- Particle physics theoretical and experimental studies
- High-Energy Particle Collisions Research
- Quantum Chromodynamics and Particle Interactions
- Particle Detector Development and Performance
- Quantum Mechanics and Applications
- Cosmology and Gravitation Theories
- Solar Radiation and Photovoltaics
- Solar and Space Plasma Dynamics
- Dark Matter and Cosmic Phenomena
- Quantum Information and Cryptography
- Atomic and Subatomic Physics Research
- Quantum Computing Algorithms and Architecture
- Scientific Computing and Data Management
- Distributed and Parallel Computing Systems
- Spacecraft and Cryogenic Technologies
- Origins and Evolution of Life
- Advanced Mathematical Theories and Applications
- Astro and Planetary Science
- Geophysics and Gravity Measurements
- Relativity and Gravitational Theory
- Biofield Effects and Biophysics
- Neutrino Physics Research
- Radiation Detection and Scintillator Technologies
Yunnan University
2022-2024
Institute of High Energy Physics
2015-2024
Shanghai Jiao Tong University
2021
The principles of special relativity and Einstein’s simple derivation the Lorentz transformation are reviewed. A new is developed in this paper, by a approach light-pulse observation or time-dilation observation. Therefore, under two relativity, there exist equivalent derivations approaches to transformation. emphasizes highlights space while our time. This research reveals, particular way, equivalence time relativity. Combination paper makes methodology complete perfect.
The physical mechanism of heredity or inheritance genes is a quantum mechanical and/or computational process. A theory bio-quantum genetics established in this paper. Principle Bio-quantum Genetics suggested. I propose and define the soft-genes controlling processes genes. This research deals with mechanisms Mendel plant family as examples genetics, deepening our understanding inheritance. believe that more contributions will be made to promote researches biology at large.
Cryptography is crucial to communication security. In 1984, a well-known QKD (quantum key distribution) protocol, BB84, was published by Bennett and Brassard. The BB84 Protocol followed the protocols Ekert (1991) (E91) (1992) (B92). Some authors proved security of theoretical in different frameworks defining differently. My argument that previous proofs are neither unique nor exhaustive for each which means proof has not been completed or achieved. non-uniqueness non-exhaustiveness will lead...
The existing quantum cryptography is a classical in nature and basically insecure because of its (conventional) bits, encryption algorithm (public) channel. A novel topic about successful communication between the legitimate users, Alice Bob, discussed with probability solution uniqueness Bob’s decryption equation. We find, by probabilistic analysis, that success Bob bigger than 1/2. It also to define insecurity search equation Eve, eavesdropper. Eve’s find plain-text (and Bob) greater 1/2,...