258,212 research outputs found

    PROVIDING A FLEXIBLE AND COSTLESS SOLUTION FOR TRANSITIONAL SETS

    Get PDF
    Within this paper, we advise a manuscript upper bound privacy leakage constraint-based method of identify which intermediate data sets have to be encoded and that do not, to ensure that privacy-protecting cost could be saved as the privacy needs of information holders can nonetheless be satisfied. To be able to curtail the general expenses by staying away from frequent computation to acquire these data sets. Such situations are very common because data customers frequently reanalyze results, conduct new analysis on intermediate data sets, or share some intermediate results with other people for collaboration. Across the processing of these programs, a sizable amount of intermediate data sets is going to be produced, and frequently stored in order to save the price of computing them. Cloud computing provides massive computation power and storage capacity which enable customers to deploy computation and knowledge-intensive programs without infrastructure investment. However, protecting the privacy of intermediate data sets turns into a challenging problem because opponents may recover privacy-sensitive information by examining multiple intermediate data sets. Evaluation results show the privacy-protecting price of intermediate data sets could be considerably reduced with this approach over existing ones where all data sets are encoded. Encrypting ALL data takes hold cloud is broadly adopted in existing methods to address this concern. But we reason that encrypting all intermediate data sets are neither efficient nor cost-effective since it is very time intensive and pricey for data-intensive programs to en/decrypt data sets frequently while carrying out any operation in it. Finally, we design an operating heuristic formula accordingly to recognize the information sets that should be encoded

    Self-consistent Modeling of the IcI_c of HTS Devices: How Accurate do Models Really Need to Be?

    Full text link
    Numerical models for computing the effective critical current of devices made of HTS tapes require the knowledge of the Jc(B,theta) dependence, i.e. of the way the critical current density Jc depends on the magnetic flux density B and its orientation theta with respect to the tape. In this paper we present a numerical model based on the critical state with angular field dependence of Jc to extract the Jc(B,theta) relation from experimental data. The model takes into account the self-field created by the tape, which gives an important contribution when the field applied in the experiments is low. The same model can also be used to compute the effective critical current of devices composed of electromagnetically interacting tapes. Three examples are considered here: two differently current rated Roebel cables composed of REBCO coated conductors and a power cable prototype composed of Bi-2223 tapes. The critical currents computed with the numerical model show good agreement with the measured ones. The simulations reveal also that several parameter sets in the Jc(B,theta) give an equally good representation of the experimental characterization of the tapes and that the measured Ic values of cables are subjected to the influence of experimental conditions, such as Ic degradation due to the manufacturing and assembling process and non-uniformity of the tape properties. These two aspects make the determination of a very precise Jc(B,theta) expression probably unnecessary, as long as that expression is able to reproduce the main features of the angular dependence. The easiness of use of this model, which can be straightforwardly implemented in finite-element programs able to solve static electromagnetic problems, is very attractive both for researchers and devices manufactures who want to characterize superconducting tapes and calculate the effective critical current of superconducting devices

    Further Results on the Power of Generating APCol Systems

    Get PDF
    In this paper we continue our investigations in APCol systems (Automatonlike P colonies), variants of P colonies where the environment of the agents is given by a string and the functioning of the system resembles to the functioning of standard nite automaton. We rst deal with the concept of determinism in these systems and compare deterministic APCol systems with deterministic register machines. Then we focus on generating non-deterministic APCol systems with only one agent. We show that these systems are as powerful as 0-type grammars, i.e., generate any recursively enumerable language. If the APCol system is non-erasing, then any context-sensitive language can be generated by a non-deterministic APCol systems with only one agent
    corecore