38 research outputs found

    Insight-HXMT observations of Swift J0243.6+6124 during its 2017-2018 outburst

    Full text link
    The recently discovered neutron star transient Swift J0243.6+6124 has been monitored by {\it the Hard X-ray Modulation Telescope} ({\it Insight-\rm HXMT). Based on the obtained data, we investigate the broadband spectrum of the source throughout the outburst. We estimate the broadband flux of the source and search for possible cyclotron line in the broadband spectrum. No evidence of line-like features is, however, found up to 150 keV\rm 150~keV. In the absence of any cyclotron line in its energy spectrum, we estimate the magnetic field of the source based on the observed spin evolution of the neutron star by applying two accretion torque models. In both cases, we get consistent results with B1013 GB\rm \sim 10^{13}~G, D6 kpcD\rm \sim 6~kpc and peak luminosity of >1039 erg s1\rm >10^{39}~erg~s^{-1} which makes the source the first Galactic ultraluminous X-ray source hosting a neutron star.Comment: publishe

    Overview to the Hard X-ray Modulation Telescope (Insight-HXMT) Satellite

    Full text link
    As China's first X-ray astronomical satellite, the Hard X-ray Modulation Telescope (HXMT), which was dubbed as Insight-HXMT after the launch on June 15, 2017, is a wide-band (1-250 keV) slat-collimator-based X-ray astronomy satellite with the capability of all-sky monitoring in 0.2-3 MeV. It was designed to perform pointing, scanning and gamma-ray burst (GRB) observations and, based on the Direct Demodulation Method (DDM), the image of the scanned sky region can be reconstructed. Here we give an overview of the mission and its progresses, including payload, core sciences, ground calibration/facility, ground segment, data archive, software, in-orbit performance, calibration, background model, observations and some preliminary results.Comment: 29 pages, 40 figures, 6 tables, to appear in Sci. China-Phys. Mech. Astron. arXiv admin note: text overlap with arXiv:1910.0443

    Household, community, sub-national and country-level predictors of primary cooking fuel switching in nine countries from the PURE study

    Get PDF
    Introduction. Switchingfrom polluting (e.g. wood, crop waste, coal)to clean (e.g. gas, electricity) cooking fuels can reduce household air pollution exposures and climate-forcing emissions.While studies have evaluated specific interventions and assessed fuel-switching in repeated cross-sectional surveys, the role of different multilevel factors in household fuel switching, outside of interventions and across diverse community settings, is not well understood. Methods.We examined longitudinal survey data from 24 172 households in 177 rural communities across nine countries within the Prospective Urban and Rural Epidemiology study.We assessed household-level primary cooking fuel switching during a median of 10 years offollow up (∼2005–2015).We used hierarchical logistic regression models to examine the relative importance of household, community, sub-national and national-level factors contributing to primary fuel switching. Results. One-half of study households(12 369)reported changing their primary cookingfuels between baseline andfollow up surveys. Of these, 61% (7582) switchedfrom polluting (wood, dung, agricultural waste, charcoal, coal, kerosene)to clean (gas, electricity)fuels, 26% (3109)switched between different polluting fuels, 10% (1164)switched from clean to polluting fuels and 3% (522)switched between different clean fuels

    Household, community, sub-national and country-level predictors of primary cooking fuel switching in nine countries from the PURE study

    Get PDF

    A Method for Evaluating the Dominant Seepage Channel of Water Flooding in Layered Sandstone Reservoir

    No full text
    A method for evaluating the dominant seepage channel (DSC) water flooding in a layered sandstone reservoir is proposed and applied in an oilfield based on the water-cut derivative. The water-cut derivative curve of the reservoir with DSC shows double peaks. Therefore, based on the analysis of geology and production characteristics, the evaluation method of DSC is established. The evaluation index is proposed to quantitatively characterize the development degree of DSC and determine its distribution in a water-flooding reservoir. The test data validate that the proposed method can not only accurately determine the DSC and quantitatively evaluate its development degree, but also show its dynamic change. This method will be a powerful guide for water controlling and oil stabilizing in the adjustment stage of sandstone reservoirs

    Exploring the gamification of cybersecurity education in higher education institutions: An analytical study

    Get PDF
    Our world has become increasingly dependent on electronic technology. As most economic, cultural, and social activities are conducted in cyberspace, how to protect data from cyberattacks has arisen as a prominent challenge. Cybersecurity education and training that improves awareness among personnel is recognized as an effective approach. Higher education institutions (HEIs) have become prime cyberattack targets as they hold vast amounts of valuable research and personal data. This paper analyses the state of cybersecurity in HEIs and the problems of cybersecurity education, and proposes the solution of gamification of cybersecurity education. A detailed feasibility analysis and recommendations for developing cybersecurity education games are provided. This paper expands the theories of gamified cybersecurity education in China, and sheds light on enhancing the effectiveness of cybersecurity education in HEIs through games

    Exploring the gamification of cybersecurity education in higher education institutions: An analytical study

    No full text
    Our world has become increasingly dependent on electronic technology. As most economic, cultural, and social activities are conducted in cyberspace, how to protect data from cyberattacks has arisen as a prominent challenge. Cybersecurity education and training that improves awareness among personnel is recognized as an effective approach. Higher education institutions (HEIs) have become prime cyberattack targets as they hold vast amounts of valuable research and personal data. This paper analyses the state of cybersecurity in HEIs and the problems of cybersecurity education, and proposes the solution of gamification of cybersecurity education. A detailed feasibility analysis and recommendations for developing cybersecurity education games are provided. This paper expands the theories of gamified cybersecurity education in China, and sheds light on enhancing the effectiveness of cybersecurity education in HEIs through games

    DNA Hydrolytic Cleavage by the Diiron(III) Complex Fe 2

    No full text

    A Network Pharmacology Approach to Investigate the Active Compounds and Mechanisms of Musk for Ischemic Stroke

    No full text
    Objectives. This study aims to study the material basis and effective mechanism of musk for ischemic stroke (IS) based on the network pharmacology approach. Methods. We collected the chemical components and target gene of musk from the BATMAN-TCM analytical platform and identified ischemic stroke-related targets from the following databases: DisGeNET, NCBI-Gene, HPO, OMIM, DrugBank, and TTD. The targets of musk and IS were uploaded to the String database to construct the protein-protein interaction (PPI) network, and then, the key targets were analyzed by topological methods. At last, the function biological process and signaling pathways of key targets were carried out by Gene Ontology (GO) and Kyoto Encyclopedia of Genes and Genomes (KEGG) pathway enrichment analysis and cluster analysis by using the Database for Annotation, Visualization, and Integrated Discovery (DAVID) server and Metascape platform. Results. A total of 29 active compounds involving 1081 predicted targets were identified in musk and there were 1104 IS-related targets. And 88 key targets of musk for IS were obtained including AKT1, MAPK1/3, TP53, TNF, SRC, FOS, CASP3, JUN, NOS3, and IL1B. The GO and KEGG enrichment analysis suggested that these key targets are mainly involved in multiple pathways which participated in TNF signaling pathway, estrogen signaling pathway, prolactin signaling pathway, neurotrophin signaling pathway, T-cell receptor signaling pathway, cAMP signaling pathway, FoxO signaling pathway, and HIF1 signaling pathway. Conclusion. This study revealed that the effective mechanisms of musk against IS would be associated with the regulation of apoptosis, inflammatory response, and gene transcription
    corecore