1,956 research outputs found

    Ensuring the authenticity of the conservation and reuse of modern industrial heritage architecture: a case study of the large machine factory, China

    Get PDF
    The Large Machine Factory (LMF) was built in the complex historical context of the late Qing Dynasty (1840–1912). Its space and construction faithfully record the architectural and cultural fusion between Chinese and western traditions and mark the beginning of modern architectural techniques in China. Through historical data and empirical studies, the historical background and architectural characteristics of the LMF were analyzed, and interventions aimed at ensuring authenticity were established. The cultural significance and results of construction were considered two crucial elements in terms of outstanding characteristics. Comprehensive inspection and assessment strategies were discussed, with minimal intervention and interpretation principles. Preventive reinforcement of the foundation, complementary reinforcement of the main structures, restoration of the historic façade and environment, and adaptive spatial interventions were found to be effective ways to ensure authenticity. The principles of minimal intervention and interpretability, which include prevention, recognizability, invisibility, subsidiarity, and intertextuality, were proposed through a comparison with the literature and practical experience. This study provides an appropriate technical reference for ensuring authenticity in the conservation and reuse of modern historic buildings with complex contexts. We propose a new understanding of intervention principles and suggest a guiding intervention path that avoids the complexities arising from the generalized interpretations of authenticity.Postprint (published version

    Quantum interference effect in electron tunneling through a quantum-dot-ring spin valve

    Get PDF
    Spin-dependent transport through a quantum-dot (QD) ring coupled to ferromagnetic leads with noncollinear magnetizations is studied theoretically. Tunneling current, current spin polarization and tunnel magnetoresistance (TMR) as functions of the bias voltage and the direct coupling strength between the two leads are analyzed by the nonequilibrium Green's function technique. It is shown that the magnitudes of these quantities are sensitive to the relative angle between the leads' magnetic moments and the quantum interference effect originated from the inter-lead coupling. We pay particular attention on the Coulomb blockade regime and find the relative current magnitudes of different magnetization angles can be reversed by tuning the inter-lead coupling strength, resulting in sign change of the TMR. For large enough inter-lead coupling strength, the current spin polarizations for parallel and antiparallel magnetic configurations will approach to unit and zero, respectively

    Source attack of decoy-state quantum key distribution using phase information

    Get PDF
    Quantum key distribution (QKD) utilizes the laws of quantum mechanics to achieve information-theoretically secure key generation. This field is now approaching the stage of commercialization, but many practical QKD systems still suffer from security loopholes due to imperfect devices. In fact, practical attacks have successfully been demonstrated. Fortunately, most of them only exploit detection-side loopholes which are now closed by the recent idea of measurement-device-independent QKD. On the other hand, little attention is paid to the source which may still leave QKD systems insecure. In this work, we propose and demonstrate an attack that exploits a source-side loophole existing in qubit-based QKD systems using a weak coherent state source and decoy states. Specifically, by implementing a linear-optics unambiguous-state-discrimination measurement, we show that the security of a system without phase randomization --- which is a step assumed in conventional security analyses but sometimes neglected in practice --- can be compromised. We conclude that implementing phase randomization is essential to the security of decoy-state QKD systems under current security analyses.Comment: 12 pages, 5 figure

    Reconstruction of phyletic trees by global alignment of multiple metabolic networks

    Get PDF
    Background: In the last decade, a considerable amount of research has been devoted to investigating the phylogenetic properties of organisms from a systems-level perspective. Most studies have focused on the classification of organisms based on structural comparison and local alignment of metabolic pathways. In contrast, global alignment of multiple metabolic networks complements sequence-based phylogenetic analyses and provides more comprehensive information. Results: We explored the phylogenetic relationships between microorganisms through global alignment of multiple metabolic networks. The proposed approach integrates sequence homology data with topological information of metabolic networks. In general, compared to recent studies, the resulting trees reflect the living style of organisms as well as classical taxa. Moreover, for phylogenetically closely related organisms, the classification results are consistent with specific metabolic characteristics, such as the light-harvesting systems, fermentation types, and sources of electrons in photosynthesis. Conclusions: We demonstrate the usefulness of global alignment of multiple metabolic networks to infer phylogenetic relationships between species. In addition, our exhaustive analysis of microbial metabolic pathways reveals differences in metabolic features between phylogenetically closely related organisms. With the ongoing increase in the number of genomic sequences and metabolic annotations, the proposed approach will help identify phenotypic variations that may not be apparent based solely on sequence-based classification.National Institutes of Health (U.S.) (Grant GM081871

    Residential Assessment Instrument 2.0 in care planning for residents in nursing homes

    Get PDF
    published_or_final_versio

    Type I interferons suppress viral replication but contribute to T cell depletion and dysfunction during chronic HIV-1 infection

    Get PDF
    The direct link between sustained type I interferon (IFN-I) signaling and HIV-1-induced immunopathogenesis during chronic infection remains unclear. Here we report studies using a monoclonal antibody to block IFN-α/β receptor 1 (IFNAR1) signaling during persistent HIV-1 infection in humanized mice (hu-mice). We discovered that, during chronic HIV-1 infection, IFNAR blockade increased viral replication, which was correlated with elevated T cell activation. Thus, IFN-Is suppress HIV-1 replication during the chronic phase but are not essential for HIV-1-induced aberrant immune activation. Surprisingly, IFNAR blockade rescued both total human T cell and HIV-specific T cell numbers despite elevated HIV-1 replication and immune activation. We showed that IFNAR blockade reduced HIV-1-induced apoptosis of CD4+ T cells. Importantly, IFNAR blockade also rescued the function of human T cells, including HIV-1-specific CD8+ and CD4+ T cells. We conclude that during persistent HIV-1 infection, IFN-Is suppress HIV-1 replication, but contribute to depletion and dysfunction of T cells
    corecore