4,372 research outputs found

    Does search boost efficiency?

    Get PDF
    Poaching externality, arising from job-to-job turnovers, implies that a planner should allocate fewer resources to costly job creations. However, these search efforts increase competition among employers, and this could in turn internalize the externality, whereas the congestion externality requires a unit-elastic matching function

    Active inductor shunt peaking in high-speed VCSEL driver design

    Full text link
    An all transistor active inductor shunt peaking structure has been used in a prototype of 8-Gbps high-speed VCSEL driver which is designed for the optical link in ATLAS liquid Argon calorimeter upgrade. The VCSEL driver is fabricated in a commercial 0.25-um Silicon-on-Sapphire (SoS) CMOS process for radiation tolerant purpose. The all transistor active inductor shunt peaking is used to overcome the bandwidth limitation from the CMOS process. The peaking structure has the same peaking effect as the passive one, but takes a small area, does not need linear resistors and can overcome the process variation by adjust the peaking strength via an external control. The design has been tapped out, and the prototype has been proofed by the preliminary electrical test results and bit error ratio test results. The driver achieves 8-Gbps data rate as simulated with the peaking. We present the all transistor active inductor shunt peaking structure, simulation and test results in this paper.Comment: 4 pages, 6 figures and 1 table, Submitted to 'Chinese Physics C

    Strain prioritization and genome mining for enediyne natural products

    Get PDF
    The enediyne family of natural products has had a profound impact on modern chemistry, biology, and medicine, and yet only 11 enediynes have been structurally characterized to date. Here we report a genome survey of 3,400 actinomycetes, identifying 81 strains that harbor genes encoding the enediyne polyketide synthase cassettes that could be grouped into 28 distinct clades based on phylogenetic analysis. Genome sequencing of 31 representative strains confirmed that each clade harbors a distinct enediyne biosynthetic gene cluster. A genome neighborhood network allows prediction of new structural features and biosynthetic insights that could be exploited for enediyne discovery. We confirmed one clade as new C-1027 producers, with a significantly higher C-1027 titer than the original producer, and discovered a new family of enediyne natural products, the tiancimycins (TNMs), that exhibit potent cytotoxicity against a broad spectrum of cancer cell lines. Our results demonstrate the feasibility of rapid discovery of new enediynes from a large strain collection. IMPORTANCE Recent advances in microbial genomics clearly revealed that the biosynthetic potential of soil actinomycetes to produce enediynes is underappreciated. A great challenge is to develop innovative methods to discover new enediynes and produce them in sufficient quantities for chemical, biological, and clinical investigations. This work demonstrated the feasibility of rapid discovery of new enediynes from a large strain collection. The new C-1027 producers, with a significantly higher C-1027 titer than the original producer, will impact the practical supply of this important drug lead. The TNMs, with their extremely potent cytotoxicity against various cancer cells and their rapid and complete cancer cell killing characteristics, in comparison with the payloads used in FDA-approved antibody-drug conjugates (ADCs), are poised to be exploited as payload candidates for the next generation of anticancer ADCs. Follow-up studies on the other identified hits promise the discovery of new enediynes, radically expanding the chemical space for the enediyne family

    Urbanization, inequality and property prices : equilibrium pricing and transaction in the Chinese housing market

    Get PDF
    The particularly overheated Chinese housing market, with its soaring property prices, has attracted a large amount of research. We point out three of its striking empirical features, which current literature leaves unexplored: co-existence of steady growth of real transaction price and excess supply, accelerations in price-to-income ratio, and significantly strong positive correlation between real transaction prices and income inequality. A search-equilibrium model is built to explain these facts. Heterogeneous buyers and homogeneous sellers randomly search for partners to trade in a frictional property market. The search equilibrium of the property market is either a high-price-and-low-transaction elitist matching equilibrium, or a low-price-and-high-transaction pooled matching equilibrium. The terms of trade determine which equilibrium arises. Empirical observations argue for the development of China's property market through evolution from a pooled matching equilibrium to an elitist matching equilibrium. We set out to show that the market equilibrium is always inefficient, due to crowding out externalities and market incompleteness. Policy experiments support redistributive tax, as a means to improve social welfare

    Cyber-Resilient Self-Triggered Distributed Control of Networked Microgrids Against Multi-Layer DoS Attacks

    Get PDF
    Networked microgrids with high penetration of distributed generators have ubiquitous remote information exchange, which may be exposed to various cyber security threats. This paper, for the first time, addresses a consensus problem in terms of frequency synchronisation in networked microgrids subject to multi-layer denial of service (DoS) attacks, which could simultaneously affect communication, measurement and control actuation channels. A unified notion of Persistency-of-Data-Flow (PoDF) is proposed to characterise the data unavailability in different information network links, and further quantifies the multi-layer DoS effects on the hierarchical system. With PoDF, we provide a sufficient condition of the DoS attacks under which the consensus can be preserved with the proposed edgebased self-triggered distributed control framework. In addition, to mitigate the conservativeness of offline design against the worst-case attack across all agents, an online self-adaptive scheme of the control parameters is developed to fully utilise the latest available information of all data transmission channels. Finally, the effectiveness of the proposed cyber-resilient self-triggered distributed control is verified by representative case studies
    corecore