8,642 research outputs found
21st Century Simulation: Exploiting High Performance Computing and Data Analysis
This paper identifies, defines, and analyzes the limitations imposed on Modeling and Simulation by outmoded
paradigms in computer utilization and data analysis. The authors then discuss two emerging capabilities to
overcome these limitations: High Performance Parallel Computing and Advanced Data Analysis. First, parallel
computing, in supercomputers and Linux clusters, has proven effective by providing users an advantage in
computing power. This has been characterized as a ten-year lead over the use of single-processor computers.
Second, advanced data analysis techniques are both necessitated and enabled by this leap in computing power.
JFCOM's JESPP project is one of the few simulation initiatives to effectively embrace these concepts. The
challenges facing the defense analyst today have grown to include the need to consider operations among non-combatant
populations, to focus on impacts to civilian infrastructure, to differentiate combatants from non-combatants,
and to understand non-linear, asymmetric warfare. These requirements stretch both current
computational techniques and data analysis methodologies. In this paper, documented examples and potential
solutions will be advanced. The authors discuss the paths to successful implementation based on their experience.
Reviewed technologies include parallel computing, cluster computing, grid computing, data logging, OpsResearch,
database advances, data mining, evolutionary computing, genetic algorithms, and Monte Carlo sensitivity analyses.
The modeling and simulation community has significant potential to provide more opportunities for training and
analysis. Simulations must include increasingly sophisticated environments, better emulations of foes, and more
realistic civilian populations. Overcoming the implementation challenges will produce dramatically better insights,
for trainees and analysts. High Performance Parallel Computing and Advanced Data Analysis promise increased
understanding of future vulnerabilities to help avoid unneeded mission failures and unacceptable personnel losses.
The authors set forth road maps for rapid prototyping and adoption of advanced capabilities. They discuss the
beneficial impact of embracing these technologies, as well as risk mitigation required to ensure success
Pipes and Connections
This document describes the low-level Pipe and ConnectionManager objects of the Mesh-
Router system. The overall MeshRouter framework provides a general scheme for interest-
limited communications among a number of client processes. This generality is achieved by
a carefully factorized, object-oriented software implementation. Within this framework, the
Pipe and ConnectionManager (base) classes dened in this note specify the interfaces for i) ac-
tual `bits on the wire' communications and ii) dynamic client insertions during overall system
execution. Two specic implementations of the Pipe class are described in detail: a `Memo-
ryPipe' linking objects instanced on a single processor and a more general 'rtisPipe' providing
inter-processor communications built entirely from the standard RTI-s library used in current
JSAF applications. Initialization procedures within the overall MeshRouter system are dis-
cussed, with particular attention given to dynamic management of inter-processor connections.
Prototype RTI-s router processes are discussed, and simple extensions of the standard system
conguration data les are presented
Computational and theoretical aspects of a grain-boundary model at finite deformations
A model to describe the role of grain boundaries in the overall response of a polycrystalline material at small length scales subject to finite deformations is presented. Three alternative thermodynamically consistent plastic flow relations on the grain boundary are derived and compared using a series of numerical experiments. The numerical model is obtained by approximating the governing relations using the finite element method. In addition, the infinitesimal and finite deformation theories are compared, and the limitations of the former made clear
Concurrent Multi-Target Tracking
Simulation89 is an emulation of various SDI tasks (tracking,
engagement management and ‘look ahead’) developed for the
U. S. Air Force. The simulation presently deals with
the boost, post-boost and early midcourse phases of
a ’mass raid’ scenario, and is designed to process scenarios with a few thousand targets. The simulation is run on
the Mark-III hypercube, with individual tasks performed
on subcubes of the full hypercube. In general, the computations within individual subcubes are done in
a synchronous manner (i.e., CrOS), while communications between tasks/subcubes are done asynchronously
Computational and theoretical aspects of a grain-boundary model that accounts for grain misorientation and grain-boundary orientation
A detailed theoretical and numerical investigation of the infinitesimal
single-crystal gradient plasticity and grain-boundary theory of Gurtin (2008)
"A theory of grain boundaries that accounts automatically for grain
misorientation and grain-boundary orientation". Journal of the Mechanics and
Physics of Solids 56 (2), 640-662, is performed. The governing equations and
flow laws are recast in variational form. The associated incremental problem is
formulated in minimization form and provides the basis for the subsequent
finite element formulation. Various choices of the kinematic measure used to
characterize the ability of the grain boundary to impede the flow of
dislocations are compared. An alternative measure is also suggested. A series
of three-dimensional numerical examples serve to elucidate the theory
Safety of overlapping inpatient orthopaedic surgery: A multicenter study
BackgroundAlthough overlapping surgery is used to maximize efficiency, more empirical data are needed to guide patient safety. We conducted a retrospective cohort study to evaluate the safety of overlapping inpatient orthopaedic surgery, as judged by the occurrence of perioperative complications.MethodsAll inpatient orthopaedic surgical procedures performed at 5 academic institutions from January 1, 2015, to December 31, 2015, were included. Overlapping surgery was defined as 2 skin incisions open simultaneously for 1 surgeon. In comparing patients who underwent overlapping surgery with those who underwent non-overlapping surgery, the primary outcome was the occurrence of a perioperative complication within 30 days of the surgical procedure, and secondary outcomes included all-cause 30-day readmission, length of stay, and mortality. To determine if there was an association between overlapping surgery and a perioperative complication, we tested for non-inferiority of overlapping surgery, assuming a null hypothesis of an increased risk of 50%. We used an inverse probability of treatment weighted regression model adjusted for institution, procedure type, demographic characteristics (age, sex, race, comorbidities), admission type, admission severity of illness, and clustering by surgeon.ResultsAmong 14,135 cases, the frequency of overlapping surgery was 40%. The frequencies of perioperative complications were 1% in the overlapping surgery group and 2% in the non-overlapping surgery group. The overlapping surgery group was non-inferior to the non-overlapping surgery group (odds ratio [OR], 0.61 [90% confidence interval (CI), 0.45 to 0.83]; p < 0.001), with reduced odds of perioperative complications (OR, 0.61 [95% CI, 0.43 to 0.88]; p = 0.009). For secondary outcomes, there was a significantly lower chance of all-cause 30-day readmission in the overlapping surgery group (OR, 0.67 [95% CI, 0.52 to 0.87]; p = 0.003) and shorter length of stay (e, 0.94 [95% CI, 0.89 to 0.99]; p = 0.012). There was no difference in mortality.ConclusionsOur results suggest that overlapping inpatient orthopaedic surgery does not introduce additional perioperative risk for the complications that we evaluated. The suitability of this practice should be determined by individual surgeons on a case-by-case basis with appropriate informed consent.Level of evidenceTherapeutic Level III. See Instructions for Authors for a complete description of levels of evidence
Entropy and the variational principle for actions of sofic groups
Recently Lewis Bowen introduced a notion of entropy for measure-preserving
actions of a countable sofic group on a standard probability space admitting a
generating partition with finite entropy. By applying an operator algebra
perspective we develop a more general approach to sofic entropy which produces
both measure and topological dynamical invariants, and we establish the
variational principle in this context. In the case of residually finite groups
we use the variational principle to compute the topological entropy of
principal algebraic actions whose defining group ring element is invertible in
the full group C*-algebra.Comment: 44 pages; minor changes; to appear in Invent. Mat
- …
