1,703 research outputs found

    Experimental Study of the Cloud Architecture Selection for Effective Big Data Processing

    Full text link
    Big data dictate their requirements to the hardware and software. Simple migration to the cloud data processing, while solving the problem of increasing computational capabilities, however creates some issues: the need to ensure the safety, the need to control the quality during data transmission, the need to optimize requests. Computational cloud does not simply provide scalable resources but also requires network infrastructure, unknown routes and the number of user requests. In addition, during functioning situation can occur, in which you need to change the architecture of the application - part of the data needs to be placed in a private cloud, part in a public cloud, part stays on the client

    GRBs with optical afterglow and known redshift: a statistical study

    Full text link
    We present a correlation between two intrinsic parameters of GRB optical afterglows. These are the isotropic luminosity at the maximum of the light curve (Lpeak) and the time-integrated isotropic energy (Eiso) radiated after the observed maximum. We test the correlation between the logarithms of (Eiso) and (Lpeak) and finally we value the effect of the different samples of GRBs in according with the first optical observation reduced to proper time.Comment: To be published in the proceedings of the conference "SWIFT and GRBs: Unveiling the Relativistic Universe", Venice, June 5-9, 200

    The Effect of Surface Roughness on the Universal Thermal Conductance

    Get PDF
    We explain the reduction of the thermal conductance below the predicted universal value observed by Schwab et al. in terms of the scattering of thermal phonons off surface roughness using a scalar model for the elastic waves. Our analysis shows that the thermal conductance depends on two roughness parameters: the roughness amplitude δ\delta and the correlation length aa. At sufficiently low temperatures the conductance decrease from the universal value quadratically with temperature at a rate proportional to δ2a\delta ^{2}a. Values of δ\delta equal to 0.22 and aa equal to about 0.75 of the width of the conduction pathway give a good fit to the data.Comment: 10 pages, 5 figures. Ref. added, typo correcte

    MV3: A new word based stream cipher using rapid mixing and revolving buffers

    Get PDF
    MV3 is a new word based stream cipher for encrypting long streams of data. A direct adaptation of a byte based cipher such as RC4 into a 32- or 64-bit word version will obviously need vast amounts of memory. This scaling issue necessitates a look for new components and principles, as well as mathematical analysis to justify their use. Our approach, like RC4's, is based on rapidly mixing random walks on directed graphs (that is, walks which reach a random state quickly, from any starting point). We begin with some well understood walks, and then introduce nonlinearity in their steps in order to improve security and show long term statistical correlations are negligible. To minimize the short term correlations, as well as to deter attacks using equations involving successive outputs, we provide a method for sequencing the outputs derived from the walk using three revolving buffers. The cipher is fast -- it runs at a speed of less than 5 cycles per byte on a Pentium IV processor. A word based cipher needs to output more bits per step, which exposes more correlations for attacks. Moreover we seek simplicity of construction and transparent analysis. To meet these requirements, we use a larger state and claim security corresponding to only a fraction of it. Our design is for an adequately secure word-based cipher; our very preliminary estimate puts the security close to exhaustive search for keys of size < 256 bits.Comment: 27 pages, shortened version will appear in "Topics in Cryptology - CT-RSA 2007

    Tevatron Beam Halo Collimation System: Design, Operational Experience and New Methods

    Full text link
    Collimation of proton and antiproton beams in the Tevatron collider is required to protect CDF and D0 detectors and minimize their background rates, to keep irradiation of superconducting magnets under control, to maintain long-term operational reliability, and to reduce the impact of beam-induced radiation on the environment. In this article we briefly describe the design, practical implementation and performance of the collider collimation system, methods to control transverse and longitudinal beam halo and two novel collimation techniques tested in the Tevatron.Comment: 25 p

    Crystal experiments on efficient beam extraction

    Get PDF
    Silicon crystal was channeling and extracting 70-GeV protons from the U-70 accelerator with efficiency of 85.3+-2.8% as measured for a beam of 10^12 protons directed towards crystals of 2 mm length in spills of 1-2 s duration. The experimental data follow very well the prediction of Monte Carlo simulations. This success is important to devise a more efficient use of the U-70 accelerator in Protvino and provides a crucial support for implementation of crystal-assisted collimation of gold ion beam in RHIC and slow extraction from AGS onto E952, now in preparation at Brookhaven Nat'l Lab. Future applications, spanning in the energy from sub-GeV (medical) to order of 1 GeV (scraping in the SNS, extraction from COSY) to order of 1 TeV and beyond (scraping in the Tevatron, LHC, VLHC), can benefit from these studies.Comment: 12pp. Presented at 19-th Intern. Conference on Atomic Collisions in Solids (ICACS-19: Paris, July 29 - August 3, 2001
    corecore