398 research outputs found
Reducing the number of miscreant tasks executions in a multi-use cluster.
Exploiting computational resources within an organisation
for more than their primary task offers great
benefits – making better use of capital expenditure and provides
a pool of computational power. This can be achieved through
the deployment of a cycle stealing distributed system, where
tasks execute during the idle time on computers. However,
if a task has not completed when a computer returns to its
primary function the task will be preempted, wasting time
(and energy), and is often reallocated to a new resource in
an attempt to complete. This becomes exacerbated when tasks
are incapable of completing due to excessive execution time or
faulty hardware / software, leading to a situation where tasks
are perpetually reallocated between computers – wasting time
and energy. In this work we investigate techniques to increase
the chance of ‘good’ tasks completing whilst curtailing the
execution of ‘bad’ tasks. We demonstrate, through simulation,
that we could have reduce the energy consumption of our cycle
stealing system by approximately 50%
Surface tension in an intrinsic curvature model with fixed one-dimensional boundaries
A triangulated fixed connectivity surface model is investigated by using the
Monte Carlo simulation technique. In order to have the macroscopic surface
tension \tau, the vertices on the one-dimensional boundaries are fixed as the
edges (=circles) of the tubular surface in the simulations. The size of the
tubular surface is chosen such that the projected area becomes the regular
square of area A. An intrinsic curvature energy with a microscopic bending
rigidity b is included in the Hamiltonian. We found that the model undergoes a
first-order transition of surface fluctuations at finite b, where the surface
tension \tau discontinuously changes. The gap of \tau remains constant at the
transition point in a certain range of values A/N^\prime at sufficiently large
N^\prime, which is the total number of vertices excluding the fixed vertices on
the boundaries. The value of \tau remains almost zero in the wrinkled phase at
the transition point while \tau remains negative finite in the smooth phase in
that range of A/N^\prime.Comment: 12 pages, 8 figure
Disaggregation of spatial rainfall fields for hydrological modelling
International audienceMeteorological models generate fields of precipitation and other climatological variables as spatial averages at the scale of the grid used for numerical solution. The grid-scale can be large, particularly for GCMs, and disaggregation is required, for example to generate appropriate spatial-temporal properties of rainfall for coupling with surface-boundary conditions or more general hydrological applications. A method is presented here which considers the generation of the wet areas and the simulation of rainfall intensities separately. For the first task, a nearest-neighbour Markov scheme, based upon a Bayesian technique used in image processing, is implemented so as to preserve the structural features of the observed rainfall. Essentially, the large-scale field and the previously disaggregated field are used as evidence in an iterative procedure which aims at selecting a realisation according to the joint posterior probability distribution. In the second task the morphological characteristics of the field of rainfall intensities are reproduced through a random sampling of intensities according to a beta distribution and their allocation to pixels chosen so that the higher intensities are more likely to be further from the dry areas. The components of the scheme are assessed for Arkansas-Red River basin radar rainfall (hourly averages) by disaggregating from 40 km x 40 km to 8 km x 8 km. The wet/dry scheme provides a good reproduction both of the number of correctly classified pixels and the coverage, while the intensitiy scheme generates fields with an adequate variance within the grid-squares, so that this scheme provides the hydrologist with a useful tool for the downscaling of meteorological model outputs. Keywords: Rainfall, disaggregation, General Circulation Model, Bayesian analysi
An extreme analysis for the 2010 precipitation event at the south of Saskatchewan prairie
After a prolonged drought period in the early 2000s, the Canadian prairie experienced a remarkably wet year in 2010. Five stations near the edge of the Saskatchewan boreal forest recorded historically high cumulative precipitation (from April to September). The exceptional wet year causes the public concerns on flood controls and land use management in the region. Using the Canadian National Climate Data Achieve, characteristics of six-month cumulative precipitation sums over Saskatchewan prairie are investigated by the Generalised Extreme Value (GEV) Theory. Based on the unconstrained GEV distribution, the 2010 event is outside the estimated 95% confidence intervals for the five Canadian prairie stations. On the contrary, the exceptional high 2010 cumulative perception sums for the five stations are still bounded by the estimated confidence bounds if the GEV distribution is constrained to the Gumbel distribution (i.e. setting the shape factor of the GEV distribution to be zero). These results demonstrate that the classical extreme analysis is useful for planning unprecedented extreme events in the Canadian Prairie, if the GEV distribution is constrained to the Gumbel distribution with the estimated uncertainty bounds based on the order statistics. © 2012 Global NEST Printed in Greece. All rights reserved
Reducing the number of miscreant tasks executions in a multi-use cluster
Exploiting computational resources within an organisation for more than their primary task offers great benefits – making better use of capital expenditure and provides a pool of computational power. This can be achieved through the deployment of a cycle stealing distributed system, where tasks execute during the idle time on computers. However, if a task has not completed when a computer returns to its primary function the task will be preempted, wasting time (and energy), and is often reallocated to a new resource in an attempt to complete. This becomes exacerbated when tasks are incapable of completing due to excessive execution time or faulty hardware / software, leading to a situation where tasks are perpetually reallocated between computers – wasting time and energy. In this work we investigate techniques to increase the chance of ‘good’ tasks completing whilst curtailing the execution of ‘bad’ tasks. We demonstrate, through simulation, that we could have reduce the energy consumption of our cycle stealing system by approximately 50%
Free boson formulation of boundary states in W_3 minimal models and the critical Potts model
We develop a Coulomb gas formalism for boundary conformal field theory having
a symmetry and illustrate its operation using the three state Potts model.
We find that there are free-field representations for six conserving
boundary states, which yield the fixed and mixed physical boundary conditions,
and two violating boundary states which yield the free and new boundary
conditions. Other violating boundary states can be constructed but they
decouple from the rest of the theory. Thus we have a complete free-field
realization of the known boundary states of the three state Potts model. We
then use the formalism to calculate boundary correlation functions in various
cases. We find that the conformal blocks arising when the two point function of
is calculated in the presence of free and new boundary conditions
are indeed the last two solutions of the sixth order differential equation
generated by the singular vector.Comment: 25 page
Phase transitions of an intrinsic curvature model on dynamically triangulated spherical surfaces with point boundaries
An intrinsic curvature model is investigated using the canonical Monte Carlo
simulations on dynamically triangulated spherical surfaces of size upto N=4842
with two fixed-vertices separated by the distance 2L. We found a first-order
transition at finite curvature coefficient \alpha, and moreover that the order
of the transition remains unchanged even when L is enlarged such that the
surfaces become sufficiently oblong. This is in sharp contrast to the known
results of the same model on tethered surfaces, where the transition weakens to
a second-order one as L is increased. The phase transition of the model in this
paper separates the smooth phase from the crumpled phase. The surfaces become
string-like between two point-boundaries in the crumpled phase. On the
contrary, we can see a spherical lump on the oblong surfaces in the smooth
phase. The string tension was calculated and was found to have a jump at the
transition point. The value of \sigma is independent of L in the smooth phase,
while it increases with increasing L in the crumpled phase. This behavior of
\sigma is consistent with the observed scaling relation \sigma \sim (2L/N)^\nu,
where \nu\simeq 0 in the smooth phase, and \nu=0.93\pm 0.14 in the crumpled
phase. We should note that a possibility of a continuous transition is not
completely eliminated.Comment: 15 pages with 10 figure
A stochastic reconstruction framework for analysis of water resource system vulnerability to climate-induced changes in river flow regime
Assessments of potential impacts of climate change on water resources systems are generally based on the use of downscaled climate scenarios to force hydrological and water resource systems models and hence quantify potential changes in system response. This approach, however, has several limitations. The uncertainties in current climate and hydrological models can be large, such analyses are rapidly outdated as new scenarios become available, and limited insight into system response is obtained. Here, we propose an alternative methodology in which system vulnerability is analyzed directly as a function of the potential variations in flow characteristics. We develop a stochastic reconstruction framework that generates a large ensemble of perturbed flow series at the local scale to represent a range of potential flow responses to climate change. From a theoretical perspective, the proposed reconstruction scheme can be considered as an extension of both the conventional resampling and the simple delta-methods. By the use of a two-parameter representation of regime change (i.e., the shift in the timing of the annual peak and the shift in the annual flow volume), system vulnerability can be visualized in a two-dimensional map. The methodology is applied to the current water resource system in southern Alberta, Canada, to explore the system's vulnerability to potential changes in the streamflow regime. Our study shows that the system is vulnerable to the expected decrease in annual flow volume, particularly when it is combined with an earlier annual peak. Under such conditions, adaptation will be required to return the system to the feasible operational mode. © 2013. American Geophysical Union. All Rights Reserved
- …