43,210 research outputs found
Solving the global atmospheric equations through heterogeneous reconfigurable platforms
One of the most essential and challenging components in climate modeling is the atmospheric model. To solve multiphysical atmospheric equations, developers have to face extremely complex stencil kernels that are costly in terms of both computing and memory resources. This article aims to accelerate the solution of global shallow water equations (SWEs), which is one of the most essential equation sets describing atmospheric dynamics. We first design a hybrid methodology that employs both the host CPU cores and the field-programmable gate array (FPGA) accelerators to work in parallel. Through a careful adjustment of the computational domains, we achieve a balanced resource utilization and a further improvement of the overall performance. By decomposing the resource-demanding SWE kernel, we manage to map the double-precision algorithm into three FPGAs. Moreover, by using fixed-point and reduced-precision floating point arithmetic, we manage to build a fully pipelined mixed-precision design on a single FPGA, which can perform 428 floating-point and 235 fixed-point operations per cycle. The mixed-precision design with four FPGAs running together can achieve a speedup of 20 over a fully optimized design on a CPU rack with two eight-core processorsand is 8 times faster than the fully optimized Kepler GPU design. As for power efficiency, the mixed-precision design with four FPGAs is 10 times more power efficient than a Tianhe-1A supercomputer node.</jats:p
WSN based intelligent cold chain management
This paper presents a cold chain monitoring system which is implemented by using ubiquitous computing technologies, Radio Frequency Identification (RFID) & Wireless Sensor Network (WSN). In this paper, we discuss how cold supply chain works and how we can monitor and control cold supply chain by using wireless tracking and sensing technologies. We propose a prototype design which will provide a well controlled and transparent cold chain system, which could help the users to manage their products’ environmental data in real time during the life cycle. Moreover, we highlight how the availability of product trace data in combination with historical condition-monitoring data can facilitate decision-making processes enhancing supply chain’s performance. Finally we discuss the integration works of these two technologies together in the cold supply chain management system. Hardware and software platform of WSN used in this system are also described in this paper
Recommended from our members
Influence of absorbed water on the dielectric properties and glass-transition temperature of silica-filled epoxy nanocomposites
Work on dielectric spectroscopy of epoxy resin filled with nano-SiO2 at different relative humidities and temperatures is reported. Above the glass-transition temperature (Tg), dc-like imperfect charge transport (QDC or LFD) dominates the low frequency dielectric spectrum. Another mid-frequency relaxation process was found in the non-dried composites. Water also induces glass-transition temperature decreases, which can be measured both by dielectric spectroscopy and DSC. Both theory and experiment demonstrated that a higher water content could exist in nanocomposites than unfilled epoxy suggesting a bigger free volume when nanostructured. In our system, the hydrophilic surface of silica is likely to cause water to surround and lead to delamination of the epoxy from SiO2. This is a potential mechanical and dielectric weakness in the nanocomposites, which may lead to an ageing phenomenon. Hydrophobic surface group may reduce the water adsorption in nanocomposites
Study of intermixing in a GaAs/AlGaAs quantum-well structure using doped spin-on silica layers
The effect of two different dopants, P and Ga, in spin-on glass (SOG) films on impurity-free vacancy disordering (IFVD) in GaAs/AlGaAs quantum-well structures has been investigated. It is observed that by varying the annealing and baking temperatures, P-doped SOG films created a similar amount of intermixing as the undoped SOG films. This is different from the results of other studies of P-doped SiO₂ and is ascribed to the low doping concentration of P, indicating that the doping concentration of P in the SiO₂ layer is one of the key parameters that may control intermixing. On the other hand, for all the samples encapsulated with Ga-doped SOG layers, significant suppression of the intermixing was observed, making them very promising candidates with which to achieve the selective-area defect engineering that is required for any successful application of IFVD.One of the authors (H.H.T.) acknowledges a fellowship
awarded to him by the Australian Research Council
General covariant Horava-Lifshitz gravity without projectability condition and its applications to cosmology
We consider an extended theory of Horava-Lifshitz gravity with the detailed
balance condition softly breaking, but without the projectability condition.
With the former, the number of independent coupling constants is significantly
reduced. With the latter and by extending the original foliation-preserving
diffeomorphism symmetry to include a local U(1)
symmetry, the spin-0 gravitons are eliminated. Thus, all the problems related
to them disappear, including the instability, strong coupling, and different
speeds in the gravitational sector. When the theory couples to a scalar field,
we find that the scalar field is not only stable in both the ultraviolet (UV)
and infrared (IR), but also free of the strong coupling problem, because of the
presence of high-order spatial derivative terms of the scalar field.
Furthermore, applying the theory to cosmology, we find that due to the
additional U(1) symmetry, the Friedmann-Robertson-Walker (FRW) universe is
necessarily flat. We also investigate the scalar, vector, and tensor
perturbations of the flat FRW universe, and derive the general linearized field
equations for each kind of the perturbations.Comment: 19 pages, comments are welcome!!
Simulating Gyrokinetic Microinstabilities in Stellarator Geometry with GS2
The nonlinear gyrokinetic code GS2 has been extended to treat
non-axisymmetric stellarator geometry. Electromagnetic perturbations and
multiple trapped particle regions are allowed. Here, linear, collisionless,
electrostatic simulations of the quasi-axisymmetric, three-field period
National Compact Stellarator Experiment (NCSX) design QAS3-C82 have been
successfully benchmarked against the eigenvalue code FULL. Quantitatively, the
linear stability calculations of GS2 and FULL agree to within ~10%.Comment: Submitted to Physics of Plasmas. 9 pages, 14 figure
Search for Spin-Dependent Short-Range Force Using Optically Polarized He Gas
We propose a new method to detect short-range \textit{P-} and \textit{T-}
violating interactions between nucleons, based on measuring the precession
frequency shift of polarized He nuclei in the presence of an unpolarized
mass. To maximize the sensitivity, a high-pressure He cell with thin glass
windows (250 ) is used to minimize the distance between the mass and
He. The magnetic field fluctuation is suppressed by using the He gas in
a different region of the cell as a magnetometer. Systematic uncertainties from
the magnetic properties of the mass are suppressed by flipping both the
magnetic field and spin directions. Without any magnetic shielding, our result
has already reached the sensitivity of the current best limit. With improvement
in uniformity and stability of the field, we can further improve the
sensitivity by two orders of magnitude over the force range from
m
Cryptanalysis of the Hillery-Buzek-Berthiaume quantum secret-sharing protocol
The participant attack is the most serious threat for quantum secret-sharing
protocols. We present a method to analyze the security of quantum
secret-sharing protocols against this kind of attack taking the scheme of
Hillery, Buzek, and Berthiaume (HBB) [Phys. Rev. A 59 1829 (1999)] as an
example. By distinguishing between two mixed states, we derive the necessary
and sufficient conditions under which a dishonest participant can attain all
the information without introducing any error, which shows that the HBB
protocol is insecure against dishonest participants. It is easy to verify that
the attack scheme of Karlsson, Koashi, and Imoto [Phys. Rev. A 59, 162 (1999)]
is a special example of our results. To demonstrate our results further, we
construct an explicit attack scheme according to the necessary and sufficient
conditions. Our work completes the security analysis of the HBB protocol, and
the method presented may be useful for the analysis of other similar protocols.Comment: Revtex, 7 pages, 3 figures; Introduction modifie
- …
