311 research outputs found

    Priority-enabled Scheduling for Resizable Parallel Applications

    Get PDF
    In this paper, we illustrate the impact of dynamic resizability on parallel scheduling. Our ReSHAPE framework includes an application scheduler that supports dynamic resizing of parallel applications. We propose and evaluate new scheduling policies made possible by our ReSHAPE framework. The framework also provides a platform to experiment with more interesting and sophisticated scheduling policies and scenarios for resizable parallel applications. The proposed policies support scheduling of parallel applications with and without user assigned priorities. Experimental results show that these scheduling policies significantly improve individual application turn around time as well as overall cluster utilization

    A QKD Protocol Extendable to Support Entanglement and Reduce Unauthorized Information Gain by Randomizing the Bases Lists with Key Values and Invalidate Explicit Privacy Amplification

    Get PDF
    This paper suggests an improvement to the BB84 scheme in Quantum key distribution. The original scheme has its weakness in letting quantifiably more information gain to an eavesdropper during public announcement of unencrypted bases lists. The security of the secret key comes at the expense of the final key length. We aim at exploiting the randomness of preparation (measurement) basis and the bit values encoded (observed), so as to randomize the bases lists before they are communicated over the public channel. A proof of security is given for our scheme and proven that our protocol results in lesser information gain by Eve in comparison with BB84 and its other extensions. Moreover, an analysis is made on the feasibility of our proposal as such and to support entanglement based QKD. The performance of our protocol is compared in terms of the upper and lower bounds on the tolerable bit error rate. We also quantify the information gain (by Eve) mathematically using the familiar approach of the concept of Shannon entropy. The paper models the attack by Eve in terms of interference in a multi-access quantum channel. Besides, this paper also hints at the invalidation of a separate privacy amplification step in the "prepare-and-measure" protocols in general.Comment: 13 pages, 1 figure, submitted for review to the USENIX 200

    Experimental investigations on forming limit diagram of ultra thin SS 304 steel : effect of circular grid size, sheet orientation, punch size and deformation speed

    Get PDF
    In the present work, SS 304 sheet of 200 μm thickness was used to experimentally evaluate the forming limit diagram (FLD). In this context, a sub-size limiting dome height (LDH) test setup was developed to deform rectangular specimens of different widths using a 30 mm hemispherical punch. Further, effect of various parameters such as change in circular grid size, stretching direction with respect to rolling direction of the sheet, punch size and deformation speed on limiting strains was investigated. It was observed that there was marginal change in limiting strains due to the change of punch diameter from 30 mm to 50 mm. The FLD0 level changed approximately 7.5% and 6.8% with the change in punch diameter and stretching direction respectively. It was also found that the FLD0 value increased by 15% with change in circular grid diameter from 2.5 mm to 2.0 mm. However, a negligible change in the limiting strains was noted when the grid diameter was further reduced to 1.0 mm. There was negligible change in the FLD0 level with increase in punch speed from 4 mm/min to 100 mm/min, but approximately 13% decrease was found when the punch speed was further increased to 400 mm/min. Moreover, the LDH, strain distribution and failure strains were also analyzed in context of formability

    Length–weight relationship for three estuarine fish species from the Chilika Lagoon, India

    Get PDF
    501-502We investigated the length–weight relationships (LWRs) for Sillago vincenti McKay, 1980, Triacanthus nieuhofii Bleeker, 1852 and Terapon puta Cuvier, 1829 from the Chilika lagoon in India. Sampling was conducted in central sector of the Chilika from April to November of 2017. Specimens were caught in mono-filament gill nets of mesh size 28-36 mm and fixed set nets of mesh size 16-24 mm. From LWR estimation, the determined intercept (a value) and slope (b value) were found to be 0.007 and 3.039 for Sillago vincenti, 0.010 and 2.997 for Triacanthus nieuhofii and 0.008 and 3.156 for Terapon puta. The relationships between length and weight in all three species were highly correlated (p <0.05)

    Immunity elicitors for induced resistance against the downy mildew pathogen in pearl millet

    Get PDF
    Pearl millet (Pennisetum glaucum (L.) R. Br.) is a globally important cereal whose production is severely constrained by downy mildew caused by Sclerospora graminicola (Sacc.). In this study, immunity eliciting properties of 3,5-dichloroanthranilic acid (DCA), Cell Wall Glucan (CWG), Lipopolysaccharide (LPS), and Glycinebetaine (GB) was deciphered through enzymatic and protein studies based on elicitor treatment activated defense mechanisms. Glycinebetaine, LPS, CWS and DCA elicited enzyme activities and gene expression of the defense enzymes, such as β-1,3-glucanase, phenylalanine ammonia lyase (PAL), peroxidase (POX), polyphenol oxidase (PPO), lipoxygenase (LOX) and defense protein hydroxyproline-rich glycoproteins (HRGPs). However, the speed and the extent of elicitation differed. High levels of enzyme activities and gene expression in elicitor-treated P. glaucum positively correlated with the increased downy mildew resistance. A very rapid and large changes in elicitor-treated seedlings, in contrast to the delayed, smaller changes in the untreated susceptible control seedlings suggests that the rate and magnitude of defense gene expression are important for effective manifestation of defense against pathogen. As compared to other elicitors and control, GB promoted increase in enzyme activities and gene expression, implicating that GB is a promising elicitor of downy mildew resistance in P. glaucum

    Detection of a Westward Hotspot Offset in the Atmosphere of a Hot Gas Giant CoRoT-2b

    Get PDF
    Short-period planets exhibit day-night temperature contrasts of hundreds to thousands of degrees K. They also exhibit eastward hotspot offsets whereby the hottest region on the planet is east of the substellar point; this has been widely interpreted as advection of heat due to eastward winds. We present thermal phase observations of the hot Jupiter CoRoT-2b obtained with the IRAC instrument on the Spitzer Space Telescope. These measurements show the most robust detection to date of a westward hotspot offset of 23 ±\pm 4 degrees, in contrast with the nine other planets with equivalent measurements. The peculiar infrared flux map of CoRoT-2b may result from westward winds due to non-synchronous rotation magnetic effects, or partial cloud coverage, that obscures the emergent flux from the planet's eastern hemisphere. Non-synchronous rotation and magnetic effects may also explain the planet's anomalously large radius. On the other hand, partial cloud coverage could explain the featureless dayside emission spectrum of the planet. If CoRoT-2b is not tidally locked, then it means that our understanding of star-planet tidal interaction is incomplete. If the westward offset is due to magnetic effects, our result represents an opportunity to study an exoplanet's magnetic field. If it has Eastern clouds, then it means that our understanding of large-scale circulation on tidally locked planets is incomplete.Comment: 30 pages, 4 figures, 15 supplementary figure

    Методы измерения фазового сдвига с промежуточным преобразованием напряжение-частота

    Get PDF
    В статті розглянуті методи вимірювання фазового зсуву з проміжним перетворенням напруга-частота. Проаналізовано переваги й недоліки методів. Проведено оцінку похибки, обумовленої неточністю формування часових інтервалів.In article methods of measurement of phase shift with preliminary transformation a voltage-frequency are considered. Their merits and demerits are analyzed. The estimation of the error caused by discrepancy of formation of time intervals is made

    Understanding the errors of SHAPE-directed RNA structure modeling

    Full text link
    Single-nucleotide-resolution chemical mapping for structured RNA is being rapidly advanced by new chemistries, faster readouts, and coupling to computational algorithms. Recent tests have shown that selective 2'-hydroxyl acylation by primer extension (SHAPE) can give near-zero error rates (0-2%) in modeling the helices of RNA secondary structure. Here, we benchmark the method using six molecules for which crystallographic data are available: tRNA(phe) and 5S rRNA from Escherichia coli, the P4-P6 domain of the Tetrahymena group I ribozyme, and ligand-bound domains from riboswitches for adenine, cyclic di-GMP, and glycine. SHAPE-directed modeling of these highly structured RNAs gave an overall false negative rate (FNR) of 17% and a false discovery rate (FDR) of 21%, with at least one helix prediction error in five of the six cases. Extensive variations of data processing, normalization, and modeling parameters did not significantly mitigate modeling errors. Only one varation, filtering out data collected with deoxyinosine triphosphate during primer extension, gave a modest improvement (FNR = 12%, and FDR = 14%). The residual structure modeling errors are explained by the insufficient information content of these RNAs' SHAPE data, as evaluated by a nonparametric bootstrapping analysis. Beyond these benchmark cases, bootstrapping suggests a low level of confidence (<50%) in the majority of helices in a previously proposed SHAPE-directed model for the HIV-1 RNA genome. Thus, SHAPE-directed RNA modeling is not always unambiguous, and helix-by-helix confidence estimates, as described herein, may be critical for interpreting results from this powerful methodology.Comment: Biochemistry, Article ASAP (Aug. 15, 2011
    corecore