398 research outputs found

    Reducing the number of miscreant tasks executions in a multi-use cluster.

    Get PDF
    Exploiting computational resources within an organisation for more than their primary task offers great benefits – making better use of capital expenditure and provides a pool of computational power. This can be achieved through the deployment of a cycle stealing distributed system, where tasks execute during the idle time on computers. However, if a task has not completed when a computer returns to its primary function the task will be preempted, wasting time (and energy), and is often reallocated to a new resource in an attempt to complete. This becomes exacerbated when tasks are incapable of completing due to excessive execution time or faulty hardware / software, leading to a situation where tasks are perpetually reallocated between computers – wasting time and energy. In this work we investigate techniques to increase the chance of ‘good’ tasks completing whilst curtailing the execution of ‘bad’ tasks. We demonstrate, through simulation, that we could have reduce the energy consumption of our cycle stealing system by approximately 50%

    Surface tension in an intrinsic curvature model with fixed one-dimensional boundaries

    Full text link
    A triangulated fixed connectivity surface model is investigated by using the Monte Carlo simulation technique. In order to have the macroscopic surface tension \tau, the vertices on the one-dimensional boundaries are fixed as the edges (=circles) of the tubular surface in the simulations. The size of the tubular surface is chosen such that the projected area becomes the regular square of area A. An intrinsic curvature energy with a microscopic bending rigidity b is included in the Hamiltonian. We found that the model undergoes a first-order transition of surface fluctuations at finite b, where the surface tension \tau discontinuously changes. The gap of \tau remains constant at the transition point in a certain range of values A/N^\prime at sufficiently large N^\prime, which is the total number of vertices excluding the fixed vertices on the boundaries. The value of \tau remains almost zero in the wrinkled phase at the transition point while \tau remains negative finite in the smooth phase in that range of A/N^\prime.Comment: 12 pages, 8 figure

    Disaggregation of spatial rainfall fields for hydrological modelling

    Get PDF
    International audienceMeteorological models generate fields of precipitation and other climatological variables as spatial averages at the scale of the grid used for numerical solution. The grid-scale can be large, particularly for GCMs, and disaggregation is required, for example to generate appropriate spatial-temporal properties of rainfall for coupling with surface-boundary conditions or more general hydrological applications. A method is presented here which considers the generation of the wet areas and the simulation of rainfall intensities separately. For the first task, a nearest-neighbour Markov scheme, based upon a Bayesian technique used in image processing, is implemented so as to preserve the structural features of the observed rainfall. Essentially, the large-scale field and the previously disaggregated field are used as evidence in an iterative procedure which aims at selecting a realisation according to the joint posterior probability distribution. In the second task the morphological characteristics of the field of rainfall intensities are reproduced through a random sampling of intensities according to a beta distribution and their allocation to pixels chosen so that the higher intensities are more likely to be further from the dry areas. The components of the scheme are assessed for Arkansas-Red River basin radar rainfall (hourly averages) by disaggregating from 40 km x 40 km to 8 km x 8 km. The wet/dry scheme provides a good reproduction both of the number of correctly classified pixels and the coverage, while the intensitiy scheme generates fields with an adequate variance within the grid-squares, so that this scheme provides the hydrologist with a useful tool for the downscaling of meteorological model outputs. Keywords: Rainfall, disaggregation, General Circulation Model, Bayesian analysi

    An extreme analysis for the 2010 precipitation event at the south of Saskatchewan prairie

    Get PDF
    After a prolonged drought period in the early 2000s, the Canadian prairie experienced a remarkably wet year in 2010. Five stations near the edge of the Saskatchewan boreal forest recorded historically high cumulative precipitation (from April to September). The exceptional wet year causes the public concerns on flood controls and land use management in the region. Using the Canadian National Climate Data Achieve, characteristics of six-month cumulative precipitation sums over Saskatchewan prairie are investigated by the Generalised Extreme Value (GEV) Theory. Based on the unconstrained GEV distribution, the 2010 event is outside the estimated 95% confidence intervals for the five Canadian prairie stations. On the contrary, the exceptional high 2010 cumulative perception sums for the five stations are still bounded by the estimated confidence bounds if the GEV distribution is constrained to the Gumbel distribution (i.e. setting the shape factor of the GEV distribution to be zero). These results demonstrate that the classical extreme analysis is useful for planning unprecedented extreme events in the Canadian Prairie, if the GEV distribution is constrained to the Gumbel distribution with the estimated uncertainty bounds based on the order statistics. © 2012 Global NEST Printed in Greece. All rights reserved

    Reducing the number of miscreant tasks executions in a multi-use cluster

    Get PDF
    Exploiting computational resources within an organisation for more than their primary task offers great benefits – making better use of capital expenditure and provides a pool of computational power. This can be achieved through the deployment of a cycle stealing distributed system, where tasks execute during the idle time on computers. However, if a task has not completed when a computer returns to its primary function the task will be preempted, wasting time (and energy), and is often reallocated to a new resource in an attempt to complete. This becomes exacerbated when tasks are incapable of completing due to excessive execution time or faulty hardware / software, leading to a situation where tasks are perpetually reallocated between computers – wasting time and energy. In this work we investigate techniques to increase the chance of ‘good’ tasks completing whilst curtailing the execution of ‘bad’ tasks. We demonstrate, through simulation, that we could have reduce the energy consumption of our cycle stealing system by approximately 50%

    Free boson formulation of boundary states in W_3 minimal models and the critical Potts model

    Full text link
    We develop a Coulomb gas formalism for boundary conformal field theory having a WW symmetry and illustrate its operation using the three state Potts model. We find that there are free-field representations for six WW conserving boundary states, which yield the fixed and mixed physical boundary conditions, and two WW violating boundary states which yield the free and new boundary conditions. Other WW violating boundary states can be constructed but they decouple from the rest of the theory. Thus we have a complete free-field realization of the known boundary states of the three state Potts model. We then use the formalism to calculate boundary correlation functions in various cases. We find that the conformal blocks arising when the two point function of Ï•2,3\phi_{2,3} is calculated in the presence of free and new boundary conditions are indeed the last two solutions of the sixth order differential equation generated by the singular vector.Comment: 25 page

    Phase transitions of an intrinsic curvature model on dynamically triangulated spherical surfaces with point boundaries

    Full text link
    An intrinsic curvature model is investigated using the canonical Monte Carlo simulations on dynamically triangulated spherical surfaces of size upto N=4842 with two fixed-vertices separated by the distance 2L. We found a first-order transition at finite curvature coefficient \alpha, and moreover that the order of the transition remains unchanged even when L is enlarged such that the surfaces become sufficiently oblong. This is in sharp contrast to the known results of the same model on tethered surfaces, where the transition weakens to a second-order one as L is increased. The phase transition of the model in this paper separates the smooth phase from the crumpled phase. The surfaces become string-like between two point-boundaries in the crumpled phase. On the contrary, we can see a spherical lump on the oblong surfaces in the smooth phase. The string tension was calculated and was found to have a jump at the transition point. The value of \sigma is independent of L in the smooth phase, while it increases with increasing L in the crumpled phase. This behavior of \sigma is consistent with the observed scaling relation \sigma \sim (2L/N)^\nu, where \nu\simeq 0 in the smooth phase, and \nu=0.93\pm 0.14 in the crumpled phase. We should note that a possibility of a continuous transition is not completely eliminated.Comment: 15 pages with 10 figure

    A stochastic reconstruction framework for analysis of water resource system vulnerability to climate-induced changes in river flow regime

    Get PDF
    Assessments of potential impacts of climate change on water resources systems are generally based on the use of downscaled climate scenarios to force hydrological and water resource systems models and hence quantify potential changes in system response. This approach, however, has several limitations. The uncertainties in current climate and hydrological models can be large, such analyses are rapidly outdated as new scenarios become available, and limited insight into system response is obtained. Here, we propose an alternative methodology in which system vulnerability is analyzed directly as a function of the potential variations in flow characteristics. We develop a stochastic reconstruction framework that generates a large ensemble of perturbed flow series at the local scale to represent a range of potential flow responses to climate change. From a theoretical perspective, the proposed reconstruction scheme can be considered as an extension of both the conventional resampling and the simple delta-methods. By the use of a two-parameter representation of regime change (i.e., the shift in the timing of the annual peak and the shift in the annual flow volume), system vulnerability can be visualized in a two-dimensional map. The methodology is applied to the current water resource system in southern Alberta, Canada, to explore the system's vulnerability to potential changes in the streamflow regime. Our study shows that the system is vulnerable to the expected decrease in annual flow volume, particularly when it is combined with an earlier annual peak. Under such conditions, adaptation will be required to return the system to the feasible operational mode. © 2013. American Geophysical Union. All Rights Reserved
    • …
    corecore