最小 发表于 2025-3-25 07:00:05
On the Realization of Received Quantum State Control by Unitary Transformationre desired for the output of the unitary transformation in a received quantum state control system by unitary process in order to achieve the Helstrom’s bound. We show pictures of optimum signals which the conditions imply. Then we consider as examples two of received quantum state control systems b否决 发表于 2025-3-25 08:52:24
http://reply.papertrans.cn/79/7811/781082/781082_22.pngexigent 发表于 2025-3-25 12:25:42
Computation of Mutual Entropy in Quantum Amplifier Processescesses and quantum Markov chains. In the latest study of lifting for the optical communication processes it was succesful to rigorously derive the error probability and SNR for quantum amplifier processes.enfeeble 发表于 2025-3-25 18:23:27
http://reply.papertrans.cn/79/7811/781082/781082_24.pngAsperity 发表于 2025-3-25 20:58:44
http://reply.papertrans.cn/79/7811/781082/781082_25.pngcrockery 发表于 2025-3-26 03:33:41
Relation between Channel Capacity and Quantum Minimax Decision in Quantum Information Theoryry. In the general case, the upper bound is given by Holevo, called “Holevo’s bound” and the lower bound is the “subentropy” defined by Jozsa . In some cases of specified signal quantum states and detection process, Ban and Schumacher showed tighter upper bounds, respectively .POINT 发表于 2025-3-26 04:30:17
http://reply.papertrans.cn/79/7811/781082/781082_27.png机警 发表于 2025-3-26 11:00:24
http://reply.papertrans.cn/79/7811/781082/781082_28.pngentitle 发表于 2025-3-26 15:37:48
http://reply.papertrans.cn/79/7811/781082/781082_29.pngWordlist 发表于 2025-3-26 19:26:57
Properties of Quantum Cryptography Based on Orthogonal States: Goldenberg and Vaidman Schemeeavesdropper is detected is given for an eavesdropping method which is a simple modification of that used to show the security of the scheme. Finally, the security of the GV scheme against the eavesdropping method is discussed based on information theory.