Search results for " and Cluster Computing"
showing 9 items of 119 documents
Scheduling independent stochastic tasks under deadline and budget constraints
2018
This article discusses scheduling strategies for the problem of maximizing the expected number of tasks that can be executed on a cloud platform within a given budget and under a deadline constraint. The execution times of tasks follow independent and identically distributed probability laws. The main questions are how many processors to enroll and whether and when to interrupt tasks that have been executing for some time. We provide complexity results and an asymptotically optimal strategy for the problem instance with discrete probability distributions and without deadline. We extend the latter strategy for the general case with continuous distributions and a deadline and we design an ef…
Automated detection of contextuality proofs with intermediate numbers of observables
2021
<div style=""><font face="arial, helvetica"><span style="font-size: 13px;">Quantum contextuality takes an important place amongst the concepts of quantum computing that bring an advantage over its classical counterpart. For a large class of contextuality </span></font><span style="font-size: 13px; font-family: arial, helvetica;">proofs, aka. observable-based proofs of the Kochen-Specker Theorem, we first formulate the</span></div><div style=""><font face="arial, helvetica"><span style="font-size: 13px;">contextuality property as the absence of solutions to a linear system. Then we explain why </span></font><span style="font-size: 13px; font-family: arial, helvetica…
A Route toward Protein Sequencing using Solid-State Nanopores Assisted by Machine Learning
2022
Solid-State Nanopores made of 2-D materials such as MoS2 have emerged as one of the most versatile sensors for single-biomolecule detection, which is essential for early disease diagnosis (biomarker detection). One of the most promising applications of SSN is DNA and protein sequencing, at a low cost and faster than the current standard methods. The detection principle relies on measuring the relatively small variations of ionic current as charged biomolecules immersed in an electrolyte traverse the nanopore, in response to an external voltage applied across the membrane. The passage of a biomolecule through the pore yields information about its structure and chemical properties, as demonst…
Computer-assisted enumeration and classification of multi-qubit doilies
2022
For N ≥ 2, an N-qubit doily is a doily living in the N-qubit symplectic polar space. These doilies are related to operator-based proofs of quantum contextuality. Following and extending the strategy of [SdBHG21] that focused exclusively on three-qubit doilies, we first bring forth several formulas giving the number of both linear and quadratic doilies for any N > 2. Then we present an effective algorithm for the generation of all N-qubit doilies. Using this algorithm for N = 4 and N = 5, we provide a classification of N-qubit doilies in terms of types of observables they feature and number of negative lines they are endowed with.
Anomaly‐based intrusion detection systems: The requirements, methods, measurements, and datasets
2021
International audience; With the Internet's unprecedented growth and nations' reliance on computer networks, new cyber‐attacks are created every day as means for achieving financial gain, imposing political agendas, and developing cyberwarfare arsenals. Network security is thus acquiring increasing attention among researchers, practitioners, network architects, policy makers, and others. To defend organizations' networks from existing, foreseen, and future threats, intrusion detection systems (IDSs) are becoming a must. Existing surveys on anomaly‐based IDS (AIDS) focus on specific components such as detection mechanisms and lack many others. In contrast to existing surveys, this article co…
Transient stability simulation of a fixed speed wind turbine by Matlab/Simulink
2007
This paper describes the dynamic behavior of a typical fixed speed wind turbine connected to the grid; the model is developed in the simulation tool Matlab/Simulink and created as a modular structure. The pitch control system is used for stabilization of the wind turbine at grid faults. In this way, voltage stability of the system with grid-connected wind turbines can be improved by using blade-angle control for a temporary reduction of the wind turbine power during a short-circuit fault in the grid. This paper shows a new variable control for maintaining of voltage stability, when a three-phase fault is applied close to the wind turbine and cleared by disconnecting the affected line. In th…
Geometric and morphologic evolution of normal fault planes and traces from 2D to 4D data
2003
Abstract The detailed 3D geometry of normal fault planes is described and analysed using datasets from outcrop studies (2D), seismic surveys (3D) and analogue models (4D). Different geometric configurations of simple isolated normal faults are studied by reference to processes of normal fault propagation. When a normal fault propagates without interacting with other fault zones, the entire border of the principal plane displays characteristic connected secondary structures. These secondary structures cause bifurcations of the principal fault terminations. The along-strike terminations of the principal plane display typical bifurcation configurations (‘ear geometry‘). The orientation of the …
Identification of international media events by spatial and temporal aggregation of RSS flows of newspapers
2013
The GEOMEDIA research project (ANR Corpus, 2013-2015) aims to elaborate an international observatory of media events, based on the collection of RSS flows sent by 100 newspapers of French and English languages. This contribution (1) describes the complexity of the information contained in RSS flows according to space, time and media dimensions; (2) derives basic solutions for the identification of international events on the basis of procedures of time aggregation; (3) analyzes the spatial interaction between countries through an analysis of co-quotations in RSS flows; (4) checks the existence of possible interactions between the two previous dimensions.
Perfect Hashing Structures for Parallel Similarity Searches
2015
International audience; Seed-based heuristics have proved to be efficient for studying similarity between genetic databases with billions of base pairs. This paper focuses on algorithms and data structures for the filtering phase in seed-based heuristics, with an emphasis on efficient parallel GPU/manycores implementa- tion. We propose a 2-stage index structure which is based on neighborhood indexing and perfect hashing techniques. This structure performs a filtering phase over the neighborhood regions around the seeds in constant time and avoid as much as possible random memory accesses and branch divergences. Moreover, it fits particularly well on parallel SIMD processors, because it requ…