3,067 research outputs found
Recommended from our members
Leveraging legacy codes to distributed problem solving environments: A web service approach
This paper describes techniques used to leverage high performance legacy codes as CORBA components to a distributed problem solving environment. It first briefly introduces the software architecture adopted by the environment. Then it presents a CORBA oriented wrapper generator (COWG) which can be used to automatically wrap high performance legacy codes as CORBA components. Two legacy codes have been wrapped with COWG. One is an MPI-based molecular dynamic simulation (MDS) code, the other is a finite element based computational fluid dynamics (CFD) code for simulating incompressible Navier-Stokes flows. Performance comparisons between runs of the MDS CORBA component and the original MDS legacy code on a cluster of workstations and on a parallel computer are also presented. Wrapped as CORBA components, these legacy codes can be reused in a distributed computing environment. The first case shows that high performance can be maintained with the wrapped MDS component. The second case shows that a Web user can submit a task to the wrapped CFD component through a Web page without knowing the exact implementation of the component. In this way, a user’s desktop computing environment can be extended to a high performance computing environment using a cluster of workstations or a parallel computer
Adjunctive strategies in the management of resistant, 'undilatable' coronary lesions after successfully crossing a CTO with a guidewire.
Successful revascularisation of chronic total occlusions (CTOs) remains one of the greatest challenges in the era of contemporary percutaneous coronary intervention (PCI). Such lesions are encountered with increasing frequency in current clinical practice. A predictable increase in the future burden of CTO management can be anticipated given the ageing population, increased rates of renal failure, graft failure and diabetes mellitus. Given recent advances and developments in CTO PCI management, successful recanalisation can be anticipated in the majority of procedures undertaken at high-volume centres when performed by expert operators. Despite advances in device technology, the management of resistant, calcific lesions remains one of the greatest challenges in successful CTO intervention. Established techniques to modify calcific lesions include the use of high-pressure non-compliant balloon dilation, cutting-balloons, anchor balloons and high speed rotational atherectomy (HSRA). Novel approaches have proven to be safe and technically feasible where standard approaches have failed. A step-wise progression of strategies is demonstrated, from well-recognised techniques to techniques that should only be considered when standard manoeuvres have proven unsuccessful. These methods will be described in the setting of clinical examples and include use of very high-pressure non-compliant balloon dilation, intentional balloon rupture with vessel dissection or balloon assisted micro-dissection (BAM), excimer coronary laser atherectomy (ECLA) and use of HSRA in various 'offlabel' settings
Fluctuation relations for heat engines in time-periodic steady states
A fluctuation relation for heat engines (FRHE) has been derived recently. In
the beginning, the system is in contact with the cooler bath. The system is
then coupled to the hotter bath and external parameters are changed cyclically,
eventually bringing the system back to its initial state, once the coupling
with the hot bath is switched off. In this work, we lift the condition of
initial thermal equilibrium and derive a new fluctuation relation for the
central system (heat engine) being in a time-periodic steady state (TPSS).
Carnot's inequality for classical thermodynamics follows as a direct
consequence of this fluctuation theorem even in TPSS. For the special cases of
the absence of hot bath and no extraction of work, we obtain the integral
fluctuation theorem for total entropy and the generalized exchange fluctuation
theorem, respectively. Recently microsized heat engines have been realized
experimentally in the TPSS. We numerically simulate the same model and verify
our proposed theorems.Comment: 9 page
Nanomechanical inhomogeneities in CVA-deposited titanium nitride thin films: Nanoindentation and Finite Element Method Investigations
Refractory metals that can withstand at high temperatures and harsh
conditions are of utmost importance for solar-thermal and energy storage
applications. Thin films of TiN have been deposited using cathodic vacuum arc
deposition (CVA) at relatively low temperatures ~ 300 oC using the substrate
bias ~ -60V. The nanomechanical properties of these films were investigated
using nanoindentation and the spatial fluctuations were observed. The
nanoindentation results were simulated using finite element method (FEM)
through Johnson-Cook model. We have found the local nitridation plays an
important role on nanomechanical properties of TiN thin films and confirms that
the nitrogen deficient regions are ductile with low yield stress and hardening
modulus. This study further opens the opportunities of modelling the nanoscale
system using FEM analysis
Using the blockchain to enable transparent and auditable processing of personal data in cloud- based services: Lessons from the Privacy-Aware Cloud Ecosystems (PACE) project
The architecture of cloud-based services is typically opaque and intricate. As a result, data subjects cannot exercise adequate control over their personal data, and overwhelmed data protection authorities must spend their limited resources in costly forensic efforts to ascertain instances of non-compliance. To address these data protection challenges, a group of computer scientists and socio-legal scholars joined forces in the Privacy-Aware Cloud Ecosystems (PACE) project to design a blockchain-based privacy-enhancing technology (PET). This article presents the fruits of this collaboration, highlighting the capabilities and limits of our PET, as well as the challenges we encountered during our interdisciplinary endeavour. In particular, we explore the barriers to interdisciplinary collaboration between law and computer science that we faced, and how these two fields’ different expectations as to what technology can do for data protection law compliance had an impact on the project's development and outcome. We also explore the overstated promises of techno-regulation, and the practical and legal challenges that militate against the implementation of our PET: most industry players have no incentive to deploy it, the transaction costs of running it make it prohibitively expensive, and there are significant clashes between the blockchain's decentralised architecture and GDPR's requirements that hinder its deployability. We share the insights and lessons we learned from our efforts to overcome these challenges, hoping to inform other interdisciplinary projects that are increasingly important to shape a data ecosystem that promotes the protection of our personal data
Applying conflict management strategies in BDI Agents for resource management in computational grids
Managing resources in large scale distributed systems --- "Computational Grids", is a complex and time sensitive process. The computational resources being shared vary in type and complexity, and resource properties can change over time. An approach based on interacting software agents is presented, where each resource manager and resource requester is modelled as a BDI (Belief-Desire-Intention) agent. The proposed approach can help resolve conflicts that arise during resource discovery and application scheduling, and enables site autonomy to be maintained. The modelling and detection of conflicts is important in the context of this work, to enable each resource and application to respond to changes in the environment. We propose a BDI based framework that can be used to model agents that represent resources and applications --- and outline properties that each must maintain
BioSec: A Biometric Authentication Framework for Secure and Private Communication among Edge Devices in IoT and Industry 4.0
With the rapid increase in the usage areas of Internet of Things (IoT) devices, it brings challenges such as security and privacy. One way to ensure these in IoT-based systems is user authentication. Until today, user authentication is provided by traditional methods such as pin and token based. But traditional methods have challenges such as forgotten, stolen, and shared with another user who is unauthorized. To address these challenges, we proposed a biometric method called BioSec to provide authentication in IoT integrated with edge consumer electronics using fingerprint authentication. Further, we ensured the security of biometric data both in the transmission channel and database with the standard encryption method. BioSec ensures secure and private communication among edge devices in IoT and Industry 4.0. Finally, we have compared three encryption methods used to protect biometric templates in terms of processing times and identified that AES-128-bit key encryption method outperforms others
Chiral constituent quark model and the coupling strength of eta'
Using the latest data pertaining to \bar u-\bar d asymmetry and the spin
polarization functions, detailed implications of the possible values of the
coupling strength of the singlet Goldstone boson \eta' have been investigated
in the \chiCQM with configuration mixing. Using \Delta u, \Delta_3, \bar u-\bar
d and \bar u/\bar d, the possible ranges of the coupling parameters a, \alpha^
2, \beta^ 2 and \zeta^ 2, representing respectively the probabilities of
fluctuations to pions, K, \eta and \eta^{'}, are shown to be 0.10 \lesssim a
\lesssim 0.14, 0.2\lesssim \alpha \lesssim 0.5, 0.2\lesssim \beta \lesssim 0.7
and 0.10 lesssim |\zeta| \lesssim 0.70. To constrain the coupling strength of
\eta', detailed fits have been obtained for spin polarization functions, quark
distribution functions and baryon octet magnetic moments corresponding to the
following sets of parameters: a=0.1, \alpha=0.4, \beta=0.7, |\zeta|=0.65 (Case
I); a=0.1, \alpha=0.4, \beta=0.6, |\zeta|=0.70 (Case II); a=0.14, \alpha=0.4,
\beta=0.2, \zeta=0 (Case III) and a=0.13, \alpha=\beta=0.45, |\zeta|=0.10 (Case
IV). Case I represents the calculations where a is fixed to be 0.1, in
accordance with earlier calculations, whereas other parameters are treated free
and the Case IV represents our best fit. The fits clearly establish that a
small non-zero value of the coupling of \eta' is preferred over the higher
values of \eta' as well as when \zeta=0, the latter implying the absence of
\eta' from the dynamics of \chiCQM. Our best fit achieves an overall excellent
fit to the data, in particular the fit for \Delta u, \Delta d, \Delta_8 as well
as the magnetic moments \mu_{n}, \mu_{\Sigma^-}, \mu_{\Sigma^+} and \mu_{\Xi^-}
is almost perfect, the \mu_{\Xi^-} being a difficult case for most of the
similar calculations.Comment: 8 RevTeX pages, 2 Tables, Revised version to appear in Int.J.Mod.Phys
- …