1,977 research outputs found

    First UFZ Energy Days 2012: Book of abstracts

    Full text link

    Joint interpretation of geoelectrical and soil-gas measurements for monitoring CO2 releases at a natural analogue

    Get PDF
    The development and validation of hierarchic monitoring concepts is essential for detecting and assessing possible leakages from storage formations, especially for carbon capture and storage (CCS) applications. Joint interpretation of various techniques (such as carbon dioxide (CO2) concentration and flux measurements, self-potential (SP) and geoelectrical surveys) showed that the combination of geophysical methods with soil-gas analysis for mesoscale monitoring of the shallow subsurface above geologic CO2 storages can be a valuable tool for mapping and monitoring potential CO2 spread in the subsurface. Three measurement campaigns were undertaken - May 2011, July 2011 and April 2012 - at an analogue site in the Cheb Basin, Czech Republic, with the aim of studying CO2 leakages and their temporal and spatial behaviour. Results of geoelectrical investigations give an insight into the structural features of the subsurface. CO2 discharge into the atmosphere is mostly impeded by shallow, clay-rich, partly water-saturated zones, which can be seen in the electrical resistivity tomography (ERT) results. Several transport processes can be identified based on SP measurements. The SP results highlight the complex behaviour of temporal variations for the flow patterns. In particular, coupled migration of gas and water plays an important influencing role in this process. Site-specific, near surface geological features and meteorological conditions seem to exert great influence on the degassing pattern and measured CO 2 values. Therefore, soil-gas measurements represent a snapshot which illustrates both a distinct typical pattern of the soil-gas distribution in the near subsurface and certain differences caused by soil and meteorological conditions. Observed CO2 soil-gas anomalies and modelled results suggest that the occurrence of gas discharge is much more localized around restricted areas, often controlled by local permeability contrasts. Hence, our results show that a proposed monitoring concept should integrate SP, time-lapse ERT, meteorological parameters and soil-gas measurements to provide a comprehensive insight into the subsurface structures and processes.</p

    Geochemical investigations of salt marsh pore waters and sediments at Langeoog island in course of a simulated transgression

    Get PDF
    In der vorliegenden Arbeit werden die geochemischen und sedimentologischen Auswirkungen eines simulierten Meeresspiegelanstieges auf ein rückgedeichtes Salzwiesengebiet der ostfriesischen Barriereinsel Langeoog untersucht. Hierzu wurde die Geochemie des Porenwassers und des Sedimentes bis in eine Tiefe von 5 m analysiert. Die marinen Sedimente, die aktuell ins Untersuchungsgebiet eingetragen werden, wurden ebenfalls hinsichtlich ihrer Geochemie und Sedimentologie untersucht. Die Studie belegt, dass im Zuge einer Transgression große Mengen an Fe, Mn, PO43- und NH4+ ins Porenwasser freigesetzt werden können. Die Untersuchungen des Sedimenteintrages und der Vergleich mit Holozänen Küstensedimenten belegen, dass sich die rückgedeichte Salzwiesenfläche auf Langeoog in einem frühen Transgressionsstadium befindet. Die Schwebstoffe des angrenzenden Wattenmeeres stellen die Hauptquelle des eingetragenen Materials dar. Diese Studie dient nicht nur als Informationsbasis für zukünftige Szenarien sondern unterstützt auch die Interpretation geochemischer Signaturen in Holozänen Küstensedimenten

    Der Herrscher als Pilger im westlichen und östlichen Mittelalter –: eine Skizze

    Get PDF
    Investigating medieval royal pilgrimage from a comparative perspective, certain characteristics can be observed: Byzantine emperors normally did not go on pilgrimage, preferring to collect holy relics in their capital. In the West, royal pilgrimage flourished especially during the Later Middle Ages, playing a key role in the practice of rulership, without, however, making a significant contribution to the sacral character of monarchy. Christian kings seldom crossed the borders of their realms to visit sacred places. Muslim rulers (apart from the early caliphs) followed a similar pattern, often avoiding to perform the hajj to Mecca personally. Instead, royal pilgrimage over long distances was a significant phenomenon at the periphery of both religious spheres: in West Africa and Scandinavia

    Resiliency Mechanisms for In-Memory Column Stores

    Get PDF
    The key objective of database systems is to reliably manage data, while high query throughput and low query latency are core requirements. To date, database research activities mostly concentrated on the second part. However, due to the constant shrinking of transistor feature sizes, integrated circuits become more and more unreliable and transient hardware errors in the form of multi-bit flips become more and more prominent. In a more recent study (2013), in a large high-performance cluster with around 8500 nodes, a failure rate of 40 FIT per DRAM device was measured. For their system, this means that every 10 hours there occurs a single- or multi-bit flip, which is unacceptably high for enterprise and HPC scenarios. Causes can be cosmic rays, heat, or electrical crosstalk, with the latter being exploited actively through the RowHammer attack. It was shown that memory cells are more prone to bit flips than logic gates and several surveys found multi-bit flip events in main memory modules of today's data centers. Due to the shift towards in-memory data management systems, where all business related data and query intermediate results are kept solely in fast main memory, such systems are in great danger to deliver corrupt results to their users. Hardware techniques can not be scaled to compensate the exponentially increasing error rates. In other domains, there is an increasing interest in software-based solutions to this problem, but these proposed methods come along with huge runtime and/or storage overheads. These are unacceptable for in-memory data management systems. In this thesis, we investigate how to integrate bit flip detection mechanisms into in-memory data management systems. To achieve this goal, we first build an understanding of bit flip detection techniques and select two error codes, AN codes and XOR checksums, suitable to the requirements of in-memory data management systems. The most important requirement is effectiveness of the codes to detect bit flips. We meet this goal through AN codes, which exhibit better and adaptable error detection capabilities than those found in today's hardware. The second most important goal is efficiency in terms of coding latency. We meet this by introducing a fundamental performance improvements to AN codes, and by vectorizing both chosen codes' operations. We integrate bit flip detection mechanisms into the lowest storage layer and the query processing layer in such a way that the remaining data management system and the user can stay oblivious of any error detection. This includes both base columns and pointer-heavy index structures such as the ubiquitous B-Tree. Additionally, our approach allows adaptable, on-the-fly bit flip detection during query processing, with only very little impact on query latency. AN coding allows to recode intermediate results with virtually no performance penalty. We support our claims by providing exhaustive runtime and throughput measurements throughout the whole thesis and with an end-to-end evaluation using the Star Schema Benchmark. To the best of our knowledge, we are the first to present such holistic and fast bit flip detection in a large software infrastructure such as in-memory data management systems. Finally, most of the source code fragments used to obtain the results in this thesis are open source and freely available.:1 INTRODUCTION 1.1 Contributions of this Thesis 1.2 Outline 2 PROBLEM DESCRIPTION AND RELATED WORK 2.1 Reliable Data Management on Reliable Hardware 2.2 The Shift Towards Unreliable Hardware 2.3 Hardware-Based Mitigation of Bit Flips 2.4 Data Management System Requirements 2.5 Software-Based Techniques For Handling Bit Flips 2.5.1 Operating System-Level Techniques 2.5.2 Compiler-Level Techniques 2.5.3 Application-Level Techniques 2.6 Summary and Conclusions 3 ANALYSIS OF CODING TECHNIQUES 3.1 Selection of Error Codes 3.1.1 Hamming Coding 3.1.2 XOR Checksums 3.1.3 AN Coding 3.1.4 Summary and Conclusions 3.2 Probabilities of Silent Data Corruption 3.2.1 Probabilities of Hamming Codes 3.2.2 Probabilities of XOR Checksums 3.2.3 Probabilities of AN Codes 3.2.4 Concrete Error Models 3.2.5 Summary and Conclusions 3.3 Throughput Considerations 3.3.1 Test Systems Descriptions 3.3.2 Vectorizing Hamming Coding 3.3.3 Vectorizing XOR Checksums 3.3.4 Vectorizing AN Coding 3.3.5 Summary and Conclusions 3.4 Comparison of Error Codes 3.4.1 Effectiveness 3.4.2 Efficiency 3.4.3 Runtime Adaptability 3.5 Performance Optimizations for AN Coding 3.5.1 The Modular Multiplicative Inverse 3.5.2 Faster Softening 3.5.3 Faster Error Detection 3.5.4 Comparison to Original AN Coding 3.5.5 The Multiplicative Inverse Anomaly 3.6 Summary 4 BIT FLIP DETECTING STORAGE 4.1 Column Store Architecture 4.1.1 Logical Data Types 4.1.2 Storage Model 4.1.3 Data Representation 4.1.4 Data Layout 4.1.5 Tree Index Structures 4.1.6 Summary 4.2 Hardened Data Storage 4.2.1 Hardened Physical Data Types 4.2.2 Hardened Lightweight Compression 4.2.3 Hardened Data Layout 4.2.4 UDI Operations 4.2.5 Summary and Conclusions 4.3 Hardened Tree Index Structures 4.3.1 B-Tree Verification Techniques 4.3.2 Justification For Further Techniques 4.3.3 The Error Detecting B-Tree 4.4 Summary 5 BIT FLIP DETECTING QUERY PROCESSING 5.1 Column Store Query Processing 5.2 Bit Flip Detection Opportunities 5.2.1 Early Onetime Detection 5.2.2 Late Onetime Detection 5.2.3 Continuous Detection 5.2.4 Miscellaneous Processing Aspects 5.2.5 Summary and Conclusions 5.3 Hardened Intermediate Results 5.3.1 Materialization of Hardened Intermediates 5.3.2 Hardened Bitmaps 5.4 Summary 6 END-TO-END EVALUATION 6.1 Prototype Implementation 6.1.1 AHEAD Architecture 6.1.2 Diversity of Physical Operators 6.1.3 One Concrete Operator Realization 6.1.4 Summary and Conclusions 6.2 Performance of Individual Operators 6.2.1 Selection on One Predicate 6.2.2 Selection on Two Predicates 6.2.3 Join Operators 6.2.4 Grouping and Aggregation 6.2.5 Delta Operator 6.2.6 Summary and Conclusions 6.3 Star Schema Benchmark Queries 6.3.1 Query Runtimes 6.3.2 Improvements Through Vectorization 6.3.3 Storage Overhead 6.3.4 Summary and Conclusions 6.4 Error Detecting B-Tree 6.4.1 Single Key Lookup 6.4.2 Key Value-Pair Insertion 6.5 Summary 7 SUMMARY AND CONCLUSIONS 7.1 Future Work A APPENDIX A.1 List of Golden As A.2 More on Hamming Coding A.2.1 Code examples A.2.2 Vectorization BIBLIOGRAPHY LIST OF FIGURES LIST OF TABLES LIST OF LISTINGS LIST OF ACRONYMS LIST OF SYMBOLS LIST OF DEFINITION
    corecore