2,605 research outputs found

    Fast computation of Bernoulli, Tangent and Secant numbers

    Full text link
    We consider the computation of Bernoulli, Tangent (zag), and Secant (zig or Euler) numbers. In particular, we give asymptotically fast algorithms for computing the first n such numbers in O(n^2.(log n)^(2+o(1))) bit-operations. We also give very short in-place algorithms for computing the first n Tangent or Secant numbers in O(n^2) integer operations. These algorithms are extremely simple, and fast for moderate values of n. They are faster and use less space than the algorithms of Atkinson (for Tangent and Secant numbers) and Akiyama and Tanigawa (for Bernoulli numbers).Comment: 16 pages. To appear in Computational and Analytical Mathematics (associated with the May 2011 workshop in honour of Jonathan Borwein's 60th birthday). For further information, see http://maths.anu.edu.au/~brent/pub/pub242.htm

    Positively Perplexing E-Books: Digital Natives’ Perceptions of Electronic Information Resources

    Get PDF
    Anecdotal evidence from user surveys and the experiences of information professionals portray a picture that today’s students (i.e., “digital natives”) do not differentiate between the variety of information resources online. The issue of container only becomes problematic to these students when they have to produce a scholarly work and cite their information sources. Then the question becomes, “What is it?” This paper will present preliminary data from a survey of university students on how they recognize and label electronic information resources. The authors will explore such questions as: Do users recognize an e-book as a book? If not, how do they categorize it? Does the amount and placement of labeling from the publisher make a difference in their recognition? Do they differentiate between an academic database and a search engine? Are a newspaper article and a peer-reviewed journal article considered synonymous

    eBook Platforms: Lessons Learned from Managing Multiple Providers

    Get PDF

    Advanced Grid programming with components: a biometric identification case study

    Get PDF
    Component-oriented software development has been attracting increasing attention for building complex distributed applications. A new infrastructure supporting this advanced concept is our prototype component framework based on the Grid component model. This paper provides an overview of the component framework and presents a case study where we utilise the component-oriented approach to develop a business process application for a biometric identification system. We then introduce the tools being developed as part of an integrated development environment to enable graphical component-based development of Grid applications. Finally, we report our initial findings and experiences of efficiently using the component framework and set of software tools

    Thermally-induced lactosylation of whey proteins: Identification and synthesis of lactosylated β-lactoglobulin epitope

    Get PDF
    The high temperatures used in the production of milk may induce modifications in proteins structure. Due to occurrence of the Maillard reaction, lactose binds lysine residues in proteins, affecting the nutritional value. Milk is also an important source of allergenic proteins (i.e., caseins, β-lactoglobulin and α-lactalbumin). Thus, this modification may also affect the allergenicity of these proteins. Focusing on milk whey proteins, a screening on different Ultra High Temperatures (UHT) and pasteurized milk samples was performed to identify lactosylation sites, in particular in protein known epitopes, and to verify the correlation between lactosylation and the harshness of the treatment. Whey proteins were extracted from milk samples after caseins precipitations at pH 4.6 and, after chymotryptic and tryptic in solution digestion, peptides were analysed by UPLC-MS and LTQ-Orbitrap. Results show the presence of lactosylated lysine residues in several known epitopes. Then, a β-lactoglobulin epitope was selected and synthesized by solid phase synthesis followed by in solution lactosylation, obtaining high reaction yields and purities. The synthesis of lactosylated allergenic epitopes, described here for the first time, is a useful tool for further studies on the technological impacts on food allergenicity

    Observing CMB polarisation through ice

    Get PDF
    Ice crystal clouds in the upper troposphere can generate polarisation signals at the uK level. This signal can seriously affect very sensitive ground based searches for E- and B-mode of Cosmic Microwave Background polarisation. In this paper we estimate this effect within the ClOVER experiment observing bands (97, 150 and 220 GHz) for the selected observing site (Llano de Chajnantor, Atacama desert, Chile). The results show that the polarisation signal from the clouds can be of the order of or even bigger than the CMB expected polarisation. Climatological data suggest that this signal is fairly constant over the whole year in Antarctica. On the other hand the stronger seasonal variability in Atacama allows for a 50% of clean observations during the dry season.Comment: 7 Pages, 4 figure

    On the Effectiveness of BGP Hijackers That Evade Public Route Collectors

    Get PDF
    Routing hijack attacks have plagued the Internet for decades. After many failed mitigation attempts, recent Internet-wide BGP monitoring infrastructures relying on distributed route collection systems, called route collectors, give us hope that future monitor systems can quickly detect and ultimately mitigate hijacks. In this paper, we investigate the effectiveness of public route collectors with respect to future attackers deliberately engineering longer hijacks to avoid being recorded by route collectors. Our extensive simulations (and attacks we device) show that monitor-based systems may be unable to observe many carefully crafted hijacks diverting traffic from thousands of ASes. Hijackers could predict whether their attacks would propagate to some BGP feeders (i.e., monitors) of public route collectors. Then, manipulate BGP route propagation so that the attack never reaches those monitors. This observation remains true when considering plausible future Internet topologies, with more IXP links and up to 4 times more monitors peering with route collectors. We then evaluate the feasibility of performing hijacks not observed by route collectors in the real-world. We experiment with two classifiers to predict the monitors that are dangerous to report the attack to route collectors, one based on monitor proximities (i.e., shortest path lengths) and another based on Gao-Rexford routing policies. We show that a proximity-based classifier could be sufficient for the hijacker to identify all dangerous monitors for hijacks announced to peer-to-peer neighbors. For hijacks announced to transit networks, a Gao-Rexford classifier reduces wrong inferences by ≥91%\ge 91\% without introducing new misclassifications for existing dangerous monitors

    A Semantic Grid Oriented to E-Tourism

    Full text link
    With increasing complexity of tourism business models and tasks, there is a clear need of the next generation e-Tourism infrastructure to support flexible automation, integration, computation, storage, and collaboration. Currently several enabling technologies such as semantic Web, Web service, agent and grid computing have been applied in the different e-Tourism applications, however there is no a unified framework to be able to integrate all of them. So this paper presents a promising e-Tourism framework based on emerging semantic grid, in which a number of key design issues are discussed including architecture, ontologies structure, semantic reconciliation, service and resource discovery, role based authorization and intelligent agent. The paper finally provides the implementation of the framework.Comment: 12 PAGES, 7 Figure

    Characterization of defatted products obtained from the Parmigiano–Reggiano manufacturing chain: Determination of peptides and amino acids content and study of the digestibility and bioactive properties

    Get PDF
    Parmigiano–Reggiano (PR) is a worldwide known Italian, long ripened, hard cheese. Its inclusion in the list of cheeses bearing the protected designation of origin (PDO, EU regulation 510/2006) poses restrictions to its geographic area of production and its technological characteristics. To innovate the Parmigiano–Reggiano (PR) cheese manufacturing chain from the health and nutritional point of view, the output of defatted PR is addressed. Two defatting procedures (Soxhlet, and supercritical CO2 extraction) were tested, and the obtained products were compared in the composition of their nitrogen fraction, responsible for their nutritional, organoleptic, and bioactive functions. Free amino acids were quantified, and other nitrogen compounds (peptides, proteins, and non-proteolytic aminoacyl derivatives) were identified in the extracts and the mixtures obtained after simulated gastrointestinal digestion. Moreover, antioxidant and angiotensin converting enzyme (ACE) inhibition capacities of the digests were tested. Results obtained from the molecular and biofunctional characterization of the nitrogen fraction, show that both the defatted products keep the same nutritional properties of the whole cheese

    Self-interested service-oriented agents based on trust and QoS for dynamic reconfiguration

    Get PDF
    Progressively increasing complexity of dynamic environments, in which services and applications are demanded by potential clients, requires a high level of reconfiguration of the offer to better match that ever changing demand. In particular, the dynamic change of the client’s needs, leading to higher exigency, may require a smart and flexible automatic composition of more elementary services. By leveraging the service-oriented architectures and multi-agent system benefits, the paper proposes a method to explore the flexibility of the decision support for the services’ reconfiguration based on several pillars, such as trust, reputation and QoS models, which allows the selection based on measuring the expected performance of the agents. Preliminary experimental results, extracted from a real case scenario, allow highlighting the benefits of the proposed distributed and flexible solution to balance the workload of service providers in a simple and fast manner. The proposed solution includes the agents’ intelligent decision-making capability to dynamically and autonomously change services selection on the fly, towards more trustworthy services with better quality when unexpected events happen, e.g. broken machines. We then propose the use of competitive self-interested agents to provide services that best suits to the client through dynamic service composition.info:eu-repo/semantics/publishedVersio
    • …
    corecore