11 resultados para Hybrid secret sharing schemes


Relevância:

100.00% 100.00%

Publicador:

Resumo:

We report the first experimental generation and characterization of a six-photon Dicke state. The produced state shows a fidelity of F=0.56 +/- 0.02 with respect to an ideal Dicke state and violates a witness detecting genuine six-qubit entanglement by 4 standard deviations. We confirm characteristic Dicke properties of our resource and demonstrate its versatility by projecting out four- and five-photon Dicke states, as well as four-photon Greenberger-Horne-Zeilinger and W states. We also show that Dicke states have interesting applications in multiparty quantum networking protocols such as open-destination teleportation, telecloning, and quantum secret sharing.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

We present photometric and spectroscopic data of the peculiar SN 2005la, an object which shows an optical light curve with some luminosity fluctuations and spectra with comparably strong narrow hydrogen and helium lines, probably of circumstellar nature. The increasing full width at half-maximum velocity of these lines is indicative of an acceleration of the circumstellar material. SN 2005la exhibits hybrid properties, sharing some similarities with both Type IIn supernovae and 2006jc-like (Type Ibn) events. We propose that the progenitor of SN 2005la was a very young Wolf-Rayet (WN-type) star which experienced mass ejection episodes shortly before core collapse.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

A numerical and experimental investigation on the mode-I intralaminar toughness of a hybrid plain weave composite laminate manufactured using resin infusion under flexible tooling (RIFT) process is presented in this paper. The pre-cracked geometries consisted of overheight compact tension (OCT), double edge notch (DEN) and centrally cracked four-point-bending (4PBT) test specimens. The position as well as the strain field ahead of the crack tip during the loading stage was determined using a digital speckle photogrammetry system. The limitation on the applicability of the standard data reduction schemes for the determination of intralaminar toughness of composite materials is presented and discussed. A methodology based on the numerical evaluation of the strain energy release rate using the J-integral method is proposed to derive new geometric correction functions for the determination of the stress intensity factor for composites. The method accounts for material anisotropy and finite specimen dimension effects regardless of the geometry. The approach has been validated for alternative non-standard specimen geometries. A comparison between different methods currently available for computing the intralaminar fracture toughness in composite laminates is presented and a good agreement between numerical and experimental results using the proposed methodology was obtained. 

Relevância:

30.00% 30.00%

Publicador:

Resumo:

This paper presents a robust finite element procedure for modelling the behaviour of postbuckling structures undergoing mode-jumping. Current non-linear implicit finite element solution schemes, found in most finite element codes, are discussed and their shortcomings highlighted. A more effective strategy is presented which combines a quasi-static and a pseudo-transient routine for modelling this behaviour. The switching between these two schemes is fully automated and therefore eliminates the need for user intervention during the solution process. The quasi-static response is modelled using the are-length constraint while the pseudo-transient routine uses a modified explicit dynamic routine, which is more computationally efficient than standard implicit and explicit dynamic schemes. The strategies for switching between the quasi-static and pseudo-transient routines are presented

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Many scientific applications are programmed using hybrid programming models that use both message passing and shared memory, due to the increasing prevalence of large-scale systems with multicore, multisocket nodes. Previous work has shown that energy efficiency can be improved using software-controlled execution schemes that consider both the programming model and the power-aware execution capabilities of the system. However, such approaches have focused on identifying optimal resource utilization for one programming model, either shared memory or message passing, in isolation. The potential solution space, thus the challenge, increases substantially when optimizing hybrid models since the possible resource configurations increase exponentially. Nonetheless, with the accelerating adoption of hybrid programming models, we increasingly need improved energy efficiency in hybrid parallel applications on large-scale systems. In this work, we present new software-controlled execution schemes that consider the effects of dynamic concurrency throttling (DCT) and dynamic voltage and frequency scaling (DVFS) in the context of hybrid programming models. Specifically, we present predictive models and novel algorithms based on statistical analysis that anticipate application power and time requirements under different concurrency and frequency configurations. We apply our models and methods to the NPB MZ benchmarks and selected applications from the ASC Sequoia codes. Overall, we achieve substantial energy savings (8.74 percent on average and up to 13.8 percent) with some performance gain (up to 7.5 percent) or negligible performance loss.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

A range of chloroplumbate(II) organic salts, based on the two cations, 1-ethyl-3-methylimidazolium and trihexyl(tetradecyl) phosphonium, was prepared by ionothermal synthesis. Depending on the structure of the organic cation and on the molar ratio of PbCl2 in the product,.PbCl2, the salts were room-temperature ionic liquids or crystalline organic/inorganic hybrid materials. The solids were studied using Raman spectroscopy; the crystal structure of [C(2)mim]{PbCl3} was determined and shown to contain 1D infinite chloroplumbate(II) strands formed by edge-sharing tetragonal pyramids of pentacoordinate (PbCl5) units. The liquids were analysed using Pb-207 NMR and Raman spectroscopies, as well as viscometry. Phase diagrams were constructed based on differential scanning calorimetry (DSC) measurements. Discrete anions: [PbCl4](2-) and [PbCl3](-), were detected in the liquid state. The trichloroplumbate(II) anion was shown to have a flexible structure due to the presence of a stereochemically-active lone pair. The relationship between the liquid phase anionic speciation and the structure of the corresponding crystalline products of ionothermal syntheses was discussed, and the data were compared with analogous tin(II) systems.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Policy-based network management (PBNM) paradigms provide an effective tool for end-to-end resource
management in converged next generation networks by enabling unified, adaptive and scalable solutions
that integrate and co-ordinate diverse resource management mechanisms associated with heterogeneous
access technologies. In our project, a PBNM framework for end-to-end QoS management in converged
networks is being developed. The framework consists of distributed functional entities managed within a
policy-based infrastructure to provide QoS and resource management in converged networks. Within any
QoS control framework, an effective admission control scheme is essential for maintaining the QoS of
flows present in the network. Measurement based admission control (MBAC) and parameter basedadmission control (PBAC) are two commonly used approaches. This paper presents the implementationand analysis of various measurement-based admission control schemes developed within a Java-based
prototype of our policy-based framework. The evaluation is made with real traffic flows on a Linux-based experimental testbed where the current prototype is deployed. Our results show that unlike with classic MBAC or PBAC only schemes, a hybrid approach that combines both methods can simultaneously result in improved admission control and network utilization efficiency

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Heterogeneous Networks (HetNets) are known to enhance the bandwidth efficiency and throughput of wireless networks by more effectively utilizing the network resources. However, the higher density of users and access points in HetNets introduces significant inter-user interference that needs to be mitigated through complex and sophisticated interference cancellation schemes. Moreover, due to significant channel attenuation and presence of hardware impairments, e.g., phase noise and amplifier nonlinearities, the vast bandwidth in the millimeter-wave band has not been fully utilized to date. In order to enable the development of multi-Gigabit per second wireless networks, we introduce a novel millimeter-wave HetNet paradigm, termed hybrid HetNet, which exploits the vast bandwidth and propagation characteristics in the 60 GHz and 70–80 GHz bands to reduce the impact of interference in HetNets. Simulation results are presented to illustrate the performance advantage of hybrid HetNets with respect to traditional networks. Next, two specific transceiver structures that enable hand-offs from the 60 GHz band, i.e., the V-band to the 70–80 GHz band, i.e., the E-band, and vice versa are proposed. Finally, the practical and regulatory challenges for establishing a hybrid HetNet are outlined.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

As the number of high profile cases of institutional child abuse mounts internationally, and the demands of victims for justice are heard, state responses have ranged from prosecution, apology, and compensation schemes, to truth commissions or public inquiries. Drawing on the examples of Australia and Northern Ireland as two jurisdictions with a recent and ongoing history of statutory inquiries into institutional child abuse, the article utilises the restorative justice paradigm to critically evaluate the strengths and limitations of the inquiry framework in providing ‘justice’ for victims. It critically explores the normative and pragmatic implications of a hybrid model as a more effective route to procedural justice and suggests that an appropriately designed restorative pathway may augment the legitimacy and utility of the public inquiry model for victims chiefly via improving offender accountability and ‘voice’ for victims. The article concludes by offering some thoughts on the broader implications for other jurisdictions in responding to large-scale historical abuses and seeking to come to terms with the legacy of institutional child abuse.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

In this paper, we propose three relay selection schemes for full-duplex heterogeneous networks in the presence of multiple cognitive radio eavesdroppers. In this setup, the cognitive small-cell nodes (secondary network) can share the spectrum licensed to the macro-cell system (primary network) on the condition that the quality-of-service of the primary network is always satisfied subjected to its outage probability constraint. The messages are delivered from one small-cell base station to the destination with the help of full-duplex small-cell base stations, which act as relay nodes. Based on the availability of the network’s channel state information at the secondary information source, three different selection criteria for full-duplex relays, namely: 1) partial relay selection; 2) optimal relay selection; and 3) minimal self-interference relay selection, are proposed. We derive the exact closed-form and asymptotic expressions of the secrecy outage probability for the three criteria under the attack of non-colluding/colluding eavesdroppers. We demonstrate that the optimal relay selection scheme outperforms the partial relay selection and minimal self-interference relay selection schemes at the expense of acquiring full channel state information knowledge. In addition, increasing the number of the full-duplex small-cell base stations can improve the security performance. At the illegitimate side, deploying colluding eavesdroppers and increasing the number of eavesdroppers put the confidential information at a greater risk. Besides, the transmit power and the desire outage probability of the primary network have great influences on the secrecy outage probability of the secondary network.