1,475 research outputs found

    CloudAISim: A toolkit for modelling and simulation of modern applications in al-driven cloud computing environments

    Get PDF
    There is a very significant knowledge gap between Artificial Intelligence (AI) and a multitude of industries that exist in todayā€™s modern world. This is primarily attributable to the limited availability of resources and technical expertise. However, a major obstacle is that AI needs to be flexible enough to work in many different applications, utilising a wide variety of datasets through cloud computing. As a result, we developed a benchmark toolkit called CloudAISim to make use of the power of AI and cloud computing in order to satisfy the requirements of modern applications. The goal of this study is to come up with a strategy for building a bridge so that AI can be utilised in order to assist those who are not very knowledgeable about technological advancements. In addition, we modelled a healthcare application as a case study in order to verify the scientific reliability of the CloudAISim toolkit and simulated it in a cloud computing environment using Google Cloud Functions to increase its real-time efficiency. A non-expert-friendly interface built with an interactive web app has also been developed. Any user without any technical knowledge can operate the entire model, which has a 98% accuracy rate. The proposed use case is designed to put AI to work in the healthcare industry, but CloudAISim would be useful and adaptable for other applications in the future

    Design and Implementation of Secure Location Service Using Software Engineering Approach in the Age of Industry 4.0

    Get PDF
    Data privacy and security are major concerns in any location-based system. In majority of location-based systems, data security is ensured via data replacement policies. Data replacement or hiding policy requires additional measures for providing required security standards for Industry 4.0. Whereas, cryptography primitives and protocols are integral part of any network and can be re-used for ensuring userā€™s locations in Industry 4.0 based applications. In this work, an application has been designed and developed that used RSA encryption/decryption algorithm for ensuring location dataā€™s confidentiality. The proposed system is distributed in nature and gives access to locationā€™s information after users get authenticated and authorized. In the proposed system, a threshold-based subset mechanism is adopted for keys and their storage. Server is designed to securely store the location information for clients and provide this information to those set of clients or users who are able to verify sum of subset of keys. This work has elaborated the location-based data confidentiality designs in a distributed client/server environment and presented the in-depth system working with different flow diagrams. The command line and graphical User Interface (GUI)-based implementation shows that the proposed system is capable of working with standard system requirements (i5 processor, 4Ā GB RAM and 64-bits operating system). In addition to location information, system is able to provide much important information (including IP address, timestamp, time to access, hop count) that enhances the overall system capabilities

    Excitations in the deformed D1D5 CFT

    Get PDF
    We perform some simple computations for the first order deformation of the D1D5 CFT off its orbifold point. It had been shown earlier that under this deformation the vacuum state changes to a squeezed state (with the further action of a supercharge). We now start with states containing one or two initial quanta and write down the corresponding states obtained under the action of deformation operator. The result is relevant to the evolution of an initial excitation in the CFT dual to the near extremal D1D5 black hole: when a left and a right moving excitation collide in the CFT, the deformation operator spreads their energy over a larger number of quanta, thus evolving the state towards the infrared.Comment: 26 pages, Latex, 4 figure

    Deforming the D1D5 CFT away from the orbifold point

    Get PDF
    The D1D5 brane bound state is believed to have an `orbifold point' in its moduli space which is the analogue of the free Yang Mills theory for the D3 brane bound state. The supergravity geometry generated by D1 and D5 branes is described by a different point in moduli space, and in moving towards this point we have to deform the CFT by a marginal operator: the `twist' which links together two copies of the CFT. In this paper we find the effect of this deformation operator on the simplest physical state of the CFT -- the Ramond vacuum. The twist deformation leads to a final state that is populated by pairs of excitations like those in a squeezed state. We find the coefficients characterizing the distribution of these particle pairs (for both bosons and fermions) and thus write this final state in closed form.Comment: 30 pages, 4 figures, Late

    Emission from the D1D5 CFT: Higher Twists

    Full text link
    We study a certain class of nonextremal D1D5 geometries and their ergoregion emission. Using a detailed CFT computation and the formalism developed in arXiv:0906.2015 [hep-th], we compute the full spectrum and rate of emission from the geometries and find exact agreement with the gravity answer. Previously, only part of the spectrum had been reproduced using a CFT description. We close with a discussion of the context and significance of the calculation.Comment: 39 pages, 6 figures, late

    DNA binding induces active site conformational change in the human TREX2 3ā€²-exonuclease

    Get PDF
    The TREX enzymes process DNA as the major 3ā€²ā†’5ā€² exonuclease activity in mammalian cells. TREX2 and TREX1 are members of the DnaQ family of exonucleases and utilize a two metal ion catalytic mechanism of hydrolysis. The structure of the dimeric TREX2 enzyme in complex with single-stranded DNA has revealed binding properties that are distinct from the TREX1 protein. The TREX2 protein undergoes a conformational change in the active site upon DNA binding including ordering of active site residues and a shift of an active site helix. Surprisingly, even when a single monomer binds DNA, both monomers in the dimer undergo the structural rearrangement. From this we have proposed a model for DNA binding and 3ā€² hydrolysis for the TREX2 dimer. The structure also shows how TREX proteins potentially interact with double-stranded DNA and suggest features that might be involved in strand denaturation to provide a single-stranded substrate for the active site

    General practice performance in referral for suspected cancer: influence of number of cases and case-mix on publicly reported data

    Get PDF
    Background:Publicly available data show variation in GPsā€™ use of urgent suspected cancer (USC) referral pathways. We investigated whether this could be due to small numbers of cancer cases and random case-mix, rather than due to true variation in performance. Methods:We analysed individual GP practice USC referral detection rates (proportion of the practice's cancer cases that are detected via USC) and conversion rates (proportion of the practice's USC referrals that prove to be cancer) in routinely collected data from GP practices in all of England (over 4 years) and northeast Scotland (over 7 years). We explored the effect of pooling data. We then modelled the effects of adding random case-mix to practice variation. Results:Correlations between practice detection rate and conversion rate became less positive when data were aggregated over several years. Adding random case-mix to between-practice variation indicated that the median proportion of poorly performing practices correctly identified after 25 cancer cases were examined was 20% (IQR 17 to 24) and after 100 cases was 44% (IQR 40 to 47). Conclusions:Much apparent variation in GPsā€™ use of suspected cancer referral pathways can be attributed to random case-mix. The methods currently used to assess the quality of GP-suspected cancer referral performance, and to compare individual practices, are misleading. These should no longer be used, and more appropriate and robust methods should be develope

    Sphalerons and the Electroweak Phase Transition in Models with Higher Scalar Representations

    Get PDF
    In this work we investigate the sphaleron solution in a SU(2)ƗU(1)XSU(2)\times U(1)_X gauge theory, which also encompasses the Standard Model, with higher scalar representation(s) (J(i),X(i)J^{(i)},X^{(i)}). We show that the field profiles describing the sphaleron in higher scalar multiplet, have similar trends like the doublet case with respect to the radial distance. We compute the sphaleron energy and find that it scales linearly with the vacuum expectation value of the scalar field and its slope depends on the representation. We also investigate the effect of U(1)U(1) gauge field and find that it is small for the physical value of the mixing angle, ĪøW\theta_{W} and resembles the case for the doublet. For higher representations, we show that the criterion for strong first order phase transition, vc/Tc>Ī·v_{c}/T_{c}>\eta, is relaxed with respect to the doublet case, i.e. Ī·<1\eta<1.Comment: 20 pages, 5 figures & 1 table, published versio

    Black rings with fourth dipole cause less hair loss

    Full text link
    An example of entropy enigma with a controlled CFT dual was recently studied in arXiv:1108.0411. The enigmatic bulk configurations, considered within the STU model, can be mapped under spectral flow into black rings with three monopole and dipole charges. Even though the bulk and CFT configurations existed in the same region of parameter space, the Bekenstein-Hawking entropy of the bulk configurations was found to be lower than the microscopic entropy from the CFT. While it is possible that the difference in entropy is due to the bulk and boundary configurations being at different points in the moduli space, it is also possible that the bulk configurations embeddable within the STU model are not the most entropic. New families of BPS black ring solutions with four electric and four dipole magnetic charges have recently been explicitly constructed in arXiv:1201.2585. These black rings are not embeddable within the STU model. In this paper we investigate if these black rings can be entropically dominant over the STU model black rings. We find that the new black rings are always entropically subdominant to the STU-model black rings. However, for small fourth dipole charge these black rings continue to be dominant over the BMPV in a small region of parameters and are thus enigmatic.Comment: v2: minor changes, references added, 15 pages, 9 figures (published version
    • ā€¦
    corecore