Abstract:
UPE (Ultraweak photon emission) is one kind of a common phenomenon in biological organisms. It contains a wealth of information of biological functions. In this paper, single photon counting system is used to measure UPE of some anti- cancer herbal plants. For the plants, the changes of UPE under different water condition are stud-ied and the varying laws of ultraweak photon number with time are analysed. The results are higher fit double exponential decay law.

A two-factor identity authentication method
on the basis of two-beam interference was presented. While verifying a user’s
identity, a specific “phase key” as well as a corresponding “phase lock” are
both mandatory required for a successful authentication. Note that this scheme
can not only check the legality of the users, but also verify their identity
levels so as to grant them hierarchical access permissions to various resources
of the protected systems or organizations. The authentication process is
straightforward and could be implemented by a hybrid optic-electrical system.
However, the system designing procedure involves an iterative Modified Phase
Retrieval Algorithm (MPRA) and can only be achieved by digital means.
Theoretical analysis and simulations both validate the effectiveness of our
method.

Abstract:
When Newton became the President of the Royal Society, he proposed corpuscle concept (wave-particle duality) to destroy the fruitions of Hooke and Huygens, because Newton mistook Hooke and Huygens as his enemies. Thereafter, this erroneous concept governed the scientific world for more than one hundred years. This paper will reveal the mystery: why corpuscle concept could govern the scientific world for one hundred years after Newton’s death. In the beginning of last century, photon, a palingenesis of Newton’s corpuscle, was proposed by Einstein again, as a sudden whim, because Planck strongly opposed this wrong concept, since 1907, Einstein strongly doubted this concept. Finally, Einstein disappointedly said: “The quanta really are a hopeless mess.” This paper will reveal the mystery: why photon concept can govern the scientific world until now, and give the evidences for the actual nature of light.

Abstract:
We consider a source-destination pair that can only communicate through an untrusted intermediate relay node. The intermediate node is willing to employ a designated relaying scheme to facilitate reliable communication between the source and the destination. Yet, the information it relays needs to be kept secret from it. In this two-hop communication scenario, where the use of the untrusted relay node is essential, we find that a positive secrecy rate is achievable. The center piece of the achievability scheme is the help provided by either the destination node with transmission capability, or an external "good samaritan" node. In either case, the helper performs cooperative jamming that confuses the eavesdropping relay and disables it from being able to decipher what it is relaying. We next derive an upper bound on the secrecy rate for this system. We observe that the gap between the upper bound and the achievable rate vanishes as the power of the relay node goes to infinity. Overall, the paper presents a case for intentional interference, that is, cooperative jamming, as an enabler for secure communication.

Abstract:
We consider a source-destination pair that can only communicate through an untrusted intermediate relay node. The intermediate node is willing to employ a designated relaying scheme to facilitate reliable communication between the source and the destination. Yet, the information it relays needs to be kept secret from it. In this two-hop communication scenario, where the use of the untrusted relay node is essential, we find that a positive secrecy rate is achievable. The center piece of the achievability scheme is the help provided by either the destination node with transmission capability, or an external “good samaritan” node. In either case, the helper performs cooperative jamming that confuses the eavesdropping relay and disables it from being able to decipher what it is relaying. We next derive an upper bound on the secrecy rate for this system. We observe that the gap between the upper bound and the achievable rate vanishes as the power of the relay node goes to infinity. Overall, the paper presents a case for intentional interference, that is, cooperative jamming, as an enabler for secure communication.

Abstract:
In this work, we systematically study the interaction of $D^*$ and nucleon, which is stimulated by the observation of $\Lambda_c(2940)^+$ close to the threshold of $D^*p$. Our numerical result obtained by the dynamical investigation indicates the existence of the $D^*N$ systems with $J^P=1/2^\pm,\,3/2^\pm$, which not only provides valuable information to understand the underlying structure of $\Lambda_c(2940)^+$ but also improves our knowledge of the interaction of $D^*$ and nucleon. Additionally, the bottom partners of the $D^*N$ systems are predicted, which might be as one of the tasks in LHCb experiment.

Abstract:
In this work, we investigate the decay widths and the line shapes of the open-charm radiative and pionic decays of Y(4274) with the $D_s\bar{D}_{s0}(2317)$ molecular charmonium assignment. Our calculation indicates that the decay widths of $Y(4274)\to D^{+}_{s}D^{*-}_{s}\gamma$ and $Y(4274)\to D^+_{s}D^-_{s}\pi^0$ can reach up to 0.05 keV and 0.75 keV, respectively. In addition, the result of the line shape of the photon spectrum of $Y(4274)\to D_s^+ {D}_s^{*-} \gamma$ shows that there exists a very sharp peak near the large end point of photon energy. The line shape of the pion spectrum of $Y(4274)\to D_s^+ {D}_s^{*-} \pi^0$ is similar to that of the pion spectrum of $Y(4274)\to D_s^+ {D}_s^{*-} \gamma$, where we also find a very sharp peak near the large end point of pion energy. According to our calculation, we suggest further experiments to carry out the search for the open-charm radiative and pionic decays of Y(4274).

Abstract:
In this work, we investigate the discovery potential for Y(3940) by the photoproduction process $\gamma p\to Y(3940)p$. The numerical result shows that the upper (lower) limit of the total cross section for $\gamma p\to Y(3940)p$ is up to the order of 1 $nb$ (0.1 $\mu b$). Additionally, the background analysis and the Dalitz plot relevant to the production of Y(3940) are studied. The Dalitz plot analysis of Y(3940) production indicates that Y(3940) signal can be distinguished from the background clearly. The lower limit of the number of events of Y(3940) reaches up to 10/0.02GeV$^2$ for one billion collisions of $\gamma p$ by studying the invariant mass spectrum of $J/\psi\omega$. Experimental search for Y(3940) by the meson photoproduction is suggested.

Abstract:
Recent results have shown that structured codes can be used to construct good channel codes, source codes and physical layer network codes for Gaussian channels. For Gaussian channels with secrecy constraints, however, efforts to date rely on random codes. In this work, we advocate that structured codes are useful for providing secrecy, and show how to compute the secrecy rate when structured codes are used. In particular, we solve the problem of bounding equivocation rates with one important class of structured codes, i.e., nested lattice codes. Having established this result, we next demonstrate the use of structured codes for secrecy in two-user Gaussian channels. In particular, with structured codes, we prove that a positive secure degree of freedom is achievable for a large class of fully connected Gaussian channels as long as the channel is not degraded. By way of this, for these channels, we establish that structured codes outperform Gaussian random codes at high SNR. This class of channels include the two-user multiple access wiretap channel, the two-user interference channel with confidential messages and the two-user interference wiretap channel. A notable consequence of this result is that, unlike the case with Gaussian random codes, using structured codes for both transmission and cooperative jamming, it is possible to achieve an arbitrary large secrecy rate given enough power.