WorldWideScience

Sample records for asynchronous multiparty computation

  1. Asynchronous Multiparty Computation

    DEFF Research Database (Denmark)

    Damgård, Ivan Bjerre; Geisler, Martin; Krøigaard, Mikkel;

    2009-01-01

    We propose an asynchronous protocol for general multiparty computation. The protocol has perfect security and communication complexity  where n is the number of parties, |C| is the size of the arithmetic circuit being computed, and k is the size of elements in the underlying field. The protocol...... multithreading. Benchmarking of a VIFF implementation of our protocol confirms that it is applicable to practical non-trivial secure computations....

  2. Asynchronous Multi-Party Computation with Quadratic Communication

    DEFF Research Database (Denmark)

    Hirt, Martin; Nielsen, Jesper Buus; Przydatek, Bartosz

    2008-01-01

    We present an efficient protocol for secure multi-party computation in the asynchronous model with optimal resilience. For n parties, up to t < n/3 of them being corrupted, and security parameter κ, a circuit with c gates can be securely computed with communication complexity O(cn^2k) bits, which...

  3. Batch Secret Sharing for Secure Multi-party Computation in Asynchronous Network

    Institute of Scientific and Technical Information of China (English)

    HUANG Zheng; GONG Zheng; LI Qiang

    2009-01-01

    This paper proposes an efficient batch secret sharing protocol among n players resilient to t < n/4 players in asynchronous network. The construction of our protocol is along the line of Hirt's protocol which works in synchronous model. Compared with the method of using secret share protocol m times to share m secrets, our protocol is quite efficient. The protocol can be used to improve the efficiency of secure multi-party computation (MPC) greatly in asynchronous network.

  4. Multiparty Computations

    DEFF Research Database (Denmark)

    Dziembowski, Stefan

    In this thesis we study a problem of doing Verifiable Secret Sharing (VSS) and Multiparty Computations in a model where private channels between the players and a broadcast channel is available. The adversary is active, adaptive and has an unbounded computing power. The thesis is based on two...... impossibility result indicating that a similar equivalence does not hold for Multiparty Computation (MPC): we show that even if protocols are given black-box access for free to an idealized secret sharing scheme secure for the access structure in question, it is not possible to handle all relevant access...... here and discuss other problems caused by the adaptiveness. All protocols in the thesis are formally specified and the proofs of their security are given. [1]Ronald Cramer, Ivan Damgård, Stefan Dziembowski, Martin Hirt, and Tal Rabin. Efficient multiparty computations with dishonest minority. In...

  5. Multiparty Cloud Computation

    OpenAIRE

    Zheng, Qingji; Zhang, Xinwen

    2012-01-01

    With the increasing popularity of the cloud, clients oursource their data to clouds in order to take advantage of unlimited virtualized storage space and the low management cost. Such trend prompts the privately oursourcing computation, called \\emph{multiparty cloud computation} (\\MCC): Given $k$ clients storing their data in the cloud, how can they perform the joint functionality by contributing their private data as inputs, and making use of cloud's powerful computation capability. Namely, ...

  6. Multi-party Quantum Computation

    CERN Document Server

    Smith, A

    2001-01-01

    We investigate definitions of and protocols for multi-party quantum computing in the scenario where the secret data are quantum systems. We work in the quantum information-theoretic model, where no assumptions are made on the computational power of the adversary. For the slightly weaker task of verifiable quantum secret sharing, we give a protocol which tolerates any t < n/4 cheating parties (out of n). This is shown to be optimal. We use this new tool to establish that any multi-party quantum computation can be securely performed as long as the number of dishonest players is less than n/6.

  7. Secure Multiparty Computation Goes Live

    DEFF Research Database (Denmark)

    Bøgetoft, Peter; Lund Christensen, Dan; Damgård, Ivan Bjerre;

    2009-01-01

    In this note, we report on the first large-scale and practical application of secure multiparty computation, which took place in January 2008. We also report on the novel cryptographic protocols that were used. This work was supported by the Danish Strategic Research Council and the European...... Commision. Tomas Toft’s work was partially performed at Aarhus University. In Holland, he was supported by the research program Sentinels, financed by Technology Foundation STW, the Netherlands Organization for Scientific Research (NWO), and the Dutch Ministry of Economic Affairs....

  8. Multiparty Computation from Threshold Homomorphic Encryption

    DEFF Research Database (Denmark)

    Cramer, Ronald; Damgård, Ivan Bjerre; Nielsen, Jesper Buus

    We introduce a new approach to multiparty computation (MPC) basing it on homomorphic threshold crypto-systems. We show that given keys for any sufficiently efficient system of this type, general MPC protocols for n parties can be devised which are secure against an active adversary that corrupts...

  9. Robust Multiparty Computation with Linear Communication Complexity

    DEFF Research Database (Denmark)

    Hirt, Martin; Nielsen, Jesper Buus

    We present a robust multiparty computation protocol. The protocol is for the cryptographic model with open channels and a poly-time adversary, and allows n parties to actively securely evaluate any poly-sized circuit with resilience t < n/2. The total communication complexity in bits over the poi...

  10. Zero-Knowledge Protocols and Multiparty Computation

    DEFF Research Database (Denmark)

    Pastro, Valerio

    This thesis presents results in two branches of cryptography. In the first part we construct two general multiparty computation protocols that can evaluate any arithmetic circuit over a finite field. Both are built in the preprocessing model and achieve active security in the setting of a dishone...... communication complexity, while the construction over the integers improves the state of the art both in terms of communication complexity and in the security requirements (it requires factoring instead of the strong RSA assumption)....

  11. Secure Multiparty Quantum Computation for Summation and Multiplication.

    Science.gov (United States)

    Shi, Run-hua; Mu, Yi; Zhong, Hong; Cui, Jie; Zhang, Shun

    2016-01-01

    As a fundamental primitive, Secure Multiparty Summation and Multiplication can be used to build complex secure protocols for other multiparty computations, specially, numerical computations. However, there is still lack of systematical and efficient quantum methods to compute Secure Multiparty Summation and Multiplication. In this paper, we present a novel and efficient quantum approach to securely compute the summation and multiplication of multiparty private inputs, respectively. Compared to classical solutions, our proposed approach can ensure the unconditional security and the perfect privacy protection based on the physical principle of quantum mechanics. PMID:26792197

  12. Efficient Multi-Party Computation over Rings

    DEFF Research Database (Denmark)

    Cramer, Ronald; Fehr, Serge; Ishai, Yuval;

    2003-01-01

    Secure multi-party computation (MPC) is an active research area, and a wide range of literature can be found nowadays suggesting improvements and generalizations of existing protocols in various directions. However, all current techniques for secure MPC apply to functions that are represented by...... usefulness of the above results by presenting a novel application of MPC over (non-field) rings to the round-efficient secure computation of the maximum function. Basic Research in Computer Science (www.brics.dk), funded by the Danish National Research Foundation....

  13. Confidential benchmarking based on multiparty computation

    DEFF Research Database (Denmark)

    Damgård, Ivan Bjerre; Damgård, Kasper Lyneborg; Nielsen, Kurt;

    We report on the design and implementation of a system that uses multiparty computation to enable banks to benchmark their customers' confidential performance data against a large representative set of confidential performance data from a consultancy house. The system ensures that both the banks......' and the consultancy house's data stays confidential, the banks as clients learn nothing but the computed benchmarking score. In the concrete business application, the developed prototype help Danish banks to find the most efficient customers among a large and challenging group of agricultural customers with too much...

  14. Scalable and Unconditionally Secure Multiparty Computation

    DEFF Research Database (Denmark)

    Damgård, Ivan Bjerre; Nielsen, Jesper Buus

    2007-01-01

    We present a multiparty computation protocol that is unconditionally secure against adaptive and active adversaries, with communication complexity O(Cn)k+O(Dn^2)k+poly(nk), where C is the number of gates in the circuit, n is the number of parties, k is the bit-length of the elements of the field...... over which the computation is carried out, D is the multiplicative depth of the circuit, and κ is the security parameter. The corruption threshold is t < n/3. For passive security the corruption threshold is t < n/2 and the communication complexity is O(nC)k. These are the first unconditionally secure...... protocols where the part of the communication complexity that depends on the circuit size is linear in n. We also present a protocol with threshold t < n/2 and complexity O(Cn)k+poly(n\\kappa) based on a complexity assumption which, however, only has to hold during the execution of the protocol – that is...

  15. Secure data structures based on multi-party computation

    DEFF Research Database (Denmark)

    Toft, Tomas

    2011-01-01

    This work considers data structures based on multi-party computation (MPC) primitives: structuring secret (e.g. secret shared and potentially unknown) data such that it can both be queried and updated efficiently. Implementing an oblivious RAM (ORAM) using MPC allows any existing data structure...

  16. Peer-to-Peer Secure Multi-Party Numerical Computation

    CERN Document Server

    Bickson, Danny; Dolev, Danny; Pinkas, Benny

    2008-01-01

    We propose an efficient framework for enabling secure multi-party numerical computations in a Peer-to-Peer network. This problem arises in a range of applications such as collaborative filtering, distributed computation of trust and reputation, monitoring and numerous other tasks, where the computing nodes would like to preserve the privacy of their inputs while performing a joint computation of a certain function. Although there is a rich literature in the field of distributed systems security concerning secure multi-party computation, in practice it is hard to deploy those methods in very large scale Peer-to-Peer networks. In this work, we examine several possible approaches and discuss their feasibility. Among the possible approaches, we identify a single approach which is both scalable and theoretically secure. An additional novel contribution is that we show how to compute the neighborhood based collaborative filtering, a state-of-the-art collaborative filtering algorithm, winner of the Netflix progress ...

  17. Inherit Differential Privacy in Distributed Setting: Multiparty Randomized Function Computation

    OpenAIRE

    Wu, Genqiang; He, Yeping; Wu, Jingzheng; Xia, Xianyao

    2016-01-01

    How to achieve differential privacy in the distributed setting, where the dataset is distributed among the distrustful parties, is an important problem. We consider in what condition can a protocol inherit the differential privacy property of a function it computes. The heart of the problem is the secure multiparty computation of randomized function. A notion \\emph{obliviousness} is introduced, which captures the key security problems when computing a randomized function from a deterministic ...

  18. Two-Cloud-Servers-Assisted Secure Outsourcing Multiparty Computation

    OpenAIRE

    Yi Sun; Qiaoyan Wen; Yudong Zhang; Hua Zhang; Zhengping Jin; Wenmin Li

    2014-01-01

    We focus on how to securely outsource computation task to the cloud and propose a secure outsourcing multiparty computation protocol on lattice-based encrypted data in two-cloud-servers scenario. Our main idea is to transform the outsourced data respectively encrypted by different users’ public keys to the ones that are encrypted by the same two private keys of the two assisted servers so that it is feasible to operate on the transformed ciphertexts to compute an encrypted result following th...

  19. Scalable Multiparty Computation with Nearly Optimal Work and Resilience

    DEFF Research Database (Denmark)

    Damgård, Ivan Bjerre; Krøigaard, Mikkel; Ishai, Yuval;

    2008-01-01

    We present the first general protocol for secure multiparty computation in which the total amount of work required by n players to compute a function f grows only polylogarithmically with n (ignoring an additive term that depends on n but not on the complexity of f). Moreover, the protocol is als...... nearly optimal in terms of resilience, providing computational security against an active, adaptive adversary corrupting a (1/2 − ε) fraction of the players, for an arbitrary ε> 0....

  20. Universally Composable Efficient Multiparty Computation from Threshold Homomorphic Encryption

    DEFF Research Database (Denmark)

    Damgård, Ivan Bjerre; Nielsen, Jesper Buus

    We present a new general multiparty computation protocol for the cryptographic scenario which is universally composable — in particular, it is secure against an active and adaptive adversary, corrupting any minority of the parties. The protocol is as efficient as the best known statically secure...... solutions, in particular the number of bits broadcast (which dominates the complexity) is Ω (nk |C|), where n is the number of parties, k is a security parameter, and |C| is the size of a circuit doing the desired computation. Unlike previous adaptively secure protocols for the cryptographic model, our...

  1. A Domain-Specific Programming Language for Secure Multiparty Computation

    DEFF Research Database (Denmark)

    Nielsen, Janus Dam; Schwartzbach, Michael Ignatieff

    2007-01-01

    We present a domain-specific programming language for Secure Multiparty Computation (SMC). Information is a resource of vital importance and considerable economic value to individuals, public administration, and private companies. This means that the confidentiality of information is crucial, but...... at the same time significant value can often be obtained by combining confidential information from various sources. This fundamental conflict between the benefits of confidentiality and the benefits of information sharing may be overcome using the cryptographic method of SMC where computations are...

  2. Universally Composable Multiparty Computation with Partially Isolated Parties

    DEFF Research Database (Denmark)

    Damgård, Ivan Bjerre; Nielsen, Jesper Buus; Wichs, Daniel

    2009-01-01

    assume that a player (Alice) can partially isolate another player (Bob) for a brief portion of the computation and prevent Bob from communicating more than some limited number of bits with the environment. For example, isolation might be achieved by asking Bob to put his functionality on a tamper......It is well known that universally composable multiparty computation cannot, in general, be achieved in the standard model without setup assumptions when the adversary can corrupt an arbitrary number of players. One way to get around this problem is by having a trusted third party generate some......-proof hardware token and assuming that Alice can prevent this token from communicating to the outside world. Alternatively, Alice may interact with Bob directly but in a special office which she administers and where there are no high-bandwidth communication channels to the outside world. We show that, under...

  3. Secure multi-party computation solution to Yao's millionaires' problem based on set-inclusion

    Institute of Scientific and Technical Information of China (English)

    LI Shundong; DAI Yiqi; YOU Qiyou

    2005-01-01

    Secure multi-party computation is a focus of international cryptography in recent years. Protocols for Yao's millionaires' problem have become an important building block of many secure multi-party computation protocols. Their efficiency are crucial to the efficiency of many secure multi-party computation protocols. Unfortunately, known protocols for Yao's millionaires' problem have high computational complexity or communication complexity. In this study, based on the 1-out-of-m oblivious transfer and set-inclusion problem, we propose a new protocol to solve this problem. This new protocol is very efficient in terms of both computational and communication complexities. Its privacy-preserving property is also proved by simulation paradigm which is generally accepted in the study of secure multi-party computation. We also compare the information leakage of our new protocol and the known protocols.

  4. Two-Cloud-Servers-Assisted Secure Outsourcing Multiparty Computation

    Science.gov (United States)

    Wen, Qiaoyan; Zhang, Hua; Jin, Zhengping; Li, Wenmin

    2014-01-01

    We focus on how to securely outsource computation task to the cloud and propose a secure outsourcing multiparty computation protocol on lattice-based encrypted data in two-cloud-servers scenario. Our main idea is to transform the outsourced data respectively encrypted by different users' public keys to the ones that are encrypted by the same two private keys of the two assisted servers so that it is feasible to operate on the transformed ciphertexts to compute an encrypted result following the function to be computed. In order to keep the privacy of the result, the two servers cooperatively produce a custom-made result for each user that is authorized to get the result so that all authorized users can recover the desired result while other unauthorized ones including the two servers cannot. Compared with previous research, our protocol is completely noninteractive between any users, and both of the computation and the communication complexities of each user in our solution are independent of the computing function. PMID:24982949

  5. Two-cloud-servers-assisted secure outsourcing multiparty computation.

    Science.gov (United States)

    Sun, Yi; Wen, Qiaoyan; Zhang, Yudong; Zhang, Hua; Jin, Zhengping; Li, Wenmin

    2014-01-01

    We focus on how to securely outsource computation task to the cloud and propose a secure outsourcing multiparty computation protocol on lattice-based encrypted data in two-cloud-servers scenario. Our main idea is to transform the outsourced data respectively encrypted by different users' public keys to the ones that are encrypted by the same two private keys of the two assisted servers so that it is feasible to operate on the transformed ciphertexts to compute an encrypted result following the function to be computed. In order to keep the privacy of the result, the two servers cooperatively produce a custom-made result for each user that is authorized to get the result so that all authorized users can recover the desired result while other unauthorized ones including the two servers cannot. Compared with previous research, our protocol is completely noninteractive between any users, and both of the computation and the communication complexities of each user in our solution are independent of the computing function. PMID:24982949

  6. Two-Cloud-Servers-Assisted Secure Outsourcing Multiparty Computation

    Directory of Open Access Journals (Sweden)

    Yi Sun

    2014-01-01

    Full Text Available We focus on how to securely outsource computation task to the cloud and propose a secure outsourcing multiparty computation protocol on lattice-based encrypted data in two-cloud-servers scenario. Our main idea is to transform the outsourced data respectively encrypted by different users’ public keys to the ones that are encrypted by the same two private keys of the two assisted servers so that it is feasible to operate on the transformed ciphertexts to compute an encrypted result following the function to be computed. In order to keep the privacy of the result, the two servers cooperatively produce a custom-made result for each user that is authorized to get the result so that all authorized users can recover the desired result while other unauthorized ones including the two servers cannot. Compared with previous research, our protocol is completely noninteractive between any users, and both of the computation and the communication complexities of each user in our solution are independent of the computing function.

  7. A Glance at Secure Multiparty Computation for Privacy Preserving Data Mining

    Directory of Open Access Journals (Sweden)

    Dr. Durgesh Kumar Mishra

    2009-11-01

    Full Text Available In this paper, we provide an overview of the new and rapidly emerging research area of Secure Multiparty Computation (SMC. We also propose several existing as well as new SMC problems along with some solutions. It provides detailed overview of work done so far in this area and a brief evaluation and conclusion about SMC. SMC literally means: Secure- Safety concerns for data security and integrity of individual organizations. Multiparty- Involving multiple organizations/parties for Privacy Preserving Data Mining (PPDM. Computations- Any global operations. Therefore, keeping them together, it is a mechanism to provide collaborate computations of multiple organizations without revealing data of individual organization.

  8. (Unconditional) Secure Multiparty Computation with Man-in-the-middle Attacks

    CERN Document Server

    Vaya, Shailesh

    2010-01-01

    In secure multi-party computation $n$ parties jointly evaluate an $n$-variate function $f$ in the presence of an adversary which can corrupt up till $t$ parties. Almost all the works that have appeared in the literature so far assume the presence of authenticated channels between the parties. This assumption is far from realistic. Two directions of research have been borne from relaxing this (strong) assumption: (a) The adversary is virtually omnipotent and can control all the communication channels in the network, (b) Only a partially connected topology of authenticated channels is guaranteed and adversary controls a subset of the communication channels in the network. This work introduces a new setting for (unconditional) secure multiparty computation problem which is an interesting intermediate model with respect to the above well studied models from the literature (by sharing a salient feature from both the above models). We consider the problem of (unconditional) secure multi-party computation when 'some...

  9. Computing by Temporal Order: Asynchronous Cellular Automata

    Directory of Open Access Journals (Sweden)

    Michael Vielhaber

    2012-08-01

    Full Text Available Our concern is the behaviour of the elementary cellular automata with state set 0,1 over the cell set Z/nZ (one-dimensional finite wrap-around case, under all possible update rules (asynchronicity. Over the torus Z/nZ (n<= 11,we will see that the ECA with Wolfram rule 57 maps any v in F_2^n to any w in F_2^n, varying the update rule. We furthermore show that all even (element of the alternating group bijective functions on the set F_2^n = 0,...,2^n-1, can be computed by ECA57, by iterating it a sufficient number of times with varying update rules, at least for n <= 10. We characterize the non-bijective functions computable by asynchronous rules.

  10. Peer-to-Peer Secure Multi-Party Numerical Computation Facing Malicious Adversaries

    CERN Document Server

    Bickson, Danny; Dolev, Danny; Pinkas, Benny

    2009-01-01

    We propose an efficient framework for enabling secure multi-party numerical computations in a Peer-to-Peer network. This problem arises in a range of applications such as collaborative filtering, distributed computation of trust and reputation, monitoring and other tasks, where the computing nodes is expected to preserve the privacy of their inputs while performing a joint computation of a certain function. Although there is a rich literature in the field of distributed systems security concerning secure multi-party computation, in practice it is hard to deploy those methods in very large scale Peer-to-Peer networks. In this work, we try to bridge the gap between theoretical algorithms in the security domain, and a practical Peer-to-Peer deployment. We consider two security models. The first is the semi-honest model where peers correctly follow the protocol, but try to reveal private information. We provide three possible schemes for secure multi-party numerical computation for this model and identify a singl...

  11. A Modified ck-Secure Sum Protocol for Multi-Party Computation

    CERN Document Server

    Sheikh, Rashid; Mishra, Durgesh Kumar

    2010-01-01

    Secure Multi-Party Computation (SMC) allows multiple parties to compute some function of their inputs without disclosing the actual inputs to one another. Secure sum computation is an easily understood example and the component of the various SMC solutions. Secure sum computation allows parties to compute the sum of their individual inputs without disclosing the inputs to one another. In this paper, we propose a modified version of our ck-Secure Sum protocol with more security when a group of the computing parties conspire to know the data of some party.

  12. Comment on ''Secure multiparty computation with a dishonest majority via quantum means''

    International Nuclear Information System (INIS)

    In a recent paper [K. Loukopoulos and D. E. Browne, Phys. Rev. A 81, 062336 (2010)], five schemes for secure multiparty computation utilizing the Greenberger-Horne-Zeilinger (GHZ) quantum correlation were presented, which were claimed to be secure in some kinds of security models. However, this study points out that schemes C and D2 could be attacked by corrupted parties replacing photon and exchanging classical information.

  13. A Distributed k-Secure Sum Protocol for Secure Multi-Party Computations

    CERN Document Server

    Sheikh, Rashid; Mishra, Durgesh Kumar

    2010-01-01

    Secure sum computation of private data inputs is an interesting example of Secure Multiparty Computation (SMC) which has attracted many researchers to devise secure protocols with lower probability of data leakage. In this paper, we provide a novel protocol to compute the sum of individual data inputs with zero probability of data leakage when two neighbor parties collude to know the data of a middle party. We break the data block of each party into number of segments and redistribute the segments among parties before the computation. These entire steps create a scenario in which it becomes impossible for semi honest parties to know the private data of some other party.

  14. Experimental realization of an entanglement access network and secure multi-party computation.

    Science.gov (United States)

    Chang, X-Y; Deng, D-L; Yuan, X-X; Hou, P-Y; Huang, Y-Y; Duan, L-M

    2016-01-01

    To construct a quantum network with many end users, it is critical to have a cost-efficient way to distribute entanglement over different network ends. We demonstrate an entanglement access network, where the expensive resource, the entangled photon source at the telecom wavelength and the core communication channel, is shared by many end users. Using this cost-efficient entanglement access network, we report experimental demonstration of a secure multiparty computation protocol, the privacy-preserving secure sum problem, based on the network quantum cryptography. PMID:27404561

  15. Experimental realization of secure multi-party computation in an entanglement access to network

    CERN Document Server

    Chang, X Y; Yuan, X X; Hou, P Y; Huang, Y Y; Duan, L M

    2015-01-01

    To construct a quantum network with many end users, it is critical to have a cost-efficient way to distribute entanglement over different network ends. We demonstrate an entanglement access network, where the expensive resource, the entangled photon source at the telecom wavelength and the core communication channel, is shared by many end users. Using this cost-efficient entanglement access network, we report experimental demonstration of a secure multiparty computation protocol, the privacy-preserving secure sum problem, based on the network quantum cryptography.

  16. High-performance secure multi-party computation for data mining applications

    DEFF Research Database (Denmark)

    Bogdanov, Dan; Niitsoo, Margus; Toft, Tomas;

    2012-01-01

    -world benchmarks. Sharemind is a secure multi-party computation framework designed with real-life efficiency in mind. It has been applied in several practical scenarios, and from these experiments, new requirements have been identified. Firstly, large datasets require more efficient protocols for standard...... operations such as multiplication and comparison. Secondly, the confidential processing of financial data requires the use of more complex primitives, including a secure division operation. This paper describes new protocols in the Sharemind model for secure multiplication, share conversion, equality, bit...

  17. Experimental realization of an entanglement access network and secure multi-party computation

    Science.gov (United States)

    Chang, X.-Y.; Deng, D.-L.; Yuan, X.-X.; Hou, P.-Y.; Huang, Y.-Y.; Duan, L.-M.

    2016-07-01

    To construct a quantum network with many end users, it is critical to have a cost-efficient way to distribute entanglement over different network ends. We demonstrate an entanglement access network, where the expensive resource, the entangled photon source at the telecom wavelength and the core communication channel, is shared by many end users. Using this cost-efficient entanglement access network, we report experimental demonstration of a secure multiparty computation protocol, the privacy-preserving secure sum problem, based on the network quantum cryptography.

  18. A Secure Multi-Party Computation Protocol for Malicious Computation Prevention for preserving privacy during Data Mining

    CERN Document Server

    Mishra, Dr Durgesh Kumar; Kapoor, Nikhil; Bahety, Ravish

    2009-01-01

    Secure Multi-Party Computation (SMC) allows parties with similar background to compute results upon their private data, minimizing the threat of disclosure. The exponential increase in sensitive data that needs to be passed upon networked computers and the stupendous growth of internet has precipitated vast opportunities for cooperative computation, where parties come together to facilitate computations and draw out conclusions that are mutually beneficial; at the same time aspiring to keep their private data secure. These computations are generally required to be done between competitors, who are obviously weary of each-others intentions. SMC caters not only to the needs of such parties but also provides plausible solutions to individual organizations for problems like privacy-preserving database query, privacy-preserving scientific computations, privacy-preserving intrusion detection and privacy-preserving data mining. This paper is an extension to a previously proposed protocol Encrytpo_Random, which prese...

  19. Breaking the O(nm) Bit Barrier: Secure Multiparty Computation with a Static Adversary

    CERN Document Server

    Dani, Varsha; Movahedi, Mahnush; Saia, Jared

    2012-01-01

    We describe scalable algorithms for secure multiparty computation (SMPC). We assume a synchronous message passing communication model, but unlike most related work, we do not assume the existence of a broadcast channel. Our main result holds for the case where there are n players, of which a (1/3-\\epsilon)-fraction are controlled by an adversary, for \\epsilon, any positive constant. We describe a SMPC algorithm for this model that requires each player to send O((n+m)/n + \\sqrt{n}) (where the O notation hides polylogarithmic factors) messages and perform O((n+m)/n + \\sqrt{n}) computations to compute any function f, where m is the size of a circuit to compute f. We also consider a model where all players are selfish but rational. In this model, we describe a Nash equilibrium protocol that solve SMPC and requires each player to send O((n+m)/n) messages and perform O((n+m)/n) computations. These results significantly improve over past results for SMPC which require each player to send a number of bits and perform...

  20. Comment on ''Secure multiparty computation with a dishonest majority via quantum means''

    Energy Technology Data Exchange (ETDEWEB)

    Li Yanbing [State Key Laboratory of Networking and Switching Technology, Beijing University of Posts and Telecommunications, Beijing, 100876 (China); Beijing Electronic Science and Technology Institute, Beijing 100070 (China); Wen Qiaoyan; Qin Sujuan [State Key Laboratory of Networking and Switching Technology, Beijing University of Posts and Telecommunications, Beijing, 100876 (China)

    2011-07-15

    In a recent paper [K. Loukopoulos and D. E. Browne, Phys. Rev. A 81, 062336 (2010)], five schemes for secure multiparty computation utilizing the Greenberger-Horne-Zeilinger (GHZ) quantum correlation were presented, which were claimed to be secure in some kinds of security models. However, this study points out that schemes C and D2 could be attacked by corrupted parties replacing photon and exchanging classical information.

  1. Asynchronous replica exchange software for grid and heterogeneous computing

    Science.gov (United States)

    Gallicchio, Emilio; Xia, Junchao; Flynn, William F.; Zhang, Baofeng; Samlalsingh, Sade; Mentes, Ahmet; Levy, Ronald M.

    2015-11-01

    Parallel replica exchange sampling is an extended ensemble technique often used to accelerate the exploration of the conformational ensemble of atomistic molecular simulations of chemical systems. Inter-process communication and coordination requirements have historically discouraged the deployment of replica exchange on distributed and heterogeneous resources. Here we describe the architecture of a software (named ASyncRE) for performing asynchronous replica exchange molecular simulations on volunteered computing grids and heterogeneous high performance clusters. The asynchronous replica exchange algorithm on which the software is based avoids centralized synchronization steps and the need for direct communication between remote processes. It allows molecular dynamics threads to progress at different rates and enables parameter exchanges among arbitrary sets of replicas independently from other replicas. ASyncRE is written in Python following a modular design conducive to extensions to various replica exchange schemes and molecular dynamics engines. Applications of the software for the modeling of association equilibria of supramolecular and macromolecular complexes on BOINC campus computational grids and on the CPU/MIC heterogeneous hardware of the XSEDE Stampede supercomputer are illustrated. They show the ability of ASyncRE to utilize large grids of desktop computers running the Windows, MacOS, and/or Linux operating systems as well as collections of high performance heterogeneous hardware devices.

  2. On the theoretical gap between synchronous and asynchronous MPC protocols

    DEFF Research Database (Denmark)

    Beerliová-Trubíniová, Zuzana; Hirt, Martin; Nielsen, Jesper Buus

    2010-01-01

    Multiparty computation (MPC) protocols among n parties secure against t active faults are known to exist if and only if t < n/2, when the channels are synchronous, and t < n/3, when the channels are asynchronous, respectively.   In this work we analyze the gap between these bounds, and show that in...... the cryptographic setting (with setup), the sole reason for it is the distribution of inputs: given an oracle for input distribution, cryptographically-secure asynchronous MPC is possible with the very same condition as synchronous MPC, namely t < n/2. We do not know whether the gaps in other security...

  3. Multiparty Equality Function Computation in Networks with Point-to-Point Links

    CERN Document Server

    Liang, Guanfeng

    2010-01-01

    In this report, we study the multiparty communication complexity problem of the multiparty equality function (MEQ): EQ(x_1,...,x_n) = 1 if x_1=...=x_n, and 0 otherwise. The input vector (x_1,...,x_n) is distributed among n>=2 nodes, with x_i known to node i, where x_i is chosen from the set {1,...,M}, for some integer M>0. Instead of the "number on the forehand" model, we consider a point-to-point communication model (similar to the message passing model), which we believe is more realistic in networking settings. We assume a synchronous fully connected network of n nodes, the node IDs (identifiers) are common knowledge. We assume that all point-to-point communication channels/links are private such that when a node transmits, only the designated recipient can receive the message. The identity of the sender is known to the recipient. We demonstrate that traditional techniques generalized from two-party communication complexity problem are not sufficient to obtain tight bounds under the point-to-point communic...

  4. Students experiences with collaborative learning in asynchronous computer-supported collaborative learning environments.

    OpenAIRE

    Dewiyanti, Silvia; Brand-Gruwel, Saskia; Jochems, Wim; Broers, Nick

    2008-01-01

    Dewiyanti, S., Brand-Gruwel, S., Jochems, W., & Broers, N. (2007). Students experiences with collaborative learning in asynchronous computer-supported collaborative learning environments. Computers in Human Behavior, 23, 496-514.

  5. Integrating Asynchronous Digital Design Into the Computer Engineering Curriculum

    Science.gov (United States)

    Smith, S. C.; Al-Assadi, W. K.; Di, J.

    2010-01-01

    As demand increases for circuits with higher performance, higher complexity, and decreased feature size, asynchronous (clockless) paradigms will become more widely used in the semiconductor industry, as evidenced by the International Technology Roadmap for Semiconductors' (ITRS) prediction of a likely shift from synchronous to asynchronous design…

  6. Abstractions for asynchronous distributed computing with malicious players

    OpenAIRE

    Vukolic, Marko; Guerraoui, Rachid

    2009-01-01

    In modern distributed systems, failures are the norm rather than the exception. In many cases, these failures are not benign. Settings such as the Internet might incur malicious (also called Byzantine or arbitrary) behavior and asynchrony. As a result, and perhaps not surprisingly, research on asynchronous Byzantine fault-tolerant (BFT) distributed systems is flourishing. Tolerating arbitrary behavior and asynchrony calls for very sophisticated algorithms. This is in particular the case with ...

  7. An Examination of Computer Engineering Students' Perceptions about Asynchronous Discussion Forums

    Science.gov (United States)

    Ozyurt, Ozcan; Ozyurt, Hacer

    2013-01-01

    This study was conducted in order to reveal the usage profiles and perceptions of Asynchronous Discussion Forums (ADFs) of 126 computer engineering students from the Computer Engineering Department in a university in Turkey. By using a mixed methods research design both quantitative and qualitative data were collected and analyzed. Research…

  8. Unconditionally Secure Constant-Rounds Multi-party Computation for Equality, Comparison, Bits and Exponentiation

    DEFF Research Database (Denmark)

    Damgård, Ivan Bjerre; Nielsen, Jesper Buus; Toft, Tomas;

    2006-01-01

    We show that if a set of players hold shares of a value aFp for some prime p (where the set of shares is written [a] p ), it is possible to compute, in constant rounds and with unconditional security, sharings of the bits of a, i.e., compute sharings [a 0] p , ..., [a ℓ− − 1] p such that ℓ = ⌈ log2...

  9. A Model for Evaluating the Process of Learning in Asynchronous Computer Conferencing.

    Science.gov (United States)

    Schrire, Sarah

    2003-01-01

    Presents a qualitative multiple-case study of three online asynchronous computer conferences that were part of a doctoral program at Nova Southeastern University. Examines the learning process from the points of view of interaction, cognition, and discourse analysis and proposes a model for assessing sociocognitive processes in computer…

  10. Research Notes ~ Simulating the Computer Science Closed Laboratory in an Asynchronous Learning Network

    Directory of Open Access Journals (Sweden)

    Timothy Margush

    2002-10-01

    Full Text Available The quiz tool that is part of the WebCT package is used to provide an asynchronous simulation of a (synchronous closed laboratory experience to beginner computer science students. The technique suggested in this paper and which may be applied to other disciplines, offers students a guided path through an exploratory, discovery based learning experience.

  11. THE ROLE OF OFFLINE METALANGUAGE TALK IN ASYNCHRONOUS COMPUTER-MEDIATED COMMUNICATION

    Directory of Open Access Journals (Sweden)

    Keiko Kitade

    2008-02-01

    Full Text Available In order to demonstrate how learners utilize the text-based asynchronous attributes of the Bulletin Board System, this study explored Japanese-as-a-second-language learners' metalanguage episodes (Swain & Lapkin, 1995, 1998 in offline verbal peer speech and online asynchronous discussions with their Japanese key pals. The findings suggest the crucial role of offline collaborative dialogue, the interactional modes in which the episodes occur, and the unique discourse structure of metalanguage episodes concerning online and offline interactions. A high score on the posttest also suggests the high retention of linguistic knowledge constructed through offline peer dialogue. In the offline mode, the learners were able to collaboratively construct knowledge with peers in the stipulated time, while simultaneously focusing on task content in the online interaction. The retrospective interviews and questionnaires reveal the factors that could affect the benefits of the asynchronous computer-mediated communication medium for language learning.

  12. Asynchronous P300 classification in a reactive brain-computer interface during an outlier detection task

    Science.gov (United States)

    Krumpe, Tanja; Walter, Carina; Rosenstiel, Wolfgang; Spüler, Martin

    2016-08-01

    Objective. In this study, the feasibility of detecting a P300 via an asynchronous classification mode in a reactive EEG-based brain-computer interface (BCI) was evaluated. The P300 is one of the most popular BCI control signals and therefore used in many applications, mostly for active communication purposes (e.g. P300 speller). As the majority of all systems work with a stimulus-locked mode of classification (synchronous), the field of applications is limited. A new approach needs to be applied in a setting in which a stimulus-locked classification cannot be used due to the fact that the presented stimuli cannot be controlled or predicted by the system. Approach. A continuous observation task requiring the detection of outliers was implemented to test such an approach. The study was divided into an offline and an online part. Main results. Both parts of the study revealed that an asynchronous detection of the P300 can successfully be used to detect single events with high specificity. It also revealed that no significant difference in performance was found between the synchronous and the asynchronous approach. Significance. The results encourage the use of an asynchronous classification approach in suitable applications without a potential loss in performance.

  13. Distance Based Asynchronous Recovery Approach In Mobile Computing Environment

    Directory of Open Access Journals (Sweden)

    Yogita Khatri,

    2012-06-01

    Full Text Available A mobile computing system is a distributed system in which at least one of the processes is mobile. They are constrained by lack of stable storage, low network bandwidth, mobility, frequent disconnection andlimited battery life. Checkpointing is one of the commonly used techniques to provide fault tolerance in mobile computing environment. In order to suit the mobile environment a distance based recovery schemeis proposed which is based on checkpointing and message logging. After the system recovers from failures, only the failed processes rollback and restart from their respective recent checkpoints, independent of the others. The salient feature of this scheme is to reduce the transfer and recovery cost. While the mobile host moves with in a specific range, recovery information is not moved and thus only be transferred nearby if the mobile host moves out of certain range.

  14. Tiling and Asynchronous Communication Optimizations for Stencil Computations

    KAUST Repository

    Malas, Tareq

    2015-12-07

    The importance of stencil-based algorithms in computational science has focused attention on optimized parallel implementations for multilevel cache-based processors. Temporal blocking schemes leverage the large bandwidth and low latency of caches to accelerate stencil updates and approach theoretical peak performance. A key ingredient is the reduction of data traffic across slow data paths, especially the main memory interface. Most of the established work concentrates on updating separate cache blocks per thread, which works on all types of shared memory systems, regardless of whether there is a shared cache among the cores. This approach is memory-bandwidth limited in several situations, where the cache space for each thread can be too small to provide sufficient in-cache data reuse. We introduce a generalized multi-dimensional intra-tile parallelization scheme for shared-cache multicore processors that results in a significant reduction of cache size requirements and shows a large saving in memory bandwidth usage compared to existing approaches. It also provides data access patterns that allow efficient hardware prefetching. Our parameterized thread groups concept provides a controllable trade-off between concurrency and memory usage, shifting the pressure between the memory interface and the Central Processing Unit (CPU).We also introduce efficient diamond tiling structure for both shared memory cache blocking and distributed memory relaxed-synchronization communication, demonstrated using one-dimensional domain decomposition. We describe the approach and our open-source testbed implementation details (called Girih), present performance results on contemporary Intel processors, and apply advanced performance modeling techniques to reconcile the observed performance with hardware capabilities. Furthermore, we conduct a comparison with the state-of-the-art stencil frameworks PLUTO and Pochoir in shared memory, using corner-case stencil operators. We study the

  15. Self-calibration algorithm in an asynchronous P300-based brain-computer interface

    Science.gov (United States)

    Schettini, F.; Aloise, F.; Aricò, P.; Salinari, S.; Mattia, D.; Cincotti, F.

    2014-06-01

    Objective. Reliability is a desirable characteristic of brain-computer interface (BCI) systems when they are intended to be used under non-experimental operating conditions. In addition, their overall usability is influenced by the complex and frequent procedures that are required for configuration and calibration. Earlier studies examined the issue of asynchronous control in P300-based BCIs, introducing dynamic stopping and automatic control suspension features. This report proposes and evaluates an algorithm for the automatic recalibration of the classifier's parameters using unsupervised data. Approach. Ten healthy subjects participated in five P300-based BCI sessions throughout a single day. First, we examined whether continuous adaptation of control parameters improved the accuracy of the asynchronous system over time. Then, we assessed the performance of the self-calibration algorithm with respect to the no-recalibration and supervised calibration conditions with regard to system accuracy and communication efficiency. Main results. Offline tests demonstrated that continuous adaptation of the control parameters significantly increased the communication efficiency of asynchronous P300-based BCIs. The self-calibration algorithm correctly assigned labels to unsupervised data with 95% accuracy, effecting communication efficiency that was comparable with that of supervised repeated calibration. Significance. Although additional online tests that involve end-users under non-experimental conditions are needed, these preliminary results are encouraging, from which we conclude that the self-calibration algorithm is a promising solution to improve P300-based BCI usability and reliability.

  16. Asynchronous Computer-Mediated Corrective Feedback
And The Correct Use Of Prepositions: Is It Really Effective?

    OpenAIRE

    Seyyed Behrooz HOSSEINI

    2012-01-01

    An area that has recently attracted increasing attention is providing feedback on learners’ writing accuracy through the Internet. However, research in this area has largely focused on synchronous communication, i.e., chatting, with fewer studies assessing asynchronous technologies, i.e., e-mailing. Therefore, this study investigates the effectiveness of asynchronous computer-mediated corrective feedback-explicit and implicit, on increasing the correct use of prepositions. Forty-five Iranian ...

  17. APFA: Asynchronous Parallel Finite Automaton for Deep Packet Inspection in Cloud Computing

    Science.gov (United States)

    Li, Yang; Li, Zheng; Yu, Nenghai; Ma, Ke

    Security in cloud computing is getting more and more important recently. Besides passive defense such as encryption, it is necessary to implement real-time active monitoring, detection and defense in the cloud. According to the published researches, DPI (deep packet inspection) is the most effective technology to realize active inspection and defense. However, most recent works of DPI aim at space reduction but could not meet the demands of high speed and stability in the cloud. So, it is important to improve regular methods of DPI, making it more suitable for cloud computing. In this paper, an asynchronous parallel finite automaton named APFA is proposed, by introducing the asynchronous parallelization and the heuristically forecast mechanism, which significantly decreases the time consumed in matching while still keeps reducing the memory required. What is more, APFA is immune to the overlapping problem so that the stability is also enhanced. The evaluation results show that APFA achieves higher stability, better performance on time and memory. In short, APFA is more suitable for cloud computing.

  18. Quantum secret sharing between multiparty and multiparty with entanglement swapping

    Institute of Scientific and Technical Information of China (English)

    2008-01-01

    A quantum secret sharing (QSS) protocol between multiparty and multiparty is proposed, based on Greenberger-Horne- Zeilinger (GHZ) state. The protocol utilizes quantum Fourier transform and entanglement swapping to achieve a high intrinsic efficiency and source capacity. Then, the security of this protocol against some possible eavesdropping strategies has been analyzed. Furthermore, the presented protocol is generalized to the d-level case.

  19. Multiparty Symmetric Sum Types

    DEFF Research Database (Denmark)

    Nielsen, Lasse; Yoshida, Nobuko; Honda, Kohei

    2010-01-01

    determining how the session proceeds, the symmetric sum type represents a choice made by agreement among all the participants of a session. Such behaviour can be found in many practical systems, including collaborative workflow in healthcare systems for clinical practice guidelines (CPGs). Processes with the......This paper introduces a new theory of multiparty session types based on symmetric sum types, by which we can type non-deterministic orchestration choice behaviours. While the original branching type in session types can represent a choice made by a single participant and accepted by others...

  20. Computationally Efficient Blind Code Synchronization for Asynchronous DS-CDMA Systems with Adaptive Antenna Arrays

    Directory of Open Access Journals (Sweden)

    Chia-Chang Hu

    2005-04-01

    Full Text Available A novel space-time adaptive near-far robust code-synchronization array detector for asynchronous DS-CDMA systems is developed in this paper. There are the same basic requirements that are needed by the conventional matched filter of an asynchronous DS-CDMA system. For the real-time applicability, a computationally efficient architecture of the proposed detector is developed that is based on the concept of the multistage Wiener filter (MWF of Goldstein and Reed. This multistage technique results in a self-synchronizing detection criterion that requires no inversion or eigendecomposition of a covariance matrix. As a consequence, this detector achieves a complexity that is only a linear function of the size of antenna array (J, the rank of the MWF (M, the system processing gain (N, and the number of samples in a chip interval (S, that is, 𝒪(JMNS. The complexity of the equivalent detector based on the minimum mean-squared error (MMSE or the subspace-based eigenstructure analysis is a function of 𝒪((JNS3. Moreover, this multistage scheme provides a rapid adaptive convergence under limited observation-data support. Simulations are conducted to evaluate the performance and convergence behavior of the proposed detector with the size of the J-element antenna array, the amount of the L-sample support, and the rank of the M-stage MWF. The performance advantage of the proposed detector over other DS-CDMA detectors is investigated as well.

  1. Automatic analysis of multiparty meetings

    Indian Academy of Sciences (India)

    Steve Renals

    2011-10-01

    This paper is about the recognition and interpretation of multiparty meetings captured as audio, video and other signals. This is a challenging task since the meetings consist of spontaneous and conversational interactions between a number of participants: it is a multimodal, multiparty, multistream problem. We discuss the capture and annotation of the Augmented Multiparty Interaction (AMI) meeting corpus, the development of a meeting speech recognition system, and systems for the automatic segmentation, summarization and social processing of meetings, together with some example applications based on these systems.

  2. Online retrieval of patient information by asynchronous communication between general purpose computer and stand-alone personal computer

    International Nuclear Information System (INIS)

    Asynchronous communication was made between host (FACOM M-340) and personal computer (OLIBETTIE S-2250) to get patient's information required for RIA test registration. The retrieval system consists of a keyboad input of six numeric codes, patient's ID, and a real time reply containing six parameters for the patient. Their identified parameters are patient's name, sex, date of birth (include area), department, and out- or inpatient. Linking this program to RIA registration program for individual patient, then, operator can input name of RIA test requested. Our simple retrieval program made a useful data network between different types of host and stand-alone personal computers, and enabled us accurate and labor-saving registration for RIA test. (author)

  3. [Online retrieval of patient information by asynchronous communication between a general purpose computer and a stand-alone personal computer].

    Science.gov (United States)

    Tsutsumi, R; Takahashi, K; Sato, T; Komatani, A; Yamaguchi, K

    1988-03-01

    Asynchronous communication was made between host (FACOM M-340) and personal computer (OLIBETTIE S-2250) to get patient's information required for RIA test registration. The retrieval system consists of a keyboard input of six numeric codes, patient's ID, and a real time reply containing six parameters for the patient. Their identified parameters are patient's name, sex, date of birth (include area), department, and out- or inpatient. Linking this program to RIA registration program for individual patient, then, operator can input name of RIA test requested. Our simple retrieval program made a useful data network between different types of host and stand-alone personal computers, and enabled us accurate and labor-saving registration for RIA test. PMID:3387606

  4. The Role of Offline Metalanguage Talk in Asynchronous Computer-Mediated Communication

    Science.gov (United States)

    Kitade, Keiko

    2008-01-01

    In order to demonstrate how learners utilize the text-based asynchronous attributes of the Bulletin Board System, this study explored Japanese-as-a-second-language learners' metalanguage episodes (Swain & Lapkin, 1995, 1998) in offline verbal peer speech and online asynchronous discussions with their Japanese key pals. The findings suggest the…

  5. Student Participation and Interactivity Using Asynchronous Computer-Mediated Communication for Resolution of an Undergraduate Capstone Management Case Study

    OpenAIRE

    Miller, Paulette J.

    2012-01-01

    Online discussion activities are designed for computer-mediated learning activities in face-to-face, hybrid, and totally online courses. The use of asynchronous computer-mediated communication (A-CMC) coupled with authentic workplace case studies provides students in the protected learning environment with opportunities to practice workplace decision making and communication. In this study, communication behaviors of transmitter and receiver were analyzed to determine participation and intera...

  6. VASA: Interactive Computational Steering of Large Asynchronous Simulation Pipelines for Societal Infrastructure.

    Science.gov (United States)

    Ko, Sungahn; Zhao, Jieqiong; Xia, Jing; Afzal, Shehzad; Wang, Xiaoyu; Abram, Greg; Elmqvist, Niklas; Kne, Len; Van Riper, David; Gaither, Kelly; Kennedy, Shaun; Tolone, William; Ribarsky, William; Ebert, David S

    2014-12-01

    We present VASA, a visual analytics platform consisting of a desktop application, a component model, and a suite of distributed simulation components for modeling the impact of societal threats such as weather, food contamination, and traffic on critical infrastructure such as supply chains, road networks, and power grids. Each component encapsulates a high-fidelity simulation model that together form an asynchronous simulation pipeline: a system of systems of individual simulations with a common data and parameter exchange format. At the heart of VASA is the Workbench, a visual analytics application providing three distinct features: (1) low-fidelity approximations of the distributed simulation components using local simulation proxies to enable analysts to interactively configure a simulation run; (2) computational steering mechanisms to manage the execution of individual simulation components; and (3) spatiotemporal and interactive methods to explore the combined results of a simulation run. We showcase the utility of the platform using examples involving supply chains during a hurricane as well as food contamination in a fast food restaurant chain. PMID:26356899

  7. Hybrid EEG-fNIRS Asynchronous Brain-Computer Interface for Multiple Motor Tasks.

    Directory of Open Access Journals (Sweden)

    Alessio Paolo Buccino

    Full Text Available Non-invasive Brain-Computer Interfaces (BCI have demonstrated great promise for neuroprosthetics and assistive devices. Here we aim to investigate methods to combine Electroencephalography (EEG and functional Near-Infrared Spectroscopy (fNIRS in an asynchronous Sensory Motor rhythm (SMR-based BCI. We attempted to classify 4 different executed movements, namely, Right-Arm-Left-Arm-Right-Hand-Left-Hand tasks. Previous studies demonstrated the benefit of EEG-fNIRS combination. However, since normally fNIRS hemodynamic response shows a long delay, we investigated new features, involving slope indicators, in order to immediately detect changes in the signals. Moreover, Common Spatial Patterns (CSPs have been applied to both EEG and fNIRS signals. 15 healthy subjects took part in the experiments and since 25 trials per class were available, CSPs have been regularized with information from the entire population of participants and optimized using genetic algorithms. The different features have been compared in terms of performance and the dynamic accuracy over trials shows that the introduced methods diminish the fNIRS delay in the detection of changes.

  8. Learning Together: A Positieve Experience.The effect of reflection on group processes in an asynchronous computer-supported collaboratieve learning environment.

    NARCIS (Netherlands)

    Dewiyanti, Silvia

    2007-01-01

    Dewiyanti, S. (2005).Learning Together: A Positieve Experience.The effect of reflection on group processes in an asynchronous computer-supported collaboratieve learning environment. Unpublished doctoral dissertation. Open University of the Netherlands, The Netherlands.

  9. Quantum secret sharing between multiparty and multiparty with four states

    Institute of Scientific and Technical Information of China (English)

    YAN; FengLi; GAO; Ting; LI; YouCheng

    2007-01-01

    A protocol of quantum secret sharing between multiparty and multiparty with four states was presented. It was shown that this protocol can nullify the Trojan horse attack with a multi-photon signal, the fake-signal attack with Einstein-Podolsky- Rosen pairs, the attack with single photons, and the attack with invisible photons. In addition, the upper bounds of the average success probabilities were given for dishonest agent eavesdropping encryption using the fake-signal attack with any two-particle entangled states.

  10. Multiparty Symmetric Sum Types

    Directory of Open Access Journals (Sweden)

    Lasse Nielsen

    2010-11-01

    Full Text Available This paper introduces a new theory of multiparty session types based on symmetric sum types, by which we can type non-deterministic orchestration choice behaviours. While the original branching type in session types can represent a choice made by a single participant and accepted by others determining how the session proceeds, the symmetric sum type represents a choice made by agreement among all the participants of a session. Such behaviour can be found in many practical systems, including collaborative workflow in healthcare systems for clinical practice guidelines (CPGs. Processes using the symmetric sums can be embedded into the original branching types using conductor processes. We show that this type-driven embedding preserves typability, satisfies semantic soundness and completeness, and meets the encodability criteria adapted to the typed setting. The theory leads to an efficient implementation of a prototypical tool for CPGs which automatically translates the original CPG specifications from a representation called the Process Matrix to symmetric sum types, type checks programs and executes them.

  11. Identity formation in multiparty negotiations.

    Science.gov (United States)

    Swaab, Roderick I; Postmes, Tom; Spears, Russell

    2008-03-01

    Based on the recently proposed Interactive Model of Identity Formation, we examine how top-down deductive and bottom-up inductive identity formations influence intentions and behaviour in multiparty negotiations. Results show that a shared identity can be deduced from the social context through recognition of superordinate similarities. However, shared identities can also be induced by intragroup processes in which individuals get acquainted with one another on an interpersonal basis. Both top-down and bottom-up processes led to the formation of a sense of shared identity, and this in turn exerted a positive influence on behavioural intentions and actual behaviour in multiparty negotiations. PMID:17588289

  12. Anonymity to Promote Peer Feedback: Pre-Service Teachers' Comments in Asynchronous Computer-Mediated Communication

    Science.gov (United States)

    Howard, Craig D.; Barrett, Andrew F.; Frick, Theodore W.

    2010-01-01

    In this quasi-experimental case study, we compared five sections of a basic undergraduate technology course. Within an asynchronous web forum, pre-service teachers wrote short critiques of websites designed by their classmates. This peer feedback was provided anonymously by students in two classes (n = 35) whereas providers and recipients of peer…

  13. Identity formation in multiparty negotiations

    NARCIS (Netherlands)

    Swaab, R; Postmes, T.; Spears, R.

    2008-01-01

    Based on the recently proposed Interactive Model of Identity Formation, we examine how top-down deductive and bottom-up inductive identity formations influence intentions and behaviour in multiparty negotiations. Results show that a shared identity can be deduced from the social context through reco

  14. XMPP for cloud computing in bioinformatics supporting discovery and invocation of asynchronous web services

    Directory of Open Access Journals (Sweden)

    Willighagen Egon L

    2009-09-01

    Full Text Available Abstract Background Life sciences make heavily use of the web for both data provision and analysis. However, the increasing amount of available data and the diversity of analysis tools call for machine accessible interfaces in order to be effective. HTTP-based Web service technologies, like the Simple Object Access Protocol (SOAP and REpresentational State Transfer (REST services, are today the most common technologies for this in bioinformatics. However, these methods have severe drawbacks, including lack of discoverability, and the inability for services to send status notifications. Several complementary workarounds have been proposed, but the results are ad-hoc solutions of varying quality that can be difficult to use. Results We present a novel approach based on the open standard Extensible Messaging and Presence Protocol (XMPP, consisting of an extension (IO Data to comprise discovery, asynchronous invocation, and definition of data types in the service. That XMPP cloud services are capable of asynchronous communication implies that clients do not have to poll repetitively for status, but the service sends the results back to the client upon completion. Implementations for Bioclipse and Taverna are presented, as are various XMPP cloud services in bio- and cheminformatics. Conclusion XMPP with its extensions is a powerful protocol for cloud services that demonstrate several advantages over traditional HTTP-based Web services: 1 services are discoverable without the need of an external registry, 2 asynchronous invocation eliminates the need for ad-hoc solutions like polling, and 3 input and output types defined in the service allows for generation of clients on the fly without the need of an external semantics description. The many advantages over existing technologies make XMPP a highly interesting candidate for next generation online services in bioinformatics.

  15. Quantum channel capacities: Multiparty communication

    Science.gov (United States)

    Demianowicz, Maciej; Horodecki, Paweł

    2006-10-01

    We analyze different aspects of multiparty communication over quantum memoryless channels and generalize some of the key results known from bipartite channels to the multiparty scenario. In particular, we introduce multiparty versions of subspace and entanglement transmission fidelities. We also provide alternative, local, versions of fidelities and show their equivalence to the global ones in context of capacity regions defined. An equivalence of two different capacity notions with respect to two types of fidelities is proven. In analogy to the bipartite case it is shown, via sufficiency of isometric encoding theorem, that additional classical forward side channel does not increase capacity region of any quantum channel with k senders and m receivers which represents a compact unit of general quantum networks theory. The result proves that recently provided capacity region of a multiple access channel [M. Horodecki , Nature 436, 673 (2005); J. Yard , e-print quant-ph/0501045], is optimal also in a scenario of an additional support of forward classical communication.

  16. Efficient multiparty quantum key agreement protocol based on commutative encryption

    Science.gov (United States)

    Sun, Zhiwei; Huang, Jiwu; Wang, Ping

    2016-05-01

    A secure multiparty quantum key agreement protocol using single-qubit states is proposed. The agreement key is computed by performing exclusive-OR operation on all the participants' secret keys. Based on the commutative property of the commutative encryption, the exclusive-OR operation can be performed on the plaintext in the encrypted state without decrypting it. Thus, it not only protects the final shared key, but also reduces the complexity of the computation. The efficiency of the proposed protocol, compared with previous multiparty QKA protocols, is also improved. In the presented protocol, entanglement states, joint measurement and even the unitary operations are not needed, and only rotation operations and single-state measurement are required, which are easier to be realized with current technology.

  17. A Two-Stage State Recognition Method for Asynchronous SSVEP-Based Brain-Computer Interface System

    Institute of Scientific and Technical Information of China (English)

    ZHANG Zimu; DENG Zhidong

    2013-01-01

    A two-stage state recognition method is proposed for asynchronous SSVEP (steady-state visual evoked potential) based brain-computer interface (SBCI) system.The two-stage method is composed of the idle state (IS) detection and control state (CS) discrimination modules.Based on blind source separation and continuous wavelet transform techniques,the proposed method integrates functions of multi-electrode spatial filtering and feature extraction.In IS detection module,a method using the ensemble IS feature is proposed.In CS discrimination module,the ensemble CS feature is designed as feature vector for control intent classification.Further,performance comparisons are investigated among our IS detection module and other existing ones.Also the experimental results validate the satisfactory performance of our CS discrimination module.

  18. Redundant Asynchronous Microprocessor System

    Science.gov (United States)

    Meyer, G.; Johnston, J. O.; Dunn, W. R.

    1985-01-01

    Fault-tolerant computer structure called RAMPS (for redundant asynchronous microprocessor system) has simplicity of static redundancy but offers intermittent-fault handling ability of complex, dynamically redundant systems. New structure useful wherever several microprocessors are employed for control - in aircraft, industrial processes, robotics, and automatic machining, for example.

  19. Asynchronous P300 BCI

    DEFF Research Database (Denmark)

    Panicker, Rajesh; Puthusserypady, Sadasivan; Sun, Ying

    2010-01-01

    An asynchronous hybrid brain-computer interface (BCI) system combining the P300 and steady-state visually evoked potentials (SSVEP) paradigms is introduced. A P300 base system is used for information transfer, and is augmented to include SSVEP for control state detection. The proposed system has...

  20. Entanglement swapping secures multiparty quantum communication

    International Nuclear Information System (INIS)

    Extending the eavesdropping strategy devised by Zhang, Li, and Guo [Zhang, Li, and Guo, Phys. Rev. A 63, 036301 (2001)], we show that the multiparty quantum communication protocol based on entanglement swapping, which was proposed by Cabello (e-print quant-ph/0009025), is not secure. We modify the protocol so that entanglement swapping can secure multiparty quantum communication, such as multiparty quantum key distribution and quantum secret sharing of classical information, and show that the modified protocol is secure against the Zhang-Li-Guo strategy for eavesdropping as well as the basic intercept-resend attack

  1. Enhancing robustness of multiparty quantum correlations using weak measurement

    Energy Technology Data Exchange (ETDEWEB)

    Singh, Uttam, E-mail: uttamsingh@hri.res.in [Quantum Information and Computation Group, Harish-Chandra Research Institute, Chhatnag Road, Jhunsi, Allahabad 211 019 (India); Mishra, Utkarsh, E-mail: utkarsh@hri.res.in [Quantum Information and Computation Group, Harish-Chandra Research Institute, Chhatnag Road, Jhunsi, Allahabad 211 019 (India); Dhar, Himadri Shekhar, E-mail: dhar.himadri@gmail.com [School of Physical Sciences, Jawaharlal Nehru University, New Delhi 110067 (India)

    2014-11-15

    Multipartite quantum correlations are important resources for the development of quantum information and computation protocols. However, the resourcefulness of multipartite quantum correlations in practical settings is limited by its fragility under decoherence due to environmental interactions. Though there exist protocols to protect bipartite entanglement under decoherence, the implementation of such protocols for multipartite quantum correlations has not been sufficiently explored. Here, we study the effect of local amplitude damping channel on the generalized Greenberger–Horne–Zeilinger state, and use a protocol of optimal reversal quantum weak measurement to protect the multipartite quantum correlations. We observe that the weak measurement reversal protocol enhances the robustness of multipartite quantum correlations. Further it increases the critical damping value that corresponds to entanglement sudden death. To emphasize the efficacy of the technique in protection of multipartite quantum correlation, we investigate two proximately related quantum communication tasks, namely, quantum teleportation in a one sender, many receivers setting and multiparty quantum information splitting, through a local amplitude damping channel. We observe an increase in the average fidelity of both the quantum communication tasks under the weak measurement reversal protocol. The method may prove beneficial, for combating external interactions, in other quantum information tasks using multipartite resources. - Highlights: • Extension of weak measurement reversal scheme to protect multiparty quantum correlations. • Protection of multiparty quantum correlation under local amplitude damping noise. • Enhanced fidelity of quantum teleportation in one sender and many receivers setting. • Enhanced fidelity of quantum information splitting protocol.

  2. Enhancing robustness of multiparty quantum correlations using weak measurement

    International Nuclear Information System (INIS)

    Multipartite quantum correlations are important resources for the development of quantum information and computation protocols. However, the resourcefulness of multipartite quantum correlations in practical settings is limited by its fragility under decoherence due to environmental interactions. Though there exist protocols to protect bipartite entanglement under decoherence, the implementation of such protocols for multipartite quantum correlations has not been sufficiently explored. Here, we study the effect of local amplitude damping channel on the generalized Greenberger–Horne–Zeilinger state, and use a protocol of optimal reversal quantum weak measurement to protect the multipartite quantum correlations. We observe that the weak measurement reversal protocol enhances the robustness of multipartite quantum correlations. Further it increases the critical damping value that corresponds to entanglement sudden death. To emphasize the efficacy of the technique in protection of multipartite quantum correlation, we investigate two proximately related quantum communication tasks, namely, quantum teleportation in a one sender, many receivers setting and multiparty quantum information splitting, through a local amplitude damping channel. We observe an increase in the average fidelity of both the quantum communication tasks under the weak measurement reversal protocol. The method may prove beneficial, for combating external interactions, in other quantum information tasks using multipartite resources. - Highlights: • Extension of weak measurement reversal scheme to protect multiparty quantum correlations. • Protection of multiparty quantum correlation under local amplitude damping noise. • Enhanced fidelity of quantum teleportation in one sender and many receivers setting. • Enhanced fidelity of quantum information splitting protocol

  3. The improvement of quantum secret sharing protocol between multiparty and multiparty without entanglement

    CERN Document Server

    Gao, T; Gao, Ting; Yan, Feng-Li

    2006-01-01

    We improve our quantum secret sharing protocol between multiparty and multiparty without entanglement [Phys. Rev. A 72, 012304 (2005)]. The improved protocol can avoid not only the Trojan horse attack but also the attack with single photons and attack with EPR pairs.

  4. Multiparty Quantum Remote Secret Conference

    CERN Document Server

    Li, X H; Deng, F G; Zhou, P; Liang, Y J; Zhou, H Y; Li, Xi-Han; Li, Chun-Yan; Deng, Fu-Guo; Zhou, Ping; Liang, Yu-Jie; Zhou, Hong-Yu

    2007-01-01

    We present two schemes for multiparty quantum remote secret conference in which each legitimate conferee can read out securely the secret message announced by another one, but a vicious eavesdropper can get nothing about it. The first one is based on the same key shared efficiently and securely by all the parties with Greenberger-Horne-Zeilinger (GHZ) states, and each conferee sends his secret message to the others with one-time pad crypto-system. The other one is based on quantum encryption with a quantum key, a sequence of GHZ states shared among all the conferees and used repeatedly after confirming their security. Both these schemes are optimal as their intrinsic efficiency for qubits approaches the maximal value.

  5. The multiparty coherent channel and its implementation with linear optics.

    Science.gov (United States)

    He, Guangqiang; Liu, Taizhi; Tao, Xin

    2013-08-26

    The continuous-variable coherent (conat) channel is a useful resource for coherent communication, supporting coherent teleportation and coherent superdense coding. We extend the conat channel to multiparty conditions by proposing definitions on multiparty position-quadrature and momentum-quadrature conat channel. We additionally provide two methods to implement this channel using linear optics. One method is the multiparty version of coherent communication assisted by entanglement and classical communication (CCAECC). The other is multiparty coherent superdense coding. PMID:24105527

  6. General polygamy inequality of multi-party quantum entanglement

    OpenAIRE

    Kim, Jeong San

    2012-01-01

    Using entanglement of assistance, we establish a general polygamy inequality of multi-party entanglement in arbitrary dimensional quantum systems. For multi-party closed quantum systems, we relate our result with the monogamy of entanglement to show that the entropy of entanglement is an universal entanglement measure that bounds both monogamy and polygamy of multi-party quantum entanglement.

  7. Distributed compression and multiparty squashed entanglement

    International Nuclear Information System (INIS)

    We study a protocol in which many parties use quantum communication to transfer a shared state to a receiver without communicating with each other. This protocol is a multiparty version of the fully quantum Slepian-Wolf protocol for two senders and arises through the repeated application of the two-sender protocol. We describe bounds on the achievable rate region for the distributed compression problem. The inner bound arises by expressing the achievable rate region for our protocol in terms of its vertices and extreme rays and, equivalently, in terms of facet inequalities. We also prove an outer bound on all possible rates for distributed compression based on the multiparty squashed entanglement, a measure of multiparty entanglement

  8. Asynchronous Parallelization of a CFD Solver

    Directory of Open Access Journals (Sweden)

    Daniel S. Abdi

    2015-01-01

    Full Text Available A Navier-Stokes equations solver is parallelized to run on a cluster of computers using the domain decomposition method. Two approaches of communication and computation are investigated, namely, synchronous and asynchronous methods. Asynchronous communication between subdomains is not commonly used in CFD codes; however, it has a potential to alleviate scaling bottlenecks incurred due to processors having to wait for each other at designated synchronization points. A common way to avoid this idle time is to overlap asynchronous communication with computation. For this to work, however, there must be something useful and independent a processor can do while waiting for messages to arrive. We investigate an alternative approach of computation, namely, conducting asynchronous iterations to improve local subdomain solution while communication is in progress. An in-house CFD code is parallelized using message passing interface (MPI, and scalability tests are conducted that suggest asynchronous iterations are a viable way of parallelizing CFD code.

  9. Behavioral synthesis of asynchronous circuits

    DEFF Research Database (Denmark)

    Nielsen, Sune Fallgaard

    2005-01-01

    domain by introducing a computation model, which resembles the synchronous datapath and control architecture, but which is completely asynchronous. The model contains the possibility for isolating some or all of the functional units by locking their respective inputs and outputs while the functional unit...

  10. Multiparty Quantum Secret Sharing Using Quantum Fourier Transform

    Institute of Scientific and Technical Information of China (English)

    HUANG Da-Zu; CHEN Zhi-Gang; GUO Ying

    2009-01-01

    A (n, n )-threshold scheme of multiparty quantum secret sharing of classical or quantum message is proposed based on the discrete quantum Fourier transform.In our proposed scheme, the secret message, which is encoded by using the forward quantum Fourier transform and decoded by using the reverse, is split and shared in such a way that it can be reconstructed among them only if all the participants work in concert.Furthermore, we also discuss how this protocol must be carefully designed for correcting errors and checking eavesdropping or a dishonest participant.Security analysis shows that our scheme is secure.Also, this scheme has an advantage that it is completely compatible with quantum computation and easier to realize in the distributed quantum secure computation.

  11. Remote Operation on Quantum State Among Multiparty

    International Nuclear Information System (INIS)

    In this paper, a scheme is proposed for performing remote operation on quantum state among multiparty. We use three-particle GHZ state as quantum channels to prepare a state operator, which describes quantum correlation between states and operations. Based on the special characteristic of the state operator, observers can perform unitary operation on a system that is away from observers. Our studies show this process is deterministic. We further consider remote operation among N spatially distributed observers, and the results show the successful realization of remote operation needs collective participation of N parties, that is, there exists strong correlation among multiparty. In addition, we investigate the case in which observers share a three-particle W state as quantum channels to perform remote operation and studies find this process is probabilistic.

  12. Remote Operation on Quantum State Among Multiparty

    Institute of Scientific and Technical Information of China (English)

    2007-01-01

    In this paper, a scheme is proposed for performing remote operation on quantum state among multiparty.We use three-particle GHZ state as quantum channels to prepare a state operator, which describes quantum correlation between states and operations. Based on the special characteristic of the state operator, observers can perform unitary operation on a system that is away from observers. Our studies show this process is deterministic. We further consider remote operation among N spatially distributed observers, and the results show the successful realization of remote operation needs collective participation of N parties, that is, there exists strong correlation among multiparty. In addition, we investigate the case in which observers share a three-particle W state as quantum channels to perform remote operation and studies find this process is probabilistic.

  13. Efficient generation of photonic entanglement and multiparty quantum communication

    International Nuclear Information System (INIS)

    This thesis deals largely with the problem of efficient generation of photonic entanglement with the principal aim of developing a bright source of polarization-entangled photon pairs, which meets the requirements for reliable and economic operation of quantum communication prototypes and demonstrators. Our approach uses a cor-related photon-pair emission in nonlinear process of spontaneous parametric downconversion pumped by light coming from a compact and cheap blue laser diode. Two alternative source configurations are examined within the thesis. The first makes use of a well established concept of degenerate non-collinear emission from a single type-II nonlinear crystal and the second relies on a novel method where the emissions from two adjacent type-I phase-matched nonlinear crystals operated in collinear non-degenerate regime are coherently overlapped. The latter approach showed to be more effective, yielding a total detected rate of almost 106 pairs/s at >98% quantum interference visibility of polarization correlations. The second issue addressed within the thesis is the simplification and practical implementation of quantum-assisted solutions to multiparty communication tasks. We show that entanglement is not the only non-classical resource endowing the quantum multiparty information processing its power. Instead, only the sequential communication and transformation of a single qubit can be sufficient to accomplish certain tasks. This we prove for two distinct communication tasks, secret sharing and communication complexity. Whereas the goal of the first is to split a cryptographic key among several parties in a way that its reconstruction requires their collaboration, the latter aims at reducing the amount of communication during distributed computational tasks. Importantly, our qubitassisted solutions to the problems are feasible with state-of-the-art technology. This we clearly demonstrate in the laboratory implementation for 6 and 5 parties

  14. Efficient generation of photonic entanglement and multiparty quantum communication

    Energy Technology Data Exchange (ETDEWEB)

    Trojek, Pavel

    2007-09-15

    This thesis deals largely with the problem of efficient generation of photonic entanglement with the principal aim of developing a bright source of polarization-entangled photon pairs, which meets the requirements for reliable and economic operation of quantum communication prototypes and demonstrators. Our approach uses a cor-related photon-pair emission in nonlinear process of spontaneous parametric downconversion pumped by light coming from a compact and cheap blue laser diode. Two alternative source configurations are examined within the thesis. The first makes use of a well established concept of degenerate non-collinear emission from a single type-II nonlinear crystal and the second relies on a novel method where the emissions from two adjacent type-I phase-matched nonlinear crystals operated in collinear non-degenerate regime are coherently overlapped. The latter approach showed to be more effective, yielding a total detected rate of almost 10{sup 6} pairs/s at >98% quantum interference visibility of polarization correlations. The second issue addressed within the thesis is the simplification and practical implementation of quantum-assisted solutions to multiparty communication tasks. We show that entanglement is not the only non-classical resource endowing the quantum multiparty information processing its power. Instead, only the sequential communication and transformation of a single qubit can be sufficient to accomplish certain tasks. This we prove for two distinct communication tasks, secret sharing and communication complexity. Whereas the goal of the first is to split a cryptographic key among several parties in a way that its reconstruction requires their collaboration, the latter aims at reducing the amount of communication during distributed computational tasks. Importantly, our qubitassisted solutions to the problems are feasible with state-of-the-art technology. This we clearly demonstrate in the laboratory implementation for 6 and 5 parties

  15. Addendum to "Quantum secret sharing between multiparty and multiparty without entanglement"

    CERN Document Server

    Deng, F G; Li, C Y; Li, X H; Yan, F L; Zhou, H Y

    2005-01-01

    Recently, Yan and Gao proposed a quantum secret sharing protocol between multiparty ($m$ members in group 1) and multiparty ($n$ members in group 2) using a sequence of single photons (Phys. Rev. A \\textbf{72}, 012304 (2005)). We find that it is secure if the quantum signal transmitted is only a single photon but insecure with a multi-photon signal as some agents can get the information about the others' message if they attack the communication with a Trojan horse. However, security against this attack can be attained with a simple modification.

  16. Addendum to "Quantum secret sharing between multiparty and multiparty without entanglement"

    OpenAIRE

    Deng, Fu-Guo; Yan, Feng-Li; Li, Xi-Han; Li, Chun-Yan; Zhou, Hong-Yu; Gao, Ting

    2005-01-01

    Recently, Yan and Gao proposed a quantum secret sharing protocol between multiparty ($m$ members in group 1) and multiparty ($n$ members in group 2) using a sequence of single photons (Phys. Rev. A \\textbf{72}, 012304 (2005)). We find that it is secure if the quantum signal transmitted is only a single photon but insecure with a multi-photon signal as some agents can get the information about the others' message if they attack the communication with a Trojan horse. However, security against t...

  17. Retrospective Analysis of Communication Events - Understanding the Dynamics of Collaborative Multi-Party Discourse

    Energy Technology Data Exchange (ETDEWEB)

    Cowell, Andrew J.; Haack, Jereme N.; McColgin, Dave W.

    2006-06-08

    This research is aimed at understanding the dynamics of collaborative multi-party discourse across multiple communication modalities. Before we can truly make sig-nificant strides in devising collaborative communication systems, there is a need to understand how typical users utilize com-putationally supported communications mechanisms such as email, instant mes-saging, video conferencing, chat rooms, etc., both singularly and in conjunction with traditional means of communication such as face-to-face meetings, telephone calls and postal mail. Attempting to un-derstand an individual’s communications profile with access to only a single modal-ity is challenging at best and often futile. Here, we discuss the development of RACE – Retrospective Analysis of Com-munications Events – a test-bed prototype to investigate issues relating to multi-modal multi-party discourse.

  18. VOLTAGE REGULATORS ASYNCHRONOUS GENERATORS

    OpenAIRE

    Grigorash O. V.; Bogatyrev N. I.; Hitskova A. O.

    2015-01-01

    A promising is currently the use of asynchronous generators with capacitive excitation as a source of electricity in stand-alone power systems. Drive asynchronous generators may exercise as a thermal engine and wind wheel wind power plant or turbines of small hydropower plants. The article discusses the structural and schematics of voltage stabilizers and frequency of asynchronous generators with improved operational and technical specifications. Technical novelty of design solutions of the m...

  19. Enhanced Multiparty Controlled QSDC Using GHZ State

    Institute of Scientific and Technical Information of China (English)

    Shih-Hung Kao; Chia-Wei Tsai; Tzonelih Hwang

    2011-01-01

    Recently, Gao et al. [Opt. Commun. 283 (2010) 192] pointed out that Wang et al.'s multiparty controlled quantum secure direct communication (CQSDC) protocol [Opt. Commun. 266 (2006) 732] has the information leakage problem and proposed an improved protocol. However, in the improved protocol, due to the introduction of an additional random sampling to avoid the weakness, the qubit efficiency is decreased. By introducing the base changing technique to the random sampling in Wang et al.'s protocol, this study overcomes the information leakage problem and provides a better qubit efficiency.

  20. Concerted, highly asynchronous, enzyme-catalyzed [4 + 2] cycloaddition in the biosynthesis of spinosyn A; computational evidence.

    Science.gov (United States)

    Hess, B Andes; Smentek, Lidia

    2012-10-01

    A theoretical study has been carried out on model systems to study a recently reported, (Nature, 2011, 473, 109) biosynthetic, [4 + 2] cycloaddition catalyzed by a stand-alone enzyme (the cyclase SpnF). It was suggested in this paper that SpnF is the first known example of a Diels-Alderase (DA). In the present study, for a model system of the substrate a transition structure was found with density functional calculations (DFT). In addition, the intrinsic reaction coordinate calculations indicated that the transition structure is that of a concerted, but highly asynchronous, DA reaction. Based on the DFT and Møller-Plesset second order calculations the activation energy was estimated to be about 15 kcal mol(-1). The results of a natural population analysis indicated that there is significant charge transfer in the transition state, and it is proposed that possibly the enzyme plays a dual role of not only folding the substrate into the proper conformation for the DA reaction to occur, but also lowering its activation energy by stabilization of the highly polarized transition structure. PMID:22885939

  1. Compositional asynchronous membrane systems

    Institute of Scientific and Technical Information of China (English)

    Cosmin Bonchis; Cornel Izbasa; Gabriel Ciobanu

    2007-01-01

    This paper presents an algorithmic way of building complex membrane systems by coupling elementary membranes. Its application seems particularly valuable in the case of asynchronous membrane systems, since the resulting membrane system remains asynchronous. The composition method is based on a handshake mechanism implemented by using antiport rules and promoters.

  2. Multiparty Simultaneous Quantum Identity Authentication Based on Entanglement Swapping

    Institute of Scientific and Technical Information of China (English)

    WANG Jian; ZHANG Quan; TANG Chao-Jing

    2006-01-01

    @@ We present a multiparty simultaneous quantum identity authentication protocol based on entanglement swapping.In our protocol, the multi-user can be authenticated by a trusted third party simultaneously.

  3. Efficient, effective and flexible multiparty quantum secret sharing

    International Nuclear Information System (INIS)

    An efficient scheme for multiparty quantum secret sharing based on multipartite GHZ states is proposed. The scheme is effective allowing the sender to identify precisely who are dishonest among the authorized receivers. It is also flexible in the sense that it is beyond the (N,N)-threshold scheme and can serve as well as a multiple-parties-multiparty secret sharing. Furthermore, maximally entangled states are not a prerequisite ingredient in this scheme. (author)

  4. Genuine Multiparty Quantum Entanglement Suppresses Multiport Classical Information Transmission

    OpenAIRE

    Prabhu, R.; De, Aditi Sen; Sen, Ujjwal

    2012-01-01

    We establish a universal complementarity relation between the capacity of classical information transmission by employing a multiparty quantum state as a multiport quantum channel, and the genuine multipartite entanglement of the quantum state. The classical information transfer is from a sender to several receivers by using the quantum dense coding protocol with the multiparty quantum state shared between the sender and the receivers. The relation holds for arbitrary pure or mixed quantum st...

  5. Asynchronous interactive control systems

    Science.gov (United States)

    Vuskovic, M. I.; Heer, E.

    1980-01-01

    A class of interactive control systems is derived by generalizing interactive manipulator control systems. The general structural properties of such systems are discussed and an appropriate general software implementation is proposed. This is based on the fact that tasks of interactive control systems can be represented as a network of a finite set of actions which have specific operational characteristics and specific resource requirements, and which are of limited duration. This has enabled the decomposition of the overall control algorithm into a set of subalgorithms, called subcontrollers, which can operate simultaneously and asynchronously. Coordinate transformations of sensor feedback data and actuator set-points have enabled the further simplification of the subcontrollers and have reduced their conflicting resource requirements. The modules of the decomposed control system are implemented as parallel processes with disjoint memory space communicating only by I/O. The synchronization mechanisms for dynamic resource allocation among subcontrollers and other synchronization mechanisms are also discussed in this paper. Such a software organization is suitable for the general form of multiprocessing using computer networks with distributed storage.

  6. VOLTAGE REGULATORS ASYNCHRONOUS GENERATORS

    Directory of Open Access Journals (Sweden)

    Grigorash O. V.

    2015-06-01

    Full Text Available A promising is currently the use of asynchronous generators with capacitive excitation as a source of electricity in stand-alone power systems. Drive asynchronous generators may exercise as a thermal engine and wind wheel wind power plant or turbines of small hydropower plants. The article discusses the structural and schematics of voltage stabilizers and frequency of asynchronous generators with improved operational and technical specifications. Technical novelty of design solutions of the magnetic system and stabilizers asynchronous generator of electricity parameters confirmed by the patents for the invention of the Russian Federation. The proposed technical solution voltage stabilizer asynchronous generators, can reduce the weight of the block capacitors excitation and reactive power compensation, as well as to simplify the control system power circuit which has less power electronic devices. For wind power plants it is an important issue not only to stabilize the voltage of the generator, but also the frequency of the current. Recommend functionality stabilizer schemes parameters of electric power made for direct frequency converters with artificial and natural switching power electronic devices. It is also proposed as part of stabilization systems use single-phase voltage, three-phase transformers with rotating magnetic field, reduce the level of electromagnetic interference generated by power electronic devices for switching, enhance the efficiency and reliability of the stabilizer.

  7. Long-distance measurement-device-independent multiparty quantum communication.

    Science.gov (United States)

    Fu, Yao; Yin, Hua-Lei; Chen, Teng-Yun; Chen, Zeng-Bing

    2015-03-01

    The Greenberger-Horne-Zeilinger (GHZ) entanglement, originally introduced to uncover the extreme violation of local realism against quantum mechanics, is an important resource for multiparty quantum communication tasks. But the low intensity and fragility of the GHZ entanglement source in current conditions have made the practical applications of these multiparty tasks an experimental challenge. Here we propose a feasible scheme for practically distributing the postselected GHZ entanglement over a distance of more than 100 km for experimentally accessible parameter regimes. Combining the decoy-state and measurement-device-independent protocols for quantum key distribution, we anticipate that our proposal suggests an important avenue for practical multiparty quantum communication. PMID:25793788

  8. Asynchronized synchronous machines

    CERN Document Server

    Botvinnik, M M

    1964-01-01

    Asynchronized Synchronous Machines focuses on the theoretical research on asynchronized synchronous (AS) machines, which are "hybrids” of synchronous and induction machines that can operate with slip. Topics covered in this book include the initial equations; vector diagram of an AS machine; regulation in cases of deviation from the law of full compensation; parameters of the excitation system; and schematic diagram of an excitation regulator. The possible applications of AS machines and its calculations in certain cases are also discussed. This publication is beneficial for students and indiv

  9. Asynchronous Variational Contact Mechanics

    CERN Document Server

    Vouga, Etienne; Tamstorf, Rasmus; Grinspun, Eitan

    2010-01-01

    An asynchronous, variational method for simulating elastica in complex contact and impact scenarios is developed. Asynchronous Variational Integrators (AVIs) are extended to handle contact forces by associating different time steps to forces instead of to spatial elements. By discretizing a barrier potential by an infinite sum of nested quadratic potentials, these extended AVIs are used to resolve contact while obeying momentum- and energy-conservation laws. A series of two- and three-dimensional examples illustrate the robustness and good energy behavior of the method.

  10. Technologies That Assist in Online Group Work: A Comparison of Synchronous and Asynchronous Computer Mediated Communication Technologies on Students' Learning and Community

    Science.gov (United States)

    Rockinson-Szapkiw, Amanda; Wendt, Jillian

    2015-01-01

    While the benefits of online group work completed using asynchronous CMC technology is documented, researchers have identified a number of challenges that result in ineffective and unsuccessful online group work. Fewer channels of communication and lack of immediacy when compared to face-to-face group work are a few of the noted limitations. Thus,…

  11. Cryptographic framework for document-objects resulting from multiparty collaborative transactions.

    Science.gov (United States)

    Goh, A

    2000-01-01

    Multiparty transactional frameworks--i.e. Electronic Data Interchange (EDI) or Health Level (HL) 7--often result in composite documents which can be accurately modelled using hyperlinked document-objects. The structural complexity arising from multiauthor involvement and transaction-specific sequencing would be poorly handled by conventional digital signature schemes based on a single evaluation of a one-way hash function and asymmetric cryptography. In this paper we outline the generation of structure-specific authentication hash-trees for the the authentication of transactional document-objects, followed by asymmetric signature generation on the hash-tree value. Server-side multi-client signature verification would probably constitute the single most compute-intensive task, hence the motivation for our usage of the Rabin signature protocol which results in significantly reduced verification workloads compared to the more commonly applied Rivest-Shamir-Adleman (RSA) protocol. Data privacy is handled via symmetric encryption of message traffic using session-specific keys obtained through key-negotiation mechanisms based on discrete-logarithm cryptography. Individual client-to-server channels can be secured using a double key-pair variation of Diffie-Hellman (DH) key negotiation, usage of which also enables bidirectional node authentication. The reciprocal server-to-client multicast channel is secured through Burmester-Desmedt (BD) key-negotiation which enjoys significant advantages over the usual multiparty extensions to the DH protocol. The implementation of hash-tree signatures and bi/multidirectional key negotiation results in a comprehensive cryptographic framework for multiparty document-objects satisfying both authentication and data privacy requirements. PMID:11187485

  12. An active attack on a multiparty key exchange protocol

    Directory of Open Access Journals (Sweden)

    Reto Schnyder

    2016-01-01

    Full Text Available The multiparty key exchange introduced in Steiner et al. and presented in more general form by the authors is known to be secure against passive attacks. In this paper, an active attack is presented assuming malicious control of the communications of the last two users for the duration of only the key exchange.

  13. A trace-based model for multiparty contracts

    DEFF Research Database (Denmark)

    Hvitved, Tom; Klaedtke, Felix; Zalinescu, Eugen

    2012-01-01

    In this article we present a model for multiparty contracts in which contract conformance is defned abstractly as a property on traces. A key feature of our model is blame assignment, which means that for a given contract, every breach is attributed to a set of parties. We show that blame...

  14. Student Representation and Multiparty Politics in African Higher Education

    Science.gov (United States)

    Luescher-Mamashela, Thierry M.; Mugume, Taabo

    2014-01-01

    The transition from one-party rule and other forms of authoritarianism to multiparty democracy in the 1990s has had a profound impact on the organisation and role of student politics in Africa. Against the background of student involvement in African politics in the twentieth century, leading up to student participation in Africa's…

  15. Monitoring multi-party contracts for E-business

    NARCIS (Netherlands)

    Xu, L.

    2004-01-01

    "Monitoring multi-party contracts for E-business" investigates the issues involved in the performance of econtract monitoring of business automations in business to business e-commerce environment. A pro-active monitoring contract model and monitoring mechanism have been designed and developed. A ne

  16. Solving SAT and Hamiltonian Cycle Problem Using Asynchronous P Systems

    Science.gov (United States)

    Tagawa, Hirofumi; Fujiwara, Akihiro

    In the present paper, we consider fully asynchronous parallelism in membrane computing, and propose two asynchronous P systems for the satisfiability (SAT) and Hamiltonian cycle problem. We first propose an asynchronous P system that solves SAT with n variables and m clauses, and show that the proposed P system computes SAT in O(mn2n) sequential steps or O(mn) parallel steps using O(mn) kinds of objects. We next propose an asynchronous P system that solves the Hamiltonian cycle problem with n nodes, and show that the proposed P system computes the problem in O(n!) sequential steps or O(n2) parallel steps using O(n2) kinds of objects.

  17. Text Mining: (Asynchronous Sequences

    Directory of Open Access Journals (Sweden)

    Sheema Khan

    2014-12-01

    Full Text Available In this paper we tried to correlate text sequences those provides common topics for semantic clues. We propose a two step method for asynchronous text mining. Step one check for the common topics in the sequences and isolates these with their timestamps. Step two takes the topic and tries to give the timestamp of the text document. After multiple repetitions of step two, we could give optimum result.

  18. Asynchronous Variational Integrators

    OpenAIRE

    Lew, A.; Marsden, J. E.; Ortiz, M.; West, M

    2003-01-01

    We describe a new class of asynchronous variational integrators (AVI) for nonlinear elastodynamics. The AVIs are distinguished by the following attributes: (i) The algorithms permit the selection of independent time steps in each element, and the local time steps need not bear an integral relation to each other; (ii) the algorithms derive from a spacetime form of a discrete version of Hamilton’s variational principle. As a consequence of this variational structure, the algorith...

  19. Asynchronous Bounded Expected Delay Networks

    OpenAIRE

    Bakhshi, Rena; Endrullis, Jörg; Fokkink, Wan; Pang, Jun

    2010-01-01

    The commonly used asynchronous bounded delay (ABD) network models assume a fixed bound on message delay. We propose a probabilistic network model, called asynchronous bounded expected delay (ABE) model. Instead of a strict bound, the ABE model requires only a bound on the expected message delay. While the conditions of ABD networks restrict the set of possible executions, in ABE networks all asynchronous executions are possible, but executions with extremely long delays are less probable. In ...

  20. Inhibition Controls Asynchronous States of Neuronal Networks

    Science.gov (United States)

    Treviño, Mario

    2016-01-01

    Computations in cortical circuits require action potentials from excitatory and inhibitory neurons. In this mini-review, I first provide a quick overview of findings that indicate that GABAergic neurons play a fundamental role in coordinating spikes and generating synchronized network activity. Next, I argue that these observations helped popularize the notion that network oscillations require a high degree of spike correlations among interneurons which, in turn, produce synchronous inhibition of the local microcircuit. The aim of this text is to discuss some recent experimental and computational findings that support a complementary view: one in which interneurons participate actively in producing asynchronous states in cortical networks. This requires a proper mixture of shared excitation and inhibition leading to asynchronous activity between neighboring cells. Such contribution from interneurons would be extremely important because it would tend to reduce the spike correlation between neighboring pyramidal cells, a drop in redundancy that could enhance the information-processing capacity of neural networks. PMID:27274721

  1. Quantum Steganography for Multi-party Covert Communication

    Science.gov (United States)

    Liu, Lin; Tang, Guang-Ming; Sun, Yi-Feng; Yan, Shu-Fan

    2016-01-01

    A novel multi-party quantum steganography protocol based on quantum secret sharing is proposed in this paper. Hidden channels are built in HBB and improved HBB quantum secret sharing protocols for secret messages transmitting, via the entanglement swapping of GHZ states and Bell measurement. Compared with the original protocol, there are only a few different GHZ sates transmitted in the proposed protocol, making the hidden channel with good imperceptibility. Moreover, the secret messages keep secure even when the hidden channel is under the attack from the dishonest participators, for the sub-secretmessages distributed randomly to different participators. With good imperceptibility and security, the capacity of proposed protocol is higher than previous multi-party quantum steganography protocol.

  2. Automatic topic segmentation and labeling in multiparty dialogue

    OpenAIRE

    Hsueh, Pei-Yun; Moore, Johanna D.

    2006-01-01

    This study concerns how to segment a scenario-driven multiparty dialogue and how to label these segments automatically. We apply approaches that have been proposed for identifying topic boundaries at a coarser level to the problem of identifying agenda-based topic boundaries in scenario-based meetings. We also develop conditional models to classify segments into topic classes. Experiments in topic segmentation show that a supervised classification approach that combines lexical and conversati...

  3. Monitoring multi-party contracts for E-business

    OpenAIRE

    Xu, L

    2004-01-01

    "Monitoring multi-party contracts for E-business" investigates the issues involved in the performance of econtract monitoring of business automations in business to business e-commerce environment. A pro-active monitoring contract model and monitoring mechanism have been designed and developed. A new architecture and framework is proposed for pro-active monitorable contracts. This pro-active monitoring contract model is supported by a prototype

  4. Lower Bounds for Number-in-Hand Multiparty Communication Complexity, Made Easy

    DEFF Research Database (Denmark)

    Phillips, Jeff; Verbin, Elad; Zhang, Qin

    2012-01-01

    In this paper we prove lower bounds on randomized multiparty communication complexity, both in the blackboard model (where each message is written on a blackboard for all players to see) and (mainly) in the message-passing model, where messages are sent player-to-player. We introduce a new...... technique for proving such bounds, called symmetrization, which is natural, intuitive, and often easy to use. For example, for the problem where each of k players gets a bit-vector of length n, and the goal is to compute the coordinate-wise XOR of these vectors, we prove a tight lower bounds of Ω(nk) in the...... technique seems applicable to a wide range of other problems as well. The obtained communication lower bounds imply new lower bounds in the functional monitoring model [11] (also called the distributed streaming model). All of our lower bounds allow randomized communication protocols with two-sided error...

  5. Alignment, realignment and dealignment in multi-party systems : a conceptual and empirical study

    NARCIS (Netherlands)

    Federer-Shtayer, Hila

    2012-01-01

    The present research is motivated by the conviction that there is inadequate conceptual understanding of the phenomena of ‘realignment’ and ‘dealignment’ in multi-party systems. It aims to fill this gap by examining empirically both phenomena in eleven cases of multi-party systems, in order to devel

  6. The right of self-determination and multiparty democracy: two sides of the same coin?

    NARCIS (Netherlands)

    J. Vidmar

    2010-01-01

    This article is concerned with the relationship between the right of self-determination and the political system of multiparty democracy. It considers whether international law supports the view that operation of the right of self-determination requires a multiparty political system. It also questio

  7. Asynchronous Power Flow Controller

    Directory of Open Access Journals (Sweden)

    Rahul Juneja

    2014-04-01

    Full Text Available In the present system demand of electrical power increases so fast and transfer of electrical power is need of today‟s scenario. . The electrical power is transfer at same frequency through AC transmission line. However, power generation may be at different frequencies such as wind generation, sources at islanding or power generation in different countries. The proposed Asynchronous Power Flow Controller (APFC system essentially consists of two back-to-back voltage source converters as “Shunt Converter” and “Series Converter” which is coupled via a common dc link provided by a dc storage capacitor This paper suggests the power transfer and control between the sources operating at different or same frequencies.

  8. Ternary Tree Asynchronous Interconnect Network for GALS' SOC

    Directory of Open Access Journals (Sweden)

    Vivek E. Khetade

    2013-03-01

    Full Text Available Interconnect fabric requires easy integration of computational block operating with unrelated clocks.Thispaper presents asynchronous interconnect with ternary tree asynchronous network for GloballyAsynchronous Locally Synchronous (GALS system-on-chip (SOC. Here architecture is proposed forinterconnection with ternary tree asynchronous network where ratio of number NOC design unit andnumber of router is 4:1,6:2, 8:3,10:4 etc .It is scalable for any number of NOC design unit. It offersaneasy integration of different clock domain with lowcommunication overhead .NOC design unit for GALS‘SOC is formulated by wrapping synchronous module with input port along with input port controller,output port along with output port controller and local clock generator. It creates the interface betweensynchronous to asynchronous and asynchronous to synchronous. For this purpose four port asynchronousrouters is designed with routing element and outputarbitration and buffering with micro-pipeline. Thisinterconnect fabric minimizes silicon area, minimize Latency and maximize throughput. Here functionalmodel is made for TTAN and application MPEG4 is mapped on the Network .Desired traffic pattern isgenerated and performance of the network is evaluated. Significant improvement in the networkperformance parameter has been observed.

  9. Pro asynchronous programming with .NET

    CERN Document Server

    Blewett, Richard; Ltd, Rock Solid Knowledge

    2014-01-01

    Pro Asynchronous Programming with .NET teaches the essential skill of asynchronous programming in .NET. It answers critical questions in .NET application development, such as: how do I keep my program responding at all times to keep my users happy how do I make the most of the available hardware how can I improve performanceIn the modern world, users expect more and more from their applications and devices, and multi-core hardware has the potential to provide it. But it takes carefully crafted code to turn that potential into responsive, scalable applications.With Pro Asynchronous Programming

  10. Reducing energy with asynchronous circuits

    OpenAIRE

    Rivas Barragan, Daniel

    2012-01-01

    Reducing energy consumption using asynchronous circuits. The elastic clocks approach has been implemented along with a closed-feedback loop in order to achieve a lower energy consumption along with more reliability in integrated circuits.

  11. Adding effect of current displacement and magnetic circuit saturation in an asynchronous motor mathematical model

    Directory of Open Access Journals (Sweden)

    I.A. Tsodik

    2014-04-01

    Full Text Available A methodology of an asynchronous motor mathematical model synthesis is described. Experiments are suggested to be conducted in the following sequence. Geometrical models are first built in AutoCAD, then imported to Comsol Multiphysics, and further processed in Matlab with computation of coefficients and dependences applied in the asynchronous motor mathematical model.

  12. Robust Multiparty Quantum Secret Sharing against Participant Forcible Manipulation

    International Nuclear Information System (INIS)

    The security of the multiparty quantum secret sharing protocol proposed by Gao [G. Gao, Common. Theor. Phys. 52 (2009) 421] is analyzed. It is shown that this protocol is vulnerable since the agents' imperfect encryption scheme can be attacked by a powerful participant. We introduce a attack strategy called participant forcible manipulation and analyze the information leakage in this protocol under this attack. At last, we give an improved version of the original protocol. The improved protocol is robust and has the same efficiency as the original one. (general)

  13. Mechanical Proofs about BW Multi-Party Contract Signing Protocol

    Institute of Scientific and Technical Information of China (English)

    ZHANG Ningrong; ZHANG Xingyuan; WANG Yuanyuan

    2006-01-01

    We report on the verification of a multi-party contract signing protocol described by Baum-Waidner and Waidner (BW). Based on Paulson' inductive approach, we give the protocol model that includes infinitely many signatories and contract texts signing simultaneously. We consider composite attacks of the dishonest signatory and the external intruder, formalize cryptographic primitives and protocol arithmetic including attack model, show formal description of key distribution, and prove signature key secrecy theorems and fairness property theorems of the BW protocol using the interactive theorem prover Isabelle/HOL.

  14. Asynchronous Distributed Searchlight Scheduling

    CERN Document Server

    Obermeyer, Karl J; Bullo, Francesco

    2011-01-01

    This paper develops and compares two simple asynchronous distributed searchlight scheduling algorithms for multiple robotic agents in nonconvex polygonal environments. A searchlight is a ray emitted by an agent which cannot penetrate the boundary of the environment. A point is detected by a searchlight if and only if the point is on the ray at some instant. Targets are points which can move continuously with unbounded speed. The objective of the proposed algorithms is for the agents to coordinate the slewing (rotation about a point) of their searchlights in a distributed manner, i.e., using only local sensing and limited communication, such that any target will necessarily be detected in finite time. The first algorithm we develop, called the DOWSS (Distributed One Way Sweep Strategy), is a distributed version of a known algorithm described originally in 1990 by Sugihara et al \\cite{KS-IS-MY:90}, but it can be very slow in clearing the entire environment because only one searchlight may slew at a time. In an ...

  15. ASYNCHRONOUS ELECTRONIC DISCUSSION GROUP:

    Directory of Open Access Journals (Sweden)

    Tina Lim Swee KIM

    2007-01-01

    Full Text Available This paper examines the practice of online discussion in a course specially tailored for in-service teachers who are pursuing their basic degree qualification at a teacher training institute. Analyses of postings to the asynchronous electronic discussion group were made according to the type of postings as proposed by Poole (2000. Four focus areas were looked into, that is, content, technical, procedural, or non-academic. Analyses were done for each quarter of the 12 weeks of interaction. At the end of the learners’ participation in the EDG and before their end-of-course examination, the participants were then given a paper-based questionnaire asking their perceptions on the use of EDG as part of their coursework on the whole. Six aspects of EDG were examined, these are;Ø technical aspects, Ø motivation to use the EDG, Ø quality of interaction, Ø tutor’s response, Ø perceived learning, and Ø attitude towards EDG. Analyses on postings for the EDG showed that the bulk of the postings were made in the last quarter of the online discussions. Further, 97.8% of the postings were on content and the types of content posting registered were predominantly questions (41.19% and those that sought clarification/elaboration (37.48%. Findings from this study suggest that overall the participants were satisfied with the six aspects of EDG examined. The aspect that recorded the highest mean was ‘motivation to read tutor’s responses’ whilst the lowest mean (and the only one with negative perception was for ‘worthiness of time spent on online discussions’.

  16. Asynchronous updating of threshold-coupled chaotic neurons

    Indian Academy of Sciences (India)

    Manish Dev Shirmali; Sudeshna Sinha; Kazuyuki Aihara

    2008-06-01

    We study a network of chaotic model neurons incorporating threshold activated coupling. We obtain a wide range of spatiotemporal patterns under varying degrees of asynchronicity in the evolution of the neuronal components. For instance, we find that sequential updating of threshold-coupled chaotic neurons can yield dynamical switching of the individual neurons between two states. So varying the asynchronicity in the updating scheme can serve as a control mechanism to extract different responses, and this can have possible applications in computation and information processing.

  17. GPU-Based Asynchronous Global Optimization with Particle Swarm

    International Nuclear Information System (INIS)

    The recent upsurge in research into general-purpose applications for graphics processing units (GPUs) has made low cost high-performance computing increasingly more accessible. Many global optimization algorithms that have previously benefited from parallel computation are now poised to take advantage of general-purpose GPU computing as well. In this paper, a global parallel asynchronous particle swarm optimization (PSO) approach is employed to solve three relatively complex, realistic parameter estimation problems in which each processor performs significant computation. Although PSO is readily parallelizable, memory bandwidth limitations with GPUs must be addressed, which is accomplished by minimizing communication among individual population members though asynchronous operations. The effect of asynchronous PSO on robustness and efficiency is assessed as a function of problem and population size. Experiments were performed with different population sizes on NVIDIA GPUs and on single-core CPUs. Results for successful trials exhibit marked speedup increases with the population size, indicating that more particles may be used to improve algorithm robustness while maintaining nearly constant time. This work also suggests that asynchronous operations on the GPU may be viable in stochastic population-based algorithms to increase efficiency without sacrificing the quality of the solutions.

  18. Protocol for multi-party superdense coding by using multi-atom in cavity QED

    Institute of Scientific and Technical Information of China (English)

    Tan Jia; Fang Mao-Fa

    2006-01-01

    We present a protocol for multi-party superdense coding by using multi-atom in cavity quantum electrodynamics (QED). It is shown that, with a highly detuned cavity mode and a strong driving field, the protocol is insensitive to both cavity decay and thermal field. It is even certain to identify GHZ states via detecting the atomic states. Therefore we can realize the quantum dense coding in a simple way in the multiparty system.

  19. ELECTROMAGNETIC CALCULATION OF THREE-PHASE ASYNCHRONOUS MOTORS WITH A SIX-PHASE WINDING

    OpenAIRE

    S.Yu. Polezіn; Kiryanov, V. V.; V.D. Lushchyk

    2013-01-01

    Features of electromagnetic computation of three-phase asynchronous motors with a six-phase winding in the stator are described. Experimental data on a conveyor motor with two six-phase windings are given.

  20. ELECTROMAGNETIC CALCULATION OF THREE-PHASE ASYNCHRONOUS MOTORS WITH A SIX-PHASE WINDING

    Directory of Open Access Journals (Sweden)

    S.Yu. Polezіn

    2013-02-01

    Full Text Available Features of electromagnetic computation of three-phase asynchronous motors with a six-phase winding in the stator are described. Experimental data on a conveyor motor with two six-phase windings are given.

  1. Quantum multiparty communication complexity and circuit lower bounds

    CERN Document Server

    Kerenidis, I

    2005-01-01

    We define a quantum model for multiparty communication complexity and prove a simulation theorem between the classical and quantum models. As a result of our simulation, we show that if the quantum k-party communication complexity of a function f is $\\Omega(n/2^k)$, then its classical k-party communication is $\\Omega(n/2^{k/2})$. Finding such an f would allow us to prove strong classical lower bounds for (k>log n) players and hence resolve a main open question about symmetric circuits. Furthermore, we prove that for the Generalized Inner Product (GIP) function, the quantum model is exponentially more efficient than the classical one. This provides the first exponential separation for a total function between any quantum and public coin randomized communication model.

  2. Attack on the Enhanced Multiparty Quantum Secret Sharing

    Institute of Scientific and Technical Information of China (English)

    杨帅; 陈秀波; 杨义先

    2012-01-01

    Recently, Gao et al.'s [Commun. Theor. Phys. 52 (2009) 421] multiparty quantum secret sharing (MQSS) protocol with two-photon three-dimensional Bell states was enhanced by Hwang et al. [Commun. Theor. Phys. 56 (2011) 79]. The improved protocol removes some unnecessary unitary operations, devices, and transmissions by the technique of decoy single photons and careful modification. However, in this paper, we investigate the security of the improved protocol and find it is insecure. The eavesdropper can steal all Alice's secret information. Furthermore, a feasible modification to remedy the security loophole is put forward. Our improved protocol provides a basic method to modify a kind of MQSS protocols which cannot resist the collusion attack.

  3. Multiparty simultaneous quantum identity authentication with secret sharing

    Institute of Scientific and Technical Information of China (English)

    2008-01-01

    Two multiparty simultaneous quantum identity authentication (MSQIA) protocols based on secret sharing are presented. All the users can be authenticated by a trusted third party (TTP) simultaneously. In the first protocol,the TTP shares a random key K with all the users using quantum secret sharing. The ith share acts as the authentication key of the ith user. When it is necessary to perform MSQIA,the TTP generates a random number R secretly and sends a sequence of single photons encoded with K and R to all the users. According to his share,each user performs the corresponding unitary operations on the single photon sequence sequentially. At last,the TTP can judge whether the impersonator exists. The sec-ond protocol is a modified version with a circular structure. The two protocols can be efficiently used for MSQIA in a network. They are feasible with current technol-ogy.

  4. Acquiring Knowledge from Asynchronous Discussion

    Science.gov (United States)

    Teo, Yiong Hwee; Webster, Len

    2008-01-01

    This article discusses a study which was designed to explore how online scaffolding can be incorporated to support knowledge acquisition in asynchronous discussion. A group of Singapore preservice teachers engaged in collaborative critiquing of videos before they embarked on their video projects to illustrate what constitutes good and bad video…

  5. Asynchronous sequential machine design and analysis

    CERN Document Server

    Tinder, Richard

    2009-01-01

    Asynchronous Sequential Machine Design and Analysis provides a lucid, in-depth treatment of asynchronous state machine design and analysis presented in two parts: Part I on the background fundamentals related to asynchronous sequential logic circuits generally, and Part II on self-timed systems, high-performance asynchronous programmable sequencers, and arbiters.Part I provides a detailed review of the background fundamentals for the design and analysis of asynchronous finite state machines (FSMs). Included are the basic models, use of fully documented state diagrams, and the design and charac

  6. On the basins of attraction of the regular autonomous asynchronous systems

    OpenAIRE

    Vlad, Serban E.

    2012-01-01

    The Boolean autonomous dynamical systems, also called regular autonomous asynchronous systems are systems whose 'vector field' is a function {\\Phi}:{0,1}^{n}{\\to}{0,1}^{n} and time is discrete or continuous. While the synchronous systems have their coordinate functions {\\Phi}_{1},...,{\\Phi}_{n} computed at the same time: {\\Phi},{\\Phi}{\\circ}{\\Phi},{\\Phi}{\\circ}{\\Phi}{\\circ}{\\Phi},... the asynchronous systems have {\\Phi}_{1},...,{\\Phi}_{n} computed independently on each other. The purpose of t...

  7. Selective particle capture by asynchronously beating cilia

    Science.gov (United States)

    Ding, Yang; Kanso, Eva

    2015-12-01

    Selective particle filtration is fundamental in many engineering and biological systems. For example, many aquatic microorganisms use filter feeding to capture food particles from the surrounding fluid, using motile cilia. One of the capture strategies is to use the same cilia to generate feeding currents and to intercept particles when the particles are on the downstream side of the cilia. Here, we develop a 3D computational model of ciliary bands interacting with flow suspended particles and calculate particle trajectories for a range of particle sizes. Consistent with experimental observations, we find optimal particle sizes that maximize capture rate. The optimal size depends nonlinearly on cilia spacing and cilia coordination, synchronous vs. asynchronous. These parameters affect the cilia-generated flow field, which in turn affects particle trajectories. The low capture rate of smaller particles is due to the particles' inability to cross the flow streamlines of neighboring cilia. Meanwhile, large particles have difficulty entering the sub-ciliary region once advected downstream, also resulting in low capture rates. The optimal range of particle sizes is enhanced when cilia beat asynchronously. These findings have potentially important implications on the design and use of biomimetic cilia in processes such as particle sorting in microfluidic devices.

  8. Asynchronous control for networked systems

    CERN Document Server

    Rubio, Francisco; Bencomo, Sebastián

    2015-01-01

    This book sheds light on networked control systems; it describes different techniques for asynchronous control, moving away from the periodic actions of classical control, replacing them with state-based decisions and reducing the frequency with which communication between subsystems is required. The text focuses specially on event-based control. Split into two parts, Asynchronous Control for Networked Systems begins by addressing the problems of single-loop networked control systems, laying out various solutions which include two alternative model-based control schemes (anticipatory and predictive) and the use of H2/H∞ robust control to deal with network delays and packet losses. Results on self-triggering and send-on-delta sampling are presented to reduce the need for feedback in the loop. In Part II, the authors present solutions for distributed estimation and control. They deal first with reliable networks and then extend their results to scenarios in which delays and packet losses may occur. The novel ...

  9. Asynchronous Anytime Sequential Monte Carlo

    OpenAIRE

    Paige, Brooks; Wood, Frank; Doucet, Arnaud; Teh, Yee Whye

    2014-01-01

    We introduce a new sequential Monte Carlo algorithm we call the particle cascade. The particle cascade is an asynchronous, anytime alternative to traditional particle filtering algorithms. It uses no barrier synchronizations which leads to improved particle throughput and memory efficiency. It is an anytime algorithm in the sense that it can be run forever to emit an unbounded number of particles while keeping within a fixed memory budget. We prove that the particle cascade is an unbiased mar...

  10. Asynchronous MPI for the Masses

    OpenAIRE

    Wittmann, Markus; Hager, Georg; Zeiser, Thomas; Wellein, Gerhard

    2013-01-01

    We present a simple library which equips MPI implementations with truly asynchronous non-blocking point-to-point operations, and which is independent of the underlying communication infrastructure. It utilizes the MPI profiling interface (PMPI) and the MPI_THREAD_MULTIPLE thread compatibility level, and works with current versions of Intel MPI, Open MPI, MPICH2, MVAPICH2, Cray MPI, and IBM MPI. We show performance comparisons on a commodity InfiniBand cluster and two tier-1 systems in Germany...

  11. GAMIFICATION IN ASYNCHRONOUS EDUCATION PROCESS

    Directory of Open Access Journals (Sweden)

    B. P. Dyakonov

    2016-03-01

    Full Text Available The author of the paper discourses on the prospects of education in the context of the global tendency towards informatization and virtualization of the modern world, influence of these processes on personalized senses of education and educational values and related problems of methodological and technological education in relation to the personalized meanings and educational values. Educational individualization is defined by the author as the most expected way of educational evolution. Distance learning is studied as the main example of the modern transformative educational model. Asynchronous education is explored and characterized as one of the distance learning examples. While defining what asynchronous distance learning is, the author explores its role in the specifics of forming a subject to subject educational approach, while forecasting difficulties in creating holistic asynchronous educational environment. Gamification techniques in the educational process are studied with their respective opportunities and threats, examples in grad and post grad professional studies are provided, including but not limited to foreign language studies. Addictiveness as the goal and means of a build in gamification process is explored as the way to bridge the gap between students and the educators. The author studies gamification in the context of minimizing negative connotations from the educational process, while controversies between pain and game approaches of getting knowledge are brought into light.

  12. Hitting Families of Schedules for Asynchronous Programs

    OpenAIRE

    Chistikov, Dmitry; Majumdar, Rupak; Niksic, Filip

    2016-01-01

    Asynchronous programming is a ubiquitous idiom for concurrent programming, where sequential units of code, called events, are scheduled and run atomically by a scheduler. While running, an event can post additional events for future execution by the scheduler. Asynchronous programs can have subtle bugs due to the non-deterministic scheduling of events, and a lot of recent research has focused on systematic testing of these programs. Empirically, many bugs in asynchronous programs have small b...

  13. A method for designing asynchronous probabilistic processes

    OpenAIRE

    Abbes, Samy

    2013-01-01

    We present a method for constructing asynchronous probabilistic processes. The asynchronous probabilistic processes thus obtained are called invariant. They generalize the familiar independent and identically distributed sequences of random variables to an asynchronous framework. Invariant processes are shown to be characterised by a finite family of real numbers, their characteristic numbers. Our method provides first a way to obtaining necessary and sufficient normalization conditions for a...

  14. Asynchronous Methods for Deep Reinforcement Learning

    OpenAIRE

    Mnih, Volodymyr; Badia, Adrià Puigdomènech; Mirza, Mehdi; Graves, Alex; Lillicrap, Timothy P.; Harley, Tim; Silver, David; Kavukcuoglu, Koray

    2016-01-01

    We propose a conceptually simple and lightweight framework for deep reinforcement learning that uses asynchronous gradient descent for optimization of deep neural network controllers. We present asynchronous variants of four standard reinforcement learning algorithms and show that parallel actor-learners have a stabilizing effect on training allowing all four methods to successfully train neural network controllers. The best performing method, an asynchronous variant of actor-critic, surpasse...

  15. Constant communication complexity protocols for multiparty accumulative boolean functions

    CERN Document Server

    pal, S P; Kumar, S; Das, Sima; Kumar, Somesh; pal, Sudebkumar Prasant

    2005-01-01

    Generalizing a boolean function from Cleve and Buhrman \\cite{cb:sqec}, we consider the class of {\\it accumulative boolean functions} of the form $f_B(X_1,X_2,..., X_m)=\\bigoplus_{i=1}^n t_B(x_i^1x_i^2... x_i^m)$, where $X_j=(x^j_1,x^j_2,..., x^j_n), 1\\leq j\\leq m$ and $t_B(x_i^1x_i^2... x_i^m)=1$ for input $m$-tuples $x_i^1x_i^2...x_i^m\\in B\\subseteq A\\subseteq \\{0,1\\}^n$, and 0, otherwise. Here the set $A$ is the promise set for function $f_B$. The input vectors $X_j, 1\\leq j\\leq m$ are given to the $m\\geq 2$ parties respectively, who communicate classical bits in a distributed environment so that one of them (say Alice) comes up with the value of the function. We algebraically characterize entanglement assisted LOCC protocols requiring only $m-1$ cbits of communication, for certain classes of such multiparty boolean functions for $m\\geq 2$ parties under appropriate uniform parity promise restrictions on input $m$-tuples $x_i^1x_i^2...x_i^m, 1\\leq i\\leq n$. In contrast, for certain $m$-party accumulative boo...

  16. Financial considerations affecting implementation of a large multiparty cogeneration project

    Energy Technology Data Exchange (ETDEWEB)

    1979-04-01

    The report identifies problems inhibiting large scale multiparty cogeneration development and suggests means to reconcile the parties' differing interests. The analytical approach adopted for structuring ownership arrangements for a cogeneration project, once engineering studies confirm that the requisite technical advantages exist, is to attempt to resolve three specific issues: (1) identification of the potential participants (industrial customers, the electric utility serving the area, equipment vendors and erectors, design and engineering firms, fuel suppliers and transporters, passive investors, governmental interests, insurance carriers, and others); (2) selection of one or more of the three principal roles which each participant may play: (a) purchaser of project output, (b) provider of other commitments to support financing of the project, and (c) investor in the project; and (3) as to those participants taking an ownership role in the project, deciding whether one participant will act as sole owner or, if joint ownership is selected, deciding which of two structural formats they prefer: (a) an undivided interest approach in which each participant is responsible for and bears the full burden of providing its proportionate share of funding for the project; or (b) a project-entity approach in which each participant owns an interest in a newly organized entity which in turn owns project assets, thereby making the funding of the project the common responsibility of all of the participants.

  17. A novel protocol for multiparty quantum key management

    Science.gov (United States)

    Xu, Gang; Chen, Xiu-Bo; Dou, Zhao; Yang, Yi-Xian; Li, Zongpeng

    2015-08-01

    Key management plays a fundamental role in the field of cryptography. In this paper, we propose a novel multiparty quantum key management (QKM) protocol. Departing from single-function quantum cryptography protocols, our protocol has a salient feature in that it accomplishes a complete QKM process. In this process, we can simultaneously realize the functions of key generation, key distribution and key backup by executing the protocol once. Meanwhile, for the first time, we propose the idea of multi-function QKM. Firstly, the secret key is randomly generated by managers via the quantum measurements in -level Bell basis. Then, through entanglement swapping, the secret key is successfully distributed to users. Under circumstances of urgent requirement, all managers can cooperate to recover the users' secret key, but neither of them can recover it unilaterally. Furthermore, this protocol is further generalized into the multi-manager and multi-user QKM scenario. It has clear advantages in the burgeoning area of quantum security group communication. In this system, all group members share the same group key, and group key management is the foundation of secure group communication and hence an important subject of study.

  18. Applications of Maximum Likelihood Algorithm in Asynchronous CDMA Systems

    OpenAIRE

    Xiao, P; Strom, E

    2002-01-01

    We treat the problems of propagation delay and channel estimation as well as data detection of orthogonally modulated signals in an asynchronous DS-CDMA system over fading channels using the maximum likelihood (ML) approach. The overwhelming computational complexity of the ML algorithm makes it unfeasible for implementation. The emphasis of this paper is to reduce its complexity by some approximation methods. The derived approximative ML schemes are compared with conventional algorithms as we...

  19. On the convergence time of asynchronous distributed quantized averaging algorithms

    OpenAIRE

    ZHU, MINGHUI; Martinez, Sonia

    2010-01-01

    We come up with a class of distributed quantized averaging algorithms on asynchronous communication networks with fixed, switching and random topologies. The implementation of these algorithms is subject to the realistic constraint that the communication rate, the memory capacities of agents and the computation precision are finite. The focus of this paper is on the study of the convergence time of the proposed quantized averaging algorithms. By appealing to random walks on graphs, we derive ...

  20. Asynchronous Discussions and Assessment in Online Learning

    Science.gov (United States)

    Vonderwell, Selma; Liang, Xin; Alderman, Kay

    2007-01-01

    This case study explored asynchronous online discussions, assessment processes, and the meaning students derived from their experiences in five online graduate courses at the Colleges of Education of two Midwestern higher education institutions. The findings suggest that asynchronous online discussions facilitate a multidimensional process of…

  1. Issue Evolution and the Remaking of Partisan Alignments in a European Multiparty System

    DEFF Research Database (Denmark)

    Arndt, Christoph

    partisan (re-)alignments. This paper applies the issue evolution perspective to a European multiparty system. I find that the evolution of issues such as immigration or crime has reshaped partisan alignments in Denmark as polarization of new issues on the elite level reshapes partisan alignments. Unlike...

  2. Abstracting Asynchronous Multi-Valued Networks

    Directory of Open Access Journals (Sweden)

    J. Steggles

    2011-01-01

    Full Text Available Multi-valued networks (MVNs provide a simple yet expressive qualitative state based modelling approach for biological systems. In this paper we develop an abstraction theory for asynchronous MVNs that allows the state space of a model to be reduced while preserving key properties. The abstraction theory therefore provides a mechanism for coping with the state space explosion problem and supports the analysis and comparison of MVNs. We take as our starting point the abstraction theory for synchronous MVNs which uses the under- approximation approach of trace set inclusion. We show this definition of asynchronous abstraction allows the sound inference of analysis properties and preserves other interesting model properties. One problem that arises in the asynchronous case is that the trace set of an MVN can be infinite making a simple trace set inclusion check infeasible. To address this we develop a decision procedure for checking asynchronous abstractions based on using the finite state graph of an asynchronous MVN to reason about its trace semantics and formally show that this decision procedure is correct. We illustrate the abstraction techniques developed by considering two detailed case studies in which asynchronous abstractions are identified and validated for existing asynchronous MVN models taken from the literature.

  3. Burst-Mode Asynchronous Controllers on FPGA

    Directory of Open Access Journals (Sweden)

    Duarte L. Oliveira

    2008-01-01

    Full Text Available FPGAs have been mainly used to design synchronous circuits. Asynchronous design on FPGAs is difficult because the resulting circuit may suffer from hazard problems. We propose a method that implements a popular class of asynchronous circuits, known as burst mode, on FPGAs based on look-up table architectures. We present two conditions that, if satisfied, guarantee essential hazard-free implementation on any LUT-based FPGA. By doing that, besides all the intrinsic advantages of asynchronous over synchronous circuits, they also take advantage of the shorter design time and lower cost associated with FPGA designs.

  4. Carrying Synchronous Voice Data On Asynchronous Networks

    Science.gov (United States)

    Bergman, Larry A.

    1990-01-01

    Buffers restore synchronism for internal use and permit asynchronism in external transmission. Proposed asynchronous local-area digital communication network (LAN) carries synchronous voice, data, or video signals, or non-real-time asynchronous data signals. Network uses double buffering scheme that reestablishes phase and frequency references at each node in network. Concept demonstrated in token-ring network operating at 80 Mb/s, pending development of equipment operating at planned data rate of 200 Mb/s. Technique generic and used with any LAN as long as protocol offers deterministic (or bonded) access delays and sufficient capacity.

  5. Implementing LOTOS as asynchronously Communicating Processes

    OpenAIRE

    Sjödin, Peter

    1990-01-01

    A technique is presented for translating LOTOS specifications into implementations executing as asynchronously communicating processes. This generation of implementations is described as transformations of LOTOS expressions. A protocol for implementing LOTOS synchronisation is described.

  6. Asynchronous Data Fusion With Parallel Filtering Frame

    OpenAIRE

    Na Li; Junhui Liu

    2011-01-01

    This paper studies the design of data fusion algorithm for asynchronous system with integer times sampling. Firstly, the multisensor asynchronous samplings is mapped to the basic axis, accordingly a sampling sequence of single sensor can be taken. Secondly, aiming at the sensor with the densest sampling points, the modified parallel filtering is given. Afterwards, the sequential filtering fusion method is introduced to deal with the case that there are multiple mapped measurements at some sam...

  7. REACTIVE POWER COMPENSATION IN ASYNCHRONOUS ELECTRIC DRIVES

    Directory of Open Access Journals (Sweden)

    V.S. Malyar

    2013-10-01

    Full Text Available A problem of calculating capacity of cosine capacitors for individual compensation of reactive power in asynchronous electric drives in stationary and transient operation modes is considered. The algorithm introduced employs a high-adequacy mathematical model of asynchronous motor developed on the theory of representing vectors which takes into account both the magnetic core saturation and the current displacement in the rotor bars.

  8. Asynchronous communication in real space process algebra

    OpenAIRE

    Baeten, JCM Jos; Bergstra, JA Jan

    1992-01-01

    A version of classical real space process algebra is given in which messages travel with constant speed through a three-dimensional medium. It follows that communication is asynchronous and has a broadcasting character. A state operator is used to describe asynchronous message transfer and a priority mechanism allows to express the broadcasting mechanism. As an application, a protocol is specified in which the receiver moves with respect to the sender.

  9. Performance Analysis of Asynchronous Multicarrier Wireless Networks

    OpenAIRE

    Lin, Xingqin; Jiang, Libin; Andrews, Jeffrey G.

    2014-01-01

    This paper develops a novel analytical framework for asynchronous wireless networks deploying multicarrier transmission. Nodes in the network have different notions of timing, so from the viewpoint of a typical receiver, the received signals from different transmitters are asynchronous, leading to a loss of orthogonality between subcarriers. We first develop a detailed link-level analysis based on OFDM, based on which we propose a tractable system-level signal-to-interference-plus-noise ratio...

  10. Asynchronous event-based hebbian epipolar geometry.

    Science.gov (United States)

    Benosman, Ryad; Ieng, Sio-Hoï; Rogister, Paul; Posch, Christoph

    2011-11-01

    Epipolar geometry, the cornerstone of perspective stereo vision, has been studied extensively since the advent of computer vision. Establishing such a geometric constraint is of primary importance, as it allows the recovery of the 3-D structure of scenes. Estimating the epipolar constraints of nonperspective stereo is difficult, they can no longer be defined because of the complexity of the sensor geometry. This paper will show that these limitations are, to some extent, a consequence of the static image frames commonly used in vision. The conventional frame-based approach suffers from a lack of the dynamics present in natural scenes. We introduce the use of neuromorphic event-based--rather than frame-based--vision sensors for perspective stereo vision. This type of sensor uses the dimension of time as the main conveyor of information. In this paper, we present a model for asynchronous event-based vision, which is then used to derive a general new concept of epipolar geometry linked to the temporal activation of pixels. Practical experiments demonstrate the validity of the approach, solving the problem of estimating the fundamental matrix applied, in a first stage, to classic perspective vision and then to more general cameras. Furthermore, this paper shows that the properties of event-based vision sensors allow the exploration of not-yet-defined geometric relationships, finally, we provide a definition of general epipolar geometry deployable to almost any visual sensor. PMID:21954205

  11. Arithmetic Operations and Factorization using Asynchronous P Systems

    Directory of Open Access Journals (Sweden)

    Takayuki Murakawa

    2012-07-01

    Full Text Available

    In the present paper, we consider the asynchronous parallelism in membrane computing, and propose asynchronous P systems that perform two basic arithmetic operations and factorization. Since there is no restrictive assumption for application of rules, sequential and maximal parallel executions are allowed on the asynchronous P system.

    We first propose a P system that computes addition of two binary numbers of m bits.  The P system works in O(m sequential and parallel steps using O(m types of objects. We next propose a P system for multiplication of the two binary numbers of m bits, and show that the P system works in O(m log m parallel steps or O(m3 sequential steps using O(m2 types of objects. Finally, we propose a P system for factorization of a positive integer of $m$ bits using the above P system as a sub-system. The P system computes the factorization in O(m log m parallel steps or O(4m 

  12. W-state Analyzer and Multi-party Measurement-device-independent Quantum Key Distribution

    Science.gov (United States)

    Zhu, Changhua; Xu, Feihu; Pei, Changxing

    2015-12-01

    W-state is an important resource for many quantum information processing tasks. In this paper, we for the first time propose a multi-party measurement-device-independent quantum key distribution (MDI-QKD) protocol based on W-state. With linear optics, we design a W-state analyzer in order to distinguish the four-qubit W-state. This analyzer constructs the measurement device for four-party MDI-QKD. Moreover, we derived a complete security proof of the four-party MDI-QKD, and performed a numerical simulation to study its performance. The results show that four-party MDI-QKD is feasible over 150 km standard telecom fiber with off-the-shelf single photon detectors. This work takes an important step towards multi-party quantum communication and a quantum network.

  13. W-state Analyzer and Multi-party Measurement-device-independent Quantum Key Distribution.

    Science.gov (United States)

    Zhu, Changhua; Xu, Feihu; Pei, Changxing

    2015-01-01

    W-state is an important resource for many quantum information processing tasks. In this paper, we for the first time propose a multi-party measurement-device-independent quantum key distribution (MDI-QKD) protocol based on W-state. With linear optics, we design a W-state analyzer in order to distinguish the four-qubit W-state. This analyzer constructs the measurement device for four-party MDI-QKD. Moreover, we derived a complete security proof of the four-party MDI-QKD, and performed a numerical simulation to study its performance. The results show that four-party MDI-QKD is feasible over 150 km standard telecom fiber with off-the-shelf single photon detectors. This work takes an important step towards multi-party quantum communication and a quantum network. PMID:26644289

  14. ON THE ISSUE OF VECTOR CONTROL OF THE ASYNCHRONOUS MOTORS

    Directory of Open Access Journals (Sweden)

    B. I. Firago

    2015-10-01

    of the computer based simulation of a specific electric drive on the basis of an asynchronous motor 4А132S4У3 (7,5 kW with direct vector control at the rated loading. The results confirm validity of the presented technique to investigation of the

  15. IHadoop: Asynchronous iterations for MapReduce

    KAUST Repository

    Elnikety, Eslam Mohamed Ibrahim

    2011-11-01

    MapReduce is a distributed programming frame-work designed to ease the development of scalable data-intensive applications for large clusters of commodity machines. Most machine learning and data mining applications involve iterative computations over large datasets, such as the Web hyperlink structures and social network graphs. Yet, the MapReduce model does not efficiently support this important class of applications. The architecture of MapReduce, most critically its dataflow techniques and task scheduling, is completely unaware of the nature of iterative applications; tasks are scheduled according to a policy that optimizes the execution for a single iteration which wastes bandwidth, I/O, and CPU cycles when compared with an optimal execution for a consecutive set of iterations. This work presents iHadoop, a modified MapReduce model, and an associated implementation, optimized for iterative computations. The iHadoop model schedules iterations asynchronously. It connects the output of one iteration to the next, allowing both to process their data concurrently. iHadoop\\'s task scheduler exploits inter-iteration data locality by scheduling tasks that exhibit a producer/consumer relation on the same physical machine allowing a fast local data transfer. For those iterative applications that require satisfying certain criteria before termination, iHadoop runs the check concurrently during the execution of the subsequent iteration to further reduce the application\\'s latency. This paper also describes our implementation of the iHadoop model, and evaluates its performance against Hadoop, the widely used open source implementation of MapReduce. Experiments using different data analysis applications over real-world and synthetic datasets show that iHadoop performs better than Hadoop for iterative algorithms, reducing execution time of iterative applications by 25% on average. Furthermore, integrating iHadoop with HaLoop, a variant Hadoop implementation that caches

  16. Wind Generator Stabilization with Doubly-Fed Asynchronous Machine

    Institute of Scientific and Technical Information of China (English)

    WU Li; WANG Zhi-xin

    2007-01-01

    This paper investigates the function of doubly-fed asynchronous machine(DASM) with emphasis placed on its ability to the stabilization of the power system including wind generators. P(active power) and Q(reactive power) compensation from DASM can be regulated independently through secondary-excitation controlling. Simulation results by power system computer aided design(PSCAD) show that DASM can restore the wind-generator system to a normal operating condition rapidly even following severe transmission-line failures. Comparison studies have also been performed between wind turbine pitch control and proposed method.

  17. Formal analysis and design of multi-party fair exchange protocols

    Institute of Scientific and Technical Information of China (English)

    2006-01-01

    Based on the origin of message items and channel combination between transacting parties, and events and relations among events, this paper presents a concise, precise, and hierarchical model for general fair exchange protocols, formally specifies various security requirements which are able to reflect inherent requirements for fair exchange protocols more rigorously, and partition these security requirements with fine granularity. This work helps analyze, debug, and design multi-party fair exchange protocols more effectively and elaborately.

  18. Comment on 'Multiparty quantum secret sharing of classical messages based on entanglement swapping'

    International Nuclear Information System (INIS)

    In a recent paper [Z. J. Zhang and Z. X. Man, Phys. Rev. A 72, 022303 (2005)], a multiparty quantum secret sharing protocol based on entanglement swapping was presented. However, as we show, this protocol is insecure in the sense that an unauthorized agent group can recover the secret from the dealer. Hence we propose an improved version of this protocol which can stand against this kind of attack

  19. Economical multiparty simultaneous quantum identity authentication based on Greenberger–Horne–Zeilinger states

    International Nuclear Information System (INIS)

    A multiparty simultaneous quantum identity authentication protocol based on Greenberger–Horne–Zeilinger (GHZ) states is proposed. The multi-user can be authenticated by a trusted third party (TTP) simultaneously. Compared with the scheme proposed recently (Wang et al 2006 Chin. Phys. Lett. 23(9) 2360), the proposed scheme has the advantages of consuming fewer quantum and classical resources and lessening the difficulty and intensity of necessary operations. (general)

  20. Multi-party and Multi-contract Arbitration Mechanisms in International Commercial Arbitration

    OpenAIRE

    Laitinen, Klas

    2014-01-01

    International commercial arbitration is the de facto method of solving disputes between corporations. Multi-party and multi-contract arbitration situations have increased significantly in recent years, which has led to arbitration institutes creating new mechanisms to increase efficiency in such situations. However, these new rules have not been studied in-depth and compared to each other, to ascertain possible similarities, dissimilarities, and common requirements. This thesis examines joind...

  1. Asynchronous Complex Pipeline Design Based on ARM Instruction Set

    Institute of Scientific and Technical Information of China (English)

    WANG Bing; WANG Qin; PENG Rui-hua; FU Yu-zhuo

    2008-01-01

    This paper proposes an asynchronous complex pipeline based on ARM-V3 instruction set. Muller pipeline structure is used as prototype, and the factors which may affect pipeline performance are analyzed. To balance the difficulty of asynchronous design and performance analysis, both complete asynchronous and partial asynchronous structures aere designed and compared. Results of comparison with the well-Rnown industrial product ARM922T verify that about 30% and 40% performance improvement of the partial and complete asynchronous complex pipelines can be obtained respectively. The design methodologies can also be used in the design of other asynchronous pipelines.

  2. Time-Efficient Read/Write Register in Crash-prone Asynchronous Message-Passing Systems

    OpenAIRE

    Mostefaoui, Achour; Raynal, Michel

    2016-01-01

    The atomic register is certainly the most basic object of computing science. Its implementation on top of an n-process asynchronous message-passing system has received a lot of attention. It has been shown that t \\textless{} n/2 (where t is the maximal number of processes that may crash) is a necessary and sufficient requirement to build an atomic register on top of a crash-prone asynchronous message-passing system. Considering such a context, this paper visits the notion of a fast implementa...

  3. An Asynchronous P300 BCI With SSVEP-Based Control State Detection

    DEFF Research Database (Denmark)

    Panicker, Rajesh C.; Puthusserypady, Sadasivan; Sun, Ying

    2011-01-01

    In this paper, an asynchronous brain–computer interface (BCI) system combining the P300 and steady-state visually evoked potentials (SSVEPs) paradigms is proposed. The information transfer is accomplished using P300 event-related potential paradigm and the control state (CS) detection is achieved...

  4. Asynchronous decentralized method for interconnected electricity markets

    International Nuclear Information System (INIS)

    This paper presents an asynchronous decentralized method to solve the optimization problem of interconnected electricity markets. The proposed method decomposes the optimization problem of combined electricity markets into individual optimization problems. The impact of neighboring markets' information is included in the objective function of the individual market optimization problem by the standard Lagrangian relaxation method. Most decentralized optimization methods use synchronous models of communication to exchange updated market information among markets during the iterative process. In this paper, however, the solutions of the individual optimization problems are coordinated through an asynchronous communication model until they converge to the global optimal solution of combined markets. Numerical examples are presented to demonstrate the advantages of the proposed asynchronous method over the existing synchronous methods. (author)

  5. Modelling and Simulation of Asynchronous Real-Time Systems using Timed Rebeca

    CERN Document Server

    Aceto, Luca; Ingolfsdottir, Anna; Reynisson, Arni Hermann; Sigurdarson, Steinar Hugi; Sirjani, Marjan; 10.4204/EPTCS.58.1

    2011-01-01

    In this paper we propose an extension of the Rebeca language that can be used to model distributed and asynchronous systems with timing constraints. We provide the formal semantics of the language using Structural Operational Semantics, and show its expressiveness by means of examples. We developed a tool for automated translation from timed Rebeca to the Erlang language, which provides a first implementation of timed Rebeca. We can use the tool to set the parameters of timed Rebeca models, which represent the environment and component variables, and use McErlang to run multiple simulations for different settings. Timed Rebeca restricts the modeller to a pure asynchronous actor-based paradigm, where the structure of the model represents the service oriented architecture, while the computational model matches the network infrastructure. Simulation is shown to be an effective analysis support, specially where model checking faces almost immediate state explosion in an asynchronous setting.

  6. Dual stator winding variable speed asynchronous generator: magnetic equivalent circuit with saturation, FEM analysis and experiments

    Science.gov (United States)

    Tutelea, L. N.; Muntean, N.; Deaconu, S. I.; Cunţan, C. D.

    2016-02-01

    The authors carried out a theoretical and experimental study of dual stator winding squirrel cage asynchronous generator (DSWA) behaviour in the presence of saturation regime (non-sinusoidal) due to the variable speed operation. The main aims are the determination of the relations of calculating the equivalent parameters of the machine windings, FEM validation of parameters and characteristics with free FEMM 4.2 computing software and the practice experimental tests for verifying them. Issue is limited to three phase range of double stator winding cage-asynchronous generator of small sized powers, the most currently used in the small adjustable speed wind or hydro power plants. The tests were carried out using three-phase asynchronous generator having rated power of 6 [kVA].

  7. EXPERIMENTAL STUDY OF THE ASYNCHRONOUS MULTISPLITTING RELAXATION METHODS FOR THE LINEAR COMPLEMENTARITY PROBLEMS

    Institute of Scientific and Technical Information of China (English)

    Zhong-zhi Bai

    2002-01-01

    We study the numerical behaviours of the relaxed asynchronous multisplitting methods for the linear complementarity problems by solving some typical problems from practical applications on a real multiprocessor system. Numerical results show that the parallel multisplitting relaxation methods always perform much better than the corresponding sequential alternatives, and that the asynchronous multisplitting relaxation methods often outperform their corresponding synchronous counterparts. Moreover, the two-sweep relaxed multisplitting methods have better convergence properties than their corresponding one-sweep relaxed ones in the sense that they have larger convergence domains and faster convergence speeds. Hence, the asynchronous multisplitting unsymmetric relaxation iterations should be the methods of choice for solving the large sparse linear complementarity problems in the parallel computing environments.

  8. Asynchronous Video Interviewing as a New Technology in Personnel Selection: The Applicant's Point of View.

    Science.gov (United States)

    Brenner, Falko S; Ortner, Tuulia M; Fay, Doris

    2016-01-01

    The present study aimed to integrate findings from technology acceptance research with research on applicant reactions to new technology for the emerging selection procedure of asynchronous video interviewing. One hundred six volunteers experienced asynchronous video interviewing and filled out several questionnaires including one on the applicants' personalities. In line with previous technology acceptance research, the data revealed that perceived usefulness and perceived ease of use predicted attitudes toward asynchronous video interviewing. Furthermore, openness revealed to moderate the relation between perceived usefulness and attitudes toward this particular selection technology. No significant effects emerged for computer self-efficacy, job interview self-efficacy, extraversion, neuroticism, and conscientiousness. Theoretical and practical implications are discussed. PMID:27378969

  9. Handbook of asynchronous machines with variable speed

    CERN Document Server

    Razik, Hubert

    2013-01-01

    This handbook deals with the asynchronous machine in its close environment. It was born from a reflection on this electromagnetic converter whose integration in industrial environments takes a wide part. Previously this type of motor operated at fixed speed, from now on it has been integrated more and more in processes at variable speed. For this reason it seemed useful, or necessary, to write a handbook on the various aspects from the motor in itself, via the control and while finishing by the diagnosis aspect. Indeed, an asynchronous motor is used nowadays in industry where variation speed a

  10. A Parallel Particle Swarm Optimization Algorithm Accelerated by Asynchronous Evaluations

    Science.gov (United States)

    Venter, Gerhard; Sobieszczanski-Sobieski, Jaroslaw

    2005-01-01

    A parallel Particle Swarm Optimization (PSO) algorithm is presented. Particle swarm optimization is a fairly recent addition to the family of non-gradient based, probabilistic search algorithms that is based on a simplified social model and is closely tied to swarming theory. Although PSO algorithms present several attractive properties to the designer, they are plagued by high computational cost as measured by elapsed time. One approach to reduce the elapsed time is to make use of coarse-grained parallelization to evaluate the design points. Previous parallel PSO algorithms were mostly implemented in a synchronous manner, where all design points within a design iteration are evaluated before the next iteration is started. This approach leads to poor parallel speedup in cases where a heterogeneous parallel environment is used and/or where the analysis time depends on the design point being analyzed. This paper introduces an asynchronous parallel PSO algorithm that greatly improves the parallel e ciency. The asynchronous algorithm is benchmarked on a cluster assembled of Apple Macintosh G5 desktop computers, using the multi-disciplinary optimization of a typical transport aircraft wing as an example.

  11. Spatiotemporal Features for Asynchronous Event-based Data

    Directory of Open Access Journals (Sweden)

    Xavier eLagorce

    2015-02-01

    Full Text Available Bio-inspired asynchronous event-based vision sensors are currently introducing a paradigm shift in visual information processing. These new sensors rely on a stimulus-driven principle of light acquisition similar to biological retinas. They are event-driven and fully asynchronous, thereby reducing redundancy and encoding exact times of input signal changes, leading to a very precise temporal resolution. Approaches for higher-level computer vision often rely on the realiable detection of features in visual frames, but similar definitions of features for the novel dynamic and event-based visual input representation of silicon retinas have so far been lacking. This article addresses the problem of learning and recognizing features for event-based vision sensors, which capture properties of truly spatiotemporal volumes of sparse visual event information. A novel computational architecture for learning and encoding spatiotemporal features is introduced based on a set of predictive recurrent reservoir networks, competing via winner-take-all selection. Features are learned in an unsupervised manner from real-world input recorded with event-based vision sensors. It is shown that the networks in the architecture learn distinct and task-specific dynamic visual features, and can predict their trajectories over time.

  12. FAST: A fully asynchronous and status-tracking pattern for geoprocessing services orchestration

    Science.gov (United States)

    Wu, Huayi; You, Lan; Gui, Zhipeng; Gao, Shuang; Li, Zhenqiang; Yu, Jingmin

    2014-09-01

    Geoprocessing service orchestration (GSO) provides a unified and flexible way to implement cross-application, long-lived, and multi-step geoprocessing service workflows by coordinating geoprocessing services collaboratively. Usually, geoprocessing services and geoprocessing service workflows are data and/or computing intensive. The intensity feature may make the execution process of a workflow time-consuming. Since it initials an execution request without blocking other interactions on the client side, an asynchronous mechanism is especially appropriate for GSO workflows. Many critical problems remain to be solved in existing asynchronous patterns for GSO including difficulties in improving performance, status tracking, and clarifying the workflow structure. These problems are a challenge when orchestrating performance efficiency, making statuses instantly available, and constructing clearly structured GSO workflows. A Fully Asynchronous and Status-Tracking (FAST) pattern that adopts asynchronous interactions throughout the whole communication tier of a workflow is proposed for GSO. The proposed FAST pattern includes a mechanism that actively pushes the latest status to clients instantly and economically. An independent proxy was designed to isolate the status tracking logic from the geoprocessing business logic, which assists the formation of a clear GSO workflow structure. A workflow was implemented in the FAST pattern to simulate the flooding process in the Poyang Lake region. Experimental results show that the proposed FAST pattern can efficiently tackle data/computing intensive geoprocessing tasks. The performance of all collaborative partners was improved due to the asynchronous mechanism throughout communication tier. A status-tracking mechanism helps users retrieve the latest running status of a GSO workflow in an efficient and instant way. The clear structure of the GSO workflow lowers the barriers for geospatial domain experts and model designers to

  13. Acceptability of an Asynchronous Learning Forum on Mobile Devices

    Science.gov (United States)

    Chang, Chih-Kai

    2010-01-01

    Mobile learning has recently become noteworthy because mobile devices have become popular. To construct an asynchronous learning forum on mobile devices is important because an asynchronous learning forum is always an essential part of networked asynchronous distance learning. However, the input interface in handheld learning devices, which is…

  14. The non-anticipation of the asynchronous systems

    OpenAIRE

    Vlad, Serban E.

    2008-01-01

    The asynchronous systems are the models of the asynchronous circuits from the digital electrical engineering and non-anticipation is one of the most important properties in systems theory. Our present purpose is to introduce several concepts of non-anticipation of the asynchronous systems.

  15. Asynchronous Rumor Spreading on Random Graphs

    CERN Document Server

    Panagiotou, Konstantinos

    2016-01-01

    We perform a thorough study of various characteristics of the asynchronous push-pull protocol for spreading a rumor on Erd\\H{o}s-R\\'enyi random graphs $G_{n,p}$, for any $p>c\\ln(n)/n$ with $c>1$. In particular, we provide a simple strategy for analyzing the asynchronous push-pull protocol on arbitrary graph topologies and apply this strategy to $G_{n,p}$. We prove tight bounds of logarithmic order for the total time that is needed until the information has spread to all nodes. Surprisingly, the time required by the asynchronous push-pull protocol is asymptotically almost unaffected by the average degree of the graph. Similarly tight bounds for Erd\\H{o}s-R\\'enyi random graphs have previously only been obtained for the synchronous push protocol, where it has been observed that the total running time increases significantly for sparse random graphs. Finally, we quantify the robustness of the protocol with respect to transmission and node failures. Our analysis suggests that the asynchronous protocols are particu...

  16. Increasing Student Engagement Using Asynchronous Learning

    Science.gov (United States)

    Northey, Gavin; Bucic, Tania; Chylinski, Mathew; Govind, Rahul

    2015-01-01

    Student engagement is an ongoing concern for educators because of its positive association with deep learning and educational outcomes. This article tests the use of a social networking site (Facebook) as a tool to facilitate asynchronous learning opportunities that complement face-to-face interactions and thereby enable a stronger learning…

  17. Duration of asynchronous operations in distributed systems

    OpenAIRE

    Makhaniok, Mikhail; Männer, Reinhard

    1995-01-01

    A distributed asynchronous system is investigated. Its processing elements execute common operations concurrently and distributively. They are implemented as combinatorial circuits and exchange data via open collector bus lines. A method is presented to identify and to minimize the duration of an operation and therefore to increase the performance of the system. No hardware modifications are required.

  18. CCS, locations and asynchronous transition systems

    DEFF Research Database (Denmark)

    Mukund, Madhavan; Nielsen, Mogens

    system for CCS by introducing labels on the transitions with information about the locations of events. We then show that the resulting transition system is an asynchronous transition system which has the additional property of being elementary, which means that it can also be represented by a 1-safe net...

  19. Efficient multiparty protocols via log-depth threshold formulae

    DEFF Research Database (Denmark)

    Cohen, Gil; Damgård, Ivan Bjerre; Ishai, Yuval; Kölker, Jonas; Miltersen, P.B.; Raz, Ran; Rothblum, R.D.

    , 2000) with constructions of logarithmic-depth formulae which compute threshold functions using only constant fan-in threshold gates. Using this approach, we simplify and improve on previous results in cryptography and distributed computing. In particular: We provide conceptually simple constructions of...... complexity-theoretic contributions, which may be of independent interest: We show that for every j,k ∈ ℕ such that m≜k−1j−1 is an integer, there is an explicit (poly(n)-time) construction of a logarithmic-depth formula which computes a good approximation of an (n/m)-out-of-n threshold function using only j...

  20. Asynchronous compressed beamformer for portable diagnostic ultrasound systems.

    Science.gov (United States)

    Zhou, Jun; Hoyos, Sebastian; Sadler, Brian

    2014-11-01

    State-of-the-art portable ultrasound imaging systems employ a small transducer array and a low carrier frequency to fit stringent constraints on power and form factor, and this tends to compromise the ultrasound imaging quality. In this paper, we present a low-complexity low-power asynchronous compressed beamformer (ACB) for portable diagnostic ultrasound. The proposed ACB integrates asynchronous sampling and compressive sensing (CS), and is capable of reducing data conversion power and handling a large data volume at the mixed-signal interface. A high-rate continuoustime ternary encoding (CT-TE) scheme eliminates the need for interpolation filters and coordinate rotation digital computer (CORDIC) units typically used in a conventional architecture. A split-projection least squares (SPLS) signal reconstruction algorithm is applied that replaces high-cost nonlinear signal recovery with a series of low-complexity and independent linear problems. Experiments with measured ultrasound data demonstrate the proposed ACB architecture, and the SPLS reconstruction algorithm achieves 9-fold data compression compared with Nyquist sampling. PMID:25389158

  1. Propagation of external regulation and asynchronous dynamics in random Boolean networks

    OpenAIRE

    Mahmoudi, Hamed; Pagnani, Andrea; Weigt, Martin; Zecchina, Riccardo

    2007-01-01

    Boolean Networks and their dynamics are of great interest as abstract modeling schemes in various disciplines, ranging from biology to computer science. Whereas parallel update schemes have been studied extensively in past years, the level of understanding of asynchronous updates schemes is still very poor. In this paper we study the propagation of external information given by regulatory input variables into a random Boolean network. We compute both analytically and numerically the time evol...

  2. Improving the security of multiparty quantum secret sharing against Trojan horse attack

    OpenAIRE

    Deng, Fu-Guo; Li, Xi-Han; Zhou, Hong-Yu; Zhang, Zhan-jun

    2005-01-01

    We analyzed the security of the multiparty quantum secret sharing (MQSS) protocol recently proposed by Zhang, Li and Man [Phys. Rev. A \\textbf{71}, 044301 (2005)] and found that this protocol is secure for any other eavesdropper except for the agent Bob who prepares the quantum signals as he can attack the quantum communication with a Trojan horse. That is, Bob replaces the single-photon signal with a multi-photon one and the other agent Charlie cannot find this cheating as she does not measu...

  3. Novel Multiparty Controlled Bidirectional Quantum Secure Direct Communication Based on Continuous-variable States

    Science.gov (United States)

    Yu, Zhen-Bo; Gong, Li-Hua; Wen, Ru-Hong

    2016-03-01

    A novel multiparty controlled bidirectional quantum secure direct communication protocol combining continuous-variable states with qubit block transmission is proposed. Two legitimate communication parties encode their own secret information into entangled optical modes with translation operations, and the secret information of each counterpart can only be recovered under the permission of all controllers. Due to continuous-variable states and block transmission strategy, the proposed protocol is easy to realize with perfect qubit efficiency. Security analyses show that the proposed protocol is free from common attacks, including the man-in-the-middle attack.

  4. A Multiparty Controlled Bidirectional Quantum Secure Direct Communication and Authentication Protocol Based on EPR Pairs

    Science.gov (United States)

    Chang, Yan; Zhang, Shi-Bin; Yan, Li-Li; Sheng, Zhi-Wei

    2013-06-01

    A multiparty controlled bidirectional quantum secure direct communication and authentication protocol is proposed based on EPR pair and entanglement swapping. The legitimate identities of communicating parties are encoded to Bell states which act as a detection sequence. Secret messages are transmitted by using the classical XOR operation, which serves as a one-time-pad. No photon with secret information transmits in the quantum channel. Compared with the protocols proposed by Wang et al. [Acta Phys. Sin. 56 (2007) 673; Opt. Commun. 266 (2006) 732], the protocol in this study implements bidirectional communication and authentication, which defends most attacks including the ‘man-in-the-middle’ attack efficiently.

  5. The Effect of Asynchronous/Synchronous Approaches on English Vocabulary Achievement: A Study of Iranian EFL Learners

    Science.gov (United States)

    Khodaparast, Fatemeh; Ghafournia, Narjes

    2015-01-01

    The contribution of computer-assisted instructional programs to language learning process has been the focus of researchers for about two decades. However, the effect of synchronous and asynchronous computer-assisted approaches of language teaching on improving L2 vocabulary has been scarcely investigated. This study explored whether synchronous,…

  6. On Adaptive vs. Non-adaptive Security of Multiparty Protocols

    DEFF Research Database (Denmark)

    Canetti, Ran; Damgård, Ivan Bjerre; Dziembowski, Stefan; Ishai, Yuval; Malkin, Tal

    course of the computation. We study the relations between adaptive security (i.e., security in the adaptive setting) and non-adaptive security, according to two definitions and in several models of computation. While affirming some prevailing beliefs, we also obtain some unexpected results. Some...... definition of Canetti, for honest-but-curious adversaries, adaptive security is equivalent to non-adaptive security when the number of parties is logarithmic, and is strictly stronger than non-adaptive security when the number of parties is super-logarithmic. For Byzantine adversaries, adaptive security is...

  7. Existence test for asynchronous interval iterations

    DEFF Research Database (Denmark)

    Madsen, Kaj; Caprani, O.; Stauning, Ole

    1997-01-01

    In the search for regions that contain fixed points ofa real function of several variables, tests based on interval calculationscan be used to establish existence ornon-existence of fixed points in regions that are examined in the course ofthe search. The search can e.g. be performed as a...... synchronous (sequential) interval iteration:In each iteration step all components of the iterate are calculatedbased on the previous iterate. In this case it is straight forward to base simple interval existence and non-existencetests on the calculations done in each step of the iteration. The search can also...... be performed as an asynchronous (parallel) iteration: Only a few components are changed in each stepand this calculation is in general based on components from differentprevious iterates. For the asynchronous iteration it turns out thatsimple tests of existence and non-existence can be based on...

  8. Enigma: Decentralized Computation Platform with Guaranteed Privacy

    OpenAIRE

    Zyskind, Guy; Nathan, Oz; Pentland, Alex

    2015-01-01

    A peer-to-peer network, enabling different parties to jointly store and run computations on data while keeping the data completely private. Enigma's computational model is based on a highly optimized version of secure multi-party computation, guaranteed by a verifiable secret-sharing scheme. For storage, we use a modified distributed hashtable for holding secret-shared data. An external blockchain is utilized as the controller of the network, manages access control, identities and serves as a...

  9. Direct Torque Control of the Asynchronous Motor

    Directory of Open Access Journals (Sweden)

    Peter Girovský

    2008-05-01

    Full Text Available This contribution deals with the proposal of direct torque control (DTC of asynchronous motor (AMwith the help of fuzzy logic. The whole structure of DTC is designed in software Matlab – Simulink, the fuzzy regulator is designed with the help of Fuzzy Toolbox. The results of DTC with fuzzy regulator are compared with DTC with the help of Depenbrock method and DTC with the help of Takahashi method.

  10. Direct Torque Control of the Asynchronous Motor

    OpenAIRE

    Peter Girovský; Jaroslava Žilková; Ľubomír Cibuľa; Jaroslav Timko

    2008-01-01

    This contribution deals with the proposal of direct torque control (DTC) of asynchronous motor (AM)with the help of fuzzy logic. The whole structure of DTC is designed in software Matlab – Simulink, the fuzzy regulator is designed with the help of Fuzzy Toolbox. The results of DTC with fuzzy regulator are compared with DTC with the help of Depenbrock method and DTC with the help of Takahashi method.

  11. Asynchronous Nano-Electronics: Preliminary Investigation

    OpenAIRE

    Martin, Alain J.; Prakash, Piyush

    2008-01-01

    This paper is a preliminary investigation in implementing asynchronous QDI logic in molecular nano-electronics, taking into account the restricted geometry, the lack of control on transistor strengths, the high timing variations. We show that the main building blocks of QDI logic can be successfully implemented; we illustrate the approach with the layout of an adder stage. The proposed techniques to improve the reliability of QDI apply to nano-CMOS as well.

  12. Rapid, generalized adaptation to asynchronous audiovisual speech

    OpenAIRE

    Van der Burg, Erik; Goodbourn, Patrick T.

    2015-01-01

    The brain is adaptive. The speed of propagation through air, and of low-level sensory processing, differs markedly between auditory and visual stimuli; yet the brain can adapt to compensate for the resulting cross-modal delays. Studies investigating temporal recalibration to audiovisual speech have used prolonged adaptation procedures, suggesting that adaptation is sluggish. Here, we show that adaptation to asynchronous audiovisual speech occurs rapidly. Participants viewed a brief clip of an...

  13. Accurate estimator of correlations between asynchronous signals

    OpenAIRE

    Toth, Bence; Kertesz, Janos

    2008-01-01

    The estimation of the correlation between time series is often hampered by the asynchronicity of the signals. Cumulating data within a time window suppresses this source of noise but weakens the statistics. We present a method to estimate correlations without applying long time windows. We decompose the correlations of data cumulated over a long window using decay of lagged correlations as calculated from short window data. This increases the accuracy of the estimated correlation significantl...

  14. Quantitative phase microscopy with asynchronous digital holography

    OpenAIRE

    Chalut, Kevin J.; Brown, William J.; Wax, Adam

    2007-01-01

    We demonstrate a new method of measuring quantitative phase in imaging of biological materials. This method, asynchronous digital holography, employs knowledge of a moving fringe created by acousto-optic modulators to execute phase-shifting interferometry using two near-simultaneous interferograms. The method can be used to obtain quantitative phase images of dynamic biological samples on millisecond time scales. We present results on a standard sample, and on live cell samples.

  15. Blending Online Asynchronous and Synchronous Learning

    Directory of Open Access Journals (Sweden)

    Lisa C. Yamagata-Lynch

    2014-04-01

    Full Text Available In this article I will share a qualitative self-study about a 15-week blended 100% online graduate level course facilitated through synchronous meetings on Blackboard Collaborate and asynchronous discussions on Blackboard. I taught the course at the University of Tennessee (UT during the spring 2012 semester and the course topic was online learning environments. The primary research question of this study was: How can the designer/instructor optimize learning experiences for students who are studying about online learning environments in a blended online course relying on both synchronous and asynchronous technologies? I relied on student reflections of course activities during the beginning, middle, and the end of the semester as the primary data source to obtain their insights regarding course experiences. Through the experiences involved in designing and teaching the course and engaging in this study I found that there is room in the instructional technology research community to address strategies for facilitating online synchronous learning that complement asynchronous learning. Synchronous online whole class meetings and well-structured small group meetings can help students feel a stronger sense of connection to their peers and instructor and stay engaged with course activities. In order to provide meaningful learning spaces in synchronous learning environments, the instructor/designer needs to balance the tension between embracing the flexibility that the online space affords to users and designing deliberate structures that will help them take advantage of the flexible space.

  16. Enabling techniques for asynchronous coherent OCDMA

    Science.gov (United States)

    Wang, Xu; Wada, Naoya; Kitayama, Ken-ichi

    2005-11-01

    The coherent OCDMA system could suffer from severe multiple access interference (MAI) and beat noise, which limit the maximum number of active users that can be supported in a network. One effective method to reduce the beat noise as well as the MAI noise is to lower the interference level by adopting ultra-long optical code. Applying optical thresholding technique is also crucial to enable data-rate detection for achieving a practical OCDMA system. In this paper, we review the recent progress in the key enabling techniques for asynchronous coherent OCDMA: the novel encoder/decoders including spatial lightwave phase modulator, micro-ring resonator for spectral phase coding and superstructured FBG (SSFBG) and AWG type encode/decoder for time-spreading coding; optical thresholding techniques with PPLN and nonlinearity in fiber. The FEC has also been applied in OCDMA system recently. With 511-chip SSFBG and SC-based optical thresholder, 10-user, truly-asynchronous gigabit OCDMA transmission has been successfully achieved. Most recently, a record throughput 12×10.71 Gbps truly-asynchronous OCDMA has been demonstrated by using the 16×16 ports AWG-type encoder/decoder and FEC transmit ITU-T G.709 OTN frames.

  17. Multithreaded Asynchronous Graph Traversal for In-Memory and Semi-External Memory

    KAUST Repository

    Pearce, Roger

    2010-11-01

    Processing large graphs is becoming increasingly important for many domains such as social networks, bioinformatics, etc. Unfortunately, many algorithms and implementations do not scale with increasing graph sizes. As a result, researchers have attempted to meet the growing data demands using parallel and external memory techniques. We present a novel asynchronous approach to compute Breadth-First-Search (BFS), Single-Source-Shortest-Paths, and Connected Components for large graphs in shared memory. Our highly parallel asynchronous approach hides data latency due to both poor locality and delays in the underlying graph data storage. We present an experimental study applying our technique to both In-Memory and Semi-External Memory graphs utilizing multi-core processors and solid-state memory devices. Our experiments using synthetic and real-world datasets show that our asynchronous approach is able to overcome data latencies and provide significant speedup over alternative approaches. For example, on billion vertex graphs our asynchronous BFS scales up to 14x on 16-cores. © 2010 IEEE.

  18. Normalized and Asynchronous Mirror Alignment for Cherenkov Telescopes

    CERN Document Server

    Ahnen, M L; Balbo, M; Bergmann, M; Biland, A; Blank, M; Bretz, T; Bruegge, K A; Buss, J; Domke, M; Dorner, D; Einecke, S; Hempfling, C; Hildebrand, D; Hughes, G; Lustermann, W; Mannheim, K; Mueller, S A; Neise, D; Neronov, A; Noethe, M; Overkemping, A -K; Paravac, A; Pauss, F; Rhode, W; Shukla, A; Temme, F; Thaele, J; Toscano, S; Vogler, P; Walter, R; Wilbert, A

    2016-01-01

    Imaging Atmospheric Cherenkov Telescopes (IACTs) need imaging optics with large apertures and high image intensities to map the faint Cherenkov light emitted from cosmic ray air showers onto their image sensors. Segmented reflectors fulfill these needs, and as they are composed from mass production mirror facets they are inexpensive and lightweight. However, as the overall image is a superposition of the individual facet images, alignment is a challenge. Here we present a computer vision based star tracking alignment method, which also works for limited or changing star light visibility. Our method normalizes the mirror facet reflection intensities to become independent of the reference star's intensity or the cloud coverage. Using two CCD cameras, our method records the mirror facet orientations asynchronously of the telescope drive system, and thus makes the method easy to integrate into existing telescopes. It can be combined with remote facet actuation, but does not require one to work. Furthermore, it ca...

  19. Designing asynchronous circuits using NULL convention logic (NCL)

    CERN Document Server

    Smith, Scott

    2009-01-01

    Designing Asynchronous Circuits using NULL Convention Logic (NCL) begins with an introduction to asynchronous (clockless) logic in general, and then focuses on delay-insensitive asynchronous logic design using the NCL paradigm. The book details design of input-complete and observable dual-rail and quad-rail combinational circuits, and then discusses implementation of sequential circuits, which require datapath feedback. Next, throughput optimization techniques are presented, including pipelining, embedding registration, early completion, and NULL cycle reduction. Subsequently, low-power design

  20. INVESTIGATING THE EFFECT OF ASYNCHRONOUS DISCUSSIONS ON STUDENTS’ LEARNING AND UNDERSTANDING OF MATHEMATICS SUBJECT

    Directory of Open Access Journals (Sweden)

    Ozcan OZYURT

    2011-10-01

    Full Text Available Recently, learning activities have gone beyond conventional environments and started to be performed via computer supported instruments. One of these instruments is asynchronous discussion forums (ADFs used as computer-supported collaborative learning means. Learners practice various learning activities in ADFs and produce knowledge construction. In the present study, document analysis was employed and all Turkish originated ADFs relating mathematics teaching were scanned and put subjected to content analysis. Besides, a survey was implemented on 86 high school and undergraduate students. Both qualitative and quantitative data were obtained through this survey. These data were put subjected to qualitative and quantitative data analysis. Attitudes of students towards computer-supported collaborative learning and asynchronous discussion forums as mathematics learning instrument were tried to be revealed via this study. Also, behaviors of the learners and their views relating the learning activities in these environments were evaluated by means of this study. Results of the study demonstrated that asynchronous discussion forums are widely and efficiently used as computer-supported collaborative learning instrument in terms of mathematics learning.

  1. Designing Asynchronous Circuits for Low Power: An IFIR Filter

    DEFF Research Database (Denmark)

    Nielsen, Lars Skovby; Sparsø, Jens

    1999-01-01

    This paper addresses the design of asynchronous circuits for low power through an example: a filter bank for a digital hearing aid. The asynchronous design re-implements an existing synchronous circuit which is used in a commercial product. For comparison, both designs have been fabricated in the...... by numerically small samples). Apart from the improved RAM design, these measures are only viable in an asynchronous design. The principles and techniques explained in this paper are of a general nature, and they apply to the design of asynchronous low-power digital signal-processing circuits in a...

  2. EPOS for Coordination of Asynchronous Sensor Webs Project

    Data.gov (United States)

    National Aeronautics and Space Administration — Develop, integrate, and deploy software-based tools to coordinate asynchronous, distributed missions and optimize observation planning spanning simultaneous...

  3. S.A.T.E.P. : Synchronous-Asynchronous Tele-education Platform

    OpenAIRE

    Lazaridis, Lazaros; Papatsimouli, Maria; Fragulis, George F.

    2014-01-01

    S.A.T.E.P. means Synchronous Asynchronous Tele education Platform is a software application for educational purposes, with a lot of parametrizing features written entirely from scratch. It aims at the training and examination of computer skills, a platform that can be adjusted to the needs of each lesson. In the application the trainer and the administrator can define the number of the lectures and upload files for each one of them. Furthermore, he can insert, modify and delete questions whic...

  4. Facilitation Prompts and Rubrics on Higher-Order Thinking Skill Performance Found in Undergraduate Asynchronous Discussion Boards

    Science.gov (United States)

    Giacumo, Lisa A.; Savenye, Wilhelmina; Smith, Nichole

    2013-01-01

    Over the past 20 years, researchers have begun to examine data from asynchronous computer-mediated student discussions in courses. Some results have shown students to demonstrate lower or mid-level thinking skills, while others suggest students routinely demonstrate higher-order thinking skills. The authors investigated the relationship between…

  5. Integrating multiple HD video services over tiled display for advanced multi-party collaboration

    Science.gov (United States)

    Han, Sangwoo; Kim, Jaeyoun; Choi, Kiho; Kim, JongWon

    2006-10-01

    Multi-party collaborative environments based on AG (Access Grid) are extensively utilized for distance learning, e-science, and other distributed global collaboration events. In such environments, A/V media services play an important role in providing QoE (quality of experience) to participants in collaboration sessions. In this paper, in order to support high-quality user experience in the aspect of video services, we design an integration architecture to combine high-quality video services and a high-resolution tiled display service. In detail, the proposed architecture incorporates video services for DV (digital video) and HDV (high-definition digital video) streaming with a display service to provide methods for decomposable decoding/display for a tiled display system. By implementing the proposed architecture on top of AG, we verify that high-quality collaboration among a couple of collaboration sites can be realized over a multicast-enabled network testbed with improved media quality experience.

  6. An Efficient Password Security of Multi-Party Key Exchange Protocol Based on ECDLP

    Directory of Open Access Journals (Sweden)

    Banshidhar Majhi

    2009-12-01

    Full Text Available In this paper we have proposed an efficient password security of multiparty Key Exchange Protocol based on Elliptic Curve Discrete Logarithm Problem. Key exchange protocols allow a group of parties communicating over a public network to establish a common secret key called session key.Due to their significance by in building a secure communication channel, a number of key exchange protocols have been suggested over the years for a variety of settings.our Protocol is password authentication model, where group member are assumed to hold an individual password rather than a common password. Here we have taken two one-way hash functions to built the level of security high.

  7. Robust target localization with multi-party cooperation in wireless sensor networks

    Science.gov (United States)

    Ding, Liang; Wang, Xue; Bi, Daowei

    2008-10-01

    Fault tolerant target localization is an important issue in wireless sensor networks. Faulty sensor nodes generate arbitrary data, which make the cooperation result untrustworthy. In this paper, multi-party cooperation between sensor nodes is used to estimate the target location robustly and accurately. We assign each sensor node a reliability level (RL) to qualify its data fidelity. A RL-weighted scheme is used to select the sensor node nearest to the target to perform as a processing node, which executes a particle swarm optimization algorithm to solve the maximum likelihood function of target location distribution. Each sensor node's RL is then updated according to the current data quality determined by the estimated target location. Experimental results show that although more than 50% sensor nodes are faulty, target localization error decreases over time and ultimately achieve a low level.

  8. Symmetric multiparty-controlled teleportation of an arbitrary two-particle entanglement

    International Nuclear Information System (INIS)

    We present a way for symmetric multiparty-controlled teleportation of an arbitrary two-particle entangled state based on Bell-basis measurements by using two Greenberger-Horne-Zeilinger states, i.e., a sender transmits an arbitrary two-particle entangled state to a distant receiver, an arbitrary one of the n+1 agents, via the control of the others in a network. It will be shown that the outcomes in the cases that n is odd or is even are different in principle as the receiver has to perform a controlled-NOT operation on his particles for reconstructing the original arbitrary entangled state in addition to some local unitary operations in the former. Also we discuss the applications of this controlled teleporation for quantum secret sharing of classical and quantum information. As all the instances can be used to carry useful information, its efficiency for qubit approaches the maximal value

  9. Simple Post Quantum Scheme for Higher Key Rate Multiparty Quantum Key Distribution

    Directory of Open Access Journals (Sweden)

    Abudhahir Buhari

    2012-10-01

    Full Text Available We propose a multi-party quantum key distribution protocol which enables all the receivers can converttheir respective private shared key into common secret key without use of entanglement. The maincomponent of our protocol is a simple post quantum scheme for achieving the higher secret key rate.Efficiency of the extracted key rate is almost 100%. We assume that sender established the pre-sharedprivate secret keys and a common secret number with the receivers. Our proposed scheme sends n stringsof number to n receivers in the public channel to convert their respective shared secret key into commonsecret key in the presence of Eve. We also analyze the complexity of attack by the adversary to guess thesecret key

  10. Improving the security of multiparty quantum secret sharing against Trojan horse attack

    CERN Document Server

    Deng, F G; Deng, Fu-Guo; Zhou, Hong-Yu

    2005-01-01

    Security of the multiparty quantum secret sharing (MQSS) protocol recently proposed by Zhang et al. [Phys. Rev. A \\textbf{71}, 044301 (2005)] is analyzed in the case that the agent who prepares the quantum signal, say Bob wants to eavesdrop the information about the unitary operations done by the other agent, Charlie by using a Trojan horse attack. Bob can replace the single-photon signal with a multi-photon one and Charlie cannot find this cheating as she does not measure the photons before they runs back from the boss Alice, which reveals that this MQSS protocol is not secure. Finally, we present a possible improvement of the MQSS protocol security with two single-photon measurements and four unitary operations.

  11. Multiparty Quantum Secret Sharing of Classical Message using Cavity Quantum Electrodynamic System

    Institute of Scientific and Technical Information of China (English)

    HAN Lian-Fang; LIU Yi-Min; ZHANG Zhan-Jun

    2006-01-01

    @@ An experimental feasible scheme of multiparty secret sharing of classical messages is proposed, based on a cavity quantum electrodynamic system. The secret messages are imposed on atomic Bell states initially in the sender's possession by local unitary operations. By swapping quantum entanglement of atomic Bell states, the secret messages are split into several parts and each part is distributed to a separate party. In this case, any subset of the entire party group can not read out the secret message but the entirety via mutual cooperations. In this scheme, to discriminate atomic Bell states, additional classical fields are employed besides the same highly-detuned single-mode cavities used to prepare atomic Bell states. This scheme is insensitive to the cavity decay and the thermal field, and usual joint Bell-state measurements are unnecessary.

  12. Asynchronous Video Interviewing as a New Technology in Personnel Selection: The Applicant’s Point of View

    Science.gov (United States)

    Brenner, Falko S.; Ortner, Tuulia M.; Fay, Doris

    2016-01-01

    The present study aimed to integrate findings from technology acceptance research with research on applicant reactions to new technology for the emerging selection procedure of asynchronous video interviewing. One hundred six volunteers experienced asynchronous video interviewing and filled out several questionnaires including one on the applicants’ personalities. In line with previous technology acceptance research, the data revealed that perceived usefulness and perceived ease of use predicted attitudes toward asynchronous video interviewing. Furthermore, openness revealed to moderate the relation between perceived usefulness and attitudes toward this particular selection technology. No significant effects emerged for computer self-efficacy, job interview self-efficacy, extraversion, neuroticism, and conscientiousness. Theoretical and practical implications are discussed. PMID:27378969

  13. Localized radio frequency communication using asynchronous transfer mode protocol

    Science.gov (United States)

    Witzke, Edward L.; Robertson, Perry J.; Pierson, Lyndon G.

    2007-08-14

    A localized wireless communication system for communication between a plurality of circuit boards, and between electronic components on the circuit boards. Transceivers are located on each circuit board and electronic component. The transceivers communicate with one another over spread spectrum radio frequencies. An asynchronous transfer mode protocol controls communication flow with asynchronous transfer mode switches located on the circuit boards.

  14. Asynchronous Learning Sources in a High-Tech Organization

    Science.gov (United States)

    Bouhnik, Dan; Giat, Yahel; Sanderovitch, Yafit

    2009-01-01

    Purpose: The purpose of this study is to characterize learning from asynchronous sources among research and development (R&D) personnel. It aims to examine four aspects of asynchronous source learning: employee preferences regarding self-learning; extent of source usage; employee satisfaction with these sources and the effect of the sources on the…

  15. Teaching Presence and Communication Timeliness in Asynchronous Online Courses

    Science.gov (United States)

    Skramstad, Erik; Schlosser, Charles; Orellana, Anymir

    2012-01-01

    This study examined student perceptions of teaching presence and communication timeliness in asynchronous online courses. Garrison, Anderson, and Archer's (2000) community of inquiry model provided the framework for the survey research methodology used. Participants were 59 student volunteers taking 1 or more asynchronous online graduate courses.…

  16. Considerations regarding asynchronous motor rotor parameters determination by FEM

    Directory of Open Access Journals (Sweden)

    Olivian Chiver

    2010-12-01

    Full Text Available The paper presents some considerations about asynchronous motor rotor parameters determination, using software based on finite elements method (FEM. For this, 2D magnetostatic and time harmonic analysis will be realized, at different frequencies, in case of a three phase asynchronous motor.

  17. Considerations regarding asynchronous motor rotor parameters determination by FEM

    OpenAIRE

    Olivian Chiver; Liviu Neamt; Zoltan Erdei; Eleonora Pop

    2010-01-01

    The paper presents some considerations about asynchronous motor rotor parameters determination, using software based on finite elements method (FEM). For this, 2D magnetostatic and time harmonic analysis will be realized, at different frequencies, in case of a three phase asynchronous motor.

  18. Realistic modelling of the effects of asynchronous motion at the base of bridge piers

    CERN Document Server

    Romanelli, F; Vaccari, F

    2002-01-01

    Frequently long-span bridges provide deep valley crossings, which require special consideration due to the possibility of local amplification of the ground motion as a consequence of topographical irregularities and local soil conditions. This does in fact cause locally enhanced seismic input with the possibility for the bridge piers to respond asynchronously. This introduces special design requirements so that possible out-of-phase ground displacements and the associated large relative displacements of adjacent piers can be accommodated without excessive damage. Assessment of the local variability of the ground motion due to local lateral heterogeneities and to attenuation properties is thus crucial toward the realistic definition of the asynchronous motion at the base of the bridge piers. We illustrate the work done in the framework of a large international cooperation to assess the importance of non-synchronous seismic excitation of long structures. To accomplish this task we compute complete synthetic acc...

  19. Secure Multi-Party Computation Based Privacy Preserving Extreme Learning Machine Algorithm Over Vertically Distributed Data

    OpenAIRE

    Çatak, Ferhat Özgür

    2016-01-01

    Especially in the Big Data era, the usage of different classification methods is increasing day by day. The success of these classification methods depends on the effectiveness of learning methods. Extreme learning machine (ELM) classification algorithm is a relatively new learning method built on feed-forward neural-network. ELM classification algorithm is a simple and fast method that can create a model from high-dimensional data sets. Traditional ELM learning algorithm implicitly assumes c...

  20. Multi-Agent Model using Secure Multi-Party Computing in e-Governance

    CERN Document Server

    Mishra, Durgesh Kumar

    2009-01-01

    Information management and retrieval of all the citizen occurs in almost all the public service functions. Electronic Government system is an emerging trend in India through which efforts are made to strive maximum safety and security. Various solutions for this have been proposed like Shibboleth, Public Key Infrastructure, Smart Cards and Light Weight Directory Access Protocols. Still, none of these guarantee 100 percent security. Efforts are being made to provide common national identity solution to various diverse Government identity cards. In this paper, we discuss issues related to these solutions.

  1. Multi-Agent Model using Secure Multi-Party Computing in e-Governance

    OpenAIRE

    Mishra, Durgesh Kumar; Shukla, Samiksha

    2009-01-01

    Information management and retrieval of all the citizen occurs in almost all the public service functions. Electronic Government system is an emerging trend in India through which efforts are made to strive maximum safety and security. Various solutions for this have been proposed like Shibboleth, Public Key Infrastructure, Smart Cards and Light Weight Directory Access Protocols. Still, none of these guarantee 100 percent security. Efforts are being made to provide common national identity so...

  2. Asynchronous machines. Direct torque control; Machines asynchrones. Commande par controle direct de couple

    Energy Technology Data Exchange (ETDEWEB)

    Fornel, B. de [Institut National Polytechnique, 31 - Toulouse (France)

    2006-05-15

    The asynchronous machine, with its low cost and robustness, is today the most widely used motor to make speed variators. However, its main drawback is that the same current generates both the magnetic flux and the torque, and thus any torque variation creates a flux variation. Such a coupling gives to the asynchronous machine a nonlinear behaviour which makes its control much more complex. The direct self control (DSC) method has been developed to improve the low efficiency of the scalar control method and for the specific railway drive application. The direct torque control (DTC) method is derived from the DSC method but corresponds to other type of applications. The DSC and DTC algorithms for asynchronous motors are presented in this article: 1 - direct control of the stator flux (DSC): principle, flux control, torque control, switching frequency of the inverter, speed estimation; 2 - direct torque control (DTC): principle, electromagnetic torque derivative, signals shape and switching frequency, some results, DTC speed variator without speed sensor, DTC application to multi-machine multi-converter systems; 3 - conclusion. (J.S.)

  3. Asynchronous Parallel Evolutionary Algorithms for Constrained Optimizations

    Institute of Scientific and Technical Information of China (English)

    2000-01-01

    Recently Guo Tao proposed a stochastic search algorithm in his PhD thesis for solving function op-timization problems. He combined the subspace search method (a general multi-parent recombination strategy) with the population hill-climbing method. The former keeps a global search for overall situation,and the latter keeps the convergence of the algorithm. Guo's algorithm has many advantages ,such as the sim-plicity of its structure ,the higher accuracy of its results, the wide range of its applications ,and the robustness of its use. In this paper a preliminary theoretical analysis of the algorithm is given and some numerical experiments has been done by using Guo's algorithm for demonstrating the theoretical results. Three asynchronous paral-lel evolutionary algorithms with different granularities for MIMD machines are designed by parallelizing Guo's Algorithm.

  4. Towards Cloud-based Asynchronous Elasticity for Iterative HPC Applications

    Science.gov (United States)

    da Rosa Righi, Rodrigo; Facco Rodrigues, Vinicius; André da Costa, Cristiano; Kreutz, Diego; Heiss, Hans-Ulrich

    2015-10-01

    Elasticity is one of the key features of cloud computing. It allows applications to dynamically scale computing and storage resources, avoiding over- and under-provisioning. In high performance computing (HPC), initiatives are normally modeled to handle bag-of-tasks or key-value applications through a load balancer and a loosely-coupled set of virtual machine (VM) instances. In the joint-field of Message Passing Interface (MPI) and tightly-coupled HPC applications, we observe the need of rewriting source codes, previous knowledge of the application and/or stop-reconfigure-and-go approaches to address cloud elasticity. Besides, there are problems related to how profit this new feature in the HPC scope, since in MPI 2.0 applications the programmers need to handle communicators by themselves, and a sudden consolidation of a VM, together with a process, can compromise the entire execution. To address these issues, we propose a PaaS-based elasticity model, named AutoElastic. It acts as a middleware that allows iterative HPC applications to take advantage of dynamic resource provisioning of cloud infrastructures without any major modification. AutoElastic provides a new concept denoted here as asynchronous elasticity, i.e., it provides a framework to allow applications to either increase or decrease their computing resources without blocking the current execution. The feasibility of AutoElastic is demonstrated through a prototype that runs a CPU-bound numerical integration application on top of the OpenNebula middleware. The results showed the saving of about 3 min at each scaling out operations, emphasizing the contribution of the new concept on contexts where seconds are precious.

  5. An FDES-Based Shared Control Method for Asynchronous Brain-Actuated Robot.

    Science.gov (United States)

    Liu, Rong; Wang, Yong-Xuan; Zhang, Lin

    2016-06-01

    The asynchronous brain-computer interface (BCI) offers more natural human-machine interaction. However, it is still considered insufficient to control rapid and complex sequences of movements for a robot without any advanced control method. This paper proposes a new shared controller based on the supervisory theory of fuzzy discrete event system (FDES) for brain-actuated robot control. The developed supervisory theory allows the more reliable control mode to play a dominant role in the robot control which is beneficial to reduce misoperation and improve the robustness of the system. The experimental procedures consist of real-time direct manual control and BCI control tests from ten volunteers. Both tests have shown that the proposed method significantly improves the performance and robustness of the robotic control. In an online BCI experiment, eight of the participants successfully controlled the robot to circumnavigate obstacles and reached the target with a three mental states asynchronous BCI while the other two participants failed in all the BCI control sessions. Furthermore, the FDES-based shared control method also helps to reduce the workload. It can be stated that the asynchronous BCI, in combination with FDES-based shared controller, is feasible for the real-time and robust control of robotics. PMID:26357416

  6. AP-IO: Asynchronous Pipeline I/O for Hiding Periodic Output Cost in CFD Simulation

    Directory of Open Access Journals (Sweden)

    Ren Xiaoguang

    2014-01-01

    Full Text Available Computational fluid dynamics (CFD simulation often needs to periodically output intermediate results to files in the form of snapshots for visualization or restart, which seriously impacts the performance. In this paper, we present asynchronous pipeline I/O (AP-IO optimization scheme for the periodically snapshot output on the basis of asynchronous I/O and CFD application characteristics. In AP-IO, dedicated background I/O processes or threads are in charge of handling the file write in pipeline mode, therefore the write overhead can be hidden with more calculation than classic asynchronous I/O. We design the framework of AP-IO and implement it in OpenFOAM, providing CFD users with a user-friendly interface. Experimental results on the Tianhe-2 supercomputer demonstrate that AP-IO can achieve a good optimization effect for the periodical snapshot output in CFD application, and the effect is especially better for massively parallel CFD simulations, which can reduce the total execution time up to about 40%.

  7. AP-IO: asynchronous pipeline I/O for hiding periodic output cost in CFD simulation.

    Science.gov (United States)

    Xiaoguang, Ren; Xinhai, Xu

    2014-01-01

    Computational fluid dynamics (CFD) simulation often needs to periodically output intermediate results to files in the form of snapshots for visualization or restart, which seriously impacts the performance. In this paper, we present asynchronous pipeline I/O (AP-IO) optimization scheme for the periodically snapshot output on the basis of asynchronous I/O and CFD application characteristics. In AP-IO, dedicated background I/O processes or threads are in charge of handling the file write in pipeline mode, therefore the write overhead can be hidden with more calculation than classic asynchronous I/O. We design the framework of AP-IO and implement it in OpenFOAM, providing CFD users with a user-friendly interface. Experimental results on the Tianhe-2 supercomputer demonstrate that AP-IO can achieve a good optimization effect for the periodical snapshot output in CFD application, and the effect is especially better for massively parallel CFD simulations, which can reduce the total execution time up to about 40%. PMID:24955390

  8. High Performance Parallel Processing Project: Industrial computing initiative. Progress reports for fiscal year 1995

    Energy Technology Data Exchange (ETDEWEB)

    Koniges, A.

    1996-02-09

    This project is a package of 11 individual CRADA`s plus hardware. This innovative project established a three-year multi-party collaboration that is significantly accelerating the availability of commercial massively parallel processing computing software technology to U.S. government, academic, and industrial end-users. This report contains individual presentations from nine principal investigators along with overall program information.

  9. Stand-Alone and Hybrid Positioning Using Asynchronous Pseudolites

    Directory of Open Access Journals (Sweden)

    Ciro Gioia

    2014-12-01

    Full Text Available global navigation satellite system (GNSS receivers are usually unable to achieve satisfactory performance in difficult environments, such as open-pit mines, urban canyons and indoors. Pseudolites have the potential to extend GNSS usage and significantly improve receiver performance in such environments by providing additional navigation signals. This also applies to asynchronous pseudolite systems, where different pseudolites operate in an independent way. Asynchronous pseudolite systems require, however, dedicated strategies in order to properly integrate GNSS and pseudolite measurements. In this paper, several asynchronous pseudolite/GNSS integration strategies are considered: loosely- and tightly-coupled approaches are developed and combined with pseudolite proximity and receiver signal strength (RSS-based positioning. The performance of the approaches proposed has been tested in different scenarios, including static and kinematic conditions. The tests performed demonstrate that the methods developed are effective techniques for integrating heterogeneous measurements from different sources, such as asynchronous pseudolites and GNSS.

  10. TCDQ-TCT retraction and losses during asynchronous beam dump

    CERN Document Server

    Bracco, Chiara; Quaranta, Elena; CERN. Geneva. ATS Department

    2016-01-01

    The protection provided by the TCDQs in case of asynchronous beam dump depends strongly on their correct setup. They have to respect the strict hierarchy of the full collimation system and shield the tertiary collimators in the experimental regions. This MD aimed at performing asynchronous beam dump tests with different configurations, in order to assess the minimum allowed retraction between TCTs and TCDQs and, as a consequence, on the The protection provided by the TCDQs in case of asynchronous beam dump depends strongly on their correct setup. They have to respect the strict hierarchy of the full collimation system and shield the tertiary collimators in the experimental regions. This MD aimed at performing asynchronous beam dump tests with different configurations, in order to assess the minimum allowed retraction between TCTs and TCDQs and, as a consequence, on the β* reach.

  11. A Comparison of Distance Education Competencies Delivered Synchronously and Asynchronously.

    Science.gov (United States)

    Dooley, Kim E.; Lindner, James R.; Richards, Lance J.

    2003-01-01

    Comparison of agriculture courses delivered synchronously via interactive television (20 students) and asynchronously via the Web (22 students) showed similar achievement of core distance education competencies: adult learning, technology knowledge, instructional design, communication skills, graphic design, administration) regardless of delivery…

  12. Asynchronous FSK wireless data traffic interface circuit design

    International Nuclear Information System (INIS)

    This article gives a practical interface circuit, which is able to conduct asynchronous wireless data communication through data transfer broadcasting station. And the circuit's design as well as its applications are introduced. (authors)

  13. Control of asynchronous motors. Volume 1. Modeling, vectorial control and direct torque control; Commande des moteurs asynchrones. Volume 1. Modelisation, controle vectoriel et DTC

    Energy Technology Data Exchange (ETDEWEB)

    Canudas de Wit, C. [Ecole Nationale Superieure d' Ingenieurs de Genie Chimique, ENSIGC, 31 - Toulouse (France)

    2000-07-01

    This first volume deals with the problems of control of asynchronous motors in industrial environments: industrial environment, variable speed, asynchronous motors and power supplies, modeling, direct torque control laws, control by controlled limit cycles under frequency constraints. (J.S.)

  14. Dynamic interactions between asynchronous grids interconnected through an MTDC system

    OpenAIRE

    Endegnanew, Atsede Gualu; Beerten, Jef; Uhlen, Kjetil

    2015-01-01

    The large-scale integration of renewable energy sources in the power system, combined with the need for an increased transmission capacity has led to a growing interest in multi-terminal high voltage dc (MTDC) grids. In the future, these grids will be integrated with different existing asynchronous ac grids, eventually resulting in hybrid AC/DC power systems. This paper investigates interactions between asynchronous ac grids in a hybrid AC/DC power system. In the study, a symmetrical monopola...

  15. The Engine Mechanical Coordinates Measuring in the Asynchronous Motor

    Directory of Open Access Journals (Sweden)

    Dementyev Yuriy N.

    2014-01-01

    Full Text Available The article considers indirect control devices for the mechanical coordinate’s measurement of a three-phase asynchronous electric motor, which detects the temperature of the stator winding conductors and the basic frequency of stator voltage. Characteristics of mechanical coordinate’s simulation of the asynchronous motor are provided to assess the accuracy of the mechanical coordinate’s measurement in the dynamic modes.

  16. The Engine Mechanical Coordinates Measuring in the Asynchronous Motor

    OpenAIRE

    Dementyev Yuriy N.; Umurzakova Anara D.

    2014-01-01

    The article considers indirect control devices for the mechanical coordinate’s measurement of a three-phase asynchronous electric motor, which detects the temperature of the stator winding conductors and the basic frequency of stator voltage. Characteristics of mechanical coordinate’s simulation of the asynchronous motor are provided to assess the accuracy of the mechanical coordinate’s measurement in the dynamic modes.

  17. Tidal Flows in asynchronous binaries: The beta-factor

    CERN Document Server

    Koenigsberger, Gloria

    2013-01-01

    We discuss the potential role that tidal flows in asynchronous binary stars may play in transporting chemically enriched material from deep layers towards the surface and the corresponding observational consequences of these processes. We suggest that the time-dependent velocity field induced by asynchronous rotation may contribute significantly to the mixing, thus providing a channel for the formation of chemically enriched slowly rotating massive stars.

  18. Collusive attacks to "circle-type" multi-party quantum key agreement protocols

    Science.gov (United States)

    Liu, Bin; Xiao, Di; Jia, Heng-Yue; Liu, Run-Zong

    2016-05-01

    We find that existing multi-party quantum key agreement (MQKA) protocols designed for fairness of the key are, in fact, unfair. Our analysis shows that these protocols are sensitive to collusive attacks; that is, dishonest participants can collaborate in predetermining the key without being detected. In fact, the transmission structures of the quantum particles in those unfair MQKA protocols, three of which have already been analyzed, have much in common. We call these unfair MQKA protocols circle-type MQKA protocols. Likewise, the transmission structures of the quantum particles in MQKA protocols that can resist collusive attacks are also similar. We call such protocols complete-graph-type MQKA protocols. A MQKA protocol also exists that can resist the above attacks but is still not fair, and we call it the tree-type MQKA protocol. We first point out a common, easily missed loophole that severely compromises the fairness of present circle-type MQKA protocols. Then we show that two dishonest participants at special positions can totally predetermine the key generated by circle-type MQKA protocols. We anticipate that our observations will contribute to secure and fair MQKA protocols, especially circle-type protocols.

  19. Multi-Party Energy Management for Clusters of Roof Leased PV Prosumers: A Game Theoretical Approach

    Directory of Open Access Journals (Sweden)

    Nian Liu

    2016-07-01

    Full Text Available The roof-leased business mode is an important development method for the distributed photovoltaic (PV systems. In this paper, the benefits of the PV energy are considered in a PV cluster (PVC consisting of a certain number of prosumers and a PVC operator (PVCO. In order to distribute the benefits, a multi-party energy management method for the PVC is proposed, including an internal pricing model and a demand response (DR model. First, the dynamic internal pricing model for the trading between PVCO and prosumers is formulated according to the economic principle of demand and supply relation. Moreover, in order to improve the local consumption of PV energy, the DR model is formulated as a non-cooperative game among the prosumers. Meanwhile, the existence and uniqueness of the Nash Equilibrium (NE are proved, and a distributed solving algorithm is introduced to approach the NE solution. Finally, the PVC including four prosumers is selected as the study object, the results have shown that the internal pricing model and DR model can improve the benefit of both prosumers and PVCO, as well as the local consumption of PV energy.

  20. Rapid, generalized adaptation to asynchronous audiovisual speech.

    Science.gov (United States)

    Van der Burg, Erik; Goodbourn, Patrick T

    2015-04-01

    The brain is adaptive. The speed of propagation through air, and of low-level sensory processing, differs markedly between auditory and visual stimuli; yet the brain can adapt to compensate for the resulting cross-modal delays. Studies investigating temporal recalibration to audiovisual speech have used prolonged adaptation procedures, suggesting that adaptation is sluggish. Here, we show that adaptation to asynchronous audiovisual speech occurs rapidly. Participants viewed a brief clip of an actor pronouncing a single syllable. The voice was either advanced or delayed relative to the corresponding lip movements, and participants were asked to make a synchrony judgement. Although we did not use an explicit adaptation procedure, we demonstrate rapid recalibration based on a single audiovisual event. We find that the point of subjective simultaneity on each trial is highly contingent upon the modality order of the preceding trial. We find compelling evidence that rapid recalibration generalizes across different stimuli, and different actors. Finally, we demonstrate that rapid recalibration occurs even when auditory and visual events clearly belong to different actors. These results suggest that rapid temporal recalibration to audiovisual speech is primarily mediated by basic temporal factors, rather than higher-order factors such as perceived simultaneity and source identity. PMID:25716790

  1. Managing Asynchronous Data in ATLAS's Concurrent Framework

    CERN Document Server

    Baines, John; The ATLAS collaboration

    2016-01-01

    In order to be able to make effective use of emerging hardware, where the amount of memory available to any CPU is rapidly decreasing as the core count continues to rise, ATLAS has begun a migration to a concurrent, multi-threaded software framework, known as AthenaMT. Significant progress has been made in implementing AthenaMT - we can currently run realistic Geant4 simulations on massively concurrent machines. the migration of realistic prototypes of reconstruction workflows is more difficult, given the large amounts of legacy code and the complexity and challenges of reconstruction software. These types of workflows, however, are the types that will most benefit from the memory reduction features of a multi-threaded framework. One of the challenges that we will report on in this paper is the re-design and implementation of several key asynchronous technologies whose behaviour is radically different in a concurrent environment than in a serial one, namely the management of Conditions data and the Detector D...

  2. iHadoop: Asynchronous Iterations Support for MapReduce

    KAUST Repository

    Elnikety, Eslam

    2011-08-01

    MapReduce is a distributed programming framework designed to ease the development of scalable data-intensive applications for large clusters of commodity machines. Most machine learning and data mining applications involve iterative computations over large datasets, such as the Web hyperlink structures and social network graphs. Yet, the MapReduce model does not efficiently support this important class of applications. The architecture of MapReduce, most critically its dataflow techniques and task scheduling, is completely unaware of the nature of iterative applications; tasks are scheduled according to a policy that optimizes the execution for a single iteration which wastes bandwidth, I/O, and CPU cycles when compared with an optimal execution for a consecutive set of iterations. This work presents iHadoop, a modified MapReduce model, and an associated implementation, optimized for iterative computations. The iHadoop model schedules iterations asynchronously. It connects the output of one iteration to the next, allowing both to process their data concurrently. iHadoop\\'s task scheduler exploits inter- iteration data locality by scheduling tasks that exhibit a producer/consumer relation on the same physical machine allowing a fast local data transfer. For those iterative applications that require satisfying certain criteria before termination, iHadoop runs the check concurrently during the execution of the subsequent iteration to further reduce the application\\'s latency. This thesis also describes our implementation of the iHadoop model, and evaluates its performance against Hadoop, the widely used open source implementation of MapReduce. Experiments using different data analysis applications over real-world and synthetic datasets show that iHadoop performs better than Hadoop for iterative algorithms, reducing execution time of iterative applications by 25% on average. Furthermore, integrating iHadoop with HaLoop, a variant Hadoop implementation that caches

  3. Effect of asynchronous updating on the stability of cellular automata

    International Nuclear Information System (INIS)

    Highlights: ► An upper bound on the Lyapunov exponent of asynchronously updated CA is established. ► The employed update method has repercussions on the stability of CAs. ► A decision on the employed update method should be taken with care. ► Substantial discrepancies arise between synchronously and asynchronously updated CA. ► Discrepancies between different asynchronous update schemes are less pronounced. - Abstract: Although cellular automata (CAs) were conceptualized as utter discrete mathematical models in which the states of all their spatial entities are updated simultaneously at every consecutive time step, i.e. synchronously, various CA-based models that rely on so-called asynchronous update methods have been constructed in order to overcome the limitations that are tied up with the classical way of evolving CAs. So far, only a few researchers have addressed the consequences of this way of updating on the evolved spatio-temporal patterns, and the reachable stationary states. In this paper, we exploit Lyapunov exponents to determine to what extent the stability of the rules within a family of totalistic CAs is affected by the underlying update method. For that purpose, we derive an upper bound on the maximum Lyapunov exponent of asynchronously iterated CAs, and show its validity, after which we present a comparative study between the Lyapunov exponents obtained for five different update methods, namely one synchronous method and four well-established asynchronous methods. It is found that the stability of CAs is seriously affected if one of the latter methods is employed, whereas the discrepancies arising between the different asynchronous methods are far less pronounced and, finally, we discuss the repercussions of our findings on the development of CA-based models.

  4. Efficiency asynchronous application programming language Python

    OpenAIRE

    Толстікова, О. В.; Національний авіаційний університет; Мирошниченко, І. С.; Національний авіаційний університет; Коцюр, А. Б.; Національний авіаційний університет

    2016-01-01

    Consider tools that implement asynchronous programming in Python and allow more efficient use ofasynchronous programming applications. The efficiency of the module asyncio (PEP 3156) incomparison with classical spivprohramamy Рассмотрены инструменты, которые реализуют асинхронное программирование в языкеPython и позволяют повысить эффективность использования программирования асинхронныхприложений. Показана эффективность работы модуля asyncio (PEP 3156) по сравнению с классическими сопрогра...

  5. Diagnostic reframing of intractable environmental problems: case of a contested multiparty public land-use conflict.

    Science.gov (United States)

    Asah, Stanley T; Bengston, David N; Wendt, Keith; Nelson, Kristen C

    2012-10-15

    , including political and economic influences on decision making. We discuss how the reframing process enhances tractability of multiparty environmental problems. We point to some limitations of Q methodology as a tool for the diagnostic reframing of such problems. PMID:22705762

  6. Asynchronous event-based corner detection and matching.

    Science.gov (United States)

    Clady, Xavier; Ieng, Sio-Hoi; Benosman, Ryad

    2015-06-01

    This paper introduces an event-based luminance-free method to detect and match corner events from the output of asynchronous event-based neuromorphic retinas. The method relies on the use of space-time properties of moving edges. Asynchronous event-based neuromorphic retinas are composed of autonomous pixels, each of them asynchronously generating "spiking" events that encode relative changes in pixels' illumination at high temporal resolutions. Corner events are defined as the spatiotemporal locations where the aperture problem can be solved using the intersection of several geometric constraints in events' spatiotemporal spaces. A regularization process provides the required constraints, i.e. the motion attributes of the edges with respect to their spatiotemporal locations using local geometric properties of visual events. Experimental results are presented on several real scenes showing the stability and robustness of the detection and matching. PMID:25828960

  7. Molecular mechanisms for synchronous, asynchronous, and spontaneous neurotransmitter release.

    Science.gov (United States)

    Kaeser, Pascal S; Regehr, Wade G

    2014-01-01

    Most neuronal communication relies upon the synchronous release of neurotransmitters, which occurs through synaptic vesicle exocytosis triggered by action potential invasion of a presynaptic bouton. However, neurotransmitters are also released asynchronously with a longer, variable delay following an action potential or spontaneously in the absence of action potentials. A compelling body of research has identified roles and mechanisms for synchronous release, but asynchronous release and spontaneous release are less well understood. In this review, we analyze how the mechanisms of the three release modes overlap and what molecular pathways underlie asynchronous and spontaneous release. We conclude that the modes of release have key fusion processes in common but may differ in the source of and necessity for Ca(2+) to trigger release and in the identity of the Ca(2+) sensor for release. PMID:24274737

  8. A Novel Multiuser Detector for Asynchronous CDMA System

    Institute of Scientific and Technical Information of China (English)

    LIANGXint; SHANGYong; LIANGQinglin; XIANGHaige

    2004-01-01

    The decorrelating and the MMSE (Minimum mean square error) multiuser detector for asynchronous CDMA (Code devision multiple access) system are ideally anticausal infinite memory-length detectors. Asa result~ in practice they have to be approximately implemented with finite-memory structure, and the process delay in detection is unavoidable. Based on the analysis of a new signal model for asynchronous system, a novel multiuser detector for asynchronous CDMA system is proposed in this paper~ which is termed as DF-IC-MMSE (Decision ,feedback interference cancellation-MMSE) detector. It's the detection statistics that makes the DF-IC-MMSE-detector basically different from other traditional ones. The DF-IC-MMSE detector can be ideally implemented with Causal finite memory-length structure, and cause no delay in symbol detection. Simulations show that the performance of DF-IC-MMSE detector is almost identical to that of the ideal MMSE detector.

  9. A Loosely Synchronizing Asynchronous Router for TDM-Scheduled NOCs

    DEFF Research Database (Denmark)

    Kotleas, Ioannis; Humphreys, Dean; Sørensen, Rasmus Bo;

    2014-01-01

    This paper presents an asynchronous router design for use in time-division-multiplexed (TDM) networks-on-chip. Unlike existing synchronous, mesochronous and asynchronous router designs with similar functionality, the router is able to silently skip over cycles/TDM-slots where no traffic is...... scheduled and hence avoid all switching activity in the idle links and router ports. In this way switching activity is reduced to the minimum possible amount. The fact that this relaxed synchronization is sufficient to implement TDM scheduling represents a contribution at the conceptual level. The idea can...... only be implemented using asynchronous circuit techniques. To this end, the paper explores the use of “click-element” templates. Click-element templates use only flipflops and conventional gates, and this greatly simplifies the design process when using conventional EDA tools and standard cell...

  10. Current Trends in High-Level Synthesis of Asynchronous Circuits

    DEFF Research Database (Denmark)

    Sparsø, Jens

    2009-01-01

    .g. the Haste/TiDE tool from Handshake Solutions or the Balsa tool from the University of Manchester. The aims are to add highlevel synthesis capabilities to these tools and to extend the tools such that a wider range of (higher speed) micro-architectures can be generated. Another branch of research takes...... a conventional synchronous circuit as the starting point, and then adds some form of handshake-based flow-control. One approach keeps the global clock and implements discrete-time asynchronous operation. Another approach substitutes the clocked registers by asynchronous handshake-registers, thus...

  11. DESIGN METHODOLOGY OF SELF-EXCITED ASYNCHRONOUS GENERATOR

    Directory of Open Access Journals (Sweden)

    Berzan V.

    2012-04-01

    Full Text Available The paper sets out the methodology of designing an asynchronous generator with capacitive self-excitation. It is known that its design is possible on the basis of serial synchronous motor with squirrel cage rotor. With this approach, the design reworked only the stator winding of electrical machines, making it cost-effectively implement the creation of the generator. Therefore, the methodology for the design, optimization calculations, the development scheme and the stator winding excitation system gain, not only of practical interest, and may also be useful for specialists in the field of electrical machines in the design of asynchronous generators.

  12. DPA on quasi delay insensitive asynchronous circuits : formalization and improvement

    CERN Document Server

    Bouesse, G F; Dumont, S; Germain, F

    2007-01-01

    The purpose of this paper is to formally specify a flow devoted to the design of Differential Power Analysis (DPA) resistant QDI asynchronous circuits. The paper first proposes a formal modeling of the electrical signature of QDI asynchronous circuits. The DPA is then applied to the formal model in order to identify the source of leakage of this type of circuits. Finally, a complete design flow is specified to minimize the information leakage. The relevancy and efficiency of the approach is demonstrated using the design of an AES crypto-processor.

  13. The Influence of Asynchronous Video Communication on Learner Social Presence: A Narrative Analysis of Four Cases

    Science.gov (United States)

    Borup, Jered; West, Richard E.; Graham, Charles R.

    2013-01-01

    Online courses are increasingly using asynchronous video communication. However, little is known about how asynchronous video communication influences students' communication patterns. This study presents four narratives of students with varying characteristics who engaged in asynchronous video communication. The extrovert valued the efficiency of…

  14. Breaking The Millisecond Barrier On SpiNNaker: Implementing Asynchronous Event-Based Plastic Models With Microsecond Resolution

    Directory of Open Access Journals (Sweden)

    Xavier eLagorce

    2015-06-01

    Full Text Available Spike-based neuromorphic sensors such as retinas and cochleas, change the way in which the world is sampled. Instead of producing data sampled at a constant rate, these sensors output spikes that are asynchronous and event driven. The event-based nature of neuromorphic sensors implies a complete paradigm shift in current perception algorithms towards those that emphasize the importance of precise timing. The spikes produced by these sensors usually have a time resolution in the order of microseconds. This high temporal resolution is a crucial factor in learning tasks. It is also widely used in the field of biological neural networks. Sound localization for instance relies on detecting time lags between the two ears which, in the barn owl, reaches a temporal resolution of 5 microseconds. Current available neuromorphic computation platforms such as SpiNNaker often limit their users to a time resolution in the order of milliseconds that is not compatible with the asynchronous outputs of neuromorphic sensors. To overcome these limitations and allow for the exploration of new types of neuromorphic computing architectures, we introduce a novel software framework on the SpiNNaker platform. This framework allows for simulations of spiking networks and plasticity mechanisms using a completely asynchronous and event-based scheme running with a microsecond time resolution. Results on two example networks using this new implementation are presented.

  15. Characterization of the three-dimensional free energy manifold for the uracil ribonucleoside from asynchronous replica exchange simulations.

    Science.gov (United States)

    Radak, Brian K; Romanus, Melissa; Lee, Tai-Sung; Chen, Haoyuan; Huang, Ming; Treikalis, Antons; Balasubramanian, Vivekanandan; Jha, Shantenu; York, Darrin M

    2015-02-10

    Replica exchange molecular dynamics has emerged as a powerful tool for efficiently sampling free energy landscapes for conformational and chemical transitions. However, daunting challenges remain in efficiently getting such simulations to scale to the very large number of replicas required to address problems in state spaces beyond two dimensions. The development of enabling technology to carry out such simulations is in its infancy, and thus it remains an open question as to which applications demand extension into higher dimensions. In the present work, we explore this problem space by applying asynchronous Hamiltonian replica exchange molecular dynamics with a combined quantum mechanical/molecular mechanical potential to explore the conformational space for a simple ribonucleoside. This is done using a newly developed software framework capable of executing >3,000 replicas with only enough resources to run 2,000 simultaneously. This may not be possible with traditional synchronous replica exchange approaches. Our results demonstrate 1.) the necessity of high dimensional sampling simulations for biological systems, even as simple as a single ribonucleoside, and 2.) the utility of asynchronous exchange protocols in managing simultaneous resource requirements expected in high dimensional sampling simulations. It is expected that more complicated systems will only increase in computational demand and complexity, and thus the reported asynchronous approach may be increasingly beneficial in order to make such applications available to a broad range of computational scientists. PMID:26580900

  16. An asynchronous and parallel time-marching method: Application to three-dimensional MHD simulation of solar wind

    Institute of Scientific and Technical Information of China (English)

    2009-01-01

    An asynchronous and parallel time-marching method for three-dimensional (3D) time-dependent magnetohydrodynamic (MHD) simulation is used for large-scale solar wind simulation. It uses different local time steps in the corona and the heliosphere according to the local Courant-Friedrichs-Levy (CFL) conditions. The solar wind background with observed solar photospheric magnetic field as input is first presented. The simulation time for the background solar wind by using the asynchronous method is <1/6 of that by using the normal synchronous time-marching method with the same computation precision. Then, we choose the coronal mass ejection (CME) event of 13 November, 2003 as a test case. The time-dependent variations of the pressure and the velocity configured from a CME model at the inner boundary are applied to generate transient structures in order to study the dynamical interaction of a CME with the background solar wind flow between 1 and 230 Rs. This time-marching method is very effective in terms of computation time for large-scale 3D time-dependent numerical MHD problem. In this validation study, we find that this 3D MHD model, with the asynchronous and parallel time-marching method, provides a relatively satisfactory comparison with the ACE spacecraft obser- vations at L1 point.

  17. Asynchronous Assessment in a Large Lecture Marketing Course

    Science.gov (United States)

    Downey, W. Scott; Schetzsle, Stacey

    2012-01-01

    Asynchronous assessment, which includes quizzes or exams online or outside class, offers marketing educators an opportunity to make more efficient use of class time and to enhance students' learning experiences by giving them more flexibility and choice in their assessment environment. In this paper, we examine the performance difference between…

  18. Structure-Based Deadlock Checking of Asynchronous Circuits

    Institute of Scientific and Technical Information of China (English)

    Hong-Guang Ren; Zhi-Ying Wang; Doug Edwards

    2011-01-01

    It is important to verify the absence of deadlocks in asynchronous circuits.Much previous work relies on a reachability analysis of the circuits' states,with the use of binary decision diagrams (BDDs) or Petri nets to model the behaviors of circuits.This paper presents an alternative approach focusing on the structural properties of well-formed asynchronous circuits that will never suffer deadlocks.A class of data-driven asynchronous pipelines is targeted in this paper,which can be viewed as a network of basic components connected by handshake channels.The sufficient and necessary conditions for a component network consisting of Steer,Merge,Fork and Join are given.The slack elasticity of the channels is analyzed in order to introduce pipelining.As an application,a deadlock checking method is implemented in a syntax-directed asynchronous design tool - Teak.The proposed method shows a great runtime advantage when compared against previous Petri net based verification tools.

  19. APPLICATION OF ASYNCHRONOUS GENERATOR FOR INDUCTION MOTOR’S FEEDING

    OpenAIRE

    Bogdan A. V.; Ilchenko Y. A.; Sobol A. N.; Erokhov M. V.

    2014-01-01

    In the article, the following items are represented: mathematical formulation of system including: asynchronous generator with cage rotor, condenser’s for excitation, induction load. Electromagnetic and electromechanical processes of induction motor’s connecting and feeding are described. Equations of voltage stability, equations of current, equations of rotor are used for describing of electricity circuits of generator

  20. Analysis of the Relevance of Posts in Asynchronous Discussions

    Science.gov (United States)

    Azevedo, Breno T.; Reategui, Eliseo; Behar, Patrícia A.

    2014-01-01

    This paper presents ForumMiner, a tool for the automatic analysis of students' posts in asynchronous discussions. ForumMiner uses a text mining system to extract graphs from texts that are given to students as a basis for their discussion. These graphs contain the most relevant terms found in the texts, as well as the relationships between them.…

  1. Cyber Asynchronous versus Blended Cyber Approach in Distance English Learning

    Science.gov (United States)

    Ge, Zi-Gang

    2012-01-01

    This study aims to compare the single cyber asynchronous learning approach with the blended cyber learning approach in distance English education. Two classes of 70 students participated in this study, which lasted one semester of about four months, with one class using the blended approach for their English study and the other only using the…

  2. Psychological Type and Asynchronous Written Dialogue in Adult Learning

    Science.gov (United States)

    Lin, Lin; Cranton, Patricia; Bridglall, Beatrice

    2005-01-01

    This study explores how adults learn from asynchronous written dialogue through the lens of psychological type preferences. We asked participants to discover their dominant and auxiliary psychological preferences using the Personal Empowerment through Type inventory. Participants then completed an open-ended survey in which they described their…

  3. Asynchronous Linking in a Service –Oriented Architecture.

    OpenAIRE

    Vivek, Sanjay; Tso, Kenneth; Thompson, Mark; De Roure, David

    2002-01-01

    In this paper, we identify research issues in the development of system infrastructure support for asynchronous linkservices in a service-oriented architecture. We explore the suitability and applicability of using MQSeries Everyplace to provide a messaging backbone for linkservices that increases reliability, fault tolerance, and scalability. We identify and discuss some important problems and research issues related to this approach.

  4. Abstracting Asynchronous Multi-Valued Networks: An Initial Investigation

    CERN Document Server

    Steggles, L Jason

    2011-01-01

    Multi-valued networks provide a simple yet expressive qualitative state based modelling approach for biological systems. In this paper we develop an abstraction theory for asynchronous multi-valued network models that allows the state space of a model to be reduced while preserving key properties of the model. The abstraction theory therefore provides a mechanism for coping with the state space explosion problem and supports the analysis and comparison of multi-valued networks. We take as our starting point the abstraction theory for synchronous multi-valued networks which is based on the finite set of traces that represent the behaviour of such a model. The problem with extending this approach to the asynchronous case is that we can now have an infinite set of traces associated with a model making a simple trace inclusion test infeasible. To address this we develop a decision procedure for checking asynchronous abstractions based on using the finite state graph of an asynchronous multi-valued network to reas...

  5. Asynchronous Torque Characteristics of VR Type Vernier Motor

    Science.gov (United States)

    Suda, Hiroshi; Matsushima, Yoshitaro; Xu, Li; Anazawa, Yoshihisa

    Recently, various types of vernier motor are developed. The VR type vernier motor is a kind of three-phase reluctance motor, and its stator has slots and distributed three-phase windings. The rotor is slotted iron core without windings. Relationship between S, R and P is S = R±2, where S and R are the numbers of stator and rotor slots per pair of poles, and the number of poles P is two. The rotor of the vernier motor moves at a sub-multiple of the angular velocity of the stator mmf. The multiplying factor is P/R. Authors had reported that the VR type vernier motors are analyzed as a three-phase reluctance motor, and have obtained the voltage equations on the γ-δ axis and expression of the torque.However, the asynchronous characteristics of the vernier motor are not clear yet. In this paper, the asynchronous characteristics of the vernier motors are analyzed with the symmetric components transformation and the commutator transformation. The voltage equations on the symmetrical co-ordinates and asynchronous and synchronous torque expression at steady state condition are obtained. The tests were performed on the trial motor. The calculated asynchronous torque has agreed well with the measured values.

  6. Asynchronous rotation scan for synthetic aperture interferometric radiometer

    Institute of Scientific and Technical Information of China (English)

    WU Ji; ZHANG Cheng; LIU Hao; SUN WeiYing

    2009-01-01

    Synthetic aperture interferometric technique has wide applications in optics, radio astronomy and mi-crowave remote sensing areas. With the increasing demands of high resolution imaging observation, a new time-sharing sampling scheme of asynchronous rotation scan is proposed to meet the technical challenge of achieving a large equivalent aperture and overcome the operating barriers of space borne application. This configuration is basically composed by two asynchronously and concentrically ro-tating antenna groups, whose revolving radii and speeds are different. The synthetic aperture system with asynchronous rotation scanning scheme can effectively solve the trade-off problem of system complexity, and greatly simplify the system hardware at the cost of sacrificing a certain time resolution. The basic rules and design methods of asynchronous rotation scan are investigated The Gridding method is introduced to inverse the spiral sampling data for image reconstruction. The potential ap-plications of geostationary orbit (GEO) earth observation and solar polar orbit (SPO) plasma cloud observation are explored with numerical simulations to validate the significance and feasibility of this new imaging configuration.

  7. Asynchronous rotation scan for synthetic aperture interferometric radiometer

    Institute of Scientific and Technical Information of China (English)

    2009-01-01

    Synthetic aperture interferometric technique has wide applications in optics,radio astronomy and mi-crowave remote sensing areas.With the increasing demands of high resolution imaging observation,a new time-sharing sampling scheme of asynchronous rotation scan is proposed to meet the technical challenge of achieving a large equivalent aperture and overcome the operating barriers of space borne application.This configuration is basically composed by two asynchronously and concentrically ro-tating antenna groups,whose revolving radii and speeds are different.The synthetic aperture system with asynchronous rotation scanning scheme can effectively solve the trade-off problem of system complexity,and greatly simplify the system hardware at the cost of sacrificing a certain time resolution.The basic rules and design methods of asynchronous rotation scan are investigated The Gridding method is introduced to inverse the spiral sampling data for image reconstruction.The potential ap-plications of geostationary orbit(GEO)earth observation and solar polar orbit(SPO)plasma cloud observation are explored with numerical simulations to validate the significance and feasibility of this new imaging configuration.

  8. General-purpose stepping motor-encoder positioning subsystem with standard asynchronous serial-line interface

    International Nuclear Information System (INIS)

    A general-purpose mechanical positioning subsystem for open-loop control of experiment devices which have their positions established and read out by stepping motor-encoder combinations has been developed. The subsystem is to be used mainly for experiments to be conducted at the National Synchrotron Light Source at Brookhaven National Laboratory. The subsystem unit has been designed to be compatible with a wide variety of stepping motor and encoder types. The unit may be operated by any device capable of driving a standard RS-232-C asynchronous serial communication line. An informal survey has shown that several experiments at the Light Source will use one particular type of computer, operating system, and programming language. Accordingly, a library of subroutines compatible with this combination of computer system elements has been written to facilitate driving the positioning subsystem unit

  9. EEG-based asynchronous BCI control of a car in 3D virtual reality environments

    Institute of Scientific and Technical Information of China (English)

    ZHAO QiBin; ZHANG LiQing; CICHOCKI Andrzej

    2009-01-01

    Brain computer interface (BCl) aims at creating new communication channels without depending on brain's normal output channels of peripheral nerves and muscles.However,natural and sophisticated interactions manner between brain and computer still remain challenging.In this paper,we investigate how the duration of event-related desynchronization/synchronization (ERD/ERS) caused by motor im-agery (MI) can be modulated and used as an additional control parameter beyond simple binary deci-sions.Furthermore,using the non-time-locked properties of sustained (de)synchronization,we have developed an asynchronous BCl system for driving a car in 3D virtual reality environment (VRE) based on cumulative incremental control strategy.The extensive real time experiments confirmed that our new approach is able to drive smoothly a virtual car within challenging VRE only by the MI tasks with-out involving any muscular activities.

  10. A multi-host front end concentrator system for asynchronous consoles

    CERN Document Server

    Palandri, E M

    1974-01-01

    Describes a front end concentrator system for asynchronous time sharing consoles which has recently been put into operation at CERN. The concentrator will control up to 36 consoles at speeds up to 9600 bits per second and has the capability of dynamically connecting these consoles to several large Host processors. Features of the system include specially designed hardware and software to connect a wide range of different types of consoles in a flexible and expandable way, and the use of special purpose microcode to optimise console handling and facilitate the implementation of the system. The system runs in an HP2100 computer initially front-ending CDC 6000 series computers using the INTERCOM time sharing system. (6 refs).

  11. Realistic modelling of the effects of asynchronous motion at the base of bridge piers

    International Nuclear Information System (INIS)

    Frequently long-span bridges provide deep valley crossings, which require special consideration due to the possibility of local amplification of the ground motion as a consequence of topographical irregularities and local soil conditions. This does in fact cause locally enhanced seismic input with the possibility for the bridge piers to respond asynchronously. This introduces special design requirements so that possible out-of-phase ground displacements and the associated large relative displacements of adjacent piers can be accommodated without excessive damage. Assessment of the local variability of the ground motion due to local lateral heterogeneities and to attenuation properties is thus crucial toward the realistic definition of the asynchronous motion at the base of the bridge piers. We illustrate the work done in the framework of a large international cooperation to assess the importance of non-synchronous seismic excitation of long structures. To accomplish this task we compute complete synthetic accelerograms using as input a set of parameters that describes, to the best of our knowledge, the geological structure and seismotectonic setting of the investigated area. (author)

  12. THE RESEARCH OF GRADATION FUSION ALGORITHM BASED ON MULTISENSOR ASYNCHRONOUS SAMPLING SYSTEM

    Institute of Scientific and Technical Information of China (English)

    2005-01-01

    This letter explores the distributed multisensor dynamic system, which has uniform sampling velocity and asynchronous sampling data for different sensors, and puts forward a new gradation fusion algorithm of multisensor dynamic system. As the total forecasted increment value between the two adjacent moments is the forecasted estimate value of the corresponding state increment in the fusion center, the new algorithm models the state and the forecasted estimate value of every moment. Kalman filter and all measurements arriving sequentially in the fusion period are employed to update the evaluation of target state step by step, on the condition that the system has obtained the target state evaluation that is based on the overall information in the previous fusion period. Accordingly, in the present period, the fusion evaluation of the target state at each sampling point on the basis of the overall information can be obtained. This letter elaborates the form of this new algorithm. Computer simulation demonstrates that this new algorithm owns greater precision in estimating target state than the present asynchronous fusion algorithm calibrated in time does.

  13. Asynchronous detection of kinesthetic attention during mobilization of lower limbs using EEG measurements

    Science.gov (United States)

    Melinscak, Filip; Montesano, Luis; Minguez, Javier

    2016-02-01

    Objective. Attention is known to modulate the plasticity of the motor cortex, and plasticity is crucial for recovery in motor rehabilitation. This study addresses the possibility of using an EEG-based brain-computer interface (BCI) to detect kinesthetic attention to movement. Approach. A novel experiment emulating physical rehabilitation was designed to study kinesthetic attention. The protocol involved continuous mobilization of lower limbs during which participants reported levels of attention to movement—from focused kinesthetic attention to mind wandering. For this protocol an asynchronous BCI detector of kinesthetic attention and deliberate mind wandering was designed. Main results. EEG analysis showed significant differences in theta, alpha, and beta bands, related to the attentional state. These changes were further pinpointed to bands relative to the frequency of the individual alpha peak. The accuracy of the designed BCI ranged between 60.8% and 68.4% (significantly above chance level), depending on the used analysis window length, i.e. acceptable detection delay. Significance. This study shows it is possible to use self-reporting to study attention-related changes in EEG during continuous mobilization. Such a protocol is used to develop an asynchronous BCI detector of kinesthetic attention, with potential applications to motor rehabilitation.

  14. Data-Aware Retrodiction for Asynchronous Harmonic Measurement in a Cyber-Physical Energy System

    Directory of Open Access Journals (Sweden)

    Youda Liu

    2016-08-01

    Full Text Available Cyber-physical energy systems provide a networked solution for safety, reliability and efficiency problems in smart grids. On the demand side, the secure and trustworthy energy supply requires real-time supervising and online power quality assessing. Harmonics measurement is necessary in power quality evaluation. However, under the large-scale distributed metering architecture, harmonic measurement faces the out-of-sequence measurement (OOSM problem, which is the result of latencies in sensing or the communication process and brings deviations in data fusion. This paper depicts a distributed measurement network for large-scale asynchronous harmonic analysis and exploits a nonlinear autoregressive model with exogenous inputs (NARX network to reorder the out-of-sequence measuring data. The NARX network gets the characteristics of the electrical harmonics from practical data rather than the kinematic equations. Thus, the data-aware network approximates the behavior of the practical electrical parameter with real-time data and improves the retrodiction accuracy. Theoretical analysis demonstrates that the data-aware method maintains a reasonable consumption of computing resources. Experiments on a practical testbed of a cyber-physical system are implemented, and harmonic measurement and analysis accuracy are adopted to evaluate the measuring mechanism under a distributed metering network. Results demonstrate an improvement of the harmonics analysis precision and validate the asynchronous measuring method in cyber-physical energy systems.

  15. Data-Aware Retrodiction for Asynchronous Harmonic Measurement in a Cyber-Physical Energy System.

    Science.gov (United States)

    Liu, Youda; Wang, Xue; Liu, Yanchi; Cui, Sujin

    2016-01-01

    Cyber-physical energy systems provide a networked solution for safety, reliability and efficiency problems in smart grids. On the demand side, the secure and trustworthy energy supply requires real-time supervising and online power quality assessing. Harmonics measurement is necessary in power quality evaluation. However, under the large-scale distributed metering architecture, harmonic measurement faces the out-of-sequence measurement (OOSM) problem, which is the result of latencies in sensing or the communication process and brings deviations in data fusion. This paper depicts a distributed measurement network for large-scale asynchronous harmonic analysis and exploits a nonlinear autoregressive model with exogenous inputs (NARX) network to reorder the out-of-sequence measuring data. The NARX network gets the characteristics of the electrical harmonics from practical data rather than the kinematic equations. Thus, the data-aware network approximates the behavior of the practical electrical parameter with real-time data and improves the retrodiction accuracy. Theoretical analysis demonstrates that the data-aware method maintains a reasonable consumption of computing resources. Experiments on a practical testbed of a cyber-physical system are implemented, and harmonic measurement and analysis accuracy are adopted to evaluate the measuring mechanism under a distributed metering network. Results demonstrate an improvement of the harmonics analysis precision and validate the asynchronous measuring method in cyber-physical energy systems. PMID:27548171

  16. Efficient Remote Preparation of Four-Qubit Cluster-Type Entangled States with Multi-Party Over Partially Entangled Channels

    Science.gov (United States)

    Wang, Dong; Hoehn, Ross D.; Ye, Liu; Kais, Sabre

    2016-03-01

    We present a strategy for realizing multiparty-controlled remote state preparation (MCRSP) for a family of four-qubit cluster-type states by taking a pair of partial entanglements as the quantum channels. In this scenario, the encoded information is transmitted from the sender to a spatially separated receiver with control of the transmission by multiple parties. Predicated on the collaboration of all participants, the desired state can be faithfully restored at the receiver's location with high success probability by application of additional appropriate local operations and necessary classical communication. Moreover, this proposal for MCRSP can be faithfully achieved with unit total success probability when the quantum channels are distilled to maximally entangled ones.

  17. Multiparty quantum-state sharing of an arbitrary two-particle state with Einstein-Podolsky-Rosen pairs

    International Nuclear Information System (INIS)

    A scheme for multiparty quantum state sharing of an arbitrary two-particle state is presented with Einstein-Podolsky-Rosen pairs. Any one of the N agents has the access to regenerate the original state with two local unitary operations if he collaborates with the other agents, say the controllers. Moreover, each of the controllers is required to take only a product measurement σxxσx on his two particles, which makes this scheme more convenient for the agents in the applications on a network than others. As all the quantum source can be used to carry the useful information, the intrinsic efficiency of qubits approaches the maximal value. With a new notation for the multipartite entanglement, the sender need only publish two bits of classical information for each measurement, which reduces the information exchanged largely

  18. Multi-Party Quantum Private Comparison Protocol with an Almost-Dishonest Third Party using GHZ States

    Science.gov (United States)

    Huang, Sheng-Liang; Hwang, Tzonelih; Gope, Prosanta

    2016-06-01

    This article proposes an innovative quantum private comparison (QPC) protocol for n users using GHZ states, where an almost-dishonest third party (TP) is introduced to assist the participants for comparing their secrets. It is argued that as compared to the existing QPC protocols our proposed scheme has some considerable advantages. First, in the existing QPC protocols, the TP can only to determine whether all participants' secrets are equal or not. Instead of that, in our proposed scheme a TP can even compare the secrets between any subsects of users. Second, since our proposed scheme is based on GHZ state; hence it can ensure higher efficiency as compared to other existing multi-party QPC protocols on d-dimension photons.

  19. Efficient Remote Preparation of Four-Qubit Cluster-Type Entangled States with Multi-Party Over Partially Entangled Channels

    Science.gov (United States)

    Wang, Dong; Hoehn, Ross D.; Ye, Liu; Kais, Sabre

    2016-07-01

    We present a strategy for realizing multiparty-controlled remote state preparation (MCRSP) for a family of four-qubit cluster-type states by taking a pair of partial entanglements as the quantum channels. In this scenario, the encoded information is transmitted from the sender to a spatially separated receiver with control of the transmission by multiple parties. Predicated on the collaboration of all participants, the desired state can be faithfully restored at the receiver's location with high success probability by application of additional appropriate local operations and necessary classical communication. Moreover, this proposal for MCRSP can be faithfully achieved with unit total success probability when the quantum channels are distilled to maximally entangled ones.

  20. The Subjective Evaluation Experiments on an Automatic Video Editing System Using Vision-based Head Tracking for Multiparty Conversations

    Science.gov (United States)

    Takemae, Yoshinao; Otsuka, Kazuhiro; Yamato, Junji; Ozawa, Shinji

    This paper presents experiments conducted to evaluate an automatic video editing system, founded on vision-based head tracking, that clearly conveys face-to-face multiparty conversations, such as meetings, to viewers. Systems that archive meetings and teleconferences to effectively facilitate human communication are attracting considerable interest. Conventional systems use a fixed-viewpoint camera and simple camera selection based on participants' utterances. Unfortunately, they fail to adequately convey who is talking to whom and nonverbal information about participants etc., to viewers. To solve this problem, we previously proposed an automatic video editing system using vision-based head tracking. This paper describes subjective evaluation experiments in which videos of entire conversations with 3 participants were presented to viewers; the results confirm the effectiveness of our system.

  1. Control or non-control state: that is the question! An asynchronous visual P300-based BCI approach

    Science.gov (United States)

    Pinegger, Andreas; Faller, Josef; Halder, Sebastian; Wriessnegger, Selina C.; Müller-Putz, Gernot R.

    2015-02-01

    Objective. Brain-computer interfaces (BCI) based on event-related potentials (ERP) were proven to be a reliable synchronous communication method. For everyday life situations, however, this synchronous mode is impractical because the system will deliver a selection even if the user is not paying attention to the stimulation. So far, research into attention-aware visual ERP-BCIs (i.e., asynchronous ERP-BCIs) has led to variable success. In this study, we investigate new approaches for detection of user engagement. Approach. Classifier output and frequency-domain features of electroencephalogram signals as well as the hybridization of them were used to detect the user's state. We tested their capabilities for state detection in different control scenarios on offline data from 21 healthy volunteers. Main results. The hybridization of classifier output and frequency-domain features outperformed the results of the single methods, and allowed building an asynchronous P300-based BCI with an average correct state detection accuracy of more than 95%. Significance. Our results show that all introduced approaches for state detection in an asynchronous P300-based BCI can effectively avoid involuntary selections, and that the hybrid method is the most effective approach.

  2. A new asynchronous parallel algorithm for inferring large-scale gene regulatory networks.

    Directory of Open Access Journals (Sweden)

    Xiangyun Xiao

    Full Text Available The reconstruction of gene regulatory networks (GRNs from high-throughput experimental data has been considered one of the most important issues in systems biology research. With the development of high-throughput technology and the complexity of biological problems, we need to reconstruct GRNs that contain thousands of genes. However, when many existing algorithms are used to handle these large-scale problems, they will encounter two important issues: low accuracy and high computational cost. To overcome these difficulties, the main goal of this study is to design an effective parallel algorithm to infer large-scale GRNs based on high-performance parallel computing environments. In this study, we proposed a novel asynchronous parallel framework to improve the accuracy and lower the time complexity of large-scale GRN inference by combining splitting technology and ordinary differential equation (ODE-based optimization. The presented algorithm uses the sparsity and modularity of GRNs to split whole large-scale GRNs into many small-scale modular subnetworks. Through the ODE-based optimization of all subnetworks in parallel and their asynchronous communications, we can easily obtain the parameters of the whole network. To test the performance of the proposed approach, we used well-known benchmark datasets from Dialogue for Reverse Engineering Assessments and Methods challenge (DREAM, experimentally determined GRN of Escherichia coli and one published dataset that contains more than 10 thousand genes to compare the proposed approach with several popular algorithms on the same high-performance computing environments in terms of both accuracy and time complexity. The numerical results demonstrate that our parallel algorithm exhibits obvious superiority in inferring large-scale GRNs.

  3. Asynchronous Cooperative e-Learning System and Its Evaluation

    Science.gov (United States)

    Eto, Kazuhiro; Miyoshi, Takumi

    Much attention has been attracted to collaborative learning on an e-learning system. However, it is difficult to implement the collaborative environment to an asynchronous e-learning system since collaboration would be realized only when learners join the system at the same time. On the other hand, cooperative learning has been proposed. In this method, learners can study on their own pace without making mutual agreement but with receiving cognitive information from others. In this paper, the authors have developed the asynchronous cooperative e-learning system that provides learners' attendance and studying progress as the cognitive information. The subjective evaluation experiments show that our system is slightly inferior to the synchronous collaborative e-learning system, but it can motivate the learners more than the conventional system.

  4. A STUDY ON ASYNCHRONOUS SERIAL COMMUNICATON BETWEEN COMPONENTS IN AUTOMOBILES

    OpenAIRE

    ŞAHİN, Yaşar Güneri

    2010-01-01

    ABSTRACTIn connection with the developments in the automobile sector, the number of in-automobile components, the amount of cable used for providing in-automobile communication between these components and costs are increased gradually. In this study, a method is presented in which asynchronous serial connection is used for decreasing the initial and maintenance costs by means of decreasing the amount of cables used in middle and lower class automobiles. The electronic circuits required to es...

  5. Diversity Multiplexing Tradeoff of Asynchronous Cooperative Relay Networks

    CERN Document Server

    Krishnakumar, R N; Kumar, P Vijay

    2008-01-01

    The assumption of nodes in a cooperative communication relay network operating in synchronous fashion is often unrealistic. In the present paper, we consider two different models of asynchronous operation in cooperative-diversity networks experiencing slow fading and examine the corresponding diversity-multiplexing tradeoffs (DMT). For both models, we propose protocols and distributed space-time codes that asymptotically achieve the transmit diversity bound for all multiplexing gains and for any number of relays.

  6. Indoor Positioning for Smartphones Using Asynchronous Ultrasound Trilateration

    OpenAIRE

    James D. Carswell; Viacheslav Filonenko; Charlie Cullen

    2013-01-01

    Modern smartphones are a great platform for Location Based Services (LBS). While outdoor LBS for smartphones has proven to be very successful, indoor LBS for smartphones has not yet fully developed due to the lack of an accurate positioning technology. In this paper we present an accurate indoor positioning approach for commercial off-the-shelf (COTS) smartphones that uses the innate ability of mobile phones to produce ultrasound, combined with Time-Difference-of-Arrival (TDOA) asynchronous t...

  7. Research on DSP-based Asynchronous Motor Control Technology

    OpenAIRE

    Jun Yao; Xiangxin Qiao; Xin Wang

    2013-01-01

    The Motor in a variety of electrical transmission and position servo system occupies an extremely important position. After the DSP technology being applied to the motor control, the unification of the hardware and the flexibility of the software can be combined. Take the brushless DC motor for example, studied the mathematical model and the structure of the motor control system, also obtained the design scheme of the DSP-based asynchronous motor control system. With TI's 32 bit fixed point D...

  8. Asynchronous Discourse Analysis in the Quality of Expected Learning

    OpenAIRE

    Schalk-Quintanar, Ana-Elena; Marcelo-García, Carlos

    2010-01-01

    Universities are gradually implementing virtual learning processes. However, research still remains limited in examining the internal processes that occur in learning in virtual environments. This article presents an investigation that seeks to describe the relationship between the quality of interaction in asynchronous discussion forums in training experiences in e-learning, and the quality of learning offered and achieved. The main objective was to determine how interactions in online envir...

  9. A novel asynchronous access method with binary interfaces

    OpenAIRE

    Torres-Solis Jorge; Silva Jorge; Chau Tom; Mihailidis Alex

    2008-01-01

    Abstract Background Traditionally synchronous access strategies require users to comply with one or more time constraints in order to communicate intent with a binary human-machine interface (e.g., mechanical, gestural or neural switches). Asynchronous access methods are preferable, but have not been used with binary interfaces in the control of devices that require more than two commands to be successfully operated. Methods We present the mathematical development and evaluation of a novel as...

  10. Design and Implementation of an Asynchronous Pipelined FFT Processor

    OpenAIRE

    Claesson, Jonas

    2003-01-01

    FFT processors are today one of the most important blocks in communication equipment. They are used in everything from broadband to 3G and digital TV to Radio LANs. This master's thesis project will deal with pipelined hardware solutions for FFT processors with long FFT transforms, 1K to 8K points. These processors could be used for instance in OFDM communication systems. The final implementation of the FFT processor uses a GALS (Globally Asynchronous Locally Synchronous) architecture, that ...

  11. Teleoperation system using Asynchronous transfer mode, ATM network

    International Nuclear Information System (INIS)

    This paper examines the application of Asynchronous Transfer Mode (ATM) in a distributed industrial environment such as in teleoperation, which performs real time control manipulation from a remote location. In our study, two models of teleoperation are proposed; the first model is a point to point connection and the second model is through an ATM network. The performance results are analysed as to determine whether the two models can support the teleoperation traffics via simulation using commercial software design tool. (Author)

  12. Asynchronous interaction, online technologies self-efficacy and self-regulated learning as predictors of academic achievement in an online class

    Science.gov (United States)

    McGhee, Rosie M. Hector

    This research is a correlational study of the relationship among the independent variables: asynchronous interaction, online technologies self-efficacy, and self-regulated learning, and the dependent variable; academic achievement. This study involves an online computer literacy course at a local community college. Very little research exists on the relationship among asynchronous interaction, online technologies self-efficacy and self-regulated learning on predicting academic achievement in an online class. Liu (2008), in his study on student interaction in online courses, concluded that student interaction is a complex issue that needs more research to increase our understanding as it relates to distance education. The purpose of this study was to examine the relationships between asynchronous interaction, online technologies self-efficacy, self-regulated learning and academic achievement in an online computer literacy class at a community college. The researcher used quantitative methods to obtain and analyze data on the relationships among the variables during the summer 2010 semester. Forty-five community college students completed three web-based self-reporting instruments: (a) the GVU 10th WWW User Survey Questionnaire, (b) the Online Technologies Self-Efficacy Survey, and (c) selected items from the Motivated Strategies for Learning Questionnaire. Additional data was obtained from asynchronous discussions posted on Blackboard(TM) Learning Management System. The results of this study found that there were statistically significant relationships between asynchronous interaction and academic achievement (r = .55, p self-regulated learning and academic achievement ( r = -.02, p learning experience. Driscoll (2005) said constructivist pedagogy sees the learner as an active participant in their learning experience rather than a passive vessel to be filled with information. This study is beneficial to theorists, administrators, leaders, online instructors, online

  13. Non-Detection of Nova Shells Around Asynchronous Polars

    CERN Document Server

    Pagnotta, Ashley

    2016-01-01

    Asynchronous polars (APs) are accreting white dwarfs (WDs) that have different WD and orbital angular velocities, unlike the rest of the known polars, which rotate synchronously (i.e., their WD and orbital angular velocities are the same). Past nova eruptions are the predicted cause of the asynchronicity, in part due to the fact that one of the APs, V1500 Cyg, was observed to undergo a nova eruption in 1975. We used the Southern African Large Telescope 10m class telescope and the MDM 2.4m Hiltner telescope to search for nova shells around three of the remaining four APs (V1432 Aql, BY Cam, and CD Ind) as well as one Intermediate Polar with a high asynchronicity (EX Hya). We found no evidence of nova shells in any of our images. We therefore cannot say that any of the systems besides V1500 Cyg had nova eruptions, but because not all post-nova systems have detectable shells, we also cannot exclude the possibility of a nova eruption occurring in any of these systems and knocking the rotation out of sync.

  14. Asynchronous Stoichiometric Response in Lithium Iron Phosphate Batteries

    Energy Technology Data Exchange (ETDEWEB)

    Paxton, William A. [State Univ. of New Jersey, Piscataway, NJ (United States); Akdogan, E. Koray [State Univ. of New Jersey, Piscataway, NJ (United States); Savkliyidiz, Ilyas [State Univ. of New Jersey, Piscataway, NJ (United States); Choksi, Ankur U. [State Univ. of New Jersey, Piscataway, NJ (United States); Silver, Scott X. [State Univ. of New Jersey, Piscataway, NJ (United States); Tsakalokos, Thomas [State Univ. of New Jersey, Piscataway, NJ (United States); Zhong, Zhong [Brookhaven National Lab. (BNL), Upton, NY (United States)

    2014-11-11

    The operando energy-dispersive x-ray diffraction (EDXRD) was carried out on a newly formed 8 Ah lithium iron phosphate (LiFePO4) battery with the goal of elucidating the origin of asynchronous phase transformation commonly seen with in situ x-ray diffraction studies. The high-energy photons at the NSLS X17B1 beamline allow for penetration into a fully assembled battery and therefore negate any need for a specially designed in situ cell which often uses modified current collectors to minimize x-ray attenuation. Spatially-and-temporally resolved phase-mapping was conducted with a semiquantitative reference intensity ratio (RIR) analysis to estimate the relative abundance of the delithiated phase. The data show an asynchronous response in the stoichiometry versus the electrochemical profile and suggest limited diffusion in the electrode toward the end of discharge. These results confirm that the asynchronous electrode response is not just limited to specially designed cells but occurs in fully assembled cells alike. We attribute this behavior to be a consequence of performing a local measurement over a wide-area heterogeneous reaction.

  15. Divorce and asynchronous arrival in common terns, Sterna hirundo.

    Science.gov (United States)

    GonzáLez-SolíS; Becker; Wendeln

    1999-11-01

    We investigated which of three hypotheses (better option, incompatibility or asynchronous arrival) best explains divorce in the common tern. One partner did not return the next year in 18.5% of 150 pairs. Among the 106 pairs in which both mates returned, the divorce rate was 18.9%. We found no significant differences in: breeding performance or condition in relation to the probability of divorce; quality of previous mates and new mates, mean age in relation to pair bond status; breeding success before and after divorce nor did this differ from breeding success of reunited pairs. Hence the better option and incompatibility hypotheses were not supported. However, divorce was more likely in pairs in which mates arrived asynchronously on the breeding grounds, supporting the asynchronous arrival hypothesis. Median arrival asynchrony for divorced pairs was 7.5 days and for reunited pairs 2 days; mates arriving more than 16 days apart always split up. About 20% of divorced birds lost breeding status in the year of divorce, probably as a consequence of their late arrival. Our results suggest that terns search for a new mate as soon as they arrive on the breeding grounds and that mates remain faithful to each other to avoid the costs of searching for a new partner. Thus, synchrony in arrival facilitates pair bond maintenance rather than asynchrony promoting divorce, since divorce appears to be a side-effect of asynchrony and not an active decision. Copyright 1999 The Association for the Study of Animal Behaviour. PMID:10564616

  16. Data Collection for Mobile Group Consumption: An Asynchronous Distributed Approach.

    Science.gov (United States)

    Zhu, Weiping; Chen, Weiran; Hu, Zhejie; Li, Zuoyou; Liang, Yue; Chen, Jiaojiao

    2016-01-01

    Mobile group consumption refers to consumption by a group of people, such as a couple, a family, colleagues and friends, based on mobile communications. It differs from consumption only involving individuals, because of the complex relations among group members. Existing data collection systems for mobile group consumption are centralized, which has the disadvantages of being a performance bottleneck, having single-point failure and increasing business and security risks. Moreover, these data collection systems are based on a synchronized clock, which is often unrealistic because of hardware constraints, privacy concerns or synchronization cost. In this paper, we propose the first asynchronous distributed approach to collecting data generated by mobile group consumption. We formally built a system model thereof based on asynchronous distributed communication. We then designed a simulation system for the model for which we propose a three-layer solution framework. After that, we describe how to detect the causality relation of two/three gathering events that happened in the system based on the collected data. Various definitions of causality relations based on asynchronous distributed communication are supported. Extensive simulation results show that the proposed approach is effective for data collection relating to mobile group consumption. PMID:27058544

  17. Asynchronous signal-dependent non-uniform sampler

    Science.gov (United States)

    Can-Cimino, Azime; Chaparro, Luis F.; Sejdić, Ervin

    2014-05-01

    Analog sparse signals resulting from biomedical and sensing network applications are typically non-stationary with frequency-varying spectra. By ignoring that the maximum frequency of their spectra is changing, uniform sampling of sparse signals collects unnecessary samples in quiescent segments of the signal. A more appropriate sampling approach would be signal-dependent. Moreover, in many of these applications power consumption and analog processing are issues of great importance that need to be considered. In this paper we present a signal dependent non-uniform sampler that uses a Modified Asynchronous Sigma Delta Modulator which consumes low-power and can be processed using analog procedures. Using Prolate Spheroidal Wave Functions (PSWF) interpolation of the original signal is performed, thus giving an asynchronous analog to digital and digital to analog conversion. Stable solutions are obtained by using modulated PSWFs functions. The advantage of the adapted asynchronous sampler is that range of frequencies of the sparse signal is taken into account avoiding aliasing. Moreover, it requires saving only the zero-crossing times of the non-uniform samples, or their differences, and the reconstruction can be done using their quantized values and a PSWF-based interpolation. The range of frequencies analyzed can be changed and the sampler can be implemented as a bank of filters for unknown range of frequencies. The performance of the proposed algorithm is illustrated with an electroencephalogram (EEG) signal.

  18. A novel asynchronous access method with binary interfaces

    Directory of Open Access Journals (Sweden)

    Torres-Solis Jorge

    2008-10-01

    Full Text Available Abstract Background Traditionally synchronous access strategies require users to comply with one or more time constraints in order to communicate intent with a binary human-machine interface (e.g., mechanical, gestural or neural switches. Asynchronous access methods are preferable, but have not been used with binary interfaces in the control of devices that require more than two commands to be successfully operated. Methods We present the mathematical development and evaluation of a novel asynchronous access method that may be used to translate sporadic activations of binary interfaces into distinct outcomes for the control of devices requiring an arbitrary number of commands to be controlled. With this method, users are required to activate their interfaces only when the device under control behaves erroneously. Then, a recursive algorithm, incorporating contextual assumptions relevant to all possible outcomes, is used to obtain an informed estimate of user intention. We evaluate this method by simulating a control task requiring a series of target commands to be tracked by a model user. Results When compared to a random selection, the proposed asynchronous access method offers a significant reduction in the number of interface activations required from the user. Conclusion This novel access method offers a variety of advantages over traditionally synchronous access strategies and may be adapted to a wide variety of contexts, with primary relevance to applications involving direct object manipulation.

  19. Non-detection of nova shells around asynchronous polars

    Science.gov (United States)

    Pagnotta, Ashley; Zurek, David

    2016-05-01

    Asynchronous polars (APs) are accreting white dwarfs (WDs) that have different WD and orbital angular velocities, unlike the rest of the known polars, which rotate synchronously (i.e. their WD and orbital angular velocities are the same). Past nova eruptions are the predicted cause of the asynchronicity, in part due to the fact that one of the APs, V1500 Cyg, was observed to undergo a nova eruption in 1975. We used the Southern African Large Telescope 10 m class telescope and the MDM 2.4 m Hiltner telescope to search for nova shells around three of the remaining four APs (V1432 Aql, BY Cam, and CD Ind) as well as one Intermediate Polar with a high asynchronicity (EX Hya). We found no evidence of nova shells in any of our images. We therefore cannot say that any of the systems besides V1500 Cyg had nova eruptions, but because not all post-nova systems have detectable shells, we also cannot exclude the possibility of a nova eruption occurring in any of these systems and knocking the rotation out of sync.

  20. Asynchronous Checkpoint Migration with MRNet in the Scalable Checkpoint / Restart Library

    Energy Technology Data Exchange (ETDEWEB)

    Mohror, K; Moody, A; de Supinski, B R

    2012-03-20

    Applications running on today's supercomputers tolerate failures by periodically saving their state in checkpoint files on stable storage, such as a parallel file system. Although this approach is simple, the overhead of writing the checkpoints can be prohibitive, especially for large-scale jobs. In this paper, we present initial results of an enhancement to our Scalable Checkpoint/Restart Library (SCR). We employ MRNet, a tree-based overlay network library, to transfer checkpoints from the compute nodes to the parallel file system asynchronously. This enhancement increases application efficiency by removing the need for an application to block while checkpoints are transferred to the parallel file system. We show that the integration of SCR with MRNet can reduce the time spent in I/O operations by as much as 15x. However, our experiments exposed new scalability issues with our initial implementation. We discuss the sources of the scalability problems and our plans to address them.

  1. Middleware for Processing Message Queues with Elasticity Support and Sequential Integrity of Asynchronous Message Processing

    Science.gov (United States)

    Henrique Teixeira, Eduardo; Patrícia Favacho de Araújo, Aletéia

    2015-10-01

    Elasticity in computing refers to dynamically adjusting the amount of allocated resources to process a distributed application. In order to achieve this, mechanisms are needed to avoid the phenomenon of the elasticity threshold detection moving constantly up or down. The existing work fails to deliver sequential integrity of asynchronous messages processing and the asymmetries of data distribution to achieve parallel consumption. This paper fills this gaps and proposes a middleware solution to dynamically analyze the flow of message queue, and a mechanism to increase the parallelized consumption based on the output behavior. An architecture for IOD (Increase On Demand) middleware is presented, with support for the increase and decrease of thread's to cope with the growth of message queues, using the technique of limit-based heuristics over a given period of time and grouping messages into sub-queues based on classification criteria.

  2. Asynchronous Message Transmission Technique for Latency Requirements in Time Critical Ship-borne System

    Directory of Open Access Journals (Sweden)

    N. P. Shrivastava

    2016-01-01

    Full Text Available A solution to data ageing requirements in time critical ship system like fire control system is presented. In an operational sea borne platform, navigation requirements for the onboard systems are fulfilled by ring laser gyro-based inertial navigation system. For critical systems like fire control system, navigational data must be delivered in real time without any delay. However due to delay occurring in processing of raw information and transmission of data on interface bus some latency is introduced. Algorithm for an asynchronous message transmission technique from inertial navigation system to user system to meet its latency requirements is discussed. Latency requirement is achieved by sending a separate message with the time stamp for the instance the first byte of 100 Hz attitude data is received at the processing computer of navigation system.Defence Science Journal, Vol. 66, No. 1, January 2016, pp. 26-29, DOI: http://dx.doi.org/10.14429/dsj.66.8502

  3. Asynchronous Group Key Distribution on top of the CC2420 Security Mechanisms for Sensor Networks

    DEFF Research Database (Denmark)

    Hansen, Morten Tranberg

    scheme with no time synchronization requirements. The scheme decreases the number of key updates by providing them on an as needed basis according to the amount of network traffic. We evaluate the CC2420 radio security mechanism and show how to use it as a basis to implement secure group communication......A sensor network is a network consisting of small, inexpensive, low-powered sensor nodes that communicate to complete a common task. Sensor nodes are characterized by having limited communication and computation capabilities, energy, and storage. They often are deployed in hostile environments...... creating a demand for encryption and authentication of the messages sent between them. Due to severe resource constraints on the sensor nodes, efficient key distribution schemes and secure communication protocols with low overhead are desired. In this paper we present an asynchronous group key distribution...

  4. Asynchronous Remote Medical Consultation for Ghana

    CERN Document Server

    Luk, Rowena; Aoki, Paul M

    2008-01-01

    Computer-mediated communication systems can be used to bridge the gap between doctors in underserved regions with local shortages of medical expertise and medical specialists worldwide. To this end, we describe the design of a prototype remote consultation system intended to provide the social, institutional and infrastructural context for sustained, self-organizing growth of a globally-distributed Ghanaian medical community. The design is grounded in an iterative design process that included two rounds of extended design fieldwork throughout Ghana and draws on three key design principles (social networks as a framework on which to build incentives within a self-organizing network; optional and incremental integration with existing referral mechanisms; and a weakly-connected, distributed architecture that allows for a highly interactive, responsive system despite failures in connectivity). We discuss initial experiences from an ongoing trial deployment in southern Ghana.

  5. Impact of thermoelectric cooling modules on the efficiency of a single-phase asynchronous machine

    OpenAIRE

    Gouws, Rupert; Van Jaarsveldt, Heino

    2014-01-01

    In this paper, the authors present the impact of thermoelectric cooling modules (TECMs) on the efficiency of a single-phase asynchronous machine. TECMs are used to lower the stator winding temperature and core temperature of the single-phase asynchronous machine. A similar effect might be possible by operating the asynchronous machine in a controlled lower temperature environment or by using other means of improved controlled cooling. An overview on the materials an...

  6. Pharmacists’ Perception of Synchronous Versus Asynchronous Distance Learning for Continuing Education Programs

    OpenAIRE

    Buxton, Eric C.

    2014-01-01

    Objective. To evaluate and compare pharmacists’ satisfaction with the content and learning environment of a continuing education program series offered as either synchronous or asynchronous webinars.

  7. Item Vetoes and Attempts to Override Them in Multiparty Legislatures Vetos parciales e intentos de insistencia en legislaturas multipartidistas

    Directory of Open Access Journals (Sweden)

    Valeria Palanza

    2013-01-01

    Full Text Available This paper analyzes the dynamics of vetoes and veto overrides in the context of a multiparty legislature using an original dataset from the period 1983–2007 in Argentina. We argue that the President can use an “item” or “partial” veto to selectively delete articles, while keeping enough distributive goods in the bill to break up the coalition responsible for its passage, thereby eliminating support for an override. Our research reveals that total vetoes – which affect all legislators equally – are more likely to be overridden than partial vetoes. Contradicting the received wisdom that in multiparty legislatures override attempts are more likely under a divided government, we find that override attempts are more likely in plurality governments. We use case analyses to illustrate the main arguments developed in this paper.El trabajo estudia las dinámicas desatadas por la práctica del veto presidencial e insistencias del congreso, en el contexto de legislaturas multipartidarias, a través del análisis de una base de datos original que abarca el período 1983-2007 en Argentina. El trabajo argumenta que el presidente puede usar el veto parcial para quitar del texto, en forma selectiva, artículos puntuales, dejando al mismo tiempo en el texto bienes distributivos suficientes como para romper la coalición responsable de la aprobación del proyecto, de manera tal de eliminar la posibilidad de una insistencia. La investigación revela que los vetos totales, que afectan por igual a todos los legisladores, son más factibles de ser insistidos que los vetos parciales. En contra de lo sostenido al momento acerca de que en legislaturas multipartidarias los intentos de insistencia son más factibles bajo gobierno dividido, este trabajo encuentra que son más factibles cuando el gobierno cuenta con al menos una pluralidad en una de las cámaras. Además del análisis cuantitativo, presentamos estudios de casos para ilustrar los argumentos

  8. An Asynchronous Recurrent Network of Cellular Automaton-Based Neurons and Its Reproduction of Spiking Neural Network Activities.

    Science.gov (United States)

    Matsubara, Takashi; Torikai, Hiroyuki

    2016-04-01

    Modeling and implementation approaches for the reproduction of input-output relationships in biological nervous tissues contribute to the development of engineering and clinical applications. However, because of high nonlinearity, the traditional modeling and implementation approaches encounter difficulties in terms of generalization ability (i.e., performance when reproducing an unknown data set) and computational resources (i.e., computation time and circuit elements). To overcome these difficulties, asynchronous cellular automaton-based neuron (ACAN) models, which are described as special kinds of cellular automata that can be implemented as small asynchronous sequential logic circuits have been proposed. This paper presents a novel type of such ACAN and a theoretical analysis of its excitability. This paper also presents a novel network of such neurons, which can mimic input-output relationships of biological and nonlinear ordinary differential equation model neural networks. Numerical analyses confirm that the presented network has a higher generalization ability than other major modeling and implementation approaches. In addition, Field-Programmable Gate Array-implementations confirm that the presented network requires lower computational resources. PMID:25974951

  9. Can Factors Related to Self-regulated Learning and Epistemological Beliefs Predict Learning Achievement in Undergraduate Asynchronous Web-based Courses?

    OpenAIRE

    Bell, Paul D

    2006-01-01

    This study examined the effects of self-regulated learning (SRL) and epistemological beliefs (EB) on individual learner levels of academic achievement in Web-based learning environments while holding constant the effect of computer self-efficacy, reason for taking an online course, and prior college academic achievement. The study constituents included 201 undergraduate students enrolled in a variety of asynchronous Web-based courses at a university in the southeastern United States.

  10. "Conversations réflexives" dans la classe de langues virtuelle par conférence asynchrone "Reflective conversations" in asynchronous conferencing for distance language learnersning

    Directory of Open Access Journals (Sweden)

    Robin Goodfellow

    1998-12-01

    Full Text Available A l’Open University, université britannique de télé-enseignement, les concepteurs de matériaux utilisent depuis longtemps des pédagogies qui amènent l’apprenant à réfléchir sur son apprentissage et à expliciter cette réflexion. Or aujourd’hui les Technologies de l’Information et de la Communication (TIC leur permettent de faire interagir apprenants, professeurs et locuteurs natifs. Ainsi l’apprenant participe à la communication et reçoit en retour des messages en langue cible, dont il se sert pour améliorer sa compétence communicative. Qu’en est-il, dès lors, du rôle de la réflexion consciente dans le processus d’apprentissage ? Vu les importantes possibilités d’interactivité offertes par les TIC, doit-on encore prôner la réflexion consciente dans le télé-enseignement ? Nous répondons par l’affirmative, considérant que les concepteurs d’environnements virtuels doivent faciliter et la réflexion consciente et l’interactivité spontanée. Nous soutenons que la conférence télématique asynchrone est un outil qui permet d’atteindre cet objectif. Nous cherchons à voir dans quelle mesure la réflexivité et l’interactivité interviennent dans ce type de conférence, et à préciser la valeur pédagogique de ces échanges. Nous étudions une conférence organisée pour des étudiants de français langue étrangère (FLE et nous proposons une pédagogie visant à promouvoir ce que nous appelons des "conversations réflexives", c’est-à-dire des échanges privilégiant des thèmes langagiers ou portant sur l’apprentissage même des langues.In the UK Open University the principle that distance language learners should be encouraged to reflect on their own learning has traditionally been central to the design of conventional (i.e. print , audio and video course materials. However, since Computer-Mediated-Communication (CMC technologies have created the possibility for learners to interact with each

  11. Entry of Ebola Virus is an Asynchronous Process.

    Science.gov (United States)

    Reynard, Olivier; Volchkov, Viktor E

    2015-10-01

    Ebola virus (EBOV) is responsible for a severe fever with a high mortality rate. The diverse nature of the attachment of the virus to the cell surface, the initial step of virus entry, raises questions concerning the kinetics of the virus internalization process. We investigated EBOV entry kinetics using the activity of a particular monoclonal antibody that neutralizes virus infectivity. We demonstrate that inoculation of cells with EBOV results in an asynchronous entry process, as revealed by the ability of the virus to remain in a cell-bound state for an extended period of time before it is internalized. PMID:25941332

  12. Hyperplastic polyposis associated with two asynchronous colon cancers

    Institute of Scientific and Technical Information of China (English)

    Masaya Kurobe; Kuniko Abe; Naoe Kinoshita; Masanobu Anami; Hirotaka Tokai; Yoshinori Ryu; Chun Yang Wen; Takashi Kanematsu; Tomayoshi Hayashi

    2007-01-01

    We report a patient with hyperplastic polyposis who had two asynchronous colon cancers, a combined adenoma-hyperplastic polyp, a serrated adenoma, and tubular adenomas. Hyperplastic polyposis is thought to be a precancerous lesion; and adenocarcinoma arises from hyperplastic polyposis through the hyperplastic polyp-adenoma-carcinoma sequence. Most polyps in patients with hyperplastic polyposis present as blandlooking hyperplastic polyps, which are regarded as nonneoplastic lesions; however, the risk of malignancy should not be underestimated. In patients with multiple hyperplastic polyps, hyperplastic polyposis should be identified and followed up carefully in order to detect malignant transformation in the early stage.

  13. The Mechanical Transient Process at Asynchronous Motor Oscillating Mode

    Science.gov (United States)

    Antonovičs, Uldis; Bražis, Viesturs; Greivulis, Jānis

    2009-01-01

    The research object is squirrel-cage asynchronous motor connected to single-phase sinusoidal. There are shown, that by connecting to the stator windings a certain sequence of half-period positive and negative voltage, a motor rotor is rotated, but three times slower than in the three-phase mode. Changing the connecting sequence of positive and negative half-period voltage to stator windings, motor can work in various oscillating modes. It is tested experimentally. The mechanical transient processes had been researched in rotation and oscillating modes.

  14. Positive Semidefinite Integrated Covariance Estimation, Factorizations and Asynchronicity

    DEFF Research Database (Denmark)

    Boudt, Kris; Laurent, Sébastien; Lunde, Asger;

    observations as possible. The estimator is guaranteed positive semidefinite. Monte Carlo simulations confirm good finite sample properties. In the application we forecast portfolio Value-at-Risk and sector risk exposures for a portfolio of 52 stocks. We find that forecasts obtained from dynamic models......An estimator of the ex-post covariation of log-prices under asynchronicity and microstructure noise is proposed. It uses the Cholesky factorization on the correlation matrix in order to exploit the heterogeneity in trading intensity to estimate the different parameters sequentially with as many...... utilizing the proposed high-frequency estimator provide statistically and economically superior forecasts to models using daily returns....

  15. Electrotechnics - AC motors. Asynchronous and brush-less motors - Lecture and exercises with solutions; Electrotechnique - Moteurs a courant alternatif. Moteurs asynchrones et brushless - Cours et problemes resolus

    Energy Technology Data Exchange (ETDEWEB)

    Jacob, D.

    2005-07-01

    This book proposes a presentation of AC electric motors essentially based on physics and technology. Its originality consists in avoiding to use mathematical formulations (like Park's transformation). The modeling retained, which only uses magnetic momentum, magnetic fields and reluctance concepts, leads simply and naturally to the vectorial control principle. The book develops some lecture elements which includes some topics rarely considered like the dimensioning of an asynchronous motor or of a single-phase brush-less motor. Experimental results illustrate the physical phenomena described and many original problems are resolved and commented at the end of each chapter. Content: signals and systems in electrotechnics, torque and rotating magnetic fields generation, asynchronous machine in permanent regime, speed variation of the asynchronous motor, special asynchronous motors, synchronous machine in permanent regime, brush-less motor, note about step motors, note about inverters, index. (J.S.)

  16. THE METHODS AND THE RESULTS OF THE TESTING OF AN ASYNCHRONOUS GENERATOR WITH SIX PHASE ZONES

    Directory of Open Access Journals (Sweden)

    Bogatyrev N. I.

    2016-03-01

    Full Text Available The article contain the peculiarities of testing asynchronous generator with sixzone winding on the basis of the asynchronous motor series 4A100S4 and analysis of obtained characteristics. Circuit parameters of the stator winding can significantly affect the characteristics of the asynchronous generator. Asynchronous generator was tested with a stator winding connected star, autotransformer and sectional winding. Use chastising windings opens the possibility of applying various circuits of capacitors and the load to asynchronous generators, which in turn affect the efficiency and stabilizing properties of the electric machine. Asynchronous generators to test with sectional winding by confirmation of theoretical calculations for determine the most optimal scheme under connect capacitors and load, testing the stator winding. The volume of testing for asynchronous generators standard is not defined, so we proposed testing method, taking into account the design features of the stator winding. Asynchronous generators were tested with the help of special equipment with the use of analyzer of energy power quality. Article contains characteristics of idling, short circuit and others, considered the heat mode. On the basis of the results we have determined the parameters of the circuit, the efficiency and power factor of induction generator

  17. The Key Implementation Technology of Client/Server's Asynchronous Communication Programs

    Institute of Scientific and Technical Information of China (English)

    2002-01-01

    This paper introduces the implementation method,key technology and flowchart of Client/Server's asynchronous communication programs on Linux or Unix,and further explains a few problems to which should pay attention for improving CPU's efficiency in implementing asynchronous communication programs.

  18. Designing Asynchronous Online Discussion Environments: Recent Progress and Possible Future Directions

    Science.gov (United States)

    Gao, Fei; Zhang, Tianyi; Franklin, Teresa

    2013-01-01

    Asynchronous online discussion environments are important platforms to support learning. Research suggests, however, threaded forums, one of the most popular asynchronous discussion environments, do not often foster productive online discussions naturally. This paper explores how certain properties of threaded forums have affected or constrained…

  19. Anonymity and Motivation in Asynchronous Discussions and L2 Vocabulary Learning

    Science.gov (United States)

    Polat, Nihat; Mancilla, Rae; Mahalingappa, Laura

    2013-01-01

    This study investigates L2 attainment in asynchronous online environments, specifically possible relationships among anonymity, L2 motivation, participation in discussions, quality of L2 production, and success in L2 vocabulary learning. It examines, in asynchronous discussions, (a) if participation and (b) motivation contribute to L2 vocabulary…

  20. Using Television Sitcoms to Facilitate Asynchronous Discussions in the Online Communication Course

    Science.gov (United States)

    Tolman, Elizabeth; Asbury, Bryan

    2012-01-01

    Asynchronous discussions are a useful instructional resource in the online communication course. In discussion groups students have the opportunity to actively participate and interact with students and the instructor. Asynchronous communication allows for flexibility because "participants can interact with significant amounts of time between…

  1. Grain Refining of Flange Plate for Welded H Section Steel Made under Asynchronous Rolling Condition

    Institute of Scientific and Technical Information of China (English)

    DAI Hui; SUN Jiquan; TANG Di

    2011-01-01

    Asynchronous rolling technology was adopted for the accumulated ten passes cold rolling,flange plate steel,and for welded H section steel,respectively.The metallographic microstructure analysis,tensile test and annealing test were carried out for cold rolled pieces; thus the ratio of length to width of grain,tensile strength,relationship between the grain size and asynchronous rolling process parameters after annealing can be obtained.The experimental results show that the relationship between the asynchronous rolling and the shearing deformation of rolled pieces can make a reasonable interpretation of the mechanism that asynchronous rolling may improve the strain accumulated energy of rolled pieces and the strength of flange plate steel.This paper provides a theoretical basis for the application of asynchronous rolling in improving the strength of flange plate steel.

  2. Cooperative and asynchronous stereo vision for dynamic vision sensors

    International Nuclear Information System (INIS)

    Dynamic vision sensors (DVSs) encode visual input as a stream of events generated upon relative light intensity changes in the scene. These sensors have the advantage of allowing simultaneously high temporal resolution (better than 10 µs) and wide dynamic range (>120 dB) at sparse data representation, which is not possible with clocked vision sensors. In this paper, we focus on the task of stereo reconstruction. The spatiotemporal and asynchronous aspects of data provided by the sensor impose a different stereo reconstruction approach from the one applied for synchronous frame-based cameras. We propose to model the event-driven stereo matching by a cooperative network (Marr and Poggio 1976 Science 194 283–7). The history of the recent activity in the scene is stored in the network, which serves as spatiotemporal context used in disparity calculation for each incoming event. The network constantly evolves in time, as events are generated. In our work, not only the spatiotemporal aspect of the data is preserved but also the matching is performed asynchronously. The results of the experiments prove that the proposed approach is well adapted for DVS data and can be successfully used for disparity calculation. (paper)

  3. Experience with synchronous and asynchronous digital control systems

    Science.gov (United States)

    Regenie, V. A.; Chacon, C. V.; Lock, W. P.

    1986-01-01

    Flight control systems have undergone a revolution since the days of simple mechanical linkages; presently the most advanced systems are full-authority, full-time digital systems controlling unstable aircraft. With the use of advanced control systems, the aerodynamic design can incorporate features that allow greater performance and fuel savings, as can be seen on the new Airbus design and advanced tactical fighter concepts. These advanced aircraft will be and are relying on the flight control system to provide the stability and handling qualities required for safe flight and to allow the pilot to control the aircraft. Various design philosophies have been proposed and followed to investigate system architectures for these advanced flight control systems. One major area of discussion is whether a multichannel digital control system should be synchronous or asynchronous. This paper addressed the flight experience at the Dryden Flight Research Facility of NASA's Ames Research Center with both synchronous and asynchronous digital flight control systems. Four different flight control systems are evaluated against criteria such as software reliability, cost increases, and schedule delays.

  4. Asynchronous Transfer Mode Quality-of-Service Testing

    Science.gov (United States)

    Ivancic, William D.

    1998-01-01

    In support of satellite-ATM interoperability, researchers at the NASA Lewis Research Center performed asynchronous transfer mode (ATM) quality-of-service experiments using MPEG-2 (ATM application layer 5, AAL5) over ATM over an emulated satellite link. The purpose of these experiments was to determine the free-space link quality necessary to use the ATM protocol to transmit high-quality multimedia information. The experimental results have been submitted to various International Telecommunications Union (ITU) study groups in order to improve and modify current standards and recommendations for the telecommunications industry. Quality-of-service parameters for Class I, stringent class requirements for ITU-T I.356 are currently being debated. The experimental results presented will help to establish these quality-of-service thresholds. This material will also be useful in the development of the ITU-R WP-4B's Draft Preliminary New Recommendation on the Transmission of Asynchronous Transfer Mode Traffic via Satellite (Rec. S.atm).

  5. Design and test of asynchronous eSFQ circuits

    International Nuclear Information System (INIS)

    We designed and tested new energy-efficient single flux quantum (eSFQ) circuits. The eSFQ design approach is based on biasing logic gates via decision-making pairs (DMPs) which connect clock lines to synchronous gates. The eSFQ design of asynchronous gates is more challenging, since these gates are not clocked. We demonstrate eSFQ designs of asynchronous circuits and implemented two versions of eSFQ toggle flip-flops (eTFF) cells embedded in a synchronous shift register environment. The first design is based on the bias-free version of a TFF operating in the ballistic mode. In the second design, the TFFs dc bias is applied symmetrically, while the necessary half-quantum phase skew is achieved by magnetic flux bias, which can also be done with a pi-junction phase shifter. Surrounding shift registers are the eSFQ versions of the RSFQ shift register with two junctions per bit. In this work, we report the functional operation of these eSFQ circuits and their energy consumption. (paper)

  6. An Examination of Asynchronous Communication Experiences and Perspectives of Students in an Online Course: A Case Study.

    Science.gov (United States)

    Vonderwell, Selma

    2003-01-01

    Explores asynchronous communication perspectives and experiences of undergraduate students in an online course. Interviews with 22 preservice teachers, student-to-instructor email transcripts, asynchronous discussion transcripts, and two independent reviewers' reviews of the asynchronous discussions were used to collect and analyze the data.…

  7. COMPUTING

    CERN Multimedia

    M. Kasemann

    Overview In autumn the main focus was to process and handle CRAFT data and to perform the Summer08 MC production. The operational aspects were well covered by regular Computing Shifts, experts on duty and Computing Run Coordination. At the Computing Resource Board (CRB) in October a model to account for service work at Tier 2s was approved. The computing resources for 2009 were reviewed for presentation at the C-RRB. The quarterly resource monitoring is continuing. Facilities/Infrastructure operations Operations during CRAFT data taking ran fine. This proved to be a very valuable experience for T0 workflows and operations. The transfers of custodial data to most T1s went smoothly. A first round of reprocessing started at the Tier-1 centers end of November; it will take about two weeks. The Computing Shifts procedure was tested full scale during this period and proved to be very efficient: 30 Computing Shifts Persons (CSP) and 10 Computing Resources Coordinators (CRC). The shift program for the shut down w...

  8. CloudMine: Multi-Party Privacy-Preserving Data Analytics Service

    OpenAIRE

    Anh, Dinh Tien Tuan; Thanh, Quach Vinh; Datta, Anwitaman

    2012-01-01

    An increasing number of businesses are replacing their data storage and computation infrastructure with cloud services. Likewise, there is an increased emphasis on performing analytics based on multiple datasets obtained from different data sources. While ensuring security of data and computation outsourced to a third party cloud is in itself challenging, supporting analytics using data distributed across multiple, independent clouds is even further from trivial. In this paper we present Clou...

  9. COMPUTING

    CERN Multimedia

    P. McBride

    The Computing Project is preparing for a busy year where the primary emphasis of the project moves towards steady operations. Following the very successful completion of Computing Software and Analysis challenge, CSA06, last fall, we have reorganized and established four groups in computing area: Commissioning, User Support, Facility/Infrastructure Operations and Data Operations. These groups work closely together with groups from the Offline Project in planning for data processing and operations. Monte Carlo production has continued since CSA06, with about 30M events produced each month to be used for HLT studies and physics validation. Monte Carlo production will continue throughout the year in the preparation of large samples for physics and detector studies ramping to 50 M events/month for CSA07. Commissioning of the full CMS computing system is a major goal for 2007. Site monitoring is an important commissioning component and work is ongoing to devise CMS specific tests to be included in Service Availa...

  10. COMPUTING

    CERN Multimedia

    I. Fisk

    2011-01-01

    Introduction CMS distributed computing system performed well during the 2011 start-up. The events in 2011 have more pile-up and are more complex than last year; this results in longer reconstruction times and harder events to simulate. Significant increases in computing capacity were delivered in April for all computing tiers, and the utilisation and load is close to the planning predictions. All computing centre tiers performed their expected functionalities. Heavy-Ion Programme The CMS Heavy-Ion Programme had a very strong showing at the Quark Matter conference. A large number of analyses were shown. The dedicated heavy-ion reconstruction facility at the Vanderbilt Tier-2 is still involved in some commissioning activities, but is available for processing and analysis. Facilities and Infrastructure Operations Facility and Infrastructure operations have been active with operations and several important deployment tasks. Facilities participated in the testing and deployment of WMAgent and WorkQueue+Request...

  11. COMPUTING

    CERN Multimedia

    M. Kasemann

    Overview During the past three months activities were focused on data operations, testing and re-enforcing shift and operational procedures for data production and transfer, MC production and on user support. Planning of the computing resources in view of the new LHC calendar in ongoing. Two new task forces were created for supporting the integration work: Site Commissioning, which develops tools helping distributed sites to monitor job and data workflows, and Analysis Support, collecting the user experience and feedback during analysis activities and developing tools to increase efficiency. The development plan for DMWM for 2009/2011 was developed at the beginning of the year, based on the requirements from the Physics, Computing and Offline groups (see Offline section). The Computing management meeting at FermiLab on February 19th and 20th was an excellent opportunity discussing the impact and for addressing issues and solutions to the main challenges facing CMS computing. The lack of manpower is particul...

  12. COMPUTING

    CERN Multimedia

    I. Fisk

    2013-01-01

    Computing activity had ramped down after the completion of the reprocessing of the 2012 data and parked data, but is increasing with new simulation samples for analysis and upgrade studies. Much of the Computing effort is currently involved in activities to improve the computing system in preparation for 2015. Operations Office Since the beginning of 2013, the Computing Operations team successfully re-processed the 2012 data in record time, not only by using opportunistic resources like the San Diego Supercomputer Center which was accessible, to re-process the primary datasets HTMHT and MultiJet in Run2012D much earlier than planned. The Heavy-Ion data-taking period was successfully concluded in February collecting almost 500 T. Figure 3: Number of events per month (data) In LS1, our emphasis is to increase efficiency and flexibility of the infrastructure and operation. Computing Operations is working on separating disk and tape at the Tier-1 sites and the full implementation of the xrootd federation ...

  13. An asynchronous, pipelined, electronic acquisition system for Active Matrix Flat-Panel Imagers (AMFPIs)

    International Nuclear Information System (INIS)

    The development of a full-custom electronic acquisition system designed for readout of large-area active matrix flat-panel imaging arrays is reported. The arrays, which comprise two-dimensional matrices of pixels utilizing amorphous silicon thin-film transistors, are themselves under development for a wide variety of X-ray imaging applications. The acquisition system was specifically designed to facilitate detailed, quantitative investigations of the properties of these novel imaging arrays and contains significant enhancements compared to a previously developed acquisition system. These enhancements include pipelined preamplifier circuits to allow faster readout speed, expanded addressing capabilities allowing a maximum of 4096 array data lines, and on-board summing of image frames. The values of many acquisition system parameters, including timings and voltages, may be specified and downloaded from a host computer. Once acquisition is enabled, the system operates asynchronously of its host computer. The system allows image capture in both radiographic mode (corresponding to the capture of individual X-ray images), and fluoroscopic mode (corresponding to the capture of a continual series of X-ray images). A detailed description of the system architecture and the underlying motivations for the design is reported in this paper. (author)

  14. An asynchronous writing method for restart files in the gysela code in prevision of exascale systems*

    Directory of Open Access Journals (Sweden)

    Thomine O.

    2013-12-01

    Full Text Available The present work deals with an optimization procedure developed in the full-f global GYrokinetic SEmi-LAgrangian code (GYSELA. Optimizing the writing of the restart files is necessary to reduce the computing impact of crashes. These files require a very large memory space, and particularly so for very large mesh sizes. The limited bandwidth of the data pipe between the comput- ing nodes and the storage system induces a non-scalable part in the GYSELA code, which increases with the mesh size. Indeed the transfer time of RAM to data depends linearly on the files size. The necessity of non synchronized writing-in-file procedure is therefore crucial. A new GYSELA module has been developed. This asynchronous procedure allows the frequent writ- ing of the restart files, whilst preventing a severe slowing down due to the limited writing bandwidth. This method has been improved to generate a checksum control of the restart files, and automatically rerun the code in case of a crash for any cause.

  15. An investigation of assessment and feedback practices in fully asynchronous online undergraduate mathematics courses

    Science.gov (United States)

    Trenholm, Sven; Alcock, Lara; Robinson, Carol

    2015-11-01

    Research suggests it is difficult to learn mathematics in the fully asynchronous online (FAO) instructional modality, yet little is known about associated teaching and assessment practices. In this study, we investigate FAO mathematics assessment and feedback practices in particular consideration of both claims and findings that these practices have a powerful influence on learning. A survey questionnaire was constructed and completed by 70 FAO undergraduate mathematics instructors, mostly from the USA, who were each asked to detail their assessment and feedback practices in a single FAO mathematics course. Alongside these questions, participants also answered the 16-item version of the Approaches to Teaching Inventory. In addition, a novel feedback framework was also created and used to examine how feedback practices may be related to participants' approaches to teaching. Results show that assessment and feedback practices are varied and complex: in particular, we found there was not a simple emphasis on summative assessment instruments, nor a concomitant expectation these would always be invigilated. Though richer assessment feedback appears to be emphasized, evidence suggests this feedback may not be primarily directed at advancing student learning. Moreover, we found evidence of a reliance on computer--human interactions (e.g. via computer-assisted assessment systems) and further evidence of a decline in human interactions, suggesting a dynamic that is both consistent with current online learning theory and claims FAO mathematics courses are becoming commodified. Several avenues for further research are suggested.

  16. Computer

    CERN Document Server

    Atkinson, Paul

    2011-01-01

    The pixelated rectangle we spend most of our day staring at in silence is not the television as many long feared, but the computer-the ubiquitous portal of work and personal lives. At this point, the computer is almost so common we don't notice it in our view. It's difficult to envision that not that long ago it was a gigantic, room-sized structure only to be accessed by a few inspiring as much awe and respect as fear and mystery. Now that the machine has decreased in size and increased in popular use, the computer has become a prosaic appliance, little-more noted than a toaster. These dramati

  17. Label-acquired magnetorotation for biosensing: An asynchronous rotation assay

    Energy Technology Data Exchange (ETDEWEB)

    Hecht, Ariel, E-mail: hecht@umich.ed [University of Michigan, Department of Biomedical Engineering, 2200 Bonisteel, Ann Arbor, MI 48109-2099 (United States); University of Michigan, Department of Chemistry, 930 North University, Ann Arbor, MI 48109-1055 (United States); Kinnunen, Paivo, E-mail: pkkinn@umich.ed [University of Michigan, Department of Chemistry, 930 North University, Ann Arbor, MI 48109-1055 (United States); University of Michigan, Applied Physics Program, 2477 Randall Laboratory, Ann Arbor, MI 48109-1120 (United States); McNaughton, Brandon, E-mail: bmcnaugh@umich.ed [University of Michigan, Department of Biomedical Engineering, 2200 Bonisteel, Ann Arbor, MI 48109-2099 (United States); University of Michigan, Department of Chemistry, 930 North University, Ann Arbor, MI 48109-1055 (United States); University of Michigan, Applied Physics Program, 2477 Randall Laboratory, Ann Arbor, MI 48109-1120 (United States); Kopelman, Raoul, E-mail: kopelman@umich.ed [University of Michigan, Department of Biomedical Engineering, 2200 Bonisteel, Ann Arbor, MI 48109-2099 (United States); University of Michigan, Department of Chemistry, 930 North University, Ann Arbor, MI 48109-1055 (United States); University of Michigan, Applied Physics Program, 2477 Randall Laboratory, Ann Arbor, MI 48109-1120 (United States)

    2011-02-15

    This paper presents a novel application of magnetic particles for biosensing, called label-acquired magnetorotation (LAM). This method is based on a combination of the traditional sandwich assay format with the asynchronous magnetic bead rotation (AMBR) method. In label-acquired magnetorotation, an analyte facilitates the binding of a magnetic label bead to a nonmagnetic solid phase sphere, forming a sandwich complex. The sandwich complex is then placed in a rotating magnetic field, where the rotational frequency of the sandwich complex is a function of the amount of analyte attached to the surface of the sphere. Here, we use streptavidin-coated beads and biotin-coated particles as analyte mimics, to be replaced by proteins and other biological targets in future work. We show this sensing method to have a dynamic range of two orders of magnitude.

  18. Numerical Simulation of Asynchronous Simulated Moving Bed Chromatography

    Institute of Scientific and Technical Information of China (English)

    卢建刚

    2004-01-01

    Asynchronous simulated moving bed chromatography (ASMBC), known also as the "VARICOL" process, is more efficient and flexible than the well-known and traditional simulated moving bed chromatography (SMBC). A detailed model of ASMBC, taking account of non-linear competitive isotherms, mass transfer parameters, and complex port switching schedule parameters, was developed to simulate the complex dynamics of ASMBC.The simulated performance is in close agreement with the experimental data of chiral separation reported in the literature. The simulation results show that ASMBC can achieve the performance similar to SMBC with fewer columns and can achieve better performance than SMBC with the same total column number. All design and operation parameters can be chosen correctly by numerical simulation. This detailed ASMBC model and the numerical technique are useful for design, operation, optimization and scale-up of ASMBC.

  19. Blow Flies Visiting Decaying Alligators: Is Succession Synchronous or Asynchronous?

    Directory of Open Access Journals (Sweden)

    Mark P. Nelder

    2009-01-01

    Full Text Available Succession patterns of adult blow flies (Diptera: Calliphoridae on decaying alligators were investigated in Mobile (Ala, USA during August 2002. The most abundant blow fly species visiting the carcasses were Chrysomya rufifacies (Macquart, Cochliomyia macellaria (Fabricus, Chrysomya megacephala (Fabricus, Phormia regina (Meigen, and Lucilia coeruleiviridis (Macquart. Lucilia coeruleiviridis was collected more often during the early stages of decomposition, followed by Chrysomya spp., Cochliomyia macellaria, and Phormia regina in the later stages. Lucilia coeruleiviridis was the only synchronous blow fly on the three carcasses; other blow fly species exhibited only site-specific synchrony. Using dichotomous correlations and analyses of variance, we demonstrated that blow fly-community succession was asynchronous among three alligators; however, Monte Carlo simulations indicate that there was some degree of synchrony between the carcasses.

  20. Operational aspects of asynchronous filtering for hydrological forecasting

    Directory of Open Access Journals (Sweden)

    O. Rakovec

    2015-03-01

    Full Text Available This study investigates the suitability of the Asynchronous Ensemble Kalman Filter (AEnKF and a partitioned updating scheme for hydrological forecasting. The AEnKF requires forward integration of the model for the analysis and enables assimilation of current and past observations simultaneously at a single analysis step. The results of discharge assimilation into a grid-based hydrological model for the Upper Ourthe catchment in the Belgian Ardennes show that including past predictions and observations in the data assimilation method improves the model forecasts. Additionally, we show that elimination of the strongly non-linear relation between the soil moisture storage and assimilated discharge observations from the model update becomes beneficial for improved operational forecasting, which is evaluated using several validation measures.

  1. LOAD CONTROL OF A 3-Ø SELF- EXCITED ASYNCHRONOUS GENERATOR

    Directory of Open Access Journals (Sweden)

    SUBRAMANIAN KULANDHAIVELU

    2011-02-01

    Full Text Available This paper describes the simulation based performance study of a 3-Ø self-excited asynchronous generator (SEASG in constant power operation. A feed back voltage based controller by using a load control technique to control and retain the generator terminal voltage constant. This technique mostly used in uncontrolled hydroturbine driven induction generators in a stand-alone power generator. The results has been validate by the steady state equivalent circuit analysis of a 2.2kW, 415Volts, 4.7A, Star connected, 1440-rpm induction generator. The proposed study system has been simulated using Mat lab/Simulink version-7.0.The simulated results arepresented.

  2. The Efficacy of Deliberate Practice Delivered Using Asynchronous Training Technology

    Directory of Open Access Journals (Sweden)

    Colleen E. McEdwards

    2014-04-01

    Full Text Available Employee productivity is key to survival in business. Senior employees require access to advanced training that does not necessitate extended periods away from their work. Once performance begins to plateau, it can be difficult to reach experienced employees with cost-effective, timely, and relevant training opportunities. Organizations must find ways to enhance employee performance; however, research suggests workplace training is too expensive and is too often without lasting benefit. The purpose of this study is to further quantify deliberate practice as a potentially efficient, customizable mode of training using asynchronous e-learning. The study compared traditional seminars with online deliberate practice training. While additional research is needed in wider learning contexts and with larger sample sizes, improvements among the deliberate practice groups were significant. Using a mixed methods pretest/posttest research design, the deliberate practice training showed improved performance and increased satisfaction compared with the traditional seminar approach.

  3. Commande vectorielle d'un moteur asynchrone sans capteur

    OpenAIRE

    Ourth, T.

    1993-01-01

    Ce papier présente la commande par flux orienté d'une machine asynchrone sans capteur de vitesse ou de position. Le flux rotorique est évalué grâce à un observateur d'ordre réduit d'un type voisin de Luenberger travaillant dans un repère fixe statorique. L'estimation de la vitesse est obtenue à partir du module du flux rotorique, des courants statoriques mesurés et de l'angle d'orientation du flux rotorique. Cette étude basée sur des simulations démontre un comportement acceptable de la comma...

  4. Multi-rate asynchronous sampling of bandwidth-limited signals

    CERN Document Server

    Feldster, Alfred; Horowitz, Moshe; Rosenthal, Amir; Zach, Shlomo; Singer, Lea

    2008-01-01

    We demonstrate experimentally an optical system for under-sampling several bandwidth limited signals with carrier frequencies that are not known apriori that can be located anywhere within a very broad frequency region between 0-18 GHz. The system is based on under-sampling asynchronously at three different sampling rates. The pulses required for the under-sampling are generated by a combination of an electrical comb generator and an electro-absorption modulator. To reduce loss and improve performance the implementation of the optical system is based on a wavelength division multiplexing technique. An accurate reconstruction of both the phase and the amplitude of the signals was obtained when two chirped signals generated simultaneously were sampled.

  5. The Formation of the Wide Asynchronous Binary Asteroid Population

    CERN Document Server

    Jacobson, Seth A; McMahon, Jay

    2013-01-01

    We propose and analyze a new mechanism for the formation of the wide asynchronous binary population. These binary asteroids have wide semi-major axes relative to most near-Earth and Main Belt asteroid systems. Confirmed members have rapidly rotating primaries and satellites that are not tidally locked. Previously suggested formation mechanisms from impact ejecta, planetary flybys and directly from rotational fission events cannot satisfy all of the observations. The newly hypothesized mechanism works as follows: (i) these systems are formed from rotational fission, (ii) their satellites are tidally locked, (iii) their orbits are expanded by the BYORP effect, (iv) their satellites de-synchronize due to the adiabatic invariance between the libration of the secondary and the mutual orbit, and (v) the secondary avoids resynchronization due to the the YORP effect. This seemingly complex chain of events is a natural pathway for binaries with satellites that have particular shapes, which define the BYORP effect torq...

  6. Vector control structure of an asynchronous motor at maximum torque

    Science.gov (United States)

    Chioncel, C. P.; Tirian, G. O.; Gillich, N.; Raduca, E.

    2016-02-01

    Vector control methods offer the possibility to gain high performance, being widely used. Certain applications require an optimum control in limit operating conditions, as, at maximum torque, that is not always satisfied. The paper presents how the voltage and the frequency for an asynchronous machine (ASM) operating at variable speed are determinate, with an accent on the method that keeps the rotor flux constant. The simulation analyses consider three load types: variable torque and speed, variable torque and constant speed, constant torque and variable speed. The final values of frequency and voltage are obtained through the proposed control schemes with one controller using the simulation language based on the Maple module. The dynamic analysis of the system is done for the case with P and PI controller and allows conclusions on the proposed method, which can have different applications, as the ASM in wind turbines.

  7. Minor Planet 1016 Anitra: A Likely Asynchronous Binary

    Science.gov (United States)

    Pilcher, Frederick; Benishek, Vladimir; Jacobsen, Jens; Kristensen, Leif Hugo; Lang, Kim; Larsen, Frank R.; Odden, Caroline; Pravec, Petr

    2016-07-01

    Analysis of photometry data for 1016 Anitra using a single period analysis shows a lightcurve with a period of 5.9296 hours and amplitude of 0.30 mag, with short period fluctuations. A simultaneous two-period analysis of the data found two smooth bimodal lightcurves with periods and amplitudes of P1 = 5.92951 h, A1 = 0.30 mag and P2 = 2.609143 h, A2 = 0.10 mag. These results are interpreted as the rotation of the two components of an asynchronous binary system. Four additional attenuations were observed that may have been caused by satellite mutual events, but those data were insufficient to yield an orbital period.

  8. Research on DSP-based Asynchronous Motor Control Technology

    Directory of Open Access Journals (Sweden)

    Jun Yao

    2013-05-01

    Full Text Available The Motor in a variety of electrical transmission and position servo system occupies an extremely important position. After the DSP technology being applied to the motor control, the unification of the hardware and the flexibility of the software can be combined. Take the brushless DC motor for example, studied the mathematical model and the structure of the motor control system, also obtained the design scheme of the DSP-based asynchronous motor control system. With TI's 32 bit fixed point DSPTMS320F2812 as the core design of the hardware system, we wrote the system software, debug the motor control system and the results show that the system achieves the expected effect. The results of the research can be applied to brushless DC motor and other motor control, it will have a wide application prospects.

  9. Asynchronous Variational Integration of Interaction Potentials for Contact Mechanics

    CERN Document Server

    Vouga, Etienne; Tamstorf, Rasmus; Grinspun, Eitan

    2009-01-01

    Asynchronous Variational Integrators (AVIs) have demonstrated long-time good energy behavior. It was previously conjectured that this remarkable property is due to their geometric nature: they preserve a discrete multisymplectic form. Previous proofs of AVIs' multisymplecticity assume that the potentials are of an elastic type, i.e., specified by volume integration over the material domain, an assumption violated by interaction-type potentials, such as penalty forces used to model mechanical contact. We extend the proof of AVI multisymplecticity, showing that AVIs remain multisymplectic under relaxed assumptions on the type of potential. The extended theory thus accommodates the simulation of mechanical contact in elastica (such as thin shells) and multibody systems (such as granular materials) with no drift of conserved quantities (energy, momentum) over long run times, using the algorithms in [3]. We present data from a numerical experiment measuring the long time energy behavior of simulated contact, compa...

  10. Asynchronous data-driven classification of weapon systems

    International Nuclear Information System (INIS)

    This communication addresses real-time weapon classification by analysis of asynchronous acoustic data, collected from microphones on a sensor network. The weapon classification algorithm consists of two parts: (i) feature extraction from time-series data using symbolic dynamic filtering (SDF), and (ii) pattern classification based on the extracted features using the language measure (LM) and support vector machine (SVM). The proposed algorithm has been tested on field data, generated by firing of two types of rifles. The results of analysis demonstrate high accuracy and fast execution of the pattern classification algorithm with low memory requirements. Potential applications include simultaneous shooter localization and weapon classification with soldier-wearable networked sensors. (rapid communication)

  11. Asynchronous learning: student utilization out of sync with their preference

    Directory of Open Access Journals (Sweden)

    Edward K. Lew

    2016-06-01

    Full Text Available Background: Asynchronous learning is gaining popularity. Data are limited regarding this learning method in medical students rotating in emergency medicine (EM. In EM, faculty time is limited to give in-person lectures. The authors sought to create an online curriculum that students could utilize as an additional learning modality. Objective: The goal was to evaluate effectiveness, participation, and preference for this mode of learning. Methods: We developed five online, narrated PowerPoint presentations. After orientation, access to the online curriculum was provided to the students, which they could review at their leisure. Results: One hundred and seven fourth-year medical students participated. They reported the curriculum to be of high quality. Pretest scores were similar for those that viewed all lectures – compliant group (CG (9.5 [CI 4.8–14.1] and those that did not view any – non-compliant group (NCG (9.6 [CI 5.9–13.4]. There was no statistical significant difference in posttest scores between the groups although there was improvement overall: CG 14.6 (CI 6.9–22.1; NCG 11.4 (CI 5.7–17.1. A majority (69.2% favored inclusion of asynchronous learning, but less than a quarter (22.4% reported viewing all five modules and more than a third (36.4% viewed none. Conclusion: Despite student-expressed preference for an online curriculum, they used the online resource less than expected. This should give pause to educators looking to convert core EM topics to an online format. However, when high-quality online lectures are utilized as a learning tool, this study demonstrates that they had neither a positive nor a negative impact on test scores.

  12. COMPUTING

    CERN Multimedia

    I. Fisk

    2010-01-01

    Introduction It has been a very active quarter in Computing with interesting progress in all areas. The activity level at the computing facilities, driven by both organised processing from data operations and user analysis, has been steadily increasing. The large-scale production of simulated events that has been progressing throughout the fall is wrapping-up and reprocessing with pile-up will continue. A large reprocessing of all the proton-proton data has just been released and another will follow shortly. The number of analysis jobs by users each day, that was already hitting the computing model expectations at the time of ICHEP, is now 33% higher. We are expecting a busy holiday break to ensure samples are ready in time for the winter conferences. Heavy Ion An activity that is still in progress is computing for the heavy-ion program. The heavy-ion events are collected without zero suppression, so the event size is much large at roughly 11 MB per event of RAW. The central collisions are more complex and...

  13. COMPUTING

    CERN Multimedia

    M. Kasemann P. McBride Edited by M-C. Sawley with contributions from: P. Kreuzer D. Bonacorsi S. Belforte F. Wuerthwein L. Bauerdick K. Lassila-Perini M-C. Sawley

    Introduction More than seventy CMS collaborators attended the Computing and Offline Workshop in San Diego, California, April 20-24th to discuss the state of readiness of software and computing for collisions. Focus and priority were given to preparations for data taking and providing room for ample dialog between groups involved in Commissioning, Data Operations, Analysis and MC Production. Throughout the workshop, aspects of software, operating procedures and issues addressing all parts of the computing model were discussed. Plans for the CMS participation in STEP’09, the combined scale testing for all four experiments due in June 2009, were refined. The article in CMS Times by Frank Wuerthwein gave a good recap of the highly collaborative atmosphere of the workshop. Many thanks to UCSD and to the organizers for taking care of this workshop, which resulted in a long list of action items and was definitely a success. A considerable amount of effort and care is invested in the estimate of the comput...

  14. UNIVERSAL REGULAR AUTONOMOUS ASYNCHRONOUS SYSTEMS: ω-LIMIT SETS, INVARIANCE AND BASINS OF ATTRACTION

    Directory of Open Access Journals (Sweden)

    Serban Vlad

    2011-07-01

    Full Text Available The asynchronous systems are the non-deterministic real timebinarymodels of the asynchronous circuits from electrical engineering.Autonomy means that the circuits and their models have no input.Regularity means analogies with the dynamical systems, thus such systems may be considered to be real time dynamical systems with a’vector field’, Universality refers to the case when the state space of the system is the greatest possible in the sense of theinclusion. The purpose of this paper is that of defining, by analogy with the dynamical systems theory, the omega-limit sets, the invariance and the basins of attraction of the universal regular autonomous asynchronous systems.

  15. Argo: A Time-Elastic Time-Division-Multiplexed NOC using Asynchronous Routers

    DEFF Research Database (Denmark)

    Kasapaki, Evangelia; Sparsø, Jens

    In this paper we explore the use of asynchronous routers in a time-division-multiplexed (TDM) network-on-chip (NOC), Argo, that is being developed for a multi-processor platform for hard real-time systems. TDM inherently requires a common time reference, and existing TDM-based NOC designs are...... either synchronous or mesochronous. We use asynchronous routers to achieve a simpler, smaller, and more robust, self-timed design. Our design exploits the fact that pipelined asynchronous circuits also behave as ripple FIFOs. Thus, it avoids the need for explicit synchronization FIFOs between the routers...

  16. Meeting decision detection: multimodal information fusion for multi-party dialogue understanding

    OpenAIRE

    Hsueh, Pei-Yun

    2009-01-01

    Modern advances in multimedia and storage technologies have led to huge archives of human conversations in widely ranging areas. These archives offer a wealth of information in the organization contexts. However, retrieving and managing information in these archives is a time-consuming and labor-intensive task. Previous research applied keyword and computer vision-based methods to do this. However, spontaneous conversations, complex in the use of multimodal cues and intricate i...

  17. Research Related Electromechanical Processes in an Asynchronous Traction Motor - Asynchronous Generator with Common Shaft Based on Field Model

    Directory of Open Access Journals (Sweden)

    Yury Kazakov

    2015-01-01

    Full Text Available Creating energy efficiency traction induction motors with frequency control for hybrid drive vehicles defines practical interest for new methods of testing and simulation. Tests of these machines, it is desirable to carry out with energy recovery in the motor-generator, where a common shaft unites the machines. At present, the system simulation of motor-generator is carried out on simplified models without saturation, surface effect, jagged cores, and non-sinusoidal voltage of frequency converters. A refined interrelated mathematical model of asynchronous motor and generator operating with a common shaft, based on the theory of electrical circuits and field theory. Models allow the related modelling and study of static and dynamic modes electrical machines taking into account the saturation, skin effect, toothed cores, non-sinusoidal voltage of the frequency inverter, and variation parameters of the windings.

  18. COMPUTING

    CERN Multimedia

    I. Fisk

    2010-01-01

    Introduction The first data taking period of November produced a first scientific paper, and this is a very satisfactory step for Computing. It also gave the invaluable opportunity to learn and debrief from this first, intense period, and make the necessary adaptations. The alarm procedures between different groups (DAQ, Physics, T0 processing, Alignment/calibration, T1 and T2 communications) have been reinforced. A major effort has also been invested into remodeling and optimizing operator tasks in all activities in Computing, in parallel with the recruitment of new Cat A operators. The teams are being completed and by mid year the new tasks will have been assigned. CRB (Computing Resource Board) The Board met twice since last CMS week. In December it reviewed the experience of the November data-taking period and could measure the positive improvements made for the site readiness. It also reviewed the policy under which Tier-2 are associated with Physics Groups. Such associations are decided twice per ye...

  19. COMPUTING

    CERN Multimedia

    M. Kasemann

    CCRC’08 challenges and CSA08 During the February campaign of the Common Computing readiness challenges (CCRC’08), the CMS computing team had achieved very good results. The link between the detector site and the Tier0 was tested by gradually increasing the number of parallel transfer streams well beyond the target. Tests covered the global robustness at the Tier0, processing a massive number of very large files and with a high writing speed to tapes.  Other tests covered the links between the different Tiers of the distributed infrastructure and the pre-staging and reprocessing capacity of the Tier1’s: response time, data transfer rate and success rate for Tape to Buffer staging of files kept exclusively on Tape were measured. In all cases, coordination with the sites was efficient and no serious problem was found. These successful preparations prepared the ground for the second phase of the CCRC’08 campaign, in May. The Computing Software and Analysis challen...

  20. COMPUTING

    CERN Multimedia

    I. Fisk

    2011-01-01

    Introduction It has been a very active quarter in Computing with interesting progress in all areas. The activity level at the computing facilities, driven by both organised processing from data operations and user analysis, has been steadily increasing. The large-scale production of simulated events that has been progressing throughout the fall is wrapping-up and reprocessing with pile-up will continue. A large reprocessing of all the proton-proton data has just been released and another will follow shortly. The number of analysis jobs by users each day, that was already hitting the computing model expectations at the time of ICHEP, is now 33% higher. We are expecting a busy holiday break to ensure samples are ready in time for the winter conferences. Heavy Ion The Tier 0 infrastructure was able to repack and promptly reconstruct heavy-ion collision data. Two copies were made of the data at CERN using a large CASTOR disk pool, and the core physics sample was replicated ...

  1. COMPUTING

    CERN Multimedia

    M. Kasemann

    Introduction During the past six months, Computing participated in the STEP09 exercise, had a major involvement in the October exercise and has been working with CMS sites on improving open issues relevant for data taking. At the same time operations for MC production, real data reconstruction and re-reconstructions and data transfers at large scales were performed. STEP09 was successfully conducted in June as a joint exercise with ATLAS and the other experiments. It gave good indication about the readiness of the WLCG infrastructure with the two major LHC experiments stressing the reading, writing and processing of physics data. The October Exercise, in contrast, was conducted as an all-CMS exercise, where Physics, Computing and Offline worked on a common plan to exercise all steps to efficiently access and analyze data. As one of the major results, the CMS Tier-2s demonstrated to be fully capable for performing data analysis. In recent weeks, efforts were devoted to CMS Computing readiness. All th...

  2. COMPUTING

    CERN Multimedia

    I. Fisk

    2012-01-01

    Introduction Computing continued with a high level of activity over the winter in preparation for conferences and the start of the 2012 run. 2012 brings new challenges with a new energy, more complex events, and the need to make the best use of the available time before the Long Shutdown. We expect to be resource constrained on all tiers of the computing system in 2012 and are working to ensure the high-priority goals of CMS are not impacted. Heavy ions After a successful 2011 heavy-ion run, the programme is moving to analysis. During the run, the CAF resources were well used for prompt analysis. Since then in 2012 on average 200 job slots have been used continuously at Vanderbilt for analysis workflows. Operations Office As of 2012, the Computing Project emphasis has moved from commissioning to operation of the various systems. This is reflected in the new organisation structure where the Facilities and Data Operations tasks have been merged into a common Operations Office, which now covers everything ...

  3. COMPUTING

    CERN Multimedia

    P. McBride

    It has been a very active year for the computing project with strong contributions from members of the global community. The project has focused on site preparation and Monte Carlo production. The operations group has begun processing data from P5 as part of the global data commissioning. Improvements in transfer rates and site availability have been seen as computing sites across the globe prepare for large scale production and analysis as part of CSA07. Preparations for the upcoming Computing Software and Analysis Challenge CSA07 are progressing. Ian Fisk and Neil Geddes have been appointed as coordinators for the challenge. CSA07 will include production tests of the Tier-0 production system, reprocessing at the Tier-1 sites and Monte Carlo production at the Tier-2 sites. At the same time there will be a large analysis exercise at the Tier-2 centres. Pre-production simulation of the Monte Carlo events for the challenge is beginning. Scale tests of the Tier-0 will begin in mid-July and the challenge it...

  4. COMPUTING

    CERN Multimedia

    M. Kasemann

    Introduction More than seventy CMS collaborators attended the Computing and Offline Workshop in San Diego, California, April 20-24th to discuss the state of readiness of software and computing for collisions. Focus and priority were given to preparations for data taking and providing room for ample dialog between groups involved in Commissioning, Data Operations, Analysis and MC Production. Throughout the workshop, aspects of software, operating procedures and issues addressing all parts of the computing model were discussed. Plans for the CMS participation in STEP’09, the combined scale testing for all four experiments due in June 2009, were refined. The article in CMS Times by Frank Wuerthwein gave a good recap of the highly collaborative atmosphere of the workshop. Many thanks to UCSD and to the organizers for taking care of this workshop, which resulted in a long list of action items and was definitely a success. A considerable amount of effort and care is invested in the estimate of the co...

  5. A Fourth Generation Distance Education System: Integrating Computer-Assisted Learning and Computer Conferencing.

    Science.gov (United States)

    Lauzon, Allan C.; Moore, George A. B.

    1989-01-01

    Reviews the literature on Keller's Personalized System of Instruction (PSI), computer-assisted learning (CAL), computer conferencing (CC), and forms of instruction, then discusses how they can be integrated into a delivery system to enhance distance learning. Asynchronous individualized instruction and group instruction are also discussed. (28…

  6. STRUCTURAL RELIABILITY OF TRACTION INVERTER FOR MULTI-SYSTEM ELECTRIC LOCOMOTIVE WITH ASYNCHRONOUS TRACTION MOTORS

    Directory of Open Access Journals (Sweden)

    A. M. Muha

    2009-04-01

    Full Text Available In the article the structural reliability of different variants of structured schemes of the steady-state converter for traction drive of promising multi-system electric locomotives with asynchronous traction engines is compared.

  7. Asynchronous Free-Space Optical CDMA Communications System for Last-mile Access Network

    DEFF Research Database (Denmark)

    Jurado-Navas, Antonio; Raddo, Thiago R.; Sanches, Anderson L.;

    2016-01-01

    We propose a new hybrid asynchronous OCDMA-FSO communications system for access network solutions. New ABER expressions are derived under gamma-gamma scintillation channels, where all users can surprisingly achieve error-free transmissions when FEC is employed....

  8. Calculation of mechanical characteristic for disk asynchronous motor with free rotor

    OpenAIRE

    Ерошин, Сергей Сергеевич; Мирошник, Сергей Александрович

    2012-01-01

    Taking into account the features of construction of asynchronous motor with free annular rotor analytical formulas for the calculation of its mechanical characteristic have been obtained. New features of machines with annular working tools without mechanical support are revealed

  9. Asynchronous abdomino-parasacral resection of a giant pelvic lipoma protruding to the left buttock

    Directory of Open Access Journals (Sweden)

    Masanori Sato

    2014-01-01

    CONCLUSION: The asynchronous abdomino-parasacral approach with several turnings of the patient's body and plastic bag packing of the tumor were advantageous to manage en bloc resection of the giant pelvic lipoma presented in this case study.

  10. A reverse mode of three-phase asynchronous motors with hexaphase windings

    OpenAIRE

    V.D. Lushchyk; S.Yu. Polezin

    2014-01-01

    A reverse operation feasibility in three-phase asynchronous motors with the stator hexaphase windings is proved. In the reverse mode, the hexaphase windings are shown to keep all their declared advantages.

  11. Asynchronous Sensor fuSion for Improved Safety of air Traffic (ASSIST) Project

    Data.gov (United States)

    National Aeronautics and Space Administration — SSCI proposes to develop, implement and test a collision detection system for unmanned aerial vehicles (UAV), referred to as the Asynchronous Sensor fuSion for...

  12. Speed estimation of vector controlled squirrel cage asynchronous motor with artificial neural networks

    International Nuclear Information System (INIS)

    In this paper, the artificial neural networks as a sensorless speed estimator in indirect vector controlled squirrel cage asynchronous motor control are defined. High dynamic performance power semi conductors obtainable from direct current motors can also be obtained from asynchronous motor through developments in digital signal processors (DSP) and control techniques. With using of field diverting control in asynchronous motors, the flux and moment can be controlled independently. The process of estimating the speed information required in control of vector controlled asynchronous motor without sensors has been obtained with artificial neural networks (ANN) in this study. By examining the data obtained from the experimental study concluded on the DSP application circuit, the validity and high performance of the ANN speed estimator on real-time speed estimation has been demonstrated.

  13. Low-power Implementation of an Encryption/Decryption System with Asynchronous Techniques

    Directory of Open Access Journals (Sweden)

    Nikos Sklavos

    2002-01-01

    Full Text Available An asynchronous VLSI implementation of the International Data Encryption Algorithm (IDEA is presented in this paper. In order to evaluate the asynchronous design a synchronous version of the algorithm was also designed. VHDL hardware description language was used in order to describe the algorithm. By using Synopsys commercial available tools the VHDL code was synthesized. After placing and routing both designs were fabricated with 0.6 μm CMOS technology. With a system clock of up to 8 MHz and a power supply of 5 V the two chips were tested and evaluated comparing with the software implementation of the IDEA algorithm. This new approach proves efficiently the lowest power consumption of the asynchronous implementation compared to the existing synchronous. Therefore, the asynchronous chip performs efficiently in Wireless Encryption Protocols and high speed networks.

  14. Behavioral Synthesis of Asynchronous Circuits Using Syntax Directed Translation as Backend

    DEFF Research Database (Denmark)

    Nielsen, Sune Fallgaard; Sparsø, Jens; Madsen, Jan

    2009-01-01

    of syntax directed translation, and which allows the designer to perform automatic design space exploration guided by area or speed constraints. The paper presents an asynchronous implementation template consisting of a data-path and a control unit and its implementation using the asynchronous hardware...... description language Balsa [1]. This ”conventional” template architecture allows us to adapt traditional synchronous synthesis techniques for resource sharing, scheduling, binding etc, to the domain of asynchronous circuits. A prototype tool has been implemented on top of the Balsa framework, and the method...... is illustrated through the implementation of a set of example circuits. The main contributions of the paper are: the fundamental idea, the template architecture and its implementation using asynchronous handshake components, and the implementation of a prototype tool....

  15. A reverse mode of three-phase asynchronous motors with hexaphase windings

    Directory of Open Access Journals (Sweden)

    V.D. Lushchyk

    2014-04-01

    Full Text Available A reverse operation feasibility in three-phase asynchronous motors with the stator hexaphase windings is proved. In the reverse mode, the hexaphase windings are shown to keep all their declared advantages.

  16. Representation of Musical Computer Processes

    OpenAIRE

    Fober, Dominique; Orlarey, Yann; Letz, Stéphane

    2014-01-01

    International audience The paper presents a study about the representation of musical computer processes within a music score. The idea is to provide performers with information that could be useful especially in the context of interactive music. The paper starts with a characterization of a musical computer process in order to define the values to be represented. Next it proposes an approach to time representation suitable to asynchronous processes representation.

  17. COMPUTING

    CERN Multimedia

    P. MacBride

    The Computing Software and Analysis Challenge CSA07 has been the main focus of the Computing Project for the past few months. Activities began over the summer with the preparation of the Monte Carlo data sets for the challenge and tests of the new production system at the Tier-0 at CERN. The pre-challenge Monte Carlo production was done in several steps: physics generation, detector simulation, digitization, conversion to RAW format and the samples were run through the High Level Trigger (HLT). The data was then merged into three "Soups": Chowder (ALPGEN), Stew (Filtered Pythia) and Gumbo (Pythia). The challenge officially started when the first Chowder events were reconstructed on the Tier-0 on October 3rd. The data operations teams were very busy during the the challenge period. The MC production teams continued with signal production and processing while the Tier-0 and Tier-1 teams worked on splitting the Soups into Primary Data Sets (PDS), reconstruction and skimming. The storage sys...

  18. COMPUTING

    CERN Multimedia

    Matthias Kasemann

    Overview The main focus during the summer was to handle data coming from the detector and to perform Monte Carlo production. The lessons learned during the CCRC and CSA08 challenges in May were addressed by dedicated PADA campaigns lead by the Integration team. Big improvements were achieved in the stability and reliability of the CMS Tier1 and Tier2 centres by regular and systematic follow-up of faults and errors with the help of the Savannah bug tracking system. In preparation for data taking the roles of a Computing Run Coordinator and regular computing shifts monitoring the services and infrastructure as well as interfacing to the data operations tasks are being defined. The shift plan until the end of 2008 is being put together. User support worked on documentation and organized several training sessions. The ECoM task force delivered the report on “Use Cases for Start-up of pp Data-Taking” with recommendations and a set of tests to be performed for trigger rates much higher than the ...

  19. COMPUTING

    CERN Multimedia

    M. Kasemann

    Introduction A large fraction of the effort was focused during the last period into the preparation and monitoring of the February tests of Common VO Computing Readiness Challenge 08. CCRC08 is being run by the WLCG collaboration in two phases, between the centres and all experiments. The February test is dedicated to functionality tests, while the May challenge will consist of running at all centres and with full workflows. For this first period, a number of functionality checks of the computing power, data repositories and archives as well as network links are planned. This will help assess the reliability of the systems under a variety of loads, and identifying possible bottlenecks. Many tests are scheduled together with other VOs, allowing the full scale stress test. The data rates (writing, accessing and transfer¬ring) are being checked under a variety of loads and operating conditions, as well as the reliability and transfer rates of the links between Tier-0 and Tier-1s. In addition, the capa...

  20. COMPUTING

    CERN Multimedia

    Contributions from I. Fisk

    2012-01-01

    Introduction The start of the 2012 run has been busy for Computing. We have reconstructed, archived, and served a larger sample of new data than in 2011, and we are in the process of producing an even larger new sample of simulations at 8 TeV. The running conditions and system performance are largely what was anticipated in the plan, thanks to the hard work and preparation of many people. Heavy ions Heavy Ions has been actively analysing data and preparing for conferences.  Operations Office Figure 6: Transfers from all sites in the last 90 days For ICHEP and the Upgrade efforts, we needed to produce and process record amounts of MC samples while supporting the very successful data-taking. This was a large burden, especially on the team members. Nevertheless the last three months were very successful and the total output was phenomenal, thanks to our dedicated site admins who keep the sites operational and the computing project members who spend countless hours nursing the...

  1. COMPUTING

    CERN Multimedia

    I. Fisk

    2012-01-01

      Introduction Computing activity has been running at a sustained, high rate as we collect data at high luminosity, process simulation, and begin to process the parked data. The system is functional, though a number of improvements are planned during LS1. Many of the changes will impact users, we hope only in positive ways. We are trying to improve the distributed analysis tools as well as the ability to access more data samples more transparently.  Operations Office Figure 2: Number of events per month, for 2012 Since the June CMS Week, Computing Operations teams successfully completed data re-reconstruction passes and finished the CMSSW_53X MC campaign with over three billion events available in AOD format. Recorded data was successfully processed in parallel, exceeding 1.2 billion raw physics events per month for the first time in October 2012 due to the increase in data-parking rate. In parallel, large efforts were dedicated to WMAgent development and integrati...

  2. COMPUTING

    CERN Multimedia

    I. Fisk

    2013-01-01

    Computing operation has been lower as the Run 1 samples are completing and smaller samples for upgrades and preparations are ramping up. Much of the computing activity is focusing on preparations for Run 2 and improvements in data access and flexibility of using resources. Operations Office Data processing was slow in the second half of 2013 with only the legacy re-reconstruction pass of 2011 data being processed at the sites.   Figure 1: MC production and processing was more in demand with a peak of over 750 Million GEN-SIM events in a single month.   Figure 2: The transfer system worked reliably and efficiently and transferred on average close to 520 TB per week with peaks at close to 1.2 PB.   Figure 3: The volume of data moved between CMS sites in the last six months   The tape utilisation was a focus for the operation teams with frequent deletion campaigns from deprecated 7 TeV MC GEN-SIM samples to INVALID datasets, which could be cleaned up...

  3. COMPUTING

    CERN Multimedia

    2010-01-01

    Introduction Just two months after the “LHC First Physics” event of 30th March, the analysis of the O(200) million 7 TeV collision events in CMS accumulated during the first 60 days is well under way. The consistency of the CMS computing model has been confirmed during these first weeks of data taking. This model is based on a hierarchy of use-cases deployed between the different tiers and, in particular, the distribution of RECO data to T1s, who then serve data on request to T2s, along a topology known as “fat tree”. Indeed, during this period this model was further extended by almost full “mesh” commissioning, meaning that RECO data were shipped to T2s whenever possible, enabling additional physics analyses compared with the “fat tree” model. Computing activities at the CMS Analysis Facility (CAF) have been marked by a good time response for a load almost evenly shared between ALCA (Alignment and Calibration tasks - highest p...

  4. Violation of the equivalence principle for stressed bodies in asynchronous relativity

    Energy Technology Data Exchange (ETDEWEB)

    Andrade Martins, R. de (Centro de Logica, Epistemologia e Historia da Ciencia, Campinas (Brazil))

    1983-12-11

    In the recently developed asynchronous formulation of the relativistic theory of extended bodies, the inertial mass of a body does not explicitly depend on its pressure or stress. The detailed analysis of the weight of a box filled with a gas and placed in a weak gravitational field shows that this feature of asynchronous relativity implies a breakdown of the equivalence between inertial and passive gravitational mass for stressed systems.

  5. Linearity, Persistence and Testing Semantics in the Asynchronous Pi-Calculus

    OpenAIRE

    Cacciagrano, Diletta; Flavio CORRADINI; Aranda, Jesus; Valencia, Frank,

    2007-01-01

    In [CSVV06] the authors studied the expressiveness of persistence in the asynchronous pi calculus (Api) wrt weak barbed congruence. The study is incomplete because it ignores the issue of divergence. In this paper we present an expressiveness study of persistence in the asynchronous pi-calculus (Api) wrt DeNicola and Hennesy's testing scenario which is sensitive to divergence. We consider Api and theree sub-languages of it, each capturing one source of persistence: the persistent-input calcul...

  6. Synaptotagmin-7 Is an Asynchronous Calcium Sensor for Synaptic Transmission in Neurons Expressing SNAP-23

    DEFF Research Database (Denmark)

    Weber, Jens P; Toft-Bertelsen, Trine L; Mohrmann, Ralf;

    2014-01-01

    Synchronization of neurotransmitter release with the presynaptic action potential is essential for maintaining fidelity of information transfer in the central nervous system. However, synchronous release is frequently accompanied by an asynchronous release component that builds up during repetitive......-7 acts to synchronize release and suppress spontaneous release. However, compared to synaptotagmin-1, synaptotagmin-7 is a both leaky and asynchronous calcium sensor. In the presence of SNAP-25, consequences of the elimination of synaptotagmin-7 were small or absent, indicating that the protein...

  7. Strict optical orthogonal codes for purely asynchronous code-division multiple-access applications.

    Science.gov (United States)

    Zhang, J G

    1996-12-10

    Strict optical orthogonal codes are presented for purely asynchronous optical code-division multiple-access (CDMA) applications. The proposed code can strictly guarantee the peaks of its cross-correlation functions and the sidelobes of any of its autocorrelation functions to have a value of 1 in purely asynchronous data communications. The basic theory of the proposed codes is given. An experiment on optical CDMA systems is also demonstrated to verify the characteristics of the proposed code. PMID:21151299

  8. Asynchronous growth and competition in a two-sex age-structured population model

    OpenAIRE

    Iannelli, Mimmo; Ripoll, Jordi

    2009-01-01

    Asynchronous exponential growth has been extensively studied in population dynamics. In this paper we find out the asymptotic behaviour in a non-linear age-dependent model which takes into account sexual reproduction interactions. The main feature of our model is that the non-linear process converges to a linear one as the solution becomes large, so that the population undergoes asynchronous growth. The steady states analysis and the corresponding stability analysis are completely made and ...

  9. Simulation of the Double-closed Loop Three-phase Asynchronous Variable Voltage Control System

    OpenAIRE

    Shuhua Jiang

    2011-01-01

    When controlling the voltage and speed of the asynchronous motor, to expand the speed control range and reduce the speed fluctuation, the speed control system adopts two feedback control loops, i.e. the speed feedback control loop and the current feedback control loop. The principle and components of the double-closed loop three-phase asynchronous variable voltage control system are studied, and the simulation model and the test result based on MATLAB/Simulink are provided in this article thr...

  10. Document Flow Model: A Formal Notation for Modelling Asynchronous Web Services Composition

    OpenAIRE

    Yang, Jingtao; Cirstea, Corina; Henderson, Peter

    2005-01-01

    This paper presents a formal notation for modelling asynchronous web services composition, using context and coordination mechanisms. Our notation specifies the messages that can be handled by different web services, and describes a system of inter-related web services as the flow of documents between them. The notation allows the typical web services composition pattern, asynchronous messaging, and has the capability to deal with long-running service-to-service interactions and dynamic confi...

  11. Blind Synchronization in Asynchronous UWB Networks Based on the Transmit-Reference Scheme

    Directory of Open Access Journals (Sweden)

    Leus Geert

    2006-01-01

    Full Text Available Ultra-wideband (UWB wireless communication systems are based on the transmission of extremely narrow pulses, with a duration inferior to a nanosecond. The application of transmit reference (TR to UWB systems allows to side-step channel estimation at the receiver, with a tradeoff of the effective transmission bandwidth, which is reduced by the usage of a reference pulse. Similar to CDMA systems, different users can share the same available bandwidth by means of different spreading codes. This allows the receiver to separate users, and to recover the timing information of the transmitted data packets. The nature of UWB transmissions—short, burst-like packets—requires a fast synchronization algorithm, that can accommodate several asynchronous users. Exploiting the fact that a shift in time corresponds to a phase rotation in the frequency domain, a blind and computationally effcient synchronization algorithm that takes advantage of the shift invariance structure in the frequency domain is proposed in this paper. Integer and fractional delay estimations are considered, along with a subsequent symbol estimation step. This results in a collision-avoiding multiuser algorithm, readily applicable to a fast acquisition procedure in a UWB ad hoc network.

  12. Differentiating closed-loop cortical intention from rest: building an asynchronous electrocorticographic BCI

    Science.gov (United States)

    Williams, Jordan J.; Rouse, Adam G.; Thongpang, Sanitta; Williams, Justin C.; Moran, Daniel W.

    2013-08-01

    Objective. Recent experiments have shown that electrocorticography (ECoG) can provide robust control signals for a brain-computer interface (BCI). Strategies that attempt to adapt a BCI control algorithm by learning from past trials often assume that the subject is attending to each training trial. Likewise, automatic disabling of movement control would be desirable during resting periods when random brain fluctuations might cause unintended movements of a device. To this end, our goal was to identify ECoG differences that arise between periods of active BCI use and rest. Approach. We examined spectral differences in multi-channel, epidural micro-ECoG signals recorded from non-human primates when rest periods were interleaved between blocks of an active BCI control task. Main Results. Post-hoc analyses demonstrated that these states can be decoded accurately on both a trial-by-trial and real-time basis, and this discriminability remains robust over a period of weeks. In addition, high gamma frequencies showed greater modulation with desired movement direction, while lower frequency components demonstrated greater amplitude differences between task and rest periods, suggesting possible specialized BCI roles for these frequencies. Significance. The results presented here provide valuable insight into the neurophysiology of BCI control as well as important considerations toward the design of an asynchronous BCI system.

  13. An Asynchronous Many-Task Implementation of In-Situ Statistical Analysis using Legion.

    Energy Technology Data Exchange (ETDEWEB)

    Pebay, Philippe Pierre [Sandia National Lab. (SNL-CA), Livermore, CA (United States); Bennett, Janine Camille [Sandia National Lab. (SNL-CA), Livermore, CA (United States)

    2015-11-01

    In this report, we propose a framework for the design and implementation of in-situ analy- ses using an asynchronous many-task (AMT) model, using the Legion programming model together with the MiniAero mini-application as a surrogate for full-scale parallel scientific computing applications. The bulk of this work consists of converting the Learn/Derive/Assess model which we had initially developed for parallel statistical analysis using MPI [PTBM11], from a SPMD to an AMT model. In this goal, we propose an original use of the concept of Legion logical regions as a replacement for the parallel communication schemes used for the only operation of the statistics engines that require explicit communication. We then evaluate this proposed scheme in a shared memory environment, using the Legion port of MiniAero as a proxy for a full-scale scientific application, as a means to provide input data sets of variable size for the in-situ statistical analyses in an AMT context. We demonstrate in particular that the approach has merit, and warrants further investigation, in collaboration with ongoing efforts to improve the overall parallel performance of the Legion system.

  14. Conceptualising and measuring collaborative critical thinking on asynchronous discussion forums: Challenges and possible solutions

    Directory of Open Access Journals (Sweden)

    Nazanin Ghodrati

    2015-04-01

    Full Text Available The use of asynchronous discussion forums (ADFs is thought to assist in enhancing students’ collaborative learning and critical thinking throughout higher education. However, previous research has mainly focused on individual critical thinking while the investigation of critical thinking during group work has been generally overlooked. Furthermore, few studies have investigated critical thinking processes of the individual and of the group in a single study to present a comprehensive picture of collaborative critical thinking (CCT. To address these gaps, I examined the demonstration of CCT on ADFs in a graduate subject at an Australian university over two academic semesters as students discussed topics online. In this paper, I discuss the ontological and methodological challenges in conducting the above research and present possible solutions to these challenges. At the ontological level, I discuss challenges in conceptualising and defining CCT. At the methodological level, I present challenges in constructing a coding scheme to measure the demonstration of CCT on ADFs. I then discuss ways to tackle the above challenges, propose an operational definition of CCT and present a synthetic coding scheme for measuring CCT in computer-supported collaborative learning contexts such as on ADFs.

  15. Simulating Quantitative Cellular Responses Using Asynchronous Threshold Boolean Network Ensembles

    Directory of Open Access Journals (Sweden)

    Shah Imran

    2011-07-01

    Full Text Available Abstract Background With increasing knowledge about the potential mechanisms underlying cellular functions, it is becoming feasible to predict the response of biological systems to genetic and environmental perturbations. Due to the lack of homogeneity in living tissues it is difficult to estimate the physiological effect of chemicals, including potential toxicity. Here we investigate a biologically motivated model for estimating tissue level responses by aggregating the behavior of a cell population. We assume that the molecular state of individual cells is independently governed by discrete non-deterministic signaling mechanisms. This results in noisy but highly reproducible aggregate level responses that are consistent with experimental data. Results We developed an asynchronous threshold Boolean network simulation algorithm to model signal transduction in a single cell, and then used an ensemble of these models to estimate the aggregate response across a cell population. Using published data, we derived a putative crosstalk network involving growth factors and cytokines - i.e., Epidermal Growth Factor, Insulin, Insulin like Growth Factor Type 1, and Tumor Necrosis Factor α - to describe early signaling events in cell proliferation signal transduction. Reproducibility of the modeling technique across ensembles of Boolean networks representing cell populations is investigated. Furthermore, we compare our simulation results to experimental observations of hepatocytes reported in the literature. Conclusion A systematic analysis of the results following differential stimulation of this model by growth factors and cytokines suggests that: (a using Boolean network ensembles with asynchronous updating provides biologically plausible noisy individual cellular responses with reproducible mean behavior for large cell populations, and (b with sufficient data our model can estimate the response to different concentrations of extracellular ligands. Our

  16. COMPUTING

    CERN Multimedia

    I. Fisk

    2011-01-01

    Introduction The Computing Team successfully completed the storage, initial processing, and distribution for analysis of proton-proton data in 2011. There are still a variety of activities ongoing to support winter conference activities and preparations for 2012. Heavy ions The heavy-ion run for 2011 started in early November and has already demonstrated good machine performance and success of some of the more advanced workflows planned for 2011. Data collection will continue until early December. Facilities and Infrastructure Operations Operational and deployment support for WMAgent and WorkQueue+Request Manager components, routinely used in production by Data Operations, are provided. The GlideInWMS and components installation are now deployed at CERN, which is added to the GlideInWMS factory placed in the US. There has been new operational collaboration between the CERN team and the UCSD GlideIn factory operators, covering each others time zones by monitoring/debugging pilot jobs sent from the facto...

  17. Adaptive Iterative Soft-Input Soft-Output Parallel Decision-Feedback Detectors for Asynchronous Coded DS-CDMA Systems

    Directory of Open Access Journals (Sweden)

    Zhang Wei

    2005-01-01

    Full Text Available The optimum and many suboptimum iterative soft-input soft-output (SISO multiuser detectors require a priori information about the multiuser system, such as the users' transmitted signature waveforms, relative delays, as well as the channel impulse response. In this paper, we employ adaptive algorithms in the SISO multiuser detector in order to avoid the need for this a priori information. First, we derive the optimum SISO parallel decision-feedback detector for asynchronous coded DS-CDMA systems. Then, we propose two adaptive versions of this SISO detector, which are based on the normalized least mean square (NLMS and recursive least squares (RLS algorithms. Our SISO adaptive detectors effectively exploit the a priori information of coded symbols, whose soft inputs are obtained from a bank of single-user decoders. Furthermore, we consider how to select practical finite feedforward and feedback filter lengths to obtain a good tradeoff between the performance and computational complexity of the receiver.

  18. COMPUTING

    CERN Multimedia

    M. Kasemann

    CMS relies on a well functioning, distributed computing infrastructure. The Site Availability Monitoring (SAM) and the Job Robot submission have been very instrumental for site commissioning in order to increase availability of more sites such that they are available to participate in CSA07 and are ready to be used for analysis. The commissioning process has been further developed, including "lessons learned" documentation via the CMS twiki. Recently the visualization, presentation and summarizing of SAM tests for sites has been redesigned, it is now developed by the central ARDA project of WLCG. Work to test the new gLite Workload Management System was performed; a 4 times increase in throughput with respect to LCG Resource Broker is observed. CMS has designed and launched a new-generation traffic load generator called "LoadTest" to commission and to keep exercised all data transfer routes in the CMS PhE-DEx topology. Since mid-February, a transfer volume of about 12 P...

  19. Enhancing ESL Learners Speaking Skills through Asynchronous Online Discussion Forum

    Directory of Open Access Journals (Sweden)

    Nadzrah Abu Bakar

    2013-05-01

    Full Text Available Communicating orally in a second or foreign language such as English can be a difficult task especially for the low proficiency learners as they may lack the confidence and feel shy and apprehensive when interacting verbally in the target language. This may hold them back from expressing themselves vocally though they are fully aware that in order to be fluent in the target language, they need to practise speaking not only in the classroom but also outside the classroom. This paper discusses the use of an asynchronous online discussion forum (AODF as a communication tool to assist the low proficiency ESL learners to build their confidence and practise using the target language orally. As an online discussion forum, the Multimedia Enhance Discussion Forum (MEDiF was specifically designed to be used by a selected group of low proficiency ESL learners at tertiary level for one academic semester. This online forum allows the learners to audio and video-record their discussions, listen to the recorded discussions and respond to their friends’ ideas and opinions. Interviews and observations of the discussions on the MEDiF were conducted to gather data. The findings generally indicate positive responses from the ESL learners although there were also some obstacles faced by them while utilizing the MEDiF.

  20. Asynchronous vehicle pose correction using visual detection of ground features

    Science.gov (United States)

    Harnarinesingh, Randy E. S.; Syan, Chanan S.

    2014-07-01

    The inherent noise associated with odometry manifests itself as errors in localization for autonomous vehicles. Visual odometry has been previously used in order to supplement classical vehicle odometry. However, visual odometry is limited in its ability to reduce errors in localization for large travel distances that entail the cumulative summing of individual frame-to-frame image errors. In this paper, a novel machine vision approach for tiled surfaces is proposed to address this problem. Tile edges in a laboratory environment are used to define a travel trajectory for the Quansar Qbot (autonomous vehicle) built on the iRobot iRoomba platform with a forward facing camera. Tile intersections are used to enable asynchronous error recovery for vehicle position and orientation. The proposed approach employs real-time image classification and is feasible for error mitigation for large travel distances. The average position error for an 8m travel distance using classical odometry was measured to be 0.28m. However, implementation of the proposed approach resulted in an error of 0.028m. The proposed approach therefore significantly reduces pose estimation error and could be used to supplement existing modalities such as GPS and Laser-based range sensors.

  1. Sparse asynchronous cortical generators can produce measurable scalp EEG signals.

    Science.gov (United States)

    von Ellenrieder, Nicolás; Dan, Jonathan; Frauscher, Birgit; Gotman, Jean

    2016-09-01

    We investigate to what degree the synchronous activation of a smooth patch of cortex is necessary for observing EEG scalp activity. We perform extensive simulations to compare the activity generated on the scalp by different models of cortical activation, based on intracranial EEG findings reported in the literature. The spatial activation is modeled as a cortical patch of constant activation or as random sets of small generators (0.1 to 3cm(2) each) concentrated in a cortical region. Temporal activation models for the generation of oscillatory activity are either equal phase or random phase across the cortical patches. The results show that smooth or random spatial activation profiles produce scalp electric potential distributions with the same shape. Also, in the generation of oscillatory activity, multiple cortical generators with random phase produce scalp activity attenuated on average only 2 to 4 times compared to generators with equal phase. Sparse asynchronous cortical generators can produce measurable scalp EEG. This is a possible explanation for seemingly paradoxical observations of simultaneous disorganized intracranial activity and scalp EEG signals. Thus, the standard interpretation of scalp EEG might constitute an oversimplification of the underlying brain activity. PMID:27262240

  2. Commande vectorielle d'un moteur asynchrone sans capteur

    Science.gov (United States)

    Ourth, T.

    1993-06-01

    A field-oriented control strategy for induction machines which does not use mechanical sensors is presented. The rotor flux is observed by a reduced-order Luenberger-type observer based on a model using a stator-fixed reference frame. An estimate of the rotation speed is derived from the flux vector, the measured stator currents and the field orientation angle. Simulations demonstrate that this control strategy performs well even in the presence of parameter variations up to ± 50% (resistances). Ce papier présente la commande par flux orienté d'une machine asynchrone sans capteur de vitesse ou de position. Le flux rotorique est évalué grâce à un observateur d'ordre réduit d'un type voisin de Luenberger travaillant dans un repère fixe statorique. L'estimation de la vitesse est obtenue à partir du module du flux rotorique, des courants statoriques mesurés et de l'angle d'orientation du flux rotorique. Cette étude basée sur des simulations démontre un comportement acceptable de la commande malgré la variation des paramètres comme les résistances de la machine.

  3. Obstacle avoidance in social groups: new insights from asynchronous models.

    Science.gov (United States)

    Croft, Simon; Budgey, Richard; Pitchford, Jonathan W; Wood, A Jamie

    2015-05-01

    For moving animals, the successful avoidance of hazardous obstacles is an important capability. Despite this, few models of collective motion have addressed the relationship between behavioural and social features and obstacle avoidance. We develop an asynchronous individual-based model for social movement which allows social structure within groups to be included. We assess the dynamics of group navigation and resulting collision risk in the context of information transfer through the system. In agreement with previous work, we find that group size has a nonlinear effect on collision risk. We implement examples of possible network structures to explore the impact social preferences have on collision risk. We show that any social heterogeneity induces greater obstacle avoidance with further improvements corresponding to groups containing fewer influential individuals. The model provides a platform for both further theoretical investigation and practical application. In particular, we argue that the role of social structures within bird flocks may have an important role to play in assessing the risk of collisions with wind turbines, but that new methods of data analysis are needed to identify these social structures. PMID:25833245

  4. Progresses in the Analysis of Stochastic 2D Cellular Automata: a Study of Asynchronous 2D Minority

    CERN Document Server

    Regnault, Damien; Thierry, Éric

    2007-01-01

    Cellular automata are often used to model systems in physics, social sciences, biology that are inherently asynchronous. Over the past 20 years, studies have demonstrated that the behavior of cellular automata drastically changed under asynchronous updates. Still, the few mathematical analyses of asynchronism focus on one-dimensional probabilistic cellular automata, either on single examples or on specific classes. As for other classic dynamical systems in physics, extending known methods from one- to two-dimensional systems is a long lasting challenging problem. In this paper, we address the problem of analysing an apparently simple 2D asynchronous cellular automaton: 2D Minority where each cell, when fired, updates to the minority state of its neighborhood. Our experiments reveal that in spite of its simplicity, the minority rule exhibits a quite complex response to asynchronism. By focusing on the fully asynchronous regime, we are however able to describe completely the asymptotic behavior of this dynamics...

  5. Blind Turing-Machines: Arbitrary Private Computations from Group Homomorphic Encryption

    Directory of Open Access Journals (Sweden)

    Stefan Rass

    2013-12-01

    Full Text Available Secure function evaluation (SFE is the process of computing a function (or running an algorithm on some data, while keeping the input, output and intermediate results hidden from the environment in which the function is evaluated. This can be done using fully homomorphic encryption, Yao's garbled circuits or secure multiparty computation. Applications are manifold, most prominently the outsourcing of computations to cloud service providers, where data is to be manipulated and processed in full confidentiality. Today, one of the most intensively studied solutions to SFE is fully homomorphic encryption (FHE. Ever since the first such systems have been discovered in 2009, and despite much progress, FHE still remains inefficient and difficult to implement practically. Similar concerns apply to garbled circuits and (generic multiparty computation protocols. In this work, we introduce the concept of a blind Turing-machine, which uses simple homomorphic encryption (an extension of ElGamal encryption to process ciphertexts in the way as standard Turing-machines do, thus achieving computability of any function in total privacy. Remarkably, this shows that fully homomorphic encryption is indeed an overly strong primitive to do SFE, as group homomorphic encryption with equality check is already sufficient. Moreover, the technique is easy to implement and perhaps opens the door to efficient private computations on nowadays computing machinery, requiring only simple changes to well-established computer architectures.

  6. Secure Two-Party Computational Geometry

    Institute of Scientific and Technical Information of China (English)

    Shun-Dong Li; Yi-Qi Dai

    2005-01-01

    Secure Multi-party Computation has been a research focus in international cryptographic community in recent years. In this paper the authors investigate how some computational geometric problems could be solved in a cooperative environment, where two parties need to solve a geometric problem based on their joint data, but neither wants to disclose its private data to the other party. These problems are the distance between two private points, the relation between a private point and a circle area, the relation between a private point and an ellipse area and the shortest distance between two point sets. The paper gives solutions to these specific geometric problems, and in doing so a building block is developed,the protocol for the distance between two private points, that is also useful in the solutions to other geometric problems and combinatorial problems.

  7. Privacy-Preserving Protocols for Eigenvector Computation

    CERN Document Server

    Pathak, Manas A

    2010-01-01

    In this paper, we present a protocol for computing the dominant eigenvector of a collection of private data distributed across multiple parties, with the individual parties unwilling to share their data. Our proposed protocol is based on secure multiparty computation with a trusted third-party arbitrator who deals with data encrypted by the other parties using an additive homomorphic cryptosystem. We also augment the protocol with randomization to make it difficult, with a high probability, for any party to estimate properties of the data belonging to other parties from the intermediate steps. The previous approaches towards this problem were based on expensive QR decomposition of correlation matrices, we present an efficient algorithm using the power iteration method. We present an analysis of the correctness, security, efficiency of protocol and experiments over a prototype implementation.

  8. Commande optimale à flux libre des machines asynchrones

    Science.gov (United States)

    Biedinger, J. M.; Poullain, S.; Yvon, J. P.

    1992-01-01

    The subject of this paper is the optimal control with unconstrained flux of an induction motor being considered as a distributed parameter system described by a nonlinear diffusion equation. This approach allows to describe the electrodynamic state of the motor by taking into account, in a natural way, the influence of saturation and eddy-currents, as well as the nonlinearities due to the variable flux operation. Equations are approximated via a finite element formulation which leads to a finite dimensional dynamical system to which the techniques of optimal control may be applied. The generality of the methodology allows to treat various criteria. The objective aimed in this paper is to force the motor torque to follow a given input, especially under initially demagnetized conditions and with, naturally, constraints on the currents. For this purpose the criterion will be chosen as a norm of the difference between the electromagnetic torque and a given reference torque. Numerical simulations are presented for the case of a squirrel-cage rotor and for a solid iron rotor. Results are compared with those deduced from strategies based on lumped-parameter models. Torque responses obtained with field-oriented control method adapted to the case of flux-variable operation are also presented. Finally a modification of the criterion is proposed for identifying the command which allows to obtain the larger torque during transient states. Dans cet article on traite le problème du contrôle optimal à flux libre d'un moteur asynchrone considéré comme un système à paramètres répartis gouverné par une équation de diffusion non linéaire. Cette approche permet de décrire l'état électrodynamique de la machine en prenant naturellement en compte les effets de la saturation et des courants induits, ainsi que les non-linéarités liées au fonctionnement à flux variable. La formulation éléments finis est utilisée pour traduire le problème continu sous la forme d

  9. The Use of Efficient Broadcast Protocols in Asynchronous Distributed Systems. Ph.D. Thesis

    Science.gov (United States)

    Schmuck, Frank Bernhard

    1988-01-01

    Reliable broadcast protocols are important tools in distributed and fault-tolerant programming. They are useful for sharing information and for maintaining replicated data in a distributed system. However, a wide range of such protocols has been proposed. These protocols differ in their fault tolerance and delivery ordering characteristics. There is a tradeoff between the cost of a broadcast protocol and how much ordering it provides. It is, therefore, desirable to employ protocols that support only a low degree of ordering whenever possible. This dissertation presents techniques for deciding how strongly ordered a protocol is necessary to solve a given application problem. It is shown that there are two distinct classes of application problems: problems that can be solved with efficient, asynchronous protocols, and problems that require global ordering. The concept of a linearization function that maps partially ordered sets of events to totally ordered histories is introduced. How to construct an asynchronous implementation that solves a given problem if a linearization function for it can be found is shown. It is proved that in general the question of whether a problem has an asynchronous solution is undecidable. Hence there exists no general algorithm that would automatically construct a suitable linearization function for a given problem. Therefore, an important subclass of problems that have certain commutativity properties are considered. Techniques for constructing asynchronous implementations for this class are presented. These techniques are useful for constructing efficient asynchronous implementations for a broad range of practical problems.

  10. A Rewriting Approach to Replace Asynchronous ROMs with Synchronous Ones for the Circuits with Cycles

    Directory of Open Access Journals (Sweden)

    Yasuaki Ito

    2012-07-01

    Full Text Available

    Field Programmable Gate Arrays (FPGAs are a dominant implementation medium for digital circuits which are used  to embed a circuit designed by users instantly. FPGAs can be used for implementing parallel and hardware algorithms. Circuit design that minimizes the number of clock cycles is easy if we use asynchronous read operations. However, most of FPGAs support synchronous read operations, but do not support asynchronous read operations. The main contribution of this paper is to provide one of the potent approaches to resolve this problem. We assume that a circuit using asynchronous ROMs is given. In our previous work, we have presented a circuit rewriting algorithm to convert a circuit with asynchronous ROMs into an equivalent circuit with synchronous ones. The resulting circuit with synchronous ROMs can be embedded into FPGAs. However, this circuit rewriting algorithm can handle circuits represented by a directed acyclic graph and does not work for those with cycles. In this paper, we succeeded in relaxing the cycle-free condition of circuits. More specifically, we present an algorithm that automatically converts a circuit with cycles using asynchronous ROMs into an equivalent circuit using synchronous ROMs.

  11. Improving Learning of Programming Through E-Learning by Using Asynchronous Virtual Pair Programming

    Directory of Open Access Journals (Sweden)

    Sufian IDRIS

    2006-07-01

    Full Text Available The problem of learning programming subjects, especially through distance learning and E-Learning, has been widely reported in literatures. Many attempts have been made to solve these problems. This has led to many new approaches in the techniques of learning of programming. One of the approaches that have been proposed is the use of virtual pair programming (VPP. Most of the studies about VPP in distance learning or e-learning environment focus on the use of the synchronous mode of collaboration between learners. Not much research have been done about asynchronous VPP. This paper describes how we have implemented VPP and a research that has been carried out to study the effectiveness of asynchronous VPP for learning of programming. In particular, this research study the effectiveness of asynchronous VPP in the learning of object-oriented programming among students at Open University Malaysia (OUM. The result of the research has shown that most of the learners have given positive feedback, indicating that they are happy with the use of asynchronous VPP. At the same time, learners did recommend some extra features that could be added in making asynchronous VPP more enjoyable.

  12. On Modeling Large-Scale Multi-Agent Systems with Parallel, Sequential and Genuinely Asynchronous Cellular Automata

    International Nuclear Information System (INIS)

    We study certain types of Cellular Automata (CA) viewed as an abstraction of large-scale Multi-Agent Systems (MAS). We argue that the classical CA model needs to be modified in several important respects, in order to become a relevant and sufficiently general model for the large-scale MAS, and so that thus generalized model can capture many important MAS properties at the level of agent ensembles and their long-term collective behavior patterns. We specifically focus on the issue of inter-agent communication in CA, and propose sequential cellular automata (SCA) as the first step, and genuinely Asynchronous Cellular Automata (ACA) as the ultimate deterministic CA-based abstract models for large-scale MAS made of simple reactive agents. We first formulate deterministic and nondeterministic versions of sequential CA, and then summarize some interesting configuration space properties (i.e., possible behaviors) of a restricted class of sequential CA. In particular, we compare and contrast those properties of sequential CA with the corresponding properties of the classical (that is, parallel and perfectly synchronous) CA with the same restricted class of update rules. We analytically demonstrate failure of the studied sequential CA models to simulate all possible behaviors of perfectly synchronous parallel CA, even for a very restricted class of non-linear totalistic node update rules. The lesson learned is that the interleaving semantics of concurrency, when applied to sequential CA, is not refined enough to adequately capture the perfect synchrony of parallel CA updates. Last but not least, we outline what would be an appropriate CA-like abstraction for large-scale distributed computing insofar as the inter-agent communication model is concerned, and in that context we propose genuinely asynchronous CA. (author)

  13. Scalability of Asynchronous Networks Is Limited by One-to-One Mapping between Effective Connectivity and Correlations.

    Directory of Open Access Journals (Sweden)

    Sacha Jennifer van Albada

    2015-09-01

    Full Text Available Network models are routinely downscaled compared to nature in terms of numbers of nodes or edges because of a lack of computational resources, often without explicit mention of the limitations this entails. While reliable methods have long existed to adjust parameters such that the first-order statistics of network dynamics are conserved, here we show that limitations already arise if also second-order statistics are to be maintained. The temporal structure of pairwise averaged correlations in the activity of recurrent networks is determined by the effective population-level connectivity. We first show that in general the converse is also true and explicitly mention degenerate cases when this one-to-one relationship does not hold. The one-to-one correspondence between effective connectivity and the temporal structure of pairwise averaged correlations implies that network scalings should preserve the effective connectivity if pairwise averaged correlations are to be held constant. Changes in effective connectivity can even push a network from a linearly stable to an unstable, oscillatory regime and vice versa. On this basis, we derive conditions for the preservation of both mean population-averaged activities and pairwise averaged correlations under a change in numbers of neurons or synapses in the asynchronous regime typical of cortical networks. We find that mean activities and correlation structure can be maintained by an appropriate scaling of the synaptic weights, but only over a range of numbers of synapses that is limited by the variance of external inputs to the network. Our results therefore show that the reducibility of asynchronous networks is fundamentally limited.

  14. POLITICAL PLURALISM AND MULTIPARTY

    Directory of Open Access Journals (Sweden)

    Erhard NICULESCU

    2014-06-01

    Full Text Available Political parties have made themselves noticed in history by competing for power and over time they have emerged as undeniable and indispensable realities in a political system regardless of its form. The Constitution of Romania recognised the role and historical importance of pluralism and political parties and dedicated them a place of honour in the general principles that establish our state as a democratic and social state of law. This article analyses the constitutional provisions on political parties, depicting the evolution of statutory regulations thereon over more than 100 years, during various political regimes. Last but not least, it also analyses concepts and points of view of the doctrine with respect to the subject matter, while also making references to the relevant constitutional jurisprudence. Finally, as a result of the analysis conducted, we will reveal any weaknesses of the legislation and we will make our conclusions.

  15. POLITICAL PLURALISM AND MULTIPARTY

    Directory of Open Access Journals (Sweden)

    Erhard NICULESCU

    2014-05-01

    Full Text Available Political parties have made themselves noticed in history by competing for power and over time they have emerged as undeniable and indispensable realities in a political system regardless of its form. The Constitution of Romania recognised the role and historical importance of pluralism and political parties and dedicated them a place of honour in the general principles that establish our state as a democratic and social state of law. This article analyses the constitutional provisions on political parties, depicting the evolution of statutory regulations thereon over more than 100 years, during various political regimes. Last but not least, it also analyses concepts and points of view of the doctrine with respect to the subject matter, while also making references to the relevant constitutional jurisprudence. Finally, as a result of the analysis conducted, we will reveal any weaknesses of the legislation and we will make our conclusions.

  16. On the Outage Behavior of Asynchronous OFDM DF and AF Cooperative Networks

    CERN Document Server

    Torbatian, Mehdi

    2009-01-01

    The outage behavior of various relaying protocols over a general one hop asynchronous cooperative network is examined when orthogonal frequency division multiplexing (OFDM) is used to combat synchronization error among the relays. We consider non-orthogonal selection decode-and-forward (NSDF), orthogonal selection decode-and-forward (OSDF), non-orthogonal amplify-and-forward (NAF), and orthogonal amplify-and-forward (OAF) relaying protocols and analyze the diversity multiplexing gain tradeoff (DMT) in all scenarios. The transmitting nodes cooperatively construct an asynchronous OFDM space-time code by re-sending the source messages over a common time interval and a common frequency bandwidth. It is shown that in decode-and-forward (DF) type protocols, the asynchronous network provides a diversity gain greater than or equal to the one of the corresponding synchronous network in the limit of code word length and throughout the range of multiplexing gain. In amplify-and-forward (AF) type protocols, in which the ...

  17. The design of an asynchronous Tiny RISC TM/TR4101 microprocessor core

    DEFF Research Database (Denmark)

    Christensen, Kåre Tais; Jensen, P.; Korger, P.;

    1998-01-01

    This paper presents the design of an asynchronous version of the TR4101 embedded microprocessor core developed by LSI Logic Inc. The asynchronous processor, called ARISC, was designed using the same CAD tools and the same standard cell library that was used to implement the TR4101. The paper...... reports on the design methodology, the architecture, the implementation, and the performance of the ARISC. This includes a comparison with the TR4101, and a detailed breakdown of the power consumption in the ARISC. ARISC is our first attempt at an asynchronous implementation and a number of simplifying...... decisions were made up front. Throughout the entire design we use four-phase handshaking in combination with a normally opaque latch controller. All logic is implemented using static logic standard cells. Despite this the ARISC performs surprisingly well: In 0.35 μm CMOS performance is 74-123 MIPS depending...

  18. Concerted and asynchronous mechanism of ground state proton transfer in alcohol mediated 7-hydroxyquinoline

    International Nuclear Information System (INIS)

    Highlights: • Reaction rate constants obtained by DFT agree with experimental ones quite well. • Experimental postulate of concerted and asynchronous GSPT was confirmed. • The GSPT reaction can be decomposed into three asynchronous steps. - Abstract: Alcohols mediated 7-hydroxyquinoline (7-HQ) complex has received enormous attractions on the issue of proton transfer reaction in the ground and excited states. In the present paper, concentrating on the ground state proton transfer (GSPT), density functional theory (DFT) calculations were carried out to investigate the intrinsic insight into the reaction mechanism. We found that the GSPT is concerted and asynchronous process and can be accelerated by more acidic alcohol. Such GSPT was initiated by the proton transfer from alcohol to keto group of 7-HQ and finished by the proton transfer from nitrogen to alcohol. Our findings were in agreement with experimental conclusions quite well. Our results would be helpful to understand the proton transfer reaction for 7-HQ and related systems

  19. Router Designs for an Asynchronous Time-Division-Multiplexed Network-on-Chip

    DEFF Research Database (Denmark)

    Kasapaki, Evangelia; Sparsø, Jens; Sørensen, Rasmus Bo; Goossens, Kees

    In this paper we explore the design of an asynchronous router for a time-division-multiplexed (TDM) network-on-chip (NOC) that is being developed for a multi-processor platform for hard real-time systems. TDM inherently requires a common time reference, and existing TDM-based NOC designs are either...... synchronous or mesochronous, but both approaches have their limitations: a globally synchronous NOC is no longer feasible in today's sub micron technologies and a mesochronous NOC requires special FIFO-based synchronizers in all input ports of all routers in order to accommodate for clock phase differences....... This adds hardware complexity and increases area and power consumption. We propose to use asynchronous routers in order to achieve a simpler, more robust and globally-asynchronous NOC, and this represents an unexplored point in the design space. The paper presents a range of alternative router designs...

  20. Simultaneous and independent optical impairments monitoring using singular spectrum analysis of asynchronously sampled signal amplitudes

    Science.gov (United States)

    Guesmi, Latifa; Menif, Mourad

    2015-09-01

    Optical performance monitoring (OPM) becomes an inviting topic in high speed optical communication networks. In this paper, a novel technique of OPM based on a new elaborated computation approach of singular spectrum analysis (SSA) for time series prediction is presented. Indeed, various optical impairments among chromatic dispersion (CD), polarization mode dispersion (PMD) and amplified spontaneous emission (ASE) noise are a major factors limiting quality of transmission data in the systems with data rates lager than 40 Gbit/s. This technique proposed an independent and simultaneous multi-impairments monitoring, where we used SSA of time series analysis and forecasting. It has proven their usefulness in the temporal analysis of short and noisy time series in several fields, that it is based on the singular value decomposition (SVD). Also, advanced optical modulation formats (100 Gbit/s non-return-to zero dual-polarization quadrature phase shift keying (NRZ-DP-QPSK) and 160 Gbit/s DP-16 quadrature amplitude modulation (DP-16QAM)) offering high spectral efficiencies have been successfully employed by analyzing their asynchronously sampled amplitude. The simulated results proved that our method is efficient on CD, first-order PMD, Q-factor and OSNR monitoring, which enabled large monitoring ranges, the CD in the range of 170-1700 ps/nm.Km and 170-1110 ps/nm.Km for 100 Gbit/s NRZ-DP-QPSK and 160 Gbit/s DP-16QAM respectively, and also the DGD up to 20 ps is monitored. We could accurately monitor the OSNR in the range of 10-40 dB with monitoring error remains less than 1 dB in the presence of large accumulated CD.

  1. A bio-inspired asynchronous skin system for crack detection applications

    International Nuclear Information System (INIS)

    In many applications of structural health monitoring (SHM) it is imperative or advantageous to have large sensor arrays in order to properly sense the state of health of the structure. Typically these sensor networks are implemented by placing a large number of sensors over a structure and running individual cables from each sensor back to a central measurement station. Data is then collected from each sensor on the network at a constant sampling rate regardless of the current timescales at which events are acting on the structure. These conventional SHM sensor networks have a number of shortfalls. They tend to have a large number of cables that can represent a single point of failure for each sensor as well as add significant weight and installation costs. The constant sampling rate associated with each sensor very quickly leads to large amounts of data that must be analyzed, stored, and possibly transmitted to a remote user. This leads to increased demands on power consumption, bandwidth, and size. It also taxes our current techniques for managing large amounts of data. For the last decade the goal of the SHM community has been to endow structures with the functionality of a biological nervous system. Despite this goal the community has predominantly ignored the biological nervous system as inspiration for building structural nervous systems, choosing instead to focus on experimental mechanics and simulation techniques. In this work we explore the use of a novel, bio-inspired, SHM skin. This skin makes use of distributed computing and asynchronous communication techniques to alleviate the scale of the data management challenge as well as reduce power. The system also periodically sends a ‘heat beat’ signal to provide state-of-health updates. This conductive skin was implemented using conductive ink resistors as well as with graphene-oxide capacitors. (paper)

  2. Network evolution induced by asynchronous stimuli through spike-timing-dependent plasticity.

    Directory of Open Access Journals (Sweden)

    Wu-Jie Yuan

    Full Text Available In sensory neural system, external asynchronous stimuli play an important role in perceptual learning, associative memory and map development. However, the organization of structure and dynamics of neural networks induced by external asynchronous stimuli are not well understood. Spike-timing-dependent plasticity (STDP is a typical synaptic plasticity that has been extensively found in the sensory systems and that has received much theoretical attention. This synaptic plasticity is highly sensitive to correlations between pre- and postsynaptic firings. Thus, STDP is expected to play an important role in response to external asynchronous stimuli, which can induce segregative pre- and postsynaptic firings. In this paper, we study the impact of external asynchronous stimuli on the organization of structure and dynamics of neural networks through STDP. We construct a two-dimensional spatial neural network model with local connectivity and sparseness, and use external currents to stimulate alternately on different spatial layers. The adopted external currents imposed alternately on spatial layers can be here regarded as external asynchronous stimuli. Through extensive numerical simulations, we focus on the effects of stimulus number and inter-stimulus timing on synaptic connecting weights and the property of propagation dynamics in the resulting network structure. Interestingly, the resulting feedforward structure induced by stimulus-dependent asynchronous firings and its propagation dynamics reflect both the underlying property of STDP. The results imply a possible important role of STDP in generating feedforward structure and collective propagation activity required for experience-dependent map plasticity in developing in vivo sensory pathways and cortices. The relevance of the results to cue-triggered recall of learned temporal sequences, an important cognitive function, is briefly discussed as well. Furthermore, this finding suggests a potential

  3. The development of mathematical model for the study of electromagnetic interference from the traction converters with asynchronous motor

    OpenAIRE

    V. I. Shcheka; HAVRYLIUK V.I.

    2010-01-01

    The mathematical modeling and circuit simulation of asynchronous propulsion drive unit with converters on IGBT transistors have been made. The possible noises appearing during drive’s operation have been determined. The spectral composition of phase current of the asynchronous engine has been obtained.

  4. Good Quality Discussion Is Necessary but Not Sufficient in Asynchronous Tuition: A Brief Narrative Review of the Literature

    Science.gov (United States)

    Fear, William James; Erikson-Brown, Andrew

    2014-01-01

    Online learning is a growing field of education with a corresponding increase in the use of asynchronous discussion. Asynchronous discussion is a form of interaction that is mediated rather than direct and where there is a time lag in the interactions between discussants. In this paper we conducted a brief narrative review of the literature on…

  5. Enhancing Discussions in the Asynchronous Online Classroom: The Lack of Face-to-Face Interaction Does Not Lessen the Lesson

    Science.gov (United States)

    Comer, Debra R.; Lenaghan, Janet A.

    2013-01-01

    This article addresses educators' concerns about using asynchronous online discussions in lieu of face-to-face discussions. Drawing from research on asynchronous online education and Bloom's taxonomy, the authors introduce the system of "original examples" and "value-added comments" that they have developed to promote engaging and meaningful…

  6. Evaluation of asynchronous E-learning in the geography curriculum: enriching learning quality in Saudi high schools

    OpenAIRE

    Al Dobaikhi, Hend; Woollard, John

    2011-01-01

    The impacts of emerging ICT into educational curricula Asynchronous discussion forum Discussion groups via e-learning environment Posting questions and comments Self-efficacy in asynchronous e-learning Web community participation Collaborative learning can be fostered Positive impacts on objectives of educational curriculum

  7. THE DEVELOPMENT OF MATHEMATICAL MODEL FOR THE STUDY OF ELECTROMAGNETIC INTERFERENCE FROM THE TRACTION CONVERTERS WITH ASYNCHRONOUS MOTOR

    Directory of Open Access Journals (Sweden)

    V. I. Shcheka

    2010-01-01

    Full Text Available The mathematical modeling and circuit simulation of asynchronous propulsion drive unit with converters on IGBT transistors have been made. The possible noises appearing during drive’s operation have been determined. The spectral composition of phase current of the asynchronous engine has been obtained.

  8. An Attempt at Pseudo-Democracy and Tactical Liberalization in Turkey: An Analysis of Ismet Inönü’s Decision to Transition to a Multi-Party Political System

    Directory of Open Access Journals (Sweden)

    Kemal Ozden

    2010-10-01

    Full Text Available Turkish experiment of transition to multi-party politics in 1946 has been seen by transition to democracy comparativists as an example of the cases in which the ruling elites deliberately decide that the society is diverse so this diversity needs to be translated into the political sphere by allowing multi-party politics. However, this study challanges this view and suggests that a close reading of the critical juncture of 1946 when the President and the leader of Republican People’s Party smet nönü decided to allow other parties to operate shows that it was not that the President nönü succumbed to the reality of diversity but domestic and international concerns forced him to act towards a multi-party political structure. In his mind, he had a pseudodemocratic system where he and his party would continue to rule the country in a hegemonic party system setting where a ruling party monopolizes the political arena, using coercion, patronage, media control, and other means to deny formally legal opposition parties any real chance of competing for power.

  9. The study of transient processes in the asynchronous starting of the synchronous motor

    Directory of Open Access Journals (Sweden)

    Alexandru Bârlea

    2012-12-01

    Full Text Available Starting synchronous motors can be achieved by several ethods: starting with an auxiliary motor launch, starting in asynchronous regim, by feeding from a variable frequency source, auto-synchronization with the network.. In our case we study the transient processes in a asynchronous regim . In this case the synchronous motor is started like a squirrel cage induction motor . To start, the synchronous motor is equipped with a starting winding cage placed in the pole pieces of polar inducers; later , during the operation, this acts as a damping winding. Large synchronous motors have pole pieces made from massive polar inducers fulfilling the role of a cage winding.

  10. On Input-to-State Stability of Switched Stochastic Nonlinear Systems Under Extended Asynchronous Switching.

    Science.gov (United States)

    Kang, Yu; Zhai, Di-Hua; Liu, Guo-Ping; Zhao, Yun-Bo

    2016-05-01

    An extended asynchronous switching model is investigated for a class of switched stochastic nonlinear retarded systems in the presence of both detection delay and false alarm, where the extended asynchronous switching is described by two independent and exponentially distributed stochastic processes, and further simplified as Markovian. Based on the Razumikhin-type theorem incorporated with average dwell-time approach, the sufficient criteria for global asymptotic stability in probability and stochastic input-to-state stability are given, whose importance and effectiveness are finally verified by numerical examples. PMID:26068932

  11. A Scheduling Discipline for Latency and Bandwidth Guarantees in Asynchronous Network-on-Chip

    DEFF Research Database (Denmark)

    Bjerregaard, Tobias; Sparsø, Jens

    2005-01-01

    Guaranteed services (GS) are important in that they provide predictability in the complex dynamics of shared communication structures. This paper discusses the implementation of GS in asynchronous Network-on-Chip. We present a novel scheduling discipline called Asynchronous Latency Guarantee (ALG......) scheduling, which provides latency and bandwidth guarantees in accessing a shared media, e.g. a physical link shared between a number of virtual channels. ALG overcomes the drawbacks of existing scheduling disciplines, in particular the coupling between latency and bandwidth guarantees. A 0.12 &956;m CMOS...

  12. Efficiency of three-phase asynchronous motors. Energy loss reduction by means of overdimensioning; Efficientie van driefasen asynchrone motoren. SinuMEC beperkt energieverlies door overdimensionering

    Energy Technology Data Exchange (ETDEWEB)

    Peeters, J.; Van Dorst, C. [Hyteps, Gemert (Netherlands)

    2008-10-15

    The three phase asynchronous motor has been applied in various installations since time immemorial. Although the motor is more efficient at full mechanical load, this is not always applied efficiently. Can the efficiency of low load motors be improved or is this a utopia? The Sinusoidal Motor Controller (SinuMEC) improves efficiency, saves energy and lengthens the life span. [mk]. [Dutch] De driefasen asynchrone motor wordt sinds mensenheugenis in uiteenlopende installaties toegepast. Hoewel de motor met een volle mechanische belasting efficient is, wordt deze niet altijd efficient toegepast. Kan de efficiency van laag belaste motoren worden verbeterd of is dit een utopie? De Sinusoidal Motor efficiency controller (SinuMEC) verbetert de efficiency, bespaart energie en verlengt de levensduur.

  13. Teradata data base computer

    Energy Technology Data Exchange (ETDEWEB)

    1984-04-01

    To meet the growing demand for information management of large databases, Teradata Corporation has introduced the DBC/1012 data base computer, an IBM plug-compatible system that can handle data volumes up to a trillion bytes. Teradata estimates the DBC/1012 to be one-third the cost of an all-software relational system on a general purpose mainframe. Cost effectiveness, as well as fault tolerance, is achieved by a parallel architecture which processes data asynchronously using multiple independent microprocessors. Another cost saving results from the resources on the host mainframe that become available once the mainframe is relieved of the burden of maintaining the database.

  14. Brain Computer Interface for Virtual Reality Control

    OpenAIRE

    Guger, C; Groenegress, C.; Holzner, C.; Edlinger, G.; Slater, Mel; Sánchez-Vives, María Victoria

    2009-01-01

    A brain-computer interface (BCI) is a new communication channel between the human brain and a computer. Applications of BCI systems comprise the restoration of movements, communication and environmental control. In this study experiments were made that used the BCI system to control or to navigate in virtual environments (VE) just by thoughts. BCI experiments for navigation in VR were conducted so far with synchronous BCI and asynchronous BCI systems. The synchronous BCI analyzes the EEG patt...

  15. Concurrent computing machines and physical space-time

    OpenAIRE

    Matherat, Philippe; Jaekel, Marc-Thierry

    2001-01-01

    Concrete computing machines, either sequential or concurrent, rely on an intimate relation between computation and time. We recall the general characteristic properties of physical time and of present realizations of computing systems. We emphasize the role of computing interferences, i.e. the necessity to avoid them in order to give a causal implementation to logical operations. We compare synchronous and asynchronous systems, and make a brief survey of some methods used to deal with computi...

  16. A model of asynchronous left ventricular relaxation predicting the bi-exponential pressure decay

    NARCIS (Netherlands)

    R.W. Brower (Ronald); S. Meij (Simon); P.W.J.C. Serruys (Patrick)

    1983-01-01

    textabstractA new model for the pressure relaxation of the left ventricle is proposed. The model presumes that the myocardium relaxes asynchronously, but that when regions begin to relax, after a delay, the local wall stress decays as a mono-exponential process. This formulation results in an appare

  17. Synchronous and Asynchronous E-Language Learning: A Case Study of Virtual University of Pakistan

    Science.gov (United States)

    Perveen, Ayesha

    2016-01-01

    This case study evaluated the impact of synchronous and asynchronous E-Language Learning activities (ELL-ivities) in an E-Language Learning Environment (ELLE) at Virtual University of Pakistan. The purpose of the study was to assess e-language learning analytics based on the constructivist approach of collaborative construction of knowledge. The…

  18. An Approach for Asynchronous Awareness Support in Collaborative Non-Linear Storytelling

    NARCIS (Netherlands)

    Schumann, J.; Buttler, T.; Lukosch, S.

    2012-01-01

    Workspace awareness support is mandatory for group support systems. It allows users not only to follow actions of others, but to understand and respond to any changes others make to the workspace. In this paper, we present a novel approach for asynchronous awareness support by offering different fil

  19. An iron free asynchronous pulsed generator for the production of pulsed high magnetic fields

    International Nuclear Information System (INIS)

    The production of long pulsed high fields (> 500 kgaus) with (tau > 1 s) with cryogenic coils requires an initial energy source of several megajoules. Iron free asynchronous pulsed generators are particulary well adapted to this application as they are able to produce this energy at a very competitive price

  20. A low-power asynchronous data-path for a FIR filter bank

    DEFF Research Database (Denmark)

    Nielsen, Lars Skovby; Sparsø, Jens

    1996-01-01

    This paper describes a number of design issues relating to the implementation of low-power asynchronous signal processing circuits. Specifically, the paper addresses the design of a dedicated processor structure that implements an audio FIR filter bank which is part of an industrial application...

  1. Synthesis and Layout of an Asynchronous Network-on-Chip using Standard EDA Tools

    DEFF Research Database (Denmark)

    Müller, Christoph; Kasapaki, Evangelia; Sørensen, Rasmus Bo;

    2014-01-01

    is the key role that clock signals play in specifying time-constraints for the synthesis. In this paper explain how we handled the synthesis and layout of an asynchronous network-on-chip for a multi-core platform. Focus is on the design process while the actual NOC-design and its performance are...

  2. "Intentional Repetition" and Learning Style: Increasing Efficient and Cohesive Interaction in Asynchronous Online Discussions

    Science.gov (United States)

    Topcu, Abdullah

    2008-01-01

    This study verified the efficacy of the intentional repetition technique in improving interaction in asynchronous online discussions by taking into account the learning styles of the participants. A conceptual framework served for the development of the technique, which conceptualises efficient and cohesive interaction on a continuum of process…

  3. Visual Search in a Multi-Element Asynchronous Dynamic (MAD) World

    Science.gov (United States)

    Kunar, Melina A.; Watson, Derrick G.

    2011-01-01

    In visual search tasks participants search for a target among distractors in strictly controlled displays. We show that visual search principles observed in these tasks do not necessarily apply in more ecologically valid search conditions, using dynamic and complex displays. A multi-element asynchronous dynamic (MAD) visual search was developed in…

  4. Comparative Analysis of Preservice Teachers' Reflective Thinking in Synchronous versus Asynchronous Online Case Discussions

    Science.gov (United States)

    Levin, Barbara B.; He, Ye; Robbins, Holly H.

    2006-01-01

    This study was undertaken to better understand the nature of preservice teachers' reflective thinking during case discussions about classroom management in two online formats: synchronous versus asynchronous. Findings indicated that when participants engaged in synchronous online case discussions they had higher levels of critical reflection than…

  5. Defining the Symmetry of the Universal Semi-Regular Autonomous Asynchronous Systems

    Directory of Open Access Journals (Sweden)

    Serban E. Vlad

    2012-02-01

    Full Text Available The regular autonomous asynchronous systems are the non-deterministic Boolean dynamical systems and universality means the greatest in the sense of the inclusion. The paper gives four definitions of symmetry of these systems in a slightly more general framework, called semi-regularity, and also many examples.

  6. Flipping the Online Classroom with Web 2.0: The Asynchronous Workshop

    Science.gov (United States)

    Cummings, Lance

    2016-01-01

    This article examines how Web 2.0 technologies can be used to "flip" the online classroom by creating asynchronous workshops in social environments where immediacy and social presence can be maximized. Using experience teaching several communication and writing classes in Google Apps (Google+, Google Hangouts, Google Drive, etc.), I…

  7. Designing a Discussion Environment to Enhance Connectivity and Sustainability in Asynchronous Online Discussion

    Science.gov (United States)

    Gao, Fei

    2011-01-01

    Lack of connectivity and sustainability are two common problems in asynchronous online discussions. In this paper, the author proposes that the two problems may have to do with the structure of threaded forums, that is, the design of threaded forums may constrain participants from having well-connected and sustained discussions. A new discussion…

  8. Cooperative Learning in Graduate Student Projects: Comparing Synchronous versus Asynchronous Collaboration

    Science.gov (United States)

    Strang, Kenneth

    2013-01-01

    Cooperative learning was applied in a graduate project management course to compare the effectiveness of asynchronous versus synchronous online team meetings. An experiment was constructed to allocate students to project teams while ensuring there was a balance of requisite skills, namely systems analysis and design along with HTML/Javascript…

  9. Credit Hours with No Set Time: A Study of Credit Policies in Asynchronous Online Education

    Science.gov (United States)

    Prasuhn, Frederick Carl

    2014-01-01

    U.S. public university system policies were examined to learn how credit hours were determined for asynchronous online education. Findings indicated that (a) credit hour meaning and use are not consistent, (b) primary responsibility for credit hour decisions was at the local level, and (c) no policies exist to guide credit hour application for…

  10. The Role of Beliefs and Motivation in Asynchronous Online Learning in College-Level Classes

    Science.gov (United States)

    Xie, Kui; Huang, Kun

    2014-01-01

    Epistemic and learning beliefs were found to affect college students' cognitive engagement and study strategies, as well as motivation in classroom settings. However, the relationships between epistemic and learning beliefs, motivation, learning perception, and students' actual learning participation in asynchronous online settings have been…

  11. The Role of Technology-Based Scaffolding in Problem-Based Online Asynchronous Discussion

    Science.gov (United States)

    Ak, Serife

    2016-01-01

    This study examined the effects of technology-based scaffolds that were composed through the use of the seven-stage, problem-based learning strategy on knowledge construction in a problem-based online asynchronous discussion. In a quasi-experimental setting, 60 students in an undergraduate Instructional Technology and Material Design course were…

  12. Defining the Symmetry of the Universal Semi-Regular Autonomous Asynchronous Systems

    OpenAIRE

    Vlad, Serban E.

    2012-01-01

    The regular autonomous asynchronous systems are the non-deterministic Boolean dynamical systems and universality means the greatest in the sense of the inclusion. The paper gives four definitions of symmetry of these systems in a slightly more general framework, called semi-regularity, and also many examples.

  13. A Study of Asynchronous and Synchronous Discussion on Cognitive Maps in a Distributed Learning Environment.

    Science.gov (United States)

    Bhattacharya, Madhumita

    This paper reports on a comparative study of the use of asynchronous (bulletin board) and synchronous (chat) discussion on three learning units based on the cognitive maps developed by the learners. Cognitive maps have been found to be an effective tool for learners for discussion in a distributed learning environment. Cognitive maps provided…

  14. Socialization in the "Virtual Hallway": Instant Messaging in the Asynchronous Web-Based Distance Education Classroom.

    Science.gov (United States)

    Nicholson, Scott

    2002-01-01

    Examined differences in communication between masters degree students at Syracuse University who used instant messaging (IM) services and those who did not in the same asynchronous distance education Web-based course. Results showed that students who used IM found it easier to communicate and felt a stronger sense of community. (Author/LRW)

  15. Performance comparison of asynchronous orthogonal multi-carrier CDMA in frequency selective channel

    OpenAIRE

    Xiang, G; Ng, TS

    1998-01-01

    Bit error rate (BER) performance of an asynchronous multi-carrier code division multiple access (MC-CDMA) system for the uplink of the mobile communication system with equal gain combining and maximum ratio combining are obtained. Given a fixed bandwidth frequency selective channel, performance of MC-CDMA is compared with that of conventional CDMA and MC-DS-CDMA in numerical results.

  16. Asynchronous Orthogonal Multi-Carrier CDMA Using Equal Gain Combining in Multipath Rayleigh Fading Channel

    OpenAIRE

    Xiang, G; Ng, TS

    1998-01-01

    Performance of an asynchronous orthogonal multi-carrier code division multiple access (MC-CDMA) system for the reverse link of the mobile communication system with equal gain combining is obtained. The performance of MC-CDMA is compared with that of conventional CDMA and MC-DS-CDMA in numerical results in a multipath Rayleigh fading channel.

  17. Pedagogical Dimensions of Effective Online Asynchronous Teacher Communication in Higher Education

    NARCIS (Netherlands)

    A. Smits; J. Voogt

    2015-01-01

    In this research teacher behaviour in online asynchronous discussions is studied. To this end teachers’ online messages were analyzed and correlated to measures of student satisfaction. Findings show a positive relation between student satisfaction and the presence of content knowledge, multiple ack

  18. A Study of Synchronous versus Asynchronous Collaboration in an Online Business Writing Class

    Science.gov (United States)

    Mabrito, Mark

    2006-01-01

    A case study examined the collaborative experiences of students in an online business writing classroom. The purpose was to examine the same groups of students working on collaborative writing assignments in both a synchronous (real-time) and an asynchronous (non-real-time) discussion forum. This study focused on examining the amount, pattern, and…

  19. Asynchronous Knowledge Sharing and Conversation Interaction Impact on Grade in an Online Business Course

    Science.gov (United States)

    Strang, Kenneth David

    2011-01-01

    Student knowledge sharing and conversation theory interactions were coded from asynchronous discussion forums to measure the effect of learning-oriented utterances on academic performance. The sample was 3 terms of an online business course (in an accredited MBA program) at a U.S.-based university. Correlation, stepwise regression, and multiple…

  20. Comparing Asynchronous Online Discussions and Face-to-Face Discussions in a Classroom Setting

    Science.gov (United States)

    Wang, Qiyun; Woo, Huay Lit

    2007-01-01

    The purpose of this study is to investigate the perceived differences between asynchronous online discussions and face-to-face discussions in a classroom setting. The students' reflections were analysed by following a qualitative research approach. The results showed that atmosphere, response, efficiency, interactivity and communication were the…

  1. VOLTAGE REGULATORS AND FREQUENCY OF CURRENT OF ASYNCHRONOUS GENERATORS OF WIND POWER INSTALLATIONS

    Directory of Open Access Journals (Sweden)

    Grigorash O. V.

    2013-10-01

    Full Text Available In the article we have considered the technical solutions of voltage regulators and the frequency of current of the asynchronous generators of the wind power installations executed with the help of the direct frequency transformers. The comparative analysis of them has been carried out as well

  2. Asynchronous Pipeline Micro—Control—Unit (MCU) Chip Design

    Institute of Scientific and Technical Information of China (English)

    ZHOUQian; XUKe; MINHao

    2003-01-01

    The work of this paper includes a researchon asynch ronous design methodology, and a design and implementation of an asynchronous 8-Bit micro-control-unit (MCU). This paper introduces a new application of New-Instruction-Fetching method to detect new instruc-tion which makes this chip fit for demand changeable sys-tem. The instruction set of this asynchronous MCU is compatible with PIC16C6X (Sicrochip Technology Inc).This paper also introduces a new architecture of pipeline,which increases the average speed of chip operation. The asynchronous low power MCU has been fabricated with CSMC (central semiconductor manufacturing corporation)0.6μm CMOS process in Aug 2001. The chip size is about 1.60mm*2.00mm (without taking account of PAD size).Now the test work has been accomplished and the test-ing result of this chip is also presented. The testing result shows that the asynchronous architecture could fulfill all the expected functions, additionally with higher processs peed and lower power consumption than its synchronous counterpart under the same supply voltage.

  3. Use of Podcasting as an Innovative Asynchronous E-Learning Tool for Students

    Science.gov (United States)

    Jalali, Alireza; Leddy, John; Gauthier, Martin; Sun, Rong; Hincke, Maxwell; Carnegie, Jacqueline

    2011-01-01

    Podcasting is an innovative, asynchronous communication tool. A pilot study was conducted to assess the utility of podcasting as an educational tool for undergraduate medical students. A paper-and-pencil questionnaire was developed and distributed to the 40 first-year students enrolled in the francophone stream of the medical curriculum at the…

  4. Effects of Asynchronous Music on Students' Lesson Satisfaction and Motivation at the Situational Level

    Science.gov (United States)

    Digelidis, Nikolaos; Karageorghis, Costas I.; Papapavlou, Anastasia; Papaioannou, Athanasios G.

    2014-01-01

    The aim of this study was to examine the effects of asynchronous (background) music on senior students' motivation and lesson satisfaction at the situational level. A counterbalanced mixed-model design was employed with two factors comprising condition (three levels) and gender (two levels). Two hundred students (82 boys, 118 girls; M…

  5. Tagging Thinking Types in Asynchronous Discussion Groups: Effects on Critical Thinking

    Science.gov (United States)

    Schellens, T.; Van Keer, H.; De Wever, B.; Valcke, M.

    2009-01-01

    The present study focuses on the use of thinking types as a possible way to structure university students' discourse in asynchronous discussion groups and consequently promote their learning. More specifically, the aim of the study is to determine how requiring students to label their contributions by means of De Bono's (1991) thinking hats…

  6. Facing Off: Comparing an In-Person Library Orientation Lecture with an Asynchronous Online Library Orientation

    Science.gov (United States)

    Gall, Dan

    2014-01-01

    A study to compare the effectiveness of an in-person library orientation with an online asynchronous orientation was conducted with three sections of Social Work Research Methods, a required course in the University of Iowa's Master of Social Work program. Two sections of the course received an online orientation involving short videos, text…

  7. Thematic Analysis of the "Games" Students Play in Asynchronous Learning Environments

    Science.gov (United States)

    MacMillan, Thalia; Forte, Michele; Grant, Cynthia

    2014-01-01

    The dynamics of the student-student relationship within the asynchronous online classroom, as evidenced by conversations in an online discussion board, is a balancing act potentially more complex than those occurring in real-time. In order for learning to truly be considered effective, a collaborative, safe environment needs to exist among…

  8. Examining Facilitators' Habits of Mind in an Asynchronous Online Discussion Environment: A Two Cases Study

    Science.gov (United States)

    Cheung, Wing Sum; Hew, Khe Foon

    2010-01-01

    Asynchronous online discussion has been widely used by faculty members and students in schools and universities. Previous research has examined how factors such as the discussion activity, knowledge about the discussion topic, and the behaviour of other participants can affect learner participation. This study explored student facilitators'…

  9. Router Designs for an Asynchronous Time-Division-Multiplexed Network-on-Chip

    DEFF Research Database (Denmark)

    Kasapaki, Evangelia; Sparsø, Jens; Sørensen, Rasmus Bo;

    2013-01-01

    In this paper we explore the design of an asynchronous router for a time-division-multiplexed (TDM) network-on-chip (NOC) that is being developed for a multi-processor platform for hard real-time systems. TDM inherently requires a common time reference, and existing TDM-based NOC designs are either...

  10. Developing Asynchronous Online Courses: Key Instructional Strategies in a Social Metacognitive Constructivist Learning Trajectory

    Science.gov (United States)

    Niess, Margaret; Gillow-Wiles, Henry

    2013-01-01

    This qualitative, design-based research study resulted in a proposal for a comprehensive set of best instructional practices immersed in a learning trajectory, outlining the tools, processes and the content development for online asynchronous, text-based learning in graduate level professional development courses. The outcome provides a rich…

  11. Using the Community of Inquiry Model to Investigate Students' Knowledge Construction in Asynchronous Online Discussions

    Science.gov (United States)

    Liu, Chien-Jen; Yang, Shu Ching

    2014-01-01

    This study used the Community of Inquiry (CoI) model proposed by Garrison to investigate students' level of knowledge construction in asynchronous discussions. The participants included 36 senior students (27 males) majoring in information management. The students attended 18 weeks of an online information ethics course. In this study, four types…

  12. 3D asynchronous particle tracking in single and dual continuum matrix-fractures. Application to nuclear waste storage; Modelisation 3D du transport particulaire asynchrone en simple et double continuum matrice-fractures: application au stockage de dechets nucleaires

    Energy Technology Data Exchange (ETDEWEB)

    Lam, M.Ph

    2008-06-15

    This PhD research was conducted as a collaboration between Laboratoire National d'Hydraulique et Environnement (LNHE) from EDF R and D and the Institut de Mecanique des Fluides de Toulouse (IMFT) in the frame of a CIFRE contract. This PhD thesis aims at providing LNHE a reliable numerical model to study the feasibility of a nuclear waste storage in deep geological structures. The main focus of the thesis is put on developing and implementing a Random Walk Particle Method (RWPM) to model contaminant transport in 3D heterogeneous and fractured porous media. In its first part, the report presents the Lagrangian particle tracking method used to model transport in heterogeneous media with a direct high resolution approach. The solute plume is discretized into concentration packets: particles. The model tracks each particle based on a time-explicit displacement algorithm according to an advective component and a diffusive random component. The method is implemented on a hydraulic model discretized on a 3D unstructured tetrahedral finite element mesh. We focus on techniques to overcome problems due to the discontinuous transport parameters and the unstructured mesh. First, we introduce an asynchronous time-stepping approach to deal with the numerical and overshoot errors that occur with conventional RWPM. Then, a filtering method is applied to smooth discontinuous transport parameters (pre-processing). Finally, once the particle displacements are computed, we propose several filtering and sampling methods to obtain concentrations from particle positions (post-processing). Applications of these methods are presented with cases of tracer advection-dispersion in homogeneous and heterogeneous media. For dense fracture networks, direct high resolution methods are very time consuming and need a lot of computational resources. So, as an alternative to the discrete approach, a dual-continuum representation is used, in the second part of the report, to describe the porous

  13. Application-Controlled Parallel Asynchronous Input/Output Utility

    Science.gov (United States)

    Clune, Thomas; Zhou, Shujia

    2010-01-01

    A software utility tool has been designed to alleviate file system I/O performance bottlenecks to which many high-end computing (HEC) applications fall prey because of the relatively large volume of data generated for a given amount of computational work. In an effort to reduce computing resource waste, and to improve sustained performance of these HEC applications, a lightweight software utility has been designed to circumvent bandwidth limitations of typical HEC file systems by exploiting the faster inter-processor bandwidth to move output data from compute nodes to designated I/O nodes as quickly as possible, thereby minimizing the I/O wait time. This utility has successfully demonstrated a significant performance improvement within a major NASA weather application.

  14. 3D asynchronous particle tracking in single and dual continuum matrix-fractures. Application to nuclear waste storage

    International Nuclear Information System (INIS)

    This PhD research was conducted as a collaboration between Laboratoire National d'Hydraulique et Environnement (LNHE) from EDF R and D and the Institut de Mecanique des Fluides de Toulouse (IMFT) in the frame of a CIFRE contract. This PhD thesis aims at providing LNHE a reliable numerical model to study the feasibility of a nuclear waste storage in deep geological structures. The main focus of the thesis is put on developing and implementing a Random Walk Particle Method (RWPM) to model contaminant transport in 3D heterogeneous and fractured porous media. In its first part, the report presents the Lagrangian particle tracking method used to model transport in heterogeneous media with a direct high resolution approach. The solute plume is discretized into concentration packets: particles. The model tracks each particle based on a time-explicit displacement algorithm according to an advective component and a diffusive random component. The method is implemented on a hydraulic model discretized on a 3D unstructured tetrahedral finite element mesh. We focus on techniques to overcome problems due to the discontinuous transport parameters and the unstructured mesh. First, we introduce an asynchronous time-stepping approach to deal with the numerical and overshoot errors that occur with conventional RWPM. Then, a filtering method is applied to smooth discontinuous transport parameters (pre-processing). Finally, once the particle displacements are computed, we propose several filtering and sampling methods to obtain concentrations from particle positions (post-processing). Applications of these methods are presented with cases of tracer advection-dispersion in homogeneous and heterogeneous media. For dense fracture networks, direct high resolution methods are very time consuming and need a lot of computational resources. So, as an alternative to the discrete approach, a dual-continuum representation is used, in the second part of the report, to describe the porous matrix

  15. Discrete analog computing with rotor-routers.

    Science.gov (United States)

    Propp, James

    2010-09-01

    Rotor-routing is a procedure for routing tokens through a network that can implement certain kinds of computation. These computations are inherently asynchronous (the order in which tokens are routed makes no difference) and distributed (information is spread throughout the system). It is also possible to efficiently check that a computation has been carried out correctly in less time than the computation itself required, provided one has a certificate that can itself be computed by the rotor-router network. Rotor-router networks can be viewed as both discrete analogs of continuous linear systems and deterministic analogs of stochastic processes. PMID:20887076

  16. Interaction through Asynchronous Audio-Based Computer Mediated Communication in the Virtual Foreign Language Classroom

    OpenAIRE

    Shrewsbury, Eric-Gene Jackson

    2012-01-01

    Because distance learning (DL) programs provide students educational opportunities with minimal restrictions on location and/or time, the number of institutions that provide DL courses has grown at a tremendous rate over recent years and is projected to increase in the future. Foreign language courses through DL, however, have been criticized for limited opportunities to engage in speaking activities and to develop oral proficiency. While previous research consistently reports no significan...

  17. Study on Asynchronous MES Teaching Approach for Discipline of College Japanese in Characteristic Campus of Agriculture-related Universities

    Institute of Scientific and Technical Information of China (English)

    Ming; XU

    2015-01-01

    This paper made scientific analysis on asynchronous MES for discipline of College Japanese in characteristic campus of agriculturerelated universities. It made modular design for discipline of College Japanese in emotional concept,language skill,language knowledge,learning strategy,and cultural quality combining students’ demands and education and teaching rules. Relying on Internet and Mobile Internet aided teaching platform,it came up with " Integration- Separation- Integration" asynchronous teaching approach. The practice indicates that teaching effect of such approach is remarkable. However,asynchronous MES for discipline of College Japanese raises higher requirement for interaction between teachers and students and voluntary effort of teachers.

  18. “多方当事人调解诊所课程”的调研报告%A Report on Multiparty Mediation Practicum

    Institute of Scientific and Technical Information of China (English)

    翁洁

    2012-01-01

    This report was targeted at the course of Multiparty Mediation Practicum. It discussed the authorg observation and investigation of the teaching contents and methods, class characteristics as well as the assess ment methods of this course. Then detailed analyses were made on the course orientation, class structure and teacher student function of it in the hope that they could contribute to the improvements in the research and practice of the teaching attitude toward, objective of, and means of the legal education in China.%文章将“多方当事人调解诊所课程”作为调查研究的对象,通过对该课程的授课内容与方式、课堂特点、考核方式等方面的观察与记录,从课程定位、课堂构成、师生功能三个方面对该课程进行了分析并得出了相关结论,以期能为我国法学教育教学态度、目标、方式、手段等方面的研究与切实改善提供有益的参考。

  19. Synchronous and asynchronous multiplexer circuits for medical imaging realized in CMOS 0.18um technology

    Science.gov (United States)

    Długosz, R.; Iniewski, K.

    2007-05-01

    Multiplexers are one of the most important elements in readout front-end ASICs for multi-element detectors in medical imaging. The purpose of these ASICs is to detect signals appearing randomly in many channels and to collect the detected data in an ordered fashion (de-randomization) in order to send it to an external ADC. ASIC output stage functionality can be divided into two: pulse detection and multiplexing. The pulse detection block is responsible for detecting maximum values of signals arriving from the shaper, sending a flag signal indicating that the peak signal has been detected and storing the pulse in an analog memory until read by ADC. The multiplexer in turn is responsible for searching for active flags, controlling the channel that has detected the peak signal and performing reset functions after readout. There are several types of multiplexers proposed in this paper, which can be divided into several classes: synchronous, synchronized and asynchronous. Synchronous circuits require availability of the multiphase clock generator, which increases the power dissipation, but simultaneously provide very convenient mechanism that enables unambiguous choice of the active channel. This characteristics leads to 100% effectiveness in data processing and no data loss. Asynchronous multiplexers do not require clock generators and because of that have simpler structure, are faster and more power efficient, especially when data samples occur seldom at the ASIC's inputs. The main problem of the asynchronous solution is when data on two or more inputs occur almost at the same time, shorter than the multiplexer's reaction time. In this situation some data can be lost. In many applications loss of the order of 1% of the data is acceptable, which makes use of asynchronous multiplexers possible. For applications when the lower loss is desirable a new hierarchy mechanism has been introduced. One of proposed solutions is a synchronized binary tree structure, that uses many

  20. Supporting collaborative computing and interaction

    Energy Technology Data Exchange (ETDEWEB)

    Agarwal, Deborah [Lawrence Berkeley National Lab. (LBNL), Berkeley, CA (United States); McParland, Charles [Lawrence Berkeley National Lab. (LBNL), Berkeley, CA (United States); Perry, Marcia [Lawrence Berkeley National Lab. (LBNL), Berkeley, CA (United States)

    2002-05-22

    To enable collaboration on the daily tasks involved in scientific research, collaborative frameworks should provide lightweight and ubiquitous components that support a wide variety of interaction modes. We envision a collaborative environment as one that provides a persistent space within which participants can locate each other, exchange synchronous and asynchronous messages, share documents and applications, share workflow, and hold videoconferences. We are developing the Pervasive Collaborative Computing Environment (PCCE) as such an environment. The PCCE will provide integrated tools to support shared computing and task control and monitoring. This paper describes the PCCE and the rationale for its design.