Determining the Activity Series with the Fewest Experiments Using Sorting Algorithms

Author(s):  
Joshua Schrier ◽  
Michael F. Tynes ◽  
Lillian Cain
1987 ◽  
Vol 15 (1) ◽  
pp. 226-233
Author(s):  
Mohamed Salehmohamed ◽  
W. S. Luk ◽  
Joseph G. Peters

Computing ◽  
1981 ◽  
Vol 26 (1) ◽  
pp. 1-7 ◽  
Author(s):  
L. Devroye ◽  
T. Klincsek

1978 ◽  
Vol 56 (24) ◽  
pp. 3078-3083 ◽  
Author(s):  
David Victor Fikis ◽  
Keith Walter Heckley ◽  
William John Murphy ◽  
Robert Anderson Ross

The oxygen exchange reaction between O2/C18O2 and the surfaces of vanadium pentoxide and promoted vanadium pentoxide catalysts has been studied in a circulation system using a quartz differential reactor. Isotopic compositions were analysed with an in-line mass spectrometer. Alkali metal sulphates, Li to Cs, were added to the pentoxide as individual promoters at a concentration level of 9 mol % and the effect of variation of promoter concentration was examined with melts containing potassium sulphate at additional levels of 1, 2, and 5 mol%. The structures of the solids were studied by X-ray diffraction and by ATR and transmission infrared spectroscopy. The latter results have been used to explain the two activity series for the exchange rates: (i)V2O5 < Na < Li < K < Rb < Cs (melts) and (ii) V2O5 < 1 mol% < 2 mol% < 5 mol% < 9 mol% (K), in terms of additive effects on the relative abundance and strength of identified vanadium/oxygen linkages in the surfaces of the catalysts.


2002 ◽  
Vol 285 (1) ◽  
pp. 25-42 ◽  
Author(s):  
D. Cantone ◽  
G. Cincotti
Keyword(s):  

2020 ◽  
Vol 11 (2) ◽  
pp. 95-102
Author(s):  
I Nyoman Aditya Yudiswara ◽  
Abba Suganda

Processor technology currently tends to increase the number of cores more than increasing the clock speed. This development is very useful and becomes an opportunity to improve the performance of sequential algorithms that are only done by one core. This paper discusses the sorting algorithm that is executed in parallel by several logical CPUs or cores using the openMP library. This algorithm is named QDM Sort which is a combination of sequential quick sort algorithm and double merge algorithm. This study uses a data parallelism approach to design parallel algorithms from sequential algorithms. The data used in this study are the data that have not been sorted and also the data that has been sorted is integer type which is stored in advance in a file. The parameter measured to determine the performance of the QDM Sort algorithm is speedup. In a condition where a large amount of data is above 4096 and the number of threads in QDM Sort is the same as the number of logical CPUs, the QDM Sort algorithm has a better speedup compared to the other parallel sorting algorithms discussed in this study. For small amounts of data it is still better to use sequential sorting algorithm.


2018 ◽  
Vol 2018 ◽  
pp. 1-10
Author(s):  
Hua Dai ◽  
Hui Ren ◽  
Zhiye Chen ◽  
Geng Yang ◽  
Xun Yi

Outsourcing data in clouds is adopted by more and more companies and individuals due to the profits from data sharing and parallel, elastic, and on-demand computing. However, it forces data owners to lose control of their own data, which causes privacy-preserving problems on sensitive data. Sorting is a common operation in many areas, such as machine learning, service recommendation, and data query. It is a challenge to implement privacy-preserving sorting over encrypted data without leaking privacy of sensitive data. In this paper, we propose privacy-preserving sorting algorithms which are on the basis of the logistic map. Secure comparable codes are constructed by logistic map functions, which can be utilized to compare the corresponding encrypted data items even without knowing their plaintext values. Data owners firstly encrypt their data and generate the corresponding comparable codes and then outsource them to clouds. Cloud servers are capable of sorting the outsourced encrypted data in accordance with their corresponding comparable codes by the proposed privacy-preserving sorting algorithms. Security analysis and experimental results show that the proposed algorithms can protect data privacy, while providing efficient sorting on encrypted data.


Sign in / Sign up

Export Citation Format

Share Document