首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 234 毫秒
1.
Recall operations of quantum associative memory (QuAM) have been conducted separately through evolutionary as well as non-evolutionary processes in terms of unitary and non- unitary operators respectively by separately choosing our recently derived maximally entangled states (Singh-Rajput MES) and Bell’s MES as memory states for various queries and it has been shown that in each case the choices of Singh-Rajput MES as valid memory states are much more suitable than those of Bell’s MES. it has been demonstrated that in both the types of recall processes the first and the fourth states of Singh-Rajput MES are most suitable choices as memory states for the queries ‘11’ and ‘00’ respectively while none of the Bell’s MES is a suitable choice as valid memory state in these recall processes. It has been demonstrated that all the four states of Singh-Rajput MES are suitable choice as valid memory states for the queries ‘1?’, ‘?1’, ‘?0’ and ‘0?’ while none of the Bell’s MES is suitable choice as the valid memory state for these queries also.  相似文献   

2.
Pattern classifications have been performed by employing the method of Grover’s iteration on Bell’s MES and Singh-Rajput MES in two-qubit system and it has been demonstrated that for any pattern classification in a two-qubit system the maximally entangled states of Singh-Rajput eigen basis provide the most suitable choice of search states while in no case any of Bell’s states is suitable for such pattern classifications.  相似文献   

3.
Carrying out the classification of patterns in a two-qubit system by separately using Grover’s and Ventura’s algorithms on different possible superposition, it has been shown that the exclusion superposition and the phase-invariance superposition are the most suitable search states obtained from two-pattern start-states and one-pattern start-states, respectively, for the simultaneous classifications of patterns. The higher effectiveness of Grover’s algorithm for large search states has been verified but the higher effectiveness of Ventura’s algorithm for smaller data base has been contradicted in two-qubit systems and it has been demonstrated that the unknown patterns (not present in the concerned data-base) are classified more efficiently than the known ones (present in the data-base) in both the algorithms. It has also been demonstrated that different states of Singh-Rajput MES obtained from the corresponding self-single- pattern start states are the most suitable search states for the classification of patterns |00>,|01 >, |10> and |11> respectively on the second iteration of Grover’s method or the first operation of Ventura’s algorithm.  相似文献   

4.
Entanglement has been explored as one of the key resources required for quantum computation, the functional dependence of the entanglement measures on spin correlation functions has been established, correspondence between evolution of maximally entangled states (MES) of two-qubit system and representation of SU(2) group has been worked out and the evolution of MES under a rotating magnetic field has been investigated. Necessary and sufficient conditions for the general two-qubit state to be maximally entangled state (MES) have been obtained and a new set of MES constituting a very powerful and reliable eigen basis (different from magic bases) of two-qubit systems has been constructed. In terms of the MES constituting this basis, Bell’s States have been generated and all the qubits of two-qubit system have been obtained. It has shown that a MES corresponds to a point in the SO(3) sphere and an evolution of MES corresponds to a trajectory connecting two points on this sphere. Analysing the evolution of MES under a rotating magnetic field, it has been demonstrated that a rotating magnetic field is equivalent to a three dimensional rotation in real space leading to the evolution of a MES.  相似文献   

5.
The entanglement of two qubits is investigated in the range of their ultra-strongly coupling with a quantum oscillator. The two qubits are initially in four Bell states and they are under the control mechanism of the coherent state of the quantum oscillator. There are four parameters: the average number of the coherent state, the ultra-strong coupling strength, the ratio of two frequencies of qubit and oscillator, and the inter-interaction coupling of the two qubits in the mechanism, and they all are influential parameters on the entanglement of the two qubits. One Bell state |0>is easyily kept and is trivial case. The novel results show that there is one state |I0> among the other three Bell states which the entanglement of the two qubits could be almost completely preserved. The possibility is made into reality by the appropriate choice of the four influential parameters. We give two different schemes to choose the respective parameters to maintain the entanglment of |I0> almost undiminished. The results will be useful for the quantum information process.  相似文献   

6.
A multi-party semi-quantum key agreement (SQKA) protocol based on delegating quantum computation (DQC) model is proposed by taking Bell states as quantum resources. In the proposed protocol, the participants only need the ability of accessing quantum channel and preparing single photons {|0〉, |1〉, |+〉, |?〉}, while the complicated quantum operations, such as the unitary operations and Bell measurement, will be delegated to the remote quantum center. Compared with previous quantum key agreement protocols, this client-server model is more feasible in the early days of the emergence of quantum computers. In order to prevent the attacks from outside eavesdroppers, inner participants and quantum center, two single photon sequences are randomly inserted into Bell states: the first sequence is used to perform the quantum channel detection, while the second is applied to disorder the positions of message qubits, which guarantees the security of the protocol.  相似文献   

7.
周震  赵鸿 《中国物理快报》2006,23(6):1402-1405
We show that the performance of the Hopfield neural networks, especially the quality of the recall and the capacity of the effective storing, can be greatly improved by making use of a recently presented neural network designing method without altering the whole structure of the network. In the improved neural network, a memory pattern is recalled exactly from initial states having a given degree of similarity with the memory pattern, and thus one can avoids to apply the overlap criterion as carried out in the Hopfield neural networks.  相似文献   

8.
Perfect quantum state mirroring in a chain of N spins is defined as the condition in which the state |iof the chain is swapped into the state |N-i within a time evolution interval τ.Such a phenomenon is an interesting way of transfering entanglement.An expressions for the perfect mirroring of a single qubit contained in a spin chain were proposed in the past.We exploit such an expressions for calculating the evolution times in chains of both two and three spins.In the case of a chain of two qubits,we derive conditions under which the associated four Bell states diagonalize the Hamiltonian.It is found that for the two Bell states |Φ+and|Φ-,perfect mirroring does not occur(i.e.entanglement is not preserved under swapping).On the other hand,perfect single qubit mirror effect(entanglement preservation) indeed occurs for the other two Bell states |Ψ+and|Ψ- which are mapped into |Φ+and|Φ-respectively.For the case of a chain of three qubits,the effects of a perfect single qubit mirroring on a set of four maximally entangled three qubit states ψ1,ψ2,χ1,and χ2 are studied.Due to the fact that quantum mirroring preserves maximal entanglement,the states ψ1 and ψ2 are not altered.However,quantum mirroring changes the states χ1 and χ2 only if we apply perfect quantum state mirroring in the site a=1 of the three qubits spin chain.The above constrains the preservation of maximal entanglement under qubit mirroring of such a state.Due to the fact that swapping has already been experimentally tested,a posible experimental implementations of single qubit mirroring is possible.  相似文献   

9.
In this paper, we propose certain different design ideas on a novel topic in quantum cryptography — quantum operation sharing(QOS). Following these unique ideas, three QOS schemes, the "HIEC"(The scheme whose messages are hidden in the entanglement correlation), "HIAO"(The scheme whose messages are hidden with the assistant operations) and "HIMB"(The scheme whose messages are hidden in the selected measurement basis), have been presented to share the single-qubit operations determinately on target states in a remote node. These schemes only require Bell states as quantum resources. Therefore, they can be directly applied in quantum networks, since Bell states are considered the basic quantum channels in quantum networks. Furthermore, after analyse on the security and resource consumptions, the task of QOS can be achieved securely and effectively in these schemes.  相似文献   

10.
A study of the hyperfine interaction in the ESR of Cu-Cu pairs in single crystals of copper diethyldithiocarbamate as a function of temperature has shown distinct differences in the hyperfine structure in the two fine structure transitions at 20 K, the spectrum not having the same hyperfine intensity pattern in the low field fine structure transition in contrast to that of the high field transition. The details of the structure of both the fine structure transitions in the 20 K spectrum have now been explained by recognizing the fact that the mixing of the nuclear spin states caused by the anisotropic hyperfine interaction affects the electron spin states | + 1 > and | −> differently. This has incidentally led to a determination of the sign ofD confirming the earlier model. The anomalous hyperfine structure is found to become symmetric at 77 K and 300 K. It is proposed that the reason for this lies in the dynamics of spin-lattice interaction which limits the lifetime of the spin states in each of the electronic levels | − 1 >, | 0 > and | + 1 > The estimate of spin-lattice relaxation time agrees with those indicated from other studies. The model proposed here for the hyperfine interaction of pairs in the electronic triplet state is of general validity.  相似文献   

11.

In this paper, we proposed two semi-quantum direct communication protocols based on Bell states. By pre-sharing two secret keys between two communicants, Alice with the advanced quantum ability can transmit secret messages to the classical Bob who can only perform the limited classical operations. At the same time, both sides of the communication can comfirm the legitimacy of each other’s identity. Security and qubit efficency analysis have been given. The analysis results show that the two protocols can resistant to several well-known attacks and their qubit efficency is higher than some current protocols.

  相似文献   

12.
We propose a simple geometrical approach for finding robustness of entanglement for Bell decomposable states of two-qubit quantum systems. It is shown that for these states robustness is equal to the concurrence. We also present an analytical expression for two separable states that wipe out all entanglement of these states. Random robustness of these states is also obtained. We also obtain robustness of a class of states obtained from Bell decomposable states via some special local operations and classical communications (LOCC).Received: 28 October 2002, Published online: 5 August 2003PACS: 03.65.Ud Entanglement and quantum nonlocality (e.g. EPR paradox, Bell's inequalities, GHZ states, etc.)  相似文献   

13.
Jeffrey Bub 《Foundations of Physics》2010,40(9-10):1333-1340
Since the analysis by John Bell in 1965, the consensus in the literature is that von Neumann’s ‘no hidden variables’ proof fails to exclude any significant class of hidden variables. Bell raised the question whether it could be shown that any hidden variable theory would have to be nonlocal, and in this sense ‘like Bohm’s theory.’ His seminal result provides a positive answer to the question. I argue that Bell’s analysis misconstrues von Neumann’s argument. What von Neumann proved was the impossibility of recovering the quantum probabilities from a hidden variable theory of dispersion free (deterministic) states in which the quantum observables are represented as the ‘beables’ of the theory, to use Bell’s term. That is, the quantum probabilities could not reflect the distribution of pre-measurement values of beables, but would have to be derived in some other way, e.g., as in Bohm’s theory, where the probabilities are an artefact of a dynamical process that is not in fact a measurement of any beable of the system.  相似文献   

14.
Based on a 3 × 3 mass matrix describing the mixing of the scalar states f0(1370),f0(1500) and f0(1710), the hadronic decays of the three states are investigated. Taking into account the two possible assumptions concerning the mass level order of the bare states |N> =|μμ+dd>/ √2 |S>= |ss> and |G> = |gg> in the scalar sector, MG > MS > MN and MG > MN > MS, the glueball-quarkonia content of the three states is obtained by solving the nonlinear equations. Some predictions about the hadronic and two-photon decays of the three states in two cases are presented. It is pointed out that the predictions about the two-photon decay width ratios for the three states can provide a stringent consistency check of the two assumptions.  相似文献   

15.
The theorem of Bell states that certain results of quantum mechanics violate inequalities that are valid for objective local random variables. We show that the inequalities of Bell are special cases of theorems found 10 years earlier by Bass and stated in full generality by Vorob’ev. This fact implies precise necessary and sufficient mathematical conditions for the validity of the Bell inequalities. We show that these precise conditions differ significantly from the definition of objective local variable spaces and as an application that the Bell inequalities may be violated even for objective local random variables.  相似文献   

16.
杨雄  童朝阳  向少华 《物理学报》2007,56(4):2148-2153
研究了两个全同二能级原子同时与单模耗散腔场发生大失谐相互作用时,原子-场系统、两原子子系统的线性熵演化,以及原子的初始状态与腔的耗散因素对各线性熵的影响.研究结果表明:腔场的衰变常数对不同类型的Bell纠缠态的影响完全不同,其中|Ψ12态具有强烈的抗消纠缠的能力,而|Φ12态是一个脆弱的纠缠态. 关键词: 腔耗散 原子纠缠 纠缠退化 线性熵  相似文献   

17.
In the last years the attention of the scientific community on the generation of entangled states has constantly increased both for their importance in the foundation of quantum mechanics and for their application in the quantum computation and communication field. To these aims high quality of generated states is required. A standard procedure to produce entangled photons pairs is spontaneous down conversion process in nonlinear crystals. In this paper we report preparation of quantum entangled states using CW laser at 266 nm pumping the standard Kwiat’s source. We have been able to generate the full set of Bell’s states with very high purity, fidelity and Concurrence which have been estimated using standard tomography procedure. To proof the high degree of achieved entanglement, we performed a non-locality test obtaining a high violation of the CHSH inequality.  相似文献   

18.
Entanglement, the Einstein–Podolsky–Rosen (EPR) paradox and Bell’s failure of local-hiddenvariable (LHV) theories are three historically famous forms of “quantum nonlocality”. We give experimental criteria for these three forms of nonlocality in multi-particle systems, with the aim of better understanding the transition from microscopic to macroscopic nonlocality. We examine the nonlocality of N separated spin J systems. First, we obtain multipartite Bell inequalities that address the correlation between spin values measured at each site, and then we review spin squeezing inequalities that address the degree of reduction in the variance of collective spins. The latter have been particularly useful as a tool for investigating entanglement in Bose–Einstein condensates (BEC). We present solutions for two topical quantum states: multi-qubit Greenberger–Horne–Zeilinger (GHZ) states, and the ground state of a two-well BEC.  相似文献   

19.
The parameters at which the maximally entangled two-particle state appears in the system of two ideal electronic Mach-Zehnder interferometers are known. In this work, the operation of nonideal devices with finite scattering in splitters and with reflection in the region of the Coulomb Interaction has been considered. It has been shown that, under the condition of postselection of experimental results, these factors can increase the observed Bell parameter to values exceeding Cirel’son’s (or Tsirelson’s) bound equal to 2√2 up to the mathematical limit equal to 4. A simple postselective measurement scheme providing B = 4 has been described. Although the results of such measurements are not as fundamental as the observation of the violation of Bell’s inequality, they can indirectly indicate the existence of an entangled state in the system. The measurement system is more stable against fluctuations of the phase than a system without postselection. Furthermore, it has been found that the proposed system is optimal for investigation of cross correlations between interferometers in the dc regime (beyond the paradigm of the violation of Bell’s inequality) because they cannot be generated by coordinated fluctuations of Aharonov-Bohm phases.  相似文献   

20.
Bell’s theorem has been widely argued to show that some of the predictions of quantum mechanics which are obtained by applying the Born’s rule to a class of entangled states, are not compatible with any local-causal statistical model, via the violation of Bell’s inequalities. On the other hand, in the previous works, we have shown that quantum dynamics and kinematics are emergent from a statistical model that is singled out uniquely by the principle of Locality. Here we shall show that the local-causal model supports entangled states and give the statistical origin of their generation. We then study the Stern-Gerlach experiment to show that the Born’s rule can also be derived as a mathematical theorem in the local-causal model. These results lead us to argue that nonlocality is not responsible for the quantum mechanical and most importantly experimental violation of Bell’s inequalities. The source(s) of violation has to be sought somewhere else.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号