首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   59篇
  免费   15篇
  国内免费   4篇
物理学   78篇
  2022年   1篇
  2021年   1篇
  2019年   4篇
  2018年   2篇
  2017年   1篇
  2016年   1篇
  2015年   3篇
  2014年   1篇
  2013年   4篇
  2011年   4篇
  2010年   5篇
  2009年   3篇
  2008年   7篇
  2007年   10篇
  2006年   8篇
  2005年   7篇
  2004年   5篇
  2003年   4篇
  2002年   5篇
  2001年   1篇
  1997年   1篇
排序方式: 共有78条查询结果,搜索用时 31 毫秒
21.
We discuss how to create more entanglement with nonlocal operations acting on two-particle states. For a given nonlocal operation, we find that some input states cannot produce entanglement and some produce the maximal entanglement, and find that any initial entangled states can produce more entanglement than initial product states.  相似文献   
22.
Quantum secure direct communication provides a direct means of conveying secret information via quantum states among legitimate users. The past two decades have witnessed its great strides both theoretically and experimentally. However, the security analysis of it still stays in its infant. Some practical problems in this field to be solved urgently, such as detector efficiency mismatch, side-channel effect and source imperfection, are propelling the birth of a more impeccable solution. In this paper, we establish a new framework of the security analysis driven by numerics where all the practical problems may be taken into account naturally. We apply this framework to several variations of the DL04 protocol considering real-world experimental conditions. Also, we propose two optimizing methods to process the numerical part of the framework so as to meet different requirements in practice. With these properties considered, we predict the robust framework would open up a broad avenue of the development in the field.  相似文献   
23.
We present a scheme for quantum privacy amplification (QPA) for a sequence of single qubits. The QPA procedure uses a unitary operation with two controlled-not gates and a Hadamard gate. Every two qubits are performed with the unitary gate operation, and a measurement is made on one photon and the other one is retained.The retained qubit carries the state information of the discarded one. In this way, the information leakage is reduced.The procedure can be performed repeatedly so that the information leakage is reduced to any arbitrarily low level. With this QPA scheme, the quantum secure direct communication with single qubits can be implemented with arbitrarily high security. We also exploit this scheme to do privacy amplification on the single qubits in quantum information sharing for long-distance communication with quantum repeaters.  相似文献   
24.
We propose to use a set of averaged entropies, the multiple entropy measures (MEMS), to partially quantify quantum entanglement of multipartite quantum state. The MEMS is vector-like with m = [N/2] components: [S1, S2,..., Sm], and the i-th component Si is the geometric mean of i-qubits partial entropy of the system. The Si measures how strong an arbitrary i qubits from the system are correlated with the rest of the system. It satisfies the conditions for a good entanglement measure. We have analyzed the entanglement properties of the GHZ-state, the W-states, and cluster-states under MEMS.  相似文献   
25.
High-Dimensional Multi-particle Cat-Like State Teleportation   总被引:1,自引:0,他引:1  
Two kinds of M-particle d-dimensional Schmidt-form entangled state teleportation protocols are presented.In the first protocol, the teleportation is achieved by d-dimensional Bell-basis measurements, while in the second protocolit is realized by d-dimensional GHZ-basis measurement.  相似文献   
26.
The modified mapping method is further improved by the expanded expression of u(ξ) that contains the terms of the first-order derivative of function f(ξ). Some new exact solutions to the mBBM equation are determined by means of the method. We can obtain many new solutions in terms of the Jacobi elliptic functions of the equation.  相似文献   
27.
In this paper, we present the decoupling bang-bang (BB) twin-born pulses to suppress the genera/deco- herence, both amplitude and phase decoherence, in a three-level atom in V- and Ξ-configurations. We give the exact sequence of periodic twinborn pulses in such systems.  相似文献   
28.
We present a scheme for quantum privacy amplification (QPA) for a sequence of single qubits. The QPA procedure uses a unitary operation with two controlled-not gates and a Hadamard gate. Every two qubits are performed with the unitary gate operation, and a measurement is made on one photon and the other one is retained. The retained qubit carries the state information of the discarded one. In this way, the information leakage is reduced. The procedure can be performed repeatedly so that the information leakage is reduced to any arbitrarily low level. With this QPA scheme, the quantum secure direct communication with single qubits can be implemented with arbitrarily high security. We also exploit this scheme to do privacy amplification on the single qubits in quantum information sharing for long-distance communication with quantum repeaters.  相似文献   
29.
General Quantum Interference Principle and Duality Computer   总被引:2,自引:0,他引:2  
In this article, we propose a general principle of quantum interference for quantum system, and based on this we propose a new type of computing machine, the duality computer, that may outperform in principle both classical computer and the quantum computer. According to the general principle of quantum interference, the very essence of quantum interference is the interference of the sub-waves of the quantum system itself. A quantum system considered here can be any quantum system: a single microscopic particle, a composite quantum system such as an atom or a molecule, or a loose collection of a few quantum objects such as two independent photons. In the duality computer, the wave of the duality computer is split into several sub-waves and they pass through different routes, where different computing gate operations are performed. These sub-waves are then re-combined to interfere to give the computational results. The quantum computer, however, has only used the particle nature of quantum object. In a duality computer, it may be possible to find a marked item from an unsorted database using only a single query, and all NP-complete problems may have polynomial algorithms. Two proof-of-the-principle designs of the duality computer are presented: the giant molecule scheme and the nonlinear quantum optics scheme. We also propose thought experiment to check the related fundamental issues, the measurement efficiency of a partial wave function.  相似文献   
30.
Excitation energies and electromagnetic transition strengths in even-even ^96-108Mo nuclei have been described systematically be using the proton-neutron interacting boson model (IBM-2).It appears that the properties of low-lying levels in these isotopes,for which the comparison between experiment and theory is possible,can be satisfactorily described by the IBM-2 model,provided proper account is taken of the presence at low energy of states having a mixed-symmetry character.It seems possible to identify,in each isotope,a few states having such a character,the lowest ones being either 22^ or 23^ levels.It is found that these nuclei are in the transition from U(5) to SU(3).  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号