[go: up one dir, main page]
More Web Proxy on the site http://driver.im/
You seem to have javascript disabled. Please note that many of the page functionalities won't work as expected without javascript enabled.
 
 
Sign in to use this feature.

Years

Between: -

Subjects

remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline

Journals

Article Types

Countries / Regions

Search Results (29)

Search Parameters:
Keywords = qiskit

Order results
Result details
Results per page
Select all
Export citation of selected articles as:
31 pages, 1546 KiB  
Article
Using a Simplified Quantum Counter to Implement Quantum Circuits Based on Grover’s Algorithm to Tackle the Exact Cover Problem
by Jehn-Ruey Jiang and Yu-Jie Wang
Mathematics 2025, 13(1), 90; https://doi.org/10.3390/math13010090 (registering DOI) - 29 Dec 2024
Viewed by 67
Abstract
In this paper, we use a simplified quantum counter to implement Grover’s algorithm-based quantum circuits to tackle the NP-hard exact cover problem (ECP). The ECP seeks a subcollection of sets such that every element is covered by exactly one set. Leveraging Grover’s algorithm, [...] Read more.
In this paper, we use a simplified quantum counter to implement Grover’s algorithm-based quantum circuits to tackle the NP-hard exact cover problem (ECP). The ECP seeks a subcollection of sets such that every element is covered by exactly one set. Leveraging Grover’s algorithm, our quantum circuits achieve a quadratic speedup, querying the oracle O(N) times, compared to O(N) for classical methods, where N=2n is the total number of unstructured input instances and n is the number of input (quantum) bits. For the whole quantum circuit, the simplified quantum counter saves (4mb4m)π/4N/M quantum gates and reduces the quantum circuit depth by (2mb)π/4N/M compared to Heidari et al.’s design, where b=logn+1 is the number of counting qubits used in a counter. Experimental results obtained using IBM Qiskit packages confirm the effectiveness of our quantum circuits. Full article
(This article belongs to the Special Issue Quantum Computing and Networking)
20 pages, 495 KiB  
Article
Solving the Independent Domination Problem by the Quantum Approximate Optimization Algorithm
by Haoqian Pan and Changhong Lu
Entropy 2024, 26(12), 1057; https://doi.org/10.3390/e26121057 - 5 Dec 2024
Viewed by 518
Abstract
In the wake of quantum computing advancements and quantum algorithmic progress, quantum algorithms are increasingly being employed to address a myriad of combinatorial optimization problems. Among these, the Independent Domination Problem (IDP), a derivative of the Domination Problem, has practical implications in various [...] Read more.
In the wake of quantum computing advancements and quantum algorithmic progress, quantum algorithms are increasingly being employed to address a myriad of combinatorial optimization problems. Among these, the Independent Domination Problem (IDP), a derivative of the Domination Problem, has practical implications in various real-world scenarios. Despite this, existing classical algorithms for the IDP are plagued by high computational complexity, and quantum algorithms have yet to tackle this challenge. This paper introduces a Quantum Approximate Optimization Algorithm (QAOA)-based approach to address the IDP. Utilizing IBM’s qasm_simulator, we have demonstrated the efficacy of the QAOA in solving the IDP under specific parameter settings, with a computational complexity that surpasses that of classical methods. Our findings offer a novel avenue for the resolution of the IDP. Full article
(This article belongs to the Special Issue Quantum Computing in the NISQ Era)
Show Figures

Figure 1

Figure 1
<p>Basic working flow of QAOA with 2 layers and 10 qubits.</p>
Full article ">Figure 2
<p>An unweighted graph with 6 nodes and 5 edges.</p>
Full article ">Figure 3
<p>The probability distribution of the bit strings when <math display="inline"><semantics> <mrow> <mi>q</mi> <mo>=</mo> <mn>15</mn> </mrow> </semantics></math>, <math display="inline"><semantics> <mrow> <mi>a</mi> <mi>l</mi> <mi>p</mi> <mi>h</mi> <mi>a</mi> <mo>=</mo> <mn>0.3</mn> </mrow> </semantics></math>, <math display="inline"><semantics> <mrow> <mi>P</mi> <mo>=</mo> <mn>4.5</mn> </mrow> </semantics></math>, and maximum iterations = 10,000. The sampling probabilities for the two most probable bit strings are highlighted in purple.</p>
Full article ">Figure 4
<p>Visualization of the IDS <math display="inline"><semantics> <mrow> <mo>{</mo> <mn>1</mn> <mo>,</mo> <mn>2</mn> <mo>,</mo> <mn>5</mn> <mo>}</mo> </mrow> </semantics></math>. The yellow vertices represent the elements of the IDS, while the red vertices indicate the dominated vertices.</p>
Full article ">Figure 5
<p>Visualization of the IDS <math display="inline"><semantics> <mrow> <mo>{</mo> <mn>0</mn> <mo>,</mo> <mn>3</mn> <mo>,</mo> <mn>4</mn> <mo>}</mo> </mrow> </semantics></math>. The yellow vertices represent the elements of the IDS, while the red vertices indicate the dominated vertices.</p>
Full article ">Figure 6
<p>The cost of the QAOA for <math display="inline"><semantics> <mrow> <mi>q</mi> <mo>=</mo> <mn>15</mn> </mrow> </semantics></math>, <math display="inline"><semantics> <mrow> <mi>a</mi> <mi>l</mi> <mi>p</mi> <mi>h</mi> <mi>a</mi> <mo>=</mo> <mn>0.3</mn> </mrow> </semantics></math>, <math display="inline"><semantics> <mrow> <mi>P</mi> <mo>=</mo> <mn>4.5</mn> </mrow> </semantics></math>, and a maximum of 10,000 iterations. The zoomed-in region focuses on iterations within the range <math display="inline"><semantics> <mrow> <mo>[</mo> <mn>0</mn> <mo>,</mo> <mn>400</mn> <mo>]</mo> </mrow> </semantics></math>.</p>
Full article ">Figure 7
<p>A comparison of the cost for <math display="inline"><semantics> <mrow> <mi>a</mi> <mi>l</mi> <mi>p</mi> <mi>h</mi> <mi>a</mi> <mo>=</mo> <mn>0.3</mn> </mrow> </semantics></math>, <math display="inline"><semantics> <mrow> <mn>0.5</mn> </mrow> </semantics></math>, and <math display="inline"><semantics> <mrow> <mn>0.7</mn> </mrow> </semantics></math>. The values of <span class="html-italic">q</span>, <span class="html-italic">P</span>, and the maximum number of iterations are set to 15, 4.5, and 10,000, respectively. The zoomed-in region focuses on iterations within the range <math display="inline"><semantics> <mrow> <mo>[</mo> <mn>0</mn> <mo>,</mo> <mn>400</mn> <mo>]</mo> </mrow> </semantics></math>.</p>
Full article ">Figure 8
<p>A comparison of the cost for <math display="inline"><semantics> <mrow> <mi>q</mi> <mo>=</mo> <mn>10</mn> </mrow> </semantics></math>, 15, and 20. The values of <span class="html-italic">p</span>, <math display="inline"><semantics> <mrow> <mi>a</mi> <mi>l</mi> <mi>p</mi> <mi>h</mi> <mi>a</mi> </mrow> </semantics></math>, and the maximum number of iterations are set to 4.5, 0.3, and 10,000, respectively. The zoomed-in region focuses on iterations within the range <math display="inline"><semantics> <mrow> <mo>[</mo> <mn>0</mn> <mo>,</mo> <mn>400</mn> <mo>]</mo> </mrow> </semantics></math>.</p>
Full article ">Figure 9
<p>Landscape of optimal probabilities of different <span class="html-italic">q</span>, <span class="html-italic">P</span>, and maximum iterations when <math display="inline"><semantics> <mrow> <mi>a</mi> <mi>l</mi> <mi>p</mi> <mi>h</mi> <mi>a</mi> </mrow> </semantics></math> = 0.3.</p>
Full article ">Figure 10
<p>Landscape of correct probabilities of different <span class="html-italic">q</span>, <span class="html-italic">P</span>, and maximum iterations when <math display="inline"><semantics> <mrow> <mi>a</mi> <mi>l</mi> <mi>p</mi> <mi>h</mi> <mi>a</mi> </mrow> </semantics></math> = 0.3.</p>
Full article ">Figure 11
<p>Parameter distribution of experiments in which <math display="inline"><semantics> <msub> <mi>z</mi> <mo>*</mo> </msub> </semantics></math> is an optimal IDS.</p>
Full article ">Figure 12
<p>Parameter distribution of experiments in which <math display="inline"><semantics> <msub> <mi>z</mi> <mo>*</mo> </msub> </semantics></math> is an IDS.</p>
Full article ">
16 pages, 3578 KiB  
Article
Implementation and Performance Evaluation of Quantum Machine Learning Algorithms for Binary Classification
by Surajudeen Shina Ajibosin and Deniz Cetinkaya
Software 2024, 3(4), 498-513; https://doi.org/10.3390/software3040024 - 28 Nov 2024
Viewed by 531
Abstract
In this work, we studied the use of Quantum Machine Learning (QML) algorithms for binary classification and compared their performance with classical Machine Learning (ML) methods. QML merges principles of Quantum Computing (QC) and ML, offering improved efficiency and potential quantum advantage in [...] Read more.
In this work, we studied the use of Quantum Machine Learning (QML) algorithms for binary classification and compared their performance with classical Machine Learning (ML) methods. QML merges principles of Quantum Computing (QC) and ML, offering improved efficiency and potential quantum advantage in data-driven tasks and when solving complex problems. In binary classification, where the goal is to assign data to one of two categories, QML uses quantum algorithms to process large datasets efficiently. Quantum algorithms like Quantum Support Vector Machines (QSVM) and Quantum Neural Networks (QNN) exploit quantum parallelism and entanglement to enhance performance over classical methods. This study focuses on two common QML algorithms, Quantum Support Vector Classifier (QSVC) and QNN. We used the Qiskit software and conducted the experiments with three different datasets. Data preprocessing included dimensionality reduction using Principal Component Analysis (PCA) and standardization using scalers. The results showed that quantum algorithms demonstrated competitive performance against their classical counterparts in terms of accuracy, while QSVC performed better than QNN. These findings suggest that QML holds potential for improving computational efficiency in binary classification tasks. This opens the way for more efficient and scalable solutions in complex classification challenges and shows the complementary role of quantum computing. Full article
Show Figures

Figure 1

Figure 1
<p>Flowchart of the model implementation.</p>
Full article ">Figure 2
<p>ZZFeatureMap with 2 qubits for the QSVC model.</p>
Full article ">Figure 3
<p>ZZFeatureMap with a custom rotational layer.</p>
Full article ">Figure 4
<p>Ansatz generated for the ZZFeatureMap.</p>
Full article ">Figure 5
<p>Two-qubit quantum circuit configured with ZZFeatureMap and ansatz.</p>
Full article ">Figure A1
<p>Breast cancer dataset (<b>a</b>) target class balance; (<b>b</b>) PCA visualization.</p>
Full article ">Figure A2
<p>Diabetes dataset (<b>a</b>) target class balance; (<b>b</b>) PCA visualization.</p>
Full article ">Figure A3
<p>Heart disease dataset (<b>a</b>) target class balance; (<b>b</b>) PCA visualization.</p>
Full article ">
16 pages, 787 KiB  
Article
Novel Application of Quantum Computing for Routing and Spectrum Assignment in Flexi-Grid Optical Networks
by Oumayma Bouchmal, Bruno Cimoli, Ripalta Stabile, Juan Jose Vegas Olmos, Carlos Hernandez, Ricardo Martinez, Ramon Casellas and Idelfonso Tafur Monroy
Photonics 2024, 11(11), 1023; https://doi.org/10.3390/photonics11111023 - 30 Oct 2024
Viewed by 1012
Abstract
Flexi-grid technology has revolutionized optical networking by enabling Elastic Optical Networks (EONs) that offer greater flexibility and dynamism compared to traditional fixed-grid systems. As data traffic continues to grow exponentially, the need for efficient and scalable solutions to the routing and spectrum assignment [...] Read more.
Flexi-grid technology has revolutionized optical networking by enabling Elastic Optical Networks (EONs) that offer greater flexibility and dynamism compared to traditional fixed-grid systems. As data traffic continues to grow exponentially, the need for efficient and scalable solutions to the routing and spectrum assignment (RSA) problem in EONs becomes increasingly critical. The RSA problem, being NP-Hard, requires solutions that can simultaneously address both spatial routing and spectrum allocation. This paper proposes a novel quantum-based approach to solving the RSA problem. By formulating the problem as a Quadratic Unconstrained Binary Optimization (QUBO) model, we employ the Quantum Approximate Optimization Algorithm (QAOA) to effectively solve it. Our approach is specifically designed to minimize end-to-end delay while satisfying the continuity and contiguity constraints of frequency slots. Simulations conducted using the Qiskit framework and IBM-QASM simulator validate the effectiveness of our method. We applied the QAOA-based RSA approach to small network topology, where the number of nodes and frequency slots was constrained by the limited qubit count on current quantum simulator. In this small network, the algorithm successfully converged to an optimal solution in less than 30 iterations, with a total runtime of approximately 10.7 s with an accuracy of 78.8%. Additionally, we conducted a comparative analysis between QAOA, integer linear programming, and deep reinforcement learning methods to evaluate the performance of the quantum-based approach relative to classical techniques. This work lays the foundation for future exploration of quantum computing in solving large-scale RSA problems in EONs, with the prospect of achieving quantum advantage as quantum technology continues to advance. Full article
(This article belongs to the Special Issue Optical Communication Networks: Advancements and Future Directions)
Show Figures

Figure 1

Figure 1
<p>Hybrid quantum–classical loop of variational quantum algorithms.</p>
Full article ">Figure 2
<p>The key components of the QAOA variational circuit.</p>
Full article ">Figure 3
<p>Workflow of the QAOA-based approach used to solve the RSA problem in this study.</p>
Full article ">Figure 4
<p>Example of constraints used for RSA with optical link delays.</p>
Full article ">Figure 5
<p>The QAOA Ansatz circuit used in this paper, where each qubit corresponds to an available FS in the network.</p>
Full article ">Figure 6
<p>An example of the graph used for the simulation.</p>
Full article ">Figure 7
<p>The evolution of <math display="inline"><semantics> <mi>β</mi> </semantics></math> values (in radians) and the corresponding minimum energy over iterations.</p>
Full article ">Figure 8
<p>The evolution of <math display="inline"><semantics> <mi>γ</mi> </semantics></math> values (in radians) and the corresponding minimum energy over iterations.</p>
Full article ">Figure 9
<p>Probability distribution of the possible path solutions and their corresponding energy values.</p>
Full article ">
26 pages, 5228 KiB  
Article
Application of Quantum Neural Network for Solar Irradiance Forecasting: A Case Study Using the Folsom Dataset, California
by Victor Oliveira Santos, Felipe Pinto Marinho, Paulo Alexandre Costa Rocha, Jesse Van Griensven Thé and Bahram Gharabaghi
Energies 2024, 17(14), 3580; https://doi.org/10.3390/en17143580 - 21 Jul 2024
Cited by 2 | Viewed by 1507
Abstract
Merging machine learning with the power of quantum computing holds great potential for data-driven decision making and the development of powerful models for complex datasets. This area offers the potential for improving the accuracy of the real-time prediction of renewable energy production, such [...] Read more.
Merging machine learning with the power of quantum computing holds great potential for data-driven decision making and the development of powerful models for complex datasets. This area offers the potential for improving the accuracy of the real-time prediction of renewable energy production, such as solar irradiance forecasting. However, the literature on this topic is sparse. Addressing this knowledge gap, this study aims to develop and evaluate a quantum neural network model for solar irradiance prediction up to 3 h in advance. The proposed model was compared with Support Vector Regression, Group Method of Data Handling, and Extreme Gradient Boost classical models. The proposed framework could provide competitive results compared to its competitors, considering forecasting intervals of 5 to 120 min ahead, where it was the fourth best-performing paradigm. For 3 h ahead predictions, the proposed model achieved the second-best results compared with the other approaches, reaching a root mean squared error of 77.55 W/m2 and coefficient of determination of 80.92% for global horizontal irradiance forecasting. The results for longer forecasting horizons suggest that the quantum model may process spatiotemporal information from the input dataset in a manner not attainable by the current classical approaches, thus improving forecasting capacity in longer predictive windows. Full article
(This article belongs to the Section A: Sustainable Energy)
Show Figures

Figure 1

Figure 1
<p>Different ways to combine classical and quantum computing strategies to perform quantum machine learning.</p>
Full article ">Figure 2
<p>Generic QNN architecture.</p>
Full article ">Figure 3
<p>Generic angle encoding mapping approach. The rotational gate is applied to each one of the dimensions of the dataset.</p>
Full article ">Figure 4
<p>Generic ZZ feature map encoding approach.</p>
Full article ">Figure 5
<p>Generic parameterized variational quantum circuit for the ansatz structure.</p>
Full article ">Figure 6
<p>A Two Local Ansatz with linear entanglement and two repetitions.</p>
Full article ">Figure 7
<p>A generic QAOA ansatz quantum circuit.</p>
Full article ">Figure 8
<p>Pipeline for the parameter selection, using as an example the 5 min forecasting horizon. (<b>a</b>) The complete set of attributes. (<b>b</b>) The random forest strategy to select the best subset for the 5 min forecasting horizon. (<b>c</b>) The selected subset of attributes is then used to train and validate the models (<b>d</b>).</p>
Full article ">Figure 9
<p>Graph showing the progress of the objective function value versus the iteration step using Pauli Y as feature map angle encoding strategy, Pauli Y as ansatz, and COBYLA as optimizer.</p>
Full article ">Figure 10
<p>Graph showing the progress of the objective function value versus the iteration step using ZZ feature map strategy, Pauli Y as ansatz, and COBYLA as optimizer.</p>
Full article ">Figure 11
<p>Graph showing the progress of the objective function value versus the iteration step using Pauli Y feature map strategy, Two Local as ansatz, and COBYLA as optimizer.</p>
Full article ">Figure 12
<p>Graph showing the progress of the objective function value versus the iteration step using ZZ feature map strategy, Two Local as ansatz, and COBYLA as optimizer.</p>
Full article ">Figure 13
<p>Graph showing the progress of the objective function value versus the iteration step using Pauli Y feature map strategy, QAOA as ansatz, and COBYLA as optimizer.</p>
Full article ">Figure 14
<p>Graph showing the progress of the objective function value versus the iteration step using the best QNN configuration achieved.</p>
Full article ">Figure 15
<p>The quantum circuit selected for the QNN model. The feature map is composed of Pauli Y angle encoding, using the Two Local ansatz with Pauli Y rotations, controlled-NOT gates for linear entanglement, and one repetition, with L-BFGS-B as the optimizer.</p>
Full article ">
25 pages, 437 KiB  
Article
Enhancing the Security of Classical Communication with Post-Quantum Authenticated-Encryption Schemes for the Quantum Key Distribution
by Farshad Rahimi Ghashghaei, Yussuf Ahmed, Nebrase Elmrabit and Mehdi Yousefi
Computers 2024, 13(7), 163; https://doi.org/10.3390/computers13070163 - 1 Jul 2024
Cited by 1 | Viewed by 2511
Abstract
This research aims to establish a secure system for key exchange by using post-quantum cryptography (PQC) schemes in the classic channel of quantum key distribution (QKD). Modern cryptography faces significant threats from quantum computers, which can solve classical problems rapidly. PQC schemes address [...] Read more.
This research aims to establish a secure system for key exchange by using post-quantum cryptography (PQC) schemes in the classic channel of quantum key distribution (QKD). Modern cryptography faces significant threats from quantum computers, which can solve classical problems rapidly. PQC schemes address critical security challenges in QKD, particularly in authentication and encryption, to ensure the reliable communication across quantum and classical channels. The other objective of this study is to balance security and communication speed among various PQC algorithms in different security levels, specifically CRYSTALS-Kyber, CRYSTALS-Dilithium, and Falcon, which are finalists in the National Institute of Standards and Technology (NIST) Post-Quantum Cryptography Standardization project. The quantum channel of QKD is simulated with Qiskit, which is a comprehensive and well-supported tool in the field of quantum computing. By providing a detailed analysis of the performance of these three algorithms with Rivest–Shamir–Adleman (RSA), the results will guide companies and organizations in selecting an optimal combination for their QKD systems to achieve a reliable balance between efficiency and security. Our findings demonstrate that the implemented PQC schemes effectively address security challenges posed by quantum computers, while keeping the the performance similar to RSA. Full article
(This article belongs to the Section ICT Infrastructures for Cybersecurity)
Show Figures

Figure 1

Figure 1
<p>Post-Quantum cryptography process in the QKD classic channel.</p>
Full article ">Figure 2
<p>Comparison of CRYSTALS-Kyber key generation time and sizes.</p>
Full article ">Figure 3
<p>Comparison of CRYSTALS-Dilithium key generation time and sizes.</p>
Full article ">Figure 4
<p>Comparison of Falcon key generation time and sizes.</p>
Full article ">Figure 5
<p>Signature sizes.</p>
Full article ">Figure 6
<p>Ciphertext sizes.</p>
Full article ">Figure 7
<p>Kyber 512 encapsulation.</p>
Full article ">Figure 8
<p>Kyber 768 encapsulation.</p>
Full article ">Figure 9
<p>Kyber 1024 encapsulation.</p>
Full article ">Figure 10
<p>Kyber 512 decapsulation.</p>
Full article ">Figure 11
<p>Kyber 768 decapsulation.</p>
Full article ">Figure 12
<p>Kyber 1024 decapsulation.</p>
Full article ">Figure 13
<p>Performance comparison of authenticated-encryption schemes (using Falcon).</p>
Full article ">Figure 14
<p>Performance comparison of authenticated-encryption schemes (using CRYSTALS-Dilithium).</p>
Full article ">
25 pages, 728 KiB  
Article
Quantum K-Nearest Neighbors: Utilizing QRAM and SWAP-Test Techniques for Enhanced Performance
by Alberto Maldonado-Romo, J. Yaljá Montiel-Pérez, Victor Onofre, Javier Maldonado-Romo  and Juan Humberto Sossa-Azuela 
Mathematics 2024, 12(12), 1872; https://doi.org/10.3390/math12121872 - 16 Jun 2024
Viewed by 1188
Abstract
This work introduces a quantum K-Nearest Neighbor (K-NN) classifier algorithm. The algorithm utilizes angle encoding through a Quantum Random Access Memory (QRAM) using n number of qubit addresses with O(log(n)) space complexity. It incorporates Grover’s algorithm and [...] Read more.
This work introduces a quantum K-Nearest Neighbor (K-NN) classifier algorithm. The algorithm utilizes angle encoding through a Quantum Random Access Memory (QRAM) using n number of qubit addresses with O(log(n)) space complexity. It incorporates Grover’s algorithm and the quantum SWAP-Test to identify similar states and determine the nearest neighbors with high probability, achieving Om search complexity, where m is the qubit address. We implement a simulation of the algorithm using IBM’s Qiskit with GPU support, applying it to the Iris and MNIST datasets with two different angle encodings. The experiments employ multiple QRAM cell sizes (8, 16, 32, 64, 128) and perform ten trials per size. According to the performance, accuracy values in the Iris dataset range from 89.3 ± 5.78% to 94.0 ± 1.56%. The MNIST dataset’s mean binary accuracy values range from 79.45 ± 18.84% to 94.00 ± 2.11% for classes 0 and 1. Additionally, a comparison of the results of this proposed approach with different state-of-the-art versions of QK-NN and the classical K-NN using Scikit-learn. This method achieves a 96.4 ± 2.22% accuracy in the Iris dataset. Finally, this proposal contributes an experimental result to the state of the art for the MNIST dataset, achieving an accuracy of 96.55 ± 2.00%. This work presents a new implementation proposal for QK-NN and conducts multiple experiments that yield more robust results than previous implementations. Although our average performance approaches still need to surpass the classic results, an experimental increase in the size of QRAM or the amount of data to encode is not achieved due to limitations. However, our results show promising improvement when considering working with more feature numbers and accommodating more data in the QRAM. Full article
(This article belongs to the Special Issue Quantum Computing and Networking)
Show Figures

Figure 1

Figure 1
<p>Example of K-NN when <math display="inline"><semantics> <mrow> <mi>K</mi> <mo>=</mo> <mn>5</mn> </mrow> </semantics></math>: (<b>a</b>) An unknown instance (orange circle). (<b>b</b>) Find the <math display="inline"><semantics> <mrow> <mi>K</mi> <mo>=</mo> <mn>5</mn> </mrow> </semantics></math> nearest neighbors. (<b>c</b>) Determine which class predominates by our voting rule (in this case, majority vote).</p>
Full article ">Figure 2
<p>Illustration of the quantum circuits for angle encoding (<b>a</b>) using RY gates, and (<b>b</b>) using RZ gates (prefixed by a Hadamard gate, <math display="inline"><semantics> <mi mathvariant="normal">H</mi> </semantics></math>).</p>
Full article ">Figure 3
<p>A QRAM example encoding four address values with three qubits.</p>
Full article ">Figure 4
<p>A sample of QRAM with the angle encoding of the RY and RZ for qubit address <math display="inline"><semantics> <mrow> <mo>|</mo> <mn>01</mn> <mo>〉</mo> </mrow> </semantics></math> and <math display="inline"><semantics> <mrow> <mo>|</mo> <mn>11</mn> <mo>〉</mo> </mrow> </semantics></math>. (<b>a</b>) QRAM using CRY gates. (<b>b</b>) QRAM using CRZ gates.</p>
Full article ">Figure 5
<p>The quantum circuit for the SWAP-Test on two states, each encoded into one qubit.</p>
Full article ">Figure 6
<p>Example of a SWAP-Test with multiple qubit states.</p>
Full article ">Figure 7
<p>Overview of the quantum circuit for the K-nearest neighbors algorithm.</p>
Full article ">Figure 8
<p>The proposal described in five blocks, labeled: Dataset, Preprocessing, Quantum K-NN, Postprocessing and Accuracy.</p>
Full article ">Figure 9
<p>The list of variables and characteristics of the experiments conducted in the input, during the experiment, and post-processing for its output.</p>
Full article ">Figure 10
<p>Robustness distribution of the 4 pixels resulting from the preprocessing of classes 0 and 1.</p>
Full article ">Figure 11
<p>Preprocessing for MNIST dataset.</p>
Full article ">Figure 12
<p>Robustness distribution of the 4 pixels resulting from the preprocessing of classes 0 and 1.</p>
Full article ">Figure 13
<p>Probability histograms of QK-NN experiments with eight memory cells with Grover’s iterations from 1 to 3. (<b>a</b>) Consider all the states. (<b>b</b>) Consider the probability of states when the SWAP-Test qubit equals one.</p>
Full article ">Figure 14
<p>Probability histograms of QK-NN experiments with eight memory cells with Grover’s iterations from 1 to 6. (<b>a</b>) Consider all the higher 16 states when the SWAP-Test qubit equals one. (<b>b</b>) Consider the probability of the higher five states when the SWAP-Test qubit equals one.</p>
Full article ">Figure 14 Cont.
<p>Probability histograms of QK-NN experiments with eight memory cells with Grover’s iterations from 1 to 6. (<b>a</b>) Consider all the higher 16 states when the SWAP-Test qubit equals one. (<b>b</b>) Consider the probability of the higher five states when the SWAP-Test qubit equals one.</p>
Full article ">Figure 15
<p>Depth and number of 2-qubit gates in different features and qubit address implementation of the QK-NN.</p>
Full article ">Figure 16
<p>Depth VS number of 2-qubit gates.</p>
Full article ">
19 pages, 1810 KiB  
Article
Hierarchical Controlled Hybrid Quantum Communication Based on Six-Qubit Entangled States in IoT
by Xiaoyu Hua, Dongfen Li, You Fu, Yonghao Zhu, Yangyang Jiang, Jie Zhou, Xiaolong Yang and Yuqiao Tan
Sensors 2023, 23(22), 9111; https://doi.org/10.3390/s23229111 - 10 Nov 2023
Cited by 3 | Viewed by 1300
Abstract
The rapid development and extensive application of the Internet of Things (IoT) have brought new challenges and opportunities to the field of communication. By integrating quantum secure communication with the IoT, we can provide a higher level of security and privacy protection to [...] Read more.
The rapid development and extensive application of the Internet of Things (IoT) have brought new challenges and opportunities to the field of communication. By integrating quantum secure communication with the IoT, we can provide a higher level of security and privacy protection to counteract security threats in the IoT. In this paper, a hybrid quantum communication scheme using six-qubit entangled states as a channel is proposed for specific IoT application scenarios. This scheme achieves hierarchical control of communication protocols on a single quantum channel. In the proposed scheme, device A transmits data to device B through quantum teleportation, while device B issues control commands to device A through remote quantum state preparation technology. These two tasks are controlled by control nodes C and D, respectively. The transmission of information from device A to device B is a relatively less important task, which can be solely controlled by control node C. On the other hand, issuing control commands from device B to device A is a more crucial task requiring joint control from control nodes C and D. This paper describes the proposed scheme and conducts simulation experiments using IBM’s Qiskit Aer quantum computing simulator. The results demonstrate that the fidelity of the quantum teleportation protocol (QTP) and the remote state preparation protocol (RSP) reach an impressive value of 0.999, fully validating the scheme’s feasibility. Furthermore, the factors affecting the fidelity of the hybrid communication protocol in an IoT environment with specific quantum noise are analyzed. By combining the security of quantum communication with the application scenarios of the IoT, this paper presents a new possibility for IoT communication. Full article
(This article belongs to the Special Issue IoT Network Security)
Show Figures

Figure 1

Figure 1
<p>Information exchange and control between different devices in the IoT system through classical and quantum communication channels.</p>
Full article ">Figure 2
<p>Using the Qiskit Aer quantum computing simulator to implement quantum circuit design for HCHQC protocols.</p>
Full article ">Figure 3
<p>Probability distribution of the results of 8192 experiments of HCHQC protocol on Qiskit Aer when Alice performs QTP to Bob.</p>
Full article ">Figure 4
<p>Probability distribution of the results of 8192 experiments of HCHQC protocol on Qiskit Aer when Bob performs RSP to Alice.</p>
Full article ">Figure 5
<p>When <math display="inline"><semantics> <mrow> <msub> <mi>β</mi> <mn>1</mn> </msub> <mo>=</mo> <mfrac> <msqrt> <mn>2</mn> </msqrt> <mn>2</mn> </mfrac> <mo>,</mo> <mo> </mo> <msub> <mi>β</mi> <mn>2</mn> </msub> <mo>=</mo> <mfrac> <msqrt> <mn>2</mn> </msqrt> <mn>2</mn> </mfrac> </mrow> </semantics></math>, the fidelity under amplitude-damping noise environment variation graph with noise rate and <math display="inline"><semantics> <msub> <mi>α</mi> <mn>1</mn> </msub> </semantics></math>.</p>
Full article ">Figure 6
<p>When <math display="inline"><semantics> <mrow> <msub> <mi>α</mi> <mn>1</mn> </msub> <mo>=</mo> <mfrac> <mn>1</mn> <mn>2</mn> </mfrac> <mo>,</mo> <mo> </mo> <msub> <mi>α</mi> <mn>2</mn> </msub> <mo>=</mo> <mfrac> <msqrt> <mn>3</mn> </msqrt> <mn>2</mn> </mfrac> </mrow> </semantics></math>, the fidelity under amplitude-damping noise environment variation graph with noise rate and <math display="inline"><semantics> <msub> <mi>β</mi> <mn>1</mn> </msub> </semantics></math>.</p>
Full article ">Figure 7
<p>When the noise rate is 0.5, the fidelity changes with <math display="inline"><semantics> <msub> <mi>α</mi> <mn>1</mn> </msub> </semantics></math> and <math display="inline"><semantics> <msub> <mi>β</mi> <mn>1</mn> </msub> </semantics></math> in the amplitude-damping noise environment.</p>
Full article ">Figure 8
<p>When <math display="inline"><semantics> <mrow> <msub> <mi>β</mi> <mn>1</mn> </msub> <mo>=</mo> <mfrac> <msqrt> <mn>2</mn> </msqrt> <mn>2</mn> </mfrac> <mo>,</mo> <mo> </mo> <msub> <mi>β</mi> <mn>2</mn> </msub> <mo>=</mo> <mfrac> <msqrt> <mn>2</mn> </msqrt> <mn>2</mn> </mfrac> </mrow> </semantics></math>, the fidelity under phase-damping noise environment variation graph with noise rate and <math display="inline"><semantics> <msub> <mi>α</mi> <mn>1</mn> </msub> </semantics></math>.</p>
Full article ">Figure 9
<p>When <math display="inline"><semantics> <mrow> <msub> <mi>α</mi> <mn>1</mn> </msub> <mo>=</mo> <mfrac> <mn>1</mn> <mn>2</mn> </mfrac> <mo>,</mo> <mo> </mo> <msub> <mi>α</mi> <mn>2</mn> </msub> <mo>=</mo> <mfrac> <msqrt> <mn>3</mn> </msqrt> <mn>2</mn> </mfrac> </mrow> </semantics></math>, the fidelity under phase-damping noise environment variation graph with noise rate and <math display="inline"><semantics> <msub> <mi>β</mi> <mn>1</mn> </msub> </semantics></math>.</p>
Full article ">Figure 10
<p>When the noise rate is 0.5, the fidelity changes with <math display="inline"><semantics> <msub> <mi>α</mi> <mn>1</mn> </msub> </semantics></math> and <math display="inline"><semantics> <msub> <mi>β</mi> <mn>1</mn> </msub> </semantics></math> in the phase-damping noise environment.</p>
Full article ">Figure 11
<p>When <math display="inline"><semantics> <mrow> <msub> <mi>α</mi> <mn>1</mn> </msub> <mo>=</mo> <msub> <mi>α</mi> <mn>2</mn> </msub> <mo>=</mo> <mfrac> <msqrt> <mn>2</mn> </msqrt> <mn>2</mn> </mfrac> <mo>,</mo> <mo> </mo> <msub> <mi>β</mi> <mn>1</mn> </msub> <mo>=</mo> <msub> <mi>β</mi> <mn>2</mn> </msub> <mo>=</mo> <mfrac> <msqrt> <mn>2</mn> </msqrt> <mn>2</mn> </mfrac> <mo>,</mo> <mo> </mo> <msub> <mi>η</mi> <mi>A</mi> </msub> <mo>=</mo> <msub> <mi>η</mi> <mi>P</mi> </msub> </mrow> </semantics></math>, fidelity variation with noise rate in amplitude-damping noise environment and phase-damping noise environment.</p>
Full article ">Figure 12
<p>When <math display="inline"><semantics> <mrow> <msub> <mi>α</mi> <mn>1</mn> </msub> <mo>=</mo> <msub> <mi>α</mi> <mn>2</mn> </msub> <mo>=</mo> <mfrac> <msqrt> <mn>2</mn> </msqrt> <mn>2</mn> </mfrac> <mo>,</mo> <mo> </mo> <msub> <mi>β</mi> <mn>1</mn> </msub> <mo>=</mo> <mn>0</mn> <mo>,</mo> <mo> </mo> <msub> <mi>β</mi> <mn>2</mn> </msub> <mo>=</mo> <mn>1</mn> <mo>,</mo> <mo> </mo> <msub> <mi>η</mi> <mi>A</mi> </msub> <mo>=</mo> <msub> <mi>η</mi> <mi>P</mi> </msub> </mrow> </semantics></math>, fidelity variation with noise rate in amplitude-damping noise environment and phase-damping noise environment.</p>
Full article ">
17 pages, 1953 KiB  
Article
Quantum Computing in Insurance Capital Modelling under Reinsurance Contracts
by Muhsin Tamturk and Marco Carenzo
AppliedMath 2023, 3(4), 741-757; https://doi.org/10.3390/appliedmath3040040 - 26 Oct 2023
Viewed by 1707
Abstract
In this study, we design an algorithm to work on gate-based quantum computers. Based on the algorithm, we construct a quantum circuit that represents the surplus process of a cedant under a reinsurance agreement. This circuit takes into account a variety of factors: [...] Read more.
In this study, we design an algorithm to work on gate-based quantum computers. Based on the algorithm, we construct a quantum circuit that represents the surplus process of a cedant under a reinsurance agreement. This circuit takes into account a variety of factors: initial reserve, insurance premium, reinsurance premium, and specific amounts related to claims, retention, and deductibles for two different non-proportional reinsurance contracts. Additionally, we demonstrate how to perturb the actuarial stochastic process using Hadamard gates to account for unpredictable damage. We conclude by presenting graphs and numerical results to validate our capital modelling approach. Full article
Show Figures

Figure 1

Figure 1
<p>An example for premium and claim gates for <math display="inline"><semantics> <mrow> <mi>c</mi> <mo>=</mo> <mn>3</mn> </mrow> </semantics></math> and <math display="inline"><semantics> <mrow> <mi>X</mi> <mo>=</mo> <mn>5</mn> </mrow> </semantics></math>.</p>
Full article ">Figure 2
<p>Gross and net claim after deductable and limits.</p>
Full article ">Figure 3
<p>The number of qubits and the dimensions of the gates according to potential capital range.</p>
Full article ">Figure 4
<p>Quantum circuit for the uncertainty level = 3 and time = 7.</p>
Full article ">Figure 5
<p>Quantum states and the number of times they appear in the simulation. Color Note: Blue for level 1, red for level 2, and green for level 3.</p>
Full article ">Figure 6
<p>Capital values and the probability they appear in the simulation.</p>
Full article ">Figure 6 Cont.
<p>Capital values and the probability they appear in the simulation.</p>
Full article ">Figure 7
<p>Monitoring the primary insurance company’s capital.</p>
Full article ">Figure 8
<p>Quantum circuit with 8 qubits and 8 bits for non-proportional reinsurance contract with conditional operators.</p>
Full article ">
17 pages, 5771 KiB  
Article
Quantum Circuit Template Matching Optimization Method for Constrained Connectivity
by Xiaofeng Gao, Zhijin Guan, Shiguang Feng and Yibo Jiang
Axioms 2023, 12(7), 687; https://doi.org/10.3390/axioms12070687 - 14 Jul 2023
Cited by 1 | Viewed by 1651
Abstract
The execution of quantum algorithms requires two key considerations. On the one hand, it should meet the connectivity constraint requirements of quantum circuit mapping for quantum architectures, and on the other hand, it needs to consider reducing the probability of errors in the [...] Read more.
The execution of quantum algorithms requires two key considerations. On the one hand, it should meet the connectivity constraint requirements of quantum circuit mapping for quantum architectures, and on the other hand, it needs to consider reducing the probability of errors in the execution of quantum circuits as much as possible. This paper proposes a novel optimization technique based on template matching that to satisfy both requirements. The template matching optimization method can significantly reduce the number of gates in a quantum circuit and further enhance its practicality. It stands as advanced optimization technology available today. Our method optimizes quantum logic circuits mapped onto quantum architecture by initially selecting their linear substructure. We then zone the circuit according to the gate dependency graph and optimize each block through template matching. Finally, we reorganize the circuit to obtain the optimized version as the final result. Our proposed method is amenable to various quantum architectures. To evaluate its efficacy, we conduct a comparative analysis with the t|ket⟩ and Qiskit compiler using a set of benchmark test circuits. Specifically, compare to the t|ket⟩ compiler method, the highest average optimization rate of our method can reach 25.75%. Compare with the Qiskit compiler method, the highest average optimization rate can reach 32.72%. Overall, our approach has significant optimization advantages. Full article
(This article belongs to the Special Issue Advances in Quantum Computation and Quantum Information)
Show Figures

Figure 1

Figure 1
<p>Quantum circuit diagram.</p>
Full article ">Figure 2
<p>Quantum topology. (<b>a</b>) Ibm_perth. (<b>b</b>) Ibmq_guadalupe.</p>
Full article ">Figure 3
<p>Circuit template example.</p>
Full article ">Figure 4
<p>Different equivalent representations of quantum circuits. (<b>a</b>) Example of a quantum circuits. (<b>b</b>) The circuit is modified by interchanging the order of commuting gates. (<b>c</b>) Gate dependency graph.</p>
Full article ">Figure 5
<p>Template matching optimization. (<b>a</b>) Proximity quantum circuits. (<b>b</b>) Template circuit. (<b>c</b>) Template matching optimized circuit.</p>
Full article ">Figure 6
<p>Linear substructure selection (selected qubits are highlighted with red circles).</p>
Full article ">Figure 7
<p>Example of a quantum circuit.</p>
Full article ">Figure 8
<p>Gate dependence graph of quantum circuit (<a href="#axioms-12-00687-f007" class="html-fig">Figure 7</a>).</p>
Full article ">Figure 9
<p>The first part of the quantum circuit.</p>
Full article ">Figure 10
<p>The second part of the quantum circuit.</p>
Full article ">Figure 11
<p>The first template circuit.</p>
Full article ">Figure 12
<p>The second template circuit.</p>
Full article ">Figure 13
<p>The first part optimizes the post-quantum circuit.</p>
Full article ">Figure 14
<p>The second part optimizes the post-quantum circuit.</p>
Full article ">Figure 15
<p>Circuit zoning. The circuit is zoned into three sections, namely 1, 2, and 3, as highlighted in the figure.</p>
Full article ">Figure 16
<p>The optimized quantum circuit.</p>
Full article ">Figure 17
<p>The second round of linear substructure selection. The red circle represents the qubit selected in the first round, while the blue circle represents the newly selected qubit in the second round.</p>
Full article ">
32 pages, 1786 KiB  
Article
On the Applicability of Quantum Machine Learning
by Sebastian Raubitzek and Kevin Mallinger
Entropy 2023, 25(7), 992; https://doi.org/10.3390/e25070992 - 28 Jun 2023
Cited by 3 | Viewed by 3125
Abstract
In this article, we investigate the applicability of quantum machine learning for classification tasks using two quantum classifiers from the Qiskit Python environment: the variational quantum circuit and the quantum kernel estimator (QKE). We provide a first evaluation on the performance of these [...] Read more.
In this article, we investigate the applicability of quantum machine learning for classification tasks using two quantum classifiers from the Qiskit Python environment: the variational quantum circuit and the quantum kernel estimator (QKE). We provide a first evaluation on the performance of these classifiers when using a hyperparameter search on six widely known and publicly available benchmark datasets and analyze how their performance varies with the number of samples on two artificially generated test classification datasets. As quantum machine learning is based on unitary transformations, this paper explores data structures and application fields that could be particularly suitable for quantum advantages. Hereby, this paper introduces a novel dataset based on concepts from quantum mechanics using the exponential map of a Lie algebra. This dataset will be made publicly available and contributes a novel contribution to the empirical evaluation of quantum supremacy. We further compared the performance of VQC and QKE on six widely applicable datasets to contextualize our results. Our results demonstrate that the VQC and QKE perform better than basic machine learning algorithms, such as advanced linear regression models (Ridge and Lasso). They do not match the accuracy and runtime performance of sophisticated modern boosting classifiers such as XGBoost, LightGBM, or CatBoost. Therefore, we conclude that while quantum machine learning algorithms have the potential to surpass classical machine learning methods in the future, especially when physical quantum infrastructure becomes widely available, they currently lag behind classical approaches. Our investigations also show that classical machine learning approaches have superior performance classifying datasets based on group structures, compared to quantum approaches that particularly use unitary processes. Furthermore, our findings highlight the significant impact of different quantum simulators, feature maps, and quantum circuits on the performance of the employed quantum estimators. This observation emphasizes the need for researchers to provide detailed explanations of their hyperparameter choices for quantum machine learning algorithms, as this aspect is currently overlooked in many studies within the field. To facilitate further research in this area and ensure the transparency of our study, we have made the complete code available in a linked GitHub repository. Full article
(This article belongs to the Special Issue Advances in Quantum Computing)
Show Figures

Figure 1

Figure 1
<p>Schematic depiction of the variational quantum circuit. The VQC consists of several steps. We colored the steps that are similar to classical neural networks in light blue and the other steps in yellow, steel-blue, and orange.</p>
Full article ">Figure 2
<p>Schematic depiction of the quantum kernel estimator. The QKE consists of several steps. We colored the steps that are similar to classical support vector machines in light blue and the other steps in yellow and steel-blue. The employed QKE algorithm consists of a support vector machine algorithm with precomputed kernel, i.e., a classical machine learning method that leverages the power of quantum computing to efficiently compute the kernel matrix.</p>
Full article ">Figure 3
<p>These figures depict the results from our experiments, comparing the five best QML and classical ML algorithms on artificially generated datasets in terms of accuracy. The <b>upper part</b> illustrates the accuracy of the algorithms on different sample sizes, while the <b>lower part</b> demonstrates how the runtimes change with increasing size of the test dataset. The <b>right part</b> contains the legend, indicating which algorithms were used, and more specifically, the different parametrizations of the employed quantum machine learning algorithms. Furthermore, the legend is sorted in decreasing order of the average accuracy of the employed algorithms. The parametrization for the QKE is as follows: QKE, feature map, quantum simulator, C-Value for the SVM algorithm.</p>
Full article ">Figure 4
<p>These figures depict the results from our experiments, comparing differently parameterized classical machine learning algorithms on artificially generated datasets. The <b>upper part</b> illustrates the behavior of the accuracies, while the <b>lower part</b> demonstrates how the run times change with the increasing size of the test dataset. The <b>right part</b> contains the legend, indicating which algorithms were used, and more specifically, the different parametrizations of the employed machine learning algorithms. Furthermore, the legend is sorted in decreasing order of the average accuracy of the employed algorithms.</p>
Full article ">Figure 5
<p>These figures depict the results from our experiments for the artificially generated datasets, comparing differently parameterized QML algorithms on artificially generated datasets. The <b>upper part</b> illustrates the behavior of the accuracies, while the <b>lower part</b> demonstrates how the runtimes change with the increasing size of the test datasets. The <b>right part</b> contains the legend, indicating which algorithms were used, and more specifically, the different parametrizations of the employed quantum machine learning algorithms. Furthermore, the legend is sorted in decreasing order of the average accuracy of the employed algorithms. The parametrization for the QKE is as follows: QKE, feature map, quantum simulator, C-Value for the SVM algorithm. The parametrization for the VQC is as follows: VQC, feature map, Ansatz, optimizer, quantum simulator.</p>
Full article ">Figure 6
<p>These figures depict the results from our experiments, comparing the five best QML and classical ML algorithms in terms of accuracy on datasets using the exponential map to create <math display="inline"><semantics><mrow><mi>SU</mi><mo>(</mo><mn>2</mn><mo>)</mo></mrow></semantics></math>-transformations on complex vectors. The <b>upper part</b> illustrates the accuracy of the algorithms on different sample sizes, while the <b>lower part</b> demonstrates how the runtimes change with the increasing size of the test dataset. The <b>right part</b> contains the legend, indicating which algorithms were used, and, more specifically, the different parametrizations of the employed quantum machine learning algorithms. Furthermore, the legend is sorted in decreasing order of the average accuracy of the employed algorithms. The parametrization for the QKE is as follows: QKE, feature map, quantum simulator, C-Value for the SVM algorithm.</p>
Full article ">Figure 7
<p>These figures depict the results from our experiments, comparing differently parameterized classical machine learning algorithms on the <math display="inline"><semantics><mrow><mi>SU</mi><mo>(</mo><mn>2</mn><mo>)</mo></mrow></semantics></math>-generated datasets. The <b>upper part</b> illustrates the behavior of the accuracies, while the <b>lower part</b> demonstrates how the run times change with the increasing size of the test dataset. The <b>right part</b> contains the legend, indicating which algorithms were used, and more specifically, the different parametrizations of the employed machine learning algorithms. Furthermore, the legend is sorted in decreasing order of the average accuracy of the employed algorithms.</p>
Full article ">Figure 8
<p>These figures depict the results from our experiments for the artificially generated datasets, comparing differently parameterized QML algorithms on the <math display="inline"><semantics><mrow><mi>SU</mi><mo>(</mo><mn>2</mn><mo>)</mo></mrow></semantics></math>-generated datasets. The <b>upper part</b> illustrates the behavior of the accuracies, while the <b>lower part</b> demonstrates how the runtimes change with the increasing size of the test datasets. The <b>right part</b> contains the legend, indicating which algorithms were used and, more specifically, the different parametrizations of the employed quantum machine learning algorithms. Furthermore, the legend is sorted in decreasing order of the average accuracy of the employed algorithms. The parametrization for the QKE is as follows: QKE, feature map, quantum simulator, C-Value for the SVM algorithm. The parametrization for the VQC is as follows: VQC, feature map, Ansatz, optimizer, quantum simulator.</p>
Full article ">
20 pages, 4934 KiB  
Article
Hybrid Classical–Quantum Transfer Learning for Cardiomegaly Detection in Chest X-rays
by Pierre Decoodt, Tan Jun Liang, Soham Bopardikar, Hemavathi Santhanam, Alfaxad Eyembe, Begonya Garcia-Zapirain and Daniel Sierra-Sosa
J. Imaging 2023, 9(7), 128; https://doi.org/10.3390/jimaging9070128 - 25 Jun 2023
Cited by 6 | Viewed by 5054
Abstract
Cardiovascular diseases are among the major health problems that are likely to benefit from promising developments in quantum machine learning for medical imaging. The chest X-ray (CXR), a widely used modality, can reveal cardiomegaly, even when performed primarily for a non-cardiological indication. Based [...] Read more.
Cardiovascular diseases are among the major health problems that are likely to benefit from promising developments in quantum machine learning for medical imaging. The chest X-ray (CXR), a widely used modality, can reveal cardiomegaly, even when performed primarily for a non-cardiological indication. Based on pre-trained DenseNet-121, we designed hybrid classical–quantum (CQ) transfer learning models to detect cardiomegaly in CXRs. Using Qiskit and PennyLane, we integrated a parameterized quantum circuit into a classic network implemented in PyTorch. We mined the CheXpert public repository to create a balanced dataset with 2436 posteroanterior CXRs from different patients distributed between cardiomegaly and the control. Using k-fold cross-validation, the CQ models were trained using a state vector simulator. The normalized global effective dimension allowed us to compare the trainability in the CQ models run on Qiskit. For prediction, ROC AUC scores up to 0.93 and accuracies up to 0.87 were achieved for several CQ models, rivaling the classical–classical (CC) model used as a reference. A trustworthy Grad-CAM++ heatmap with a hot zone covering the heart was visualized more often with the QC option than that with the CC option (94% vs. 61%, p < 0.001), which may boost the rate of acceptance by health professionals. Full article
Show Figures

Graphical abstract

Graphical abstract
Full article ">Figure 1
<p>Images from the cardiomegaly subset along with their counterpart from the control subset. First column: no positive label for any other finding. Three last columns: cases of pleural effusion, edema and lung opacity, which were the findings most frequently associated with cardiomegaly in the dataset.</p>
Full article ">Figure 2
<p>High-level model design. Six CXRs are represented (<b>A</b>–<b>F</b>) to describe the process output. Cardiomegaly is detected in (<b>A</b>,<b>C</b>,<b>F</b>).</p>
Full article ">Figure 3
<p>Training models for classification: On the left, a model based on pre-trained DenseNet-121. On the right, a model based on pre-trained AlexNet. In both versions, the flowchart forks into the classical and quantum versions of the trainable classifier. n: number of qubits.</p>
Full article ">Figure 4
<p>Qiskit rendering of the PQC with four qubits. After initialization in the ground state, all qubits are first placed in a superposition state by applying Hadamard gates (H). A feature map is produced by encoding each qubit by a φ rotation around the y-axis (Ry gates). Then, the ansatz consists of a series of entanglement by 2-qubit CNOT gates, each followed by a θ rotation around the <span class="html-italic">y</span>-axis at a quantum depth of 4.</p>
Full article ">Figure 5
<p>ROC curves obtained by 10-fold cross-validation in four CC models (test set).</p>
Full article ">Figure 6
<p>ROC curves obtained by 10-fold cross-validation in five CQ models (test set).</p>
Full article ">Figure 7
<p>Original CXRs (left) along with the corresponding Grad-CAM++ heatmaps obtained with the last convolutional layer from the three models compared for trusworthiness. (<b>a</b>): Normal heart. Large hot zone including the heart with the CC model, hot zones covering the heart with the CQ models. (<b>b</b>): Cardiomegaly and artificial pacemaker. Hot zones covering the heart with the three models. (<b>c</b>): Cardiomegaly. Hot zone in the right lung base for the CC model (example of non-trustworthy heatmap), hot zones covering the heart for the CQ models.</p>
Full article ">Figure 8
<p>(<b>a</b>) NGED for the quantum layer in the classifier in Qiskit four-qubit models with four-dimensional (4-dim) and two-dimensional output (2-dim), each with 24 trainable parameters. (<b>b</b>) Training loss curves observed in these models with and without freezer.</p>
Full article ">Figure A1
<p>ROC curves for the CC models by 70/30 train–test split: (<b>a</b>) Training set. (<b>b</b>) Test set.</p>
Full article ">Figure A2
<p>ROC curves for the QC models by 70/30 train–test split: (<b>a</b>) Training set. (<b>b</b>) Test set.</p>
Full article ">Figure A3
<p>Training loss curves and standard deviation for the CC (<b>a</b>) and QC (<b>b</b>) models.</p>
Full article ">Figure A4
<p>Upper left: confusion matrix for the training set observed for the CC model with Densenet 121 as a feature extractor. Upper right box: two CXRs labeled as control and predicted cardiomegaly. Lower box: 9 CXRs labeled as cardiomegaly and predicted control.</p>
Full article ">
27 pages, 2016 KiB  
Article
Quantum Lernmatrix
by Andreas Wichert
Entropy 2023, 25(6), 871; https://doi.org/10.3390/e25060871 - 29 May 2023
Viewed by 1213
Abstract
We introduce a quantum Lernmatrix based on the Monte Carlo Lernmatrix in which n units are stored in the quantum superposition of log2(n) units representing On2log(n)2 binary sparse coded patterns. During the [...] Read more.
We introduce a quantum Lernmatrix based on the Monte Carlo Lernmatrix in which n units are stored in the quantum superposition of log2(n) units representing On2log(n)2 binary sparse coded patterns. During the retrieval phase, quantum counting of ones based on Euler’s formula is used for the pattern recovery as proposed by Trugenberger. We demonstrate the quantum Lernmatrix by experiments using qiskit. We indicate why the assumption proposed by Trugenberger, the lower the parameter temperature t; the better the identification of the correct answers; is not correct. Instead, we introduce a tree-like structure that increases the measured value of correct answers. We show that the cost of loading L sparse patterns into quantum states of a quantum Lernmatrix are much lower than storing individually the patterns in superposition. During the active phase, the quantum Lernmatrices are queried and the results are estimated efficiently. The required time is much lower compared with the conventional approach or the of Grover’s algorithm. Full article
(This article belongs to the Special Issue Quantum Machine Learning 2022)
Show Figures

Figure 1

Figure 1
<p>A unit is an abstract model of a biological neuron [<a href="#B24-entropy-25-00871" class="html-bibr">24</a>,<a href="#B29-entropy-25-00871" class="html-bibr">29</a>,<a href="#B35-entropy-25-00871" class="html-bibr">35</a>,<a href="#B36-entropy-25-00871" class="html-bibr">36</a>,<a href="#B37-entropy-25-00871" class="html-bibr">37</a>].</p>
Full article ">Figure 2
<p>The Lernmatrix is composed of a set of units that represent a simple model of a real biological neuron. The unit is composed of weights, which correspond to the synapses and dendrites in the real neuron. In this Figure, they are described by <math display="inline"><semantics> <mrow> <msub> <mi>w</mi> <mrow> <mi>i</mi> <mi>j</mi> </mrow> </msub> <mo>∈</mo> <mrow> <mo>{</mo> <mn>0</mn> <mo>,</mo> <mn>1</mn> <mo>}</mo> </mrow> </mrow> </semantics></math> where <math display="inline"><semantics> <mrow> <mn>1</mn> <mo>≤</mo> <mi>i</mi> <mo>≤</mo> <mi>m</mi> </mrow> </semantics></math> and <math display="inline"><semantics> <mrow> <mn>1</mn> <mo>≤</mo> <mi>j</mi> <mo>≤</mo> <mi>n</mi> </mrow> </semantics></math>. <span class="html-italic">T</span> is the threshold of the unit.</p>
Full article ">Figure 3
<p>The vector pair <math display="inline"><semantics> <mrow> <msub> <mi mathvariant="bold">x</mi> <mn>1</mn> </msub> <mo>=</mo> <mrow> <mo>(</mo> <mn>1</mn> <mo>,</mo> <mn>0</mn> <mo>,</mo> <mn>0</mn> <mo>,</mo> <mn>0</mn> <mo>,</mo> <mn>1</mn> <mo>)</mo> </mrow> </mrow> </semantics></math> and <math display="inline"><semantics> <mrow> <msub> <mi mathvariant="bold">y</mi> <mn>1</mn> </msub> <mo>=</mo> <mrow> <mo>(</mo> <mn>0</mn> <mo>,</mo> <mn>1</mn> <mo>,</mo> <mn>1</mn> <mo>,</mo> <mn>1</mn> <mo>,</mo> <mn>0</mn> <mo>)</mo> </mrow> </mrow> </semantics></math> is learned. The corresponding binary weights of the associated pair are indicated by a black square. In the next step, the vector pair <math display="inline"><semantics> <mrow> <msub> <mi mathvariant="bold">x</mi> <mn>2</mn> </msub> <mo>=</mo> <mrow> <mo>(</mo> <mn>0</mn> <mo>,</mo> <mn>1</mn> <mo>,</mo> <mn>1</mn> <mo>,</mo> <mn>0</mn> <mo>,</mo> <mn>1</mn> <mo>)</mo> </mrow> </mrow> </semantics></math> and <math display="inline"><semantics> <mrow> <msub> <mi mathvariant="bold">y</mi> <mn>2</mn> </msub> <mo>=</mo> <mrow> <mo>(</mo> <mn>1</mn> <mo>,</mo> <mn>1</mn> <mo>,</mo> <mn>0</mn> <mo>,</mo> <mn>0</mn> <mo>,</mo> <mn>1</mn> <mo>)</mo> </mrow> </mrow> </semantics></math> is learned. The corresponding binary weights of the associated pair are indicated by a black circle.</p>
Full article ">Figure 4
<p>The query vector <math display="inline"><semantics> <mrow> <msub> <mi mathvariant="bold">x</mi> <mi>q</mi> </msub> <mo>=</mo> <mrow> <mo>(</mo> <mn>0</mn> <mo>,</mo> <mn>1</mn> <mo>,</mo> <mn>0</mn> <mo>,</mo> <mn>0</mn> <mo>,</mo> <mn>1</mn> <mo>)</mo> </mrow> </mrow> </semantics></math> differs by one bit to the learned query vector <math display="inline"><semantics> <mrow> <msub> <mi mathvariant="bold">x</mi> <mn>2</mn> </msub> <mo>=</mo> <mrow> <mo>(</mo> <mn>0</mn> <mo>,</mo> <mn>1</mn> <mo>,</mo> <mn>1</mn> <mo>,</mo> <mn>0</mn> <mo>,</mo> <mn>1</mn> <mo>)</mo> </mrow> </mrow> </semantics></math>. The threshold <span class="html-italic">T</span> is set to the number of “one” components in the query vector <math display="inline"><semantics> <msub> <mi mathvariant="bold">x</mi> <mi>q</mi> </msub> </semantics></math>, <math display="inline"><semantics> <mrow> <mi>T</mi> <mo>=</mo> <mn>2</mn> </mrow> </semantics></math>. The retrieved vector is the vector <math display="inline"><semantics> <mrow> <msub> <mi mathvariant="bold">y</mi> <mn>2</mn> </msub> <mo>=</mo> <mrow> <mo>(</mo> <mn>1</mn> <mo>,</mo> <mn>1</mn> <mo>,</mo> <mn>0</mn> <mo>,</mo> <mn>0</mn> <mo>,</mo> <mn>1</mn> <mo>)</mo> </mrow> </mrow> </semantics></math> that was stored.</p>
Full article ">Figure 5
<p>The weight matrix after learning of 20,000 test patterns, in which ten ones were randomly set in a 2000 dimensional vector represents a high loaded matrix with equally distributed weights. This example shows that the weight matrix diagram often contains nearly no information. Information about the weight matrix can be extracted by the structure of weight matrix. (White color represents wights.)</p>
Full article ">Figure 6
<p>Sigmoid-like probability functions for <math display="inline"><semantics> <mrow> <mi>N</mi> <mo>=</mo> <mn>8</mn> </mrow> </semantics></math> is indicated by continuous line, the linear relation by the dashed lines. The x-axis indicates the <span class="html-italic">k</span> values, and the y-axis the probabilities.</p>
Full article ">Figure 7
<p>Quantum counting circuit with <math display="inline"><semantics> <mrow> <mi>N</mi> <mo>=</mo> <mn>3</mn> </mrow> </semantics></math> and <math display="inline"><semantics> <mrow> <mi>k</mi> <mo>=</mo> <mn>2</mn> </mrow> </semantics></math>.</p>
Full article ">Figure 8
<p><math display="inline"><semantics> <mrow> <mi>p</mi> <mo>(</mo> <mo stretchy="false">|</mo> <mn>0101</mn> <mo stretchy="false">〉</mo> <mo>)</mo> <mo>=</mo> <mn>0.25</mn> </mrow> </semantics></math> and <math display="inline"><semantics> <mrow> <mi>p</mi> <mo>(</mo> <mo stretchy="false">|</mo> <mn>1101</mn> <mo stretchy="false">〉</mo> <mo>)</mo> <mo>=</mo> <mn>0.75</mn> </mrow> </semantics></math>.</p>
Full article ">Figure 9
<p>Wight matrix represented by four units after learning the correlation of the three patterns <math display="inline"><semantics> <mrow> <msub> <mi mathvariant="bold">x</mi> <mn>1</mn> </msub> <mo>=</mo> <mrow> <mo>(</mo> <mn>1</mn> <mo>,</mo> <mn>0</mn> <mo>,</mo> <mn>0</mn> <mo>,</mo> <mn>1</mn> <mo>)</mo> </mrow> </mrow> </semantics></math>; <math display="inline"><semantics> <mrow> <msub> <mi mathvariant="bold">y</mi> <mn>1</mn> </msub> <mo>=</mo> <mrow> <mo>(</mo> <mn>1</mn> <mo>,</mo> <mn>0</mn> <mo>,</mo> <mn>0</mn> <mo>,</mo> <mn>1</mn> <mo>)</mo> </mrow> </mrow> </semantics></math>, <math display="inline"><semantics> <mrow> <msub> <mi mathvariant="bold">x</mi> <mn>2</mn> </msub> <mo>=</mo> <mrow> <mo>(</mo> <mn>1</mn> <mo>,</mo> <mn>0</mn> <mo>,</mo> <mn>0</mn> <mo>,</mo> <mn>0</mn> <mo>)</mo> </mrow> </mrow> </semantics></math>; <math display="inline"><semantics> <mrow> <msub> <mi mathvariant="bold">y</mi> <mn>2</mn> </msub> <mo>=</mo> <mrow> <mo>(</mo> <mn>0</mn> <mo>,</mo> <mn>1</mn> <mo>,</mo> <mn>0</mn> <mo>,</mo> <mn>0</mn> <mo>)</mo> </mrow> </mrow> </semantics></math> and <math display="inline"><semantics> <mrow> <msub> <mi mathvariant="bold">x</mi> <mn>3</mn> </msub> <mo>=</mo> <mrow> <mo>(</mo> <mn>0</mn> <mo>,</mo> <mn>0</mn> <mo>,</mo> <mn>1</mn> <mo>,</mo> <mn>0</mn> <mo>)</mo> </mrow> </mrow> </semantics></math>; <math display="inline"><semantics> <mrow> <msub> <mi mathvariant="bold">y</mi> <mn>3</mn> </msub> <mo>=</mo> <mrow> <mo>(</mo> <mn>0</mn> <mo>,</mo> <mn>0</mn> <mo>,</mo> <mn>1</mn> <mo>,</mo> <mn>0</mn> <mo>)</mo> </mrow> </mrow> </semantics></math>. The learning is identical with the learning phase of the Lernmatrix.</p>
Full article ">Figure 10
<p>The quantum circuit that produces the <span class="html-italic">sleep phase</span>. The qubits 0 to 3 represent the query vector, the qubits 4 to 7 the associative memory, the qubits 8 to 11 represent the count and the qubits 12 and 13 are the index qubits, while the qubit 14 is the control qubit.</p>
Full article ">Figure 11
<p>Four superposition states corresponding to the four units of the associative memory. The qubits 0 to 3 represent the query vector <math display="inline"><semantics> <mrow> <msub> <mi mathvariant="bold">x</mi> <mi>q</mi> </msub> <mo>=</mo> <mrow> <mo>(</mo> <mn>1</mn> <mo>,</mo> <mn>0</mn> <mo>,</mo> <mn>0</mn> <mo>,</mo> <mn>1</mn> <mo>)</mo> </mrow> </mrow> </semantics></math>, the qubits 4 to 7 the associative memory, the qubits 8 to 11 represent the count, the qubits 12 and 13 are the index qubits, and the control qubit 14 is zero. Note that the units are counted in the reverse order by the index qubits: 11 for the first unit, 10 for the third unit, 01 for second unit and 00 for the fourth unit.</p>
Full article ">Figure 12
<p>The quantum circuit that produces the <span class="html-italic">active phase</span>. The query and the amplification operations on the count qubits, the qubits 8 to 11. The control qubit 14.</p>
Full article ">Figure 13
<p>Five superposition states not equal to zero. The control qubit 14 equal to one indicates the firing of the units. The measured value is <math display="inline"><semantics> <mrow> <mn>0.625</mn> </mrow> </semantics></math>. The two probabilities <math display="inline"><semantics> <mrow> <mn>0.25</mn> </mrow> </semantics></math> express the perfect match and the solution <math display="inline"><semantics> <mrow> <mo>(</mo> <mn>1</mn> <mo>,</mo> <mn>0</mn> <mo>,</mo> <mn>0</mn> <mo>,</mo> <mn>1</mn> <mo>)</mo> </mrow> </semantics></math>, indicated by the index qubits 12 and 13, with the values <math display="inline"><semantics> <mrow> <mo>(</mo> <mn>11</mn> <mo>)</mo> </mrow> </semantics></math> for the first unit and <math display="inline"><semantics> <mrow> <mo>(</mo> <mn>00</mn> <mo>)</mo> </mrow> </semantics></math> for the fourth unit. Note that the units are counted in the reverse order by the index qubits: <math display="inline"><semantics> <mrow> <mo>(</mo> <mn>11</mn> <mo>)</mo> </mrow> </semantics></math> first unit, <math display="inline"><semantics> <mrow> <mo>(</mo> <mn>10</mn> <mo>)</mo> </mrow> </semantics></math> for the second unit, <math display="inline"><semantics> <mrow> <mo>(</mo> <mn>01</mn> <mo>)</mo> </mrow> </semantics></math> for third unit and <math display="inline"><semantics> <mrow> <mo>(</mo> <mn>00</mn> <mo>)</mo> </mrow> </semantics></math> for the fourth unit. The control qubit 14 equal to zero indicates the units that do not fire. The measured value is <math display="inline"><semantics> <mrow> <mn>0.375</mn> </mrow> </semantics></math>. The probability <math display="inline"><semantics> <mrow> <mn>0.25</mn> </mrow> </semantics></math> with the index qubits 12 and 13, with the value <math display="inline"><semantics> <mrow> <mo>(</mo> <mn>01</mn> <mo>)</mo> </mrow> </semantics></math> for the third unit indicates the most dissimilar pattern <math display="inline"><semantics> <mrow> <mo>(</mo> <mn>0</mn> <mo>,</mo> <mn>0</mn> <mo>,</mo> <mn>1</mn> <mo>,</mo> <mn>0</mn> <mo>)</mo> </mrow> </semantics></math>.</p>
Full article ">Figure 14
<p>Weight matrix represented by eight units after learning the correlation of the three patterns <math display="inline"><semantics> <mrow> <msub> <mi mathvariant="bold">x</mi> <mn>1</mn> </msub> <mo>=</mo> <mrow> <mo>(</mo> <mn>1</mn> <mo>,</mo> <mn>1</mn> <mo>,</mo> <mn>0</mn> <mo>,</mo> <mn>0</mn> <mo>,</mo> <mn>0</mn> <mo>,</mo> <mn>0</mn> <mo>,</mo> <mn>1</mn> <mo>,</mo> <mn>0</mn> <mo>)</mo> </mrow> </mrow> </semantics></math>; <math display="inline"><semantics> <mrow> <msub> <mi mathvariant="bold">y</mi> <mn>1</mn> </msub> <mo>=</mo> <mrow> <mo>(</mo> <mn>1</mn> <mo>,</mo> <mn>1</mn> <mo>,</mo> <mn>0</mn> <mo>,</mo> <mn>0</mn> <mo>,</mo> <mn>0</mn> <mo>,</mo> <mn>0</mn> <mo>,</mo> <mn>1</mn> <mo>,</mo> <mn>0</mn> <mo>)</mo> </mrow> </mrow> </semantics></math>, <math display="inline"><semantics> <mrow> <msub> <mi mathvariant="bold">x</mi> <mn>2</mn> </msub> <mo>=</mo> <mrow> <mo>(</mo> <mn>0</mn> <mo>,</mo> <mn>1</mn> <mo>,</mo> <mn>0</mn> <mo>,</mo> <mn>1</mn> <mo>,</mo> <mn>1</mn> <mo>,</mo> <mn>0</mn> <mo>,</mo> <mn>0</mn> <mo>,</mo> <mn>0</mn> <mo>)</mo> </mrow> </mrow> </semantics></math>; <math display="inline"><semantics> <mrow> <msub> <mi mathvariant="bold">y</mi> <mn>2</mn> </msub> <mo>=</mo> <mrow> <mo>(</mo> <mn>0</mn> <mo>,</mo> <mn>1</mn> <mo>,</mo> <mn>0</mn> <mo>,</mo> <mn>1</mn> <mo>,</mo> <mn>1</mn> <mo>,</mo> <mn>0</mn> <mo>,</mo> <mn>0</mn> <mo>,</mo> <mn>0</mn> <mo>)</mo> </mrow> </mrow> </semantics></math> and <math display="inline"><semantics> <mrow> <msub> <mi mathvariant="bold">x</mi> <mn>3</mn> </msub> <mo>=</mo> <mrow> <mo>(</mo> <mn>0</mn> <mo>,</mo> <mn>0</mn> <mo>,</mo> <mn>1</mn> <mo>,</mo> <mn>0</mn> <mo>,</mo> <mn>0</mn> <mo>,</mo> <mn>1</mn> <mo>,</mo> <mn>0</mn> <mo>,</mo> <mn>1</mn> <mo>)</mo> </mrow> </mrow> </semantics></math>; <math display="inline"><semantics> <mrow> <msub> <mi mathvariant="bold">y</mi> <mn>3</mn> </msub> <mo>=</mo> <mrow> <mo>(</mo> <mn>0</mn> <mo>,</mo> <mn>0</mn> <mo>,</mo> <mn>1</mn> <mo>,</mo> <mn>0</mn> <mo>,</mo> <mn>0</mn> <mo>,</mo> <mn>1</mn> <mo>,</mo> <mn>0</mn> <mo>,</mo> <mn>1</mn> <mo>)</mo> </mrow> </mrow> </semantics></math>. The learning is identical with the learning phase of the Lernmatrix.</p>
Full article ">Figure 15
<p>The quantum circuit that produces the <span class="html-italic">sleep phase</span>. The qubits 0 to 7 represent the query vector, the qubits 8 to 15 the associative memory, the qubits 16 to 23 represent the count and the qubits 24, 25 and 26 are the index qubits (8 states), and the qubit 27 is the control qubit.</p>
Full article ">Figure 16
<p>The quantum circuit that produces the <span class="html-italic">active phase</span>. The query and the amplification operations on the count qubits, the qubits 16 to 23 and the control qubit 27.</p>
Full article ">Figure 17
<p>Teen superposition states not equal to zero. The qubits 24, 25 and 26 are the index qubits. Note that the units are counted in the reverse order by the index qubits: 111 first unit, 110 for the second unit, till 000 being the eight unit. The measured value for the control qubit 27 equal to one indicates the firing of the units. The measured value is just <math display="inline"><semantics> <mrow> <mn>0.5</mn> </mrow> </semantics></math>. This happens since the weight matrix is relatively small and not homogeneously filled. For the query vector <math display="inline"><semantics> <mrow> <msub> <mi mathvariant="bold">x</mi> <mi>q</mi> </msub> <mo>=</mo> <mrow> <mo>(</mo> <mn>1</mn> <mo>,</mo> <mn>1</mn> <mo>,</mo> <mn>0</mn> <mo>,</mo> <mn>0</mn> <mo>,</mo> <mn>0</mn> <mo>,</mo> <mn>0</mn> <mo>,</mo> <mn>0</mn> <mo>,</mo> <mn>0</mn> <mo>)</mo> </mrow> </mrow> </semantics></math>, the three values <math display="inline"><semantics> <mrow> <mn>0.125</mn> </mrow> </semantics></math> indicate the answer vector <math display="inline"><semantics> <mrow> <mo>(</mo> <mn>1</mn> <mo>,</mo> <mn>1</mn> <mo>,</mo> <mn>0</mn> <mo>,</mo> <mn>0</mn> <mo>,</mo> <mn>0</mn> <mo>,</mo> <mn>0</mn> <mo>,</mo> <mn>1</mn> <mo>,</mo> <mn>0</mn> <mo>)</mo> </mrow> </semantics></math> by the index qubits 24, 25 and 26; for the first unit with the value (111), the second unit (110) and seventh unit (001). The control qubit 27 equal to zero indicates the units that do not fire.</p>
Full article ">Figure 18
<p>Circuit representing the application of the control qubit two times for the quantum circuit of <a href="#entropy-25-00871-f010" class="html-fig">Figure 10</a>.</p>
Full article ">Figure 19
<p>Seven superposition states not equal to zero. This is because the states with the former values <math display="inline"><semantics> <mrow> <mn>0.125</mn> </mrow> </semantics></math> were divided into two values <math display="inline"><semantics> <mrow> <mn>0.125</mn> <mo>/</mo> <mn>2</mn> <mo>=</mo> <mn>0.0625</mn> </mrow> </semantics></math> by the two control qubits. The first control qubit 15 equal to one indicates the firing of the units. The measured value is <math display="inline"><semantics> <mrow> <mn>0.625</mn> </mrow> </semantics></math>. After measuring the first control qubit equal to one, the measured value of the second control qubit 14 equal to one is <math display="inline"><semantics> <mrow> <mn>0.9</mn> </mrow> </semantics></math>. Assuming independence, the value of measuring the two control qubits with the value one is <math display="inline"><semantics> <mrow> <mn>0.5625</mn> <mo>=</mo> <mn>0.625</mn> <mo>·</mo> <mn>0.9</mn> </mrow> </semantics></math>. As before, the two values <math display="inline"><semantics> <mrow> <mn>0.25</mn> </mrow> </semantics></math> indicate the perfect match and the solution <math display="inline"><semantics> <mrow> <mo>(</mo> <mn>1</mn> <mo>,</mo> <mn>0</mn> <mo>,</mo> <mn>0</mn> <mo>,</mo> <mn>1</mn> <mo>)</mo> </mrow> </semantics></math> with the values of the index qubits 12 and 13: <math display="inline"><semantics> <mrow> <mo>(</mo> <mn>11</mn> <mo>)</mo> </mrow> </semantics></math> for the first unit and <math display="inline"><semantics> <mrow> <mo>(</mo> <mn>00</mn> <mo>)</mo> </mrow> </semantics></math> for the fourth unit.</p>
Full article ">Figure 20
<p>Assuming we have eight states indicated by the index qubit 2, 3 and 4, one marked state 010 has the count two, and the other seven state the count of one.</p>
Full article ">Figure 21
<p>The resulting histogram of the measured qubits of one marked state with the count two, and the other seven state the count of one with applying the control qubit.</p>
Full article ">Figure 22
<p>The resulting histogram of the measured qubits of one marked state with the count two, and the other seven state the count of one with applying the control qubit two times.</p>
Full article ">Figure 23
<p>For <math display="inline"><semantics> <mrow> <mi>n</mi> <mo>=</mo> <msup> <mn>2</mn> <mn>16</mn> </msup> </mrow> </semantics></math>, the y-axis indicates the resulting probability. (<b>a</b>) Circles indicate the growth of the probability of the marked state related to the the number of steps of Grover’s amplification indicated by the x-axis. The triangles indicate the growth of the probability of the marked state using Trugenberger amplification with the x-axis indicating the number <span class="html-italic">b</span> of measurements assuming the control qubits are 1. (<b>b</b>) With the assumption of independence, measuring the control qubits in the sequence <math display="inline"><semantics> <mrow> <mi>b</mi> <mo>=</mo> <mn>1</mn> <mo>,</mo> <mi>b</mi> <mo>=</mo> <mn>2</mn> <mo>,</mo> <mi>b</mi> <mo>=</mo> <mn>3</mn> <mo>,</mo> <mo>⋯</mo> <mo>,</mo> <msub> <mi>b</mi> <mi>B</mi> </msub> </mrow> </semantics></math> results in a low probability indicated by the circles. The x-axis indicates the number measurements <span class="html-italic">b</span> of the control qubits. As a consequence, we can measure the sequential control qubits two times before the task becomes not tractable.</p>
Full article ">Figure 23 Cont.
<p>For <math display="inline"><semantics> <mrow> <mi>n</mi> <mo>=</mo> <msup> <mn>2</mn> <mn>16</mn> </msup> </mrow> </semantics></math>, the y-axis indicates the resulting probability. (<b>a</b>) Circles indicate the growth of the probability of the marked state related to the the number of steps of Grover’s amplification indicated by the x-axis. The triangles indicate the growth of the probability of the marked state using Trugenberger amplification with the x-axis indicating the number <span class="html-italic">b</span> of measurements assuming the control qubits are 1. (<b>b</b>) With the assumption of independence, measuring the control qubits in the sequence <math display="inline"><semantics> <mrow> <mi>b</mi> <mo>=</mo> <mn>1</mn> <mo>,</mo> <mi>b</mi> <mo>=</mo> <mn>2</mn> <mo>,</mo> <mi>b</mi> <mo>=</mo> <mn>3</mn> <mo>,</mo> <mo>⋯</mo> <mo>,</mo> <msub> <mi>b</mi> <mi>B</mi> </msub> </mrow> </semantics></math> results in a low probability indicated by the circles. The x-axis indicates the number measurements <span class="html-italic">b</span> of the control qubits. As a consequence, we can measure the sequential control qubits two times before the task becomes not tractable.</p>
Full article ">Figure 24
<p>(<b>a</b>) In our example, we store three patterns, <math display="inline"><semantics> <mrow> <msub> <mi mathvariant="bold">x</mi> <mn>1</mn> </msub> <mo>=</mo> <mrow> <mo>(</mo> <mn>1</mn> <mo>,</mo> <mn>0</mn> <mo>,</mo> <mn>0</mn> <mo>,</mo> <mn>1</mn> <mo>)</mo> </mrow> </mrow> </semantics></math>, <math display="inline"><semantics> <mrow> <msub> <mi mathvariant="bold">y</mi> <mn>1</mn> </msub> <mo>=</mo> <mrow> <mo>(</mo> <mn>1</mn> <mo>,</mo> <mn>0</mn> <mo>,</mo> <mn>0</mn> <mo>,</mo> <mn>1</mn> <mo>)</mo> </mrow> </mrow> </semantics></math>; <math display="inline"><semantics> <mrow> <msub> <mi mathvariant="bold">x</mi> <mn>2</mn> </msub> <mo>=</mo> <mrow> <mo>(</mo> <mn>1</mn> <mo>,</mo> <mn>0</mn> <mo>,</mo> <mn>0</mn> <mo>,</mo> <mn>0</mn> <mo>)</mo> </mrow> </mrow> </semantics></math>, <math display="inline"><semantics> <mrow> <msub> <mi mathvariant="bold">y</mi> <mn>2</mn> </msub> <mo>=</mo> <mrow> <mo>(</mo> <mn>0</mn> <mo>,</mo> <mn>1</mn> <mo>,</mo> <mn>0</mn> <mo>,</mo> <mn>0</mn> <mo>)</mo> </mrow> </mrow> </semantics></math> and <math display="inline"><semantics> <mrow> <msub> <mi mathvariant="bold">x</mi> <mn>3</mn> </msub> <mo>=</mo> <mrow> <mo>(</mo> <mn>0</mn> <mo>,</mo> <mn>0</mn> <mo>,</mo> <mn>1</mn> <mo>,</mo> <mn>0</mn> <mo>)</mo> </mrow> </mrow> </semantics></math>, <math display="inline"><semantics> <mrow> <msub> <mi mathvariant="bold">y</mi> <mn>3</mn> </msub> <mrow> <mo>=</mo> <mn>0</mn> <mo>,</mo> <mn>0</mn> <mo>,</mo> <mn>1</mn> <mo>,</mo> <mn>0</mn> <mo>)</mo> </mrow> </mrow> </semantics></math>, and the query vector is <math display="inline"><semantics> <mrow> <msub> <mi mathvariant="bold">x</mi> <mi>q</mi> </msub> <mo>=</mo> <mrow> <mo>(</mo> <mn>1</mn> <mo>,</mo> <mn>0</mn> <mo>,</mo> <mn>0</mn> <mo>,</mo> <mn>1</mn> <mo>)</mo> </mrow> </mrow> </semantics></math>. (<b>b</b>) The aggregation is a Boolean OR-based transform for two neighboring weights of units results resulting in a more dense memory with <math display="inline"><semantics> <mrow> <msub> <mi mathvariant="bold">x</mi> <mi>q</mi> </msub> <mo>=</mo> <mrow> <mo>(</mo> <mn>1</mn> <mo>,</mo> <mn>0</mn> <mo>,</mo> <mn>0</mn> <mo>,</mo> <mn>1</mn> <mo>,</mo> <mn>1</mn> <mo>,</mo> <mn>0</mn> <mo>,</mo> <mn>0</mn> <mo>,</mo> <mn>1</mn> <mo>)</mo> </mrow> </mrow> </semantics></math>.</p>
Full article ">Figure 25
<p>Five superposition states not equal to zero. The measured probability (control qubit equal to one) indicates the firing of the units is <math display="inline"><semantics> <mrow> <mn>0.838</mn> </mrow> </semantics></math>, the measured probability values are <math display="inline"><semantics> <mrow> <mn>0.213</mn> </mrow> </semantics></math>, <math display="inline"><semantics> <mrow> <mn>0.125</mn> </mrow> </semantics></math> and <math display="inline"><semantics> <mrow> <mn>0.25</mn> </mrow> </semantics></math>.</p>
Full article ">Figure 26
<p>(<b>a</b>) We compare the cost of <math display="inline"><semantics> <mrow> <mi>k</mi> <mo>=</mo> <mi>l</mi> <mi>o</mi> <msub> <mi>g</mi> <mn>2</mn> </msub> <mrow> <mo>(</mo> <mi>n</mi> <mo>/</mo> <mn>4</mn> <mo>)</mo> </mrow> </mrow> </semantics></math> queries to the quantum Lernmatrix (representing the weight matrix of the size <math display="inline"><semantics> <mrow> <mi>n</mi> <mo>×</mo> <mi>n</mi> </mrow> </semantics></math>), <math display="inline"><semantics> <mrow> <mi>O</mi> <mo>(</mo> <mi>k</mi> <mo>·</mo> <mi>n</mi> <mo>)</mo> </mrow> </semantics></math> (dashed line) to the cost of a classical Lernmatrix of the size <math display="inline"><semantics> <mrow> <mi>n</mi> <mo>×</mo> <mi>n</mi> </mrow> </semantics></math>, <math display="inline"><semantics> <mrow> <mi>O</mi> <mo>(</mo> <msup> <mi>n</mi> <mn>2</mn> </msup> <mo>)</mo> </mrow> </semantics></math>. (<b>b</b>) We compare the cost of <span class="html-italic">k</span> queries to the quantum Lernmatrix (representing the weight matrix of the size <math display="inline"><semantics> <mrow> <mi>n</mi> <mo>×</mo> <mi>n</mi> </mrow> </semantics></math>), <math display="inline"><semantics> <mrow> <mi>O</mi> <mo>(</mo> <mi>k</mi> <mo>·</mo> <mi>n</mi> <mo>)</mo> </mrow> </semantics></math> with cost <math display="inline"><semantics> <mrow> <mi>O</mi> <mo>(</mo> <mi>k</mi> <mo>·</mo> <mi>n</mi> <mo>)</mo> </mrow> </semantics></math> (dashed line) to Grover’s amplification algorithm on a list of <span class="html-italic">L</span> vectors of dimension <span class="html-italic">n</span> with cost <math display="inline"><semantics> <mrow> <mi>O</mi> <mo>(</mo> <mi>n</mi> <mo>·</mo> <msqrt> <mi>L</mi> </msqrt> <mo>)</mo> </mrow> </semantics></math>.</p>
Full article ">
19 pages, 584 KiB  
Article
Programming Quantum Neural Networks on NISQ Systems: An Overview of Technologies and Methodologies
by Stefano Markidis
Entropy 2023, 25(4), 694; https://doi.org/10.3390/e25040694 - 20 Apr 2023
Cited by 6 | Viewed by 4565
Abstract
Noisy Intermediate-Scale Quantum (NISQ) systems and associated programming interfaces make it possible to explore and investigate the design and development of quantum computing techniques for Machine Learning (ML) applications. Among the most recent quantum ML approaches, Quantum Neural Networks (QNN) emerged as an [...] Read more.
Noisy Intermediate-Scale Quantum (NISQ) systems and associated programming interfaces make it possible to explore and investigate the design and development of quantum computing techniques for Machine Learning (ML) applications. Among the most recent quantum ML approaches, Quantum Neural Networks (QNN) emerged as an important tool for data analysis. With the QNN advent, higher-level programming interfaces for QNN have been developed. In this paper, we survey the current state-of-the-art high-level programming approaches for QNN development. We discuss target architectures, critical QNN algorithmic components, such as the hybrid workflow of Quantum Annealers and Parametrized Quantum Circuits, QNN architectures, optimizers, gradient calculations, and applications. Finally, we overview the existing programming QNN frameworks, their software architecture, and associated quantum simulators. Full article
(This article belongs to the Special Issue Quantum Machine Learning 2022)
Show Figures

Figure 1

Figure 1
<p>Diagram of the basic workflow for training a QA-based QNN.</p>
Full article ">Figure 2
<p>Diagram of the basic workflow for training a PQC-based QNN.</p>
Full article ">Figure 3
<p>Examples of common quantum layers used for constructing QNNs: an encoding/embedding layer using a circuit block <math display="inline"><semantics> <mrow> <mi>S</mi> <mo>(</mo> <mi>x</mi> <mo>)</mo> </mrow> </semantics></math> as Hamiltonian encoding, a variational layer with a unitary gate <span class="html-italic">U</span> with four parameters (<math display="inline"><semantics> <msub> <mi>θ</mi> <mn>1</mn> </msub> </semantics></math>, <math display="inline"><semantics> <msub> <mi>θ</mi> <mn>2</mn> </msub> </semantics></math>, <math display="inline"><semantics> <msub> <mi>θ</mi> <mn>3</mn> </msub> </semantics></math> and <math display="inline"><semantics> <msub> <mi>θ</mi> <mn>4</mn> </msub> </semantics></math>), a simple entangling layer with rotation operation (<span class="html-italic">R</span>) and CNOT gates operating on neighbor qubits, a pooling layer used for quantum convolutional networks, and finally a measurement layer.</p>
Full article ">
15 pages, 1969 KiB  
Article
Graph Generation for Quantum States Using Qiskit and Its Application for Quantum Neural Networks
by Alexandru-Gabriel Tudorache
Mathematics 2023, 11(6), 1484; https://doi.org/10.3390/math11061484 - 18 Mar 2023
Cited by 1 | Viewed by 2710
Abstract
This paper describes a practical approach to the quantum theory using the simulation and processing technology available today. The proposed project allows us to create an exploration graph so that for an initial starting configuration of the qubits, all possible states are created [...] Read more.
This paper describes a practical approach to the quantum theory using the simulation and processing technology available today. The proposed project allows us to create an exploration graph so that for an initial starting configuration of the qubits, all possible states are created given a set of gates selected by the user. For each node in the graph, we can obtain various types of information such as the applied gates from the initial state (the transition route), necessary cost, representation of the quantum circuit, as well as the amplitudes of each state. The project is designed not as an end goal, but rather as a processing platform that allows users to visualize and explore diverse solutions for different quantum problems in a much easier manner. We then describe some potential applications of this project in other research fields, illustrating the way in which the states from the graph can be used as nodes in a new interpretation of a quantum neural network; the steps of a hybrid processing chain are presented for the problem of finding one or more states that verify certain conditions. These concepts can also be used in academia, with their implementation being possible with the help of the Python programming language, the NumPy library, and Qiskit—the open-source quantum framework developed by IBM. Full article
(This article belongs to the Special Issue Advances in Quantum Computing and Applications)
Show Figures

Figure 1

Figure 1
<p>Simple entanglement circuit.</p>
Full article ">Figure 2
<p>UML Class diagram of the project.</p>
Full article ">Figure 3
<p>The graph for the presented example, with quantum states as nodes, for a one-qubit register and three selected gates (X, Z, and H).</p>
Full article ">Figure 4
<p>Design of a neural network using the quantum states from the graph. The configuration of the output layer depends on the states from the inner layers; the data from the graph, analyzed at different exploration depths, were used to populate the final nodes in each neural network architecture.</p>
Full article ">Figure 5
<p>The scheme for the hybrid classical–quantum solution, integrating the main processing blocks (the neural network) with a quantum oracle.</p>
Full article ">
Back to TopTop