288 research outputs found

    Coding scheme for 3D vertical flash memory

    Full text link
    Recently introduced 3D vertical flash memory is expected to be a disruptive technology since it overcomes scaling challenges of conventional 2D planar flash memory by stacking up cells in the vertical direction. However, 3D vertical flash memory suffers from a new problem known as fast detrapping, which is a rapid charge loss problem. In this paper, we propose a scheme to compensate the effect of fast detrapping by intentional inter-cell interference (ICI). In order to properly control the intentional ICI, our scheme relies on a coding technique that incorporates the side information of fast detrapping during the encoding stage. This technique is closely connected to the well-known problem of coding in a memory with defective cells. Numerical results show that the proposed scheme can effectively address the problem of fast detrapping.Comment: 7 pages, 9 figures. accepted to ICC 2015. arXiv admin note: text overlap with arXiv:1410.177

    Black Sea coastal forecasting system

    Get PDF
    The Black Sea coastal nowcasting and forecasting system was built within the framework of EU FP6 ECOOP (European COastalshelf sea OPerational observing and forecasting system) project for five regions: the south-western basin along the coasts of Bulgaria and Turkey, the north-western shelf along the Romanian and Ukrainian coasts, coastal zone around of the Crimea peninsula, the north-eastern Russian coastal zone and the coastal zone of Georgia. The system operates in the real-time mode during the ECOOP project and afterwards. The forecasts include temperature, salinity and current velocity fields. Ecosystem model operates in the off-line mode near the Crimea coast

    Algebraic Principles for Rely-Guarantee Style Concurrency Verification Tools

    Full text link
    We provide simple equational principles for deriving rely-guarantee-style inference rules and refinement laws based on idempotent semirings. We link the algebraic layer with concrete models of programs based on languages and execution traces. We have implemented the approach in Isabelle/HOL as a lightweight concurrency verification tool that supports reasoning about the control and data flow of concurrent programs with shared variables at different levels of abstraction. This is illustrated on two simple verification examples

    A model of inversion of DNA charge by a positive polymer: fractionization of the polymer charge

    Full text link
    Charge inversion of a DNA double helix by an oppositely charged flexible polyelectrolyte (PE) is considered. We assume that, in the neutral state of the DNA-PE complex, each of the DNA charges is locally compensated by a PE charge. When an additional PE molecule is adsorbed by DNA, its charge gets fractionized into monomer charges of defects (tails and arches) on the background of the perfectly neutralized DNA. These charges spread all over the DNA eliminating the self-energy of PE. This fractionization mechanism leads to a substantial inversion of the DNA charge, a phenomenon which is widely used for gene delivery.Comment: 4 pages, 2 figures. Improved figures and various corrections to tex

    Conformation of a Polyelectrolyte Complexed to a Like-Charged Colloid

    Full text link
    We report results from a molecular dynamics (MD) simulation on the conformations of a long flexible polyelectrolyte complexed to a charged sphere, \textit{both negatively charged}, in the presence of neutralizing counterions in the strong Coulomb coupling regime. The structure of this complex is very sensitive to the charge density of the polyelectrolyte. For a fully charged polyelectrolyte the polymer forms a dense two-dimensional "disk", whereas for a partially charged polyelectrolyte the monomers are spread over the colloidal surface. A mechanism involving the \textit{overcharging} of the polyelectrolyte by counterions is proposed to explain the observed conformations.Comment: 4 pages, 4 figures (6 EPS files

    Organised crime and social media; a system for detecting, corroborating and visualising weak signals of organised crime online

    Get PDF
    This paper describes an approach for detecting the presence or emergence of Organised Crime (OC) signals on Social Media. It shows how words and phrases, used by members of the public in Social Media posts, can be treated as weak signals of OC, enabling information to be classi�ed according to a taxonomy. Formal Concept Analysis (FCA) is used to group information sources, according to Crime-type and Location, thus providing a means of corroboration and creating OC Concepts that can be used to alert police analysts to the possible presence of OC. The analyst is able to `drill down' into an OC Concept of interest, discovering additional information that may be pertinent to the crime. The paper describes the implementation of this approach into a fully-functional prototype software system, incorporating a Social Media scanning system and a map-based user interface. The approach and system are illustrated using Human Tra�cking and Modern Slavery as an example. Real data is used to obtain results that show that weak signals of OC have been detected and corroborated, thus alerting to the possible presence of OC

    Tau Be or not Tau Be? - A Perspective on Service Compatibility and Substitutability

    Get PDF
    One of the main open research issues in Service Oriented Computing is to propose automated techniques to analyse service interfaces. A first problem, called compatibility, aims at determining whether a set of services (two in this paper) can be composed together and interact with each other as expected. Another related problem is to check the substitutability of one service with another. These problems are especially difficult when behavioural descriptions (i.e., message calls and their ordering) are taken into account in service interfaces. Interfaces should capture as faithfully as possible the service behaviour to make their automated analysis possible while not exhibiting implementation details. In this position paper, we choose Labelled Transition Systems to specify the behavioural part of service interfaces. In particular, we show that internal behaviours (tau transitions) are necessary in these transition systems in order to detect subtle errors that may occur when composing a set of services together. We also show that tau transitions should be handled differently in the compatibility and substitutability problem: the former problem requires to check if the compatibility is preserved every time a tau transition is traversed in one interface, whereas the latter requires a precise analysis of tau branchings in order to make the substitution preserve the properties (e.g., a compatibility notion) which were ensured before replacement.Comment: In Proceedings WCSI 2010, arXiv:1010.233
    corecore