6,889 research outputs found

    Achievable efficiencies for probabilistically cloning the states

    Full text link
    We present an example of quantum computational tasks whose performance is enhanced if we distribute quantum information using quantum cloning. Furthermore we give achievable efficiencies for probabilistic cloning the quantum states used in implemented tasks for which cloning provides some enhancement in performance.Comment: 9 pages, 8 figure

    Understanding the internet topology evolution dynamics

    Get PDF
    The internet structure is extremely complex. The Positive-Feedback Preference (PFP) model is a recently introduced internet topology generator. The model uses two generic algorithms to replicate the evolution dynamics observed on the internet historic data. The phenomenological model was originally designed to match only two topology properties of the internet, i.e. the rich-club connectivity and the exact form of degree distribution. Whereas numerical evaluation has shown that the PFP model accurately reproduces a large set of other nontrivial characteristics as well. This paper aims to investigate why and how this generative model captures so many diverse properties of the internet. Based on comprehensive simulation results, the paper presents a detailed analysis on the exact origin of each of the topology properties produced by the model. This work reveals how network evolution mechanisms control the obtained topology properties and it also provides insights on correlations between various structural characteristics of complex networks.Comment: 15 figure

    Astronomy in the Cloud: Using MapReduce for Image Coaddition

    Full text link
    In the coming decade, astronomical surveys of the sky will generate tens of terabytes of images and detect hundreds of millions of sources every night. The study of these sources will involve computation challenges such as anomaly detection and classification, and moving object tracking. Since such studies benefit from the highest quality data, methods such as image coaddition (stacking) will be a critical preprocessing step prior to scientific investigation. With a requirement that these images be analyzed on a nightly basis to identify moving sources or transient objects, these data streams present many computational challenges. Given the quantity of data involved, the computational load of these problems can only be addressed by distributing the workload over a large number of nodes. However, the high data throughput demanded by these applications may present scalability challenges for certain storage architectures. One scalable data-processing method that has emerged in recent years is MapReduce, and in this paper we focus on its popular open-source implementation called Hadoop. In the Hadoop framework, the data is partitioned among storage attached directly to worker nodes, and the processing workload is scheduled in parallel on the nodes that contain the required input data. A further motivation for using Hadoop is that it allows us to exploit cloud computing resources, e.g., Amazon's EC2. We report on our experience implementing a scalable image-processing pipeline for the SDSS imaging database using Hadoop. This multi-terabyte imaging dataset provides a good testbed for algorithm development since its scope and structure approximate future surveys. First, we describe MapReduce and how we adapted image coaddition to the MapReduce framework. Then we describe a number of optimizations to our basic approach and report experimental results comparing their performance.Comment: 31 pages, 11 figures, 2 table

    Systematic Topology Analysis and Generation Using Degree Correlations

    Full text link
    We present a new, systematic approach for analyzing network topologies. We first introduce the dK-series of probability distributions specifying all degree correlations within d-sized subgraphs of a given graph G. Increasing values of d capture progressively more properties of G at the cost of more complex representation of the probability distribution. Using this series, we can quantitatively measure the distance between two graphs and construct random graphs that accurately reproduce virtually all metrics proposed in the literature. The nature of the dK-series implies that it will also capture any future metrics that may be proposed. Using our approach, we construct graphs for d=0,1,2,3 and demonstrate that these graphs reproduce, with increasing accuracy, important properties of measured and modeled Internet topologies. We find that the d=2 case is sufficient for most practical purposes, while d=3 essentially reconstructs the Internet AS- and router-level topologies exactly. We hope that a systematic method to analyze and synthesize topologies offers a significant improvement to the set of tools available to network topology and protocol researchers.Comment: Final versio

    The Role of Solar Wind Hydrogen in Space Weathering: Insights from Laboratory-Irradiated Northwest Africa 12008

    Get PDF
    Micrometeoroid impacts, solar wind plasma interactions, and regolith gardening drive the complicated and nuanced mechanism of space weathering (or optical maturation); a process by which a materials optical properties are changed as a result of chemical and physical alterations at the surface of grains on airless bodies. Reddened slopes, attenuated absorption bands, and an overall reduction in albedo in the visible and near-IR wavelength ranges are primarily the result of native iron nanoparticle (npFe0) production within glassy rims that form from sputtering and vaporization. The sizes and abundance of these particles provide information about the relative surface exposure age of a particular grain. In addition, many studies have indicated that composition greatly affects the rate at which optical maturation occurs. Despite our understanding of how npFe0 affects optical signatures, the relative roles of micrometeoroid bombardment and solar wind interactions remains undetermined. To simulate the early effects of weathering by the solar wind and to determine thresholds for optical change with respect to a given mineral phase, we irradiated a fine-grained lunar basalt with 1 keV H+ to a fluence of 6.4 x 1016 H+ per sq.cm. Surface alterations within four phases have been evaluated using transmission electron microscopy (TEM). We found that for a given fluence of H+, the extent of damage acquired by each grain was dependent on its composition. No npFe(0) was produced in any of the phases evaluated in this study. These results are consistent with many previous studies conducted using ions of similar energy, but they also provide valuable information about the onset of space weathering and the role of the solar wind during the early stages of optical maturation

    Embracing corruption burstiness: Fast error recovery for ZigBee under wi-Fi interference

    Get PDF
    This is the author accepted manuscript. The final version is available from the publisher via the DOI in this record.The ZigBee communication can be easily and severely interfered by Wi-Fi traffic. Error recovery, as an important means for ZigBee to survive Wi-Fi interference, has been extensively studied in recent years. The existing works add upfront redundancy to in-packet blocks for recovering a certain number of random corruptions. Therefore the bursty nature of ZigBee in-packet corruptions under Wi-Fi interference is often considered harmful, since some blocks are full of errors which cannot be recovered and some blocks have no errors but still requiring redundancy. As a result, they often use interleaving to reshape the bursty errors, before applying complex FEC codes to recover the re-shaped random distributed errors. In this paper, we take a different view that burstiness may be helpful. With burstiness, the in-packet corruptions are often consecutive and the requirement for error recovery is reduced as ”recovering any k consecutive errors” instead of ”recovering any random k errors”. This lowered requirement allows us to design far more efficient code than the existing FEC codes. Motivated by this implication, we exploit the corruption burstiness to design a simple yet effective error recovery code using XOR operations (called ZiXOR). ZiXOR uses XOR code and the delay is significantly reduced. More, ZiXOR uses RSSI-hinted approach to detect in packet corruptions without CRC, incurring almost no extra transmission overhead. The testbed evaluation results show that ZiXOR outperforms the state-of-the-art works in terms of the throughput (by 47%) and latency (by 22%)This work was supported by the National Natural Science Foundation of China (No. 61602095 and No. 61472360), the Fundamental Research Funds for the Central Universities (No. ZYGX2016KYQD098 and No. 2016FZA5010), National Key Technology R&D Program (Grant No. 2014BAK15B02), CCFIntel Young Faculty Researcher Program, CCF-Tencent Open Research Fund, China Ministry of Education—China Mobile Joint Project under Grant No. MCM20150401 and the EU FP7 CLIMBER project under Grant Agreement No. PIRSES-GA- 2012-318939. Wei Dong is the corresponding author

    Double In Situ Approach for the Preparation of Polymer Nanocomposite with Multi-functionality

    Get PDF
    A novel one-step synthetic route, the double in situ approach, is used to produce both TiO2nanoparticles and polymer (PET), and simultaneously forming a nanocomposite with multi-functionality. The method uses the release of water during esterification to hydrolyze titanium (IV) butoxide (Ti(OBu)4) forming nano-TiO2in the polymerization vessel. This new approach is of general significance in the preparation of polymer nanocomposites, and will lead to a new route in the synthesis of multi-functional polymer nanocomposites

    Statistical Origin of Constituent-Quark Scaling in the QGP hadronization

    Full text link
    Nonextensive statistics in a Blast-Wave model (TBW) is implemented to describe the identified hadron production in relativistic p+p and nucleus-nucleus collisions. Incorporating the core and corona components within the TBW formalism allows us to describe simultaneously some of the major observations in hadronic observables at the Relativistic Heavy-Ion Collider (RHIC): the Number of Constituent Quark Scaling (NCQ), the large radial and elliptic flow, the effect of gluon saturation and the suppression of hadron production at high transverse momentum (pT) due to jet quenching. In this formalism, the NCQ scaling at RHIC appears as a consequence of non-equilibrium process. Our study also provides concise reference distributions with a least chi2 fit of the available experimental data for future experiments and models.Comment: 4 pages, 3 figures; added two tables, explained a little bit more on TBW_p

    A hybrid recursive multilevel incomplete factorization preconditioner for solving general linear systems

    Get PDF
    In this paper we introduce an algebraic recursive multilevel incomplete factorization preconditioner, based on a distributed Schur complement formulation, for solving general linear systems. The novelty of the proposed method is to combine factorization techniques of both implicit and explicit type, recursive combinatorial algorithms, multilevel mechanisms and overlapping strategies to maximize sparsity in the inverse factors and consequently reduce the factorization costs. Numerical experiments demonstrate the good potential of the proposed solver to precondition effectively general linear systems, also against other state-of-the-art iterative solvers of both implicit and explicit form

    Clec9a-mediated ablation of conventional dendritic cells suggests a lymphoid path to generating dendritic cells In Vivo

    Get PDF
    Conventional dendritic cells (cDCs) are versatile activators of immune responses that develop as part of the myeloid lineage downstream of hematopoietic stem cells. We have recently shown that in mice precursors of cDCs, but not of other leukocytes, are marked by expression of DNGR-1/CLEC9A. To genetically deplete DNGR-1-expressing cDC precursors and their progeny, we crossed Clec9a-Cre mice to Rosa-lox-STOP-lox-diphtheria toxin (DTA) mice. These mice develop signs of age-dependent myeloproliferative disease, as has been observed in other DC-deficient mouse models. However, despite efficient depletion of cDC progenitors in these mice, cells with phenotypic characteristics of cDCs populate the spleen. These cells are functionally and transcriptionally similar to cDCs in wild type control mice but show somatic rearrangements of Ig-heavy chain genes, characteristic of lymphoid origin cells. Our studies reveal a previously unappreciated developmental heterogeneity of cDCs and suggest that the lymphoid lineage can generate cells with features of cDCs when myeloid cDC progenitors are impaired
    corecore