17,212 research outputs found

    Carbon finance and the carbon market in China

    Get PDF
    postprin

    The cost and benefit of banking regulations and controls, Chinese style

    Get PDF
    The neoclassical approach focuses its attention on the prudence of individual banks. In its objective of achieving allocative efficiency, it seeks to prevent market failures caused by the operations of the banks. In this light, it is contended that China should further its market reforms in the direction of fostering the profit maximization cum risk minimization pursuit of individual banks. Meanwhile, the Keynesian-Schumpeterian-Minskyan approach focuses its attention on coping with systemic fragility. And systemic fragility is seen as endemic to the interaction between credit expansion and contraction, productive investment, and business profitability. In this light, even if it is indeed allocatively inefficient, Chinese finance can still have its advantages in terms of promoting productive efficiency

    Monte Carlo simulation of ferroelectricity induced by collinear magnetic order in Ising spin chain

    Get PDF
    Author name used in this publication: Veng Cheong Lo2008-2009 > Academic research: refereed > Publication in refereed journalVersion of RecordPublishe

    Food-related Yangsheng short videos among the retired population in Shanghai

    Get PDF
    Despite an emerging and significant impact upon daily life, health, and self-care in China, the popularity of smartphone-based short videos (duan shipin短视频) has not yet drawn enough attention from either anthropological study or the study of Medical Humanities. The research of this chapter is part of an ongoing long-term (Feb 2018–June 2019) ethnographic research among the retired population in Shanghai, with a specific focus on the use of short videos and their influence and potential for influence upon everyday health and self-care. Along with this development in digital technology, there is an ever-growing and ever-richening visual language among the elderly in mainland China. Given the challenges that China faces with its ageing population and the breakdown of the family as the unit of care, understanding what sorts of clips are more likely to be watched and understood and circulated, and why, becomes critical. This chapter argues that how the combination of the topic, the viewer, the properties of the clip itself, and how they interact requires greater investment from the field of health-related communication

    Phase-Remapping Attack in Practical Quantum Key Distribution Systems

    Full text link
    Quantum key distribution (QKD) can be used to generate secret keys between two distant parties. Even though QKD has been proven unconditionally secure against eavesdroppers with unlimited computation power, practical implementations of QKD may contain loopholes that may lead to the generated secret keys being compromised. In this paper, we propose a phase-remapping attack targeting two practical bidirectional QKD systems (the "plug & play" system and the Sagnac system). We showed that if the users of the systems are unaware of our attack, the final key shared between them can be compromised in some situations. Specifically, we showed that, in the case of the Bennett-Brassard 1984 (BB84) protocol with ideal single-photon sources, when the quantum bit error rate (QBER) is between 14.6% and 20%, our attack renders the final key insecure, whereas the same range of QBER values has been proved secure if the two users are unaware of our attack; also, we demonstrated three situations with realistic devices where positive key rates are obtained without the consideration of Trojan horse attacks but in fact no key can be distilled. We remark that our attack is feasible with only current technology. Therefore, it is very important to be aware of our attack in order to ensure absolute security. In finding our attack, we minimize the QBER over individual measurements described by a general POVM, which has some similarity with the standard quantum state discrimination problem.Comment: 13 pages, 8 figure

    A wall interference assessment/correction system

    Get PDF
    A Wall Signature method, the Hackett method, has been selected to be adapted for the 12-ft Wind Tunnel wall interference assessment/correction (WIAC) system in the present phase. This method uses limited measurements of the static pressure at the wall, in conjunction with the solid wall boundary condition, to determine the strength and distribution of singularities representing the test article. The singularities are used in turn for estimating wall interferences at the model location. The Wall Signature method will be formulated for application to the unique geometry of the 12-ft Tunnel. The development and implementation of a working prototype will be completed, delivered and documented with a software manual. The WIAC code will be validated by conducting numerically simulated experiments rather than actual wind tunnel experiments. The simulations will be used to generate both free-air and confined wind-tunnel flow fields for each of the test articles over a range of test configurations. Specifically, the pressure signature at the test section wall will be computed for the tunnel case to provide the simulated 'measured' data. These data will serve as the input for the WIAC method-Wall Signature method. The performance of the WIAC method then may be evaluated by comparing the corrected parameters with those for the free-air simulation. Each set of wind tunnel/test article numerical simulations provides data to validate the WIAC method. A numerical wind tunnel test simulation is initiated to validate the WIAC methods developed in the project. In the present reported period, the blockage correction has been developed and implemented for a rectangular tunnel as well as the 12-ft Pressure Tunnel. An improved wall interference assessment and correction method for three-dimensional wind tunnel testing is presented in the appendix

    Using patterns position distribution for software failure detection

    Get PDF
    Pattern-based software failure detection is an important topic of research in recent years. In this method, a set of patterns from program execution traces are extracted, and represented as features, while their occurrence frequencies are treated as the corresponding feature values. But this conventional method has its limitation due to ignore the pattern’s position information, which is important for the classification of program traces. Patterns occurs in the different positions of the trace are likely to represent different meanings. In this paper, we present a novel approach for using pattern’s position distribution as features to detect software failure. The comparative experiments in both artificial and real datasets show the effectiveness of this method

    Security Analysis of an Untrusted Source for Quantum Key Distribution: Passive Approach

    Get PDF
    We present a passive approach to the security analysis of quantum key distribution (QKD) with an untrusted source. A complete proof of its unconditional security is also presented. This scheme has significant advantages in real-life implementations as it does not require fast optical switching or a quantum random number generator. The essential idea is to use a beam splitter to split each input pulse. We show that we can characterize the source using a cross-estimate technique without active routing of each pulse. We have derived analytical expressions for the passive estimation scheme. Moreover, using simulations, we have considered four real-life imperfections: Additional loss introduced by the "plug & play" structure, inefficiency of the intensity monitor, noise of the intensity monitor, and statistical fluctuation introduced by finite data size. Our simulation results show that the passive estimate of an untrusted source remains useful in practice, despite these four imperfections. Also, we have performed preliminary experiments, confirming the utility of our proposal in real-life applications. Our proposal makes it possible to implement the "plug & play" QKD with the security guaranteed, while keeping the implementation practical.Comment: 35 pages, 19 figures. Published Versio

    Alternative schemes for measurement-device-independent quantum key distribution

    Full text link
    Practical schemes for measurement-device-independent quantum key distribution using phase and path or time encoding are presented. In addition to immunity to existing loopholes in detection systems, our setup employs simple encoding and decoding modules without relying on polarization maintenance or optical switches. Moreover, by employing a modified sifting technique to handle the dead-time limitations in single-photon detectors, our scheme can be run with only two single-photon detectors. With a phase-postselection technique, a decoy-state variant of our scheme is also proposed, whose key generation rate scales linearly with the channel transmittance.Comment: 30 pages, 5 figure
    corecore