10,544 research outputs found
GPEDIT
GPEDIT compares each character in data record to corresponding character in mask provided by user. Mask indicates that alphabetic or numeric character is allowed or that blank or punctuation mark is anticipated. Mask can also indicate that any data character other than some invalid character is allowed
Modular design of data-parallel graph algorithms
Amorphous Data Parallelism has proven to be a suitable vehicle for implementing concurrent graph algorithms effectively on multi-core architectures. In view of the growing complexity of graph algorithms for information analysis, there is a need to facilitate modular design techniques in the context of Amorphous Data Parallelism. In this paper, we investigate what it takes to formulate algorithms possessing Amorphous Data Parallelism in a modular fashion enabling a large degree of code re-use. Using the betweenness centrality algorithm, a widely popular algorithm in the analysis of social networks, we demonstrate that a single optimisation technique can suffice to enable a modular programming style without loosing the efficiency of a tailor-made monolithic implementation
Wall jet analysis for circulation control aerodynamics. Part 1: Fundamental CFD and turbulence modeling concepts
An overview of parabolic and PNS (Parabolized Navier-Stokes) methodology developed to treat highly curved sub and supersonic wall jets is presented. The fundamental data base to which these models were applied is discussed in detail. The analysis of strong curvature effects was found to require a semi-elliptic extension of the parabolic modeling to account for turbulent contributions to the normal pressure variations, as well as an extension to the turbulence models utilized, to account for the highly enhanced mixing rates observed in situations with large convex curvature. A noniterative, pressure split procedure is shown to extend parabolic models to account for such normal pressure variations in an efficient manner, requiring minimal additional run time over a standard parabolic approach. A new PNS methodology is presented to solve this problem which extends parabolic methodology via the addition of a characteristic base wave solver. Applications of this approach to analyze the interaction of wave and turbulence processes in wall jets is presented
Expectation of forward-backward rapidity correlations in collisions at the LHC energies
Forward-backward correlation strength () as a function of pesudorapidity
intervals for experimental data from non-singly diffractive
collisions are compared to PYTHIA and PHOJET model calculations. The
correlations are discussed as a function of rapidity window ()
symmetric about the central rapidity as well as rapidity window separated by a
gap () between forward and backward regions. While the correlations
are observed to be independent of , it is found to decrease with
increase in . This reflects the role of short range correlations
and justifies the use of to obtain the accurate information about
the physics of interest, the long range correlations. The experimental
value shows a linear dependence on with the maximum value of
unity being reached at = 16 TeV, beyond the top LHC energy. However
calculations from the PYTHIA and PHOJET models indicate a deviation from linear
dependence on and saturation in the values being reached
beyond = 1.8 TeV. Such a saturation in correlation values could have
interesting physical interpretations related to clan structures in particle
production. Strong forward-backward correlations are associated with cluster
production in the collisions. The average number of charged particles to which
the clusters fragments, called the cluster size, are found to also increase
linearly with for both data and the models studied. The rate of
increase in cluster size vs. from models studied are larger
compared to those from the data and higher for PHOJET compared to PYTHIA. Our
study indicates that the forward-backward measurements will provide a clear
distinguishing observable for the models studied at LHC energies.Comment: 15 pages, 14 Figures, accepted for publication in International
Journal of Modern Physics
Recommended from our members
Cancer cell lines show high heritability for motility but not generation time
Tumour evolution depends on heritable differences between cells in traits affecting cell survival or replication. It is well established that cancer cells are genetically and phenotypically heterogeneous; however, the extent to which this phenotypic variation is heritable is far less well explored. Here, we estimate the broad-sense heritability (H2) of two cell traits related to cancer hallmarks––cell motility and generation time––within populations of four cancer cell lines in vitro and find that motility is strongly heritable. This heritability is stable across multiple cell generations, with heritability values at the high end of those measured for a range of traits in natural populations of animals or plants. These findings confirm a central assumption of cancer evolution, provide a first quantification of the evolvability of key traits in cancer cells and indicate that there is ample raw material for experimental evolution in cancer cell lines. Generation time, a trait directly affecting cell fitness, shows substantially lower values of heritability than cell speed, consistent with its having been under directional selection removing heritable variation
étudiants à la médiathèque de Tréfilerie à Saint-Étienne (Les)
The concept of an Ephemerizer system has been introduced in earlier works as a mechanism to ensure that a file deleted from the persistent storage remains unrecoverable. The principle involved storing the data in an encrypted form in the user’s machine and the key to decrypt the data in a physically separate machine. However the schemes proposed so far do not provide support for fine-grained user settings on the lifetime of the data nor support any mechanism to check the integrity of the system that is using the secret data. In addition we report the presence of a vulnerability in one version of the proposed scheme that can be exploited by an attacker to nullify the ephemeral nature of the keys. We propose and discuss in detail an alternate Identity Based cryptosystem powered scheme that overcomes the identified limitations of the original system
Different aspects of cage culture management for sustainable fish production
A technological intervention has been the major impetus for the rapid
development of cage farming of marine fishes across the world. In spite of the
various technologies available for the fulfilment of high production and proper
installation of the cages, it is necessary to optimise the many factors periodically
to avoid the adverse impact of environmental and ecological factors for long
maintenance of cages and also to maintain the healthy animals in the cage. In this
context, monitoring plays vital role in any type of mariculture activity. Therefore,
a well conceived and designed monitoring programme is needed to promote good
growth of fishes and to obtain optimal production in a sustainable manner from
cages. Cage monitoring is an integral part of the cage culture and it should be
continued starting from the installation of the cage to till harvesting the fishes.
The following are the major aspects where the cage monitoring is essential and it
includes maintenance of cage and its accessories, stocking of the fish, feeding,
fish husbandry, health management, water quality and harvesting
- …
