258,212 research outputs found
PROVIDING A FLEXIBLE AND COSTLESS SOLUTION FOR TRANSITIONAL SETS
Within this paper, we advise a manuscript upper bound privacy leakage constraint-based method of identify which intermediate data sets have to be encoded and that do not, to ensure that privacy-protecting cost could be saved as the privacy needs of information holders can nonetheless be satisfied. To be able to curtail the general expenses by staying away from frequent computation to acquire these data sets. Such situations are very common because data customers frequently reanalyze results, conduct new analysis on intermediate data sets, or share some intermediate results with other people for collaboration. Across the processing of these programs, a sizable amount of intermediate data sets is going to be produced, and frequently stored in order to save the price of computing them. Cloud computing provides massive computation power and storage capacity which enable customers to deploy computation and knowledge-intensive programs without infrastructure investment. However, protecting the privacy of intermediate data sets turns into a challenging problem because opponents may recover privacy-sensitive information by examining multiple intermediate data sets. Evaluation results show the privacy-protecting price of intermediate data sets could be considerably reduced with this approach over existing ones where all data sets are encoded. Encrypting ALL data takes hold cloud is broadly adopted in existing methods to address this concern. But we reason that encrypting all intermediate data sets are neither efficient nor cost-effective since it is very time intensive and pricey for data-intensive programs to en/decrypt data sets frequently while carrying out any operation in it. Finally, we design an operating heuristic formula accordingly to recognize the information sets that should be encoded
Self-consistent Modeling of the of HTS Devices: How Accurate do Models Really Need to Be?
Numerical models for computing the effective critical current of devices made
of HTS tapes require the knowledge of the Jc(B,theta) dependence, i.e. of the
way the critical current density Jc depends on the magnetic flux density B and
its orientation theta with respect to the tape. In this paper we present a
numerical model based on the critical state with angular field dependence of Jc
to extract the Jc(B,theta) relation from experimental data. The model takes
into account the self-field created by the tape, which gives an important
contribution when the field applied in the experiments is low. The same model
can also be used to compute the effective critical current of devices composed
of electromagnetically interacting tapes. Three examples are considered here:
two differently current rated Roebel cables composed of REBCO coated conductors
and a power cable prototype composed of Bi-2223 tapes. The critical currents
computed with the numerical model show good agreement with the measured ones.
The simulations reveal also that several parameter sets in the Jc(B,theta) give
an equally good representation of the experimental characterization of the
tapes and that the measured Ic values of cables are subjected to the influence
of experimental conditions, such as Ic degradation due to the manufacturing and
assembling process and non-uniformity of the tape properties. These two aspects
make the determination of a very precise Jc(B,theta) expression probably
unnecessary, as long as that expression is able to reproduce the main features
of the angular dependence. The easiness of use of this model, which can be
straightforwardly implemented in finite-element programs able to solve static
electromagnetic problems, is very attractive both for researchers and devices
manufactures who want to characterize superconducting tapes and calculate the
effective critical current of superconducting devices
Further Results on the Power of Generating APCol Systems
In this paper we continue our investigations in APCol systems (Automatonlike
P colonies), variants of P colonies where the environment of the agents is given by a
string and the functioning of the system resembles to the functioning of standard nite
automaton. We rst deal with the concept of determinism in these systems and compare
deterministic APCol systems with deterministic register machines. Then we focus on
generating non-deterministic APCol systems with only one agent. We show that these
systems are as powerful as 0-type grammars, i.e., generate any recursively enumerable
language. If the APCol system is non-erasing, then any context-sensitive language can
be generated by a non-deterministic APCol systems with only one agent
- …