Event-by-Event Simulation of a Quantum Eraser Experiment

نویسندگان
چکیده

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Event-by-Event Simulation of a Quantum Eraser Experiment

Event-by-Event Simulation of a Quantum Eraser Experiment F. Jin1, S. Zhao1, S. Yuan2, H. De Raedt1 ∗, and K. Michielsen3 1Department of Applied Physics, Zernike Institute for Advanced Materials, University of Groningen, Nijenborgh 4, NL-9747 AG Groningen, The Netherlands 2Institute of Molecules and Materials, Radboud University of Nijmegen, NL-6525ED Nijmegen, The Netherlands 3Institute for Adv...

متن کامل

Event-by-Event Simulation of Quantum Phenomena

Recent advances in nanotechnology are paving the way to attain control over individual microscopic objects. The ability to prepare, manipulate, couple and measure single microscopic systems facilitate the study of single quantum systems at the level of individual events. Such experiments address the most fundamental aspects of quantum theory. Indeed, quantum theory gives us only a recipe to com...

متن کامل

Event-by-event simulation of Wheeler’s delayed-choice experiment

We present a computer simulation model of Wheeler’s delayed choice experiment. The model is solely based on experimental facts and does not rely on concepts of quantum theory or probability theory. We demonstrate that it is possible to give a particle-only description of Wheeler’s delayed choice experiment which reproduces the averages calculated from quantum theory and which does not defy comm...

متن کامل

Event-by-event Simulation of Quantum Cryptography Protocols∗

Cryptography is an artifice of exchanging information between two parties such that an unauthorized person cannot retrieve this information. To this end, the sender usually employs some key to encrypt the information to be transmitted, and the receiver applies a decryption algorithm to recover the original information. If the cryptographic system is secure, an eavesdropper can decipher the encr...

متن کامل

multi-objective optimization of criminal trial process using descrete event computer simulation and design of experiment

since the analysis of complex services systems by using mathematical modeling techniques, with considering the random patterns prevailing in them, is so difficult or probably impossible, improvement guidelines are often followed based on the experts' experiences using qualitative methods. in the present paper, by employing a discrete event computer simulation methodology, criminal trial sy...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Journal of Computational and Theoretical Nanoscience

سال: 2010

ISSN: 1546-1955,1546-1963

DOI: 10.1166/jctn.2010.1542