Top Banner
Proceedings of Student-Faculty Research Day, CSIS, Pace University, April 30, 2021 A Quantum Computing Architecture based Decoherence Model Lewis Westfall and Charles Tappert, PhD Seidenberg School of CSIS, Pace University, New York Email: {lw19277w, ctappert}@pace.edu Abstract—Quantum computing is a field that only recently had operating quantum computers to run programs on. Up until their advent all programs were run on simulators. Simulators are very helpful to ensure that the programs do what they are designed to do. Unfortunately there is a gap between the nice clear cut results that the simulators generate and somewhat ambiguous results that the real quantum computers generate. The difference is the noise inherent in the current implementation of quantum computers. This paper describes a quantum computing architecture-based de-coherence model developed on the available IBM Q-Experience quantum computers. The approach used was by using entangled qubits in superdense coding, to investigate the effects that noise has on the results of real world quantum computers. In conducting this research, problematic effects were found in an optimization step in the software engineering design of the newest development of dynamic, adaptive, quantum circuits found in at least one of the quantum computing architectures of the IBM Q-experience, so these effects were addressed to obtain more accurate results. I. I NTRODUCTION An important tool of quantum computing is entangled qubits. Their power has been demonstrated in algorithms like Superdense Coding [1] and Quantum Teleportation [2]. These have been studied on simulators and quantum computers such as the IBM Quantum Experience (IBM Q) [3]. This paper explores the the different architectures used by the quantum computers in IBM Q and the performance differences between pairs sets of Qubits. The research was done using Superdense coding to explore entangled qubit performance. Recent changes to the software engineering of the family of IBM Q computers available openly to researchers may have introduced a problematic step as the newest development of adaptive quantum circuits means that when a circuit program is written, it is not executed as written, but instead goes through an intermediate step, middleware, meant to optimize and reduce the processing time that a quantum computer spends on that program, and that step that can cause a greater number of swap gates than is needed, and these swap gates fatigue the qubits, resulting in a higher number of errors in the output results. The authors acknowledge the use of IBM Quantum services for this work. The views expressed are those of the authors, and do not reflect the official policy or position of IBM or the IBM Quantum team. Dr Tappert thanks IBM for their Faculty Grant which helped make this research possible. A. Superdense Coding Superdense coding is the ability of entangled qubits to carry more information that a classical bit allows [4]. This is possible because of quantum entanglement, which conveys a quantum state from one qubit to another [5]. The use of superdense coding by entanglement is a quantum cryptography method of great promise to defeat any eavesdropper [6]. Frequently the example is of Alice sending two classical bits of information in one qubit to Bob. In our case, Alice wants to tell Bob that the weather is clear or cloudy and cold or warm. The process starts when a third party, Eve, starting with two separate qubits, entangles the pair by applying a Hadamard (H) gate to the first qubit and then a Controlled Not (CNOT) gate to both qubits, where the first qubit is the control and the second qubit is the target. This entanglement is a Bell state [7]. Once the CNOT gate is applied, entanglement occurs be- tween the two qubits. It is important in this exercises is to remember that quantum gates are reversible, unlike classical gates. The CNOT gate can go both ways - it can entangle, and it can disentangle. One qubit is given to Alice while the other is given to Bob. The qubits of Alice and Bob will remain entangled although one of the qubits is subjected to more gates than the other qubit. Table I shows what message options Alice has to send to Bob, the binary code for that message, and the quantum gates she will use to encode this message information to her qubit. Because of the entanglement, when Alice does her quantum gate operations on her qubit, she can not use a standalone gate because she has an entangled qubit. The gate she will use will be the tensor product of the desired gate with the Identity matrix to create a 4x4 matrix. Although the qubits are entangled, while the qubits are in the possession of their original owner, only Alice can perform gate operations on her qubit, and only Bob can perform gate operations on his qubit. Once Alice’s qubit has been encoded by operations of the quantum gates, it is transmitted to Bob. Bob, with Alice’s qubit now in his possession, as well as his own qubit, can perform quantum gate operations on Alice’s qubit to discover the message in it. Bob first applies a Controlled-Not gate operation to both entangled qubits, where Alice’s qubit is the control and Bob’s qubit is the target. Applying the CNOT to an entangled pair of qubits causes them to become disentangled and break into two independent qubits. 1
5

A Quantum Computing Architecture based Decoherence Model

Nov 25, 2021

Download

Documents

dariahiddleston
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: A Quantum Computing Architecture based Decoherence Model

Proceedings of Student-Faculty Research Day, CSIS, Pace University, April 30, 2021

A Quantum Computing Architecture basedDecoherence ModelLewis Westfall and Charles Tappert, PhD

Seidenberg School of CSIS, Pace University, New York

Email: {lw19277w, ctappert}@pace.edu

Abstract—Quantum computing is a field that only recentlyhad operating quantum computers to run programs on. Up untiltheir advent all programs were run on simulators. Simulatorsare very helpful to ensure that the programs do what they aredesigned to do. Unfortunately there is a gap between the niceclear cut results that the simulators generate and somewhatambiguous results that the real quantum computers generate. Thedifference is the noise inherent in the current implementation ofquantum computers. This paper describes a quantum computingarchitecture-based de-coherence model developed on the availableIBM Q-Experience quantum computers. The approach used wasby using entangled qubits in superdense coding, to investigatethe effects that noise has on the results of real world quantumcomputers. In conducting this research, problematic effects werefound in an optimization step in the software engineering designof the newest development of dynamic, adaptive, quantum circuitsfound in at least one of the quantum computing architectures ofthe IBM Q-experience, so these effects were addressed to obtainmore accurate results.

I. INTRODUCTION

An important tool of quantum computing is entangledqubits. Their power has been demonstrated in algorithmslike Superdense Coding [1] and Quantum Teleportation [2].These have been studied on simulators and quantum computerssuch as the IBM Quantum Experience (IBM Q) [3]. Thispaper explores the the different architectures used by thequantum computers in IBM Q and the performance differencesbetween pairs sets of Qubits. The research was done usingSuperdense coding to explore entangled qubit performance.Recent changes to the software engineering of the family ofIBM Q computers available openly to researchers may haveintroduced a problematic step as the newest development ofadaptive quantum circuits means that when a circuit programis written, it is not executed as written, but instead goesthrough an intermediate step, middleware, meant to optimizeand reduce the processing time that a quantum computerspends on that program, and that step that can cause a greaternumber of swap gates than is needed, and these swap gatesfatigue the qubits, resulting in a higher number of errors inthe output results.

The authors acknowledge the use of IBM Quantum services for this work.The views expressed are those of the authors, and do not reflect the officialpolicy or position of IBM or the IBM Quantum team.

Dr Tappert thanks IBM for their Faculty Grant which helped make thisresearch possible.

A. Superdense Coding

Superdense coding is the ability of entangled qubits to carrymore information that a classical bit allows [4]. This is possiblebecause of quantum entanglement, which conveys a quantumstate from one qubit to another [5]. The use of superdensecoding by entanglement is a quantum cryptography method ofgreat promise to defeat any eavesdropper [6]. Frequently theexample is of Alice sending two classical bits of informationin one qubit to Bob. In our case, Alice wants to tell Bob thatthe weather is clear or cloudy and cold or warm. The processstarts when a third party, Eve, starting with two separate qubits,entangles the pair by applying a Hadamard (H) gate to the firstqubit and then a Controlled Not (CNOT) gate to both qubits,where the first qubit is the control and the second qubit is thetarget. This entanglement is a Bell state [7].

Once the CNOT gate is applied, entanglement occurs be-tween the two qubits. It is important in this exercises is toremember that quantum gates are reversible, unlike classicalgates. The CNOT gate can go both ways - it can entangle,and it can disentangle. One qubit is given to Alice while theother is given to Bob. The qubits of Alice and Bob will remainentangled although one of the qubits is subjected to more gatesthan the other qubit. Table I shows what message options Alicehas to send to Bob, the binary code for that message, and thequantum gates she will use to encode this message informationto her qubit. Because of the entanglement, when Alice doesher quantum gate operations on her qubit, she can not use astandalone gate because she has an entangled qubit. The gateshe will use will be the tensor product of the desired gate withthe Identity matrix to create a 4x4 matrix.

Although the qubits are entangled, while the qubits are inthe possession of their original owner, only Alice can performgate operations on her qubit, and only Bob can performgate operations on his qubit. Once Alice’s qubit has beenencoded by operations of the quantum gates, it is transmittedto Bob. Bob, with Alice’s qubit now in his possession, as wellas his own qubit, can perform quantum gate operations onAlice’s qubit to discover the message in it. Bob first applies aControlled-Not gate operation to both entangled qubits, whereAlice’s qubit is the control and Bob’s qubit is the target.Applying the CNOT to an entangled pair of qubits causesthem to become disentangled and break into two independentqubits.

1

Page 2: A Quantum Computing Architecture based Decoherence Model

Bob first measures the second qubit, the formerly targetqubit that was Bob’s qubit. Measurement ends the qubit’sactivation life, but it reveals data, which is either cold or warm.Bob then applies an H gate to Alice’s original qubit, the firstqubit, the former control qubit of the now disentangled pair.The H gate operation extracts the second bit of information inthe message, i.e. clear or cloudy. When the qubit is measuredthe binary code that reveals the message that Alice encodedin her qubit is displayed.

The measurements end the process [8]. Circuit 1 shows thecomplete quantum circuit diagram for Alice using the X gateto encode warm and clear. We see the Hadamard and CNOTgates used by Eve to entangle, the Unitary gate, or set of gates,U, used by Alice to encode the message, and finally the CNOTand Hadamard gates used by Bob to extract the message.

B. IBM Quantum Computing Architectures available free toresearchers as of publication

There are 13 different IBM Q computers that are avail-able free to researchers as of this publication, and theyare of four distinct architectures [9]: the 5 qubit butterflyseen in Figure 1, the 5 qubit linear seen in Figure 4,the 5 qubit T seen in Figure 3, and the 15 qubit systemseen in Figure 2. There is one butterfly computer namedibmq 5 yorktown - ibmqx2, two linear computers namedibmq athens and ibmq santiago, three T computers namedibmq ourense, ibmq valencia, and ibmq vigo, and one 15qubit computer named ibmq 16 melbourne. This research,using superdense coding, was conducted on these quantumcomputer architectures.

In the illustrative Figures 1, 2, 3, and 4 where thesearchitectures are visualized: the circles represent the qubits andthe lines between the circles represent the connections betweenqubits. A mathematician, or a deep learning scientist, wouldsay, the nodes represent the qubits and the edges represent thequantum channels. The quantum channels are the connectionpaths available between qubits in which the gate operationstake place.

On IBM Q’s website the circles and lines have colorgradients that represent the error rate. The circle color forsingle qubit operations and the color of the lines betweenthe circle represent the error rate for operations that use thespecific pairs of qubits. The darker the color, the clearer thecommunications, and the lower the error rate.

As can be seen from the diagrams, not all qubits are directlyconnected to each other but must interact through one or moreother qubits. This research will only look at the performanceof two qubits that are directly connected and will not test thequbits that are not. The performance of two qubits that are notdirectly connected requires a more nuanced measurement andthe initial findings of that effort are described in the FutureWork section.

C. New IBM Quantum Computing Architectures available toIBM Partners and Customers

There are 12 additional IBM Quantum Computers availableto IBM Partners, however, they are not openly available for

Fig. 1. IBM 5 Qubit Butterfly Architecture as in Yorktown Heights

Fig. 2. IBM 16 Qubit Architecture as in Melbourne

free. These quantum computers have greater quantum volume,more qubits, and lower error rates.

The IBMQ Manhattan is a 65 qubit computer that uses theHummingbird r2 processor as seen in Figure 5.

D. IBM Quantum Computing Simulators

IBM makes high performance quantum computing simula-tors available in the open-source QISKit software stack usinga package called IBM offers a high-performance simulationframework called Qiskit Aer. There are 5 simulators availablefor researchers that are accessed through the IBM Cloud: theClifford gate simulator can simulate a 5,000 qubit quantumcomputer, the Matrix Product State can simulate a 100 qubitcomputer, the Extended Clifford can simulate a 63 qubitcomputer, the Schrodinger wavefunction simulator is capableof up to 32 qubits and finally, a General, context-awaresimulator can model a 32 qubit machine. All of these cloudbased simulators can emulate four different noise models:decoherence, depolarizing, Pauli and general noise. QISKit canalso be installed on a local computer with the capability to runthree different circuit simulators: the statevector, the stabilizerand the extended-stabilizer, each of which can emulate thesame four different noise models of decoherence, depolarizing,

2

Page 3: A Quantum Computing Architecture based Decoherence Model

Fig. 3. IBM 5 Qubit T Architecture as in Ourense, Valencia and Vigo

Fig. 4. IBM 5 Qubit Linear Architecture as in Santiago and Athens

Fig. 5. IBM 65 Qubit ManhattanQ with the Hummingbird r2 processor

Pauli and general noise. IBM simulators are used to examine tocircuits, rapidly prototype circuits for design and characterizethe noise response and sensitivity of a circuit. However, tostudy response to real noise and test how circuits respond andrun on real quantum devices, the programs must be run onreal IBM hardware.

II. LITERATURE REVIEW

The challenges of error correction between two connectedqubits is likely NP-Hard, as this topic is being approached

relentlessly, making incremental improvements in heated com-petition. It is similar to how scientists use linear algebra onsolving for a Bounded Error Quantum Computing Polynomial(BQP) problem. Its complexity is really the same problemviewed over and over from a different linear algebra perspec-tive until one reveals the solution.

The competition is so intense that Google’s recent patenton an adaptive method for adjusting the boundaries of ac-ceptable error that should be easy to read is unintelligible,quickly written to claim that intellectual property first, likea flag on the moon [10]. Google and its parent company,Alphabet, claimed “quantum supremacy” [11] last year, withthe head of Google Research quickly becoming promoted toCEO of Alphabet because of that claim [12]. Then, otherresearchers found they could not replicate the results, asGoogle’s Bristlecone and Sycamore quantum computers arecarefully guarded proprietary information that is not open foroutside researchers to independently confirm (as compared toIBM, that does allow free access to its quantum computersvia cloud computing), so the powerful initial claim [13] thata multiple qubit machine using the annealing design did nothave the suspected decoherence problems [14]. If their claimwas true, Google’s quantum computing supported ArtificialIntelligence would have become much more accurate quickly.Google redefined what was meant by “quantum supremacy”,to mean that they had performed at least one math operationthat could not be done by any known classical computer, amuch lower bar than the original idea [15].

III. METHODOLOGY

The first task is to run the programs on the simulatorto verify that they give the expected results and set theexpectation for the results to follow.

The actual tests will be run on the ibmq 5 yorktown -ibmqx2 Which has a butterfly architecture. 1 A base line wasestablished for the performance of entangled adjacent qubit byrunning the superdense coding tests on qubits 0 and 2. Theoriginal plan was to run the tests on qubits 0 and 1, but sincethe no-adjacent tests would be run on qubits 0 and 3, whichare connected through qubit 2, see figure 1, the decision wasmade to use qubits 0 and 2 to eliminate any difference inbehavior that depends on the qubit pair used.

Once the base line is established the next tests will berunning superdense coding on different sets of adjacent qubits.

Superdense coding allows one qubit of an entangled pairto carry two classical bits of data [3]. The circuit, Figure 6,shows the composer circuit, how IBM Q graphically presentsthe circuit, for superdense coding between qubits 0 and 2 onthe ibm-qx2 butterfly computer. On this computer qubits 0 and2 are adjacent.

The Hadamard gate followed by the CNOT gate entanglesqubits 0 and 2. To encode the two classical bit pattern on theentangled qubits an operation is performed on qubit 0. TableI shows the operations or gates used for each of the desiredbit patterns. The final CNOT and Hadamard gates disentanglethe qubits and decode the message.

3

Page 4: A Quantum Computing Architecture based Decoherence Model

Fig. 6. Circuit for Superdense Coding

Temp Sky Code Quantum GateCold Clear 00 ICold Cloudy 01 ZWarm Clear 10 XWarm Cloudy 11 Y

TABLE IMESSAGE CONDITIONS AND ACTIONS

IV. RESULTS

“In fact, the mere act of opening the box will determinethe state of the cat, although in this case there were threedeterminate states the cat could be in: these being Alive, Dead,and Bloody Furious.” [16]

There appears to be a optimizer, a middleware that is notvisible, between the code generated in the Jupyter PythonNotebook and the code that is actually run on the quantumcomputer. This was first observed when a test was run tryingto entangle qubits 0 and 4 on the T architecture of theibmq ourence quantum computer. Qubits 0 and 4 are notadjacent and if they were to interact, they would have to do sothrough intervening qubits. The composer circuit in the pythonnotebook had only five operations and would have, in theory,entangled qubits 0 and 4, Figure 8, but the composer circuitafter the optimizer had many more operations, including twosets of qubit swaps and entangling qubits 3 and 1, Figure9. Since the qubits that the optimizer used are adjacent it willrequire further research to determine if non-adjacent qubits canbe entangled.NB the controlling qubit is the first one specifiedand the target qubit is the second one specified.

Table II shows the results of running the superdense circuitusing the I gate to encode ’00’. The simulation had 1024,100%, of ’00’. The first actual run had 929 ’00’, 90.7% andthe second run had 915 ’00, 89.4%. The optimizer decides thatsome operation can occur at unexpected times. To prevent theoptimizer from rearranging the operations a ’barrier’ can beinserted in the quantum code between steps. After insertingthe barriers in the code the test had 911 ’00’, 89.0%.

Note that since the tests use qubits 0 and 2, the only bitsof the output pattern that are of significance xx0x0.

Fig. 7. [17]

Fig. 8. Circuit as specified

Fig. 9. Circuit as run

4

Page 5: A Quantum Computing Architecture based Decoherence Model

00000 00001 00100 00101Simulation 1024 0 0 0

Run 1 929 71 22 2Run 2 915 67 19 1Barrier 911 71 28 14

Accuracy 1 90.7%Accuracy 2 89.4%

Barrier 89.0%

TABLE IIQUBITS 0 & 2 - ACTION I

Table III shows the results when using the Z gate to encode’01’. The simulation had 1024 ’01’, 100%. The actual test had880 ’01’, 85.9%. The barrier test had 874 ’01’, 85.5%.

00000 00001 00100 00101Simulation 0 1024 0 0

Run 1 113 880 11 20Barrier 103 874 8 39

Accuracy 85.9%Barrier 85.4%

TABLE IIIQUBITS 0 & 2 - ACTION Z

Table IV shows the results of using the X gate to enccode’10’. The simulation test showed 1024 ’10’, 100%. The actualrun without the barriers had 876 ’10’, 85.5%. The barrier testshowed 874 ’10’, 85.4%.

00000 00001 00100 00101Simulation 0 0 1024 0

Run 1 66 12 876 70Barrier 55 9 874 86

Accuracy 85.5%Barrier 85.4%

TABLE IVQUBITS 0 & 2 - ACTION X

Table V shows the results of the test using the Y gate toencode ’11’. The simulation test had 1024 ’11’, 100%. The testwithout the barries returned 853 ’11’, 83.3% and the barriertest showed 850 ’11’, 83.0%.

00000 00001 00100 00101Simulation 0 0 0 1024

Run 1 9 53 109 853Barrier 9 49 116 850

Accuracy 83.3%Barrier 83.0%

TABLE VQUBITS 0 & 2 - ACTION Y

V. CONCLUSION AND FUTURE WORK

Running the test on a real quantum computer shows abouta 10% degradation of accuracy compared to the simulations.Further the use of barrier also slightly degrades accuracyalthough the single tests should not be considered conclusive.

Future work will include testing Superdense Coding ondifferent pairs of qubits on all the IBM Q computers andtesting the accuracy of the complex circuits created by theoptimizer compared to more concise circuits.

REFERENCES

[1] C. H. Bennett and S. J. Wiesner, “Communication via one-and two-particle operators on einstein-podolsky-rosen states,” Physical reviewletters, vol. 69, no. 20, p. 2881, 1992.

[2] C. H. Bennett, G. Brassard, C. Crepeau, R. Jozsa, A. Peres, and W. K.Wootters, “Teleporting an unknown quantum state via dual classicaland einstein-podolsky-rosen channels,” Physical review letters, vol. 70,no. 13, p. 1895, 1993.

[3] L. Westfall and A. Leider, “Superdense coding step by step,” in Futureof Information and Communication Conference. Springer, 2019, pp.357–372.

[4] M. A. Nielsen and I. L. Chuang, Quantum Computation and QuantumInformation. Cambridge University Press, 2010.

[5] A. Zeilinger, “Quantum teleportation, onwards and upwards,” NaturePhysics, vol. 14, no. 1, pp. 3–4, 2018.

[6] A. Ekert, “The power of independence,” Nature Physics, vol. 14, no. 2,pp. 114–115, 2018.

[7] P. Kaye, R. Laflamme, M. Mosca et al., An introduction to quantumcomputing. Oxford University Press on Demand, 2007.

[8] E. Rieffel and W. Polak, “An introduction to quantum computing fornon-physicists,” ACM Computing Surveys (CSUR), vol. 32, no. 3, pp.300–335, 2000.

[9] I. Q. Experience, “Ibm quantum experience,” 2020. [Online]. Available:https://quantum-computing.ibm.com/

[10] J. A. Gunnels, M. Wegman, and D. Kaminsky, “Adaptive error correctionin quantum computing,” Oct. 1 2020, uS Patent App. 16/370,062.

[11] E. Gibney, “Hello quantum world! google publishes landmark quantumsupremacy claim,” Nature, vol. 574, no. 7779, pp. 461–463, 2019.

[12] B. Villalonga, D. Lyakh, S. Boixo, H. Neven, T. S. Humble, R. Biswas,E. G. Rieffel, A. Ho, and S. Mandra, “Establishing the quantumsupremacy frontier with a 281 pflop/s simulation,” Quantum Scienceand Technology, vol. 5, no. 3, p. 034003, 2020.

[13] S. Patro and A. Piedrafita, “An overview of quantum algorithms: Fromquantum supremacy to shor factorization,” in 2020 IEEE InternationalSymposium on Circuits and Systems (ISCAS). IEEE, 2020, pp. 1–5.

[14] B. Gulbahar, “Theory of quantum path computing with fourier opticsand future applications for quantum supremacy, neural networks andnonlinear schrodinger equations,” Scientific Reports, vol. 10, no. 1, pp.1–23, 2020.

[15] Y. Rinott, T. Shoham, and G. Kalai, “Statistical aspects of the quantumsupremacy demonstration,” arXiv preprint arXiv:2008.05177, 2020.

[16] T. Pratchett, Lords and Ladies. HarperCollins, 1992.[17] OpenCulture, “Meanwhile, inside the box, schrodinger’s

cat plans its revenge. . . ,” 2019. [Online]. Avail-able: https://www.openculture.com/2019/05/meanwhile-inside-the-box-schrodingers-cat-plans-its-revenge.html

5