77 research outputs found

    Transient and Permanent Error Control for High-End Multiprocessor Systems-on-Chip

    Get PDF
    High-end MPSoC systems with built-in high-radix topologies achieve good performance because of the improved connectivity and the reduced network diameter. In high-end MPSoC systems, fault tolerance support is becoming a compulsory feature. In this work, we propose a combined method to address permanent and transient link and router failures in those systems. The LBDRhr mechanism is proposed to tolerate permanent link failures in some popular high-radix topologies. The increased router complexity may lead to more transient router errors than routers using simple XY routing algorithm. We exploit the inherent information redundancy (IIR) in LBDRhr logic to manage transient errors in the network routers. Thorough analyses are provided to discover the appropriate internal nodes and the forbidden signal patterns for transient error detection. Simulation results show that LBDRhr logic can tolerate all of the permanent failure combinations of long-range links and 80% of links failures at short-range links. Case studies show that the error detection method based on the new IIR extraction method reduces the power consumption and the residual error rate by 33% and up to two orders of magnitude, respectively, compared to triple modular redundancy. The impact of network topologies on the efficiency of the detection mechanism has been examined in this work, as well

    A Multi-Function Provable Data Possession Scheme in Cloud Computing

    Get PDF
    In order to satisfy the different requirements of provable data possession in cloud computing, a multi-function provable data possession (MF-PDP) is proposed, which supports public verification, data dynamic, unlimited times verification, sampling verification. Besides, it is security in RO model and it is verification privacy under half trust model and can prevent from replacing attack and replay attack. The detail design is provided and the theory analysis about the correct, security and performance are also described. The experiment emulation and compare analysis suggest the feasibility and advantage

    Quantum Algorithm for Unsupervised Anomaly Detection

    Full text link
    Anomaly detection, an important branch of machine learning, plays a critical role in fraud detection, health care, intrusion detection, military surveillance, etc. As one of the most commonly used unsupervised anomaly detection algorithms, the Local Outlier Factor algorithm (LOF algorithm) has been extensively studied. This algorithm contains three steps, i.e., determining the k-distance neighborhood for each data point x, computing the local reachability density of x, and calculating the local outlier factor of x to judge whether x is abnormal. The LOF algorithm is computationally expensive when processing big data sets. Here we present a quantum LOF algorithm consisting of three parts corresponding to the classical algorithm. Specifically, the k-distance neighborhood of x is determined by amplitude estimation and minimum search; the local reachability density of each data point is calculated in parallel based on the quantum multiply-adder; the local outlier factor of each data point is obtained in parallel using amplitude estimation. It is shown that our quantum algorithm achieves exponential speedup on the dimension of the data points and polynomial speedup on the number of data points compared to its classical counterpart. This work demonstrates the advantage of quantum computing in unsupervised anomaly detection

    Enhanced mechanical properties in β-Ti alloy aged from recrystallized ultrafine β grains

    Get PDF
    Ultrafine β grain structures with recrystallized morphologies were fabricated by severe plastic deformation and subsequent annealing in Ti-10Mo-8 V-1Fe-3.5Al alloy. The minimum mean β grain size of 480 nm was obtained for the first time as a recrystallized structure in Ti alloys. Precipitation behavior of α in subsequent aging significantly changed with decreasing the recrystallized β grain size. Both tensile strength and total ductility of the aged Ti-alloy were increased by the β grain refinement. Tensile strength of 1.6 GPa and total elongation of 9.1% were achieved in the aged specimen having the prior β grain size of 480 nm, which was attributed to its finer and more homogeneous precipitated microstructure having a mixture of nanoscale thin-plate α and globular α without side α plates along β grain boundaries

    Achieving large super-elasticity through changing relative easiness of deformation modes in Ti-Nb-Mo alloy by ultra-grain refinement

    Get PDF
    Large super-elasticity approaching its theoretically expected value was achieved in Ti-13.3Nb-4.6Mo alloy having an ultrafine-grained β-phase. In-situ synchrotron radiation X-ray diffraction analysis revealed that the dominant yielding mechanism changed from dislocation slip to martensitic transformation by decreasing the β-grain size down to sub-micrometer. Different grain size dependence of the critical stress to initiate dislocation slip and martensitic transformation, which was reflected by the transition of yielding behavior, was considered to be the main reason for the large super-elasticity in the ultrafine-grained specimen. The present study clarified that ultra-grain refinement down to sub-mirometer scale made dislocation slips more difficult than martensitic transformation, leading to an excellent super-elasticity close to the theoretical limit in the β-Ti alloy

    Device-independent verification of Einstein-Podolsky-Rosen steering

    Full text link
    If the presence of entanglement could be certified in a device-independent (DI) way, it is likely to provide various quantum information processing tasks with unconditional security. Recently, it was shown that a DI protocol, combining measurement-device-independent techniques with self-testing, is able to verify all entangled states, however, it imposes demanding requirements on its practical implementation. Here, we present a less-demanding protocol based on Einstein-Podolsky-Rosen (EPR) steering, which is achievable with current technology. Particularly, we first establish a complete framework for DI verification of EPR steering and show that all steerable states can be verified. Then, we analyze the three-measurement setting case, allowing for imperfections of self-testing. Finally, a four-photon experiment is implemented to device-independently verify EPR steering and to further demonstrate that even Bell local states can be faithfully verified. Our findings pave the way for realistic applications of secure quantum information tasksComment: 6+8 pages; Comments are welcom

    Finishing the euchromatic sequence of the human genome

    Get PDF
    The sequence of the human genome encodes the genetic instructions for human physiology, as well as rich information about human evolution. In 2001, the International Human Genome Sequencing Consortium reported a draft sequence of the euchromatic portion of the human genome. Since then, the international collaboration has worked to convert this draft into a genome sequence with high accuracy and nearly complete coverage. Here, we report the result of this finishing process. The current genome sequence (Build 35) contains 2.85 billion nucleotides interrupted by only 341 gaps. It covers ∼99% of the euchromatic genome and is accurate to an error rate of ∼1 event per 100,000 bases. Many of the remaining euchromatic gaps are associated with segmental duplications and will require focused work with new methods. The near-complete sequence, the first for a vertebrate, greatly improves the precision of biological analyses of the human genome including studies of gene number, birth and death. Notably, the human enome seems to encode only 20,000-25,000 protein-coding genes. The genome sequence reported here should serve as a firm foundation for biomedical research in the decades ahead
    corecore