National Library of Energy BETA

Sample records for memory corruption error

  1. V-228: RealPlayer Buffer Overflow and Memory Corruption Error...

    Broader source: Energy.gov (indexed) [DOE]

    a memory corruption error and execute arbitrary code on the target system. IMPACT: Access control error SOLUTION: vendor recommends upgrading to version 16.0.3.51 Addthis...

  2. T-609: Adobe Acrobat/Reader Memory Corruption Error in CoolType Library Lets Remote Users Execute Arbitrary Code

    Broader source: Energy.gov [DOE]

    A remote user can create a specially crafted PDF file that, when loaded by the target user, will trigger a memory corruption error in the CoolType library and execute arbitrary code on the target system. The code will run with the privileges of the target user.

  3. T-625: Opera Frameset Handling Memory Corruption Vulnerability

    Broader source: Energy.gov [DOE]

    The vulnerability is caused due to an error when handling certain frameset constructs during page unloading and can be exploited to corrupt memory via a specially crafted web page.

  4. T-622: Adobe Acrobat and Reader Unspecified Memory Corruption Vulnerability

    Broader source: Energy.gov [DOE]

    The vulnerability is due to an unspecified error in the affected software when it processes .pdf files. An unauthenticated, remote attacker could exploit this vulnerability by convincing a user to view a malicious .pdf file. When viewed, the file could trigger a memory corruption error that could allow the attacker to execute arbitrary code on the system with the privileges of the user.

  5. Corruption

    E-Print Network [OSTI]

    Banerjee, Abhijit

    2012-03-13

    In this paper, we provide a new framework for analyzing corruption in public bureaucracies. The standard way to model corruption is as an example of moral hazard, which then leads to a focus on better monitoring and ...

  6. Characterizing Application Memory Error Vulnerability to

    E-Print Network [OSTI]

    Mutlu, Onur

    -reliability memory (HRM) Store error-tolerant data in less-reliable lower-cost memory Store error-vulnerable data an application Observation 2: Data can be recovered by software ·Heterogeneous-Reliability Memory (HRM: Data can be recovered by software ·Heterogeneous-Reliability Memory (HRM) ·Evaluation 4 #12;Server

  7. Evaluating operating system vulnerability to memory errors.

    SciTech Connect (OSTI)

    Ferreira, Kurt Brian; Bridges, Patrick G.; Pedretti, Kevin Thomas Tauke; Mueller, Frank; Fiala, David; Brightwell, Ronald Brian

    2012-05-01

    Reliability is of great concern to the scalability of extreme-scale systems. Of particular concern are soft errors in main memory, which are a leading cause of failures on current systems and are predicted to be the leading cause on future systems. While great effort has gone into designing algorithms and applications that can continue to make progress in the presence of these errors without restarting, the most critical software running on a node, the operating system (OS), is currently left relatively unprotected. OS resiliency is of particular importance because, though this software typically represents a small footprint of a compute node's physical memory, recent studies show more memory errors in this region of memory than the remainder of the system. In this paper, we investigate the soft error vulnerability of two operating systems used in current and future high-performance computing systems: Kitten, the lightweight kernel developed at Sandia National Laboratories, and CLE, a high-performance Linux-based operating system developed by Cray. For each of these platforms, we outline major structures and subsystems that are vulnerable to soft errors and describe methods that could be used to reconstruct damaged state. Our results show the Kitten lightweight operating system may be an easier target to harden against memory errors due to its smaller memory footprint, largely deterministic state, and simpler system structure.

  8. Improving Memory Error Handling Using Linux

    SciTech Connect (OSTI)

    Carlton, Michael Andrew [Los Alamos National Lab. (LANL), Los Alamos, NM (United States); Blanchard, Sean P. [Los Alamos National Lab. (LANL), Los Alamos, NM (United States); Debardeleben, Nathan A. [Los Alamos National Lab. (LANL), Los Alamos, NM (United States)

    2014-07-25

    As supercomputers continue to get faster and more powerful in the future, they will also have more nodes. If nothing is done, then the amount of memory in supercomputer clusters will soon grow large enough that memory failures will be unmanageable to deal with by manually replacing memory DIMMs. "Improving Memory Error Handling Using Linux" is a process oriented method to solve this problem by using the Linux kernel to disable (offline) faulty memory pages containing bad addresses, preventing them from being used again by a process. The process of offlining memory pages simplifies error handling and results in reducing both hardware and manpower costs required to run Los Alamos National Laboratory (LANL) clusters. This process will be necessary for the future of supercomputing to allow the development of exascale computers. It will not be feasible without memory error handling to manually replace the number of DIMMs that will fail daily on a machine consisting of 32-128 petabytes of memory. Testing reveals the process of offlining memory pages works and is relatively simple to use. As more and more testing is conducted, the entire process will be automated within the high-performance computing (HPC) monitoring software, Zenoss, at LANL.

  9. Quantum Error Correction for Quantum Memories

    E-Print Network [OSTI]

    Barbara M. Terhal

    2015-04-10

    Active quantum error correction using qubit stabilizer codes has emerged as a promising, but experimentally challenging, engineering program for building a universal quantum computer. In this review we consider the formalism of qubit stabilizer and subsystem stabilizer codes and their possible use in protecting quantum information in a quantum memory. We review the theory of fault-tolerance and quantum error-correction, discuss examples of various codes and code constructions, the general quantum error correction conditions, the noise threshold, the special role played by Clifford gates and the route towards fault-tolerant universal quantum computation. The second part of the review is focused on providing an overview of quantum error correction using two-dimensional (topological) codes, in particular the surface code architecture. We discuss the complexity of decoding and the notion of passive or self-correcting quantum memories. The review does not focus on a particular technology but discusses topics that will be relevant for various quantum technologies.

  10. Compiler-Assisted Detection of Transient Memory Errors

    SciTech Connect (OSTI)

    Tavarageri, Sanket; Krishnamoorthy, Sriram; Sadayappan, Ponnuswamy

    2014-06-09

    The probability of bit flips in hardware memory systems is projected to increase significantly as memory systems continue to scale in size and complexity. Effective hardware-based error detection and correction requires that the complete data path, involving all parts of the memory system, be protected with sufficient redundancy. First, this may be costly to employ on commodity computing platforms and second, even on high-end systems, protection against multi-bit errors may be lacking. Therefore, augmenting hardware error detection schemes with software techniques is of consider- able interest. In this paper, we consider software-level mechanisms to comprehensively detect transient memory faults. We develop novel compile-time algorithms to instrument application programs with checksum computation codes so as to detect memory errors. Unlike prior approaches that employ checksums on computational and architectural state, our scheme verifies every data access and works by tracking variables as they are produced and consumed. Experimental evaluation demonstrates that the proposed comprehensive error detection solution is viable as a completely software-only scheme. We also demonstrate that with limited hardware support, overheads of error detection can be further reduced.

  11. U-064: Adobe Acrobat/Reader PRC Memory Corruption Error Lets Remote Users Execute Arbitrary Code

    Broader source: Energy.gov [DOE]

    A vulnerability was reported in Adobe Acrobat/Reader, this vulnerability is being actively exploited against Windows-based systems.

  12. V-228: RealPlayer Buffer Overflow and Memory Corruption Error Let Remote

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Delicious Rank EERE: Alternative FuelsofProgram: Report1538-1950 TimelineUtility-Scale Solar through the YearsUsers

  13. Corruption in Developing Countries

    E-Print Network [OSTI]

    Olken, Benjamin A.

    Recent years have seen a remarkable expansion in economists' ability to measure corruption. This in turn has led to a new generation of well-identified, microeconomic studies. We review the evidence on corruption in ...

  14. Effective Cue Utilization Reduces Memory Errors in Older Adults Ayanna K. Thomas and John B. Bulevich

    E-Print Network [OSTI]

    Patel, Aniruddh D.

    Effective Cue Utilization Reduces Memory Errors in Older Adults Ayanna K. Thomas and John B utilization at retrieval. Retention interval and instructions at retrieval were manipulated within at retrieval (i.e., the cue utilization deficit hypothesis). The present study sought to differentiate between

  15. Decay of motor memories in the absence of error Pavan A. Vaswani1 and Reza Shadmehr2

    E-Print Network [OSTI]

    Shadmehr, Reza

    1 Decay of motor memories in the absence of error Pavan A. Vaswani1 and Reza Shadmehr2 1. Department of Neuroscience, 2. Department of Biomedical Engineering Laboratory for Computational Motor@jhmi.edu Running title: Decay of motor memories Keywords: motor control, motor learning, decay, error

  16. Electoral Corruption in Developing Democracies

    E-Print Network [OSTI]

    Cantu, Francisco

    electoral corruption has vanished in Mexico today, or if itMéxico. xv ABSTRACT OF THE DISSERTATION Electoral CorruptionMexico before the electoral reform of 1996 (Preston and Dillon, 2004) and Venezuela in 2004 (Hausmann and Rigobón, 2011), corruption

  17. Register file soft error recovery

    DOE Patents [OSTI]

    Fleischer, Bruce M.; Fox, Thomas W.; Wait, Charles D.; Muff, Adam J.; Watson, III, Alfred T.

    2013-10-15

    Register file soft error recovery including a system that includes a first register file and a second register file that mirrors the first register file. The system also includes an arithmetic pipeline for receiving data read from the first register file, and error detection circuitry to detect whether the data read from the first register file includes corrupted data. The system further includes error recovery circuitry to insert an error recovery instruction into the arithmetic pipeline in response to detecting the corrupted data. The inserted error recovery instruction replaces the corrupted data in the first register file with a copy of the data from the second register file.

  18. Corruption and Sustainable Development

    E-Print Network [OSTI]

    Aidt, Toke S.

    the exploitation of natural resources to corruption is also abundant, ranging from kick-backs associated with logging concessions in Malaysia and Indonesia to oil concessions in Nigeria. (Rose-Ackerman (1999, chapter 3) provides many more examples... . It is used to account for energy depletion, mineral depletion, and net forest depletion by subtracting an estimate of the relevant resource rents from net national savings. These rents are calculated as the market price of the resource minus average...

  19. In-Line-Test of Variability and Bit-Error-Rate of HfOx-Based Resistive Memory

    E-Print Network [OSTI]

    Ji, B L; Ye, Q; Gausepohl, S; Deora, S; Veksler, D; Vivekanand, S; Chong, H; Stamper, H; Burroughs, T; Johnson, C; Smalley, M; Bennett, S; Kaushik, V; Piccirillo, J; Rodgers, M; Passaro, M; Liehr, M

    2015-01-01

    Spatial and temporal variability of HfOx-based resistive random access memory (RRAM) are investigated for manufacturing and product designs. Manufacturing variability is characterized at different levels including lots, wafers, and chips. Bit-error-rate (BER) is proposed as a holistic parameter for the write cycle resistance statistics. Using the electrical in-line-test cycle data, a method is developed to derive BERs as functions of the design margin, to provide guidance for technology evaluation and product design. The proposed BER calculation can also be used in the off-line bench test and build-in-self-test (BIST) for adaptive error correction and for the other types of random access memories.

  20. Accounting for Corruption: Economic Structure, Democratic Norms, and Trade

    E-Print Network [OSTI]

    Sandholtz, Wayne; Koetzle, William

    1998-01-01

    D. 1991. Corruption and Politics in Mexico. Tuscaloosa, AL:corruption in France (Meny 1992), Ghana (Morris 1991) and Mexico (corruption scandals: France, Italy, Japan, Kenya, Mexico,

  1. Corruption, Institutions and Economic Development

    E-Print Network [OSTI]

    Aidt, Toke S.

    involved with these activities, therefore, go a long way to conceal what they do6 and corruption is by its very nature (mostly) unobserved. Researchers must, as a consequence of this, ?nd ingenious ways of measuring it and inferring its consequences from... to the schools after the money had left the treasury, clearly harmed primary education. Subsequent studies from other countries in the region have revealed slightly smaller, but still very substantial, leakages of funds. Given the importance of primary education...

  2. Detecting Silent Data Corruption for Extreme-Scale Applications through Data Mining

    SciTech Connect (OSTI)

    Bautista-Gomez, Leonardo; Cappello, Franck

    2014-01-16

    Supercomputers allow scientists to study natural phenomena by means of computer simulations. Next-generation machines are expected to have more components and, at the same time, consume several times less energy per operation. These trends are pushing supercomputer construction to the limits of miniaturization and energy-saving strategies. Consequently, the number of soft errors is expected to increase dramatically in the coming years. While mechanisms are in place to correct or at least detect some soft errors, a significant percentage of those errors pass unnoticed by the hardware. Such silent errors are extremely damaging because they can make applications silently produce wrong results. In this work we propose a technique that leverages certain properties of high-performance computing applications in order to detect silent errors at the application level. Our technique detects corruption solely based on the behavior of the application datasets and is completely application-agnostic. We propose multiple corruption detectors, and we couple them to work together in a fashion transparent to the user. We demonstrate that this strategy can detect the majority of the corruptions, while incurring negligible overhead. We show that with the help of these detectors, applications can have up to 80% of coverage against data corruption.

  3. Policy on Foreign Corrupt Practices Act

    E-Print Network [OSTI]

    Sridhar, Srinivas

    Policy on Foreign Corrupt Practices Act I. Purpose and Scope The university has developed this policy to comply with requirements of the federal Foreign Corrupt Practices Act. The policy applies to university activities throughout the world. II. Definitions For purposes of this Policy, Anything of Value

  4. Transparency, Sanctioning Capacity, and Corruption Displacement : : Multi-Method Evidence from Local Government in Malawi

    E-Print Network [OSTI]

    Zimmerman, Brigitte

    2014-01-01

    2.4.2 Corruption-Sanction Game Between Official and Cit-Matrix in Corruption-Sanction Game . . . . . . . . . . . .of corruption enough to sanction it. My primary hypothesis

  5. U-002:Adobe Photoshop Elements Multiple Memory Corruption Vulnerabilities

    Broader source: Energy.gov [DOE]

    A remote user can create a file that, when loaded by the target user, will execute arbitrary code on the target user's system.

  6. V-176: Adobe Flash Player Memory Corruption Flaw Lets Remote...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    and earlier versions for Linux Adobe Flash Player 11.1.115.58 and earlier versions for Android 4.x Adobe Flash Player 11.1.111.54 and earlier versions for Android 3.x and 2.x Adobe...

  7. T-627: Adobe Flash Player Memory Corruption | Department of Energy

    Energy Savers [EERE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on QA:QA J-E-1 SECTION J APPENDIX E LIST OF APPLICABLEStatutory Authority SustainXSystem for Award35:Department|27: Adobe

  8. Corrupting Learning: Evidence From Missing Federal Education Funds in Brazil

    E-Print Network [OSTI]

    Ferraz, Claudio; Finan, Frederico; Moreira, Diana B

    2012-01-01

    higher share of their educational resources from FUNDEF. Wethe same amount of educational resources can experience, formismanagement of educational resources. If corruption and

  9. Detecting Silent Data Corruption Using an Auxiliary Method and...

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    our mechanism can be applied to detect silent data corruption. Bio: Hadrien Croubois is a fourth year student at the cole Normale Suprieure de Lyon, France. After completing...

  10. When Crime Pays: Measuring Judicial Efficacy against Corruption in Brazil

    E-Print Network [OSTI]

    Ribeiro de Alencar, Carlos Higino; Gico, Ivo Jr.

    2010-01-01

    for now - crime pays in Brazil. Paginal5de27 ReferencesEfficacy against Corruption in Brazil Carlos Higino Ribeiroa widespread perception in Brazil that civil servants caught

  11. Korean Implementation of the OECD Bribery Convention: Implications for Global Efforts to Fight Corruption

    E-Print Network [OSTI]

    Kim, Jong Bum

    1999-01-01

    degree of corruption in an economy such as Mexico effec-in corruption level from that of Singapore to that of Mexico

  12. Korean Implementation of the OECD Bribery Convention: Implications for Global Efforts to Fight Corruption

    E-Print Network [OSTI]

    Kim, Jong Bum

    1999-01-01

    FOR GLOBAL EFFORTS TO FIGHT CORRUPTION Jong Bum Kim* TableC. Multilateral Efforts to Fight Transnational1999). GLOBAL EFFORTS TO FIGHT CORRUPTION omitting treatment

  13. Causes and Consequences of Corruption Dr. Bonnie Palifka

    E-Print Network [OSTI]

    Post, David M.

    -Ackerman, Susan. 1999. Corruption and Government: Causes, Consequences, and Reform. Cambridge: Cambridge of Economic Issues XLI,4: 1043-1061. How is corruption measured? Assignment: browse the websites of Transparency International (http://www.transparency.org/) and the World Bank (http://www1.worldbank

  14. Rate Regions for Coherent and Noncoherent Multisource Network Error Correction

    E-Print Network [OSTI]

    Ho, Tracey

    ,tho,effros}@caltech.edu Joerg Kliewer New Mexico State University Email: jkliewer@nmsu.edu Elona Erez Yale University Email a single error on a network link may lead to a corruption of many received packets at the destination nodes

  15. Optimal Power Flow: Closing the Loop over Corrupted Data

    E-Print Network [OSTI]

    Johansson, Karl Henrik

    application are the Supervisory Control and Data Acquisition (SCADA) systems. In power networks, the SCADA System. Modern SCADA/EMS systems collect large amounts of measurement data and, using a State Estimator attack. We denote the data corruption by a. cyber attacks on SCADA/EMS systems operating power net- works

  16. Server-Aided Two-Party Computation with Simultaneous Corruption

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    ) for the Sino-Danish Center for the Theory of Interactive Computation and from the Center for Research computationally much more efficient than the heavy public-key machin- ery ones needs for the two-party case. The standard model assumes one adversary who may corrupt one of the clients and some number of servers

  17. Storage Capacity of the Exponential Correlation Associative Memory

    E-Print Network [OSTI]

    Hancock, Edwin

    In this paper we analyze the pattern storage capacity of the exponential correlation asso- ciative memory(ECAM of the ECAM when presented with corrupted input patterns. Our model leads to an expression for the storage capacity of the ECAM both in terms of the length of the bit-patterns and the probabil- ity of bit

  18. Conducting business under the Foreign Corrupt Practices Act

    SciTech Connect (OSTI)

    Ittig, J.

    1982-07-01

    The Foreign Corrupt Practices Act inhibits many businesses conducting international transactions. Although the Senate has proposed revisions to the FCPA to alleviate some of the handicaps of U.S. citizens doing business abroad, the House of Representatives has yet to approve a bill. This study identifies the critical interpretive problems, and suggests protective measures a company can take to avoid problems until the FCPA is amended.

  19. T-545: RealPlayer Heap Corruption Error in 'vidplin.dll' Lets Remote Users

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Delicious Rank EERE:Financing ToolInternational Affairs, Before theFebruary 1,7/109 HistoricalResources |

  20. Mechanical memory

    DOE Patents [OSTI]

    Gilkey, Jeffrey C. (Albuquerque, NM); Duesterhaus, Michelle A. (Albuquerque, NM); Peter, Frank J. (Albuquerque, NM); Renn, Rosemarie A. (Alburquerque, NM); Baker, Michael S. (Albuquerque, NM)

    2006-08-15

    A first-in-first-out (FIFO) microelectromechanical memory apparatus (also termed a mechanical memory) is disclosed. The mechanical memory utilizes a plurality of memory cells, with each memory cell having a beam which can be bowed in either of two directions of curvature to indicate two different logic states for that memory cell. The memory cells can be arranged around a wheel which operates as a clocking actuator to serially shift data from one memory cell to the next. The mechanical memory can be formed using conventional surface micromachining, and can be formed as either a nonvolatile memory or as a volatile memory.

  1. Mechanical memory

    DOE Patents [OSTI]

    Gilkey, Jeffrey C. (Albuquerque, NM); Duesterhaus, Michelle A. (Albuquerque, NM); Peter, Frank J. (Albuquerque, NM); Renn, Rosemarie A. (Albuquerque, NM); Baker, Michael S. (Albuquerque, NM)

    2006-05-16

    A first-in-first-out (FIFO) microelectromechanical memory apparatus (also termed a mechanical memory) is disclosed. The mechanical memory utilizes a plurality of memory cells, with each memory cell having a beam which can be bowed in either of two directions of curvature to indicate two different logic states for that memory cell. The memory cells can be arranged around a wheel which operates as a clocking actuator to serially shift data from one memory cell to the next. The mechanical memory can be formed using conventional surface micromachining, and can be formed as either a nonvolatile memory or as a volatile memory.

  2. The pros and cons of corruption of firm performance : a micro-level study of businesses in Indonesia

    E-Print Network [OSTI]

    Murdaya, Karuna

    2005-01-01

    Over the past 10 years, different international organization and NGO's have given birth to a whole host of different anti corruption programs in response to the recent "endemic" of corruption which is seen to plague ...

  3. Cultural attitudes to corruption : a perspective on the interplay between cultural and legal norms for Western businesses operating in China

    E-Print Network [OSTI]

    Winters, Timothy (Timothy Mark)

    2013-01-01

    Corruption is an important challenge facing those who wish to do business in China. Beyond the commercial context, corruption and attitudes towards it are also more broadly relevant to politics, political economics and ...

  4. Corruption of Pulsed Electric Thruster Voltage Fluctuation Measurements by Transmission Line

    E-Print Network [OSTI]

    Choueiri, Edgar

    Corruption of Pulsed Electric Thruster Voltage Fluctuation Measurements by Transmission Line to transmission line corruption--as an experimental example of the extent to which the power transmission line can termination resistance s Laplace variable V (t) transmission line driving signal Vn Laplace transform

  5. Essays on Labor Supply and Family Risk Sharing, & Understanding Corruption in Developing Countries

    E-Print Network [OSTI]

    Beylis, Guillermo Raul

    2013-01-01

    being audited before the Lula’s anti-corruption program waspolicy implemented by Lula’s government. In this simulation,the probability before the Lula’s program, to 17%, which is

  6. U-166: Adobe Shockwave Player Memory Corruption Flaws Let Remote Users Execute Arbitrary Code

    Broader source: Energy.gov [DOE]

    Multiple vulnerabilities were reported in Adobe Shockwave Player. A remote user can cause arbitrary code to be executed on the target user's system.

  7. T-569: Adobe Flash SWF File Processing Memory Corruption Remote Code Execution Vulnerability

    Broader source: Energy.gov [DOE]

    Critical vulnerabilities have been identified in Adobe Flash Player 10.1.102.64 and earlier versions for Windows, Macintosh, Linux, and Solaris. These vulnerabilities could cause the application to crash and could potentially allow an attacker to take control of the affected system.

  8. V-176: Adobe Flash Player Memory Corruption Flaw Lets Remote Users Execute

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity of Natural GasAdjustmentsShirleyEnergyThe U.S.Lacledeutilities. The Economics ofConduct Cross-Site ScriptingDepartment

  9. Impact of Disk Corruption on OpenSource DBMS Sriram Subramanian, Yupu Zhang, Rajiv Vaidyanathan, Haryadi S. Gunawi,

    E-Print Network [OSTI]

    Swift, Michael

    Impact of Disk Corruption on Open­Source DBMS Sriram Subramanian, Yupu Zhang, Rajiv Vaidyanathan of Computer Science University of Wisconsin, Madison {srirams

  10. Low-voltage, low-power, low switching error, class-AB switched current

    E-Print Network [OSTI]

    Serdijn, Wouter A.

    Low-voltage, low-power, low switching error, class-AB switched current memory cell C. Sawigun and W into two components by a low-voltage class-AB current splitter and subsequently processes the individual signals by two low switching error class-A memory cells. As a conse- quence, the output current obtained

  11. Passive Corruption in Statistical Multi-Party Computation Martin Hirt1, Christoph Lucas1, Ueli Maurer1, and Dominik Raub2

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    Passive Corruption in Statistical Multi-Party Computation Martin Hirt1, Christoph Lucas1, Ueli, secrecy, robustness, and fairness. Corruptions can be either passive or active: A pas- sively corrupted passively. In this work, we consider the statistical setting with mixed adversaries and study the exact con

  12. Passive Corruption in Statistical MultiParty Computation # Martin Hirt 1 , Christoph Lucas 1 , Ueli Maurer 1 , and Dominik Raub 2

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    Passive Corruption in Statistical Multi­Party Computation # Martin Hirt 1 , Christoph Lucas 1, secrecy, robustness, and fairness. Corruptions can be either passive or active: A pas­ sively corrupted passively. In this work, we consider the statistical setting with mixed adversaries and study the exact con

  13. Many countries around the world are wounded with conflict, poverty, and political corruption, pushing disease prevention aside for more

    E-Print Network [OSTI]

    Rock, Chris

    Many countries around the world are wounded with conflict, poverty, and political corruption. Africa, southern Europe, southern Mexico, South America, and Asia are all faced with the devastating toll

  14. [ME]morial

    E-Print Network [OSTI]

    Lee, Beomki

    2015-01-01

    Challenging an archetypal relationship between collective memory and a multitude of traditional memorials, "[ME]morial" presents a new concept in memorial architecture based on the reinterpretation of Freud's and Bergson's ...

  15. Monte Carlo errors with less errors

    E-Print Network [OSTI]

    Ulli Wolff

    2006-11-29

    We explain in detail how to estimate mean values and assess statistical errors for arbitrary functions of elementary observables in Monte Carlo simulations. The method is to estimate and sum the relevant autocorrelation functions, which is argued to produce more certain error estimates than binning techniques and hence to help toward a better exploitation of expensive simulations. An effective integrated autocorrelation time is computed which is suitable to benchmark efficiencies of simulation algorithms with regard to specific observables of interest. A Matlab code is offered for download that implements the method. It can also combine independent runs (replica) allowing to judge their consistency.

  16. Error detection method

    DOE Patents [OSTI]

    Olson, Eric J.

    2013-06-11

    An apparatus, program product, and method that run an algorithm on a hardware based processor, generate a hardware error as a result of running the algorithm, generate an algorithm output for the algorithm, compare the algorithm output to another output for the algorithm, and detect the hardware error from the comparison. The algorithm is designed to cause the hardware based processor to heat to a degree that increases the likelihood of hardware errors to manifest, and the hardware error is observable in the algorithm output. As such, electronic components may be sufficiently heated and/or sufficiently stressed to create better conditions for generating hardware errors, and the output of the algorithm may be compared at the end of the run to detect a hardware error that occurred anywhere during the run that may otherwise not be detected by traditional methodologies (e.g., due to cooling, insufficient heat and/or stress, etc.).

  17. Memory Considerations

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity ofkandz-cm11 Outreach Home Room NewsInformationJesse BergkampCentermillion MeasurementMemorandum ofMemory Considerations Memory

  18. Memory Considerations

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity ofkandz-cm11 Outreach Home Room NewsInformationJesse BergkampCentermillion MeasurementMemorandum ofMemory ConsiderationsMemory

  19. Ritz-Volterra Reconstructions and A Posteriori Error Analysis of Finite Element Method for Parabolic

    E-Print Network [OSTI]

    Ewing, Richard E.

    conduction in material with memory [10], the compression of poro-viscoelasticity media [11], nuclear reactor meshing procedures de- signed to control and minimize the error. Over the last two decades, a posteriori

  20. A Case for Soft Error Detection and Correction in Computational Chemistry

    SciTech Connect (OSTI)

    van Dam, Hubertus JJ; Vishnu, Abhinav; De Jong, Wibe A.

    2013-09-10

    High performance computing platforms are expected to deliver 10(18) floating operations per second by the year 2022 through the deployment of millions of cores. Even if every core is highly reliable the sheer number of the them will mean that the mean time between failures will become so short that most applications runs will suffer at least one fault. In particular soft errors caused by intermittent incorrect behavior of the hardware are a concern as they lead to silent data corruption. In this paper we investigate the impact of soft errors on optimization algorithms using Hartree-Fock as a particular example. Optimization algorithms iteratively reduce the error in the initial guess to reach the intended solution. Therefore they may intuitively appear to be resilient to soft errors. Our results show that this is true for soft errors of small magnitudes but not for large errors. We suggest error detection and correction mechanisms for different classes of data structures. The results obtained with these mechanisms indicate that we can correct more than 95% of the soft errors at moderate increases in the computational cost.

  1. QUANTUM ERROR Osbert Bastani

    E-Print Network [OSTI]

    Reversible (unitary) Ancillary qbits Controlled gates (cX, cZ) #12;Measurement Deterministic Duplication;Decoding use ancillary bits to determine what error occurred #12;Decoding use ancillary bits to determine what error occurred set to 0 if first two bits equal, set to 1 if not #12;Decoding use ancillary bits

  2. Grid-scale Fluctuations and Forecast Error in Wind Power

    E-Print Network [OSTI]

    G. Bel; C. P. Connaughton; M. Toots; M. M. Bandi

    2015-03-29

    The fluctuations in wind power entering an electrical grid (Irish grid) were analyzed and found to exhibit correlated fluctuations with a self-similar structure, a signature of large-scale correlations in atmospheric turbulence. The statistical structure of temporal correlations for fluctuations in generated and forecast time series was used to quantify two types of forecast error: a timescale error ($e_{\\tau}$) that quantifies the deviations between the high frequency components of the forecast and the generated time series, and a scaling error ($e_{\\zeta}$) that quantifies the degree to which the models fail to predict temporal correlations in the fluctuations of the generated power. With no $a$ $priori$ knowledge of the forecast models, we suggest a simple memory kernel that reduces both the timescale error ($e_{\\tau}$) and the scaling error ($e_{\\zeta}$).

  3. Grid-scale Fluctuations and Forecast Error in Wind Power

    E-Print Network [OSTI]

    Bel, G; Toots, M; Bandi, M M

    2015-01-01

    The fluctuations in wind power entering an electrical grid (Irish grid) were analyzed and found to exhibit correlated fluctuations with a self-similar structure, a signature of large-scale correlations in atmospheric turbulence. The statistical structure of temporal correlations for fluctuations in generated and forecast time series was used to quantify two types of forecast error: a timescale error ($e_{\\tau}$) that quantifies the deviations between the high frequency components of the forecast and the generated time series, and a scaling error ($e_{\\zeta}$) that quantifies the degree to which the models fail to predict temporal correlations in the fluctuations of the generated power. With no $a$ $priori$ knowledge of the forecast models, we suggest a simple memory kernel that reduces both the timescale error ($e_{\\tau}$) and the scaling error ($e_{\\zeta}$).

  4. Thermodynamics of error correction

    E-Print Network [OSTI]

    Pablo Sartori; Simone Pigolotti

    2015-04-24

    Information processing at the molecular scale is limited by thermal fluctuations. This can cause undesired consequences in copying information since thermal noise can lead to errors that can compromise the functionality of the copy. For example, a high error rate during DNA duplication can lead to cell death. Given the importance of accurate copying at the molecular scale, it is fundamental to understand its thermodynamic features. In this paper, we derive a universal expression for the copy error as a function of entropy production and dissipated work of the process. Its derivation is based on the second law of thermodynamics, hence its validity is independent of the details of the molecular machinery, be it any polymerase or artificial copying device. Using this expression, we find that information can be copied in three different regimes. In two of them, work is dissipated to either increase or decrease the error. In the third regime, the protocol extracts work while correcting errors, reminiscent of a Maxwell demon. As a case study, we apply our framework to study a copy protocol assisted by kinetic proofreading, and show that it can operate in any of these three regimes. We finally show that, for any effective proofreading scheme, error reduction is limited by the chemical driving of the proofreading reaction.

  5. Lifetime of topological quantum memories in thermal environment

    E-Print Network [OSTI]

    Abbas Al-Shimary; James R. Wootton; Jiannis K. Pachos

    2012-09-13

    Here we investigate the effect lattice geometry has on the lifetime of two-dimensional topological quantum memories. Initially, we introduce various lattice patterns and show how the error-tolerance against bit-flips and phase-flips depends on the structure of the underlying lattice. Subsequently, we investigate the dependence of the lifetime of the quantum memory on the structure of the underlying lattice when it is subject to a finite temperature. Importantly, we provide a simple effective formula for the lifetime of the memory in terms of the average degree of the lattice. Finally, we propose optimal geometries for the Josephson junction implementation of topological quantum memories.

  6. Memory Considerations

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity ofkandz-cm11 Outreach Home Room NewsInformationJesse BergkampCentermillion MeasurementMemorandum ofMemory Considerations

  7. Memory Considerations

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity ofkandz-cm11 Outreach Home Room NewsInformationJesse BergkampCentermillion MeasurementMemorandum ofMemory

  8. Coding Techniques for Error Correction and Rewriting in Flash Memories 

    E-Print Network [OSTI]

    Mohammed, Shoeb Ahmed

    2010-10-12

    such combinations and obtains the values of |C1| and |C2|, by which we get |C|. Algorithm 8 has time complexity O((n? 1)!). . 11 Algorithm 8 Compute code size 1: n? number of cells, |C1| ? 0, |C2| ? 0 2: for (x1, x2, . . . , xn?2) ? {0, 1} ? {0, 1, 2... how to compute v?i and s?i+1. To compute v?i, if s?i = 0, we let Bi be the codeword in code C1 whose Kendall tau distance to A?i is the smallest. (Bi can be found through exhaustive search, where we gradually increase the Kendall tau distance. Since...

  9. Quantum error control codes 

    E-Print Network [OSTI]

    Abdelhamid Awad Aly Ahmed, Sala

    2008-10-10

    by SALAH ABDELHAMID AWAD ALY AHMED Submitted to the O–ce of Graduate Studies of Texas A&M University in partial fulflllment of the requirements for the degree of DOCTOR OF PHILOSOPHY May 2008 Major Subject: Computer Science QUANTUM ERROR CONTROL CODES A... Members, Mahmoud M. El-Halwagi Anxiao (Andrew) Jiang Rabi N. Mahapatra Head of Department, Valerie Taylor May 2008 Major Subject: Computer Science iii ABSTRACT Quantum Error Control Codes. (May 2008) Salah Abdelhamid Awad Aly Ahmed, B.Sc., Mansoura...

  10. Optical memory

    DOE Patents [OSTI]

    Mao, Samuel S; Zhang, Yanfeng

    2013-07-02

    Optical memory comprising: a semiconductor wire, a first electrode, a second electrode, a light source, a means for producing a first voltage at the first electrode, a means for producing a second voltage at the second electrode, and a means for determining the presence of an electrical voltage across the first electrode and the second electrode exceeding a predefined voltage. The first voltage, preferably less than 0 volts, different from said second voltage. The semiconductor wire is optically transparent and has a bandgap less than the energy produced by the light source. The light source is optically connected to the semiconductor wire. The first electrode and the second electrode are electrically insulated from each other and said semiconductor wire.

  11. Methods and apparatus using commutative error detection values for fault isolation in multiple node computers

    DOE Patents [OSTI]

    Almasi, Gheorghe (Ardsley, NY) [Ardsley, NY; Blumrich, Matthias Augustin (Ridgefield, CT) [Ridgefield, CT; Chen, Dong (Croton-On-Hudson, NY) [Croton-On-Hudson, NY; Coteus, Paul (Yorktown, NY) [Yorktown, NY; Gara, Alan (Mount Kisco, NY) [Mount Kisco, NY; Giampapa, Mark E. (Irvington, NY) [Irvington, NY; Heidelberger, Philip (Cortlandt Manor, NY) [Cortlandt Manor, NY; Hoenicke, Dirk I. (Ossining, NY) [Ossining, NY; Singh, Sarabjeet (Mississauga, CA) [Mississauga, CA; Steinmacher-Burow, Burkhard D. (Wernau, DE) [Wernau, DE; Takken, Todd (Brewster, NY) [Brewster, NY; Vranas, Pavlos (Bedford Hills, NY) [Bedford Hills, NY

    2008-06-03

    Methods and apparatus perform fault isolation in multiple node computing systems using commutative error detection values for--example, checksums--to identify and to isolate faulty nodes. When information associated with a reproducible portion of a computer program is injected into a network by a node, a commutative error detection value is calculated. At intervals, node fault detection apparatus associated with the multiple node computer system retrieve commutative error detection values associated with the node and stores them in memory. When the computer program is executed again by the multiple node computer system, new commutative error detection values are created and stored in memory. The node fault detection apparatus identifies faulty nodes by comparing commutative error detection values associated with reproducible portions of the application program generated by a particular node from different runs of the application program. Differences in values indicate a possible faulty node.

  12. Error Dynamics: The Dynamic Emergence of Error Avoidance and

    E-Print Network [OSTI]

    Bickhard, Mark H.

    . Standard such notions are, however, arguably limited and bad notions, being based on untenable models of learning about error and of handling error knowledge constitute a complex major theme in evolution VICARIANTS Avoiding Error. The central theme is a progressive elaboration of kinds of dynamics that manage

  13. An Investigation of word encoding strategy and verbal short-term memory in dyslexic children 

    E-Print Network [OSTI]

    Timmins, Louisa

    2006-01-01

    The main objective of this study was to investigate the effect of verbal short term memory and encoding strategies in dyslexics. The first main aim was to investigate whether or not dyslexics made more errors with pairs ...

  14. Memory abstractions for parallel programming

    E-Print Network [OSTI]

    Lee, I-Ting Angelina

    2012-01-01

    A memory abstraction is an abstraction layer between the program execution and the memory that provides a different "view" of a memory location depending on the execution context in which the memory access is made. Properly ...

  15. Using on-package memory

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    3D stacked memory interposed between the KNL chip and the slower off-package DDR memory. Compared to the on-node DDR4 memory, the high-bandwidth memory (HBM) has...

  16. Drifting absence :: drafting memory

    E-Print Network [OSTI]

    Kuhn, Marlene Eva

    2006-01-01

    The emotive power of a memorial derives from its ability to engage the viewer in active remembrance. The project considers the limitations of a monumentality which embraces a distinct division between viewer and memorial. ...

  17. Characterizing Application Memory Error Vulnerability to Optimize Datacenter Cost via Heterogeneous-Reliability Memory

    E-Print Network [OSTI]

    components of the total cost of ownership (TCO) of a datacenter [1]: (1) capital costs (those associated- cent studies have shown that capital costs can account for the majority (e.g., around 57% in [1 cooling and power supply techniques. Of the dominant component of datacenter TCO (capital costs associated

  18. Memory Module-level Testing and Error Behaviors for Phase Change Memory

    E-Print Network [OSTI]

    Minnesota, University of

    of Minnesota, Minneapolis, MN, 55455 Department of Electrical and Computer Engineering, Virginia Commonwealth

  19. RON MINER MEMORIAL BIOENGINEERING SCHOLARSHIP The Ron Miner Memorial Scholarship honors the memory of J. Ronald Miner, an

    E-Print Network [OSTI]

    Tullos, Desiree

    RON MINER MEMORIAL BIOENGINEERING SCHOLARSHIP The Ron Miner Memorial Scholarship honors the memory & Ecological Engineering. DONOR Ron Miner Memorial Bioengineering Scholarship Fund ELIGIBILITY REQUIREMENTS

  20. March 29, 2008 Operating Systems: Main Memory 1 Main Memory

    E-Print Network [OSTI]

    Adam, Salah

    March 29, 2008 Operating Systems: Main Memory 1 Main Memory Chapter 8 #12;March 29, 2008 Operating Systems: Main Memory 2 Chapter Outline Background Contiguous Memory Allocation Paging Structure of the Page Table Segmentation #12;March 29, 2008 Operating Systems: Main Memory 3 Objectives To provide

  1. Learning, Memory, and the Role of Neural Network Architecture

    E-Print Network [OSTI]

    Carlson, Jean

    Learning, Memory, and the Role of Neural Network Architecture Ann M. Hermundstad*, Kevin S. Brown architecture. In this study, we compare the performance of parallel and layered network architectures during to complexity in network architecture by characterizing local error landscape curvature. We find that variations

  2. Validating SystemLevel Error Recovery for Spacecraft Robyn R. Lutz \\Lambda

    E-Print Network [OSTI]

    Lutz, Robyn R.

    executions of the error­ recovery software with the software that controls the science and engineering events these intercommand constraints. A failure to do so can jeopardize the collection of scientific data, a spacecraft the ground and stored in the spacecraft's temporary memory until the time comes for each command

  3. DRAM Errors in the Wild: A Large-Scale Field Study Bianca Schroeder

    E-Print Network [OSTI]

    Toronto, University of

    University of Toronto Toronto, Canada bianca@cs.toronto.edu Eduardo Pinheiro Google Inc. Mountain View, CA Wolf-Dietrich Weber Google Inc. Mountain View, CA ABSTRACT Errors in dynamic random access memory (DRAM that copies are not made or distributed for profit or commercial advantage and that copies bear this notice

  4. Temporal Memoization for Energy-Efficient Timing Error Recovery in GPGPUs

    E-Print Network [OSTI]

    Gupta, Rajesh

    commonly use conservative guardbands for the operating frequency or voltage to ensure error-free operation therefore enables reduction of the minimum operating voltage [7]. Similarly, in non-volatile memory area%­4%) and outperforms recent advances in resilient architectures. This technique also enhances robustness in the voltage

  5. [MRO] Oligocrystalline Shape Memory Alloys

    E-Print Network [OSTI]

    Chen, Ying

    Copper-based shape memory alloys (SMAs) exhibit excellent shape memory properties in single crystalline form. However, when they are polycrystalline, their shape memory properties are severely compromised by brittle fracture ...

  6. Photometric Redshifts and Photometry Errors

    E-Print Network [OSTI]

    D. Wittman; P. Riechers; V. E. Margoniner

    2007-09-21

    We examine the impact of non-Gaussian photometry errors on photometric redshift performance. We find that they greatly increase the scatter, but this can be mitigated to some extent by incorporating the correct noise model into the photometric redshift estimation process. However, the remaining scatter is still equivalent to that of a much shallower survey with Gaussian photometry errors. We also estimate the impact of non-Gaussian errors on the spectroscopic sample size required to verify the photometric redshift rms scatter to a given precision. Even with Gaussian {\\it photometry} errors, photometric redshift errors are sufficiently non-Gaussian to require an order of magnitude larger sample than simple Gaussian statistics would indicate. The requirements increase from this baseline if non-Gaussian photometry errors are included. Again the impact can be mitigated by incorporating the correct noise model, but only to the equivalent of a survey with much larger Gaussian photometry errors. However, these requirements may well be overestimates because they are based on a need to know the rms, which is particularly sensitive to tails. Other parametrizations of the distribution may require smaller samples.

  7. Computer memory management system

    DOE Patents [OSTI]

    Kirk, III, Whitson John (Greenwood, MO)

    2002-01-01

    A computer memory management system utilizing a memory structure system of "intelligent" pointers in which information related to the use status of the memory structure is designed into the pointer. Through this pointer system, The present invention provides essentially automatic memory management (often referred to as garbage collection) by allowing relationships between objects to have definite memory management behavior by use of coding protocol which describes when relationships should be maintained and when the relationships should be broken. In one aspect, the present invention system allows automatic breaking of strong links to facilitate object garbage collection, coupled with relationship adjectives which define deletion of associated objects. In another aspect, The present invention includes simple-to-use infinite undo/redo functionality in that it has the capability, through a simple function call, to undo all of the changes made to a data model since the previous `valid state` was noted.

  8. Error correcting code with chip kill capability and power saving enhancement

    DOE Patents [OSTI]

    Gara, Alan G. (Mount Kisco, NY); Chen, Dong (Croton On Husdon, NY); Coteus, Paul W. (Yorktown Heights, NY); Flynn, William T. (Rochester, MN); Marcella, James A. (Rochester, MN); Takken, Todd (Brewster, NY); Trager, Barry M. (Yorktown Heights, NY); Winograd, Shmuel (Scarsdale, NY)

    2011-08-30

    A method and system are disclosed for detecting memory chip failure in a computer memory system. The method comprises the steps of accessing user data from a set of user data chips, and testing the user data for errors using data from a set of system data chips. This testing is done by generating a sequence of check symbols from the user data, grouping the user data into a sequence of data symbols, and computing a specified sequence of syndromes. If all the syndromes are zero, the user data has no errors. If one of the syndromes is non-zero, then a set of discriminator expressions are computed, and used to determine whether a single or double symbol error has occurred. In the preferred embodiment, less than two full system data chips are used for testing and correcting the user data.

  9. DATA COMPRESSION USING WAVELETS: ERROR ...

    E-Print Network [OSTI]

    1910-90-11

    algorithms that introduce differences between the original and compressed data in ... to choose an error metric that parallels the human visual system, so that image .... signal data along a communications channel, one sends integer codes that ...

  10. The Challenge of Quantum Error Correction.

    E-Print Network [OSTI]

    Fominov, Yakov

    in the design of physical bits. #12;What we need Hardware requirements: 1. Many 103-104 / R individual bits (R flip classical error b. Phase error 0exp( ( ) )z i E t dt = - Fluctuates 1. Need hardware error #12;Classical error correction by the software and hardware. , / 2 0 Hardware error correction: Ising

  11. Unequal error protection of subband coded bits 

    E-Print Network [OSTI]

    Devalla, Badarinath

    1994-01-01

    Source coded data can be separated into different classes based on their susceptibility to channel errors. Errors in the Important bits cause greater distortion in the reconstructed signal. This thesis presents an Unequal Error Protection scheme...

  12. Communication error detection using facial expressions

    E-Print Network [OSTI]

    Wang, Sy Bor, 1976-

    2008-01-01

    Automatic detection of communication errors in conversational systems typically rely only on acoustic cues. However, perceptual studies have indicated that speakers do exhibit visual communication error cues passively ...

  13. Warship : memorial in antithesis

    E-Print Network [OSTI]

    Tchelistcheff, Andre Victor

    1992-01-01

    This thesis is divided into three distinct yet related parts. The first consists of observations and reflections on some of New York City's many war memorials, ranging from one commemorating the Revolutionary War to one ...

  14. Schema and memory consolidation 

    E-Print Network [OSTI]

    Tse, Dorothy

    2011-06-27

    The traditional view of systems memory consolidation is that it is a gradual process that takes place over days or weeks. Within this approach, the hippocampus (HPC) is thought to be involved in the rapid encoding of ...

  15. Hardware Transactional Memory

    E-Print Network [OSTI]

    Lie, Sean

    This work shows how hardware transactional memory (HTM) can be implemented to support transactions of arbitrarily large size, while ensuring that small transactions run efficiently. Our implementation handles small ...

  16. Performance and Error Analysis of Knill's Postselection Scheme in a Two-Dimensional Architecture

    E-Print Network [OSTI]

    Ching-Yi Lai; Gerardo Paz; Martin Suchara; Todd A. Brun

    2013-05-31

    Knill demonstrated a fault-tolerant quantum computation scheme based on concatenated error-detecting codes and postselection with a simulated error threshold of 3% over the depolarizing channel. %We design a two-dimensional architecture for fault-tolerant quantum computation based on Knill's postselection scheme. We show how to use Knill's postselection scheme in a practical two-dimensional quantum architecture that we designed with the goal to optimize the error correction properties, while satisfying important architectural constraints. In our 2D architecture, one logical qubit is embedded in a tile consisting of $5\\times 5$ physical qubits. The movement of these qubits is modeled as noisy SWAP gates and the only physical operations that are allowed are local one- and two-qubit gates. We evaluate the practical properties of our design, such as its error threshold, and compare it to the concatenated Bacon-Shor code and the concatenated Steane code. Assuming that all gates have the same error rates, we obtain a threshold of $3.06\\times 10^{-4}$ in a local adversarial stochastic noise model, which is the highest known error threshold for concatenated codes in 2D. We also present a Monte Carlo simulation of the 2D architecture with depolarizing noise and we calculate a pseudo-threshold of about 0.1%. With memory error rates one-tenth of the worst gate error rates, the threshold for the adversarial noise model, and the pseudo-threshold over depolarizing noise, are $4.06\\times 10^{-4}$ and 0.2%, respectively. In a hypothetical technology where memory error rates are negligible, these thresholds can be further increased by shrinking the tiles into a $4\\times 4$ layout.

  17. The image cannot be displayed. Your computer may not have enough memory to open the image, or the image may have been corrupted.

    E-Print Network [OSTI]

    Crawford, T. Daniel

    -croatia.ppt #12;The Energy implica8ons of increasing prosperity 40% of the world/day will take 34 years to generate 12,5 TW!! EIA Intl Energy Outlook 2004 http World Energy Demand total industrial developing US ee/fsu Hoffert et al Nature 395, 883,1998; msd-energy

  18. ERROR ANALYSIS OF COMPOSITE SHOCK INTERACTION PROBLEMS.

    SciTech Connect (OSTI)

    LEE,T.MU,Y.ZHAO,M.GLIMM,J.LI,X.YE,K.

    2004-07-26

    We propose statistical models of uncertainty and error in numerical solutions. To represent errors efficiently in shock physics simulations we propose a composition law. The law allows us to estimate errors in the solutions of composite problems in terms of the errors from simpler ones as discussed in a previous paper. In this paper, we conduct a detailed analysis of the errors. One of our goals is to understand the relative magnitude of the input uncertainty vs. the errors created within the numerical solution. In more detail, we wish to understand the contribution of each wave interaction to the errors observed at the end of the simulation.

  19. An analog memory using a CCD memory cell 

    E-Print Network [OSTI]

    Murray, James Ray

    1983-01-01

    23 26 29 E. Digital-to-Analog Converter F. Analog-to-Digital Converter G. Operation CHAPTER IV. ANALYSIS OF THE CIRCUIT A. Testing of Major Components B. Performance of the Memory C. Comparison with Digital Memories D. Proposed Modifications... of Memory Cell 24. Four Interconnected Memory Cells 25. Four-to-Sixteen Converter 26. Column Address Decoding Circuit. 27. Row Address Decoding Circuit 28. Digital-to-Analog Converter 29. Comparator Circuit Diagram . 30. DC Transfer Function...

  20. Runtime Detection of C-Style Errors in UPC Code

    SciTech Connect (OSTI)

    Pirkelbauer, P; Liao, C; Panas, T; Quinlan, D

    2011-09-29

    Unified Parallel C (UPC) extends the C programming language (ISO C 99) with explicit parallel programming support for the partitioned global address space (PGAS), which provides a global memory space with localized partitions to each thread. Like its ancestor C, UPC is a low-level language that emphasizes code efficiency over safety. The absence of dynamic (and static) safety checks allows programmer oversights and software flaws that can be hard to spot. In this paper, we present an extension of a dynamic analysis tool, ROSE-Code Instrumentation and Runtime Monitor (ROSECIRM), for UPC to help programmers find C-style errors involving the global address space. Built on top of the ROSE source-to-source compiler infrastructure, the tool instruments source files with code that monitors operations and keeps track of changes to the system state. The resulting code is linked to a runtime monitor that observes the program execution and finds software defects. We describe the extensions to ROSE-CIRM that were necessary to support UPC. We discuss complications that arise from parallel code and our solutions. We test ROSE-CIRM against a runtime error detection test suite, and present performance results obtained from running error-free codes. ROSE-CIRM is released as part of the ROSE compiler under a BSD-style open source license.

  1. Using on-package memory

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    memory Introduction The NERSC-8 system will include a novel feature on its node architecture: 16 GB of high-bandwidth 3D stacked memory interposed between the KNL chip and the...

  2. Shape memory polymer medical device

    DOE Patents [OSTI]

    Maitland, Duncan (Pleasant Hill, CA); Benett, William J. (Livermore, CA); Bearinger, Jane P. (Livermore, CA); Wilson, Thomas S. (San Leandro, CA); Small, IV, Ward (Livermore, CA); Schumann, Daniel L. (Concord, CA); Jensen, Wayne A. (Livermore, CA); Ortega, Jason M. (Pacifica, CA); Marion, III, John E. (Livermore, CA); Loge, Jeffrey M. (Stockton, CA)

    2010-06-29

    A system for removing matter from a conduit. The system includes the steps of passing a transport vehicle and a shape memory polymer material through the conduit, transmitting energy to the shape memory polymer material for moving the shape memory polymer material from a first shape to a second and different shape, and withdrawing the transport vehicle and the shape memory polymer material through the conduit carrying the matter.

  3. Kernel Regression in the Presence of Correlated Errors Kernel Regression in the Presence of Correlated Errors

    E-Print Network [OSTI]

    Kernel Regression in the Presence of Correlated Errors Kernel Regression in the Presence in nonparametric regression is difficult in the presence of correlated errors. There exist a wide variety vector machines for regression. Keywords: nonparametric regression, correlated errors, bandwidth choice

  4. HOW MUCH MEMORY RADIATION PROTECTION DO ONBOARD MACHINE LEARNING ALGORITHMS REQUIRE?

    E-Print Network [OSTI]

    data sets in a low-Earth orbit radi- ation environment, commercial RAM would suffice; no radiation is an open area of research. Key words: radiation, onboard data analysis. 1. INTRODUCTION Space missions of computational power, available memory, storage space, and high doses of radiation. Radiation causes errors

  5. Exploring DRAM Organizations for Energy-Efficient and Resilient Exascale Memories

    E-Print Network [OSTI]

    Kambhampati, Subbarao

    Exploring DRAM Organizations for Energy-Efficient and Resilient Exascale Memories Bharan Giridhar reliability and energy is a co-optimization problem involving tradeoffs between error correction cost, access energy and refresh power--reducing the physical page size to decrease access energy increases the energy

  6. USIMM: the Utah SImulated Memory Module A Simulation Infrastructure for the JWAC Memory

    E-Print Network [OSTI]

    Balasubramonian, Rajeev

    memory controllers and four DDR3 memory channels [19, 31]. While other memory channel and memory for DDR3 channels and DIMMs. 1 #12;A modern DDR3 channel typically has a 64-bit data bus and a 23-bit

  7. The memory glasses : wearable computing for just-in-time memory support

    E-Print Network [OSTI]

    DeVaul, Richard W. (Richard Wayne), 1971-

    2004-01-01

    This thesis documents a body of wearable computing research surrounding the development of the Memory Glasses, a new type of proactive memory support technology. The Memory Glasses combines features of existing memory ...

  8. TED KYCIA MEMORIAL SYMPOSIUM.

    SciTech Connect (OSTI)

    LITTENBERG, L.; RUBINSTEIN, R.; SAMIOS, N.; LI, K.; GIACOMELLI, G.; MOCKETT, P.; CARROLL, A.; JOHNSON, R.; BRYMAN, D.; TIPPENS, B.

    2000-05-19

    On the afternoon of May 19 2000, a Memorial Seminar was held in the BNL physics Large Seminar Room to honor the memory of Ted Kyeia, a prominent particle physicist who had been a member of the BNL staff for 40 years. Although it was understandably a somewhat sad occasion because Ted was no longer with us, nevertheless there was much for his colleagues and friends to celebrate in recalling the outstanding contributions that he had made in those four decades. The Seminar speakers were all people who had worked with Ted during that period; each discussed one aspect of his career, but also included anecdotes and personal reminiscences. This booklet contains the Seminar program, listing the speakers, and also copies of transparencies of the talks (and one paper which was a later expansion of a talk); sadly, not all of the personal remarks appeared on the transparencies.

  9. Shape memory alloy actuator

    DOE Patents [OSTI]

    Varma, Venugopal K. (Knoxville, TN)

    2001-01-01

    An actuator for cycling between first and second positions includes a first shaped memory alloy (SMA) leg, a second SMA leg. At least one heating/cooling device is thermally connected to at least one of the legs, each heating/cooling device capable of simultaneously heating one leg while cooling the other leg. The heating/cooling devices can include thermoelectric and/or thermoionic elements.

  10. Approximate error conjugation gradient minimization methods

    DOE Patents [OSTI]

    Kallman, Jeffrey S

    2013-05-21

    In one embodiment, a method includes selecting a subset of rays from a set of all rays to use in an error calculation for a constrained conjugate gradient minimization problem, calculating an approximate error using the subset of rays, and calculating a minimum in a conjugate gradient direction based on the approximate error. In another embodiment, a system includes a processor for executing logic, logic for selecting a subset of rays from a set of all rays to use in an error calculation for a constrained conjugate gradient minimization problem, logic for calculating an approximate error using the subset of rays, and logic for calculating a minimum in a conjugate gradient direction based on the approximate error. In other embodiments, computer program products, methods, and systems are described capable of using approximate error in constrained conjugate gradient minimization problems.

  11. Memory effects in quantum channel discrimination

    E-Print Network [OSTI]

    Giulio Chiribella; Giacomo M. D'Ariano; Paolo Perinotti

    2008-04-02

    We consider quantum-memory assisted protocols for discriminating quantum channels. We show that for optimal discrimination of memory channels, memory assisted protocols are needed. This leads to a new notion of distance for channels with memory. For optimal discrimination and estimation of sets of unitary channels memory-assisted protocols are not required.

  12. MEMORY AS A PROGRAMMING

    E-Print Network [OSTI]

    Franek, Frantisek

    from the British Library. Library of Congress Cataloging in Publication data Franek, F. (Frantisek/deallocation errors. 5 Functions and Function Calls page 59 System stack, activation frame, activation frame as the storage for local auto objects and for function arguments. Passing arguments by value as opposed

  13. The severe scaling challenges of mainstream memories mo vated recent ac ve research on emerging nonvola le memory (eNVM) technologies. Some promising candidates, i.e., phase change memory, spintronic memory, and resis ve memory

    E-Print Network [OSTI]

    DeMara, Ronald F.

    nonvola le memory (eNVM) technologies. Some promising candidates, i.e., phase change memory, spintronic

  14. Memorial University Department of Psychology

    E-Print Network [OSTI]

    Oyet, Alwell

    1 Memorial University Department of Psychology GRADUATE STUDENT & SUPERVISOR HANDBOOK 2014 ­ 2015 .........................................................................................................................5 Masters of Applied Social Psychology (MASP ............................................................................9 Experimental Psychology

  15. An analysis of MRAM based memory technologies

    E-Print Network [OSTI]

    Vijayaraghavan, Rangarajan, M. Eng. Massachusetts Institute of Technology

    2006-01-01

    MRAM is a memory (RAM) technology that uses electron spin to store information. Often been called "the ideal memory", it can potentially combine the density of DRAM with the speed of SRAM and non-volatility of FLASH memory ...

  16. Creating a False Memory in the Hippocampus

    E-Print Network [OSTI]

    Ramirez Moreno, Steve

    Memories can be unreliable. We created a false memory in mice by optogenetically manipulating memory engram–bearing cells in the hippocampus. Dentate gyrus (DG) or CA1 neurons activated by exposure to a particular context ...

  17. Nitinol-reinforced shape-memory polymers

    E-Print Network [OSTI]

    Di Leo, Claudio V

    2010-01-01

    Reinforced shape-memory polymers have been developed from an acrylate based thermoset shape-memory polymer and nitinol wires. A rectangular shape-memory polymer measuring approximately 1 by 2 by 0.1 inches has a ten fold ...

  18. MultiScale: Memory System DVFS with Multiple Memory Controllers

    E-Print Network [OSTI]

    Wenisch, Thomas F.

    of server energy consumed by the memory system has been increasing rapidly and is now on par with that consumed by processors. Recent work demonstrates that substantial memory energy can be saved with only to select and apply a frequency combination that will minimize the overall system energy within user

  19. Group representations, error bases and quantum codes

    SciTech Connect (OSTI)

    Knill, E

    1996-01-01

    This report continues the discussion of unitary error bases and quantum codes. Nice error bases are characterized in terms of the existence of certain characters in a group. A general construction for error bases which are non-abelian over the center is given. The method for obtaining codes due to Calderbank et al. is generalized and expressed purely in representation theoretic terms. The significance of the inertia subgroup both for constructing codes and obtaining the set of transversally implementable operations is demonstrated.

  20. Genepool Memory Heatmaps

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity ofkandz-cm11 Outreach Home Room NewsInformation Current HABFESOpportunities Nuclearlong version)shortGate HoursGenepool Memory

  1. On a fatal error in tachyonic physics

    E-Print Network [OSTI]

    Edward Kapu?cik

    2013-08-10

    A fatal error in the famous paper on tachyons by Gerald Feinberg is pointed out. The correct expressions for energy and momentum of tachyons are derived.

  2. Adjoint Error Estimation for Elastohydrodynamic Lubrication

    E-Print Network [OSTI]

    Jimack, Peter

    Adjoint Error Estimation for Elastohydrodynamic Lubrication by Daniel Edward Hart Submitted elastohydro- dynamic lubrication (EHL) problems. A functional is introduced, namely the friction

  3. Measure of Diffusion Model Error for Thermal Radiation Transport 

    E-Print Network [OSTI]

    Kumar, Akansha

    2013-04-19

    and computational time. However, this approximation often has significant error. Error due to the inherent nature of a physics model is called model error. Information about the model error associated with the diffusion approximation is clearly desirable...

  4. Shape memory alloy thaw sensors

    DOE Patents [OSTI]

    Shahinpoor, Mohsen (Albuquerque, NM); Martinez, David R. (Albuquerque, NM)

    1998-01-01

    A sensor permanently indicates that it has been exposed to temperatures exceeding a critical temperature for a predetermined time period. An element of the sensor made from shape memory alloy changes shape when exposed, even temporarily, to temperatures above the Austenitic temperature of the shape memory alloy. The shape change of the SMA element causes the sensor to change between two readily distinguishable states.

  5. Paver Program Oklahoma Memorial Union

    E-Print Network [OSTI]

    Oklahoma, University of

    Paver Program Oklahoma Memorial Union The UniversiTy of oklahoma Alumni Association Pave the Way in the Oklahoma Memorial Union Courtyard. Now you can. The UniversiTy of oklahoma Alumni Association 900 Asp Ave of Oklahoma is an equal opportunity institution. This brochure was printed at no cost to the taxpayers

  6. WIPP Weatherization: Common Errors and Innovative Solutions Presentati...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    WIPP Weatherization: Common Errors and Innovative Solutions Presentation WIPP Weatherization: Common Errors and Innovative Solutions Presentation This presentation contains...

  7. Unconditional Room Temperature Quantum Memory

    E-Print Network [OSTI]

    M. Hosseini; G. Campbell; B. M. Sparkes; P. K. Lam; B. C. Buchler

    2015-02-10

    Just as classical information systems require buffers and memory, the same is true for quantum information systems. The potential that optical quantum information processing holds for revolutionising computation and communication is therefore driving significant research into developing optical quantum memory. A practical optical quantum memory must be able to store and recall quantum states on demand with high efficiency and low noise. Ideally, the platform for the memory would also be simple and inexpensive. Here, we present a complete tomographic reconstruction of quantum states that have been stored in the ground states of rubidium in a vapour cell operating at around 80$^o$C. Without conditional measurements, we show recall fidelity up to 98% for coherent pulses containing around one photon. In order to unambiguously verify that our memory beats the quantum no-cloning limit we employ state independent verification using conditional variance and signal transfer coefficients.

  8. Inference for Model Error Allan Seheult

    E-Print Network [OSTI]

    Oakley, Jeremy

    Reservoirs, Model Error, Reification, Thermohaline Circulation. 1 Introduction Mathematical models of complex that the uncertainties associated with both calibrating a mathematical model to observations on a physical system specification exercise of model error with the cosmologists, linked to an extensive analysis of model

  9. Nonparametric Regression with Correlated Errors Jean Opsomer

    E-Print Network [OSTI]

    Wang, Yuedong

    Nonparametric Regression with Correlated Errors Jean Opsomer Iowa State University Yuedong Wang Nonparametric regression techniques are often sensitive to the presence of correlation in the errors splines and wavelet regression under correlation, both for short-range and long-range dependence

  10. Remarks on statistical errors in equivalent widths

    E-Print Network [OSTI]

    Klaus Vollmann; Thomas Eversberg

    2006-07-03

    Equivalent width measurements for rapid line variability in atomic spectral lines are degraded by increasing error bars with shorter exposure times. We derive an expression for the error of the line equivalent width $\\sigma(W_\\lambda)$ with respect to pure photon noise statistics and provide a correction value for previous calculations.

  11. Working memory MARK D'ESPOSITO*

    E-Print Network [OSTI]

    subjects is usually six to seven digits (Lezak, 1995). In contrast, long-term memory is prop- erly defined underpinnings of memory function. The most common theoretical classification of mem- ory distinguishes short-term and long-term memory. In clinical practice, the terms short-term and long-term memory are used imprecisely

  12. Energy Efficient Phase Change Memory Based Main Memory for Future High Performance Systems

    E-Print Network [OSTI]

    Conte, Thomas M.

    time of a slow PCM based memory and significant energy reductions against a DDR3 commodity DRAM memoryEnergy Efficient Phase Change Memory Based Main Memory for Future High Performance Systems Abstract the point of view of scaling and energy consumption. PCM-only memories suffer from latency issues, high

  13. Scalable Dynamic Memory Management Module on Shared Memory Multiprocessors

    E-Print Network [OSTI]

    memory multiprocessors. The focus is to achieve scalability; for this purpose, both garbage collector (GC is done on Sun Ultra Enterprise 10000 (symmetric multiprocessor) and Origin 2000 (distributed shared

  14. Memory Errors in Modern Systems The Good, The Bad, and The Ugly

    E-Print Network [OSTI]

    Huang, Wei

    Laboratories, Albuquerque, New Mexico 4 National Energy Research Scientific Computing Center, Lawrence, supported by the U.S. Department of Energy contract DE-FC02-06ER25750. The publication has been assigned, a Lockheed Martin Company, for the United States Department of Energy under Contract DE-AC04-94AL85000

  15. V-194: Citrix XenServer Memory Management Error Lets Local Administrat...

    Broader source: Energy.gov (indexed) [DOE]

    Deny Service U-253: Citrix XenServer Denial of Service and Privilege Escalation Vulnerabilities U-106: Citrix XenServer Multiple Flaws in Web Self Service Have Unspecified Impact...

  16. V-194: Citrix XenServer Memory Management Error Lets Local Administrative

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity of Natural GasAdjustmentsShirleyEnergyThe U.S.Lacledeutilities. The Economics ofConductMultiple

  17. Shape memory alloy thaw sensors

    DOE Patents [OSTI]

    Shahinpoor, M.; Martinez, D.R.

    1998-04-07

    A sensor permanently indicates that it has been exposed to temperatures exceeding a critical temperature for a predetermined time period. An element of the sensor made from shape memory alloy changes shape when exposed, even temporarily, to temperatures above the austenitic temperature of the shape memory alloy. The shape change of the SMA element causes the sensor to change between two readily distinguishable states. 16 figs.

  18. Agility metric sensitivity using linear error theory 

    E-Print Network [OSTI]

    Smith, David Matthew

    2000-01-01

    Aircraft agility metrics have been proposed for use to measure the performance and capability of aircraft onboard while in-flight. The sensitivity of these metrics to various types of errors and uncertainties is not ...

  19. Simulating Bosonic Baths with Error Bars

    E-Print Network [OSTI]

    Mischa P. Woods; M. Cramer; M. B. Plenio

    2015-04-07

    We derive rigorous truncation-error bounds for the spin-boson model and its generalizations to arbitrary quantum systems interacting with bosonic baths. For the numerical simulation of such baths the truncation of both, the number of modes and the local Hilbert-space dimensions is necessary. We derive super-exponential Lieb--Robinson-type bounds on the error when restricting the bath to finitely-many modes and show how the error introduced by truncating the local Hilbert spaces may be efficiently monitored numerically. In this way we give error bounds for approximating the infinite system by a finite-dimensional one. As a consequence, numerical simulations such as the time-evolving density with orthogonal polynomials algorithm (TEDOPA) now allow for the fully certified treatment of the system-environment interaction.

  20. Errors and paradoxes in quantum mechanics

    E-Print Network [OSTI]

    D. Rohrlich

    2007-08-28

    Errors and paradoxes in quantum mechanics, entry in the Compendium of Quantum Physics: Concepts, Experiments, History and Philosophy, ed. F. Weinert, K. Hentschel, D. Greenberger and B. Falkenburg (Springer), to appear

  1. Quantum error-correcting codes and devices

    DOE Patents [OSTI]

    Gottesman, Daniel (Los Alamos, NM)

    2000-10-03

    A method of forming quantum error-correcting codes by first forming a stabilizer for a Hilbert space. A quantum information processing device can be formed to implement such quantum codes.

  2. Organizational Errors: Directions for Future Research

    E-Print Network [OSTI]

    Carroll, John Stephen

    The goal of this chapter is to promote research about organizational errors—i.e., the actions of multiple organizational participants that deviate from organizationally specified rules and can potentially result in adverse ...

  3. Quantifying truncation errors in effective field theory

    E-Print Network [OSTI]

    R. J. Furnstahl; N. Klco; D. R. Phillips; S. Wesolowski

    2015-06-03

    Bayesian procedures designed to quantify truncation errors in perturbative calculations of quantum chromodynamics observables are adapted to expansions in effective field theory (EFT). In the Bayesian approach, such truncation errors are derived from degree-of-belief (DOB) intervals for EFT predictions. Computation of these intervals requires specification of prior probability distributions ("priors") for the expansion coefficients. By encoding expectations about the naturalness of these coefficients, this framework provides a statistical interpretation of the standard EFT procedure where truncation errors are estimated using the order-by-order convergence of the expansion. It also permits exploration of the ways in which such error bars are, and are not, sensitive to assumptions about EFT-coefficient naturalness. We first demonstrate the calculation of Bayesian probability distributions for the EFT truncation error in some representative examples, and then focus on the application of chiral EFT to neutron-proton scattering. Epelbaum, Krebs, and Mei{\\ss}ner recently articulated explicit rules for estimating truncation errors in such EFT calculations of few-nucleon-system properties. We find that their basic procedure emerges generically from one class of naturalness priors considered, and that all such priors result in consistent quantitative predictions for 68% DOB intervals. We then explore several methods by which the convergence properties of the EFT for a set of observables may be used to check the statistical consistency of the EFT expansion parameter.

  4. Insights into the Mechanism of Memory Allocation Through the Trapping and Activating of Emotional Memories

    E-Print Network [OSTI]

    Rogerson, Thomas William Arundel

    2013-01-01

    Secondly, synaptic allocation functions to allocate memorieswhile neuronal allocation functions to allocate memories onwill be how memory allocation functions in the formation of

  5. Remote direct memory access

    DOE Patents [OSTI]

    Archer, Charles J.; Blocksome, Michael A.

    2012-12-11

    Methods, parallel computers, and computer program products are disclosed for remote direct memory access. Embodiments include transmitting, from an origin DMA engine on an origin compute node to a plurality target DMA engines on target compute nodes, a request to send message, the request to send message specifying a data to be transferred from the origin DMA engine to data storage on each target compute node; receiving, by each target DMA engine on each target compute node, the request to send message; preparing, by each target DMA engine, to store data according to the data storage reference and the data length, including assigning a base storage address for the data storage reference; sending, by one or more of the target DMA engines, an acknowledgment message acknowledging that all the target DMA engines are prepared to receive a data transmission from the origin DMA engine; receiving, by the origin DMA engine, the acknowledgement message from the one or more of the target DMA engines; and transferring, by the origin DMA engine, data to data storage on each of the target compute nodes according to the data storage reference using a single direct put operation.

  6. Investigating SANS/CWE Top 25 Programming Errors. 1 Investigating the SANS/CWE Top 25 Programming Errors List

    E-Print Network [OSTI]

    Hamlen, Kevin W.

    Investigating SANS/CWE Top 25 Programming Errors. 1 Investigating the SANS/CWE Top 25 Programming Errors List Running Title: Investigating SANS/CWE Top 25 Programming Errors. Investigating the SANS;Investigating SANS/CWE Top 25 Programming Errors. 2 Investigating the SANS/CWE Top 25 Programming Errors List

  7. Neutron multiplication error in TRU waste measurements

    SciTech Connect (OSTI)

    Veilleux, John [Los Alamos National Laboratory; Stanfield, Sean B [CCP; Wachter, Joe [CCP; Ceo, Bob [CCP

    2009-01-01

    Total Measurement Uncertainty (TMU) in neutron assays of transuranic waste (TRU) are comprised of several components including counting statistics, matrix and source distribution, calibration inaccuracy, background effects, and neutron multiplication error. While a minor component for low plutonium masses, neutron multiplication error is often the major contributor to the TMU for items containing more than 140 g of weapons grade plutonium. Neutron multiplication arises when neutrons from spontaneous fission and other nuclear events induce fissions in other fissile isotopes in the waste, thereby multiplying the overall coincidence neutron response in passive neutron measurements. Since passive neutron counters cannot differentiate between spontaneous and induced fission neutrons, multiplication can lead to positive bias in the measurements. Although neutron multiplication can only result in a positive bias, it has, for the purpose of mathematical simplicity, generally been treated as an error that can lead to either a positive or negative result in the TMU. While the factors that contribute to neutron multiplication include the total mass of fissile nuclides, the presence of moderating material in the matrix, the concentration and geometry of the fissile sources, and other factors; measurement uncertainty is generally determined as a function of the fissile mass in most TMU software calculations because this is the only quantity determined by the passive neutron measurement. Neutron multiplication error has a particularly pernicious consequence for TRU waste analysis because the measured Fissile Gram Equivalent (FGE) plus twice the TMU error must be less than 200 for TRU waste packaged in 55-gal drums and less than 325 for boxed waste. For this reason, large errors due to neutron multiplication can lead to increased rejections of TRU waste containers. This report will attempt to better define the error term due to neutron multiplication and arrive at values that are more realistic and accurate. To do so, measurements of standards and waste drums were performed with High Efficiency Neutron Counters (HENC) located at Los Alamos National Laboratory (LANL). The data were analyzed for multiplication effects and new estimates of the multiplication error were computed. A concluding section will present alternatives for reducing the number of rejections of TRU waste containers due to neutron multiplication error.

  8. Error Analysis in Nuclear Density Functional Theory (Journal...

    Office of Scientific and Technical Information (OSTI)

    Error Analysis in Nuclear Density Functional Theory Citation Details In-Document Search Title: Error Analysis in Nuclear Density Functional Theory Authors: Schunck, N ; McDonnell,...

  9. Error Analysis in Nuclear Density Functional Theory (Journal...

    Office of Scientific and Technical Information (OSTI)

    Error Analysis in Nuclear Density Functional Theory Citation Details In-Document Search Title: Error Analysis in Nuclear Density Functional Theory You are accessing a document...

  10. Optimal error estimates for corrected trapezoidal rules

    E-Print Network [OSTI]

    Talvila, Erik

    2012-01-01

    Corrected trapezoidal rules are proved for $\\int_a^b f(x)\\,dx$ under the assumption that $f"\\in L^p([a,b])$ for some $1\\leq p\\leq\\infty$. Such quadrature rules involve the trapezoidal rule modified by the addition of a term $k[f'(a)-f'(b)]$. The coefficient $k$ in the quadrature formula is found that minimizes the error estimates. It is shown that when $f'$ is merely assumed to be continuous then the optimal rule is the trapezoidal rule itself. In this case error estimates are in terms of the Alexiewicz norm. This includes the case when $f"$ is integrable in the Henstock--Kurzweil sense or as a distribution. All error estimates are shown to be sharp for the given assumptions on $f"$. It is shown how to make these formulas exact for all cubic polynomials $f$. Composite formulas are computed for uniform partitions.

  11. Memory cost of quantum protocols

    E-Print Network [OSTI]

    Alessandro Bisio; Giacomo Mauro D'Ariano; Paolo Perinotti; Michal Sedlak

    2011-12-16

    In this paper we consider the problem of minimizing the ancillary systems required to realize an arbitrary strategy of a quantum protocol, with the assistance of classical memory. For this purpose we introduce the notion of memory cost of a strategy, which measures the resources required in terms of ancillary dimension. We provide a condition for the cost to be equal to a given value, and we use this result to evaluate the cost in some special cases. As an example we show that any covariant protocol for the cloning of a unitary transformation requires at most one ancillary qubit. We also prove that the memory cost has to be determined globally, and cannot be calculated by optimizing the resources independently at each step of the strategy.

  12. Hipikat: A Project Memory for Software Development

    E-Print Network [OSTI]

    van der Hoek, André

    Hipikat: A Project Memory for Software Development Davor CCubranicc, Gail C. Murphy, Member, IEEE's usefulness in software modification tasks. One study evaluated the usefulness of Hipikat's recommendations Terms--Software development teams, project memory, software artifacts, recommender system, user studies

  13. Hardware support for unbounded transactional memory

    E-Print Network [OSTI]

    Lie, Sean, 1980-

    2004-01-01

    In this thesis, I propose a design for hardware transactional memory where the transaction size is not bounded by a specialized hardware buffer such as a cache. I describe an unbounded transactional memory system called ...

  14. E cient Use of Memory-Mapped Network Interfaces for Shared Memory Computing

    E-Print Network [OSTI]

    Scott, Michael L.

    E cient Use of Memory-Mapped Network Interfaces for Shared Memory Computing Nikolaos Hardavellas@cs.rochester.edu Abstract Memory-mapped network interfaces provide users with fast and cheap access to remote memory access capabilities of these networks suggest the need to re-evaluate the assumptions underlying

  15. Brain&oscillations&mediate&memory&suppression&1! Running&Title:&BRAIN&OSCILLATIONS&MEDIATE&MEMORY&SUPPRESSION&

    E-Print Network [OSTI]

    Schubart, Christoph

    Brain&oscillations&mediate&memory&suppression&1! & ! Running&Title:&BRAIN&OSCILLATIONS&MEDIATE&MEMORY&SUPPRESSION& & & Brain&oscillations&mediate&successful&suppression&of&unwanted&memories& Gerd&T.&Waldhauser1,&Karl1Heinz.de& Phone:&+49(0)753118815707& Fax:&+49(0)753118814829& #12;Brain&oscillations&mediate&memory&suppression&2

  16. Memory with memory: Soft assignment in Genetic Programming

    E-Print Network [OSTI]

    Poli, Riccardo

    that an instruction of the form x:=y or LOAD R2 R1 completely overwrites the previous value of a memory location or register. That earlier value is lost forever, and has no impact on the future be- havior of the system traditional GP). Instead of having the new value completely overwrite the old value of the register

  17. Memory with Memory: Soft Assignment in Genetic Programming

    E-Print Network [OSTI]

    Fernandez, Thomas

    that an instruction of the form x:=y or LOAD R2 R1 completely overwrites the previous value of a memory location or register. That earlier value is lost forever, and has no impact on the future be- havior of the system traditional GP). Instead of having the new value completely overwrite the old value of the register

  18. Memory Optimization for Phase-field Simulations

    SciTech Connect (OSTI)

    Derek Gaston; John Peterson; Andrew Slaughter; Cody Permann; David Andrs

    2014-08-01

    Phase-field simulations are computationally and memory intensive applications. Many of the phase-field simulations being conducted in support of NEAMS were not capable of running on “normal clusters” with 2-4GB of RAM per core, and instead required specialized “big-memory” clusters with 64GB per core. To address this issue, the MOOSE team developed a new Python-based utility called MemoryLogger, and applied it to locate, diagnose, and eradicate memory bottlenecks within the MOOSE framework. MemoryLogger allows for a better understanding of the memory usage of an application being run in parallel across a cluster. Memory usage information is captured for every individual process in a parallel job, and communicated to the head node of the cluster. Console text output from the application itself is automatically matched with this memory usage information to produce a detailed picture of memory usage over time, making it straightforward to identify the subroutines which contribute most to the application’s peak memory usage. The information produced by the MemoryLogger quickly and effectively narrows the search for memory optimizations to the most data-intensive parts of the simulation.

  19. DESIGNING EFFICIENT MEMORY FOR FUTURE COMPUTING SYSTEMS

    E-Print Network [OSTI]

    Balasubramonian, Rajeev

    , limited pin counts, increasing heterogeneity and complexity, and the diminished importance of cost main memory system with the following innovative features: (i) overfetch-aware re-organized chips, (ii) low-cost silicon photonic memory channels, (iii) largely autonomous memory modules with a packet

  20. Configurable memory system and method for providing atomic counting operations in a memory device

    DOE Patents [OSTI]

    Bellofatto, Ralph E. (Ridgefield, CT); Gara, Alan G. (Mount Kisco, NY); Giampapa, Mark E. (Irvington, NY); Ohmacht, Martin (Yorktown Heights, NY)

    2010-09-14

    A memory system and method for providing atomic memory-based counter operations to operating systems and applications that make most efficient use of counter-backing memory and virtual and physical address space, while simplifying operating system memory management, and enabling the counter-backing memory to be used for purposes other than counter-backing storage when desired. The encoding and address decoding enabled by the invention provides all this functionality through a combination of software and hardware.

  1. Lateral boundary errors in regional numerical weather

    E-Print Network [OSTI]

    ?umer, Slobodan

    Lateral boundary errors in regional numerical weather prediction models Author: Ana Car Advisor, they describe evolution of atmospher - weather forecast. Every NWP model solves the same system of equations (1: assoc. prof. dr. Nedjeljka Zagar January 5, 2015 Abstract Regional models are used in many national

  2. MEASUREMENT AND CORRECTION OF ULTRASONIC ANEMOMETER ERRORS

    E-Print Network [OSTI]

    Heinemann, Detlev

    commonly show systematic errors depending on wind speed due to inaccurate ultrasonic transducer mounting three- dimensional wind speed time series. Results for the variance and power spectra are shown. 1 wind speeds with ultrasonic anemometers: The measu- red flow is distorted by the probe head

  3. Chinese Remaindering with Errors Oded Goldreich

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    Chinese Remaindering with Errors Oded Goldreich Department of Computer Science Weizmann Institute 02139, USA madhu@mit.edu. z Abstract The Chinese Remainder Theorem states that a positive integer m The Chinese Remainder Theorem states that a positive integer m is uniquely specified by its remainder modulo k

  4. Distribution of Wind Power Forecasting Errors from Operational Systems (Presentation)

    SciTech Connect (OSTI)

    Hodge, B. M.; Ela, E.; Milligan, M.

    2011-10-01

    This presentation offers new data and statistical analysis of wind power forecasting errors in operational systems.

  5. Analysis of Solar Two Heliostat Tracking Error Sources

    SciTech Connect (OSTI)

    Jones, S.A.; Stone, K.W.

    1999-01-28

    This paper explores the geometrical errors that reduce heliostat tracking accuracy at Solar Two. The basic heliostat control architecture is described. Then, the three dominant error sources are described and their effect on heliostat tracking is visually illustrated. The strategy currently used to minimize, but not truly correct, these error sources is also shown. Finally, a novel approach to minimizing error is presented.

  6. 10.1177/1087057105276989Kevorkov and MakarenkovSystematic Errors in High-Throughput Screening Statistical Analysis of Systematic Errors

    E-Print Network [OSTI]

    Makarenkov, Vladimir

    - mentaldatarequiresan efficientautomaticroutinefor theselection of hits. Unfortunately, random and systematic errors can

  7. Shape memory alloy/shape memory polymer tools

    DOE Patents [OSTI]

    Seward, Kirk P.; Krulevitch, Peter A.

    2005-03-29

    Micro-electromechanical tools for minimally invasive techniques including microsurgery. These tools utilize composite shape memory alloy (SMA), shape memory polymer (SMP) and combinations of SMA and SMP to produce catheter distal tips, actuators, etc., which are bistable. Applications for these structures include: 1) a method for reversible fine positioning of a catheter tip, 2) a method for reversible fine positioning of tools or therapeutic catheters by a guide catheter, 3) a method for bending articulation through the body's vasculature, 4) methods for controlled stent delivery, deployment, and repositioning, and 5) catheters with variable modulus, with vibration mode, with inchworm capability, and with articulated tips. These actuators and catheter tips are bistable and are opportune for in vivo usage because the materials are biocompatible and convenient for intravascular use as well as other minimal by invasive techniques.

  8. Detecting Soft Errors in Stencil based Computations

    SciTech Connect (OSTI)

    Sharma, V.; Gopalkrishnan, G.; Bronevetsky, G.

    2015-05-06

    Given the growing emphasis on system resilience, it is important to develop software-level error detectors that help trap hardware-level faults with reasonable accuracy while minimizing false alarms as well as the performance overhead introduced. We present a technique that approaches this idea by taking stencil computations as our target, and synthesizing detectors based on machine learning. In particular, we employ linear regression to generate computationally inexpensive models which form the basis for error detection. Our technique has been incorporated into a new open-source library called SORREL. In addition to reporting encouraging experimental results, we demonstrate techniques that help reduce the size of training data. We also discuss the efficacy of various detectors synthesized, as well as our future plans.

  9. Gross error detection in process data 

    E-Print Network [OSTI]

    Singh, Gurmeet

    1992-01-01

    , 1991), with many optimum properties, seems to have been untapped by chemical engineers. We first review the background of the Tr test, and present relevant properties of the test. IV. A Hotelling's Generalization of Students t Test One of the most...: Chemical Engineering GROSS ERROR DETECTION IN PROCESS DATA A Thesis by GURMEET SINGH Approved as to style and content by: Ralph E. White (Chair of Committee) Michael Nikoloau (Member Richard B. Gri n (Member) R. W. Flummerfelt (Head...

  10. What Scientific Applications can Benefit from Hardware Transactional Memory?

    SciTech Connect (OSTI)

    Schindewolf, M; Bihari, B; Gyllenhaal, J; Schulz, M; Wang, A; Karl, W

    2012-06-04

    Achieving efficient and correct synchronization of multiple threads is a difficult and error-prone task at small scale and, as we march towards extreme scale computing, will be even more challenging when the resulting application is supposed to utilize millions of cores efficiently. Transactional Memory (TM) is a promising technique to ease the burden on the programmer, but only recently has become available on commercial hardware in the new Blue Gene/Q system and hence the real benefit for realistic applications has not been studied, yet. This paper presents the first performance results of TM embedded into OpenMP on a prototype system of BG/Q and characterizes code properties that will likely lead to benefits when augmented with TM primitives. We first, study the influence of thread count, environment variables and memory layout on TM performance and identify code properties that will yield performance gains with TM. Second, we evaluate the combination of OpenMP with multiple synchronization primitives on top of MPI to determine suitable task to thread ratios per node. Finally, we condense our findings into a set of best practices. These are applied to a Monte Carlo Benchmark and a Smoothed Particle Hydrodynamics method. In both cases an optimized TM version, executed with 64 threads on one node, outperforms a simple TM implementation. MCB with optimized TM yields a speedup of 27.45 over baseline.

  11. Galen Sasaki EE 361 University of Hawaii 1 Memory technologies

    E-Print Network [OSTI]

    Sasaki, Galen H.

    1 Galen Sasaki EE 361 University of Hawaii 1 Memory · Memory technologies · Memory hierarchy of Hawaii 2 Memory Technologies · Read Only Memory (ROM) · Static RAM (SRAM) ­ Basic cell: clocked D latch) ­ Basic cell ­ Faster DRAM, e.g. synchronous DRAM #12;2 Galen Sasaki EE 361 University of Hawaii 3 ROM

  12. Quantum memories: emerging applications and recent advances

    E-Print Network [OSTI]

    Khabat Heshami; Duncan G. England; Peter C. Humphreys; Philip J. Bustard; Victor M. Acosta; Joshua Nunn; Benjamin J. Sussman

    2015-11-12

    Quantum light-matter interfaces are at the heart of photonic quantum technologies. Quantum memories for photons are a prominent consequence of superb control over interactions between light and matter, where non-classical states of photons are mapped onto stationary matter states and preserved for subsequent retrieval into photonic excitations. The ability of quantum memories to synchronize probabilistic events makes them a key component in quantum repeaters and quantum computation based on linear optics. This has motivated several groups to dedicate theoretical and experimental research to develop quantum memory devices. In recent years, exciting new applications and more advanced developments of quantum memories have proliferated. In this review, we outline some of the emerging applications of quantum memories in optical signal processing, quantum computation, and nonlinear optics. We review recent experimental and theoretical developments, and their impacts on more advanced photonic quantum technologies based on quantum memories.

  13. Raman Quantum Memory of Photonic Polarised Entanglement

    E-Print Network [OSTI]

    Dong-Sheng Ding; Wei Zhang; Zhi-Yuan Zhou; Shuai Shi; Bao-Sen Shi; Guang-Can Guo

    2014-11-06

    Quantum entanglement of particles is regarded as a fundamental character in quantum information, in which quantum state should be given for whole system instead of independently describing single particle. Constructing quantum memory of photonic entanglement is essential for realizing quantum networks, which had been performed previously by many memory protocols. Of which Raman quantum memory gives advantages in broadband and high-speed properties, resulting in huge potential in quantum network and quantum computation. However, Raman quantum memory of photonic polarised entanglement is a challenge work and still missing. Here, we report two Raman quantum memories based on gas atomic ensembles: 1. Heralded Raman quantum memory of hybrid entanglement of path and polarization of single photon. 2. Raman storage of two-particle photonic polarised entangled state. Our experimental performances of these two different Raman quantum storages of photonic entanglement show a very promising prospective in quantum information science.

  14. Decoherence and dephasing errors caused by the dc Stark effect...

    Office of Scientific and Technical Information (OSTI)

    Decoherence and dephasing errors caused by the dc Stark effect in rapid ion transport Citation Details In-Document Search Title: Decoherence and dephasing errors caused by the dc...

  15. Human error contribution to nuclear materials-handling events

    E-Print Network [OSTI]

    Sutton, Bradley (Bradley Jordan)

    2007-01-01

    This thesis analyzes a sample of 15 fuel-handling events from the past ten years at commercial nuclear reactors with significant human error contributions in order to detail the contribution of human error to fuel-handling ...

  16. Error Reduction for Weigh-In-Motion

    SciTech Connect (OSTI)

    Hively, Lee M; Abercrombie, Robert K; Scudiere, Matthew B; Sheldon, Frederick T

    2009-01-01

    Federal and State agencies need certifiable vehicle weights for various applications, such as highway inspections, border security, check points, and port entries. ORNL weigh-in-motion (WIM) technology was previously unable to provide certifiable weights, due to natural oscillations, such as vehicle bouncing and rocking. Recent ORNL work demonstrated a novel filter to remove these oscillations. This work shows further filtering improvements to enable certifiable weight measurements (error < 0.1%) for a higher traffic volume with less effort (elimination of redundant weighing).

  17. Forward Error Correction and Functional Programming

    E-Print Network [OSTI]

    Bull, Tristan Michael

    2011-04-25

    .1 Annapolis Micro Wildstar 5 DDR2 DRAM Interface . . . . . . . . 50 6.2 Dual-Port DRAM Wrapper . . . . . . . . . . . . . . . . . . . . . 52 6.3 Kansas Lava DRAM Interface . . . . . . . . . . . . . . . . . . . . 55 7 Conclusion 58 7.1 Future Work... codewords. We ran the simulation using input data with energy per bit to noise power spectral density ratios (Eb=N0) of 3dB to 6dB in 0.5dB increments. For each Eb=N0 value, we ran the simulation until at least 25,000 bit errors were recorded. Results...

  18. Unitary-process discrimination with error margin

    E-Print Network [OSTI]

    T. Hashimoto; A. Hayashi; M. Hayashi; M. Horibe

    2010-06-10

    We investigate a discrimination scheme between unitary processes. By introducing a margin for the probability of erroneous guess, this scheme interpolates the two standard discrimination schemes: minimum-error and unambiguous discrimination. We present solutions for two cases. One is the case of two unitary processes with general prior probabilities. The other is the case with a group symmetry: the processes comprise a projective representation of a finite group. In the latter case, we found that unambiguous discrimination is a kind of "all or nothing": the maximum success probability is either 0 or 1. We also closely analyze how entanglement with an auxiliary system improves discrimination performance.

  19. On the Error in QR Integration

    E-Print Network [OSTI]

    Dieci, Luca; Van Vleck, Erik

    2008-03-07

    Society for Industrial and Applied Mathematics Vol. 46, No. 3, pp. 1166–1189 ON THE ERROR IN QR INTEGRATION? LUCA DIECI† AND ERIK S. VAN VLECK‡ Abstract. An important change of variables for a linear time varying system x? = A(t)x, t ? 0, is that induced...(X) is the matrix comprising the diagonal part of X, the rest being all 0’s; upp(X) is the matrix comprising the upper triangular part of X, the rest being all 0’s; and low(X) is the matrix comprising the strictly lower triangular part of X, the rest being all 0’s...

  20. Memorandum Memorializing Ex Parte Communication, DOE impending...

    Energy Savers [EERE]

    Communication, DOE impending determination of coverage for commercial and industrial fans, blowers, and fume hoods. Memorandum Memorializing Ex Parte Communication, DOE impending...

  1. Exploiting Data Similarity to Reduce Memory Footprints

    SciTech Connect (OSTI)

    Biswas, S; de Supinski, B R; Schulz, M; Franklin, D; Sherwood, T; Chong, F T

    2011-01-28

    Memory size has long limited large-scale applications on high-performance computing (HPC) systems. Since compute nodes frequently do not have swap space, physical memory often limits problem sizes. Increasing core counts per chip and power density constraints, which limit the number of DIMMs per node, have exacerbated this problem. Further, DRAM constitutes a significant portion of overall HPC system cost. Therefore, instead of adding more DRAM to the nodes, mechanisms to manage memory usage more efficiently - preferably transparently - could increase effective DRAM capacity and thus the benefit of multicore nodes for HPC systems. MPI application processes often exhibit significant data similarity. These data regions occupy multiple physical locations across the individual rank processes within a multicore node and thus offer a potential savings in memory capacity. These regions, primarily residing in heap, are dynamic, which makes them difficult to manage statically. Our novel memory allocation library, SBLLmalloc, automatically identifies identical memory blocks and merges them into a single copy. SBLLmalloc does not require application or OS changes since we implement it as a user-level library. Overall, we demonstrate that SBLLmalloc reduces the memory footprint of a range of MPI applications by 32.03% on average and up to 60.87%. Further, SBLLmalloc supports problem sizes for IRS over 21.36% larger than using standard memory management techniques, thus significantly increasing effective system size. Similarly, SBLLmalloc requires 43.75% fewer nodes than standard memory management techniques to solve an AMG problem.

  2. Shape memory response of ni2mnga and nimncoin magnetic shape memory alloys under compression 

    E-Print Network [OSTI]

    Brewer, Andrew Lee

    2009-05-15

    In this study, the shape memory response of Ni2MnGa and NiMnCoIn magnetic shape memory alloys was observed under compressive stresses. Ni2MnGa is a magnetic shape memory alloy (MSMA) that has been shown to exhibit fully ...

  3. Watchdog: Hardware for Safe and Secure Manual Memory Management and Full Memory Safety

    E-Print Network [OSTI]

    Plotkin, Joshua B.

    Watchdog: Hardware for Safe and Secure Manual Memory Management and Full Memory Safety Santosh) to become the root cause of exploitable security vulnerabilities. This paper proposes Watchdog, a hardware full hardware-enforced memory safety at low overheads. 1. Introduction Languages such as C and C

  4. Bolstered Error Estimation Ulisses Braga-Neto a,c

    E-Print Network [OSTI]

    Braga-Neto, Ulisses

    the bolstered error estimators proposed in this paper, as part of a larger library for classification and error of the data. It has a direct geometric interpretation and can be easily applied to any classification rule as smoothed error estimation. In some important cases, such as a linear classification rule with a Gaussian

  5. A Taxonomy of Number Entry Error Sarah Wiseman

    E-Print Network [OSTI]

    Subramanian, Sriram

    A Taxonomy of Number Entry Error Sarah Wiseman UCLIC MPEB, Malet Place London, WC1E 7JE sarah and the subsequent process of creating a taxonomy of errors from the information gathered. A total of 345 errors were. These codes are then organised into a taxonomy similar to that of Zhang et al (2004). We show how

  6. Integration of Non-volatile Memory into Storage Hierarchy 

    E-Print Network [OSTI]

    Qiu, Sheng

    2013-12-04

    In this dissertation, we present novel approaches for integrating non-volatile memory devices into storage hierarchy of a computer system. There are several types of non- volatile memory devices, such as flash memory, Phase ...

  7. Grain constraint and size effects in shape memory alloy microwires

    E-Print Network [OSTI]

    Ueland, Stian Melhus

    2013-01-01

    Shape memory alloys exhibit interesting and useful properties, such as the shape memory effect and superelasticity. Among the many alloy families that have been shown to exhibit shape memory properties the ones based on ...

  8. Saving Energy This Memorial Day | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Saving Energy This Memorial Day Saving Energy This Memorial Day May 19, 2014 - 4:07pm Addthis Be energy efficient while you spend time outside this Memorial Day. | Photo courtesy...

  9. The image cannot be displayed. Your computer may not have enough memory to open the image, or the image may have been corrupted. Restart your computer, and then open the file again. If the red x still appears, you may

    E-Print Network [OSTI]

    Garfunkel, Eric

    and Developmental Biology Cellular and Molecular Pharmacology Biomedical Engineering Exposure Science and Assessment, the single worldwide repository for 3D protein structures. #12;Graduate School of Biomedical Sciences Typical and Development in May 2014 "Coordination of tRNA transcription with export at nuclear pore complexes in budding

  10. Design Space and Performance Analysis of the Hybrid Memory Cube The Hybrid Memory Cube is an emerging main memory

    E-Print Network [OSTI]

    Jacob, Bruce

    be operated at higher throughput and lower energy per bit compared to traditional DDRx memory. This technology's performance, we compare the execution of HMC, Buffer-on-Board, and quad channel DDR3-1600 main memory systems full-system execution time over an extremely aggressive quad channel DDR3-1600 system by a factor

  11. Generation-based memory synchronization in a multiprocessor system with weakly consistent memory accesses

    DOE Patents [OSTI]

    Ohmacht, Martin

    2014-09-09

    In a multiprocessor system, a central memory synchronization module coordinates memory synchronization requests responsive to memory access requests in flight, a generation counter, and a reclaim pointer. The central module communicates via point-to-point communication. The module includes a global OR reduce tree for each memory access requesting device, for detecting memory access requests in flight. An interface unit is implemented associated with each processor requesting synchronization. The interface unit includes multiple generation completion detectors. The generation count and reclaim pointer do not pass one another.

  12. Extra-Large Memory Nodes

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity ofkandz-cm11 Outreach Home Room NewsInformation Current HABFES OctoberEvan Racah Evan-5 BeamlineGE, Ford,Extra-Large Memory

  13. Memory-2014-salishan.key

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantityBonneville Power Administration wouldMass map shines light on dark matter By SarahMODELINGMeetingsMembranesMemorial Day

  14. Building Green in Greensburg: Kiowa County Memorial Hospital...

    Energy Savers [EERE]

    Kiowa County Memorial Hospital Building Green in Greensburg: Kiowa County Memorial Hospital This poster highlights energy efficiency, renewable energy, and sustainable features of...

  15. LOW-POWER METHODOLOGY FOR FAULT TOLERANT NANOSCALE MEMORY DESIGN

    E-Print Network [OSTI]

    Kim, Seokjoong

    2012-01-01

    Outline . . . . . . . . . . . . . . . . . . . . . . . Low-Methodologies for Low-Power Memory . . . . . . . . . . . . .Scaling for SEU-Tolerance in Low-Power Memories 7.1 Soft-

  16. Y-12 historian assists in Lincoln Memorial University display...

    National Nuclear Security Administration (NNSA)

    assists in Lincoln Memorial University display design NNSA Blog Y-12 historian Ray Smith, left, joins Lincoln Memorial University board of trustees chairman Pete DeBusk in...

  17. Integrating human related errors with technical errors to determine causes behind offshore accidents

    E-Print Network [OSTI]

    Aamodt, Agnar

    errors were embedded as an integral part of the oil well drilling opera- tion. To reduce the number assessment of the failure. The method is based on a knowledge model of the oil-well drilling process. All of non-productive time (NPT) during oil-well drilling. NPT exhibits a much lower declining trend than

  18. In Search of a Taxonomy for Classifying Qualitative Spreadsheet Errors

    E-Print Network [OSTI]

    Przasnyski, Zbigniew; Seal, Kala Chand

    2011-01-01

    Most organizations use large and complex spreadsheets that are embedded in their mission-critical processes and are used for decision-making purposes. Identification of the various types of errors that can be present in these spreadsheets is, therefore, an important control that organizations can use to govern their spreadsheets. In this paper, we propose a taxonomy for categorizing qualitative errors in spreadsheet models that offers a framework for evaluating the readiness of a spreadsheet model before it is released for use by others in the organization. The classification was developed based on types of qualitative errors identified in the literature and errors committed by end-users in developing a spreadsheet model for Panko's (1996) "Wall problem". Closer inspection of the errors reveals four logical groupings of the errors creating four categories of qualitative errors. The usability and limitations of the proposed taxonomy and areas for future extension are discussed.

  19. Analysis of Errors in a Special Perturbations Satellite Orbit Propagator

    SciTech Connect (OSTI)

    Beckerman, M.; Jones, J.P.

    1999-02-01

    We performed an analysis of error densities for the Special Perturbations orbit propagator using data for 29 satellites in orbits of interest to Space Shuttle and International Space Station collision avoidance. We find that the along-track errors predominate. These errors increase monotonically over each 36-hour prediction interval. The predicted positions in the along-track direction progressively either leap ahead of or lag behind the actual positions. Unlike the along-track errors the radial and cross-track errors oscillate about their nearly zero mean values. As the number of observations per fit interval decline the along-track prediction errors, and amplitudes of the radial and cross-track errors, increase.

  20. NS201: Learning and Memory (8 Lectures)

    E-Print Network [OSTI]

    Murthy, Aditya

    and Argument Is it unique to humans ? #12;Birth of animal models and search for memory Karl Lashley Trained are not the same #12;The Standard Model and Memory Systems Squire and Zola (PNAS) #12;Priming What are the two Spontaneous Recovery: CR regains with mild presentation of US Renewal : (TBD under contextual conditioni

  1. Mechanisms underlying working memory for novel information

    E-Print Network [OSTI]

    Hasselmo, Michael

    Mechanisms underlying working memory for novel information Michael E. Hasselmo and Chantal E. Stern Cummington St, Boston, MA 02215, USA In this Opinion article we describe a theory that the brain mechanisms modeling indicates that mechanisms for maintaining novel information in working memory could differ from

  2. Designing asymmetric neural networks with associative memory

    SciTech Connect (OSTI)

    Zhao Hong [Department of Physics, Xiamen University, Xiamen 361005 (China)

    2004-12-01

    A strategy for designing asymmetric neural networks of associative memory with controllable degree of symmetry and controllable basins of attraction is presented. It is shown that the performance of the networks depends on the degree of the symmetry, and by adjusting the degree of the symmetry the spurious memories or unwanted attractors can be suppressed completely.

  3. MEMORY HIERARCHY DESIGN FOR STREAM A DISSERTATION

    E-Print Network [OSTI]

    Dally, William J.

    . Prior research has shown that stream processors provide an energy-efficient, programmable approachMEMORY HIERARCHY DESIGN FOR STREAM COMPUTING A DISSERTATION SUBMITTED TO THE DEPARTMENT of memory and bandwidth hierarchy utilization in stream processors. We first evaluate the appropriate

  4. Android Malware Analysis Based On Memory Forensics

    E-Print Network [OSTI]

    Levente, Buttyán

    Android Malware Analysis Based On Memory Forensics Andr´as Gazdag and Levente Butty´an Laboratory for the Android platform using a memory forensics approach. We explore the required modification of the Android gathered from the analysis steps we present a methodology of behaviour analysis of android applications

  5. Energy Splitting Theorems for Materials with Memory

    E-Print Network [OSTI]

    Antonino Favata; Paolo Podio-Guidugli; Giuseppe Tomassetti

    2009-07-30

    We extend to materials with fading memory and materials with internal variables a result previously established by one of us for materials with instantaneous memory: the additive decomposability of the total energy into an internal and a kinetic part, and a representation of the latter and the inertial forces in terms of one and the same mass tensor.

  6. Tier identification (TID) for tiered memory characteristics

    DOE Patents [OSTI]

    Chang, Jichuan; Lim, Kevin T; Ranganathan, Parthasarathy

    2014-03-25

    A tier identification (TID) is to indicate a characteristic of a memory region associated with a virtual address in a tiered memory system. A thread may be serviced according to a first path based on the TID indicating a first characteristic. The thread may be serviced according to a second path based on the TID indicating a second characteristic.

  7. Memorial University of Newfoundland Indirect Costs Report

    E-Print Network [OSTI]

    deYoung, Brad

    Memorial University of Newfoundland Indirect Costs Report 2012-13 The grant provided through the Government of Canada Indirect Costs Program (ICP) is essential to Memorial's research success. Funding and impact can be found in the following section. Total 2013 Indirect Costs Grant: $4,318,814 Management

  8. Pressure Change Measurement Leak Testing Errors

    SciTech Connect (OSTI)

    Pryor, Jeff M; Walker, William C

    2014-01-01

    A pressure change test is a common leak testing method used in construction and Non-Destructive Examination (NDE). The test is known as being a fast, simple, and easy to apply evaluation method. While this method may be fairly quick to conduct and require simple instrumentation, the engineering behind this type of test is more complex than is apparent on the surface. This paper intends to discuss some of the more common errors made during the application of a pressure change test and give the test engineer insight into how to correctly compensate for these factors. The principals discussed here apply to ideal gases such as air or other monoatomic or diatomic gasses; however these same principals can be applied to polyatomic gasses or liquid flow rate with altered formula specific to those types of tests using the same methodology.

  9. Quantum Error Correction with magnetic molecules

    E-Print Network [OSTI]

    José J. Baldoví; Salvador Cardona-Serra; Juan M. Clemente-Juan; Luis Escalera-Moreno; Alejandro Gaita-Ariño; Guillermo Mínguez Espallargas

    2014-08-22

    Quantum algorithms often assume independent spin qubits to produce trivial $|\\uparrow\\rangle=|0\\rangle$, $|\\downarrow\\rangle=|1\\rangle$ mappings. This can be unrealistic in many solid-state implementations with sizeable magnetic interactions. Here we show that the lower part of the spectrum of a molecule containing three exchange-coupled metal ions with $S=1/2$ and $I=1/2$ is equivalent to nine electron-nuclear qubits. We derive the relation between spin states and qubit states in reasonable parameter ranges for the rare earth $^{159}$Tb$^{3+}$ and for the transition metal Cu$^{2+}$, and study the possibility to implement Shor's Quantum Error Correction code on such a molecule. We also discuss recently developed molecular systems that could be adequate from an experimental point of view.

  10. Performing an allreduce operation using shared memory

    DOE Patents [OSTI]

    Archer, Charles J. (Rochester, MN); Dozsa, Gabor (Ardsley, NY); Ratterman, Joseph D. (Rochester, MN); Smith, Brian E. (Rochester, MN)

    2012-04-17

    Methods, apparatus, and products are disclosed for performing an allreduce operation using shared memory that include: receiving, by at least one of a plurality of processing cores on a compute node, an instruction to perform an allreduce operation; establishing, by the core that received the instruction, a job status object for specifying a plurality of shared memory allreduce work units, the plurality of shared memory allreduce work units together performing the allreduce operation on the compute node; determining, by an available core on the compute node, a next shared memory allreduce work unit in the job status object; and performing, by that available core on the compute node, that next shared memory allreduce work unit.

  11. Performing an allreduce operation using shared memory

    SciTech Connect (OSTI)

    Archer, Charles J; Dozsa, Gabor; Ratterman, Joseph D; Smith, Brian E

    2014-06-10

    Methods, apparatus, and products are disclosed for performing an allreduce operation using shared memory that include: receiving, by at least one of a plurality of processing cores on a compute node, an instruction to perform an allreduce operation; establishing, by the core that received the instruction, a job status object for specifying a plurality of shared memory allreduce work units, the plurality of shared memory allreduce work units together performing the allreduce operation on the compute node; determining, by an available core on the compute node, a next shared memory allreduce work unit in the job status object; and performing, by that available core on the compute node, that next shared memory allreduce work unit.

  12. Memory effects in turbulent transport

    E-Print Network [OSTI]

    Alexander Hubbard; Axel Brandenburg

    2009-11-13

    In the mean-field theory of magnetic fields, turbulent transport, i.e. the turbulent electromotive force, is described by a combination of the alpha effect and turbulent magnetic diffusion, which are usually assumed to be proportional respectively to the mean field and its spatial derivatives. For a passive scalar there is just turbulent diffusion, where the mean flux of concentration depends on the gradient of the mean concentration. However, these proportionalities are approximations that are valid only if the mean field or the mean concentration vary slowly in time. Examples are presented where turbulent transport possesses memory, i.e. where it depends crucially on the past history of the mean field. Such effects are captured by replacing turbulent transport coefficients with time integral kernels, resulting in transport coefficients that depend effectively on the frequency or the growth rate of the mean field itself. In this paper we perform numerical experiments to find the characteristic timescale (or memory length) of this effect as well as simple analytical models of the integral kernels in the case of passive scalar concentrations and kinematic dynamos. The integral kernels can then be used to find self-consistent growth or decay rates of the mean fields. In mean-field dynamos the growth rates and cycle periods based on steady state values of alpha effect and turbulent diffusivity can be quite different from the actual values.

  13. Theoretical analysis of reflected ray error from surface slope error and their application to the solar concentrated collector

    E-Print Network [OSTI]

    Huang, Weidong

    2011-01-01

    Surface slope error of concentrator is one of the main factors to influence the performance of the solar concentrated collectors which cause deviation of reflected ray and reduce the intercepted radiation. This paper presents the general equation to calculate the standard deviation of reflected ray error from slope error through geometry optics, applying the equation to calculate the standard deviation of reflected ray error for 5 kinds of solar concentrated reflector, provide typical results. The results indicate that the slope error is transferred to the reflected ray in more than 2 folds when the incidence angle is more than 0. The equation for reflected ray error is generally fit for all reflection surfaces, and can also be applied to control the error in designing an abaxial optical system.

  14. Elastic Constants of Ni-Mn-Ga Magnetic Shape Memory Alloys

    SciTech Connect (OSTI)

    Stipcich, M. [Universitat de Barcelona; Manosa, L. [Universitat de Barcelona; Planes, A. [Universitat de Barcelona; Morin, M. [INSA de Lyon; Zarestky, Jerel L [ORNL; Lograsso, Tom [Ames Laboratory; Stassis, C. [Ames Laboratory

    2004-01-01

    We have measured the adiabatic second order elastic constants of two Ni-Mn-Ga magnetic shape memory crystals with different martensitic transition temperatures, using ultrasonic methods. The temperature dependence of the elastic constants has been followed across the ferromagnetic transition and down to the martensitic transition temperature. Within experimental errors no noticeable change in any of the elastic constants has been observed at the Curie point. The temperature dependence of the shear elastic constant C' has been found to be very different for the two alloys. Such a different behavior is in agreement with recent theoretical predictions for systems undergoing multi-stage structural transitions.

  15. A Study of the Viability of Exploiting Memory Content Similarity to Improve

    Office of Scientific and Technical Information (OSTI)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity of NaturalDukeWakefield MunicipalTechnicalInformation4563 LLNL(Technical Report) |(Conference)Resilience to Memory Errors.

  16. State discrimination with error margin and its locality

    E-Print Network [OSTI]

    A. Hayashi; T. Hashimoto; M. Horibe

    2008-07-10

    There are two common settings in a quantum-state discrimination problem. One is minimum-error discrimination where a wrong guess (error) is allowed and the discrimination success probability is maximized. The other is unambiguous discrimination where errors are not allowed but the inconclusive result "I don't know" is possible. We investigate discrimination problem with a finite margin imposed on the error probability. The two common settings correspond to the error margins 1 and 0. For arbitrary error margin, we determine the optimal discrimination probability for two pure states with equal occurrence probabilities. We also consider the case where the states to be discriminated are multipartite, and show that the optimal discrimination probability can be achieved by local operations and classical communication.

  17. Error models in quantum computation: an application of model selection

    E-Print Network [OSTI]

    Lucia Schwarz; Steven van Enk

    2013-09-04

    Threshold theorems for fault-tolerant quantum computing assume that errors are of certain types. But how would one detect whether errors of the "wrong" type occur in one's experiment, especially if one does not even know what type of error to look for? The problem is that for many qubits a full state description is impossible to analyze, and a full process description is even more impossible to analyze. As a result, one simply cannot detect all types of errors. Here we show through a quantum state estimation example (on up to 25 qubits) how to attack this problem using model selection. We use, in particular, the Akaike Information Criterion. The example indicates that the number of measurements that one has to perform before noticing errors of the wrong type scales polynomially both with the number of qubits and with the error size.

  18. Disaggregated Memory for Expansion and Sharing in Blade Servers

    E-Print Network [OSTI]

    Wenisch, Thomas F.

    1 Disaggregated Memory for Expansion and Sharing in Blade Servers Kevin Lim*, Jichuan Chang-memory co-location on a single system and details the design of a new general-purpose architectural building block--a memory blade--that allows memory to be "disaggregated" across a system ensemble. This remote

  19. Galen Sasaki EE 361 University of Hawaii 1 Memory technologies

    E-Print Network [OSTI]

    Sasaki, Galen H.

    Galen Sasaki EE 361 University of Hawaii 1 Memory · Memory technologies · Memory hierarchy ­ Cache basics ­ Cache variations ­ Virtual memory · Synchronization Galen Sasaki EE 361 University of Hawaii 2 cell ­ Faster DRAM, e.g. synchronous DRAM #12;Galen Sasaki EE 361 University of Hawaii 3 ROM · Random

  20. Memory Power Management via Dynamic Voltage/Frequency Scaling

    E-Print Network [OSTI]

    Mutlu, Onur

    *Dual 4-core Intel Xeon®, 48GB DDR3 (12 DIMMs), SPEC CPU2006, all cores active. Measured AC power, analytically modeled memory power. #12;Existing Solution: Memory Sleep States? n Most memory energy for SPEC CPU2006 #12;Memory Power can be Scaled Down n DDR can operate at multiple frequencies à

  1. Pseudo Functional Path Delay Test through Embedded Memories 

    E-Print Network [OSTI]

    Gao, Yukun

    2015-04-29

    On-chip memory arrays are widely used in systems-on-chip. Prior research has shown that timing critical paths often go through these memories. Embedded memories are typically tested using memory built-in self-test and macro test. However...

  2. Memory search and the neural representation of context

    E-Print Network [OSTI]

    Polyn, Sean

    the most important behavioral observation in memory search is the finding that recent events are remembered

  3. Non-volatile memory for checkpoint storage

    DOE Patents [OSTI]

    Blumrich, Matthias A.; Chen, Dong; Cipolla, Thomas M.; Coteus, Paul W.; Gara, Alan; Heidelberger, Philip; Jeanson, Mark J.; Kopcsay, Gerard V.; Ohmacht, Martin; Takken, Todd E.

    2014-07-22

    A system, method and computer program product for supporting system initiated checkpoints in high performance parallel computing systems and storing of checkpoint data to a non-volatile memory storage device. The system and method generates selective control signals to perform checkpointing of system related data in presence of messaging activity associated with a user application running at the node. The checkpointing is initiated by the system such that checkpoint data of a plurality of network nodes may be obtained even in the presence of user applications running on highly parallel computers that include ongoing user messaging activity. In one embodiment, the non-volatile memory is a pluggable flash memory card.

  4. Securing non-volatile memory regions

    DOE Patents [OSTI]

    Faraboschi, Paolo; Ranganathan, Parthasarathy; Muralimanohar, Naveen

    2013-08-20

    Methods, apparatus and articles of manufacture to secure non-volatile memory regions are disclosed. An example method disclosed herein comprises associating a first key pair and a second key pair different than the first key pair with a process, using the first key pair to secure a first region of a non-volatile memory for the process, and using the second key pair to secure a second region of the non-volatile memory for the same process, the second region being different than the first region.

  5. Low Latency Messages on Distributed Memory Multiprocessors

    DOE Public Access Gateway for Energy & Science Beta (PAGES Beta)

    Rosing, Matt; Saltz, Joel

    1995-01-01

    This article describes many of the issues in developing an efficient interface for communication on distributed memory machines. Although the hardware component of message latency is less than 1 ws on many distributed memory machines, the software latency associated with sending and receiving typed messages is on the order of 50 ?s. The reason for this imbalance is that the software interface does not match the hardware. By changing the interface to match the hardware more closely, applications with fine grained communication can be put on these machines. This article describes several tests performed and many of the issues involvedmore »in supporting low latency messages on distributed memory machines.« less

  6. Direct access inter-process shared memory

    DOE Patents [OSTI]

    Brightwell, Ronald B; Pedretti, Kevin; Hudson, Trammell B

    2013-10-22

    A technique for directly sharing physical memory between processes executing on processor cores is described. The technique includes loading a plurality of processes into the physical memory for execution on a corresponding plurality of processor cores sharing the physical memory. An address space is mapped to each of the processes by populating a first entry in a top level virtual address table for each of the processes. The address space of each of the processes is cross-mapped into each of the processes by populating one or more subsequent entries of the top level virtual address table with the first entry in the top level virtual address table from other processes.

  7. A technique for human error analysis (ATHEANA)

    SciTech Connect (OSTI)

    Cooper, S.E.; Ramey-Smith, A.M.; Wreathall, J.; Parry, G.W. [and others

    1996-05-01

    Probabilistic risk assessment (PRA) has become an important tool in the nuclear power industry, both for the Nuclear Regulatory Commission (NRC) and the operating utilities. Human reliability analysis (HRA) is a critical element of PRA; however, limitations in the analysis of human actions in PRAs have long been recognized as a constraint when using PRA. A multidisciplinary HRA framework has been developed with the objective of providing a structured approach for analyzing operating experience and understanding nuclear plant safety, human error, and the underlying factors that affect them. The concepts of the framework have matured into a rudimentary working HRA method. A trial application of the method has demonstrated that it is possible to identify potentially significant human failure events from actual operating experience which are not generally included in current PRAs, as well as to identify associated performance shaping factors and plant conditions that have an observable impact on the frequency of core damage. A general process was developed, albeit in preliminary form, that addresses the iterative steps of defining human failure events and estimating their probabilities using search schemes. Additionally, a knowledge- base was developed which describes the links between performance shaping factors and resulting unsafe actions.

  8. RESEARCH ARTICLE Minimization of divergence error in volumetric velocity

    E-Print Network [OSTI]

    Marusic, Ivan

    RESEARCH ARTICLE Minimization of divergence error in volumetric velocity measurements Volumetric velocity measurements taken in incompressible fluids are typically hindered by a nonzero

  9. Electoral Corruption in Developing Democracies

    E-Print Network [OSTI]

    Cantu, Francisco

    Results . . . . . 5.2 Venezuela . . . . . . . . .5.2.1Results for each Forensic Analysis in Mexico, Venezuela andelections in Venezuela. . . . . . . . . . . . . . . . . . .

  10. The Cambridge Car Memory Test: A task matched in format to the Cambridge Face Memory Test, with norms, reliability,

    E-Print Network [OSTI]

    Duchaine, Bradley C.

    The Cambridge Car Memory Test: A task matched in format to the Cambridge Face Memory Test a prosopagnosic shows a face-specific or object- general deficit). Here, we present such a task. Our Cambridge Car higher than the mean for females. We demonstrate independence between face memory and car memory

  11. Space applications of shape memory alloys 

    E-Print Network [OSTI]

    Godard, Olivier Jean

    2002-01-01

    This work presents an investigation of two new possible space applications of shape memory alloys. The first application uses these alloys as active devices to optimally reorient solar panels in space. The thermal issues related to the actuation...

  12. An optical simulation of shared memory

    SciTech Connect (OSTI)

    Goldberg, L.A.; Matias, Y.; Rao, S.

    1994-06-01

    We present a work-optimal randomized algorithm for simulating a shared memory machine (PRAM) on an optical communication parallel computer (OCPC). The OCPC model is motivated by the potential of optical communication for parallel computation. The memory of an OCPC is divided into modules, one module per processor. Each memory module only services a request on a timestep if it receives exactly one memory request. Our algorithm simulates each step of an n lg lg n-processor EREW PRAM on an n-processor OCPC in O(lg lg n) expected delay. (The probability that the delay is longer than this is at most n{sup {minus}{alpha}} for any constant {alpha}). The best previous simulation, due to Valiant, required {Theta}(lg n) expected delay.

  13. An autoassociative model of recovery in memory 

    E-Print Network [OSTI]

    Cohen, Andrew L

    1996-01-01

    A model of memory is presented. The model is a neural system which utilizes an autoassociator trained via the Buhmann learning rule. Context plays a central role in the storage and recovery of stored items. Context is ...

  14. Commercialization of germanium based nanocrystal memory

    E-Print Network [OSTI]

    Seow, Kian Chiew

    2007-01-01

    This thesis explores the commercialization of germanium-based nanocrystal memories. Demand for smaller and faster electronics and embedded systems supports the development of high-density, low-power non-volatile electronic ...

  15. Hypergraph Partitioning for Automatic Memory Hierarchy Management

    SciTech Connect (OSTI)

    Krishnamoorthy, Sriram; Catalyurek, Umit; Nieplocha, Jarek; Rountev, Atanas; Sadayappan, Ponnuswamy

    2007-11-15

    The paper presents present a mechanism for automatic management of the memory hierarchy, including secondary storage, in the context of a global address space parallel programming framework. The programmer specifies the parallelism and locality in the computation. The scheduling of the computation into stages, together with the movement of the associated data between secondary storage and global memory, and between global memory and local memory, is automatically managed by the framework. A novel formulation of hypergraph partitioning is used to model the optimization problem of minimizing disk I/O by improving locality of access. Experimental evaluation of the proposed approach using a sub-computation from the quantum chemistry domain shows a reduction in the disk I/O cost by upto a factor of 11, and a reduction in turnaround time by upto 97%, as compared to alternatives used in state-of-the-art quantum chemistry codes.

  16. Size Effects in Ferromagnetic Shape Memory Alloys 

    E-Print Network [OSTI]

    Ozdemir, Nevin

    2012-07-16

    The utilization of ferromagnetic shape memory alloys (FSMAs) in small scale devices has attracted considerable attention within the last decade. However, the lack of sufficient studies on their reversible shape change ...

  17. Allegories of Modernity, Geographies of Memory 

    E-Print Network [OSTI]

    Jeon, Seenhwa

    2012-10-19

    with local and national history as alternative history lessons and challenges the Idea of Progress by revisiting sites of traumatic memory. Midnight's Children constructs counter-stories of Post-Independence India as multiple alternatives to one official...

  18. Memorial University Counselling Centre Professional Psychology

    E-Print Network [OSTI]

    Oyet, Alwell

    1 Memorial University Counselling Centre Doctoral Professional Psychology Residency Programme 2013-2014 Accredited by the Canadian Psychological Association www of Counseling Services (IACS) www.iacsinc.org Participating Member: Canadian Council of Professional Psychology

  19. Directoryless shared memory coherence using execution migration

    E-Print Network [OSTI]

    Lis, Mieszko

    We introduce the concept of deadlock-free migration-based coherent shared memory to the NUCA family of architectures. Migration-based architectures move threads among cores to guarantee sequential semantics in large ...

  20. Orthopaedic applications of ferromagnetic shape memory alloys

    E-Print Network [OSTI]

    Guo, Weimin, M. Eng. Massachusetts Institute of Technology

    2008-01-01

    Ferromagnetic shape memory alloys (FSMAs) are a new class of magnetic field-actuated active materials with no current commercial applications. By applying a magnetic field of around 0.4 T, they can exert a stress of ...

  1. Characterizing Flash Memory: Anomalies, Observations, and Applications

    E-Print Network [OSTI]

    Siegel, Paul H.

    these characteris- tics. Flash manufacturers provide conservative guidelines about these metrics, and this lack characteris- tics. To be successful, we must understand the trade-offs between flash memory's performance

  2. Housing memory: architecture, materiality and time 

    E-Print Network [OSTI]

    Spanou, Sofia-Irini

    2008-01-01

    , and cognition – and their intricate relationships with material culture, especially architecture, landscapes, practical action and social life, the aim is to suggest a theoretical and methodological framework within which to explore how memory of the past...

  3. Thermomechanical modeling of a shape memory polymer 

    E-Print Network [OSTI]

    Ghosh, Pritha B.

    2009-05-15

    The aim of this work is to demonstrate a Helmholtz potential based approach for the development of the constitutive equations for a shape memory polymer undergoing a thermomechanical cycle. The approach is motivated by the use of a simple spring...

  4. Distributed trace using central performance counter memory

    DOE Patents [OSTI]

    Satterfield, David L; Sexton, James C

    2013-10-22

    A plurality of processing cores, are central storage unit having at least memory connected in a daisy chain manner, forming a daisy chain ring layout on an integrated chip. At least one of the plurality of processing cores places trace data on the daisy chain connection for transmitting the trace data to the central storage unit, and the central storage unit detects the trace data and stores the trace data in the memory co-located in with the central storage unit.

  5. Associative memory in phasing neuron networks

    SciTech Connect (OSTI)

    Nair, Niketh S [ORNL; Bochove, Erik J. [United States Air Force Research Laboratory, Kirtland Air Force Base; Braiman, Yehuda [ORNL

    2014-01-01

    We studied pattern formation in a network of coupled Hindmarsh-Rose model neurons and introduced a new model for associative memory retrieval using networks of Kuramoto oscillators. Hindmarsh-Rose Neural Networks can exhibit a rich set of collective dynamics that can be controlled by their connectivity. Specifically, we showed an instance of Hebb's rule where spiking was correlated with network topology. Based on this, we presented a simple model of associative memory in coupled phase oscillators.

  6. An electromagnetic analog of gravitational wave memory

    E-Print Network [OSTI]

    Lydia Bieri; David Garfinkle

    2013-09-10

    We present an electromagnetic analog of gravitational wave memory. That is, we consider what change has occurred to a detector of electromagnetic radiation after the wave has passed. Rather than a distortion in the detector, as occurs in the gravitational wave case, we find a residual velocity (a "kick") to the charges in the detector. In analogy with the two types of gravitational wave memory ("ordinary" and "nonlinear") we find two types of electromagnetic kick.

  7. Distributed trace using central performance counter memory

    DOE Patents [OSTI]

    Satterfield, David L.; Sexton, James C.

    2013-01-22

    A plurality of processing cores, are central storage unit having at least memory connected in a daisy chain manner, forming a daisy chain ring layout on an integrated chip. At least one of the plurality of processing cores places trace data on the daisy chain connection for transmitting the trace data to the central storage unit, and the central storage unit detects the trace data and stores the trace data in the memory co-located in with the central storage unit.

  8. Aggressive children's memory for attachment relevant information 

    E-Print Network [OSTI]

    Collie, Claire Futamase

    2004-09-30

    MEMORY FOR ATTACHMENT RELEVANT INFORMATION A Dissertation by CLAIRE FUTAMASE COLLIE Submitted to the Office of Graduate Studies of Texas A&M University in partial fulfillment of the requirements for the degree of DOCTOR... OF PHILOSOPHY May 2004 Major Subject: Psychology AGGRESSIVE CHILDREN?S MEMORY FOR ATTACHMENT RELEVANT INFORMATION A Dissertation by CLAIRE FUTAMASE COLLIE Submitted to Texas A&M University in partial...

  9. Gravitational wave memory in de Sitter spacetime

    E-Print Network [OSTI]

    Bieri, Lydia; Yau, Shing-Tung

    2015-01-01

    We examine gravitational wave memory in the case where sources and detector are in an expanding cosmology. For simplicity, we treat the case where the cosmology is de Sitter spacetime, and discuss the possibility of generalizing our results to the case of a more realistic cosmology. We find results very similar to those of gravitational wave memory in an asymptotically flat spacetime, but with the magnitude of the effect multiplied by a redshift factor.

  10. Post polymerization cure shape memory polymers

    DOE Patents [OSTI]

    Wilson, Thomas S; Hearon, Michael Keith; Bearinger, Jane P

    2014-11-11

    This invention relates to chemical polymer compositions, methods of synthesis, and fabrication methods for devices regarding polymers capable of displaying shape memory behavior (SMPs) and which can first be polymerized to a linear or branched polymeric structure, having thermoplastic properties, subsequently processed into a device through processes typical of polymer melts, solutions, and dispersions and then crossed linked to a shape memory thermoset polymer retaining the processed shape.

  11. Low latency memory access and synchronization

    DOE Patents [OSTI]

    Blumrich, Matthias A. (Ridgefield, CT); Chen, Dong (Croton On Hudson, NY); Coteus, Paul W. (Yorktown Heights, NY); Gara, Alan G. (Mount Kisco, NY); Giampapa, Mark E. (Irvington, NY); Heidelberger, Philip (Cortlandt Manor, NY); Hoenicke, Dirk (Ossining, NY); Ohmacht, Martin (Brewster, NY); Steinmacher-Burow, Burkhard D. (Mount Kisco, NY); Takken, Todd E. (Mount Kisco, NY); Vranas, Pavlos M. (Bedford Hills, NY)

    2007-02-06

    A low latency memory system access is provided in association with a weakly-ordered multiprocessor system. Each processor in the multiprocessor shares resources, and each shared resource has an associated lock within a locking device that provides support for synchronization between the multiple processors in the multiprocessor and the orderly sharing of the resources. A processor only has permission to access a resource when it owns the lock associated with that resource, and an attempt by a processor to own a lock requires only a single load operation, rather than a traditional atomic load followed by store, such that the processor only performs a read operation and the hardware locking device performs a subsequent write operation rather than the processor. A simple prefetching for non-contiguous data structures is also disclosed. A memory line is redefined so that in addition to the normal physical memory data, every line includes a pointer that is large enough to point to any other line in the memory, wherein the pointers to determine which memory line to prefetch rather than some other predictive algorithm. This enables hardware to effectively prefetch memory access patterns that are non-contiguous, but repetitive.

  12. Low latency memory access and synchronization

    DOE Patents [OSTI]

    Blumrich, Matthias A. (Ridgefield, CT); Chen, Dong (Croton On Hudson, NY); Coteus, Paul W. (Yorktown Heights, NY); Gara, Alan G. (Mount Kisco, NY); Giampapa, Mark E. (Irvington, NY); Heidelberger, Philip (Cortlandt Manor, NY); Hoenicke, Dirk (Ossining, NY); Ohmacht, Martin (Brewster, NY); Steinmacher-Burow, Burkhard D. (Mount Kisco, NY); Takken, Todd E. (Mount Kisco, NY), Vranas; Pavlos M. (Bedford Hills, NY)

    2010-10-19

    A low latency memory system access is provided in association with a weakly-ordered multiprocessor system. Bach processor in the multiprocessor shares resources, and each shared resource has an associated lock within a locking device that provides support for synchronization between the multiple processors in the multiprocessor and the orderly sharing of the resources. A processor only has permission to access a resource when it owns the lock associated with that resource, and an attempt by a processor to own a lock requires only a single load operation, rather than a traditional atomic load followed by store, such that the processor only performs a read operation and the hardware locking device performs a subsequent write operation rather than the processor. A simple prefetching for non-contiguous data structures is also disclosed. A memory line is redefined so that in addition to the normal physical memory data, every line includes a pointer that is large enough to point to any other line in the memory, wherein the pointers to determine which memory line to prefetch rather than some other predictive algorithm. This enables hardware to effectively prefetch memory access patterns that are non-contiguous, but repetitive.

  13. BRIDGING THE GAP BETWEEN BRAIN AND BEHAVIOR: COGNITIVE AND NEURAL MECHANISMS OF EPISODIC MEMORY

    E-Print Network [OSTI]

    Fortin, Norbert J.

    memory. Key words: episodic memory, hippocampus, recollection, associations, odor discrimination, digging of cognitive neuroscience. Aristotle (1931) contended that ``other ani- mals (as well as man) have memory, but

  14. Low-level software security : exploiting memory safety vulnerabilities and assumptions

    E-Print Network [OSTI]

    Checkoway, Stephen

    2012-01-01

    memory cartridge slots . . . . . . . . . . . . . . . . .by means of a memory cartridge containing a specially-by means of a memory cartridge containing a specially-

  15. Mutual information, bit error rate and security in Wójcik's scheme

    E-Print Network [OSTI]

    Zhanjun Zhang

    2004-02-21

    In this paper the correct calculations of the mutual information of the whole transmission, the quantum bit error rate (QBER) are presented. Mistakes of the general conclusions relative to the mutual information, the quantum bit error rate (QBER) and the security in W\\'{o}jcik's paper [Phys. Rev. Lett. {\\bf 90}, 157901(2003)] have been pointed out.

  16. Kernel Regression with Correlated Errors K. De Brabanter

    E-Print Network [OSTI]

    Kernel Regression with Correlated Errors K. De Brabanter , J. De Brabanter , , J.A.K. Suykens B: It is a well-known problem that obtaining a correct bandwidth in nonparametric regression is difficult support vector machines for regression. Keywords: nonparametric regression, correlated errors, short

  17. Ridge Regression Estimation Approach to Measurement Error Model

    E-Print Network [OSTI]

    Shalabh

    Ridge Regression Estimation Approach to Measurement Error Model A.K.Md. Ehsanes Saleh Carleton of the regression parameters is ill conditioned. We consider the Hoerl and Kennard type (1970) ridge regression (RR) modifications of the five quasi- empirical Bayes estimators of the regression parameters of a measurement error

  18. Solving LWE problem with bounded errors in polynomial time

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    Solving LWE problem with bounded errors in polynomial time Jintai Ding1,2 Southern Chinese call the learning with bounded errors (LWBE) problems, we can solve it with complexity O(nD ). Keywords, this problem corresponds to the learning parity with noise (LPN) problem. There are several ways to solve

  19. ERROR-TOLERANT MULTI-MODAL SENSOR FUSION Farinaz Koushanfar*

    E-Print Network [OSTI]

    Potkonjak, Miodrag

    ERROR-TOLERANT MULTI-MODAL SENSOR FUSION Farinaz Koushanfar* , Sasha Slijepcevic , Miodrag is multi-modal sensor fusion, where data from sensors of dif- ferent modalities are combined in order applications, including multi- modal sensor fusion, is to ensure that all of the techniques and tools are error

  20. Fault-Tolerant Error Correction with the Gauge Color Code

    E-Print Network [OSTI]

    Benjamin J. Brown; Naomi H. Nickerson; Dan E. Browne

    2015-08-03

    The gauge color code is a quantum error-correcting code with local syndrome measurements that, remarkably, admits a universal transversal gate set without the need for resource-intensive magic state distillation. A result of recent interest, proposed by Bomb\\'{i}n, shows that the subsystem structure of the gauge color code admits an error-correction protocol that achieves tolerance to noisy measurements without the need for repeated measurements, so called single-shot error correction. Here, we demonstrate the promise of single-shot error correction by designing a two-part decoder and investigate its performance. We simulate fault-tolerant error correction with the gauge color code by repeatedly applying our proposed error-correction protocol to deal with errors that occur continuously to the underlying physical qubits of the code over the duration that quantum information is stored. We estimate a sustainable error rate, i.e. the threshold for the long time limit, of $ \\sim 0.31\\%$ for a phenomenological noise model using a simple decoding algorithm.

  1. Error detection through consistency checking Peng Gong* Lan Mu#

    E-Print Network [OSTI]

    Silver, Whendee

    Error detection through consistency checking Peng Gong* Lan Mu# *Center for Assessment & Monitoring Hall, University of California, Berkeley, Berkeley, CA 94720-3110 gong@nature.berkeley.edu mulan, accessibility, and timeliness as recorded in the lineage data (Chen and Gong, 1998). Spatial error refers

  2. Analysis of Probabilistic Error Checking Procedures on Storage Systems

    E-Print Network [OSTI]

    Chen, Ing-Ray

    Analysis of Probabilistic Error Checking Procedures on Storage Systems ING-RAY CHEN AND I.-LING YEN Email: irchen@iie.ncku.edu.tw Conventionally, error checking on storage systems is performed on-the-fly (with probability 1) as the storage system is being accessed in order to improve the reliability

  3. ADJOINT AND DEFECT ERROR BOUNDING AND CORRECTION FOR FUNCTIONAL ESTIMATES

    E-Print Network [OSTI]

    Pierce, Niles A.

    decades. Integral functionals also arise in other aerospace areas such as the calculation of radar cross functional that results from residual errors in approximating the solution to the partial differential to handle flows with shocks; numerical experiments confirm 4th order error estimates for a pressure integral

  4. Kinematic Error Correction for Minimally Invasive Surgical Robots

    E-Print Network [OSTI]

    in two likely sources of kinematic error: port displacement and instrument shaft flexion. For a quasi. To reach the surgical site near the chest wall, the instrument shaft applies significant torque to the port, and the instrument shaft to bend. These kinematic errors impair positioning of the robot and cause deviations from

  5. Using error correction to determine the noise model

    E-Print Network [OSTI]

    M. Laforest; D. Simon; J. -C. Boileau; J. Baugh; M. Ditty; R. Laflamme

    2007-01-25

    Quantum error correcting codes have been shown to have the ability of making quantum information resilient against noise. Here we show that we can use quantum error correcting codes as diagnostics to characterise noise. The experiment is based on a three-bit quantum error correcting code carried out on a three-qubit nuclear magnetic resonance (NMR) quantum information processor. Utilizing both engineered and natural noise, the degree of correlations present in the noise affecting a two-qubit subsystem was determined. We measured a correlation factor of c=0.5+/-0.2 using the error correction protocol, and c=0.3+/-0.2 using a standard NMR technique based on coherence pathway selection. Although the error correction method demands precise control, the results demonstrate that the required precision is achievable in the liquid-state NMR setting.

  6. Error Control of Iterative Linear Solvers for Integrated Groundwater Models

    E-Print Network [OSTI]

    Dixon, Matthew; Brush, Charles; Chung, Francis; Dogrul, Emin; Kadir, Tariq

    2010-01-01

    An open problem that arises when using modern iterative linear solvers, such as the preconditioned conjugate gradient (PCG) method or Generalized Minimum RESidual method (GMRES) is how to choose the residual tolerance in the linear solver to be consistent with the tolerance on the solution error. This problem is especially acute for integrated groundwater models which are implicitly coupled to another model, such as surface water models, and resolve both multiple scales of flow and temporal interaction terms, giving rise to linear systems with variable scaling. This article uses the theory of 'forward error bound estimation' to show how rescaling the linear system affects the correspondence between the residual error in the preconditioned linear system and the solution error. Using examples of linear systems from models developed using the USGS GSFLOW package and the California State Department of Water Resources' Integrated Water Flow Model (IWFM), we observe that this error bound guides the choice of a prac...

  7. Shape memory system with integrated actuation using embedded particles

    DOE Patents [OSTI]

    Buckley, Patrick R. (New York, NY); Maitland, Duncan J. (Pleasant Hill, CA)

    2009-09-22

    A shape memory material with integrated actuation using embedded particles. One embodiment provides a shape memory material apparatus comprising a shape memory material body and magnetic pieces in the shape memory material body. Another embodiment provides a method of actuating a device to perform an activity on a subject comprising the steps of positioning a shape memory material body in a desired position with regard to the subject, the shape memory material body capable of being formed in a specific primary shape, reformed into a secondary stable shape, and controllably actuated to recover the specific primary shape; including pieces in the shape memory material body; and actuating the shape memory material body using the pieces causing the shape memory material body to be controllably actuated to recover the specific primary shape and perform the activity on the subject.

  8. Shape memory system with integrated actuation using embedded particles

    DOE Patents [OSTI]

    Buckley, Patrick R. (New York, NY); Maitland, Duncan J. (Pleasant Hill, CA)

    2012-05-29

    A shape memory material with integrated actuation using embedded particles. One embodiment provides a shape memory material apparatus comprising a shape memory material body and magnetic pieces in the shape memory material body. Another embodiment provides a method of actuating a device to perform an activity on a subject comprising the steps of positioning a shape memory material body in a desired position with regard to the subject, the shape memory material body capable of being formed in a specific primary shape, reformed into a secondary stable shape, and controllably actuated to recover the specific primary shape; including pieces in the shape memory material body; and actuating the shape memory material body using the pieces causing the shape memory material body to be controllably actuated to recover the specific primary shape and perform the activity on the subject.

  9. Shape memory system with integrated actuation using embedded particles

    DOE Patents [OSTI]

    Buckley, Patrick R; Maitland, Duncan J

    2014-04-01

    A shape memory material with integrated actuation using embedded particles. One embodiment provides a shape memory material apparatus comprising a shape memory material body and magnetic pieces in the shape memory material body. Another embodiment provides a method of actuating a device to perform an activity on a subject comprising the steps of positioning a shape memory material body in a desired position with regard to the subject, the shape memory material body capable of being formed in a specific primary shape, reformed into a secondary stable shape, and controllably actuated to recover the specific primary shape; including pieces in the shape memory material body; and actuating the shape memory material body using the pieces causing the shape memory material body to be controllably actuated to recover the specific primary shape and perform the activity on the subject.

  10. Space-Memory-Memory Architecture for Clos-Network Packet Switches

    E-Print Network [OSTI]

    Hamdi, Mounir

    resequencing buffers. As a result, the SMM architecture can achieve very high performance, and is readily implemented using current technology. I. INTRODUCTION The Clos network architecture [1] was first proposedSpace-Memory-Memory Architecture for Clos-Network Packet Switches Xin Li, Zhen Zhou and Mounir

  11. This article was downloaded by:[Yale University Sterling Memorial Library] [Yale University Sterling Memorial Library

    E-Print Network [OSTI]

    Richardson, Andrew D.

    , formulae and drug doses should be independently verified with primary sources. The publisher shallThis article was downloaded by:[Yale University Sterling Memorial Library] [Yale University Sterling Memorial Library] On: 11 May 2007 Access Details: [subscription number 769486266] Publisher

  12. Low-temperature coherence properties of Z_2 quantum memory

    E-Print Network [OSTI]

    Tomoyuki Morimae

    2010-01-08

    We investigate low-temperature coherence properties of the Z_2 quantum memory which is capable of storing the information of a single logical qubit. We show that the memory has superposition of macroscopically distinct states for some values of a control parameter and at sufficiently low temperature, and that the code states of this memory have no instability except for the inevitable one. However, we also see that the coherence power of this memory is limited by space and time. We also briefly discuss the RVB memory, which is an improvement of the Z_2 quantum memory, and the relations of our results to the obscured symmetry breaking in statistical physics.

  13. Slope Error Measurement Tool for Solar Parabolic Trough Collectors: Preprint

    SciTech Connect (OSTI)

    Stynes, J. K.; Ihas, B.

    2012-04-01

    The National Renewable Energy Laboratory (NREL) has developed an optical measurement tool for parabolic solar collectors that measures the combined errors due to absorber misalignment and reflector slope error. The combined absorber alignment and reflector slope errors are measured using a digital camera to photograph the reflected image of the absorber in the collector. Previous work using the image of the reflection of the absorber finds the reflector slope errors from the reflection of the absorber and an independent measurement of the absorber location. The accuracy of the reflector slope error measurement is thus dependent on the accuracy of the absorber location measurement. By measuring the combined reflector-absorber errors, the uncertainty in the absorber location measurement is eliminated. The related performance merit, the intercept factor, depends on the combined effects of the absorber alignment and reflector slope errors. Measuring the combined effect provides a simpler measurement and a more accurate input to the intercept factor estimate. The minimal equipment and setup required for this measurement technique make it ideal for field measurements.

  14. Catastrophic photometric redshift errors: Weak-lensing survey requirements

    DOE Public Access Gateway for Energy & Science Beta (PAGES Beta)

    Bernstein, Gary; Huterer, Dragan

    2010-01-11

    We study the sensitivity of weak lensing surveys to the effects of catastrophic redshift errors - cases where the true redshift is misestimated by a significant amount. To compute the biases in cosmological parameters, we adopt an efficient linearized analysis where the redshift errors are directly related to shifts in the weak lensing convergence power spectra. We estimate the number Nspec of unbiased spectroscopic redshifts needed to determine the catastrophic error rate well enough that biases in cosmological parameters are below statistical errors of weak lensing tomography. While the straightforward estimate of Nspec is ~106 we find that using onlymore »the photometric redshifts with z ? 2.5 leads to a drastic reduction in Nspec to ~ 30,000 while negligibly increasing statistical errors in dark energy parameters. Therefore, the size of spectroscopic survey needed to control catastrophic errors is similar to that previously deemed necessary to constrain the core of the zs – zp distribution. We also study the efficacy of the recent proposal to measure redshift errors by cross-correlation between the photo-z and spectroscopic samples. We find that this method requires ~ 10% a priori knowledge of the bias and stochasticity of the outlier population, and is also easily confounded by lensing magnification bias. In conclusion, the cross-correlation method is therefore unlikely to supplant the need for a complete spectroscopic redshift survey of the source population.« less

  15. Balancing aggregation and smoothing errors in inverse models

    DOE Public Access Gateway for Energy & Science Beta (PAGES Beta)

    Turner, A. J.; Jacob, D. J.

    2015-01-13

    Inverse models use observations of a system (observation vector) to quantify the variables driving that system (state vector) by statistical optimization. When the observation vector is large, such as with satellite data, selecting a suitable dimension for the state vector is a challenge. A state vector that is too large cannot be effectively constrained by the observations, leading to smoothing error. However, reducing the dimension of the state vector leads to aggregation error as prior relationships between state vector elements are imposed rather than optimized. Here we present a method for quantifying aggregation and smoothing errors as a function ofmore »state vector dimension, so that a suitable dimension can be selected by minimizing the combined error. Reducing the state vector within the aggregation error constraints can have the added advantage of enabling analytical solution to the inverse problem with full error characterization. We compare three methods for reducing the dimension of the state vector from its native resolution: (1) merging adjacent elements (grid coarsening), (2) clustering with principal component analysis (PCA), and (3) applying a Gaussian mixture model (GMM) with Gaussian pdfs as state vector elements on which the native-resolution state vector elements are projected using radial basis functions (RBFs). The GMM method leads to somewhat lower aggregation error than the other methods, but more importantly it retains resolution of major local features in the state vector while smoothing weak and broad features.« less

  16. Balancing aggregation and smoothing errors in inverse models

    DOE Public Access Gateway for Energy & Science Beta (PAGES Beta)

    Turner, A. J.; Jacob, D. J.

    2015-06-30

    Inverse models use observations of a system (observation vector) to quantify the variables driving that system (state vector) by statistical optimization. When the observation vector is large, such as with satellite data, selecting a suitable dimension for the state vector is a challenge. A state vector that is too large cannot be effectively constrained by the observations, leading to smoothing error. However, reducing the dimension of the state vector leads to aggregation error as prior relationships between state vector elements are imposed rather than optimized. Here we present a method for quantifying aggregation and smoothing errors as a function ofmore »state vector dimension, so that a suitable dimension can be selected by minimizing the combined error. Reducing the state vector within the aggregation error constraints can have the added advantage of enabling analytical solution to the inverse problem with full error characterization. We compare three methods for reducing the dimension of the state vector from its native resolution: (1) merging adjacent elements (grid coarsening), (2) clustering with principal component analysis (PCA), and (3) applying a Gaussian mixture model (GMM) with Gaussian pdfs as state vector elements on which the native-resolution state vector elements are projected using radial basis functions (RBFs). The GMM method leads to somewhat lower aggregation error than the other methods, but more importantly it retains resolution of major local features in the state vector while smoothing weak and broad features.« less

  17. Measuring worst-case errors in a robot workcell

    SciTech Connect (OSTI)

    Simon, R.W.; Brost, R.C.; Kholwadwala, D.K. [Sandia National Labs., Albuquerque, NM (United States). Intelligent Systems and Robotics Center

    1997-10-01

    Errors in model parameters, sensing, and control are inevitably present in real robot systems. These errors must be considered in order to automatically plan robust solutions to many manipulation tasks. Lozano-Perez, Mason, and Taylor proposed a formal method for synthesizing robust actions in the presence of uncertainty; this method has been extended by several subsequent researchers. All of these results presume the existence of worst-case error bounds that describe the maximum possible deviation between the robot`s model of the world and reality. This paper examines the problem of measuring these error bounds for a real robot workcell. These measurements are difficult, because of the desire to completely contain all possible deviations while avoiding bounds that are overly conservative. The authors present a detailed description of a series of experiments that characterize and quantify the possible errors in visual sensing and motion control for a robot workcell equipped with standard industrial robot hardware. In addition to providing a means for measuring these specific errors, these experiments shed light on the general problem of measuring worst-case errors.

  18. Emotional Arsoual and Modulation of Multiple Memory Systems: Effects of Unconditioned and Conditioned Stressors 

    E-Print Network [OSTI]

    Leong, Kah-Chung

    2014-09-18

    importantly, the different types of memory are mediated by different neuroanatomical regions. Two primary memory systems are the hippocampus-dependent cognitive memory system and the dorsolateral striatum-dependent habit memory system. Interestingly...

  19. Wind Power Forecasting Error Distributions: An International Comparison; Preprint

    SciTech Connect (OSTI)

    Hodge, B. M.; Lew, D.; Milligan, M.; Holttinen, H.; Sillanpaa, S.; Gomez-Lazaro, E.; Scharff, R.; Soder, L.; Larsen, X. G.; Giebel, G.; Flynn, D.; Dobschinski, J.

    2012-09-01

    Wind power forecasting is expected to be an important enabler for greater penetration of wind power into electricity systems. Because no wind forecasting system is perfect, a thorough understanding of the errors that do occur can be critical to system operation functions, such as the setting of operating reserve levels. This paper provides an international comparison of the distribution of wind power forecasting errors from operational systems, based on real forecast data. The paper concludes with an assessment of similarities and differences between the errors observed in different locations.

  20. Field effect memory alloy heat engine

    SciTech Connect (OSTI)

    Johnson, A.D.; Kirkpatrick, P.F.

    1981-08-04

    A heat engine employing a memory alloy and a force field such as gravity for converting heat energy into mechanical work is disclosed. Field effect elements are mounted on the distal ends of flexible spokes which in turn are mounted about a hub to form a rotating wheel. The memory alloy is in the form of a helix disposed about the circumference of the wheel and interconnecting the ends of adjacent spoke pairs. Heat is transferred to segments of the memory alloy on one side of the wheel so that the segments deform toward their memory shape and deflect the associated spokes toward each other. Heat is transferred away from the memory alloy segments on the opposite side so that the segments deform toward their trained shape and permit the spokes to flex apart. The concentration of field effect elements on the first side of the wheel is greater than the concentration on the other side so that the resultant force created by a remote field acts as a torque for rotating the wheel.

  1. The Aesthetics of Remembering 9/11: Towards a Transnational Typology of Memorials

    E-Print Network [OSTI]

    Gessner, Ingrid

    2015-01-01

    Memorial (Fort Carson) Connecticut Alexander R. SteinmanNursery School (Easton) Connecticut’s 9/11 Living Memorial (

  2. The Aesthetics of Remembering 9/11: Towards a Transnational Typology of Memorials

    E-Print Network [OSTI]

    Gessner, Ingrid

    2015-01-01

    Run Park The National 9/11 Pentagon Memorial Florida Friendship Park 9/11 Memorial (Redington Beach) Indian River

  3. Hydrodynamical random walker with chemotactic memory

    E-Print Network [OSTI]

    H. Mohammady; B. Esckandariun; A. Najafi

    2014-10-01

    A three-dimensional hydrodynamical model for a micro random walker is combined with the idea of chemotactic signaling network of E. coli. Diffusion exponents, orientational correlation functions and their dependence on the geometrical and dynamical parameters of the system are analyzed numerically. Because of the chemotactic memory, the walker shows superdiffusing displacements in all directions with the largest diffusion exponent for a direction along the food gradient. Mean square displacements and orientational correlation functions show that the chemotactic memory washes out all the signatures due to the geometrical asymmetry of the walker and statistical properties are asymmetric only with respect to the direction of food gradient. For different values of the memory time, the Chemotactic index (CI) is also calculated.

  4. Memory device using movement of protons

    DOE Patents [OSTI]

    Warren, W.L.; Vanheusden, K.J.R.; Fleetwood, D.M.; Devine, R.A.B.

    1998-11-03

    An electrically written memory element is disclosed utilizing the motion of protons within a dielectric layer surrounded by layers on either side to confine the protons within the dielectric layer with electrode means attached to the surrounding layers to change the spatial position of the protons within the dielectric layer. The device is preferably constructed as a silicon-silicon dioxide-silicon layered structure with the protons being introduced to the structure laterally through the exposed edges of the silicon dioxide layer during a high temperature anneal in an atmosphere containing hydrogen gas. The device operates at low power, is preferably nonvolatile, is radiation tolerant, and is compatible with convention silicon MOS processing for integration with other microelectronic elements on the same silicon substrate. With the addition of an optically active layer, the memory element becomes an electrically written, optically read optical memory element. 19 figs.

  5. Memory device using movement of protons

    DOE Patents [OSTI]

    Warren, William L. (Albuquerque, NM); Vanheusden, Karel J. R. (Albuquerque, NM); Fleetwood, Daniel M. (Albuquerque, NM); Devine, Roderick A. B. (St. Martin le Vinoux, FR)

    1998-01-01

    An electrically written memory element utilizing the motion of protons within a dielectric layer surrounded by layers on either side to confine the protons within the dielectric layer with electrode means attached to the surrounding layers to change the spatial position of the protons within the dielectric layer. The device is preferably constructed as a silicon-silicon dioxide-silicon layered structure with the protons being introduced to the structure laterally through the exposed edges of the silicon dioxide layer during a high temperature anneal in an atmosphere containing hydrogen gas. The device operates at low power, is preferably nonvolatile, is radiation tolerant, and is compatible with convention silicon MOS processing for integration with other microelectronic elements on the same silicon substrate. With the addition of an optically active layer, the memory element becomes an electrically written, optically read optical memory element.

  6. Memory device using movement of protons

    DOE Patents [OSTI]

    Warren, William L. (Albuquerque, NM); Vanheusden, Karel J. R. (Albuquerque, NM); Fleetwood, Daniel M. (Albuquerque, NM); Devine, Roderick A. B. (St. Martin le Vinoux, FR)

    2000-01-01

    An electrically written memory element utilizing the motion of protons within a dielectric layer surrounded by layers on either side to confine the protons within the dielectric layer with electrode means attached to the surrounding layers to change the spatial position of the protons within the dielectric layer. The device is preferably constructed as a silicon-silicon dioxide-silicon layered structure with the protons being introduced to the structure laterally through the exposed edges of the silicon dioxide layer during a high temperature anneal in an atmosphere containing hydrogen gas. The device operates at low power, is preferably nonvolatile, is radiation tolerant, and is compatible with convention silicon MOS processing for integration with other microelectronic elements on the same silicon substrate. With the addition of an optically active layer, the memory element becomes an electrically written, optically read optical memory element.

  7. A complete Randomized Benchmarking Protocol accounting for Leakage Errors

    E-Print Network [OSTI]

    T. Chasseur; F. K. Wilhelm

    2015-07-09

    Randomized Benchmarking allows to efficiently and scalably characterize the average error of an unitary 2-design such as the Clifford group $\\mathcal{C}$ on a physical candidate for quantum computation, as long as there are no non-computational leakage levels in the system. We investigate the effect of leakage errors on Randomized Benchmarking induced from an additional level per physical qubit and provide a modified protocol that allows to derive reliable estimates for the error per gate in their presence. We assess the variance of the sequence fidelity corresponding to the number of random sequences needed for valid fidelity estimation. Our protocol allows for gate dependent error channels without being restricted to perturbations. We show that our protocol is compatible with Interleaved Randomized Benchmarking and expand to benchmarking of arbitrary gates. This setting is relevant for superconducting transmon qubits, among other systems.

  8. Honest Confidence Intervals for the Error Variance in Stepwise Regression

    E-Print Network [OSTI]

    Stine, Robert A.

    Honest Confidence Intervals for the Error Variance in Stepwise Regression Dean P. Foster and Robert alternatives are used. These simpler algorithms (e.g., forward or backward stepwise regression) obtain

  9. Servo control booster system for minimizing following error

    DOE Patents [OSTI]

    Wise, William L. (Mountain View, CA)

    1985-01-01

    A closed-loop feedback-controlled servo system is disclosed which reduces command-to-response error to the system's position feedback resolution least increment, .DELTA.S.sub.R, on a continuous real-time basis for all operating speeds. The servo system employs a second position feedback control loop on a by exception basis, when the command-to-response error .gtoreq..DELTA.S.sub.R, to produce precise position correction signals. When the command-to-response error is less than .DELTA.S.sub.R, control automatically reverts to conventional control means as the second position feedback control loop is disconnected, becoming transparent to conventional servo control means. By operating the second unique position feedback control loop used herein at the appropriate clocking rate, command-to-response error may be reduced to the position feedback resolution least increment. The present system may be utilized in combination with a tachometer loop for increased stability.

  10. Removing Systematic Errors from Rotating Shadowband Pyranometer Data Frank Vignola

    E-Print Network [OSTI]

    Oregon, University of

    of the pyranometer to briefly shade the pyranometer once a minute. Direct hori- zontal irradiance is calculated used in programs evaluating the performance of photovoltaic systems, and systematic errors in the data

  11. Error estimation and adaptive mesh refinement for aerodynamic flows

    E-Print Network [OSTI]

    Hartmann, Ralf

    Error estimation and adaptive mesh refinement for aerodynamic flows Ralf Hartmann1 and Paul Houston, 38108 Braunschweig, Germany Ralf.Hartmann@dlr.de 2 School of Mathematical Sciences University

  12. MULTITARGET ERROR ESTIMATION AND ADAPTIVITY IN AERODYNAMIC FLOW SIMULATIONS

    E-Print Network [OSTI]

    Hartmann, Ralf

    MULTI­TARGET ERROR ESTIMATION AND ADAPTIVITY IN AERODYNAMIC FLOW SIMULATIONS RALF HARTMANN of Scientific Computing, TU Braunschweig, Germany (Ralf.Hartmann@dlr.de). 1 #12; 2 R. HARTMANN

  13. Error estimation and adaptive mesh refinement for aerodynamic flows

    E-Print Network [OSTI]

    Hartmann, Ralf

    Error estimation and adaptive mesh refinement for aerodynamic flows Ralf Hartmann, Joachim Held), Lilien- thalplatz 7, 38108 Braunschweig, Germany, e-mail: Ralf.Hartmann@dlr.de 1 #12;2 Ralf Hartmann

  14. MULTITARGET ERROR ESTIMATION AND ADAPTIVITY IN AERODYNAMIC FLOW SIMULATIONS

    E-Print Network [OSTI]

    Hartmann, Ralf

    MULTITARGET ERROR ESTIMATION AND ADAPTIVITY IN AERODYNAMIC FLOW SIMULATIONS RALF HARTMANN Abstract, Germany (Ralf.Hartmann@dlr.de). 1 #12;2 R. HARTMANN quantity under consideration. However, in many

  15. Inflated applicants: Attribution errors in performance evaluation by professionals

    E-Print Network [OSTI]

    Swift, Samuel; Moore, Don; Sharek, Zachariah; Gino, Francesca

    2013-01-01

    performance among applicants from each ‘‘type’’ of school.and interview performance. Each school provided multi-yearschool, PLOS ONE | www.plosone.org July 2013 | Volume 8 | Issue 7 | e69258 Attribution Errors in Performance

  16. Wind Power Forecasting Error Distributions over Multiple Timescales: Preprint

    SciTech Connect (OSTI)

    Hodge, B. M.; Milligan, M.

    2011-03-01

    In this paper, we examine the shape of the persistence model error distribution for ten different wind plants in the ERCOT system over multiple timescales. Comparisons are made between the experimental distribution shape and that of the normal distribution.

  17. On Student's 1908 Article "The Probable Error of a Mean"

    E-Print Network [OSTI]

    Kim, Jong-Min

    's "attention" resulted in a report, "The Application of the `Law of Error' to the work of the Brewery" dated No] and other records available in their Dublin brewery"; see Pearson 1939, p. 213.) Unable to find

  18. Performance optimizations for compiler-based error detection 

    E-Print Network [OSTI]

    Mitropoulou, Konstantina

    2015-06-29

    The trend towards smaller transistor technologies and lower operating voltages stresses the hardware and makes transistors more susceptible to transient errors. In future systems, performance and power gains will come ...

  19. Efficient Semiparametric Estimators for Biological, Genetic, and Measurement Error Applications 

    E-Print Network [OSTI]

    Garcia, Tanya

    2012-10-19

    Many statistical models, like measurement error models, a general class of survival models, and a mixture data model with random censoring, are semiparametric where interest lies in estimating finite-dimensional parameters ...

  20. Error bars for linear and nonlinear neural network regression models

    E-Print Network [OSTI]

    Penny, Will

    Error bars for linear and nonlinear neural network regression models William D. Penny and Stephen J College of Science, Technology and Medicine, London SW7 2BT., U.K. w.penny@ic.ac.uk, s

  1. NOVELTY, CONFIDENCE & ERRORS IN CONNECTIONIST Stephen J. Roberts & William Penny

    E-Print Network [OSTI]

    Roberts, Stephen

    d NOVELTY, CONFIDENCE & ERRORS IN CONNECTIONIST SYSTEMS Stephen J. Roberts & William Penny Neural, Technology & Medicine London, UK s.j.roberts@ic.ac.uk, w.penny@ic.ac.uk April 21, 1997 Abstract Key words

  2. Predicting Intentional Tax Error Using Open Source Literature and Data

    E-Print Network [OSTI]

    for each PUMS respondent (or agent), in certain line item/taxpayer categories, allowing us to construct dis-Likelihood . . . . . . . . . . . . . . . . . . . . . . . . . 12 5 Results of Meta-Analysis 12 6 Intentional Error in Line Items/Taxpayer Categories 13 6

  3. Characterization of Shape Memory Alloys Using Artificial Neural Networks

    E-Print Network [OSTI]

    Valasek, John

    1 Characterization of Shape Memory Alloys Using Artificial Neural Networks Jim Henrickson, Kenton ­ Generate Training Data ­ Train Artificial Neural Network Results Conclusion Characterization of Shape Characterization of Shape Memory Alloys Using Artificial Neural Networks Jim Henrickson, Kenton Kirkpatrick, Dr

  4. Object Co-location and Memory Reuse for Java Programs

    E-Print Network [OSTI]

    Lau, Francis C.M.

    : Memory allocator, garbage collector, mutator, Java, object co- location, memory reuse ACM Reference of a runtime system becomes increasingly signif- icant [Sun Microsystems 2003]. Our second goal is to find

  5. OpenRAM: An Open-Source Memory Compiler

    E-Print Network [OSTI]

    Butera, Jeffrey Thomas

    2013-01-01

    3 Software Implementation Main CompilerAn Open-Source Memory Compiler by Jeffrey T. Butera InAn Open-Source Memory Compiler A thesis submitted in partial

  6. Reversible neural inactivation reveals hippocampal particin several memory processesipation 

    E-Print Network [OSTI]

    Riedel, G; Micheau, J; Lam, A G M; Roloff, E.v.L.; Martin, Stephen J; Bridge, H; de Hoz, L; Poeschel, B; McCulloch, J; Morris, Richard G M

    Studies of patients and animals with brain lesions have implicated the hippocampal formation in spatial, declarative/relational and episodic types of memory. These and other types of memory consist of a series of ...

  7. Estimating memory locality for virtual machines on NUMA systems

    E-Print Network [OSTI]

    Milouchev, Alexandre (Alexandre M.)

    2013-01-01

    The multicore revolution sparked another, similar movement towards scalable memory architectures. With most machines nowadays exhibiting non-uniform memory access (NUMA) properties, software and operating systems have seen ...

  8. Fast in-memory storage systems : two aspects

    E-Print Network [OSTI]

    Mao, Yandong

    2014-01-01

    This dissertation addresses two challenges relating to in-memory storage systems. The first challenge is storing and retrieving data at a rate close to the capabilities of the underlying memory system, particularly in the ...

  9. Storage Systems for Non-volatile Memory Devices 

    E-Print Network [OSTI]

    Wu, Xiaojian

    2011-10-21

    This dissertation presents novel approaches to the use of non-volatile memory devices in building storage systems. There are many types of non-volatile memory devices, and they usually have better performance than regular magnetic hard disks...

  10. Intellectual property strategy : analysis of the flash memory industry

    E-Print Network [OSTI]

    Ogura, Tomoko H

    2006-01-01

    This thesis studies the intellectual property strategy of companies in the flash memory industry, with special emphasis on technology and the development of nitride-based flash, a new and emerging type of memory technology. ...

  11. Method for refreshing a non-volatile memory

    DOE Patents [OSTI]

    Riekels, James E. (New Hope, MN); Schlesinger, Samuel (Aventura, FL)

    2008-11-04

    A non-volatile memory and a method of refreshing a memory are described. The method includes allowing an external system to control refreshing operations within the memory. The memory may generate a refresh request signal and transmit the refresh request signal to the external system. When the external system finds an available time to process the refresh request, the external system acknowledges the refresh request and transmits a refresh acknowledge signal to the memory. The memory may also comprise a page register for reading and rewriting a data state back to the memory. The page register may comprise latches in lieu of supplemental non-volatile storage elements, thereby conserving real estate within the memory.

  12. Molecular and quantum dot floating gate non-volatile memories

    E-Print Network [OSTI]

    Abdu, Hassen

    2008-01-01

    Conventional Flash memory devices face a scaling issue that will impede memory scaling beyond the 50nm node: a reliability issue involving the tunneling oxide thickness and charge retention. A possible solution is to replace ...

  13. Good Programming in Transactional Memory$ Game Theory Meets Multicore Architecture

    E-Print Network [OSTI]

    Good Programming in Transactional Memory$ Game Theory Meets Multicore Architecture Raphael compatible. Keywords: transactional memory, game theory, multicore architecture, concurrency, contention management, mechanism design, human factors 1. Introduction In traditional single core architecture

  14. Good Programming in Transactional Memory Game Theory Meets Multicore Architecture

    E-Print Network [OSTI]

    Good Programming in Transactional Memory Game Theory Meets Multicore Architecture Raphael Eidenbenz compatible. Key words: transactional memory, game theory, multicore architecture, concur- rency, contention management, mechanism design, human factors. 1 Introduction In traditional single core architecture

  15. Curating Memory: 9/11 Commemoration and Foucault's Archive 

    E-Print Network [OSTI]

    Rowe, Sara 1988-

    2012-08-17

    This study of commemoration of 9/11 on the 10th anniversary is performed at the intersection of public memory and rhetorical studies. Examining the role of the individual within public memory, this study furthers both ...

  16. Structural Thermomechanical Models for Shape Memory Alloy Components 

    E-Print Network [OSTI]

    Rao, Ashwin

    2014-04-18

    Thermally responsive shape memory alloys (SMA) demonstrate interesting properties like shape memory effect (SME) and superelasticity (SE). SMA components in the form of wires, springs and beams typically exhibit complex, nonlinear hysteretic...

  17. Suboptimal quantum-error-correcting procedure based on semidefinite programming

    E-Print Network [OSTI]

    Naoki Yamamoto; Shinji Hara; Koji Tsumura

    2006-06-13

    In this paper, we consider a simplified error-correcting problem: for a fixed encoding process, to find a cascade connected quantum channel such that the worst fidelity between the input and the output becomes maximum. With the use of the one-to-one parametrization of quantum channels, a procedure finding a suboptimal error-correcting channel based on a semidefinite programming is proposed. The effectiveness of our method is verified by an example of the bit-flip channel decoding.

  18. Paging memory from random access memory to backing storage in a parallel computer

    DOE Patents [OSTI]

    Archer, Charles J; Blocksome, Michael A; Inglett, Todd A; Ratterman, Joseph D; Smith, Brian E

    2013-05-21

    Paging memory from random access memory (`RAM`) to backing storage in a parallel computer that includes a plurality of compute nodes, including: executing a data processing application on a virtual machine operating system in a virtual machine on a first compute node; providing, by a second compute node, backing storage for the contents of RAM on the first compute node; and swapping, by the virtual machine operating system in the virtual machine on the first compute node, a page of memory from RAM on the first compute node to the backing storage on the second compute node.

  19. TESLA-FEL 2009-07 Errors in Reconstruction of Difference Orbit

    E-Print Network [OSTI]

    Contents 1 Introduction 1 2 Standard Least Squares Solution 2 3 Error Emittance and Error Twiss Parameters as the position of the reconstruction point changes, we will introduce error Twiss parameters and invariant error in the point of interest has to be achieved by matching error Twiss parameters in this point to the desired

  20. A Taxonomy to Enable Error Recovery and Correction in Software Vilas Sridharan

    E-Print Network [OSTI]

    Kaeli, David R.

    A Taxonomy to Enable Error Recovery and Correction in Software Vilas Sridharan ECE Department years, reliability research has largely used the following taxonomy of errors: Undetected Errors Errors (CE). While this taxonomy is suitable to characterize hardware error detection and correction

  1. A simple real-word error detection and correction using local word bigram and trigram

    E-Print Network [OSTI]

    A simple real-word error detection and correction using local word bigram and trigram Pratip bbcisical@gmail.com Abstract Spelling error is broadly classified in two categories namely non word error and real word error. In this paper a localized real word error detection and correction method is proposed

  2. DIRECTIONS FOR MEMORY HIERARCHIES AND THEIR COMPONENTS: RESEARCH AND DEVELOPMENT

    E-Print Network [OSTI]

    Smith, Alan Jay

    2011-01-01

    system should perhaps be subsumed into the overall management of the unified memory hierarchy on which the data base

  3. PHASE FIELD EQUATIONS WITH MEMORY: THE HYPERBOLIC CASE

    E-Print Network [OSTI]

    Rotstein, Horacio G.

    , memory effects, mean curvature flow, crystalline algorithms AMS subject classifications. 80A22, 74D10, 45

  4. Error Rate Comparison during Polymerase Chain Reaction by DNA Polymerase

    DOE Public Access Gateway for Energy & Science Beta (PAGES Beta)

    McInerney, Peter; Adams, Paul; Hadi, Masood Z.

    2014-01-01

    As larger-scale cloning projects become more prevalent, there is an increasing need for comparisons among high fidelity DNA polymerases used for PCR amplification. All polymerases marketed for PCR applications are tested for fidelity properties (i.e., error rate determination) by vendors, and numerous literature reports have addressed PCR enzyme fidelity. Nonetheless, it is often difficult to make direct comparisons among different enzymes due to numerous methodological and analytical differences from study to study. We have measured the error rates for 6 DNA polymerases commonly used in PCR applications, including 3 polymerases typically used for cloning applications requiring high fidelity. Errormore »rate measurement values reported here were obtained by direct sequencing of cloned PCR products. The strategy employed here allows interrogation of error rate across a very large DNA sequence space, since 94 unique DNA targets were used as templates for PCR cloning. The six enzymes included in the study, Taq polymerase, AccuPrime-Taq High Fidelity, KOD Hot Start, cloned Pfu polymerase, Phusion Hot Start, and Pwo polymerase, we find the lowest error rates with Pfu , Phusion, and Pwo polymerases. Error rates are comparable for these 3 enzymes and are >10x lower than the error rate observed with Taq polymerase. Mutation spectra are reported, with the 3 high fidelity enzymes displaying broadly similar types of mutations. For these enzymes, transition mutations predominate, with little bias observed for type of transition. « less

  5. Shape memory behavior of ultrafine grained NiTi and TiNiPd shape memory alloys 

    E-Print Network [OSTI]

    Kockar, Benat

    2009-05-15

    The cyclic instability in shape memory characteristics of NiTi-based shape memory alloys (SMAs), such as transformation temperatures, transformation and irrecoverable strains and transformation hysteresis upon thermal and ...

  6. MPI+OPENMP IMPLEMENTATION OF MEMORY-SAVING PARALLEL PIC APPLICATIONS ON HIERARCHICAL DISTRIBUTED-SHARED MEMORY

    E-Print Network [OSTI]

    Vlad, Gregorio

    MPI+OPENMP IMPLEMENTATION OF MEMORY-SAVING PARALLEL PIC APPLICATIONS ON HIERARCHICAL DISTRIBUTED for the development of memory- saving parallel Particle-in-cell simulation codes, targeted to hierarchical distributed

  7. The nature of the working memory system underlying language processing and its relationship to the long-term memory system

    E-Print Network [OSTI]

    Fedorenko, Evelina Georgievna

    2007-01-01

    This thesis examines two questions concerning the working memory system underlying language processing: (1) To what extent is the working memory system underlying language processing domain-specific? and (2) What is the ...

  8. Energy Efficient Proactive Thermal Management in Memory Subsystem

    E-Print Network [OSTI]

    Simunic, Tajana

    Energy Efficient Proactive Thermal Management in Memory Subsystem Raid Ayoub rayoub management of memory subsystem is challenging due to performance and thermal constraints. Big energy gains appreciable energy savings in memory sub-system and mini- mize thermal problems. We adopt the consolidation

  9. Direct match data flow memory for data driven computing

    DOE Patents [OSTI]

    Davidson, George S. (8516 San Francisco NE., Albuquerque, NM 87109); Grafe, Victor Gerald (1909 Saturn Ct. NE., Albuquerque, NM 87112)

    1997-01-01

    A data flow computer and method of computing is disclosed which utilizes a data driven processor node architecture. The apparatus in a preferred embodiment includes a plurality of First-In-First-Out (FIFO) registers, a plurality of related data flow memories, and a processor. The processor makes the necessary calculations and includes a control unit to generate signals to enable the appropriate FIFO register receiving the result. In a particular embodiment, there are three FIFO registers per node: an input FIFO register to receive input information form an outside source and provide it to the data flow memories; an output FIFO register to provide output information from the processor to an outside recipient; and an internal FIFO register to provide information from the processor back to the data flow memories. The data flow memories are comprised of four commonly addressed memories. A parameter memory holds the A and B parameters used in the calculations; an opcode memory holds the instruction; a target memory holds the output address; and a tag memory contains status bits for each parameter. One status bit indicates whether the corresponding parameter is in the parameter memory and one status bit to indicate whether the stored information in the corresponding data parameter is to be reused. The tag memory outputs a "fire" signal (signal R VALID) when all of the necessary information has been stored in the data flow memories, and thus when the instruction is ready to be fired to the processor.

  10. FAST SEARCH IN MAIN MEMORY DATABASES Anastasia Analyti & Sakti Pramanik *

    E-Print Network [OSTI]

    Analyti, Anastasia

    FAST SEARCH IN MAIN MEMORY DATABASES ABSTRACT Anastasia Analyti & Sakti Pramanik * Computer Science and analyze high performance hash based search methods for main memory databasea. We define optimal search in main memory databases as the search that requires at most one key comparison to locate a record

  11. Conjunctive Selection Conditions in Main Memory Kenneth A. Ross

    E-Print Network [OSTI]

    Ross, Kenneth A.

    Conjunctive Selection Conditions in Main Memory Kenneth A. Ross Columbia University kar of records. With large main memories available cheaply, systems may choose to keep the data entirely in main in main memory needs to take into account the architectural characteristics of modern processors, just

  12. An implementation of SISAL for distributed-memory architectures

    SciTech Connect (OSTI)

    Beard, P.C.

    1995-06-01

    This thesis describes a new implementation of the implicitly parallel functional programming language SISAL, for massively parallel processor supercomputers. The Optimizing SISAL Compiler (OSC), developed at Lawrence Livermore National Laboratory, was originally designed for shared-memory multiprocessor machines and has been adapted to distributed-memory architectures. OSC has been relatively portable between shared-memory architectures, because they are architecturally similar, and OSC generates portable C code. However, distributed-memory architectures are not standardized -- each has a different programming model. Distributed-memory SISAL depends on a layer of software that provides a portable, distributed, shared-memory abstraction. This layer is provided by Split-C, a dialect of the C programming language developed at U.C. Berkeley, which has demonstrated good performance on distributed-memory architectures. Split-C provides important capabilities for good performance: support for program-specific distributed data structures, and split-phase memory operations. Distributed data structures help achieve good memory locality, while split-phase memory operations help tolerate the longer communication latencies inherent in distributed-memory architectures. The distributed-memory SISAL compiler and run-time system takes advantage of these capabilities. The results of these efforts is a compiler that runs identically on the Thinking Machines Connection Machine (CM-5), and the Meiko Computing Surface (CS-2).

  13. Evaluating Memory Energy Efficiency in Parallel I/O Workloads

    E-Print Network [OSTI]

    Zhu, Yifeng

    Evaluating Memory Energy Efficiency in Parallel I/O Workloads Jianhui Yue,Yifeng Zhu , Zhao Cai the ever- widening gap between disk and processor speeds, memory energy efficiency becomes an increasingly management policies heavily influence the overall memory energy efficiency. In partic- ular, under the same

  14. Shape Memory Assisted Self-Healing Coating Xiaofan Luo

    E-Print Network [OSTI]

    Mather, Patrick T.

    Shape Memory Assisted Self-Healing Coating Xiaofan Luo and Patrick T. Mather* Department and characterization of new shape memory assisted self- healing (SMASH) coatings. The coatings feature a phase in a shape memory epoxy matrix. Mechanical damage to the coating can be self-healed via heating, which

  15. Phoenix++: Modular MapReduce for Shared-Memory Systems

    E-Print Network [OSTI]

    Kozyrakis, Christos

    Phoenix++: Modular MapReduce for Shared-Memory Systems Justin Talbot, Richard M. Yoo, and Christos This paper describes our rewrite of Phoenix, a MapReduce framework for shared-memory CMPs and SMPs. Despite successfully demonstrating the applicability of a MapReduce- style pipeline to shared-memory machines, Phoenix

  16. Guide wire extension for shape memory polymer occlusion removal devices

    SciTech Connect (OSTI)

    Maitland, Duncan J.; Small, IV, Ward; Hartman, Jonathan

    2009-11-03

    A flexible extension for a shape memory polymer occlusion removal device. A shape memory polymer instrument is transported through a vessel via a catheter. A flexible elongated unit is operatively connected to the distal end of the shape memory polymer instrument to enhance maneuverability through tortuous paths en route to the occlusion.

  17. Direct match data flow memory for data driven computing

    DOE Patents [OSTI]

    Davidson, G.S.; Grafe, V.G.

    1997-10-07

    A data flow computer and method of computing is disclosed which utilizes a data driven processor node architecture. The apparatus in a preferred embodiment includes a plurality of First-In-First-Out (FIFO) registers, a plurality of related data flow memories, and a processor. The processor makes the necessary calculations and includes a control unit to generate signals to enable the appropriate FIFO register receiving the result. In a particular embodiment, there are three FIFO registers per node: an input FIFO register to receive input information form an outside source and provide it to the data flow memories; an output FIFO register to provide output information from the processor to an outside recipient; and an internal FIFO register to provide information from the processor back to the data flow memories. The data flow memories are comprised of four commonly addressed memories. A parameter memory holds the A and B parameters used in the calculations; an opcode memory holds the instruction; a target memory holds the output address; and a tag memory contains status bits for each parameter. One status bit indicates whether the corresponding parameter is in the parameter memory and one status bit to indicate whether the stored information in the corresponding data parameter is to be reused. The tag memory outputs a ``fire`` signal (signal R VALID) when all of the necessary information has been stored in the data flow memories, and thus when the instruction is ready to be fired to the processor. 11 figs.

  18. Chronic administration of corticosterone impairs spatial reference memory before spatial working memory in rats

    E-Print Network [OSTI]

    Anderson, Brenda

    of glucocorticoids occur in numerous disorders, such as anorexia nervosa (Seed, Dixon, McCluskey, & Young, 2000) and CushingÕs syndrome (Starkman et al., 1992, 1999), as well as memory deficits in anorexia nervosa (Seed et

  19. Martensite Strain Memory in the Shape Memory Alloy Nickel-Titanium Under Mechanical Cycling

    E-Print Network [OSTI]

    Daly, Samantha

    that largely stabilize during the first loading cycle. Keywords Shape memory alloy. Nickel-Titanium . Nitinol in the recovery of mechanically-induced strains as large as 8% in Nickel-Titanium (Nitinol), a nearly equi- atomic

  20. Bayesian Semiparametric Density Deconvolution and Regression in the Presence of Measurement Errors 

    E-Print Network [OSTI]

    Sarkar, Abhra

    2014-06-24

    Although the literature on measurement error problems is quite extensive, solutions to even the most fundamental measurement error problems like density deconvolution and regression with errors-in-covariates are available ...

  1. Estimation of the error for small-sample optimal binary filter design using prior knowledge 

    E-Print Network [OSTI]

    Sabbagh, David L

    1999-01-01

    Optimal binary filters estimate an unobserved ideal quantity from observed quantities. Optimality is with respect to some error criterion, which is usually mean absolute error MAE (or equivalently mean square error) for the binary values. Both...

  2. Fault tree analysis of commonly occurring medication errors and methods to reduce them 

    E-Print Network [OSTI]

    Cherian, Sandhya Mary

    1994-01-01

    -depth analysis of over two hundred actual medication error incidents. These errors were then classified according to type, in an attempt at deriving a generalized fault tree for the medication delivery system that contributed to errors. This generalized fault...

  3. EFFECT OF MANUFACTURING ERRORS ON FIELD QUALITY OF DIPOLE MAGNETS FOR THE SSC

    E-Print Network [OSTI]

    Meuser, R.B.

    2010-01-01

    in Fig. 2. Table 2. Manufacturing Error Mode Groups13-16, 1985 EFFECT OF MANUFACTURING ERRORS ON FIELD QUALITYMag Note-27 EFFECT OF MANUFACTURING ERRORS ON FIELO QUALITY

  4. ANTHROPOLOGY HISTORY AND MEMORY Anthropology Professors

    E-Print Network [OSTI]

    Watkins, Joseph C.

    ANTHROPOLOGY HISTORY AND MEMORY Anthropology Professors Ana Alonzo Maribel Alvarez TJ Ferguson of the Southwest ANTH 417A (MENAS) North African Societies: History, Culture and Politics ANTH 418 Southwest Land, Culture and History ANTH 475A (MAS) The Education of Latinas/Latinos Click here to search for course

  5. Enhancing Compiler Techniques for Memory Energy Optimizations

    E-Print Network [OSTI]

    that the best performance opti- mizations do not necessarily generate the best energy behavior in mem- ory. WeEnhancing Compiler Techniques for Memory Energy Optimizations Joseph Zambreno1 , Mahmut Taylan frequencies steadily rise in modern microprocessors, energy consumption is quickly joining perfor- mance

  6. Rewritable Memory by Controllable Nanopatterning of DNA

    E-Print Network [OSTI]

    Pierce, Niles A.

    ABSTRACT Fabricating a nanostructure capable of reversibly patterning molecules is a fundamental goal within nanotechnology, underlying diverse processes such as information storage, scaffold functioning of the device as rewritable memory. The bit state of each address is controlled by specific DNA

  7. MEMORY SYSTEM DESIGN FOR BUS BASED MULTIPROCESSORS

    E-Print Network [OSTI]

    Sohi, Guri S.

    -cost microprocessors have led to the construction of small- to medium-scale shared memory multipro- cessors the operating environment of the multiprocessor. Two major operating environments - throughput-oriented and speedup-oriented, are considered in this thesis. 1.2. Operating Environment of Multiprocessors 1

  8. MEMORY SYSTEM DESIGN FOR BUS BASED MULTIPROCESSORS

    E-Print Network [OSTI]

    Sohi, Guri S.

    ­cost microprocessors have led to the construction of small­ to medium­scale shared memory multipro­ cessors the operating environment of the multiprocessor. Two major operating environments ­ throughput­oriented and speedup­oriented, are considered in this thesis. 1.2. Operating Environment of Multiprocessors 1

  9. Benchmarking the Memory Hierarchy of Modern GPUs

    E-Print Network [OSTI]

    Chu, Xiaowen

    GPUs Generation Tesla Fermi Kepler Device GeForce GTX 280 GeForce GTX 560 Ti GeForce GTX 780 Compute access efficiency [11­16]. The memory hierarchies are different from those of earlier generations. Our contributions are summarized as follows: #12;Table 1. Comparison of NVIDIA Tesla, Fermi and Kepler

  10. Protist Web Alert Memories of Times Past

    E-Print Network [OSTI]

    Simpson, Larry

    Protist Web Alert Memories of Times Past The Euglenoid Project (http that the Euglenoids have always fascinated me and so did this site. Micro*scope Astrobiology Institute Web Site from reviewed this site in a previous Web Alert, but it has been revised and updated and so is worth another

  11. Entanglement preserving memory for quantum microwave

    E-Print Network [OSTI]

    Vallette, Bruno

    -in entanglement generation Flurin et al., PRL 2013 #12;memory cavity itinerant wave packet Entanglement Entanglement generation #12;itinerant wave packet Entanglement Retrieval Retrieval #12;Entanglement Retrieval) @ Saclay, France Zhu et al. Nature (2011) @ Atsugi, Japan High Q cavity Yin et al. PRL (2013) @ Santa

  12. Memory Space Representation Heterogeneous Network Process Migration

    E-Print Network [OSTI]

    Sun, Xian-He

    Memory Space Representation for Heterogeneous Network Process Migration Kasidit Chanchio Xian@bit.csc.lsu.edu http://www.csc.lsu.edu/~scs/ Abstract A major difficulty of heterogeneous process migration is how and effective for heterogeneous network process migration. 1. Introduction As network computing becomes

  13. TEXAS MEMORIAL MUSEUM Speleological Monographs, Number 7

    E-Print Network [OSTI]

    Suarez, Andrew V.

    TEXAS MEMORIAL MUSEUM Speleological Monographs, Number 7 Studies on the CAVE AND ENDOGEAN FAUNA Science Research Laboratory Museum of Texas Tech University, 3301 4th Street Lubbock, Texas 79409 U.S.A. Email: james.cokendolpher@ttu.edu and James R. Reddell Texas Natural Science Center The University

  14. Weather Report Translation using a Translation Memory

    E-Print Network [OSTI]

    Langlais, Philippe

    Weather Report Translation using a Translation Memory Thomas Leplus, Philippe Langlais and Guy to French weather report translation system. This system, which has been in operation for more than 20 years approach based on the analysis of hundreds of thousands of weather reports. We show that it is possible

  15. SEMANTIC MEMORY University of Western Ontario

    E-Print Network [OSTI]

    Jones, Michael

    . Reisberg (Ed.). The Oxford Handbook of Cognitive Psychology Ken McRae Department of Psychology Social Science Centre University of Western Ontario London, ON, Canada N6A 5C2 Email: kenm@uwo.ca Phone: (519;Semantic Memory 2 1. INTRODUCTION Concepts and meaning are fundamental components of nearly all aspects

  16. Structure of minimum-error quantum state discrimination

    E-Print Network [OSTI]

    Joonwoo Bae

    2013-07-19

    Distinguishing different quantum states is a fundamental task having practical applications for information processing. Despite the efforts devoted so far, however, strategies for optimal discrimination are known only for specific examples. We here consider the problem of minimum-error quantum state discrimination where the average error is attempted to be minimized. We show the general structure of minimum-error state discrimination as well as useful properties to derive analytic solutions. Based on the general structure, we present a geometric formulation of the problem, which can be applied to cases where quantum state geometry is clear. We also introduce equivalent classes of sets of quantum states in terms of minimum-error discrimination: sets of quantum states in an equivalence class share the same guessing probability. In particular, for qubit states where the state geometry is found with the Bloch sphere, we illustrate that for an arbitrary set of qubit states, the minimum-error state discrimination with equal prior probabilities can be analytically solved, that is, optimal measurement and the guessing probability are explicitly obtained.

  17. Economic penalties of problems and errors in solar energy systems

    SciTech Connect (OSTI)

    Raman, K.; Sparkes, H.R.

    1983-01-01

    Experience with a large number of installed solar energy systems in the HUD Solar Program has shown that a variety of problems and design/installation errors have occurred in many solar systems, sometimes resulting in substantial additional costs for repair and/or replacement. In this paper, the effect of problems and errors on the economics of solar energy systems is examined. A method is outlined for doing this in terms of selected economic indicators. The method is illustrated by a simple example of a residential solar DHW system. An example of an installed, instrumented solar energy system in the HUD Solar Program is then discussed. Detailed results are given for the effects of the problems and errors on the cash flow, cost of delivered heat, discounted payback period, and life-cycle cost of the solar energy system. Conclusions are drawn regarding the most suitable economic indicators for showing the effects of problems and errors in solar energy systems. A method is outlined for deciding on the maximum justifiable expenditure for maintenance on a solar energy system with problems or errors.

  18. Goal-oriendted local a posteriori error estimator for H(div)

    E-Print Network [OSTI]

    2011-12-15

    Dec 15, 2011 ... error estimator measures the pollution effect from the outside region of D ... error estimators which account for and quantify the pollution effect.

  19. Reducing collective quantum state rotation errors with reversible dephasing

    SciTech Connect (OSTI)

    Cox, Kevin C.; Norcia, Matthew A.; Weiner, Joshua M.; Bohnet, Justin G.; Thompson, James K.

    2014-12-29

    We demonstrate that reversible dephasing via inhomogeneous broadening can greatly reduce collective quantum state rotation errors, and observe the suppression of rotation errors by more than 21?dB in the context of collective population measurements of the spin states of an ensemble of 2.1×10{sup 5} laser cooled and trapped {sup 87}Rb atoms. The large reduction in rotation noise enables direct resolution of spin state populations 13(1) dB below the fundamental quantum projection noise limit. Further, the spin state measurement projects the system into an entangled state with 9.5(5) dB of directly observed spectroscopic enhancement (squeezing) relative to the standard quantum limit, whereas no enhancement would have been obtained without the suppression of rotation errors.

  20. Characterization of quantum dynamics using quantum error correction

    E-Print Network [OSTI]

    S. Omkar; R. Srikanth; S. Banerjee

    2015-01-27

    Characterizing noisy quantum processes is important to quantum computation and communication (QCC), since quantum systems are generally open. To date, all methods of characterization of quantum dynamics (CQD), typically implemented by quantum process tomography, are \\textit{off-line}, i.e., QCC and CQD are not concurrent, as they require distinct state preparations. Here we introduce a method, "quantum error correction based characterization of dynamics", in which the initial state is any element from the code space of a quantum error correcting code that can protect the state from arbitrary errors acting on the subsystem subjected to the unknown dynamics. The statistics of stabilizer measurements, with possible unitary pre-processing operations, are used to characterize the noise, while the observed syndrome can be used to correct the noisy state. Our method requires at most $2(4^n-1)$ configurations to characterize arbitrary noise acting on $n$ qubits.

  1. Non-Gaussian numerical errors versus mass hierarchy

    E-Print Network [OSTI]

    Y. Meurice; M. B. Oktay

    2000-05-12

    We probe the numerical errors made in renormalization group calculations by varying slightly the rescaling factor of the fields and rescaling back in order to get the same (if there were no round-off errors) zero momentum 2-point function (magnetic susceptibility). The actual calculations were performed with Dyson's hierarchical model and a simplified version of it. We compare the distributions of numerical values obtained from a large sample of rescaling factors with the (Gaussian by design) distribution of a random number generator and find significant departures from the Gaussian behavior. In addition, the average value differ (robustly) from the exact answer by a quantity which is of the same order as the standard deviation. We provide a simple model in which the errors made at shorter distance have a larger weight than those made at larger distance. This model explains in part the non-Gaussian features and why the central-limit theorem does not apply.

  2. Factorization of correspondence and camera error for unconstrained dense correspondence applications

    SciTech Connect (OSTI)

    Knoblauch, D; Hess-Flores, M; Duchaineau, M; Kuester, F

    2009-09-29

    A correspondence and camera error analysis for dense correspondence applications such as structure from motion is introduced. This provides error introspection, opening up the possibility of adaptively and progressively applying more expensive correspondence and camera parameter estimation methods to reduce these errors. The presented algorithm evaluates the given correspondences and camera parameters based on an error generated through simple triangulation. This triangulation is based on the given dense, non-epipolar constraint, correspondences and estimated camera parameters. This provides an error map without requiring any information about the perfect solution or making assumptions about the scene. The resulting error is a combination of correspondence and camera parameter errors. An simple, fast low/high pass filter error factorization is introduced, allowing for the separation of correspondence error and camera error. Further analysis of the resulting error maps is applied to allow efficient iterative improvement of correspondences and cameras.

  3. Full protection of superconducting qubit systems from coupling errors

    E-Print Network [OSTI]

    M. J. Storcz; J. Vala; K. R. Brown; J. Kempe; F. K. Wilhelm; K. B. Whaley

    2005-08-09

    Solid state qubits realized in superconducting circuits are potentially extremely scalable. However, strong decoherence may be transferred to the qubits by various elements of the circuits that couple individual qubits, particularly when coupling is implemented over long distances. We propose here an encoding that provides full protection against errors originating from these coupling elements, for a chain of superconducting qubits with a nearest neighbor anisotropic XY-interaction. The encoding is also seen to provide partial protection against errors deriving from general electronic noise.

  4. When soft controls get slippery: User interfaces and human error

    SciTech Connect (OSTI)

    Stubler, W.F.; O`Hara, J.M.

    1998-12-01

    Many types of products and systems that have traditionally featured physical control devices are now being designed with soft controls--input formats appearing on computer-based display devices and operated by a variety of input devices. A review of complex human-machine systems found that soft controls are particularly prone to some types of errors and may affect overall system performance and safety. This paper discusses the application of design approaches for reducing the likelihood of these errors and for enhancing usability, user satisfaction, and system performance and safety.

  5. Comment on "Optimum Quantum Error Recovery using Semidefinite Programming"

    E-Print Network [OSTI]

    M. Reimpell; R. F. Werner; K. Audenaert

    2006-06-07

    In a recent paper ([1]=quant-ph/0606035) it is shown how the optimal recovery operation in an error correction scheme can be considered as a semidefinite program. As a possible future improvement it is noted that still better error correction might be obtained by optimizing the encoding as well. In this note we present the result of such an improvement, specifically for the four-bit correction of an amplitude damping channel considered in [1]. We get a strict improvement for almost all values of the damping parameter. The method (and the computer code) is taken from our earlier study of such correction schemes (quant-ph/0307138).

  6. Error-prevention scheme with two pairs of qubits

    E-Print Network [OSTI]

    Chu, Shih-I; Yang, Chui-Ping; Han, Siyuan

    2002-09-04

    Ei jue ie j&5ue je i& , e iP$0,1% @6#!. The expressions for HS and HSB are as follows: HS5e0~s I z 1s II z !, *Email address: cpyang@floquet.chem.ku.edu †Email address: sichu@ku.edu ‡ Email address: han@ku.eduError-prevention scheme Chui-Ping Yang.... The sche two pairs of qubits and through error-prevention proc through a decoherence-free subspace for collective p pairs; leakage out of the encoding space due to amp addition, how to construct decoherence-free states for n discussed. DOI: 10.1103/Phys...

  7. Memory in Nonlinear Ionization of Transparent Solids

    SciTech Connect (OSTI)

    Rajeev, P. P.; Simova, E.; Hnatovsky, C.; Taylor, R. S.; Rayner, D. M.; Corkum, P. B.; Gertsvolf, M.; Bhardwaj, V. R.

    2006-12-22

    We demonstrate a shot-to-shot reduction in the threshold laser intensity for ionization of bulk glasses illuminated by intense femtosecond pulses. For SiO{sub 2} the threshold change serves as positive feedback reenforcing the process that produced it. This constitutes a memory in nonlinear ionization of the material. The threshold change saturates with the number of pulses incident at a given spot. Irrespective of the pulse energy, the magnitude of the saturated threshold change is constant ({approx}20%). However, the number of shots required to reach saturation does depend on the pulse energy. Recognition of a memory in ionization is vital to understand multishot optical or electrical breakdown phenomena in dielectrics.

  8. Contributions to Human Errors and Breaches in National Security Applications.

    SciTech Connect (OSTI)

    Pond, D. J.; Houghton, F. K.; Gilmore, W. E.

    2002-01-01

    Los Alamos National Laboratory has recognized that security infractions are often the consequence of various types of human errors (e.g., mistakes, lapses, slips) and/or breaches (i.e., deliberate deviations from policies or required procedures with no intention to bring about an adverse security consequence) and therefore has established an error reduction program based in part on the techniques used to mitigate hazard and accident potentials. One cornerstone of this program, definition of the situational and personal factors that increase the likelihood of employee errors and breaches, is detailed here. This information can be used retrospectively (as in accident investigations) to support and guide inquiries into security incidents or prospectively (as in hazard assessments) to guide efforts to reduce the likelihood of error/incident occurrence. Both approaches provide the foundation for targeted interventions to reduce the influence of these factors and for the formation of subsequent 'lessons learned.' Overall security is enhanced not only by reducing the inadvertent releases of classified information but also by reducing the security and safeguards resources devoted to them, thereby allowing these resources to be concentrated on acts of malevolence.

  9. Backward Error and Condition of Polynomial Eigenvalue Problems \\Lambda

    E-Print Network [OSTI]

    Higham, Nicholas J.

    , 1999 Abstract We develop normwise backward errors and condition numbers for the polyno­ mial eigenvalue Research Council grant GR/L76532. 1 #12; where A l 2 C n\\Thetan , l = 0: m and we refer to P as a â??­matrix. Few direct numerical methods are available for solving the polynomial eigenvalue problem (PEP). When m

  10. DISCRIMINATION AND CLASSIFICATION OF UXO USING MAGNETOMETRY: INVERSION AND ERROR

    E-Print Network [OSTI]

    Sambridge, Malcolm

    DISCRIMINATION AND CLASSIFICATION OF UXO USING MAGNETOMETRY: INVERSION AND ERROR ANALYSIS USING for the different solutions didn't even overlap. Introduction A discrimination and classification strategy ambiguity and possible remanent magnetization the recovered dipole moment is compared to a library

  11. Optimal Estimation from Relative Measurements: Error Scaling (Extended Abstract)

    E-Print Network [OSTI]

    Hespanha, João Pedro

    "relative" measurement between xu and xv is available: uv = xu - xv + u,v Rk , (u, v) E V × V, (1) whereOptimal Estimation from Relative Measurements: Error Scaling (Extended Abstract) Prabir Barooah Jo~ao P. Hespanha I. ESTIMATION FROM RELATIVE MEASUREMENTS We consider the problem of estimating a number

  12. Low Degree Test with Polynomially Small Error Dana Moshkovitz

    E-Print Network [OSTI]

    Moshkovitz, Dana

    Low Degree Test with Polynomially Small Error Dana Moshkovitz October 19, 2014 Abstract A long line of work in Theoretical Computer Science shows that a function is close to a low degree polynomial iff it is close to a low degree polynomial locally. This is known as low degree testing

  13. Time reversal in thermoacoustic tomography - an error estimate

    E-Print Network [OSTI]

    Hristova, Yulia

    2008-01-01

    The time reversal method in thermoacoustic tomography is used for approximating the initial pressure inside a biological object using measurements of the pressure wave made outside the object. This article presents error estimates for the time reversal method in the cases of variable, non-trapping sound speeds.

  14. Error Control Based Model Reduction for Parameter Optimization of Elliptic

    E-Print Network [OSTI]

    of technical devices that rely on multiscale processes, such as fuel cells or batteries. As the solutionError Control Based Model Reduction for Parameter Optimization of Elliptic Homogenization Problems optimization of elliptic multiscale problems with macroscopic optimization functionals and microscopic material

  15. DISCRIMINATION AND CLASSIFICATION OF UXO USING MAGNETOMETRY: INVERSION AND ERROR

    E-Print Network [OSTI]

    Oldenburg, Douglas W.

    DISCRIMINATION AND CLASSIFICATION OF UXO USING MAGNETOMETRY: INVERSION AND ERROR ANALYSIS USING for the different solutions didn't even overlap. Introduction A discrimination and classification strategy-UXOs dug per UXO). The discrimination and classification methodology depends on the magnitude of the recov

  16. Improving STT-MRAM Density Through Multibit Error Correction

    E-Print Network [OSTI]

    Sapatnekar, Sachin

    . Traditional methods enhance robustness at the cost of area/energy by using larger cell sizes to improve the thermal stability of the MTJ cells. This paper employs multibit error correction with DRAM to the read operation) through TX. A key attribute of an MTJ is the notion of thermal stability. Fig. 2

  17. Designing Automation to Reduce Operator Errors Nancy G. Leveson

    E-Print Network [OSTI]

    Leveson, Nancy

    Designing Automation to Reduce Operator Errors Nancy G. Leveson Computer Science and Engineering University of Washington Everett Palmer NASA Ames Research Center Introduction Advanced automation has been of mode­related problems [SW95]. After studying accidents and incidents in the new, highly automated

  18. Verification of unfold error estimates in the unfold operator code

    SciTech Connect (OSTI)

    Fehl, D.L.; Biggs, F.

    1997-01-01

    Spectral unfolding is an inverse mathematical operation that attempts to obtain spectral source information from a set of response functions and data measurements. Several unfold algorithms have appeared over the past 30 years; among them is the unfold operator (UFO) code written at Sandia National Laboratories. In addition to an unfolded spectrum, the UFO code also estimates the unfold uncertainty (error) induced by estimated random uncertainties in the data. In UFO the unfold uncertainty is obtained from the error matrix. This built-in estimate has now been compared to error estimates obtained by running the code in a Monte Carlo fashion with prescribed data distributions (Gaussian deviates). In the test problem studied, data were simulated from an arbitrarily chosen blackbody spectrum (10 keV) and a set of overlapping response functions. The data were assumed to have an imprecision of 5{percent} (standard deviation). One hundred random data sets were generated. The built-in estimate of unfold uncertainty agreed with the Monte Carlo estimate to within the statistical resolution of this relatively small sample size (95{percent} confidence level). A possible 10{percent} bias between the two methods was unresolved. The Monte Carlo technique is also useful in underdetermined problems, for which the error matrix method does not apply. UFO has been applied to the diagnosis of low energy x rays emitted by Z-pinch and ion-beam driven hohlraums. {copyright} {ital 1997 American Institute of Physics.}

  19. ARTIFICIAL INTELLIGENCE 223 A Geometric Approach to Error

    E-Print Network [OSTI]

    Richardson, David

    ARTIFICIAL INTELLIGENCE 223 A Geometric Approach to Error Detection and Recovery for Robot Motion, and uncertainty in the geometric * This report describes research done at the Artificial Intelligence Laboratory of the Massach- usetts Institute of Technology. Support for the Laboratory's Artificial Intelligence research

  20. Control del Error para la Multirresoluci on Quincunx a la

    E-Print Network [OSTI]

    Amat, Sergio

    multirresoluci#19;on discreta no lineal de Harten. En los algoritmos de multirresoluci#19;on se transforma una obtiene ^ f L la cual debera de estar cerca de #22; f L . Por lo tanto, los algoritmos no deben de ser inestables. En este estudio, introduciremos algoritmos de control del error y de la estabilidad. Se obtendr

  1. Error Bounds from Extra Precise Iterative Refinement James Demmel

    E-Print Network [OSTI]

    Li, Xiaoye Sherry

    now prevented its adoption in standard subroutine libraries like LAPACK: (1) There was no standard way a reliable error bound for the computed solution. The completion of the new BLAS Technical Forum Standard [5 Cooperative Agreement No. ACI-9619020; NSF Grant Nos. ACI-9813362 and CCF-0444486; the DOE Grant Nos. DE-FG03

  2. Error rate and power dissipation in nano-logic devices 

    E-Print Network [OSTI]

    Kim, Jong Un

    2005-08-29

    of an error-free condition on temperature in single electron logic processors is derived. The size of the quantum dot of single electron transistor is predicted when a single electron logic processor with the a billion single electron transistors works without...

  3. Error rate and power dissipation in nano-logic devices 

    E-Print Network [OSTI]

    Kim, Jong Un

    2004-01-01

    -free condition on temperature in single electron logic processors is derived. The size of the quantum dot of a single electron transistor is predicted when a single electron logic processor with the 10? single electron transistors works without error at room...

  4. Urban Water Demand with Periodic Error Correction David R. Bell

    E-Print Network [OSTI]

    Griffin, Ronald

    them. Econometric estimates of residential demand for water abound (Dalhuisen et al. 2003Urban Water Demand with Periodic Error Correction by David R. Bell and Ronald C. Griffin February, Department of Agricultural Economics, Texas A&M University. #12;Abstract Monthly demand for publicly supplied

  5. Errors-in-variables problems in transient electromagnetic mineral exploration

    E-Print Network [OSTI]

    Braslavsky, Julio H.

    Errors-in-variables problems in transient electromagnetic mineral exploration K. Lau, J. H in transient electromagnetic mineral exploration. A specific sub-problem of interest in this area geological surveys, dia- mond drilling, and airborne mineral exploration. Our interest here is with ground

  6. Energy efficiency of error correction for wireless communication

    E-Print Network [OSTI]

    Havinga, Paul J.M.

    -control is an important issue for mobile computing systems. This includes energy spent in the physical radio transmission and Networking Conference 1999 [7]. #12;ENERGY EFFICIENCY OF ERROR CORRECTION FOR WIRELESS COMMUNICATIONA ­ 2 on the energy of transmission and the energy of redundancy computation. We will show that the computational cost

  7. Error Control of Iterative Linear Solvers for Integrated Groundwater Models

    E-Print Network [OSTI]

    California at Davis, University of

    Error Control of Iterative Linear Solvers for Integrated Groundwater Models by Matthew F. Dixon1 for integrated groundwater models, which are implicitly coupled to another model, such as surface water models in legacy groundwater modeling packages, resulting in the overall simulation speedups as large as 7

  8. Estimating the error distribution function in nonparametric regression

    E-Print Network [OSTI]

    Mueller, Uschi

    Schick, Wolfgang Wefelmeyer Summary: We construct an efficient estimator for the error distribution estimator, influence function #12;2 M¨uller - Schick - Wefelmeyer M¨uller, Schick and Wefelmeyer (2004a. We refer also to the introduction of M¨uller, Schick and Wefelmeyer (2004b). Our proof is complicat

  9. Automatic Error Elimination by Horizontal Code Transfer across Multiple Applications

    E-Print Network [OSTI]

    Polz, Martin

    Automatic Error Elimination by Horizontal Code Transfer across Multiple Applications Stelios CSAIL, Cambridge, MA, USA Abstract We present Code Phage (CP), a system for automatically transferring. To the best of our knowledge, CP is the first system to automatically transfer code across multiple

  10. Error field and magnetic diagnostic modeling for W7-X

    SciTech Connect (OSTI)

    Lazerson, Sam A.; Gates, David A.; NEILSON, GEORGE H.; OTTE, M.; Bozhenkov, S.; Pedersen, T. S.; GEIGER, J.; LORE, J.

    2014-07-01

    The prediction, detection, and compensation of error fields for the W7-X device will play a key role in achieving a high beta (? = 5%), steady state (30 minute pulse) operating regime utilizing the island divertor system [1]. Additionally, detection and control of the equilibrium magnetic structure in the scrape-off layer will be necessary in the long-pulse campaign as bootstrapcurrent evolution may result in poor edge magnetic structure [2]. An SVD analysis of the magnetic diagnostics set indicates an ability to measure the toroidal current and stored energy, while profile variations go undetected in the magnetic diagnostics. An additional set of magnetic diagnostics is proposed which improves the ability to constrain the equilibrium current and pressure profiles. However, even with the ability to accurately measure equilibrium parameters, the presence of error fields can modify both the plasma response and diverter magnetic field structures in unfavorable ways. Vacuum flux surface mapping experiments allow for direct measurement of these modifications to magnetic structure. The ability to conduct such an experiment is a unique feature of stellarators. The trim coils may then be used to forward model the effect of an applied n = 1 error field. This allows the determination of lower limits for the detection of error field amplitude and phase using flux surface mapping. *Research supported by the U.S. DOE under Contract No. DE-AC02-09CH11466 with Princeton University.

  11. Development of an Expert System for Classification of Medical Errors

    E-Print Network [OSTI]

    Kopec, Danny

    in the United States. There has been considerable speculation that these figures are either overestimated published by the Institute of Medicine (IOM) indicated that between 44,000 and 98,000 unnecessary deaths per in hospitals in the IOM report, what is of importance is that the number of deaths caused by such errors

  12. The contour method cutting assumption: error minimization and correction

    SciTech Connect (OSTI)

    Prime, Michael B; Kastengren, Alan L

    2010-01-01

    The recently developed contour method can measure 2-D, cross-sectional residual-stress map. A part is cut in two using a precise and low-stress cutting technique such as electric discharge machining. The contours of the new surfaces created by the cut, which will not be flat if residual stresses are relaxed by the cutting, are then measured and used to calculate the original residual stresses. The precise nature of the assumption about the cut is presented theoretically and is evaluated experimentally. Simply assuming a flat cut is overly restrictive and misleading. The critical assumption is that the width of the cut, when measured in the original, undeformed configuration of the body is constant. Stresses at the cut tip during cutting cause the material to deform, which causes errors. The effect of such cutting errors on the measured stresses is presented. The important parameters are quantified. Experimental procedures for minimizing these errors are presented. An iterative finite element procedure to correct for the errors is also presented. The correction procedure is demonstrated on experimental data from a steel beam that was plastically bent to put in a known profile of residual stresses.

  13. Selected CRC Polynomials Can Correct Errors and Thus Reduce Retransmission

    E-Print Network [OSTI]

    Mache, Jens

    sensor networks, minimizing communication is crucial to improve energy consumption and thus lifetime Correction, Reliability, Network Protocol, Low Power Comsumption I. INTRODUCTION Error detection using Cyclic of retransmitting the whole packet - improves energy consumption and thus lifetime of wireless sensor networks

  14. A Spline Algorithm for Modeling Cutting Errors Turning Centers

    E-Print Network [OSTI]

    Gilsinn, David E.

    . Bandy Automated Production Technology Division National Institute of Standards and Technology 100 Bureau are made up of features with profiles defined by arcs and lines. An error model for turned parts must take. In the case where there is a requirement of tangency between two features, such as a line tangent to an arc

  15. Scaling of Seismic Memory with Earthquake Size

    E-Print Network [OSTI]

    Zheng, Zeyu; Tenenbaum, Joel; Podobnik, Boris; Stanley, H Eugene

    2011-01-01

    It has been observed that the earthquake events possess short-term memory, i.e. that events occurring in a particular location are dependent on the short history of that location. We conduct an analysis to see whether real-time earthquake data also possess long-term memory and, if so, whether such autocorrelations depend on the size of earthquakes within close spatiotemporal proximity. We analyze the seismic waveform database recorded by 64 stations in Japan, including the 2011 "Great East Japan Earthquake", one of the five most powerful earthquakes ever recorded which resulted in a tsunami and devastating nuclear accidents. We explore the question of seismic memory through use of mean conditional intervals and detrended fluctuation analysis (DFA). We find that the waveform sign series show long-range power-law anticorrelations while the interval series show long-range power-law correlations. We find size-dependence in earthquake auto-correlations---as earthquake size increases, both of these correlation beha...

  16. High-speed quantum memory with thermal motion of atoms

    E-Print Network [OSTI]

    K. Tikhonov; T. Golubeva; Yu. Golubev

    2015-02-26

    We discuss the influence of atomic thermal motion on the efficiency of multimode quantum memory in two configurations: over the free expand of atoms cooled beforehand in a magneto-optical trap, and over complete mixing of atoms in a closed cell at room temperature. We consider the high-speed quantum memory, and assume that writing and retrieval are short enough, and the displacements of atoms during these stages are negligibly small. At the same time we take in account thermal motion during the storage time, which, as well known, must be much longer than durations of all the other memory processes for successful application of memory cell in communication and computation. We will analyze this influence in terms of eigenmodes of the full memory cycle and show that distortion of the eigenmodes, caused by thermal motion, leads to the efficiency reduction. We will demonstrate, that in the multimode memory this interconnection has complicated character.

  17. A prototype functional language implementation for hierarchical-memory architectures

    SciTech Connect (OSTI)

    Wolski, R.; Feo, J.; Cann, D.

    1991-06-05

    The first implementation of Sisal was designed for general shared-memory architectures. Since then, we have optimized the system for vector and coherent-cache multiprocessors. Coherent-cache systems can be thought of as simple, two-level hierarchical memory systems, where the memory hierarchy is managed by the hardware. The compiler and run-time system for such an architecture needs to maintain data locality so that the processor caches are used as much as possible. In this paper, we extend the coherent-cache implementation to include explicit compiler and run-time control for medium-grain and coarse-grain hierarchical-memory architectures. We implemented the extended system on the BBN Butterfly using interleaved shared memory exclusively for the purposes of data sharing and exploiting the per-processor local memories. We give preliminary performance results for this extended system. 10 refs., 7 figs.

  18. Near-field NanoThermoMechanical memory

    SciTech Connect (OSTI)

    Elzouka, Mahmoud; Ndao, Sidy

    2014-12-15

    In this letter, we introduce the concept of NanoThermoMechanical Memory. Unlike electronic memory, a NanoThermoMechanical memory device uses heat instead of electricity to record, store, and recover data. Memory function is achieved through the coupling of near-field thermal radiation and thermal expansion resulting in negative differential thermal resistance and thermal latching. Here, we demonstrate theoretically via numerical modeling the concept of near-field thermal radiation enabled negative differential thermal resistance that achieves bistable states. Design and implementation of a practical silicon based NanoThermoMechanical memory device are proposed along with a study of its dynamic response under write/read cycles. With more than 50% of the world's energy losses being in the form of heat along with the ever increasing need to develop computer technologies which can operate in harsh environments (e.g., very high temperatures), NanoThermoMechanical memory and logic devices may hold the answer.

  19. Debugging Fortran on a shared memory machine

    SciTech Connect (OSTI)

    Allen, T.R.; Padua, D.A.

    1987-01-01

    Debugging on a parallel processor is more difficult than debugging on a serial machine because errors in a parallel program may introduce nondeterminism. The approach to parallel debugging presented here attempts to reduce the problem of debugging on a parallel machine to that of debugging on a serial machine by automatically detecting nondeterminism. 20 refs., 6 figs.

  20. On admissible memory kernels for random unitary qubit evolution

    E-Print Network [OSTI]

    Filip A. Wudarski; Pawe? Nale?yty; Gniewomir Sarbicki; Dariusz Chru?ci?ski

    2015-04-12

    We analyze random unitary evolution of the qubit within memory kernel approach. We provide su?cient conditions which guarantee that the corresponding memory kernel generates physically legitimate quantum evolution. Interestingly, we are able to recover several well known examples and generate new classes of nontrivial qubit evolution. Surprisingly, it turns out that quantum evolution with memory kernel generated by our approach gives rise to vanishing non-Markovianity measure based on the distinguishability of quantum states.

  1. Controlling the Actuation Rate of Low Density Shape Memory Polymer...

    Office of Scientific and Technical Information (OSTI)

    Controlling the Actuation Rate of Low Density Shape Memory Polymer Foams in Water Citation Details In-Document Search Title: Controlling the Actuation Rate of Low Density Shape...

  2. Miniscule Mirrored Cavities Connect Quantum Memories | U.S. DOE...

    Office of Science (SC) Website

    Miniscule Mirrored Cavities Connect Quantum Memories Basic Energy Sciences (BES) BES Home About Research Facilities Science Highlights Benefits of BES Funding Opportunities Basic...

  3. Total Recall: Detailing Nitinol's Shape-Memory Behavior | The...

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    developed. Despite its industrial popularity, the underlying physics and atomistic mechanics of Nitinol have remained unclear for over 50 years. Shape-memory alloys can remember...

  4. Departure and return : abandonment, memorial and aging in Japan

    E-Print Network [OSTI]

    Danely, Jason Allen

    2008-01-01

    The four major memorial holidays (Obon, Spring Equinox ???, Autumn Equinox ??? and New Years ???) are important daysand Spring and Autumn equinox (Ohigan). Obon ?? Obon is an

  5. Memory Effects and Transport Coefficients for Non-Newtonian Fluids

    E-Print Network [OSTI]

    T. Kodama; T. Koide

    2008-12-22

    We discuss the roles of viscosity in relativistic fluid dynamics from the point of view of memory effects. Depending on the type of quantity to which the memory effect is applied, different terms appear in higher order corrections. We show that when the memory effect applies on the extensive quantities, the hydrodynamic equations of motion become non-singular. We further discuss the question of memory effect in the derivation of transport coefficients from a microscopic theory. We generalize the application of the Green-Kubo-Nakano (GKN) to calculate transport coefficients in the framework of projection operator formalism, and derive the general formula when the fluid is non-Newtonian.

  6. Consent Order, Battelle Memorial Institute - WCO-2014-01 | Department...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    issued to Battelle Memorial Institute for deficiencies associated with the Chronic Beryllium Disease Prevention Program at DOE's Pacific Northwest National Laboratory. On...

  7. Development of Superelastic Effects in Ferrous Shape Memory Alloy

    E-Print Network [OSTI]

    Olson, Scott Michael

    SME: Shape memory effect Nitinol: Nickel-titanium shapelearned in optimizing Nitinol. To develop the properties ofbe recovered. Currently, Nitinol, an alloy made of nickel

  8. Neuromorphic, Digital and Quantum Computation with Memory Circuit Elements

    E-Print Network [OSTI]

    Yuriy V. Pershin; Massimiliano Di Ventra

    2011-09-28

    Memory effects are ubiquitous in nature and the class of memory circuit elements - which includes memristors, memcapacitors and meminductors - shows great potential to understand and simulate the associated fundamental physical processes. Here, we show that such elements can also be used in electronic schemes mimicking biologically-inspired computer architectures, performing digital logic and arithmetic operations, and can expand the capabilities of certain quantum computation schemes. In particular, we will discuss few examples where the concept of memory elements is relevant to the realization of associative memory in neuronal circuits, spike-timing-dependent plasticity of synapses, digital and field-programmable quantum computing.

  9. Memory Hierarchy Hardware-Software Co-design in Embedded Systems

    E-Print Network [OSTI]

    Ge, Zhiguo

    The memory hierarchy is the main bottleneck in modern computer systems as the gap between the speed of the processor and the memory continues to grow larger. The situation in embedded systems is even worse. The memory ...

  10. The maturational course of sequential memory and its relation to the development of frontal lobe functioning 

    E-Print Network [OSTI]

    Romine, Cassandra Burns

    2005-11-01

    processes by enhancing the organization of to-be-remembered information. Among the specific memory systems presumed to be based on anterior cerebral structures is the temporal organization of memory. An essential component of memory that involves temporal...

  11. Episodic future thinking and episodic counterfactual thinking: Intersections between memory and decisions

    E-Print Network [OSTI]

    Szpunar, Karl K.

    Episodic future thinking and episodic counterfactual thinking: Intersections between memory: Available online xxxx Keywords: Episodic memory Episodic future thinking Episodic counterfactual thinking into the relationship between memory and decision making. One line of research concerns episodic future thinking, which

  12. The Aesthetics of Remembering 9/11: Towards a Transnational Typology of Memorials

    E-Print Network [OSTI]

    Gessner, Ingrid

    2015-01-01

    s 9/11 Memorial Dedication. ” Jewish Press, November 25,ground” at the memorial’s dedication ceremony. 13 WhileNews equally stress the dedication to his job and his family

  13. On the Fourier Transform Approach to Quantum Error Control

    E-Print Network [OSTI]

    Hari Dilip Kumar

    2012-08-24

    Quantum codes are subspaces of the state space of a quantum system that are used to protect quantum information. Some common classes of quantum codes are stabilizer (or additive) codes, non-stabilizer (or non-additive) codes obtained from stabilizer codes, and Clifford codes. These are analyzed in a framework using the Fourier transform on finite groups, the finite group in question being a subgroup of the quantum error group considered. All the classes of codes that can be obtained in this framework are explored, including codes more general than Clifford codes. The error detection properties of one of these more general classes ("direct sums of translates of Clifford codes") are characterized. Examples codes are constructed, and computer code search results presented and analysed.

  14. MPI Runtime Error Detection with MUST: Advances in Deadlock Detection

    DOE Public Access Gateway for Energy & Science Beta (PAGES Beta)

    Hilbrich, Tobias; Protze, Joachim; Schulz, Martin; de Supinski, Bronis R.; Müller, Matthias S.

    2013-01-01

    The widely used Message Passing Interface (MPI) is complex and rich. As a result, application developers require automated tools to avoid and to detect MPI programming errors. We present the Marmot Umpire Scalable Tool (MUST) that detects such errors with significantly increased scalability. We present improvements to our graph-based deadlock detection approach for MPI, which cover future MPI extensions. Our enhancements also check complex MPI constructs that no previous graph-based detection approach handled correctly. Finally, we present optimizations for the processing of MPI operations that reduce runtime deadlock detection overheads. Existing approaches often require (p) analysis time per MPI operation,more »forpprocesses. We empirically observe that our improvements lead to sub-linear or better analysis time per operation for a wide range of real world applications.« less

  15. Comparison of Wind Power and Load Forecasting Error Distributions: Preprint

    SciTech Connect (OSTI)

    Hodge, B. M.; Florita, A.; Orwig, K.; Lew, D.; Milligan, M.

    2012-07-01

    The introduction of large amounts of variable and uncertain power sources, such as wind power, into the electricity grid presents a number of challenges for system operations. One issue involves the uncertainty associated with scheduling power that wind will supply in future timeframes. However, this is not an entirely new challenge; load is also variable and uncertain, and is strongly influenced by weather patterns. In this work we make a comparison between the day-ahead forecasting errors encountered in wind power forecasting and load forecasting. The study examines the distribution of errors from operational forecasting systems in two different Independent System Operator (ISO) regions for both wind power and load forecasts at the day-ahead timeframe. The day-ahead timescale is critical in power system operations because it serves the unit commitment function for slow-starting conventional generators.

  16. Method and system for reducing errors in vehicle weighing systems

    DOE Patents [OSTI]

    Hively, Lee M. (Philadelphia, TN); Abercrombie, Robert K. (Knoxville, TN)

    2010-08-24

    A method and system (10, 23) for determining vehicle weight to a precision of <0.1%, uses a plurality of weight sensing elements (23), a computer (10) for reading in weighing data for a vehicle (25) and produces a dataset representing the total weight of a vehicle via programming (40-53) that is executable by the computer (10) for (a) providing a plurality of mode parameters that characterize each oscillatory mode in the data due to movement of the vehicle during weighing, (b) by determining the oscillatory mode at which there is a minimum error in the weighing data; (c) processing the weighing data to remove that dynamical oscillation from the weighing data; and (d) repeating steps (a)-(c) until the error in the set of weighing data is <0.1% in the vehicle weight.

  17. Performance gains in memory have traditionally been obtained by increasing memory bus widths and speeds. The

    E-Print Network [OSTI]

    Jacob, Bruce

    channels have supported up to 8 DIMMs of memory, some types of DDR channels support only 4 DIMMs, DDR2 channels have but 2 DIMMs, and DDR3 channels are expected to support only a single DIMM. In addition modules is identical to that seen in DDR2 or DDR3 systems, which we shall refer to as DDRx systems

  18. On the efficiency of nondegenerate quantum error correction codes for Pauli channels

    E-Print Network [OSTI]

    Gunnar Bjork; Jonas Almlof; Isabel Sainz

    2009-05-19

    We examine the efficiency of pure, nondegenerate quantum-error correction-codes for Pauli channels. Specifically, we investigate if correction of multiple errors in a block is more efficient than using a code that only corrects one error per block. Block coding with multiple-error correction cannot increase the efficiency when the qubit error-probability is below a certain value and the code size fixed. More surprisingly, existing multiple-error correction codes with a code length equal or less than 256 qubits have lower efficiency than the optimal single-error correcting codes for any value of the qubit error-probability. We also investigate how efficient various proposed nondegenerate single-error correcting codes are compared to the limit set by the code redundancy and by the necessary conditions for hypothetically existing nondegenerate codes. We find that existing codes are close to optimal.

  19. Oil Price Trackers Inspired by Immune Memory

    E-Print Network [OSTI]

    Wilson, WIlliam; Aickelin, Uwe

    2010-01-01

    We outline initial concepts for an immune inspired algorithm to evaluate and predict oil price time series data. The proposed solution evolves a short term pool of trackers dynamically, with each member attempting to map trends and anticipate future price movements. Successful trackers feed into a long term memory pool that can generalise across repeating trend patterns. The resulting sequence of trackers, ordered in time, can be used as a forecasting tool. Examination of the pool of evolving trackers also provides valuable insight into the properties of the crude oil market.

  20. Localized quantum walks as secured quantum memory

    E-Print Network [OSTI]

    C. M. Chandrashekar; Th. Busch

    2015-04-21

    We show that a quantum walk process can be used to construct and secure quantum memory. More precisely, we show that a localized quantum walk with temporal disorder can be engineered to store the information of a single, unknown qubit on a compact position space and faithfully recover it on demand. Since the localization occurss with a finite spread in position space, the stored information of the qubit will be naturally secured from the simple eavesdropper. Our protocol can be adopted to any quantum system for which experimental control over quantum walk dynamics can be achieved.

  1. Shape memory alloy seals for geothermal applications

    SciTech Connect (OSTI)

    Friske, Warren H.; Schwartzbart, Harry

    1982-10-08

    Rockwell International's Energy Systems Group, under contract to Brookhaven National Laboratory, has completed a 2-year program to develop a novel temperature-actuated seal concept for geothermal applications. This seal concept uses the unique properties of a shape memory alloy (Nitinol) to perform the sealing function. The several advantages of the concept are discussed in the paper. Demonstration tests of both face and shaft seals have shown that leaktight seals are feasible. Supporting materials studies have included corrosion tests in geothermal fluids, elevated temperature tensile tests, experimental electroplating and metallographic evaluations of microstructures.

  2. Memorial Day Message | National Nuclear Security Administration

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantityBonneville Power Administration wouldMass map shines light on dark matter By SarahMODELINGMeetingsMembranesMemorial Day Message

  3. Levels of interaction between episodic and semantic memory: an electrophysiological and computational investigation. 

    E-Print Network [OSTI]

    Greve, Andrea

    2007-01-01

    There is compelling evidence that memory is supported by multiple, functionally independent subsystems that distinguish declarative from non-declarative memories (Tulving, 1972). The declarative subsystems, episodic and ...

  4. Memory in microbes: quantifying history-Dependent behavior in a bacterium.

    E-Print Network [OSTI]

    Wolf, Denise M.

    2010-01-01

    Memory in Microbes: Quantifying History-Dependent Behaviorboth the persistence of memory in microbes and the amount ofan evolutionary advantage in microbes as well. For instance,

  5. Memory in Microbes: Quantifying History-Dependent Behavior in a Bacterium

    E-Print Network [OSTI]

    Wolf, Denise M.

    2009-01-01

    Memory in Microbes: Quantifying History-Dependent Behaviorboth the persistence of memory in microbes and the amount ofan evolutionary advantage in microbes as well. For instance,

  6. A signal-detection-based investigation into the nature of recognition memory

    E-Print Network [OSTI]

    Mickes, Laura Beth

    2010-01-01

    memory. Memory & Cognition, Speer, N. K. , & Curran, T. (Eichenbaum, 2008; Speer & Curran, 2007; Turriziani, Fadda,unitized familiarity (cf. Speer & Curran, 2007). While this

  7. ORIGINAL PAPER Prevention of cerebral ischemia-induced memory deficits

    E-Print Network [OSTI]

    memory impairment produced pharmacologically or genetically. Comparably, much less is known about4 activity in the hippocam- pus. Memory was examined using Morris water-maze and step-through passive avoidance tests in rats subjected to global cerebral ischemia with or without repeated treatment

  8. Research Report Semantic and perceptual effects on recognition memory

    E-Print Network [OSTI]

    Curran, Tim

    al., 1999; Hunt and Elliot, 1980; Nairne, 2002; Reder et al., 2002). Although the perceptual match between study and test may not always lead to better memory (Hunt and Elliot, 1980; Nairne, 2002 that perceptual match affects recognition memory when items are distinctive (Hunt and Elliot, 1980; Reder et al

  9. External Memory Controller for Virtex II Pro Blagomir Donchev

    E-Print Network [OSTI]

    An implementation of an On Chip Memory (OCM) based Dual Data Rate external memory controller (OCM2DDR) for Virtex II Pro is described. The proposed OCM2DDR controller comprises Data Side OCM (DSOCM) bus interface module, read and write control logic, halt read module and Xilinx DDR controller IP core. The presented design

  10. Boosting FMAX of Processor Pipelines using Intentional Memory Clock Skew

    E-Print Network [OSTI]

    Lemieux, Guy

    Boosting FMAX of Processor Pipelines using Intentional Memory Clock Skew Alexander Brant 1 , Ameer--FPGAs are increasingly being used to implement many new applications, including pipelined processor designs. Designers often employ memories to communicate and pass data between these pipeline stages. However, one

  11. Familiarity in source memory Matthew V. Mollison n

    E-Print Network [OSTI]

    Curran, Tim

    Familiarity in source memory Matthew V. Mollison n , Tim Curran University of Colorado, Boulder-process recognition memory system (for reviews, see Curran, Tepe, & Piatt, 2006, Chap. 18; Eichenbaum, Yonelinas, & Ranganath, 2007; Parks & Yonelinas, 2007; Rugg & Curran, 2007; Skinner & Fernandes, 2007; Vilberg & Rugg

  12. A Scratchpad Memory Allocation Scheme for Dataflow Shamik Bandyopadhyay

    E-Print Network [OSTI]

    @eecs.berkeley.edu Edward A. Lee EECS, UC Berkeley eal@eecs.berkeley.edu August 25, 2008 Abstract Scratchpad memories energy consumption. However, program code and data must be explicitly moved in the memory hierarchy for scratchpads are low power and energy consumption, and a higher degree of predictability in program execution

  13. An Integrated Approach to Reducing Power Dissipation in Memory Hierarchies

    E-Print Network [OSTI]

    , and then propose on-chip memory module buffers, called Energy-Saver Buffers (ESB), which reside in- between the L2-delay product, Energy-Saver Buffers (ESB), integrated approach, power, RDRAM 1. INTRODUCTION One of the major costs associated with reactivating memory modules from a low- power state by introducing Energy-Saver

  14. CADS: Core-Aware Dynamic Scheduler for Multicore Memory Controllers

    E-Print Network [OSTI]

    Sun, Xian-He

    Xian-He Sun Department of Computer Science Illinois Institute of Technology, Chicago, IL 60616, USA {eolmedo, sbyna, sun}@iit.edu Abstract Memory controller scheduling is crucial in multicore processors the computing power these processors offer. However, current multicore processors are using traditional memory

  15. "To the immortal name and memory of George Washington"

    E-Print Network [OSTI]

    US Army Corps of Engineers

    "To the immortal name and memory of George Washington" The United States Army Corps of Engineers and the Construction of the Washington Monument Louis Torres #12;THE COVER Washington Monument and Surroundings, North and memory of George Washington" The United States Army Corps of Engineers and the Construction

  16. Thread Row Buffers: Improving Memory Performance Isolation and Throughput

    E-Print Network [OSTI]

    Tullsen, Dean M.

    and energy efficiency. Furthermore, concurrent execution of applications also has shown the needThread Row Buffers: Improving Memory Performance Isolation and Throughput in Multiprogrammed of performance isolation among threads in the memory controller to enforce a quality of service in virtualized

  17. Silicon optical nanocrystal memory R. J. Walters,a)

    E-Print Network [OSTI]

    Atwater, Harry

    Silicon optical nanocrystal memory R. J. Walters,a) P. G. Kik, J. D. Casperson, and H. A. Atwater (Received 19 January 2004; accepted 22 July 2004) We describe the operation of a silicon optical nanocrystal memory device. The programmed logic state of the device is read optically by the detection of high or low

  18. The Future of Memory: Remembering, Imagining, and the Brain

    E-Print Network [OSTI]

    Szpunar, Karl K.

    Neuron Review The Future of Memory: Remembering, Imagining, and the Brain Daniel L. Schacter,1 increase in research examining the role of memory in imagination and future thinking. This work has revealed striking similarities between remembering the past and imagining or simulating the future

  19. Simultaneous temperature and flux controllability for heat equations with memory

    E-Print Network [OSTI]

    Ceragioli, Francesca

    Simultaneous temperature and flux controllability for heat equations with memory S. Avdonin Torino -- Italy, luciano.pandolfi@polito.it June 14, 2010 Abstract It is known that, in the case of heat equation with memory, tem- perature can be controlled to an arbitrary square integrable target provided

  20. Word learning, phonological short-term memory, phonotactic probability and

    E-Print Network [OSTI]

    Gupta, Prahlad

    Word learning, phonological short-term memory, phonotactic probability and long-term memory of Iowa, Iowa City, IA 52242, USA Word learning is studied in a multitude of ways, and it is often for thinking about various types of studies of word learning. We then review a number of themes that in recent

  1. On the practical efficiency of shape memory engines

    SciTech Connect (OSTI)

    Mc Comick, P.G.

    1987-02-01

    An important potential application of the shape memory effect is for the conversion of low grade thermal energy into mechanical power. In view of the relatively low temperature differences involved, the conversion efficiency is of considerable practical as well as theoretical importance. The purpose of this work is to evaluate the effect of non-ideal behaviour on the efficiency of shape memory engines.

  2. Abstract--Throughout many generations of memory from DDR1 to DDR3, the internal memory architecture

    E-Print Network [OSTI]

    Balasubramonian, Rajeev

    Abstract-- Throughout many generations of memory from DDR1 to DDR3, the internal memory performance bottleneck for decades [1]. Throughout many generations of DRAM, from DDR1 to DDR3, internal exploit [3]. DRAM architecture is segmented into 4 or 8 banks (DDR2, DDR3 respectively), and each DRAM

  3. A CHARACTERISTIC GALERKIN METHOD WITH ADAPTIVE ERROR CONTROL FOR THE CONTINUOUS CASTING PROBLEM

    E-Print Network [OSTI]

    Nochetto, Ricardo H.

    A CHARACTERISTIC GALERKIN METHOD WITH ADAPTIVE ERROR CONTROL FOR THE CONTINUOUS CASTING PROBLEM casting problem is a convection­dominated nonlinearly degenerate diffusion problem. It is discretized adaptive method. Keywords. a posteriori error estimates, continuous casting, method of characteristics

  4. Simulations of error in quantum adiabatic computations of random 2-SAT instances

    E-Print Network [OSTI]

    Gill, Jay S. (Jay Singh)

    2006-01-01

    This thesis presents a series of simulations of quantum computations using the adiabatic algorithm. The goal is to explore the effect of error, using a perturbative approach that models 1-local errors to the Hamiltonian ...

  5. Design techniques for graph-based error-correcting codes and their applications 

    E-Print Network [OSTI]

    Lan, Ching Fu

    2006-04-12

    -correcting (channel) coding. The main idea of error-correcting codes is to add redundancy to the information to be transmitted so that the receiver can explore the correlation between transmitted information and redundancy and correct or detect errors caused...

  6. Shared dosimetry error in epidemiological dose-response analyses

    SciTech Connect (OSTI)

    Stram, Daniel O.; Preston, Dale L.; Sokolnikov, Mikhail; Napier, Bruce; Kopecky, Kenneth J.; Boice, John; Beck, Harold; Till, John; Bouville, Andre; Zeeb, Hajo

    2015-03-23

    Radiation dose reconstruction systems for large-scale epidemiological studies are sophisticated both in providing estimates of dose and in representing dosimetry uncertainty. For example, a computer program was used by the Hanford Thyroid Disease Study to provide 100 realizations of possible dose to study participants. The variation in realizations reflected the range of possible dose for each cohort member consistent with the data on dose determinates in the cohort. Another example is the Mayak Worker Dosimetry System 2013 which estimates both external and internal exposures and provides multiple realizations of "possible" dose history to workers given dose determinants. This paper takes up the problem of dealing with complex dosimetry systems that provide multiple realizations of dose in an epidemiologic analysis. In this paper we derive expected scores and the information matrix for a model used widely in radiation epidemiology, namely the linear excess relative risk (ERR) model that allows for a linear dose response (risk in relation to radiation) and distinguishes between modifiers of background rates and of the excess risk due to exposure. We show that treating the mean dose for each individual (calculated by averaging over the realizations) as if it was true dose (ignoring both shared and unshared dosimetry errors) gives asymptotically unbiased estimates (i.e. the score has expectation zero) and valid tests of the null hypothesis that the ERR slope ? is zero. Although the score is unbiased the information matrix (and hence the standard errors of the estimate of ?) is biased for ??0 when ignoring errors in dose estimates, and we show how to adjust the information matrix to remove this bias, using the multiple realizations of dose. The use of these methods in the context of several studies including, the Mayak Worker Cohort, and the U.S. Atomic Veterans Study, is discussed.

  7. Shared dosimetry error in epidemiological dose-response analyses

    DOE Public Access Gateway for Energy & Science Beta (PAGES Beta)

    Stram, Daniel O.; Preston, Dale L.; Sokolnikov, Mikhail; Napier, Bruce; Kopecky, Kenneth J.; Boice, John; Beck, Harold; Till, John; Bouville, Andre; Zeeb, Hajo

    2015-03-23

    Radiation dose reconstruction systems for large-scale epidemiological studies are sophisticated both in providing estimates of dose and in representing dosimetry uncertainty. For example, a computer program was used by the Hanford Thyroid Disease Study to provide 100 realizations of possible dose to study participants. The variation in realizations reflected the range of possible dose for each cohort member consistent with the data on dose determinates in the cohort. Another example is the Mayak Worker Dosimetry System 2013 which estimates both external and internal exposures and provides multiple realizations of "possible" dose history to workers given dose determinants. This paper takesmore »up the problem of dealing with complex dosimetry systems that provide multiple realizations of dose in an epidemiologic analysis. In this paper we derive expected scores and the information matrix for a model used widely in radiation epidemiology, namely the linear excess relative risk (ERR) model that allows for a linear dose response (risk in relation to radiation) and distinguishes between modifiers of background rates and of the excess risk due to exposure. We show that treating the mean dose for each individual (calculated by averaging over the realizations) as if it was true dose (ignoring both shared and unshared dosimetry errors) gives asymptotically unbiased estimates (i.e. the score has expectation zero) and valid tests of the null hypothesis that the ERR slope ? is zero. Although the score is unbiased the information matrix (and hence the standard errors of the estimate of ?) is biased for ??0 when ignoring errors in dose estimates, and we show how to adjust the information matrix to remove this bias, using the multiple realizations of dose. The use of these methods in the context of several studies including, the Mayak Worker Cohort, and the U.S. Atomic Veterans Study, is discussed.« less

  8. The Impact of Soil Sampling Errors on Variable Rate Fertilization

    SciTech Connect (OSTI)

    R. L. Hoskinson; R C. Rope; L G. Blackwood; R D. Lee; R K. Fink

    2004-07-01

    Variable rate fertilization of an agricultural field is done taking into account spatial variability in the soil’s characteristics. Most often, spatial variability in the soil’s fertility is the primary characteristic used to determine the differences in fertilizers applied from one point to the next. For several years the Idaho National Engineering and Environmental Laboratory (INEEL) has been developing a Decision Support System for Agriculture (DSS4Ag) to determine the economically optimum recipe of various fertilizers to apply at each site in a field, based on existing soil fertility at the site, predicted yield of the crop that would result (and a predicted harvest-time market price), and the current costs and compositions of the fertilizers to be applied. Typically, soil is sampled at selected points within a field, the soil samples are analyzed in a lab, and the lab-measured soil fertility of the point samples is used for spatial interpolation, in some statistical manner, to determine the soil fertility at all other points in the field. Then a decision tool determines the fertilizers to apply at each point. Our research was conducted to measure the impact on the variable rate fertilization recipe caused by variability in the measurement of the soil’s fertility at the sampling points. The variability could be laboratory analytical errors or errors from variation in the sample collection method. The results show that for many of the fertility parameters, laboratory measurement error variance exceeds the estimated variability of the fertility measure across grid locations. These errors resulted in DSS4Ag fertilizer recipe recommended application rates that differed by up to 138 pounds of urea per acre, with half the field differing by more than 57 pounds of urea per acre. For potash the difference in application rate was up to 895 pounds per acre and over half the field differed by more than 242 pounds of potash per acre. Urea and potash differences accounted for almost 87% of the cost difference. The sum of these differences could result in a $34 per acre cost difference for the fertilization. Because of these differences, better analysis or better sampling methods may need to be done, or more samples collected, to ensure that the soil measurements are truly representative of the field’s spatial variability.

  9. Error-field penetration in reversed magnetic shear configurations

    SciTech Connect (OSTI)

    Wang, H. H.; Wang, Z. X.; Wang, X. Q. [MOE Key Laboratory of Materials Modification by Beams of the Ministry of Education, School of Physics and Optoelectronic Engineering, Dalian University of Technology, Dalian 116024 (China)] [MOE Key Laboratory of Materials Modification by Beams of the Ministry of Education, School of Physics and Optoelectronic Engineering, Dalian University of Technology, Dalian 116024 (China); Wang, X. G. [School of Physics, Peking University, Beijing 100871 (China)] [School of Physics, Peking University, Beijing 100871 (China)

    2013-06-15

    Error-field penetration in reversed magnetic shear (RMS) configurations is numerically investigated by using a two-dimensional resistive magnetohydrodynamic model in slab geometry. To explore different dynamic processes in locked modes, three equilibrium states are adopted. Stable, marginal, and unstable current profiles for double tearing modes are designed by varying the current intensity between two resonant surfaces separated by a certain distance. Further, the dynamic characteristics of locked modes in the three RMS states are identified, and the relevant physics mechanisms are elucidated. The scaling behavior of critical perturbation value with initial plasma velocity is numerically obtained, which obeys previously established relevant analytical theory in the viscoresistive regime.

  10. Error 401 on upload? | OpenEI Community

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on QA:QA J-E-1 SECTION J APPENDIX ECoopButtePowerEdisto Electric Coop,Erosion Flume Jump to: navigation, search BasicError

  11. Plasma parameter scaling of the error-field penetration threshold in tokamaks Richard Fitzpatrick

    E-Print Network [OSTI]

    Fitzpatrick, Richard

    Plasma parameter scaling of the error-field penetration threshold in tokamaks Richard Fitzpatrick of a rotating tokamak plasma to a resonant error-field Phys. Plasmas 21, 092513 (2014); 10.1063/1.4896244 A nonideal error-field response model for strongly shaped tokamak plasmas Phys. Plasmas 17, 112502 (2010); 10

  12. Matt Duckham Page 1 Implementing an object-oriented error sensitive GIS

    E-Print Network [OSTI]

    Duckham, Matt

    Matt Duckham Page 1 Implementing an object-oriented error sensitive GIS Matt Duckham Department in the handling of uncertainty within GIS, the production of what has been described as an error sensitive GIS of opportunities, but also impediments to the implemen- tation of such an error sensitive GIS. An important barrier

  13. Repeated quantum error correction on a continuously encoded qubit by real-time feedback

    E-Print Network [OSTI]

    Julia Cramer; Norbert Kalb; M. Adriaan Rol; Bas Hensen; Machiel S. Blok; Matthew Markham; Daniel J. Twitchen; Ronald Hanson; Tim H. Taminiau

    2015-08-06

    Reliable quantum information processing in the face of errors is a major fundamental and technological challenge. Quantum error correction protects quantum states by encoding a logical quantum bit (qubit) in multiple physical qubits, so that errors can be detected without affecting the encoded state. To be compatible with universal fault-tolerant computations, it is essential that the states remain encoded at all times and that errors are actively corrected. Here we demonstrate such active error correction on a continuously protected qubit using a diamond quantum processor. We encode a logical qubit in three long-lived nuclear spins, repeatedly detect phase errors by non-destructive measurements using an ancilla electron spin, and apply corrections on the encoded state by real-time feedback. The actively error-corrected qubit is robust against errors and multiple rounds of error correction prevent errors from accumulating. Moreover, by correcting phase errors naturally induced by the environment, we demonstrate that encoded quantum superposition states are preserved beyond the dephasing time of the best physical qubit used in the encoding. These results establish a powerful platform for the fundamental investigation of error correction under different types of noise and mark an important step towards fault-tolerant quantum information processing.

  14. Simulating and Detecting Radiation-Induced Errors for Onboard Machine Learning

    E-Print Network [OSTI]

    Simulating and Detecting Radiation-Induced Errors for Onboard Machine Learning Robert Granat, Kiri-based fault tolerance (ABFT) methods into onboard data analysis algorithms to detect radiation-induced errors for detecting and recovering from such errors. A common hardware technique for achieving radiation protection

  15. Edit: Study -APP Save | Exit | Hide/Show Errors | Print... | Jump To

    E-Print Network [OSTI]

    Biederman, Irving

    Edit: Study - APP Save | Exit | Hide/Show Errors | Print... | Jump To: 01. Project Guidance Save | Exit | Hide/Show Errors | Print... | Jump To: 01. Project IdentificationStarDev/ResourceAdministration/Project/ProjectEditor?Project=com... 1 #12;Edit: Study - APP- Save | Exit | Hide/Show Errors | Print... | Jump To: 02. Study

  16. Error Correction on a Tree: An Instanton Approach V. Chernyak,1

    E-Print Network [OSTI]

    Stepanov, Misha

    or semianalytical estimating of the post-error correction bit error rate (BER) when a forward-error correction 630090, Russia 5 Department of Electrical Engineering, University of Arizona, Tucson, Arizona 85721, USA is utilized for transmitting information through a noisy channel. The generic method that applies to a variety

  17. Exposure Measurement Error in Time-Series Studies of Air Pollution: Concepts and Consequences

    E-Print Network [OSTI]

    Dominici, Francesca

    1 Exposure Measurement Error in Time-Series Studies of Air Pollution: Concepts and Consequences S in time-series studies 1 11/11/99 Keywords: measurement error, air pollution, time series, exposure of air pollution and health. Because measurement error may have substantial implications for interpreting

  18. Towards neuro-memory-chip: Imprinting multiple memories in cultured neural networks

    SciTech Connect (OSTI)

    Baruchi, Itay; Ben-Jacob, Eshel [School of Physics and Astronomy, Raymond and Beverly Sackler Faculty of Exact Sciences, Tel-Aviv University, Tel-Aviv 69978 (Israel)

    2007-05-15

    We show that using local chemical stimulations it is possible to imprint persisting (days) multiple memories (collective modes of neuron firing) in the activity of cultured neural networks. Microdroplets of inhibitory antagonist are injected at a location selected based on real-time analysis of the recorded activity. The neurons at the stimulated locations turn into a focus for initiating synchronized bursting events (the collective modes) each with its own specific spatiotemporal pattern of neuron firing.

  19. Verification of unfold error estimates in the UFO code

    SciTech Connect (OSTI)

    Fehl, D.L.; Biggs, F.

    1996-07-01

    Spectral unfolding is an inverse mathematical operation which attempts to obtain spectral source information from a set of tabulated response functions and data measurements. Several unfold algorithms have appeared over the past 30 years; among them is the UFO (UnFold Operator) code. In addition to an unfolded spectrum, UFO also estimates the unfold uncertainty (error) induced by running the code in a Monte Carlo fashion with prescribed data distributions (Gaussian deviates). In the problem studied, data were simulated from an arbitrarily chosen blackbody spectrum (10 keV) and a set of overlapping response functions. The data were assumed to have an imprecision of 5% (standard deviation). 100 random data sets were generated. The built-in estimate of unfold uncertainty agreed with the Monte Carlo estimate to within the statistical resolution of this relatively small sample size (95% confidence level). A possible 10% bias between the two methods was unresolved. The Monte Carlo technique is also useful in underdetemined problems, for which the error matrix method does not apply. UFO has been applied to the diagnosis of low energy x rays emitted by Z-Pinch and ion-beam driven hohlraums.

  20. New insights on numerical error in symplectic integration

    E-Print Network [OSTI]

    Hugo Jiménez-Pérez; Jean-Pierre Vilotte; Barbara Romanowicz

    2015-08-13

    We implement and investigate the numerical properties of a new family of integrators connecting both variants of the symplectic Euler schemes, and including an alternative to the classical symplectic mid-point scheme, with some additional terms. This family is derived from a new method, introduced in a previous study, for generating symplectic integrators based on the concept of special symplectic manifold. The use of symplectic rotations and a particular type of projection keeps the whole procedure within the symplectic framework. We show that it is possible to define a set of parameters that control the additional terms providing a way of "tuning" these new symplectic schemes. We test the "tuned" symplectic integrators with the perturbed pendulum and we compare its behavior with an explicit scheme for perturbed systems. Remarkably, for the given examples, the error in the energy integral can be reduced considerably. There is a natural geometrical explanation, sketched at the end of this paper. This is the subject of a parallel article where a finer analysis is performed. Numerical results obtained in this paper open a new point of view on symplectic integrators and Hamiltonian error.

  1. Aperiodic dynamical decoupling sequences in presence of pulse errors

    E-Print Network [OSTI]

    Zhi-Hui Wang; V. V. Dobrovitski

    2011-01-12

    Dynamical decoupling (DD) is a promising tool for preserving the quantum states of qubits. However, small imperfections in the control pulses can seriously affect the fidelity of decoupling, and qualitatively change the evolution of the controlled system at long times. Using both analytical and numerical tools, we theoretically investigate the effect of the pulse errors accumulation for two aperiodic DD sequences, the Uhrig's DD UDD) protocol [G. S. Uhrig, Phys. Rev. Lett. {\\bf 98}, 100504 (2007)], and the Quadratic DD (QDD) protocol [J. R. West, B. H. Fong and D. A. Lidar, Phys. Rev. Lett {\\bf 104}, 130501 (2010)]. We consider the implementation of these sequences using the electron spins of phosphorus donors in silicon, where DD sequences are applied to suppress dephasing of the donor spins. The dependence of the decoupling fidelity on different initial states of the spins is the focus of our study. We investigate in detail the initial drop in the DD fidelity, and its long-term saturation. We also demonstrate that by applying the control pulses along different directions, the performance of QDD protocols can be noticeably improved, and explain the reason of such an improvement. Our results can be useful for future implementations of the aperiodic decoupling protocols, and for better understanding of the impact of errors on quantum control of spins.

  2. Memory Constraints for Power-Law Series

    E-Print Network [OSTI]

    Guo, Fangjian; Zhao, Zhi-Dan; Zhou, Tao

    2015-01-01

    Many time series produced by complex systems are empirically found to follow power-law distributions with different exponents $\\alpha$. By permuting the independently drawn samples from a power-law distribution, we present non-trivial bounds on the memory (1st-order autocorrelation) as a function of $\\alpha$, which are markedly different from the ordinary $\\pm 1$ bounds for Gaussian or uniform distributions. When $1 3$, the upper bound remains +1 while the lower bound descends below 0. Theoretical bounds agree well with numerical simulations. Based on the ratings of MovieLens and posts in Twitter, we also find that empirical power-law distributed data produced by human activities conform to such constraints.

  3. Optically Loaded Semiconductor Quantum Memory Register

    E-Print Network [OSTI]

    Danny Kim; Andrey A. Kiselev; Richard S. Ross; Matthew T. Rakher; Cody Jones; Thaddeus D. Ladd

    2015-07-30

    We propose and analyze an optically loaded quantum memory exploiting capacitive coupling between self-assembled quantum dot molecules and electrically gated quantum dot molecules. The self-assembled dots are used for spin-photon entanglement, which is transferred to the gated dots for long-term storage or processing via a teleportation process heralded by single-photon detection. We illustrate a device architecture enabling this interaction and we outline its operation and fabrication. We provide self-consistent Poisson-Schroedinger simulations to establish the design viability and refine the design, and to estimate the physical coupling parameters and their sensitivities to dot placement. The device we propose generates heralded copies of an entangled state between a photonic qubit and a solid-state qubit with a rapid reset time upon failure. The resulting fast rate of entanglement generation is of high utility for heralded quantum networking scenarios involving lossy optical channels.

  4. Remote direct memory access over datagrams

    DOE Patents [OSTI]

    Grant, Ryan Eric; Rashti, Mohammad Javad; Balaji, Pavan; Afsahi, Ahmad

    2014-12-02

    A communication stack for providing remote direct memory access (RDMA) over a datagram network is disclosed. The communication stack has a user level interface configured to accept datagram related input and communicate with an RDMA enabled network interface card (NIC) via an NIC driver. The communication stack also has an RDMA protocol layer configured to supply one or more data transfer primitives for the datagram related input of the user level. The communication stack further has a direct data placement (DDP) layer configured to transfer the datagram related input from a user storage to a transport layer based on the one or more data transfer primitives by way of a lower layer protocol (LLP) over the datagram network.

  5. Memory effects and active Brownian diffusion

    E-Print Network [OSTI]

    Ghosh, Pulak K; Marchegiani, Giampiero; Marchesoni, Fabio

    2015-01-01

    A self-propelled artificial microswimmer is often modeled as a ballistic Brownian particle moving with constant speed aligned along one of its axis, but changing direction due to random collisions with the environment. Similarly to thermal noise, its angular randomization is described as a memoryless stochastic process. Here, we speculate that finite-time correlations in the orientational dynamics can affect the swimmer's diffusivity. To this purpose we propose and solve two alternative models. In the first one we simply assume that the environmental fluctuations governing the swimmer's propulsion are exponentially correlated in time, whereas in the second one we account for possible damped fluctuations of the propulsion velocity around the swimmer's axis. The corresponding swimmer's diffusion constants are predicted to get, respectively, enhanced or suppressed upon increasing the model memory time. Possible consequences of this effect on the interpretation of the experimental data are discussed.

  6. Memory effects and active Brownian diffusion

    E-Print Network [OSTI]

    Pulak K. Ghosh; Yunyun Li; Giampiero Marchegiani; Fabio Marchesoni

    2015-11-19

    A self-propelled artificial microswimmer is often modeled as a ballistic Brownian particle moving with constant speed aligned along one of its axis, but changing direction due to random collisions with the environment. Similarly to thermal noise, its angular randomization is described as a memoryless stochastic process. Here, we speculate that finite-time correlations in the orientational dynamics can affect the swimmer's diffusivity. To this purpose we propose and solve two alternative models. In the first one we simply assume that the environmental fluctuations governing the swimmer's propulsion are exponentially correlated in time, whereas in the second one we account for possible damped fluctuations of the propulsion velocity around the swimmer's axis. The corresponding swimmer's diffusion constants are predicted to get, respectively, enhanced or suppressed upon increasing the model memory time. Possible consequences of this effect on the interpretation of the experimental data are discussed.

  7. Direct memory access transfer completion notification

    DOE Patents [OSTI]

    Chen, Dong (Croton on Hudson, NY); Giampapa, Mark E. (Irvington, NY); Heidelberger, Philip (Cortlandt Manor, NY); Kumar, Sameer (White Plains, NY); Parker, Jeffrey J. (Rochester, MN); Steinmacher-Burow, Burkhard D. (Esslingen, DE); Vranas, Pavlos (Danville, CA)

    2010-07-27

    Methods, compute nodes, and computer program products are provided for direct memory access (`DMA`) transfer completion notification. Embodiments include determining, by an origin DMA engine on an origin compute node, whether a data descriptor for an application message to be sent to a target compute node is currently in an injection first-in-first-out (`FIFO`) buffer in dependence upon a sequence number previously associated with the data descriptor, the total number of descriptors currently in the injection FIFO buffer, and the current sequence number for the newest data descriptor stored in the injection FIFO buffer; and notifying a processor core on the origin DMA engine that the message has been sent if the data descriptor for the message is not currently in the injection FIFO buffer.

  8. Shape memory alloy seals for geothermal applications

    SciTech Connect (OSTI)

    Not Available

    1985-09-15

    A shape memory radial seal was fabricated with a ''U'' cross section. Upon heating the seal recovered its original ''V'' shape and produced a high pressure seal. The sealing pressure which can be developed is approximately 41 MPa (60,000 psi), well in excess of the pressure which can be produced in conventional elastomeric seals. The low modulus martensite can conform readily to the sealing surface, and upon recovery produce a seal capable of high pressure fluid or gas confinement. The corrosion resistance of nickel-titanium in a broad range of aggressive fluids has been well established and, as such, there is little doubt that, had time permitted, a geothermal pump of flange fluid tried would have been successful.

  9. Solid state engine using Nitinol memory alloy

    SciTech Connect (OSTI)

    Golestaneh, A.A.

    1981-12-01

    A device for converting heat energy to mechanical energy includes a reservoir of a hot fluid and a rotor assembly mounted thereabove so a portion of it dips into the hot fluid. The rotor assembly may include a shaft having four spokes extending radially outwardly therefrom at right angles to each other, a floating ring and four flexible elements composed of a thermal memory material having a critical temperature between the temperature of the hot fluid and that of the ambient atmosphere extending between the ends of the spokes and the floating ring. Preferably, the flexible elements are attached to the floating ring through curved leaf springs. Energetic shape recovery of the flexible elements in the hot fluid causes the rotor assembly to rotate.

  10. Direct memory access transfer completion notification

    DOE Patents [OSTI]

    Archer, Charles J. (Rochester, MN); Blocksome, Michael A. (Rochester, MN); Parker, Jeffrey J. (Rochester, MN)

    2011-02-15

    DMA transfer completion notification includes: inserting, by an origin DMA engine on an origin node in an injection first-in-first-out (`FIFO`) buffer, a data descriptor for an application message to be transferred to a target node on behalf of an application on the origin node; inserting, by the origin DMA engine, a completion notification descriptor in the injection FIFO buffer after the data descriptor for the message, the completion notification descriptor specifying a packet header for a completion notification packet; transferring, by the origin DMA engine to the target node, the message in dependence upon the data descriptor; sending, by the origin DMA engine, the completion notification packet to a local reception FIFO buffer using a local memory FIFO transfer operation; and notifying, by the origin DMA engine, the application that transfer of the message is complete in response to receiving the completion notification packet in the local reception FIFO buffer.

  11. Solid state engine using nitinol memory alloy

    DOE Patents [OSTI]

    Golestaneh, Ahmad A. (Bolingbrook, IL)

    1981-01-01

    A device for converting heat energy to mechanical energy includes a reservoir of a hot fluid and a rotor assembly mounted thereabove so a portion of it dips into the hot fluid. The rotor assembly may include a shaft having four spokes extending radially outwardly therefrom at right angles to each other, a floating ring and four flexible elements composed of a thermal memory material having a critical temperature between the temperature of the hot fluid and that of the ambient atmosphere extending between the ends of the spokes and the floating ring. Preferably, the flexible elements are attached to the floating ring through curved leaf springs. Energetic shape recovery of the flexible elements in the hot fluid causes the rotor assembly to rotate.

  12. Solid state engine using nitinol memory alloy

    DOE Patents [OSTI]

    Golestaneh, A.A.

    1980-01-21

    A device for converting heat energy to mechanical energy includes a reservoir of a hot fluid and a rotor assembly mounted thereabove so a portion of it dips into the hot fluid. The rotor assembly may include a shaft having four spokes extending radially outwardly therefrom at right angles to each other, a floating ring and four flexible elements composed of a thermal memory material having a critical temperature between the temperature of the hot fluid and that of the ambient atmosphere extending between the ends of the spokes and the floating ring. Preferably, the flexible elements are attached to the floating ring through curved leaf springs. Energetic shape recovery of the flexible elements in the hot fluid causes the rotor assembly to rotate.

  13. Write-Once Read-Many-Times (WORM) Memory based on Zinc Oxide on Silicon

    E-Print Network [OSTI]

    Zhang, Qing

    2011-01-01

    has well developed growth technologies. 10 All those factsbeam epitaxial growth technology have shown excellent memory

  14. A Single-System Signal-Detection Theory of Repetition Priming and Recognition Memory

    E-Print Network [OSTI]

    Henson, Rik

    of unconscious memory: Merikle and Reingold (1991) revisited", in Journal of Experimental Psychology: Learning: Insights from a computational model" in Journal of Memory and Language, 55, 515-533. Chapters 5-6 are based in current memory research is that there are distinct implicit (unconscious) and explicit (conscious) memory

  15. Monitoring Data Structures using Hardware Transactional Memory Rutgers University DCS-TR-662, December 2009

    E-Print Network [OSTI]

    Ganapathy, Vinod

    in harware transactional memory (HTM) systems to addition- ally enforce programmer-specified consistency

  16. Hardware support for collecting performance counters directly to memory

    DOE Patents [OSTI]

    Gara, Alan; Salapura, Valentina; Wisniewski, Robert W.

    2012-09-25

    Hardware support for collecting performance counters directly to memory, in one aspect, may include a plurality of performance counters operable to collect one or more counts of one or more selected activities. A first storage element may be operable to store an address of a memory location. A second storage element may be operable to store a value indicating whether the hardware should begin copying. A state machine may be operable to detect the value in the second storage element and trigger hardware copying of data in selected one or more of the plurality of performance counters to the memory location whose address is stored in the first storage element.

  17. The combustion synthesis of Ni-Ti shape memory alloys

    SciTech Connect (OSTI)

    Moore, J.J.; Yi, H.C. (Colorado School of Mines, Golden (USA))

    1990-08-01

    Combustion synthesis of Ni-Ti-series shape-memory alloys yields both time and energy savings over conventional production methods. The solidified combustion synthesis process products have been cold-rolled into plates which exhibit the shape-memory effect, and it was noted that shape-memory transition temperatures may be tailored over a -78 to 460 C temperature range through the substitution of a third element for Ni; this element may be Pd or Fe. Accounts are given of the experimental combustion syntheses of Ni-Ti-Fe and Ti-Ni-Pd. 24 refs.

  18. An examination of content similarity within the memory of HPC applications.

    SciTech Connect (OSTI)

    Levy, Scott N. [University of New Mexico; Bridges, Patrick G. [University of New Mexico; Ferreira, Kurt Brian; Thompson, Aidan Patrick; Trott, Christian Robert

    2013-01-01

    Memory content similarity has been e ectively exploited for more than a decade to reduce memory consumption. By consolidating duplicate and similar pages in the address space of an application, we can reduce the amount of memory it consumes without negatively a ecting the application's perception of the memory resources available to it. In addition to memory de-duplication, there may be many other ways that we can exploit memory content similarity to improve system characteristics. In this paper, we examine the memory content similarity of several HPC applications. By characterizing the memory contents of these applications, we hope to provide a basis for ef- forts to e ectively exploit memory content similarity to improve system performance beyond memory deduplication. We show that several applications exhibit signi cant similarity and consider the source of the similarity.

  19. Pollution error in the h-version of the finite-element method and the local quality of a-posteriori error estimators 

    E-Print Network [OSTI]

    Mathur, Anuj

    1994-01-01

    In this work we study the pollution-error in the h-version of the finite element method and its effect on the local quality of a-posteriori error estimators. We show that the pollution-effect in an interior subdomain depends on the relationship...

  20. Errors, 3rd printing Page 3, Fig 1.2 has an error in the stratigraphic key: "Tertiary" should be "Triassic".

    E-Print Network [OSTI]

    Fossen, Haakon

    Errors, 3rd printing ·Page 3, Fig 1.2 has an error in the stratigraphic key: "Tertiary" should "-amplitude" to "-wavelength". ·Page 231, 6th and 3rd last lines of the page: Add "Figure" in front of 19.5a ..." and 3rd line: "three principal axes" (not two). #12;

  1. Coordinated joint motion control system with position error correction

    DOE Patents [OSTI]

    Danko, George (Reno, NV)

    2011-11-22

    Disclosed are an articulated hydraulic machine supporting, control system and control method for same. The articulated hydraulic machine has an end effector for performing useful work. The control system is capable of controlling the end effector for automated movement along a preselected trajectory. The control system has a position error correction system to correct discrepancies between an actual end effector trajectory and a desired end effector trajectory. The correction system can employ one or more absolute position signals provided by one or more acceleration sensors supported by one or more movable machine elements. Good trajectory positioning and repeatability can be obtained. A two-joystick controller system is enabled, which can in some cases facilitate the operator's task and enhance their work quality and productivity.

  2. Error field penetration and locking to the backward propagating wave

    DOE Public Access Gateway for Energy & Science Beta (PAGES Beta)

    Finn, John M.; Cole, Andrew J.; Brennan, Dylan P.

    2015-12-30

    In this letter we investigate error field penetration, or locking, behavior in plasmas having stable tearing modes with finite real frequencies wr in the plasma frame. In particular, we address the fact that locking can drive a significant equilibrium flow. We show that this occurs at a velocity slightly above v = wr/k, corresponding to the interaction with a backward propagating tearing mode in the plasma frame. Results are discussed for a few typical tearing mode regimes, including a new derivation showing that the existence of real frequencies occurs for viscoresistive tearing modes, in an analysis including the effects ofmore »pressure gradient, curvature and parallel dynamics. The general result of locking to a finite velocity flow is applicable to a wide range of tearing mode regimes, indeed any regime where real frequencies occur.« less

  3. Nanocrystalline Ge Flash Memories: Electrical Characterization and Trap Engineering

    E-Print Network [OSTI]

    Kan, Eric Win Hong

    Conventional floating gate non-volatile memories (NVMs) present critical issues for device scalability beyond the sub-90 nm node, such as gate length and tunnel oxide thickness reduction. Nanocrystalline germanium (nc-Ge) ...

  4. Collective Memory Transfers for Multi-Core Chips

    SciTech Connect (OSTI)

    Michelogiannakis, George; Williams, Alexander; Shalf, John

    2013-11-13

    Future performance improvements for microprocessors have shifted from clock frequency scaling towards increases in on-chip parallelism. Performance improvements for a wide variety of parallel applications require domain-decomposition of data arrays from a contiguous arrangement in memory to a tiled layout for on-chip L1 data caches and scratchpads. How- ever, DRAM performance suffers under the non-streaming access patterns generated by many independent cores. We propose collective memory scheduling (CMS) that actively takes control of collective memory transfers such that requests arrive in a sequential and predictable fashion to the memory controller. CMS uses the hierarchically tiled arrays formal- ism to compactly express collective operations, which greatly improves programmability over conventional prefetch or list- DMA approaches. CMS reduces application execution time by up to 32% and DRAM read power by 2.2×, compared to a baseline DMA architecture such as STI Cell.

  5. Conceptual short term memory in perception and thought

    E-Print Network [OSTI]

    Potter, Mary C.

    Conceptual short term memory (CSTM) is a theoretical construct that provides one answer to the question of how perceptual and conceptual processes are related. CSTM is a mental buffer and processor in which current perceptual ...

  6. Thermomechanical Characterization and Modeling of Shape Memory Polymers 

    E-Print Network [OSTI]

    Volk, Brent L.

    2010-01-16

    This work focuses on the thermomechanical characterization and constitutive model calibration of shape memory polymers (SMPs). These polymers have the ability to recover seemingly permanent large deformations under the ...

  7. The implications of working set analysis on supercomputing memory...

    Office of Scientific and Technical Information (OSTI)

    the SPEC-FP suite is a well balanced suite, supercomputing applications typically demand more from the memory system and must perform more 'other work' (in the form of integer...

  8. Characterization of Shape Memory Alloys Using Artificial Neural Networks 

    E-Print Network [OSTI]

    Henrickson, James V

    2014-04-28

    shape memory alloy material parameters with satisfactory accuracy. Comparison of the implemented training data generation methods indicates that the Taguchi-based approach yields an artificial neural network that outperforms that of the factorial...

  9. CoNiGa High Temperature Shape Memory Alloys 

    E-Print Network [OSTI]

    Dogan, Ebubekir

    2011-10-21

    Shape memory alloys (SMAs) are an important class of smart materials that have the ability to remember a shape. Current practical uses of SMAs are limited to below 100 degrees C which is the limit for the transformation ...

  10. A phenomenological constitutive model for magnetic shape memory alloys 

    E-Print Network [OSTI]

    Kiefer, Bjoern

    2007-04-25

    A thermodynamics-based constitutive model is derived which predicts the nonlinear strain and magnetization response that magnetic shape memory alloys (MSMAs) exhibit when subjected to mechanical and magnetic loads. The ...

  11. MemTable : contextual memory in group workspaces

    E-Print Network [OSTI]

    Hunter, Seth E

    2009-01-01

    This thesis presents the design and implementation of MemTable, an interactive touch table that supports co-located group meetings by capturing both digital and physical interactions in its memory. The goal of the project ...

  12. ERPs and Neural Oscillations during Volitional Suppression of Memory Retrieval

    E-Print Network [OSTI]

    Curran, Tim

    , Nick Ketz1*, Matthew V. Mollison1*, Erika Nyhus2 , Marie T. Banich1,3 , and Tim Curran1 Abstract, indicating that cognitive control can influence long-term memory retrieval (Depue, Banich, & Curran, 2006

  13. The Effects of Ageing on Memory and Thinking 

    E-Print Network [OSTI]

    Ford, Amanda

    2007-01-01

    The main aim of the present study is to examine the effects of ageing on memory and thinking by examining verbal fluency performance. More specifically looking at the differences between older and younger people, to ...

  14. Actuator 3 Piezoelectric and shape memory alloy technology

    E-Print Network [OSTI]

    Simpkins, Alex

    such as transducers and actuators. piezoelectric effect (sensor application) #12;Piezoelectric propertyActuator 3 ­ Piezoelectric and shape memory alloy technology ME490A Dr. CEon by Dr. Kee Moon #12;#12;#12;Piezoelectric property Direct piezoelectric effect

  15. Mpemba paradox: Hydrogen bond memory and water-skin supersolidity

    E-Print Network [OSTI]

    Chang Q Sun

    2015-01-05

    Numerical reproduction of measurements, experimental evidence for skin super-solidity and hydrogen-bond memory clarified that Mpemba paradox integrates the heat emission-conduction-dissipation dynamics in the source-path-drain cycle system.

  16. Constitutive equations for superelasticity in crystalline shape-memory materials

    E-Print Network [OSTI]

    Thamburaja, Prakash, 1974-

    2002-01-01

    A crystal-mechanics-based constitutive model for polycrystalline shape-memory materials has been developed. The model has been implemented in a finite-element program. Finite-element calculations of polycrystal response ...

  17. Scalable directoryless shared memory coherence using execution migration

    E-Print Network [OSTI]

    Lis, Mieszko

    2010-11-22

    We introduce the concept of deadlock-free migration-based coherent shared memory to the NUCA family of architectures. Migration-based architectures move threads among cores to guarantee sequential semantics in large ...

  18. Shape memory alloy for vibration isolation and damping 

    E-Print Network [OSTI]

    Machado, Luciano G

    2008-10-10

    This work investigates the use of shape memory alloys (SMAs) for vibration isolation and damping of mechanical systems. The first part of this work evaluates the nonlinear dynamics of a passive vibration isolation and ...

  19. Dynamic Memory Usage Optimization using ILP and J. Ramanujam2

    E-Print Network [OSTI]

    Ramanujam, J. "Ram"

    Dept., Assiut University, Egypt 2 Electrical and Computer Engineering Dept, Louisiana State UniversityDynamic Memory Usage Optimization using ILP A. Allam1 and J. Ramanujam2 1 Electrical Engineering

  20. Symbiotic Solid State Drives : : Management of Modern NAND Flash Memory

    E-Print Network [OSTI]

    Caulfield, Laura Marie

    In Symposium on Mass Storage Systems, pages 1–12, 2011. [79]Management for Flash Storage System. pages 284 –289, 1999. [NAND Flash Memory-Based Storage Systems. SIGOPS OSR, 42(6):