首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 31 毫秒
1.
The scheme on multiparty secret sharing of an atomic quantum state information via entanglement swapping in cavity QED [Y.Q. Zhang, X.R. Jin, S. Zhang, Phys. Lett. A 341 (2005) 380] is revisited and accordingly an improved version is proposed. The possible decoherence effect in the original version can be avoided after revision of assuming the prior distribution of entanglement. Moreover, the success probability of teleportation has been raised from 6.25% in the original version to 100% in the present version.  相似文献   

2.
[1]C.O.Weiss and R.Vilaseca,Dynamics of Lasers,VCH,Weinheim (1991); Instabilities and Chaos in Quantum Optics,eds.F.T.Arecchi and R.G.Harrison,Springer-Verlag,Berlin (1987). [2]H.Haken,Phys.Lett.A 53 (1975) 77. [3]Ju Rui,Huang Hong-Bin,Yang Peng,Xie Xia,and Zhao Huan,Commun.Theor.Phys.(Beijing,China) 44 (2005) 65; Ju Rui,Zhang Ya-Jun,Huang Hong-Bin,and Zhao Huan,Acta Phys.Sin.53 (2004) 2191 (in Chinese). [4]C.Z.Ning and H.Haken,Z.Phys.B 77 (1989) 247; B 77 (1989) 157; B 77 (1989) 163; J.Zakrenwski and M.Lewenstein,Phys.Rev.A 45 (1992) 2057. [5]G.J.deValearcel,E.Roldan,and R.Vilaseca,Phys.Rev.A 45 (1992) R2674; Phys.Rev.A 49 (1994) 1243. [6]X.Xie,H.B.Huang,F.Qian,Y.J.Zhang,P.Yang,and G.X.Qi,Commun.Theor.Phys.(Beijing,China) 46 (2006) 1042. [7]X.L.Deng,H.Q.Ma,B.D.Chen,and H.B.Huang,Phys.Lett.A 290 (2001) 77. [8]C.Benkert,and M.O.Scully,Phys.Rev.A 42 (1990) 2817. [9]M.O.Scully and M.S.Zubairy,Quantum Optics,Cambridge University Press,Cambridge (1997).  相似文献   

3.
《Physics letters. A》2006,358(4):256-258
We present an improvement of the protocol proposed by Lucamarini and Mancini [M. Lucamarini, S. Mancini, Phys. Rev. Lett. 94 (2005) 140501] with techniques used in the protocol presented by Zhu et al. [A.D. Zhu, Y. Xia, Q.B. Fan, S. Zhang, Phys. Rev. A 73 (2006) 022338], namely the secret transmitting order of particles.  相似文献   

4.
The GHZ-state-based quantum secure direct communication (QSDC) protocol [X.-R. Jin, et al., Phys. Lett. A 354 (2006) 67] and its improved version [Z. Man, Y. Xia, Chin. Phys. Lett. 24 (2007) 15] are analyzed from the aspect of security. It shows that much information of the transmitted secret message will be leaked out in both protocols.  相似文献   

5.
Y. Braiman  T. Egami 《Physica A》2009,388(10):1978-1984
We describe the oscillatory crack propagation for small propagation velocities at the atomistic scale that was recently observed for brittle metallic glasses [G. Wang, Y.T. Wang, Y.H. Liu, M.X. Pan, D.Q. Zhao, W.H. Wang, Appl. Lett. 89 (2006) 121909; G. Wang, D.Q. Zhao, H.Y. Bai, M.X. Pan, A.L. Xia, B.S. Han, X.K. Xi, Y. Wu, W.H. Wang, Phys. Rev. Lett. 98 (2007) 235501]. Based on a simple model of crack propagation [Y. Braiman, T. Egami, Phys. Rev. E, 77 (2008) 065101(R)], we derived and analyzed expressions for the feature size, oscillation period, and maximum strain accumulated in the material.  相似文献   

6.
[1]V.D.Burkert,Phys.Lett.B 72 (1997) 109. [2]S.Capstick and W.Roberts,Prog.Part.Nucl.Phys.45 (2000) S241,and references therein. [3]B.S.Zou,Nucl.Phys.A 675 (2000) 167c; B.S.Zou,Nucl.Phys.A 684 (2001) 330; BES Collaboration (J.Z.Bai,et al.) Phys.Lett.B 510 (2001) 75; BES Collaboration (M.Ablikim,et al.),hep-ex/0405030. [4]R.Sinha and Susumu Okubo,Phys.Rev.D 30 (1984)2333. [5]W.H.Liang,P.N.Shen,B.S.Zou,and A.Faessler,Euro.Phys.J A 21 (2004) 487. [6]Particle Data Group,Euro.Phys.J.C 15 (2000) 1. [7]K.Tsushima,A.Sibrtsev,and A.W.Thomas,Phys.Lett.B 390 (1997) 29. [8]J.Kogut,Rev.Mod.Phys.51 (1979) 659; Rev.Mod.Phys.55 (1983) 775. [9]Q.Haider and L.C.Liu,J.Phys.G 22 (1996) 1187; L.C.Liu and W.X.Ma,J.Phys.G 26 (2000) L59. [10]V.G.J.Stoks,R.A.M.Klomp,C.P.F.Terheggen,and J.J.de Swart,Phys.Rev.C 49 (1994) 2950. [11]H.Haberzettl,C.Bennhold,T.Mart,and T.Feuster,Phys.Rev.C 58 (1998) R40. [12]Y.Oh,A.I.Titov,and T.-S.H.Lee,Phys.Rev.C 63(2001) 25201.  相似文献   

7.
Parameter identification of chaos system based on unknown parameter observer is discussed generally. Based on the work of Guan et al. [X.P. Guan, H.P. Peng, L.X. Li, et al., Acta Phys. Sinica 50 (2001) 26], the design of unknown parameter observer is improved. The application of the improved approach is extended greatly. The works in some literatures [X.P. Guan, H.P. Peng, L.X. Li, et al., Acta Phys. Sinica 50 (2001) 26; J.H. Lü, S.C. Zhang, Phys. Lett. A 286 (2001) 148; X.Q. Wu, J.A. Lu, Chaos Solitons Fractals 18 (2003) 721; J. Liu, S.H. Chen, J. Xie, Chaos Solitons Fractals 19 (2004) 533] are only the special cases of our Corollaries 1 and 2. Some observers for Lü system and a new chaos system are designed to test our improved method, and simulations results demonstrate the effectiveness and feasibility of the improved approach.  相似文献   

8.
We propose a new attack strategy for the improvement n-party (n≥4) case [S. Lin, F. Gao, Q.Y. Wen, F.C. Zhu in Opt. Commun. 281:4553, 2008] of the multiparty quantum secret sharing protocol [Z.J. Zhang, G. Gao, X. Wang, L.F. Han, S.H. Shi in Opt. Commun. 269:418, 2007]. Our attack strategy is an interesting collaboration eavesdropping and much simpler than that in the paper [T.Y. Wang, Q.Y. Wen, F. Gao, S. Lin, F.C. Zhu in Phys. Lett. A 373:65, 2008].  相似文献   

9.
Gan Gao 《Optics Communications》2009,282(22):4464-443
We find that, in the improvement [S.J. Qin et al., Phys. Lett. A 357 (2006) 101] of the multiparty quantum secret sharing [Z.J. Zhang et al., Phys. Rev. A 71 (2005) 044301], Charlie can solely obtain Alice’s secret messages without Bob’s helps. In other words, the improved secret sharing scheme is still insecure. In the end, we further modify Qin et al. improved three-party quantum secret sharing scheme and make it really secure.  相似文献   

10.
A modification to the control law presented in [Y. Lei, W. Xu, H. Zheng, Synchronization of two chaotic nonlinear gyros using active control, Phys. Lett. A 343 (2005) 153] is proposed.  相似文献   

11.
[1]R. Casalbuoani, A. Deandrea, and M. Oertel, JHEP 032(2004) 0402. [2]G. Hooft, In Search of the Ultimate Building Blocks, Cambridge University Press, Cambridge (1997). [3]J. Belazey, Searches for New Physics at Hadron Coliders,Northern Illinois University (2005). [4]N. Arkani-hamed, A.G. Cohen, and H. Georgi, Phys. Lett.B 513 (2001) 232 [hep-ph/0105239]. [5]I. Low, W. Skiba, and D. Smith, Phys. Rev. D 66 (2002)072001 [hep-ph/0207243]. [6]N. Arkani-hamed, A.G. Cohen, E. Katz, and A.E. Nelson,JHEP 0207 (2002) 304 [hep-ph/0206021]. [7]N. Arkani-hamed, A.G. Cohen, E. Katz, A.E. Nelson, T.Gregoire, and J. G. Wacker, JHEP 0208 (2002) 021 [hepph/0206020]. [8]T. Gregoire and J.G. Wacker, JHEP 0208 (2002) 019[hep-ph/0206023]. [9]For a recent review, see e.g., M. Schmaltz, Nucl. Phys. B (Proc. Suppl.) 117 (2003) 40. [10]N. Arkani-hamed, A.G. Cohen, T. Gregoire, and J.G.Jacker, JHEP 0208 (2002) 020 [hep-ph/0202089]. [11]or a recent review, see e.g., M. Schmaltz, Nucl. Phys.Proc. Suppl. 117 (2003) 40 [hep-ph/0210415]. [12]E. Katz, J. Lee, A.E. Nelson, and D.G. Walker, hepph/0312287. [13]M. Beneke, I. Efthymiopoulos, M.L. Mangano, et al., hepph/0003033. [14]D.O. Carlson and C.-P. Yuan, hep-ph/9211289. [15]R. Frey, D. Gerdes, and J. Jaros, hep-ph/9704243. [16]G. Eilam, J.L. Hewett, and A. Soni, Phys. Rev. D 44(1991) 1473; W.S. Hou, Phys. Lett. B 296 (1992) 179; K.Agashe and M. Graesser, Phys. Rev. D 54 (1996) 4445;M. Hosch, K. Whisnant, and B.L. Young, Phys. Rev. D56 (1997) 5725. [17]C.S. Li, R.J. Oakes, and J.M. Yang, Phys. Rev. D 49(1994) 293, Erratum-ibid. D 56 (1997) 3156; G. Couture,C. Hamzaoui, and H. Koenig, Phys. Rev. D 52 (1995)1713; G. Couture, M. Frank, and H. Koenig, Phys. Rev.D 56 (1997) 4213; G.M. de Divitiis, et al., Nucl. Phys. B 504 (1997) 45. [18]B. Mele, S. Petrarca, and A. Soddu, Phys. Lett. B 435(1998) 401. [19]B. Mele, hep-ph/0003064. [20]J.M. Yang and C.S. Li, Phys. Rev. D 49 (1994) 3412,Erratum, ibid. D 51 (1995) 3974; J.G. Inglada, hepph/9906517. [21]L.R. Xing, W.G. Ma, R.Y. Zhang, Y.B. Sun, and H.S.Hou, Commun. Theor. Phys. (Beijing, China) 41 (2004)241. [22]L.R. Xing, W.G. Ma, R.Y. Zhang, Y.B. Sun, and H.S.Hou, Commun. Theor. Phys. (Beijing, China) 40 (2003)171. [23]T. Han, H.E. Logan, B. McElrath, and L.T. Wang, Phys.Rev. D 67 (2003) 095004. [24]I. Low, W. Skiba, and D. Smith, Phys. Rev. D 66 (2002)072001. [25]T. Han, H.E. Logan, B. McElrath, and L.T. Wang, hepph/0302188. [26]A.J. Buras, A. Poschenrieder, and S. Uhlig, hepph/0410309. [27]S. Eidelman, et al., Phys. Lett. B 592 (2004) 1. [28]F. Legerlehner, DESY 01-029, hep-ph/0105283.  相似文献   

12.
[1]J. Nagamatsu, N. Nakagava, T. Muranaka, Y. Zenitani,and J. Akimitsu, Nature 410 (2001) 63. [2]C. Buzea and T. Yamashita, Supercond. Sci. Techn. 14(2001) R115. [3]S. Budko, G. Lapertot, C. Petrovic, C.E. Gunningham, N.Anderson, and P.C. Canfield, Phys. Rev. Lett. 86 (2001)1877. [4]H. Kotegawa, K. Ishida, Y. Kitaoka, T. Muranaka, and J. Akimitsu, Phys. Rev. Lett. 87 (2001) 127001. [5]J. Kortus, I.I. Mazin, K.D. Belashchenko, V.P. Antropov,and L.L. Boyer, Phys. Rev. Lett. 87 (2001) 4656. [6]A. Liu, I.I. Mazin, and J. Kortus, Phys. Rev. Lett. 87(2001) 087005. [7]X.K. Chen, M.J. Konstantinovich, J.C. Irwin, D.D.Lawrie, and J.P. Frank, Phys. Rev. Lett. 87 (2001)157002. [8]H. Giublio, D. Roditchev, W. Sacks, R. Lamy, D.X.Thanh, J. Kleins, S. Miraglia, D. Fruchart, J. Markus,and P. Monod, Phys. Rev. Lett. 87 (2001) 177008. [9]F. Bouquet, R.A. Fisher, N.E. Phillips, D.G. Hinks, and J.D. Jorgensen, Phys. Rev. Lett. 87 (2001) 04700. [10]S.V. Shulga, S.-L. Drechsler, H. Echrig, H. Rosner, and W. Pickett, Cond-mat/0103154 (2001). [11]A.A. Golubov, J. Kortus, O.V. Dolgov, O. Jepsen, Y.Kong, O.K. Andersen, B.J. Gibson, K. Ahn, and R.K.Kremer, J. Phys. Condens. Matter 14 (2002) 1353. [12]H. Doh, M. Sigrist, B.K. Chao, and Sung-Ik Lee, Phys.Rev. Lett. 85 (1999) 5350. [13]I.N. Askerzade, N. Guclu, and A. Gencer, Supercond. Sci.Techn. 15 (2002) L13. [14]I.N. Askerzade, N. Guclu, A. Gencer, and A. Kiliq, Supercond. Sci. Techn. 15 (2002) L17. [15]I.N. Askerzade and A. Gencer, J. Phys. Soc. Jpn. 71(2002) 1637. [16]I.N. Askerzade, Physica C 397 (2003) 99. [17]V.V. Anshukova, B.M. Bulychev, A.I. Golovashkin, L.I.Ivanova, A.A. Minakov, and A.P. Rusakov, Phys. Solid State 45 (2003) 1207. [18]A.A. Abrikosov, Fundamentals of the Theory of Metals,North-Holland, Amsterdam (1988). [19]M.N. Kunchur, S.I. Lee, and W.N. Kang, Phys. Rev. B 68 (2003) 064516.  相似文献   

13.
A protocol for three-party quantum secure direct communication based on Greenberger-Horne-Zeilinger (GHZ) states was recently proposed by 3in et al. [Phys. Lett. A 354 (2006) 67] By analysing the protocol we find some security loopholes, e.g. one bit of secret messages of a party (Alice in the original paper) can always be leaked straight to the public without any eavesdropping. These problems suggested previously are discussed and possible solutions are presented to improve the security of the original protocol.  相似文献   

14.
Recently, several similar protocols [J. Opt. B 4 (2002) 380; Phys. Lett. A 316 (2003) 159; Phys. Lett. A 355 (2006) 285; Phys. Lett. A 336 (2005) 317] for remotely preparing a class of multi-qubit states (i.e, α[0...0〉 +β[1... 1〉) were proposed, respectively. In this paper, by applying the controlled-not (CNOT) gate, a new simple protocol is proposed for remotely preparing such class of states. Compared to the previous protocols, both classical communication cost and required quantum entanglement in our protocol are remarkably reduced. Moreover, the difficulty of identifying some quantum states in our protocol is also degraded. Hence our protocol is more economical and feasible.  相似文献   

15.
Yan Liu 《Physics letters. A》2009,373(41):3741-3742
In a previous work [Z.D. Wang, Y.R. Liu, L. Yu, X.H. Liu, Phys. Lett. A 356 (2006) 346] an exponential stability analysis for a class of Markovian jumping neural networks (MJNNs) was presented. In this Letter we employ the same technique to extend the results for MJNNs with time-varying delays and mode estimation, appropriate for active fault-tolerant control systems.  相似文献   

16.
Zhi Li  Ju-Jang Lee 《Physics letters. A》2008,372(10):1733-1735
In this Letter, we indicate that the proposed sufficient condition in Letter [J.Q. Lu, W.C. Ho, M. Liu, Phys. Lett. A 369 (2007) 444] does not hold when coupling matrix G satisfies Assumption 3 in Letter [J.Q. Lu, W.C. Ho, M. Liu, Phys. Lett. A 369 (2007) 444]. Besides, there are some mistakes in deducing Theorem 1. The mistakes have been corrected and a correct version is given in this Letter.  相似文献   

17.
From an appropriate expression for the effective action, the Hawking radiation from charged black holes is derived, using only covariant boundary conditions at the event horizon. The connection of our approach with the Unruh vacuum and the recent analysis [S.P. Robinson, F. Wilczek, Phys. Rev. Lett. 95 (2005) 011303, gr-qc/0502074; S. Iso, H. Umetsu, F. Wilczek, Phys. Rev. Lett. 96 (2006) 151302, hep-th/0602146; R. Banerjee, S. Kulkarni, arXiv: 0707.2449 [hep-th]] of Hawking radiation using anomalies is established.  相似文献   

18.
[1]J.H. Hamilton,A. VRamayya, W.T. Pinkston, et al.,Phys. Rev. Lett. 32 (1974) 239. [2]R. Julin, K. Helariutta, and M. Muikku, J. Phys. G 27(2001) R109. [3]J.H. Hamilton, Nukleonika 24 (1979) 561. [4]W.C. Ma, et al., Phys. Lett. B 139 (1984) 276. [5]R. Bengtsson, et al., Phys. Lett. B 183 (1987) 1. [6]S. Yoshida and N. Takigawa, Phys. Rev. C 55 (1996)1255. [7]T. Niksic, D. Vretenar, P. Ring, et al., Phys. Rev. C 65(2002) 054320. [8]F.G. Condev, M.P. Carpenter, R.V.F. Janssens, et al.,Phys. Lett. B 528 (2002) 221. [9]D.G. Jenkins, A.N. Andreyev, R.D. Page, et al., Phys.Rev. C 66 (2002) 011301(R). [10]B.D. Serot and J.D. Walecka, Adv. Nuc]. Phys. 16 (1986)1. [11]P. Ring, Prog. Part. Nucl. Phys. 37 (1996) 193. [12]J. Meng and P. Ring, Phys. Rev. Lett. 77 (1996) 3963. [13]J. Meng and P. Ring, Phys. Rev. Lett. 80 (1998) 460. [14]S.K. Patra, S. Yoshida, N. Takigawa, and C.R. Praharaj,Phys. Rev. C 50 (1994) 1924. [15]S. Yoshida, S.K. Patra, N. Takigawa, and C.R. Praharaj,Phys. Rev. C 50 (1994) 1938. [16]G.A. Lalazissis and P. Ring, Phys. Lett. B 427 (1998)225. [17]Jun-Qing Li, Zhong-Yu Ma, Bao-Qiu Chen, and Yong Zhou, Phys. Rev. C 65 (2002) 064305. [18]G. Audi and A.H. Wapstra, Nucl. Phys. A 565 (1993) 1. [19]G. Audi and A.H. Wapstra, Nucl. Phys. A 595 (1995)409. [20]G. Audi and A.H. Wapstra, Nucl. Phys. A 624 (1997) 1. [21]P. MOller and J.R. Nix, Atom. Data and Nucl. Data Table 59 (1995) 307.  相似文献   

19.
It has recently been shown that growth of a multilayer structure with one or more delta-layers at high temperature leads to spreading and asymmetrization of the dopant distribution [see, for example, E.F.J. Schubert, Vac. Sci. Technol. A. 8, 2980 (1990), A.M. Nazmul, S. Sugahara, M. Tanaka, J. Crystal Growth 251, 303 (2003); R.C. Newman, M.J. Ashwin, M.R. Fahy, L. Hart, S.N. Holmes, C. Roberts, X. Zhang, Phys. Rev. B 54, 8769 (1996); E.F. Schubert, J.M. Kuo, R.F. Kopf, H.S. Luftman, L.C. Hopkins, N.J. Sauer, J. Appl. Phys. 67, 1969 (1990); P.M. Zagwijn, J.F. van der Veen, E. Vlieg, A.H. Reader, D.J. Gravesteijn, J. Appl. Phys. 78, 4933 (1995); W.S. Hobson, S.J. Pearton, E.F. Schubert, G. Cabaniss, Appl. Phys. Lett. 55, 1546 (1989); Delta Doping of Semiconductors, edited by E.F. Schubert (Cambridge University Press, Cambridge, 1996); Yu.N. Drozdov, N.B. Baidus', B.N. Zvonkov, M.N. Drozdov, O.I. Khrykin, V.I. Shashkin, Semiconductors 37, 194 (2003); E. Skuras, A.R. Long, B. Vogele, M.C. Holland, C.R. Stanley, E.A. Johnson, M. van der Burgt, H. Yaguchi, J. Singleton, Phys. Rev. B 59, 10712 (1999); G. Li, C. Jagadish, Solid-State Electronics 41, 1207 (1997)]. In this work analytical and numerical analysis of dopant dynamics in a delta-doped area of a multilayer structure has been accomplished using Fick's second law. Some reasons for asymmetrization of a delta-dopant distribution are illustrated. The spreading of a delta-layer has been estimated using example materials of a multilayer structure, a delta-layer and an overlayer.  相似文献   

20.
In a recent Letter [F.G. Deng, X.H. Li, H.Y. Zhou, Phys. Lett. A 372 (2008) 1957], an efficient high-capacity quantum secret sharing scheme was proposed. However, in this comment, it is shown that the protocol does not complete the task of secret sharing well when the message sender uses the nonorthogonal entangled states as the quantum information carriers. Finally a feasible improvement of this quantum secret sharing protocol is proposed.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号