72,324 research outputs found
Optics: general-purpose scintillator light response simulation code
We present the program optics that simulates the light response of an
arbitrarily shaped scintillation particle detector. Predicted light responses
of pure CsI polygonal detectors, plastic scintillator staves, cylindrical
plastic target scintillators and a Plexiglas light-distribution plate are
illustrated. We demonstrate how different bulk and surface optical properties
of a scintillator lead to specific volume and temporal light collection
probability distributions. High-statistics optics simulations are calibrated
against the detector responses measured in a custom-made cosmic muon tomography
apparatus. The presented code can also be used to track particles intersecting
complex geometrical objects.Comment: RevTeX LaTeX, 37 pages in e-print format, 12 Postscript Figures and 1
Table, also available at
http://pibeta.phys.virginia.edu/public_html/preprints/optics.p
Experiences in teaching grid computing to advanced level students
The development of teaching materials for future software engineers is critical to the long term success of the grid. At present however there is considerable turmoil in the grid community both within the standards and the technology base underpinning these standards. In this context, it is especially challenging to develop teaching materials that have some sort of lifetime beyond the next wave of grid middleware and standards. In addition, the current way in which grid security is supported and delivered has two key problems. Firstly in the case of the UK e-Science community, scalability issues arise from a central certificate authority. Secondly, the current security mechanisms used by the grid community are not line grained enough. In this paper we outline how these issues are being addressed through the development of a grid computing module supported by an advanced authorisation infrastructure at the University of Glasgow
Recommended from our members
Virtual Simulation for Multi-material LM Process
In an ONR funded MURI program, to improve quality of multi-material parts,
we've been developing an advanced computer simulation for the multi-material layered
manufacturing (LM) process. The CAD models and their .stLfiles are created using. the
commercially available software such as I-DEAS and ProE. Using this information, one
tool path file per material is generated. Our file preparation algorithm, systematically,
layer by layer, integrates all tool path files into one multi-material tool path file. The
results of the multi-material tool path are graphically visualized using the simulation
algorithm (written in c++ & SGI OpenGL). From a virtual simulation, we can check the
LM process, and make the best selection of tool path parameters afterwards. After several
trials from design to simulation, if the simulation result is acceptable, the real
manufacturing can be started. And the part's quality should be better than a part
manufactured without running simulation in advance. This paper will represent .âą. new
studies on using real toadshapes to get more realistic simulation results. Many parts have
been successfully simulated using our method.Mechanical Engineerin
Implementation of a new bi-directional solar modelling method for complex facades within the ESP-r building simulation program
This paper provides an overview of a new method for modelling the total solar energy transmittance. It is implemented in the ESP-r building simulation program to model complex façades such as double glazed façades with external, internal or integrated shading devices. This new model has been validated and tested for several cases. The new model required changes to the solar control simulation algorithm and the user interface, so a new âAdvanced optics menuâ was also introduced into ESP-r. The paper presents the interface development and application of the new technique to different simulation configurations (especially different complex façades with shading devices) in a standard office building
PyCARL: A PyNN Interface for Hardware-Software Co-Simulation of Spiking Neural Network
We present PyCARL, a PyNN-based common Python programming interface for
hardware-software co-simulation of spiking neural network (SNN). Through
PyCARL, we make the following two key contributions. First, we provide an
interface of PyNN to CARLsim, a computationally-efficient, GPU-accelerated and
biophysically-detailed SNN simulator. PyCARL facilitates joint development of
machine learning models and code sharing between CARLsim and PyNN users,
promoting an integrated and larger neuromorphic community. Second, we integrate
cycle-accurate models of state-of-the-art neuromorphic hardware such as
TrueNorth, Loihi, and DynapSE in PyCARL, to accurately model hardware latencies
that delay spikes between communicating neurons and degrade performance. PyCARL
allows users to analyze and optimize the performance difference between
software-only simulation and hardware-software co-simulation of their machine
learning models. We show that system designers can also use PyCARL to perform
design-space exploration early in the product development stage, facilitating
faster time-to-deployment of neuromorphic products. We evaluate the memory
usage and simulation time of PyCARL using functionality tests, synthetic SNNs,
and realistic applications. Our results demonstrate that for large SNNs, PyCARL
does not lead to any significant overhead compared to CARLsim. We also use
PyCARL to analyze these SNNs for a state-of-the-art neuromorphic hardware and
demonstrate a significant performance deviation from software-only simulations.
PyCARL allows to evaluate and minimize such differences early during model
development.Comment: 10 pages, 25 figures. Accepted for publication at International Joint
Conference on Neural Networks (IJCNN) 202
Policy based roles for distributed systems security
Distributed systems are increasingly being used in commercial environments necessitating the development of trustworthy and reliable security mechanisms. There is often no clear informal or formal specification of enterprise authorisation policies and no tools to translate policy specifications to access control implementation mechanisms such as capabilities or Access Control Lists. It is thus difficult to analyse the policy to detect conflicts or flaws and it is difficult to verify that the implementation corresponds to the policy specification. We present in this paper a framework for the specification of management policies. We are concerned with two types of policies: obligations which specify what activities a manager or agent must or must not perform on a set of target objects and authorisations which specify what activities a subject (manager or agent) can or can not perform on the set of target objects. Management policies are then grouped into roles reflecting the organisation..
Building Knowledge Bases for the Generation of Software Documentation
Automated text generation requires a underlying knowledge base from which to
generate, which is often difficult to produce. Software documentation is one
domain in which parts of this knowledge base may be derived automatically. In
this paper, we describe \drafter, an authoring support tool for generating
user-centred software documentation, and in particular, we describe how parts
of its required knowledge base can be obtained automatically.Comment: 6 pages, from COLING-9
Configuration Tools: Working Together
Since the LISA conferences began, the character of a typical ââlarge installationâ â has changed greatly. Most large sites tended to consist of a comparatively small number of handcrafted ââserversâ â supporting a larger number of very similar ââclientsâ â (which would usually be configured with the aid of some automatic tool). A modern large site involves a more complex mesh of services, often with demanding requirements for completely automatic reconfiguration of entire services to provide fault-tolerance. As these changes have happened however, the tools available to provide configuration management for a site have not evolved to keep pace with these new challenges. This paper looks at some of the reasons why configuration tools have failed to move forward, and presents some suggestions for enabling the state of the art to advance. Background and Motivation Configuration Tools have been an important theme at LISA for many years, and most conferences include one or more papers in this area. Despite increasing recognition of the importance of the configuratio
- âŠ