406 research outputs found

    Quantifying Eulerian Eddy Leakiness in an Idealized Model

    Get PDF
    An idealized eddy‐resolving ocean basin, closely resembling the North Pacific Ocean, is simulated using MITgcm. We identify rotationally coherent Lagrangian vortices (RCLVs) and sea surface height (SSH) eddies based on the Lagrangian and Eulerian framework, respectively. General statistical results show that RCLVs have a much smaller coherent core than SSH eddies with the ratio of radius is about 0.5. RCLVs are often enclosed by SSH anomaly contours, but SSH eddy identification method fails to detect more than half of RCLVs. Based on their locations, two types of eddies are classified into three categories: overlapping RCLVs and SSH eddies, nonoverlapping SSH eddies, and nonoverlapping RCLVs. Using Lagrangian particles, we examine the processes of leakage and intrusion around SSH eddies. For overlapping SSH eddies, over the lifetime, the material coherent core only accounts for about 25% and about 50% of initial water leak from eddy interior. The remaining 25% of water can still remain inside the boundary, but only in the form of filaments outside the coherent core. For nonoverlapping SSH eddies, more water leakage (about 60%) occurs at a faster rate. Guided by the number and radius of SSH eddies, fixed circles and moving circles are randomly selected to diagnose the material flux around these circles. We find that the leakage and intrusion trends of moving circles are quite similar to that of nonoverlapping SSH eddies, suggesting that the material coherence properties of nonoverlapping SSH eddies are not significantly different from random pieces of ocean with the same size

    Zivilgesellschaft, Gemeinwohl und KollektivgĂŒter

    Get PDF
    In den letzten zwei Jahrzehnten erlebten ‚Gemeinwohl’ wie ‚Zivilgesellschaft’ eine Renaissance als Topoi und wissenschaftliche Konzepte. Beide werden oft miteinander in Beziehung gebracht: WĂ€hrend der Zivilgesellschaft eine gemeinwohlfördernde Funktion zugeschrieben wird, dient das Gemeinwohl wiederum auch in wissenschaftlich-analytischen Konzepten der Zivilgesellschaft als Kennzeichen eines spezifisch ‚zivilgesellschaftlichen’ Handlungsmodus. Diese Gleichsetzung wird im vorliegenden Papier theoretisch wie empirisch anhand ausgewĂ€hlter Fallstudien zum Gemeinwohldiskurs in Umweltkonflikten in Frage gestellt. Die vorgestellten Überlegungen beziehen sich dabei primĂ€r auf eine von JĂŒrgen Kocka im Rahmen der Arbeitsgruppe ‚Zivilgesellschaft’ am WZB entwickelte Definition von Zivilgesellschaft. Der Bezug auf das Gemeinwohl wird insgesamt als nur begrenzt geeignet angesehen, zivilgesellschaftliches Handeln zu kennzeichnen. Dies nicht nur aufgrund seiner inhaltlichen Vagheit und normativen Aufladung, sondern auch deshalb, weil das Gemeinwohl in Nutzungskonflikten um KollektivgĂŒter als stehender Begriff verwendet wird. Die Frage, ob das jeweils umstrittene Gut die Eigenschaften eines privaten oder eines öffentlichen Gutes aufweist, bestimmt damit maßgeblich die diskursive Verwendung von ‚Gemeinwohl’ mit. Da zudem zivilgesellschaftliche Akteure ohnehin meist im Falle von Verteilungsfragen, die KollektivgĂŒter betreffen, in die öffentliche Debatte eingreifen, bietet es sich an, anstelle des Gemeinwohls die Verhandlung von KollektivgĂŒtern in eine wissenschaftliche Konzeptualisierung zivilgesellschaftlichen Handelns aufzunehmen.As topoi and as scientific concepts, ‘common welfare’ (Gemeinwohl) and ‘civil society’ experienced a revitalisation within the last two decades. Both are often used in context of one another. While civil society is supposed to enhance the common welfare, the latter is, in return, perceived as characteristic for activities typical for civil society, even in scientific concepts. In this paper, this relationship is put into question, theoretically as well as empirically, taking into account selected case studies on the debate on ‘common welfare’ in environmental conflicts. It specifically refers to a concept of civil society developed by JĂŒrgen Kocka within the WZB Working Group “Civil Society: historical and comparative perspectives”. It will be shown that reference to common welfare is only suitable to a limited extent in characterising ‘civil society’ activities. This is not only due to its vagueness and normative charge; moreover, the ‘common welfare’ seems to be a set phrase in the case of conflicts regarding collective goods. Whether the goods in question can be described as private or public goods apparently influences the discursive use of ‘common welfare’. Since civil society actors mostly tend to intervene in public debates concerning the distribution of collective goods, the negotiation of ‘collective goods’ rather than ‘common welfare’ should be integrated into a scientific conceptualisation of civil society

    Quantifying Eulerian Eddy Leakiness in an Idealized Model

    Get PDF
    An idealized eddy‐resolving ocean basin, closely resembling the North Pacific Ocean, is simulated using MITgcm. We identify rotationally coherent Lagrangian vortices (RCLVs) and sea surface height (SSH) eddies based on the Lagrangian and Eulerian framework, respectively. General statistical results show that RCLVs have a much smaller coherent core than SSH eddies with the ratio of radius is about 0.5. RCLVs are often enclosed by SSH anomaly contours, but SSH eddy identification method fails to detect more than half of RCLVs. Based on their locations, two types of eddies are classified into three categories: overlapping RCLVs and SSH eddies, nonoverlapping SSH eddies, and nonoverlapping RCLVs. Using Lagrangian particles, we examine the processes of leakage and intrusion around SSH eddies. For overlapping SSH eddies, over the lifetime, the material coherent core only accounts for about 25% and about 50% of initial water leak from eddy interior. The remaining 25% of water can still remain inside the boundary, but only in the form of filaments outside the coherent core. For nonoverlapping SSH eddies, more water leakage (about 60%) occurs at a faster rate. Guided by the number and radius of SSH eddies, fixed circles and moving circles are randomly selected to diagnose the material flux around these circles. We find that the leakage and intrusion trends of moving circles are quite similar to that of nonoverlapping SSH eddies, suggesting that the material coherence properties of nonoverlapping SSH eddies are not significantly different from random pieces of ocean with the same size

    Low complexity hardware interleaver for MIMO-OFDM based wireless LAN

    Get PDF
    Abstract-A low complexity hardware interleaver architecture is presented for MIMO-OFDM based Wireless LAN e.g. 802.11n. Novelty of the presented architecture is twofold; 1) Flexibility to choose interleaver implementation with different modulation scheme and different size for different spatial streams in a multi antenna system, 2) Complexity to compute on the fly interleaver address is reduce by using recursion and is supported by mathematical formulation. The proposed interleaver architecture is implemented on 65nm CMOS process and it consumes 0.035 mm 2 area. The proposed architecture supports high speed communication with maximum throughput of 900 Mbps at a clock rate of 225 MHz

    Robust Parametric Control of Spacecraft Rendezvous

    Get PDF
    This paper proposes a method to design the robust parametric control for autonomous rendezvous of spacecrafts with the inertial information with uncertainty. We consider model uncertainty of traditional C-W equation to formulate the dynamic model of the relative motion. Based on eigenstructure assignment and model reference theory, a concise control law for spacecraft rendezvous is proposed which could be fixed through solving an optimization problem. The cost function considers the stabilization of the system and other performances. Simulation results illustrate the robustness and effectiveness of the proposed control

    VLSI implementation of a switch for on-chip networks

    Get PDF
    Abstract. Switch nodes in a 2

    A low area and low power programmable baseband processor architecture

    Full text link
    A fully programmable radio baseband processor archi-tecture is presented. The architecture is based on a DSP processor core and a number exible accelerators, con-nected via a congurable network. Design choices are mo-tivated by the inherent properties of the baseband algo-rithms used in different types of radio systems. A large de-gree of hardware reuse between algorithms and standards, careful selection of accelerators, and low memory cost al-lows very area and power efcient implementation of multi-standard radio baseband processors. A demonstrator chip for 802.11a/b/g physical layer baseband processing was manufactured in 0.18 m CMOS. The silicon area is 2.9 mm2, including all memories.

    Large Matrix Multiplication on a Novel Heterogeneous

    Get PDF
    Abstract. This paper introduces a novel master-multi-SIMD on-chip multi-core architecture for embedded signal processing. The parallel architecture and its memory subsystem are described in this paper. We evaluate the large size matrix multiplication performance on this parallel architecture and compare it with a SIMD-extended data parallel architecture. We also examine how well the new architecture scales for di«erent numbers of SIMD co-processors. The experimental results show that the ePUMA 1 architecture's memory subsystem can e«ectively hide the data access overhead. With its 8-way SIMD data path and multi-SIMD parallel execution, the ePUMA architecture improves the performance of matrix multiplication with a speedup of 45x from the conventional SIMD extension

    Melatonin Synthesis and Function: Evolutionary History in Animals and Plants

    Get PDF
    Melatonin is an ancient molecule that can be traced back to the origin of life. Melatonin's initial function was likely that as a free radical scavenger. Melatonin presumably evolved in bacteria; it has been measured in both α-proteobacteria and in photosynthetic cyanobacteria. In early evolution, bacteria were phagocytosed by primitive eukaryotes for their nutrient value. According to the endosymbiotic theory, the ingested bacteria eventually developed a symbiotic association with their host eukaryotes. The ingested α-proteobacteria evolved into mitochondria while cyanobacteria became chloroplasts and both organelles retained their ability to produce melatonin. Since these organelles have persisted to the present day, all species that ever existed or currently exist may have or may continue to synthesize melatonin in their mitochondria (animals and plants) and chloroplasts (plants) where it functions as an antioxidant. Melatonin's other functions, including its multiple receptors, developed later in evolution. In present day animals, via receptor-mediated means, melatonin functions in the regulation of sleep, modulation of circadian rhythms, enhancement of immunity, as a multifunctional oncostatic agent, etc., while retaining its ability to reduce oxidative stress by processes that are, in part, receptor-independent. In plants, melatonin continues to function in reducing oxidative stress as well as in promoting seed germination and growth, improving stress resistance, stimulating the immune system and modulating circadian rhythms; a single melatonin receptor has been identified in land plants where it controls stomatal closure on leaves. The melatonin synthetic pathway varies somewhat between plants and animals. The amino acid, tryptophan, is the necessary precursor of melatonin in all taxa. In animals, tryptophan is initially hydroxylated to 5-hydroxytryptophan which is then decarboxylated with the formation of serotonin. Serotonin is either acetylated to N-acetylserotonin or it is methylated to form 5-methoxytryptamine; these products are either methylated or acetylated, respectively, to produce melatonin. In plants, tryptophan is first decarboxylated to tryptamine which is then hydroxylated to form serotonin

    C2PI: An Efficient Crypto-Clear Two-Party Neural Network Private Inference

    Full text link
    Recently, private inference (PI) has addressed the rising concern over data and model privacy in machine learning inference as a service. However, existing PI frameworks suffer from high computational and communication costs due to the expensive multi-party computation (MPC) protocols. Existing literature has developed lighter MPC protocols to yield more efficient PI schemes. We, in contrast, propose to lighten them by introducing an empirically-defined privacy evaluation. To that end, we reformulate the threat model of PI and use inference data privacy attacks (IDPAs) to evaluate data privacy. We then present an enhanced IDPA, named distillation-based inverse-network attack (DINA), for improved privacy evaluation. Finally, we leverage the findings from DINA and propose C2PI, a two-party PI framework presenting an efficient partitioning of the neural network model and requiring only the initial few layers to be performed with MPC protocols. Based on our experimental evaluations, relaxing the formal data privacy guarantees C2PI can speed up existing PI frameworks, including Delphi [1] and Cheetah [2], up to 2.89x and 3.88x under LAN and WAN settings, respectively, and save up to 2.75x communication costs
    • 

    corecore