Quantum Computing — Explained
Detailed Explanation
<h2>Complete Guide to Quantum Computing for UPSC Preparation</h2>
Quantum computing stands at the forefront of emerging technologies, promising a computational paradigm shift with profound implications across science, industry, and national security. For UPSC aspirants, understanding this domain requires not just a grasp of its technical fundamentals but also its strategic relevance, policy landscape, and potential societal impact.
<h3>1. Origin and Historical Trajectory</h3>
The conceptual roots of quantum computing trace back to the early 1980s. Physicist Richard Feynman, in 1981, famously proposed that simulating quantum systems efficiently would require a quantum computer itself, as classical computers struggled with the exponential complexity of quantum mechanics.
This idea laid the groundwork for the field. In 1985, David Deutsch formalized the concept of a universal quantum computer. Significant theoretical breakthroughs followed, including Peter Shor's algorithm in 1994 for factoring large numbers (a task intractable for classical computers, threatening modern cryptography) and Lov Grover's algorithm in 1996 for searching unsorted databases faster than classical methods.
The late 20th and early 21st centuries saw the first experimental demonstrations of quantum gates and small-scale quantum processors, moving the field from theoretical curiosity to practical pursuit [3].
<h3>2. Quantum Mechanics Principles: The Foundation</h3>
Quantum computing leverages three core principles of quantum mechanics:
<h4>2.1. Superposition</h4>
Unlike a classical bit, which can only be in a state of 0 or 1, a quantum bit (qubit) can exist in a superposition of both states simultaneously. This means a single qubit can represent both 0 and 1 at the same time, with a certain probability amplitude for each.
An analogy is a spinning coin: while spinning, it's neither heads nor tails, but a probabilistic combination. This property allows quantum computers to process multiple possibilities concurrently, leading to exponential speedups for certain problems.
For 'n' qubits, a quantum computer can represent 2^n states simultaneously, a stark contrast to 'n' states for 'n' classical bits [4].
<h4>2.2. Entanglement</h4>
Entanglement is a phenomenon where two or more qubits become inextricably linked, such that the state of one qubit instantaneously influences the state of the others, regardless of the physical distance separating them.
Measuring the state of one entangled qubit instantly determines the state of its entangled partner(s). This 'spooky action at a distance,' as Einstein termed it, allows quantum computers to establish complex correlations between qubits, which is crucial for the efficiency of many quantum algorithms.
It enables a collective state that cannot be described by the individual states of the qubits alone [5].
<h4>2.3. Decoherence</h4>
Decoherence is the loss of quantum properties (superposition and entanglement) due to interaction with the external environment. Qubits are extremely fragile and susceptible to noise from heat, vibrations, or electromagnetic fields, causing them to 'collapse' into a classical state prematurely.
This is a major challenge in building stable and reliable quantum computers, as it limits the time qubits can maintain their quantum state and perform computations. Quantum error correction techniques are being developed to mitigate decoherence, but they require a significant overhead of additional qubits [6].
<h3>3. Qubits: The Building Blocks of Quantum Computation</h3>
Qubits are the fundamental units of information in a quantum computer. Their physical implementation varies significantly, each with its own advantages and challenges:
- <b>Superconducting Qubits:</b> These are tiny electrical circuits cooled to near absolute zero (-273.15°C) to eliminate electrical resistance and allow quantum effects to emerge. They are highly scalable and form the basis of IBM's and Google's quantum processors (e.g., IBM Q, Google Sycamore). Challenges include extreme cooling requirements and susceptibility to noise.
- <b>Trapped Ions:</b> Individual atoms are ionized and suspended in a vacuum using electromagnetic fields. Lasers are used to manipulate their quantum states. Ion trap systems boast high coherence times and gate fidelities, making them a leading candidate (e.g., IonQ). Scalability is a primary challenge due to the complexity of precisely controlling many ions.
- <b>Photonic Qubits:</b> These use individual photons (particles of light) as qubits. Information is encoded in properties like polarization or path. Photonic systems can operate at room temperature and are excellent for quantum communication. However, creating stable, interacting photon sources and detectors is challenging (e.g., Xanadu, China's Jiuzhang).
- <b>Topological Qubits:</b> A more theoretical approach, these qubits are based on exotic quasiparticles (anyons) in 2D materials, which are inherently more robust against local noise due to their topological properties. Microsoft is a major proponent, but experimental realization is extremely difficult.
- <b>Quantum Dots:</b> Semiconductor nanocrystals that can confine electrons, whose spin states can serve as qubits. They offer potential for integration with existing semiconductor technology but face challenges in control and entanglement.
<h3>4. Quantum Gates and Circuits</h3>
Quantum gates are the elementary operations performed on qubits, analogous to logic gates (AND, OR, NOT) in classical computing. They are unitary transformations that manipulate the quantum states of qubits. Examples include:
- <b>Hadamard Gate (H):</b> Creates superposition from a classical state (e.g., transforms |0⟩ to (|0⟩+|1⟩)/√2).
- <b>Pauli-X Gate (X):</b> Acts like a classical NOT gate, flipping the state (0 to 1, 1 to 0).
- <b>Controlled-NOT Gate (CNOT):</b> A two-qubit gate that entangles qubits. It flips the target qubit only if the control qubit is in the |1⟩ state. This gate is crucial for creating entanglement and is a universal gate when combined with single-qubit gates.
Quantum circuits are sequences of these quantum gates applied to an initial state of qubits to perform a computation. The design of these circuits is central to developing quantum algorithms.
<h3>5. Quantum Algorithms: Unleashing Computational Power</h3>
Quantum algorithms are designed to exploit superposition and entanglement to achieve computational speedups for specific problems:
- <b>Shor's Algorithm:</b> Discovered by Peter Shor in 1994, this algorithm can efficiently factor large integers into their prime factors. This has profound implications for cybersecurity, as it can break widely used public-key encryption schemes like RSA and ECC, which rely on the computational difficulty of factoring large numbers. Its practical implementation would necessitate a complete overhaul of global digital security infrastructure [7].
- <b>Grover's Algorithm:</b> Developed by Lov Grover in 1996, this algorithm offers a quadratic speedup for searching an unsorted database. While not an exponential speedup like Shor's, it significantly reduces the number of queries needed, making it valuable for tasks like database searching and cryptanalysis (e.g., breaking symmetric-key encryption like AES through brute force, though requiring much larger key sizes to remain secure) [8].
- <b>Variational Quantum Eigensolver (VQE) and Quantum Approximate Optimization Algorithm (QAOA):</b> These are hybrid classical-quantum algorithms designed for 'Noisy Intermediate-Scale Quantum' (NISQ) devices, which are current quantum computers with limited qubits and high error rates. They combine a classical optimizer with a quantum processor to find approximate solutions to complex problems in chemistry, materials science, and optimization. VQE is particularly promising for simulating molecular energies, crucial for drug discovery and material design.
- <b>Quantum Annealing:</b> A specialized type of quantum computation used primarily for optimization problems. Instead of using quantum gates, it leverages quantum tunneling to find the lowest energy state (optimal solution) in a complex energy landscape. D-Wave Systems is a pioneer in quantum annealing hardware, applying it to problems like logistics optimization and machine learning [9].
<h3>6. Quantum Supremacy Milestones</h3>
'Quantum supremacy' (or 'quantum advantage,' a more preferred term) refers to the point where a quantum computer performs a computational task that is practically impossible for the fastest classical supercomputers. Key milestones include:
- <b>Google Sycamore (2019):</b> Google announced its Sycamore processor performed a specific random circuit sampling task in 200 seconds that would take a classical supercomputer 10,000 years. This was widely considered the first demonstration of quantum supremacy [10].
- <b>China's Jiuzhang (2020):</b> Researchers at the University of Science and Technology of China (USTC) demonstrated quantum advantage using photonic qubits. Their Jiuzhang processor performed a Gaussian boson sampling task in minutes that would take classical supercomputers billions of years. This showcased an alternative approach to quantum computing [11].
- <b>China's Zuchongzhi (2021):</b> USTC further advanced with Zuchongzhi, a 66-qubit superconducting processor, demonstrating a more complex random circuit sampling task, surpassing Sycamore's capabilities.
These demonstrations, while on highly specialized tasks, validate the fundamental principles and potential of quantum computing.
<h3>7. Quantum Cryptography (QKD) vs. Post-Quantum Cryptography (PQC)</h3>
Quantum computing poses an existential threat to current cryptographic standards, necessitating new approaches to secure digital communication.
<h4>7.1. Quantum Key Distribution (QKD)</h4>
QKD is a method of secure communication that uses principles of quantum mechanics to establish a shared secret key between two parties. Its security relies on the laws of physics: any attempt by an eavesdropper to intercept the key will inevitably disturb the quantum state, alerting the communicating parties.
The most common protocol is BB84. QKD provides 'information-theoretic security' for key exchange. However, QKD only secures the key exchange; the subsequent data encryption still uses classical algorithms.
It also has practical limitations, including distance constraints (due to photon loss) and the need for dedicated quantum channels [12].
<h4>7.2. Post-Quantum Cryptography (PQC)</h4>
PQC refers to cryptographic algorithms that can run on classical computers but are designed to be resistant to attacks by both classical and quantum computers. These algorithms are based on 'hard' mathematical problems that are believed to be intractable even for quantum computers (e.
g., lattice-based cryptography, code-based cryptography, multivariate polynomial cryptography). Unlike QKD, PQC aims to replace existing public-key algorithms (like RSA and ECC) entirely. Standardization efforts, notably by the U.
S. National Institute of Standards and Technology (NIST), are underway to select and standardize PQC algorithms for global adoption. PQC is seen as a more scalable and universally deployable solution for future digital security [13].
<h3>8. Quantum Communication and Satellite QKD</h3>
Quantum communication aims to transmit quantum information (qubits) over distances, enabling secure communication and potentially distributed quantum computing networks. A key application is QKD over long distances.
- <b>Satellite QKD:</b> Due to photon loss in optical fibers, QKD is limited to a few hundred kilometers. Satellites offer a solution by transmitting photons through the vacuum of space, where loss is minimal. China has been a pioneer with its Micius quantum satellite (launched 2016), demonstrating intercontinental QKD and quantum entanglement distribution over thousands of kilometers. This technology is crucial for building a global quantum internet and securing critical national infrastructure [14].
<h3>9. Global Hardware Landscape and Key Players</h3>
The development of quantum hardware is a highly competitive global race:
- <b>IBM Q Network:</b> IBM is a leader in superconducting quantum computing, offering cloud-based access to its quantum processors (e.g., Osprey, Condor) through its Qiskit open-source framework. It has a robust ecosystem of partners and researchers.
- <b>Google Quantum AI:</b> Known for its Sycamore processor, Google focuses on superconducting qubits and aims to build a fault-tolerant quantum computer. It is actively researching quantum error correction.
- <b>China's Quantum Programs:</b> Led by institutions like USTC (University of Science and Technology of China), China has made significant strides in both photonic (Jiuzhang) and superconducting (Zuchongzhi) quantum computing, as well as satellite-based quantum communication (Micius). The government has invested heavily, making it a formidable player.
- <b>Microsoft Azure Quantum:</b> Microsoft offers a cloud platform for quantum computing, integrating various hardware providers (IonQ, Quantinuum, Rigetti) and developing its own topological qubit approach.
- <b>Other Notable Players:</b> IonQ (trapped ions), Rigetti (superconducting), Xanadu (photonic), D-Wave (quantum annealing), Quantinuum (trapped ions).
<h3>10. India's National Mission on Quantum Technologies (NM-QT)</h3>
Recognizing the strategic importance of quantum technologies, the Government of India launched the National Mission on Quantum Technologies & Applications (NM-QTA) in the Union Budget 2020. The mission was formally approved in 2020 with a total outlay of INR 8000 Crores (approximately USD 1 billion) over five years (2020-2025).
<h4>10.1. Objectives of NM-QT</h4>
- <b>Fundamental R&D:</b> Foster basic and applied research in quantum science and technology.
- <b>Infrastructure Development:</b> Establish quantum computing labs, testbeds, and facilities across the country.
- <b>Human Resource Development:</b> Train skilled manpower in quantum science, engineering, and algorithms.
- <b>Technology Development:</b> Develop quantum hardware (qubits, quantum devices) and software (algorithms, simulators).
- <b>Application Development:</b> Focus on developing quantum applications in areas like healthcare, finance, defense, and cybersecurity.
- <b>International Collaboration:</b> Promote partnerships with leading global institutions.
<h4>10.2. Institutional Players and Timelines</h4>
- <b>Department of Science & Technology (DST):</b> Nodal agency for implementing NM-QT.
- <b>DRDO (Defence Research and Development Organisation):</b> Focus on quantum cryptography and secure communication for defense applications.
- <b>IISc (Indian Institute of Science), IITs (Indian Institutes of Technology), TIFR (Tata Institute of Fundamental Research):</b> Leading academic institutions involved in fundamental research and human resource development.
- <b>C-DAC (Centre for Development of Advanced Computing):</b> Involved in developing quantum software and simulators.
India aims to develop indigenous quantum computing capabilities, secure its digital infrastructure, and become a global leader in select quantum technologies by 2030. The mission is critical for India's strategic autonomy and economic growth in the coming decades [15].
<h3>11. Applications of Quantum Computing</h3>
Quantum computing holds the potential to revolutionize numerous sectors by solving problems currently intractable for classical computers. Here are 8-10 concrete examples:
<table border="1" cellpadding="5" cellspacing="0"> <thead> <tr> <th>Sector</th> <th>Problem</th> <th>Quantum Approach</th> <th>Maturity Level</th> </tr> </thead> <tbody> <tr> <td><b>Healthcare & Drug Discovery</b></td> <td>Simulating molecular interactions for new drug development, protein folding.
</td> <td>VQE for molecular energy calculations, quantum machine learning for drug candidate screening.</td> <td>Early research, NISQ era experiments.</td> </tr> <tr> <td><b>Materials Science</b></td> <td>Designing novel materials with specific properties (e.
g., superconductors, catalysts, batteries).</td> <td>Quantum simulations to predict material behavior at atomic level, VQE.</td> <td>Early research, promising for battery tech.</td> </tr> <tr> <td><b>Finance</b></td> <td>Portfolio optimization, fraud detection, risk analysis, high-frequency trading strategies.
</td> <td>Grover's for search, QAOA for optimization, quantum machine learning for pattern recognition.</td> <td>Proof-of-concept, early commercial pilots.</td> </tr> <tr> <td><b>Cybersecurity</b></td> <td>Breaking current public-key encryption (RSA, ECC), developing quantum-resistant algorithms.
</td> <td>Shor's algorithm for factoring, PQC development, QKD for secure communication.</td> <td>Shor's is theoretical threat; PQC in standardization; QKD in limited deployment.</td> </tr> <tr> <td><b>Logistics & Supply Chain</b></td> <td>Optimizing delivery routes, fleet management, warehouse operations, supply chain resilience.
</td> <td>Quantum annealing, QAOA for combinatorial optimization problems.</td> <td>Early commercial pilots, D-Wave applications.</td> </tr> <tr> <td><b>Artificial Intelligence & Machine Learning</b></td> <td>Accelerating training of complex AI models, pattern recognition, data analysis.
</td> <td>Quantum machine learning algorithms (e.g., Q-SVM, Q-GAN), quantum neural networks.</td> <td>Active research, potential for big data.</td> </tr> <tr> <td><b>Climate Modeling & Weather Prediction</b></td> <td>Simulating complex climate systems, optimizing energy grids, carbon capture.
</td> <td>Quantum simulations for complex fluid dynamics, optimization algorithms.</td> <td>Long-term potential, early theoretical work.</td> </tr> <tr> <td><b>Aerospace & Defense</b></td> <td>Optimizing aircraft design, secure communication, advanced sensor development.
</td> <td>Quantum simulations, QKD, quantum sensing.</td> <td>Strategic R&D, secure comms for defense.
<h3>12. National Security and Digital Governance Implications</h3>
Quantum computing is not merely a technological advancement; it is a geopolitical and strategic imperative with profound implications for national security and digital governance.
- <b>Threat to Encryption:</b> The most immediate and significant threat is Shor's algorithm's ability to break widely used public-key cryptography (RSA, ECC). This would compromise secure communications, financial transactions, government secrets, and critical infrastructure globally. Nations are racing to develop and deploy Post-Quantum Cryptography (PQC) to mitigate this 'quantum apocalypse' scenario. This is a critical concern for national defense and intelligence agencies .
- <b>Secure Communication:</b> Conversely, quantum technologies offer solutions for ultra-secure communication through Quantum Key Distribution (QKD). Satellite-based QKD (like China's Micius) enables secure communication over vast distances, crucial for military and diplomatic channels. India's NM-QT explicitly includes secure communication as a key focus area, often involving DRDO.
- <b>Strategic Competition:</b> The race for quantum supremacy is a new front in technological competition between global powers (USA, China, EU, India). Dominance in quantum computing could confer significant economic and military advantages, impacting geopolitical stability. Control over quantum hardware and software stacks will be a critical aspect of future technological sovereignty.
- <b>Digital Governance and Data Sovereignty:</b> Governments will need to update their digital governance frameworks to account for quantum threats and opportunities. This includes policies for transitioning to PQC, regulating quantum technology development, and ensuring data privacy in a quantum-enabled world. The ability to process vast datasets with quantum machine learning could also enhance surveillance capabilities, raising ethical and privacy concerns. Ensuring data sovereignty and developing indigenous quantum capabilities are paramount for nations like India to maintain control over their digital future .
- <b>Economic Competitiveness:</b> Nations that lead in quantum technology will gain a significant competitive edge in industries like finance, pharmaceuticals, and advanced manufacturing. This drives massive public and private investment globally.
<h3>13. Vyyuha Analysis: A Strategic Imperative for UPSC Aspirants</h3>
From a UPSC perspective, quantum computing represents a paradigm shift that candidates must understand not just technically, but strategically. The Vyyuha editorial lens emphasizes its dual-use nature: a tool for unprecedented progress and a weapon capable of destabilizing global security.
The race for quantum supremacy is not merely about scientific achievement; it is a contest for future economic competitiveness and national security. India's National Mission on Quantum Technologies (NM-QT) is a critical policy response, reflecting a clear recognition of this strategic imperative.
Aspirants should analyze how NM-QT aligns with broader national goals of self-reliance (Atmanirbhar Bharat) and technological leadership. The interplay between quantum computing, artificial intelligence , and cybersecurity forms a crucial nexus for Mains questions, particularly concerning digital governance and national security.
The potential to revolutionize drug discovery and logistics also highlights its socio-economic impact. Understanding the global landscape—the advancements by IBM, Google, and especially China's state-backed initiatives—is vital for contextualizing India's efforts and assessing its position in this high-stakes technological race.
The transition to post-quantum cryptography is not a distant future problem but an ongoing national security challenge that requires immediate policy attention and resource allocation. The UPSC examiner will likely test candidates on their ability to synthesize these technical, policy, and strategic dimensions, moving beyond mere definitions to a comprehensive, analytical understanding of quantum computing's role in India's future.
<h3>14. Inter-Topic Connections</h3>
Quantum computing is not an isolated field; it has deep interconnections with other emerging technologies and policy domains:
- <b>Artificial Intelligence and Machine Learning (AI/ML) :</b> Quantum machine learning (QML) algorithms can potentially accelerate AI training, enhance pattern recognition, and process massive datasets more efficiently, leading to breakthroughs in areas like drug discovery and financial modeling.
- <b>Internet of Things (IoT) and Edge Computing :</b> Quantum sensors could provide unprecedented precision for IoT devices, while quantum-safe communication protocols will be essential for securing the vast network of IoT devices against future quantum attacks.
- <b>Robotics and Automation Technologies :</b> Quantum optimization algorithms can enhance robotic path planning, swarm intelligence, and complex decision-making processes in autonomous systems.
- <b>Cybersecurity and Data Protection Measures :</b> Quantum computing poses the biggest threat to current encryption, necessitating the development and deployment of Post-Quantum Cryptography (PQC) and Quantum Key Distribution (QKD).
- <b>Space Technology and Satellite Communications :</b> Satellite-based Quantum Key Distribution (QKD) is crucial for building a global quantum communication network, overcoming terrestrial distance limitations and securing critical space assets.
- <b>Biotechnology and Drug Discovery :</b> Quantum simulations can accurately model molecular interactions, accelerating the discovery of new drugs, designing novel materials, and understanding complex biological processes.
<table border="1" cellpadding="5" cellspacing="0"> <thead> <tr> <th>Year</th> <th>Milestone</th> <th>Significance</th> </tr> </thead> <tbody> <tr> <td>1981</td> <td>Richard Feynman proposes quantum computers.
</td> <td>Conceptual birth of the field.</td> </tr> <tr> <td>1994</td> <td>Peter Shor develops Shor's algorithm.</td> <td>Demonstrates exponential speedup for factoring, threatening RSA encryption.
</td> </tr> <tr> <td>1996</td> <td>Lov Grover develops Grover's algorithm.</td> <td>Quadratic speedup for unstructured database search.</td> </tr> <tr> <td>1998</td> <td>First 2-qubit NMR quantum computer demonstrated.
</td> <td>Early experimental proof of concept.</td> </tr> <tr> <td>2007</td> <td>D-Wave Systems sells first commercial quantum annealer.</td> <td>First commercial quantum device, albeit specialized.
</td> </tr> <tr> <td>2016</td> <td>China launches Micius quantum satellite.</td> <td>Pioneering satellite-based QKD and entanglement distribution.</td> </tr> <tr> <td>2017</td> <td>IBM makes 20-qubit processor available via cloud.
</td> <td>Democratization of quantum computing access.</td> </tr> <tr> <td>2019</td> <td>Google announces 'quantum supremacy' with Sycamore.</td> <td>First experimental demonstration of a quantum computer performing a task beyond classical supercomputers.
</td> </tr> <tr> <td>2020</td> <td>India launches National Mission on Quantum Technologies (NM-QT).</td> <td>Strategic national investment in quantum R&D.</td> </tr> <tr> <td>2020</td> <td>China's Jiuzhang achieves quantum advantage with photonic qubits.
</td> <td>Second independent demonstration of quantum advantage, using a different qubit modality.</td> </tr> <tr> <td>2021</td> <td>China's Zuchongzhi (66-qubit) surpasses Sycamore.</td> <td>Further advancement in superconducting quantum computing.
</td> </tr> <tr> <td>2022</td> <td>NIST announces first set of PQC standardization candidates.</td> <td>Major step towards global quantum-safe cryptography.</td> </tr> <tr> <td>2023</td> <td>IBM unveils 133-qubit Heron processor, roadmap to 1000+ qubits.
</td> <td>Continued scaling of superconducting quantum hardware.</td> </tr> <tr> <td>2024</td> <td>Global focus on quantum error correction and fault tolerance.</td> <td>Shift towards building more robust and reliable quantum computers.
<table border="1" cellpadding="5" cellspacing="0"> <thead> <tr> <th>Aspect</th> <th>Classical Computing</th> <th>Quantum Computing</th> </tr> </thead> <tbody> <tr> <td><b>Processing Method</b></td> <td>Uses bits (0 or 1) sequentially.
Deterministic logic gates.</td> <td>Uses qubits (0, 1, or superposition) in parallel. Quantum gates leverage superposition, entanglement, interference.</td> </tr> <tr> <td><b>Fundamental Unit</b></td> <td>Bit (Binary Digit)</td> <td>Qubit (Quantum Bit)</td> </tr> <tr> <td><b>Information Storage</b></td> <td>Transistors (on/off states)</td> <td>Quantum states of particles (e.
g., electron spin, photon polarization, energy levels of atoms)</td> </tr> <tr> <td><b>Speed/Complexity</b></td> <td>Solves problems by trying possibilities one by one or using heuristics. Exponentially slows down for complex problems.
</td> <td>Can explore multiple possibilities simultaneously due to superposition. Offers exponential or polynomial speedups for specific problems.</td> </tr> <tr> <td><b>Applications</b></td> <td>General-purpose computing (web browsing, word processing, databases, most AI).
</td> <td>Specialized for complex problems (cryptography breaking, drug discovery, materials science, optimization, advanced AI).</td> </tr> <tr> <td><b>Current Limitations</b></td> <td>Reaches limits for certain intractable problems (e.
g., large prime factorization, complex molecular simulations).</td> <td>High error rates (decoherence), limited number of stable qubits, extreme environmental control (cooling), lack of fault tolerance.
</td> </tr> <tr> <td><b>Energy Consumption</b></td> <td>Significant, especially for supercomputers.</td> <td>High for cooling and control systems, but potentially more energy-efficient for specific computations once mature.
</td> </tr> <tr> <td><b>Error Rates</b></td> <td>Very low, highly reliable.</td> <td>High, due to decoherence and environmental noise. Requires extensive error correction.</td> </tr> <tr> <td><b>Commercial Availability</b></td> <td>Ubiquitous, mature technology.
</td> <td>Limited access via cloud platforms, mostly for research and specialized applications. Still in NISQ era.