首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 15 毫秒
1.
In our previous paper (Ohkuwa et al., 2016) corrigendum was found in Eqs. (3.4) and (3.6). However, conclusions of our previous paper are not changed.  相似文献   

2.
3.
4.
5.
6.
7.
8.
9.
10.
In the article, one set of solutions of (−iσ1x+W(x)σ2+Mσ3)ψ=±Mψ(iσ1x+W(x)σ2+Mσ3)ψ=±Mψ was not discussed. We provide corrections where the existence of this set is taken into account.  相似文献   

11.
Erratum for paper “Theory of extreme correlations using canonical Fermions and path integrals”, B.S. Shastry, Ann. Phys. 343, 164–199 (2014) http://dx.doi.org/10.1016/j.aop.2014.02.005 AOP69618.  相似文献   

12.
13.
14.
15.
16.
In the concerned article Mitri et al. (2015), misprints that have occurred are corrected in six equations. They are Eqs. , , , ,  and (68). These corrections do neither alter the results and plots displayed in Mitri et al. (2015), nor the conclusions as the numerical computations used the correct equations.  相似文献   

17.
18.
Charlene Ahn 《Physics letters. A》2008,372(47):7097-7099
We present simulations countering the claims in [R. Nair, H.P. Yuen, Phys. Lett. A 372 (2008) 7091] that the approximation given in [C. Ahn, K. Birnbaum, Phys. Lett. A 370 (2007) 131, quant-ph/0612058] for the eavesdropper's entropy on the encrypted key cannot be valid, and additionally discuss ways in which our views on security requirements differ from those given in [R. Nair, H.P. Yuen, Phys. Lett. A 372 (2008) 7091].  相似文献   

19.
In this note we discuss and solve several open problems posed in our recent paper “Geometrical and topological aspects of electrostatics on Riemannian manifolds”, also published in this journal. Some minor mistakes therein are corrected as well.  相似文献   

20.
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号