17 research outputs found
The Controlled Growth of Long AlN Nanorods and In-situ Investigation on Their Field Emission Properties
Metal-like single crystalline boron nanotubes: synthesis and in situ study on electric transport and field emission properties †
Genomic characterization and seed transmission of a novel unclassified partitivirus infecting Polygonatum kingianum Coll. et Hemsl
This study identified a novel virus in the family Partitiviridae infecting Polygonatum kingianum Coll. et Hemsl, which is tentatively named polygonatum kingianum cryptic virus 1 (PKCV1). PKCV1 genome has two RNA segments: dsRNA1 (1926 bp) has an open reading frame (ORF) encoding an RNA-dependent RNA polymerase (RdRp) of 581 amino acids (aa), and dsRNA2 (1721 bp) has an ORF encoding a capsid protein (CP) of 495 aa. The RdRp of PKCV1 shares 20.70–82.50% aa identity with known partitiviruses, and the CP of PKCV1 shares 10.70–70.80% aa identity with known partitiviruses. Moreover, PKCV1 phylogenetically clustered with unclassified members of the Partitiviridae family. Additionally, PKCV1 is common in P. kingianum planting regions and has a high infection rate in P. kingianum seeds
Bezoar ∗ : Automated Virtual Machine-based Full-System Recovery from Control-Flow Hijacking Attacks
Abstract—System availability is difficult for systems to maintain in the face of Internet worms. Large systems have vulnerabilities, and if a system attempts to continue operation after an attack, it may not behave properly. Traditional mechanisms for detecting attacks disrupt service and current recovery approaches are application-based and cannot guarantee recovery in the face of exploits that corrupt the kernel, involve multiple processes or target multithreaded network services. This paper presents Bezoar, an automated full-system virtual machine-based approach to recover from zero-day control-flow hijacking attacks. Bezoar tracks down the source of network bytes in the system and after an attack, replays the checkpointed run while ignoring inputs from the malicious source. We evaluated our proof-of-concept prototype on six notorious exploits for Linux and Windows. In all cases, it recovered the full system state and resumed execution. Bezoar incurs low overhead to the virtual machine: less than 1% for the recovery and log components and approximately 1.4X for the memory monitor component that tracks down network bytes, for five SPEC INT 2000 benchmarks. I
Janus Magneto–Electric Nanosphere Dimers Exhibiting Unidirectional Visible Light Scattering and Strong Electromagnetic Field Enhancement
Steering incident light into specific directions at the nanoscale is very important for future nanophotonics applications of signal transmission and detection. A prerequisite for such a purpose is the development of nanostructures with high-efficiency unidirectional light scattering properties. Here, from both theoretical and experimental sides, we conceived and demonstrated the unidirectional visible light scattering behaviors of a heterostructure, Janus dimer composed of gold and silicon nanospheres. By carefully adjusting the sizes and spacings of the two nanospheres, the Janus dimer can support both electric and magnetic dipole modes with spectral overlaps and comparable strengths. The interference of these two modes gives rise to the narrow-band unidirectional scattering behaviors with enhanced forward scattering and suppressed backward scattering. The directionality can further be improved by arranging the dimers into one-dimensional chain structures. In addition, the dimers also show remarkable electromagnetic field enhancements. These results will be important not only for applications of light emitting devices, solar cells, optical filters, and various surface enhanced spectroscopies but also for furthering our understanding on the light–matter interactions at the nanoscale