New Articles (Page 319)
To stay up to date you can also follow on Mastodon.
π Asynchronous (Clockless) CPU
An asynchronous circuit, or self-timed circuit, is a sequential digital logic circuit which is not governed by a clock circuit or global clock signal. Instead it often uses signals that indicate completion of instructions and operations, specified by simple data transfer protocols. This type of circuit is contrasted with synchronous circuits, in which changes to the signal values in the circuit are triggered by repetitive pulses called a clock signal. Most digital devices today use synchronous circuits. However asynchronous circuits have the potential to be faster, and may also have advantages in lower power consumption, lower electromagnetic interference, and better modularity in large systems. Asynchronous circuits are an active area of research in digital logic design.
Discussed on
- "Asynchronous (Clockless) CPU" | 2018-10-05 | 168 Upvotes 60 Comments
π Pearson Hashing
Pearson hashing is a hash function designed for fast execution on processors with 8-bit registers. Given an input consisting of any number of bytes, it produces as output a single byte that is strongly dependent on every byte of the input. Its implementation requires only a few instructions, plus a 256-byte lookup table containing a permutation of the values 0 through 255.
This hash function is a CBC-MAC that uses an 8-bit substitution cipher implemented via the substitution table. An 8-bit cipher has negligible cryptographic security, so the Pearson hash function is not cryptographically strong, but it is useful for implementing hash tables or as a data integrity check code, for which purposes it offers these benefits:
- It is extremely simple.
- It executes quickly on resource-limited processors.
- There is no simple class of inputs for which collisions (identical outputs) are especially likely.
- Given a small, privileged set of inputs (e.g., reserved words for a compiler), the permutation table can be adjusted so that those inputs yield distinct hash values, producing what is called a perfect hash function.
- Two input strings differing by exactly one character never collide. E.g., applying the algorithm on the strings ABC and AEC will never produce the same value.
One of its drawbacks when compared with other hashing algorithms designed for 8-bit processors is the suggested 256 byte lookup table, which can be prohibitively large for a small microcontroller with a program memory size on the order of hundreds of bytes. A workaround to this is to use a simple permutation function instead of a table stored in program memory. However, using a too simple function, such as T[i] = 255-i, partly defeats the usability as a hash function as anagrams will result in the same hash value; using a too complex function, on the other hand, will affect speed negatively. Using a function rather than a table also allows extending the block size. Such functions naturally have to be bijective, like their table variants.
The algorithm can be described by the following pseudocode, which computes the hash of messageΒ C using the permutation tableΒ T:
algorithm pearson hashing is
hΒ := 0
for each c in C loop
hΒ := T[ h xor c ]
end loop
return h
The hash variable (h) may be initialized differently, e.g. to the length of the data (C) modulo 256; this particular choice is used in the Python implementation example below.
π Unidirectional Network
A unidirectional network (also referred to as a unidirectional gateway or data diode) is a network appliance or device that allows data to travel in only one direction. Data diodes can be found most commonly in high security environments, such as defense, where they serve as connections between two or more networks of differing security classifications. Given the rise of industrial IoT and digitization, this technology can now be found at the industrial control level for such facilities as nuclear power plants, power generation and safety critical systems like railway networks.
After years of development the use of data diodes have increased creating two variations:
- Data diode: Network appliance or device allowing raw data to travel only in one direction, used in guaranteeing information security or protection of critical digital systems, such as industrial control systems, from inbound cyber attacks.
- Unidirectional gateway: Combination of hardware and software running in proxy computers in the source and destination networks. The hardware, a data diode, enforces physical unidirectionality and the software replicates databases and emulates protocol servers to handle bi-directional communication. The unidirectional gateway is capable of transferring multiple protocols and data types simultaneously. It contains a broader range of cybersecurity features like, secure boot, certificate management, data integrity, forward error correction (FEC), secure communication via TLS, among others. A unique characteristic is that data is transferred deterministically (to predetermined locations) with a protocol "break" that allows the data to be transferred through the data diode.
Data diodes are commonly found in high security military and government environments, and are now becoming widely spread in sectors like oil & gas, water/wastewater, airplanes (between flight control units and in-flight entertainment systems), manufacturing and cloud connectivity for industrial IoT. New regulations have increased demand and with increased capacity, major technology vendors have lowered the cost of the core technology.
Discussed on
- "Unidirectional Network" | 2018-10-04 | 15 Upvotes 5 Comments
π Loglan β a predicate logic-based language for humans
Loglan is a constructed language originally designed for linguistic research, particularly for investigating the SapirβWhorf Hypothesis. The language was developed beginning in 1955 by Dr James Cooke Brown with the goal of making a language so different from natural languages that people learning it would think in a different way if the hypothesis were true. In 1960 Scientific American published an article introducing the language. Loglan is the first among, and the main inspiration for, the languages known as logical languages, which also includes Lojban.
Brown founded The Loglan Institute (TLI) to develop the language and other applications of it. He always considered the language an incomplete research project, and although he released many papers about its design, he continued to claim legal restrictions on its use. Because of this, a group of his followers later formed the Logical Language Group to create the language Lojban along the same principles, but with the intention to make it freely available and encourage its use as a real language.
Supporters of Lojban use the term Loglan as a generic term to refer to both their own language, and Brown's Loglan, referred to as "TLI Loglan" when in need of disambiguation. Although the non-trademarkability of the term Loglan was eventually upheld by the United States Patent and Trademark Office, many supporters and members of The Loglan Institute find this usage offensive, and reserve Loglan for the TLI version of the language.
Discussed on
- "Loglan β a predicate logic-based language for humans" | 2018-10-03 | 98 Upvotes 37 Comments
π Donna Strickland won her Nobel prize in Physics before she got a wikipedia page
Donna Theo Strickland, (born 27 May 1959) is a Canadian optical physicist and pioneer in the field of pulsed lasers. She was awarded the Nobel Prize in Physics in 2018, together with GΓ©rard Mourou, for the invention of chirped pulse amplification. She is a professor at the University of Waterloo.
She served as fellow, vice president, and president of The Optical Society, and is currently chair of their Presidential Advisory Committee. In 2018, she was listed as one of BBC's 100 Women.
Discussed on
- "Donna Strickland won her Nobel prize in Physics before she got a wikipedia page" | 2018-10-02 | 41 Upvotes 24 Comments
π Fletcher's Checksum
The Fletcher checksum is an algorithm for computing a position-dependent checksum devised by John G. Fletcher (1934β2012) at Lawrence Livermore Labs in the late 1970s. The objective of the Fletcher checksum was to provide error-detection properties approaching those of a cyclic redundancy check but with the lower computational effort associated with summation techniques.
Discussed on
- "Fletcher's Checksum" | 2018-10-02 | 87 Upvotes 11 Comments
π Miller Columns
Miller columns (also known as cascading lists) are a browsing/visualization technique that can be applied to tree structures. The columns allow multiple levels of the hierarchy to be open at once, and provide a visual representation of the current location. It is closely related to techniques used earlier in the Smalltalk browser, but was independently invented by Mark S. Miller in 1980 at Yale University. The technique was then used at Project Xanadu, Datapoint, and NeXT.
While at Datapoint, Miller generalized the technique to browse directed graphs with labeled nodes and arcs. In all cases, the technique is appropriate for structures with high degree (large fanout). For low-degree structures, outline editors or graph viewers are more effective.
Discussed on
- "Miller Columns" | 2018-10-02 | 177 Upvotes 90 Comments
π Hajnal line
The Hajnal line is a border that links Saint Petersburg, Russia and Trieste, Italy. In 1965, John Hajnal discovered it divides Europe into two areas characterized by different levels of nuptiality. To the west of the line, marriage rates and thus fertility were comparatively low and a significant minority of women married late or remained single; to the east of the line and in the Mediterranean and select pockets of Northwestern Europe, early marriage was the norm and high fertility was countered by high mortality.
Discussed on
- "Hajnal line" | 2018-09-30 | 102 Upvotes 38 Comments
π Crew resource management
Crew resource management or cockpit resource management (CRM) is a set of training procedures for use in environments where human error can have devastating effects. Used primarily for improving aviation safety, CRM focuses on interpersonal communication, leadership, and decision making in the cockpit of an airliner. Its pioneer was David Beaty, a former Royal Air Force pilot and later a BOAC pilot who wrote his seminal book The Human Factor in Aircraft Accidents in the late 1950s. Despite the considerable development of electronic aids since then, many principles he developed continue to prove effective today.
Crew resource management formally began with a National Transportation Safety Board (NTSB) recommendation made during their investigation of the 1978 United Airlines Flight 173 crash. The issues surrounding that crash included a DC-8 crew running out of fuel over Portland, Oregon while troubleshooting a landing gear problem.
The term "cockpit resource management" (later generalized to "crew resource management") was coined in 1979 by NASA psychologist John Lauber who had studied communication processes in cockpits for several years. While retaining a command hierarchy, the concept was intended to foster a less authoritarian cockpit culture, where co-pilots were encouraged to question captains if they observed them making mistakes.
Crew resource management grew out of the 1977 Tenerife airport disaster where two Boeing 747 aircraft collided on the runway killing 583 people. A few weeks later, NASA held a workshop on the topic, endorsing this innovative training. United Airlines was the first airline to provide CRM training for its cockpit crews in 1981. By the 1990s, it had become a global standard.
United Airlines additionally trained their flight attendants to use CRM in conjunction with the pilots to provide another layer of enhanced communication and teamwork. Studies have shown that by both work groups using CRM together, communication barriers are reduced and problems can be solved more efficiently, leading to increased safety. CRM training concepts have been modified for application to a wide range of activities where people must make dangerous time-critical decisions. These arenas include air traffic control, ship handling, firefighting, and medical operating rooms.
Discussed on
- "Crew resource management" | 2018-09-30 | 39 Upvotes 10 Comments
π Project West Ford
Project West Ford (also known as Westford Needles and Project Needles) was a test carried out by Massachusetts Institute of Technology's Lincoln Laboratory on behalf of the United States Military in 1961 and 1963 to create an artificial ionosphere above the Earth. This was done to solve a major weakness that had been identified in US military communications.
Discussed on
- "Project West Ford" | 2018-09-29 | 148 Upvotes 7 Comments
- "Project West Ford" | 2016-03-26 | 51 Upvotes 7 Comments