首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 0 毫秒
1.
2.
3.
4.
5.
《Physics letters. A》2014,378(28-29):1970
We show that the claims stated in the comment made by Chi-Fai Lo on our paper [Phys. Lett. A 377 (2013) 3205] neither contradict nor falsify our results.  相似文献   

6.
Lin Zhang  Junde Wu  Shao-Ming Fei 《Physics letters. A》2013,377(31-33):1794-1796
In this Letter, two counterexamples show that the superadditivity inequality of relative entropy is not true even for the full-ranked quantum states. Thus, an inequality of quantum channels and complementary channels is not also true. Finally, a conjecture of weak superadditivity inequality is presented.  相似文献   

7.
《Physics letters. A》2020,384(25):126577
In this comment we analyze a method for the solution of the eigenvalue equation for three coupled harmonic oscillators proposed recently. We argue that the authors did not obtain the frequencies and coordinates of the normal modes that make the Hamiltonian operator diagonal but merely six transcendental equations for the relevant parameters that they did not attempt to solve. We derive the conditions for the existence of bound states that the authors did not appear to be able to obtain probably because of the complexity exhibited by those equations.  相似文献   

8.
9.
《Physics letters. A》2019,383(36):126031
Nonequilibrium phase transitions are characterized by the so-called critical exponents, each of which is related to a different observable. Systems that share the same set of values for these exponents also share the same universality class. Thus, it is important that the exponents are named and treated in a standardized framework. In this comment, we reinterpret the exponents obtained by Teixeira et al. [1] for the logistic and cubic maps in order to correctly state the universality class of their bifurcations, since these maps may describe the mean-field solution of stochastic spreading processes.  相似文献   

10.
We show that the insecurity claim of the αη cryptosystem made by C. Ahn and K. Birnbaum in [C. Ahn, K. Birnbaum, Phys. Lett. A 370 (2007) 131] under heterodyne attack is based on invalid extrapolations of Shannon's random cipher analysis and on an invalid statistical independence assumption. We show, both for standard ciphers and αη, that expressions of the kind given by Ahn and Birnbaum can at best be interpreted as security lower bounds.  相似文献   

11.
Charlene Ahn 《Physics letters. A》2008,372(47):7097-7099
We present simulations countering the claims in [R. Nair, H.P. Yuen, Phys. Lett. A 372 (2008) 7091] that the approximation given in [C. Ahn, K. Birnbaum, Phys. Lett. A 370 (2007) 131, quant-ph/0612058] for the eavesdropper's entropy on the encrypted key cannot be valid, and additionally discuss ways in which our views on security requirements differ from those given in [R. Nair, H.P. Yuen, Phys. Lett. A 372 (2008) 7091].  相似文献   

12.
《Physics letters. A》2014,378(30-31):2332-2335
The second of the two proofs of the Wigner theorem on symmetry in quantum mechanics given in Simon et al. (2008) [1] is reexamined and refined to remove a possible gap in the argument presented there.  相似文献   

13.
《Physics letters. A》2014,378(28-29):1969
Recently Gardas and Dajka examined the multi-photon Rabi model and showed that it had a discrete eigenenergy spectrum with normalizable eigenstates. However, their analysis is actually invalid because it has been rigorously proven that the model does not have eigenstates in the Hilbert space spanned by the photon number states.  相似文献   

14.
15.
16.
17.
18.
In the commented paper, the authors consider a four-parameter family of three-dimensional autonomous systems that includes the widely studied systems of Lorenz, Chen and Lü. Their goal is to rigorously prove the existence of Šilnikov chaos in this Lorenz-family via the Šilnikov criterion. They use an undetermined coefficient method to demonstrate the presence of heteroclinic orbits. In this comment we point out that their analysis is erroneous. The odd function they consider for the first component of the Šilnikov heteroclinic orbit cannot represent such global connection. Thus, the main result of their paper, Theorem 2, is incorrect.  相似文献   

19.
A recent paper by T. Ramakrishnan and S. Subramaniyan shows that there is an enhancement of the stability of the trapless BECs due to the inclusion of the higher-order interaction along with the two-and three-body interactions. We point out and correct the erroneous results calculated by the authors concerning the effective potential of the trapless BECs. In addition we have shown that the incorrect expression used by authors leads to notable discrepancies between such results and exact ones. Moreover, our numerical results coincide with our theoretical predictions.  相似文献   

20.
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号