204 research outputs found
MAESTRO, CASTRO, and SEDONA -- Petascale Codes for Astrophysical Applications
Performing high-resolution, high-fidelity, three-dimensional simulations of
Type Ia supernovae (SNe Ia) requires not only algorithms that accurately
represent the correct physics, but also codes that effectively harness the
resources of the most powerful supercomputers. We are developing a suite of
codes that provide the capability to perform end-to-end simulations of SNe Ia,
from the early convective phase leading up to ignition to the explosion phase
in which deflagration/detonation waves explode the star to the computation of
the light curves resulting from the explosion. In this paper we discuss these
codes with an emphasis on the techniques needed to scale them to petascale
architectures. We also demonstrate our ability to map data from a low Mach
number formulation to a compressible solver.Comment: submitted to the Proceedings of the SciDAC 2010 meetin
Lawful Response to Attacks on Space Systems
What means may a nation lawfully employ to respond to and to defeat threats and attacks on its space systems? Treaties and customary law provide a strong incentive to limit space activities to non-aggressive “peaceful purposes.” They do not, however, proscribe space warfare or preparation for such conflict. Space system components are thus at risk, and can be attacked, degraded, or destroyed, simultaneously or each in detail. The use of force is allowed only in self-defense against an “armed attack” or in accord with authorization of the United Nations (UN). Kinetic, electromagnetic, or information operation attacks against space systems are each an “armed attack” to which the use of force is permitted. The right of self-defense is subject to the Law of Armed Conflict (LOAC) and other treaties and agreements. Even if lawful means and methods are employed and targets engaged, physical, technical, environmental, political realities, and their risks and benefits limit options to defend and fight space systems. Decades of senior policymakers have recognized the importance of the space domain, assessed the risks in their context, and provided measured and calm global leadership to preserve access to it
Relativistic MHD with Adaptive Mesh Refinement
This paper presents a new computer code to solve the general relativistic
magnetohydrodynamics (GRMHD) equations using distributed parallel adaptive mesh
refinement (AMR). The fluid equations are solved using a finite difference
Convex ENO method (CENO) in 3+1 dimensions, and the AMR is Berger-Oliger.
Hyperbolic divergence cleaning is used to control the
constraint. We present results from three flat space tests, and examine the
accretion of a fluid onto a Schwarzschild black hole, reproducing the Michel
solution. The AMR simulations substantially improve performance while
reproducing the resolution equivalent unigrid simulation results. Finally, we
discuss strong scaling results for parallel unigrid and AMR runs.Comment: 24 pages, 14 figures, 3 table
Adaptive Mesh Refinement for Characteristic Grids
I consider techniques for Berger-Oliger adaptive mesh refinement (AMR) when
numerically solving partial differential equations with wave-like solutions,
using characteristic (double-null) grids. Such AMR algorithms are naturally
recursive, and the best-known past Berger-Oliger characteristic AMR algorithm,
that of Pretorius & Lehner (J. Comp. Phys. 198 (2004), 10), recurses on
individual "diamond" characteristic grid cells. This leads to the use of
fine-grained memory management, with individual grid cells kept in
2-dimensional linked lists at each refinement level. This complicates the
implementation and adds overhead in both space and time.
Here I describe a Berger-Oliger characteristic AMR algorithm which instead
recurses on null \emph{slices}. This algorithm is very similar to the usual
Cauchy Berger-Oliger algorithm, and uses relatively coarse-grained memory
management, allowing entire null slices to be stored in contiguous arrays in
memory. The algorithm is very efficient in both space and time.
I describe discretizations yielding both 2nd and 4th order global accuracy.
My code implementing the algorithm described here is included in the electronic
supplementary materials accompanying this paper, and is freely available to
other researchers under the terms of the GNU general public license.Comment: 37 pages, 15 figures (40 eps figure files, 8 of them color; all are
viewable ok in black-and-white), 1 mpeg movie, uses Springer-Verlag svjour3
document class, includes C++ source code. Changes from v1: revised in
response to referee comments: many references added, new figure added to
better explain the algorithm, other small changes, C++ code updated to latest
versio
Navigating the Looking Glass:Severing the Lawyer's Head in <i>Arkham Asylum</i>
Reading Arkham Asylum jurisprudentially, we encounter a story of the meeting of reason and unreason in the context of justice – of conscious law and its unconscious threat. Batman’s exploration of the Asylum is symbolic of the legal unconscious, and reflects the processes of repression that can be seen in dominant legal knowledge. A threat to this dominant knowledge can be seen in Two-Face’s reliance on his coin to ‘judge’ his victims. Moreover, Arkham Asylum configures the threat of law’s unconscious as the lawyer’s severed head inside the house of law. Ultimately, Batman’s journey through Arkham Asylum reminds law of the aesthetic and irrational contexts that it strives to deny and from which it seeks to defend itself – and that cultural legal studies explores. It recalls the unreason outside law’s logic, the chaos outside its order, the madness outside its sanity. The lesson of Batman’s encounters in the Asylum is that we should remember the ‘madness’ outside the legal order, and thus recognise that law is always already more than its conscious ‘sanity’ can contain
Feasibility and willingness-to-pay for integrated community-based tuberculosis testing
BACKGROUND: Community-based screening for TB, combined with HIV and syphilis testing, faces a number of barriers. One significant barrier is the value that target communities place on such screening. METHODS: Integrated testing for TB, HIV, and syphilis was performed in neighborhoods identified using geographic information systems-based disease mapping. TB testing included skin testing and interferon gamma release assays. Subjects completed a survey describing disease risk factors, healthcare access, healthcare utilization, and willingness to pay for integrated testing. RESULTS: Behavioral and social risk factors among the 113 subjects were prevalent (71% prior incarceration, 27% prior or current crack cocaine use, 35% homelessness), and only 38% had a regular healthcare provider. The initial 24 subjects reported that they would be willing to pay a median 10 (IQR: 0-100) for TB testing when the question was asked in an open-ended fashion, but when the question was changed to a multiple-choice format, the next 89 subjects reported that they would pay a median 5 to get tested for TB, HIV, or syphilis. Among persons who received tuberculin skin testing, only 14/78 (18%) participants returned to have their skin tests read. Only 14/109 (13%) persons who underwent HIV testing returned to receive their HIV results. CONCLUSION: The relatively high-risk persons screened in this community outreach study placed low value on testing. Reported willingness to pay for such testing, while low, likely overestimated the true willingness to pay. Successful TB, HIV, and syphilis integrated testing programs in high risk populations will likely require one-visit diagnostic testing and incentives
Market Pricing of Exotic Structured Products: The Case of Multi-Asset Barrier Reverse Convertibles in Switzerland
Diet-induced obesity and low testosterone increase neuroinflammation and impair neural function
- …
