5,032 research outputs found
Closed-loop control of complex networks : A trade-off between time and energy
W. L. is supported by the National Science Foundation of China (NSFC) (Grants No. 11322111 and No. 61773125). Y.-Z. S. is supported by the NSFC (Grant No. 61403393). Y.-C. L. acknowledges support from the Vannevar Bush Faculty Fellowship program sponsored by the Basic Research Office of the Assistant Secretary of Defense for Research and Engineering and funded by the Office of Naval Research through Grant No. N00014-16-1-2828. Y.-Z. S. and S.-Y. L. contributed equally to this work.Peer reviewedPublisher PD
Performance improvement of the LM device and its application to precise measurement of motion trajectories within a small range with a machining centre
In order to apply the LM device previously developed to precisely measuring small motion trajectories located on the different motion planes, three major improvements are successfully performed under the condition of completely maintaining the advantages of the device. These improvements include 1) development of a novel connection mechanism to smoothly attach the device to the spindle of a machining centre; 2) employment of a new data sampling method to achieve a high sampling frequency independent of the operating system of the control computer; and 3) proposal of a set-up method to conveniently install the device on the test machining centre with respect to different motion planes. Practical measurement experiment results with the improved device on a machining centre sufficiently demonstrate the effectiveness of the improvements and confirm several features including a very good response to small displacement close to the resolution of the device, high precision, repeatability and reliance. Moreover, based on the measurement results for a number of trajectories for a wide range of motion conditions, the error characteristics of small size motions are systematically discussed and the effect of the movement size and feed rate on the motion accuracy is verified for the machining centre tested
How people react to the ‘also recommended’ section of online stores
Retailers can take advantage of recommendation networks to drive product demand, write Zhijie Lin, Khim-Yong Goh and Cheng-Suang Hen
Ceria–terbia solid solution nanobelts with high catalytic activities for CO oxidation
Ceria–terbia solid solution nanobelts were prepared by an electrochemical route and tested as catalysts of high activity for CO oxidation
Recommended from our members
Redox signaling in aging kidney and opportunity for therapeutic intervention through natural products.
Kidney diseases are serious public problems with high morbidity and mortality in the general population and heavily retard renal function with aging regardless of the cause. Although myriad strategies have been assigned to prevent or harness disease progression, unfortunately, thus far, there is a paucity of effective therapies partly due to an insufficient knowledge of underlying pathological mechanisms, indicating deeper studies are urgently needed. Additionally, natural products are increasingly recognized as an alternative source for disease intervention owing to the potent safety and efficacy, which might be exploited for novel drug discovery. In this review, we primarily expatiate the new advances on mediators that might be amenable to targeting aging kidney and kidney diseases, including nicotinamide adenine dinucleotide phosphate oxidase (NOX), transforming growth factor-β (TGF-β), renin-angiotensin system (RAS), nuclear factor-erythroid 2 related factor 2 (Nrf2), peroxisome proliferator-activated γ receptor (PPARγ), advanced glycation endproducts (AGEs) as well as microRNAs and vitagenes. Of note, we conclude by highlighting some natural products which have the potential to facilitate the development of novel treatment for patients with myriad renal diseases
Dynamic generation or removal of a scalar hair
We study dynamic processes through which the scalar hair of black holes is
generated or detached in a theory with a scalar field non-minimally coupled to
Gauss-Bonnet and Ricci scalar invariants. We concentrate on the nonlinear
temporal evolution of a far-from-equilibrium gravitational system. In our
simulations, we choose the initial spacetime to be either a bald Schwarzschild
or a scalarized spherically symmetric black hole. Succeeding continuous
accretion of the scalar field onto the original black hole, the final fate of
the system displays intriguing features, which depend on the initial
configurations, strengths of the perturbation, and specific metric parameters.
In addition to the scalarization process through which the bald black hole
addresses scalar hair, we observe the dynamical descalarization, which removes
scalar hair from an original hairy hole after continuous scalar field
accretion. We examine the temporal evolution of the scalar field, the metrics,
and the Misner-Sharp mass of the spacetime and exhibit rich phase structures
through nonlinear dynamical processes.Comment: 22 pages, 11 figure
Source attack of decoy-state quantum key distribution using phase information
Quantum key distribution (QKD) utilizes the laws of quantum mechanics to
achieve information-theoretically secure key generation. This field is now
approaching the stage of commercialization, but many practical QKD systems
still suffer from security loopholes due to imperfect devices. In fact,
practical attacks have successfully been demonstrated. Fortunately, most of
them only exploit detection-side loopholes which are now closed by the recent
idea of measurement-device-independent QKD. On the other hand, little attention
is paid to the source which may still leave QKD systems insecure. In this work,
we propose and demonstrate an attack that exploits a source-side loophole
existing in qubit-based QKD systems using a weak coherent state source and
decoy states. Specifically, by implementing a linear-optics
unambiguous-state-discrimination measurement, we show that the security of a
system without phase randomization --- which is a step assumed in conventional
security analyses but sometimes neglected in practice --- can be compromised.
We conclude that implementing phase randomization is essential to the security
of decoy-state QKD systems under current security analyses.Comment: 12 pages, 5 figure
- …