1,986 research outputs found

    Steady-State Analysis of Load Balancing with Coxian-22 Distributed Service Times

    Full text link
    This paper studies load balancing for many-server (NN servers) systems. Each server has a buffer of size b−1,b-1, and can have at most one job in service and b−1b-1 jobs in the buffer. The service time of a job follows the Coxian-2 distribution. We focus on steady-state performance of load balancing policies in the heavy traffic regime such that the normalized load of system is λ=1−N−α\lambda = 1 - N^{-\alpha} for 0<α<0.5.0<\alpha<0.5. We identify a set of policies that achieve asymptotic zero waiting. The set of policies include several classical policies such as join-the-shortest-queue (JSQ), join-the-idle-queue (JIQ), idle-one-first (I1F) and power-of-dd-choices (Podd) with d=O(Nαlog⁥N)d=O(N^\alpha\log N). The proof of the main result is based on Stein's method and state space collapse. A key technical contribution of this paper is the iterative state space collapse approach that leads to a simple generator approximation when applying Stein's method

    Time and position sensitive single photon detector for scintillator read-out

    Full text link
    We have developed a photon counting detector system for combined neutron and gamma radiography which can determine position, time and intensity of a secondary photon flash created by a high-energy particle or photon within a scintillator screen. The system is based on a micro-channel plate photomultiplier concept utilizing image charge coupling to a position- and time-sensitive read-out anode placed outside the vacuum tube in air, aided by a standard photomultiplier and very fast pulse-height analyzing electronics. Due to the low dead time of all system components it can cope with the high throughput demands of a proposed combined fast neutron and dual discrete energy gamma radiography method (FNDDER). We show tests with different types of delay-line read-out anodes and present a novel pulse-height-to-time converter circuit with its potential to discriminate gamma energies for the projected FNDDER devices for an automated cargo container inspection system (ACCIS).Comment: Proceedings of FNDA 201

    The Parity Bit in Quantum Cryptography

    Get PDF
    An nn-bit string is encoded as a sequence of non-orthogonal quantum states. The parity bit of that nn-bit string is described by one of two density matrices, ρ0(n)\rho_0^{(n)} and ρ1(n)\rho_1^{(n)}, both in a Hilbert space of dimension 2n2^n. In order to derive the parity bit the receiver must distinguish between the two density matrices, e.g., in terms of optimal mutual information. In this paper we find the measurement which provides the optimal mutual information about the parity bit and calculate that information. We prove that this information decreases exponentially with the length of the string in the case where the single bit states are almost fully overlapping. We believe this result will be useful in proving the ultimate security of quantum crytography in the presence of noise.Comment: 19 pages, RevTe

    PENGARUH CAMPURAN BAHAN BAKAR PREMIUM-HIDROGEN -ETANOL 99% TERHADAP PERFORMANSI MESIN GENSET OTTO

    Get PDF
    Penelitian ini dilatarbelakangi oleh kelangkaan minyak yang terus-menerus terjadi, yang dimana manusia disadarkan bahwa cadangan minyak bumi dunia semakin menipis, sementara itu pemakaiannya terus meningkat. Untuk itulah diperlukan energi alternatif yang sumbernya tidak akan pernah mengalami kelangkaan. Adalah etanol dan hidrogen yang merupakan bahan bakar yang berasal dari sumber yang tak terbatas. Selama lahan masih ada etanol akan terus dapat diproduksi dan selama lautan masih menutupi dunia ini selama itu hidrogen juga dapat diproduksi. Tujuan penelitian ini adalah mengetahui perbandingan performansi dan emisi gas buang dari mesin genset Otto 4-langkah merk STARKE Tipe GFH1900LX dengan menggunakan bahan bakar premium, etanol, campuran premium-etanol dan campuran premium-etanol-hidrogen. Penelitian ini dilakukan dengan cara menimbang bahan bakar. Kemudian, memberikan beban pada mesin genset yang telah dihidupkan, tegangan dan kuat arus diukur dengan multimeter, putaran diukur dengan tachometer dan waktu habis bahan bakar dihitung dengan stopwatch, kemudian data dianalisa. Adapun hasil penelitian ini terlihat bahwa hasil performansi dari mesin genset terlihat cukup baik. Seperti daya yang dihasilkan dapat terpenuhi hingga beban 1000 watt kecuali pada etanol hanya sebatas 600 watt saja. Dan untuk penghasilan daya optimum itu pada masing-masing bahan bakar didapat perbandinga Sfc yaitu premium 100% sebesar 923,6453 g/kw.jam, etanol 99% sebesar 1404,878 g/kw.jam, campuran premium 75%+etanol 25% sebesar 940,7666 g/kw.jam dan campuran (premium 75% +etanol 99%) 97,5% + Hidrogen 2,5% sebesar 836,2369 g/kw.jam. yang menandakan bahwa campuran hidrogen membuat bahan bakar campuran menjadi lebih hemat

    Design approaches in technology enhanced learning

    Get PDF
    Design is a critical to the successful development of any interactive learning environment (ILE). Moreover, in technology enhanced learning (TEL), the design process requires input from many diverse areas of expertise. As such, anyone undertaking tool development is required to directly address the design challenge from multiple perspectives. We provide a motivation and rationale for design approaches for learning technologies that draws upon Simon's seminal proposition of Design Science (Simon, 1969). We then review the application of Design Experiments (Brown, 1992) and Design Patterns (Alexander et al., 1977) and argue that a patterns approach has the potential to address many of the critical challenges faced by learning technologists

    Quantum key distribution via quantum encryption

    Full text link
    A quantum key distribution protocol based on quantum encryption is presented in this Brief Report. In this protocol, the previously shared Einstein-Podolsky-Rosen pairs act as the quantum key to encode and decode the classical cryptography key. The quantum key is reusable and the eavesdropper cannot elicit any information from the particle Alice sends to Bob. The concept of quantum encryption is also discussed.Comment: 4 Pages, No Figure. Final version to appear in PR

    Quantum Nonlocality without Entanglement

    Get PDF
    We exhibit an orthogonal set of product states of two three-state particles that nevertheless cannot be reliably distinguished by a pair of separated observers ignorant of which of the states has been presented to them, even if the observers are allowed any sequence of local operations and classical communication between the separate observers. It is proved that there is a finite gap between the mutual information obtainable by a joint measurement on these states and a measurement in which only local actions are permitted. This result implies the existence of separable superoperators that cannot be implemented locally. A set of states are found involving three two-state particles which also appear to be nonmeasurable locally. These and other multipartite states are classified according to the entropy and entanglement costs of preparing and measuring them by local operations.Comment: 27 pages, Latex, 6 ps figures. To be submitted to Phys. Rev. A. Version 2: 30 pages, many small revisions and extensions, author added. Version 3: Proof in Appendix D corrected, many small changes; final version for Phys. Rev. A Version 4: Report of Popescu conjecture modifie

    Quantum Eavesdropping without Interception: An Attack Exploiting the Dead Time of Single Photon Detectors

    Full text link
    The security of quantum key distribution (QKD) can easily be obscured if the eavesdropper can utilize technical imperfections of the actual implementation. Here we describe and experimentally demonstrate a very simple but highly effective attack which even does not need to intercept the quantum channel at all. Only by exploiting the dead time effect of single photon detectors the eavesdropper is able to gain (asymptotically) full information about the generated keys without being detected by state-of-the-art QKD protocols. In our experiment, the eavesdropper inferred up to 98.8% of the key correctly, without increasing the bit error rate between Alice and Bob significantly. Yet, we find an evenly simple and effective countermeasure to inhibit this and similar attacks

    Quantum Cryptography with Coherent States

    Get PDF
    The safety of a quantum key distribution system relies on the fact that any eavesdropping attempt on the quantum channel creates errors in the transmission. For a given error rate, the amount of information that may have leaked to the eavesdropper depends on both the particular system and the eavesdropping strategy. In this work, we discuss quantum cryptographic protocols based on the transmission of weak coherent states and present a new system, based on a symbiosis of two existing ones, and for which the information available to the eavesdropper is significantly reduced. This system is therefore safer than the two previous ones. We also suggest a possible experimental implementation.Comment: 20 pp. Revtex, Figures available from the authors upon request, To be published in PRA (March 95

    First report of porcine respirovirus 1 in South America.

    Get PDF
    Porcine respirovirus 1 (PRV1) is an emerging virus in pigs that has been previously described in the USA and China. There are no reports of its presence in the rest of the world. The objective of this study was to determine the occurrence of PRV1 in Chile and to determine its phylogeny. Thus, we collected samples (oral fluids, nasal swabs, and lungs) from a swine influenza A virus (IAV) surveillance program, most of which belonged to pigs with respiratory disease. The samples were analyzed by RT-PCR, and the viral sequencing was obtained using RNA whole-genome sequencing approach. Maximum likelihood phylogeny was constructed with the available references. Thirty-one of 164 samples (18.9 %) were RT-PCR positive for PRV1: 62.5 % oral fluids, 19.0 % nasal swabs, and 8.6 % lungs. All 6 farms in this study had at least one positive sample, with 6-40 % of positive results per farm, which suggests that PRV1 is disseminated in Chilean swine farms. Twenty-one of 31 (677%) PRV1-positive samples were also positive for IAV, so the role of PRV1 as secondary pathogen in respiratory disease needs to be further evaluated. Near to complete genome of two PRV1s were obtained from two farms. The phylogenies, in general, showed low bootstrap support, except the concatenated genome and the L gene trees which showed clustering of the Chilean PRV1 with Asian sequences, suggesting a close genetic relationship. This is the first report of PRV1 in the Southern Hemisphere. Further studies are necessary to determine the genetic diversity of this virus in Chile
    • 

    corecore