752 research outputs found

    Active Queue Management for Fair Resource Allocation in Wireless Networks

    Get PDF
    This paper investigates the interaction between end-to-end flow control and MAC-layer scheduling on wireless links. We consider a wireless network with multiple users receiving information from a common access point; each user suffers fading, and a scheduler allocates the channel based on channel quality,but subject to fairness and latency considerations. We show that the fairness property of the scheduler is compromised by the transport layer flow control of TCP New Reno. We provide a receiver-side control algorithm, CLAMP, that remedies this situation. CLAMP works at a receiver to control a TCP sender by setting the TCP receiver's advertised window limit, and this allows the scheduler to allocate bandwidth fairly between the users

    Comparing axiomatizations of free pseudospaces

    Get PDF
    Independently and pursuing different aims, Hrushovski and Srour (On stable non-equational theories. Unpublished manuscript, 1989) and Baudisch and Pillay (J Symb Log 65(1):443–460, 2000) have introduced two free pseudospaces that generalize the well know concept of Lachlan’s free pseudoplane. In this paper we investigate the relationship between these free pseudospaces, proving in particular, that the pseudospace of Baudisch and Pillay is a reduct of the pseudospace of Hrushovski and Srour

    Cloud computing for small business: Criminal and security threats and prevention measures

    Get PDF
    Cloud computing refers to the delivery of computer processing infrastructure, operating systems, software and data storage over Internet-based public or private computer networks. The aim is to relieve users of some of the burdens associated with maintaining computers and data storage, while enabling the associated costs to be reduced. Although cloud computing is still developing in popularity and coverage, its use raises a number of crime and security concerns, particularly for small business users. This paper charts the nature of these concerns for small business and reviews the detection, prevention and mitigation measures that may be implemented by small business users and cloud service providers to minimise or negate the risks identified

    Billiard-ball paradox for a quantum wave packet

    Full text link
    Past studies of the billiard-ball paradox, a problem involving an object that travels back in time along a closed timelike curve (CTC), typically concern themselves with entirely classical histories, whereby any trajectorial effects associated with quantum mechanics cannot manifest. Here we develop a quantum version of the paradox, wherein a (semiclassical) wave packet evolves through a region containing a wormhole time machine. This is accomplished by mapping all relevant paths on to a quantum circuit, in which the distinction of the various paths is facilitated by representing the billiard particle with a clock state. For this model, we find that the Deutsch model (D-CTCs) provides self-consistent solutions in the form of a mixed state composed of terms which represent every possible configuration of the particle's evolution through the circuit. In the equivalent circuit picture (ECP), this reduces to a binomial distribution in the number of loops of time machine. The postselected teleportation (P-CTCs) prescription on the other hand predicts a pure-state solution in which the loop counts have binomial coefficient weights. We then discuss the model in the continuum limit, with a particular focus on the various methods one may employ in order to guarantee convergence in the average number of clock evolutions. Specifically, for D-CTCs, we find that it is necessary to regularise the theory's parameters, while P-CTCs alternatively require more contrived modification.Comment: 18 pages, 9 figure

    Using velocity to predict the maximum dynamic strength in the power clean

    Get PDF
    The primary aim of the present study was to examine the commonly performed training exercise for athlete preparation. Twenty-two recreationally trained males (age: 26.3 ± 4.1 y, height: 1.80 ± 0.07 m; body mass (BM): 87.01 ± 13.75 kg, 1-repetitoon maximum(1-RM)/BM: 0.90 ± 0.19 kg) participated in the present study. All subjects had their 1-RM power clean tested with standard procedures. On a separate testing day, subjects performed three repetitions at 30% and 45%, and two repetitions at 70% and 80% of their 1-RM power clean. During all trials during both sessions, peak velocity (PV) and mean velocity (MV) were measured with the use of a GymAware device. There were no significant differences between the actual and estimated 1-RM power clean (p = 0.37, ES = —0.11) when the load-PV profile was utilized. There was a large typical error (TE) present for the load-PV- and load-MV-estimated 1-RM values. Additionally, the raw TE exceeded the smallest worthwhile change for both load-PV and load-MV profile results. Based upon the results of this study, the load-velocity profile is not an acceptable tool for monitoring power clean strength

    Longitudinal Analysis of Tactical Strategy in the Men's Division of the Ultimate Fighting Championship

    Get PDF
    This study explored longitudinal changes in contemporary mixed martial arts (MMA) combat within the Ultimate Fighting Championship (UFC). A secondary aim was to investigate how bout duration influences the contribution of performance indicators on outcome. Data were acquired via the official analytics provider to the UFC (FightMetric). Male fights with a winner from between 2000 and 2015 (n = 2,831) were examined, with 13 common performance indicators attained during each round for each participant along with duration (min) and year of fight. Non-metric dimensional scaling (nMDS) was used to examine bout characteristics by year. The Repeated Incremental Pruning to Produce Error Reduction (RIPPER) algorithm was run to determine a set of rules to explain bout outcome. The nMDS displayed that winning bout performance indicator attributes were dissimilar across the years. Eight rules were generated from the RIPPER, with fight duration featuring in three of eight rules. Distinct shifts occurred (albeit without linear trend) in performance indicator characteristics during the observed period. This was characterized by a more diverse combat style in the years following 2008. However, offensive grappling has remained a key factor regardless of year, and is influenced by bout duration

    Observation of the dynamic Jahn-Teller effect in the excited states of nitrogen-vacancy centers in diamond

    Full text link
    The optical transition linewidth and emission polarization of single nitrogen-vacancy (NV) centers are measured from 5 K to room temperature. Inter-excited state population relaxation is shown to broaden the zero-phonon line and both the relaxation and linewidth are found to follow a T^5 dependence for T up to 100 K. This dependence indicates that the dynamic Jahn-Teller effect is the dominant dephasing mechanism for the NV optical transitions at low temperatures

    TgCDPK3 Regulates Calcium-Dependent Egress of Toxoplasma gondii from Host Cells

    No full text
    The phylum Apicomplexa comprises a group of obligate intracellular parasites of broad medical and agricultural significance, including Toxoplasma gondii and the malaria-causing Plasmodium spp. Key to their parasitic lifestyle is the need to egress from an infected cell, actively move through tissue, and reinvade another cell, thus perpetuating infection. Ca(2+)-mediated signaling events modulate key steps required for host cell egress, invasion and motility, including secretion of microneme organelles and activation of the force-generating actomyosin-based motor. Here we show that a plant-like Calcium-Dependent Protein Kinase (CDPK) in T. gondii, TgCDPK3, which localizes to the inner side of the plasma membrane, is not essential to the parasite but is required for optimal in vitro growth. We demonstrate that TgCDPK3, the orthologue of Plasmodium PfCDPK1, regulates Ca(2+) ionophore- and DTT-induced host cell egress, but not motility or invasion. Furthermore, we show that targeting to the inner side of the plasma membrane by dual acylation is required for its activity. Interestingly, TgCDPK3 regulates microneme secretion when parasites are intracellular but not extracellular. Indeed, the requirement for TgCDPK3 is most likely determined by the high K(+) concentration of the host cell. Our results therefore suggest that TgCDPK3's role differs from that previously hypothesized, and rather support a model where this kinase plays a role in rapidly responding to Ca(2+) signaling in specific ionic environments to upregulate multiple processes required for gliding motility.This work was supported by the National Health and Medical Research Council (NHMRC) Project Grant APP1025598. JMM is supported by a Australian Postgraduate Award, GGvD is supported by an Australian Research Council QEII Fellowship and CJT is supported by an NHMRC Career Development Award. This work was also made possible through Victorian State Government Operational Infrastructure Support and Australian Government NHMRC IRIISS. The funders had no role in study design, data collection and analysis, decision to publish, or preparation of the manuscript
    corecore