Alternative Models Of Computation
Thread Rating:
  • 0 Vote(s) - 0 Average
  • 1
  • 2
  • 3
  • 4
  • 5
electronics seminars
Active In SP
**

Posts: 694
Joined: Nov 2009
#1
20-12-2009, 12:35 PM


Introduction
The seminar and presentation aims at introducing various other forms of computation methods. Concepts of quantum computing, DNA computing have been introduced and discussed, Particular algorithms (like the Shor's algorithm) have been discussed. Solution of Traveling alesman problem using DNA computing has also been discussed. In the seminar and presentation aims opening windows to topics that may become tomorrow's mainstay in computer science. Richard Feynman thought up the idea of a 'quantum computer', a computer that uses the effects of quantum mechanics to its advantage .Initially, the idea of a 'quantum computer' was primarily of theoretical interest only, but recent developments have bought the idea to foreground. To start with, was the invention of an algorithm to factor large numbers on a quantum computer, by Peter Shor , from Bell labs . By using this algorithm, a quantum computer would be able to crack codes much more quickly than any ordinary (or classical) computer could.In fact a quantum computer capable of performing Shor's algorithm would be able to break current cryptography techniques(like the RSA) in a matter of seconds. With the motivation provided by this algorithm, the quantum computing has gathered momentum and is a hot topic for research around the globe. Leonard M. Adleman solved an unremarkable computational problem with an exceptional technique. He had used 'mapping' to solve TSP. It was a problem that an average desktop machine could solve in fraction of a second. Adleman, however took , seven days to find a solution. Even then his work was exceptional, because he solved the problem with DNA. It was a breakthrough and a landmark demonstration of computing on the molecular level. In case of quantum computing and DNA computing, both have two aspects.Firstly building a computer and secondly deploying the computer for solving problems that are tough to solve in the present domain of Von Neumann architecture, In the seminar and presentation we would consider the later. Shor's algorithm is based on a result from number theory. Which states: The function f(a) = x pow a mod n is a periodic function, where x and n are coprime . In the context of Shor's algorithm n is the number we wish to factor. By saying we mean that their greatest common divisor is one. If implemented, it will have a profound effect on cryptography, as it would compromise the security provided by public key encryption (such as RSA).We all know that the security lies in the 'hard' factoring problem. Shor's algorithm makes it simple using quantum computing techniques.
Use Search at http://topicideas.net/search.php wisely To Get Information About Project Topic and Seminar ideas with report/source code along pdf and ppt presenaion
Reply

Important Note..!

If you are not satisfied with above reply ,..Please

ASK HERE

So that we will collect data for you and will made reply to the request....OR try below "QUICK REPLY" box to add a reply to this page

Quick Reply
Message
Type your reply to this message here.


Image Verification
Please enter the text contained within the image into the text box below it. This process is used to prevent automated spam bots.
Image Verification
(case insensitive)

Possibly Related Threads...
Thread Author Replies Views Last Post
  Game Theory in Wireless and Communication Networks: Theory, Models, and Applications study tips 0 391 22-08-2013, 03:29 PM
Last Post: study tips
  CLOUD COMPUTING: A POWERFUL ALTERNATIVE TO CHANGING GLOBAL NEEDS – A REVIEW REPORT study tips 0 392 26-06-2013, 04:56 PM
Last Post: study tips
  Rethinking of computation for future-generation, knowledge-rich speech recognition study tips 0 302 02-03-2013, 12:03 PM
Last Post: study tips
  Distributed computation, analysis, and presentation between PCs ppt study tips 0 294 26-02-2013, 04:41 PM
Last Post: study tips
  THE USE OF MULTI RESOLUTION ACTIVE SHAPE MODELS FOR FACE DETECTION pdf study tips 0 350 16-02-2013, 10:00 AM
Last Post: study tips
  SecuredTrust: A Dynamic Trust Computation Model for Secured Communication Report study tips 0 348 11-02-2013, 09:38 AM
Last Post: study tips
  Mobile Cloud Computing: A Comparison of Application Models pdf project girl 0 430 08-02-2013, 09:56 AM
Last Post: project girl
  FORMAL LANGUAGES, AUTOMATA AND THEORY OF COMPUTATION pdf project girl 0 400 02-02-2013, 11:07 AM
Last Post: project girl
  Always Acyclic Distributed Path Computation Report project girl 0 327 24-01-2013, 04:45 PM
Last Post: project girl
  NEW BUSINESS MODELS AND STRATEGIES FOR THE INTERNET ECONOMY seminar tips 0 777 08-01-2013, 03:59 PM
Last Post: seminar tips