411 research outputs found

    Non-adaptive Heisenberg-limited metrology with multi-channel homodyne measurements

    Get PDF
    We show a protocol achieving the ultimate Heisenberg-scaling sensitivity in the estimation of a parameter encoded in a generic linear network, without employing any auxiliary networks, and without the need of any prior information on the parameter nor on the network structure. As a result, this protocol does not require a prior coarse estimation of the parameter, nor an adaptation of the network. The scheme we analyse consists of a single-mode squeezed state and homodyne detectors in each of the M output channels of the network encoding the parameter, making it feasible for experimental applications

    Towards service-oriented ontology-based coordination

    Get PDF
    Coordination is a central problem in distributed computing. The aim is towards flexible coordination, managed at run-time, in open, dynamic environments. This approach would benefit from an explicit common vocabulary for coordination and hence, in a previous paper, we modelled coordination in an ontology, describing the activities carried out and the interdependencies among these activities. The purpose of this paper is to show how such an ontology can be used alongside a set of rules to perform coordination by managing the interdependencies among activities. The ontology and rules can then be used to provide a general purpose coordination tool in the form of a Web servic

    Avoiding Alignment-based Conservativity Violations through Dialogue

    Get PDF
    A number of ontology matching techniques have been proposed that rely on full disclosure of their ontological models prior to the construction of the alignment. However, within open and opportunistic environments, such approaches may not always be pragmatic or even acceptable (due to privacy concerns). Several studies have focussed on collaborative, decentralised approaches to ontology alignment, where agents negotiate the acceptability of correspondences (i.e. mappings between corresponding entities in different ontologies) acquired from past encounters, or try to ascertain novel correspondences on the fly. However, such approaches can lead to logical flaws that may undermine their utility. In this paper, we extend a dialogical approach to correspondence negotiation, whereby agents not only exchange details of possible correspondences, but also identify potential violations to the so-called conservativity principle, where novel but undesirable entailments between named concepts in one of the input ontologies emerge. We present a formal model of the dialogue, and show how \conservativity violations can be repaired (using an existing correspondence repair system) during the dialogue through the exchange of repairs. We then illustrate how agents negotiate over possible correspondences and repairs by means of a walkthrough example

    A novel scheduling algorithm to maximize the D2D spatial reuse in LTE networks

    Get PDF
    In order to offload base station (BS) traffic and to enhance efficiency of spectrum, operators can activate many Device-to-Device (D2D) pairs or links in LTE networks. This increases the overall spectral efficiency because the same Resource Blocks (RBs) are used across cellular UEs (CUEs) (i.e., all UEs connected to BS for both C-Plane and D-plane communication) and D2D links (i.e., where the UEs are connected to BS only for C-plane communication). However, significant interference problems can be caused by D2D communications as the same RBs are being shared. In our work, we address this problem by proposing a novel scheduling algorithm, Efficient Scheduling and Power control Algorithm for D2Ds (ESPAD), which reuses the same RBs and tries to maximize the overall network throughput without affecting the CUEs throughput. ESPAD algorithm also ensures that Signal to Noise plus Interference Ratio (SINR) for each of the D2D links is maintained above a certain predefined threshold. The aforementioned properties of ESPAD algorithm makes sure that the CUEs do not experience very high interference from the D2Ds. It is observed that even when the SINRdrop (i.e., maximum permissible drop in SINR of CUEs) is as high as 10 dB, there is no drastic decrease in CUEs throughput (only 3.78%). We also compare our algorithm against other algorithms and show that D2D throughput improves drastically without undermining CUEs throughput

    New factorization algorithm based on a continuous representation of truncated Gauss sums

    Full text link
    In this paper, we will describe a new factorization algorithm based on the continuous representation of Gauss sums, generalizable to orders j>2. Such an algorithm allows one, for the first time, to find all the factors of a number N in a single run without precalculating the ratio N/l, where l are all the possible trial factors. Continuous truncated exponential sums turn out to be a powerful tool for distinguishing factors from non-factors (we also suggest, with regard to this topic, to read an interesting paper by S. Woelk et al. also published in this issue [Woelk, Feiler, Schleich, J. Mod. Opt. in press]) and factorizing different numbers at the same time. We will also describe two possible M-path optical interferometers, which can be used to experimentally realize this algorithm: a liquid crystal grating and a generalized symmetric Michelson interferometer.Comment: 8 pages, 5 figure

    Heisenberg scaling precision in multi-mode distributed quantum metrology

    Get PDF
    We consider the estimation of an arbitrary parameter φ, such as the temperature or a magnetic field, affecting in a distributed manner the components of an arbitrary linear optical passive network, such as an integrated chip. We demonstrate that Heisenberg scaling precision (i.e. of the order of 1/N, where N is the number of probe photons) can be achieved without any iterative adaptation of the interferometer hardware and by using only a simple, single, squeezed light source and well-established homodyne measurements techniques. Furthermore, no constraint on the possible values of the parameter is needed but only a preliminary shot-noise estimation (i.e. with a precision of) easily achievable without any quantum resources. Indeed, such a classical knowledge of the parameter is enough to prepare a single, suitable optical stage either at the input or the output of the network to monitor with Heisenberg-limited precision any variation of the parameter to the order of without the need to iteratively modify such a stage

    Geophysical and Geochemical Approach for Seawater Intrusion Assessment in the Godavari Delta Basin, A.P., India

    Get PDF
    Coastal lands around Bay of Bengal in Central Godavari Delta are mainly agriculture fields and two times annually paddy crops putting in the study area. Canals of Godavari River are the main source of water for irrigation. Geophysical and geochemical investigations were carried out in the study area to decipher subsurface geologic formation and assessing seawater intrusion. Electrical resistivity tomographic surveys carried out in the watershed-indicated low resistivity formation in the upstream area due to the presence of thick marine clays up to thickness of 20–25 m from the surface. Secondly, the lowering of resistivity may be due to the encroachment of seawater in to freshwater zones and infiltration during tidal fluctuation through mainly the Pikaleru drain, and to some extent rarely through Kannvaram and Vasalatippa drains in the downstream area. Groundwater quality analyses were made for major ions revealed brackish nature of groundwater water at shallow depth. The in situ salinity of groundwater is around 5,000 mg/l and there is no groundwater withdrawal for irrigation or drinking purpose in this area except Cairn energy pumping wells which is using for inject brackish water into the oil wells for easy exploration of oil. Chemical analyses of groundwater samples have indicated the range of salt concentrations and correlation of geophysical and borehole litholog data in the study area predicting seawater-contaminated zones and influence of in situ salinity in the upstream of study area. The article suggested further studies and research work that can lead to sustainable exploitation/use and management of groundwater resources in coastal areas

    Interference mitigation in wireless mesh networks through radio co-location aware conflict graphs

    Get PDF
    Wireless Mesh Networks (WMNs) have evolved into a wireless communication technology of immense interest. But technological advancements in WMNs have inadvertently spawned a plethora of network performance bottlenecks, caused primarily by the rise in prevalent interference. Conflict Graphs are indispensable tools used to theoretically represent and estimate the interference in wireless networks. We propose a generic algorithm to generate conflict graphs which is independent of the underlying interference model. Further, we propose the notion of radio co-location interference, which is caused and experienced by spatially co-located radios in multi-radio multi-channel WMNs. We experimentally validate the concept, and propose a new all-encompassing algorithm to create a radio co-location aware conflict graph. Our novel conflict graph generation algorithm is demonstrated to be significantly superior and more efficient than the conventional approach, through theoretical interference estimates and comprehensive experiments. The results of an extensive set of ns-3 simulations run on the IEEE 802.11g platform strongly indicate that the radio co-location aware conflict graphs are a marked improvement over their conventional counterparts. We also question the use of total interference degree as a reliable metric to predict the performance of a Channel Assignment scheme in a given WMN deployment

    Distance sensing emerging from second-order interference of thermal light

    Full text link
    We introduce and describe a technique for distance sensing, based on second-order interferometry of thermal light. The method is based on measuring correlation between intensity fluctuations on two detectors, and provides estimates of the distances separating a remote mask from the source and the detector, even when such information cannot be retrieved by first-order intensity measurements. We show how the sensitivity to such distances is intimately connected to the degree of correlation of the measured interference pattern in different experimental scenarios and independently of the spectral properties of light. Remarkably, this protocol can be also used to measure the distance of remote reflective objects in the presence of turbulence. We demonstrate the emergence of new critical parameters which benchmark the degree of second-order correlation, describing the counterintuitive emergence of spatial second-order interference not only in the absence of (first-order) coherence at both detectors but also when first order interference is observed at one of the two detectors.Comment: 6 pages, 3 figure
    corecore