Quantum Database users and system security privileges
Israa Ibrahim Ahmed Hamed Hamouda;
Abstract
Quantum Database users and system security privileges
Israa Ibrahim Ahmed Hamed Hamouda
Master of Science in Electrical Engineering (Computer and Systems Engineering)
Keywords -- Quantum Computing, Quantum Databases, Grover’s Algorithm, Generalized Grover’s Algorithm.
The thesis is divided into five chapters including lists of contents, tables, figures and one appendix for explaining Quantum Computing as well as list of references.
Chapter 1
This chapter is divided into four parts. The first part is the problem definition. Second and third parts are the thesis methodology and contribution. Last part gives a brief explanation for each chapter in the thesis.
Chapter 2
This chapter is divided into three main sections, the first one gives introduction on classical databases and their components. It explains the architecture of the databases in general and then gives the same explanation for the quantum databases. The second section explains the main idea behind Grover’s iteration algorithm along with in details equations of the algorithm to provide better understanding. At the end
Israa Ibrahim Ahmed Hamed Hamouda
Master of Science in Electrical Engineering (Computer and Systems Engineering)
Keywords -- Quantum Computing, Quantum Databases, Grover’s Algorithm, Generalized Grover’s Algorithm.
The thesis is divided into five chapters including lists of contents, tables, figures and one appendix for explaining Quantum Computing as well as list of references.
Chapter 1
This chapter is divided into four parts. The first part is the problem definition. Second and third parts are the thesis methodology and contribution. Last part gives a brief explanation for each chapter in the thesis.
Chapter 2
This chapter is divided into three main sections, the first one gives introduction on classical databases and their components. It explains the architecture of the databases in general and then gives the same explanation for the quantum databases. The second section explains the main idea behind Grover’s iteration algorithm along with in details equations of the algorithm to provide better understanding. At the end
Other data
| Title | Quantum Database users and system security privileges | Other Titles | أمين نظم قواعد البيانات الكمية ومستخدميها | Authors | Israa Ibrahim Ahmed Hamed Hamouda | Issue Date | 2017 |
Recommend this item
Similar Items from Core Recommender Database
Items in Ain Shams Scholar are protected by copyright, with all rights reserved, unless otherwise indicated.