1,986 research outputs found
Steady-State Analysis of Load Balancing with Coxian- Distributed Service Times
This paper studies load balancing for many-server ( servers) systems. Each
server has a buffer of size and can have at most one job in service and
jobs in the buffer. The service time of a job follows the Coxian-2
distribution. We focus on steady-state performance of load balancing policies
in the heavy traffic regime such that the normalized load of system is for We identify a set of policies that
achieve asymptotic zero waiting. The set of policies include several classical
policies such as join-the-shortest-queue (JSQ), join-the-idle-queue (JIQ),
idle-one-first (I1F) and power-of--choices (Po) with . The proof of the main result is based on Stein's method and state space
collapse. A key technical contribution of this paper is the iterative state
space collapse approach that leads to a simple generator approximation when
applying Stein's method
Time and position sensitive single photon detector for scintillator read-out
We have developed a photon counting detector system for combined neutron and
gamma radiography which can determine position, time and intensity of a
secondary photon flash created by a high-energy particle or photon within a
scintillator screen. The system is based on a micro-channel plate
photomultiplier concept utilizing image charge coupling to a position- and
time-sensitive read-out anode placed outside the vacuum tube in air, aided by a
standard photomultiplier and very fast pulse-height analyzing electronics. Due
to the low dead time of all system components it can cope with the high
throughput demands of a proposed combined fast neutron and dual discrete energy
gamma radiography method (FNDDER). We show tests with different types of
delay-line read-out anodes and present a novel pulse-height-to-time converter
circuit with its potential to discriminate gamma energies for the projected
FNDDER devices for an automated cargo container inspection system (ACCIS).Comment: Proceedings of FNDA 201
The Parity Bit in Quantum Cryptography
An -bit string is encoded as a sequence of non-orthogonal quantum states.
The parity bit of that -bit string is described by one of two density
matrices, and , both in a Hilbert space of
dimension . In order to derive the parity bit the receiver must
distinguish between the two density matrices, e.g., in terms of optimal mutual
information. In this paper we find the measurement which provides the optimal
mutual information about the parity bit and calculate that information. We
prove that this information decreases exponentially with the length of the
string in the case where the single bit states are almost fully overlapping. We
believe this result will be useful in proving the ultimate security of quantum
crytography in the presence of noise.Comment: 19 pages, RevTe
PENGARUH CAMPURAN BAHAN BAKAR PREMIUM-HIDROGEN -ETANOL 99% TERHADAP PERFORMANSI MESIN GENSET OTTO
Penelitian ini dilatarbelakangi oleh kelangkaan minyak yang terus-menerus terjadi, yang dimana manusia disadarkan bahwa cadangan minyak bumi dunia semakin menipis, sementara itu pemakaiannya terus meningkat. Untuk itulah diperlukan energi alternatif yang sumbernya tidak akan pernah mengalami kelangkaan. Adalah etanol dan hidrogen yang merupakan bahan bakar yang berasal dari sumber yang tak terbatas. Selama lahan masih ada etanol akan terus dapat diproduksi dan selama lautan masih menutupi dunia ini selama itu hidrogen juga dapat diproduksi. Tujuan penelitian ini adalah mengetahui perbandingan performansi dan emisi gas buang dari mesin genset Otto 4-langkah merk STARKE Tipe GFH1900LX dengan menggunakan bahan bakar premium, etanol, campuran premium-etanol dan campuran premium-etanol-hidrogen. Penelitian ini dilakukan dengan cara menimbang bahan bakar. Kemudian, memberikan beban pada mesin genset yang telah dihidupkan, tegangan dan kuat arus diukur dengan multimeter, putaran diukur dengan tachometer dan waktu habis bahan bakar dihitung dengan stopwatch, kemudian data dianalisa. Adapun hasil penelitian ini terlihat bahwa hasil performansi dari mesin genset terlihat cukup baik. Seperti daya yang dihasilkan dapat terpenuhi hingga beban 1000 watt kecuali pada etanol hanya sebatas 600 watt saja. Dan untuk penghasilan daya optimum itu pada masing-masing bahan bakar didapat perbandinga Sfc yaitu premium 100% sebesar 923,6453 g/kw.jam, etanol 99% sebesar 1404,878 g/kw.jam, campuran premium 75%+etanol 25% sebesar 940,7666 g/kw.jam dan campuran (premium 75% +etanol 99%) 97,5% + Hidrogen 2,5% sebesar 836,2369 g/kw.jam. yang menandakan bahwa campuran hidrogen membuat bahan bakar campuran menjadi lebih hemat
Design approaches in technology enhanced learning
Design is a critical to the successful development of any interactive learning environment (ILE). Moreover, in technology enhanced learning (TEL), the design process requires input from many diverse areas of expertise. As such, anyone undertaking tool development is required to directly address the design challenge from multiple perspectives. We provide a motivation and rationale for design approaches for learning technologies that draws upon Simon's seminal proposition of Design Science (Simon, 1969). We then review the application of Design Experiments (Brown, 1992) and Design Patterns (Alexander et al., 1977) and argue that a patterns approach has the potential to address many of the critical challenges faced by learning technologists
Quantum key distribution via quantum encryption
A quantum key distribution protocol based on quantum encryption is presented
in this Brief Report. In this protocol, the previously shared
Einstein-Podolsky-Rosen pairs act as the quantum key to encode and decode the
classical cryptography key. The quantum key is reusable and the eavesdropper
cannot elicit any information from the particle Alice sends to Bob. The concept
of quantum encryption is also discussed.Comment: 4 Pages, No Figure. Final version to appear in PR
Quantum Nonlocality without Entanglement
We exhibit an orthogonal set of product states of two three-state particles
that nevertheless cannot be reliably distinguished by a pair of separated
observers ignorant of which of the states has been presented to them, even if
the observers are allowed any sequence of local operations and classical
communication between the separate observers. It is proved that there is a
finite gap between the mutual information obtainable by a joint measurement on
these states and a measurement in which only local actions are permitted. This
result implies the existence of separable superoperators that cannot be
implemented locally. A set of states are found involving three two-state
particles which also appear to be nonmeasurable locally. These and other
multipartite states are classified according to the entropy and entanglement
costs of preparing and measuring them by local operations.Comment: 27 pages, Latex, 6 ps figures. To be submitted to Phys. Rev. A.
Version 2: 30 pages, many small revisions and extensions, author added.
Version 3: Proof in Appendix D corrected, many small changes; final version
for Phys. Rev. A Version 4: Report of Popescu conjecture modifie
Quantum Eavesdropping without Interception: An Attack Exploiting the Dead Time of Single Photon Detectors
The security of quantum key distribution (QKD) can easily be obscured if the
eavesdropper can utilize technical imperfections of the actual implementation.
Here we describe and experimentally demonstrate a very simple but highly
effective attack which even does not need to intercept the quantum channel at
all. Only by exploiting the dead time effect of single photon detectors the
eavesdropper is able to gain (asymptotically) full information about the
generated keys without being detected by state-of-the-art QKD protocols. In our
experiment, the eavesdropper inferred up to 98.8% of the key correctly, without
increasing the bit error rate between Alice and Bob significantly. Yet, we find
an evenly simple and effective countermeasure to inhibit this and similar
attacks
Quantum Cryptography with Coherent States
The safety of a quantum key distribution system relies on the fact that any
eavesdropping attempt on the quantum channel creates errors in the
transmission. For a given error rate, the amount of information that may have
leaked to the eavesdropper depends on both the particular system and the
eavesdropping strategy. In this work, we discuss quantum cryptographic
protocols based on the transmission of weak coherent states and present a new
system, based on a symbiosis of two existing ones, and for which the
information available to the eavesdropper is significantly reduced. This system
is therefore safer than the two previous ones. We also suggest a possible
experimental implementation.Comment: 20 pp. Revtex, Figures available from the authors upon request, To be
published in PRA (March 95
First report of porcine respirovirus 1 in South America.
Porcine respirovirus 1 (PRV1) is an emerging virus in pigs that has been previously described in the USA and China. There are no reports of its presence in the rest of the world. The objective of this study was to determine the occurrence of PRV1 in Chile and to determine its phylogeny. Thus, we collected samples (oral fluids, nasal swabs, and lungs) from a swine influenza A virus (IAV) surveillance program, most of which belonged to pigs with respiratory disease. The samples were analyzed by RT-PCR, and the viral sequencing was obtained using RNA whole-genome sequencing approach. Maximum likelihood phylogeny was constructed with the available references. Thirty-one of 164 samples (18.9 %) were RT-PCR positive for PRV1: 62.5 % oral fluids, 19.0 % nasal swabs, and 8.6 % lungs. All 6 farms in this study had at least one positive sample, with 6-40 % of positive results per farm, which suggests that PRV1 is disseminated in Chilean swine farms. Twenty-one of 31 (677%) PRV1-positive samples were also positive for IAV, so the role of PRV1 as secondary pathogen in respiratory disease needs to be further evaluated. Near to complete genome of two PRV1s were obtained from two farms. The phylogenies, in general, showed low bootstrap support, except the concatenated genome and the L gene trees which showed clustering of the Chilean PRV1 with Asian sequences, suggesting a close genetic relationship. This is the first report of PRV1 in the Southern Hemisphere. Further studies are necessary to determine the genetic diversity of this virus in Chile
- âŠ