The introduction of topological invariants, ranging from insulators to metals, has provided new insights into the traditional classification of electronic states in condensed matter physics. A sudden change in the top...
详细信息
The introduction of topological invariants, ranging from insulators to metals, has provided new insights into the traditional classification of electronic states in condensed matter physics. A sudden change in the topological invariant at the boundaw of a topological nontrivial system leads to the formation of exotic surface states that are dramatically different from its bulk. In recent years, significant advancements in the exploration of the physical properties of these topological systems and regarding device research related to spintronics and quantum computation have been made. Here, we review the progress of the characterization and manipulation of topological phases from the electron transport perspective and also the intriguing chiral/Majorana states that stem from them. We then discuss the future directions of research into these topological states and their potential applications.
Developing radical emission at ambient conditions is a challenging task since radical species are unstable in air. In the present work, we overcome this challenge by coassembling a series of tricarbonyl-substituted be...
详细信息
Developing radical emission at ambient conditions is a challenging task since radical species are unstable in air. In the present work, we overcome this challenge by coassembling a series of tricarbonyl-substituted benzene molecules with polyvinyl alcohol (PVA). The strong hydrogen bonds between the guest dopants and the PVA host matrix protect the free radicals of carbonyl compounds after light irradiation, leading to strong solid state free radical emission. Changing temperature and peripheral functional groups of the tricarbonyl-substituted benzenes can influence the intensity of the radical emission. Quantum-chemical calculations predict that such free radical fluorescence originates from anti-Kasha D 2 →D 0 vertical emission by the anion radicals. The photoinduced radical emission by the tricarbonyl-substituted benzenes was successfully utilized for information encryption application.
IP geolocation technology can be used to obtain the real-time locations of target Internet hosts especially mobile computers, which can help law enforcement to quickly get the criminal evidence or arrest criminals. Am...
详细信息
A novel method of coupled SPH with smoothed point interpolation method (S-PIM) has been employed to simulate the 2-D problem of liquid sloshing with multiple flexible baffles. In this simulation, the exciting force en...
详细信息
Traffic congestion problem has become a bottleneck restricting the development of modern transportation systems, and accordingly the networked traffic system has drawn lots of researcher's attention. To enhance tr...
详细信息
ISBN:
(纸本)9781510868755
Traffic congestion problem has become a bottleneck restricting the development of modern transportation systems, and accordingly the networked traffic system has drawn lots of researcher's attention. To enhance transportation efficiency on scale-free networks, we proposed a hybridinformation-based(HIB) queuing strategy, where one packet's priority is related to its available transmission resource in the surplus path and current distance to destination. Numerical results show that the HIB queuing strategy perform much better than the traditional first-in-first-out(FIFO) queuing strategy in the congestion state, and the average travelling time, the rate of waiting time to travelling time Pwt and the packet arrived rate which can reflect transportation efficiency are improved remarkably. Our work should be valuable and helpful for research on networked traffic systems.
In order to improve the transmission efficiency, security and anonymity of Tor anonymous communication system, this paper analyzes the efficiency of Tor anonymous system through research and analysis of the security a...
详细信息
In order to improve the transmission efficiency, security and anonymity of Tor anonymous communication system, this paper analyzes the efficiency of Tor anonymous system through research and analysis of the security and vulnerability of transmission mechanism, encryption rules and node distribution of Tor anonymous network system, and then proposes an efficient improved model EFTAN for Tor anonymous network, and finally obtains a network system that can improve the efficiency, security and anonymity of the anonymous communication.
With the widespread application of embedded devices,embedded software vulnerabilities and oriented attacks to embedded system are also *** being wellknown,the hardware architecture of the embedded devices is heterogen...
详细信息
With the widespread application of embedded devices,embedded software vulnerabilities and oriented attacks to embedded system are also *** being wellknown,the hardware architecture of the embedded devices is heterogeneous,and the software stacks on them are customizable and flexible as *** dynamic information extraction and analysis technologies have been successfully used for general platform in vulnerability mining,malicious code detection and so on,its usage on embedded system lags behind *** paper provides(1) a CrossPlatform-Dynamic Instrumentation Framework,which,by leveraging an extensible intermediate code module and a semantic constraint database,decouples the instrumentation plugins from underlying hardware and OS;(2) a set of instrumentation interfaces which may be implemented by plugins to extract runtime state of various code granularity;(3) ability of system semantic introspection to extract processes and modules information(system semantic views),by using system attribute description files and abstract state extraction *** with TEMU and DECAF,our method shows more advantages in performance of abstract state extraction,and reducing the time and memory overhead.
The virtual block device is the data carrier of virtual machine(VM) and user information,while the file system is the ultimate goal of many *** proposed a security device named virtual block device mapping to file(VBD...
详细信息
The virtual block device is the data carrier of virtual machine(VM) and user information,while the file system is the ultimate goal of many *** proposed a security device named virtual block device mapping to file(VBD-MF) that can translate block-level operations into file-level ones by building a mapping from blocks to ***-MF could provide an out-of-VM way to monitor the file system with no modification on the code of virtual machine monitor(VMM)and guest OS,and it also provided other security tools and methods with direct interface to operate the file *** implemented a prototype on Linux and *** evaluation shows that VBD-MF has a better capability of monitoring with some loss on performance of read and *** to the traditional monitoring of host-based file system,VBD-MF has a better hidden and safety property.
Program logical controllers(PLCs) are the kernel equipment of industrial control system(ICS) as they directly monitor and control industrial processes. Recently, ICS is suffering from various cyber th
ISBN:
(纸本)9781467389808
Program logical controllers(PLCs) are the kernel equipment of industrial control system(ICS) as they directly monitor and control industrial processes. Recently, ICS is suffering from various cyber th
A periodic load balancing method is proposed according to the load imbalance of network server in a clustered system of high concurrency. It is divided into different load periods based on the load condition of server...
详细信息
A periodic load balancing method is proposed according to the load imbalance of network server in a clustered system of high concurrency. It is divided into different load periods based on the load condition of server node. Corresponding load balancing strategy is adopted for each period that the strategy of fast select is used in the period of small load while the server node with stable response time is first adopted in the period of large load. Periodic load strategy avoids the load imbalance caused by the single load strategy. It can be known from the experimental comparison that the improved periodic load balancing strategy is superior to the load balancing strategy of weighted least connection.
暂无评论