1,160 research outputs found
NFaaS: Named Function as a Service
In the past, the Information-centric networking (ICN) community has focused on issues mainly pertaining to traditional content delivery (e.g., routing and forwarding scalability, congestion control and in-network caching). However, to keep up with future Internet architectural trends the wider area of future Internet paradigms, there is a pressing need to support edge/fog computing environments, where cloud functionality is available more proximate to where the data is generated and needs processing.
With this goal in mind, we propose Named Function as a Service (NFaaS), a framework that extends the Named Data Networking architecture to support in-network function execution. In contrast to existing works, NFaaSbuilds on very lightweight VMs and allows for dynamic execution of custom code. Functions can be downloaded and run by any node in the network. Functions can move between nodes according to user demand, making resolution of moving functions a first-class challenge. NFaaSincludes a Kernel Store component, which is responsible not only for storing functions, but also for making decisions on which functions to run locally. NFaaSincludes a routing protocol and a number of forwarding strategies to deploy and dynamically migrate functions within the network. We validate our design through extensive simulations, which show that delay-sensitive functions are deployed closer to the edge, while less delay-sensitive ones closer to the core
Modelling and experiments of self-reflectivity under femtosecond ablation conditions
We present a numerical model which describes the propagation of a single
femtosecond laser pulse in a medium of which the optical properties dynamically
change within the duration of the pulse. We use a Finite Difference Time Domain
(FDTD) method to solve the Maxwell's equations coupled to equations describing
the changes in the material properties. We use the model to simulate the
self-reflectivity of strongly focused femtosecond laser pulses on silicon and
gold under laser ablation condition. We compare the simulations to experimental
results and find excellent agreement.Comment: 11 pages, 8 figure
Applying Cognitive Control Modes to Identify Security Fatigue Hotspots
Security tasks can burden the individual, to the extent that security fatigue promotes habits that undermine security. Here we revisit a series of user-centred studies which focus on security mechanisms as part of regular routines, such as two-factor authentication. By examining routine security behaviours, these studies expose perceived contributors and consequences of security fatigue, and the strategies that a person may adopt when feeling overburdened by security. Behaviours and strategies are framed according to a model of cognitive control modes, to explore the role of human performance and error in producing security fatigue. Security tasks are then considered in terms of modes such as unconscious routines and knowledge-based ad-hoc approaches. Conscious attention can support adaptation to novel security situations, but is error-prone and tiring; both simple security routines and technology-driven automation can minimise effort, but may miss cues from the environment that a nuanced response is required
Photocurrent Enhancement by Spontaneous Formation of a p n Junction in Calcium Doped Bismuth Vanadate Photoelectrodes
The application of bismuth vanadate BiVO4 photoelectrodes for solar water splitting is hindered by the poor carrier transport. To overcome this, multiple donor doping strategies e.g. dual doping, gradient doping have been explored. Here, we show for the first time the successful introduction of calcium Ca as an acceptor type dopant into BiVO4 photoelectrodes. Interestingly, instead of generating cathodic photocurrents, the Ca doped BiVO4 photoelectrodes show anodic photocurrents with an enhanced carrier separation efficiency. Hard X ray photoelectron spectroscopy HAXPES shows that this enhancement is caused by out diffusion of Ca during the deposition process, which spontaneously creates a p n junction within the BiVO4 layer. Overall, a significant two fold improvement of the AM1.5 photocurrent is obtained upon Ca doping. This study highlights the importance of controlled doping beyond simply modifying carrier concentration and may enable new device architectures in photoelectrode material
Eastern Asian emissions of anthropogenic halocarbons deduced from aircraft concentration data
The Montreal Protocol restricts production of ozone-depleting halocarbons worldwide. Enforcement of the protocol has relied mainly on annual government statistics of production and consumption of these compounds (bottom-up approach). We show here that aircraft observations of halocarbon:CO enhancement ratios on regional to continental scales can be used to infer halocarbon emissions, providing independent verification of the bottom-up approach. We apply this top-down approach to aircraft observations of Asian outflow from the TRACE-P mission over the western Pacific (March April 2001) and derive emissions from eastern Asia (China, Japan, and Korea). We derive an eastern Asian carbon tetrachloride (CCl ) source of 21.5 Gg yr , several-fold larger than previous estimates and amounting to 30% of the global budget for this gas. Our emission estimate for CFC-11 from eastern Asia is 50% higher than inventories derived from manufacturing records. Our emission estimates for methyl chloroform (CH ) and CFC-12 are in agreement with existing inventories. For halon 1211 we find only a strong local source originating from the Shanghai area. Our emission estimates for the above gases result in a 40% increase in the ozone depletion potential (ODP) of Asian emissions relative to previous estimates, corresponding to a 10% global increase in ODP
DEEM: Enabling microservices via DEvice edge markets
Native applications running over handheld devices have an irreplaceable role in users' daily activities. That said, recent studies show that users download on average zero new applications on monthly basis, which suggests that new apps can face discoverability issues. In this work, we aim for a web-based, download/installation-free access to native application features through microservices (μ Services)that are shared between user devices in a peer-to-peer (P2P)manner. Such a P2P approach is self-scalable and requires no investment for μ Service deployment, unlike mobile edge computing or Data Centre. We introduce DEEM, a DEvice Edge Market design that enables device-hosted μServices to end-users. In DEEM, μ Service-based markets act as rendezvous points between available μ Service instances and clients. DEEM ensures the i) assignment of instances to the users that value them the most, in terms of QoS gain, and ii) devices' income maximisation. Our evaluation on synthetic settings demonstrates DEEM's capability in exploiting the pool of device instances for improving the application QoS in terms of latency
Efficient decomposition of unitary matrices in quantum circuit compilers
Unitary decomposition is a widely used method to map quantum algorithms to an
arbitrary set of quantum gates. Efficient implementation of this decomposition
allows for translation of bigger unitary gates into elementary quantum
operations, which is key to executing these algorithms on existing quantum
computers. The decomposition can be used as an aggressive optimization method
for the whole circuit, as well as to test part of an algorithm on a quantum
accelerator. For selection and implementation of the decomposition algorithm,
perfect qubits are assumed. We base our decomposition technique on Quantum
Shannon Decomposition which generates O((3/4)*4^n) controlled-not gates for an
n-qubit input gate. The resulting circuits are up to 10 times shorter than
other methods in the field. When comparing our implementation to Qubiter, we
show that our implementation generates circuits with half the number of CNOT
gates and a third of the total circuit length. In addition to that, it is also
up to 10 times as fast. Further optimizations are proposed to take advantage of
potential underlying structure in the input or intermediate matrices, as well
as to minimize the execution time of the decomposition.Comment: 13 page
Biosimilar G-CSF versus filgrastim and lenograstim in healthy unrelated volunteer hematopoietic stem cell donors
The World Marrow Donor Organization recommends original granulocyte-colony stimulating factor (G-CSF) for the mobilization of stem cells in healthy unrelated hematopoietic stem cell donors. We report the comparison of a biosimilar G-CSF (Zarzio) with two original G-CSFs (filgrastim and lenograstim) in mobilization in unrelated donors. We included data of 313 consecutive donors who were mobilized during the period from October 2014 to March 2016 at the Medical University of Warsaw. The primary endpoints of this study were the efficiency of CD34+ cell mobilization to the circulation and results of the first apheresis. The mean daily dose of G-CSF was 9.1 μg/kg for lenograstim, 9.8 μg/kg for biosimilar filgrastim, and 9.3 μg/kg for filgrastim (p < 0.001). The mean CD34+ cell number per microliter in the blood before the first apheresis was 111 for lenograstim, 119 for biosimilar filgrastim, and 124 for filgrastim (p = 0.354); the mean difference was even less significant when comparing CD34+ number per dose of G-CSF per kilogram (p = 0.787). Target doses of CD34+ cells were reached with one apheresis in 87% donors mobilized with lenograstim and in 93% donors mobilized with original and biosimilar filgrastim (p = 0.005). The mobilized apheresis outcomes (mean number of CD34+ cells/kg of donor collected during the first apheresis) was similar with lenograstim, biosimilar filgrastim, and filgrastim: 6.2 × 10⁶, 7.6 × 10⁶, and 7.3 × 10⁶, respectively, p = 0.06. There was no mobilization failure in any of the donors. Biosimilar G-CSF is as effective in the mobilization of hematopoietic stem cells in unrelated donors as original G-CSFs. Small and clinically irrelevant differences seen in the study can be attributed to differences in G-CSF dose and collection-related factors. Active safety surveillance concurrent to clinical use and reporting to donor outcome registry (e.g., EBMT donor outcome registry or WMDA SEAR/SPEAR) might help to evaluate the possible short- and long-term complications of biosimilar G-CSF
- …