THE THEOPHYSICS DOCTORAL THESIS FORMAT

What This Is

A redesigned doctoral thesis structure that replaces the broken academic model. Three sharp papers instead of one monument. Real adversarial testing instead of ceremonial defense. Cross-domain by design. Falsification mandatory.

Structure

Every Dr. Thesis unit follows this architecture:

Page 0: The Biaxiosum

00_BIAXIOSUM_TEMPLATE

PAGE ZERO: THE BIAXIOSUM

Biaxio, ergo sum. I know my lens. Therefore I exist in truth.


Name Your Ground

I’m biased.

I need you to know that before you read another word. I came into this with my heart first, my intuition leading, my faith intact. I believe in God. I believe consciousness matters. I believe there’s meaning woven into the fabric of everything.

I didn’t hide that. I’m not hiding it now.


The Precedent

The Founders of the American Republic didn’t pretend to be neutral observers discovering universal truths. They opened with four axioms and told you exactly where they stood:

AxiomDeclarationBiaxiosum Score
The Source”endowed by their Creator”100% — Named the ground
The Rights”Life, Liberty, Happiness”100% — Biased toward freedom
The Purpose”to secure these rights”95% — Government serves, not defines
The Escape”right to alter or abolish”100% — People over State

They built a nation on declared assumptions. The modern academy builds on hidden ones and calls it objectivity.


My Declared Position

Ontological: I hold that consciousness is fundamental, not emergent. Reality is informational at base, and physical law is the measurable face of deeper structural truth.

Theological: Jesus Christ is Lord. The Logos described in John 1 is not metaphor but the actual structural principle by which reality coheres. I work within this commitment rigorously, the way a physicist works within the hypothesis they’re testing.

Methodological: The Theophysics framework (188 axioms, 10 Laws, Master Equation χ) was built through 15+ months of intensive cross-domain research, adversarial testing across multiple AI systems, and experimental correlation analysis reaching 5.7–6.35σ significance.

What I’m NOT claiming: I am not claiming certainty where I have evidence. I am not claiming completeness where I have structure. I am not hiding the gaps. You will find them in Paper II and the Destruction Manual. They are there because I put them there.


The Rule

THE BIAXIOSUM RULE

Wherever you start, you end.

You don’t get to be a materialist when you’re attacking my metaphysics and then suddenly “open-minded” when I ask what your framework explains. You don’t get to deny consciousness as fundamental and then smuggle it back in when it’s convenient.

You are who you are. I am who I am. We both came to this table with something. The only question is whether we’re honest about it.


The 24 Shared Properties

Before you proceed, consider this isomorphism between the properties of mathematical truth and the classical attributes of God:

#PropertyMathematical TruthDivine AttributeMatch
1Necessary existenceCan’t be otherwise; true in all possible worldsCan’t NOT exist
2EternalTrue before/after timeOutside time
3ImmutableNever changesEssence doesn’t change
4SimpleAxioms are primitive, not compositeNot composed of parts
5ConsistentContradiction = explosionNo internal contradiction
6UniversalSame everywhereEverywhere
7ImmaterialNot physicalNot physical
8FoundationalGrounds everything elseGrounds all existence
9TruthfulMath doesn’t lieNon-deceptive
10PerfectNo errorsNo errors
11InfiniteExtends infinitelyWithout limit
12Rational/IntelligibleLogos = reason itselfLogos = the Word
13BeautifulMathematical eleganceBeauty as divine attribute
14GoodInfo theory’s built-in directionality toward coherenceMaximal coherence = maximal goodness
15TranscendentAbove physical realityAbove creation
16OmnipresentApplies everywherePresent everywhere
17A se (self-existent)Doesn’t depend on physicalSelf-sufficient being
18Non-temporalTrue before time beganBefore time
19Non-spatialHas no locationHas no location
20UniqueOnly one set of mathematical truthsOnly one God
21Omnipotent (constrains all)Nothing escapes mathNothing escapes God
22Self-sufficientNeeds no external supportNeeds nothing
23OrderedInternal hierarchy and structureInternal order (Trinity)
24GenerativeProduces infinite derived truthsCreates infinitely

24 out of 24. At some point, “analogy” becomes an intellectually dishonest label for what is clearly identity.


Now you know my lens. Now we can talk.

— David Lowe Oklahoma City, 2026


TEMPLATE NOTE

This is the standard Biaxiosum page. Customize the “My Declared Position” section for each specific thesis unit. The 24 Properties table and the Biaxiosum Rule remain constant across all units.

Link to original

Name your ground before you look through the lens. Every thesis opens with the author’s declared bias, epistemological position, and axioms. No hiding. No pretending to be neutral. The Founders knew this. We remember it.

Paper I: The Foundational Claim (15-25 pages)

01_PAPER_I_FOUNDATIONAL_TEMPLATE

PAPER I: THE FOUNDATIONAL CLAIM

[THESIS TITLE]

Format

This paper follows the Lowe FACTS Format. Every section maps to the F.A.C.T.S. methodology. The Biaxiosum declaration for this thesis unit is in Page Zero.


SECTION 0: AXIOM DECLARATION

Foundational Axiom (one sentence):

[State the single bedrock assumption. If this is false, the entire paper fails.]


[F] FIND — THE ANOMALY

What was observed? What pattern demands explanation? What gap in existing knowledge prompted this inquiry?

[Write 2-3 paragraphs. State the anomaly plainly. No throat-clearing. No “since the dawn of time.” What did you notice that nobody else noticed, or that everybody noticed but nobody explained?]


[A] ADMIT — THE BIAS

Compressed Biaxiosum. Full declaration is in Page Zero.

ElementDeclaration
Worldview[e.g., Christian theist; consciousness-fundamental]
Core Belief[e.g., Physics and theology are dual projections of single substrate]
Epistemology[e.g., Empirical + revelational; cross-domain coherence as truth criterion]
Priors[e.g., Master Equation χ, Ten Laws, 188 axioms]
Off-RampWhat would change my mind: [be specific]
Mea CulpaHonest limitations: [be specific]

[C] CLAIM — THE THESIS

Primary Question:

[One question. The question this paper answers.]

THESIS (one sentence):

[One sentence. The claim. No hedging.]

SUPPORT (3 sentences):

  1. [First supporting argument]
  2. [Second supporting argument]
  3. [Third supporting argument]

Prediction (If True):

  • [Observable consequence 1]
  • [Observable consequence 2]
  • [Observable consequence 3]

Prediction (If False):

  • [What would be true instead 1]
  • [What would be true instead 2]
  • [What would be true instead 3]

[T] TEST — THE PROOF

Method:

[How was this investigated? What tools, data, reasoning?]

Tools Used:

  • Historical analysis
  • Cross-domain synthesis
  • External data (specify sources)
  • Mathematical derivation
  • Axiomatic derivation from Theophysics framework
  • Experimental correlation (specify dataset)
  • Other: ___

Evidence Table:

#Domain/VariableFindingMetricSource
1
2
3

Primary Finding:

[The main result in plain language]

Unexpected:

[What you didn’t expect to find]

Null (what showed no effect):

[What you tested that returned nothing — intellectual honesty]


[S] SNAP — THE KILL CONDITIONS

#Kill ConditionThresholdStatus
1[How to destroy this][What would count]Not yet tested
2Not yet tested
3Not yet tested

Explicit Invitation: If you can satisfy any kill condition, this paper is falsified. I will publicly acknowledge the refutation.


FRAMEWORK POSITIONING

Where This Sits in the Master Equation:

[Which variables of χ = ∭(G·M·E·S·T·K·R·Q·F·C)dxdydt does this paper address? Which Laws does it derive from or extend?]

Connections to Other Work:

  • link — [how it connects]
  • link — [how it connects]

THE LOWE BATTERY

TestQuestionPass/Fail
LCT (Coherence Test)Does the domain show coherence decay when the principle is violated?
LFT (Fruits Test)Does constraint removal correlate with negative outcomes?
LMT (Mastery Test)Can the model predict future states?

REFERENCES

  1. [Primary sources]
  2. [Framework citations per Theophysics UUID standard]

AUDIT BLOCK

Format: Lowe FACTS Format v1.0
Thesis Unit: DT-XXX
Paper: I (Foundational Claim)
Author: David Lowe
Date: YYYY-MM-DD
Axiom Hash: [SHA-256 of Section 0]
Kill Conditions Met: [ ] Yes  [ ] No
Lowe Battery: LCT [P/F]  LFT [P/F]  LMT [P/F]

TEMPLATE NOTE

This template is for Paper I (Foundational Claim) in any Dr. Thesis unit. Papers II and III use the same FACTS structure but with different emphasis:

  • Paper II (Adversarial): The [F] section is “the strongest objection found.” The [C] section is “the objection fails because…”
  • Paper III (Application): The [F] section is “unexpected domain where the claim applies.” The [C] section is “it works here too because…”
Link to original

Your core claim. What are you saying? Why does it matter? What formal structure supports it? One paper, one argument, no padding.

Paper II: The Adversarial Response (15-25 pages)

02_PAPER_II_ADVERSARIAL_TEMPLATE

PAPER II: THE ADVERSARIAL RESPONSE

[TITLE: The Strongest Objection to {Paper I Claim}]

Format

This paper follows the Lowe FACTS Format adapted for adversarial purpose. The candidate steelmans the strongest objection, then lets the idea respond. If it survives, it earned survival. If it breaks, we learn where.


SECTION 0: AXIOM DECLARATION

The Objector’s Foundational Axiom (one sentence):

[State the bedrock assumption of the STRONGEST critic. Not a strawman. The version that makes a serious physicist or theologian pause.]

My Foundational Axiom (from Paper I):

[Restate for contrast]


[F] FIND — THE STRONGEST OBJECTION

What is the most damaging attack on Paper I’s claim? Not a nitpick. The one that, if it holds, breaks the core argument.

The Objector’s Position: [2-3 paragraphs. Write this AS the objector. Inhabit the worldview. Make the case as well as its best advocates would. If you can’t articulate the objection better than most people who hold it, you haven’t understood it yet.]

Why This Objection Is Serious: [What specifically does it threaten? Which step of the argument does it attack? What would break downstream if it succeeds?]

The Objector’s Worldview:

ElementTheir Position
Worldview[e.g., Mathematical structural realism; non-theistic Platonism]
Core Assumption[e.g., Math is abstract, necessary, mind-independent, but not personal]
What They Accept[Which of your premises they grant]
Where They Break[The exact step where they diverge]

[A] ADMIT — WHERE THEY’RE RIGHT

Intellectual honesty requires acknowledging the objection’s genuine force before responding.

What the objection gets right:

  1. [Concession 1 — something genuinely true in their critique]
  2. [Concession 2]
  3. [Concession 3]

What I cannot currently answer:

[If there’s a residual gap, name it. This is strength, not weakness.]


[C] CLAIM — THE RESPONSE

The objection fails because (one sentence):

[The core reason it doesn’t hold]

RESPONSE (3 arguments):

Response 1: [Name]

[Full argument. Show the logical chain. Identify the exact point where the objection’s reasoning breaks.]

Response 2: [Name]

[Second independent argument. Different angle.]

Response 3: [Name]

[Third argument. Ideally the one that flips the objection into evidence FOR your position.]


[T] TEST — THE COLLISION

Direct comparison:

CriterionPaper I’s ClaimThe ObjectionWho Wins?
Explanatory scope
Internal consistency
Falsifiability
Cross-domain coherence
Predictive power

The decisive test:

[What single piece of evidence or logical step settles this?]


[S] SNAP — KILL CONDITIONS (for both sides)

What would kill MY response:

#Kill ConditionThresholdStatus
1
2

What would kill THE OBJECTION:

#Kill ConditionThresholdStatus
1
2

VERDICT

Outcome

Did the idea survive? [Yes / Partially / No]

What was learned? [What’s stronger now? What boundary was clarified?]

What remains open? [Any unresolved tensions that need future work?]


AUDIT BLOCK

Format: Lowe FACTS Format v1.0 (Adversarial Variant)
Thesis Unit: DT-XXX
Paper: II (Adversarial Response)
Objector Worldview: [Named]
Author: David Lowe
Date: YYYY-MM-DD
Survival Status: [Survived / Partially / Failed]
Kill Conditions Met: [ ] Yes  [ ] No
Link to original

Steelman the strongest objection. Not a strawman. The version that makes a serious physicist or theologian pause. Then let the idea respond. If it survives, it earned survival. If it breaks, you learned where.

Paper III: The Application (15-25 pages)

03_PAPER_III_APPLICATION_TEMPLATE

PAPER III: THE APPLICATION

[TITLE: {Paper I Claim} Applied to {Unexpected Domain}]

Format

This paper follows the Lowe FACTS Format adapted for cross-domain application. The claim from Paper I is deployed into a domain nobody expected. If it works in one field, it’s local. If it works in three, it’s structural.


SECTION 0: AXIOM DECLARATION

Foundational Axiom (from Paper I, restated for new domain):

[The same core axiom, but now contextualized for the application domain]


[F] FIND — THE UNEXPECTED DOMAIN

Where does this claim apply that nobody would have predicted?

The Domain: [Name the field — economics, biology, psychology, history, etc.]

Why This Domain Is Unexpected: [Why would nobody think to apply Paper I’s claim here? What makes this a genuine surprise rather than a forced connection?]

The Anomaly In This Domain: [What pattern exists in THIS domain that currently lacks explanation?]


[A] ADMIT — DOMAIN LIMITATIONS

ElementDeclaration
My expertise in this domain[Honest assessment]
Sources relied on[Who did I learn from?]
What I might be missing[Domain-specific knowledge gaps]
Off-RampWhat would prove this application is forced:

[C] CLAIM — THE CROSS-DOMAIN THESIS

THESIS (one sentence):

[Paper I’s claim, as applied to this new domain]

The Structural Isomorphism:

Element in Original DomainElement in Application DomainShared Structure

/PROBE CHECK

Is this a genuine structural isomorphism (shared logical architecture, constrains predictions in both domains)? Or merely analogical similarity (pattern looks similar but doesn’t constrain anything)? If analogical only, flag it and either strengthen or discard.

Prediction (If the application holds):

  • [Observable consequence in new domain 1]
  • [Observable consequence in new domain 2]
  • [Observable consequence in new domain 3]

[T] TEST — DOES IT ACTUALLY WORK?

Evidence Table:

#Phenomenon in New DomainPredicted by Paper I’s ClaimActual ObservationMatch?
1
2
3
4
5

What the application EXPLAINS that existing domain theories don’t:

[This is the value proposition. If the application doesn’t explain anything new, it’s decoration.]

What the application GETS WRONG or can’t reach:

[Intellectual honesty. Where does the cross-domain mapping break down?]


[S] SNAP — KILL CONDITIONS

#Kill ConditionThresholdStatus
1The isomorphism is analogical only (doesn’t constrain predictions)Can’t produce novel testable prediction in new domain
2Domain experts identify fatal disanalogyStructural element in one domain absent in other
3

THE UNIVERSALITY TEST

The Three-Domain Rule

A truly universal principle works in at least three independent domains. Track which domains this claim has been successfully applied to:

DomainPaperStatus
[Original domain from Paper I]Paper I✓ Established
[This application domain]Paper III[Testing]
[Future candidate domain][Not yet written]Candidate

THE LOWE BATTERY (Domain-Specific)

TestQuestionPass/Fail
LCTDoes this domain show coherence decay when the principle is violated?
LFTDoes constraint removal in this domain correlate with negative outcomes?
LMTCan the model predict future states in this domain?

AUDIT BLOCK

Format: Lowe FACTS Format v1.0 (Application Variant)
Thesis Unit: DT-XXX
Paper: III (Cross-Domain Application)
Application Domain: [Named]
Author: David Lowe
Date: YYYY-MM-DD
Isomorphism Type: [Structural / Analogical / Mixed]
Kill Conditions Met: [ ] Yes  [ ] No
Lowe Battery: LCT [P/F]  LFT [P/F]  LMT [P/F]
Link to original

Show the claim works in a domain nobody expected. Cross-domain application is the proof of universality. If your idea only works in one field, it’s local. If it works in three, it’s structural.

The Landscape Map (5 pages max)

04_LANDSCAPE_MAP_TEMPLATE

THE LANDSCAPE MAP

Where This Work Sits (5 Pages Maximum)

“If you can’t position your contribution in 5 pages, adding 75 more won’t help.”


The Three Most Important Thinkers

Thinker 1: [Name]

What they got right: [2-3 sentences. Be specific. What genuine contribution did they make?]

What they got wrong: [2-3 sentences. Not “they were stupid.” What structural limitation, blind spot, or missing piece?]

Where my work relates: [How does the current thesis extend, correct, or complete their contribution?]

Thinker 2: [Name]

What they got right:

What they got wrong:

Where my work relates:

Thinker 3: [Name]

What they got right:

What they got wrong:

Where my work relates:


The Gap

What do all three thinkers miss that this thesis addresses?

[One paragraph. The structural gap that nobody has filled. The reason this work exists.]


Position Map

DimensionThinker 1Thinker 2Thinker 3This Thesis
Ontology (what exists)
Epistemology (how we know)
Methodology (how we test)
Scope (how far it reaches)
Falsifiability

What This Thesis Is NOT

[2-3 sentences. Clarify what you’re not claiming. Prevent misreading.]


AUDIT BLOCK

Thesis Unit: DT-XXX
Section: Landscape Map
Thinkers Mapped: [3 names]
Word Count: [target ≤ 3,000]
Link to original

Who are the three most important thinkers in your area? What did each get right? What did each get wrong? Where does your work sit relative to theirs? Five pages. No more.

How To Destroy This Argument

05_DESTRUCTION_MANUAL_TEMPLATE

HOW TO DESTROY THIS ARGUMENT

The Destruction Manual for [Thesis Title]

“Currently, theses hide their weaknesses. That’s not scholarship. That’s marketing.”


Aggregated Kill Conditions

Collected from all three papers’ [S] SNAP sections, plus additional attacks identified during synthesis.

#AttackSource PaperWhat BreaksSeverityStatus
1Paper ICritical / Serious / Minor
2Paper I
3Paper II
4Paper III
5[New — identified during synthesis]Cross-paper

The Three Strongest Attacks (Expanded)

Attack 1: [Name]

The argument: [Write this as the attacker. Make it hurt.]

What breaks if this succeeds: [Downstream consequences]

Current defense: [How the thesis currently responds — or doesn’t]

Honest assessment: [Strong / Adequate / Vulnerable / Open]

Attack 2: [Name]

The argument:

What breaks if this succeeds:

Current defense:

Honest assessment:

Attack 3: [Name]

The argument:

What breaks if this succeeds:

Current defense:

Honest assessment:


Evidence That Would Falsify the Entire Thesis

Terminal Kill Conditions

If ANY of these are satisfied, the thesis fails as a whole. Not a paper. The whole thing.

  1. [Terminal condition 1]
  2. [Terminal condition 2]
  3. [Terminal condition 3]

Known Open Vulnerabilities

Things I can’t currently defend but believe are defensible with future work.

VulnerabilityWhy I Can’t Defend It YetWhat Would Resolve It

The Invitation

If you can satisfy any kill condition listed above, this thesis is falsified. I will publicly acknowledge the refutation. Science advances by killing bad ideas, not protecting them.

Contact: [method]


AUDIT BLOCK

Thesis Unit: DT-XXX
Section: Destruction Manual
Total Kill Conditions: [N]
Terminal Kill Conditions: [N]
Open Vulnerabilities: [N]
Honest Assessment: [How defensible overall?]
Link to original

The three strongest attacks on your own work. What evidence would defeat your thesis. Intellectual honesty as methodology.

Public Summary (2,000 words)

06_PUBLIC_SUMMARY_TEMPLATE

[THESIS TITLE]

A Public Summary

“If you can’t explain your contribution to someone outside your field, you either don’t understand it or it doesn’t matter.”

By David Lowe | Oklahoma City | [Date]


What I Found

[3-4 paragraphs. Plain language. No jargon. What’s the discovery? Why should anyone care? Write as if explaining to a smart friend over coffee who knows nothing about your field but is genuinely curious.]


Why It Matters

[2-3 paragraphs. So what? What changes if this is true? What predictions does it make? What does it explain that nothing else explains?]


How I Tested It

[2-3 paragraphs. How do you know? What evidence? What methods? Be honest about what’s strong and what’s still open.]


How To Prove Me Wrong

[1-2 paragraphs. The kill conditions in plain language. What would it take to destroy this argument? The fact that you’re telling people how to break your own work is the strongest signal that you believe it can survive.]


Where It Came From

[1-2 paragraphs. The human story. How did this start? What drove the inquiry? The Biaxiosum in narrative form — your bias, your journey, your honesty about both.]


What’s Next

[1 paragraph. Where does this go? What remains to be done? What help do you need?]


Full thesis available at: [link] Contact: [method]


AUDIT BLOCK

Thesis Unit: DT-XXX
Section: Public Summary
Word Count: [target 2,000]
Jargon Check: [ ] Passed — readable by non-specialist
Link to original

If you can’t explain your contribution to someone outside your field, you either don’t understand it or it doesn’t matter.

Defense Record

07_DEFENSE_RECORD_TEMPLATE

DEFENSE RECORD

Live Adversarial Session for [Thesis Title]

“The current defense is theater. Replace it with a real adversarial session. If the argument survives, it earned the degree.”


Session Metadata

FieldValue
Date
Thesis UnitDT-XXX
CandidateDavid Lowe
Designated Attacker[Name / AI system / Role]
Attacker’s Field[Must be OUTSIDE the thesis domain]
Committee[Names, at least one cross-domain]
Duration
Format[Live / Async / Multi-session]

Pre-Defense: Attacker’s Opening Position

The attacker’s declared worldview:

[Biaxiosum for the attacker — what are THEIR priors?]

The attacker’s primary line of attack:

[What did they come to break?]

The attacker’s strongest pre-submitted objection:

[Written before the session — their best shot with full preparation time]


The Exchange

Round 1: [Topic]

Attack: [What was argued]

Defense: [How it was answered]

Outcome: [Held / Partially held / Broke / Deferred]


Round 2: [Topic]

Attack:

Defense:

Outcome:


Round 3: [Topic]

Attack:

Defense:

Outcome:


What Broke

Failures

[List anything that broke during defense. Not “weak points.” Things that actually failed under pressure. If nothing broke, say so — but be honest.]

#What BrokeHow It BrokeSeverityFixable?

What Survived

Survived Attacks

[What withstood the strongest objections? What’s STRONGER now because it was tested?]

#What SurvivedAttack It WithstoodWhy It Held

What Was Learned

New insight from the defense:

[Did the adversarial process reveal something neither side expected?]

Refinements needed:

[What needs to be updated in Papers I-III based on this defense?]

New kill conditions discovered:

[Add these to the Destruction Manual]


Verdict

Defense Outcome

Overall: [Passed / Conditional Pass / Failed]

Strongest moment: [The exchange where the thesis was most convincingly defended]

Weakest moment: [The exchange where the thesis was most vulnerable]

Attacker’s assessment: [Did the attacker concede any ground? What did they acknowledge?]


AUDIT BLOCK

Thesis Unit: DT-XXX
Section: Defense Record
Attacker: [Name/System]
Attacker Field: [Domain]
Rounds: [N]
Items Broke: [N]
Items Survived: [N]
Overall Verdict: [Passed / Conditional / Failed]
Date: YYYY-MM-DD
Link to original

Live adversarial session documentation. Who attacked. What broke. What survived. What was learned.


Existing Dr. Thesis Units

Track completed thesis units here as they are written.

UnitTopicStatusPapers
DT-001Math Is Moral🟡 In ProgressMath_Is_Moral

The Principle

“The current model — 300 pages of throat-clearing, literature review padding, and defensive hedging — trains people to write documents nobody reads. Three sharp papers train people to think.”

Canonical Hub: CANONICAL_INDEX