717 research outputs found

    On hypergraph Lagrangians

    Full text link
    It is conjectured by Frankl and F\"uredi that the rr-uniform hypergraph with mm edges formed by taking the first mm sets in the colex ordering of N(r){\mathbb N}^{(r)} has the largest Lagrangian of all rr-uniform hypergraphs with mm edges in \cite{FF}. Motzkin and Straus' theorem confirms this conjecture when r=2r=2. For r=3r=3, it is shown by Talbot in \cite{T} that this conjecture is true when mm is in certain ranges. In this paper, we explore the connection between the clique number and Lagrangians for rr-uniform hypergraphs. As an implication of this connection, we prove that the rr-uniform hypergraph with mm edges formed by taking the first mm sets in the colex ordering of N(r){\mathbb N}^{(r)} has the largest Lagrangian of all rr-uniform graphs with tt vertices and mm edges satisfying (t1r)m(t1r)+(t2r1)[(2r6)×2r1+2r3+(r4)(2r7)1]((t2r2)1){t-1\choose r}\leq m \leq {t-1\choose r}+ {t-2\choose r-1}-[(2r-6)\times2^{r-1}+2^{r-3}+(r-4)(2r-7)-1]({t-2\choose r-2}-1) for r4.r\geq 4.Comment: 10 pages. arXiv admin note: substantial text overlap with arXiv:1312.7529, arXiv:1211.7057, arXiv:1211.6508, arXiv:1311.140

    Multiple Access Channels with Generalized Feedback and Confidential Messages

    Full text link
    This paper considers the problem of secret communication over a multiple access channel with generalized feedback. Two trusted users send independent confidential messages to an intended receiver, in the presence of a passive eavesdropper. In this setting, an active cooperation between two trusted users is enabled through using channel feedback in order to improve the communication efficiency. Based on rate-splitting and decode-and-forward strategies, achievable secrecy rate regions are derived for both discrete memoryless and Gaussian channels. Results show that channel feedback improves the achievable secrecy rates.Comment: To appear in the Proceedings of the 2007 IEEE Information Theory Workshop on Frontiers in Coding Theory, Lake Tahoe, CA, September 2-6, 200

    Experimental Study on Ultrahigh Strength Concrete Filled Steel Tube Short Columns under Axial Load

    Get PDF
    Based on the project of Modaoxi Bridge, an experimental study on the compressive behavior of ultrahigh strength concrete filled steel tube (UHSCFST) short column was conducted. A total of 9 UHSCFST specimens were tested, and the cube strength (fcu) of the core concrete reached 115.4 MPa. Main parameters were the confining factor (ξ=0.608, 0.919, and 1.015), steel ratio (α=14.67%, 20.02%, and 21.98%), and steel strength (fy = 349 MPa, 352 MPa, and 427 MPa). The axially loading test results showed that the visible damage of steel tube occurred under the ultimate load. The higher the confining effect, the less the damage features. And all specimens basically presented a drum-type failure mode. The confining effect of steel tube effectively changed the brittle failure mode of ultrahigh strength concrete (UHSC) and tremendously improved the load bearing capacity and ductility of specimens. Moreover, the higher the steel ratio and steel strength of the specimens, the stronger the confining effect. Meanwhile the excellent mechanical properties will be obtained. Also it is recommended that the UHSCFST prefers Q345 or above strength steel tube to ensure sufficient ductility, and the steel ratio should be more than 20%. Furthermore, the confining effect of steel tubes can improve the ultimate bearing capacity of the ultrahigh strength CFST short columns

    A Study of Service Desk Setup in Implementing IT Service Management in Enterprises

    Get PDF
    金沢大学理工研究域電子情報学系Information Technology Service Management (ITSM) provides a framework to provide IT related services and the interaction of IT staff with users, and is often related with the British Government’s Information Technology Infrastructure Library (ITIL). ITIL offers a set of “best practices” for managing IT services and is one of the most widely accepted approaches to IT service management in the world. Recently, more and more enterprises implemented a centralized IT service management model based on the ITIL framework. However, even by adopting ITIL, most of the enterprises didn’t improve their IT service management level. Some factors become the barriers to the success of ITIL and ITSM implementation. In some cases, enterprises paid more attention to IT infrastructure setup and operation but neglect the importance of Service Desk. In this study, we first review ITSM, ITIL and Service Desk. Second, we identify a full function of new Service Desk and how to setup a good Service Desk. Enterprises should take proper measures in building a mature Service Desk to ensure successful implementation of ITSM

    Numerical Study of Hypersonic Boundary Layer Receptivity Characteristics Due to Freestream Pulse Waves

    Get PDF
    A finite difference method is used to do direct numerical simulation (DNS) of hypersonic unsteady flowfield under the action of freestream pulse wave. The response of the hypersonic flowfield to freestream pulse wave is studied, and the generation and evolution characteristics of the boundary layer disturbance waves are discussed. The effects of the pulse wave types on the disturbance mode in the boundary layer are investigated. Results show that the freestream disturbance waves significantly change the shock standoff distance, the distribution of flowfield parameters and the thermodynamic state of boundary layer. In the nose area, the main disturbance modes in the boundary layer are distributed near the fundamental mode. With the evolution of disturbance along with streamwise, the main disturbance modes are transformed from the dominant state of the fundamental mode to the collective leadership state of the second order and the third order harmonic frequency. The intensity of bow shock has significant effects on both the fundamental mode and the harmonic modes in each order. The strong shear structure of boundary layer under different types of freestream pulse waves reveals different stability characteristics. The effects of different types of freestream pulse waves are significant on the distribution and evolution of disturbance modes. The narrowing of frequency band and the decreasing of main disturbance mode clusters exist in the boundary layer both for fast acoustic wave, slow acoustic wave and entropy wave

    Impact of the Inaccuracy of Distance Prediction Algorithms on Internet Applications--an Analytical and Comparative Study

    Get PDF
    Distance prediction algorithms use O(N) Round Trip Time (RTT) measurements to predict the N2 RTTs among N nodes. Distance prediction can be applied to improve the performance of a wide variety of Internet applications: for instance, to guide the selection of a download server from multiple replicas, or to guide the construction of overlay networks or multicast trees. Although the accuracy of existing prediction algorithms has been extensively compared using the relative prediction error metric, their impact on applications has not been systematically studied. In this paper, we consider distance prediction algorithms from an application\u27s perspective to answer the following questions: (1) Are existing prediction algorithms adequate for the applications? (2) Is there a significant performance difference between the different prediction algorithms, and which is the best from the application perspective? (3) How does the prediction error propagate to affect the user perceived application performance? (4) How can we address the fundamental limitation (i.e., inaccuracy) of distance prediction algorithms? We systematically experiment with three types of representative applications (overlay multicast, server selection, and overlay construction), three distance prediction algorithms (GNP, IDES, and the triangulated heuristic), and three real-world distance datasets (King, PlanetLab, and AMP). We find that, although using prediction can improve the performance of these applications, the achieved performance can be dramatically worse than the optimal case where the real distances are known. We formulate statistical models to explain this performance gap. In addition, we explore various techniques to improve the prediction accuracy and the performance of prediction-based applications. We find that selectively conducting a small number of measurements based on prediction-based screening is most effective
    corecore