03 KAnwar - AICOMSQ - QECC2022
03 KAnwar - AICOMSQ - QECC2022
03 KAnwar - AICOMSQ - QECC2022
E-mail: [email protected]
Presented at The 2022 AICOMS-Q Workshop on Quantum Theory, Development, and Business
Bandung (Hybrid), 8 December 2022
fi
PUI-PT AICOMS Transformation
• AICOMS (formerly AdWiTech) established in
September 2016 and received funding from
national and international funding bodies.
Funding: RP700M Funding: RP2.5B Funding: RP2.5B Funding: RP4B Funding: RP4B Funding: RP4B+
• ASEAN IVO • ASEAN IVO •
Established • EPSRC UK • LPDP Rispro • LPDP Rispro • LPDP Rispro
ASEAN IVO
• Ristekdikti • Ristekdikti • LPDP Rispro • LPDP Rispro
since Sept. • Ristekdikti • Ristekdikti • Kominfo
• Kominfo
2016 • Internal • Insinas • Insinas • PUI-PT
•
•
PUI-PT
Kemendikbud • PUI-PT
• Kemendikbud • BRIN • BRIN 2
AICOMS Current 5 Top Products/Projects
(1) MCRBS (2) High speed train (3) Over-The-Horizon Comm. /Rocket
& 5G-MERDEKA (5G-FRMCS)
Mobile Cognitive
Radio Base Station
(4) Next Generation IoT (5) AI, Quantum Coding & Security image:
nature
Cluster 1
AICOMS, Telkom University
Others
Cluster 2
Others
Cluster 3
• Quantum mechanics (QM) and quantum eld theory describe nature at the smallest scales of energy
levels of atoms and subatomic particles.
5
image: Raymond Lee, Quantum nance, 2020.
fi
fi
Motivation: Succesful Digital Transformations
2021 2022
( N0 )
E
2 b 2
C ≈ K ⋅ n ⋅ B log2 1 + m ⋅ R ⋅ | h | bit/s/Hz/m /Joule/Rp
it
lim
> 1Tbps
n
no
an
Sh
• Understanding philosophy for being
better in research and teaching
7
Motivation (1/4): Trend of Telecommunications
3
Information Theory: Philosophy
Image: G. Smith, The theory of quantum information: channels, capacities, and all that, Feb. 2021 9
Information Theory: Channel Capacity
Image: G. Smith, The theory of quantum information: channels, capacities, and all that, Feb. 2021 11
ff
Current Interesting Issue: MAC + Entanglement
Image: G. Smith, The theory of quantum information: channels, capacities, and all that, Feb. 2021 12
Maximizing 5G to Prepare 6G
2020 2021 2022 2023 2024 2025 2026 2027 2028 2029 2030
10
13
Potential Technology Enablers IMT-2030
• 1. AI Communications
• AI-native new air interface
• AI-native radio network
• Radio Network for AI
• AI-driven RAN architecture and optimization
• Explainable AI for RAN
• 2. Integrated Sensing and Communications: sensing-based ultra-high accuracy positioning and localization.
• 3. Convergence of Communications and Computing Architecture: Split computing, Pervasive computing, ubiquitois
computing and data services.
15
Image: Zhang et. al, “6G WIRELESS NETWORKS Vision, Requirements, Architecture, and KeyTechnologies”, IEEE VT Magazine, July 2019.
Quantum in ITU Study and Plan for IMT-2030 (6G)
• The current IMT-2020 (5G)
standard does not address the
issue of quantum computing
but relies on traditional
cryptography.
• While large-scale quantum
computing can be expected to
take longer, it is time to
prepare for the shift to
cryptography that is secure in
the post-quantum world.
• Security algorithms can use
machine learning to identify
attacks and respond to them.
• Physical layer security
techniques can represent
efficient solutions for securing
the most critical networks.
16
Trend of Quantum Machine Learning
• The term “quantum machine learning”
came into use only around 2013 by
Lloyd, Mohseni and Rebentrost.
17
When Quantum Meet AI: QML with QC
19
Pervasive Intelligence and Non-linear Problems
Neural networks are ‘trained’using input/output
pairs to learn the input/output mapping.
xw = y
x1 ⋅ w1 + x2 ⋅ w2 + x3 ⋅ w3 = y
Solution if
everything is
linear
−1
w=x y
https://soujiroseta.tumblr.com/
21
Processors Are Approaching Quantum
Circuit components approach quantum size
Feature size (mm)
… 1900 2000
Time
M. Planck D. Deutsch
A. Einstein, B. Podolski, N. Rosen J. S. Bell
E. Fermi
IBM Q
Black-body
radiation and EPR Paradox (1935).
discrete nature of L. De Broglie, E. Schrödinger Preliminary
atomic and sub- Bell‘s formulation
atomic physics. Theorem of quantum
(1965) computation
Wave mechanics (1924-1926). (1985)
image: Bassoli, “Entanglement-assisted (Quantum) Communication
Entanglement-assisted Networks”,
(Quantum) Communication Networks
IEEE International Conference on Communications 2021
IEEE International (ICC21),
Conference 14-23 June
on Communications 2021
2021 (ICC21) Page 4 23
Virtual // 14-23 June 2021
The History of 3 Important Technology for 6G
Neural Computer
1948 1950 1960 1969 1980 1990 2020
Cybernetics Multilayer NN Back prop, GD SVM Many
& Learning in The Brain Perceptron & XOR Problem Application
s
• From roughly 2013 onwards, quantum machine learning became its own sub-
discipline of quantum computing 25
fl
Quantum Information Theory and Communications
• Venn logic diagram
representing the main
research sub-areas in the
research eld of quantum
communication networks
image: Bassoli, et al., “Quantum Communication Networks, 1st, Springer, Forthcoming, ISBN: 978-3-030- 62938-0. 26
fi
What is Special from Quantum Information (1/2)
Classic: Quantum:
0 or 1 | 0⟩ and | 1⟩
stores only one number: 2022 stores all numbers from 0 to 2047
?
Sep 21st 2019 China: $11bn quantum
March-June 2020 computing investment
29
image: British Telecom
4
Quantum Computer in Japan 2022 and World
31
The Proposed Quantum Error Correction Codes
32
image: K. Anwar, invited paper in IEEE APCC 2021.
Quantum Gates: Do not Exist in Classical
34
Dual Packet and Wave
35
Simulation of Quantum Photon
• % (c) Dr. Eng. Khoirul Anwar
250
• % Center for Advanced Intelligent
Communications (AICOMS), Telkom 200
University
150
• % Bandung, 13 June 2022
100
•
50
• clear all;
0
• x=-20:0.1:20;
-50
• b=0;
-100
• for ii=1:300
-150
• a=sin((6+ii/500).*x);
-200
• b=a+b;
-250
• end © K. Anwar, 2022
0 50 100 150 200 250 300 350 400
• plot(b)
36
The Meaning of Superposition
α | 4⟩ + β | 5⟩
poison released
q1 = |0i
<latexit sha1_base64="Lae3EfyKIwApObpKSgWv1XRXYEk=">AAAB9XicbVDLSgNBEOyNrxhfUY9eBoPgKexKUC9C0IvHCOYByRpmJ73JkNnZdWZWCTH/4cWDIl79F2/+jZPHQRMLGoqqbrq7gkRwbVz328ksLa+srmXXcxubW9s7+d29mo5TxbDKYhGrRkA1Ci6xargR2EgU0igQWA/6V2O//oBK81jemkGCfkS7koecUWOlu/u2d/HkthSVXYGknS+4RXcCski8GSnADJV2/qvViVkaoTRMUK2bnpsYf0iV4UzgKNdKNSaU9WkXm5ZKGqH2h5OrR+TIKh0SxsqWNGSi/p4Y0kjrQRTYzoianp73xuJ/XjM14bk/5DJJDUo2XRSmgpiYjCMgHa6QGTGwhDLF7a2E9aiizNigcjYEb/7lRVI7KXqnxdJNqVC+nMWRhQM4hGPw4AzKcA0VqAIDBc/wCm/Oo/PivDsf09aMM5vZhz9wPn8AlcOR7g==</latexit>
or not
© K. Anwar, 2021
q2 = |0i cat alive or dead
<latexit sha1_base64="ml3MfFtpMBFib5pl3UHYKJWNfEk=">AAAB9XicbVDLSgNBEOz1GeMr6tHLYBA8hd0Q1IsQ9OIxgnlAsobZSScZMju7zswqIeY/vHhQxKv/4s2/cZLsQRMLGoqqbrq7glhwbVz321laXlldW89sZDe3tnd2c3v7NR0limGVRSJSjYBqFFxi1XAjsBErpGEgsB4MriZ+/QGV5pG8NcMY/ZD2JO9yRo2V7u7bxYsnt6Wo7Akk7VzeLbhTkEXipSQPKSrt3FerE7EkRGmYoFo3PTc2/ogqw5nAcbaVaIwpG9AeNi2VNETtj6ZXj8mxVTqkGylb0pCp+ntiREOth2FgO0Nq+nrem4j/ec3EdM/9EZdxYlCy2aJuIoiJyCQC0uEKmRFDSyhT3N5KWJ8qyowNKmtD8OZfXiS1YsE7LZRuSvnyZRpHBg7hCE7AgzMowzVUoAoMFDzDK7w5j86L8+58zFqXnHTmAP7A+fwBl1KR7w==</latexit>
image: britannica
image: wikipedia
| i = ↵|000i + |111i
<latexit sha1_base64="8UAWrahwh1haXbb2y7fHBtTHRuc=">AAACHXicbZDLSgMxFIYzXmu9VV26CRZBEMqMFHUjFN24rGAv0CnlTHrahmYyQ5IRStsXceOruHGhiAs34tuY3kBbfwj8fOccTs4fxIJr47rfztLyyuraemojvbm1vbOb2dsv6yhRDEssEpGqBqBRcIklw43AaqwQwkBgJejejOqVB1SaR/Le9GKsh9CWvMUZGIsamfzAjzX3Fci2QHrlg4g7QAeu687YqR+gscjzvBlqZLJuzh2LLhpvarJkqmIj8+k3I5aEKA0ToHXNc2NT74MynAkcpv1EYwysC22sWSshRF3vj68b0mNLmrQVKfukoWP6e6IPoda9MLCdIZiOnq+N4H+1WmJal/U+l3FiULLJolYiqInoKCra5AqZET1rgClu/0pZBxQwYwNN2xC8+ZMXTfks553n8nf5bOF6GkeKHJIjckI8ckEK5JYUSYkw8kieySt5c56cF+fd+Zi0LjnTmQPyR87XD215oNw=</latexit>
| i = ↵|000i + |110i
per hour.
• We also add a Geiger counter that can detect that Radioactive: | keep⟩ = | 0⟩, | released⟩ = | 1⟩
single emission, plus a connected hammer that
can smash open a closed vial of cyanide poison. Poison: | keep⟩ = | 0⟩, | released⟩ = | 1⟩
• If the Geiger counter detects anything, the hammer Cat: | alive⟩ = | 0⟩, | dead⟩ = | 1⟩
swings and cyanide is released into the air.
38
A Simple MATLAB Programming for Quantum Encoder
Prove this circuit: ket0=[1;0];
ket00=kron(ket0,ket0);
ket000=kron(ket00,ket0);
H=1/sqrt(2)*[1 1;1 -1];
HI=kron(H,eye(2));
HII=kron(HI,eye(2));
A=HII*ket000;
X= [0 1;1 0];
CNOT=[eye(2) zeros(2,2); zeros(2,2) X]
CI=kron(CNOT,eye(2)):
B=CI*A;
IC=kron(eye(2),CNOT);
D=IC*B;
Answer:
IC CI HII ket000 39
Classification of Stabilizer-based Quantum ECC
40
image: L. Hanzo
Revisit The Classical Repetition and SPC Codes 3a
Repetition Codes R = 1/3 a a
G = [ 1 1 1]
a a
[ 1 0 1]
1 1 0 © K. Anwar, 2020
H=
a a
[0 1 1]
1 0 1 a a
G=
© K. Anwar, 2020 2b
H = [ 1 1 1] b b
poison released
q1 = |0i
<latexit sha1_base64="Lae3EfyKIwApObpKSgWv1XRXYEk=">AAAB9XicbVDLSgNBEOyNrxhfUY9eBoPgKexKUC9C0IvHCOYByRpmJ73JkNnZdWZWCTH/4cWDIl79F2/+jZPHQRMLGoqqbrq7gkRwbVz328ksLa+srmXXcxubW9s7+d29mo5TxbDKYhGrRkA1Ci6xargR2EgU0igQWA/6V2O//oBK81jemkGCfkS7koecUWOlu/u2d/HkthSVXYGknS+4RXcCski8GSnADJV2/qvViVkaoTRMUK2bnpsYf0iV4UzgKNdKNSaU9WkXm5ZKGqH2h5OrR+TIKh0SxsqWNGSi/p4Y0kjrQRTYzoianp73xuJ/XjM14bk/5DJJDUo2XRSmgpiYjCMgHa6QGTGwhDLF7a2E9aiizNigcjYEb/7lRVI7KXqnxdJNqVC+nMWRhQM4hGPw4AzKcA0VqAIDBc/wCm/Oo/PivDsf09aMM5vZhz9wPn8AlcOR7g==</latexit>
or not
© K. Anwar, 2021
q2 = |0i cat alive or dead
<latexit sha1_base64="ml3MfFtpMBFib5pl3UHYKJWNfEk=">AAAB9XicbVDLSgNBEOz1GeMr6tHLYBA8hd0Q1IsQ9OIxgnlAsobZSScZMju7zswqIeY/vHhQxKv/4s2/cZLsQRMLGoqqbrq7glhwbVz321laXlldW89sZDe3tnd2c3v7NR0limGVRSJSjYBqFFxi1XAjsBErpGEgsB4MriZ+/QGV5pG8NcMY/ZD2JO9yRo2V7u7bxYsnt6Wo7Akk7VzeLbhTkEXipSQPKSrt3FerE7EkRGmYoFo3PTc2/ogqw5nAcbaVaIwpG9AeNi2VNETtj6ZXj8mxVTqkGylb0pCp+ntiREOth2FgO0Nq+nrem4j/ec3EdM/9EZdxYlCy2aJuIoiJyCQC0uEKmRFDSyhT3N5KWJ8qyowNKmtD8OZfXiS1YsE7LZRuSvnyZRpHBg7hCE7AgzMowzVUoAoMFDzDK7w5j86L8+58zFqXnHTmAP7A+fwBl1KR7w==</latexit>
image: britannica
image: wikipedia
| i = ↵|000i + |111i
<latexit sha1_base64="8UAWrahwh1haXbb2y7fHBtTHRuc=">AAACHXicbZDLSgMxFIYzXmu9VV26CRZBEMqMFHUjFN24rGAv0CnlTHrahmYyQ5IRStsXceOruHGhiAs34tuY3kBbfwj8fOccTs4fxIJr47rfztLyyuraemojvbm1vbOb2dsv6yhRDEssEpGqBqBRcIklw43AaqwQwkBgJejejOqVB1SaR/Le9GKsh9CWvMUZGIsamfzAjzX3Fci2QHrlg4g7QAeu687YqR+gscjzvBlqZLJuzh2LLhpvarJkqmIj8+k3I5aEKA0ToHXNc2NT74MynAkcpv1EYwysC22sWSshRF3vj68b0mNLmrQVKfukoWP6e6IPoda9MLCdIZiOnq+N4H+1WmJal/U+l3FiULLJolYiqInoKCra5AqZET1rgClu/0pZBxQwYwNN2xC8+ZMXTfks553n8nf5bOF6GkeKHJIjckI8ckEK5JYUSYkw8kieySt5c56cF+fd+Zi0LjnTmQPyR87XD215oNw=</latexit>
| i = ↵|000i + |110i
per hour.
• We also add a Geiger counter that can detect that Radioactive: | keep⟩ = | 0⟩, | released⟩ = | 1⟩
single emission, plus a connected hammer that
can smash open a closed vial of cyanide poison. Poison: | keep⟩ = | 0⟩, | released⟩ = | 1⟩
• If the Geiger counter detects anything, the hammer Cat: | alive⟩ = | 0⟩, | dead⟩ = | 1⟩
swings and cyanide is released into the air.
42
[[3,1,1]] Quantum Repetition Codes Bit Flip 2
[ 0 0 0 | 0 1 1]
g1 = ZZI 0 0 0 | 1 1 0
H=
g2 = IZZ
H = [Hx | Hz]
[0 0]
T T 0 0
HxHz + HzHx = 04 mod 2 =
d
∑ (n) (1 − p)
d/2
| 0⟩L = | 000⟩ | 1⟩L = | 111⟩ Pe =
d n d−n
p (1 − p) ≈
p 2
n=0
| i
<latexit sha1_base64="jm85o2FRK0yybzX3QsIegyv22Wk=">AAAB9HicbVDLSgNBEOyNrxhfUY9eBoPgKexKUI9BLx4jmAdklzA76U2GzM6uM7OBEPMdXjwo4tWP8ebfOHkcNLGgoajqprsrTAXXxnW/ndza+sbmVn67sLO7t39QPDxq6CRTDOssEYlqhVSj4BLrhhuBrVQhjUOBzXBwO/WbQ1SaJ/LBjFIMYtqTPOKMGisFT36qua+o7AkknWLJLbszkFXiLUgJFqh1il9+N2FZjNIwQbVue25qgjFVhjOBk4KfaUwpG9Aeti2VNEYdjGdHT8iZVbokSpQtachM/T0xprHWozi0nTE1fb3sTcX/vHZmoutgzGWaGZRsvijKBDEJmSZAulwhM2JkCWWK21sJ61NFmbE5FWwI3vLLq6RxUfYuy5X7Sql6s4gjDydwCufgwRVU4Q5qUAcGj/AMr/DmDJ0X5935mLfmnMXMMfyB8/kDyZySHg==</latexit>
© K. Anwar, 2022
|0i
<latexit sha1_base64="Rp9p3w4hCxG08xa/QEmcuy8N5gM=">AAAB8XicbVBNS8NAEJ3Ur1q/qh69LBbBU0lE1GPRi8cK9gPbUDbbSbt0swm7G6HE/gsvHhTx6r/x5r9x2+agrQ8GHu/NMDMvSATXxnW/ncLK6tr6RnGztLW9s7tX3j9o6jhVDBssFrFqB1Sj4BIbhhuB7UQhjQKBrWB0M/Vbj6g0j+W9GSfoR3QgecgZNVZ6eHK7isqBQNIrV9yqOwNZJl5OKpCj3it/dfsxSyOUhgmqdcdzE+NnVBnOBE5K3VRjQtmIDrBjqaQRaj+bXTwhJ1bpkzBWtqQhM/X3REYjrcdRYDsjaoZ60ZuK/3md1IRXfsZlkhqUbL4oTAUxMZm+T/pcITNibAllittbCRtSRZmxIZVsCN7iy8ukeVb1Lqrnd+eV2nUeRxGO4BhOwYNLqMEt1KEBDCQ8wyu8Odp5cd6dj3lrwclnDuEPnM8fERuQiA==</latexit>
|0i
<latexit sha1_base64="Rp9p3w4hCxG08xa/QEmcuy8N5gM=">AAAB8XicbVBNS8NAEJ3Ur1q/qh69LBbBU0lE1GPRi8cK9gPbUDbbSbt0swm7G6HE/gsvHhTx6r/x5r9x2+agrQ8GHu/NMDMvSATXxnW/ncLK6tr6RnGztLW9s7tX3j9o6jhVDBssFrFqB1Sj4BIbhhuB7UQhjQKBrWB0M/Vbj6g0j+W9GSfoR3QgecgZNVZ6eHK7isqBQNIrV9yqOwNZJl5OKpCj3it/dfsxSyOUhgmqdcdzE+NnVBnOBE5K3VRjQtmIDrBjqaQRaj+bXTwhJ1bpkzBWtqQhM/X3REYjrcdRYDsjaoZ60ZuK/3md1IRXfsZlkhqUbL4oTAUxMZm+T/pcITNibAllittbCRtSRZmxIZVsCN7iy8ukeVb1Lqrnd+eV2nUeRxGO4BhOwYNLqMEt1KEBDCQ8wyu8Odp5cd6dj3lrwclnDuEPnM8fERuQiA==</latexit>
|0i
<latexit sha1_base64="Rp9p3w4hCxG08xa/QEmcuy8N5gM=">AAAB8XicbVBNS8NAEJ3Ur1q/qh69LBbBU0lE1GPRi8cK9gPbUDbbSbt0swm7G6HE/gsvHhTx6r/x5r9x2+agrQ8GHu/NMDMvSATXxnW/ncLK6tr6RnGztLW9s7tX3j9o6jhVDBssFrFqB1Sj4BIbhhuB7UQhjQKBrWB0M/Vbj6g0j+W9GSfoR3QgecgZNVZ6eHK7isqBQNIrV9yqOwNZJl5OKpCj3it/dfsxSyOUhgmqdcdzE+NnVBnOBE5K3VRjQtmIDrBjqaQRaj+bXTwhJ1bpkzBWtqQhM/X3REYjrcdRYDsjaoZ60ZuK/3md1IRXfsZlkhqUbL4oTAUxMZm+T/pcITNibAllittbCRtSRZmxIZVsCN7iy8ukeVb1Lqrnd+eV2nUeRxGO4BhOwYNLqMEt1KEBDCQ8wyu8Odp5cd6dj3lrwclnDuEPnM8fERuQiA==</latexit>
Z Z
<latexit sha1_base64="SnYQS61M9QihKlqmdyE6xQ3C+Lw=">AAAB6HicbVDLTgJBEOzFF+IL9ehlIjHxRHYNUY9ELx4hkUeEDZkdemFkdnYzM2tCCF/gxYPGePWTvPk3DrAHBSvppFLVne6uIBFcG9f9dnJr6xubW/ntws7u3v5B8fCoqeNUMWywWMSqHVCNgktsGG4EthOFNAoEtoLR7cxvPaHSPJb3ZpygH9GB5CFn1Fip/tArltyyOwdZJV5GSpCh1it+dfsxSyOUhgmqdcdzE+NPqDKcCZwWuqnGhLIRHWDHUkkj1P5kfuiUnFmlT8JY2ZKGzNXfExMaaT2OAtsZUTPUy95M/M/rpCa89idcJqlByRaLwlQQE5PZ16TPFTIjxpZQpri9lbAhVZQZm03BhuAtv7xKmhdl77JcqVdK1ZssjjycwCmcgwdXUIU7qEEDGCA8wyu8OY/Oi/PufCxac042cwx/4Hz+ALuvjOc=</latexit>
<latexit sha1_base64="SnYQS61M9QihKlqmdyE6xQ3C+Lw=">AAAB6HicbVDLTgJBEOzFF+IL9ehlIjHxRHYNUY9ELx4hkUeEDZkdemFkdnYzM2tCCF/gxYPGePWTvPk3DrAHBSvppFLVne6uIBFcG9f9dnJr6xubW/ntws7u3v5B8fCoqeNUMWywWMSqHVCNgktsGG4EthOFNAoEtoLR7cxvPaHSPJb3ZpygH9GB5CFn1Fip/tArltyyOwdZJV5GSpCh1it+dfsxSyOUhgmqdcdzE+NPqDKcCZwWuqnGhLIRHWDHUkkj1P5kfuiUnFmlT8JY2ZKGzNXfExMaaT2OAtsZUTPUy95M/M/rpCa89idcJqlByRaLwlQQE5PZ16TPFTIjxpZQpri9lbAhVZQZm03BhuAtv7xKmhdl77JcqVdK1ZssjjycwCmcgwdXUIU7qEEDGCA8wyu8OY/Oi/PufCxac042cwx/4Hz+ALuvjOc=</latexit>
| t i = ↵|000i + |111i
<latexit sha1_base64="UdACAh3wR/TgAgHSvSazoE9XXdI=">AAACIHicbZBNSwMxEIazflu/qh69BIsgCGVXivUiiF48KthW6JYym07bYDa7JLNCqf4UL/4VLx4U0Zv+GtO6gl8vBF6emWEyb5Qqacn337yJyanpmdm5+cLC4tLySnF1rW6TzAisiUQl5iICi0pqrJEkhRepQYgjhY3o8nhUb1yhsTLR5zRIsRVDT8uuFEAOtYvV6zC1sk2hAd1TyA94CCrtA7/2ff8L7vAwQnIsCIKctYslv+yPxf+aIDclluu0XXwNO4nIYtQkFFjbDPyUWkMwJIXCm0KYWUxBXEIPm85qiNG2huMDb/iWIx3eTYx7mviYfp8YQmztII5cZwzUt79rI/hfrZlRd781lDrNCLX4XNTNFKeEj9LiHWlQkBo4A8JI91cu+mBAkMu04EIIfp/819R3y8FeuXJWKR0e5XHMsQ22ybZZwKrskJ2wU1Zjgt2ye/bInrw778F79l4+Wye8fGad/ZD3/gGAlaHt</latexit>
|0i
<latexit sha1_base64="Rp9p3w4hCxG08xa/QEmcuy8N5gM=">AAAB8XicbVBNS8NAEJ3Ur1q/qh69LBbBU0lE1GPRi8cK9gPbUDbbSbt0swm7G6HE/gsvHhTx6r/x5r9x2+agrQ8GHu/NMDMvSATXxnW/ncLK6tr6RnGztLW9s7tX3j9o6jhVDBssFrFqB1Sj4BIbhhuB7UQhjQKBrWB0M/Vbj6g0j+W9GSfoR3QgecgZNVZ6eHK7isqBQNIrV9yqOwNZJl5OKpCj3it/dfsxSyOUhgmqdcdzE+NnVBnOBE5K3VRjQtmIDrBjqaQRaj+bXTwhJ1bpkzBWtqQhM/X3REYjrcdRYDsjaoZ60ZuK/3md1IRXfsZlkhqUbL4oTAUxMZm+T/pcITNibAllittbCRtSRZmxIZVsCN7iy8ukeVb1Lqrnd+eV2nUeRxGO4BhOwYNLqMEt1KEBDCQ8wyu8Odp5cd6dj3lrwclnDuEPnM8fERuQiA==</latexit>
Z Z
<latexit sha1_base64="SnYQS61M9QihKlqmdyE6xQ3C+Lw=">AAAB6HicbVDLTgJBEOzFF+IL9ehlIjHxRHYNUY9ELx4hkUeEDZkdemFkdnYzM2tCCF/gxYPGePWTvPk3DrAHBSvppFLVne6uIBFcG9f9dnJr6xubW/ntws7u3v5B8fCoqeNUMWywWMSqHVCNgktsGG4EthOFNAoEtoLR7cxvPaHSPJb3ZpygH9GB5CFn1Fip/tArltyyOwdZJV5GSpCh1it+dfsxSyOUhgmqdcdzE+NPqDKcCZwWuqnGhLIRHWDHUkkj1P5kfuiUnFmlT8JY2ZKGzNXfExMaaT2OAtsZUTPUy95M/M/rpCa89idcJqlByRaLwlQQE5PZ16TPFTIjxpZQpri9lbAhVZQZm03BhuAtv7xKmhdl77JcqVdK1ZssjjycwCmcgwdXUIU7qEEDGCA8wyu8OY/Oi/PufCxac042cwx/4Hz+ALuvjOc=</latexit>
<latexit sha1_base64="SnYQS61M9QihKlqmdyE6xQ3C+Lw=">AAAB6HicbVDLTgJBEOzFF+IL9ehlIjHxRHYNUY9ELx4hkUeEDZkdemFkdnYzM2tCCF/gxYPGePWTvPk3DrAHBSvppFLVne6uIBFcG9f9dnJr6xubW/ntws7u3v5B8fCoqeNUMWywWMSqHVCNgktsGG4EthOFNAoEtoLR7cxvPaHSPJb3ZpygH9GB5CFn1Fip/tArltyyOwdZJV5GSpCh1it+dfsxSyOUhgmqdcdzE+NPqDKcCZwWuqnGhLIRHWDHUkkj1P5kfuiUnFmlT8JY2ZKGzNXfExMaaT2OAtsZUTPUy95M/M/rpCa89idcJqlByRaLwlQQE5PZ16TPFTIjxpZQpri9lbAhVZQZm03BhuAtv7xKmhdl77JcqVdK1ZssjjycwCmcgwdXUIU7qEEDGCA8wyu8OY/Oi/PufCxac042cwx/4Hz+ALuvjOc=</latexit>
44
How to Detect Error (3 Qubits)
45
Image: J. Ro e
ff
Shor Codes (1/2)
© K. Anwar, 2022
A B C
46
fi
fl
Encoder Decoder
8
Ka IIIXXXXXX 47
What is The Minimum Qubits to Protect from A
Single Qubit Error
• Hamming bound for t qubits correction capability, the number of n qubits is obtained from
49
image: K. Anwar, invited paper in IEEE APCC 2021.
Quantum Machine Learning
50
Machine Learning for XOR Operation (1)
• XOR is an important function for error A L1
correction coding as the parity check. L3
⊕ C
• In 1969, a single neuron is found failed for a
training to perform XOR operation, because B L2
at least three-layer NN is required.
Tabel XOR as training data set
• In the soft-decoding, the operation of XOR is A B C
performed by a box-plus operation ⊞ as 0 0 0
0 1 1
( 2 )
(L1+L2)
1+e 1 0 1
• L3 = L1 ⊞ L2 = log
e L1 + e L 1 1 0
(1 + e 1 2 )
−|L1+L2|
1+e
= sign(L1) ⋅ sign(L2) ⋅ min( | L1 | , | L2 | ) + log −|L −L | ⇐Machine learning
≈ sign(L1) ⋅ sign(L2) ⋅ min( | L1 | , | L2 | ) ⇐Current hardware
51
Machine Learning for XOR Operation (2)
• We consider three-layer NN. A L1
L3
• Since log-likelihood ratio (LLR) taking both
positive and negative value is considered, we
⊕ C
use the action functions: B L2
• f1(z) = tanh(z)
© K. Anwar, 2022
A y
z1 f1 1
• f2(z) = tanh(z)
• f3(z3) = z3 y2 y3
B z2 f2 z3 f3
• with zi being the logit of the i-th neuron.
• y1, y2, y3 are output of each neuron. 1 1
• We include bias to observe the e ects. 52
ff
Machine Learning for XOR Operation (3)
Let the matrix of weight originally of
f1(z) = tanh(z)
[1 1.2 1.4]
2.3 0.9801
1 1.1 1.2
w1 = z1 f1 f2(z) = tanh(z)
0 A w11 = 1
f3(z) = z
w2
1
=
w1
and
=
1.
. 1
1
1
w2 = [1.1 1.2 1.3] = 2.6 0.9890 3.5649
w 12
y3 = 3.5649
1
B w22 = 1.2
z2 f2 w2 = 1.2
z3 f3
We try data 2, i.e.,
A=0, B=1, C=1.
.2
© K. Anwar, 2022 . 3
=1 =
1 e = 1 − y3 = − 2.5649
4
The error is w3
13
1.
w
=
1 − y3 = − 2.5649. 1 1
23
w
53
Machine Learning for XOR Operation (4)
The learning rate is α = 0.1
f1(z) = tanh(z)
[1 1.1933 1.3933] 0
e1 = − 2.8214
ℓ=1 1 1.0889 1.1889 −0.1112
w1 =
A w11 = 1−0
v
δ1 1
f2(z) = tanh(z)
f3(z) = z
w2
1
1
w1
and 1 1
1
. 0
=
0
−
1.
. 1
w2 = [0.8486 0.9463 1.0435]
1
1
= −0.0672 e2 = − 3.0779 δ = − 2.5649
2
w 1
y3 = 3.5649
1
B v w2 = 1.2
δ f3
[ ]
δ2 2
w22 = 1.2−0.0067
ℓ=1 0 −0.0111 −0.0111
Δw1 =
0 −0.0067 −0.0067
111
0.0
.2 −
7
ℓ=1
Δw2 = [−0.2514 −0.2537 −0.2565] © K. Anwar, 2022 . 3
06
=1
1 e = 1 − y3 = − 2.5649
0
=
0.
4−
1 w3
Δw2 = αδy1
13
1.
w
1 1
=
The error is
23
= − 0.2514 1 − y3 = − 2.5649. 54
Machine Learning for XOR Operation (5)
After the training with 1600 iterations
f1(z) = tanh(z)
[0.7398 0.7450 −0.7286]
2.4937 2.6152 −0.3243 2.2909 0.9797
w1 =
z1 f1 f2(z) = tanh(z)
0 A w11 = 2.4937
and f3(z) = z
w2
w1
1
=
w2 = [1.5922 −1.6581 −0.5328]
=
0.
7
1.
39
2
5
5
92
1
8
0.2
. 6
2
2 0.0164
= 0.0164 1
w 1 2
y3 = 1
B z2 f2 z3 f3
0
243
2 8
0.3
53
Error
-0.4
© K. Anwar, 2022 0 .
e = 1 − y3 = 0
=−
86
−
=
72
0.
w3
13
-0.6
−
-0.8 1 w
=
23 1
-1 55
0 200 400 600 800 1000 1200 1400 1600 1800 2000
Epoch
Machine Learning for XOR Operation (6)
0.2 0.2
Tanh+linear+bias
Tanh+bias
0 Tanh 0
Sigmoid
-0.2 -0.2
Error
Error
-0.4 -0.4
-0.6 -0.6
Tanh+linear+bias
-0.8 -0.8
Tanh+bias
Tanh
Sigmoid
-1 -1
0 500 1000 1500 2000 2500 3000 0 0.2 0.4 0.6 0.8 1 1.2 1.4 1.6 1.8 2
Epoch Epoch #10 4
• QML can succesfully demap 5G CBPSK and 4-QAM by naturally creating the boundary of the areas.
• QML is potential for future M-QAM in 6G, where M > 1024, of which the classical computation is heavy.60
Quantum Deep Learning
• A generic circuit can be seen as a neural
network, where the inputs are the
components ⟨μi |φ(x )⟩ of the data-
encoding state |φ(x )⟩ in the eigenbasis
n
| μ⟩, i = 1,⋯,2 of the measurement
∑
M= μi | μi⟩⟨μi | .
i