8,054 research outputs found

    The Framing of China\u27s Bird Flu Epidemic by U.S. Newspapers Influencial in China: How the New York Times and The Washington Post Linked the Image of the Nation to the Handling of the Disease

    Get PDF
    This study conducted a framing research that analyzed coverage of the bird flu (avian flu) in China by two major American newspapers that are influential in China (The New York Times and Washington Post). The goal was to examine how these two prestigious newspapers frame the bird flu epidemic in China and how they represent the country in this international health crisis. This study employed textual analysis regarding the way bird flu news articles were framed in terms of problem definition, causal explanation, moral evaluation and solution recommendations in both newspapers. The study found the epidemic was framed as more than just a public health crisis. Multiple news frames were found in both newspapers\u27 coverage of bird flu, depicting the event as a cultural, social and political crisis to the nation and to the world

    Application of Variational Iteration Method for Dropping Damage Evaluation of the Suspension Spring Packaging System

    Get PDF
    The dropping damage evaluation for packaging system is essential for safe transportation and storage. A dynamic model of nonlinear cubic-quintic Duffing oscillator for the suspension spring packaging system was proposed. Then, a first-order approximate solution was obtained by applying Heā€™s variable iteration method. Based on the results, a damage evaluation equation was derived, which reveals the main controlling physical parameters for damage potential of drop to packaged products concretely. Finally, the dropping damage boundary curves and surfaces for the system were discussed. It was found that decreasing the suspension angle can improve the safe region of the system

    Generalized L\"uscher's Formula in Multichannel Baryon-Baryon Scattering

    Full text link
    In this paper, L\"uscher's formula is generalized to the case of two spin-12\frac{1}{2} particles in two-channel scattering based on Ref. \cite{Li:2012bi}. This is first done in a non-relativistic quantum mechanics model and then generalized to quantum field theory. We show that L\"uscher's formula obtained from these two different methods are equivalent up to terms that are exponentially suppressed in the box size. This formalism can be readily applied to future lattice QCD calculations.Comment: Introduction expanded and references added. 10 pages, no figure

    Shape memory alloy actuated adaptive exhaust nozzle for jet engine

    Get PDF
    The proposed adaptive exhaust nozzle features an innovative use of the shape memory alloy (SMA) actuators for actively control of the opening area of the exhaust nozzle for jet engines. The SMA actuators remotely control the opening area of the exhaust nozzle through a set of mechanism. An important advantage of using SMA actuators is the reduction of weight of the actuator system for variable area exhaust nozzle. Another advantage is that the SMA actuator can be activated using the heat from the exhaust and eliminate the need of other energy source. A prototype has been designed and fabricated. The functionality of the proposed SMA actuated adaptive exhaust nozzle is verified in the open-loop tests

    The Photosynthetic Characteristics of Wild <em>Cymbidium faberi</em> in the Qinling Mountains of Central China

    Get PDF
    The large flowers of orchids make them popular as cultivated plants. Seven species of orchids in the genus Cymbidium (Orchidaceae) have been crossbred to create more than 220 hybrids that serve as popular cultivated ornamentals. The present study examined the daily variation in the patterns of the net photosynthetic rate and the photosynthetic response of wild Cymbidium faberi in the Qinling Mountains in northwestern China. The photosynthetic characteristics of this species were studied under natural conditions with a portable photosynthesis system. Double peaks were observed in the net photosynthetic rate with one around 09:00 and another around 17:00Ā in spring, as well as one around 11:00 and another around 15:00Ā in winter. Midday depression of photosynthesis was observed in wild C. faberi plants around 13:00Ā in both spring and winter. The net photosynthetic rate was strongly positively correlated with both stomatal conductance (RĀ =Ā 0.913) and the transpiration rate (RĀ =Ā 0.659) and weakly negatively correlated with the intercellular carbon dioxide concentration (RĀ =Ā āˆ’0.094). The results show that the light compensation point (LCP) and the light saturation point (LSP) of wild C. faberi were 25.78 and 384Ā Ī¼mol māˆ’2 sāˆ’1, respectively. The result provides reference for cultivation management especially in light management of Cymbidium

    Stealth Majorana Zero Mode in a Trilayer Heterostructure MnTe/Bi2Te3/Fe(Te,Se)

    Full text link
    Recent experiment reported the robust zero-energy states with strange properties in a trilayer heterostructure MnTe/Bi2Te3/Fe(Te,Se). Here, we give comprehensive understandings about the magnetic and electronic properties of the heterostructure, and propose ferromagnetic Mn-Bi antisite defects are generated in the topmost sublayer of Bi2Te3 and hidden below the MnTe layer. We further reveal the defect can induce two types of quasiparticles. One is Yu-Shiba-Rusinov state from defect itself, and another is Majorana zero mode from the superconducting phase domain wall induced by the defect. The two types of quasiparticles have very different response to magnetic field, temperature etc. The coexistence and mutual cooperation of both can explain experimental observations. Furthermore, we propose more simple heterostructure with superiority to generate and finely modulate Majorana zero modes.Comment: 6+10 pages,3+8 figure

    On the Anonymity of Identity-Based Encryption

    Get PDF
    Anonymity of identity-based encryption (IBE) means that given a ciphertext, one cannot distinguish the target identity from a random identity. In this paper, we thoroughly discuss the anonymity of IBE systems. We found that the current definition of anonymity is obscure to describe some IBE systems, such as Gentry IBE system. Furthermore, current definition cannot express the degree of anonymity. So we divide the degree of anonymity into weak anonymity and strong anonymity based on indistinguishability between different games. For weakly anonymous IBE systems, the target identity in a ciphertext cannot be distinguished from a random identity. For strongly anonymous IBE systems, the whole ciphertext cannot be distinguished from a random tuple. We also discuss the type of anonymity and divide it into two types. Type 1 means that a random tuple can be seen as a valid ciphertext, while type 2 cannot. Based on our new definitions, we show that three famous IBE systems, Gentry IBE system, Boyen-Waters IBE system, and Lewko IBE system, have strong but different types of anonymity
    • ā€¦
    corecore