The author's process of cold fusion, was announced to International Conference on Emerging Nuclear Energy Systems in 2007, then exposed to International Conference on Emerging Nuclear Energy Systems in 2009, and has ...The author's process of cold fusion, was announced to International Conference on Emerging Nuclear Energy Systems in 2007, then exposed to International Conference on Emerging Nuclear Energy Systems in 2009, and has been applied since June, 2007 in a non-member border country of the European Union, for safety reasons, the product, of a large module of 300 cm x 40 cm, using energy of mass of 600 megawatts per hour, and unique waste, 300 cubic meters of pure water a day, instantly drinkable. The presentation which the author shall make, will contain, if it is possible, several demonstrations of a portable module, producing one megawatt per hour, and in waste one cubic meter of water per day: the authors are able to stop the module at any time. The civil applications of this process, the author developed in the articles published on the site of the European Scientific Parliament 2010, and diverse modules were the object of a protocol signed by large Asian country.展开更多
The first quantum private comparison(QPC) protocol via cavity quantum electrodynamics(QED) is proposed in this paper by making full use of the evolution law of atom via cavity QED, where the third party(TP) is allowed...The first quantum private comparison(QPC) protocol via cavity quantum electrodynamics(QED) is proposed in this paper by making full use of the evolution law of atom via cavity QED, where the third party(TP) is allowed to misbehave on his own but cannot conspire with either of the two users. The proposed protocol adopts two-atom product states rather than entangled states as the initial quantum resource, and only needs single-atom measurements for two users. Both the unitary operations and the quantum entanglement swapping operation are not necessary for the proposed protocol. The proposed protocol can compare the equality of one bit from each user in each round comparison with one two-atom product state. The proposed protocol can resist both the outside attack and the participant attack.Particularly, it can prevent TP from knowing two users' secrets. Furthermore, the qubit efficiency of the proposed protocol is as high as 50%.展开更多
文摘The author's process of cold fusion, was announced to International Conference on Emerging Nuclear Energy Systems in 2007, then exposed to International Conference on Emerging Nuclear Energy Systems in 2009, and has been applied since June, 2007 in a non-member border country of the European Union, for safety reasons, the product, of a large module of 300 cm x 40 cm, using energy of mass of 600 megawatts per hour, and unique waste, 300 cubic meters of pure water a day, instantly drinkable. The presentation which the author shall make, will contain, if it is possible, several demonstrations of a portable module, producing one megawatt per hour, and in waste one cubic meter of water per day: the authors are able to stop the module at any time. The civil applications of this process, the author developed in the articles published on the site of the European Scientific Parliament 2010, and diverse modules were the object of a protocol signed by large Asian country.
基金Supported by the National Natural Science Foundation of China under Grant No.61402407
文摘The first quantum private comparison(QPC) protocol via cavity quantum electrodynamics(QED) is proposed in this paper by making full use of the evolution law of atom via cavity QED, where the third party(TP) is allowed to misbehave on his own but cannot conspire with either of the two users. The proposed protocol adopts two-atom product states rather than entangled states as the initial quantum resource, and only needs single-atom measurements for two users. Both the unitary operations and the quantum entanglement swapping operation are not necessary for the proposed protocol. The proposed protocol can compare the equality of one bit from each user in each round comparison with one two-atom product state. The proposed protocol can resist both the outside attack and the participant attack.Particularly, it can prevent TP from knowing two users' secrets. Furthermore, the qubit efficiency of the proposed protocol is as high as 50%.