1,150 research outputs found

    NFaaS: Named Function as a Service

    Get PDF
    In the past, the Information-centric networking (ICN) community has focused on issues mainly pertaining to traditional content delivery (e.g., routing and forwarding scalability, congestion control and in-network caching). However, to keep up with future Internet architectural trends the wider area of future Internet paradigms, there is a pressing need to support edge/fog computing environments, where cloud functionality is available more proximate to where the data is generated and needs processing. With this goal in mind, we propose Named Function as a Service (NFaaS), a framework that extends the Named Data Networking architecture to support in-network function execution. In contrast to existing works, NFaaSbuilds on very lightweight VMs and allows for dynamic execution of custom code. Functions can be downloaded and run by any node in the network. Functions can move between nodes according to user demand, making resolution of moving functions a first-class challenge. NFaaSincludes a Kernel Store component, which is responsible not only for storing functions, but also for making decisions on which functions to run locally. NFaaSincludes a routing protocol and a number of forwarding strategies to deploy and dynamically migrate functions within the network. We validate our design through extensive simulations, which show that delay-sensitive functions are deployed closer to the edge, while less delay-sensitive ones closer to the core

    Modelling and experiments of self-reflectivity under femtosecond ablation conditions

    Full text link
    We present a numerical model which describes the propagation of a single femtosecond laser pulse in a medium of which the optical properties dynamically change within the duration of the pulse. We use a Finite Difference Time Domain (FDTD) method to solve the Maxwell's equations coupled to equations describing the changes in the material properties. We use the model to simulate the self-reflectivity of strongly focused femtosecond laser pulses on silicon and gold under laser ablation condition. We compare the simulations to experimental results and find excellent agreement.Comment: 11 pages, 8 figure

    Applying Cognitive Control Modes to Identify Security Fatigue Hotspots

    Get PDF
    Security tasks can burden the individual, to the extent that security fatigue promotes habits that undermine security. Here we revisit a series of user-centred studies which focus on security mechanisms as part of regular routines, such as two-factor authentication. By examining routine security behaviours, these studies expose perceived contributors and consequences of security fatigue, and the strategies that a person may adopt when feeling overburdened by security. Behaviours and strategies are framed according to a model of cognitive control modes, to explore the role of human performance and error in producing security fatigue. Security tasks are then considered in terms of modes such as unconscious routines and knowledge-based ad-hoc approaches. Conscious attention can support adaptation to novel security situations, but is error-prone and tiring; both simple security routines and technology-driven automation can minimise effort, but may miss cues from the environment that a nuanced response is required

    Photocurrent Enhancement by Spontaneous Formation of a p n Junction in Calcium Doped Bismuth Vanadate Photoelectrodes

    Get PDF
    The application of bismuth vanadate BiVO4 photoelectrodes for solar water splitting is hindered by the poor carrier transport. To overcome this, multiple donor doping strategies e.g. dual doping, gradient doping have been explored. Here, we show for the first time the successful introduction of calcium Ca as an acceptor type dopant into BiVO4 photoelectrodes. Interestingly, instead of generating cathodic photocurrents, the Ca doped BiVO4 photoelectrodes show anodic photocurrents with an enhanced carrier separation efficiency. Hard X ray photoelectron spectroscopy HAXPES shows that this enhancement is caused by out diffusion of Ca during the deposition process, which spontaneously creates a p n junction within the BiVO4 layer. Overall, a significant two fold improvement of the AM1.5 photocurrent is obtained upon Ca doping. This study highlights the importance of controlled doping beyond simply modifying carrier concentration and may enable new device architectures in photoelectrode material

    Eastern Asian emissions of anthropogenic halocarbons deduced from aircraft concentration data

    Get PDF
    The Montreal Protocol restricts production of ozone-depleting halocarbons worldwide. Enforcement of the protocol has relied mainly on annual government statistics of production and consumption of these compounds (bottom-up approach). We show here that aircraft observations of halocarbon:CO enhancement ratios on regional to continental scales can be used to infer halocarbon emissions, providing independent verification of the bottom-up approach. We apply this top-down approach to aircraft observations of Asian outflow from the TRACE-P mission over the western Pacific (March April 2001) and derive emissions from eastern Asia (China, Japan, and Korea). We derive an eastern Asian carbon tetrachloride (CCl ) source of 21.5 Gg yr , several-fold larger than previous estimates and amounting to 30% of the global budget for this gas. Our emission estimate for CFC-11 from eastern Asia is 50% higher than inventories derived from manufacturing records. Our emission estimates for methyl chloroform (CH ) and CFC-12 are in agreement with existing inventories. For halon 1211 we find only a strong local source originating from the Shanghai area. Our emission estimates for the above gases result in a 40% increase in the ozone depletion potential (ODP) of Asian emissions relative to previous estimates, corresponding to a 10% global increase in ODP

    DEEM: Enabling microservices via DEvice edge markets

    Get PDF
    Native applications running over handheld devices have an irreplaceable role in users' daily activities. That said, recent studies show that users download on average zero new applications on monthly basis, which suggests that new apps can face discoverability issues. In this work, we aim for a web-based, download/installation-free access to native application features through microservices (μ Services)that are shared between user devices in a peer-to-peer (P2P)manner. Such a P2P approach is self-scalable and requires no investment for μ Service deployment, unlike mobile edge computing or Data Centre. We introduce DEEM, a DEvice Edge Market design that enables device-hosted μServices to end-users. In DEEM, μ Service-based markets act as rendezvous points between available μ Service instances and clients. DEEM ensures the i) assignment of instances to the users that value them the most, in terms of QoS gain, and ii) devices' income maximisation. Our evaluation on synthetic settings demonstrates DEEM's capability in exploiting the pool of device instances for improving the application QoS in terms of latency

    Efficient decomposition of unitary matrices in quantum circuit compilers

    Full text link
    Unitary decomposition is a widely used method to map quantum algorithms to an arbitrary set of quantum gates. Efficient implementation of this decomposition allows for translation of bigger unitary gates into elementary quantum operations, which is key to executing these algorithms on existing quantum computers. The decomposition can be used as an aggressive optimization method for the whole circuit, as well as to test part of an algorithm on a quantum accelerator. For selection and implementation of the decomposition algorithm, perfect qubits are assumed. We base our decomposition technique on Quantum Shannon Decomposition which generates O((3/4)*4^n) controlled-not gates for an n-qubit input gate. The resulting circuits are up to 10 times shorter than other methods in the field. When comparing our implementation to Qubiter, we show that our implementation generates circuits with half the number of CNOT gates and a third of the total circuit length. In addition to that, it is also up to 10 times as fast. Further optimizations are proposed to take advantage of potential underlying structure in the input or intermediate matrices, as well as to minimize the execution time of the decomposition.Comment: 13 page

    Biosimilar G-CSF versus filgrastim and lenograstim in healthy unrelated volunteer hematopoietic stem cell donors

    No full text
    The World Marrow Donor Organization recommends original granulocyte-colony stimulating factor (G-CSF) for the mobilization of stem cells in healthy unrelated hematopoietic stem cell donors. We report the comparison of a biosimilar G-CSF (Zarzio) with two original G-CSFs (filgrastim and lenograstim) in mobilization in unrelated donors. We included data of 313 consecutive donors who were mobilized during the period from October 2014 to March 2016 at the Medical University of Warsaw. The primary endpoints of this study were the efficiency of CD34+ cell mobilization to the circulation and results of the first apheresis. The mean daily dose of G-CSF was 9.1 μg/kg for lenograstim, 9.8 μg/kg for biosimilar filgrastim, and 9.3 μg/kg for filgrastim (p < 0.001). The mean CD34+ cell number per microliter in the blood before the first apheresis was 111 for lenograstim, 119 for biosimilar filgrastim, and 124 for filgrastim (p = 0.354); the mean difference was even less significant when comparing CD34+ number per dose of G-CSF per kilogram (p = 0.787). Target doses of CD34+ cells were reached with one apheresis in 87% donors mobilized with lenograstim and in 93% donors mobilized with original and biosimilar filgrastim (p = 0.005). The mobilized apheresis outcomes (mean number of CD34+ cells/kg of donor collected during the first apheresis) was similar with lenograstim, biosimilar filgrastim, and filgrastim: 6.2 × 10⁶, 7.6 × 10⁶, and 7.3 × 10⁶, respectively, p = 0.06. There was no mobilization failure in any of the donors. Biosimilar G-CSF is as effective in the mobilization of hematopoietic stem cells in unrelated donors as original G-CSFs. Small and clinically irrelevant differences seen in the study can be attributed to differences in G-CSF dose and collection-related factors. Active safety surveillance concurrent to clinical use and reporting to donor outcome registry (e.g., EBMT donor outcome registry or WMDA SEAR/SPEAR) might help to evaluate the possible short- and long-term complications of biosimilar G-CSF
    corecore