43 research outputs found

    Multi-GPU Acceleration of the iPIC3D Implicit Particle-in-Cell Code

    Full text link
    iPIC3D is a widely used massively parallel Particle-in-Cell code for the simulation of space plasmas. However, its current implementation does not support execution on multiple GPUs. In this paper, we describe the porting of iPIC3D particle mover to GPUs and the optimization steps to increase the performance and parallel scaling on multiple GPUs. We analyze the strong scaling of the mover on two GPU clusters and evaluate its performance and acceleration. The optimized GPU version which uses pinned memory and asynchronous data prefetching outperform their corresponding CPU versions by 5-10x on two different systems equipped with NVIDIA K80 and V100 GPUs.Comment: Accepted for publication in ICCS 201

    Remodeler les institutions pour la gestion des ressources naturelles

    Get PDF
    This InfoResources Focus tries to clarify challenges people face when shaping institutions for sustainable NRM and discusses key elements for implementing processes of institutional change. Emphasis is put on local institutions embedded in national, regional and global institutional schemes

    A forensic acquisition and analysis system for IaaS

    Get PDF
    Cloud computing is a promising next-generation computing paradigm that offers significant economic benefits to both commercial and public entities. Furthermore, cloud computing provides accessibility, simplicity, and portability for its customers. Due to the unique combination of characteristics that cloud computing introduces (including on-demand self-service, broad network access, resource pooling, rapid elasticity, and measured service), digital investigations face various technical, legal, and organizational challenges to keep up with current developments in the field of cloud computing. There are a wide variety of issues that need to be resolved in order to perform a proper digital investigation in the cloud environment. This paper examines the challenges in cloud forensics that are identified in the current research literature, alongside exploring the existing proposals and technical solutions addressed in the respective research. The open problems that need further effort are highlighted. As a result of the analysis of literature, it is found that it would be difficult, if not impossible, to perform an investigation and discovery in the cloud environment without relying on cloud service providers (CSPs). Therefore, dependence on the CSPs is ranked as the greatest challenge when investigators need to acquire evidence in a timely yet forensically sound manner from cloud systems. Thus, a fully independent model requires no intervention or cooperation from the cloud provider is proposed. This model provides a different approach to a forensic acquisition and analysis system (FAAS) in an Infrastructure as a Service model. FAAS seeks to provide a richer and more complete set of admissible evidences than what current CSPs provide, with no requirement for CSP involvement or modification to the CSP’s underlying architecture

    Fog computing security: a review of current applications and security solutions

    Get PDF
    Fog computing is a new paradigm that extends the Cloud platform model by providing computing resources on the edges of a network. It can be described as a cloud-like platform having similar data, computation, storage and application services, but is fundamentally different in that it is decentralized. In addition, Fog systems are capable of processing large amounts of data locally, operate on-premise, are fully portable, and can be installed on heterogeneous hardware. These features make the Fog platform highly suitable for time and location-sensitive applications. For example, Internet of Things (IoT) devices are required to quickly process a large amount of data. This wide range of functionality driven applications intensifies many security issues regarding data, virtualization, segregation, network, malware and monitoring. This paper surveys existing literature on Fog computing applications to identify common security gaps. Similar technologies like Edge computing, Cloudlets and Micro-data centres have also been included to provide a holistic review process. The majority of Fog applications are motivated by the desire for functionality and end-user requirements, while the security aspects are often ignored or considered as an afterthought. This paper also determines the impact of those security issues and possible solutions, providing future security-relevant directions to those responsible for designing, developing, and maintaining Fog systems

    Macrophage signaling in HIV-1 infection

    Get PDF
    The human immunodeficiency virus-1 (HIV-1) is a member of the lentivirus genus. The virus does not rely exclusively on the host cell machinery, but also on viral proteins that act as molecular switches during the viral life cycle which play significant functions in viral pathogenesis, notably by modulating cell signaling. The role of HIV-1 proteins (Nef, Tat, Vpr, and gp120) in modulating macrophage signaling has been recently unveiled. Accessory, regulatory, and structural HIV-1 proteins interact with signaling pathways in infected macrophages. In addition, exogenous Nef, Tat, Vpr, and gp120 proteins have been detected in the serum of HIV-1 infected patients. Possibly, these proteins are released by infected/apoptotic cells. Exogenous accessory regulatory HIV-1 proteins are able to enter macrophages and modulate cellular machineries including those that affect viral transcription. Furthermore HIV-1 proteins, e.g., gp120, may exert their effects by interacting with cell surface membrane receptors, especially chemokine co-receptors. By activating the signaling pathways such as NF-kappaB, MAP kinase (MAPK) and JAK/STAT, HIV-1 proteins promote viral replication by stimulating transcription from the long terminal repeat (LTR) in infected macrophages; they are also involved in macrophage-mediated bystander T cell apoptosis. The role of HIV-1 proteins in the modulation of macrophage signaling will be discussed in regard to the formation of viral reservoirs and macrophage-mediated T cell apoptosis during HIV-1 infection

    The macrophage in HIV-1 infection: From activation to deactivation?

    Get PDF
    Macrophages play a crucial role in innate and adaptative immunity in response to microorganisms and are an important cellular target during HIV-1 infection. Recently, the heterogeneity of the macrophage population has been highlighted. Classically activated or type 1 macrophages (M1) induced in particular by IFN-γ display a pro-inflammatory profile. The alternatively activated or type 2 macrophages (M2) induced by Th-2 cytokines, such as IL-4 and IL-13 express anti-inflammatory and tissue repair properties. Finally IL-10 has been described as the prototypic cytokine involved in the deactivation of macrophages (dM). Since the capacity of macrophages to support productive HIV-1 infection is known to be modulated by cytokines, this review shows how modulation of macrophage activation by cytokines impacts the capacity to support productive HIV-1 infection. Based on the activation status of macrophages we propose a model starting with M1 classically activated macrophages with accelerated formation of viral reservoirs in a context of Th1 and proinflammatory cytokines. Then IL-4/IL-13 alternatively activated M2 macrophages will enter into the game that will stop the expansion of the HIV-1 reservoir. Finally IL-10 deactivation of macrophages will lead to immune failure observed at the very late stages of the HIV-1 disease

    Tradizioni, culto e dottrine nel mondo bulgaro

    No full text
    Viene descritta la presenza dell'immagine dell'imperatore Costantino (santo nella tradizione ortodossa) nella tradizione medievale bulgara, secoli IX-XIV, e nella tradizione popolare nei secoli successivi con speciale attenzione al rito dei nestinari che nel giorno dei s.s. Costantino ed Elena eseguono una specifica danza sulle braci ardenti

    Negotiating and Enforcing QoS and SLAs in Grid and Cloud Computing

    No full text
    Abstract. Emerging grid computing infrastructures such as cloud com-puting can only become viable alternatives for the enterprise if they can provide stable service levels for business processes and SLA-based cost-ing. In this paper we describe and apply a three-step approach to map SLA and QoS requirements of business processes to such infrastructures. We start with formalization of service capabilities and business process requirements. We compare them and, if we detect a performance or reli-ability gap, we dynamically improve performance of individual services deployed in grid and cloud computing environments. Here we employ translucent replication of services. An experimental evaluation in Ama-zon EC2 verified our approach
    corecore