971 resultados para Distributed development


Relevância:

30.00% 30.00%

Publicador:

Resumo:

A 7.8-mu m surface emitting second-order distributed feedback quantum cascade laser (DFB QCL) structure with metallized surface grating is studied. The modal property of this structure is described by utilizing coupled-mode theory where the coupling coefficients are derived from exact Floquet-Bloch solutions of infinite periodic structure. Based on this theory, the influence of waveguide structure and grating topography as well as device length on the laser performance is numerically investigated. The optimized surface emitting second-order DFB QCL structure design exhibits a high surface outcoupling efficiency of 22% and a low threshold gain of 10 cm(-1). Using a pi phase-shift in the centre of the grating, a high-quality single-lobe far-field radiation pattern is obtained.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

The two-section tunable ridge waveguide distributed Bragg reflector (DBR) laser fabricated by the selective intermixing of an InGaAsP-InGaAsP quantum well structure is presented. The threshold current of the laser is 51mA. The tunable range of the laser is 4.6nm, and the side mode suppression ratio (SMSR) is 40dB.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

We demonstrate surface emitting distributed feedback quantum cascade lasers emitting at wavelengths from 8.1 mu m at 90 K to 8.4 mu m at 210 K. The second-order metalized grating is carefully designed using a modified coupled-mode theory and fabricated by contact lithography. The devices show single mode behavior with a side mode suppression ratio above 18 dB at all working temperatures. At 90 K, the device emits an optical power of 101 mW from the surface and 199 mW from the edge. In addition, a double-lobe far-field pattern with a separation of 2.2 degrees is obtained in the direction along the waveguide.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Costaria costata (C. Agardh) Saunders is one of common kelps distributed in many coastal areas worldwide; however, in China, no reports have been made on cultivation of the genus. To investigate potential cultivation of the species in the northern part of China, trials on isolation and preservation of the gametophytes were conducted using C. costata from Korea; growth and development of the gametophytes were observed. We showed that at 10 +/- 1A degrees C, 60 mu mol m(-2)s(-1) and 12:12 h (L:D), freshly released zoospores settled down within 1 hour, and then developed into the primary cell during the following 2 days. After a vegetative growth phase lasting 6-8 days, female gametophytes became 3-4 times larger in diameter than that of the primary cell, but still remained at a unicellular stage, while male gametophytes divided into 4-10 cells with only a slight change in size. Fertilization occurred within 10 days after the zoospores were released from the sporangia, and the apical and basal tissues of the juvenile sporophyte divided and differentiated into the blade and stipe. Temperature and irradiance influenced gametophytic vegetative growth and developmental patterns. Generally, low irradiance (15 mu mol m(-2)s(-1) and 30 mu mol m(-2)s(-1)) was unfavorable to the induction of fertility, but it enhanced female gametophyte division. The optimal conditions for vegetative growth were 15A degrees C and 30 mu mol m(-2)s(-1). After transplantation of the juvenile seedlings and after eight months cultivation, the harvested mature blade reached 194 cm in length and 32.7 cm in width. Our study proves that it is feasible to implement propagation and large scale cultivation of C. costata in northern China.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

The proliferation of inexpensive workstations and networks has prompted several researchers to use such distributed systems for parallel computing. Attempts have been made to offer a shared-memory programming model on such distributed memory computers. Most systems provide a shared-memory that is coherent in that all processes that use it agree on the order of all memory events. This dissertation explores the possibility of a significant improvement in the performance of some applications when they use non-coherent memory. First, a new formal model to describe existing non-coherent memories is developed. I use this model to prove that certain problems can be solved using asynchronous iterative algorithms on shared-memory in which the coherence constraints are substantially relaxed. In the course of the development of the model I discovered a new type of non-coherent behavior called Local Consistency. Second, a programming model, Mermera, is proposed. It provides programmers with a choice of hierarchically related non-coherent behaviors along with one coherent behavior. Thus, one can trade-off the ease of programming with coherent memory for improved performance with non-coherent memory. As an example, I present a program to solve a linear system of equations using an asynchronous iterative algorithm. This program uses all the behaviors offered by Mermera. Third, I describe the implementation of Mermera on a BBN Butterfly TC2000 and on a network of workstations. The performance of a version of the equation solving program that uses all the behaviors of Mermera is compared with that of a version that uses coherent behavior only. For a system of 1000 equations the former exhibits at least a 5-fold improvement in convergence time over the latter. The version using coherent behavior only does not benefit from employing more than one workstation to solve the problem while the program using non-coherent behavior continues to achieve improved performance as the number of workstations is increased from 1 to 6. This measurement corroborates our belief that non-coherent shared memory can be a performance boon for some applications.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

As the commoditization of sensing, actuation and communication hardware increases, so does the potential for dynamically tasked sense and respond networked systems (i.e., Sensor Networks or SNs) to replace existing disjoint and inflexible special-purpose deployments (closed-circuit security video, anti-theft sensors, etc.). While various solutions have emerged to many individual SN-centric challenges (e.g., power management, communication protocols, role assignment), perhaps the largest remaining obstacle to widespread SN deployment is that those who wish to deploy, utilize, and maintain a programmable Sensor Network lack the programming and systems expertise to do so. The contributions of this thesis centers on the design, development and deployment of the SN Workbench (snBench). snBench embodies an accessible, modular programming platform coupled with a flexible and extensible run-time system that, together, support the entire life-cycle of distributed sensory services. As it is impossible to find a one-size-fits-all programming interface, this work advocates the use of tiered layers of abstraction that enable a variety of high-level, domain specific languages to be compiled to a common (thin-waist) tasking language; this common tasking language is statically verified and can be subsequently re-translated, if needed, for execution on a wide variety of hardware platforms. snBench provides: (1) a common sensory tasking language (Instruction Set Architecture) powerful enough to express complex SN services, yet simple enough to be executed by highly constrained resources with soft, real-time constraints, (2) a prototype high-level language (and corresponding compiler) to illustrate the utility of the common tasking language and the tiered programming approach in this domain, (3) an execution environment and a run-time support infrastructure that abstract a collection of heterogeneous resources into a single virtual Sensor Network, tasked via this common tasking language, and (4) novel formal methods (i.e., static analysis techniques) that verify safety properties and infer implicit resource constraints to facilitate resource allocation for new services. This thesis presents these components in detail, as well as two specific case-studies: the use of snBench to integrate physical and wireless network security, and the use of snBench as the foundation for semester-long student projects in a graduate-level Software Engineering course.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Although cooperation generally increases the amount of resources available to a community of nodes, thus improving individual and collective performance, it also allows for the appearance of potential mistreatment problems through the exposition of one node’s resources to others. We study such concerns by considering a group of independent, rational, self-aware nodes that cooperate using on-line caching algorithms, where the exposed resource is the storage of each node. Motivated by content networking applications – including web caching, CDNs, and P2P – this paper extends our previous work on the off-line version of the problem, which was limited to object replication and was conducted under a game-theoretic framework. We identify and investigate two causes of mistreatment: (1) cache state interactions (due to the cooperative servicing of requests) and (2) the adoption of a common scheme for cache replacement/redirection/admission policies. Using analytic models, numerical solutions of these models, as well as simulation experiments, we show that online cooperation schemes using caching are fairly robust to mistreatment caused by state interactions. When this becomes possible, the interaction through the exchange of miss-streams has to be very intense, making it feasible for the mistreated nodes to detect and react to the exploitation. This robustness ceases to exist when nodes fetch and store objects in response to remote requests, i.e., when they operate as Level-2 caches (or proxies) for other nodes. Regarding mistreatment due to a common scheme, we show that this can easily take place when the “outlier” characteristics of some of the nodes get overlooked. This finding underscores the importance of allowing cooperative caching nodes the flexibility of choosing from a diverse set of schemes to fit the peculiarities of individual nodes. To that end, we outline an emulation-based framework for the development of mistreatment-resilient distributed selfish caching schemes.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Although cooperation generally increases the amount of resources available to a community of nodes, thus improving individual and collective performance, it also allows for the appearance of potential mistreatment problems through the exposition of one node's resources to others. We study such concerns by considering a group of independent, rational, self-aware nodes that cooperate using on-line caching algorithms, where the exposed resource is the storage at each node. Motivated by content networking applications -- including web caching, CDNs, and P2P -- this paper extends our previous work on the on-line version of the problem, which was conducted under a game-theoretic framework, and limited to object replication. We identify and investigate two causes of mistreatment: (1) cache state interactions (due to the cooperative servicing of requests) and (2) the adoption of a common scheme for cache management policies. Using analytic models, numerical solutions of these models, as well as simulation experiments, we show that on-line cooperation schemes using caching are fairly robust to mistreatment caused by state interactions. To appear in a substantial manner, the interaction through the exchange of miss-streams has to be very intense, making it feasible for the mistreated nodes to detect and react to exploitation. This robustness ceases to exist when nodes fetch and store objects in response to remote requests, i.e., when they operate as Level-2 caches (or proxies) for other nodes. Regarding mistreatment due to a common scheme, we show that this can easily take place when the "outlier" characteristics of some of the nodes get overlooked. This finding underscores the importance of allowing cooperative caching nodes the flexibility of choosing from a diverse set of schemes to fit the peculiarities of individual nodes. To that end, we outline an emulation-based framework for the development of mistreatment-resilient distributed selfish caching schemes. Our framework utilizes a simple control-theoretic approach to dynamically parameterize the cache management scheme. We show performance evaluation results that quantify the benefits from instantiating such a framework, which could be substantial under skewed demand profiles.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

National Science Foundation (SBE-0354378); Office of Naval Research (N00014-95-1-0657)

Relevância:

30.00% 30.00%

Publicador:

Resumo:

The goal of this work is to fabricate robust, highly-miniaturised, wireless sensor modules that incorporates ion-selective electrodes (ISEs). pH is one of the main parameters in assessment of the quality of our environment (water, soil) and these ISE/pH sensors will be deployed in a miniaturised, programmable modular system. The simplicity of ISEs (low costs and low power requirements) allow for the preparation of sensors that are all very similar in construction but can at the same time be easily made for variety of different environmentally important ions (i.e. heavy metals). This is important because of the increasing focus on the impact of the quality of the environment on society, both locally, and globally. The work described will contribute to a widely distributed sensor network for monitoring the quality of our environment, focused mainly on soil and water quality.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

The measurement of users’ attitudes towards and confidence with using the Internet is an important yet poorly researched topic. Previous research has encountered issues that serve to obfuscate rather than clarify. Such issues include a lack of distinction between the terms ‘attitude’ and ‘self-efficacy’, the absence of a theoretical framework to measure each concept, and failure to follow well-established techniques for the measurement of both attitude and self-efficacy. Thus, the primary aim of this research was to develop two statistically reliable scales which independently measure attitudes towards the Internet and Internet self-efficacy. This research addressed the outlined issues by applying appropriate theoretical frameworks to each of the constructs under investigation. First, the well-known three component (affect, behaviour, cognition) model of attitudes was applied to previous Internet attitude statements. The scale was distributed to four large samples of participants. Exploratory factor analyses revealed four underlying factors in the scale: Internet Affect, Internet Exhilaration, Social Benefit of the Internet and Internet Detriment. The final scale contains 21 items, demonstrates excellent reliability and achieved excellent model fit in the confirmatory factor analysis. Second, Bandura’s (1997) model of self-efficacy was followed to develop a reliable measure of Internet self-efficacy. Data collected as part of this research suggests that there are ten main activities which individuals can carry out on the Internet. Preliminary analyses suggested that self-efficacy is confounded with previous experience; thus, individuals were invited to indicate how frequently they performed the listed Internet tasks in addition to rating their feelings of self-efficacy for each task. The scale was distributed to a sample of 841 participants. Results from the analyses suggest that the more frequently an individual performs an activity on the Internet, the higher their self-efficacy score for that activity. This suggests that frequency of use ought to be taken into account in individual’s self-efficacy scores to obtain a ‘true’ self-efficacy score for the individual. Thus, a formula was devised to incorporate participants’ previous experience of Internet tasks in their Internet self-efficacy scores. This formula was then used to obtain an overall Internet self-efficacy score for participants. Following the development of both scales, gender and age differences were explored in Internet attitudes and Internet self-efficacy scores. The analyses indicated that there were no gender differences between groups for Internet attitude or Internet self-efficacy scores. However, age group differences were identified for both attitudes and self-efficacy. Individuals aged 25-34 years achieved the highest scores on both the Internet attitude and Internet self-efficacy measures. Internet attitude and self-efficacy scores tended to decrease with age with older participants achieving lower scores on both measures than younger participants. It was also found that the more exposure individuals had to the Internet, the higher their Internet attitude and Internet self-efficacy scores. Examination of the relationship between attitude and self-efficacy found a significantly positive relationship between the two measures suggesting that the two constructs are related. Implication of such findings and directions for future research are outlined in detail in the Discussion section of this thesis.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

BACKGROUND/AIMS: The obesity epidemic has spread to young adults, and obesity is a significant risk factor for cardiovascular disease. The prominence and increasing functionality of mobile phones may provide an opportunity to deliver longitudinal and scalable weight management interventions in young adults. The aim of this article is to describe the design and development of the intervention tested in the Cell Phone Intervention for You study and to highlight the importance of adaptive intervention design that made it possible. The Cell Phone Intervention for You study was a National Heart, Lung, and Blood Institute-sponsored, controlled, 24-month randomized clinical trial comparing two active interventions to a usual-care control group. Participants were 365 overweight or obese (body mass index≥25 kg/m2) young adults. METHODS: Both active interventions were designed based on social cognitive theory and incorporated techniques for behavioral self-management and motivational enhancement. Initial intervention development occurred during a 1-year formative phase utilizing focus groups and iterative, participatory design. During the intervention testing, adaptive intervention design, where an intervention is updated or extended throughout a trial while assuring the delivery of exactly the same intervention to each cohort, was employed. The adaptive intervention design strategy distributed technical work and allowed introduction of novel components in phases intended to help promote and sustain participant engagement. Adaptive intervention design was made possible by exploiting the mobile phone's remote data capabilities so that adoption of particular application components could be continuously monitored and components subsequently added or updated remotely. RESULTS: The cell phone intervention was delivered almost entirely via cell phone and was always-present, proactive, and interactive-providing passive and active reminders, frequent opportunities for knowledge dissemination, and multiple tools for self-tracking and receiving tailored feedback. The intervention changed over 2 years to promote and sustain engagement. The personal coaching intervention, alternatively, was primarily personal coaching with trained coaches based on a proven intervention, enhanced with a mobile application, but where all interactions with the technology were participant-initiated. CONCLUSION: The complexity and length of the technology-based randomized clinical trial created challenges in engagement and technology adaptation, which were generally discovered using novel remote monitoring technology and addressed using the adaptive intervention design. Investigators should plan to develop tools and procedures that explicitly support continuous remote monitoring of interventions to support adaptive intervention design in long-term, technology-based studies, as well as developing the interventions themselves.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

The availability of a very accurate dependence graph for a scalar code is the basis for the automatic generation of an efficient parallel implementation. The strategy for this task which is encapsulated in a comprehensive data partitioning code generation algorithm is described. This algorithm involves the data partition, calculation of assignment ranges for partitioned arrays, addition of a comprehensive set of execution control masks, altering loop limits, addition and optimisation of communications for all data. In this context, the development and implementation of strategies to merge communications wherever possible has proved an important feature in producing efficient parallel implementations for numerical mesh based codes. The code generation strategies described here are embedded within the Computer Aided Parallelisation tools (CAPTools) software as a key part of a toolkit for automating as much as possible of the parallelisation process for mesh based numerical codes. The algorithms used enables parallelisation of real computational mechanics codes with only minor user interaction and without any prior manual customisation of the serial code to suit the parallelisation tool.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Ten polymorphic nuclear microsatellite loci were developed from a microsatellite enriched genomic library of the blue shark, Prionace glauca. The utility of these markers for genetic studies of this globally distributed, heavily exploited, oceanic predator was assessed by screening 120 specimens sampled from six locations throughout the species’ range. Both moderately and highly polymorphic marker loci were identified. Three to 35 alleles were found to be segregating per locus (mean 10.1) with observed heterozygosities ranging from 24 to 91%. Evaluation of the cross-species amplification of these markers across 18 additional shark species indicates that these microsatellites are potentially useful for genetic studies of other species of conservation concern.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

The MaRINET project aims to build a synergy in the European marine renewable energy development infrastructure network, involving a total of 28 partners across the union. Its scope extends from small to large scale testing, in both tank and field. The main activities of the project are to standardize test procedures, to provide centralized free access for European technology developers, and to innovate for improving test infrastructures and techniques.
This paper presents the work carried in this last part, which focuses on research objectives identified to be current challenges for industrial development. They are distributed in 6 topics. On the one hand are issues that concern directly one of the 3 types of energy scoped in the project: wave, tidal, and offshore wind energy. Two examples are the real time estimation of incident waves, and the measurement of turbulence in tidal flows. On the other hand, collaborative effort is drawn on aspects that are common to those technologies: electrical components, environmental monitoring, and dedicated moorings.