Event-based simulation of quantum physics experiments
نویسندگان
چکیده
منابع مشابه
Deterministic event-based simulation of quantum phenomena
We propose and analyse simple deterministic algorithms that can be used to construct machines that have primitive learning capabilities. We demonstrate that locally connected networks of these machines can be used to perform blind classification on an event-by-event basis, without storing the information of the individual events. We also demonstrate that properly designed networks of these mach...
متن کاملEvent-by-Event Simulation of Quantum Phenomena
Recent advances in nanotechnology are paving the way to attain control over individual microscopic objects. The ability to prepare, manipulate, couple and measure single microscopic systems facilitate the study of single quantum systems at the level of individual events. Such experiments address the most fundamental aspects of quantum theory. Indeed, quantum theory gives us only a recipe to com...
متن کاملQuantum Coordinates of an Event in Local Quantum Physics
Recently [3] it has been proposed, using the formalism of positiveoperator-valued measures, a possible definition of quantum coordinates for events in the context of quantum mechanics. In this short note we analyze this definition from the point of view of local algebras in the framework of local quantum theories. PACS: 03.65.Bz UTF-411.
متن کاملDeterministic event-based simulation of universal quantum computation
The basic ideas of quantum computation were formulated more than twenty years ago [1,2]. Ten years ago DiVincenzo has proven that the CNOT gate and single-qubit operations constitute a set of gates that can be used to construct a universal quantum computer [3]. This statement is equivalent to the one that a digital classical computer can be constructed by means of NAND gates only. Conventional ...
متن کاملEvent-by-event Simulation of Quantum Cryptography Protocols∗
Cryptography is an artifice of exchanging information between two parties such that an unauthorized person cannot retrieve this information. To this end, the sender usually employs some key to encrypt the information to be transmitted, and the receiver applies a decryption algorithm to recover the original information. If the cryptographic system is secure, an eavesdropper can decipher the encr...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: International Journal of Modern Physics C
سال: 2014
ISSN: 0129-1831,1793-6586
DOI: 10.1142/s0129183114300036