406 research outputs found
Quantifying Eulerian Eddy Leakiness in an Idealized Model
An idealized eddyâresolving ocean basin, closely resembling the North Pacific Ocean, is simulated using MITgcm. We identify rotationally coherent Lagrangian vortices (RCLVs) and sea surface height (SSH) eddies based on the Lagrangian and Eulerian framework, respectively. General statistical results show that RCLVs have a much smaller coherent core than SSH eddies with the ratio of radius is about 0.5. RCLVs are often enclosed by SSH anomaly contours, but SSH eddy identification method fails to detect more than half of RCLVs. Based on their locations, two types of eddies are classified into three categories: overlapping RCLVs and SSH eddies, nonoverlapping SSH eddies, and nonoverlapping RCLVs. Using Lagrangian particles, we examine the processes of leakage and intrusion around SSH eddies. For overlapping SSH eddies, over the lifetime, the material coherent core only accounts for about 25% and about 50% of initial water leak from eddy interior. The remaining 25% of water can still remain inside the boundary, but only in the form of filaments outside the coherent core. For nonoverlapping SSH eddies, more water leakage (about 60%) occurs at a faster rate. Guided by the number and radius of SSH eddies, fixed circles and moving circles are randomly selected to diagnose the material flux around these circles. We find that the leakage and intrusion trends of moving circles are quite similar to that of nonoverlapping SSH eddies, suggesting that the material coherence properties of nonoverlapping SSH eddies are not significantly different from random pieces of ocean with the same size
Zivilgesellschaft, Gemeinwohl und KollektivgĂŒter
In den letzten zwei Jahrzehnten erlebten âGemeinwohlâ wie âZivilgesellschaftâ eine
Renaissance als Topoi und wissenschaftliche Konzepte. Beide werden oft miteinander in
Beziehung gebracht: WÀhrend der Zivilgesellschaft eine gemeinwohlfördernde Funktion
zugeschrieben wird, dient das Gemeinwohl wiederum auch in wissenschaftlich-analytischen
Konzepten der Zivilgesellschaft als Kennzeichen eines spezifisch âzivilgesellschaftlichenâ
Handlungsmodus. Diese Gleichsetzung wird im vorliegenden Papier theoretisch wie
empirisch anhand ausgewÀhlter Fallstudien zum Gemeinwohldiskurs in Umweltkonflikten in
Frage gestellt. Die vorgestellten Ăberlegungen beziehen sich dabei primĂ€r auf eine von JĂŒrgen
Kocka im Rahmen der Arbeitsgruppe âZivilgesellschaftâ am WZB entwickelte Definition von
Zivilgesellschaft.
Der Bezug auf das Gemeinwohl wird insgesamt als nur begrenzt geeignet angesehen,
zivilgesellschaftliches Handeln zu kennzeichnen. Dies nicht nur aufgrund seiner inhaltlichen
Vagheit und normativen Aufladung, sondern auch deshalb, weil das Gemeinwohl in
Nutzungskonflikten um KollektivgĂŒter als stehender Begriff verwendet wird. Die Frage, ob
das jeweils umstrittene Gut die Eigenschaften eines privaten oder eines öffentlichen Gutes
aufweist, bestimmt damit maĂgeblich die diskursive Verwendung von âGemeinwohlâ mit. Da
zudem zivilgesellschaftliche Akteure ohnehin meist im Falle von Verteilungsfragen, die
KollektivgĂŒter betreffen, in die öffentliche Debatte eingreifen, bietet es sich an, anstelle des
Gemeinwohls die Verhandlung von KollektivgĂŒtern in eine wissenschaftliche
Konzeptualisierung zivilgesellschaftlichen Handelns aufzunehmen.As topoi and as scientific concepts, âcommon welfareâ (Gemeinwohl) and âcivil societyâ
experienced a revitalisation within the last two decades. Both are often used in context of one
another. While civil society is supposed to enhance the common welfare, the latter is, in
return, perceived as characteristic for activities typical for civil society, even in scientific
concepts. In this paper, this relationship is put into question, theoretically as well as
empirically, taking into account selected case studies on the debate on âcommon welfareâ in
environmental conflicts. It specifically refers to a concept of civil society developed by JĂŒrgen
Kocka within the WZB Working Group âCivil Society: historical and comparative
perspectivesâ.
It will be shown that reference to common welfare is only suitable to a limited extent in
characterising âcivil societyâ activities. This is not only due to its vagueness and normative
charge; moreover, the âcommon welfareâ seems to be a set phrase in the case of conflicts
regarding collective goods. Whether the goods in question can be described as private or
public goods apparently influences the discursive use of âcommon welfareâ. Since civil
society actors mostly tend to intervene in public debates concerning the distribution of
collective goods, the negotiation of âcollective goodsâ rather than âcommon welfareâ should
be integrated into a scientific conceptualisation of civil society
Quantifying Eulerian Eddy Leakiness in an Idealized Model
An idealized eddyâresolving ocean basin, closely resembling the North Pacific Ocean, is simulated using MITgcm. We identify rotationally coherent Lagrangian vortices (RCLVs) and sea surface height (SSH) eddies based on the Lagrangian and Eulerian framework, respectively. General statistical results show that RCLVs have a much smaller coherent core than SSH eddies with the ratio of radius is about 0.5. RCLVs are often enclosed by SSH anomaly contours, but SSH eddy identification method fails to detect more than half of RCLVs. Based on their locations, two types of eddies are classified into three categories: overlapping RCLVs and SSH eddies, nonoverlapping SSH eddies, and nonoverlapping RCLVs. Using Lagrangian particles, we examine the processes of leakage and intrusion around SSH eddies. For overlapping SSH eddies, over the lifetime, the material coherent core only accounts for about 25% and about 50% of initial water leak from eddy interior. The remaining 25% of water can still remain inside the boundary, but only in the form of filaments outside the coherent core. For nonoverlapping SSH eddies, more water leakage (about 60%) occurs at a faster rate. Guided by the number and radius of SSH eddies, fixed circles and moving circles are randomly selected to diagnose the material flux around these circles. We find that the leakage and intrusion trends of moving circles are quite similar to that of nonoverlapping SSH eddies, suggesting that the material coherence properties of nonoverlapping SSH eddies are not significantly different from random pieces of ocean with the same size
Low complexity hardware interleaver for MIMO-OFDM based wireless LAN
Abstract-A low complexity hardware interleaver architecture is presented for MIMO-OFDM based Wireless LAN e.g. 802.11n. Novelty of the presented architecture is twofold; 1) Flexibility to choose interleaver implementation with different modulation scheme and different size for different spatial streams in a multi antenna system, 2) Complexity to compute on the fly interleaver address is reduce by using recursion and is supported by mathematical formulation. The proposed interleaver architecture is implemented on 65nm CMOS process and it consumes 0.035 mm 2 area. The proposed architecture supports high speed communication with maximum throughput of 900 Mbps at a clock rate of 225 MHz
Robust Parametric Control of Spacecraft Rendezvous
This paper proposes a method to design the robust parametric control for autonomous rendezvous of spacecrafts with the inertial information with uncertainty. We consider model uncertainty of traditional C-W equation to formulate the dynamic model of the relative motion. Based on eigenstructure assignment and model reference theory, a concise control law for spacecraft rendezvous is proposed which could be fixed through solving an optimization problem. The cost function considers the stabilization of the system and other performances. Simulation results illustrate the robustness and effectiveness of the proposed control
A low area and low power programmable baseband processor architecture
A fully programmable radio baseband processor archi-tecture is presented. The architecture is based on a DSP processor core and a number exible accelerators, con-nected via a congurable network. Design choices are mo-tivated by the inherent properties of the baseband algo-rithms used in different types of radio systems. A large de-gree of hardware reuse between algorithms and standards, careful selection of accelerators, and low memory cost al-lows very area and power efcient implementation of multi-standard radio baseband processors. A demonstrator chip for 802.11a/b/g physical layer baseband processing was manufactured in 0.18 m CMOS. The silicon area is 2.9 mm2, including all memories.
Large Matrix Multiplication on a Novel Heterogeneous
Abstract. This paper introduces a novel master-multi-SIMD on-chip multi-core architecture for embedded signal processing. The parallel architecture and its memory subsystem are described in this paper. We evaluate the large size matrix multiplication performance on this parallel architecture and compare it with a SIMD-extended data parallel architecture. We also examine how well the new architecture scales for di«erent numbers of SIMD co-processors. The experimental results show that the ePUMA 1 architecture's memory subsystem can e«ectively hide the data access overhead. With its 8-way SIMD data path and multi-SIMD parallel execution, the ePUMA architecture improves the performance of matrix multiplication with a speedup of 45x from the conventional SIMD extension
Melatonin Synthesis and Function: Evolutionary History in Animals and Plants
Melatonin is an ancient molecule that can be traced back to the origin of life. Melatonin's initial function was likely that as a free radical scavenger. Melatonin presumably evolved in bacteria; it has been measured in both α-proteobacteria and in photosynthetic cyanobacteria. In early evolution, bacteria were phagocytosed by primitive eukaryotes for their nutrient value. According to the endosymbiotic theory, the ingested bacteria eventually developed a symbiotic association with their host eukaryotes. The ingested α-proteobacteria evolved into mitochondria while cyanobacteria became chloroplasts and both organelles retained their ability to produce melatonin. Since these organelles have persisted to the present day, all species that ever existed or currently exist may have or may continue to synthesize melatonin in their mitochondria (animals and plants) and chloroplasts (plants) where it functions as an antioxidant. Melatonin's other functions, including its multiple receptors, developed later in evolution. In present day animals, via receptor-mediated means, melatonin functions in the regulation of sleep, modulation of circadian rhythms, enhancement of immunity, as a multifunctional oncostatic agent, etc., while retaining its ability to reduce oxidative stress by processes that are, in part, receptor-independent. In plants, melatonin continues to function in reducing oxidative stress as well as in promoting seed germination and growth, improving stress resistance, stimulating the immune system and modulating circadian rhythms; a single melatonin receptor has been identified in land plants where it controls stomatal closure on leaves. The melatonin synthetic pathway varies somewhat between plants and animals. The amino acid, tryptophan, is the necessary precursor of melatonin in all taxa. In animals, tryptophan is initially hydroxylated to 5-hydroxytryptophan which is then decarboxylated with the formation of serotonin. Serotonin is either acetylated to N-acetylserotonin or it is methylated to form 5-methoxytryptamine; these products are either methylated or acetylated, respectively, to produce melatonin. In plants, tryptophan is first decarboxylated to tryptamine which is then hydroxylated to form serotonin
C2PI: An Efficient Crypto-Clear Two-Party Neural Network Private Inference
Recently, private inference (PI) has addressed the rising concern over data
and model privacy in machine learning inference as a service. However, existing
PI frameworks suffer from high computational and communication costs due to the
expensive multi-party computation (MPC) protocols. Existing literature has
developed lighter MPC protocols to yield more efficient PI schemes. We, in
contrast, propose to lighten them by introducing an empirically-defined privacy
evaluation. To that end, we reformulate the threat model of PI and use
inference data privacy attacks (IDPAs) to evaluate data privacy. We then
present an enhanced IDPA, named distillation-based inverse-network attack
(DINA), for improved privacy evaluation. Finally, we leverage the findings from
DINA and propose C2PI, a two-party PI framework presenting an efficient
partitioning of the neural network model and requiring only the initial few
layers to be performed with MPC protocols. Based on our experimental
evaluations, relaxing the formal data privacy guarantees C2PI can speed up
existing PI frameworks, including Delphi [1] and Cheetah [2], up to 2.89x and
3.88x under LAN and WAN settings, respectively, and save up to 2.75x
communication costs
- âŠ