WorldWideScience

Sample records for asynchronous multiparty computation

  1. Asynchronous Multiparty Computation

    DEFF Research Database (Denmark)

    Damgård, Ivan Bjerre; Geisler, Martin; Krøigaard, Mikkel;

    2009-01-01

    less than n/3 players. We also present a software framework for implementation of asynchronous protocols called VIFF (Virtual Ideal Functionality Framework), which allows automatic parallelization of primitive operations such as secure multiplications, without having to resort to complicated...

  2. Asynchronous Multi-Party Computation with Quadratic Communication

    DEFF Research Database (Denmark)

    Hirt, Martin; Nielsen, Jesper Buus; Przydatek, Bartosz

    2008-01-01

    We present an efficient protocol for secure multi-party computation in the asynchronous model with optimal resilience. For n parties, up to t < n/3 of them being corrupted, and security parameter κ, a circuit with c gates can be securely computed with communication complexity O(cn^2k) bits, which...

  3. Batch Secret Sharing for Secure Multi-party Computation in Asynchronous Network

    Institute of Scientific and Technical Information of China (English)

    HUANG Zheng; GONG Zheng; LI Qiang

    2009-01-01

    This paper proposes an efficient batch secret sharing protocol among n players resilient to t < n/4 players in asynchronous network. The construction of our protocol is along the line of Hirt's protocol which works in synchronous model. Compared with the method of using secret share protocol m times to share m secrets, our protocol is quite efficient. The protocol can be used to improve the efficiency of secure multi-party computation (MPC) greatly in asynchronous network.

  4. Multiparty Computations

    DEFF Research Database (Denmark)

    Dziembowski, Stefan

    In this thesis we study a problem of doing Verifiable Secret Sharing (VSS) and Multiparty Computations in a model where private channels between the players and a broadcast channel is available. The adversary is active, adaptive and has an unbounded computing power. The thesis is based on two...... an impossibility result indicating that a similar equivalence does not hold for Multiparty Computation (MPC): we show that even if protocols are given black-box access for free to an idealized secret sharing scheme secure for the access structure in question, it is not possible to handle all relevant access...... adversary structure. We propose new VSS and MPC protocols that are substantially more efficient than the ones previously known. Another contribution of [2] is an attack against a Weak Secret Sharing Protocol (WSS) of [3]. The attack exploits the fact that the adversary is adaptive. We present this attack...

  5. Secure multiparty computation goes live

    DEFF Research Database (Denmark)

    Bogetoft, Peter; Christensen, Dan Lund; Damgård, Ivan Bjerre;

    2009-01-01

    In this note, we report on the first large-scale and practical application of secure multiparty computation, which took place in January 2008. We also report on the novel cryptographic protocols that were used. This work was supported by the Danish Strategic Research Council and the European...

  6. Efficient Multi-Party Computation over Rings

    DEFF Research Database (Denmark)

    Cramer, Ronald; Fehr, Serge; Ishai, Yuval;

    2003-01-01

    Secure multi-party computation (MPC) is an active research area, and a wide range of literature can be found nowadays suggesting improvements and generalizations of existing protocols in various directions. However, all current techniques for secure MPC apply to functions that are represented by ...

  7. Robust Multiparty Computation with Linear Communication Complexity

    DEFF Research Database (Denmark)

    Hirt, Martin; Nielsen, Jesper Buus

    2006-01-01

    We present a robust multiparty computation protocol. The protocol is for the cryptographic model with open channels and a poly-time adversary, and allows n parties to actively securely evaluate any poly-sized circuit with resilience t < n/2. The total communication complexity in bits over the poi...

  8. Scalable and Unconditionally Secure Multiparty Computation

    DEFF Research Database (Denmark)

    Damgård, Ivan Bjerre; Nielsen, Jesper Buus

    2007-01-01

    We present a multiparty computation protocol that is unconditionally secure against adaptive and active adversaries, with communication complexity O(Cn)k+O(Dn^2)k+poly(nk), where C is the number of gates in the circuit, n is the number of parties, k is the bit-length of the elements of the field...... over which the computation is carried out, D is the multiplicative depth of the circuit, and κ is the security parameter. The corruption threshold is t security the corruption threshold is t secure......, the protocol has so called everlasting security....

  9. Secure Multiparty Computation with Partial Fairness

    CERN Document Server

    Beimel, Amos; Orlov, Ilan

    2010-01-01

    A protocol for computing a functionality is secure if an adversary in this protocol cannot cause more harm than in an ideal computation where parties give their inputs to a trusted party which returns the output of the functionality to all parties. In particular, in the ideal model such computation is fair -- all parties get the output. Cleve (STOC 1986) proved that, in general, fairness is not possible without an honest majority. To overcome this impossibility, Gordon and Katz (Eurocrypt 2010) suggested a relaxed definition -- 1/p-secure computation -- which guarantees partial fairness. For two parties, they construct 1/p-secure protocols for functionalities for which the size of either their domain or their range is polynomial (in the security parameter). Gordon and Katz ask whether their results can be extended to multiparty protocols. We study 1/p-secure protocols in the multiparty setting for general functionalities. Our main result is constructions of 1/p-secure protocols when the number of parties is c...

  10. Zero-Knowledge Protocols and Multiparty Computation

    DEFF Research Database (Denmark)

    Pastro, Valerio

    on information-theoretic message authentication codes, requires only a linear amount of data from the preprocessing, and improves on the number of field multiplications needed to perform one secure multiplication (linear, instead of quadratic as in earlier work). The preprocessing phase in Chapter 5 comes......This thesis presents results in two branches of cryptography. In the first part we construct two general multiparty computation protocols that can evaluate any arithmetic circuit over a finite field. Both are built in the preprocessing model and achieve active security in the setting of a dishonest...... majority, in which all players but one are controlled by the adversary. In Chapter 5 we present both the preprocessing and the online phase of [DKL+ 13], while in Chapter 2 we describe only the preprocessing phase of [DPSZ12] since the combination of this preprocessing phase with the online phase of [DKL...

  11. Scalable Multiparty Computation with Nearly Optimal Work and Resilience

    DEFF Research Database (Denmark)

    Damgård, Ivan Bjerre; Krøigaard, Mikkel; Ishai, Yuval;

    2008-01-01

    We present the first general protocol for secure multiparty computation in which the total amount of work required by n players to compute a function f grows only polylogarithmically with n (ignoring an additive term that depends on n but not on the complexity of f). Moreover, the protocol is als...

  12. Secure data structures based on multi-party computation

    DEFF Research Database (Denmark)

    Toft, Tomas

    2011-01-01

    This work considers data structures based on multi-party computation (MPC) primitives: structuring secret (e.g. secret shared and potentially unknown) data such that it can both be queried and updated efficiently. Implementing an oblivious RAM (ORAM) using MPC allows any existing data structure...

  13. Peer-to-Peer Secure Multi-Party Numerical Computation

    CERN Document Server

    Bickson, Danny; Dolev, Danny; Pinkas, Benny

    2008-01-01

    We propose an efficient framework for enabling secure multi-party numerical computations in a Peer-to-Peer network. This problem arises in a range of applications such as collaborative filtering, distributed computation of trust and reputation, monitoring and numerous other tasks, where the computing nodes would like to preserve the privacy of their inputs while performing a joint computation of a certain function. Although there is a rich literature in the field of distributed systems security concerning secure multi-party computation, in practice it is hard to deploy those methods in very large scale Peer-to-Peer networks. In this work, we examine several possible approaches and discuss their feasibility. Among the possible approaches, we identify a single approach which is both scalable and theoretically secure. An additional novel contribution is that we show how to compute the neighborhood based collaborative filtering, a state-of-the-art collaborative filtering algorithm, winner of the Netflix progress ...

  14. A Domain-Specific Programming Language for Secure Multiparty Computation

    DEFF Research Database (Denmark)

    Nielsen, Janus Dam; Schwartzbach, Michael Ignatieff

    2007-01-01

    We present a domain-specific programming language for Secure Multiparty Computation (SMC). Information is a resource of vital importance and considerable economic value to individuals, public administration, and private companies. This means that the confidentiality of information is crucial......, but at the same time significant value can often be obtained by combining confidential information from various sources. This fundamental conflict between the benefits of confidentiality and the benefits of information sharing may be overcome using the cryptographic method of SMC where computations are performed...

  15. Confidential benchmarking based on multiparty computation

    DEFF Research Database (Denmark)

    Damgård, Ivan Bjerre; Damgård, Kasper Lyneborg; Nielsen, Kurt;

    ' and the consultancy house's data stays confidential, the banks as clients learn nothing but the computed benchmarking score. In the concrete business application, the developed prototype help Danish banks to find the most efficient customers among a large and challenging group of agricultural customers with too much...... state during the computation. We ran the system with two servers doing the secure computation using a database with information on about 2500 users. Answers arrived in about 25 seconds....

  16. Secure multi-party computation solution to Yao's millionaires' problem based on set-inclusion

    Institute of Scientific and Technical Information of China (English)

    LI Shundong; DAI Yiqi; YOU Qiyou

    2005-01-01

    Secure multi-party computation is a focus of international cryptography in recent years. Protocols for Yao's millionaires' problem have become an important building block of many secure multi-party computation protocols. Their efficiency are crucial to the efficiency of many secure multi-party computation protocols. Unfortunately, known protocols for Yao's millionaires' problem have high computational complexity or communication complexity. In this study, based on the 1-out-of-m oblivious transfer and set-inclusion problem, we propose a new protocol to solve this problem. This new protocol is very efficient in terms of both computational and communication complexities. Its privacy-preserving property is also proved by simulation paradigm which is generally accepted in the study of secure multi-party computation. We also compare the information leakage of our new protocol and the known protocols.

  17. Two-Cloud-Servers-Assisted Secure Outsourcing Multiparty Computation

    Science.gov (United States)

    Wen, Qiaoyan; Zhang, Hua; Jin, Zhengping; Li, Wenmin

    2014-01-01

    We focus on how to securely outsource computation task to the cloud and propose a secure outsourcing multiparty computation protocol on lattice-based encrypted data in two-cloud-servers scenario. Our main idea is to transform the outsourced data respectively encrypted by different users' public keys to the ones that are encrypted by the same two private keys of the two assisted servers so that it is feasible to operate on the transformed ciphertexts to compute an encrypted result following the function to be computed. In order to keep the privacy of the result, the two servers cooperatively produce a custom-made result for each user that is authorized to get the result so that all authorized users can recover the desired result while other unauthorized ones including the two servers cannot. Compared with previous research, our protocol is completely noninteractive between any users, and both of the computation and the communication complexities of each user in our solution are independent of the computing function. PMID:24982949

  18. Two-cloud-servers-assisted secure outsourcing multiparty computation.

    Science.gov (United States)

    Sun, Yi; Wen, Qiaoyan; Zhang, Yudong; Zhang, Hua; Jin, Zhengping; Li, Wenmin

    2014-01-01

    We focus on how to securely outsource computation task to the cloud and propose a secure outsourcing multiparty computation protocol on lattice-based encrypted data in two-cloud-servers scenario. Our main idea is to transform the outsourced data respectively encrypted by different users' public keys to the ones that are encrypted by the same two private keys of the two assisted servers so that it is feasible to operate on the transformed ciphertexts to compute an encrypted result following the function to be computed. In order to keep the privacy of the result, the two servers cooperatively produce a custom-made result for each user that is authorized to get the result so that all authorized users can recover the desired result while other unauthorized ones including the two servers cannot. Compared with previous research, our protocol is completely noninteractive between any users, and both of the computation and the communication complexities of each user in our solution are independent of the computing function.

  19. Two-Cloud-Servers-Assisted Secure Outsourcing Multiparty Computation

    Directory of Open Access Journals (Sweden)

    Yi Sun

    2014-01-01

    Full Text Available We focus on how to securely outsource computation task to the cloud and propose a secure outsourcing multiparty computation protocol on lattice-based encrypted data in two-cloud-servers scenario. Our main idea is to transform the outsourced data respectively encrypted by different users’ public keys to the ones that are encrypted by the same two private keys of the two assisted servers so that it is feasible to operate on the transformed ciphertexts to compute an encrypted result following the function to be computed. In order to keep the privacy of the result, the two servers cooperatively produce a custom-made result for each user that is authorized to get the result so that all authorized users can recover the desired result while other unauthorized ones including the two servers cannot. Compared with previous research, our protocol is completely noninteractive between any users, and both of the computation and the communication complexities of each user in our solution are independent of the computing function.

  20. An Integrated Computational Model of Multiparty Electoral Competition

    NARCIS (Netherlands)

    Quinn, Kevin M.; Martin, Andrew D.

    2002-01-01

    Most theoretic models of multiparty electoral competition make the assumption that party leaders are motivated to maximize their vote share or seat share. In plurality-rule systems this is a sensible assumption. However, in proportional representation systems, this assumption is questionable since t

  1. (Unconditional) Secure Multiparty Computation with Man-in-the-middle Attacks

    CERN Document Server

    Vaya, Shailesh

    2010-01-01

    In secure multi-party computation $n$ parties jointly evaluate an $n$-variate function $f$ in the presence of an adversary which can corrupt up till $t$ parties. Almost all the works that have appeared in the literature so far assume the presence of authenticated channels between the parties. This assumption is far from realistic. Two directions of research have been borne from relaxing this (strong) assumption: (a) The adversary is virtually omnipotent and can control all the communication channels in the network, (b) Only a partially connected topology of authenticated channels is guaranteed and adversary controls a subset of the communication channels in the network. This work introduces a new setting for (unconditional) secure multiparty computation problem which is an interesting intermediate model with respect to the above well studied models from the literature (by sharing a salient feature from both the above models). We consider the problem of (unconditional) secure multi-party computation when 'some...

  2. Peer-to-Peer Secure Multi-Party Numerical Computation Facing Malicious Adversaries

    CERN Document Server

    Bickson, Danny; Dolev, Danny; Pinkas, Benny

    2009-01-01

    We propose an efficient framework for enabling secure multi-party numerical computations in a Peer-to-Peer network. This problem arises in a range of applications such as collaborative filtering, distributed computation of trust and reputation, monitoring and other tasks, where the computing nodes is expected to preserve the privacy of their inputs while performing a joint computation of a certain function. Although there is a rich literature in the field of distributed systems security concerning secure multi-party computation, in practice it is hard to deploy those methods in very large scale Peer-to-Peer networks. In this work, we try to bridge the gap between theoretical algorithms in the security domain, and a practical Peer-to-Peer deployment. We consider two security models. The first is the semi-honest model where peers correctly follow the protocol, but try to reveal private information. We provide three possible schemes for secure multi-party numerical computation for this model and identify a singl...

  3. A secure multi-party computation solution to intersection problems of sets and rectangles

    Institute of Scientific and Technical Information of China (English)

    LI Shundong; DAI Yiqi; WANG Daoshun; LUO Ping

    2006-01-01

    Secure multi-party computation (SMC) is a research focus in international cryptographic community. At present, there is no SMC solution to the intersection problem of sets. In this paper, we first propose a SMC solution to this problem. Applying Cantor encoding method to computational geometry problems, and based on the solution to set-intersection problem, we further propose solutions to points inclusion problem and intersection problem of rectangles and further prove their privacy-preserving property with widely accepted simulation paradigm. Compared with the known solutions, these new solutions are of less computational complexity and less communication complexity, and have obvious superiority in computational and communication complexity.

  4. High-performance secure multi-party computation for data mining applications

    DEFF Research Database (Denmark)

    Bogdanov, Dan; Niitsoo, Margus; Toft, Tomas;

    2012-01-01

    Secure multi-party computation (MPC) is a technique well suited for privacy-preserving data mining. Even with the recent progress in two-party computation techniques such as fully homomorphic encryption, general MPC remains relevant as it has shown promising performance metrics in real...... operations such as multiplication and comparison. Secondly, the confidential processing of financial data requires the use of more complex primitives, including a secure division operation. This paper describes new protocols in the Sharemind model for secure multiplication, share conversion, equality, bit...

  5. Experimental realization of an entanglement access network and secure multi-party computation.

    Science.gov (United States)

    Chang, X-Y; Deng, D-L; Yuan, X-X; Hou, P-Y; Huang, Y-Y; Duan, L-M

    2016-01-01

    To construct a quantum network with many end users, it is critical to have a cost-efficient way to distribute entanglement over different network ends. We demonstrate an entanglement access network, where the expensive resource, the entangled photon source at the telecom wavelength and the core communication channel, is shared by many end users. Using this cost-efficient entanglement access network, we report experimental demonstration of a secure multiparty computation protocol, the privacy-preserving secure sum problem, based on the network quantum cryptography. PMID:27404561

  6. Experimental realization of secure multi-party computation in an entanglement access to network

    CERN Document Server

    Chang, X Y; Yuan, X X; Hou, P Y; Huang, Y Y; Duan, L M

    2015-01-01

    To construct a quantum network with many end users, it is critical to have a cost-efficient way to distribute entanglement over different network ends. We demonstrate an entanglement access network, where the expensive resource, the entangled photon source at the telecom wavelength and the core communication channel, is shared by many end users. Using this cost-efficient entanglement access network, we report experimental demonstration of a secure multiparty computation protocol, the privacy-preserving secure sum problem, based on the network quantum cryptography.

  7. Experimental realization of an entanglement access network and secure multi-party computation

    Science.gov (United States)

    Chang, X.-Y.; Deng, D.-L.; Yuan, X.-X.; Hou, P.-Y.; Huang, Y.-Y.; Duan, L.-M.

    2016-07-01

    To construct a quantum network with many end users, it is critical to have a cost-efficient way to distribute entanglement over different network ends. We demonstrate an entanglement access network, where the expensive resource, the entangled photon source at the telecom wavelength and the core communication channel, is shared by many end users. Using this cost-efficient entanglement access network, we report experimental demonstration of a secure multiparty computation protocol, the privacy-preserving secure sum problem, based on the network quantum cryptography.

  8. Experimental realization of an entanglement access network and secure multi-party computation

    Science.gov (United States)

    Chang, X.-Y.; Deng, D.-L.; Yuan, X.-X.; Hou, P.-Y.; Huang, Y.-Y.; Duan, L.-M.

    2016-01-01

    To construct a quantum network with many end users, it is critical to have a cost-efficient way to distribute entanglement over different network ends. We demonstrate an entanglement access network, where the expensive resource, the entangled photon source at the telecom wavelength and the core communication channel, is shared by many end users. Using this cost-efficient entanglement access network, we report experimental demonstration of a secure multiparty computation protocol, the privacy-preserving secure sum problem, based on the network quantum cryptography. PMID:27404561

  9. Universally Composable Multiparty Computation with Partially Isolated Parties

    DEFF Research Database (Denmark)

    Damgård, Ivan Bjerre; Nielsen, Jesper Buus; Wichs, Daniel

    2009-01-01

    assume that a player (Alice) can partially isolate another player (Bob) for a brief portion of the computation and prevent Bob from communicating more than some limited number of bits with the environment. For example, isolation might be achieved by asking Bob to put his functionality on a tamper...... by all of the players. This compromise allows us to significantly limit the use of the physical set-up and hence might be preferred in practice....

  10. Quantum And Relativistic Protocols For Secure Multi-Party Computation

    CERN Document Server

    Colbeck, Roger

    2009-01-01

    After a general introduction, the thesis is divided into four parts. In the first, we discuss the task of coin tossing, principally in order to highlight the effect different physical theories have on security in a straightforward manner, but, also, to introduce a new protocol for non-relativistic strong coin tossing. This protocol matches the security of the best protocol known to date while using a conceptually different approach to achieve the task. In the second part variable bias coin tossing is introduced. This is a variant of coin tossing in which one party secretly chooses one of two biased coins to toss. It is shown that this can be achieved with unconditional security for a specified range of biases, and with cheat-evident security for any bias. We also discuss two further protocols which are conjectured to be unconditionally secure for any bias. The third section looks at other two-party secure computations for which, prior to our work, protocols and no-go theorems were unknown. We introduce a gene...

  11. Parking Query in Vehicular Delay-Tolerant Networks with Privacy Protection Based on Secure Multiparty Computation

    Directory of Open Access Journals (Sweden)

    Haiping Huang

    2015-01-01

    Full Text Available Within vehicular delay-tolerant network, conflict exists in the scenario of which two vehicles happen to choose the same parking space. To solve this problem, two protocols are proposed, respectively, which are called privacy protection protocol based on secure multiparty computation and routing protocol based on angle and density. The proposed methods prevent the leaking of privacy information of the vehicles involved during the parking space seeking process and improve the performance of the transmission ratio and reduce the transmission delay by unifying the directions of messages and choosing the vehicle of the highest distribution density as the next hop. The results of the simulation show the efficiency of our method.

  12. A Secure Multi-Party Computation Protocol for Malicious Computation Prevention for preserving privacy during Data Mining

    CERN Document Server

    Mishra, Dr Durgesh Kumar; Kapoor, Nikhil; Bahety, Ravish

    2009-01-01

    Secure Multi-Party Computation (SMC) allows parties with similar background to compute results upon their private data, minimizing the threat of disclosure. The exponential increase in sensitive data that needs to be passed upon networked computers and the stupendous growth of internet has precipitated vast opportunities for cooperative computation, where parties come together to facilitate computations and draw out conclusions that are mutually beneficial; at the same time aspiring to keep their private data secure. These computations are generally required to be done between competitors, who are obviously weary of each-others intentions. SMC caters not only to the needs of such parties but also provides plausible solutions to individual organizations for problems like privacy-preserving database query, privacy-preserving scientific computations, privacy-preserving intrusion detection and privacy-preserving data mining. This paper is an extension to a previously proposed protocol Encrytpo_Random, which prese...

  13. Buffered Communication Analysis in Distributed Multiparty Sessions

    Science.gov (United States)

    Deniélou, Pierre-Malo; Yoshida, Nobuko

    Many communication-centred systems today rely on asynchronous messaging among distributed peers to make efficient use of parallel execution and resource access. With such asynchrony, the communication buffers can happen to grow inconsiderately over time. This paper proposes a static verification methodology based on multiparty session types which can efficiently compute the upper bounds on buffer sizes. Our analysis relies on a uniform causality audit of the entire collaboration pattern - an examination that is not always possible from each end-point type. We extend this method to design algorithms that allocate communication channels in order to optimise the memory requirements of session executions. From these analyses, we propose two refinements methods which respect buffer bounds: a global protocol refinement that automatically inserts confirmation messages to guarantee stipulated buffer sizes and a local protocol refinement to optimise asynchronous messaging without buffer overflow. Finally our work is applied to overcome a buffer overflow problem of the multi-buffering algorithm.

  14. On the theoretical gap between synchronous and asynchronous MPC protocols

    DEFF Research Database (Denmark)

    Beerliová-Trubíniová, Zuzana; Hirt, Martin; Nielsen, Jesper Buus

    2010-01-01

    (perfect, statistical) have the same cause. We stress that all previous asynchronous MPC protocols inherently require t ...Multiparty computation (MPC) protocols among n parties secure against t active faults are known to exist if and only if t work we analyze the gap between these bounds, and show...

  15. Breaking the O(nm) Bit Barrier: Secure Multiparty Computation with a Static Adversary

    CERN Document Server

    Dani, Varsha; Movahedi, Mahnush; Saia, Jared

    2012-01-01

    We describe scalable algorithms for secure multiparty computation (SMPC). We assume a synchronous message passing communication model, but unlike most related work, we do not assume the existence of a broadcast channel. Our main result holds for the case where there are n players, of which a (1/3-\\epsilon)-fraction are controlled by an adversary, for \\epsilon, any positive constant. We describe a SMPC algorithm for this model that requires each player to send O((n+m)/n + \\sqrt{n}) (where the O notation hides polylogarithmic factors) messages and perform O((n+m)/n + \\sqrt{n}) computations to compute any function f, where m is the size of a circuit to compute f. We also consider a model where all players are selfish but rational. In this model, we describe a Nash equilibrium protocol that solve SMPC and requires each player to send O((n+m)/n) messages and perform O((n+m)/n) computations. These results significantly improve over past results for SMPC which require each player to send a number of bits and perform...

  16. Asynchronous replica exchange software for grid and heterogeneous computing

    Science.gov (United States)

    Gallicchio, Emilio; Xia, Junchao; Flynn, William F.; Zhang, Baofeng; Samlalsingh, Sade; Mentes, Ahmet; Levy, Ronald M.

    2015-11-01

    Parallel replica exchange sampling is an extended ensemble technique often used to accelerate the exploration of the conformational ensemble of atomistic molecular simulations of chemical systems. Inter-process communication and coordination requirements have historically discouraged the deployment of replica exchange on distributed and heterogeneous resources. Here we describe the architecture of a software (named ASyncRE) for performing asynchronous replica exchange molecular simulations on volunteered computing grids and heterogeneous high performance clusters. The asynchronous replica exchange algorithm on which the software is based avoids centralized synchronization steps and the need for direct communication between remote processes. It allows molecular dynamics threads to progress at different rates and enables parameter exchanges among arbitrary sets of replicas independently from other replicas. ASyncRE is written in Python following a modular design conducive to extensions to various replica exchange schemes and molecular dynamics engines. Applications of the software for the modeling of association equilibria of supramolecular and macromolecular complexes on BOINC campus computational grids and on the CPU/MIC heterogeneous hardware of the XSEDE Stampede supercomputer are illustrated. They show the ability of ASyncRE to utilize large grids of desktop computers running the Windows, MacOS, and/or Linux operating systems as well as collections of high performance heterogeneous hardware devices.

  17. Multiparty Equality Function Computation in Networks with Point-to-Point Links

    CERN Document Server

    Liang, Guanfeng

    2010-01-01

    In this report, we study the multiparty communication complexity problem of the multiparty equality function (MEQ): EQ(x_1,...,x_n) = 1 if x_1=...=x_n, and 0 otherwise. The input vector (x_1,...,x_n) is distributed among n>=2 nodes, with x_i known to node i, where x_i is chosen from the set {1,...,M}, for some integer M>0. Instead of the "number on the forehand" model, we consider a point-to-point communication model (similar to the message passing model), which we believe is more realistic in networking settings. We assume a synchronous fully connected network of n nodes, the node IDs (identifiers) are common knowledge. We assume that all point-to-point communication channels/links are private such that when a node transmits, only the designated recipient can receive the message. The identity of the sender is known to the recipient. We demonstrate that traditional techniques generalized from two-party communication complexity problem are not sufficient to obtain tight bounds under the point-to-point communic...

  18. An Approach for Privacy Preservation of Distributed Data in Peer-to-Peer Network using Multiparty Computation

    Directory of Open Access Journals (Sweden)

    Hemanta Kumar Bhuyan

    2011-07-01

    Full Text Available Use of technology for data collection and analysis has seen an unprecedented growth in the last couple of decades. Individuals and organizations generate huge amount of data through everyday activities. This data is either centralized for pattern identification or mined in a distributed fashion for efficient knowledge discovery and collaborative computation. This has raised serious concerns about privacy issues. The data mining community has responded to this challenge by developing a new breed of algorithms that are privacy preserving. The main objective of data mining is to extract the identified pattern for efficient knowledge discovery with centralized or decentralized collaborative computation. This paper focuses on developing secure computational model for preserving the privacy of the distributed data by performing multiparty computation in peer-to-peer network. However this approach requires that participating parties are attached to the coordinator of the peer-to-peer network through a specified path and maintain privacy by performing certain application specific computation on their local site. The computation is performed by taking the distributed data-set of a particular scenario through centralized and decentralized fashion.

  19. Students experiences with collaborative learning in asynchronous computer-supported collaborative learning environments.

    OpenAIRE

    Dewiyanti, Silvia; Brand-Gruwel, Saskia; Jochems, Wim; Broers, Nick

    2008-01-01

    Dewiyanti, S., Brand-Gruwel, S., Jochems, W., & Broers, N. (2007). Students experiences with collaborative learning in asynchronous computer-supported collaborative learning environments. Computers in Human Behavior, 23, 496-514.

  20. Integrating Asynchronous Digital Design Into the Computer Engineering Curriculum

    Science.gov (United States)

    Smith, S. C.; Al-Assadi, W. K.; Di, J.

    2010-01-01

    As demand increases for circuits with higher performance, higher complexity, and decreased feature size, asynchronous (clockless) paradigms will become more widely used in the semiconductor industry, as evidenced by the International Technology Roadmap for Semiconductors' (ITRS) prediction of a likely shift from synchronous to asynchronous design…

  1. Research and Application of Secure Multi-Party Computation%安全多方计算技术研究与应用

    Institute of Scientific and Technical Information of China (English)

    张卷美; 徐荣华

    2016-01-01

    认为同态密码的本质是通过密文运算,实现相对应的明文运算。基于同态密码、格理论密码,分别设计了安全多方计算协议,解决了安全两方线段求解直线相交问题和聚类分析中一种经常遇到的加权平均问题。认为目前安全多方计算的实际应用比较滞后,但随着其理论的不断成熟以及各种密码理论基础技术的不断发展,安全多方计算最终会为新时代下的信息安全提供服务。%The essence of homomorphic encryption is to realize the corresponding plaintext operation by calculating cipher text. In this paper, we propose some secure multi-party computation schemes based on homomorphic encryption and lattice theory. With these protocols, the secure two-party line segment intersection problem and weighted-average problem, which are often encountered when solving the problem of clustering analysis, are solved. Practical application of secure multi-party computation is lagging, but with the continuous development of its theory and various kinds of cryptography, secure multi-party computation wil increase information security in the future.

  2. Non-adaptive Measurement-based Quantum Computation and Multi-party Bell Inequalities

    CERN Document Server

    Hoban, Matty J; Loukopoulos, Klearchos; Browne, Dan E

    2010-01-01

    Quantum correlations exhibit behaviour that cannot be resolved with a local hidden variable picture of the world. In quantum information, they are also used as resources for information processing tasks, such as Measurement-based Quantum Computation (MQC). In MQC, universal quantum computation can be achieved via adaptive measurements on a suitable entangled resource state. In this paper, we look at a version of MQC in which we remove the adaptivity of measurements and aim to understand what computational abilities still remain in the resource. We show that there are explicit connections between this model of computation and the question of non-classicality in quantum correlations. We demonstrate this by focussing on deterministic computation of Boolean functions, in which natural generalisations of the Greenberger-Horne-Zeilinger (GHZ) paradox emerge; we then explore probabilistic computation, via which multipartite Bell Inequalities can be defined. We use this correspondence to define families of multi-part...

  3. Abstractions for asynchronous distributed computing with malicious players

    OpenAIRE

    Vukolic, Marko; Guerraoui, Rachid

    2009-01-01

    In modern distributed systems, failures are the norm rather than the exception. In many cases, these failures are not benign. Settings such as the Internet might incur malicious (also called Byzantine or arbitrary) behavior and asynchrony. As a result, and perhaps not surprisingly, research on asynchronous Byzantine fault-tolerant (BFT) distributed systems is flourishing. Tolerating arbitrary behavior and asynchrony calls for very sophisticated algorithms. This is in particular the case with ...

  4. An Examination of Computer Engineering Students' Perceptions about Asynchronous Discussion Forums

    Science.gov (United States)

    Ozyurt, Ozcan; Ozyurt, Hacer

    2013-01-01

    This study was conducted in order to reveal the usage profiles and perceptions of Asynchronous Discussion Forums (ADFs) of 126 computer engineering students from the Computer Engineering Department in a university in Turkey. By using a mixed methods research design both quantitative and qualitative data were collected and analyzed. Research…

  5. Unconditionally Secure Constant-Rounds Multi-party Computation for Equality, Comparison, Bits and Exponentiation

    DEFF Research Database (Denmark)

    Damgård, Ivan Bjerre; Nielsen, Jesper Buus; Toft, Tomas;

    2006-01-01

    We show that if a set of players hold shares of a value aFp for some prime p (where the set of shares is written [a] p ), it is possible to compute, in constant rounds and with unconditional security, sharings of the bits of a, i.e., compute sharings [a 0] p , ..., [a ℓ− − 1] p such that ℓ = ⌈ log2...... p ⌉, a 0,...,a l − 1 ∈ {0,1} and a = ∑ i = 0 ℓ− − 1 a i 2 i . Our protocol is secure against active adversaries and works for any linear secret sharing scheme with a multiplication protocol. The complexity of our protocol is (llogl) invocations of the multiplication protocol for the underlying...... secret sharing scheme, carried out in (1) rounds. This result immediately implies solutions to other long-standing open problems such as constant-rounds and unconditionally secure protocols for deciding whether a shared number is zero, comparing shared numbers, raising a shared number to a shared...

  6. A Model for Evaluating the Process of Learning in Asynchronous Computer Conferencing.

    Science.gov (United States)

    Schrire, Sarah

    2003-01-01

    Presents a qualitative multiple-case study of three online asynchronous computer conferences that were part of a doctoral program at Nova Southeastern University. Examines the learning process from the points of view of interaction, cognition, and discourse analysis and proposes a model for assessing sociocognitive processes in computer…

  7. Research Notes ~ Simulating the Computer Science Closed Laboratory in an Asynchronous Learning Network

    Directory of Open Access Journals (Sweden)

    Timothy Margush

    2002-10-01

    Full Text Available The quiz tool that is part of the WebCT package is used to provide an asynchronous simulation of a (synchronous closed laboratory experience to beginner computer science students. The technique suggested in this paper and which may be applied to other disciplines, offers students a guided path through an exploratory, discovery based learning experience.

  8. Computer Learner Corpora: Analysing Interlanguage Errors in Synchronous and Asynchronous Communication

    Science.gov (United States)

    MacDonald, Penny; Garcia-Carbonell, Amparo; Carot, Sierra, Jose Miguel

    2013-01-01

    This study focuses on the computer-aided analysis of interlanguage errors made by the participants in the telematic simulation IDEELS (Intercultural Dynamics in European Education through on-Line Simulation). The synchronous and asynchronous communication analysed was part of the MiLC Corpus, a multilingual learner corpus of texts written by…

  9. Evaluation of a Computer-Based, Asynchronous Activity on Student Learning of Leadership Concepts.

    Science.gov (United States)

    Boyd, Barry L.; Murphrey, Theresa Pesl

    2002-01-01

    Students taught leadership and ethics using asynchronous computer simulation (n=83) were compared with 113 taught conventionally. The treatment group performed better on questions written at the knowledge, comprehension, and analysis levels of Bloom's Taxonomy, regardless of learning mode preferences. (Contains 26 references.) (SK)

  10. THE ROLE OF OFFLINE METALANGUAGE TALK IN ASYNCHRONOUS COMPUTER-MEDIATED COMMUNICATION

    Directory of Open Access Journals (Sweden)

    Keiko Kitade

    2008-02-01

    Full Text Available In order to demonstrate how learners utilize the text-based asynchronous attributes of the Bulletin Board System, this study explored Japanese-as-a-second-language learners' metalanguage episodes (Swain & Lapkin, 1995, 1998 in offline verbal peer speech and online asynchronous discussions with their Japanese key pals. The findings suggest the crucial role of offline collaborative dialogue, the interactional modes in which the episodes occur, and the unique discourse structure of metalanguage episodes concerning online and offline interactions. A high score on the posttest also suggests the high retention of linguistic knowledge constructed through offline peer dialogue. In the offline mode, the learners were able to collaboratively construct knowledge with peers in the stipulated time, while simultaneously focusing on task content in the online interaction. The retrospective interviews and questionnaires reveal the factors that could affect the benefits of the asynchronous computer-mediated communication medium for language learning.

  11. Asynchronous P300 classification in a reactive brain-computer interface during an outlier detection task

    Science.gov (United States)

    Krumpe, Tanja; Walter, Carina; Rosenstiel, Wolfgang; Spüler, Martin

    2016-08-01

    Objective. In this study, the feasibility of detecting a P300 via an asynchronous classification mode in a reactive EEG-based brain-computer interface (BCI) was evaluated. The P300 is one of the most popular BCI control signals and therefore used in many applications, mostly for active communication purposes (e.g. P300 speller). As the majority of all systems work with a stimulus-locked mode of classification (synchronous), the field of applications is limited. A new approach needs to be applied in a setting in which a stimulus-locked classification cannot be used due to the fact that the presented stimuli cannot be controlled or predicted by the system. Approach. A continuous observation task requiring the detection of outliers was implemented to test such an approach. The study was divided into an offline and an online part. Main results. Both parts of the study revealed that an asynchronous detection of the P300 can successfully be used to detect single events with high specificity. It also revealed that no significant difference in performance was found between the synchronous and the asynchronous approach. Significance. The results encourage the use of an asynchronous classification approach in suitable applications without a potential loss in performance.

  12. Distance Based Asynchronous Recovery Approach In Mobile Computing Environment

    Directory of Open Access Journals (Sweden)

    Yogita Khatri,

    2012-06-01

    Full Text Available A mobile computing system is a distributed system in which at least one of the processes is mobile. They are constrained by lack of stable storage, low network bandwidth, mobility, frequent disconnection andlimited battery life. Checkpointing is one of the commonly used techniques to provide fault tolerance in mobile computing environment. In order to suit the mobile environment a distance based recovery schemeis proposed which is based on checkpointing and message logging. After the system recovers from failures, only the failed processes rollback and restart from their respective recent checkpoints, independent of the others. The salient feature of this scheme is to reduce the transfer and recovery cost. While the mobile host moves with in a specific range, recovery information is not moved and thus only be transferred nearby if the mobile host moves out of certain range.

  13. Tiling and Asynchronous Communication Optimizations for Stencil Computations

    KAUST Repository

    Malas, Tareq

    2015-12-07

    The importance of stencil-based algorithms in computational science has focused attention on optimized parallel implementations for multilevel cache-based processors. Temporal blocking schemes leverage the large bandwidth and low latency of caches to accelerate stencil updates and approach theoretical peak performance. A key ingredient is the reduction of data traffic across slow data paths, especially the main memory interface. Most of the established work concentrates on updating separate cache blocks per thread, which works on all types of shared memory systems, regardless of whether there is a shared cache among the cores. This approach is memory-bandwidth limited in several situations, where the cache space for each thread can be too small to provide sufficient in-cache data reuse. We introduce a generalized multi-dimensional intra-tile parallelization scheme for shared-cache multicore processors that results in a significant reduction of cache size requirements and shows a large saving in memory bandwidth usage compared to existing approaches. It also provides data access patterns that allow efficient hardware prefetching. Our parameterized thread groups concept provides a controllable trade-off between concurrency and memory usage, shifting the pressure between the memory interface and the Central Processing Unit (CPU).We also introduce efficient diamond tiling structure for both shared memory cache blocking and distributed memory relaxed-synchronization communication, demonstrated using one-dimensional domain decomposition. We describe the approach and our open-source testbed implementation details (called Girih), present performance results on contemporary Intel processors, and apply advanced performance modeling techniques to reconcile the observed performance with hardware capabilities. Furthermore, we conduct a comparison with the state-of-the-art stencil frameworks PLUTO and Pochoir in shared memory, using corner-case stencil operators. We study the

  14. Quantum secret sharing between multiparty and multiparty with entanglement swapping

    Institute of Scientific and Technical Information of China (English)

    2008-01-01

    A quantum secret sharing (QSS) protocol between multiparty and multiparty is proposed, based on Greenberger-Horne- Zeilinger (GHZ) state. The protocol utilizes quantum Fourier transform and entanglement swapping to achieve a high intrinsic efficiency and source capacity. Then, the security of this protocol against some possible eavesdropping strategies has been analyzed. Furthermore, the presented protocol is generalized to the d-level case.

  15. APFA: Asynchronous Parallel Finite Automaton for Deep Packet Inspection in Cloud Computing

    Science.gov (United States)

    Li, Yang; Li, Zheng; Yu, Nenghai; Ma, Ke

    Security in cloud computing is getting more and more important recently. Besides passive defense such as encryption, it is necessary to implement real-time active monitoring, detection and defense in the cloud. According to the published researches, DPI (deep packet inspection) is the most effective technology to realize active inspection and defense. However, most recent works of DPI aim at space reduction but could not meet the demands of high speed and stability in the cloud. So, it is important to improve regular methods of DPI, making it more suitable for cloud computing. In this paper, an asynchronous parallel finite automaton named APFA is proposed, by introducing the asynchronous parallelization and the heuristically forecast mechanism, which significantly decreases the time consumed in matching while still keeps reducing the memory required. What is more, APFA is immune to the overlapping problem so that the stability is also enhanced. The evaluation results show that APFA achieves higher stability, better performance on time and memory. In short, APFA is more suitable for cloud computing.

  16. Automatic analysis of multiparty meetings

    Indian Academy of Sciences (India)

    Steve Renals

    2011-10-01

    This paper is about the recognition and interpretation of multiparty meetings captured as audio, video and other signals. This is a challenging task since the meetings consist of spontaneous and conversational interactions between a number of participants: it is a multimodal, multiparty, multistream problem. We discuss the capture and annotation of the Augmented Multiparty Interaction (AMI) meeting corpus, the development of a meeting speech recognition system, and systems for the automatic segmentation, summarization and social processing of meetings, together with some example applications based on these systems.

  17. Asynchronous P300-based brain-computer interface to control a virtual environment: initial tests on end users.

    Science.gov (United States)

    Aloise, Fabio; Schettini, Francesca; Aricò, Pietro; Salinari, Serenella; Guger, Christoph; Rinsma, Johanna; Aiello, Marco; Mattia, Donatella; Cincotti, Febo

    2011-10-01

    Motor disability and/or ageing can prevent individuals from fully enjoying home facilities, thus worsening their quality of life. Advances in the field of accessible user interfaces for domotic appliances can represent a valuable way to improve the independence of these persons. An asynchronous P300-based Brain-Computer Interface (BCI) system was recently validated with the participation of healthy young volunteers for environmental control. In this study, the asynchronous P300-based BCI for the interaction with a virtual home environment was tested with the participation of potential end-users (clients of a Frisian home care organization) with limited autonomy due to ageing and/or motor disabilities. System testing revealed that the minimum number of stimulation sequences needed to achieve correct classification had a higher intra-subject variability in potential end-users with respect to what was previously observed in young controls. Here we show that the asynchronous modality performed significantly better as compared to the synchronous mode in continuously adapting its speed to the users' state. Furthermore, the asynchronous system modality confirmed its reliability in avoiding misclassifications and false positives, as previously shown in young healthy subjects. The asynchronous modality may contribute to filling the usability gap between BCI systems and traditional input devices, representing an important step towards their use in the activities of daily living.

  18. Multiparty Symmetric Sum Types

    DEFF Research Database (Denmark)

    Nielsen, Lasse; Yoshida, Nobuko; Honda, Kohei

    2010-01-01

    This paper introduces a new theory of multiparty session types based on symmetric sum types, by which we can type non-deterministic orchestration choice behaviours. While the original branching type in session types can represent a choice made by a single participant and accepted by others...... determining how the session proceeds, the symmetric sum type represents a choice made by agreement among all the participants of a session. Such behaviour can be found in many practical systems, including collaborative workflow in healthcare systems for clinical practice guidelines (CPGs). Processes...... with the symmetric sums can be embedded into the original branching types using conductor processes. We show that this type-driven embedding preserves typability, satisfies semantic soundness and completeness, and meets the encodability criteria adapted to the typed setting. The theory leads to an efficient...

  19. Computationally Efficient Blind Code Synchronization for Asynchronous DS-CDMA Systems with Adaptive Antenna Arrays

    Directory of Open Access Journals (Sweden)

    Chia-Chang Hu

    2005-04-01

    Full Text Available A novel space-time adaptive near-far robust code-synchronization array detector for asynchronous DS-CDMA systems is developed in this paper. There are the same basic requirements that are needed by the conventional matched filter of an asynchronous DS-CDMA system. For the real-time applicability, a computationally efficient architecture of the proposed detector is developed that is based on the concept of the multistage Wiener filter (MWF of Goldstein and Reed. This multistage technique results in a self-synchronizing detection criterion that requires no inversion or eigendecomposition of a covariance matrix. As a consequence, this detector achieves a complexity that is only a linear function of the size of antenna array (J, the rank of the MWF (M, the system processing gain (N, and the number of samples in a chip interval (S, that is, 𝒪(JMNS. The complexity of the equivalent detector based on the minimum mean-squared error (MMSE or the subspace-based eigenstructure analysis is a function of 𝒪((JNS3. Moreover, this multistage scheme provides a rapid adaptive convergence under limited observation-data support. Simulations are conducted to evaluate the performance and convergence behavior of the proposed detector with the size of the J-element antenna array, the amount of the L-sample support, and the rank of the M-stage MWF. The performance advantage of the proposed detector over other DS-CDMA detectors is investigated as well.

  20. Student Participation and Interactivity Using Asynchronous Computer-Mediated Communication for Resolution of an Undergraduate Capstone Management Case Study

    OpenAIRE

    Miller, Paulette J.

    2012-01-01

    Online discussion activities are designed for computer-mediated learning activities in face-to-face, hybrid, and totally online courses. The use of asynchronous computer-mediated communication (A-CMC) coupled with authentic workplace case studies provides students in the protected learning environment with opportunities to practice workplace decision making and communication. In this study, communication behaviors of transmitter and receiver were analyzed to determine participation and intera...

  1. Efficient multiparty protocols via log-depth threshold formulae

    DEFF Research Database (Denmark)

    Cohen, Gil; Damgård, Ivan Bjerre; Ishai, Yuval;

    2013-01-01

    We put forward a new approach for the design of efficient multiparty protocols: Design a protocol π for a small number of parties (say, 3 or 4) which achieves security against a single corrupted party. Such protocols are typically easy to construct, as they may employ techniques that do not scale...... of efficient protocols for Secure Multiparty Computation (MPC) in the presence of an honest majority, as well as broadcast protocols from point-to-point channels and a 2-cast primitive. We obtain new results on MPC over blackbox groups and other algebraic structures. The above results rely on the following...

  2. General polygamy inequality of multiparty quantum entanglement

    Science.gov (United States)

    Kim, Jeong San

    2012-06-01

    Using entanglement of assistance, we establish a general polygamy inequality of multiparty entanglement in arbitrary-dimensional quantum systems. For multiparty closed quantum systems, we relate our result with the monogamy of entanglement, and clarify that the entropy of entanglement bounds both monogamy and polygamy of multiparty quantum entanglement.

  3. Quantum secret sharing between multiparty and multiparty with four states

    Institute of Scientific and Technical Information of China (English)

    YAN; FengLi; GAO; Ting; LI; YouCheng

    2007-01-01

    A protocol of quantum secret sharing between multiparty and multiparty with four states was presented. It was shown that this protocol can nullify the Trojan horse attack with a multi-photon signal, the fake-signal attack with Einstein-Podolsky- Rosen pairs, the attack with single photons, and the attack with invisible photons. In addition, the upper bounds of the average success probabilities were given for dishonest agent eavesdropping encryption using the fake-signal attack with any two-particle entangled states.

  4. Multiparty Quantum Secret Report

    Institute of Scientific and Technical Information of China (English)

    DENG Fu-Guo; LI Xi-Han; LI Chun-Yan; ZHOU Ping; LIANG Yu-Jie; ZHOU Hong-Yu

    2006-01-01

    @@ A multiparty quantum secret report scheme is proposed with quantum encryption. The boss Alice and her M agents first share a sequence of (M + 1)-particle Greenberger-Horne-Zeilinger (GHZ) states that only Alice knows which state each (M + 1)-particle quantum system is in. Each agent exploits a controlled-not (CNot) gate to encrypt the travelling particle by using the particle in the GHZ state as the control qubit. The boss Alice decrypts the travelling particle with a CNot gate after performing a σx operation on her particle in the GHZ state or not.After the GHZ states (the quantum key) are used up, the parties check whether there is a vicious eavesdropper,say Eve, monitoring the quantum line, by picking out some samples from the GHZ states shared and measuring them with two measuring bases. After confirming the security of the quantum key, they use the remaining GHZ states repeatedly for the next round of quantum communication. This scheme has the advantage of high intrinsic efficiency for the qubits and total efficiency.

  5. Multiparty Symmetric Sum Types

    Directory of Open Access Journals (Sweden)

    Lasse Nielsen

    2010-11-01

    Full Text Available This paper introduces a new theory of multiparty session types based on symmetric sum types, by which we can type non-deterministic orchestration choice behaviours. While the original branching type in session types can represent a choice made by a single participant and accepted by others determining how the session proceeds, the symmetric sum type represents a choice made by agreement among all the participants of a session. Such behaviour can be found in many practical systems, including collaborative workflow in healthcare systems for clinical practice guidelines (CPGs. Processes using the symmetric sums can be embedded into the original branching types using conductor processes. We show that this type-driven embedding preserves typability, satisfies semantic soundness and completeness, and meets the encodability criteria adapted to the typed setting. The theory leads to an efficient implementation of a prototypical tool for CPGs which automatically translates the original CPG specifications from a representation called the Process Matrix to symmetric sum types, type checks programs and executes them.

  6. Quantum channel capacities - multiparty communication

    CERN Document Server

    Demianowicz, M; Demianowicz, Maciej; Horodecki, Pawel

    2006-01-01

    We analyze different aspects of multiparty communication over quantum memoryless channels and generalize some of key results known from bipartite channels to that of multiparty scenario. In particular, we introduce multiparty versions of minimal subspace transmission fidelity and entanglement transmission fidelity. We also provide alternative, local, versions of fidelities and show their equivalence to the global ones in context of capacity regions defined. The equivalence of two different capacity notions with respect to two types of the fidelities is proven. In analogy to bipartite case it is shown, via sufficiency of isometric encoding theorem, that additional classical forward side channel does not increase capacity region of any quantum channel with $k$ senders and $m$ receivers which represents a compact unit of general quantum networks theory. The result proves that recently provided capacity region of multiple access channel ([M. Horodecki et al, Nature {\\bf 436} 673 (2005)], [J.Yard et al, quant-ph/0...

  7. Hybrid EEG-fNIRS Asynchronous Brain-Computer Interface for Multiple Motor Tasks.

    Directory of Open Access Journals (Sweden)

    Alessio Paolo Buccino

    Full Text Available Non-invasive Brain-Computer Interfaces (BCI have demonstrated great promise for neuroprosthetics and assistive devices. Here we aim to investigate methods to combine Electroencephalography (EEG and functional Near-Infrared Spectroscopy (fNIRS in an asynchronous Sensory Motor rhythm (SMR-based BCI. We attempted to classify 4 different executed movements, namely, Right-Arm-Left-Arm-Right-Hand-Left-Hand tasks. Previous studies demonstrated the benefit of EEG-fNIRS combination. However, since normally fNIRS hemodynamic response shows a long delay, we investigated new features, involving slope indicators, in order to immediately detect changes in the signals. Moreover, Common Spatial Patterns (CSPs have been applied to both EEG and fNIRS signals. 15 healthy subjects took part in the experiments and since 25 trials per class were available, CSPs have been regularized with information from the entire population of participants and optimized using genetic algorithms. The different features have been compared in terms of performance and the dynamic accuracy over trials shows that the introduced methods diminish the fNIRS delay in the detection of changes.

  8. VASA: Interactive Computational Steering of Large Asynchronous Simulation Pipelines for Societal Infrastructure.

    Science.gov (United States)

    Ko, Sungahn; Zhao, Jieqiong; Xia, Jing; Afzal, Shehzad; Wang, Xiaoyu; Abram, Greg; Elmqvist, Niklas; Kne, Len; Van Riper, David; Gaither, Kelly; Kennedy, Shaun; Tolone, William; Ribarsky, William; Ebert, David S

    2014-12-01

    We present VASA, a visual analytics platform consisting of a desktop application, a component model, and a suite of distributed simulation components for modeling the impact of societal threats such as weather, food contamination, and traffic on critical infrastructure such as supply chains, road networks, and power grids. Each component encapsulates a high-fidelity simulation model that together form an asynchronous simulation pipeline: a system of systems of individual simulations with a common data and parameter exchange format. At the heart of VASA is the Workbench, a visual analytics application providing three distinct features: (1) low-fidelity approximations of the distributed simulation components using local simulation proxies to enable analysts to interactively configure a simulation run; (2) computational steering mechanisms to manage the execution of individual simulation components; and (3) spatiotemporal and interactive methods to explore the combined results of a simulation run. We showcase the utility of the platform using examples involving supply chains during a hurricane as well as food contamination in a fast food restaurant chain. PMID:26356899

  9. Learning Together: A Positieve Experience.The effect of reflection on group processes in an asynchronous computer-supported collaboratieve learning environment.

    NARCIS (Netherlands)

    Dewiyanti, Silvia

    2007-01-01

    Dewiyanti, S. (2005).Learning Together: A Positieve Experience.The effect of reflection on group processes in an asynchronous computer-supported collaboratieve learning environment. Unpublished doctoral dissertation. Open University of the Netherlands, The Netherlands.

  10. Multiparty Computation for Dishonest Majority

    DEFF Research Database (Denmark)

    Damgård, Ivan Bjerre; Orlandi, Claudio

    2010-01-01

    theory and practice. We propose a new protocol to securely evaluate reactive arithmetic circuits, that offers security against an active adversary in the universally composable security framework. Instead of the "do-and-compile" approach (where the parties use zero-knowledge proofs to show...... that they are following the protocol) our key ingredient is an efficient version of the "cut-and-choose" technique, that allow us to achieve active security for just a (small) constant amount of work more than for passive security....

  11. Identity formation in multiparty negotiations

    NARCIS (Netherlands)

    Swaab, R; Postmes, T.; Spears, R.

    2008-01-01

    Based on the recently proposed Interactive Model of Identity Formation, we examine how top-down deductive and bottom-up inductive identity formations influence intentions and behaviour in multiparty negotiations. Results show that a shared identity can be deduced from the social context through reco

  12. Student participation and interactivity using asynchronous computer-mediated communication for resolution of an undergraduate capstone management case study.

    Science.gov (United States)

    Miller, Paulette J

    2012-01-01

    Online discussion activities are designed for computer-mediated learning activities in face-to-face, hybrid, and totally online courses. The use of asynchronous computer-mediated communication (A-CMC) coupled with authentic workplace case studies provides students in the protected learning environment with opportunities to practice workplace decision making and communication. In this study, communication behaviors of transmitter and receiver were analyzed to determine participation and interactivity in communication among small-group participants in a health information management capstone management course.

  13. Multiparty Session Types as Coherence Proofs

    DEFF Research Database (Denmark)

    Carbone, Marco; Montesi, Fabrizio; Schürmann, Carsten;

    2015-01-01

    We propose a Curry-Howard correspondence between a language for programming multiparty sessions and a generalisation of Classical Linear Logic (CLL). In this framework, propositions correspond to the local behaviour of a participant in a multiparty session type, proofs to processes, and proof...

  14. XMPP for cloud computing in bioinformatics supporting discovery and invocation of asynchronous web services

    Directory of Open Access Journals (Sweden)

    Willighagen Egon L

    2009-09-01

    Full Text Available Abstract Background Life sciences make heavily use of the web for both data provision and analysis. However, the increasing amount of available data and the diversity of analysis tools call for machine accessible interfaces in order to be effective. HTTP-based Web service technologies, like the Simple Object Access Protocol (SOAP and REpresentational State Transfer (REST services, are today the most common technologies for this in bioinformatics. However, these methods have severe drawbacks, including lack of discoverability, and the inability for services to send status notifications. Several complementary workarounds have been proposed, but the results are ad-hoc solutions of varying quality that can be difficult to use. Results We present a novel approach based on the open standard Extensible Messaging and Presence Protocol (XMPP, consisting of an extension (IO Data to comprise discovery, asynchronous invocation, and definition of data types in the service. That XMPP cloud services are capable of asynchronous communication implies that clients do not have to poll repetitively for status, but the service sends the results back to the client upon completion. Implementations for Bioclipse and Taverna are presented, as are various XMPP cloud services in bio- and cheminformatics. Conclusion XMPP with its extensions is a powerful protocol for cloud services that demonstrate several advantages over traditional HTTP-based Web services: 1 services are discoverable without the need of an external registry, 2 asynchronous invocation eliminates the need for ad-hoc solutions like polling, and 3 input and output types defined in the service allows for generation of clients on the fly without the need of an external semantics description. The many advantages over existing technologies make XMPP a highly interesting candidate for next generation online services in bioinformatics.

  15. Understanding the Dynamics of Collaborative Multi-Party Discourse

    Energy Technology Data Exchange (ETDEWEB)

    Cowell, Andrew J.; Gregory, Michelle L.; Bruce, Joseph R.; Haack, Jereme N.; Love, Douglas V.; Rose, Stuart J.; Andrew, Adrienne H.

    2006-12-01

    In this manuscript, we discuss the efforts underway at the Pacific Northwest National Laboratory in understanding the dynamics of multi-party discourse across a number of communication mo-dalities, such as email, instant messaging traffic and meeting data. Two prototype systems are dis-cussed. The Conversation Analysis Tool (ChAT) is an experimental test-bed for the development of computational linguistic components, and provides users with the ability to easily identify top-ics or persons of interest within multi-party conversations, including who talked to whom, when, entities that were discussed, etc. The Retrospective Analysis of Communication Events (RACE) prototype, leveraging many of the ChAT components, is an application built specifically for knowledge workers and focuses on merging different types of communications data so that the underlying message can be discovered in an efficient, timely fashion.

  16. A Two-Stage State Recognition Method for Asynchronous SSVEP-Based Brain-Computer Interface System

    Institute of Scientific and Technical Information of China (English)

    ZHANG Zimu; DENG Zhidong

    2013-01-01

    A two-stage state recognition method is proposed for asynchronous SSVEP (steady-state visual evoked potential) based brain-computer interface (SBCI) system.The two-stage method is composed of the idle state (IS) detection and control state (CS) discrimination modules.Based on blind source separation and continuous wavelet transform techniques,the proposed method integrates functions of multi-electrode spatial filtering and feature extraction.In IS detection module,a method using the ensemble IS feature is proposed.In CS discrimination module,the ensemble CS feature is designed as feature vector for control intent classification.Further,performance comparisons are investigated among our IS detection module and other existing ones.Also the experimental results validate the satisfactory performance of our CS discrimination module.

  17. Enhancing robustness of multiparty quantum correlations using weak measurement

    Energy Technology Data Exchange (ETDEWEB)

    Singh, Uttam, E-mail: uttamsingh@hri.res.in [Quantum Information and Computation Group, Harish-Chandra Research Institute, Chhatnag Road, Jhunsi, Allahabad 211 019 (India); Mishra, Utkarsh, E-mail: utkarsh@hri.res.in [Quantum Information and Computation Group, Harish-Chandra Research Institute, Chhatnag Road, Jhunsi, Allahabad 211 019 (India); Dhar, Himadri Shekhar, E-mail: dhar.himadri@gmail.com [School of Physical Sciences, Jawaharlal Nehru University, New Delhi 110067 (India)

    2014-11-15

    Multipartite quantum correlations are important resources for the development of quantum information and computation protocols. However, the resourcefulness of multipartite quantum correlations in practical settings is limited by its fragility under decoherence due to environmental interactions. Though there exist protocols to protect bipartite entanglement under decoherence, the implementation of such protocols for multipartite quantum correlations has not been sufficiently explored. Here, we study the effect of local amplitude damping channel on the generalized Greenberger–Horne–Zeilinger state, and use a protocol of optimal reversal quantum weak measurement to protect the multipartite quantum correlations. We observe that the weak measurement reversal protocol enhances the robustness of multipartite quantum correlations. Further it increases the critical damping value that corresponds to entanglement sudden death. To emphasize the efficacy of the technique in protection of multipartite quantum correlation, we investigate two proximately related quantum communication tasks, namely, quantum teleportation in a one sender, many receivers setting and multiparty quantum information splitting, through a local amplitude damping channel. We observe an increase in the average fidelity of both the quantum communication tasks under the weak measurement reversal protocol. The method may prove beneficial, for combating external interactions, in other quantum information tasks using multipartite resources. - Highlights: • Extension of weak measurement reversal scheme to protect multiparty quantum correlations. • Protection of multiparty quantum correlation under local amplitude damping noise. • Enhanced fidelity of quantum teleportation in one sender and many receivers setting. • Enhanced fidelity of quantum information splitting protocol.

  18. Asynchronous P300 BCI

    DEFF Research Database (Denmark)

    Panicker, Rajesh; Puthusserypady, Sadasivan; Sun, Ying

    2010-01-01

    An asynchronous hybrid brain-computer interface (BCI) system combining the P300 and steady-state visually evoked potentials (SSVEP) paradigms is introduced. A P300 base system is used for information transfer, and is augmented to include SSVEP for control state detection. The proposed system has...

  19. Redundant Asynchronous Microprocessor System

    Science.gov (United States)

    Meyer, G.; Johnston, J. O.; Dunn, W. R.

    1985-01-01

    Fault-tolerant computer structure called RAMPS (for redundant asynchronous microprocessor system) has simplicity of static redundancy but offers intermittent-fault handling ability of complex, dynamically redundant systems. New structure useful wherever several microprocessors are employed for control - in aircraft, industrial processes, robotics, and automatic machining, for example.

  20. The improvement of quantum secret sharing protocol between multiparty and multiparty without entanglement

    CERN Document Server

    Gao, T; Gao, Ting; Yan, Feng-Li

    2006-01-01

    We improve our quantum secret sharing protocol between multiparty and multiparty without entanglement [Phys. Rev. A 72, 012304 (2005)]. The improved protocol can avoid not only the Trojan horse attack but also the attack with single photons and attack with EPR pairs.

  1. The multiparty coherent channel and its implementation with linear optics.

    Science.gov (United States)

    He, Guangqiang; Liu, Taizhi; Tao, Xin

    2013-08-26

    The continuous-variable coherent (conat) channel is a useful resource for coherent communication, supporting coherent teleportation and coherent superdense coding. We extend the conat channel to multiparty conditions by proposing definitions on multiparty position-quadrature and momentum-quadrature conat channel. We additionally provide two methods to implement this channel using linear optics. One method is the multiparty version of coherent communication assisted by entanglement and classical communication (CCAECC). The other is multiparty coherent superdense coding. PMID:24105527

  2. General polygamy inequality of multi-party quantum entanglement

    CERN Document Server

    Kim, Jeong San

    2012-01-01

    Using entanglement of assistance, we establish a general polygamy inequality of multi-party entanglement in arbitrary dimensional quantum systems. For multi-party closed quantum systems, we relate our result with the monogamy of entanglement to show that the entropy of entanglement is an universal entanglement measure that bounds both monogamy and polygamy of multi-party quantum entanglement.

  3. Asynchronous Parallelization of a CFD Solver

    Directory of Open Access Journals (Sweden)

    Daniel S. Abdi

    2015-01-01

    Full Text Available A Navier-Stokes equations solver is parallelized to run on a cluster of computers using the domain decomposition method. Two approaches of communication and computation are investigated, namely, synchronous and asynchronous methods. Asynchronous communication between subdomains is not commonly used in CFD codes; however, it has a potential to alleviate scaling bottlenecks incurred due to processors having to wait for each other at designated synchronization points. A common way to avoid this idle time is to overlap asynchronous communication with computation. For this to work, however, there must be something useful and independent a processor can do while waiting for messages to arrive. We investigate an alternative approach of computation, namely, conducting asynchronous iterations to improve local subdomain solution while communication is in progress. An in-house CFD code is parallelized using message passing interface (MPI, and scalability tests are conducted that suggest asynchronous iterations are a viable way of parallelizing CFD code.

  4. Asynchronous P300-Based Brain-Computer Interface to Control a Virtual Environment : Initial Tests on End Users

    NARCIS (Netherlands)

    Aloise, Fabio; Schettini, Francesca; Arico, Pietro; Salinari, Serenella; Guger, Christoph; Rinsma, Johanna; Aiello, Marco; Mattia, Donatella; Cincotti, Febo

    2011-01-01

    Motor disability and/or ageing can prevent individuals from fully enjoying home facilities, thus worsening their quality of life. Advances in the field of accessible user interfaces for domotic appliances can represent a valuable way to improve the independence of these persons. An asynchronous P300

  5. Applying reflection and moderation in an asynchronous computer-supported collaborative learning environment in campus-based higher education.

    NARCIS (Netherlands)

    Dewiyanti, Silvia; Brand-Gruwel, Saskia; Jochems, Wim

    2007-01-01

    Working together while accomplishing a task is a characteristic of a powerful learning environment that aims at active knowledge construction. Studies have demonstrated that collaborative learning by using asynchronous communication tools can have advantages over collaboration in a face-to-face sett

  6. On Adaptive vs. Non-adaptive Security of Multiparty Protocols

    DEFF Research Database (Denmark)

    Canetti, Ran; Damgård, Ivan Bjerre; Dziembowski, Stefan;

    2001-01-01

    Security analysis of multiparty cryptographic protocols distinguishes between two types of adversarialsettings: In the non-adaptive setting, the set of corrupted parties is chosen in advance, before the interaction begins. In the adaptive setting, the adversary chooses who to corrupt during...... the course of the computation. We study the relations between adaptive security (i.e., security in the adaptive setting) and non-adaptive security, according to two definitions and in several models of computation. While affirming some prevailing beliefs, we also obtain some unexpected results. Some...... highlights of our results are: – - According to the definition of Dodis-Micali-Rogaway (which is set in the information-theoretic model), adaptive and non-adaptive security are equivalent. This holds for both honest-but-curious and Byzantine adversaries, and for any number of parties. – - According...

  7. Multiparty Quantum Secret Sharing Using Quantum Fourier Transform

    Institute of Scientific and Technical Information of China (English)

    HUANG Da-Zu; CHEN Zhi-Gang; GUO Ying

    2009-01-01

    A (n, n )-threshold scheme of multiparty quantum secret sharing of classical or quantum message is proposed based on the discrete quantum Fourier transform.In our proposed scheme, the secret message, which is encoded by using the forward quantum Fourier transform and decoded by using the reverse, is split and shared in such a way that it can be reconstructed among them only if all the participants work in concert.Furthermore, we also discuss how this protocol must be carefully designed for correcting errors and checking eavesdropping or a dishonest participant.Security analysis shows that our scheme is secure.Also, this scheme has an advantage that it is completely compatible with quantum computation and easier to realize in the distributed quantum secure computation.

  8. Adaptive versus Non-Adaptive Security of Multi-Party Protocols

    DEFF Research Database (Denmark)

    Canetti, Ran; Damgård, Ivan Bjerre; Dziembowski, Stefan;

    2004-01-01

    Security analysis of multi-party cryptographic protocols distinguishes between two types of adversarial settings: In the non-adaptive setting the set of corrupted parties is chosen in advance, before the interaction begins. In the adaptive setting the adversary chooses who to corrupt during...... the course of the computation. We study the relations between adaptive security (i.e., security in the adaptive setting) and nonadaptive security, according to two definitions and in several models of computation....

  9. Remote Operation on Quantum State Among Multiparty

    Institute of Scientific and Technical Information of China (English)

    2007-01-01

    In this paper, a scheme is proposed for performing remote operation on quantum state among multiparty.We use three-particle GHZ state as quantum channels to prepare a state operator, which describes quantum correlation between states and operations. Based on the special characteristic of the state operator, observers can perform unitary operation on a system that is away from observers. Our studies show this process is deterministic. We further consider remote operation among N spatially distributed observers, and the results show the successful realization of remote operation needs collective participation of N parties, that is, there exists strong correlation among multiparty. In addition, we investigate the case in which observers share a three-particle W state as quantum channels to perform remote operation and studies find this process is probabilistic.

  10. Addendum to "Quantum secret sharing between multiparty and multiparty without entanglement"

    CERN Document Server

    Deng, F G; Li, C Y; Li, X H; Yan, F L; Zhou, H Y

    2005-01-01

    Recently, Yan and Gao proposed a quantum secret sharing protocol between multiparty ($m$ members in group 1) and multiparty ($n$ members in group 2) using a sequence of single photons (Phys. Rev. A \\textbf{72}, 012304 (2005)). We find that it is secure if the quantum signal transmitted is only a single photon but insecure with a multi-photon signal as some agents can get the information about the others' message if they attack the communication with a Trojan horse. However, security against this attack can be attained with a simple modification.

  11. Efficient generation of photonic entanglement and multiparty quantum communication

    International Nuclear Information System (INIS)

    This thesis deals largely with the problem of efficient generation of photonic entanglement with the principal aim of developing a bright source of polarization-entangled photon pairs, which meets the requirements for reliable and economic operation of quantum communication prototypes and demonstrators. Our approach uses a cor-related photon-pair emission in nonlinear process of spontaneous parametric downconversion pumped by light coming from a compact and cheap blue laser diode. Two alternative source configurations are examined within the thesis. The first makes use of a well established concept of degenerate non-collinear emission from a single type-II nonlinear crystal and the second relies on a novel method where the emissions from two adjacent type-I phase-matched nonlinear crystals operated in collinear non-degenerate regime are coherently overlapped. The latter approach showed to be more effective, yielding a total detected rate of almost 106 pairs/s at >98% quantum interference visibility of polarization correlations. The second issue addressed within the thesis is the simplification and practical implementation of quantum-assisted solutions to multiparty communication tasks. We show that entanglement is not the only non-classical resource endowing the quantum multiparty information processing its power. Instead, only the sequential communication and transformation of a single qubit can be sufficient to accomplish certain tasks. This we prove for two distinct communication tasks, secret sharing and communication complexity. Whereas the goal of the first is to split a cryptographic key among several parties in a way that its reconstruction requires their collaboration, the latter aims at reducing the amount of communication during distributed computational tasks. Importantly, our qubitassisted solutions to the problems are feasible with state-of-the-art technology. This we clearly demonstrate in the laboratory implementation for 6 and 5 parties

  12. Efficient generation of photonic entanglement and multiparty quantum communication

    Energy Technology Data Exchange (ETDEWEB)

    Trojek, Pavel

    2007-09-15

    This thesis deals largely with the problem of efficient generation of photonic entanglement with the principal aim of developing a bright source of polarization-entangled photon pairs, which meets the requirements for reliable and economic operation of quantum communication prototypes and demonstrators. Our approach uses a cor-related photon-pair emission in nonlinear process of spontaneous parametric downconversion pumped by light coming from a compact and cheap blue laser diode. Two alternative source configurations are examined within the thesis. The first makes use of a well established concept of degenerate non-collinear emission from a single type-II nonlinear crystal and the second relies on a novel method where the emissions from two adjacent type-I phase-matched nonlinear crystals operated in collinear non-degenerate regime are coherently overlapped. The latter approach showed to be more effective, yielding a total detected rate of almost 10{sup 6} pairs/s at >98% quantum interference visibility of polarization correlations. The second issue addressed within the thesis is the simplification and practical implementation of quantum-assisted solutions to multiparty communication tasks. We show that entanglement is not the only non-classical resource endowing the quantum multiparty information processing its power. Instead, only the sequential communication and transformation of a single qubit can be sufficient to accomplish certain tasks. This we prove for two distinct communication tasks, secret sharing and communication complexity. Whereas the goal of the first is to split a cryptographic key among several parties in a way that its reconstruction requires their collaboration, the latter aims at reducing the amount of communication during distributed computational tasks. Importantly, our qubitassisted solutions to the problems are feasible with state-of-the-art technology. This we clearly demonstrate in the laboratory implementation for 6 and 5 parties

  13. Asynchronous reference frame agreement in a quantum network

    Science.gov (United States)

    Islam, Tanvirul; Wehner, Stephanie

    2016-03-01

    An efficient implementation of many multiparty protocols for quantum networks requires that all the nodes in the network share a common reference frame. Establishing such a reference frame from scratch is especially challenging in an asynchronous network where network links might have arbitrary delays and the nodes do not share synchronised clocks. In this work, we study the problem of establishing a common reference frame in an asynchronous network of n nodes of which at most t are affected by arbitrary unknown error, and the identities of the faulty nodes are not known. We present a protocol that allows all the correctly functioning nodes to agree on a common reference frame as long as the network graph is complete and not more than t\\lt n/4 nodes are faulty. As the protocol is asynchronous, it can be used with some assumptions to synchronise clocks over a network. Also, the protocol has the appealing property that it allows any existing two-node asynchronous protocol for reference frame agreement to be lifted to a robust protocol for an asynchronous quantum network.

  14. Behavioral synthesis of asynchronous circuits

    DEFF Research Database (Denmark)

    Nielsen, Sune Fallgaard

    2005-01-01

    domain by introducing a computation model, which resembles the synchronous datapath and control architecture, but which is completely asynchronous. The model contains the possibility for isolating some or all of the functional units by locking their respective inputs and outputs while the functional unit...

  15. Enhanced Multiparty Controlled QSDC Using GHZ State

    Institute of Scientific and Technical Information of China (English)

    Shih-Hung Kao; Chia-Wei Tsai; Tzonelih Hwang

    2011-01-01

    Recently, Gao et al. [Opt. Commun. 283 (2010) 192] pointed out that Wang et al.'s multiparty controlled quantum secure direct communication (CQSDC) protocol [Opt. Commun. 266 (2006) 732] has the information leakage problem and proposed an improved protocol. However, in the improved protocol, due to the introduction of an additional random sampling to avoid the weakness, the qubit efficiency is decreased. By introducing the base changing technique to the random sampling in Wang et al.'s protocol, this study overcomes the information leakage problem and provides a better qubit efficiency.

  16. Retrospective Analysis of Communication Events - Understanding the Dynamics of Collaborative Multi-Party Discourse

    Energy Technology Data Exchange (ETDEWEB)

    Cowell, Andrew J.; Haack, Jereme N.; McColgin, Dave W.

    2006-06-08

    This research is aimed at understanding the dynamics of collaborative multi-party discourse across multiple communication modalities. Before we can truly make sig-nificant strides in devising collaborative communication systems, there is a need to understand how typical users utilize com-putationally supported communications mechanisms such as email, instant mes-saging, video conferencing, chat rooms, etc., both singularly and in conjunction with traditional means of communication such as face-to-face meetings, telephone calls and postal mail. Attempting to un-derstand an individual’s communications profile with access to only a single modal-ity is challenging at best and often futile. Here, we discuss the development of RACE – Retrospective Analysis of Com-munications Events – a test-bed prototype to investigate issues relating to multi-modal multi-party discourse.

  17. Multiparty Simultaneous Quantum Identity Authentication Based on Entanglement Swapping

    Institute of Scientific and Technical Information of China (English)

    WANG Jian; ZHANG Quan; TANG Chao-Jing

    2006-01-01

    @@ We present a multiparty simultaneous quantum identity authentication protocol based on entanglement swapping.In our protocol, the multi-user can be authenticated by a trusted third party simultaneously.

  18. Compositional asynchronous membrane systems

    Institute of Scientific and Technical Information of China (English)

    Cosmin Bonchis; Cornel Izbasa; Gabriel Ciobanu

    2007-01-01

    This paper presents an algorithmic way of building complex membrane systems by coupling elementary membranes. Its application seems particularly valuable in the case of asynchronous membrane systems, since the resulting membrane system remains asynchronous. The composition method is based on a handshake mechanism implemented by using antiport rules and promoters.

  19. Cryptographic framework for document-objects resulting from multiparty collaborative transactions.

    Science.gov (United States)

    Goh, A

    2000-01-01

    Multiparty transactional frameworks--i.e. Electronic Data Interchange (EDI) or Health Level (HL) 7--often result in composite documents which can be accurately modelled using hyperlinked document-objects. The structural complexity arising from multiauthor involvement and transaction-specific sequencing would be poorly handled by conventional digital signature schemes based on a single evaluation of a one-way hash function and asymmetric cryptography. In this paper we outline the generation of structure-specific authentication hash-trees for the the authentication of transactional document-objects, followed by asymmetric signature generation on the hash-tree value. Server-side multi-client signature verification would probably constitute the single most compute-intensive task, hence the motivation for our usage of the Rabin signature protocol which results in significantly reduced verification workloads compared to the more commonly applied Rivest-Shamir-Adleman (RSA) protocol. Data privacy is handled via symmetric encryption of message traffic using session-specific keys obtained through key-negotiation mechanisms based on discrete-logarithm cryptography. Individual client-to-server channels can be secured using a double key-pair variation of Diffie-Hellman (DH) key negotiation, usage of which also enables bidirectional node authentication. The reciprocal server-to-client multicast channel is secured through Burmester-Desmedt (BD) key-negotiation which enjoys significant advantages over the usual multiparty extensions to the DH protocol. The implementation of hash-tree signatures and bi/multidirectional key negotiation results in a comprehensive cryptographic framework for multiparty document-objects satisfying both authentication and data privacy requirements. PMID:11187485

  20. Cryptanalysis and Improvement of Quantum Secret Sharing Protocol between Multiparty and Multiparty with Single Photons and Unitary Transformations

    Institute of Scientific and Technical Information of China (English)

    LIN Song; WEN Qiao-Yan; LIU Xiao-Fen

    2009-01-01

    In a recent paper[Yan F L et al.Chin.Phys.Lett.25(2008)1187],a quantum secret sharing the protocol between multiparty and multiparty with single photons and unitary transformations was presented.We analyze the security of the protocol and find that a dishonest participant can eavesdrop the key by using a special attack.Finally,we give a description of this strategy and put forward an improved version of this protocol which can stand against this kind of attack.

  1. VOLTAGE REGULATORS ASYNCHRONOUS GENERATORS

    Directory of Open Access Journals (Sweden)

    Grigorash O. V.

    2015-06-01

    Full Text Available A promising is currently the use of asynchronous generators with capacitive excitation as a source of electricity in stand-alone power systems. Drive asynchronous generators may exercise as a thermal engine and wind wheel wind power plant or turbines of small hydropower plants. The article discusses the structural and schematics of voltage stabilizers and frequency of asynchronous generators with improved operational and technical specifications. Technical novelty of design solutions of the magnetic system and stabilizers asynchronous generator of electricity parameters confirmed by the patents for the invention of the Russian Federation. The proposed technical solution voltage stabilizer asynchronous generators, can reduce the weight of the block capacitors excitation and reactive power compensation, as well as to simplify the control system power circuit which has less power electronic devices. For wind power plants it is an important issue not only to stabilize the voltage of the generator, but also the frequency of the current. Recommend functionality stabilizer schemes parameters of electric power made for direct frequency converters with artificial and natural switching power electronic devices. It is also proposed as part of stabilization systems use single-phase voltage, three-phase transformers with rotating magnetic field, reduce the level of electromagnetic interference generated by power electronic devices for switching, enhance the efficiency and reliability of the stabilizer.

  2. Student Representation and Multiparty Politics in African Higher Education

    Science.gov (United States)

    Luescher-Mamashela, Thierry M.; Mugume, Taabo

    2014-01-01

    The transition from one-party rule and other forms of authoritarianism to multiparty democracy in the 1990s has had a profound impact on the organisation and role of student politics in Africa. Against the background of student involvement in African politics in the twentieth century, leading up to student participation in Africa's…

  3. Monitoring multi-party contracts for E-business

    NARCIS (Netherlands)

    Xu, L.

    2004-01-01

    "Monitoring multi-party contracts for E-business" investigates the issues involved in the performance of econtract monitoring of business automations in business to business e-commerce environment. A pro-active monitoring contract model and monitoring mechanism have been designed and developed. A ne

  4. Choosing the enemy: attack behaviour in a multiparty system

    NARCIS (Netherlands)

    A.S. Walter

    2012-01-01

    This article examines which political parties are the most likely targets of negative campaigning in a multiparty system. The choice of target is an important strategic decision parties make when deciding on their campaign strategy. The article advances existing research on negative campaigning in s

  5. An active attack on a multiparty key exchange protocol

    Directory of Open Access Journals (Sweden)

    Reto Schnyder

    2016-01-01

    Full Text Available The multiparty key exchange introduced in Steiner et al. and presented in more general form by the authors is known to be secure against passive attacks. In this paper, an active attack is presented assuming malicious control of the communications of the last two users for the duration of only the key exchange.

  6. Measurement study of multi-party video conferencing

    NARCIS (Netherlands)

    Lu, Y.; Zhao, Y.; Kuipers, F.A.; Van Mieghem, P.

    2010-01-01

    More and more free multi-party video conferencing applications are readily available over the Internet and both Server-to-Client (S/C) or Peer-to-Peer (P2P) technologies are used. Investigating their mechanisms, analyzing their system performance, and measuring their quality are important objectives

  7. A trace-based model for multiparty contracts

    DEFF Research Database (Denmark)

    Hvitved, Tom; Klaedtke, Felix; Zalinescu, Eugen

    2012-01-01

    In this article we present a model for multiparty contracts in which contract conformance is defned abstractly as a property on traces. A key feature of our model is blame assignment, which means that for a given contract, every breach is attributed to a set of parties. We show that blame assignm...

  8. Technologies That Assist in Online Group Work: A Comparison of Synchronous and Asynchronous Computer Mediated Communication Technologies on Students' Learning and Community

    Science.gov (United States)

    Rockinson-Szapkiw, Amanda; Wendt, Jillian

    2015-01-01

    While the benefits of online group work completed using asynchronous CMC technology is documented, researchers have identified a number of challenges that result in ineffective and unsuccessful online group work. Fewer channels of communication and lack of immediacy when compared to face-to-face group work are a few of the noted limitations. Thus,…

  9. Asynchronized synchronous machines

    CERN Document Server

    Botvinnik, M M

    1964-01-01

    Asynchronized Synchronous Machines focuses on the theoretical research on asynchronized synchronous (AS) machines, which are "hybrids” of synchronous and induction machines that can operate with slip. Topics covered in this book include the initial equations; vector diagram of an AS machine; regulation in cases of deviation from the law of full compensation; parameters of the excitation system; and schematic diagram of an excitation regulator. The possible applications of AS machines and its calculations in certain cases are also discussed. This publication is beneficial for students and indiv

  10. Solving SAT and Hamiltonian Cycle Problem Using Asynchronous P Systems

    Science.gov (United States)

    Tagawa, Hirofumi; Fujiwara, Akihiro

    In the present paper, we consider fully asynchronous parallelism in membrane computing, and propose two asynchronous P systems for the satisfiability (SAT) and Hamiltonian cycle problem. We first propose an asynchronous P system that solves SAT with n variables and m clauses, and show that the proposed P system computes SAT in O(mn2n) sequential steps or O(mn) parallel steps using O(mn) kinds of objects. We next propose an asynchronous P system that solves the Hamiltonian cycle problem with n nodes, and show that the proposed P system computes the problem in O(n!) sequential steps or O(n2) parallel steps using O(n2) kinds of objects.

  11. Quantum Steganography for Multi-party Covert Communication

    Science.gov (United States)

    Liu, Lin; Tang, Guang-Ming; Sun, Yi-Feng; Yan, Shu-Fan

    2016-01-01

    A novel multi-party quantum steganography protocol based on quantum secret sharing is proposed in this paper. Hidden channels are built in HBB and improved HBB quantum secret sharing protocols for secret messages transmitting, via the entanglement swapping of GHZ states and Bell measurement. Compared with the original protocol, there are only a few different GHZ sates transmitted in the proposed protocol, making the hidden channel with good imperceptibility. Moreover, the secret messages keep secure even when the hidden channel is under the attack from the dishonest participators, for the sub-secretmessages distributed randomly to different participators. With good imperceptibility and security, the capacity of proposed protocol is higher than previous multi-party quantum steganography protocol.

  12. Monitoring multi-party contracts for E-business

    OpenAIRE

    Xu, L

    2004-01-01

    "Monitoring multi-party contracts for E-business" investigates the issues involved in the performance of econtract monitoring of business automations in business to business e-commerce environment. A pro-active monitoring contract model and monitoring mechanism have been designed and developed. A new architecture and framework is proposed for pro-active monitorable contracts. This pro-active monitoring contract model is supported by a prototype

  13. Measurement Study of Multi-party Video Conferencing

    OpenAIRE

    Y. Lu; Zhao, Y.; Kuipers, F. A.; Van Mieghem, P.

    2010-01-01

    International audience; More and more free multi-party video conferencing applications are readily available over the Internet and both Server-to-Client (S/C) or Peer-to-Peer (P2P) technologies are used. Investigating their mechanisms, analyzing their system performance, and measuring their quality are important objectives for researchers, developers and end users. In this paper, we take four representative video conferencing applications and reveal their characteristics and different aspects...

  14. Asynchronous Variational Integrators

    OpenAIRE

    Lew, A.; Marsden, J. E.; Ortiz, M.; West, M

    2003-01-01

    We describe a new class of asynchronous variational integrators (AVI) for nonlinear elastodynamics. The AVIs are distinguished by the following attributes: (i) The algorithms permit the selection of independent time steps in each element, and the local time steps need not bear an integral relation to each other; (ii) the algorithms derive from a spacetime form of a discrete version of Hamilton’s variational principle. As a consequence of this variational structure, the algorith...

  15. Text Mining: (Asynchronous Sequences

    Directory of Open Access Journals (Sweden)

    Sheema Khan

    2014-12-01

    Full Text Available In this paper we tried to correlate text sequences those provides common topics for semantic clues. We propose a two step method for asynchronous text mining. Step one check for the common topics in the sequences and isolates these with their timestamps. Step two takes the topic and tries to give the timestamp of the text document. After multiple repetitions of step two, we could give optimum result.

  16. Inhibition Controls Asynchronous States of Neuronal Networks

    Science.gov (United States)

    Treviño, Mario

    2016-01-01

    Computations in cortical circuits require action potentials from excitatory and inhibitory neurons. In this mini-review, I first provide a quick overview of findings that indicate that GABAergic neurons play a fundamental role in coordinating spikes and generating synchronized network activity. Next, I argue that these observations helped popularize the notion that network oscillations require a high degree of spike correlations among interneurons which, in turn, produce synchronous inhibition of the local microcircuit. The aim of this text is to discuss some recent experimental and computational findings that support a complementary view: one in which interneurons participate actively in producing asynchronous states in cortical networks. This requires a proper mixture of shared excitation and inhibition leading to asynchronous activity between neighboring cells. Such contribution from interneurons would be extremely important because it would tend to reduce the spike correlation between neighboring pyramidal cells, a drop in redundancy that could enhance the information-processing capacity of neural networks. PMID:27274721

  17. Inhibition Controls Asynchronous States of Neuronal Networks.

    Science.gov (United States)

    Treviño, Mario

    2016-01-01

    Computations in cortical circuits require action potentials from excitatory and inhibitory neurons. In this mini-review, I first provide a quick overview of findings that indicate that GABAergic neurons play a fundamental role in coordinating spikes and generating synchronized network activity. Next, I argue that these observations helped popularize the notion that network oscillations require a high degree of spike correlations among interneurons which, in turn, produce synchronous inhibition of the local microcircuit. The aim of this text is to discuss some recent experimental and computational findings that support a complementary view: one in which interneurons participate actively in producing asynchronous states in cortical networks. This requires a proper mixture of shared excitation and inhibition leading to asynchronous activity between neighboring cells. Such contribution from interneurons would be extremely important because it would tend to reduce the spike correlation between neighboring pyramidal cells, a drop in redundancy that could enhance the information-processing capacity of neural networks.

  18. The right of self-determination and multiparty democracy: two sides of the same coin?

    NARCIS (Netherlands)

    J. Vidmar

    2010-01-01

    This article is concerned with the relationship between the right of self-determination and the political system of multiparty democracy. It considers whether international law supports the view that operation of the right of self-determination requires a multiparty political system. It also questio

  19. Alignment, realignment and dealignment in multi-party systems : a conceptual and empirical study

    NARCIS (Netherlands)

    Federer-Shtayer, Hila

    2012-01-01

    The present research is motivated by the conviction that there is inadequate conceptual understanding of the phenomena of ‘realignment’ and ‘dealignment’ in multi-party systems. It aims to fill this gap by examining empirically both phenomena in eleven cases of multi-party systems, in order to devel

  20. Strong polygamy of quantum correlations in multi-party quantum systems

    Science.gov (United States)

    San Kim, Jeong

    2014-10-01

    We propose a new type of polygamy inequality for multi-party quantum entanglement. We first consider the possible amount of bipartite entanglement distributed between a fixed party and any subset of the rest parties in a multi-party quantum system. By using the summation of these distributed entanglements, we provide an upper bound of the distributed entanglement between a party and the rest in multi-party quantum systems. We then show that this upper bound also plays as a lower bound of the usual polygamy inequality, therefore the strong polygamy of multi-party quantum entanglement. For the case of multi-party pure states, we further show that the strong polygamy of entanglement implies the strong polygamy of quantum discord.

  1. Mechanical Proofs about BW Multi-Party Contract Signing Protocol

    Institute of Scientific and Technical Information of China (English)

    ZHANG Ningrong; ZHANG Xingyuan; WANG Yuanyuan

    2006-01-01

    We report on the verification of a multi-party contract signing protocol described by Baum-Waidner and Waidner (BW). Based on Paulson' inductive approach, we give the protocol model that includes infinitely many signatories and contract texts signing simultaneously. We consider composite attacks of the dishonest signatory and the external intruder, formalize cryptographic primitives and protocol arithmetic including attack model, show formal description of key distribution, and prove signature key secrecy theorems and fairness property theorems of the BW protocol using the interactive theorem prover Isabelle/HOL.

  2. Multiuser Detection in Asynchronous Multibeam Communications

    CERN Document Server

    Chaouech, Helmi; 10.5121/ijwmn.2012.4102

    2012-01-01

    This paper deals with multi-user detection techniques in asynchronous multibeam satellite communications. The proposed solutions are based on successive interference cancellation architecture (SIC) and channel decoding algorithms. The aim of these detection methods is to reduce the effect of cochannel interference due to co-frequency access, and consequently, improves the capacity of the mulitbeam communications systems, by improving frequency reuse. Channel estimation allows the determination of interference coefficients, which helps their effects compensation. The developed multiuser detections techniques are iterative. Therefore, detection quality is improved from a stage to another. Moreover, a signals combining method, which is integrated into these detection solutions, enhances their capability. The proposed solutions are evaluated through computer simulations, where an asynchronous multibeam satellite link is considered over an AWGN channel. The obtained simulation results showed the robustness of thes...

  3. Asynchronous Power Flow Controller

    Directory of Open Access Journals (Sweden)

    Rahul Juneja

    2014-04-01

    Full Text Available In the present system demand of electrical power increases so fast and transfer of electrical power is need of today‟s scenario. . The electrical power is transfer at same frequency through AC transmission line. However, power generation may be at different frequencies such as wind generation, sources at islanding or power generation in different countries. The proposed Asynchronous Power Flow Controller (APFC system essentially consists of two back-to-back voltage source converters as “Shunt Converter” and “Series Converter” which is coupled via a common dc link provided by a dc storage capacitor This paper suggests the power transfer and control between the sources operating at different or same frequencies.

  4. Ternary Tree Asynchronous Interconnect Network for GALS' SOC

    Directory of Open Access Journals (Sweden)

    Vivek E. Khetade

    2013-03-01

    Full Text Available Interconnect fabric requires easy integration of computational block operating with unrelated clocks.Thispaper presents asynchronous interconnect with ternary tree asynchronous network for GloballyAsynchronous Locally Synchronous (GALS system-on-chip (SOC. Here architecture is proposed forinterconnection with ternary tree asynchronous network where ratio of number NOC design unit andnumber of router is 4:1,6:2, 8:3,10:4 etc .It is scalable for any number of NOC design unit. It offersaneasy integration of different clock domain with lowcommunication overhead .NOC design unit for GALS‘SOC is formulated by wrapping synchronous module with input port along with input port controller,output port along with output port controller and local clock generator. It creates the interface betweensynchronous to asynchronous and asynchronous to synchronous. For this purpose four port asynchronousrouters is designed with routing element and outputarbitration and buffering with micro-pipeline. Thisinterconnect fabric minimizes silicon area, minimize Latency and maximize throughput. Here functionalmodel is made for TTAN and application MPEG4 is mapped on the Network .Desired traffic pattern isgenerated and performance of the network is evaluated. Significant improvement in the networkperformance parameter has been observed.

  5. Celerity: A Low-Delay Multi-Party Conferencing Solution

    CERN Document Server

    Chen, X; Li, B; Zhao, Y; Wu, Y; Li, J

    2011-01-01

    In this paper, we attempt to revisit the problem of multi-party conferencing from a practical perspective, and to rethink the design space involved in this problem. We believe that an emphasis onlow end-to-end delays between any two parties in the conference is a must, and the source sending rate in a session should adapt to bandwidth availability and congestion. We present Celerity, a multi-party conferencing solution specifically designed to achieve our objectives. It is entirely Peer-to-Peer (P2P), and as such eliminating the cost of maintaining centrally administered servers. It is designed to deliver video with low end-to-end delays, at quality levels commensurate with available network resources over arbitrary network topologies where bottlenecks can be anywhere in the network. This is in contrast to commonly assumed P2P scenarios where bandwidth bottlenecks reside only at the edge of the network. The highlight in our design is a distributed and adaptive rate control protocol, that can discover and adap...

  6. Pro asynchronous programming with .NET

    CERN Document Server

    Blewett, Richard; Ltd, Rock Solid Knowledge

    2014-01-01

    Pro Asynchronous Programming with .NET teaches the essential skill of asynchronous programming in .NET. It answers critical questions in .NET application development, such as: how do I keep my program responding at all times to keep my users happy how do I make the most of the available hardware how can I improve performanceIn the modern world, users expect more and more from their applications and devices, and multi-core hardware has the potential to provide it. But it takes carefully crafted code to turn that potential into responsive, scalable applications.With Pro Asynchronous Programming

  7. Adding effect of current displacement and magnetic circuit saturation in an asynchronous motor mathematical model

    Directory of Open Access Journals (Sweden)

    I.A. Tsodik

    2014-04-01

    Full Text Available A methodology of an asynchronous motor mathematical model synthesis is described. Experiments are suggested to be conducted in the following sequence. Geometrical models are first built in AutoCAD, then imported to Comsol Multiphysics, and further processed in Matlab with computation of coefficients and dependences applied in the asynchronous motor mathematical model.

  8. Protocol for multi-party superdense coding by using multi-atom in cavity QED

    Institute of Scientific and Technical Information of China (English)

    Tan Jia; Fang Mao-Fa

    2006-01-01

    We present a protocol for multi-party superdense coding by using multi-atom in cavity quantum electrodynamics (QED). It is shown that, with a highly detuned cavity mode and a strong driving field, the protocol is insensitive to both cavity decay and thermal field. It is even certain to identify GHZ states via detecting the atomic states. Therefore we can realize the quantum dense coding in a simple way in the multiparty system.

  9. Quantum multiparty communication complexity and circuit lower bounds

    CERN Document Server

    Kerenidis, I

    2005-01-01

    We define a quantum model for multiparty communication complexity and prove a simulation theorem between the classical and quantum models. As a result of our simulation, we show that if the quantum k-party communication complexity of a function f is $\\Omega(n/2^k)$, then its classical k-party communication is $\\Omega(n/2^{k/2})$. Finding such an f would allow us to prove strong classical lower bounds for (k>log n) players and hence resolve a main open question about symmetric circuits. Furthermore, we prove that for the Generalized Inner Product (GIP) function, the quantum model is exponentially more efficient than the classical one. This provides the first exponential separation for a total function between any quantum and public coin randomized communication model.

  10. Attack on the Enhanced Multiparty Quantum Secret Sharing

    Institute of Scientific and Technical Information of China (English)

    杨帅; 陈秀波; 杨义先

    2012-01-01

    Recently, Gao et al.'s [Commun. Theor. Phys. 52 (2009) 421] multiparty quantum secret sharing (MQSS) protocol with two-photon three-dimensional Bell states was enhanced by Hwang et al. [Commun. Theor. Phys. 56 (2011) 79]. The improved protocol removes some unnecessary unitary operations, devices, and transmissions by the technique of decoy single photons and careful modification. However, in this paper, we investigate the security of the improved protocol and find it is insecure. The eavesdropper can steal all Alice's secret information. Furthermore, a feasible modification to remedy the security loophole is put forward. Our improved protocol provides a basic method to modify a kind of MQSS protocols which cannot resist the collusion attack.

  11. Multiparty simultaneous quantum identity authentication with secret sharing

    Institute of Scientific and Technical Information of China (English)

    2008-01-01

    Two multiparty simultaneous quantum identity authentication (MSQIA) protocols based on secret sharing are presented. All the users can be authenticated by a trusted third party (TTP) simultaneously. In the first protocol,the TTP shares a random key K with all the users using quantum secret sharing. The ith share acts as the authentication key of the ith user. When it is necessary to perform MSQIA,the TTP generates a random number R secretly and sends a sequence of single photons encoded with K and R to all the users. According to his share,each user performs the corresponding unitary operations on the single photon sequence sequentially. At last,the TTP can judge whether the impersonator exists. The sec-ond protocol is a modified version with a circular structure. The two protocols can be efficiently used for MSQIA in a network. They are feasible with current technol-ogy.

  12. ASYNCHRONOUS ELECTRONIC DISCUSSION GROUP:

    Directory of Open Access Journals (Sweden)

    Tina Lim Swee KIM

    2007-01-01

    Full Text Available This paper examines the practice of online discussion in a course specially tailored for in-service teachers who are pursuing their basic degree qualification at a teacher training institute. Analyses of postings to the asynchronous electronic discussion group were made according to the type of postings as proposed by Poole (2000. Four focus areas were looked into, that is, content, technical, procedural, or non-academic. Analyses were done for each quarter of the 12 weeks of interaction. At the end of the learners’ participation in the EDG and before their end-of-course examination, the participants were then given a paper-based questionnaire asking their perceptions on the use of EDG as part of their coursework on the whole. Six aspects of EDG were examined, these are;Ø technical aspects, Ø motivation to use the EDG, Ø quality of interaction, Ø tutor’s response, Ø perceived learning, and Ø attitude towards EDG. Analyses on postings for the EDG showed that the bulk of the postings were made in the last quarter of the online discussions. Further, 97.8% of the postings were on content and the types of content posting registered were predominantly questions (41.19% and those that sought clarification/elaboration (37.48%. Findings from this study suggest that overall the participants were satisfied with the six aspects of EDG examined. The aspect that recorded the highest mean was ‘motivation to read tutor’s responses’ whilst the lowest mean (and the only one with negative perception was for ‘worthiness of time spent on online discussions’.

  13. Asynchronous updating of threshold-coupled chaotic neurons

    Indian Academy of Sciences (India)

    Manish Dev Shirmali; Sudeshna Sinha; Kazuyuki Aihara

    2008-06-01

    We study a network of chaotic model neurons incorporating threshold activated coupling. We obtain a wide range of spatiotemporal patterns under varying degrees of asynchronicity in the evolution of the neuronal components. For instance, we find that sequential updating of threshold-coupled chaotic neurons can yield dynamical switching of the individual neurons between two states. So varying the asynchronicity in the updating scheme can serve as a control mechanism to extract different responses, and this can have possible applications in computation and information processing.

  14. On the basins of attraction of the regular autonomous asynchronous systems

    OpenAIRE

    Vlad, Serban E.

    2012-01-01

    The Boolean autonomous dynamical systems, also called regular autonomous asynchronous systems are systems whose 'vector field' is a function {\\Phi}:{0,1}^{n}{\\to}{0,1}^{n} and time is discrete or continuous. While the synchronous systems have their coordinate functions {\\Phi}_{1},...,{\\Phi}_{n} computed at the same time: {\\Phi},{\\Phi}{\\circ}{\\Phi},{\\Phi}{\\circ}{\\Phi}{\\circ}{\\Phi},... the asynchronous systems have {\\Phi}_{1},...,{\\Phi}_{n} computed independently on each other. The purpose of t...

  15. A novel protocol for multiparty quantum key management

    Science.gov (United States)

    Xu, Gang; Chen, Xiu-Bo; Dou, Zhao; Yang, Yi-Xian; Li, Zongpeng

    2015-08-01

    Key management plays a fundamental role in the field of cryptography. In this paper, we propose a novel multiparty quantum key management (QKM) protocol. Departing from single-function quantum cryptography protocols, our protocol has a salient feature in that it accomplishes a complete QKM process. In this process, we can simultaneously realize the functions of key generation, key distribution and key backup by executing the protocol once. Meanwhile, for the first time, we propose the idea of multi-function QKM. Firstly, the secret key is randomly generated by managers via the quantum measurements in -level Bell basis. Then, through entanglement swapping, the secret key is successfully distributed to users. Under circumstances of urgent requirement, all managers can cooperate to recover the users' secret key, but neither of them can recover it unilaterally. Furthermore, this protocol is further generalized into the multi-manager and multi-user QKM scenario. It has clear advantages in the burgeoning area of quantum security group communication. In this system, all group members share the same group key, and group key management is the foundation of secure group communication and hence an important subject of study.

  16. Selective particle capture by asynchronously beating cilia

    Science.gov (United States)

    Ding, Yang; Kanso, Eva

    2015-12-01

    Selective particle filtration is fundamental in many engineering and biological systems. For example, many aquatic microorganisms use filter feeding to capture food particles from the surrounding fluid, using motile cilia. One of the capture strategies is to use the same cilia to generate feeding currents and to intercept particles when the particles are on the downstream side of the cilia. Here, we develop a 3D computational model of ciliary bands interacting with flow suspended particles and calculate particle trajectories for a range of particle sizes. Consistent with experimental observations, we find optimal particle sizes that maximize capture rate. The optimal size depends nonlinearly on cilia spacing and cilia coordination, synchronous vs. asynchronous. These parameters affect the cilia-generated flow field, which in turn affects particle trajectories. The low capture rate of smaller particles is due to the particles' inability to cross the flow streamlines of neighboring cilia. Meanwhile, large particles have difficulty entering the sub-ciliary region once advected downstream, also resulting in low capture rates. The optimal range of particle sizes is enhanced when cilia beat asynchronously. These findings have potentially important implications on the design and use of biomimetic cilia in processes such as particle sorting in microfluidic devices.

  17. Asynchronous control for networked systems

    CERN Document Server

    Rubio, Francisco; Bencomo, Sebastián

    2015-01-01

    This book sheds light on networked control systems; it describes different techniques for asynchronous control, moving away from the periodic actions of classical control, replacing them with state-based decisions and reducing the frequency with which communication between subsystems is required. The text focuses specially on event-based control. Split into two parts, Asynchronous Control for Networked Systems begins by addressing the problems of single-loop networked control systems, laying out various solutions which include two alternative model-based control schemes (anticipatory and predictive) and the use of H2/H∞ robust control to deal with network delays and packet losses. Results on self-triggering and send-on-delta sampling are presented to reduce the need for feedback in the loop. In Part II, the authors present solutions for distributed estimation and control. They deal first with reliable networks and then extend their results to scenarios in which delays and packet losses may occur. The novel ...

  18. Asynchronous MPI for the Masses

    OpenAIRE

    Wittmann, Markus; Hager, Georg; Zeiser, Thomas; Wellein, Gerhard

    2013-01-01

    We present a simple library which equips MPI implementations with truly asynchronous non-blocking point-to-point operations, and which is independent of the underlying communication infrastructure. It utilizes the MPI profiling interface (PMPI) and the MPI_THREAD_MULTIPLE thread compatibility level, and works with current versions of Intel MPI, Open MPI, MPICH2, MVAPICH2, Cray MPI, and IBM MPI. We show performance comparisons on a commodity InfiniBand cluster and two tier-1 systems in Germany...

  19. Asynchronous τ-leaping

    Science.gov (United States)

    JÈ©drzejewski-Szmek, Zbigniew; Blackwell, Kim T.

    2016-03-01

    Stochastic simulation of cell signaling pathways and genetic regulatory networks has contributed to the understanding of cell function; however, investigation of larger, more complicated systems requires computationally efficient algorithms. τ-leaping methods, which improve efficiency when some molecules have high copy numbers, either use a fixed leap size, which does not adapt to changing state, or recalculate leap size at a heavy computational cost. We present a hybrid simulation method for reaction-diffusion systems which combines exact stochastic simulation and τ-leaping in a dynamic way. Putative times of events are stored in a priority queue, which reduces the cost of each step of the simulation. For every reaction and diffusion channel at each step of the simulation the more efficient of an exact stochastic event or a τ-leap is chosen. This new approach removes the inherent trade-off between speed and accuracy in stiff systems which was present in all τ-leaping methods by allowing each reaction channel to proceed at its own pace. Both directions of reversible reactions and diffusion are combined in a single event, allowing bigger leaps to be taken. This improves efficiency for systems near equilibrium where forward and backward events are approximately equally frequent. Comparison with existing algorithms and behaviour for five test cases of varying complexity shows that the new method is almost as accurate as exact stochastic simulation, scales well for large systems, and for various problems can be significantly faster than τ-leaping.

  20. Asynchronous Methods for Deep Reinforcement Learning

    OpenAIRE

    Mnih, Volodymyr; Badia, Adrià Puigdomènech; Mirza, Mehdi; Graves, Alex; Lillicrap, Timothy P.; Harley, Tim; Silver, David; Kavukcuoglu, Koray

    2016-01-01

    We propose a conceptually simple and lightweight framework for deep reinforcement learning that uses asynchronous gradient descent for optimization of deep neural network controllers. We present asynchronous variants of four standard reinforcement learning algorithms and show that parallel actor-learners have a stabilizing effect on training allowing all four methods to successfully train neural network controllers. The best performing method, an asynchronous variant of actor-critic, surpasse...

  1. On the convergence time of asynchronous distributed quantized averaging algorithms

    OpenAIRE

    ZHU, MINGHUI; Martinez, Sonia

    2010-01-01

    We come up with a class of distributed quantized averaging algorithms on asynchronous communication networks with fixed, switching and random topologies. The implementation of these algorithms is subject to the realistic constraint that the communication rate, the memory capacities of agents and the computation precision are finite. The focus of this paper is on the study of the convergence time of the proposed quantized averaging algorithms. By appealing to random walks on graphs, we derive ...

  2. Inference of asynchronous Boolean network from biological pathways.

    Science.gov (United States)

    Das, Haimabati; Layek, Ritwik Kumar

    2015-01-01

    Gene regulation is a complex process with multiple levels of interactions. In order to describe this complex dynamical system with tractable parameterization, the choice of the dynamical system model is of paramount importance. The right abstraction of the modeling scheme can reduce the complexity in the inference and intervention design, both computationally and experimentally. This article proposes an asynchronous Boolean network framework to capture the transcriptional regulation as well as the protein-protein interactions in a genetic regulatory system. The inference of asynchronous Boolean network from biological pathways information and experimental evidence are explained using an algorithm. The suitability of this paradigm for the variability of several reaction rates is also discussed. This methodology and model selection open up new research challenges in understanding gene-protein interactive system in a coherent way and can be beneficial for designing effective therapeutic intervention strategy.

  3. Students' Activity Focus in Online Asynchronous Peer Learning Forums

    Directory of Open Access Journals (Sweden)

    Naomi BOYER

    2010-04-01

    Full Text Available This qualitative study explores how using Peer Learning Forums (PLF in an online asynchronous computer programming course can be analyzed to derive information about Student Activity Focus (SAF for adult Information Technology students. Three instruments are proposed to assist instructors classify questions posted by students on these forums, obtain easy quantitative measures of their SAF, and use it to gain a better understanding of the type of learning barriers they are encountering. In addition, we also look at the difference in SAF between passing and failing students based on their exam performance. The PLF learning activity and the classification instruments are easily adaptable to other disciplines or courses and allow instructors and students alike to gain a better understanding of what kind of participation is helpful in online asynchronous discussion forums.

  4. Asynchronous Rate Chaos in Spiking Neuronal Circuits

    Science.gov (United States)

    Harish, Omri; Hansel, David

    2015-01-01

    The brain exhibits temporally complex patterns of activity with features similar to those of chaotic systems. Theoretical studies over the last twenty years have described various computational advantages for such regimes in neuronal systems. Nevertheless, it still remains unclear whether chaos requires specific cellular properties or network architectures, or whether it is a generic property of neuronal circuits. We investigate the dynamics of networks of excitatory-inhibitory (EI) spiking neurons with random sparse connectivity operating in the regime of balance of excitation and inhibition. Combining Dynamical Mean-Field Theory with numerical simulations, we show that chaotic, asynchronous firing rate fluctuations emerge generically for sufficiently strong synapses. Two different mechanisms can lead to these chaotic fluctuations. One mechanism relies on slow I-I inhibition which gives rise to slow subthreshold voltage and rate fluctuations. The decorrelation time of these fluctuations is proportional to the time constant of the inhibition. The second mechanism relies on the recurrent E-I-E feedback loop. It requires slow excitation but the inhibition can be fast. In the corresponding dynamical regime all neurons exhibit rate fluctuations on the time scale of the excitation. Another feature of this regime is that the population-averaged firing rate is substantially smaller in the excitatory population than in the inhibitory population. This is not necessarily the case in the I-I mechanism. Finally, we discuss the neurophysiological and computational significance of our results. PMID:26230679

  5. Carrying Synchronous Voice Data On Asynchronous Networks

    Science.gov (United States)

    Bergman, Larry A.

    1990-01-01

    Buffers restore synchronism for internal use and permit asynchronism in external transmission. Proposed asynchronous local-area digital communication network (LAN) carries synchronous voice, data, or video signals, or non-real-time asynchronous data signals. Network uses double buffering scheme that reestablishes phase and frequency references at each node in network. Concept demonstrated in token-ring network operating at 80 Mb/s, pending development of equipment operating at planned data rate of 200 Mb/s. Technique generic and used with any LAN as long as protocol offers deterministic (or bonded) access delays and sufficient capacity.

  6. Asynchronous design of Networks-on-Chip

    DEFF Research Database (Denmark)

    Sparsø, Jens

    2007-01-01

    The Network-on-chip concept has evolved as a solution to a broad range of problems related to the design of complex systems-on-chip (SoC) with tenths or hundreds of (heterogeneous) IP-cores. The paper introduces the NoC concept, identifies a range of possible timing organizations (globally......-synchronous, mesochronous, globally-asynchronous locally-synchronous and fully asynchronous), discusses the circuitry needed to implement these timing methodologies, and provides some implementation details for a couple of asynchronous NoCs designed at the Technical University of Denmark (DTU). The paper is written...

  7. Burst-Mode Asynchronous Controllers on FPGA

    Directory of Open Access Journals (Sweden)

    Duarte L. Oliveira

    2008-01-01

    Full Text Available FPGAs have been mainly used to design synchronous circuits. Asynchronous design on FPGAs is difficult because the resulting circuit may suffer from hazard problems. We propose a method that implements a popular class of asynchronous circuits, known as burst mode, on FPGAs based on look-up table architectures. We present two conditions that, if satisfied, guarantee essential hazard-free implementation on any LUT-based FPGA. By doing that, besides all the intrinsic advantages of asynchronous over synchronous circuits, they also take advantage of the shorter design time and lower cost associated with FPGA designs.

  8. W-state Analyzer and Multi-party Measurement-device-independent Quantum Key Distribution

    Science.gov (United States)

    Zhu, Changhua; Xu, Feihu; Pei, Changxing

    2015-12-01

    W-state is an important resource for many quantum information processing tasks. In this paper, we for the first time propose a multi-party measurement-device-independent quantum key distribution (MDI-QKD) protocol based on W-state. With linear optics, we design a W-state analyzer in order to distinguish the four-qubit W-state. This analyzer constructs the measurement device for four-party MDI-QKD. Moreover, we derived a complete security proof of the four-party MDI-QKD, and performed a numerical simulation to study its performance. The results show that four-party MDI-QKD is feasible over 150 km standard telecom fiber with off-the-shelf single photon detectors. This work takes an important step towards multi-party quantum communication and a quantum network.

  9. Economical multiparty simultaneous quantum identity authentication based on Greenberger-Horne-Zeilinger states

    Institute of Scientific and Technical Information of China (English)

    Yang Yu-Guang; Wen Qiao-Yan

    2009-01-01

    A multiparty simultaneous quantum identity authentication protocol based on Greenberger-Horne-Zeilinger (GHZ) states is proposed.The multi-user can be authenticated by a trusted third party (TTP) simultaneously.Compared with the scheme proposed recently (Wang et al 2006 Chin.Phys.Lett.23(9) 2360),the proposed scheme has the advantages of consuming fewer quantum and classical resources and lessening the difficulty and intensity of necessary operations.

  10. Formal analysis and design of multi-party fair exchange protocols

    Institute of Scientific and Technical Information of China (English)

    2006-01-01

    Based on the origin of message items and channel combination between transacting parties, and events and relations among events, this paper presents a concise, precise, and hierarchical model for general fair exchange protocols, formally specifies various security requirements which are able to reflect inherent requirements for fair exchange protocols more rigorously, and partition these security requirements with fine granularity. This work helps analyze, debug, and design multi-party fair exchange protocols more effectively and elaborately.

  11. Multi-party and Multi-contract Arbitration Mechanisms in International Commercial Arbitration

    OpenAIRE

    Laitinen, Klas

    2014-01-01

    International commercial arbitration is the de facto method of solving disputes between corporations. Multi-party and multi-contract arbitration situations have increased significantly in recent years, which has led to arbitration institutes creating new mechanisms to increase efficiency in such situations. However, these new rules have not been studied in-depth and compared to each other, to ascertain possible similarities, dissimilarities, and common requirements. This thesis examines joind...

  12. Multiparty quantum secret conference based on quantum encryption with pure entangled states

    Institute of Scientific and Technical Information of China (English)

    Gu Bin; Li Chuan-Qi; Chen Yu-Lin

    2009-01-01

    We present a scheme for multiparty quantum remote secret conference (MQRSC) with pure entangled states, not maximally entangled multipartite quantum systems. The conferees first share a private quantum key, a sequence of pure entangled states and then use them to encode and decode the secret messages. The conferees exploit the decoy-photon technique to ensure the security of the transmission of qubits. This MQRSC scheme is more feasible and efficient than others.

  13. Economical multiparty simultaneous quantum identity authentication based on Greenberger–Horne–Zeilinger states

    International Nuclear Information System (INIS)

    A multiparty simultaneous quantum identity authentication protocol based on Greenberger–Horne–Zeilinger (GHZ) states is proposed. The multi-user can be authenticated by a trusted third party (TTP) simultaneously. Compared with the scheme proposed recently (Wang et al 2006 Chin. Phys. Lett. 23(9) 2360), the proposed scheme has the advantages of consuming fewer quantum and classical resources and lessening the difficulty and intensity of necessary operations. (general)

  14. Implementing LOTOS as asynchronously Communicating Processes

    OpenAIRE

    Sjödin, Peter

    1990-01-01

    A technique is presented for translating LOTOS specifications into implementations executing as asynchronously communicating processes. This generation of implementations is described as transformations of LOTOS expressions. A protocol for implementing LOTOS synchronisation is described.

  15. Asynchronous Data Fusion With Parallel Filtering Frame

    OpenAIRE

    Na Li; Junhui Liu

    2011-01-01

    This paper studies the design of data fusion algorithm for asynchronous system with integer times sampling. Firstly, the multisensor asynchronous samplings is mapped to the basic axis, accordingly a sampling sequence of single sensor can be taken. Secondly, aiming at the sensor with the densest sampling points, the modified parallel filtering is given. Afterwards, the sequential filtering fusion method is introduced to deal with the case that there are multiple mapped measurements at some sam...

  16. REACTIVE POWER COMPENSATION IN ASYNCHRONOUS ELECTRIC DRIVES

    Directory of Open Access Journals (Sweden)

    V.S. Malyar

    2013-10-01

    Full Text Available A problem of calculating capacity of cosine capacitors for individual compensation of reactive power in asynchronous electric drives in stationary and transient operation modes is considered. The algorithm introduced employs a high-adequacy mathematical model of asynchronous motor developed on the theory of representing vectors which takes into account both the magnetic core saturation and the current displacement in the rotor bars.

  17. Asynchronous communication in real space process algebra

    OpenAIRE

    Baeten, JCM Jos; Bergstra, JA Jan

    1992-01-01

    A version of classical real space process algebra is given in which messages travel with constant speed through a three-dimensional medium. It follows that communication is asynchronous and has a broadcasting character. A state operator is used to describe asynchronous message transfer and a priority mechanism allows to express the broadcasting mechanism. As an application, a protocol is specified in which the receiver moves with respect to the sender.

  18. Performance Analysis of Asynchronous Multicarrier Wireless Networks

    OpenAIRE

    Lin, Xingqin; Jiang, Libin; Andrews, Jeffrey G.

    2014-01-01

    This paper develops a novel analytical framework for asynchronous wireless networks deploying multicarrier transmission. Nodes in the network have different notions of timing, so from the viewpoint of a typical receiver, the received signals from different transmitters are asynchronous, leading to a loss of orthogonality between subcarriers. We first develop a detailed link-level analysis based on OFDM, based on which we propose a tractable system-level signal-to-interference-plus-noise ratio...

  19. Arithmetic Operations and Factorization using Asynchronous P Systems

    Directory of Open Access Journals (Sweden)

    Takayuki Murakawa

    2012-07-01

    Full Text Available

    In the present paper, we consider the asynchronous parallelism in membrane computing, and propose asynchronous P systems that perform two basic arithmetic operations and factorization. Since there is no restrictive assumption for application of rules, sequential and maximal parallel executions are allowed on the asynchronous P system.

    We first propose a P system that computes addition of two binary numbers of m bits.  The P system works in O(m sequential and parallel steps using O(m types of objects. We next propose a P system for multiplication of the two binary numbers of m bits, and show that the P system works in O(m log m parallel steps or O(m3 sequential steps using O(m2 types of objects. Finally, we propose a P system for factorization of a positive integer of $m$ bits using the above P system as a sub-system. The P system computes the factorization in O(m log m parallel steps or O(4m 

  20. IHadoop: Asynchronous iterations for MapReduce

    KAUST Repository

    Elnikety, Eslam Mohamed Ibrahim

    2011-11-01

    MapReduce is a distributed programming frame-work designed to ease the development of scalable data-intensive applications for large clusters of commodity machines. Most machine learning and data mining applications involve iterative computations over large datasets, such as the Web hyperlink structures and social network graphs. Yet, the MapReduce model does not efficiently support this important class of applications. The architecture of MapReduce, most critically its dataflow techniques and task scheduling, is completely unaware of the nature of iterative applications; tasks are scheduled according to a policy that optimizes the execution for a single iteration which wastes bandwidth, I/O, and CPU cycles when compared with an optimal execution for a consecutive set of iterations. This work presents iHadoop, a modified MapReduce model, and an associated implementation, optimized for iterative computations. The iHadoop model schedules iterations asynchronously. It connects the output of one iteration to the next, allowing both to process their data concurrently. iHadoop\\'s task scheduler exploits inter-iteration data locality by scheduling tasks that exhibit a producer/consumer relation on the same physical machine allowing a fast local data transfer. For those iterative applications that require satisfying certain criteria before termination, iHadoop runs the check concurrently during the execution of the subsequent iteration to further reduce the application\\'s latency. This paper also describes our implementation of the iHadoop model, and evaluates its performance against Hadoop, the widely used open source implementation of MapReduce. Experiments using different data analysis applications over real-world and synthetic datasets show that iHadoop performs better than Hadoop for iterative algorithms, reducing execution time of iterative applications by 25% on average. Furthermore, integrating iHadoop with HaLoop, a variant Hadoop implementation that caches

  1. Wind Generator Stabilization with Doubly-Fed Asynchronous Machine

    Institute of Scientific and Technical Information of China (English)

    WU Li; WANG Zhi-xin

    2007-01-01

    This paper investigates the function of doubly-fed asynchronous machine(DASM) with emphasis placed on its ability to the stabilization of the power system including wind generators. P(active power) and Q(reactive power) compensation from DASM can be regulated independently through secondary-excitation controlling. Simulation results by power system computer aided design(PSCAD) show that DASM can restore the wind-generator system to a normal operating condition rapidly even following severe transmission-line failures. Comparison studies have also been performed between wind turbine pitch control and proposed method.

  2. A wavelet approach to binary blackholes with asynchronous multitasking

    Science.gov (United States)

    Lim, Hyun; Hirschmann, Eric; Neilsen, David; Anderson, Matthew; Debuhr, Jackson; Zhang, Bo

    2016-03-01

    Highly accurate simulations of binary black holes and neutron stars are needed to address a variety of interesting problems in relativistic astrophysics. We present a new method for the solving the Einstein equations (BSSN formulation) using iterated interpolating wavelets. Wavelet coefficients provide a direct measure of the local approximation error for the solution and place collocation points that naturally adapt to features of the solution. Further, they exhibit exponential convergence on unevenly spaced collection points. The parallel implementation of the wavelet simulation framework presented here deviates from conventional practice in combining multi-threading with a form of message-driven computation sometimes referred to as asynchronous multitasking.

  3. ON THE ISSUE OF VECTOR CONTROL OF THE ASYNCHRONOUS MOTORS

    Directory of Open Access Journals (Sweden)

    B. I. Firago

    2015-10-01

    of the computer based simulation of a specific electric drive on the basis of an asynchronous motor 4А132S4У3 (7,5 kW with direct vector control at the rated loading. The results confirm validity of the presented technique to investigation of the

  4. Asynchronous Complex Pipeline Design Based on ARM Instruction Set

    Institute of Scientific and Technical Information of China (English)

    WANG Bing; WANG Qin; PENG Rui-hua; FU Yu-zhuo

    2008-01-01

    This paper proposes an asynchronous complex pipeline based on ARM-V3 instruction set. Muller pipeline structure is used as prototype, and the factors which may affect pipeline performance are analyzed. To balance the difficulty of asynchronous design and performance analysis, both complete asynchronous and partial asynchronous structures aere designed and compared. Results of comparison with the well-Rnown industrial product ARM922T verify that about 30% and 40% performance improvement of the partial and complete asynchronous complex pipelines can be obtained respectively. The design methodologies can also be used in the design of other asynchronous pipelines.

  5. Asynchronous Task-Based Polar Decomposition on Manycore Architectures

    KAUST Repository

    Sukkari, Dalal

    2016-10-25

    This paper introduces the first asynchronous, task-based implementation of the polar decomposition on manycore architectures. Based on a new formulation of the iterative QR dynamically-weighted Halley algorithm (QDWH) for the calculation of the polar decomposition, the proposed implementation replaces the original and hostile LU factorization for the condition number estimator by the more adequate QR factorization to enable software portability across various architectures. Relying on fine-grained computations, the novel task-based implementation is also capable of taking advantage of the identity structure of the matrix involved during the QDWH iterations, which decreases the overall algorithmic complexity. Furthermore, the artifactual synchronization points have been severely weakened compared to previous implementations, unveiling look-ahead opportunities for better hardware occupancy. The overall QDWH-based polar decomposition can then be represented as a directed acyclic graph (DAG), where nodes represent computational tasks and edges define the inter-task data dependencies. The StarPU dynamic runtime system is employed to traverse the DAG, to track the various data dependencies and to asynchronously schedule the computational tasks on the underlying hardware resources, resulting in an out-of-order task scheduling. Benchmarking experiments show significant improvements against existing state-of-the-art high performance implementations (i.e., Intel MKL and Elemental) for the polar decomposition on latest shared-memory vendors\\' systems (i.e., Intel Haswell/Broadwell/Knights Landing, NVIDIA K80/P100 GPUs and IBM Power8), while maintaining high numerical accuracy.

  6. An Asynchronous P300 BCI With SSVEP-Based Control State Detection

    DEFF Research Database (Denmark)

    Panicker, Rajesh C.; Puthusserypady, Sadasivan; Sun, Ying

    2011-01-01

    In this paper, an asynchronous brain–computer interface (BCI) system combining the P300 and steady-state visually evoked potentials (SSVEPs) paradigms is proposed. The information transfer is accomplished using P300 event-related potential paradigm and the control state (CS) detection is achieved...

  7. Towards behavioral synthesis of asynchronous circuits - an implementation template targeting syntax directed compilation

    DEFF Research Database (Denmark)

    Nielsen, Sune Fallgaard; Sparsø, Jens; Madsen, Jan

    2004-01-01

    domain by introducing a computation model, which resembles the synchronous datapath and control architecture, but which is completely asynchronous. The datapath and control architecture is then expressed in the Balsa-language, and using syntax directed compilation a corresponding handshake circuit...

  8. Modelling and Simulation of Asynchronous Real-Time Systems using Timed Rebeca

    CERN Document Server

    Aceto, Luca; Ingolfsdottir, Anna; Reynisson, Arni Hermann; Sigurdarson, Steinar Hugi; Sirjani, Marjan; 10.4204/EPTCS.58.1

    2011-01-01

    In this paper we propose an extension of the Rebeca language that can be used to model distributed and asynchronous systems with timing constraints. We provide the formal semantics of the language using Structural Operational Semantics, and show its expressiveness by means of examples. We developed a tool for automated translation from timed Rebeca to the Erlang language, which provides a first implementation of timed Rebeca. We can use the tool to set the parameters of timed Rebeca models, which represent the environment and component variables, and use McErlang to run multiple simulations for different settings. Timed Rebeca restricts the modeller to a pure asynchronous actor-based paradigm, where the structure of the model represents the service oriented architecture, while the computational model matches the network infrastructure. Simulation is shown to be an effective analysis support, specially where model checking faces almost immediate state explosion in an asynchronous setting.

  9. EXPERIMENTAL STUDY OF THE ASYNCHRONOUS MULTISPLITTING RELAXATION METHODS FOR THE LINEAR COMPLEMENTARITY PROBLEMS

    Institute of Scientific and Technical Information of China (English)

    Zhong-zhi Bai

    2002-01-01

    We study the numerical behaviours of the relaxed asynchronous multisplitting methods for the linear complementarity problems by solving some typical problems from practical applications on a real multiprocessor system. Numerical results show that the parallel multisplitting relaxation methods always perform much better than the corresponding sequential alternatives, and that the asynchronous multisplitting relaxation methods often outperform their corresponding synchronous counterparts. Moreover, the two-sweep relaxed multisplitting methods have better convergence properties than their corresponding one-sweep relaxed ones in the sense that they have larger convergence domains and faster convergence speeds. Hence, the asynchronous multisplitting unsymmetric relaxation iterations should be the methods of choice for solving the large sparse linear complementarity problems in the parallel computing environments.

  10. Asynchronous Video Interviewing as a New Technology in Personnel Selection: The Applicant's Point of View.

    Science.gov (United States)

    Brenner, Falko S; Ortner, Tuulia M; Fay, Doris

    2016-01-01

    The present study aimed to integrate findings from technology acceptance research with research on applicant reactions to new technology for the emerging selection procedure of asynchronous video interviewing. One hundred six volunteers experienced asynchronous video interviewing and filled out several questionnaires including one on the applicants' personalities. In line with previous technology acceptance research, the data revealed that perceived usefulness and perceived ease of use predicted attitudes toward asynchronous video interviewing. Furthermore, openness revealed to moderate the relation between perceived usefulness and attitudes toward this particular selection technology. No significant effects emerged for computer self-efficacy, job interview self-efficacy, extraversion, neuroticism, and conscientiousness. Theoretical and practical implications are discussed. PMID:27378969

  11. Asynchronous decentralized method for interconnected electricity markets

    International Nuclear Information System (INIS)

    This paper presents an asynchronous decentralized method to solve the optimization problem of interconnected electricity markets. The proposed method decomposes the optimization problem of combined electricity markets into individual optimization problems. The impact of neighboring markets' information is included in the objective function of the individual market optimization problem by the standard Lagrangian relaxation method. Most decentralized optimization methods use synchronous models of communication to exchange updated market information among markets during the iterative process. In this paper, however, the solutions of the individual optimization problems are coordinated through an asynchronous communication model until they converge to the global optimal solution of combined markets. Numerical examples are presented to demonstrate the advantages of the proposed asynchronous method over the existing synchronous methods. (author)

  12. Novel Multiparty Controlled Bidirectional Quantum Secure Direct Communication Based on Continuous-variable States

    Science.gov (United States)

    Yu, Zhen-Bo; Gong, Li-Hua; Wen, Ru-Hong

    2016-03-01

    A novel multiparty controlled bidirectional quantum secure direct communication protocol combining continuous-variable states with qubit block transmission is proposed. Two legitimate communication parties encode their own secret information into entangled optical modes with translation operations, and the secret information of each counterpart can only be recovered under the permission of all controllers. Due to continuous-variable states and block transmission strategy, the proposed protocol is easy to realize with perfect qubit efficiency. Security analyses show that the proposed protocol is free from common attacks, including the man-in-the-middle attack.

  13. A Multiparty Controlled Bidirectional Quantum Secure Direct Communication and Authentication Protocol Based on EPR Pairs

    Science.gov (United States)

    Chang, Yan; Zhang, Shi-Bin; Yan, Li-Li; Sheng, Zhi-Wei

    2013-06-01

    A multiparty controlled bidirectional quantum secure direct communication and authentication protocol is proposed based on EPR pair and entanglement swapping. The legitimate identities of communicating parties are encoded to Bell states which act as a detection sequence. Secret messages are transmitted by using the classical XOR operation, which serves as a one-time-pad. No photon with secret information transmits in the quantum channel. Compared with the protocols proposed by Wang et al. [Acta Phys. Sin. 56 (2007) 673; Opt. Commun. 266 (2006) 732], the protocol in this study implements bidirectional communication and authentication, which defends most attacks including the ‘man-in-the-middle’ attack efficiently.

  14. Issue Evolution and the Remaking of Partisan Alignments in a European Multiparty System

    DEFF Research Database (Denmark)

    Arndt, Christoph

    Issue evolution has become a well-established theoretical perspective in the analysis of long-term electoral behavior and partisan alignments in the U.S. after the emergence of the cultural wars. Outside the U.S., however, this perspective has been rarely used to analyze electoral behavior...... analytical validity and usefulness in the analysis of electoral behavior beyond the U.S.-case....... two party systems, fringe parties act as catalysts of issue evolution on the elite-level which is then followed by mainstream party adaption and the mass electorate realignment. Applying and refining the issue evolution perspective to a multiparty context, this paper therefore demonstrates its...

  15. Improving the security of multiparty quantum secret sharing against Trojan horse attack

    OpenAIRE

    Deng, Fu-Guo; Li, Xi-Han; Zhou, Hong-Yu; Zhang, Zhan-jun

    2005-01-01

    We analyzed the security of the multiparty quantum secret sharing (MQSS) protocol recently proposed by Zhang, Li and Man [Phys. Rev. A \\textbf{71}, 044301 (2005)] and found that this protocol is secure for any other eavesdropper except for the agent Bob who prepares the quantum signals as he can attack the quantum communication with a Trojan horse. That is, Bob replaces the single-photon signal with a multi-photon one and the other agent Charlie cannot find this cheating as she does not measu...

  16. Spatiotemporal Features for Asynchronous Event-based Data

    Directory of Open Access Journals (Sweden)

    Xavier eLagorce

    2015-02-01

    Full Text Available Bio-inspired asynchronous event-based vision sensors are currently introducing a paradigm shift in visual information processing. These new sensors rely on a stimulus-driven principle of light acquisition similar to biological retinas. They are event-driven and fully asynchronous, thereby reducing redundancy and encoding exact times of input signal changes, leading to a very precise temporal resolution. Approaches for higher-level computer vision often rely on the realiable detection of features in visual frames, but similar definitions of features for the novel dynamic and event-based visual input representation of silicon retinas have so far been lacking. This article addresses the problem of learning and recognizing features for event-based vision sensors, which capture properties of truly spatiotemporal volumes of sparse visual event information. A novel computational architecture for learning and encoding spatiotemporal features is introduced based on a set of predictive recurrent reservoir networks, competing via winner-take-all selection. Features are learned in an unsupervised manner from real-world input recorded with event-based vision sensors. It is shown that the networks in the architecture learn distinct and task-specific dynamic visual features, and can predict their trajectories over time.

  17. A Parallel Particle Swarm Optimization Algorithm Accelerated by Asynchronous Evaluations

    Science.gov (United States)

    Venter, Gerhard; Sobieszczanski-Sobieski, Jaroslaw

    2005-01-01

    A parallel Particle Swarm Optimization (PSO) algorithm is presented. Particle swarm optimization is a fairly recent addition to the family of non-gradient based, probabilistic search algorithms that is based on a simplified social model and is closely tied to swarming theory. Although PSO algorithms present several attractive properties to the designer, they are plagued by high computational cost as measured by elapsed time. One approach to reduce the elapsed time is to make use of coarse-grained parallelization to evaluate the design points. Previous parallel PSO algorithms were mostly implemented in a synchronous manner, where all design points within a design iteration are evaluated before the next iteration is started. This approach leads to poor parallel speedup in cases where a heterogeneous parallel environment is used and/or where the analysis time depends on the design point being analyzed. This paper introduces an asynchronous parallel PSO algorithm that greatly improves the parallel e ciency. The asynchronous algorithm is benchmarked on a cluster assembled of Apple Macintosh G5 desktop computers, using the multi-disciplinary optimization of a typical transport aircraft wing as an example.

  18. FAST: A fully asynchronous and status-tracking pattern for geoprocessing services orchestration

    Science.gov (United States)

    Wu, Huayi; You, Lan; Gui, Zhipeng; Gao, Shuang; Li, Zhenqiang; Yu, Jingmin

    2014-09-01

    Geoprocessing service orchestration (GSO) provides a unified and flexible way to implement cross-application, long-lived, and multi-step geoprocessing service workflows by coordinating geoprocessing services collaboratively. Usually, geoprocessing services and geoprocessing service workflows are data and/or computing intensive. The intensity feature may make the execution process of a workflow time-consuming. Since it initials an execution request without blocking other interactions on the client side, an asynchronous mechanism is especially appropriate for GSO workflows. Many critical problems remain to be solved in existing asynchronous patterns for GSO including difficulties in improving performance, status tracking, and clarifying the workflow structure. These problems are a challenge when orchestrating performance efficiency, making statuses instantly available, and constructing clearly structured GSO workflows. A Fully Asynchronous and Status-Tracking (FAST) pattern that adopts asynchronous interactions throughout the whole communication tier of a workflow is proposed for GSO. The proposed FAST pattern includes a mechanism that actively pushes the latest status to clients instantly and economically. An independent proxy was designed to isolate the status tracking logic from the geoprocessing business logic, which assists the formation of a clear GSO workflow structure. A workflow was implemented in the FAST pattern to simulate the flooding process in the Poyang Lake region. Experimental results show that the proposed FAST pattern can efficiently tackle data/computing intensive geoprocessing tasks. The performance of all collaborative partners was improved due to the asynchronous mechanism throughout communication tier. A status-tracking mechanism helps users retrieve the latest running status of a GSO workflow in an efficient and instant way. The clear structure of the GSO workflow lowers the barriers for geospatial domain experts and model designers to

  19. Synchronization of Asynchronous Switched Boolean Network.

    Science.gov (United States)

    Zhang, Hao; Wang, Xingyuan; Lin, Xiaohui

    2015-01-01

    In this paper, the complete synchronizations for asynchronous switched Boolean network with free Boolean sequence controllers and close-loop controllers are studied. First, the basic asynchronous switched Boolean network model is provided. With the method of semi-tensor product, the Boolean dynamics is translated into linear representation. Second, necessary and sufficient conditions for ASBN synchronization with free Boolean sequence control and close-loop control are derived, respectively. Third, some illustrative examples are provided to show the efficiency of the proposed methods.

  20. Handbook of asynchronous machines with variable speed

    CERN Document Server

    Razik, Hubert

    2013-01-01

    This handbook deals with the asynchronous machine in its close environment. It was born from a reflection on this electromagnetic converter whose integration in industrial environments takes a wide part. Previously this type of motor operated at fixed speed, from now on it has been integrated more and more in processes at variable speed. For this reason it seemed useful, or necessary, to write a handbook on the various aspects from the motor in itself, via the control and while finishing by the diagnosis aspect. Indeed, an asynchronous motor is used nowadays in industry where variation speed a

  1. The non-anticipation of the asynchronous systems

    OpenAIRE

    Vlad, Serban E.

    2008-01-01

    The asynchronous systems are the models of the asynchronous circuits from the digital electrical engineering and non-anticipation is one of the most important properties in systems theory. Our present purpose is to introduce several concepts of non-anticipation of the asynchronous systems.

  2. Acceptability of an Asynchronous Learning Forum on Mobile Devices

    Science.gov (United States)

    Chang, Chih-Kai

    2010-01-01

    Mobile learning has recently become noteworthy because mobile devices have become popular. To construct an asynchronous learning forum on mobile devices is important because an asynchronous learning forum is always an essential part of networked asynchronous distance learning. However, the input interface in handheld learning devices, which is…

  3. Increasing Student Engagement Using Asynchronous Learning

    Science.gov (United States)

    Northey, Gavin; Bucic, Tania; Chylinski, Mathew; Govind, Rahul

    2015-01-01

    Student engagement is an ongoing concern for educators because of its positive association with deep learning and educational outcomes. This article tests the use of a social networking site (Facebook) as a tool to facilitate asynchronous learning opportunities that complement face-to-face interactions and thereby enable a stronger learning…

  4. Asynchronous Rumor Spreading on Random Graphs

    CERN Document Server

    Panagiotou, Konstantinos

    2016-01-01

    We perform a thorough study of various characteristics of the asynchronous push-pull protocol for spreading a rumor on Erd\\H{o}s-R\\'enyi random graphs $G_{n,p}$, for any $p>c\\ln(n)/n$ with $c>1$. In particular, we provide a simple strategy for analyzing the asynchronous push-pull protocol on arbitrary graph topologies and apply this strategy to $G_{n,p}$. We prove tight bounds of logarithmic order for the total time that is needed until the information has spread to all nodes. Surprisingly, the time required by the asynchronous push-pull protocol is asymptotically almost unaffected by the average degree of the graph. Similarly tight bounds for Erd\\H{o}s-R\\'enyi random graphs have previously only been obtained for the synchronous push protocol, where it has been observed that the total running time increases significantly for sparse random graphs. Finally, we quantify the robustness of the protocol with respect to transmission and node failures. Our analysis suggests that the asynchronous protocols are particu...

  5. Duration of asynchronous operations in distributed systems

    OpenAIRE

    Makhaniok, Mikhail; Männer, Reinhard

    1995-01-01

    A distributed asynchronous system is investigated. Its processing elements execute common operations concurrently and distributively. They are implemented as combinatorial circuits and exchange data via open collector bus lines. A method is presented to identify and to minimize the duration of an operation and therefore to increase the performance of the system. No hardware modifications are required.

  6. Propagation of external regulation and asynchronous dynamics in random Boolean networks

    OpenAIRE

    Mahmoudi, Hamed; Pagnani, Andrea; Weigt, Martin; Zecchina, Riccardo

    2007-01-01

    Boolean Networks and their dynamics are of great interest as abstract modeling schemes in various disciplines, ranging from biology to computer science. Whereas parallel update schemes have been studied extensively in past years, the level of understanding of asynchronous updates schemes is still very poor. In this paper we study the propagation of external information given by regulatory input variables into a random Boolean network. We compute both analytically and numerically the time evol...

  7. The Effect of Asynchronous/Synchronous Approaches on English Vocabulary Achievement: A Study of Iranian EFL Learners

    Science.gov (United States)

    Khodaparast, Fatemeh; Ghafournia, Narjes

    2015-01-01

    The contribution of computer-assisted instructional programs to language learning process has been the focus of researchers for about two decades. However, the effect of synchronous and asynchronous computer-assisted approaches of language teaching on improving L2 vocabulary has been scarcely investigated. This study explored whether synchronous,…

  8. Enigma: Decentralized Computation Platform with Guaranteed Privacy

    OpenAIRE

    Zyskind, Guy; Nathan, Oz; Pentland, Alex

    2015-01-01

    A peer-to-peer network, enabling different parties to jointly store and run computations on data while keeping the data completely private. Enigma's computational model is based on a highly optimized version of secure multi-party computation, guaranteed by a verifiable secret-sharing scheme. For storage, we use a modified distributed hashtable for holding secret-shared data. An external blockchain is utilized as the controller of the network, manages access control, identities and serves as a...

  9. Low Latency High Throughout Circular Asynchronous FIFO

    Institute of Scientific and Technical Information of China (English)

    XIAO Yong; ZHOU Runde

    2008-01-01

    This paper describes a circular first in first out (FIFO) and its protocols which have a very low la-tency while still maintaining high throughput. Unlike the existing serial FIFOs based on asynchronous micro-pipelines, this FIFO's cells communicate directly with the input and output ports through a common bus, which effectively eliminates the data movement from the input port to the output port, thereby reducing the latency and the power consumption. Furthermore, the latency does not increase with the number of FIFO stages. Single-track asynchronous protocols are used to simplify the FIFO controller design, with only three C-gates needed in each cell controller, which substantially reduces the area. Simulations with the TSMC 0.25 Ijm CMOS logic process show that the latency of the 4-stage FIFO is less than 581 ps and the throughput is higher than 2.2 GHz.

  10. Existence test for asynchronous interval iterations

    DEFF Research Database (Denmark)

    Madsen, Kaj; Caprani, O.; Stauning, Ole

    1997-01-01

    In the search for regions that contain fixed points ofa real function of several variables, tests based on interval calculationscan be used to establish existence ornon-existence of fixed points in regions that are examined in the course ofthe search. The search can e.g. be performed as a...... synchronous (sequential) interval iteration:In each iteration step all components of the iterate are calculatedbased on the previous iterate. In this case it is straight forward to base simple interval existence and non-existencetests on the calculations done in each step of the iteration. The search can also...... be performed as an asynchronous (parallel) iteration: Only a few components are changed in each stepand this calculation is in general based on components from differentprevious iterates. For the asynchronous iteration it turns out thatsimple tests of existence and non-existence can be based on...

  11. Asynchronous Nano-Electronics: Preliminary Investigation

    OpenAIRE

    Martin, Alain J.; Prakash, Piyush

    2008-01-01

    This paper is a preliminary investigation in implementing asynchronous QDI logic in molecular nano-electronics, taking into account the restricted geometry, the lack of control on transistor strengths, the high timing variations. We show that the main building blocks of QDI logic can be successfully implemented; we illustrate the approach with the layout of an adder stage. The proposed techniques to improve the reliability of QDI apply to nano-CMOS as well.

  12. Asynchronous exponential growth of a bacterial population

    Directory of Open Access Journals (Sweden)

    Mohamed Boulanouar

    2014-01-01

    Full Text Available In this work, we complete a study started earlier in [1,2] wherein a model of growing bacterial population has been the matter of a mathematical analysis. We show that the full model is governed by a strongly continuous semigroup. Beside the positivity and the irreducibility of the generated semigroup, we describe its asymptotic behavior in the uniform topology which leads to the asynchronous exponential growth of the bacterial population.

  13. Accurate estimator of correlations between asynchronous signals

    OpenAIRE

    Toth, Bence; Kertesz, Janos

    2008-01-01

    The estimation of the correlation between time series is often hampered by the asynchronicity of the signals. Cumulating data within a time window suppresses this source of noise but weakens the statistics. We present a method to estimate correlations without applying long time windows. We decompose the correlations of data cumulated over a long window using decay of lagged correlations as calculated from short window data. This increases the accuracy of the estimated correlation significantl...

  14. Improving the security of multiparty quantum secret sharing against Trojan horse attack

    CERN Document Server

    Deng, F G; Deng, Fu-Guo; Zhou, Hong-Yu

    2005-01-01

    Security of the multiparty quantum secret sharing (MQSS) protocol recently proposed by Zhang et al. [Phys. Rev. A \\textbf{71}, 044301 (2005)] is analyzed in the case that the agent who prepares the quantum signal, say Bob wants to eavesdrop the information about the unitary operations done by the other agent, Charlie by using a Trojan horse attack. Bob can replace the single-photon signal with a multi-photon one and Charlie cannot find this cheating as she does not measure the photons before they runs back from the boss Alice, which reveals that this MQSS protocol is not secure. Finally, we present a possible improvement of the MQSS protocol security with two single-photon measurements and four unitary operations.

  15. An Efficient Password Security of Multi-Party Key Exchange Protocol Based on ECDLP

    Directory of Open Access Journals (Sweden)

    Banshidhar Majhi

    2009-12-01

    Full Text Available In this paper we have proposed an efficient password security of multiparty Key Exchange Protocol based on Elliptic Curve Discrete Logarithm Problem. Key exchange protocols allow a group of parties communicating over a public network to establish a common secret key called session key.Due to their significance by in building a secure communication channel, a number of key exchange protocols have been suggested over the years for a variety of settings.our Protocol is password authentication model, where group member are assumed to hold an individual password rather than a common password. Here we have taken two one-way hash functions to built the level of security high.

  16. Simple Post Quantum Scheme for Higher Key Rate Multiparty Quantum Key Distribution

    Directory of Open Access Journals (Sweden)

    Abudhahir Buhari

    2012-10-01

    Full Text Available We propose a multi-party quantum key distribution protocol which enables all the receivers can converttheir respective private shared key into common secret key without use of entanglement. The maincomponent of our protocol is a simple post quantum scheme for achieving the higher secret key rate.Efficiency of the extracted key rate is almost 100%. We assume that sender established the pre-sharedprivate secret keys and a common secret number with the receivers. Our proposed scheme sends n stringsof number to n receivers in the public channel to convert their respective shared secret key into commonsecret key in the presence of Eve. We also analyze the complexity of attack by the adversary to guess thesecret key

  17. Multiparty Quantum Secret Sharing of Classical Message using Cavity Quantum Electrodynamic System

    Institute of Scientific and Technical Information of China (English)

    HAN Lian-Fang; LIU Yi-Min; ZHANG Zhan-Jun

    2006-01-01

    @@ An experimental feasible scheme of multiparty secret sharing of classical messages is proposed, based on a cavity quantum electrodynamic system. The secret messages are imposed on atomic Bell states initially in the sender's possession by local unitary operations. By swapping quantum entanglement of atomic Bell states, the secret messages are split into several parts and each part is distributed to a separate party. In this case, any subset of the entire party group can not read out the secret message but the entirety via mutual cooperations. In this scheme, to discriminate atomic Bell states, additional classical fields are employed besides the same highly-detuned single-mode cavities used to prepare atomic Bell states. This scheme is insensitive to the cavity decay and the thermal field, and usual joint Bell-state measurements are unnecessary.

  18. Symmetric multiparty-controlled teleportation of an arbitrary two-particle entanglement

    International Nuclear Information System (INIS)

    We present a way for symmetric multiparty-controlled teleportation of an arbitrary two-particle entangled state based on Bell-basis measurements by using two Greenberger-Horne-Zeilinger states, i.e., a sender transmits an arbitrary two-particle entangled state to a distant receiver, an arbitrary one of the n+1 agents, via the control of the others in a network. It will be shown that the outcomes in the cases that n is odd or is even are different in principle as the receiver has to perform a controlled-NOT operation on his particles for reconstructing the original arbitrary entangled state in addition to some local unitary operations in the former. Also we discuss the applications of this controlled teleporation for quantum secret sharing of classical and quantum information. As all the instances can be used to carry useful information, its efficiency for qubit approaches the maximal value

  19. Blending Online Asynchronous and Synchronous Learning

    Directory of Open Access Journals (Sweden)

    Lisa C. Yamagata-Lynch

    2014-04-01

    Full Text Available In this article I will share a qualitative self-study about a 15-week blended 100% online graduate level course facilitated through synchronous meetings on Blackboard Collaborate and asynchronous discussions on Blackboard. I taught the course at the University of Tennessee (UT during the spring 2012 semester and the course topic was online learning environments. The primary research question of this study was: How can the designer/instructor optimize learning experiences for students who are studying about online learning environments in a blended online course relying on both synchronous and asynchronous technologies? I relied on student reflections of course activities during the beginning, middle, and the end of the semester as the primary data source to obtain their insights regarding course experiences. Through the experiences involved in designing and teaching the course and engaging in this study I found that there is room in the instructional technology research community to address strategies for facilitating online synchronous learning that complement asynchronous learning. Synchronous online whole class meetings and well-structured small group meetings can help students feel a stronger sense of connection to their peers and instructor and stay engaged with course activities. In order to provide meaningful learning spaces in synchronous learning environments, the instructor/designer needs to balance the tension between embracing the flexibility that the online space affords to users and designing deliberate structures that will help them take advantage of the flexible space.

  20. Multithreaded Asynchronous Graph Traversal for In-Memory and Semi-External Memory

    KAUST Repository

    Pearce, Roger

    2010-11-01

    Processing large graphs is becoming increasingly important for many domains such as social networks, bioinformatics, etc. Unfortunately, many algorithms and implementations do not scale with increasing graph sizes. As a result, researchers have attempted to meet the growing data demands using parallel and external memory techniques. We present a novel asynchronous approach to compute Breadth-First-Search (BFS), Single-Source-Shortest-Paths, and Connected Components for large graphs in shared memory. Our highly parallel asynchronous approach hides data latency due to both poor locality and delays in the underlying graph data storage. We present an experimental study applying our technique to both In-Memory and Semi-External Memory graphs utilizing multi-core processors and solid-state memory devices. Our experiments using synthetic and real-world datasets show that our asynchronous approach is able to overcome data latencies and provide significant speedup over alternative approaches. For example, on billion vertex graphs our asynchronous BFS scales up to 14x on 16-cores. © 2010 IEEE.

  1. Estimation of delays in generalized asynchronous Boolean networks.

    Science.gov (United States)

    Das, Haimabati; Layek, Ritwik Kumar

    2016-10-20

    A new generalized asynchronous Boolean network (GABN) model has been proposed in this paper. This continuous-time discrete-state model captures the biological reality of cellular dynamics without compromising the computational efficiency of the Boolean framework. The GABN synthesis procedure is based on the prior knowledge of the logical structure of the regulatory network, and the experimental transcriptional parameters. The novelty of the proposed methodology lies in considering different delays associated with the activation and deactivation of a particular protein (especially the transcription factors). A few illustrative examples of some well-studied network motifs have been provided to explore the scope of using the GABN model for larger networks. The GABN model of the p53-signaling pathway in response to γ-irradiation has also been simulated in the current paper to provide an indirect validation of the proposed schema. PMID:27464825

  2. Estimation of delays in generalized asynchronous Boolean networks.

    Science.gov (United States)

    Das, Haimabati; Layek, Ritwik Kumar

    2016-10-20

    A new generalized asynchronous Boolean network (GABN) model has been proposed in this paper. This continuous-time discrete-state model captures the biological reality of cellular dynamics without compromising the computational efficiency of the Boolean framework. The GABN synthesis procedure is based on the prior knowledge of the logical structure of the regulatory network, and the experimental transcriptional parameters. The novelty of the proposed methodology lies in considering different delays associated with the activation and deactivation of a particular protein (especially the transcription factors). A few illustrative examples of some well-studied network motifs have been provided to explore the scope of using the GABN model for larger networks. The GABN model of the p53-signaling pathway in response to γ-irradiation has also been simulated in the current paper to provide an indirect validation of the proposed schema.

  3. Normalized and Asynchronous Mirror Alignment for Cherenkov Telescopes

    CERN Document Server

    Ahnen, M L; Balbo, M; Bergmann, M; Biland, A; Blank, M; Bretz, T; Bruegge, K A; Buss, J; Domke, M; Dorner, D; Einecke, S; Hempfling, C; Hildebrand, D; Hughes, G; Lustermann, W; Mannheim, K; Mueller, S A; Neise, D; Neronov, A; Noethe, M; Overkemping, A -K; Paravac, A; Pauss, F; Rhode, W; Shukla, A; Temme, F; Thaele, J; Toscano, S; Vogler, P; Walter, R; Wilbert, A

    2016-01-01

    Imaging Atmospheric Cherenkov Telescopes (IACTs) need imaging optics with large apertures and high image intensities to map the faint Cherenkov light emitted from cosmic ray air showers onto their image sensors. Segmented reflectors fulfill these needs, and as they are composed from mass production mirror facets they are inexpensive and lightweight. However, as the overall image is a superposition of the individual facet images, alignment is a challenge. Here we present a computer vision based star tracking alignment method, which also works for limited or changing star light visibility. Our method normalizes the mirror facet reflection intensities to become independent of the reference star's intensity or the cloud coverage. Using two CCD cameras, our method records the mirror facet orientations asynchronously of the telescope drive system, and thus makes the method easy to integrate into existing telescopes. It can be combined with remote facet actuation, but does not require one to work. Furthermore, it ca...

  4. An asynchronous metamodel-assisted memetic algorithm for CFD-based shape optimization

    Science.gov (United States)

    Kontoleontos, Evgenia A.; Asouti, Varvara G.; Giannakoglou, Kyriakos C.

    2012-02-01

    This article presents an asynchronous metamodel-assisted memetic algorithm for the solution of CFD-based optimization problems. This algorithm is appropriate for use on multiprocessor platforms and may solve computationally expensive optimization problems in reduced wall-clock time, compared to conventional evolutionary or memetic algorithms. It is, in fact, a hybridization of non-generation-based (asynchronous) evolutionary algorithms, assisted by surrogate evaluation models, a local search method and the Lamarckian learning process. For the objective function gradient computation, in CFD applications, the adjoint method is used. Issues concerning the 'smart' implementation of local search in multi-objective problems are discussed. In this respect, an algorithmic scheme for reducing the number of calls to the adjoint equations to just one, irrespective of the number of objectives, is proposed. The algorithm is applied to the CFD-based shape optimization of the tubes of a heat exchanger and of a turbomachinery cascade.

  5. EPOS for Coordination of Asynchronous Sensor Webs Project

    Data.gov (United States)

    National Aeronautics and Space Administration — Develop, integrate, and deploy software-based tools to coordinate asynchronous, distributed missions and optimize observation planning spanning simultaneous...

  6. Designing Asynchronous Circuits for Low Power: An IFIR Filter

    DEFF Research Database (Denmark)

    Nielsen, Lars Skovby; Sparsø, Jens

    1999-01-01

    This paper addresses the design of asynchronous circuits for low power through an example: a filter bank for a digital hearing aid. The asynchronous design re-implements an existing synchronous circuit which is used in a commercial product. For comparison, both designs have been fabricated...... by numerically small samples). Apart from the improved RAM design, these measures are only viable in an asynchronous design. The principles and techniques explained in this paper are of a general nature, and they apply to the design of asynchronous low-power digital signal-processing circuits in a broader...

  7. Secure Multi-Party Computation Based Privacy Preserving Extreme Learning Machine Algorithm Over Vertically Distributed Data

    OpenAIRE

    Çatak, Ferhat Özgür

    2016-01-01

    Especially in the Big Data era, the usage of different classification methods is increasing day by day. The success of these classification methods depends on the effectiveness of learning methods. Extreme learning machine (ELM) classification algorithm is a relatively new learning method built on feed-forward neural-network. ELM classification algorithm is a simple and fast method that can create a model from high-dimensional data sets. Traditional ELM learning algorithm implicitly assumes c...

  8. Multi-Agent Model using Secure Multi-Party Computing in e-Governance

    CERN Document Server

    Mishra, Durgesh Kumar

    2009-01-01

    Information management and retrieval of all the citizen occurs in almost all the public service functions. Electronic Government system is an emerging trend in India through which efforts are made to strive maximum safety and security. Various solutions for this have been proposed like Shibboleth, Public Key Infrastructure, Smart Cards and Light Weight Directory Access Protocols. Still, none of these guarantee 100 percent security. Efforts are being made to provide common national identity solution to various diverse Government identity cards. In this paper, we discuss issues related to these solutions.

  9. Multi-Agent Model using Secure Multi-Party Computing in e-Governance

    OpenAIRE

    Mishra, Durgesh Kumar; Shukla, Samiksha

    2009-01-01

    Information management and retrieval of all the citizen occurs in almost all the public service functions. Electronic Government system is an emerging trend in India through which efforts are made to strive maximum safety and security. Various solutions for this have been proposed like Shibboleth, Public Key Infrastructure, Smart Cards and Light Weight Directory Access Protocols. Still, none of these guarantee 100 percent security. Efforts are being made to provide common national identity so...

  10. S.A.T.E.P. : Synchronous-Asynchronous Tele-education Platform

    OpenAIRE

    Lazaridis, Lazaros; Papatsimouli, Maria; Fragulis, George F.

    2014-01-01

    S.A.T.E.P. means Synchronous Asynchronous Tele education Platform is a software application for educational purposes, with a lot of parametrizing features written entirely from scratch. It aims at the training and examination of computer skills, a platform that can be adjusted to the needs of each lesson. In the application the trainer and the administrator can define the number of the lectures and upload files for each one of them. Furthermore, he can insert, modify and delete questions whic...

  11. Self-Healing Computation

    OpenAIRE

    Saad, George; Saia, Jared

    2014-01-01

    In the problem of reliable multiparty computation (RC), there are $n$ parties, each with an individual input, and the parties want to jointly compute a function $f$ over $n$ inputs. The problem is complicated by the fact that an omniscient adversary controls a hidden fraction of the parties. We describe a self-healing algorithm for this problem. In particular, for a fixed function $f$, with $n$ parties and $m$ gates, we describe how to perform RC repeatedly as the inputs to $f$ change. Our al...

  12. Facilitation Prompts and Rubrics on Higher-Order Thinking Skill Performance Found in Undergraduate Asynchronous Discussion Boards

    Science.gov (United States)

    Giacumo, Lisa A.; Savenye, Wilhelmina; Smith, Nichole

    2013-01-01

    Over the past 20 years, researchers have begun to examine data from asynchronous computer-mediated student discussions in courses. Some results have shown students to demonstrate lower or mid-level thinking skills, while others suggest students routinely demonstrate higher-order thinking skills. The authors investigated the relationship between…

  13. Asynchronous Video Interviewing as a New Technology in Personnel Selection: The Applicant’s Point of View

    Science.gov (United States)

    Brenner, Falko S.; Ortner, Tuulia M.; Fay, Doris

    2016-01-01

    The present study aimed to integrate findings from technology acceptance research with research on applicant reactions to new technology for the emerging selection procedure of asynchronous video interviewing. One hundred six volunteers experienced asynchronous video interviewing and filled out several questionnaires including one on the applicants’ personalities. In line with previous technology acceptance research, the data revealed that perceived usefulness and perceived ease of use predicted attitudes toward asynchronous video interviewing. Furthermore, openness revealed to moderate the relation between perceived usefulness and attitudes toward this particular selection technology. No significant effects emerged for computer self-efficacy, job interview self-efficacy, extraversion, neuroticism, and conscientiousness. Theoretical and practical implications are discussed. PMID:27378969

  14. Asynchronous Learning Sources in a High-Tech Organization

    Science.gov (United States)

    Bouhnik, Dan; Giat, Yahel; Sanderovitch, Yafit

    2009-01-01

    Purpose: The purpose of this study is to characterize learning from asynchronous sources among research and development (R&D) personnel. It aims to examine four aspects of asynchronous source learning: employee preferences regarding self-learning; extent of source usage; employee satisfaction with these sources and the effect of the sources on the…

  15. Asynchronicity of facial blood perfusion in migraine.

    Directory of Open Access Journals (Sweden)

    Nina Zaproudina

    Full Text Available Asymmetrical changes in blood perfusion and asynchronous blood supply to head tissues likely contribute to migraine pathophysiology. Imaging was widely used in order to understand hemodynamic variations in migraine. However, mapping of blood pulsations in the face of migraineurs has not been performed so far. We used the Blood Pulsation Imaging (BPI technique, which was recently developed in our group, to establish whether 2D-imaging of blood pulsations parameters can reveal new biomarkers of migraine. BPI characteristics were measured in migraineurs during the attack-free interval and compared to healthy subjects with and without a family history of migraine. We found a novel phenomenon of transverse waves of facial blood perfusion in migraineurs in contrast to healthy subjects who showed synchronous blood delivery to both sides of the face. Moreover, the amplitude of blood pulsations was symmetrically distributed over the face of healthy subjects, but asymmetrically in migraineurs and subjects with a family history of migraine. In the migraine patients we found a remarkable correlation between the side of unilateral headache and the direction of the blood perfusion wave. Our data suggest that migraine is associated with lateralization of blood perfusion and asynchronous blood pulsations in the facial area, which could be due to essential dysfunction of the autonomic vascular control in the face. These findings may further enhance our understanding of migraine pathophysiology and suggest new easily available biomarkers of this pathology.

  16. Event-Based Tone Mapping for Asynchronous Time-Based Image Sensor.

    Science.gov (United States)

    Simon Chane, Camille; Ieng, Sio-Hoi; Posch, Christoph; Benosman, Ryad B

    2016-01-01

    The asynchronous time-based neuromorphic image sensor ATIS is an array of autonomously operating pixels able to encode luminance information with an exceptionally high dynamic range (>143 dB). This paper introduces an event-based methodology to display data from this type of event-based imagers, taking into account the large dynamic range and high temporal accuracy that go beyond available mainstream display technologies. We introduce an event-based tone mapping methodology for asynchronously acquired time encoded gray-level data. A global and a local tone mapping operator are proposed. Both are designed to operate on a stream of incoming events rather than on time frame windows. Experimental results on real outdoor scenes are presented to evaluate the performance of the tone mapping operators in terms of quality, temporal stability, adaptation capability, and computational time. PMID:27642275

  17. Realistic modelling of the effects of asynchronous motion at the base of bridge piers

    CERN Document Server

    Romanelli, F; Vaccari, F

    2002-01-01

    Frequently long-span bridges provide deep valley crossings, which require special consideration due to the possibility of local amplification of the ground motion as a consequence of topographical irregularities and local soil conditions. This does in fact cause locally enhanced seismic input with the possibility for the bridge piers to respond asynchronously. This introduces special design requirements so that possible out-of-phase ground displacements and the associated large relative displacements of adjacent piers can be accommodated without excessive damage. Assessment of the local variability of the ground motion due to local lateral heterogeneities and to attenuation properties is thus crucial toward the realistic definition of the asynchronous motion at the base of the bridge piers. We illustrate the work done in the framework of a large international cooperation to assess the importance of non-synchronous seismic excitation of long structures. To accomplish this task we compute complete synthetic acc...

  18. Multi-Party Quantum Private Comparison Protocol Based on Entanglement Swapping of Bell Entangled States

    Science.gov (United States)

    Ye, Tian-Yu

    2016-09-01

    Recently, Liu et al. proposed a two-party quantum private comparison (QPC) protocol using entanglement swapping of Bell entangled state (Commun. Theor. Phys. 57 (2012) 583). Subsequently Liu et al. pointed out that in Liu et al.'s protocol, the TP can extract the two users' secret inputs without being detected by launching the Bell-basis measurement attack, and suggested the corresponding improvement to mend this loophole (Commun. Theor. Phys. 62 (2014) 210). In this paper, we first point out the information leakage problem toward TP existing in both of the above two protocols, and then suggest the corresponding improvement by using the one-way hash function to encrypt the two users' secret inputs. We further put forward the three-party QPC protocol also based on entanglement swapping of Bell entangled state, and then validate its output correctness and its security in detail. Finally, we generalize the three-party QPC protocol into the multi-party case, which can accomplish arbitrary pair's comparison of equality among K users within one execution. Supported by the National Natural Science Foundation of China under Grant No. 61402407

  19. Multi-Party Energy Management for Clusters of Roof Leased PV Prosumers: A Game Theoretical Approach

    Directory of Open Access Journals (Sweden)

    Nian Liu

    2016-07-01

    Full Text Available The roof-leased business mode is an important development method for the distributed photovoltaic (PV systems. In this paper, the benefits of the PV energy are considered in a PV cluster (PVC consisting of a certain number of prosumers and a PVC operator (PVCO. In order to distribute the benefits, a multi-party energy management method for the PVC is proposed, including an internal pricing model and a demand response (DR model. First, the dynamic internal pricing model for the trading between PVCO and prosumers is formulated according to the economic principle of demand and supply relation. Moreover, in order to improve the local consumption of PV energy, the DR model is formulated as a non-cooperative game among the prosumers. Meanwhile, the existence and uniqueness of the Nash Equilibrium (NE are proved, and a distributed solving algorithm is introduced to approach the NE solution. Finally, the PVC including four prosumers is selected as the study object, the results have shown that the internal pricing model and DR model can improve the benefit of both prosumers and PVCO, as well as the local consumption of PV energy.

  20. Asynchronous machines. Direct torque control; Machines asynchrones. Commande par controle direct de couple

    Energy Technology Data Exchange (ETDEWEB)

    Fornel, B. de [Institut National Polytechnique, 31 - Toulouse (France)

    2006-05-15

    The asynchronous machine, with its low cost and robustness, is today the most widely used motor to make speed variators. However, its main drawback is that the same current generates both the magnetic flux and the torque, and thus any torque variation creates a flux variation. Such a coupling gives to the asynchronous machine a nonlinear behaviour which makes its control much more complex. The direct self control (DSC) method has been developed to improve the low efficiency of the scalar control method and for the specific railway drive application. The direct torque control (DTC) method is derived from the DSC method but corresponds to other type of applications. The DSC and DTC algorithms for asynchronous motors are presented in this article: 1 - direct control of the stator flux (DSC): principle, flux control, torque control, switching frequency of the inverter, speed estimation; 2 - direct torque control (DTC): principle, electromagnetic torque derivative, signals shape and switching frequency, some results, DTC speed variator without speed sensor, DTC application to multi-machine multi-converter systems; 3 - conclusion. (J.S.)

  1. Asynchronous Parallel Evolutionary Algorithms for Constrained Optimizations

    Institute of Scientific and Technical Information of China (English)

    2000-01-01

    Recently Guo Tao proposed a stochastic search algorithm in his PhD thesis for solving function op-timization problems. He combined the subspace search method (a general multi-parent recombination strategy) with the population hill-climbing method. The former keeps a global search for overall situation,and the latter keeps the convergence of the algorithm. Guo's algorithm has many advantages ,such as the sim-plicity of its structure ,the higher accuracy of its results, the wide range of its applications ,and the robustness of its use. In this paper a preliminary theoretical analysis of the algorithm is given and some numerical experiments has been done by using Guo's algorithm for demonstrating the theoretical results. Three asynchronous paral-lel evolutionary algorithms with different granularities for MIMD machines are designed by parallelizing Guo's Algorithm.

  2. High Performance Parallel Processing Project: Industrial computing initiative. Progress reports for fiscal year 1995

    Energy Technology Data Exchange (ETDEWEB)

    Koniges, A.

    1996-02-09

    This project is a package of 11 individual CRADA`s plus hardware. This innovative project established a three-year multi-party collaboration that is significantly accelerating the availability of commercial massively parallel processing computing software technology to U.S. government, academic, and industrial end-users. This report contains individual presentations from nine principal investigators along with overall program information.

  3. Towards Cloud-based Asynchronous Elasticity for Iterative HPC Applications

    Science.gov (United States)

    da Rosa Righi, Rodrigo; Facco Rodrigues, Vinicius; André da Costa, Cristiano; Kreutz, Diego; Heiss, Hans-Ulrich

    2015-10-01

    Elasticity is one of the key features of cloud computing. It allows applications to dynamically scale computing and storage resources, avoiding over- and under-provisioning. In high performance computing (HPC), initiatives are normally modeled to handle bag-of-tasks or key-value applications through a load balancer and a loosely-coupled set of virtual machine (VM) instances. In the joint-field of Message Passing Interface (MPI) and tightly-coupled HPC applications, we observe the need of rewriting source codes, previous knowledge of the application and/or stop-reconfigure-and-go approaches to address cloud elasticity. Besides, there are problems related to how profit this new feature in the HPC scope, since in MPI 2.0 applications the programmers need to handle communicators by themselves, and a sudden consolidation of a VM, together with a process, can compromise the entire execution. To address these issues, we propose a PaaS-based elasticity model, named AutoElastic. It acts as a middleware that allows iterative HPC applications to take advantage of dynamic resource provisioning of cloud infrastructures without any major modification. AutoElastic provides a new concept denoted here as asynchronous elasticity, i.e., it provides a framework to allow applications to either increase or decrease their computing resources without blocking the current execution. The feasibility of AutoElastic is demonstrated through a prototype that runs a CPU-bound numerical integration application on top of the OpenNebula middleware. The results showed the saving of about 3 min at each scaling out operations, emphasizing the contribution of the new concept on contexts where seconds are precious.

  4. A Formal Framework for Multi-Party Business Protocols (Replaced by CentER DP 2009-05)

    NARCIS (Netherlands)

    Mancioppi, M.

    2008-01-01

    Service Oriented Architecture deployments comprise large numbers of long-running, highly dynamic complex end-to-end service interactions reflecting asynchronous message flows that typically transcend several organizations and span several geographical locations. Business protocols are formalisms to

  5. An FDES-Based Shared Control Method for Asynchronous Brain-Actuated Robot.

    Science.gov (United States)

    Liu, Rong; Wang, Yong-Xuan; Zhang, Lin

    2016-06-01

    The asynchronous brain-computer interface (BCI) offers more natural human-machine interaction. However, it is still considered insufficient to control rapid and complex sequences of movements for a robot without any advanced control method. This paper proposes a new shared controller based on the supervisory theory of fuzzy discrete event system (FDES) for brain-actuated robot control. The developed supervisory theory allows the more reliable control mode to play a dominant role in the robot control which is beneficial to reduce misoperation and improve the robustness of the system. The experimental procedures consist of real-time direct manual control and BCI control tests from ten volunteers. Both tests have shown that the proposed method significantly improves the performance and robustness of the robotic control. In an online BCI experiment, eight of the participants successfully controlled the robot to circumnavigate obstacles and reached the target with a three mental states asynchronous BCI while the other two participants failed in all the BCI control sessions. Furthermore, the FDES-based shared control method also helps to reduce the workload. It can be stated that the asynchronous BCI, in combination with FDES-based shared controller, is feasible for the real-time and robust control of robotics.

  6. AP-IO: Asynchronous Pipeline I/O for Hiding Periodic Output Cost in CFD Simulation

    Directory of Open Access Journals (Sweden)

    Ren Xiaoguang

    2014-01-01

    Full Text Available Computational fluid dynamics (CFD simulation often needs to periodically output intermediate results to files in the form of snapshots for visualization or restart, which seriously impacts the performance. In this paper, we present asynchronous pipeline I/O (AP-IO optimization scheme for the periodically snapshot output on the basis of asynchronous I/O and CFD application characteristics. In AP-IO, dedicated background I/O processes or threads are in charge of handling the file write in pipeline mode, therefore the write overhead can be hidden with more calculation than classic asynchronous I/O. We design the framework of AP-IO and implement it in OpenFOAM, providing CFD users with a user-friendly interface. Experimental results on the Tianhe-2 supercomputer demonstrate that AP-IO can achieve a good optimization effect for the periodical snapshot output in CFD application, and the effect is especially better for massively parallel CFD simulations, which can reduce the total execution time up to about 40%.

  7. AP-IO: asynchronous pipeline I/O for hiding periodic output cost in CFD simulation.

    Science.gov (United States)

    Xiaoguang, Ren; Xinhai, Xu

    2014-01-01

    Computational fluid dynamics (CFD) simulation often needs to periodically output intermediate results to files in the form of snapshots for visualization or restart, which seriously impacts the performance. In this paper, we present asynchronous pipeline I/O (AP-IO) optimization scheme for the periodically snapshot output on the basis of asynchronous I/O and CFD application characteristics. In AP-IO, dedicated background I/O processes or threads are in charge of handling the file write in pipeline mode, therefore the write overhead can be hidden with more calculation than classic asynchronous I/O. We design the framework of AP-IO and implement it in OpenFOAM, providing CFD users with a user-friendly interface. Experimental results on the Tianhe-2 supercomputer demonstrate that AP-IO can achieve a good optimization effect for the periodical snapshot output in CFD application, and the effect is especially better for massively parallel CFD simulations, which can reduce the total execution time up to about 40%. PMID:24955390

  8. Optimum Multiuser Detector for Multipath Slow Fading Asynchronous CDMA Channels

    Institute of Scientific and Technical Information of China (English)

    WangZhaocheng; YangZhixing; 等

    1995-01-01

    A structure of optimum multiuser detector for asynchronous CDMA in multipath slow fading channels is derived and the significant performance gain over the conventional RAKE receiv-er is shown by simulation.

  9. Current Trends in High-Level Synthesis of Asynchronous Circuits

    DEFF Research Database (Denmark)

    Sparsø, Jens

    2009-01-01

    This paper is a survey paper presenting what the author sees as two major and promising trends in the current research in CAD-tools and design-methods for asynchronous circuits. One branch of research builds on top of existing asynchronous CAD-tools that perform syntax directed translation, e.......g. the Haste/TiDE tool from Handshake Solutions or the Balsa tool from the University of Manchester. The aims are to add highlevel synthesis capabilities to these tools and to extend the tools such that a wider range of (higher speed) micro-architectures can be generated. Another branch of research takes...... a conventional synchronous circuit as the starting point, and then adds some form of handshake-based flow-control. One approach keeps the global clock and implements discrete-time asynchronous operation. Another approach substitutes the clocked registers by asynchronous handshake-registers, thus creating truly...

  10. TCDQ-TCT retraction and losses during asynchronous beam dump

    CERN Document Server

    Bracco, Chiara; Quaranta, Elena; CERN. Geneva. ATS Department

    2016-01-01

    The protection provided by the TCDQs in case of asynchronous beam dump depends strongly on their correct setup. They have to respect the strict hierarchy of the full collimation system and shield the tertiary collimators in the experimental regions. This MD aimed at performing asynchronous beam dump tests with different configurations, in order to assess the minimum allowed retraction between TCTs and TCDQs and, as a consequence, on the The protection provided by the TCDQs in case of asynchronous beam dump depends strongly on their correct setup. They have to respect the strict hierarchy of the full collimation system and shield the tertiary collimators in the experimental regions. This MD aimed at performing asynchronous beam dump tests with different configurations, in order to assess the minimum allowed retraction between TCTs and TCDQs and, as a consequence, on the β* reach.

  11. Asynchronous FSK wireless data traffic interface circuit design

    International Nuclear Information System (INIS)

    This article gives a practical interface circuit, which is able to conduct asynchronous wireless data communication through data transfer broadcasting station. And the circuit's design as well as its applications are introduced. (authors)

  12. Stand-Alone and Hybrid Positioning Using Asynchronous Pseudolites

    Directory of Open Access Journals (Sweden)

    Ciro Gioia

    2014-12-01

    Full Text Available global navigation satellite system (GNSS receivers are usually unable to achieve satisfactory performance in difficult environments, such as open-pit mines, urban canyons and indoors. Pseudolites have the potential to extend GNSS usage and significantly improve receiver performance in such environments by providing additional navigation signals. This also applies to asynchronous pseudolite systems, where different pseudolites operate in an independent way. Asynchronous pseudolite systems require, however, dedicated strategies in order to properly integrate GNSS and pseudolite measurements. In this paper, several asynchronous pseudolite/GNSS integration strategies are considered: loosely- and tightly-coupled approaches are developed and combined with pseudolite proximity and receiver signal strength (RSS-based positioning. The performance of the approaches proposed has been tested in different scenarios, including static and kinematic conditions. The tests performed demonstrate that the methods developed are effective techniques for integrating heterogeneous measurements from different sources, such as asynchronous pseudolites and GNSS.

  13. A proof system for asynchronously communicating deterministic processes

    NARCIS (Netherlands)

    de Boer, F.S.; van Hulst, M.

    1994-01-01

    We introduce in this paper new communication and synchronization constructs which allow deterministic processes, communicating asynchronously via unbounded FIFO buffers, to cope with an indeterminate environment. We develop for the resulting parallel programming language, which subsumes deterministi

  14. Normalized and asynchronous mirror alignment for Cherenkov telescopes

    Science.gov (United States)

    Ahnen, M. L.; Baack, D.; Balbo, M.; Bergmann, M.; Biland, A.; Blank, M.; Bretz, T.; Bruegge, K. A.; Buss, J.; Domke, M.; Dorner, D.; Einecke, S.; Hempfling, C.; Hildebrand, D.; Hughes, G.; Lustermann, W.; Mannheim, K.; Mueller, S. A.; Neise, D.; Neronov, A.; Noethe, M.; Overkemping, A.-K.; Paravac, A.; Pauss, F.; Rhode, W.; Shukla, A.; Temme, F.; Thaele, J.; Toscano, S.; Vogler, P.; Walter, R.; Wilbert, A.

    2016-09-01

    Imaging Atmospheric Cherenkov Telescopes (IACTs) need imaging optics with large apertures and high image intensities to map the faint Cherenkov light emitted from cosmic ray air showers onto their image sensors. Segmented reflectors fulfill these needs, and as they are composed from mass production mirror facets they are inexpensive and lightweight. However, as the overall image is a superposition of the individual facet images, alignment is a challenge. Here we present a computer vision based star tracking alignment method, which also works for limited or changing star light visibility. Our method normalizes the mirror facet reflection intensities to become independent of the reference star's intensity or the cloud coverage. Using two CCD cameras, our method records the mirror facet orientations asynchronously of the telescope drive system, and thus makes the method easy to integrate into existing telescopes. It can be combined with remote facet actuation, but does not require one to work. Furthermore, it can reconstruct all individual mirror facet point spread functions without moving any mirror. We present alignment results on the 4 m First Geiger-mode Avalanche Cherenkov Telescope (FACT).

  15. Novel Asynchronous Wrapper and Its Application to GALS Systems

    Institute of Scientific and Technical Information of China (English)

    Zhuang Shengxian; Peng Anjin; Lars Wanhammar

    2006-01-01

    An asynchronous wrapper with novel handshake circuits for data communication in globally asynchronous locally synchronous (GALS) systems is proposed. The handshake circuits include two communication ports and a local clock generator. Two approaches for the implementation of communication ports are presented, one with pure standard cells and the others with Müller-C elements. The detailed design methodology for GALS systems is given and the circuits are validated with VHDL and circuits simulation in standard CMOS technology.

  16. Reasoning on Robot Knowledge from Discrete and Asynchronous Observations

    OpenAIRE

    Ziafati, Pouyan; Elrakaiby, Yehia; Torre, Leon van der; Voos, Holger; dastani, mehdi; Meyer, John-Jules; Van Zee, Marc

    2014-01-01

    Robot knowledge of the world is created from discrete and asynchronous events received from its perception components. Proper representation and maintenance of robot knowledge is crucial to enable the use of robot knowledge for planning, user-interaction, etc. This paper identifies some of the main issues related to the representation, maintenance and querying of robot knowledge based on discrete asynchronous events such as event-history management and synchronization, and introduces a langua...

  17. Operational aspects of asynchronous filtering for improved flood forecasting

    Science.gov (United States)

    Rakovec, Oldrich; Weerts, Albrecht; Sumihar, Julius; Uijlenhoet, Remko

    2014-05-01

    Hydrological forecasts can be made more reliable and less uncertain by recursively improving initial conditions. A common way of improving the initial conditions is to make use of data assimilation (DA), a feedback mechanism or update methodology which merges model estimates with available real world observations. The traditional implementation of the Ensemble Kalman Filter (EnKF; e.g. Evensen, 2009) is synchronous, commonly named a three dimensional (3-D) assimilation, which means that all assimilated observations correspond to the time of update. Asynchronous DA, also called four dimensional (4-D) assimilation, refers to an updating methodology, in which observations being assimilated into the model originate from times different to the time of update (Evensen, 2009; Sakov 2010). This study investigates how the capabilities of the DA procedure can be improved by applying alternative Kalman-type methods, e.g., the Asynchronous Ensemble Kalman Filter (AEnKF). The AEnKF assimilates observations with smaller computational costs than the original EnKF, which is beneficial for operational purposes. The results of discharge assimilation into a grid-based hydrological model for the Upper Ourthe catchment in Belgian Ardennes show that including past predictions and observations in the AEnKF improves the model forecasts as compared to the traditional EnKF. Additionally we show that elimination of the strongly non-linear relation between the soil moisture storage and assimilated discharge observations from the model update becomes beneficial for an improved operational forecasting, which is evaluated using several validation measures. In the current study we employed the HBV-96 model built within a recently developed open source modelling environment OpenStreams (2013). The advantage of using OpenStreams (2013) is that it enables direct communication with OpenDA (2013), an open source data assimilation toolbox. OpenDA provides a number of algorithms for model calibration

  18. MODIFIED MICROPIPLINE ARCHITECTURE FOR SYNTHESIZABLE ASYNCHRONOUS FIR FILTER DESIGN

    Directory of Open Access Journals (Sweden)

    Basel Halak

    2016-02-01

    Full Text Available The use of asynchronous design approaches to construct digital signal processing (DSP systems is a rapidly growing research area driven by a wide range of emerging energy constrained applications such as wireless sensor network, portable medical devices and brain implants. The asynchronous design techniques allow the construction of systems which are samples driven, which means they only dissipate dynamic energy when there processing data and idle otherwise. This inherent advantage of asynchronous design over conventional synchronous circuits allows them to be energy efficient. However the implementation flow of asynchronous systems is still difficult due to its lack of compatibility with industrystandard synchronous design tools and modelling languages. This paper devises a novel asynchronous design for a finite impulse response (FIR filter, an essential building block of DSP systems, which is synthesizable and suitable for implementation using conventional synchronous systems design flow and tools. The proposed design is based on a modified version of the micropipline architecture and it is constructed using four phase bundled data protocol. A hardware prototype of the proposed filter has been developed on an FPGA, and systematically verified. The results prove correct functionality of the novel design and a superior performance compared to a synchronous FIR implementation. The findings of this work will allow a wider adoption of asynchronous circuits by DSP designers to harness their energy and performance benefits.

  19. Building asynchronous geospatial processing workflows with web services

    Science.gov (United States)

    Zhao, Peisheng; Di, Liping; Yu, Genong

    2012-02-01

    Geoscience research and applications often involve a geospatial processing workflow. This workflow includes a sequence of operations that use a variety of tools to collect, translate, and analyze distributed heterogeneous geospatial data. Asynchronous mechanisms, by which clients initiate a request and then resume their processing without waiting for a response, are very useful for complicated workflows that take a long time to run. Geospatial contents and capabilities are increasingly becoming available online as interoperable Web services. This online availability significantly enhances the ability to use Web service chains to build distributed geospatial processing workflows. This paper focuses on how to orchestrate Web services for implementing asynchronous geospatial processing workflows. The theoretical bases for asynchronous Web services and workflows, including asynchrony patterns and message transmission, are examined to explore different asynchronous approaches to and architecture of workflow code for the support of asynchronous behavior. A sample geospatial processing workflow, issued by the Open Geospatial Consortium (OGC) Web Service, Phase 6 (OWS-6), is provided to illustrate the implementation of asynchronous geospatial processing workflows and the challenges in using Web Services Business Process Execution Language (WS-BPEL) to develop them.

  20. Managing Asynchronous Data in ATLAS's Concurrent Framework

    CERN Document Server

    Leggett, Charles; The ATLAS collaboration

    2016-01-01

    In order to be able to make effective use of emerging hardware, where the amount of memory available to any CPU is rapidly decreasing as the core count continues to rise, ATLAS has begun a migration to a concurrent, multi-threaded software framework, known as AthenaMT. Significant progress has been made in implementing AthenaMT - we can currently run realistic Geant4 simulations on massively concurrent machines. the migration of realistic prototypes of reconstruction workflows is more difficult, given the large amounts of legacy code and the complexity and challenges of reconstruction software. These types of workflows, however, are the types that will most benefit from the memory reduction features of a multi-threaded framework. One of the challenges that we will report on in this paper is the re-design and implementation of several key asynchronous technologies whose behaviour is radically different in a concurrent environment than in a serial one, namely the management of Conditions data and the Detector D...

  1. Rapid, generalized adaptation to asynchronous audiovisual speech.

    Science.gov (United States)

    Van der Burg, Erik; Goodbourn, Patrick T

    2015-04-01

    The brain is adaptive. The speed of propagation through air, and of low-level sensory processing, differs markedly between auditory and visual stimuli; yet the brain can adapt to compensate for the resulting cross-modal delays. Studies investigating temporal recalibration to audiovisual speech have used prolonged adaptation procedures, suggesting that adaptation is sluggish. Here, we show that adaptation to asynchronous audiovisual speech occurs rapidly. Participants viewed a brief clip of an actor pronouncing a single syllable. The voice was either advanced or delayed relative to the corresponding lip movements, and participants were asked to make a synchrony judgement. Although we did not use an explicit adaptation procedure, we demonstrate rapid recalibration based on a single audiovisual event. We find that the point of subjective simultaneity on each trial is highly contingent upon the modality order of the preceding trial. We find compelling evidence that rapid recalibration generalizes across different stimuli, and different actors. Finally, we demonstrate that rapid recalibration occurs even when auditory and visual events clearly belong to different actors. These results suggest that rapid temporal recalibration to audiovisual speech is primarily mediated by basic temporal factors, rather than higher-order factors such as perceived simultaneity and source identity.

  2. iHadoop: Asynchronous Iterations Support for MapReduce

    KAUST Repository

    Elnikety, Eslam

    2011-08-01

    MapReduce is a distributed programming framework designed to ease the development of scalable data-intensive applications for large clusters of commodity machines. Most machine learning and data mining applications involve iterative computations over large datasets, such as the Web hyperlink structures and social network graphs. Yet, the MapReduce model does not efficiently support this important class of applications. The architecture of MapReduce, most critically its dataflow techniques and task scheduling, is completely unaware of the nature of iterative applications; tasks are scheduled according to a policy that optimizes the execution for a single iteration which wastes bandwidth, I/O, and CPU cycles when compared with an optimal execution for a consecutive set of iterations. This work presents iHadoop, a modified MapReduce model, and an associated implementation, optimized for iterative computations. The iHadoop model schedules iterations asynchronously. It connects the output of one iteration to the next, allowing both to process their data concurrently. iHadoop\\'s task scheduler exploits inter- iteration data locality by scheduling tasks that exhibit a producer/consumer relation on the same physical machine allowing a fast local data transfer. For those iterative applications that require satisfying certain criteria before termination, iHadoop runs the check concurrently during the execution of the subsequent iteration to further reduce the application\\'s latency. This thesis also describes our implementation of the iHadoop model, and evaluates its performance against Hadoop, the widely used open source implementation of MapReduce. Experiments using different data analysis applications over real-world and synthetic datasets show that iHadoop performs better than Hadoop for iterative algorithms, reducing execution time of iterative applications by 25% on average. Furthermore, integrating iHadoop with HaLoop, a variant Hadoop implementation that caches

  3. Proximity-Based Asynchronous Messaging Platform for Location-Based Internet of Things Service

    Directory of Open Access Journals (Sweden)

    Hyeong gon Jo

    2016-07-01

    Full Text Available The Internet of Things (IoT opens up tremendous opportunities to provide location-based applications. However, despite the services around a user being physically adjacent, common IoT platforms use a centralized structure, like a cloud-computing architecture, which transfers large amounts of data to a central server. This raises problems, such as traffic concentration, long service latency, and high communication cost. In this paper, we propose a physical distance-based asynchronous messaging platform that specializes in processing personalized data and location-based messages. The proposed system disperses traffic using a location-based message-delivery protocol, and has high stability.

  4. Internal end-effect problem in a linear asynchronous MHD machine with arbitrary current load

    Energy Technology Data Exchange (ETDEWEB)

    Vilnitis, A.Ya.

    1977-01-01

    The internal end-effect problem in a bilateral linear asynchronous engine is solved by variation of constants for a surface current load of any type, including discrete conductors. Mathematically correct formulae for this case are given for computing the mechanical force on wound coils and the active power. Known methods of end-effect compensation are examined. The requirements for the surface load of inductors were found for the case where the requirements may be limited to an internal problem and scattering along the magnetic circuit ends.

  5. ASCERTAINMENT OF THE EQUIVALENT CIRCUIT PARAMETERS OF THE ASYNCHRONOUS MACHINE

    Directory of Open Access Journals (Sweden)

    V. S. Safaryan

    2015-01-01

    Full Text Available The article considers experimental and analytical determination of the asynchronous machine equivalent-circuit parameters with application of the reference data. Transient processes investigation of the asynchronous machines necessitates the equivalent circuit parameters (resistance impedance, inductances and coefficient of the stator-rotor contours mutual inductance that help form the transitory-process mathematical simulation model. The reference books do not provide those parameters; they instead give the rated ones (active power, voltage, slide, coefficient of performance and capacity coefficient as well as the ratio of starting and nominal currents and torques. The noted studies on the asynchronous machine equivalent-circuits parametrization fail to solve the problems ad finem or solve them with admissions. The paper presents experimental and analytical determinations of the asynchronous machine equivalent-circuit parameters: the experimental one based on the results of two measurements and the analytical one where the problem boils down to solving a system of nonlineal algebraic equations. The authors investigate the equivalent asynchronous machine input-resistance properties and adduce the dependence curvatures of the input-resistances on the slide. They present a symbolic model for analytical parameterization of the asynchronous machine equivalent-circuit that represents a system of nonlineal equations and requires one of the rotor-parameters arbitrary assignment. The article demonstrates that for the asynchronous machine equivalent-circuit experimental parameterization the measures are to be conducted of the stator-circuit voltage, current and active power with two different slides and arbitrary assignment of one of the rotor parameters. The paper substantiates the fact that additional measurement does not discard the rotor-parameter choice arbitrariness. The authors establish that in motoring mode there is a critical slide by which the

  6. Effect of asynchronous updating on the stability of cellular automata

    International Nuclear Information System (INIS)

    Highlights: ► An upper bound on the Lyapunov exponent of asynchronously updated CA is established. ► The employed update method has repercussions on the stability of CAs. ► A decision on the employed update method should be taken with care. ► Substantial discrepancies arise between synchronously and asynchronously updated CA. ► Discrepancies between different asynchronous update schemes are less pronounced. - Abstract: Although cellular automata (CAs) were conceptualized as utter discrete mathematical models in which the states of all their spatial entities are updated simultaneously at every consecutive time step, i.e. synchronously, various CA-based models that rely on so-called asynchronous update methods have been constructed in order to overcome the limitations that are tied up with the classical way of evolving CAs. So far, only a few researchers have addressed the consequences of this way of updating on the evolved spatio-temporal patterns, and the reachable stationary states. In this paper, we exploit Lyapunov exponents to determine to what extent the stability of the rules within a family of totalistic CAs is affected by the underlying update method. For that purpose, we derive an upper bound on the maximum Lyapunov exponent of asynchronously iterated CAs, and show its validity, after which we present a comparative study between the Lyapunov exponents obtained for five different update methods, namely one synchronous method and four well-established asynchronous methods. It is found that the stability of CAs is seriously affected if one of the latter methods is employed, whereas the discrepancies arising between the different asynchronous methods are far less pronounced and, finally, we discuss the repercussions of our findings on the development of CA-based models.

  7. Efficiency asynchronous application programming language Python

    OpenAIRE

    Толстікова, О. В.; Національний авіаційний університет; Мирошниченко, І. С.; Національний авіаційний університет; Коцюр, А. Б.; Національний авіаційний університет

    2016-01-01

    Consider tools that implement asynchronous programming in Python and allow more efficient use ofasynchronous programming applications. The efficiency of the module asyncio (PEP 3156) incomparison with classical spivprohramamy Рассмотрены инструменты, которые реализуют асинхронное программирование в языкеPython и позволяют повысить эффективность использования программирования асинхронныхприложений. Показана эффективность работы модуля asyncio (PEP 3156) по сравнению с классическими сопрогра...

  8. Fast Simulation of Mechanical Heterogeneity in the Electrically Asynchronous Heart Using the MultiPatch Module.

    Directory of Open Access Journals (Sweden)

    John Walmsley

    2015-07-01

    Full Text Available Cardiac electrical asynchrony occurs as a result of cardiac pacing or conduction disorders such as left bundle-branch block (LBBB. Electrically asynchronous activation causes myocardial contraction heterogeneity that can be detrimental for cardiac function. Computational models provide a tool for understanding pathological consequences of dyssynchronous contraction. Simulations of mechanical dyssynchrony within the heart are typically performed using the finite element method, whose computational intensity may present an obstacle to clinical deployment of patient-specific models. We present an alternative based on the CircAdapt lumped-parameter model of the heart and circulatory system, called the MultiPatch module. Cardiac walls are subdivided into an arbitrary number of patches of homogeneous tissue. Tissue properties and activation time can differ between patches. All patches within a wall share a common wall tension and curvature. Consequently, spatial location within the wall is not required to calculate deformation in a patch. We test the hypothesis that activation time is more important than tissue location for determining mechanical deformation in asynchronous hearts. We perform simulations representing an experimental study of myocardial deformation induced by ventricular pacing, and a patient with LBBB and heart failure using endocardial recordings of electrical activation, wall volumes, and end-diastolic volumes. Direct comparison between simulated and experimental strain patterns shows both qualitative and quantitative agreement between model fibre strain and experimental circumferential strain in terms of shortening and rebound stretch during ejection. Local myofibre strain in the patient simulation shows qualitative agreement with circumferential strain patterns observed in the patient using tagged MRI. We conclude that the MultiPatch module produces realistic regional deformation patterns in the asynchronous heart and that

  9. Secure computing, economy, and trust

    DEFF Research Database (Denmark)

    Bogetoft, Peter; Damgård, Ivan B.; Jakobsen, Thomas;

    In this paper we consider the problem of constructing secure auctions based on techniques from modern cryptography. We combine knowledge from economics, cryptography and security engineering and develop and implement secure auctions for practical real-world problems. In essence this paper...... is an overview of the research project which attempts to build auctions for real applications using secure multiparty computation. The main contributions of this project are: A generic setup for secure evaluation of integer arithmetic including comparisons; general double auctions expressed by such operations...

  10. Asynchronous event-based corner detection and matching.

    Science.gov (United States)

    Clady, Xavier; Ieng, Sio-Hoi; Benosman, Ryad

    2015-06-01

    This paper introduces an event-based luminance-free method to detect and match corner events from the output of asynchronous event-based neuromorphic retinas. The method relies on the use of space-time properties of moving edges. Asynchronous event-based neuromorphic retinas are composed of autonomous pixels, each of them asynchronously generating "spiking" events that encode relative changes in pixels' illumination at high temporal resolutions. Corner events are defined as the spatiotemporal locations where the aperture problem can be solved using the intersection of several geometric constraints in events' spatiotemporal spaces. A regularization process provides the required constraints, i.e. the motion attributes of the edges with respect to their spatiotemporal locations using local geometric properties of visual events. Experimental results are presented on several real scenes showing the stability and robustness of the detection and matching. PMID:25828960

  11. A Loosely Synchronizing Asynchronous Router for TDM-Scheduled NOCs

    DEFF Research Database (Denmark)

    Kotleas, Ioannis; Humphreys, Dean; Sørensen, Rasmus Bo;

    2014-01-01

    This paper presents an asynchronous router design for use in time-division-multiplexed (TDM) networks-on-chip. Unlike existing synchronous, mesochronous and asynchronous router designs with similar functionality, the router is able to silently skip over cycles/TDM-slots where no traffic is...... scheduled and hence avoid all switching activity in the idle links and router ports. In this way switching activity is reduced to the minimum possible amount. The fact that this relaxed synchronization is sufficient to implement TDM scheduling represents a contribution at the conceptual level. The idea can...... only be implemented using asynchronous circuit techniques. To this end, the paper explores the use of “click-element” templates. Click-element templates use only flipflops and conventional gates, and this greatly simplifies the design process when using conventional EDA tools and standard cell...

  12. A Novel Multiuser Detector for Asynchronous CDMA System

    Institute of Scientific and Technical Information of China (English)

    LIANGXint; SHANGYong; LIANGQinglin; XIANGHaige

    2004-01-01

    The decorrelating and the MMSE (Minimum mean square error) multiuser detector for asynchronous CDMA (Code devision multiple access) system are ideally anticausal infinite memory-length detectors. Asa result~ in practice they have to be approximately implemented with finite-memory structure, and the process delay in detection is unavoidable. Based on the analysis of a new signal model for asynchronous system, a novel multiuser detector for asynchronous CDMA system is proposed in this paper~ which is termed as DF-IC-MMSE (Decision ,feedback interference cancellation-MMSE) detector. It's the detection statistics that makes the DF-IC-MMSE-detector basically different from other traditional ones. The DF-IC-MMSE detector can be ideally implemented with Causal finite memory-length structure, and cause no delay in symbol detection. Simulations show that the performance of DF-IC-MMSE detector is almost identical to that of the ideal MMSE detector.

  13. Molecular mechanisms for synchronous, asynchronous, and spontaneous neurotransmitter release.

    Science.gov (United States)

    Kaeser, Pascal S; Regehr, Wade G

    2014-01-01

    Most neuronal communication relies upon the synchronous release of neurotransmitters, which occurs through synaptic vesicle exocytosis triggered by action potential invasion of a presynaptic bouton. However, neurotransmitters are also released asynchronously with a longer, variable delay following an action potential or spontaneously in the absence of action potentials. A compelling body of research has identified roles and mechanisms for synchronous release, but asynchronous release and spontaneous release are less well understood. In this review, we analyze how the mechanisms of the three release modes overlap and what molecular pathways underlie asynchronous and spontaneous release. We conclude that the modes of release have key fusion processes in common but may differ in the source of and necessity for Ca(2+) to trigger release and in the identity of the Ca(2+) sensor for release. PMID:24274737

  14. Efficient Remote Preparation of Four-Qubit Cluster-Type Entangled States with Multi-Party Over Partially Entangled Channels

    Science.gov (United States)

    Wang, Dong; Hoehn, Ross D.; Ye, Liu; Kais, Sabre

    2016-07-01

    We present a strategy for realizing multiparty-controlled remote state preparation (MCRSP) for a family of four-qubit cluster-type states by taking a pair of partial entanglements as the quantum channels. In this scenario, the encoded information is transmitted from the sender to a spatially separated receiver with control of the transmission by multiple parties. Predicated on the collaboration of all participants, the desired state can be faithfully restored at the receiver's location with high success probability by application of additional appropriate local operations and necessary classical communication. Moreover, this proposal for MCRSP can be faithfully achieved with unit total success probability when the quantum channels are distilled to maximally entangled ones.

  15. The Subjective Evaluation Experiments on an Automatic Video Editing System Using Vision-based Head Tracking for Multiparty Conversations

    Science.gov (United States)

    Takemae, Yoshinao; Otsuka, Kazuhiro; Yamato, Junji; Ozawa, Shinji

    This paper presents experiments conducted to evaluate an automatic video editing system, founded on vision-based head tracking, that clearly conveys face-to-face multiparty conversations, such as meetings, to viewers. Systems that archive meetings and teleconferences to effectively facilitate human communication are attracting considerable interest. Conventional systems use a fixed-viewpoint camera and simple camera selection based on participants' utterances. Unfortunately, they fail to adequately convey who is talking to whom and nonverbal information about participants etc., to viewers. To solve this problem, we previously proposed an automatic video editing system using vision-based head tracking. This paper describes subjective evaluation experiments in which videos of entire conversations with 3 participants were presented to viewers; the results confirm the effectiveness of our system.

  16. Multi-Party Quantum Private Comparison Protocol with an Almost-Dishonest Third Party using GHZ States

    Science.gov (United States)

    Huang, Sheng-Liang; Hwang, Tzonelih; Gope, Prosanta

    2016-06-01

    This article proposes an innovative quantum private comparison (QPC) protocol for n users using GHZ states, where an almost-dishonest third party (TP) is introduced to assist the participants for comparing their secrets. It is argued that as compared to the existing QPC protocols our proposed scheme has some considerable advantages. First, in the existing QPC protocols, the TP can only to determine whether all participants' secrets are equal or not. Instead of that, in our proposed scheme a TP can even compare the secrets between any subsects of users. Second, since our proposed scheme is based on GHZ state; hence it can ensure higher efficiency as compared to other existing multi-party QPC protocols on d-dimension photons.

  17. DESIGN METHODOLOGY OF SELF-EXCITED ASYNCHRONOUS GENERATOR

    Directory of Open Access Journals (Sweden)

    Berzan V.

    2012-04-01

    Full Text Available The paper sets out the methodology of designing an asynchronous generator with capacitive self-excitation. It is known that its design is possible on the basis of serial synchronous motor with squirrel cage rotor. With this approach, the design reworked only the stator winding of electrical machines, making it cost-effectively implement the creation of the generator. Therefore, the methodology for the design, optimization calculations, the development scheme and the stator winding excitation system gain, not only of practical interest, and may also be useful for specialists in the field of electrical machines in the design of asynchronous generators.

  18. Design issues in the semantics and scheduling of asynchronous tasks.

    Energy Technology Data Exchange (ETDEWEB)

    Olivier, Stephen L.

    2013-07-01

    The asynchronous task model serves as a useful vehicle for shared memory parallel programming, particularly on multicore and manycore processors. As adoption of model among programmers has increased, support has emerged for the integration of task parallel language constructs into mainstream programming languages, e.g., C and C++. This paper examines some of the design decisions in Cilk and OpenMP concerning semantics and scheduling of asynchronous tasks with the aim of informing the efforts of committees considering language integration, as well as developers of new task parallel languages and libraries.

  19. Characterization of the three-dimensional free energy manifold for the uracil ribonucleoside from asynchronous replica exchange simulations.

    Science.gov (United States)

    Radak, Brian K; Romanus, Melissa; Lee, Tai-Sung; Chen, Haoyuan; Huang, Ming; Treikalis, Antons; Balasubramanian, Vivekanandan; Jha, Shantenu; York, Darrin M

    2015-02-10

    Replica exchange molecular dynamics has emerged as a powerful tool for efficiently sampling free energy landscapes for conformational and chemical transitions. However, daunting challenges remain in efficiently getting such simulations to scale to the very large number of replicas required to address problems in state spaces beyond two dimensions. The development of enabling technology to carry out such simulations is in its infancy, and thus it remains an open question as to which applications demand extension into higher dimensions. In the present work, we explore this problem space by applying asynchronous Hamiltonian replica exchange molecular dynamics with a combined quantum mechanical/molecular mechanical potential to explore the conformational space for a simple ribonucleoside. This is done using a newly developed software framework capable of executing >3,000 replicas with only enough resources to run 2,000 simultaneously. This may not be possible with traditional synchronous replica exchange approaches. Our results demonstrate 1.) the necessity of high dimensional sampling simulations for biological systems, even as simple as a single ribonucleoside, and 2.) the utility of asynchronous exchange protocols in managing simultaneous resource requirements expected in high dimensional sampling simulations. It is expected that more complicated systems will only increase in computational demand and complexity, and thus the reported asynchronous approach may be increasingly beneficial in order to make such applications available to a broad range of computational scientists. PMID:26580900

  20. Breaking The Millisecond Barrier On SpiNNaker: Implementing Asynchronous Event-Based Plastic Models With Microsecond Resolution

    Directory of Open Access Journals (Sweden)

    Xavier eLagorce

    2015-06-01

    Full Text Available Spike-based neuromorphic sensors such as retinas and cochleas, change the way in which the world is sampled. Instead of producing data sampled at a constant rate, these sensors output spikes that are asynchronous and event driven. The event-based nature of neuromorphic sensors implies a complete paradigm shift in current perception algorithms towards those that emphasize the importance of precise timing. The spikes produced by these sensors usually have a time resolution in the order of microseconds. This high temporal resolution is a crucial factor in learning tasks. It is also widely used in the field of biological neural networks. Sound localization for instance relies on detecting time lags between the two ears which, in the barn owl, reaches a temporal resolution of 5 microseconds. Current available neuromorphic computation platforms such as SpiNNaker often limit their users to a time resolution in the order of milliseconds that is not compatible with the asynchronous outputs of neuromorphic sensors. To overcome these limitations and allow for the exploration of new types of neuromorphic computing architectures, we introduce a novel software framework on the SpiNNaker platform. This framework allows for simulations of spiking networks and plasticity mechanisms using a completely asynchronous and event-based scheme running with a microsecond time resolution. Results on two example networks using this new implementation are presented.

  1. An asynchronous and parallel time-marching method: Application to three-dimensional MHD simulation of solar wind

    Institute of Scientific and Technical Information of China (English)

    2009-01-01

    An asynchronous and parallel time-marching method for three-dimensional (3D) time-dependent magnetohydrodynamic (MHD) simulation is used for large-scale solar wind simulation. It uses different local time steps in the corona and the heliosphere according to the local Courant-Friedrichs-Levy (CFL) conditions. The solar wind background with observed solar photospheric magnetic field as input is first presented. The simulation time for the background solar wind by using the asynchronous method is <1/6 of that by using the normal synchronous time-marching method with the same computation precision. Then, we choose the coronal mass ejection (CME) event of 13 November, 2003 as a test case. The time-dependent variations of the pressure and the velocity configured from a CME model at the inner boundary are applied to generate transient structures in order to study the dynamical interaction of a CME with the background solar wind flow between 1 and 230 Rs. This time-marching method is very effective in terms of computation time for large-scale 3D time-dependent numerical MHD problem. In this validation study, we find that this 3D MHD model, with the asynchronous and parallel time-marching method, provides a relatively satisfactory comparison with the ACE spacecraft obser- vations at L1 point.

  2. Asynchronous communication in spectral-element and discontinuous Galerkin methods for atmospheric dynamics - a case study using the High-Order Methods Modeling Environment (HOMME-homme_dg_branch)

    Science.gov (United States)

    Jamroz, Benjamin F.; Klöfkorn, Robert

    2016-08-01

    The scalability of computational applications on current and next-generation supercomputers is increasingly limited by the cost of inter-process communication. We implement non-blocking asynchronous communication in the High-Order Methods Modeling Environment for the time integration of the hydrostatic fluid equations using both the spectral-element and discontinuous Galerkin methods. This allows the overlap of computation with communication, effectively hiding some of the costs of communication. A novel detail about our approach is that it provides some data movement to be performed during the asynchronous communication even in the absence of other computations. This method produces significant performance and scalability gains in large-scale simulations.

  3. Asynchronous rotation scan for synthetic aperture interferometric radiometer

    Institute of Scientific and Technical Information of China (English)

    WU Ji; ZHANG Cheng; LIU Hao; SUN WeiYing

    2009-01-01

    Synthetic aperture interferometric technique has wide applications in optics, radio astronomy and mi-crowave remote sensing areas. With the increasing demands of high resolution imaging observation, a new time-sharing sampling scheme of asynchronous rotation scan is proposed to meet the technical challenge of achieving a large equivalent aperture and overcome the operating barriers of space borne application. This configuration is basically composed by two asynchronously and concentrically ro-tating antenna groups, whose revolving radii and speeds are different. The synthetic aperture system with asynchronous rotation scanning scheme can effectively solve the trade-off problem of system complexity, and greatly simplify the system hardware at the cost of sacrificing a certain time resolution. The basic rules and design methods of asynchronous rotation scan are investigated The Gridding method is introduced to inverse the spiral sampling data for image reconstruction. The potential ap-plications of geostationary orbit (GEO) earth observation and solar polar orbit (SPO) plasma cloud observation are explored with numerical simulations to validate the significance and feasibility of this new imaging configuration.

  4. Asynchronous Linking in a Service –Oriented Architecture.

    OpenAIRE

    Vivek, Sanjay; Tso, Kenneth; Thompson, Mark; De Roure, David

    2002-01-01

    In this paper, we identify research issues in the development of system infrastructure support for asynchronous linkservices in a service-oriented architecture. We explore the suitability and applicability of using MQSeries Everyplace to provide a messaging backbone for linkservices that increases reliability, fault tolerance, and scalability. We identify and discuss some important problems and research issues related to this approach.

  5. RELAXED ASYNCHRONOUS ITERATIONS FOR THE LINEAR COMPLEMENTARITY PROBLEM

    Institute of Scientific and Technical Information of China (English)

    Zhong-zhi Bai; Yu-guang Huang

    2002-01-01

    We present a class of relaxed asynchronous parallel multisplitting iterative methods forsolving the linear complementarity problem on multiprocessor systems, and set up theirconvergence theories when the system matrix of the linear complementarity problem is anH-matrix with positive diagonal elements.

  6. Asynchronous Assessment in a Large Lecture Marketing Course

    Science.gov (United States)

    Downey, W. Scott; Schetzsle, Stacey

    2012-01-01

    Asynchronous assessment, which includes quizzes or exams online or outside class, offers marketing educators an opportunity to make more efficient use of class time and to enhance students' learning experiences by giving them more flexibility and choice in their assessment environment. In this paper, we examine the performance difference between…

  7. Cyber Asynchronous versus Blended Cyber Approach in Distance English Learning

    Science.gov (United States)

    Ge, Zi-Gang

    2012-01-01

    This study aims to compare the single cyber asynchronous learning approach with the blended cyber learning approach in distance English education. Two classes of 70 students participated in this study, which lasted one semester of about four months, with one class using the blended approach for their English study and the other only using the…

  8. Abstracting Asynchronous Multi-Valued Networks: An Initial Investigation

    CERN Document Server

    Steggles, L Jason

    2011-01-01

    Multi-valued networks provide a simple yet expressive qualitative state based modelling approach for biological systems. In this paper we develop an abstraction theory for asynchronous multi-valued network models that allows the state space of a model to be reduced while preserving key properties of the model. The abstraction theory therefore provides a mechanism for coping with the state space explosion problem and supports the analysis and comparison of multi-valued networks. We take as our starting point the abstraction theory for synchronous multi-valued networks which is based on the finite set of traces that represent the behaviour of such a model. The problem with extending this approach to the asynchronous case is that we can now have an infinite set of traces associated with a model making a simple trace inclusion test infeasible. To address this we develop a decision procedure for checking asynchronous abstractions based on using the finite state graph of an asynchronous multi-valued network to reas...

  9. Structure-Based Deadlock Checking of Asynchronous Circuits

    Institute of Scientific and Technical Information of China (English)

    Hong-Guang Ren; Zhi-Ying Wang; Doug Edwards

    2011-01-01

    It is important to verify the absence of deadlocks in asynchronous circuits.Much previous work relies on a reachability analysis of the circuits' states,with the use of binary decision diagrams (BDDs) or Petri nets to model the behaviors of circuits.This paper presents an alternative approach focusing on the structural properties of well-formed asynchronous circuits that will never suffer deadlocks.A class of data-driven asynchronous pipelines is targeted in this paper,which can be viewed as a network of basic components connected by handshake channels.The sufficient and necessary conditions for a component network consisting of Steer,Merge,Fork and Join are given.The slack elasticity of the channels is analyzed in order to introduce pipelining.As an application,a deadlock checking method is implemented in a syntax-directed asynchronous design tool - Teak.The proposed method shows a great runtime advantage when compared against previous Petri net based verification tools.

  10. Asynchronous rotation scan for synthetic aperture interferometric radiometer

    Institute of Scientific and Technical Information of China (English)

    2009-01-01

    Synthetic aperture interferometric technique has wide applications in optics,radio astronomy and mi-crowave remote sensing areas.With the increasing demands of high resolution imaging observation,a new time-sharing sampling scheme of asynchronous rotation scan is proposed to meet the technical challenge of achieving a large equivalent aperture and overcome the operating barriers of space borne application.This configuration is basically composed by two asynchronously and concentrically ro-tating antenna groups,whose revolving radii and speeds are different.The synthetic aperture system with asynchronous rotation scanning scheme can effectively solve the trade-off problem of system complexity,and greatly simplify the system hardware at the cost of sacrificing a certain time resolution.The basic rules and design methods of asynchronous rotation scan are investigated The Gridding method is introduced to inverse the spiral sampling data for image reconstruction.The potential ap-plications of geostationary orbit(GEO)earth observation and solar polar orbit(SPO)plasma cloud observation are explored with numerical simulations to validate the significance and feasibility of this new imaging configuration.

  11. Reconceptualising Moderation in Asynchronous Online Discussions Using Grounded Theory

    Science.gov (United States)

    Vlachopoulos, Panos; Cowan, John

    2010-01-01

    This article reports a grounded theory study of the moderation of asynchronous online discussions, to explore the processes by which tutors in higher education decide when and how to moderate. It aims to construct a theory of e-moderation based on some key factors which appear to influence e-moderation. It discusses previous research on the…

  12. Reflections of Students in Their Use of Asynchronous Online Seminars

    Science.gov (United States)

    Groves, Mark; O'Donoghue, John

    2009-01-01

    This paper reports on research that has been carried out into the use, process, and effectiveness of an asynchronous online seminar within an undergraduate sports studies degree programme. Contemporary sources are used to justify the use of technology supported learning (TSL) in higher education and to inform a reflective and critical account of…

  13. Analysis of the Relevance of Posts in Asynchronous Discussions

    Science.gov (United States)

    Azevedo, Breno T.; Reategui, Eliseo; Behar, Patrícia A.

    2014-01-01

    This paper presents ForumMiner, a tool for the automatic analysis of students' posts in asynchronous discussions. ForumMiner uses a text mining system to extract graphs from texts that are given to students as a basis for their discussion. These graphs contain the most relevant terms found in the texts, as well as the relationships between them.…

  14. Teachers of the Gifted: Experiences with Asynchronous Development

    Science.gov (United States)

    Rosenberg, Jennifer

    2012-01-01

    Gifted students' development is asynchronous in the social, emotional, physical and cognitive domains. Because of this, unique interventions must be used by teachers of the gifted in order to best serve their developmental and educational needs. This qualitative study used transcendental phenomenology to examine and describe the experiences…

  15. Positive Semidefinite Integrated Covariance Estimation, Factorizations and Asynchronicity

    DEFF Research Database (Denmark)

    Boudt, Kris; Laurent, Sébastien; Lunde, Asger;

    An estimator of the ex-post covariation of log-prices under asynchronicity and microstructure noise is proposed. It uses the Cholesky factorization on the correlation matrix in order to exploit the heterogeneity in trading intensity to estimate the different parameters sequentially with as many...

  16. EEG-based asynchronous BCI control of a car in 3D virtual reality environments

    Institute of Scientific and Technical Information of China (English)

    ZHAO QiBin; ZHANG LiQing; CICHOCKI Andrzej

    2009-01-01

    Brain computer interface (BCl) aims at creating new communication channels without depending on brain's normal output channels of peripheral nerves and muscles.However,natural and sophisticated interactions manner between brain and computer still remain challenging.In this paper,we investigate how the duration of event-related desynchronization/synchronization (ERD/ERS) caused by motor im-agery (MI) can be modulated and used as an additional control parameter beyond simple binary deci-sions.Furthermore,using the non-time-locked properties of sustained (de)synchronization,we have developed an asynchronous BCl system for driving a car in 3D virtual reality environment (VRE) based on cumulative incremental control strategy.The extensive real time experiments confirmed that our new approach is able to drive smoothly a virtual car within challenging VRE only by the MI tasks with-out involving any muscular activities.

  17. Asynchronous detection of kinesthetic attention during mobilization of lower limbs using EEG measurements

    Science.gov (United States)

    Melinscak, Filip; Montesano, Luis; Minguez, Javier

    2016-02-01

    Objective. Attention is known to modulate the plasticity of the motor cortex, and plasticity is crucial for recovery in motor rehabilitation. This study addresses the possibility of using an EEG-based brain-computer interface (BCI) to detect kinesthetic attention to movement. Approach. A novel experiment emulating physical rehabilitation was designed to study kinesthetic attention. The protocol involved continuous mobilization of lower limbs during which participants reported levels of attention to movement—from focused kinesthetic attention to mind wandering. For this protocol an asynchronous BCI detector of kinesthetic attention and deliberate mind wandering was designed. Main results. EEG analysis showed significant differences in theta, alpha, and beta bands, related to the attentional state. These changes were further pinpointed to bands relative to the frequency of the individual alpha peak. The accuracy of the designed BCI ranged between 60.8% and 68.4% (significantly above chance level), depending on the used analysis window length, i.e. acceptable detection delay. Significance. This study shows it is possible to use self-reporting to study attention-related changes in EEG during continuous mobilization. Such a protocol is used to develop an asynchronous BCI detector of kinesthetic attention, with potential applications to motor rehabilitation.

  18. Data-Aware Retrodiction for Asynchronous Harmonic Measurement in a Cyber-Physical Energy System.

    Science.gov (United States)

    Liu, Youda; Wang, Xue; Liu, Yanchi; Cui, Sujin

    2016-08-18

    Cyber-physical energy systems provide a networked solution for safety, reliability and efficiency problems in smart grids. On the demand side, the secure and trustworthy energy supply requires real-time supervising and online power quality assessing. Harmonics measurement is necessary in power quality evaluation. However, under the large-scale distributed metering architecture, harmonic measurement faces the out-of-sequence measurement (OOSM) problem, which is the result of latencies in sensing or the communication process and brings deviations in data fusion. This paper depicts a distributed measurement network for large-scale asynchronous harmonic analysis and exploits a nonlinear autoregressive model with exogenous inputs (NARX) network to reorder the out-of-sequence measuring data. The NARX network gets the characteristics of the electrical harmonics from practical data rather than the kinematic equations. Thus, the data-aware network approximates the behavior of the practical electrical parameter with real-time data and improves the retrodiction accuracy. Theoretical analysis demonstrates that the data-aware method maintains a reasonable consumption of computing resources. Experiments on a practical testbed of a cyber-physical system are implemented, and harmonic measurement and analysis accuracy are adopted to evaluate the measuring mechanism under a distributed metering network. Results demonstrate an improvement of the harmonics analysis precision and validate the asynchronous measuring method in cyber-physical energy systems.

  19. Data-Aware Retrodiction for Asynchronous Harmonic Measurement in a Cyber-Physical Energy System

    Directory of Open Access Journals (Sweden)

    Youda Liu

    2016-08-01

    Full Text Available Cyber-physical energy systems provide a networked solution for safety, reliability and efficiency problems in smart grids. On the demand side, the secure and trustworthy energy supply requires real-time supervising and online power quality assessing. Harmonics measurement is necessary in power quality evaluation. However, under the large-scale distributed metering architecture, harmonic measurement faces the out-of-sequence measurement (OOSM problem, which is the result of latencies in sensing or the communication process and brings deviations in data fusion. This paper depicts a distributed measurement network for large-scale asynchronous harmonic analysis and exploits a nonlinear autoregressive model with exogenous inputs (NARX network to reorder the out-of-sequence measuring data. The NARX network gets the characteristics of the electrical harmonics from practical data rather than the kinematic equations. Thus, the data-aware network approximates the behavior of the practical electrical parameter with real-time data and improves the retrodiction accuracy. Theoretical analysis demonstrates that the data-aware method maintains a reasonable consumption of computing resources. Experiments on a practical testbed of a cyber-physical system are implemented, and harmonic measurement and analysis accuracy are adopted to evaluate the measuring mechanism under a distributed metering network. Results demonstrate an improvement of the harmonics analysis precision and validate the asynchronous measuring method in cyber-physical energy systems.

  20. Data-Aware Retrodiction for Asynchronous Harmonic Measurement in a Cyber-Physical Energy System.

    Science.gov (United States)

    Liu, Youda; Wang, Xue; Liu, Yanchi; Cui, Sujin

    2016-01-01

    Cyber-physical energy systems provide a networked solution for safety, reliability and efficiency problems in smart grids. On the demand side, the secure and trustworthy energy supply requires real-time supervising and online power quality assessing. Harmonics measurement is necessary in power quality evaluation. However, under the large-scale distributed metering architecture, harmonic measurement faces the out-of-sequence measurement (OOSM) problem, which is the result of latencies in sensing or the communication process and brings deviations in data fusion. This paper depicts a distributed measurement network for large-scale asynchronous harmonic analysis and exploits a nonlinear autoregressive model with exogenous inputs (NARX) network to reorder the out-of-sequence measuring data. The NARX network gets the characteristics of the electrical harmonics from practical data rather than the kinematic equations. Thus, the data-aware network approximates the behavior of the practical electrical parameter with real-time data and improves the retrodiction accuracy. Theoretical analysis demonstrates that the data-aware method maintains a reasonable consumption of computing resources. Experiments on a practical testbed of a cyber-physical system are implemented, and harmonic measurement and analysis accuracy are adopted to evaluate the measuring mechanism under a distributed metering network. Results demonstrate an improvement of the harmonics analysis precision and validate the asynchronous measuring method in cyber-physical energy systems. PMID:27548171

  1. THE RESEARCH OF GRADATION FUSION ALGORITHM BASED ON MULTISENSOR ASYNCHRONOUS SAMPLING SYSTEM

    Institute of Scientific and Technical Information of China (English)

    2005-01-01

    This letter explores the distributed multisensor dynamic system, which has uniform sampling velocity and asynchronous sampling data for different sensors, and puts forward a new gradation fusion algorithm of multisensor dynamic system. As the total forecasted increment value between the two adjacent moments is the forecasted estimate value of the corresponding state increment in the fusion center, the new algorithm models the state and the forecasted estimate value of every moment. Kalman filter and all measurements arriving sequentially in the fusion period are employed to update the evaluation of target state step by step, on the condition that the system has obtained the target state evaluation that is based on the overall information in the previous fusion period. Accordingly, in the present period, the fusion evaluation of the target state at each sampling point on the basis of the overall information can be obtained. This letter elaborates the form of this new algorithm. Computer simulation demonstrates that this new algorithm owns greater precision in estimating target state than the present asynchronous fusion algorithm calibrated in time does.

  2. Data-Aware Retrodiction for Asynchronous Harmonic Measurement in a Cyber-Physical Energy System

    Science.gov (United States)

    Liu, Youda; Wang, Xue; Liu, Yanchi; Cui, Sujin

    2016-01-01

    Cyber-physical energy systems provide a networked solution for safety, reliability and efficiency problems in smart grids. On the demand side, the secure and trustworthy energy supply requires real-time supervising and online power quality assessing. Harmonics measurement is necessary in power quality evaluation. However, under the large-scale distributed metering architecture, harmonic measurement faces the out-of-sequence measurement (OOSM) problem, which is the result of latencies in sensing or the communication process and brings deviations in data fusion. This paper depicts a distributed measurement network for large-scale asynchronous harmonic analysis and exploits a nonlinear autoregressive model with exogenous inputs (NARX) network to reorder the out-of-sequence measuring data. The NARX network gets the characteristics of the electrical harmonics from practical data rather than the kinematic equations. Thus, the data-aware network approximates the behavior of the practical electrical parameter with real-time data and improves the retrodiction accuracy. Theoretical analysis demonstrates that the data-aware method maintains a reasonable consumption of computing resources. Experiments on a practical testbed of a cyber-physical system are implemented, and harmonic measurement and analysis accuracy are adopted to evaluate the measuring mechanism under a distributed metering network. Results demonstrate an improvement of the harmonics analysis precision and validate the asynchronous measuring method in cyber-physical energy systems. PMID:27548171

  3. Asynchronous, web-based course in astronomy

    Science.gov (United States)

    Spergel, M.

    The course described here is a general educational, non-prerequisite and non- mathematical college course in astronomy offered on the web. It consists of readings from the text plus other periodical sources both online and offline. The course also requires the student to utilize a virtual planetarium to perform exercises in viewing the sky. The students respond to conceptual, multiple-choice questions. This course gives the student a sense of the night sky through the use of computer simulations and night observation. The students learn to understand and express scientific ideas. In addition, since the course is enhanced in computer usage and writing, students also develop these important skills.

  4. A new asynchronous parallel algorithm for inferring large-scale gene regulatory networks.

    Directory of Open Access Journals (Sweden)

    Xiangyun Xiao

    Full Text Available The reconstruction of gene regulatory networks (GRNs from high-throughput experimental data has been considered one of the most important issues in systems biology research. With the development of high-throughput technology and the complexity of biological problems, we need to reconstruct GRNs that contain thousands of genes. However, when many existing algorithms are used to handle these large-scale problems, they will encounter two important issues: low accuracy and high computational cost. To overcome these difficulties, the main goal of this study is to design an effective parallel algorithm to infer large-scale GRNs based on high-performance parallel computing environments. In this study, we proposed a novel asynchronous parallel framework to improve the accuracy and lower the time complexity of large-scale GRN inference by combining splitting technology and ordinary differential equation (ODE-based optimization. The presented algorithm uses the sparsity and modularity of GRNs to split whole large-scale GRNs into many small-scale modular subnetworks. Through the ODE-based optimization of all subnetworks in parallel and their asynchronous communications, we can easily obtain the parameters of the whole network. To test the performance of the proposed approach, we used well-known benchmark datasets from Dialogue for Reverse Engineering Assessments and Methods challenge (DREAM, experimentally determined GRN of Escherichia coli and one published dataset that contains more than 10 thousand genes to compare the proposed approach with several popular algorithms on the same high-performance computing environments in terms of both accuracy and time complexity. The numerical results demonstrate that our parallel algorithm exhibits obvious superiority in inferring large-scale GRNs.

  5. Item Vetoes and Attempts to Override Them in Multiparty Legislatures Vetos parciales e intentos de insistencia en legislaturas multipartidistas

    Directory of Open Access Journals (Sweden)

    Valeria Palanza

    2013-01-01

    Full Text Available This paper analyzes the dynamics of vetoes and veto overrides in the context of a multiparty legislature using an original dataset from the period 1983–2007 in Argentina. We argue that the President can use an “item” or “partial” veto to selectively delete articles, while keeping enough distributive goods in the bill to break up the coalition responsible for its passage, thereby eliminating support for an override. Our research reveals that total vetoes – which affect all legislators equally – are more likely to be overridden than partial vetoes. Contradicting the received wisdom that in multiparty legislatures override attempts are more likely under a divided government, we find that override attempts are more likely in plurality governments. We use case analyses to illustrate the main arguments developed in this paper.El trabajo estudia las dinámicas desatadas por la práctica del veto presidencial e insistencias del congreso, en el contexto de legislaturas multipartidarias, a través del análisis de una base de datos original que abarca el período 1983-2007 en Argentina. El trabajo argumenta que el presidente puede usar el veto parcial para quitar del texto, en forma selectiva, artículos puntuales, dejando al mismo tiempo en el texto bienes distributivos suficientes como para romper la coalición responsable de la aprobación del proyecto, de manera tal de eliminar la posibilidad de una insistencia. La investigación revela que los vetos totales, que afectan por igual a todos los legisladores, son más factibles de ser insistidos que los vetos parciales. En contra de lo sostenido al momento acerca de que en legislaturas multipartidarias los intentos de insistencia son más factibles bajo gobierno dividido, este trabajo encuentra que son más factibles cuando el gobierno cuenta con al menos una pluralidad en una de las cámaras. Además del análisis cuantitativo, presentamos estudios de casos para ilustrar los argumentos

  6. State assignment approach to asynchronous CMOS circuit design

    Science.gov (United States)

    Kantabutra, Vitit; Andreou, Andreas G.

    1994-04-01

    We present a new algorithm for state assignment in asynchronous circuits so that for each circuit state transition, only one (secondary) state variable switches. No intermediate unstable states are used. The resultant circuits operate at optimum speed in terms of the number of transitions made and use only static CMOS gates. By reducing the number of switching events per state transition, noise due to the switching events is reduced and dynamic power dissipation may also be reduced. Our approach is suitable for asynchronous sequential circuits that are designed from flow tables or state transition diagrams. The proposed approach may also be useful for designing synchronous circuits, but explorations into the subject of clock power would be necessary to determine its usefulness.

  7. Asynchronous Cooperative e-Learning System and Its Evaluation

    Science.gov (United States)

    Eto, Kazuhiro; Miyoshi, Takumi

    Much attention has been attracted to collaborative learning on an e-learning system. However, it is difficult to implement the collaborative environment to an asynchronous e-learning system since collaboration would be realized only when learners join the system at the same time. On the other hand, cooperative learning has been proposed. In this method, learners can study on their own pace without making mutual agreement but with receiving cognitive information from others. In this paper, the authors have developed the asynchronous cooperative e-learning system that provides learners' attendance and studying progress as the cognitive information. The subjective evaluation experiments show that our system is slightly inferior to the synchronous collaborative e-learning system, but it can motivate the learners more than the conventional system.

  8. Channel Estimation And Multiuser Detection In Asynchronous Satellite Communications

    CERN Document Server

    Chaouech, Helmi; 10.5121/ijwmn.2010.2411

    2010-01-01

    In this paper, we propose a new method of channel estimation for asynchronous additive white Gaussian noise channels in satellite communications. This method is based on signals correlation and multiuser interference cancellation which adopts a successive structure. Propagation delays and signals amplitudes are jointly estimated in order to be used for data detection at the receiver. As, a multiuser detector, a single stage successive interference cancellation (SIC) architecture is analyzed and integrated to the channel estimation technique and the whole system is evaluated. The satellite access method adopted is the direct sequence code division multiple access (DS CDMA) one. To evaluate the channel estimation and the detection technique, we have simulated a satellite uplink with an asynchronous multiuser access.

  9. Asynchronous interaction, online technologies self-efficacy and self-regulated learning as predictors of academic achievement in an online class

    Science.gov (United States)

    McGhee, Rosie M. Hector

    This research is a correlational study of the relationship among the independent variables: asynchronous interaction, online technologies self-efficacy, and self-regulated learning, and the dependent variable; academic achievement. This study involves an online computer literacy course at a local community college. Very little research exists on the relationship among asynchronous interaction, online technologies self-efficacy and self-regulated learning on predicting academic achievement in an online class. Liu (2008), in his study on student interaction in online courses, concluded that student interaction is a complex issue that needs more research to increase our understanding as it relates to distance education. The purpose of this study was to examine the relationships between asynchronous interaction, online technologies self-efficacy, self-regulated learning and academic achievement in an online computer literacy class at a community college. The researcher used quantitative methods to obtain and analyze data on the relationships among the variables during the summer 2010 semester. Forty-five community college students completed three web-based self-reporting instruments: (a) the GVU 10th WWW User Survey Questionnaire, (b) the Online Technologies Self-Efficacy Survey, and (c) selected items from the Motivated Strategies for Learning Questionnaire. Additional data was obtained from asynchronous discussions posted on Blackboard(TM) Learning Management System. The results of this study found that there were statistically significant relationships between asynchronous interaction and academic achievement (r = .55, p self-efficacy and academic achievement (r = .50, p self-regulated learning and academic achievement ( r = -.02, p interested in taking online teaching and learning to the next level.

  10. A STUDY ON ASYNCHRONOUS SERIAL COMMUNICATON BETWEEN COMPONENTS IN AUTOMOBILES

    OpenAIRE

    ŞAHİN, Yaşar Güneri

    2010-01-01

    ABSTRACTIn connection with the developments in the automobile sector, the number of in-automobile components, the amount of cable used for providing in-automobile communication between these components and costs are increased gradually. In this study, a method is presented in which asynchronous serial connection is used for decreasing the initial and maintenance costs by means of decreasing the amount of cables used in middle and lower class automobiles. The electronic circuits required to es...

  11. Teleoperation system using Asynchronous transfer mode, ATM network

    International Nuclear Information System (INIS)

    This paper examines the application of Asynchronous Transfer Mode (ATM) in a distributed industrial environment such as in teleoperation, which performs real time control manipulation from a remote location. In our study, two models of teleoperation are proposed; the first model is a point to point connection and the second model is through an ATM network. The performance results are analysed as to determine whether the two models can support the teleoperation traffics via simulation using commercial software design tool. (Author)

  12. Diversity Multiplexing Tradeoff of Asynchronous Cooperative Relay Networks

    CERN Document Server

    Krishnakumar, R N; Kumar, P Vijay

    2008-01-01

    The assumption of nodes in a cooperative communication relay network operating in synchronous fashion is often unrealistic. In the present paper, we consider two different models of asynchronous operation in cooperative-diversity networks experiencing slow fading and examine the corresponding diversity-multiplexing tradeoffs (DMT). For both models, we propose protocols and distributed space-time codes that asymptotically achieve the transmit diversity bound for all multiplexing gains and for any number of relays.

  13. A novel asynchronous access method with binary interfaces

    OpenAIRE

    Torres-Solis Jorge; Silva Jorge; Chau Tom; Mihailidis Alex

    2008-01-01

    Abstract Background Traditionally synchronous access strategies require users to comply with one or more time constraints in order to communicate intent with a binary human-machine interface (e.g., mechanical, gestural or neural switches). Asynchronous access methods are preferable, but have not been used with binary interfaces in the control of devices that require more than two commands to be successfully operated. Methods We present the mathematical development and evaluation of a novel as...

  14. An asynchronous controller for a daisychainable vme bus interrupter

    OpenAIRE

    Wollowski, Ralf; Beister, Jochen; Kuhn, Matthias

    1999-01-01

    An interrupter for use in a daisy-chained VME bus interrupt system has beendesigned and implemented as an asynchronous sequential circuit. The concur-rency of the processes posed a design problem that was solved by means of asystematic design procedure that uses Petri nets for specifying system and in-terrupter behaviour, and for deriving a primitive flow table. Classical designand additional measures to cope with non-fundamental mode operation yieldeda coded state-machine representation. Thi...

  15. Non-detection of nova shells around asynchronous polars

    Science.gov (United States)

    Pagnotta, Ashley; Zurek, David

    2016-05-01

    Asynchronous polars (APs) are accreting white dwarfs (WDs) that have different WD and orbital angular velocities, unlike the rest of the known polars, which rotate synchronously (i.e. their WD and orbital angular velocities are the same). Past nova eruptions are the predicted cause of the asynchronicity, in part due to the fact that one of the APs, V1500 Cyg, was observed to undergo a nova eruption in 1975. We used the Southern African Large Telescope 10 m class telescope and the MDM 2.4 m Hiltner telescope to search for nova shells around three of the remaining four APs (V1432 Aql, BY Cam, and CD Ind) as well as one Intermediate Polar with a high asynchronicity (EX Hya). We found no evidence of nova shells in any of our images. We therefore cannot say that any of the systems besides V1500 Cyg had nova eruptions, but because not all post-nova systems have detectable shells, we also cannot exclude the possibility of a nova eruption occurring in any of these systems and knocking the rotation out of sync.

  16. Non-Detection of Nova Shells Around Asynchronous Polars

    CERN Document Server

    Pagnotta, Ashley

    2016-01-01

    Asynchronous polars (APs) are accreting white dwarfs (WDs) that have different WD and orbital angular velocities, unlike the rest of the known polars, which rotate synchronously (i.e., their WD and orbital angular velocities are the same). Past nova eruptions are the predicted cause of the asynchronicity, in part due to the fact that one of the APs, V1500 Cyg, was observed to undergo a nova eruption in 1975. We used the Southern African Large Telescope 10m class telescope and the MDM 2.4m Hiltner telescope to search for nova shells around three of the remaining four APs (V1432 Aql, BY Cam, and CD Ind) as well as one Intermediate Polar with a high asynchronicity (EX Hya). We found no evidence of nova shells in any of our images. We therefore cannot say that any of the systems besides V1500 Cyg had nova eruptions, but because not all post-nova systems have detectable shells, we also cannot exclude the possibility of a nova eruption occurring in any of these systems and knocking the rotation out of sync.

  17. Asynchronous Stoichiometric Response in Lithium Iron Phosphate Batteries

    Energy Technology Data Exchange (ETDEWEB)

    Paxton, William A. [State Univ. of New Jersey, Piscataway, NJ (United States); Akdogan, E. Koray [State Univ. of New Jersey, Piscataway, NJ (United States); Savkliyidiz, Ilyas [State Univ. of New Jersey, Piscataway, NJ (United States); Choksi, Ankur U. [State Univ. of New Jersey, Piscataway, NJ (United States); Silver, Scott X. [State Univ. of New Jersey, Piscataway, NJ (United States); Tsakalokos, Thomas [State Univ. of New Jersey, Piscataway, NJ (United States); Zhong, Zhong [Brookhaven National Lab. (BNL), Upton, NY (United States)

    2014-11-11

    The operando energy-dispersive x-ray diffraction (EDXRD) was carried out on a newly formed 8 Ah lithium iron phosphate (LiFePO4) battery with the goal of elucidating the origin of asynchronous phase transformation commonly seen with in situ x-ray diffraction studies. The high-energy photons at the NSLS X17B1 beamline allow for penetration into a fully assembled battery and therefore negate any need for a specially designed in situ cell which often uses modified current collectors to minimize x-ray attenuation. Spatially-and-temporally resolved phase-mapping was conducted with a semiquantitative reference intensity ratio (RIR) analysis to estimate the relative abundance of the delithiated phase. The data show an asynchronous response in the stoichiometry versus the electrochemical profile and suggest limited diffusion in the electrode toward the end of discharge. These results confirm that the asynchronous electrode response is not just limited to specially designed cells but occurs in fully assembled cells alike. We attribute this behavior to be a consequence of performing a local measurement over a wide-area heterogeneous reaction.

  18. A novel asynchronous access method with binary interfaces

    Directory of Open Access Journals (Sweden)

    Torres-Solis Jorge

    2008-10-01

    Full Text Available Abstract Background Traditionally synchronous access strategies require users to comply with one or more time constraints in order to communicate intent with a binary human-machine interface (e.g., mechanical, gestural or neural switches. Asynchronous access methods are preferable, but have not been used with binary interfaces in the control of devices that require more than two commands to be successfully operated. Methods We present the mathematical development and evaluation of a novel asynchronous access method that may be used to translate sporadic activations of binary interfaces into distinct outcomes for the control of devices requiring an arbitrary number of commands to be controlled. With this method, users are required to activate their interfaces only when the device under control behaves erroneously. Then, a recursive algorithm, incorporating contextual assumptions relevant to all possible outcomes, is used to obtain an informed estimate of user intention. We evaluate this method by simulating a control task requiring a series of target commands to be tracked by a model user. Results When compared to a random selection, the proposed asynchronous access method offers a significant reduction in the number of interface activations required from the user. Conclusion This novel access method offers a variety of advantages over traditionally synchronous access strategies and may be adapted to a wide variety of contexts, with primary relevance to applications involving direct object manipulation.

  19. Divorce and asynchronous arrival in common terns, Sterna hirundo.

    Science.gov (United States)

    GonzáLez-SolíS; Becker; Wendeln

    1999-11-01

    We investigated which of three hypotheses (better option, incompatibility or asynchronous arrival) best explains divorce in the common tern. One partner did not return the next year in 18.5% of 150 pairs. Among the 106 pairs in which both mates returned, the divorce rate was 18.9%. We found no significant differences in: breeding performance or condition in relation to the probability of divorce; quality of previous mates and new mates, mean age in relation to pair bond status; breeding success before and after divorce nor did this differ from breeding success of reunited pairs. Hence the better option and incompatibility hypotheses were not supported. However, divorce was more likely in pairs in which mates arrived asynchronously on the breeding grounds, supporting the asynchronous arrival hypothesis. Median arrival asynchrony for divorced pairs was 7.5 days and for reunited pairs 2 days; mates arriving more than 16 days apart always split up. About 20% of divorced birds lost breeding status in the year of divorce, probably as a consequence of their late arrival. Our results suggest that terns search for a new mate as soon as they arrive on the breeding grounds and that mates remain faithful to each other to avoid the costs of searching for a new partner. Thus, synchrony in arrival facilitates pair bond maintenance rather than asynchrony promoting divorce, since divorce appears to be a side-effect of asynchrony and not an active decision. Copyright 1999 The Association for the Study of Animal Behaviour. PMID:10564616

  20. Data Collection for Mobile Group Consumption: An Asynchronous Distributed Approach.

    Science.gov (United States)

    Zhu, Weiping; Chen, Weiran; Hu, Zhejie; Li, Zuoyou; Liang, Yue; Chen, Jiaojiao

    2016-01-01

    Mobile group consumption refers to consumption by a group of people, such as a couple, a family, colleagues and friends, based on mobile communications. It differs from consumption only involving individuals, because of the complex relations among group members. Existing data collection systems for mobile group consumption are centralized, which has the disadvantages of being a performance bottleneck, having single-point failure and increasing business and security risks. Moreover, these data collection systems are based on a synchronized clock, which is often unrealistic because of hardware constraints, privacy concerns or synchronization cost. In this paper, we propose the first asynchronous distributed approach to collecting data generated by mobile group consumption. We formally built a system model thereof based on asynchronous distributed communication. We then designed a simulation system for the model for which we propose a three-layer solution framework. After that, we describe how to detect the causality relation of two/three gathering events that happened in the system based on the collected data. Various definitions of causality relations based on asynchronous distributed communication are supported. Extensive simulation results show that the proposed approach is effective for data collection relating to mobile group consumption. PMID:27058544

  1. Students and Taxes: a Privacy-Preserving Study Using Secure Computation

    Directory of Open Access Journals (Sweden)

    Bogdanov Dan

    2016-07-01

    Full Text Available We describe the use of secure multi-party computation for performing a large-scale privacy-preserving statistical study on real government data. In 2015, statisticians from the Estonian Center of Applied Research (CentAR conducted a big data study to look for correlations between working during university studies and failing to graduate in time. The study was conducted by linking the database of individual tax payments from the Estonian Tax and Customs Board and the database of higher education events from the Ministry of Education and Research. Data collection, preparation and analysis were conducted using the Share-mind secure multi-party computation system that provided end-to-end cryptographic protection to the analysis. Using ten million tax records and half a million education records in the analysis, this is the largest cryptographically private statistical study ever conducted on real data.

  2. Asynchronous Distance Education Forum - Brainstorming vs. Snowballing: A Case Study for Teaching in Programming Didactics

    Science.gov (United States)

    Patriarcheas, Kiriakos; Xenos, Michalis

    Asynchronous discussion fora all the more become part of the educational process of distance education. The goal of this research is the study of the educational techniques of Brainstorming and Snowballing to their utilisation in the frame of a distance education forum, both as far as participation and creation of learning environment and also educational effectiveness are concerned. This research refers to computer teachers’ training on didactics of programming within the framework of educational micro-worlds. As it is deduced from the data analysis and the study of the messages higher participation and improvement of critical thinking are noted when Brainstorming technique is used, while fairly less time is spent and less off-topic interventions are made when Snowballing technique is used. Meanwhile, Brainstorming is found to be more advantageous than Snowballing concerning the effectiveness both in primary level (trained teachers) and in secondary level of adaptation and knowledge impartment to the students (results of their students).

  3. Asynchronous Checkpoint Migration with MRNet in the Scalable Checkpoint / Restart Library

    Energy Technology Data Exchange (ETDEWEB)

    Mohror, K; Moody, A; de Supinski, B R

    2012-03-20

    Applications running on today's supercomputers tolerate failures by periodically saving their state in checkpoint files on stable storage, such as a parallel file system. Although this approach is simple, the overhead of writing the checkpoints can be prohibitive, especially for large-scale jobs. In this paper, we present initial results of an enhancement to our Scalable Checkpoint/Restart Library (SCR). We employ MRNet, a tree-based overlay network library, to transfer checkpoints from the compute nodes to the parallel file system asynchronously. This enhancement increases application efficiency by removing the need for an application to block while checkpoints are transferred to the parallel file system. We show that the integration of SCR with MRNet can reduce the time spent in I/O operations by as much as 15x. However, our experiments exposed new scalability issues with our initial implementation. We discuss the sources of the scalability problems and our plans to address them.

  4. Asynchronous Group Key Distribution on top of the CC2420 Security Mechanisms for Sensor Networks

    DEFF Research Database (Denmark)

    Hansen, Morten Tranberg

    2009-01-01

    scheme with no time synchronization requirements. The scheme decreases the number of key updates by providing them on an as needed basis according to the amount of network traffic. We evaluate the CC2420 radio security mechanism and show how to use it as a basis to implement secure group communication......A sensor network is a network consisting of small, inexpensive, low-powered sensor nodes that communicate to complete a common task. Sensor nodes are characterized by having limited communication and computation capabilities, energy, and storage. They often are deployed in hostile environments...... creating a demand for encryption and authentication of the messages sent between them. Due to severe resource constraints on the sensor nodes, efficient key distribution schemes and secure communication protocols with low overhead are desired. In this paper we present an asynchronous group key distribution...

  5. On the asynchronously continuous control of mobile robot movement by motor cortical spiking activity.

    Science.gov (United States)

    Xu, Zhiming; So, Rosa Q; Toe, Kyaw Kyar; Ang, Kai Keng; Guan, Cuntai

    2014-01-01

    This paper presents an asynchronously intracortical brain-computer interface (BCI) which allows the subject to continuously drive a mobile robot. This system has a great implication for disabled patients to move around. By carefully designing a multiclass support vector machine (SVM), the subject's self-paced instantaneous movement intents are continuously decoded to control the mobile robot. In particular, we studied the stability of the neural representation of the movement directions. Experimental results on the nonhuman primate showed that the overt movement directions were stably represented in ensemble of recorded units, and our SVM classifier could successfully decode such movements continuously along the desired movement path. However, the neural representation of the stop state for the self-paced control was not stably represented and could drift.

  6. Middleware for Processing Message Queues with Elasticity Support and Sequential Integrity of Asynchronous Message Processing

    Science.gov (United States)

    Henrique Teixeira, Eduardo; Patrícia Favacho de Araújo, Aletéia

    2015-10-01

    Elasticity in computing refers to dynamically adjusting the amount of allocated resources to process a distributed application. In order to achieve this, mechanisms are needed to avoid the phenomenon of the elasticity threshold detection moving constantly up or down. The existing work fails to deliver sequential integrity of asynchronous messages processing and the asymmetries of data distribution to achieve parallel consumption. This paper fills this gaps and proposes a middleware solution to dynamically analyze the flow of message queue, and a mechanism to increase the parallelized consumption based on the output behavior. An architecture for IOD (Increase On Demand) middleware is presented, with support for the increase and decrease of thread's to cope with the growth of message queues, using the technique of limit-based heuristics over a given period of time and grouping messages into sub-queues based on classification criteria.

  7. Asynchronous Message Transmission Technique for Latency Requirements in Time Critical Ship-borne System

    Directory of Open Access Journals (Sweden)

    N. P. Shrivastava

    2016-01-01

    Full Text Available A solution to data ageing requirements in time critical ship system like fire control system is presented. In an operational sea borne platform, navigation requirements for the onboard systems are fulfilled by ring laser gyro-based inertial navigation system. For critical systems like fire control system, navigational data must be delivered in real time without any delay. However due to delay occurring in processing of raw information and transmission of data on interface bus some latency is introduced. Algorithm for an asynchronous message transmission technique from inertial navigation system to user system to meet its latency requirements is discussed. Latency requirement is achieved by sending a separate message with the time stamp for the instance the first byte of 100 Hz attitude data is received at the processing computer of navigation system.Defence Science Journal, Vol. 66, No. 1, January 2016, pp. 26-29, DOI: http://dx.doi.org/10.14429/dsj.66.8502

  8. Efficient Multiparty Protocols via Log-Depth Threshold Formulae Contact Add Comment RSS-Feed

    DEFF Research Database (Denmark)

    Cohen, Gil; Damgård, Ivan Bjerre; Ishai, Yuval;

    2013-01-01

    We study the complexity of computing Boolean functions on general Boolean domains by polynomial threshold functions (PTFs). A typical example of a general Boolean domain is 12n . We are mainly interested in the length (the number of monomials) of PTFs, with their degree and weight being...... of secondary interest. We show that PTFs on general Boolean domains are tightly connected to depth two threshold circuits. Our main results in regard to this connection are: PTFs of polynomial length and polynomial degree compute exactly the functions computed by THRMAJ circuits. An exponential length lower...

  9. Asynchronous Remote Medical Consultation for Ghana

    CERN Document Server

    Luk, Rowena; Aoki, Paul M

    2008-01-01

    Computer-mediated communication systems can be used to bridge the gap between doctors in underserved regions with local shortages of medical expertise and medical specialists worldwide. To this end, we describe the design of a prototype remote consultation system intended to provide the social, institutional and infrastructural context for sustained, self-organizing growth of a globally-distributed Ghanaian medical community. The design is grounded in an iterative design process that included two rounds of extended design fieldwork throughout Ghana and draws on three key design principles (social networks as a framework on which to build incentives within a self-organizing network; optional and incremental integration with existing referral mechanisms; and a weakly-connected, distributed architecture that allows for a highly interactive, responsive system despite failures in connectivity). We discuss initial experiences from an ongoing trial deployment in southern Ghana.

  10. High-speed secure key distribution over an optical network based on computational correlation imaging.

    Science.gov (United States)

    Li, Shen; Yao, Xu-Ri; Yu, Wen-Kai; Wu, Ling-An; Zhai, Guang-Jie

    2013-06-15

    We present a protocol for an optical key distribution network based on computational correlation imaging, which can simultaneously realize privacy amplification and multiparty distribution. With current technology, the key distribution rate could reach hundreds of Mbit/s with suitable choice of parameters. The setup is simple and inexpensive, and may be employed in real networks where high-speed long-distance secure communication is required. PMID:23939004

  11. Behavioral Synthesis of Asynchronous Circuits Using Syntax Directed Translation as Backend

    DEFF Research Database (Denmark)

    Nielsen, Sune Fallgaard; Sparsø, Jens; Madsen, Jan

    2009-01-01

    The current state-of-the art in high-level synthesis of asynchronous circuits is syntax directed translation, which performs a one-to-one mapping of a HDL-description into a corresponding circuit. This paper presents a method for behavioral synthesis of asynchronous circuits which builds on top...... of syntax directed translation, and which allows the designer to perform automatic design space exploration guided by area or speed constraints. The paper presents an asynchronous implementation template consisting of a data-path and a control unit and its implementation using the asynchronous hardware...

  12. An Asynchronous Recurrent Network of Cellular Automaton-Based Neurons and Its Reproduction of Spiking Neural Network Activities.

    Science.gov (United States)

    Matsubara, Takashi; Torikai, Hiroyuki

    2016-04-01

    Modeling and implementation approaches for the reproduction of input-output relationships in biological nervous tissues contribute to the development of engineering and clinical applications. However, because of high nonlinearity, the traditional modeling and implementation approaches encounter difficulties in terms of generalization ability (i.e., performance when reproducing an unknown data set) and computational resources (i.e., computation time and circuit elements). To overcome these difficulties, asynchronous cellular automaton-based neuron (ACAN) models, which are described as special kinds of cellular automata that can be implemented as small asynchronous sequential logic circuits have been proposed. This paper presents a novel type of such ACAN and a theoretical analysis of its excitability. This paper also presents a novel network of such neurons, which can mimic input-output relationships of biological and nonlinear ordinary differential equation model neural networks. Numerical analyses confirm that the presented network has a higher generalization ability than other major modeling and implementation approaches. In addition, Field-Programmable Gate Array-implementations confirm that the presented network requires lower computational resources.

  13. Can Factors Related to Self-regulated Learning and Epistemological Beliefs Predict Learning Achievement in Undergraduate Asynchronous Web-based Courses?

    OpenAIRE

    Bell, Paul D

    2006-01-01

    This study examined the effects of self-regulated learning (SRL) and epistemological beliefs (EB) on individual learner levels of academic achievement in Web-based learning environments while holding constant the effect of computer self-efficacy, reason for taking an online course, and prior college academic achievement. The study constituents included 201 undergraduate students enrolled in a variety of asynchronous Web-based courses at a university in the southeastern United States.

  14. Scalable Symmetric Key Cryptography Using Asynchronous Data Exchange in Enterprise Grid

    Directory of Open Access Journals (Sweden)

    Medhat Awadallah

    2011-11-01

    Full Text Available Symmetric key cryptography is one of the most critical computing problems that need high performance computing power resources. The use of large key sizes and complex encryption/decryption algorithms to achieve unbreakable state has led to an increased time computational complexity. Traditionally, this problem is solved in the grid environment by partitioning data streams into several blocks of a predefined size. This is done while sequentially reading the data from the raw data file. The grid manager node then takes the responsibility of passing these blocks to the executer nodes where different blocks are processed separately and simultaneously. Although this technique allows parallel processing to speed up the encryption/decryption process, creating blocks by sequentially reading the data file and distributing these blocks on executers synchronously by the central manager node is a poor technique and a source of delay. In this paper, we present a novel approach that tackles this problem by allowing executers to access data file at random and asynchronously exchange the blocks among them, thereby, delay is significantly reduced and data size can be scaled up. In order to show the merit of our approach experiments have been conducted through a system-level middleware for grid computing called Alchemi. The results show a remarkable performance enhancement in our approach over traditional approaches in terms of speed.

  15. COMPUTING

    CERN Multimedia

    M. Kasemann

    Overview In autumn the main focus was to process and handle CRAFT data and to perform the Summer08 MC production. The operational aspects were well covered by regular Computing Shifts, experts on duty and Computing Run Coordination. At the Computing Resource Board (CRB) in October a model to account for service work at Tier 2s was approved. The computing resources for 2009 were reviewed for presentation at the C-RRB. The quarterly resource monitoring is continuing. Facilities/Infrastructure operations Operations during CRAFT data taking ran fine. This proved to be a very valuable experience for T0 workflows and operations. The transfers of custodial data to most T1s went smoothly. A first round of reprocessing started at the Tier-1 centers end of November; it will take about two weeks. The Computing Shifts procedure was tested full scale during this period and proved to be very efficient: 30 Computing Shifts Persons (CSP) and 10 Computing Resources Coordinators (CRC). The shift program for the shut down w...

  16. The design of the asynchronous abacus adder%异步算盘加法器设计

    Institute of Scientific and Technical Information of China (English)

    徐阳扬; 杨银堂; 周端; 弥晓华

    2011-01-01

    目的 开发一种新型的高速低功耗加法器设计方案.以满足SOC对高速低功耗运算的需要.方法 采用中国算盘算法,接口采用异步双轨握手协议,将算盘加法与异步自定时技术相结合,减少运算的进位产生,提高运算并行度.结果 提出了一种新的高速加法器电路.测试结果表明,在SMIC 0.18 μm工艺下,32位异步算盘加法器平均运算完成时间为0.957ns,其速度是同步串行加法器的6.747倍,是异步串行加法器的1.517倍和异步进位选择加法器的1.033倍.且电路平均功耗只有异步进位选择加法器的25%.结论 中国算盘算法与异步自定时电路相结合的加法器电路,有很好的速度和功耗特性,有很广阔的应用和研究前景.%Aim To develop a new high speed and low power adder design scheme for the demand of high speed and low power computing in SOC. Methods A new adder design is proposed in this paper. The adder adopts the Chinese abacus algorithm, combined with asynchronous self-timed techniques, and it also introduces the hybrid handshake protocol in the scheme. It can decrease the number of the carries and increase the parallel computing degrees. So it can achieve high speed while maintaining low power. Results The adder implemented the 0. 18μm technique of SMIC. The test result shows the 32-bit asynchronous parallel adder achieves the average computation duration is 0.957ns. Its speed is 7. 33 times faster than the synchronous ripple adder, 1.517 times faster than the a-synchronous ripple adder, and 1.033 times faster than the asynchronous carry-select adder. And its average power is only 25% of the asynchronous carry-select adder. Conclusion The adder design which combine with Chinese abacus algorithm and asynchronous self-timed techniques has good performance on high speed and low power. It has wide implement and develop prospective.

  17. Hyperplastic polyposis associated with two asynchronous colon cancers

    Institute of Scientific and Technical Information of China (English)

    Masaya Kurobe; Kuniko Abe; Naoe Kinoshita; Masanobu Anami; Hirotaka Tokai; Yoshinori Ryu; Chun Yang Wen; Takashi Kanematsu; Tomayoshi Hayashi

    2007-01-01

    We report a patient with hyperplastic polyposis who had two asynchronous colon cancers, a combined adenoma-hyperplastic polyp, a serrated adenoma, and tubular adenomas. Hyperplastic polyposis is thought to be a precancerous lesion; and adenocarcinoma arises from hyperplastic polyposis through the hyperplastic polyp-adenoma-carcinoma sequence. Most polyps in patients with hyperplastic polyposis present as blandlooking hyperplastic polyps, which are regarded as nonneoplastic lesions; however, the risk of malignancy should not be underestimated. In patients with multiple hyperplastic polyps, hyperplastic polyposis should be identified and followed up carefully in order to detect malignant transformation in the early stage.

  18. COMPUTING

    CERN Multimedia

    M. Kasemann

    Overview During the past three months activities were focused on data operations, testing and re-enforcing shift and operational procedures for data production and transfer, MC production and on user support. Planning of the computing resources in view of the new LHC calendar in ongoing. Two new task forces were created for supporting the integration work: Site Commissioning, which develops tools helping distributed sites to monitor job and data workflows, and Analysis Support, collecting the user experience and feedback during analysis activities and developing tools to increase efficiency. The development plan for DMWM for 2009/2011 was developed at the beginning of the year, based on the requirements from the Physics, Computing and Offline groups (see Offline section). The Computing management meeting at FermiLab on February 19th and 20th was an excellent opportunity discussing the impact and for addressing issues and solutions to the main challenges facing CMS computing. The lack of manpower is particul...

  19. COMPUTING

    CERN Multimedia

    P. McBride

    The Computing Project is preparing for a busy year where the primary emphasis of the project moves towards steady operations. Following the very successful completion of Computing Software and Analysis challenge, CSA06, last fall, we have reorganized and established four groups in computing area: Commissioning, User Support, Facility/Infrastructure Operations and Data Operations. These groups work closely together with groups from the Offline Project in planning for data processing and operations. Monte Carlo production has continued since CSA06, with about 30M events produced each month to be used for HLT studies and physics validation. Monte Carlo production will continue throughout the year in the preparation of large samples for physics and detector studies ramping to 50 M events/month for CSA07. Commissioning of the full CMS computing system is a major goal for 2007. Site monitoring is an important commissioning component and work is ongoing to devise CMS specific tests to be included in Service Availa...

  20. COMPUTING

    CERN Multimedia

    I. Fisk

    2011-01-01

    Introduction CMS distributed computing system performed well during the 2011 start-up. The events in 2011 have more pile-up and are more complex than last year; this results in longer reconstruction times and harder events to simulate. Significant increases in computing capacity were delivered in April for all computing tiers, and the utilisation and load is close to the planning predictions. All computing centre tiers performed their expected functionalities. Heavy-Ion Programme The CMS Heavy-Ion Programme had a very strong showing at the Quark Matter conference. A large number of analyses were shown. The dedicated heavy-ion reconstruction facility at the Vanderbilt Tier-2 is still involved in some commissioning activities, but is available for processing and analysis. Facilities and Infrastructure Operations Facility and Infrastructure operations have been active with operations and several important deployment tasks. Facilities participated in the testing and deployment of WMAgent and WorkQueue+Request...

  1. Secure Computation with Fixed-Point Numbers

    Science.gov (United States)

    Catrina, Octavian; Saxena, Amitabh

    Secure computation is a promising approach to business problems in which several parties want to run a joint application and cannot reveal their inputs. Secure computation preserves the privacy of input data using cryptographic protocols, allowing the parties to obtain the benefits of data sharing and at the same time avoid the associated risks. These business applications need protocols that support all the primitive data types and allow secure protocol composition and efficient application development. Secure computation with rational numbers has been a challenging problem. We present in this paper a family of protocols for multiparty computation with rational numbers using fixed-point representation. This approach offers more efficient solutions for secure computation than other usual representations.

  2. Meeting decision detection: multimodal information fusion for multi-party dialogue understanding

    OpenAIRE

    Hsueh, Pei-Yun

    2009-01-01

    Modern advances in multimedia and storage technologies have led to huge archives of human conversations in widely ranging areas. These archives offer a wealth of information in the organization contexts. However, retrieving and managing information in these archives is a time-consuming and labor-intensive task. Previous research applied keyword and computer vision-based methods to do this. However, spontaneous conversations, complex in the use of multimodal cues and intricate i...

  3. THE METHODS AND THE RESULTS OF THE TESTING OF AN ASYNCHRONOUS GENERATOR WITH SIX PHASE ZONES

    Directory of Open Access Journals (Sweden)

    Bogatyrev N. I.

    2016-03-01

    Full Text Available The article contain the peculiarities of testing asynchronous generator with sixzone winding on the basis of the asynchronous motor series 4A100S4 and analysis of obtained characteristics. Circuit parameters of the stator winding can significantly affect the characteristics of the asynchronous generator. Asynchronous generator was tested with a stator winding connected star, autotransformer and sectional winding. Use chastising windings opens the possibility of applying various circuits of capacitors and the load to asynchronous generators, which in turn affect the efficiency and stabilizing properties of the electric machine. Asynchronous generators to test with sectional winding by confirmation of theoretical calculations for determine the most optimal scheme under connect capacitors and load, testing the stator winding. The volume of testing for asynchronous generators standard is not defined, so we proposed testing method, taking into account the design features of the stator winding. Asynchronous generators were tested with the help of special equipment with the use of analyzer of energy power quality. Article contains characteristics of idling, short circuit and others, considered the heat mode. On the basis of the results we have determined the parameters of the circuit, the efficiency and power factor of induction generator

  4. Designing Asynchronous Online Discussion Environments: Recent Progress and Possible Future Directions

    Science.gov (United States)

    Gao, Fei; Zhang, Tianyi; Franklin, Teresa

    2013-01-01

    Asynchronous online discussion environments are important platforms to support learning. Research suggests, however, threaded forums, one of the most popular asynchronous discussion environments, do not often foster productive online discussions naturally. This paper explores how certain properties of threaded forums have affected or constrained…

  5. The Key Implementation Technology of Client/Server's Asynchronous Communication Programs

    Institute of Scientific and Technical Information of China (English)

    2002-01-01

    This paper introduces the implementation method,key technology and flowchart of Client/Server's asynchronous communication programs on Linux or Unix,and further explains a few problems to which should pay attention for improving CPU's efficiency in implementing asynchronous communication programs.

  6. The design of an asynchronous Tiny RISC TM/TR4101 microprocessor core

    DEFF Research Database (Denmark)

    Christensen, Kåre Tais; Jensen, P.; Korger, P.;

    1998-01-01

    This paper presents the design of an asynchronous version of the TR4101 embedded microprocessor core developed by LSI Logic Inc. The asynchronous processor, called ARISC, was designed using the same CAD tools and the same standard cell library that was used to implement the TR4101. The paper...

  7. Effects of Belongingness and Synchronicity on Face-to-Face and Computer-Mediated Online Cooperative Pedagogy

    Science.gov (United States)

    Saltarelli, Andrew John

    2012-01-01

    Previous research suggests asynchronous online computer-mediated communication (CMC) has deleterious effects on certain cooperative learning pedagogies (e.g., constructive controversy), but the processes underlying this effect and how it may be ameliorated remain unclear. This study tests whether asynchronous CMC thwarts belongingness needs…

  8. Grain Refining of Flange Plate for Welded H Section Steel Made under Asynchronous Rolling Condition

    Institute of Scientific and Technical Information of China (English)

    DAI Hui; SUN Jiquan; TANG Di

    2011-01-01

    Asynchronous rolling technology was adopted for the accumulated ten passes cold rolling,flange plate steel,and for welded H section steel,respectively.The metallographic microstructure analysis,tensile test and annealing test were carried out for cold rolled pieces; thus the ratio of length to width of grain,tensile strength,relationship between the grain size and asynchronous rolling process parameters after annealing can be obtained.The experimental results show that the relationship between the asynchronous rolling and the shearing deformation of rolled pieces can make a reasonable interpretation of the mechanism that asynchronous rolling may improve the strain accumulated energy of rolled pieces and the strength of flange plate steel.This paper provides a theoretical basis for the application of asynchronous rolling in improving the strength of flange plate steel.

  9. Router Designs for an Asynchronous Time-Division-Multiplexed Network-on-Chip

    DEFF Research Database (Denmark)

    Kasapaki, Evangelia; Sparsø, Jens; Sørensen, Rasmus Bo;

    2013-01-01

    In this paper we explore the design of an asynchronous router for a time-division-multiplexed (TDM) network-on-chip (NOC) that is being developed for a multi-processor platform for hard real-time systems. TDM inherently requires a common time reference, and existing TDM-based NOC designs are either....... This adds hardware complexity and increases area and power consumption. We propose to use asynchronous routers in order to achieve a simpler, more robust and globally-asynchronous NOC, and this represents an unexplored point in the design space. The paper presents a range of alternative router designs. All...... routers have been synthesized for a 65nm CMOS technology, and the paper reports post-layout figures for area, speed and energy and compares the asynchronous designs with an existing mesochronous clocked router. The results show that an asynchronous router is 2 times smaller, marginally slower...

  10. COMPUTING

    CERN Document Server

    I. Fisk

    2013-01-01

    Computing activity had ramped down after the completion of the reprocessing of the 2012 data and parked data, but is increasing with new simulation samples for analysis and upgrade studies. Much of the Computing effort is currently involved in activities to improve the computing system in preparation for 2015. Operations Office Since the beginning of 2013, the Computing Operations team successfully re-processed the 2012 data in record time, not only by using opportunistic resources like the San Diego Supercomputer Center which was accessible, to re-process the primary datasets HTMHT and MultiJet in Run2012D much earlier than planned. The Heavy-Ion data-taking period was successfully concluded in February collecting almost 500 T. Figure 3: Number of events per month (data) In LS1, our emphasis is to increase efficiency and flexibility of the infrastructure and operation. Computing Operations is working on separating disk and tape at the Tier-1 sites and the full implementation of the xrootd federation ...

  11. Experience with synchronous and asynchronous digital control systems

    Science.gov (United States)

    Regenie, V. A.; Chacon, C. V.; Lock, W. P.

    1986-01-01

    Flight control systems have undergone a revolution since the days of simple mechanical linkages; presently the most advanced systems are full-authority, full-time digital systems controlling unstable aircraft. With the use of advanced control systems, the aerodynamic design can incorporate features that allow greater performance and fuel savings, as can be seen on the new Airbus design and advanced tactical fighter concepts. These advanced aircraft will be and are relying on the flight control system to provide the stability and handling qualities required for safe flight and to allow the pilot to control the aircraft. Various design philosophies have been proposed and followed to investigate system architectures for these advanced flight control systems. One major area of discussion is whether a multichannel digital control system should be synchronous or asynchronous. This paper addressed the flight experience at the Dryden Flight Research Facility of NASA's Ames Research Center with both synchronous and asynchronous digital flight control systems. Four different flight control systems are evaluated against criteria such as software reliability, cost increases, and schedule delays.

  12. Cooperative and asynchronous stereo vision for dynamic vision sensors

    International Nuclear Information System (INIS)

    Dynamic vision sensors (DVSs) encode visual input as a stream of events generated upon relative light intensity changes in the scene. These sensors have the advantage of allowing simultaneously high temporal resolution (better than 10 µs) and wide dynamic range (>120 dB) at sparse data representation, which is not possible with clocked vision sensors. In this paper, we focus on the task of stereo reconstruction. The spatiotemporal and asynchronous aspects of data provided by the sensor impose a different stereo reconstruction approach from the one applied for synchronous frame-based cameras. We propose to model the event-driven stereo matching by a cooperative network (Marr and Poggio 1976 Science 194 283–7). The history of the recent activity in the scene is stored in the network, which serves as spatiotemporal context used in disparity calculation for each incoming event. The network constantly evolves in time, as events are generated. In our work, not only the spatiotemporal aspect of the data is preserved but also the matching is performed asynchronously. The results of the experiments prove that the proposed approach is well adapted for DVS data and can be successfully used for disparity calculation. (paper)

  13. The Role of Online Instructors in Asynchronous Discussion Forums

    Science.gov (United States)

    Maddison, Sarah T.; Mazzolini, M. M.; Gay, P. L.

    2007-05-01

    We present qualitative results and advice on the role of online instructors in asynchronous discussion forums and the technologies used to support online interactive learning. Results are based on six years of designing, coordinating, evaluating and teaching into the distance learning program Swinburne Astronomy Online. We discuss why we chose to use asynchronous rather than synchronous discussion forums and how we have implemented them; how we train our online instructors and their role as a 'guide on the side'; techniques for moderating the volume of forum postings while ensuring a constructive learning environment; and methods for dealing with both mixed class preparedness and 'challenging' students within an online environment. Our research into the interaction between students and instructors in online forums provides some interesting (and often counter-intuitive) insights into the relationship between the number and length of student postings and the posting patterns of their instructors. We compare these results with qualitative feedback from both students and instructors on their perception of the online learning and teaching experience.

  14. Asynchronous Code-Division Random Access Using Convex Optimization

    CERN Document Server

    Applebaum, Lorne; Duarte, Marco F; Calderbank, Robert

    2011-01-01

    Many applications in cellular systems and sensor networks involve a random subset of a large number of users asynchronously reporting activity to a base station. This paper examines the problem of multiuser detection (MUD) in random access channels for such applications. Traditional orthogonal signaling ignores the random nature of user activity in this problem and limits the total number of users to be on the order of the number of signal space dimensions. Contention-based schemes, on the other hand, suffer from delays caused by colliding transmissions and the hidden node problem. In contrast, this paper presents a novel asynchronous (non-orthogonal) code-division random access scheme along with a convex optimization-based MUD algorithm that overcomes the issues associated with orthogonal signaling and contention-based methods. Two key distinguishing features of the proposed algorithm are that it does not require knowledge of the delay or channel state information of every user and it has polynomial-time com...

  15. Algebraic Number Precoded OFDM Transmission for Asynchronous Cooperative Multirelay Networks

    Directory of Open Access Journals (Sweden)

    Hua Jiang

    2014-01-01

    Full Text Available This paper proposes a space-time block coding (STBC transmission scheme for asynchronous cooperative systems. By combination of rotated complex constellations and Hadamard transform, these constructed codes are capable of achieving full cooperative diversity with the analysis of the pairwise error probability (PEP. Due to the asynchronous characteristic of cooperative systems, orthogonal frequency division multiplexing (OFDM technique with cyclic prefix (CP is adopted for combating timing delays from relay nodes. The total transmit power across the entire network is fixed and appropriate power allocation can be implemented to optimize the network performance. The relay nodes do not require decoding and demodulation operation, resulting in a low complexity. Besides, there is no delay for forwarding the OFDM symbols to the destination node. At the destination node the received signals have the corresponding STBC structure on each subcarrier. In order to reduce the decoding complexity, the sphere decoder is implemented for fast data decoding. Bit error rate (BER performance demonstrates the effectiveness of the proposed scheme.

  16. Formation of the wide asynchronous binary asteroid population

    Energy Technology Data Exchange (ETDEWEB)

    Jacobson, Seth A. [Department of Astrophysical and Planetary Science, UCB 391, University of Colorado, Boulder, CO 80309 (United States); Scheeres, Daniel J.; McMahon, Jay [Department of Aerospace Engineering Sciences, UCB 429, University of Colorado, Boulder, CO 80309 (United States)

    2014-01-01

    We propose and analyze a new mechanism for the formation of the wide asynchronous binary population. These binary asteroids have wide semimajor axes relative to most near-Earth and main belt asteroid systems. Confirmed members have rapidly rotating primaries and satellites that are not tidally locked. Previously suggested formation mechanisms from impact ejecta, from planetary flybys, and directly from rotational fission events cannot satisfy all of the observations. The newly hypothesized mechanism works as follows: (1) these systems are formed from rotational fission, (2) their satellites are tidally locked, (3) their orbits are expanded by the binary Yarkovsky-O'Keefe-Radzievskii-Paddack (BYORP) effect, (4) their satellites desynchronize as a result of the adiabatic invariance between the libration of the secondary and the mutual orbit, and (5) the secondary avoids resynchronization because of the YORP effect. This seemingly complex chain of events is a natural pathway for binaries with satellites that have particular shapes, which define the BYORP effect torque that acts on the system. After detailing the theory, we analyze each of the wide asynchronous binary members and candidates to assess their most likely formation mechanism. Finally, we suggest possible future observations to check and constrain our hypothesis.

  17. Designing Parallel Bus Using Universal Asynchronous Receiver Transmitter

    Directory of Open Access Journals (Sweden)

    Satyandra Sharad

    2013-04-01

    Full Text Available This paper entitled “DESIGNING PARALLEL BUSUSING UNIVERSAL ASYNCHRONOUS RECEIVER TRANSMITTER” is designed to the core of a UART interface module, which includes both receive and transmit modules, and the command parser. This paper will be a viable solution to design parallel buses with the help of UART. In the test bench , there is a RFM(register file model to which we write/read back data from just to check our design .The txt file issues serial inputs to the core and the core outputs parallel data and address in the form of bus. This bus is connected to our RFM (register file model instantiated in the test bench along with the design. This makes easy to retrieve parallel data from serial input. The base of the paper is to use microcontroller along with other components to interface with the physical world. In contrast, most serial communication must first be converted back into parallel form by a universal asynchronous receiver/transmitter (UART before they may be directly connected to a data bus. Both Transmissions (Parallel and Serial are used to connect peripheral devices and enable us to communicate with these devices. The UART core described here is designed using VHDL and implemented on Xilinx Vertex FPGA.

  18. Asynchronous glaciation at Nanga Parbat, northwestern Himalaya Mountains, Pakistan

    Science.gov (United States)

    Phillips, William M.; Sloan, Valerie F.; Shroder, John F., Jr.; Sharma, Pankaj; Clarke, Michèle L.; Rendell, Helen M.

    2000-05-01

    We present a new glacial chronology demonstrating asynchroneity between advances of Himalayan glaciers and Northern Hemisphere ice-sheet volumes. Glaciers at Nanga Parbat expanded during the early to middle Holocene ca. 9.0 5.5 ka. No major advances at Nanga Parbat during the last global glacial stage of marine oxygen isotope stage 2 (MIS-2) between 24 and 11 ka were identified. Preliminary evidence also indicates advances between ca. 60 and 30 ka. These periods of high ice volume coincide with warm, wet regional climates dominated by a strong southwest Asian summer monsoon. The general lack of deposits dating from MIS-2 suggests that Nanga Parbat was too arid to support expanded ice during this period of low monsoon intensity. Advances during warm, wet periods are possible for the high-altitude summer accumulation glaciers typical of the Himalayas, and explain asynchronous behavior. However, the Holocene advances at Nanga Parbat appear to have been forced by an abrupt drop in temperature ca. 8.4 8.0 ka and an increase in winter precipitation ca. 7 5.5 ka. These results highlight the overall sensitivity of Himalayan glaciation to orbital forcing of monsoon intensity, and on millennial or shorter time scales, to changes in North Atlantic circulation.

  19. Computer

    CERN Document Server

    Atkinson, Paul

    2011-01-01

    The pixelated rectangle we spend most of our day staring at in silence is not the television as many long feared, but the computer-the ubiquitous portal of work and personal lives. At this point, the computer is almost so common we don't notice it in our view. It's difficult to envision that not that long ago it was a gigantic, room-sized structure only to be accessed by a few inspiring as much awe and respect as fear and mystery. Now that the machine has decreased in size and increased in popular use, the computer has become a prosaic appliance, little-more noted than a toaster. These dramati

  20. COMPUTING

    CERN Multimedia

    I. Fisk

    2010-01-01

    Introduction It has been a very active quarter in Computing with interesting progress in all areas. The activity level at the computing facilities, driven by both organised processing from data operations and user analysis, has been steadily increasing. The large-scale production of simulated events that has been progressing throughout the fall is wrapping-up and reprocessing with pile-up will continue. A large reprocessing of all the proton-proton data has just been released and another will follow shortly. The number of analysis jobs by users each day, that was already hitting the computing model expectations at the time of ICHEP, is now 33% higher. We are expecting a busy holiday break to ensure samples are ready in time for the winter conferences. Heavy Ion An activity that is still in progress is computing for the heavy-ion program. The heavy-ion events are collected without zero suppression, so the event size is much large at roughly 11 MB per event of RAW. The central collisions are more complex and...

  1. COMPUTING

    CERN Multimedia

    M. Kasemann P. McBride Edited by M-C. Sawley with contributions from: P. Kreuzer D. Bonacorsi S. Belforte F. Wuerthwein L. Bauerdick K. Lassila-Perini M-C. Sawley

    Introduction More than seventy CMS collaborators attended the Computing and Offline Workshop in San Diego, California, April 20-24th to discuss the state of readiness of software and computing for collisions. Focus and priority were given to preparations for data taking and providing room for ample dialog between groups involved in Commissioning, Data Operations, Analysis and MC Production. Throughout the workshop, aspects of software, operating procedures and issues addressing all parts of the computing model were discussed. Plans for the CMS participation in STEP’09, the combined scale testing for all four experiments due in June 2009, were refined. The article in CMS Times by Frank Wuerthwein gave a good recap of the highly collaborative atmosphere of the workshop. Many thanks to UCSD and to the organizers for taking care of this workshop, which resulted in a long list of action items and was definitely a success. A considerable amount of effort and care is invested in the estimate of the comput...

  2. COMPUTING

    CERN Multimedia

    M. Kasemann

    Introduction During the past six months, Computing participated in the STEP09 exercise, had a major involvement in the October exercise and has been working with CMS sites on improving open issues relevant for data taking. At the same time operations for MC production, real data reconstruction and re-reconstructions and data transfers at large scales were performed. STEP09 was successfully conducted in June as a joint exercise with ATLAS and the other experiments. It gave good indication about the readiness of the WLCG infrastructure with the two major LHC experiments stressing the reading, writing and processing of physics data. The October Exercise, in contrast, was conducted as an all-CMS exercise, where Physics, Computing and Offline worked on a common plan to exercise all steps to efficiently access and analyze data. As one of the major results, the CMS Tier-2s demonstrated to be fully capable for performing data analysis. In recent weeks, efforts were devoted to CMS Computing readiness. All th...

  3. COMPUTING

    CERN Multimedia

    I. Fisk

    2011-01-01

    Introduction It has been a very active quarter in Computing with interesting progress in all areas. The activity level at the computing facilities, driven by both organised processing from data operations and user analysis, has been steadily increasing. The large-scale production of simulated events that has been progressing throughout the fall is wrapping-up and reprocessing with pile-up will continue. A large reprocessing of all the proton-proton data has just been released and another will follow shortly. The number of analysis jobs by users each day, that was already hitting the computing model expectations at the time of ICHEP, is now 33% higher. We are expecting a busy holiday break to ensure samples are ready in time for the winter conferences. Heavy Ion The Tier 0 infrastructure was able to repack and promptly reconstruct heavy-ion collision data. Two copies were made of the data at CERN using a large CASTOR disk pool, and the core physics sample was replicated ...

  4. COMPUTING

    CERN Multimedia

    M. Kasemann

    CCRC’08 challenges and CSA08 During the February campaign of the Common Computing readiness challenges (CCRC’08), the CMS computing team had achieved very good results. The link between the detector site and the Tier0 was tested by gradually increasing the number of parallel transfer streams well beyond the target. Tests covered the global robustness at the Tier0, processing a massive number of very large files and with a high writing speed to tapes.  Other tests covered the links between the different Tiers of the distributed infrastructure and the pre-staging and reprocessing capacity of the Tier1’s: response time, data transfer rate and success rate for Tape to Buffer staging of files kept exclusively on Tape were measured. In all cases, coordination with the sites was efficient and no serious problem was found. These successful preparations prepared the ground for the second phase of the CCRC’08 campaign, in May. The Computing Software and Analysis challen...

  5. COMPUTING

    CERN Document Server

    P. McBride

    It has been a very active year for the computing project with strong contributions from members of the global community. The project has focused on site preparation and Monte Carlo production. The operations group has begun processing data from P5 as part of the global data commissioning. Improvements in transfer rates and site availability have been seen as computing sites across the globe prepare for large scale production and analysis as part of CSA07. Preparations for the upcoming Computing Software and Analysis Challenge CSA07 are progressing. Ian Fisk and Neil Geddes have been appointed as coordinators for the challenge. CSA07 will include production tests of the Tier-0 production system, reprocessing at the Tier-1 sites and Monte Carlo production at the Tier-2 sites. At the same time there will be a large analysis exercise at the Tier-2 centres. Pre-production simulation of the Monte Carlo events for the challenge is beginning. Scale tests of the Tier-0 will begin in mid-July and the challenge it...

  6. COMPUTING

    CERN Multimedia

    I. Fisk

    2010-01-01

    Introduction The first data taking period of November produced a first scientific paper, and this is a very satisfactory step for Computing. It also gave the invaluable opportunity to learn and debrief from this first, intense period, and make the necessary adaptations. The alarm procedures between different groups (DAQ, Physics, T0 processing, Alignment/calibration, T1 and T2 communications) have been reinforced. A major effort has also been invested into remodeling and optimizing operator tasks in all activities in Computing, in parallel with the recruitment of new Cat A operators. The teams are being completed and by mid year the new tasks will have been assigned. CRB (Computing Resource Board) The Board met twice since last CMS week. In December it reviewed the experience of the November data-taking period and could measure the positive improvements made for the site readiness. It also reviewed the policy under which Tier-2 are associated with Physics Groups. Such associations are decided twice per ye...

  7. COMPUTING

    CERN Document Server

    M. Kasemann

    Introduction More than seventy CMS collaborators attended the Computing and Offline Workshop in San Diego, California, April 20-24th to discuss the state of readiness of software and computing for collisions. Focus and priority were given to preparations for data taking and providing room for ample dialog between groups involved in Commissioning, Data Operations, Analysis and MC Production. Throughout the workshop, aspects of software, operating procedures and issues addressing all parts of the computing model were discussed. Plans for the CMS participation in STEP’09, the combined scale testing for all four experiments due in June 2009, were refined. The article in CMS Times by Frank Wuerthwein gave a good recap of the highly collaborative atmosphere of the workshop. Many thanks to UCSD and to the organizers for taking care of this workshop, which resulted in a long list of action items and was definitely a success. A considerable amount of effort and care is invested in the estimate of the co...

  8. COMPUTING

    CERN Document Server

    I. Fisk

    2012-01-01

    Introduction Computing continued with a high level of activity over the winter in preparation for conferences and the start of the 2012 run. 2012 brings new challenges with a new energy, more complex events, and the need to make the best use of the available time before the Long Shutdown. We expect to be resource constrained on all tiers of the computing system in 2012 and are working to ensure the high-priority goals of CMS are not impacted. Heavy ions After a successful 2011 heavy-ion run, the programme is moving to analysis. During the run, the CAF resources were well used for prompt analysis. Since then in 2012 on average 200 job slots have been used continuously at Vanderbilt for analysis workflows. Operations Office As of 2012, the Computing Project emphasis has moved from commissioning to operation of the various systems. This is reflected in the new organisation structure where the Facilities and Data Operations tasks have been merged into a common Operations Office, which now covers everything ...

  9. An investigation of assessment and feedback practices in fully asynchronous online undergraduate mathematics courses

    Science.gov (United States)

    Trenholm, Sven; Alcock, Lara; Robinson, Carol

    2015-11-01

    Research suggests it is difficult to learn mathematics in the fully asynchronous online (FAO) instructional modality, yet little is known about associated teaching and assessment practices. In this study, we investigate FAO mathematics assessment and feedback practices in particular consideration of both claims and findings that these practices have a powerful influence on learning. A survey questionnaire was constructed and completed by 70 FAO undergraduate mathematics instructors, mostly from the USA, who were each asked to detail their assessment and feedback practices in a single FAO mathematics course. Alongside these questions, participants also answered the 16-item version of the Approaches to Teaching Inventory. In addition, a novel feedback framework was also created and used to examine how feedback practices may be related to participants' approaches to teaching. Results show that assessment and feedback practices are varied and complex: in particular, we found there was not a simple emphasis on summative assessment instruments, nor a concomitant expectation these would always be invigilated. Though richer assessment feedback appears to be emphasized, evidence suggests this feedback may not be primarily directed at advancing student learning. Moreover, we found evidence of a reliance on computer--human interactions (e.g. via computer-assisted assessment systems) and further evidence of a decline in human interactions, suggesting a dynamic that is both consistent with current online learning theory and claims FAO mathematics courses are becoming commodified. Several avenues for further research are suggested.

  10. An asynchronous writing method for restart files in the gysela code in prevision of exascale systems*

    Directory of Open Access Journals (Sweden)

    Thomine O.

    2013-12-01

    Full Text Available The present work deals with an optimization procedure developed in the full-f global GYrokinetic SEmi-LAgrangian code (GYSELA. Optimizing the writing of the restart files is necessary to reduce the computing impact of crashes. These files require a very large memory space, and particularly so for very large mesh sizes. The limited bandwidth of the data pipe between the comput- ing nodes and the storage system induces a non-scalable part in the GYSELA code, which increases with the mesh size. Indeed the transfer time of RAM to data depends linearly on the files size. The necessity of non synchronized writing-in-file procedure is therefore crucial. A new GYSELA module has been developed. This asynchronous procedure allows the frequent writ- ing of the restart files, whilst preventing a severe slowing down due to the limited writing bandwidth. This method has been improved to generate a checksum control of the restart files, and automatically rerun the code in case of a crash for any cause.

  11. Simulation of an Asynchronous Machine by using a Pseudo Bond Graph

    Science.gov (United States)

    Romero, Gregorio; Felez, Jesus; Maroto, Joaquin; Martinez, M. Luisa

    2008-11-01

    For engineers, computer simulation, is a basic tool since it enables them to understand how systems work without actually needing to see them. They can learn how they work in different circumstances and optimize their design with considerably less cost in terms of time and money than if they had to carry out tests on a physical system. However, if computer simulation is to be reliable it is essential for the simulation model to be validated. There is a wide range of commercial brands on the market offering products for electrical domain simulation (SPICE, LabVIEW PSCAD,Dymola, Simulink, Simplorer,...). These are powerful tools, but require the engineer to have a perfect knowledge of the electrical field. This paper shows an alternative methodology to can simulate an asynchronous machine using the multidomain Bond Graph technique and apply it in any program that permit the simulation of models based in this technique; no extraordinary knowledge of this technique and electric field are required to understand the process .

  12. Asynchronous API Pattern and its Application%异步接口模式及其应用

    Institute of Scientific and Technical Information of China (English)

    何华海; 丁柯

    2002-01-01

    In distributed systems,high efficiency can be achieved using asynchronous API between client and server.This paper provides an architectural pattern that implements asynchronous API generally. Asynchronous methods donot execute operations directly,however,they delegate the sending and receiving process to individual threads via aqueue ,the client deals with results by means of callback ,wait or check. Synchronous API is implemented on the baseof asynchronous API. Presently the asynchronous API pattern has been employed in the implementation of messagequeue middleware ISMQ.

  13. Vector control structure of an asynchronous motor at maximum torque

    Science.gov (United States)

    Chioncel, C. P.; Tirian, G. O.; Gillich, N.; Raduca, E.

    2016-02-01

    Vector control methods offer the possibility to gain high performance, being widely used. Certain applications require an optimum control in limit operating conditions, as, at maximum torque, that is not always satisfied. The paper presents how the voltage and the frequency for an asynchronous machine (ASM) operating at variable speed are determinate, with an accent on the method that keeps the rotor flux constant. The simulation analyses consider three load types: variable torque and speed, variable torque and constant speed, constant torque and variable speed. The final values of frequency and voltage are obtained through the proposed control schemes with one controller using the simulation language based on the Maple module. The dynamic analysis of the system is done for the case with P and PI controller and allows conclusions on the proposed method, which can have different applications, as the ASM in wind turbines.

  14. Numerical Simulation of Asynchronous Simulated Moving Bed Chromatography

    Institute of Scientific and Technical Information of China (English)

    卢建刚

    2004-01-01

    Asynchronous simulated moving bed chromatography (ASMBC), known also as the "VARICOL" process, is more efficient and flexible than the well-known and traditional simulated moving bed chromatography (SMBC). A detailed model of ASMBC, taking account of non-linear competitive isotherms, mass transfer parameters, and complex port switching schedule parameters, was developed to simulate the complex dynamics of ASMBC.The simulated performance is in close agreement with the experimental data of chiral separation reported in the literature. The simulation results show that ASMBC can achieve the performance similar to SMBC with fewer columns and can achieve better performance than SMBC with the same total column number. All design and operation parameters can be chosen correctly by numerical simulation. This detailed ASMBC model and the numerical technique are useful for design, operation, optimization and scale-up of ASMBC.

  15. Realization of station for testing asynchronous three-phase motors

    Science.gov (United States)

    Wróbel, A.; Surma, W.

    2016-08-01

    Nowadays, you cannot imagine the construction and operation of machines without the use of electric motors [13-15]. The proposed position is designed to allow testing of asynchronous three-phase motors. The position consists of a tested engine and the engine running as a load, both engines combined with a mechanical clutch [2]. The value of the load is recorded by measuring shaft created with Strain Gauge Bridge. This concept will allow to study the basic parameters of the engines, visualization motor parameters both vector and scalar controlled, during varying load drive system. In addition, registration during the variable physical parameters of the working electric motor, controlled by a frequency converter or controlled by a contactor will be possible. Position is designed as a teaching and research position to characterize the engines. It will be also possible selection of inverter parameters.

  16. An Asynchronous Cellular Automata-Based Adaptive Illumination Facility

    Science.gov (United States)

    Bandini, Stefania; Bonomi, Andrea; Vizzari, Giuseppe; Acconci, Vito

    The term Ambient Intelligence refers to electronic environments that are sensitive and responsive to the presence of people; in the described scenario the environment itself is endowed with a set of sensors (to perceive humans or other physical entities such as dogs, bicycles, etc.), interacting with a set of actuators (lights) that choose their actions (i.e. state of illumination) in an attempt improve the overall experience of these users. The model for the interaction and action of sensors and actuators is an asynchronous Cellular Automata (CA) with memory, supporting a self-organization of the system as a response to the presence and movements of people inside it. The paper will introduce the model, as well as an ad hoc user interface for the specification of the relevant parameters of the CA transition rule that determines the overall system behaviour.

  17. Label-acquired magnetorotation for biosensing: An asynchronous rotation assay

    Energy Technology Data Exchange (ETDEWEB)

    Hecht, Ariel, E-mail: hecht@umich.ed [University of Michigan, Department of Biomedical Engineering, 2200 Bonisteel, Ann Arbor, MI 48109-2099 (United States); University of Michigan, Department of Chemistry, 930 North University, Ann Arbor, MI 48109-1055 (United States); Kinnunen, Paivo, E-mail: pkkinn@umich.ed [University of Michigan, Department of Chemistry, 930 North University, Ann Arbor, MI 48109-1055 (United States); University of Michigan, Applied Physics Program, 2477 Randall Laboratory, Ann Arbor, MI 48109-1120 (United States); McNaughton, Brandon, E-mail: bmcnaugh@umich.ed [University of Michigan, Department of Biomedical Engineering, 2200 Bonisteel, Ann Arbor, MI 48109-2099 (United States); University of Michigan, Department of Chemistry, 930 North University, Ann Arbor, MI 48109-1055 (United States); University of Michigan, Applied Physics Program, 2477 Randall Laboratory, Ann Arbor, MI 48109-1120 (United States); Kopelman, Raoul, E-mail: kopelman@umich.ed [University of Michigan, Department of Biomedical Engineering, 2200 Bonisteel, Ann Arbor, MI 48109-2099 (United States); University of Michigan, Department of Chemistry, 930 North University, Ann Arbor, MI 48109-1055 (United States); University of Michigan, Applied Physics Program, 2477 Randall Laboratory, Ann Arbor, MI 48109-1120 (United States)

    2011-02-15

    This paper presents a novel application of magnetic particles for biosensing, called label-acquired magnetorotation (LAM). This method is based on a combination of the traditional sandwich assay format with the asynchronous magnetic bead rotation (AMBR) method. In label-acquired magnetorotation, an analyte facilitates the binding of a magnetic label bead to a nonmagnetic solid phase sphere, forming a sandwich complex. The sandwich complex is then placed in a rotating magnetic field, where the rotational frequency of the sandwich complex is a function of the amount of analyte attached to the surface of the sphere. Here, we use streptavidin-coated beads and biotin-coated particles as analyte mimics, to be replaced by proteins and other biological targets in future work. We show this sensing method to have a dynamic range of two orders of magnitude.

  18. H∞ Controller Design for Asynchronous Hybrid Systems with Multiple Delays

    Directory of Open Access Journals (Sweden)

    Xiaoqiang Sun

    2016-01-01

    Full Text Available Solutions for the H∞ synthesis problems of asynchronous hybrid systems with input-output delays are proposed. The continuous-time lifting approach of sampled-data systems is extended to a hybrid system with multiple delays, and some feasible formulas to calculate the operators of the equivalent discrete-time (DT system are given. Different from the existing methods derived from symplectic pair theory or by state augmentation, a Lyapunov-Krasovskii functional to solve the synthesis problem is explicitly constructed. The delay-dependent stability conditions we obtained can be described in terms of nonstrict linear matrix inequalities (LMIs, which are much more convenient to be solved by LMI tools.

  19. Commande vectorielle d'un moteur asynchrone sans capteur

    OpenAIRE

    Ourth, T.

    1993-01-01

    Ce papier présente la commande par flux orienté d'une machine asynchrone sans capteur de vitesse ou de position. Le flux rotorique est évalué grâce à un observateur d'ordre réduit d'un type voisin de Luenberger travaillant dans un repère fixe statorique. L'estimation de la vitesse est obtenue à partir du module du flux rotorique, des courants statoriques mesurés et de l'angle d'orientation du flux rotorique. Cette étude basée sur des simulations démontre un comportement acceptable de la comma...

  20. Asynchronous Multilateral Control for Simplified Walking Haptic System

    Science.gov (United States)

    Okura, Takeshi; Katsura, Seiichiro

    Recently, there has been extensive development in remote communication technologies such as telephone, radio, and television. Haptic information is studied as the third type of multimedia information. Real-world haptics is getting attention not only for the feedback of real-world haptic information in teleoperation but also as the key technology for future human support. Most of the objects of study in haptics are stationary. Therefore, the moving range of such haptic systems is limited. This paper proposes a novel haptic device that receives force feedback of walking motion from a remote environment and manipulates remote system. Thus, its moving range is unrestricted. To drive this haptic system, the paper also proposes asynchronous multilateral control. By using this control, an operator can operate the remote system without changing his/her position. The proposed haptic system is expected to act as an effective interface for virtual reality applications and teleoperation.

  1. The Formation of the Wide Asynchronous Binary Asteroid Population

    CERN Document Server

    Jacobson, Seth A; McMahon, Jay

    2013-01-01

    We propose and analyze a new mechanism for the formation of the wide asynchronous binary population. These binary asteroids have wide semi-major axes relative to most near-Earth and Main Belt asteroid systems. Confirmed members have rapidly rotating primaries and satellites that are not tidally locked. Previously suggested formation mechanisms from impact ejecta, planetary flybys and directly from rotational fission events cannot satisfy all of the observations. The newly hypothesized mechanism works as follows: (i) these systems are formed from rotational fission, (ii) their satellites are tidally locked, (iii) their orbits are expanded by the BYORP effect, (iv) their satellites de-synchronize due to the adiabatic invariance between the libration of the secondary and the mutual orbit, and (v) the secondary avoids resynchronization due to the the YORP effect. This seemingly complex chain of events is a natural pathway for binaries with satellites that have particular shapes, which define the BYORP effect torq...

  2. Blow Flies Visiting Decaying Alligators: Is Succession Synchronous or Asynchronous?

    Directory of Open Access Journals (Sweden)

    Mark P. Nelder

    2009-01-01

    Full Text Available Succession patterns of adult blow flies (Diptera: Calliphoridae on decaying alligators were investigated in Mobile (Ala, USA during August 2002. The most abundant blow fly species visiting the carcasses were Chrysomya rufifacies (Macquart, Cochliomyia macellaria (Fabricus, Chrysomya megacephala (Fabricus, Phormia regina (Meigen, and Lucilia coeruleiviridis (Macquart. Lucilia coeruleiviridis was collected more often during the early stages of decomposition, followed by Chrysomya spp., Cochliomyia macellaria, and Phormia regina in the later stages. Lucilia coeruleiviridis was the only synchronous blow fly on the three carcasses; other blow fly species exhibited only site-specific synchrony. Using dichotomous correlations and analyses of variance, we demonstrated that blow fly-community succession was asynchronous among three alligators; however, Monte Carlo simulations indicate that there was some degree of synchrony between the carcasses.

  3. Research on DSP-based Asynchronous Motor Control Technology

    Directory of Open Access Journals (Sweden)

    Jun Yao

    2013-05-01

    Full Text Available The Motor in a variety of electrical transmission and position servo system occupies an extremely important position. After the DSP technology being applied to the motor control, the unification of the hardware and the flexibility of the software can be combined. Take the brushless DC motor for example, studied the mathematical model and the structure of the motor control system, also obtained the design scheme of the DSP-based asynchronous motor control system. With TI's 32 bit fixed point DSPTMS320F2812 as the core design of the hardware system, we wrote the system software, debug the motor control system and the results show that the system achieves the expected effect. The results of the research can be applied to brushless DC motor and other motor control, it will have a wide application prospects.

  4. LOAD CONTROL OF A 3-Ø SELF- EXCITED ASYNCHRONOUS GENERATOR

    Directory of Open Access Journals (Sweden)

    SUBRAMANIAN KULANDHAIVELU

    2011-02-01

    Full Text Available This paper describes the simulation based performance study of a 3-Ø self-excited asynchronous generator (SEASG in constant power operation. A feed back voltage based controller by using a load control technique to control and retain the generator terminal voltage constant. This technique mostly used in uncontrolled hydroturbine driven induction generators in a stand-alone power generator. The results has been validate by the steady state equivalent circuit analysis of a 2.2kW, 415Volts, 4.7A, Star connected, 1440-rpm induction generator. The proposed study system has been simulated using Mat lab/Simulink version-7.0.The simulated results arepresented.

  5. Indoor Positioning for Smartphones Using Asynchronous Ultrasound Trilateration

    Directory of Open Access Journals (Sweden)

    James D. Carswell

    2013-06-01

    Full Text Available Modern smartphones are a great platform for Location Based Services (LBS. While outdoor LBS for smartphones has proven to be very successful, indoor LBS for smartphones has not yet fully developed due to the lack of an accurate positioning technology. In this paper we present an accurate indoor positioning approach for commercial off-the-shelf (COTS smartphones that uses the innate ability of mobile phones to produce ultrasound, combined with Time-Difference-of-Arrival (TDOA asynchronous trilateration. We evaluate our indoor positioning approach by describing its strengths and weaknesses, and determine its absolute accuracy. This is accomplished through a range of experiments that involve variables such as position of control point microphones, position of phone within the room, direction speaker is facing and presence of user in the signal path. Test results show that our Lok8 (locate mobile positioning system can achieve accuracies better than 10 cm in a real-world environment.

  6. Operational aspects of asynchronous filtering for hydrological forecasting

    Directory of Open Access Journals (Sweden)

    O. Rakovec

    2015-03-01

    Full Text Available This study investigates the suitability of the Asynchronous Ensemble Kalman Filter (AEnKF and a partitioned updating scheme for hydrological forecasting. The AEnKF requires forward integration of the model for the analysis and enables assimilation of current and past observations simultaneously at a single analysis step. The results of discharge assimilation into a grid-based hydrological model for the Upper Ourthe catchment in the Belgian Ardennes show that including past predictions and observations in the data assimilation method improves the model forecasts. Additionally, we show that elimination of the strongly non-linear relation between the soil moisture storage and assimilated discharge observations from the model update becomes beneficial for improved operational forecasting, which is evaluated using several validation measures.

  7. The Efficacy of Deliberate Practice Delivered Using Asynchronous Training Technology

    Directory of Open Access Journals (Sweden)

    Colleen E. McEdwards

    2014-04-01

    Full Text Available Employee productivity is key to survival in business. Senior employees require access to advanced training that does not necessitate extended periods away from their work. Once performance begins to plateau, it can be difficult to reach experienced employees with cost-effective, timely, and relevant training opportunities. Organizations must find ways to enhance employee performance; however, research suggests workplace training is too expensive and is too often without lasting benefit. The purpose of this study is to further quantify deliberate practice as a potentially efficient, customizable mode of training using asynchronous e-learning. The study compared traditional seminars with online deliberate practice training. While additional research is needed in wider learning contexts and with larger sample sizes, improvements among the deliberate practice groups were significant. Using a mixed methods pretest/posttest research design, the deliberate practice training showed improved performance and increased satisfaction compared with the traditional seminar approach.

  8. Minor Planet 1016 Anitra: A Likely Asynchronous Binary

    Science.gov (United States)

    Pilcher, Frederick; Benishek, Vladimir; Jacobsen, Jens; Kristensen, Leif Hugo; Lang, Kim; Larsen, Frank R.; Odden, Caroline; Pravec, Petr

    2016-07-01

    Analysis of photometry data for 1016 Anitra using a single period analysis shows a lightcurve with a period of 5.9296 hours and amplitude of 0.30 mag, with short period fluctuations. A simultaneous two-period analysis of the data found two smooth bimodal lightcurves with periods and amplitudes of P1 = 5.92951 h, A1 = 0.30 mag and P2 = 2.609143 h, A2 = 0.10 mag. These results are interpreted as the rotation of the two components of an asynchronous binary system. Four additional attenuations were observed that may have been caused by satellite mutual events, but those data were insufficient to yield an orbital period.

  9. AN IMPROVED DOA ESTIMATION ALGORITHM FOR ASYNCHRONOUS MULTIPATH CDMA SYSTEM

    Institute of Scientific and Technical Information of China (English)

    Yang Wei; Chen Junshi; Tan Zhenhui; Takis Mathiopoulos

    2006-01-01

    This paper proposes an improved Direction Of Arrival(DOA) estimation algorithm for asynchronous multipath Code Division Multiple Access(CDMA) system. The algorithm is based on the correlation matrices of outputs of decorrelator, which is a Multi-User Detection(MUD) approach, one of the key techniques for CDMA system. Through decorrelating processing, the desired user's mulipath signals can be resolved and all the other resolved multipath signal interference is eliminated. So the proposed algorithm is expected to perform much better than algorithm such as that based directly on the Matched Filter(MF) bank outputs. Simulation results confirm this. While the improved algorithm performs better and better as Signal-to-Noise Ratio(SNR)increases, the performance of algorithm based directly on the MF bank outputs can not be improved.

  10. Asynchronous data-driven classification of weapon systems

    International Nuclear Information System (INIS)

    This communication addresses real-time weapon classification by analysis of asynchronous acoustic data, collected from microphones on a sensor network. The weapon classification algorithm consists of two parts: (i) feature extraction from time-series data using symbolic dynamic filtering (SDF), and (ii) pattern classification based on the extracted features using the language measure (LM) and support vector machine (SVM). The proposed algorithm has been tested on field data, generated by firing of two types of rifles. The results of analysis demonstrate high accuracy and fast execution of the pattern classification algorithm with low memory requirements. Potential applications include simultaneous shooter localization and weapon classification with soldier-wearable networked sensors. (rapid communication)

  11. Asynchronous learning: student utilization out of sync with their preference

    Directory of Open Access Journals (Sweden)

    Edward K. Lew

    2016-06-01

    Full Text Available Background: Asynchronous learning is gaining popularity. Data are limited regarding this learning method in medical students rotating in emergency medicine (EM. In EM, faculty time is limited to give in-person lectures. The authors sought to create an online curriculum that students could utilize as an additional learning modality. Objective: The goal was to evaluate effectiveness, participation, and preference for this mode of learning. Methods: We developed five online, narrated PowerPoint presentations. After orientation, access to the online curriculum was provided to the students, which they could review at their leisure. Results: One hundred and seven fourth-year medical students participated. They reported the curriculum to be of high quality. Pretest scores were similar for those that viewed all lectures – compliant group (CG (9.5 [CI 4.8–14.1] and those that did not view any – non-compliant group (NCG (9.6 [CI 5.9–13.4]. There was no statistical significant difference in posttest scores between the groups although there was improvement overall: CG 14.6 (CI 6.9–22.1; NCG 11.4 (CI 5.7–17.1. A majority (69.2% favored inclusion of asynchronous learning, but less than a quarter (22.4% reported viewing all five modules and more than a third (36.4% viewed none. Conclusion: Despite student-expressed preference for an online curriculum, they used the online resource less than expected. This should give pause to educators looking to convert core EM topics to an online format. However, when high-quality online lectures are utilized as a learning tool, this study demonstrates that they had neither a positive nor a negative impact on test scores.

  12. COMPUTING

    CERN Multimedia

    2010-01-01

    Introduction Just two months after the “LHC First Physics” event of 30th March, the analysis of the O(200) million 7 TeV collision events in CMS accumulated during the first 60 days is well under way. The consistency of the CMS computing model has been confirmed during these first weeks of data taking. This model is based on a hierarchy of use-cases deployed between the different tiers and, in particular, the distribution of RECO data to T1s, who then serve data on request to T2s, along a topology known as “fat tree”. Indeed, during this period this model was further extended by almost full “mesh” commissioning, meaning that RECO data were shipped to T2s whenever possible, enabling additional physics analyses compared with the “fat tree” model. Computing activities at the CMS Analysis Facility (CAF) have been marked by a good time response for a load almost evenly shared between ALCA (Alignment and Calibration tasks - highest p...

  13. COMPUTING

    CERN Document Server

    I. Fisk

    2012-01-01

      Introduction Computing activity has been running at a sustained, high rate as we collect data at high luminosity, process simulation, and begin to process the parked data. The system is functional, though a number of improvements are planned during LS1. Many of the changes will impact users, we hope only in positive ways. We are trying to improve the distributed analysis tools as well as the ability to access more data samples more transparently.  Operations Office Figure 2: Number of events per month, for 2012 Since the June CMS Week, Computing Operations teams successfully completed data re-reconstruction passes and finished the CMSSW_53X MC campaign with over three billion events available in AOD format. Recorded data was successfully processed in parallel, exceeding 1.2 billion raw physics events per month for the first time in October 2012 due to the increase in data-parking rate. In parallel, large efforts were dedicated to WMAgent development and integrati...

  14. COMPUTING

    CERN Multimedia

    Contributions from I. Fisk

    2012-01-01

    Introduction The start of the 2012 run has been busy for Computing. We have reconstructed, archived, and served a larger sample of new data than in 2011, and we are in the process of producing an even larger new sample of simulations at 8 TeV. The running conditions and system performance are largely what was anticipated in the plan, thanks to the hard work and preparation of many people. Heavy ions Heavy Ions has been actively analysing data and preparing for conferences.  Operations Office Figure 6: Transfers from all sites in the last 90 days For ICHEP and the Upgrade efforts, we needed to produce and process record amounts of MC samples while supporting the very successful data-taking. This was a large burden, especially on the team members. Nevertheless the last three months were very successful and the total output was phenomenal, thanks to our dedicated site admins who keep the sites operational and the computing project members who spend countless hours nursing the...

  15. COMPUTING

    CERN Multimedia

    I. Fisk

    2013-01-01

    Computing operation has been lower as the Run 1 samples are completing and smaller samples for upgrades and preparations are ramping up. Much of the computing activity is focusing on preparations for Run 2 and improvements in data access and flexibility of using resources. Operations Office Data processing was slow in the second half of 2013 with only the legacy re-reconstruction pass of 2011 data being processed at the sites.   Figure 1: MC production and processing was more in demand with a peak of over 750 Million GEN-SIM events in a single month.   Figure 2: The transfer system worked reliably and efficiently and transferred on average close to 520 TB per week with peaks at close to 1.2 PB.   Figure 3: The volume of data moved between CMS sites in the last six months   The tape utilisation was a focus for the operation teams with frequent deletion campaigns from deprecated 7 TeV MC GEN-SIM samples to INVALID datasets, which could be cleaned up...

  16. COMPUTING

    CERN Multimedia

    Matthias Kasemann

    Overview The main focus during the summer was to handle data coming from the detector and to perform Monte Carlo production. The lessons learned during the CCRC and CSA08 challenges in May were addressed by dedicated PADA campaigns lead by the Integration team. Big improvements were achieved in the stability and reliability of the CMS Tier1 and Tier2 centres by regular and systematic follow-up of faults and errors with the help of the Savannah bug tracking system. In preparation for data taking the roles of a Computing Run Coordinator and regular computing shifts monitoring the services and infrastructure as well as interfacing to the data operations tasks are being defined. The shift plan until the end of 2008 is being put together. User support worked on documentation and organized several training sessions. The ECoM task force delivered the report on “Use Cases for Start-up of pp Data-Taking” with recommendations and a set of tests to be performed for trigger rates much higher than the ...

  17. COMPUTING

    CERN Multimedia

    P. MacBride

    The Computing Software and Analysis Challenge CSA07 has been the main focus of the Computing Project for the past few months. Activities began over the summer with the preparation of the Monte Carlo data sets for the challenge and tests of the new production system at the Tier-0 at CERN. The pre-challenge Monte Carlo production was done in several steps: physics generation, detector simulation, digitization, conversion to RAW format and the samples were run through the High Level Trigger (HLT). The data was then merged into three "Soups": Chowder (ALPGEN), Stew (Filtered Pythia) and Gumbo (Pythia). The challenge officially started when the first Chowder events were reconstructed on the Tier-0 on October 3rd. The data operations teams were very busy during the the challenge period. The MC production teams continued with signal production and processing while the Tier-0 and Tier-1 teams worked on splitting the Soups into Primary Data Sets (PDS), reconstruction and skimming. The storage sys...

  18. COMPUTING

    CERN Multimedia

    M. Kasemann

    Introduction A large fraction of the effort was focused during the last period into the preparation and monitoring of the February tests of Common VO Computing Readiness Challenge 08. CCRC08 is being run by the WLCG collaboration in two phases, between the centres and all experiments. The February test is dedicated to functionality tests, while the May challenge will consist of running at all centres and with full workflows. For this first period, a number of functionality checks of the computing power, data repositories and archives as well as network links are planned. This will help assess the reliability of the systems under a variety of loads, and identifying possible bottlenecks. Many tests are scheduled together with other VOs, allowing the full scale stress test. The data rates (writing, accessing and transfer¬ring) are being checked under a variety of loads and operating conditions, as well as the reliability and transfer rates of the links between Tier-0 and Tier-1s. In addition, the capa...

  19. UNIVERSAL REGULAR AUTONOMOUS ASYNCHRONOUS SYSTEMS: ω-LIMIT SETS, INVARIANCE AND BASINS OF ATTRACTION

    Directory of Open Access Journals (Sweden)

    Serban Vlad

    2011-07-01

    Full Text Available The asynchronous systems are the non-deterministic real timebinarymodels of the asynchronous circuits from electrical engineering.Autonomy means that the circuits and their models have no input.Regularity means analogies with the dynamical systems, thus such systems may be considered to be real time dynamical systems with a’vector field’, Universality refers to the case when the state space of the system is the greatest possible in the sense of theinclusion. The purpose of this paper is that of defining, by analogy with the dynamical systems theory, the omega-limit sets, the invariance and the basins of attraction of the universal regular autonomous asynchronous systems.

  20. A Fourth Generation Distance Education System: Integrating Computer-Assisted Learning and Computer Conferencing.

    Science.gov (United States)

    Lauzon, Allan C.; Moore, George A. B.

    1989-01-01

    Reviews the literature on Keller's Personalized System of Instruction (PSI), computer-assisted learning (CAL), computer conferencing (CC), and forms of instruction, then discusses how they can be integrated into a delivery system to enhance distance learning. Asynchronous individualized instruction and group instruction are also discussed. (28…

  1. Representation of Musical Computer Processes

    OpenAIRE

    Fober, Dominique; Orlarey, Yann; Letz, Stéphane

    2014-01-01

    International audience The paper presents a study about the representation of musical computer processes within a music score. The idea is to provide performers with information that could be useful especially in the context of interactive music. The paper starts with a characterization of a musical computer process in order to define the values to be represented. Next it proposes an approach to time representation suitable to asynchronous processes representation.

  2. COMPUTING

    CERN Multimedia

    I. Fisk

    2011-01-01

    Introduction The Computing Team successfully completed the storage, initial processing, and distribution for analysis of proton-proton data in 2011. There are still a variety of activities ongoing to support winter conference activities and preparations for 2012. Heavy ions The heavy-ion run for 2011 started in early November and has already demonstrated good machine performance and success of some of the more advanced workflows planned for 2011. Data collection will continue until early December. Facilities and Infrastructure Operations Operational and deployment support for WMAgent and WorkQueue+Request Manager components, routinely used in production by Data Operations, are provided. The GlideInWMS and components installation are now deployed at CERN, which is added to the GlideInWMS factory placed in the US. There has been new operational collaboration between the CERN team and the UCSD GlideIn factory operators, covering each others time zones by monitoring/debugging pilot jobs sent from the facto...

  3. OT-Combiners Via Secure Computation

    DEFF Research Database (Denmark)

    Harnik, Danny; Ishai, Yuval; Kushilevitz, Eyal;

    2008-01-01

    An OT-combiner implements a secure oblivious transfer (OT) protocol using oracle access to n OT-candidates of which at most t may be faulty. We introduce a new general approach for combining OTs by making a simple and modular use of protocols for secure computation. Specifically, we obtain an OT......-combiner from any instantiation of the following two ingredients: (1) a t-secure n-party protocol for the OT functionality, in a network consisting of secure point-to-point channels and a broadcast primitive; and (2) a secure two-party protocol for a functionality determined by the former multiparty protocol......, in a network consisting of a single OT-channel. Our approach applies both to the “semi-honest” and the “malicious” models of secure computation, yielding the corresponding types of OT-combiners. Instantiating our general approach with secure computation protocols from the literature, we conceptually simplify...

  4. Distributed Consensus of Stochastic Delayed Multi-agent Systems Under Asynchronous Switching.

    Science.gov (United States)

    Wu, Xiaotai; Tang, Yang; Cao, Jinde; Zhang, Wenbing

    2016-08-01

    In this paper, the distributed exponential consensus of stochastic delayed multi-agent systems with nonlinear dynamics is investigated under asynchronous switching. The asynchronous switching considered here is to account for the time of identifying the active modes of multi-agent systems. After receipt of confirmation of mode's switching, the matched controller can be applied, which means that the switching time of the matched controller in each node usually lags behind that of system switching. In order to handle the coexistence of switched signals and stochastic disturbances, a comparison principle of stochastic switched delayed systems is first proved. By means of this extended comparison principle, several easy to verified conditions for the existence of an asynchronously switched distributed controller are derived such that stochastic delayed multi-agent systems with asynchronous switching and nonlinear dynamics can achieve global exponential consensus. Two examples are given to illustrate the effectiveness of the proposed method.

  5. Synaptotagmin-7 Is an Asynchronous Calcium Sensor for Synaptic Transmission in Neurons Expressing SNAP-23

    DEFF Research Database (Denmark)

    Weber, Jens P; Toft-Bertelsen, Trine L; Mohrmann, Ralf;

    2014-01-01

    Synchronization of neurotransmitter release with the presynaptic action potential is essential for maintaining fidelity of information transfer in the central nervous system. However, synchronous release is frequently accompanied by an asynchronous release component that builds up during repetiti...

  6. Low-power Implementation of an Encryption/Decryption System with Asynchronous Techniques

    Directory of Open Access Journals (Sweden)

    Nikos Sklavos

    2002-01-01

    Full Text Available An asynchronous VLSI implementation of the International Data Encryption Algorithm (IDEA is presented in this paper. In order to evaluate the asynchronous design a synchronous version of the algorithm was also designed. VHDL hardware description language was used in order to describe the algorithm. By using Synopsys commercial available tools the VHDL code was synthesized. After placing and routing both designs were fabricated with 0.6 μm CMOS technology. With a system clock of up to 8 MHz and a power supply of 5 V the two chips were tested and evaluated comparing with the software implementation of the IDEA algorithm. This new approach proves efficiently the lowest power consumption of the asynchronous implementation compared to the existing synchronous. Therefore, the asynchronous chip performs efficiently in Wireless Encryption Protocols and high speed networks.

  7. Calculation of mechanical characteristic for disk asynchronous motor with free rotor

    OpenAIRE

    Ерошин, Сергей Сергеевич; Мирошник, Сергей Александрович

    2012-01-01

    Taking into account the features of construction of asynchronous motor with free annular rotor analytical formulas for the calculation of its mechanical characteristic have been obtained. New features of machines with annular working tools without mechanical support are revealed

  8. Asynchronous Sensor fuSion for Improved Safety of air Traffic (ASSIST) Project

    Data.gov (United States)

    National Aeronautics and Space Administration — SSCI proposes to develop, implement and test a collision detection system for unmanned aerial vehicles (UAV), referred to as the Asynchronous Sensor fuSion for...

  9. COMPUTING

    CERN Multimedia

    M. Kasemann

    CMS relies on a well functioning, distributed computing infrastructure. The Site Availability Monitoring (SAM) and the Job Robot submission have been very instrumental for site commissioning in order to increase availability of more sites such that they are available to participate in CSA07 and are ready to be used for analysis. The commissioning process has been further developed, including "lessons learned" documentation via the CMS twiki. Recently the visualization, presentation and summarizing of SAM tests for sites has been redesigned, it is now developed by the central ARDA project of WLCG. Work to test the new gLite Workload Management System was performed; a 4 times increase in throughput with respect to LCG Resource Broker is observed. CMS has designed and launched a new-generation traffic load generator called "LoadTest" to commission and to keep exercised all data transfer routes in the CMS PhE-DEx topology. Since mid-February, a transfer volume of about 12 P...

  10. Secure Electronic Voting Scheme Based on Multi-party Ranking%基于多方排序协议的安全电子投票方案

    Institute of Scientific and Technical Information of China (English)

    杨婷婷; 林昌露; 刘忆宁; 张胜元

    2015-01-01

    Compared with the traditional voting, electronic voting(e-voting) not only has many advantages, but also exists many security problems. The full privacy of electronic voting is an important index to evaluate the security of the voting scheme, it implies the privacy of the voters and candidates for privacy protection, especially the protection of total votes for the losers. This paper designs a secure multi-party ranking protocol via using the verifiable secret sharing. We propose a new secure electronic voting scheme based on the proposed multi-party ranking protocol. The e-voting scheme is full privacy.%与传统投票相比较, 电子投票拥有许多优势, 也存在重要的安全问题. 电子投票的全隐私性是评估投票方案安全的重要指标, 它是指对投票者的隐私保护和候选者的隐私保护, 特别是落选者的得票数的保护. 利用可验证秘密共享的思想提出了一个安全多方排序协议, 并将它运用到电子投票中, 设计了一个新的安全的电子投票协议, 本协议具有全隐私性.

  11. An Asynchronous Many-Task Implementation of In-Situ Statistical Analysis using Legion.

    Energy Technology Data Exchange (ETDEWEB)

    Pebay, Philippe Pierre [Sandia National Lab. (SNL-CA), Livermore, CA (United States); Bennett, Janine Camille [Sandia National Lab. (SNL-CA), Livermore, CA (United States)

    2015-11-01

    In this report, we propose a framework for the design and implementation of in-situ analy- ses using an asynchronous many-task (AMT) model, using the Legion programming model together with the MiniAero mini-application as a surrogate for full-scale parallel scientific computing applications. The bulk of this work consists of converting the Learn/Derive/Assess model which we had initially developed for parallel statistical analysis using MPI [PTBM11], from a SPMD to an AMT model. In this goal, we propose an original use of the concept of Legion logical regions as a replacement for the parallel communication schemes used for the only operation of the statistics engines that require explicit communication. We then evaluate this proposed scheme in a shared memory environment, using the Legion port of MiniAero as a proxy for a full-scale scientific application, as a means to provide input data sets of variable size for the in-situ statistical analyses in an AMT context. We demonstrate in particular that the approach has merit, and warrants further investigation, in collaboration with ongoing efforts to improve the overall parallel performance of the Legion system.

  12. SocialRAD: an infrastructure for a secure, cooperative, asynchronous teleradiology system.

    Science.gov (United States)

    Figueiredo, João Filho Matos; Motta, Gustavo Henrique Matos Bezerra

    2013-01-01

    The popularity of teleradiology services has enabled a major advance in the provision of health services to areas with difficult geographical access. However, this potential has also brought with it a number of challenges: the large volume of data, characteristic of imaging tests, and security requirements designed to ensure confidentiality and integrity. Moreover, there is also a number of ethical questions involving the dominant model on the market, whereby this service is outsourced to private companies, and is not directly undertaken by professional radiologists. Therefore, the present paper proposes a cooperative model of teleradiology, where health professionals interact directly with the hospitals providing patient care. This has involved the integration of a wide range of technologies, such as the interconnection models Peer-to-Peer, Cloud Computing, Dynamic DNS, RESTful Web Services, as well as security and interoperability standards, with the aim of promoting a secure, collaborative asynchronous environment. The developed model is currently being used on an experimental basis, providing teleradiology support to cities in the north-eastern hinterland of Brazil, and is fulfilling all expectations.

  13. Differentiating closed-loop cortical intention from rest: building an asynchronous electrocorticographic BCI

    Science.gov (United States)

    Williams, Jordan J.; Rouse, Adam G.; Thongpang, Sanitta; Williams, Justin C.; Moran, Daniel W.

    2013-08-01

    Objective. Recent experiments have shown that electrocorticography (ECoG) can provide robust control signals for a brain-computer interface (BCI). Strategies that attempt to adapt a BCI control algorithm by learning from past trials often assume that the subject is attending to each training trial. Likewise, automatic disabling of movement control would be desirable during resting periods when random brain fluctuations might cause unintended movements of a device. To this end, our goal was to identify ECoG differences that arise between periods of active BCI use and rest. Approach. We examined spectral differences in multi-channel, epidural micro-ECoG signals recorded from non-human primates when rest periods were interleaved between blocks of an active BCI control task. Main Results. Post-hoc analyses demonstrated that these states can be decoded accurately on both a trial-by-trial and real-time basis, and this discriminability remains robust over a period of weeks. In addition, high gamma frequencies showed greater modulation with desired movement direction, while lower frequency components demonstrated greater amplitude differences between task and rest periods, suggesting possible specialized BCI roles for these frequencies. Significance. The results presented here provide valuable insight into the neurophysiology of BCI control as well as important considerations toward the design of an asynchronous BCI system.

  14. Blind Synchronization in Asynchronous UWB Networks Based on the Transmit-Reference Scheme

    Directory of Open Access Journals (Sweden)

    Leus Geert

    2006-01-01

    Full Text Available Ultra-wideband (UWB wireless communication systems are based on the transmission of extremely narrow pulses, with a duration inferior to a nanosecond. The application of transmit reference (TR to UWB systems allows to side-step channel estimation at the receiver, with a tradeoff of the effective transmission bandwidth, which is reduced by the usage of a reference pulse. Similar to CDMA systems, different users can share the same available bandwidth by means of different spreading codes. This allows the receiver to separate users, and to recover the timing information of the transmitted data packets. The nature of UWB transmissions—short, burst-like packets—requires a fast synchronization algorithm, that can accommodate several asynchronous users. Exploiting the fact that a shift in time corresponds to a phase rotation in the frequency domain, a blind and computationally effcient synchronization algorithm that takes advantage of the shift invariance structure in the frequency domain is proposed in this paper. Integer and fractional delay estimations are considered, along with a subsequent symbol estimation step. This results in a collision-avoiding multiuser algorithm, readily applicable to a fast acquisition procedure in a UWB ad hoc network.

  15. Conceptualising and measuring collaborative critical thinking on asynchronous discussion forums: Challenges and possible solutions

    Directory of Open Access Journals (Sweden)

    Nazanin Ghodrati

    2015-04-01

    Full Text Available The use of asynchronous discussion forums (ADFs is thought to assist in enhancing students’ collaborative learning and critical thinking throughout higher education. However, previous research has mainly focused on individual critical thinking while the investigation of critical thinking during group work has been generally overlooked. Furthermore, few studies have investigated critical thinking processes of the individual and of the group in a single study to present a comprehensive picture of collaborative critical thinking (CCT. To address these gaps, I examined the demonstration of CCT on ADFs in a graduate subject at an Australian university over two academic semesters as students discussed topics online. In this paper, I discuss the ontological and methodological challenges in conducting the above research and present possible solutions to these challenges. At the ontological level, I discuss challenges in conceptualising and defining CCT. At the methodological level, I present challenges in constructing a coding scheme to measure the demonstration of CCT on ADFs. I then discuss ways to tackle the above challenges, propose an operational definition of CCT and present a synthetic coding scheme for measuring CCT in computer-supported collaborative learning contexts such as on ADFs.

  16. INVESTIGATION OF ASYNCHRONOUS OPTICAL COMMUNICATION CHANNEL THROUGHPUT CONTAINING A RECEIVER ON THE BASIS OF PHOTON COUNTER

    Directory of Open Access Journals (Sweden)

    I. R. Gulakov

    2013-01-01

    Full Text Available A mathematical model of asynchronous optical communication channel with a photon counter applied as a receiving module has been built. The expression for calculating of data throughput of this channel has been obtained. As a result of implemented experimental investigations it has been established that the data throughput of asynchronous optical communication channel containing a photon counter on the basis of avalanche photodetector as a receiving module depends on optical radiation and photodetector supply voltage.

  17. Asynchronous growth and competition in a two-sex age-structured population model

    OpenAIRE

    Iannelli, Mimmo; Ripoll, Jordi

    2009-01-01

    Asynchronous exponential growth has been extensively studied in population dynamics. In this paper we find out the asymptotic behaviour in a non-linear age-dependent model which takes into account sexual reproduction interactions. The main feature of our model is that the non-linear process converges to a linear one as the solution becomes large, so that the population undergoes asynchronous growth. The steady states analysis and the corresponding stability analysis are completely made and ...

  18. Document Flow Model: A Formal Notation for Modelling Asynchronous Web Services Composition

    OpenAIRE

    Yang, Jingtao; Cirstea, Corina; Henderson, Peter

    2005-01-01

    This paper presents a formal notation for modelling asynchronous web services composition, using context and coordination mechanisms. Our notation specifies the messages that can be handled by different web services, and describes a system of inter-related web services as the flow of documents between them. The notation allows the typical web services composition pattern, asynchronous messaging, and has the capability to deal with long-running service-to-service interactions and dynamic confi...

  19. Violation of the equivalence principle for stressed bodies in asynchronous relativity

    Energy Technology Data Exchange (ETDEWEB)

    Andrade Martins, R. de (Centro de Logica, Epistemologia e Historia da Ciencia, Campinas (Brazil))

    1983-12-11

    In the recently developed asynchronous formulation of the relativistic theory of extended bodies, the inertial mass of a body does not explicitly depend on its pressure or stress. The detailed analysis of the weight of a box filled with a gas and placed in a weak gravitational field shows that this feature of asynchronous relativity implies a breakdown of the equivalence between inertial and passive gravitational mass for stressed systems.

  20. Asynchronous Free-Space Optical CDMA Communications System for Last-mile Access Network

    DEFF Research Database (Denmark)

    Jurado-Navas, Antonio; Raddo, Thiago R.; Sanches, Anderson L.;

    2016-01-01

    We propose a new hybrid asynchronous OCDMA-FSO communications system for access network solutions. New ABER expressions are derived under gamma-gamma scintillation channels, where all users can surprisingly achieve error-free transmissions when FEC is employed.......We propose a new hybrid asynchronous OCDMA-FSO communications system for access network solutions. New ABER expressions are derived under gamma-gamma scintillation channels, where all users can surprisingly achieve error-free transmissions when FEC is employed....

  1. POLITICAL PLURALISM AND MULTIPARTY

    Directory of Open Access Journals (Sweden)

    Erhard NICULESCU

    2014-06-01

    Full Text Available Political parties have made themselves noticed in history by competing for power and over time they have emerged as undeniable and indispensable realities in a political system regardless of its form. The Constitution of Romania recognised the role and historical importance of pluralism and political parties and dedicated them a place of honour in the general principles that establish our state as a democratic and social state of law. This article analyses the constitutional provisions on political parties, depicting the evolution of statutory regulations thereon over more than 100 years, during various political regimes. Last but not least, it also analyses concepts and points of view of the doctrine with respect to the subject matter, while also making references to the relevant constitutional jurisprudence. Finally, as a result of the analysis conducted, we will reveal any weaknesses of the legislation and we will make our conclusions.

  2. POLITICAL PLURALISM AND MULTIPARTY

    Directory of Open Access Journals (Sweden)

    Erhard NICULESCU

    2014-05-01

    Full Text Available Political parties have made themselves noticed in history by competing for power and over time they have emerged as undeniable and indispensable realities in a political system regardless of its form. The Constitution of Romania recognised the role and historical importance of pluralism and political parties and dedicated them a place of honour in the general principles that establish our state as a democratic and social state of law. This article analyses the constitutional provisions on political parties, depicting the evolution of statutory regulations thereon over more than 100 years, during various political regimes. Last but not least, it also analyses concepts and points of view of the doctrine with respect to the subject matter, while also making references to the relevant constitutional jurisprudence. Finally, as a result of the analysis conducted, we will reveal any weaknesses of the legislation and we will make our conclusions.

  3. Sparse asynchronous cortical generators can produce measurable scalp EEG signals.

    Science.gov (United States)

    von Ellenrieder, Nicolás; Dan, Jonathan; Frauscher, Birgit; Gotman, Jean

    2016-09-01

    We investigate to what degree the synchronous activation of a smooth patch of cortex is necessary for observing EEG scalp activity. We perform extensive simulations to compare the activity generated on the scalp by different models of cortical activation, based on intracranial EEG findings reported in the literature. The spatial activation is modeled as a cortical patch of constant activation or as random sets of small generators (0.1 to 3cm(2) each) concentrated in a cortical region. Temporal activation models for the generation of oscillatory activity are either equal phase or random phase across the cortical patches. The results show that smooth or random spatial activation profiles produce scalp electric potential distributions with the same shape. Also, in the generation of oscillatory activity, multiple cortical generators with random phase produce scalp activity attenuated on average only 2 to 4 times compared to generators with equal phase. Sparse asynchronous cortical generators can produce measurable scalp EEG. This is a possible explanation for seemingly paradoxical observations of simultaneous disorganized intracranial activity and scalp EEG signals. Thus, the standard interpretation of scalp EEG might constitute an oversimplification of the underlying brain activity. PMID:27262240

  4. Inferring gene regulatory networks from asynchronous microarray data with AIRnet

    Directory of Open Access Journals (Sweden)

    Lai Chun Wan J

    2010-11-01

    Full Text Available Abstract Background Modern approaches to treating genetic disorders, cancers and even epidemics rely on a detailed understanding of the underlying gene signaling network. Previous work has used time series microarray data to infer gene signaling networks given a large number of accurate time series samples. Microarray data available for many biological experiments is limited to a small number of arrays with little or no time series guarantees. When several samples are averaged to examine differences in mean value between a diseased and normal state, information from individual samples that could indicate a gene relationship can be lost. Results Asynchronous Inference of Regulatory Networks (AIRnet provides gene signaling network inference using more practical assumptions about the microarray data. By learning correlation patterns for the changes in microarray values from all pairs of samples, accurate network reconstructions can be performed with data that is normally available in microarray experiments. Conclusions By focussing on the changes between microarray samples, instead of absolute values, increased information can be gleaned from expression data.

  5. Commande vectorielle d'un moteur asynchrone sans capteur

    Science.gov (United States)

    Ourth, T.

    1993-06-01

    A field-oriented control strategy for induction machines which does not use mechanical sensors is presented. The rotor flux is observed by a reduced-order Luenberger-type observer based on a model using a stator-fixed reference frame. An estimate of the rotation speed is derived from the flux vector, the measured stator currents and the field orientation angle. Simulations demonstrate that this control strategy performs well even in the presence of parameter variations up to ± 50% (resistances). Ce papier présente la commande par flux orienté d'une machine asynchrone sans capteur de vitesse ou de position. Le flux rotorique est évalué grâce à un observateur d'ordre réduit d'un type voisin de Luenberger travaillant dans un repère fixe statorique. L'estimation de la vitesse est obtenue à partir du module du flux rotorique, des courants statoriques mesurés et de l'angle d'orientation du flux rotorique. Cette étude basée sur des simulations démontre un comportement acceptable de la commande malgré la variation des paramètres comme les résistances de la machine.

  6. Asynchronous Dual-Rail Transition Logic for Enhanced DPA Resistance

    Directory of Open Access Journals (Sweden)

    Rajath Srivathsav N

    2015-02-01

    Full Text Available An Asynchronous Dual–Rail Transition Logic (ADTL is proposed in this paper. The new logic style can be used in the encryption circuit of cryptography to counter the differential power analysis (DPA attacks. The resistance to the DPA attacks is achieved by randomizing the power dissipated in the circuit through Manchester input signal coding and unpredictable initial state of the toggle flip-flops (TFF. The proposed logic uses two wires to transmit the signal, in the form of a single transition on either one of the two wires to indicate the input logic value. T-FFs are employed to randomize the power dissipated by the circuit. The randomizing is made possible by making the initial states of the flip-flops un-deterministic. Furthermore, the clock is completely eliminated in the conceived design, thus realizing increased power randomization and resistance to the DPA attacks. The design is demonstrated through the systematic simulations on a typical encryption circuit. The validation of the ADTL is made through extensive comparisons with the existing Dual-rail Transition Logic (DTL for power, delay and the DPA resistance. Industry standard EDA tools with 90nm technology libraries provided by the UMC foundry have been employed in the designs.

  7. Progresses in the Analysis of Stochastic 2D Cellular Automata: a Study of Asynchronous 2D Minority

    CERN Document Server

    Regnault, Damien; Thierry, Éric

    2007-01-01

    Cellular automata are often used to model systems in physics, social sciences, biology that are inherently asynchronous. Over the past 20 years, studies have demonstrated that the behavior of cellular automata drastically changed under asynchronous updates. Still, the few mathematical analyses of asynchronism focus on one-dimensional probabilistic cellular automata, either on single examples or on specific classes. As for other classic dynamical systems in physics, extending known methods from one- to two-dimensional systems is a long lasting challenging problem. In this paper, we address the problem of analysing an apparently simple 2D asynchronous cellular automaton: 2D Minority where each cell, when fired, updates to the minority state of its neighborhood. Our experiments reveal that in spite of its simplicity, the minority rule exhibits a quite complex response to asynchronism. By focusing on the fully asynchronous regime, we are however able to describe completely the asymptotic behavior of this dynamics...

  8. Secure Two-Party Computational Geometry

    Institute of Scientific and Technical Information of China (English)

    Shun-Dong Li; Yi-Qi Dai

    2005-01-01

    Secure Multi-party Computation has been a research focus in international cryptographic community in recent years. In this paper the authors investigate how some computational geometric problems could be solved in a cooperative environment, where two parties need to solve a geometric problem based on their joint data, but neither wants to disclose its private data to the other party. These problems are the distance between two private points, the relation between a private point and a circle area, the relation between a private point and an ellipse area and the shortest distance between two point sets. The paper gives solutions to these specific geometric problems, and in doing so a building block is developed,the protocol for the distance between two private points, that is also useful in the solutions to other geometric problems and combinatorial problems.

  9. Privacy-Preserving Protocols for Eigenvector Computation

    CERN Document Server

    Pathak, Manas A

    2010-01-01

    In this paper, we present a protocol for computing the dominant eigenvector of a collection of private data distributed across multiple parties, with the individual parties unwilling to share their data. Our proposed protocol is based on secure multiparty computation with a trusted third-party arbitrator who deals with data encrypted by the other parties using an additive homomorphic cryptosystem. We also augment the protocol with randomization to make it difficult, with a high probability, for any party to estimate properties of the data belonging to other parties from the intermediate steps. The previous approaches towards this problem were based on expensive QR decomposition of correlation matrices, we present an efficient algorithm using the power iteration method. We present an analysis of the correctness, security, efficiency of protocol and experiments over a prototype implementation.

  10. Collaborative learning through computer-mediated argumentation

    NARCIS (Netherlands)

    Kanselaar, G.; Veerman, A.L.; Andriessen, J.E.B.

    1999-01-01

    This article reports on three studies that involved undergraduate students collaboratively working on authentic discussion tasks in synchronous and asynchronous Computer Mediated Communication systems (Netmeeting, Belvédère, Allaire Forums). The purposes of the assignments were respectively to deve

  11. An Attempt at Pseudo-Democracy and Tactical Liberalization in Turkey: An Analysis of Ismet Inönü’s Decision to Transition to a Multi-Party Political System

    Directory of Open Access Journals (Sweden)

    Kemal Ozden

    2010-10-01

    Full Text Available Turkish experiment of transition to multi-party politics in 1946 has been seen by transition to democracy comparativists as an example of the cases in which the ruling elites deliberately decide that the society is diverse so this diversity needs to be translated into the political sphere by allowing multi-party politics. However, this study challanges this view and suggests that a close reading of the critical juncture of 1946 when the President and the leader of Republican People’s Party smet nönü decided to allow other parties to operate shows that it was not that the President nönü succumbed to the reality of diversity but domestic and international concerns forced him to act towards a multi-party political structure. In his mind, he had a pseudodemocratic system where he and his party would continue to rule the country in a hegemonic party system setting where a ruling party monopolizes the political arena, using coercion, patronage, media control, and other means to deny formally legal opposition parties any real chance of competing for power.

  12. Commande optimale à flux libre des machines asynchrones

    Science.gov (United States)

    Biedinger, J. M.; Poullain, S.; Yvon, J. P.

    1992-01-01

    The subject of this paper is the optimal control with unconstrained flux of an induction motor being considered as a distributed parameter system described by a nonlinear diffusion equation. This approach allows to describe the electrodynamic state of the motor by taking into account, in a natural way, the influence of saturation and eddy-currents, as well as the nonlinearities due to the variable flux operation. Equations are approximated via a finite element formulation which leads to a finite dimensional dynamical system to which the techniques of optimal control may be applied. The generality of the methodology allows to treat various criteria. The objective aimed in this paper is to force the motor torque to follow a given input, especially under initially demagnetized conditions and with, naturally, constraints on the currents. For this purpose the criterion will be chosen as a norm of the difference between the electromagnetic torque and a given reference torque. Numerical simulations are presented for the case of a squirrel-cage rotor and for a solid iron rotor. Results are compared with those deduced from strategies based on lumped-parameter models. Torque responses obtained with field-oriented control method adapted to the case of flux-variable operation are also presented. Finally a modification of the criterion is proposed for identifying the command which allows to obtain the larger torque during transient states. Dans cet article on traite le problème du contrôle optimal à flux libre d'un moteur asynchrone considéré comme un système à paramètres répartis gouverné par une équation de diffusion non linéaire. Cette approche permet de décrire l'état électrodynamique de la machine en prenant naturellement en compte les effets de la saturation et des courants induits, ainsi que les non-linéarités liées au fonctionnement à flux variable. La formulation éléments finis est utilisée pour traduire le problème continu sous la forme d

  13. Scalability of Asynchronous Networks Is Limited by One-to-One Mapping between Effective Connectivity and Correlations.

    Directory of Open Access Journals (Sweden)

    Sacha Jennifer van Albada

    2015-09-01

    Full Text Available Network models are routinely downscaled compared to nature in terms of numbers of nodes or edges because of a lack of computational resources, often without explicit mention of the limitations this entails. While reliable methods have long existed to adjust parameters such that the first-order statistics of network dynamics are conserved, here we show that limitations already arise if also second-order statistics are to be maintained. The temporal structure of pairwise averaged correlations in the activity of recurrent networks is determined by the effective population-level connectivity. We first show that in general the converse is also true and explicitly mention degenerate cases when this one-to-one relationship does not hold. The one-to-one correspondence between effective connectivity and the temporal structure of pairwise averaged correlations implies that network scalings should preserve the effective connectivity if pairwise averaged correlations are to be held constant. Changes in effective connectivity can even push a network from a linearly stable to an unstable, oscillatory regime and vice versa. On this basis, we derive conditions for the preservation of both mean population-averaged activities and pairwise averaged correlations under a change in numbers of neurons or synapses in the asynchronous regime typical of cortical networks. We find that mean activities and correlation structure can be maintained by an appropriate scaling of the synaptic weights, but only over a range of numbers of synapses that is limited by the variance of external inputs to the network. Our results therefore show that the reducibility of asynchronous networks is fundamentally limited.

  14. Simultaneous and independent optical impairments monitoring using singular spectrum analysis of asynchronously sampled signal amplitudes

    Science.gov (United States)

    Guesmi, Latifa; Menif, Mourad

    2015-09-01

    Optical performance monitoring (OPM) becomes an inviting topic in high speed optical communication networks. In this paper, a novel technique of OPM based on a new elaborated computation approach of singular spectrum analysis (SSA) for time series prediction is presented. Indeed, various optical impairments among chromatic dispersion (CD), polarization mode dispersion (PMD) and amplified spontaneous emission (ASE) noise are a major factors limiting quality of transmission data in the systems with data rates lager than 40 Gbit/s. This technique proposed an independent and simultaneous multi-impairments monitoring, where we used SSA of time series analysis and forecasting. It has proven their usefulness in the temporal analysis of short and noisy time series in several fields, that it is based on the singular value decomposition (SVD). Also, advanced optical modulation formats (100 Gbit/s non-return-to zero dual-polarization quadrature phase shift keying (NRZ-DP-QPSK) and 160 Gbit/s DP-16 quadrature amplitude modulation (DP-16QAM)) offering high spectral efficiencies have been successfully employed by analyzing their asynchronously sampled amplitude. The simulated results proved that our method is efficient on CD, first-order PMD, Q-factor and OSNR monitoring, which enabled large monitoring ranges, the CD in the range of 170-1700 ps/nm.Km and 170-1110 ps/nm.Km for 100 Gbit/s NRZ-DP-QPSK and 160 Gbit/s DP-16QAM respectively, and also the DGD up to 20 ps is monitored. We could accurately monitor the OSNR in the range of 10-40 dB with monitoring error remains less than 1 dB in the presence of large accumulated CD.

  15. A bio-inspired asynchronous skin system for crack detection applications

    International Nuclear Information System (INIS)

    In many applications of structural health monitoring (SHM) it is imperative or advantageous to have large sensor arrays in order to properly sense the state of health of the structure. Typically these sensor networks are implemented by placing a large number of sensors over a structure and running individual cables from each sensor back to a central measurement station. Data is then collected from each sensor on the network at a constant sampling rate regardless of the current timescales at which events are acting on the structure. These conventional SHM sensor networks have a number of shortfalls. They tend to have a large number of cables that can represent a single point of failure for each sensor as well as add significant weight and installation costs. The constant sampling rate associated with each sensor very quickly leads to large amounts of data that must be analyzed, stored, and possibly transmitted to a remote user. This leads to increased demands on power consumption, bandwidth, and size. It also taxes our current techniques for managing large amounts of data. For the last decade the goal of the SHM community has been to endow structures with the functionality of a biological nervous system. Despite this goal the community has predominantly ignored the biological nervous system as inspiration for building structural nervous systems, choosing instead to focus on experimental mechanics and simulation techniques. In this work we explore the use of a novel, bio-inspired, SHM skin. This skin makes use of distributed computing and asynchronous communication techniques to alleviate the scale of the data management challenge as well as reduce power. The system also periodically sends a ‘heat beat’ signal to provide state-of-health updates. This conductive skin was implemented using conductive ink resistors as well as with graphene-oxide capacitors. (paper)

  16. Methodological Reflections on the Use of Asynchronous Online Focus Groups in Health Research

    Directory of Open Access Journals (Sweden)

    Sarah Williams PhD

    2012-09-01

    Full Text Available The Internet is increasingly used as a tool in qualitative research. In particular, asynchronous online focus groups are used when factors such as cost, time, or access to participants can make conducting face-to-face research difficult. In this article we consider key methodological issues involved in using asynchronous online focus groups to explore experiences of health and illness. The written nature of Internet communication, the lack of physical presence, and the asynchronous, longitudinal aspects enable participants who might not normally contribute to research studies to reflect on their personal stories before disclosing them to the researcher. Implications for study design, recruitment strategies, and ethics should be considered when deciding whether to use this method.

  17. On the Outage Behavior of Asynchronous OFDM DF and AF Cooperative Networks

    CERN Document Server

    Torbatian, Mehdi

    2009-01-01

    The outage behavior of various relaying protocols over a general one hop asynchronous cooperative network is examined when orthogonal frequency division multiplexing (OFDM) is used to combat synchronization error among the relays. We consider non-orthogonal selection decode-and-forward (NSDF), orthogonal selection decode-and-forward (OSDF), non-orthogonal amplify-and-forward (NAF), and orthogonal amplify-and-forward (OAF) relaying protocols and analyze the diversity multiplexing gain tradeoff (DMT) in all scenarios. The transmitting nodes cooperatively construct an asynchronous OFDM space-time code by re-sending the source messages over a common time interval and a common frequency bandwidth. It is shown that in decode-and-forward (DF) type protocols, the asynchronous network provides a diversity gain greater than or equal to the one of the corresponding synchronous network in the limit of code word length and throughout the range of multiplexing gain. In amplify-and-forward (AF) type protocols, in which the ...

  18. Simulating the operation action of an asynchronized turbogenerator under loss of excitation

    Institute of Scientific and Technical Information of China (English)

    SANGARE Adama Fanhiri; YANG Shunchang; LIU Ren

    2004-01-01

    The control strategy tor asynchronized turbogenerators (ASTGs) was studied by using two-axis equations. Simulation of the process of an asynchronized turbogenerator with faults of d or q axis or d and q axes in the excitation system was carried out with the simulating models including the model of the reverse thyristors in the excitation system established by Saber software. The simulation results show that at the loss of excitation at both windings or one winding of the rotor, the ASTGs can be automatically driven into an asynchronous or single axis excitation operation mode without a power unit tripping, and the characteristics for ASTGs with faults in the excitation system appear in good order.

  19. An Asynchronous Time-Division-Multiplexed Network-on-Chip for Real-Time Systems

    DEFF Research Database (Denmark)

    Kasapaki, Evangelia

    design that supports time-predictability, and asynchronous routers that form a time-elastic network. The NI design integrates the DMA functionality and the TDM schedule, and uses dual-ported local memories. The routers combine the router functionality and asynchronous elastic behavior. They also use......Multi-processor architectures using networks-on-chip (NOCs) for communication are becoming the standard approach in the development of embedded systems and general purpose platforms. Typically, multi-processor platforms follow a globally asynchronous locally synchronous (GALS) timing organization...... more flexible timing within its structure, to address signal distribution issues, using a network of synchronous routers. NOCs consist of a switching structure of routers connected by links, with network interfaces (NIs) that connect the processors to the switching structure. Argo uses a novel NI...

  20. Gigabit Ethernet signal transmission using asynchronous optical code division multiple access.

    Science.gov (United States)

    Ma, Philip Y; Fok, Mable P; Shastri, Bhavin J; Wu, Ben; Prucnal, Paul R

    2015-12-15

    We propose and experimentally demonstrate a novel architecture for interfacing and transmitting a Gigabit Ethernet (GbE) signal using asynchronous incoherent optical code division multiple access (OCDMA). This is the first such asynchronous incoherent OCDMA system carrying GbE data being demonstrated to be working among multi-users where each user is operating with an independent clock/data rate and is granted random access to the network. Three major components, the GbE interface, the OCDMA transmitter, and the OCDMA receiver are discussed in detail. The performance of the system is studied and characterized through measuring eye diagrams, bit-error rate and packet loss rate in real-time file transfer. Our Letter also addresses the near-far problem and realizes asynchronous transmission and detection of signal.

  1. The Effects of Metacognitive Instruction Embedded within an Asynchronous Learning Network on Scientific Inquiry Skills. Research Report

    Science.gov (United States)

    Zion, Michal; Michalsky, Tova; Mevarech, Zemira R.

    2005-01-01

    The study is aimed at investigating the effects of four learning methods on students' scientific inquiry skills. The four learning methods are: (a) metacognitive-guided inquiry within asynchronous learning networked technology (MINT); (b) an asynchronous learning network (ALN) with no metacognitive guidance; (c) metacognitive-guided inquiry…

  2. Good Quality Discussion Is Necessary but Not Sufficient in Asynchronous Tuition: A Brief Narrative Review of the Literature

    Science.gov (United States)

    Fear, William James; Erikson-Brown, Andrew

    2014-01-01

    Online learning is a growing field of education with a corresponding increase in the use of asynchronous discussion. Asynchronous discussion is a form of interaction that is mediated rather than direct and where there is a time lag in the interactions between discussants. In this paper we conducted a brief narrative review of the literature on…

  3. Enhancing Discussions in the Asynchronous Online Classroom: The Lack of Face-to-Face Interaction Does Not Lessen the Lesson

    Science.gov (United States)

    Comer, Debra R.; Lenaghan, Janet A.

    2013-01-01

    This article addresses educators' concerns about using asynchronous online discussions in lieu of face-to-face discussions. Drawing from research on asynchronous online education and Bloom's taxonomy, the authors introduce the system of "original examples" and "value-added comments" that they have developed to promote engaging and meaningful…

  4. THE DEVELOPMENT OF MATHEMATICAL MODEL FOR THE STUDY OF ELECTROMAGNETIC INTERFERENCE FROM THE TRACTION CONVERTERS WITH ASYNCHRONOUS MOTOR

    Directory of Open Access Journals (Sweden)

    V. I. Shcheka

    2010-01-01

    Full Text Available The mathematical modeling and circuit simulation of asynchronous propulsion drive unit with converters on IGBT transistors have been made. The possible noises appearing during drive’s operation have been determined. The spectral composition of phase current of the asynchronous engine has been obtained.

  5. Finite-time quantised feedback asynchronously switched control of sampled-data switched linear systems

    Science.gov (United States)

    Wang, Ronghao; Xing, Jianchun; Li, Juelong; Xiang, Zhengrong

    2016-10-01

    This paper studies the problem of stabilising a sampled-data switched linear system by quantised feedback asynchronously switched controllers. The idea of a quantised feedback asynchronously switched control strategy originates in earlier work reflecting actual system characteristic of switching and quantising, respectively. A quantised scheme is designed depending on switching time using dynamic quantiser. When sampling time, system switching time and controller switching time are all not uniform, the proposed switching controllers guarantee the system to be finite-time stable by a piecewise Lyapunov function and the average dwell-time method. Simulation examples are provided to show the effectiveness of the developed results.

  6. A Scheduling Discipline for Latency and Bandwidth Guarantees in Asynchronous Network-on-Chip

    DEFF Research Database (Denmark)

    Bjerregaard, Tobias; Sparsø, Jens

    2005-01-01

    Guaranteed services (GS) are important in that they provide predictability in the complex dynamics of shared communication structures. This paper discusses the implementation of GS in asynchronous Network-on-Chip. We present a novel scheduling discipline called Asynchronous Latency Guarantee (ALG......) scheduling, which provides latency and bandwidth guarantees in accessing a shared media, e.g. a physical link shared between a number of virtual channels. ALG overcomes the drawbacks of existing scheduling disciplines, in particular the coupling between latency and bandwidth guarantees. A 0.12 &956;m CMOS...

  7. Efficiency of three-phase asynchronous motors. Energy loss reduction by means of overdimensioning; Efficientie van driefasen asynchrone motoren. SinuMEC beperkt energieverlies door overdimensionering

    Energy Technology Data Exchange (ETDEWEB)

    Peeters, J.; Van Dorst, C. [Hyteps, Gemert (Netherlands)

    2008-10-15

    The three phase asynchronous motor has been applied in various installations since time immemorial. Although the motor is more efficient at full mechanical load, this is not always applied efficiently. Can the efficiency of low load motors be improved or is this a utopia? The Sinusoidal Motor Controller (SinuMEC) improves efficiency, saves energy and lengthens the life span. [mk]. [Dutch] De driefasen asynchrone motor wordt sinds mensenheugenis in uiteenlopende installaties toegepast. Hoewel de motor met een volle mechanische belasting efficient is, wordt deze niet altijd efficient toegepast. Kan de efficiency van laag belaste motoren worden verbeterd of is dit een utopie? De Sinusoidal Motor efficiency controller (SinuMEC) verbetert de efficiency, bespaart energie en verlengt de levensduur.

  8. “多方当事人调解诊所课程”的调研报告%A Report on Multiparty Mediation Practicum

    Institute of Scientific and Technical Information of China (English)

    翁洁

    2012-01-01

    This report was targeted at the course of Multiparty Mediation Practicum. It discussed the authorg observation and investigation of the teaching contents and methods, class characteristics as well as the assess ment methods of this course. Then detailed analyses were made on the course orientation, class structure and teacher student function of it in the hope that they could contribute to the improvements in the research and practice of the teaching attitude toward, objective of, and means of the legal education in China.%文章将“多方当事人调解诊所课程”作为调查研究的对象,通过对该课程的授课内容与方式、课堂特点、考核方式等方面的观察与记录,从课程定位、课堂构成、师生功能三个方面对该课程进行了分析并得出了相关结论,以期能为我国法学教育教学态度、目标、方式、手段等方面的研究与切实改善提供有益的参考。

  9. Teradata data base computer

    Energy Technology Data Exchange (ETDEWEB)

    1984-04-01

    To meet the growing demand for information management of large databases, Teradata Corporation has introduced the DBC/1012 data base computer, an IBM plug-compatible system that can handle data volumes up to a trillion bytes. Teradata estimates the DBC/1012 to be one-third the cost of an all-software relational system on a general purpose mainframe. Cost effectiveness, as well as fault tolerance, is achieved by a parallel architecture which processes data asynchronously using multiple independent microprocessors. Another cost saving results from the resources on the host mainframe that become available once the mainframe is relieved of the burden of maintaining the database.

  10. Defining the Symmetry of the Universal Semi-Regular Autonomous Asynchronous Systems

    OpenAIRE

    Vlad, Serban E.

    2012-01-01

    The regular autonomous asynchronous systems are the non-deterministic Boolean dynamical systems and universality means the greatest in the sense of the inclusion. The paper gives four definitions of symmetry of these systems in a slightly more general framework, called semi-regularity, and also many examples.

  11. An Approach for Asynchronous Awareness Support in Collaborative Non-Linear Storytelling

    NARCIS (Netherlands)

    Schumann, J.; Buttler, T.; Lukosch, S.

    2012-01-01

    Workspace awareness support is mandatory for group support systems. It allows users not only to follow actions of others, but to understand and respond to any changes others make to the workspace. In this paper, we present a novel approach for asynchronous awareness support by offering different fil

  12. A low-power asynchronous data-path for a FIR filter bank

    DEFF Research Database (Denmark)

    Nielsen, Lars Skovby; Sparsø, Jens

    1996-01-01

    This paper describes a number of design issues relating to the implementation of low-power asynchronous signal processing circuits. Specifically, the paper addresses the design of a dedicated processor structure that implements an audio FIR filter bank which is part of an industrial application...

  13. Effects of Asynchronous Music on Students' Lesson Satisfaction and Motivation at the Situational Level

    Science.gov (United States)

    Digelidis, Nikolaos; Karageorghis, Costas I.; Papapavlou, Anastasia; Papaioannou, Athanasios G.

    2014-01-01

    The aim of this study was to examine the effects of asynchronous (background) music on senior students' motivation and lesson satisfaction at the situational level. A counterbalanced mixed-model design was employed with two factors comprising condition (three levels) and gender (two levels). Two hundred students (82 boys, 118 girls; M…

  14. Trajectory exploration within asynchronous binary asteroid systems using refined Lagrangian coherent structures

    Science.gov (United States)

    Shang, Haibin; Wu, Xiaoyu; Cui, Pingyuan

    2016-09-01

    Ground observations have found that asynchronous systems constitute most of the population of the near-Earth binary asteroids. This paper concerns the trajectory of a particle in the asynchronous system which is systematically described using periodic ellipsoidal and spherical body models. Due to the non-autonomous characteristics of the asynchronous system, Lagrangian coherent structures (LCS) are employed to identify the various dynamical behaviors. To enhance the accuracy of LCS, a robust LCS finding algorithm is developed incorporating hierarchical grid refinement, one-dimensional search and variational theory verification. In this way, the intricate dynamical transport boundaries are detected efficiently. These boundaries indicate that a total of 15 types of trajectories exist near asynchronous binary asteroids. According to their Kepler energy variations, these trajectories can be grouped into four basic categories, i.e., transitory, escape, impact and flyby trajectories. Furthermore, the influence of the ellipsoid's spin period on the dynamical behavior is discussed in the context of the change of dynamical regions. We found that the transitory and impact motions occur easily in the synchronous-like binary systems, in which the rotation period of the ellipsoid is nearly equal to that of the mutual orbit. Meanwhile, the results confirm a positive correlation between the spinning rate of the ellipsoid and the probability of the escape and flyby trajectories. The LCS also reveal a marked increase in trajectory diversity after a larger initial energy is selected.

  15. Selected Issues in Persistent Asynchronous Adaptive Specialization for Generic Functional Array Programming

    NARCIS (Netherlands)

    C. Grelck; H. Wiesinger

    2014-01-01

    Asynchronous adaptive specialization of rank- and shape-generic code for processing immutable (purely functional) multi-dimensional arrays has proven to be an effective technique to reconcile the desire for abstract specifications with the need to achieve reasonably high performance in sequential as

  16. Tagging Thinking Types in Asynchronous Discussion Groups: Effects on Critical Thinking

    Science.gov (United States)

    Schellens, T.; Van Keer, H.; De Wever, B.; Valcke, M.

    2009-01-01

    The present study focuses on the use of thinking types as a possible way to structure university students' discourse in asynchronous discussion groups and consequently promote their learning. More specifically, the aim of the study is to determine how requiring students to label their contributions by means of De Bono's (1991) thinking hats…

  17. Introducing group-based asynchronous learning to business education : Reflections on effective course design and delivery

    NARCIS (Netherlands)

    Arnold, I.J.M.; Walker, R.

    2004-01-01

    This paper explores the contribution of virtual tools to student learning within full-time management programmes. More specifically, the paper focuses on asynchronous communication tools, considering the scope they offer for group-based collaborative learning outside the classroom. We report on the

  18. Participation in Asynchronous Online Discussion Forums Does Improve Student Learning of Gross Anatomy

    Science.gov (United States)

    Green, Rodney A.; Farchione, Davide; Hughes, Diane L.; Chan, Siew-Pang

    2014-01-01

    Asynchronous online discussion forums are common in blended learning models and are popular with students. A previous report has suggested that participation in these forums may assist student learning in a gross anatomy subject but it was unclear as to whether more academically able students post more often or whether participation led to…

  19. Defining the Symmetry of the Universal Semi-Regular Autonomous Asynchronous Systems

    Directory of Open Access Journals (Sweden)

    Serban E. Vlad

    2012-02-01

    Full Text Available The regular autonomous asynchronous systems are the non-deterministic Boolean dynamical systems and universality means the greatest in the sense of the inclusion. The paper gives four definitions of symmetry of these systems in a slightly more general framework, called semi-regularity, and also many examples.

  20. A Study of Synchronous versus Asynchronous Collaboration in an Online Business Writing Class

    Science.gov (United States)

    Mabrito, Mark

    2006-01-01

    A case study examined the collaborative experiences of students in an online business writing classroom. The purpose was to examine the same groups of students working on collaborative writing assignments in both a synchronous (real-time) and an asynchronous (non-real-time) discussion forum. This study focused on examining the amount, pattern, and…

  1. Asynchronous Knowledge Sharing and Conversation Interaction Impact on Grade in an Online Business Course

    Science.gov (United States)

    Strang, Kenneth David

    2011-01-01

    Student knowledge sharing and conversation theory interactions were coded from asynchronous discussion forums to measure the effect of learning-oriented utterances on academic performance. The sample was 3 terms of an online business course (in an accredited MBA program) at a U.S.-based university. Correlation, stepwise regression, and multiple…

  2. The Role of Technology-Based Scaffolding in Problem-Based Online Asynchronous Discussion

    Science.gov (United States)

    Ak, Serife

    2016-01-01

    This study examined the effects of technology-based scaffolds that were composed through the use of the seven-stage, problem-based learning strategy on knowledge construction in a problem-based online asynchronous discussion. In a quasi-experimental setting, 60 students in an undergraduate Instructional Technology and Material Design course were…

  3. Designing a Discussion Environment to Enhance Connectivity and Sustainability in Asynchronous Online Discussion

    Science.gov (United States)

    Gao, Fei

    2011-01-01

    Lack of connectivity and sustainability are two common problems in asynchronous online discussions. In this paper, the author proposes that the two problems may have to do with the structure of threaded forums, that is, the design of threaded forums may constrain participants from having well-connected and sustained discussions. A new discussion…

  4. Asynchronous Pipeline Micro—Control—Unit (MCU) Chip Design

    Institute of Scientific and Technical Information of China (English)

    ZHOUQian; XUKe; MINHao

    2003-01-01

    The work of this paper includes a researchon asynch ronous design methodology, and a design and implementation of an asynchronous 8-Bit micro-control-unit (MCU). This paper introduces a new application of New-Instruction-Fetching method to detect new instruc-tion which makes this chip fit for demand changeable sys-tem. The instruction set of this asynchronous MCU is compatible with PIC16C6X (Sicrochip Technology Inc).This paper also introduces a new architecture of pipeline,which increases the average speed of chip operation. The asynchronous low power MCU has been fabricated with CSMC (central semiconductor manufacturing corporation)0.6μm CMOS process in Aug 2001. The chip size is about 1.60mm*2.00mm (without taking account of PAD size).Now the test work has been accomplished and the test-ing result of this chip is also presented. The testing result shows that the asynchronous architecture could fulfill all the expected functions, additionally with higher processs peed and lower power consumption than its synchronous counterpart under the same supply voltage.

  5. Cooperative Learning in Graduate Student Projects: Comparing Synchronous versus Asynchronous Collaboration

    Science.gov (United States)

    Strang, Kenneth

    2013-01-01

    Cooperative learning was applied in a graduate project management course to compare the effectiveness of asynchronous versus synchronous online team meetings. An experiment was constructed to allocate students to project teams while ensuring there was a balance of requisite skills, namely systems analysis and design along with HTML/Javascript…

  6. Factor Validity of the Motivated Strategies for Learning Questionnaire (MSLQ) in Asynchronous Online Learning Environments (AOLE)

    Science.gov (United States)

    Cho, Moon-Heum; Summers, Jessica

    2012-01-01

    The purpose of this study was to investigate the factor validity of the Motivated Strategies for Learning Questionnaire (MSLQ) in asynchronous online learning environments. In order to check the factor validity, confirmatory factor analysis (CFA) was conducted with 193 cases. Using CFA, it was found that the original measurement model fit for…

  7. Synchronous and Asynchronous E-Language Learning: A Case Study of Virtual University of Pakistan

    Science.gov (United States)

    Perveen, Ayesha

    2016-01-01

    This case study evaluated the impact of synchronous and asynchronous E-Language Learning activities (ELL-ivities) in an E-Language Learning Environment (ELLE) at Virtual University of Pakistan. The purpose of the study was to assess e-language learning analytics based on the constructivist approach of collaborative construction of knowledge. The…

  8. Flipping the Online Classroom with Web 2.0: The Asynchronous Workshop

    Science.gov (United States)

    Cummings, Lance

    2016-01-01

    This article examines how Web 2.0 technologies can be used to "flip" the online classroom by creating asynchronous workshops in social environments where immediacy and social presence can be maximized. Using experience teaching several communication and writing classes in Google Apps (Google+, Google Hangouts, Google Drive, etc.), I…

  9. "Intentional Repetition" and Learning Style: Increasing Efficient and Cohesive Interaction in Asynchronous Online Discussions

    Science.gov (United States)

    Topcu, Abdullah

    2008-01-01

    This study verified the efficacy of the intentional repetition technique in improving interaction in asynchronous online discussions by taking into account the learning styles of the participants. A conceptual framework served for the development of the technique, which conceptualises efficient and cohesive interaction on a continuum of process…

  10. Pedagogical Dimensions of Effective Online Asynchronous Teacher Communication in Higher Education

    NARCIS (Netherlands)

    A. Smits; J. Voogt

    2015-01-01

    In this research teacher behaviour in online asynchronous discussions is studied. To this end teachers’ online messages were analyzed and correlated to measures of student satisfaction. Findings show a positive relation between student satisfaction and the presence of content knowledge, multiple ack

  11. A model of asynchronous left ventricular relaxation predicting the bi-exponential pressure decay

    NARCIS (Netherlands)

    R.W. Brower (Ronald); S. Meij (Simon); P.W.J.C. Serruys (Patrick)

    1983-01-01

    textabstractA new model for the pressure relaxation of the left ventricle is proposed. The model presumes that the myocardium relaxes asynchronously, but that when regions begin to relax, after a delay, the local wall stress decays as a mono-exponential process. This formulation results in an appare

  12. Credit Hours with No Set Time: A Study of Credit Policies in Asynchronous Online Education

    Science.gov (United States)

    Prasuhn, Frederick Carl

    2014-01-01

    U.S. public university system policies were examined to learn how credit hours were determined for asynchronous online education. Findings indicated that (a) credit hour meaning and use are not consistent, (b) primary responsibility for credit hour decisions was at the local level, and (c) no policies exist to guide credit hour application for…

  13. Comparing Asynchronous Online Discussions and Face-to-Face Discussions in a Classroom Setting

    Science.gov (United States)

    Wang, Qiyun; Woo, Huay Lit

    2007-01-01

    The purpose of this study is to investigate the perceived differences between asynchronous online discussions and face-to-face discussions in a classroom setting. The students' reflections were analysed by following a qualitative research approach. The results showed that atmosphere, response, efficiency, interactivity and communication were the…

  14. VOLTAGE REGULATORS AND FREQUENCY OF CURRENT OF ASYNCHRONOUS GENERATORS OF WIND POWER INSTALLATIONS

    Directory of Open Access Journals (Sweden)

    Grigorash O. V.

    2013-10-01

    Full Text Available In the article we have considered the technical solutions of voltage regulators and the frequency of current of the asynchronous generators of the wind power installations executed with the help of the direct frequency transformers. The comparative analysis of them has been carried out as well

  15. Facing Off: Comparing an In-Person Library Orientation Lecture with an Asynchronous Online Library Orientation

    Science.gov (United States)

    Gall, Dan

    2014-01-01

    A study to compare the effectiveness of an in-person library orientation with an online asynchronous orientation was conducted with three sections of Social Work Research Methods, a required course in the University of Iowa's Master of Social Work program. Two sections of the course received an online orientation involving short videos, text…

  16. Synthesis and Layout of an Asynchronous Network-on-Chip using Standard EDA Tools

    DEFF Research Database (Denmark)

    Müller, Christoph; Kasapaki, Evangelia; Sørensen, Rasmus Bo;

    2014-01-01

    is the key role that clock signals play in specifying time-constraints for the synthesis. In this paper explain how we handled the synthesis and layout of an asynchronous network-on-chip for a multi-core platform. Focus is on the design process while the actual NOC-design and its performance are presented...

  17. Using the Community of Inquiry Model to Investigate Students' Knowledge Construction in Asynchronous Online Discussions

    Science.gov (United States)

    Liu, Chien-Jen; Yang, Shu Ching

    2014-01-01

    This study used the Community of Inquiry (CoI) model proposed by Garrison to investigate students' level of knowledge construction in asynchronous discussions. The participants included 36 senior students (27 males) majoring in information management. The students attended 18 weeks of an online information ethics course. In this study, four types…

  18. 3D asynchronous particle tracking in single and dual continuum matrix-fractures. Application to nuclear waste storage; Modelisation 3D du transport particulaire asynchrone en simple et double continuum matrice-fractures: application au stockage de dechets nucleaires

    Energy Technology Data Exchange (ETDEWEB)

    Lam, M.Ph

    2008-06-15

    This PhD research was conducted as a collaboration between Laboratoire National d'Hydraulique et Environnement (LNHE) from EDF R and D and the Institut de Mecanique des Fluides de Toulouse (IMFT) in the frame of a CIFRE contract. This PhD thesis aims at providing LNHE a reliable numerical model to study the feasibility of a nuclear waste storage in deep geological structures. The main focus of the thesis is put on developing and implementing a Random Walk Particle Method (RWPM) to model contaminant transport in 3D heterogeneous and fractured porous media. In its first part, the report presents the Lagrangian particle tracking method used to model transport in heterogeneous media with a direct high resolution approach. The solute plume is discretized into concentration packets: particles. The model tracks each particle based on a time-explicit displacement algorithm according to an advective component and a diffusive random component. The method is implemented on a hydraulic model discretized on a 3D unstructured tetrahedral finite element mesh. We focus on techniques to overcome problems due to the discontinuous transport parameters and the unstructured mesh. First, we introduce an asynchronous time-stepping approach to deal with the numerical and overshoot errors that occur with conventional RWPM. Then, a filtering method is applied to smooth discontinuous transport parameters (pre-processing). Finally, once the particle displacements are computed, we propose several filtering and sampling methods to obtain concentrations from particle positions (post-processing). Applications of these methods are presented with cases of tracer advection-dispersion in homogeneous and heterogeneous media. For dense fracture networks, direct high resolution methods are very time consuming and need a lot of computational resources. So, as an alternative to the discrete approach, a dual-continuum representation is used, in the second part of the report, to describe the porous

  19. Application-Controlled Parallel Asynchronous Input/Output Utility

    Science.gov (United States)

    Clune, Thomas; Zhou, Shujia

    2010-01-01

    A software utility tool has been designed to alleviate file system I/O performance bottlenecks to which many high-end computing (HEC) applications fall prey because of the relatively large volume of data generated for a given amount of computational work. In an effort to reduce computing resource waste, and to improve sustained performance of these HEC applications, a lightweight software utility has been designed to circumvent bandwidth limitations of typical HEC file systems by exploiting the faster inter-processor bandwidth to move output data from compute nodes to designated I/O nodes as quickly as possible, thereby minimizing the I/O wait time. This utility has successfully demonstrated a significant performance improvement within a major NASA weather application.

  20. Interaction through Asynchronous Audio-Based Computer Mediated Communication in the Virtual Foreign Language Classroom

    OpenAIRE

    Shrewsbury, Eric-Gene Jackson

    2012-01-01

    Because distance learning (DL) programs provide students educational opportunities with minimal restrictions on location and/or time, the number of institutions that provide DL courses has grown at a tremendous rate over recent years and is projected to increase in the future. Foreign language courses through DL, however, have been criticized for limited opportunities to engage in speaking activities and to develop oral proficiency. While previous research consistently reports no significan...

  1. BPEL based asynchronous interaction and composition of RESTful Web service%基于BPEL的RESTful Web服务异步交互及组合研究

    Institute of Scientific and Technical Information of China (English)

    铁威; 黄志球; 王进

    2013-01-01

    RESTful Web service has become a primary method to publish services in cloud computing, due to its lightweight and specific semantics. However, because RESTful Web service only support synchronous interaction, it is difficult of using synchronous composition to meet the requirement of the complex business process. Therefore, the paper proposed a callback based asynchronous interaction approach under REST style. The approach enables the composition of both synchronous and asynchronous RESTful Web services by extending the BPEL meta model. The architecture of the execution engine for the extended BPEL was designed and implemented as well.%RESTful Web服务由于其轻量级和明确语义等特性,已成为云计算环境下发布服务的首要方法.但是,由于RESTful Web服务仅支持同步的交互方式,面对复杂业务逻辑时,难以通过服务组合的方式来满足业务需求.针对这些问题,提出了一种基于回调的RESTful Web服务异步交互方式,通过扩展BPEL元模型,增加了BPEL对异步RESTful Web服务组合的支持,并设计实现了扩展后的BPEL执行引擎.

  2. Study on Asynchronous MES Teaching Approach for Discipline of College Japanese in Characteristic Campus of Agriculture-related Universities

    Institute of Scientific and Technical Information of China (English)

    Ming; XU

    2015-01-01

    This paper made scientific analysis on asynchronous MES for discipline of College Japanese in characteristic campus of agriculturerelated universities. It made modular design for discipline of College Japanese in emotional concept,language skill,language knowledge,learning strategy,and cultural quality combining students’ demands and education and teaching rules. Relying on Internet and Mobile Internet aided teaching platform,it came up with " Integration- Separation- Integration" asynchronous teaching approach. The practice indicates that teaching effect of such approach is remarkable. However,asynchronous MES for discipline of College Japanese raises higher requirement for interaction between teachers and students and voluntary effort of teachers.

  3. A Local Distributed Peer-to-Peer Algorithm Using Multi-Party Optimization Based Privacy Preservation for Data Mining Primitive Computation

    Data.gov (United States)

    National Aeronautics and Space Administration — This paper proposes a scalable, local privacy-preserving algorithm for distributed peer-to-peer (P2P) data aggregation useful for many advanced data mining/analysis...

  4. Efficient Protocols for Principal Eigenvector Computation over Private Data

    Directory of Open Access Journals (Sweden)

    Manas A. Pathak

    2011-12-01

    Full Text Available In this paper we present a protocol for computing the principal eigenvector of a collection of data matrices belonging to multiple semi-honest parties with privacy constraints. Our proposed protocol is based on secure multi-party computation with a semi-honest arbitrator who deals with data encrypted by the other parties using an additive homomorphic cryptosystem. We augment the protocol with randomization and oblivious transfer to make it difficult for any party to estimate properties of the data belonging to other parties from the intermediate steps. The previous approaches towards this problem were based on expensive QR decomposition of correlation matrices, we present an efficient algorithm using the power iteration method. We present an analysis of the correctness, security, and efficiency of protocol along with experimental results using a prototype implementation over simulated data and USPS handwritten digits dataset.

  5. On the Power of Correlated Randomness in Secure Computation

    DEFF Research Database (Denmark)

    Ishai, Yuval; Kushilevitz, Eyal; Meldgaard, Sigurd Torkel;

    2013-01-01

    We investigate the extent to which correlated secret randomness can help in secure computation with no honest majority. It is known that correlated randomness can be used to evaluate any circuit of size s with perfect security against semi-honest parties or statistical security against malicious...... parties, where the communication complexity grows linearly with s. This leaves open two natural questions: (1) Can the communication complexity be made independent of the circuit size? (2) Is it possible to obtain perfect security against malicious parties? We settle the above questions, obtaining both...... positive and negative results on unconditionally secure computation with correlated randomness. Concretely, we obtain the following results. Minimizing communication. Any multiparty functionality can be realized, with perfect security against semi-honest parties or statistical security against malicious...

  6. Practicing Nonverbal Awareness in the Asynchronous Online Classroom

    Science.gov (United States)

    Kelly, Stephanie; Claus, Christopher J.

    2015-01-01

    In this unit activity, students understand that social presence-one's ability to project a personality through computer-mediated communication-is critical for creating an effective online learning environment (Christen, Kelly, Fall, & Snyder, in press; Jorgensen, 2002; Kehrwald, 2010; O'Sullivan, Hunt, & Lippert, 2004). Without…

  7. Synchronous and asynchronous multiplexer circuits for medical imaging realized in CMOS 0.18um technology

    Science.gov (United States)

    Długosz, R.; Iniewski, K.

    2007-05-01

    Multiplexers are one of the most important elements in readout front-end ASICs for multi-element detectors in medical imaging. The purpose of these ASICs is to detect signals appearing randomly in many channels and to collect the detected data in an ordered fashion (de-randomization) in order to send it to an external ADC. ASIC output stage functionality can be divided into two: pulse detection and multiplexing. The pulse detection block is responsible for detecting maximum values of signals arriving from the shaper, sending a flag signal indicating that the peak signal has been detected and storing the pulse in an analog memory until read by ADC. The multiplexer in turn is responsible for searching for active flags, controlling the channel that has detected the peak signal and performing reset functions after readout. There are several types of multiplexers proposed in this paper, which can be divided into several classes: synchronous, synchronized and asynchronous. Synchronous circuits require availability of the multiphase clock generator, which increases the power dissipation, but simultaneously provide very convenient mechanism that enables unambiguous choice of the active channel. This characteristics leads to 100% effectiveness in data processing and no data loss. Asynchronous multiplexers do not require clock generators and because of that have simpler structure, are faster and more power efficient, especially when data samples occur seldom at the ASIC's inputs. The main problem of the asynchronous solution is when data on two or more inputs occur almost at the same time, shorter than the multiplexer's reaction time. In this situation some data can be lost. In many applications loss of the order of 1% of the data is acceptable, which makes use of asynchronous multiplexers possible. For applications when the lower loss is desirable a new hierarchy mechanism has been introduced. One of proposed solutions is a synchronized binary tree structure, that uses many

  8. Magnetic Random Access Memory based non-volatile asynchronous Muller cell for ultra-low power autonomous applications

    International Nuclear Information System (INIS)

    Micro and nano electronic integrated circuit domain is today mainly driven by the advent of the Internet of Things for which the constraints are strong, especially in terms of power consumption and autonomy, not only during the computing phases but also during the standby or idle phases. In such ultra-low power applications, the circuit has to meet new constraints mainly linked to its changing energetic environment: long idle phases, automatic wake up, data back-up when the circuit is sporadically turned off, and ultra-low voltage power supply operation. Such circuits have to be completely autonomous regarding their unstable environment, while remaining in an optimum energetic configuration. Therefore, we propose in this paper the first MRAM-based non-volatile asynchronous Muller cell. This cell has been simulated and characterized in a very advanced 28 nm CMOS fully depleted silicon-on-insulator technology, presenting good power performance results due to an extremely efficient body biasing control together with ultra-wide supply voltage range from 160 mV up to 920 mV. The leakage current can be reduced to 154 pA thanks to reverse body biasing. We also propose an efficient standard CMOS bulk version of this cell in order to be compatible with different fabrication processes

  9. Synchronization, retiming and OTDM of an asynchronous 10 Gigabit Ethernet NRZ packet using a time lens for Terabit Ethernet

    DEFF Research Database (Denmark)

    Hu, Hao; Laguardia Areal, Janaina; Mulvad, Hans Christian Hansen;

    2011-01-01

    An asynchronous 10G Ethernet packet is synchronized and retimed to a master clock using a time lens. The NRZ packet is converted into an RZ packet and multiplexed with a serial 1.28 Tb/s signal.......An asynchronous 10G Ethernet packet is synchronized and retimed to a master clock using a time lens. The NRZ packet is converted into an RZ packet and multiplexed with a serial 1.28 Tb/s signal....

  10. N-CANDA data integration: anatomy of an asynchronous infrastructure for multi-site, multi-instrument longitudinal data capture

    OpenAIRE

    Rohlfing, Torsten; Cummins, Kevin; Henthorn, Trevor; Chu, WeiWei; Nichols, B Nolan

    2013-01-01

    The infrastructure for data collection implemented by the National Consortium on Alcohol and NeuroDevelopment in Adolescence (N-CANDA) for data collection comprises several innovative features: (a) secure, asynchronous transfer and persistent storage of collected data via a revision control system; (b) two-stage import into a longitudinal database; and (c) use of a script-controlled web browser for data retrieval from a third-party, web-based neuropsychological test battery. The asynchronous ...

  11. Computer Literacy and Online Learning Attitude toward GSOE Students in Distance Education Programs

    Science.gov (United States)

    Li, Lung-Yu; Lee, Long-Yuan

    2016-01-01

    The purpose of this study was to explore graduate students' competencies in computer use and their attitudes toward online learning in asynchronous online courses of distance learning programs in a Graduate School of Education (GSOE) in Taiwan. The research examined the relationship between computer literacy and the online learning attitudes of…

  12. PERFORMANCE ANALYSIS OF GATED RING OSCILLATOR DESIGNED FOR AUDIO FREQUENCY RANGE ASYNCHRONOUS ADC

    Directory of Open Access Journals (Sweden)

    Anita Arvind Deshmukh

    2014-12-01

    Full Text Available This paper presents performance analysis of Gated Ring Oscillator (GRO. Proposed GRO is designed to employ in implementation of Time to Digital Converter (TDC block of Asynchronous ADC. For an audio frequency range ADC, minimum GRO stages are designed using asynchronous technique. So leads to reduced area and power. Compared to conventional Ring Oscillator (RO, we avoided to employ the gated clock; to evade clock design related problems like jitter, additional area and power. Instead we preferred gating of ring oscillator itself. Consequently during sleep mode, GRO disables automatically which saves the dynamic power. Furthermore it also provides first order noise shaping of the quantization and mismatch noise. Proposed GRO is implemented with 0.18µm CMOS Digital Technology in Cadence Virtuso environment. GRO performance analysis shows oscillation frequency as 286 KHz with 327ps jitter and average power consumption of 1.08µW.

  13. A 0.6-V 8.3-ENOB asynchronous SAR ADC for biomedical applications

    Science.gov (United States)

    Yan, Song; Zhongming, Xue; Pengcheng, Yan; Jueying, Zhang; Li, Geng

    2014-08-01

    A microwatt asynchronous successive approximation register (SAR) analog-to-digital converter (ADC) is presented. The supply voltage of the SAR ADC is decreased to 0.6 V to fit the low voltage and low power requirements of biomedical systems. The tail capacitor of the DAC array is reused for least significant bit conversion to decrease the total DAC capacitance thus reducing the power. Asynchronous control logic avoids the high frequency clock generator and further reduces the power consumption. The prototype ADC is fabricated with a standard 0.18 μm CMOS technology. Experimental results show that it achieves an ENOB of 8.3 bit at a 300-kS/s sampling rate. Very low power consumption of 3.04 μW is achieved, resulting in a figure of merit of 32 fJ/conv.-step.

  14. Zero Dynamics Analysis for Inverse Decoupling Control of Asynchronous Traction Motor

    Directory of Open Access Journals (Sweden)

    Haiying Dong

    2013-07-01

    Full Text Available Considering the problem for inverse system method in EMU AC induction traction motor linear decoupling, the zero dynamics subsystem will be separated from the original dynamic system through coordinate transformation. Firstly, a getting method for zero dynamics of the multiple input multiple output nonlinear system is discussed when γ<n. Second, the zero dynamics analysis for five order nonlinear model of asynchronous traction motor which base on the stationary coordinate system is given by using inverse decoupling method. The analysis results show that if the stability of the zero dynamics can be ensured, then the entire linearization of original nonlinear system is not necessary, need only partial linearization which effect on the external dynamic portion. The inverse decoupling process of asynchronous traction motor can be simplified by this conclusion.

  15. Performance Analysis of Gated Ring Oscillator Designed for Audio Frequency Range Asynchronous ADC

    Directory of Open Access Journals (Sweden)

    Anita Arvind Deshmukh

    2014-12-01

    Full Text Available This paper presents performance analysis of Gated R ing Oscillator (GRO. Proposed GRO is designed to employ in implementation of Time to Digital Convert er (TDC block of Asynchronous ADC. For an audio frequency range ADC, minimum GRO stages are designe d using asynchronous technique. So leads to reduced area and power. Compared to conventional Ri ng Oscillator (RO, we avoided to employ the gated clock; to evade clock design related problems like jitter, additional area and power. Instead we prefe rred gating of ring oscillator itself. Consequently duri ng sleep mode, GRO disables automatically which sav es the dynamic power. Furthermore it also provides fir st order noise shaping of the quantization and mismatch noise. Proposed GRO is implemented with 0. 18 μ m CMOS Digital Technology in Cadence Virtuso environment. GRO performance analysis shows oscillation frequency as 286 KHz with 327ps jitter and average power consumption of 1.08 μ W.

  16. Asynchronous H∞ filtering for linear switched systems with average dwell time

    Science.gov (United States)

    Wang, Bo; Zhang, Hongbin; Wang, Gang; Dang, Chuangyin

    2016-09-01

    This paper is concerned with the H∞ filtering problem for a class of continuous-time linear switched systems with the asynchronous behaviours, where 'asynchronous' means that the switching of the filters to be designed has a lag to the switching of the system modes. By using the Lyapunov-like functions and the average dwell time technique, a sufficient condition is obtained to guarantee the asymptotic stability with a weighted H∞ performance index for the filtering error system. Moreover, the results are formulated in the form of linear matrix inequalities that are numerical feasible. As a result, the filter design problem is solved. Finally, an illustrative numerical example is presented to show the effectiveness of the results.

  17. Distributed embedded controller development with petri nets application to globally-asynchronous locally-synchronous systems

    CERN Document Server

    Moutinho, Filipe de Carvalho

    2016-01-01

    This book describes a model-based development approach for globally-asynchronous locally-synchronous distributed embedded controllers.  This approach uses Petri nets as modeling formalism to create platform and network independent models supporting the use of design automation tools.  To support this development approach, the Petri nets class in use is extended with time-domains and asynchronous-channels. The authors’ approach uses models not only providing a better understanding of the distributed controller and improving the communication among the stakeholders, but also to be ready to support the entire lifecycle, including the simulation, the verification (using model-checking tools), the implementation (relying on automatic code generators), and the deployment of the distributed controller into specific platforms. Uses a graphical and intuitive modeling formalism supported by design automation tools; Enables verification, ensuring that the distributed controller was correctly specified; Provides flex...

  18. A 0.6-V 8.3-ENOB asynchronous SAR ADC for biomedical applications

    International Nuclear Information System (INIS)

    A microwatt asynchronous successive approximation register (SAR) analog-to-digital converter (ADC) is presented. The supply voltage of the SAR ADC is decreased to 0.6 V to fit the low voltage and low power requirements of biomedical systems. The tail capacitor of the DAC array is reused for least significant bit conversion to decrease the total DAC capacitance thus reducing the power. Asynchronous control logic avoids the high frequency clock generator and further reduces the power consumption. The prototype ADC is fabricated with a standard 0.18 μm CMOS technology. Experimental results show that it achieves an ENOB of 8.3 bit at a 300-kS/s sampling rate. Very low power consumption of 3.04 μW is achieved, resulting in a figure of merit of 32 fJ/conv.-step. (semiconductor integrated circuits)

  19. Asynchronous Magnetic Bead Rotation (AMBR Microviscometer for Label-Free DNA Analysis

    Directory of Open Access Journals (Sweden)

    Yunzi Li

    2014-03-01

    Full Text Available We have developed a label-free viscosity-based DNA detection system, using paramagnetic beads as an asynchronous magnetic bead rotation (AMBR microviscometer. We have demonstrated experimentally that the bead rotation period is linearly proportional to the viscosity of a DNA solution surrounding the paramagnetic bead, as expected theoretically. Simple optical measurement of asynchronous microbead motion determines solution viscosity precisely in microscale volumes, thus allowing an estimate of DNA concentration or average fragment length. The response of the AMBR microviscometer yields reproducible measurement of DNA solutions, enzymatic digestion reactions, and PCR systems at template concentrations across a 5000-fold range. The results demonstrate the feasibility of viscosity-based DNA detection using AMBR in microscale aqueous volumes.

  20. A Proficient Design of Hybrid Synchronous and Asynchronous Digital FIR Filter using FPGA

    Directory of Open Access Journals (Sweden)

    B.Paulchamy

    2012-07-01

    Full Text Available In this paper, a hybrid synchronous and asynchronous digital FIR filter is designed and implemented in FPGA using VHDL. The digital FIR filter of high throughput, low latency operating at above 1.3 GHz was designed. An adaptive high capacity pipelined was introduced in the hybrid synchronous asynchronous design of the filter. The degree of the pipelining is dynamically variable depending upon the input. Concurrent execution of software or program can be achieved in FPGA through parallel processing. The designed digital FIR filter is simulated using ModelSim and implemented using Xilinx. The simulation results are presented for different order such as 3, 6 and 15. The FIR filter designed is synthesized in Xilinx 9.1i and the device utilization report is presented for filter of order 3, 6 and 15.

  1. 基于Javascript的异步编程分析%Javascript-based Asynchronous Programming Analysis

    Institute of Scientific and Technical Information of China (English)

    陈浩

    2015-01-01

    异步编程带来的问题在客户端Javascript中并不明显,但随着服务器端Javascript越来越广的被使用,大量的异步IO操作使得该问题变得明显。许多不同的方法都可以解决这个问题,本文针对此问题讨论了一些方法。%Asynchronous programming problems caused by the client Javascript is not obvious, but with the server-side Javascript is used more widely, a large number of asynchronous IO operation so that the problem becomes apparent. Many different methods can solve this problem, this paper discusses some of the ways this problem.

  2. Dual stator winding variable speed asynchronous generator: optimal design and experiments

    Science.gov (United States)

    Tutelea, L. N.; Deaconu, S. I.; Popa, G. N.

    2015-06-01

    In the present paper is carried out a theoretical and experimental study of dual stator winding squirrel cage asynchronous generator (DSWA) behavior in the presence of saturation regime (non-sinusoidal) due to the variable speed operation. The main aims are the determination of the relations of calculating the equivalent parameters of the machine windings to optimal design using a Matlab code. Issue is limited to three phase range of double stator winding cage-induction generator of small sized powers, the most currently used in the small adjustable speed wind or hydro power plants. The tests were carried out using three-phase asynchronous generator having rated power of 6 [kVA].

  3. The Combine Effect of Synchronous and Asynchronous E-Learning on Distance Education

    Directory of Open Access Journals (Sweden)

    Iqrar Ahmad

    2013-01-01

    Full Text Available The aim of this paper is to highlight the combine effect of synchronous as well as asynchronous in E-learning environment. Both type of learning have importance in different scenario. Not one of them can fulfill whole requirement individually. Synchronous training is done in real-time with a live instructor facilitating the training. Everyone logs in at a set time and can communicate directly with the instructor and with each other. It lasts for a set amount of time - from a single session to several weeks, months or even years. Asynchronous is e-learning in the more traditional sense of the word. It involves self-paced learning, CD-ROM-based, Network-based, Intranet-based or Internet-based. It may include access to instructors through on-line bulletin boards, on-line discussion groups and e-mail.

  4. Extended ℋ∞ Estimation for Two-Dimensional Markov Jump Systems under Asynchronous Switching

    Directory of Open Access Journals (Sweden)

    Rui Zhang

    2013-01-01

    Full Text Available This paper is concerned with the problem of designing ℋ∞ filters for a class of two-dimensional (2D Markov jump systems under asynchronous switching. The problem under consideration is primarily motivated by a realistic situation that the switching of candidate filters may have a lag to the switching of system modes. Different from conventional techniques, by a suitable augmentation, the jumping process of the error system is represented by a two-component Markov chain. Then, the extended transition probabilities are provided for the error system. A stochastic Lyapunov function approach is proposed for the design of desired filters that ensure a prescribed ℋ∞ performance for admissible asynchronous switching. Finally, a numerical example is given to illustrate the effectiveness of the developed method.

  5. Asynchronous update based networked predictive control system using a novel proactive compensation strategy.

    Science.gov (United States)

    Duan, Yingyao; Zuo, Xin; Liu, Jianwei

    2016-01-01

    Networked predictive control system (NPCS) has been proposed to address random delays and data dropouts in networked control systems (NCSs). A remaining challenge of this approach is that the controller has uncertain information about the actual control inputs, which leads to the predicted control input errors. The main contribution of this paper is to develop an explicit mechanism running in the distributed network nodes asynchronously, which enables the controller node to keep informed of the states of the actuator node without a priori knowledge about the network. Based on this mechanism, a novel proactive compensation strategy is proposed to develop asynchronous update based networked predictive control system (AUBNPCS). The stability criterion of AUBNPCS is derived analytically. A simulation experiment based on Truetime demonstrates the effectiveness of the scheme. PMID:26582090

  6. Application of Artificial Intelligence Techniques for the Control of the Asynchronous Machine

    Directory of Open Access Journals (Sweden)

    F. Khammar

    2016-01-01

    Full Text Available The induction machine is experiencing a growing success for two decades by gradually replacing the DC machines and synchronous in many industrial applications. This paper is devoted to the study of advanced methods applied to the command of the asynchronous machine in order to obtain a system of control of high performance. While the criteria for response time, overtaking, and static error can be assured by the techniques of conventional control, the criterion of robustness remains a challenge for researchers. This criterion can be satisfied only by applying advanced techniques of command. After mathematical modeling of the asynchronous machine, it defines the control strategies based on the orientation of the rotor flux. The results of the different simulation tests highlight the properties of robustness of algorithms proposed and suggested to compare the different control strategies.

  7. Analysis of an FBMC/OQAM scheme for asynchronous access in wireless communications

    Science.gov (United States)

    Mattera, Davide; Tanda, Mario; Bellanger, Maurice

    2015-12-01

    The OFDM/OQAM transceiver belongs to the filter-bank-based multicarrier (FBMC) family and, unlike OFDM schemes, it is particularly able to meet the requirements of the physical layer of cognitive radio networks such as high level of adjacent channel leakage ratio and asynchronous communications. The paper proposes and analyzes a new implementation structure, named frequency spreading, for the OFDM/OQAM transceiver. On flat channels, it is equivalent to the standard one in terms of input-output relations, though more complex. On multipath channels, it offers a crucial advantage in terms of equalization, which is performed in the frequency domain, leading to high performance and no additional delay. With its flexibility and level of performance, the analyzed scheme has the potential to outperform OFDM in the asynchronous access context and in cognitive radio networks.

  8. Desynchronization of neocortical networks by asynchronous release of GABA at autaptic and synaptic contacts from fast-spiking interneurons.

    Directory of Open Access Journals (Sweden)

    Frédéric Manseau

    Full Text Available Networks of specific inhibitory interneurons regulate principal cell firing in several forms of neocortical activity. Fast-spiking (FS interneurons are potently self-inhibited by GABAergic autaptic transmission, allowing them to precisely control their own firing dynamics and timing. Here we show that in FS interneurons, high-frequency trains of action potentials can generate a delayed and prolonged GABAergic self-inhibition due to sustained asynchronous release at FS-cell autapses. Asynchronous release of GABA is simultaneously recorded in connected pyramidal (P neurons. Asynchronous and synchronous autaptic release show differential presynaptic Ca(2+ sensitivity, suggesting that they rely on different Ca(2+ sensors and/or involve distinct pools of vesicles. In addition, asynchronous release is modulated by the endogenous Ca(2+ buffer parvalbumin. Functionally, asynchronous release decreases FS-cell spike reliability and reduces the ability of P neurons to integrate incoming stimuli into precise firing. Since each FS cell contacts many P neurons, asynchronous release from a single interneuron may desynchronize a large portion of the local network and disrupt cortical information processing.

  9. The Flipped Classroom: A Modality for Mixed Asynchronous and Synchronous Learning in a Residency Program

    OpenAIRE

    Young, Timothy P.; Bailey, Caleb J.; Guptill, Mindi; Thorp, Andrea W.; Thomas, Tamara L

    2014-01-01

    Introduction: A “flipped classroom” educational model exchanges the traditional format of a classroom lecture and homework problem set. We piloted two flipped classroom sessions in our emergency medicine (EM) residency didactic schedule. We aimed to learn about resident and faculty impressions of the sessions, in order to develop them as a regular component of our residency curriculum. Methods: We evaluated residents’ impression of the asynchronous video component and sy...

  10. Asynchronous and Synchronous Communication in College English Writing in Web-based Learning Environment

    Institute of Scientific and Technical Information of China (English)

    丁洁

    2009-01-01

    In web-based learning environment,College English writing has always been a thorny issue.Here both asynchronous and synchronous communications in college English writing mean the new interactive teaching belief. This paper attempts to do the blending of two in the traditional writing learning and teaching in college English in order to promote a more flexible,efficient and interactive learning environment in accordance with students' interests and needs.

  11. Asynchronous and Synchronous Communication in College English Writing in Web-based Learning Environment

    Institute of Scientific and Technical Information of China (English)

    丁洁

    2009-01-01

    In web-based learning environment,College English writing has always been a thorny issue.Here both asynchronous and synchronous communications in college English writing mean the new interactive teaching belief. This paper attempts to do the blending of two in the traditional writing learning and teaching in college English in order to promote a more flexible, efficient and interactive learning environment in accordance with students' interests and needs.

  12. Punctuated equilibrium in thoroughbred evolution and its model based on asynchronous clocks

    International Nuclear Information System (INIS)

    Evolutionary patterns of thoroughbreds are estimated in terms of distribution of life-spans, avalanche size of extinction and lineage size. All of them show power-law distribution with exponent of -2.0, and show the characteristics of a particular evolutionary pattern called punctuated equilibrium. In addition, we propose a model based on modulation among asynchronous clocks to explain this kind of power-law distribution

  13. Punctuated equilibrium in thoroughbred evolution and its model based on asynchronous clocks

    Energy Technology Data Exchange (ETDEWEB)

    Takachi, Yasuhiro; Gunji, Yukio-Pegio

    2004-02-01

    Evolutionary patterns of thoroughbreds are estimated in terms of distribution of life-spans, avalanche size of extinction and lineage size. All of them show power-law distribution with exponent of -2.0, and show the characteristics of a particular evolutionary pattern called punctuated equilibrium. In addition, we propose a model based on modulation among asynchronous clocks to explain this kind of power-law distribution.

  14. A New Parallel Algorithm in Power Flow Calculation: Dynamic Asynchronous Parallel Algorithm

    Institute of Scientific and Technical Information of China (English)

    2000-01-01

    Based on the general methods in power flow calculation of power system and onconceptions and classifications of parallel algorithm, a new approach named DynamicAsynchronous Parallel Algorithm that applies to the online analysis and real-time dispatching and controlling of large-scale power network was put forward in this paper. Its performances of high speed and dynamic following have been verified on IEEE-14 bus system.

  15. Cut Reduction in Linear Logic as Asynchronous Session-Typed Communication

    OpenAIRE

    DeYoung, Henry; Caires, Luís; Pfenning, Frank; Toninho, Bernardo

    2012-01-01

    Prior work has shown that intuitionistic linear logic can be seen as a session-type discipline for the pi-calculus, where cut reduction in the sequent calculus corresponds to synchronous process reduction. In this paper, we exhibit a new process assignment from the asynchronous, polyadic pi-calculus to exactly the same proof rules. Proof-theoretically, the difference between these interpretations can be understood through permutations of inference rules that preserve observ...

  16. MODELING OF SYMMETRIC THREE-PHASE ASYNCHRONOUS ELECTRIC MOTOR IN ASYMMETRIC CONNECTION TO NETWORK

    Directory of Open Access Journals (Sweden)

    V. I. Lukovnikov

    2005-01-01

    Full Text Available The paper shows how to solve the problem concerning reveal of changes in mathematical models and electric parameters of symmetric three-phase short-circuited asynchronous electric motors in case of their connection to single- or two-phase network in comparison with their connection to three-phase network. The uniform methodological approach permitting to generalize the known data and receive new results is offered in the paper.

  17. Using Team-Based Learning in an Online, Asynchronous Information Literacy Course

    OpenAIRE

    Allison Hosier

    2013-01-01

    Making information literacy instruction engaging to learners can be a challenge. Making it engaging in an online, asynchronous setting can be even more daunting. As students seek more opportunities for online learning, it’s becoming increasingly important to develop information literacy instruction that will promote engagement and enhance learning in the online environment. Team-Based Learning is a method of instruction that has transformed the atmosphere of a face-to-face information literac...

  18. Synaptotagmin-7 is an asynchronous calcium sensor for synaptic transmission in neurons expressing SNAP-23.

    Directory of Open Access Journals (Sweden)

    Jens P Weber

    Full Text Available Synchronization of neurotransmitter release with the presynaptic action potential is essential for maintaining fidelity of information transfer in the central nervous system. However, synchronous release is frequently accompanied by an asynchronous release component that builds up during repetitive stimulation, and can even play a dominant role in some synapses. Here, we show that substitution of SNAP-23 for SNAP-25 in mouse autaptic glutamatergic hippocampal neurons results in asynchronous release and a higher frequency of spontaneous release events (mEPSCs. Use of neurons from double-knock-out (SNAP-25, synaptotagmin-7 mice in combination with viral transduction showed that SNAP-23-driven release is triggered by endogenous synaptotagmin-7. In the absence of synaptotagmin-7 release became even more asynchronous, and the spontaneous release rate increased even more, indicating that synaptotagmin-7 acts to synchronize release and suppress spontaneous release. However, compared to synaptotagmin-1, synaptotagmin-7 is a both leaky and asynchronous calcium sensor. In the presence of SNAP-25, consequences of the elimination of synaptotagmin-7 were small or absent, indicating that the protein pairs SNAP-25/synaptotagmin-1 and SNAP-23/synaptotagmin-7 might act as mutually exclusive calcium sensors. Expression of fusion proteins between pHluorin (pH-sensitive GFP and synaptotagmin-1 or -7 showed that vesicles that fuse using the SNAP-23/synaptotagmin-7 combination contained synaptotagmin-1, while synaptotagmin-7 barely displayed activity-dependent trafficking between vesicle and plasma membrane, implying that it acts as a plasma membrane calcium sensor. Overall, these findings support the idea of alternative syt∶SNARE combinations driving release with different kinetics and fidelity.

  19. Research of methods of providing of temporal transparency of asynchronous TK network

    OpenAIRE

    Нашат, Галеб Саммур Альбдур

    2011-01-01

    Work is devoted development and research of new methods of indemnification of jittera by the additional delay of barns in the buffer of knot of commutation at the different levels of his load for providing of sentinel transparency of asynchronous telecommunication networks. The method of calculation of indexes of sentinel transparency of network is offered, which takes into account necessary quality of service traffic and allows to forecast the mean value of delay an...

  20. A Novel Approach to Asynchronous MVP Data Interpretation Based on Elliptical-Vectors

    Science.gov (United States)

    Kruglyakov, M.; Trofimov, I.; Korotaev, S.; Shneyer, V.; Popova, I.; Orekhova, D.; Scshors, Y.; Zhdanov, M. S.

    2014-12-01

    We suggest a novel approach to asynchronous magnetic-variation profiling (MVP) data interpretation. Standard method in MVP is based on the interpretation of the coefficients of linear relation between vertical and horizontal components of the measured magnetic field.From mathematical point of view this pair of linear coefficients is not a vector which leads to significant difficulties in asynchronous data interpretation. Our approach allows us to actually treat such a pair of complex numbers as a special vector called an ellipse-vector (EV). By choosing the particular definitions of complex length and direction, the basic relation of MVP can be considered as the dot product. This considerably simplifies the interpretation of asynchronous data. The EV is described by four real numbers: the values of major and minor semiaxes, the angular direction of the major semiaxis and the phase. The notation choice is motivated by historical reasons. It is important that different EV's components have different sensitivity with respect to the field sources and the local heterogeneities. Namely, the value of major semiaxis and the angular direction are mostly determined by the field source and the normal cross-section. On the other hand, the value of minor semiaxis and the phase are responsive to local heterogeneities. Since the EV is the general form of complex vector, the traditional Schmucker vectors can be explicitly expressed through its components.The proposed approach was successfully applied to interpretation the results of asynchronous measurements that had been obtained in the Arctic Ocean at the drift stations "North Pole" in 1962-1976.