5,001 research outputs found

    Conceptual kinematic design and performance evaluation of a chameleon-like service robot for space stations

    Get PDF
    In this paper a conceptual kinematic design of a chameleon-like robot with proper mobility capacity is presented for service applications in space stations as result of design considerations with biomimetic inspiration by looking at chameleons. Requirements and characteristics are discussed with the aim to identify design problems and operation features. A study of feasibility is described through performance evaluation by using simulations for a basic operation characterization

    A statistical evaluation model for driver-bus-route combinatorial optimization

    Get PDF

    Studies towards the Total Asymmetric Synthesis of the Pentacyclic Indole Alkaloid Arboflorine: Asymmetric Synthesis of a Key Intermediate

    Get PDF
    The synthesis of a plausible key intermediate for a biomimetic asymmetric synthesis of indole alkaloid arboflorine is described. The method featured the use of Ellman's sulfinamide chemistry for the establishment of the first chiral center, and the Polonovski-Potier reaction for the formation of the alpha-aminonitrile moiety.NSF of China[20832005]; NFFTBS[J1030415]; National Basic Research Program (973 Program) of China[2010CB833200

    Linearly and Circularly Polarized Emission in Sagittarius A*

    Full text link
    We perform general relativistic ray-tracing calculations of the transfer of polarized synchrotron radiation through the relativistic accretion flow in Sagittarius (Sgr) A*. Based on a two-temperature magneto-rotational-instability (MRI) induced accretion mode, the birefringence effects are treated self-consistently. By fitting the spectrum and polarization of Sgr A* from millimeter to near-infrared bands, we are able to not only constrain the basic parameters related to the MRI and the electron heating rate, but also limit the orientation of the accretion torus. These constraints lead to unique polarimetric images, which may be compared with future millimeter and sub-millimeter VLBI observations. In combination with general relativistic MHD simulations, the model has the potential to test the MRI with observations of Sgr A*.Comment: 12 pages, 2 figures, ApJL accepte

    Mid-late Holocene temperature and precipitation variations in the Guanting Basin, upper reaches of the Yellow River

    Get PDF
    The reconstruction of prehistoric temperature and precipitation variations in the upper reaches of the Yellow River is essential for understanding the cultural evolution of the region, but related information is sparse due to the limitations of the available proxies. Recent studies have shown that microbial glycerol dialkyl glycerol tetraethers (GDGTs) are promising tools for reconstructing mean annual temperature (MAT) and mean annual precipitation (MAP) in terrestrial deposits. In this study, we reconstructed mid-late Holocene climatic changes using GDGT distributions in a loess-paleosol sequence in the Lajia Ruins of the Neolithic Qijia Culture, Guanting Basin, in the southwestern end of the Chinese Loess Plateau. Our GDGT records show that MAP decreased from ca. 600 mm to 430 mm, while MAT decreased from 11.9 degrees C to 8.0 degrees C, during the past ca. 7000 yr, and a drastic decline in MAP (70 mm), accompanied by a 0.8 degrees C decline in MAT, occurred at 3800-3400 yr BP. Our results provide direct evidence supporting a hypothesis that the flourishing (4200-4000 yr BP) and decline (4000-3600 yr BP) of the Qijia culture (mainly based on millets cultivation) and subsequent rise of the Xindian/Kayue culture (3600-2600 yr BP), based on mixed agriculture of sheep husbandry and millets cultivation were triggered by climate change

    An inventory of invasive alien species in China

    Get PDF
    Invasive alien species (IAS) are a major global challenge requiring urgent action, and the Strategic Plan for Biodiversity (2011–2020) of the Convention on Biological Diversity (CBD) includes a target on the issue. Meeting the target requires an understanding of invasion patterns. However, national or regional analyses of invasions are limited to developed countries. We identified 488 IAS in China’s terrestrial habitats, inland waters and marine ecosystems based on available literature and field work, including 171 animals, 265 plants, 26 fungi, 3 protists, 11 procaryots, and 12 viruses. Terrestrial plants account for 51.6% of the total number of IAS, and terrestrial invertebrates (104 species) for 21.3%. Of the total numbers, 67.9% of plant IAS and 34.8% of animal IAS were introduced intentionally. All other taxa were introduced unintentionally despite very few animal and plant species that invaded naturally. In terms of habitats, 64.3% of IAS occur on farmlands, 13.9% in forests, 8.4% in marine ecosystems, 7.3% in inland waters, and 6.1% in residential areas. Half of all IAS (51.1%) originate from North and South America, 18.3% from Europe, 17.3% from Asia not including China, 7.2% from Africa, 1.8% from Oceania, and the origin of the remaining 4.3% IAS is unknown. The distribution of IAS can be divided into three zones. Most IAS are distributed in coastal provinces and the Yunnan province; provinces in Middle China have fewer IAS, and most provinces in West China have the least number of IAS. Sites where IAS were first detected are mainly distributed in the coastal region, the Yunnan Province and the Xinjiang Uyghur Autonomous Region. The number of newly emerged IAS has been increasing since 1850. The cumulative number of firstly detected IAS grew exponentially

    Measurement-device-independent quantum key distribution over untrustful metropolitan network

    Full text link
    Quantum cryptography holds the promise to establish an information-theoretically secure global network. All field tests of metropolitan-scale quantum networks to date are based on trusted relays. The security critically relies on the accountability of the trusted relays, which will break down if the relay is dishonest or compromised. Here, we construct a measurement-device-independent quantum key distribution (MDIQKD) network in a star topology over a 200 square kilometers metropolitan area, which is secure against untrustful relays and against all detection attacks. In the field test, our system continuously runs through one week with a secure key rate ten times larger than previous result. Our results demonstrate that the MDIQKD network, combining the best of both worlds --- security and practicality, constitutes an appealing solution to secure metropolitan communications.Comment: 17 pages, 4 figure

    Entropy of entangled three-level atoms interacting with entangled cavity fields: entanglement swapping

    Full text link
    The dynamics of an entangled atomic system in a partial interaction with entangled cavity fields, characterizing an entanglement swapping, have been studied through the use of Von Neuman entropy. We consider the interaction via two-photon process given by a full microscopical Hamiltonian approach. The explicit expression of the entropy is obtained, wherewith we estimated the largest period. The numerical simulation of the entropy of the entangled atomic and cavity systems shows that its time evolution presents multi-periodicity. The effects of detuning parameter on the period and the amplitude of the entropy are also discussed.Comment: 5 pages, 8 figure

    Protecting Data Privacy for Mobile Payments Under the Chinese Law: Comparative Perspectives and Reform Suggestions

    Get PDF
    China has become one of the largest mobile payment markets in the world. While mobile payments bring great benefits such as convenience, flexibility, and efficiency, they are not without risks. This article focuses on one of the major risks, namely the data privacy risk, which is in large part caused and exacerbated by the involvement of multiple players and the extensive collection of personal information. There were some difficulties in protecting data privacy under the traditional legal framework, which was developed in a piecemeal manner with relevant provisions scattered around many different laws. In response, China has been trying to consolidate and modernise its regulatory regime for data privacy to suit the needs of the new digital era. Over the past few years, China has made great efforts to enact new laws and regulations to delineate the scope of personal information, introduce the obligations for data controllers and processors, and incorporate the principles of the Fair Information Practices. However, there are some remaining concerns, including the ineffective requirements of consent and disclosure, the ambiguous principle of purpose limitation, and the limited applicability of the principle of data minimisation. In a quest for a more effective solution to meet the regulatory challenge and strike a proper balance between privacy protection and technological innovation, a comparative analysis is conducted with several other major jurisdictions in this area, including the United States, the European Union, Singapore and Hong Kong. This article proposes that China should 1) improve the requirements of consent and disclosure; 2) strengthen the application of the principles of purpose limitation and data minimization; 3) enact a specific law for data protection; 4) establish a unified law enforcement agency, a 5) enhance private and public enforcement
    corecore