5,032 research outputs found

    Closed-loop control of complex networks : A trade-off between time and energy

    Get PDF
    W. L. is supported by the National Science Foundation of China (NSFC) (Grants No. 11322111 and No. 61773125). Y.-Z. S. is supported by the NSFC (Grant No. 61403393). Y.-C. L. acknowledges support from the Vannevar Bush Faculty Fellowship program sponsored by the Basic Research Office of the Assistant Secretary of Defense for Research and Engineering and funded by the Office of Naval Research through Grant No. N00014-16-1-2828. Y.-Z. S. and S.-Y. L. contributed equally to this work.Peer reviewedPublisher PD

    Performance improvement of the LM device and its application to precise measurement of motion trajectories within a small range with a machining centre

    No full text
    In order to apply the LM device previously developed to precisely measuring small motion trajectories located on the different motion planes, three major improvements are successfully performed under the condition of completely maintaining the advantages of the device. These improvements include 1) development of a novel connection mechanism to smoothly attach the device to the spindle of a machining centre; 2) employment of a new data sampling method to achieve a high sampling frequency independent of the operating system of the control computer; and 3) proposal of a set-up method to conveniently install the device on the test machining centre with respect to different motion planes. Practical measurement experiment results with the improved device on a machining centre sufficiently demonstrate the effectiveness of the improvements and confirm several features including a very good response to small displacement close to the resolution of the device, high precision, repeatability and reliance. Moreover, based on the measurement results for a number of trajectories for a wide range of motion conditions, the error characteristics of small size motions are systematically discussed and the effect of the movement size and feed rate on the motion accuracy is verified for the machining centre tested

    How people react to the ‘also recommended’ section of online stores

    Get PDF
    Retailers can take advantage of recommendation networks to drive product demand, write Zhijie Lin, Khim-Yong Goh and Cheng-Suang Hen

    Ceria–terbia solid solution nanobelts with high catalytic activities for CO oxidation

    Get PDF
    Ceria–terbia solid solution nanobelts were prepared by an electrochemical route and tested as catalysts of high activity for CO oxidation

    Dynamic generation or removal of a scalar hair

    Full text link
    We study dynamic processes through which the scalar hair of black holes is generated or detached in a theory with a scalar field non-minimally coupled to Gauss-Bonnet and Ricci scalar invariants. We concentrate on the nonlinear temporal evolution of a far-from-equilibrium gravitational system. In our simulations, we choose the initial spacetime to be either a bald Schwarzschild or a scalarized spherically symmetric black hole. Succeeding continuous accretion of the scalar field onto the original black hole, the final fate of the system displays intriguing features, which depend on the initial configurations, strengths of the perturbation, and specific metric parameters. In addition to the scalarization process through which the bald black hole addresses scalar hair, we observe the dynamical descalarization, which removes scalar hair from an original hairy hole after continuous scalar field accretion. We examine the temporal evolution of the scalar field, the metrics, and the Misner-Sharp mass of the spacetime and exhibit rich phase structures through nonlinear dynamical processes.Comment: 22 pages, 11 figure

    Source attack of decoy-state quantum key distribution using phase information

    Get PDF
    Quantum key distribution (QKD) utilizes the laws of quantum mechanics to achieve information-theoretically secure key generation. This field is now approaching the stage of commercialization, but many practical QKD systems still suffer from security loopholes due to imperfect devices. In fact, practical attacks have successfully been demonstrated. Fortunately, most of them only exploit detection-side loopholes which are now closed by the recent idea of measurement-device-independent QKD. On the other hand, little attention is paid to the source which may still leave QKD systems insecure. In this work, we propose and demonstrate an attack that exploits a source-side loophole existing in qubit-based QKD systems using a weak coherent state source and decoy states. Specifically, by implementing a linear-optics unambiguous-state-discrimination measurement, we show that the security of a system without phase randomization --- which is a step assumed in conventional security analyses but sometimes neglected in practice --- can be compromised. We conclude that implementing phase randomization is essential to the security of decoy-state QKD systems under current security analyses.Comment: 12 pages, 5 figure
    corecore