71,326 research outputs found

    N-port rectangular-shaped distributed RC NETWORKS

    Get PDF
    Dielectric material between resistive thin film and pure conductor considered as n-port distributed RC networ

    Real photons produced from photoproduction in pppp collisions

    Full text link
    We calculate the production of real photons originating from the photoproduction in relativistic pppp collisions. The Weizsa¨\ddot{\mathrm{a}}cker-Williams approximation in the photoproduction is considered. Numerical results agree with the experimental data from Relativistic Heavy Ion Collider (RHIC) and Large Hadron Collider (LHC). We find that the modification of the photoproduction is more prominent in large transverse momentum region.Comment: 2 figure

    Synthesis of active distributed RC networks

    Get PDF
    Open-circuit transfer function of two-port network expressed as rational function with real coefficient

    Guanxi and the organization of Chinese new year festivals in England

    Get PDF
    This article explores how Chinese diaspora communities use guanxi, a unique Chinese interpretation of personal relationships, in the organization of Chinese New Year (CNY) festivals in England. A case-study approach that incorporated mixed qualitative methods was used to investigate the interactions and interrelationships between the ethnic Chinese communities involved in the organization of CNY festivals in five English cities. The article argues that Chinese diaspora communities use their guanxi to establish collaboration at CNY festivals. However, the process of organizing CNY festivals has also exposed divisions among Chinese communities. The article proposes that guanxi has important implications for the relationships among Chinese diaspora communities in the context of CNY festivals. Although it facilitates collaboration and promotes solidarity among Chinese communities, it may also intensify competition for power. Diaspora festivals in general are a neglected area of research and this article is the first to study the organization of Chinese New Year festivals in detail

    On the Landau theory of phase transitions

    Full text link
    The Landau theory of phase transitions has been re-examined under the framework of a modified mean field theory in ferroelectrics. By doing so, one can see that there are two atomic movements involved in the ferroelectric phase transition; the first corresponds to the vibration of crystalline lattice, which will render phonon mode softening at the critical point, and the second represents the slow evolution of a partially ordered nematic phase formed by the cooperative behavior of high-temperature structure precursors. In this hierarchical dynamic structure, the former fast dynamics could be significantly modulated by the latter slow dynamics in the vicinity of the Curie temperature; it then turns out that it is the behavior of the nematic phase on approaching the critical point that makes the Landau theory deviate from experimental observations.Comment: 7 pages and 3 figure

    Multi-aspect, robust, and memory exclusive guest os fingerprinting

    Get PDF
    Precise fingerprinting of an operating system (OS) is critical to many security and forensics applications in the cloud, such as virtual machine (VM) introspection, penetration testing, guest OS administration, kernel dump analysis, and memory forensics. The existing OS fingerprinting techniques primarily inspect network packets or CPU states, and they all fall short in precision and usability. As the physical memory of a VM always exists in all these applications, in this article, we present OS-Sommelier+, a multi-aspect, memory exclusive approach for precise and robust guest OS fingerprinting in the cloud. It works as follows: given a physical memory dump of a guest OS, OS-Sommelier+ first uses a code hash based approach from kernel code aspect to determine the guest OS version. If code hash approach fails, OS-Sommelier+ then uses a kernel data signature based approach from kernel data aspect to determine the version. We have implemented a prototype system, and tested it with a number of Linux kernels. Our evaluation results show that the code hash approach is faster but can only fingerprint the known kernels, and data signature approach complements the code signature approach and can fingerprint even unknown kernels
    corecore