Sample records for memory corruption error

  1. T-609: Adobe Acrobat/Reader Memory Corruption Error in CoolType Library Lets Remote Users Execute Arbitrary Code

    Broader source: Energy.gov [DOE]

    A remote user can create a specially crafted PDF file that, when loaded by the target user, will trigger a memory corruption error in the CoolType library and execute arbitrary code on the target system. The code will run with the privileges of the target user.

  2. T-625: Opera Frameset Handling Memory Corruption Vulnerability

    Broader source: Energy.gov [DOE]

    The vulnerability is caused due to an error when handling certain frameset constructs during page unloading and can be exploited to corrupt memory via a specially crafted web page.

  3. T-622: Adobe Acrobat and Reader Unspecified Memory Corruption Vulnerability

    Broader source: Energy.gov [DOE]

    The vulnerability is due to an unspecified error in the affected software when it processes .pdf files. An unauthenticated, remote attacker could exploit this vulnerability by convincing a user to view a malicious .pdf file. When viewed, the file could trigger a memory corruption error that could allow the attacker to execute arbitrary code on the system with the privileges of the user.

  4. V-176: Adobe Flash Player Memory Corruption Flaw Lets Remote...

    Broader source: Energy.gov (indexed) [DOE]

    Adobe Flash Player Memory Corruption Flaw Lets Remote Users Execute Arbitrary Code PLATFORM: Adobe Flash Player 11.7.700.202 and earlier versions for Windows Adobe Flash Player...

  5. T-545: RealPlayer Heap Corruption Error in 'vidplin.dll' Lets...

    Energy Savers [EERE]

    T-545: RealPlayer Heap Corruption Error in 'vidplin.dll' Lets Remote Users Execute Arbitrary Code T-545: RealPlayer Heap Corruption Error in 'vidplin.dll' Lets Remote Users Execute...

  6. Corruption

    E-Print Network [OSTI]

    Banerjee, Abhijit

    2012-03-13T23:59:59.000Z

    In this paper, we provide a new framework for analyzing corruption in public bureaucracies. The standard way to model corruption is as an example of moral hazard, which then leads to a focus on better monitoring and ...

  7. Evaluating operating system vulnerability to memory errors.

    SciTech Connect (OSTI)

    Ferreira, Kurt Brian; Bridges, Patrick G. (University of New Mexico); Pedretti, Kevin Thomas Tauke; Mueller, Frank (North Carolina State University); Fiala, David (North Carolina State University); Brightwell, Ronald Brian

    2012-05-01T23:59:59.000Z

    Reliability is of great concern to the scalability of extreme-scale systems. Of particular concern are soft errors in main memory, which are a leading cause of failures on current systems and are predicted to be the leading cause on future systems. While great effort has gone into designing algorithms and applications that can continue to make progress in the presence of these errors without restarting, the most critical software running on a node, the operating system (OS), is currently left relatively unprotected. OS resiliency is of particular importance because, though this software typically represents a small footprint of a compute node's physical memory, recent studies show more memory errors in this region of memory than the remainder of the system. In this paper, we investigate the soft error vulnerability of two operating systems used in current and future high-performance computing systems: Kitten, the lightweight kernel developed at Sandia National Laboratories, and CLE, a high-performance Linux-based operating system developed by Cray. For each of these platforms, we outline major structures and subsystems that are vulnerable to soft errors and describe methods that could be used to reconstruct damaged state. Our results show the Kitten lightweight operating system may be an easier target to harden against memory errors due to its smaller memory footprint, largely deterministic state, and simpler system structure.

  8. Improving Memory Error Handling Using Linux

    SciTech Connect (OSTI)

    Carlton, Michael Andrew [Los Alamos National Lab. (LANL), Los Alamos, NM (United States); Blanchard, Sean P. [Los Alamos National Lab. (LANL), Los Alamos, NM (United States); Debardeleben, Nathan A. [Los Alamos National Lab. (LANL), Los Alamos, NM (United States)

    2014-07-25T23:59:59.000Z

    As supercomputers continue to get faster and more powerful in the future, they will also have more nodes. If nothing is done, then the amount of memory in supercomputer clusters will soon grow large enough that memory failures will be unmanageable to deal with by manually replacing memory DIMMs. "Improving Memory Error Handling Using Linux" is a process oriented method to solve this problem by using the Linux kernel to disable (offline) faulty memory pages containing bad addresses, preventing them from being used again by a process. The process of offlining memory pages simplifies error handling and results in reducing both hardware and manpower costs required to run Los Alamos National Laboratory (LANL) clusters. This process will be necessary for the future of supercomputing to allow the development of exascale computers. It will not be feasible without memory error handling to manually replace the number of DIMMs that will fail daily on a machine consisting of 32-128 petabytes of memory. Testing reveals the process of offlining memory pages works and is relatively simple to use. As more and more testing is conducted, the entire process will be automated within the high-performance computing (HPC) monitoring software, Zenoss, at LANL.

  9. Running head: STEREOTYPE THREAT REDUCES MEMORY ERRORS Stereotype threat can reduce older adults' memory errors

    E-Print Network [OSTI]

    Mather, Mara

    Running head: STEREOTYPE THREAT REDUCES MEMORY ERRORS Stereotype threat can reduce older adults, 90089-0191. Phone: 213-740-6772. Email: barbersa@usc.edu #12;STEREOTYPE THREAT REDUCES MEMORY ERRORS 2 Abstract (144 words) Stereotype threat often incurs the cost of reducing the amount of information

  10. Quantum Error Correction for Quantum Memories

    E-Print Network [OSTI]

    Barbara M. Terhal

    2015-01-20T23:59:59.000Z

    Active quantum error correction using qubit stabilizer codes has emerged as a promising, but experimentally challenging, engineering program for building a universal quantum computer. In this review we consider the formalism of qubit stabilizer and subsystem stabilizer codes and their possible use in protecting quantum information in a quantum memory. We review the theory of fault-tolerance and quantum error-correction, discuss examples of various codes and code constructions, the general quantum error correction conditions, the noise threshold, the special role played by Clifford gates and the route towards fault-tolerant universal quantum computation. The second part of the review is focused on providing an overview of quantum error correction using two-dimensional (topological) codes, in particular the surface code architecture. We discuss the complexity of decoding and the notion of passive or self-correcting quantum memories. The review does not focus on a particular technology but discusses topics that will be relevant for various quantum technologies.

  11. Susceptibility of Commodity Systems and Software to Memory Soft Errors

    E-Print Network [OSTI]

    Riska, Alma

    Susceptibility of Commodity Systems and Software to Memory Soft Errors Alan Messer, Member, IEEE Abstract--It is widely understood that most system downtime is acounted for by programming errors transient errors in computer system hardware due to external factors, such as cosmic rays. This work

  12. Coding Techniques for Error Correction and Rewriting in Flash Memories

    E-Print Network [OSTI]

    Mohammed, Shoeb Ahmed

    2010-10-12T23:59:59.000Z

    CODING TECHNIQUES FOR ERROR CORRECTION AND REWRITING IN FLASH MEMORIES A Thesis by SHOEB AHMED MOHAMMED Submitted to the Office of Graduate Studies of Texas A&M University in partial fulfillment of the requirements for the degree of MASTER... OF SCIENCE August 2010 Major Subject: Electrical Engineering CODING TECHNIQUES FOR ERROR CORRECTION AND REWRITING IN FLASH MEMORIES A Thesis by SHOEB AHMED MOHAMMED Submitted to the Office of Graduate Studies of Texas A&M University in partial...

  13. A Memory Soft Error Measurement on Production Systems Xin Li Kai Shen Michael C. Huang

    E-Print Network [OSTI]

    Shen, Kai

    A Memory Soft Error Measurement on Production Systems Xin Li Kai Shen Michael C. Huang University and dealing with these soft (or transient) errors is impor- tant for system reliability. Several earlier for memory soft error measurement on production systems where performance impact on existing running ap

  14. A Memory Soft Error Measurement on Production Systems # Xin Li Kai Shen Michael C. Huang

    E-Print Network [OSTI]

    Shen, Kai

    A Memory Soft Error Measurement on Production Systems # Xin Li Kai Shen Michael C. Huang University and dealing with these soft (or transient) errors is impor­ tant for system reliability. Several earlier for memory soft error measurement on production systems where performance impact on existing running ap

  15. U-064: Adobe Acrobat/Reader PRC Memory Corruption Error Lets Remote Users Execute Arbitrary Code

    Broader source: Energy.gov [DOE]

    A vulnerability was reported in Adobe Acrobat/Reader, this vulnerability is being actively exploited against Windows-based systems.

  16. V-228: RealPlayer Buffer Overflow and Memory Corruption Error...

    Broader source: Energy.gov (indexed) [DOE]

    were reported in RealPlayer PLATFORM: RealPlayer 16.0.2.32 and prior ABSTRACT: A remote user can cause arbitrary code to be executed on the target user's system REFERENCE...

  17. V-228: RealPlayer Buffer Overflow and Memory Corruption Error Let Remote

    Energy Savers [EERE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page onYou are now leaving Energy.gov You are now leaving Energy.gov You are being directed off Energy.gov. Are you sureReportsofDepartmentSeries |

  18. V-194: Citrix XenServer Memory Management Error Lets Local Administrat...

    Broader source: Energy.gov (indexed) [DOE]

    a memory management page reference counting error to gain access on the target host server. IMPACT: A local user on the guest operating system can obtain access on the target...

  19. Decay of motor memories in the absence of error Pavan A. Vaswani1 and Reza Shadmehr2

    E-Print Network [OSTI]

    Shadmehr, Reza

    1 Decay of motor memories in the absence of error Pavan A. Vaswani1 and Reza Shadmehr2 1. Department of Neuroscience, 2. Department of Biomedical Engineering Laboratory for Computational Motor@jhmi.edu Running title: Decay of motor memories Keywords: motor control, motor learning, decay, error

  20. Error bounds for space-time discretizations of a 3D model for shape-memory materials

    E-Print Network [OSTI]

    Stefanelli, Ulisse

    Error bounds for space-time discretizations of a 3D model for shape-memory materials Alexander in shape- memory materials. After recalling existence and uniqueness results, a fully evolution of shape-memory alloys (SMAs). The latter are metallic alloys showing some surprising thermo

  1. Corruption in Developing Countries

    E-Print Network [OSTI]

    Olken, Benjamin A.

    Recent years have seen a remarkable expansion in economists' ability to measure corruption. This in turn has led to a new generation of well-identified, microeconomic studies. We review the evidence on corruption in ...

  2. Register file soft error recovery

    DOE Patents [OSTI]

    Fleischer, Bruce M.; Fox, Thomas W.; Wait, Charles D.; Muff, Adam J.; Watson, III, Alfred T.

    2013-10-15T23:59:59.000Z

    Register file soft error recovery including a system that includes a first register file and a second register file that mirrors the first register file. The system also includes an arithmetic pipeline for receiving data read from the first register file, and error detection circuitry to detect whether the data read from the first register file includes corrupted data. The system further includes error recovery circuitry to insert an error recovery instruction into the arithmetic pipeline in response to detecting the corrupted data. The inserted error recovery instruction replaces the corrupted data in the first register file with a copy of the data from the second register file.

  3. Corruption, Institutions and Economic Development

    E-Print Network [OSTI]

    Aidt, Toke S

    and in developing the underlying theory (Dasgupta, 2001, chapter 9; Hamilton and Clemens, 1999). Loosely speaking, sustainable development is related to an economy?s ability to maintain living standards through time. More precisely, Arrow et al. (2004) suggest... capita ?a direct measure of sustainable development ?and corruption. While corruption may have little average e¤ect on the growth rate of GDP per capita, it is a likely source of unsustainable development. Key words: Corruption, Growth, Sustainable...

  4. Curing Corruption in Illinois: Anti-Corruption Report Number 1

    E-Print Network [OSTI]

    Illinois at Chicago, University of

    ` Curing Corruption in Illinois: Anti-Corruption Report Number 1 February 3, 2009 Authored By would come to local officials for housing and work, thus turning public office into the market for jobs and franchises to enrich themselves. They even awarded the city's gas business to a fictional company they had

  5. ROBERT MCNAB AND KATHLEEN BAILEY MANUSCRIPT 2: DEFINING CORRUPTION

    E-Print Network [OSTI]

    to be a corrupt action, given the individual saw no explicit private benefit? From Nye's perspective, 1964). The literature commonly defines corruption as, "the abuse of public power for private benefit: "the use of public office for private gain."3 From this perspective, corruption is connected explicitly

  6. The Sweet Temptation of Corruption: Understanding Corrupt Actions by Experiments in the US and Germany

    E-Print Network [OSTI]

    Kubbe, Ina

    2015-01-01T23:59:59.000Z

    costs of corruption. Bonn, Germany, available at: http://appendix). German-Sample In Germany, 348 subjects took part175-196. Appendix Age Germany US Obs Field of Study African

  7. CORRUPTION AND ILLEGAL LOGGING IN THE WOOD

    E-Print Network [OSTI]

    Pettenella, Davide

    CORRUPTION AND ILLEGAL LOGGING IN THE WOOD PRODUCTS MARKET: the Italian experience in controlling Science 7 May 2004 Paper organization 1. State of the problem 2. Are Italian companies involved in deforestation and trade of illegal logging? 3. Which are the most affected countries? 4. Why do we need

  8. U-002:Adobe Photoshop Elements Multiple Memory Corruption Vulnerabilities

    Broader source: Energy.gov [DOE]

    A remote user can create a file that, when loaded by the target user, will execute arbitrary code on the target user's system.

  9. T-627: Adobe Flash Player Memory Corruption | Department of Energy

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742EnergyOn April 23, 2014,Zaleski -BlueprintThisVulnerabilities | DepartmentDepartment|Adobe Flash

  10. When Crime Pays: Measuring Judicial Efficacy against Corruption in Brazil

    E-Print Network [OSTI]

    Ribeiro de Alencar, Carlos Higino; Gico, Ivo Jr.

    2010-01-01T23:59:59.000Z

    for now - crime pays in Brazil. Paginal5de27 ReferencesEfficacy against Corruption in Brazil Carlos Higino Ribeiroa widespread perception in Brazil that civil servants caught

  11. Optimal Power Flow: Closing the Loop over Corrupted Data

    E-Print Network [OSTI]

    Johansson, Karl Henrik

    application are the Supervisory Control and Data Acquisition (SCADA) systems. In power networks, the SCADA System. Modern SCADA/EMS systems collect large amounts of measurement data and, using a State Estimator attack. We denote the data corruption by a. cyber attacks on SCADA/EMS systems operating power net- works

  12. HOW MUCH MEMORY RADIATION PROTECTION DO ONBOARD MACHINE LEARNING ALGORITHMS REQUIRE?

    E-Print Network [OSTI]

    Wagstaff, Kiri L.

    and Correction), which employs a "mem- ory scrubber" process to continually check memory for errors (Shirvani et-bit errors. However, in addition to the processing overhead imposed by the memory scrubber, EDAC also imposes

  13. T-545: RealPlayer Heap Corruption Error in 'vidplin.dll' Lets Remote Users

    Energy Savers [EERE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page onYou are now leaving Energy.gov You are now leaving Energy.gov You are being directed offOCHCO Overview OCHCOSystems Analysis Success Stories Systems Analysis Success Stories JuneExecute

  14. The pros and cons of corruption of firm performance : a micro-level study of businesses in Indonesia

    E-Print Network [OSTI]

    Murdaya, Karuna

    2005-01-01T23:59:59.000Z

    Over the past 10 years, different international organization and NGO's have given birth to a whole host of different anti corruption programs in response to the recent "endemic" of corruption which is seen to plague ...

  15. Cultural attitudes to corruption : a perspective on the interplay between cultural and legal norms for Western businesses operating in China

    E-Print Network [OSTI]

    Winters, Timothy (Timothy Mark)

    2013-01-01T23:59:59.000Z

    Corruption is an important challenge facing those who wish to do business in China. Beyond the commercial context, corruption and attitudes towards it are also more broadly relevant to politics, political economics and ...

  16. Corruption of Pulsed Electric Thruster Voltage Fluctuation Measurements by Transmission Line

    E-Print Network [OSTI]

    Choueiri, Edgar

    Corruption of Pulsed Electric Thruster Voltage Fluctuation Measurements by Transmission Line to transmission line corruption--as an experimental example of the extent to which the power transmission line can termination resistance s Laplace variable V (t) transmission line driving signal Vn Laplace transform

  17. LOCAL GOVERNANCE, ANTI-CORRUPTION AND REDD+ IN LATIN AMERICA AND THE CARIBBEAN

    E-Print Network [OSTI]

    LOCAL GOVERNANCE, ANTI-CORRUPTION AND REDD+ IN LATIN AMERICA AND THE CARIBBEAN: EXPLORING SYNERGIES AND THE CARIBBEAN: EXPLORING SYNERGIES TO STRENGTHEN TRANSPARENCY AND ACCOUNTABILITY 2 #12;LOCAL GOVERNANCE, ANTI-CORRUPTION AND REDD+ IN LATIN AMERICA AND THE CARIBBEAN: EXPLORING SYNERGIES TO STRENGTHEN TRANSPARENCY

  18. An Appliance-driven Approach to Detection of Corrupted Load Curve Data

    E-Print Network [OSTI]

    Pei, Jian

    An Appliance-driven Approach to Detection of Corrupted Load Curve Data Guoming Tang1,3 , Kui Wu1@sfu.ca, jiuyang_tang@nudt.edu.cn, jshlei@shiep.edu.cn ABSTRACT Load curve data in power systems refers to users discov- ered in the data. Load curve data, however, usually suffers from corruptions caused by various

  19. Corrupt and Illegal Activities in the Forestry Sector: Current understandings, and implications for World Bank

    E-Print Network [OSTI]

    Corrupt and Illegal Activities in the Forestry Sector: Current understandings, and implications.org/eap/eap.nsf/Attachments/FLEG_OB6/$File/OB+6+FPR+Paper+-+Illegal+Actions+-+Debra+Callister.pdf #12;TABLE OF CONTENTS INTRODUCTION CHAPTER 1 1. DESCRIBING THE PROBLEM: ITS NATURE, CAUSES, SCALE AND IMPACT 1.1 Types of corrupt and illegal

  20. Using End-to-End Statistics to Distinguish Congestion and Corruption Losses

    E-Print Network [OSTI]

    Vaidya, Nitin

    ://www.cs.tamu.edu/faculty/vaidya/mobile.html Technical Report 97-009 August 18, 1997 Abstract On wireless links, the rate of corruption losses canUsing End-to-End Statistics to Distinguish Congestion and Corruption Losses: A Negative Result Saad be signi cant, leading to poor TCP performance. The performance gets worse when these losses are mistaken

  1. T-569: Adobe Flash SWF File Processing Memory Corruption Remote Code Execution Vulnerability

    Broader source: Energy.gov [DOE]

    Critical vulnerabilities have been identified in Adobe Flash Player 10.1.102.64 and earlier versions for Windows, Macintosh, Linux, and Solaris. These vulnerabilities could cause the application to crash and could potentially allow an attacker to take control of the affected system.

  2. U-166: Adobe Shockwave Player Memory Corruption Flaws Let Remote Users Execute Arbitrary Code

    Broader source: Energy.gov [DOE]

    Multiple vulnerabilities were reported in Adobe Shockwave Player. A remote user can cause arbitrary code to be executed on the target user's system.

  3. V-176: Adobe Flash Player Memory Corruption Flaw Lets Remote Users Execute

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742Energy China 2015of 2005UNSDepartmentFebruaryPhase|PotomacDepartment ofConductThere isArbitrary

  4. Field error lottery

    SciTech Connect (OSTI)

    Elliott, C.J.; McVey, B. (Los Alamos National Lab., NM (USA)); Quimby, D.C. (Spectra Technology, Inc., Bellevue, WA (USA))

    1990-01-01T23:59:59.000Z

    The level of field errors in an FEL is an important determinant of its performance. We have computed 3D performance of a large laser subsystem subjected to field errors of various types. These calculations have been guided by simple models such as SWOOP. The technique of choice is utilization of the FELEX free electron laser code that now possesses extensive engineering capabilities. Modeling includes the ability to establish tolerances of various types: fast and slow scale field bowing, field error level, beam position monitor error level, gap errors, defocusing errors, energy slew, displacement and pointing errors. Many effects of these errors on relative gain and relative power extraction are displayed and are the essential elements of determining an error budget. The random errors also depend on the particular random number seed used in the calculation. The simultaneous display of the performance versus error level of cases with multiple seeds illustrates the variations attributable to stochasticity of this model. All these errors are evaluated numerically for comprehensive engineering of the system. In particular, gap errors are found to place requirements beyond mechanical tolerances of {plus minus}25{mu}m, and amelioration of these may occur by a procedure utilizing direct measurement of the magnetic fields at assembly time. 4 refs., 12 figs.

  5. Abstract--: Corruption in India is deemed an accepted reality by most Indians who spend at least Rs4000.00 a year on it. Even basic

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    with a renewable energy metal fuel cell are a last mile in eliminating corruption by privatization--anti corruption, aircrafts, metal air fuel cells, green technology, shared runway condominiums, privatization. INTRODUCTION Corruption defined by the authority on it the Transparency International India, has placed India

  6. Transmission of O-band wavelength-division-multiplexed heralded photons over a noise-corrupted optical fiber channel

    E-Print Network [OSTI]

    Mao Tong Liu; Han Chuen Lim

    2013-12-15T23:59:59.000Z

    We transmitted O-band heralded photons over 10 km of optical fiber in a proof-of-concept experiment demonstrating the feasibility of using heralded photons to improve the noise tolerance of quantum key distribution. In our experiment, the optical fiber channel was corrupted by noise photons to the extent that if we had used an attenuated laser as the photon source, a photon signal-to-noise ratio of 10.0%, would have prevented the effective generation of secure keys. Using a photon heralding scheme, the photon signal-to-noise ratio in our experiment was shown to be > 7.8. This corresponds to a quantum bit-error rate of < 5.7%, which is good enough for distilling secure keys. In addition, we showed that it is possible to incorporate wavelength-division-multiplexing into the photon heralding scheme to improve overall key rate. We discussed and clarified the prospects and limitations of the photon heralding scheme for noise-tolerant quantum key distribution.

  7. Scanning, Filtering and Prediction for Random Fields Corrupted by Gaussian Noise

    E-Print Network [OSTI]

    Weissman, Tsachy

    Scanning, Filtering and Prediction for Random Fields Corrupted by Gaussian Noise Asaf Cohen and how far is the performance of widely used scanning methods from the optimum. We formally define the problem of scanning and filtering, derive a bound on the best achievable performance and quantify

  8. Error detection method

    SciTech Connect (OSTI)

    Olson, Eric J.

    2013-06-11T23:59:59.000Z

    An apparatus, program product, and method that run an algorithm on a hardware based processor, generate a hardware error as a result of running the algorithm, generate an algorithm output for the algorithm, compare the algorithm output to another output for the algorithm, and detect the hardware error from the comparison. The algorithm is designed to cause the hardware based processor to heat to a degree that increases the likelihood of hardware errors to manifest, and the hardware error is observable in the algorithm output. As such, electronic components may be sufficiently heated and/or sufficiently stressed to create better conditions for generating hardware errors, and the output of the algorithm may be compared at the end of the run to detect a hardware error that occurred anywhere during the run that may otherwise not be detected by traditional methodologies (e.g., due to cooling, insufficient heat and/or stress, etc.).

  9. Flexible and Transparent Memory

    E-Print Network [OSTI]

    KIM, SUNG MIN

    2012-01-01T23:59:59.000Z

    H. Seo and K. L. Wang. , “Flexible and Transparent Memory”2] S. Kim and J. Lee “Flexible Organic Transistor MemoryMemory Transistors for Flexible Sensor Arrays” Science, Vol.

  10. A Case for Soft Error Detection and Correction in Computational Chemistry

    SciTech Connect (OSTI)

    van Dam, Hubertus JJ; Vishnu, Abhinav; De Jong, Wibe A.

    2013-09-10T23:59:59.000Z

    High performance computing platforms are expected to deliver 10(18) floating operations per second by the year 2022 through the deployment of millions of cores. Even if every core is highly reliable the sheer number of the them will mean that the mean time between failures will become so short that most applications runs will suffer at least one fault. In particular soft errors caused by intermittent incorrect behavior of the hardware are a concern as they lead to silent data corruption. In this paper we investigate the impact of soft errors on optimization algorithms using Hartree-Fock as a particular example. Optimization algorithms iteratively reduce the error in the initial guess to reach the intended solution. Therefore they may intuitively appear to be resilient to soft errors. Our results show that this is true for soft errors of small magnitudes but not for large errors. We suggest error detection and correction mechanisms for different classes of data structures. The results obtained with these mechanisms indicate that we can correct more than 95% of the soft errors at moderate increases in the computational cost.

  11. Thermodynamics of error correction

    E-Print Network [OSTI]

    Sartori, Pablo

    2015-01-01T23:59:59.000Z

    Information processing at the molecular scale is limited by thermal fluctuations. This can cause undesired consequences in copying information since thermal noise can lead to errors that can compromise the functionality of the copy. For example, a high error rate during DNA duplication can lead to cell death. Given the importance of accurate copying at the molecular scale, it is fundamental to understand its thermodynamic features. In this paper, we derive a universal expression for the copy error as a function of entropy production and dissipated work of the process. Its derivation is based on the second law of thermodynamics, hence its validity is independent of the details of the molecular machinery, be it any polymerase or artificial copying device. Using this expression, we find that information can be copied in three different regimes. In two of them, work is dissipated to either increase or decrease the error. In the third regime, the protocol extracts work while correcting errors, reminiscent of a Max...

  12. Grid-scale Fluctuations and Forecast Error in Wind Power

    E-Print Network [OSTI]

    G. Bel; C. P. Connaughton; M. Toots; M. M. Bandi

    2015-03-29T23:59:59.000Z

    The fluctuations in wind power entering an electrical grid (Irish grid) were analyzed and found to exhibit correlated fluctuations with a self-similar structure, a signature of large-scale correlations in atmospheric turbulence. The statistical structure of temporal correlations for fluctuations in generated and forecast time series was used to quantify two types of forecast error: a timescale error ($e_{\\tau}$) that quantifies the deviations between the high frequency components of the forecast and the generated time series, and a scaling error ($e_{\\zeta}$) that quantifies the degree to which the models fail to predict temporal correlations in the fluctuations of the generated power. With no $a$ $priori$ knowledge of the forecast models, we suggest a simple memory kernel that reduces both the timescale error ($e_{\\tau}$) and the scaling error ($e_{\\zeta}$).

  13. Grid-scale Fluctuations and Forecast Error in Wind Power

    E-Print Network [OSTI]

    Bel, G; Toots, M; Bandi, M M

    2015-01-01T23:59:59.000Z

    The fluctuations in wind power entering an electrical grid (Irish grid) were analyzed and found to exhibit correlated fluctuations with a self-similar structure, a signature of large-scale correlations in atmospheric turbulence. The statistical structure of temporal correlations for fluctuations in generated and forecast time series was used to quantify two types of forecast error: a timescale error ($e_{\\tau}$) that quantifies the deviations between the high frequency components of the forecast and the generated time series, and a scaling error ($e_{\\zeta}$) that quantifies the degree to which the models fail to predict temporal correlations in the fluctuations of the generated power. With no $a$ $priori$ knowledge of the forecast models, we suggest a simple memory kernel that reduces both the timescale error ($e_{\\tau}$) and the scaling error ($e_{\\zeta}$).

  14. Corruption kills On the anniversary of Haiti's devastating quake, Nicholas Ambraseys and

    E-Print Network [OSTI]

    Bilham, Roger

    Corruption kills On the anniversary of Haiti's devastating quake, Nicholas Ambraseys and Roger from last year's Haiti earthquake compared with the absence of any fatalities in New Zea- land.162 L.AbAssi/MiNUsTAH/GeTTyiMAGes Port-au-Prince, Haiti, 2010. 1 3 J A n u A r y 2 0 1 1 | V O L 4 6 9

  15. Optical memory

    DOE Patents [OSTI]

    Mao, Samuel S; Zhang, Yanfeng

    2013-07-02T23:59:59.000Z

    Optical memory comprising: a semiconductor wire, a first electrode, a second electrode, a light source, a means for producing a first voltage at the first electrode, a means for producing a second voltage at the second electrode, and a means for determining the presence of an electrical voltage across the first electrode and the second electrode exceeding a predefined voltage. The first voltage, preferably less than 0 volts, different from said second voltage. The semiconductor wire is optically transparent and has a bandgap less than the energy produced by the light source. The light source is optically connected to the semiconductor wire. The first electrode and the second electrode are electrically insulated from each other and said semiconductor wire.

  16. Quantum error control codes

    E-Print Network [OSTI]

    Abdelhamid Awad Aly Ahmed, Sala

    2008-10-10T23:59:59.000Z

    QUANTUM ERROR CONTROL CODES A Dissertation by SALAH ABDELHAMID AWAD ALY AHMED Submitted to the Office of Graduate Studies of Texas A&M University in partial fulfillment of the requirements for the degree of DOCTOR OF PHILOSOPHY May 2008 Major... Subject: Computer Science QUANTUM ERROR CONTROL CODES A Dissertation by SALAH ABDELHAMID AWAD ALY AHMED Submitted to the Office of Graduate Studies of Texas A&M University in partial fulfillment of the requirements for the degree of DOCTOR OF PHILOSOPHY...

  17. Thermodynamics of error correction

    E-Print Network [OSTI]

    Pablo Sartori; Simone Pigolotti

    2015-04-24T23:59:59.000Z

    Information processing at the molecular scale is limited by thermal fluctuations. This can cause undesired consequences in copying information since thermal noise can lead to errors that can compromise the functionality of the copy. For example, a high error rate during DNA duplication can lead to cell death. Given the importance of accurate copying at the molecular scale, it is fundamental to understand its thermodynamic features. In this paper, we derive a universal expression for the copy error as a function of entropy production and dissipated work of the process. Its derivation is based on the second law of thermodynamics, hence its validity is independent of the details of the molecular machinery, be it any polymerase or artificial copying device. Using this expression, we find that information can be copied in three different regimes. In two of them, work is dissipated to either increase or decrease the error. In the third regime, the protocol extracts work while correcting errors, reminiscent of a Maxwell demon. As a case study, we apply our framework to study a copy protocol assisted by kinetic proofreading, and show that it can operate in any of these three regimes. We finally show that, for any effective proofreading scheme, error reduction is limited by the chemical driving of the proofreading reaction.

  18. Quantum Error Correction Workshop on

    E-Print Network [OSTI]

    Grassl, Markus

    Error Correction Avoiding Errors: Mathematical Model decomposition of the interaction algebra;Quantum Error Correction Designed Hamiltonians Main idea: "perturb the system to make it more stable" · fast (local) control operations = average Hamiltonian with more symmetry (cf. techniques from NMR

  19. Dynamic Prediction of Concurrency Errors

    E-Print Network [OSTI]

    Sadowski, Caitlin

    2012-01-01T23:59:59.000Z

    Relation 15 Must-Before Race Prediction 16 Implementation 17viii Abstract Dynamic Prediction of Concurrency Errors bySANTA CRUZ DYNAMIC PREDICTION OF CONCURRENCY ERRORS A

  20. Using Graphs for Fast Error Term Approximation of Time-varying Datasets

    SciTech Connect (OSTI)

    Nuber, C; LaMar, E C; Pascucci, V; Hamann, B; Joy, K I

    2003-02-27T23:59:59.000Z

    We present a method for the efficient computation and storage of approximations of error tables used for error estimation of a region between different time steps in time-varying datasets. The error between two time steps is defined as the distance between the data of these time steps. Error tables are used to look up the error between different time steps of a time-varying dataset, especially when run time error computation is expensive. However, even the generation of error tables itself can be expensive. For n time steps, the exact error look-up table (which stores the error values for all pairs of time steps in a matrix) has a memory complexity and pre-processing time complexity of O(n2), and O(1) for error retrieval. Our approximate error look-up table approach uses trees, where the leaf nodes represent original time steps, and interior nodes contain an average (or best-representative) of the children nodes. The error computed on an edge of a tree describes the distance between the two nodes on that edge. Evaluating the error between two different time steps requires traversing a path between the two leaf nodes, and accumulating the errors on the traversed edges. For n time steps, this scheme has a memory complexity and pre-processing time complexity of O(nlog(n)), a significant improvement over the exact scheme; the error retrieval complexity is O(log(n)). As we do not need to calculate all possible n2 error terms, our approach is a fast way to generate the approximation.

  1. Memory abstractions for parallel programming

    E-Print Network [OSTI]

    Lee, I-Ting Angelina

    2012-01-01T23:59:59.000Z

    A memory abstraction is an abstraction layer between the program execution and the memory that provides a different "view" of a memory location depending on the execution context in which the memory access is made. Properly ...

  2. Edison memory upgrade

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Edison memory upgraded during the maintenance in Jan 13-16, 2015 Edison memory upgraded during the maintenance in Jan 13-16, 2015 January 16, 2015 (0 Comments) Edison compute node...

  3. Drifting absence :: drafting memory

    E-Print Network [OSTI]

    Kuhn, Marlene Eva

    2006-01-01T23:59:59.000Z

    The emotive power of a memorial derives from its ability to engage the viewer in active remembrance. The project considers the limitations of a monumentality which embraces a distinct division between viewer and memorial. ...

  4. Hard Data on Soft Errors: A Large-Scale Assessment of Real-World Error Rates in GPGPU

    E-Print Network [OSTI]

    Haque, Imran S

    2009-01-01T23:59:59.000Z

    Graphics processing units (GPUs) are gaining widespread use in computational chemistry and other scientific simulation contexts because of their huge performance advantages relative to conventional CPUs. However, the reliability of GPUs in error-intolerant applications is largely unproven. In particular, a lack of error checking and correcting (ECC) capability in the memory subsystems of graphics cards has been cited as a hindrance to the acceptance of GPUs as high-performance coprocessors, but the impact of this design has not been previously quantified. In this article we present MemtestG80, our software for assessing memory error rates on NVIDIA G80 and GT200-architecture-based graphics cards. Furthermore, we present the results of a large-scale assessment of GPU error rate, conducted by running MemtestG80 on over 20,000 hosts on the Folding@home distributed computing network. Our control experiments on consumer-grade and dedicated-GPGPU hardware in a controlled environment found no errors. However, our su...

  5. Modular error embedding

    DOE Patents [OSTI]

    Sandford, II, Maxwell T. (Los Alamos, NM); Handel, Theodore G. (Los Alamos, NM); Ettinger, J. Mark (Los Alamos, NM)

    1999-01-01T23:59:59.000Z

    A method of embedding auxiliary information into the digital representation of host data containing noise in the low-order bits. The method applies to digital data representing analog signals, for example digital images. The method reduces the error introduced by other methods that replace the low-order bits with auxiliary information. By a substantially reverse process, the embedded auxiliary data can be retrieved easily by an authorized user through use of a digital key. The modular error embedding method includes a process to permute the order in which the host data values are processed. The method doubles the amount of auxiliary information that can be added to host data values, in comparison with bit-replacement methods for high bit-rate coding. The invention preserves human perception of the meaning and content of the host data, permitting the addition of auxiliary data in the amount of 50% or greater of the original host data.

  6. Approaches to Quantum Error Correction

    E-Print Network [OSTI]

    Julia Kempe

    2006-12-21T23:59:59.000Z

    The purpose of this little survey is to give a simple description of the main approaches to quantum error correction and quantum fault-tolerance. Our goal is to convey the necessary intuitions both for the problems and their solutions in this area. After characterising quantum errors we present several error-correction schemes and outline the elements of a full fledged fault-tolerant computation, which works error-free even though all of its components can be faulty. We also mention alternative approaches to error-correction, so called error-avoiding or decoherence-free schemes. Technical details and generalisations are kept to a minimum.

  7. STATISTICAL MODEL OF SYSTEMATIC ERRORS: LINEAR ERROR MODEL

    E-Print Network [OSTI]

    Rudnyi, Evgenii B.

    to apply. The algorithm to maximize a likelihood function in the case of a non-linear physico - the same variances of errors 3.1. One-way classification 3.2. Linear regression 4. Real case (vaporizationSTATISTICAL MODEL OF SYSTEMATIC ERRORS: LINEAR ERROR MODEL E.B. Rudnyi Department of Chemistry

  8. Memory Module-level Testing and Error Behaviors for Phase Change Memory

    E-Print Network [OSTI]

    Minnesota, University of

    of Minnesota, Minneapolis, MN, 55455 Department of Electrical and Computer Engineering, Virginia Commonwealth

  9. Unequal Error Protection Turbo Codes

    E-Print Network [OSTI]

    Henkel, Werner

    Unequal Error Protection Turbo Codes Diploma Thesis Neele von Deetzen Arbeitsbereich Nachrichtentechnik School of Engineering and Science Bremen, February 28th, 2005 #12;Unequal Error Protection Turbo Convolutional Codes / Turbo Codes 18 3.1 Structure

  10. EIA - Sorry! Unexpected Error

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742EnergyOnItem NotEnergy,ARMFormsGasRelease Date:research community -- hosted byCold Fusion Error

  11. Uncertainty quantification and error analysis

    SciTech Connect (OSTI)

    Higdon, Dave M [Los Alamos National Laboratory; Anderson, Mark C [Los Alamos National Laboratory; Habib, Salman [Los Alamos National Laboratory; Klein, Richard [Los Alamos National Laboratory; Berliner, Mark [OHIO STATE UNIV.; Covey, Curt [LLNL; Ghattas, Omar [UNIV OF TEXAS; Graziani, Carlo [UNIV OF CHICAGO; Seager, Mark [LLNL; Sefcik, Joseph [LLNL; Stark, Philip [UC/BERKELEY; Stewart, James [SNL

    2010-01-01T23:59:59.000Z

    UQ studies all sources of error and uncertainty, including: systematic and stochastic measurement error; ignorance; limitations of theoretical models; limitations of numerical representations of those models; limitations on the accuracy and reliability of computations, approximations, and algorithms; and human error. A more precise definition for UQ is suggested below.

  12. [MRO] Oligocrystalline Shape Memory Alloys

    E-Print Network [OSTI]

    Chen, Ying

    Copper-based shape memory alloys (SMAs) exhibit excellent shape memory properties in single crystalline form. However, when they are polycrystalline, their shape memory properties are severely compromised by brittle fracture ...

  13. Franklin Trouble Shooting and Error Messages

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Trouble Shooting and Error Messages Trouble Shooting and Error Messages Error Messages Message or Symptom Fault Recommendation job hit wallclock time limit user or system Submit...

  14. Technology strategy for the semiconductor memory market

    E-Print Network [OSTI]

    Nakamura, Tomohiko

    2012-01-01T23:59:59.000Z

    Solid state memories are used in a variety of applications as data and code storages. A non-volatile memory is a memory that retains information when its power supply is off. Flash memory is a type of nonvolatile memory ...

  15. Nested Quantum Error Correction Codes

    E-Print Network [OSTI]

    Zhuo Wang; Kai Sun; Hen Fan; Vlatko Vedral

    2009-09-28T23:59:59.000Z

    The theory of quantum error correction was established more than a decade ago as the primary tool for fighting decoherence in quantum information processing. Although great progress has already been made in this field, limited methods are available in constructing new quantum error correction codes from old codes. Here we exhibit a simple and general method to construct new quantum error correction codes by nesting certain quantum codes together. The problem of finding long quantum error correction codes is reduced to that of searching several short length quantum codes with certain properties. Our method works for all length and all distance codes, and is quite efficient to construct optimal or near optimal codes. Two main known methods in constructing new codes from old codes in quantum error-correction theory, the concatenating and pasting, can be understood in the framework of nested quantum error correction codes.

  16. Computer memory management system

    DOE Patents [OSTI]

    Kirk, III, Whitson John (Greenwood, MO)

    2002-01-01T23:59:59.000Z

    A computer memory management system utilizing a memory structure system of "intelligent" pointers in which information related to the use status of the memory structure is designed into the pointer. Through this pointer system, The present invention provides essentially automatic memory management (often referred to as garbage collection) by allowing relationships between objects to have definite memory management behavior by use of coding protocol which describes when relationships should be maintained and when the relationships should be broken. In one aspect, the present invention system allows automatic breaking of strong links to facilitate object garbage collection, coupled with relationship adjectives which define deletion of associated objects. In another aspect, The present invention includes simple-to-use infinite undo/redo functionality in that it has the capability, through a simple function call, to undo all of the changes made to a data model since the previous `valid state` was noted.

  17. Finding beam focus errors automatically

    SciTech Connect (OSTI)

    Lee, M.J.; Clearwater, S.H.; Kleban, S.D.

    1987-01-01T23:59:59.000Z

    An automated method for finding beam focus errors using an optimization program called COMFORT-PLUS. The steps involved in finding the correction factors using COMFORT-PLUS has been used to find the beam focus errors for two damping rings at the SLAC Linear Collider. The program is to be used as an off-line program to analyze actual measured data for any SLC system. A limitation on the application of this procedure is found to be that it depends on the magnitude of the machine errors. Another is that the program is not totally automated since the user must decide a priori where to look for errors. (LEW)

  18. Data& Error Analysis 1 DATA and ERROR ANALYSIS

    E-Print Network [OSTI]

    Mukasyan, Alexander

    Data& Error Analysis 1 DATA and ERROR ANALYSIS Performing the experiment and collecting data learned, you might get a better grade.) Data analysis should NOT be delayed until all of the data. This will help one avoid the problem of spending an entire class collecting bad data because of a mistake

  19. On the Characterization and Optimization of On-Chip Cache Reliability against Soft Errors

    E-Print Network [OSTI]

    Ziavras, Sotirios G.

    --Soft errors induced by energetic particle strikes in on-chip cache memories have become an increasing challenge in designing new generation reliable microprocessors. Previous efforts have exploited information. In this paper, we propose a new framework for conducting comprehensive studies and characterization

  20. Linking Error, Passage of Time, the Cerebellum and the Primary Motor

    E-Print Network [OSTI]

    Shadmehr, Reza

    i Linking Error, Passage of Time, the Cerebellum and the Primary Motor Cortex to the Multiple Timescales of Motor Memory By Sarah Hemminger A dissertation submitted to the Johns Hopkins University could account for a large body of behavioral data in numerous motor adaptation paradigms. The idea

  1. Memory with memory: Soft assignment in Genetic Programming

    E-Print Network [OSTI]

    Poli, Riccardo

    Keywords Genetic Programming, Linear GP, Soft assignment, Memory with memory, Symbolic regressionMemory with memory: Soft assignment in Genetic Programming Nicholas Freitag McPhee Division was carried over to most versions of genetic programming (GP) that had state and assignments. This includes

  2. Memory with Memory: Soft Assignment in Genetic Programming

    E-Print Network [OSTI]

    Fernandez, Thomas

    Keywords Genetic Programming, Linear GP, Soft assignment, Memory with memory, Symbolic regressionMemory with Memory: Soft Assignment in Genetic Programming Nicholas Freitag McPhee Division was carried over to most versions of genetic programming (GP) that had state and assignments. This includes

  3. An analog memory using a CCD memory cell

    E-Print Network [OSTI]

    Murray, James Ray

    1983-01-01T23:59:59.000Z

    . Charge Storage . B. Charge Transfer C. Charge Injection D. Charge Detection CHAPTER III. DESIGN OF THE 4K ANALOG MEMORY A. Overview of the 4K Analog Memory B. NMOS Process . C. CCD Memory Cell D. Address Decoding . Page iv vi vii I 12 18 23... Gain Buffer . 18. ADC-DAC Loop . 19. Memory with Addressing Scheme 20. Memory with AD Loop and Addressing Scheme Page 13 15 16 17 20 21 24 26 ix 21. Floor Plan of the 4K Analog Memory 22. Overhead Plot of Memory Cell 23. Side View...

  4. Error correcting code with chip kill capability and power saving enhancement

    DOE Patents [OSTI]

    Gara, Alan G. (Mount Kisco, NY); Chen, Dong (Croton On Husdon, NY); Coteus, Paul W. (Yorktown Heights, NY); Flynn, William T. (Rochester, MN); Marcella, James A. (Rochester, MN); Takken, Todd (Brewster, NY); Trager, Barry M. (Yorktown Heights, NY); Winograd, Shmuel (Scarsdale, NY)

    2011-08-30T23:59:59.000Z

    A method and system are disclosed for detecting memory chip failure in a computer memory system. The method comprises the steps of accessing user data from a set of user data chips, and testing the user data for errors using data from a set of system data chips. This testing is done by generating a sequence of check symbols from the user data, grouping the user data into a sequence of data symbols, and computing a specified sequence of syndromes. If all the syndromes are zero, the user data has no errors. If one of the syndromes is non-zero, then a set of discriminator expressions are computed, and used to determine whether a single or double symbol error has occurred. In the preferred embodiment, less than two full system data chips are used for testing and correcting the user data.

  5. Mondriaan memory protection

    E-Print Network [OSTI]

    Witchel, Emmett Jethro, 1970-

    2004-01-01T23:59:59.000Z

    Reliability and security are quickly becoming users' biggest concern due to the increasing reliance on computers in all areas of society. Hardware-enforced, fine-grained memory protection can increase the reliability and ...

  6. Schema and memory consolidation 

    E-Print Network [OSTI]

    Tse, Dorothy

    2011-06-27T23:59:59.000Z

    The traditional view of systems memory consolidation is that it is a gradual process that takes place over days or weeks. Within this approach, the hippocampus (HPC) is thought to be involved in the rapid encoding of ...

  7. Static Detection of Disassembly Errors

    SciTech Connect (OSTI)

    Krishnamoorthy, Nithya; Debray, Saumya; Fligg, Alan K.

    2009-10-13T23:59:59.000Z

    Static disassembly is a crucial ?rst step in reverse engineering executable ?les, and there is a consider- able body of work in reverse-engineering of binaries, as well as areas such as semantics-based security anal- ysis, that assumes that the input executable has been correctly disassembled. However, disassembly errors, e.g., arising from binary obfuscations, can render this assumption invalid. This work describes a machine- learning-based approach, using decision trees, for stat- ically identifying possible errors in a static disassem- bly; such potential errors may then be examined more closely, e.g., using dynamic analyses. Experimental re- sults using a variety of input executables indicate that our approach performs well, correctly identifying most disassembly errors with relatively few false positives.

  8. Dynamic Prediction of Concurrency Errors

    E-Print Network [OSTI]

    Sadowski, Caitlin

    2012-01-01T23:59:59.000Z

    errors in systems code using smt solvers. In Computer Aideddata race witnesses by an SMT-based analysis. In NASA Formalscalability relies on a modern SMT solver and an e?cient

  9. Unequal error protection of subband coded bits

    E-Print Network [OSTI]

    Devalla, Badarinath

    1994-01-01T23:59:59.000Z

    Source coded data can be separated into different classes based on their susceptibility to channel errors. Errors in the Important bits cause greater distortion in the reconstructed signal. This thesis presents an Unequal Error Protection scheme...

  10. An analog memory using a CCD memory cell 

    E-Print Network [OSTI]

    Murray, James Ray

    1983-01-01T23:59:59.000Z

    23 26 29 E. Digital-to-Analog Converter F. Analog-to-Digital Converter G. Operation CHAPTER IV. ANALYSIS OF THE CIRCUIT A. Testing of Major Components B. Performance of the Memory C. Comparison with Digital Memories D. Proposed Modifications... of Memory Cell 24. Four Interconnected Memory Cells 25. Four-to-Sixteen Converter 26. Column Address Decoding Circuit. 27. Row Address Decoding Circuit 28. Digital-to-Analog Converter 29. Comparator Circuit Diagram . 30. DC Transfer Function...

  11. Two-Layer Error Control Codes Combining Rectangular and Hamming Product Codes for Cache Error

    E-Print Network [OSTI]

    Zhang, Meilin

    We propose a novel two-layer error control code, combining error detection capability of rectangular codes and error correction capability of Hamming product codes in an efficient way, in order to increase cache error ...

  12. Performance and Error Analysis of Knill's Postselection Scheme in a Two-Dimensional Architecture

    E-Print Network [OSTI]

    Ching-Yi Lai; Gerardo Paz; Martin Suchara; Todd A. Brun

    2013-05-31T23:59:59.000Z

    Knill demonstrated a fault-tolerant quantum computation scheme based on concatenated error-detecting codes and postselection with a simulated error threshold of 3% over the depolarizing channel. %We design a two-dimensional architecture for fault-tolerant quantum computation based on Knill's postselection scheme. We show how to use Knill's postselection scheme in a practical two-dimensional quantum architecture that we designed with the goal to optimize the error correction properties, while satisfying important architectural constraints. In our 2D architecture, one logical qubit is embedded in a tile consisting of $5\\times 5$ physical qubits. The movement of these qubits is modeled as noisy SWAP gates and the only physical operations that are allowed are local one- and two-qubit gates. We evaluate the practical properties of our design, such as its error threshold, and compare it to the concatenated Bacon-Shor code and the concatenated Steane code. Assuming that all gates have the same error rates, we obtain a threshold of $3.06\\times 10^{-4}$ in a local adversarial stochastic noise model, which is the highest known error threshold for concatenated codes in 2D. We also present a Monte Carlo simulation of the 2D architecture with depolarizing noise and we calculate a pseudo-threshold of about 0.1%. With memory error rates one-tenth of the worst gate error rates, the threshold for the adversarial noise model, and the pseudo-threshold over depolarizing noise, are $4.06\\times 10^{-4}$ and 0.2%, respectively. In a hypothetical technology where memory error rates are negligible, these thresholds can be further increased by shrinking the tiles into a $4\\times 4$ layout.

  13. Harmonic Analysis Errors in Calculating Dipole,

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    to reduce the harmonic field calculation errors. A conformal transfor- mation of a multipole magnet into a dipole reduces these errors. Dipole Magnet Calculations A triangular...

  14. Cache Memories ALAN JAY SMITH

    E-Print Network [OSTI]

    Lee, Hsien-Hsin "Sean"

    Cache Memories ALAN JAY SMITH Unwersity of California, Berkeley, Californm 94720 Cache memories 1982 #12;474 * A. J. Smith CONTENTS INTRODUCTION Definltlonand Rationale Overwew of Cache Deslgn Cache

  15. Ubiquitous Memory Introspection (Preliminary Manuscript)

    E-Print Network [OSTI]

    Zhao, Qin

    2006-09-25T23:59:59.000Z

    Modern memory systems play a critical role in the performance ofapplications, but a detailed understanding of the application behaviorin the memory system is not trivial to attain. It requires timeconsuming simulations of ...

  16. Shape memory polymer medical device

    DOE Patents [OSTI]

    Maitland, Duncan (Pleasant Hill, CA); Benett, William J. (Livermore, CA); Bearinger, Jane P. (Livermore, CA); Wilson, Thomas S. (San Leandro, CA); Small, IV, Ward (Livermore, CA); Schumann, Daniel L. (Concord, CA); Jensen, Wayne A. (Livermore, CA); Ortega, Jason M. (Pacifica, CA); Marion, III, John E. (Livermore, CA); Loge, Jeffrey M. (Stockton, CA)

    2010-06-29T23:59:59.000Z

    A system for removing matter from a conduit. The system includes the steps of passing a transport vehicle and a shape memory polymer material through the conduit, transmitting energy to the shape memory polymer material for moving the shape memory polymer material from a first shape to a second and different shape, and withdrawing the transport vehicle and the shape memory polymer material through the conduit carrying the matter.

  17. Memorial to James Allan Bennyhoff

    E-Print Network [OSTI]

    Hughes, Richard E

    1994-01-01T23:59:59.000Z

    REFERENCES Anonymous 1993 James Allan Bennyhoff. Society forMemorial to James Allan Bennyhoff (January 3, 1926 - August

  18. Distributed Error Confinement Extended Abstract

    E-Print Network [OSTI]

    Patt-Shamir, Boaz

    . These algorithms can serve as building blocks in more general reactive systems. Previous results in exploring locality in reactive systems were not error confined, and relied on the assump- tion (not used in current, that seems inherent for voting in reactive networks; its analysis leads to an interesting combinatorial

  19. Global aspects of radiation memory

    E-Print Network [OSTI]

    J. Winicour

    2014-10-11T23:59:59.000Z

    Gravitational radiation has a memory effect represented by a net change in the relative positions of test particles. Both the linear and nonlinear sources proposed for this radiation memory are of the "electric" type, or E mode, as characterized by the even parity of the polarization pattern. Although "magnetic" type, or B mode, radiation memory is mathematically possible, no physically realistic source has been identified. There is an electromagnetic counterpart to radiation memory in which the velocity of charged particles obtain a net "kick". Again, the physically realistic sources of electromagnetic radiation memory that have been identified are of the electric type. In this paper, a global null cone description of the electromagnetic field is applied to establish the non-existence of B mode radiation memory and the non-existence of E mode radiation memory due to a bound charge distribution.

  20. Runtime Detection of C-Style Errors in UPC Code

    SciTech Connect (OSTI)

    Pirkelbauer, P; Liao, C; Panas, T; Quinlan, D

    2011-09-29T23:59:59.000Z

    Unified Parallel C (UPC) extends the C programming language (ISO C 99) with explicit parallel programming support for the partitioned global address space (PGAS), which provides a global memory space with localized partitions to each thread. Like its ancestor C, UPC is a low-level language that emphasizes code efficiency over safety. The absence of dynamic (and static) safety checks allows programmer oversights and software flaws that can be hard to spot. In this paper, we present an extension of a dynamic analysis tool, ROSE-Code Instrumentation and Runtime Monitor (ROSECIRM), for UPC to help programmers find C-style errors involving the global address space. Built on top of the ROSE source-to-source compiler infrastructure, the tool instruments source files with code that monitors operations and keeps track of changes to the system state. The resulting code is linked to a runtime monitor that observes the program execution and finds software defects. We describe the extensions to ROSE-CIRM that were necessary to support UPC. We discuss complications that arise from parallel code and our solutions. We test ROSE-CIRM against a runtime error detection test suite, and present performance results obtained from running error-free codes. ROSE-CIRM is released as part of the ROSE compiler under a BSD-style open source license.

  1. The memory glasses : wearable computing for just-in-time memory support

    E-Print Network [OSTI]

    DeVaul, Richard W. (Richard Wayne), 1971-

    2004-01-01T23:59:59.000Z

    This thesis documents a body of wearable computing research surrounding the development of the Memory Glasses, a new type of proactive memory support technology. The Memory Glasses combines features of existing memory ...

  2. TED KYCIA MEMORIAL SYMPOSIUM.

    SciTech Connect (OSTI)

    LITTENBERG, L.; RUBINSTEIN, R.; SAMIOS, N.; LI, K.; GIACOMELLI, G.; MOCKETT, P.; CARROLL, A.; JOHNSON, R.; BRYMAN, D.; TIPPENS, B.

    2000-05-19T23:59:59.000Z

    On the afternoon of May 19 2000, a Memorial Seminar was held in the BNL physics Large Seminar Room to honor the memory of Ted Kyeia, a prominent particle physicist who had been a member of the BNL staff for 40 years. Although it was understandably a somewhat sad occasion because Ted was no longer with us, nevertheless there was much for his colleagues and friends to celebrate in recalling the outstanding contributions that he had made in those four decades. The Seminar speakers were all people who had worked with Ted during that period; each discussed one aspect of his career, but also included anecdotes and personal reminiscences. This booklet contains the Seminar program, listing the speakers, and also copies of transparencies of the talks (and one paper which was a later expansion of a talk); sadly, not all of the personal remarks appeared on the transparencies.

  3. Shape memory alloy actuator

    DOE Patents [OSTI]

    Varma, Venugopal K. (Knoxville, TN)

    2001-01-01T23:59:59.000Z

    An actuator for cycling between first and second positions includes a first shaped memory alloy (SMA) leg, a second SMA leg. At least one heating/cooling device is thermally connected to at least one of the legs, each heating/cooling device capable of simultaneously heating one leg while cooling the other leg. The heating/cooling devices can include thermoelectric and/or thermoionic elements.

  4. The image cannot be displayed. Your computer may not have enough memory to open the image, or the image may have been corrupted.

    E-Print Network [OSTI]

    Crawford, T. Daniel

    -croatia.ppt #12;The Energy implica8ons of increasing prosperity 40% of the world/day will take 34 years to generate 12,5 TW!! EIA Intl Energy Outlook 2004 http World Energy Demand total industrial developing US ee/fsu Hoffert et al Nature 395, 883,1998; msd-energy

  5. Gifts in Memory of LEHIGH UNIVERSITY 1 Anonymous, in memory of

    E-Print Network [OSTI]

    Gilchrist, James F.

    . Brown, in memory of Lawrence J. Varnerin, Jr. '91P R. N. Brummer, in memory of James W. Niemeyer '43 '68. Campbell, in memory of Gerald G. Leeman '71P '10GP Michael J. Caruso '67, in memory of Gerald G. Leeman '71, in memory of James E. Schierloh '51 Martin D. Cohen, in memory of Gerald G. Leeman '71P '10GP Kathleen

  6. Nitinol-reinforced shape-memory polymers

    E-Print Network [OSTI]

    Di Leo, Claudio V

    2010-01-01T23:59:59.000Z

    Reinforced shape-memory polymers have been developed from an acrylate based thermoset shape-memory polymer and nitinol wires. A rectangular shape-memory polymer measuring approximately 1 by 2 by 0.1 inches has a ten fold ...

  7. Memory with Memory in Tree-Based Genetic Programming

    E-Print Network [OSTI]

    Poli, Riccardo

    was carried over to most versions of genetic programming (GP) that had state and assign- ments (see [8 of assignment in a linear GP system can significantly improve performance on a variety of symbolic regressionMemory with Memory in Tree-Based Genetic Programming Riccardo Poli1 , Nicholas F. McPhee2 , Luca

  8. Memory Considerations for Carver

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645U.S. DOE Office of Science (SC)Integrated Codes |IsLove Your Home andDispositionMechanicalAboutMembers HomeMemory

  9. Shape memory alloy thaw sensors

    SciTech Connect (OSTI)

    Shahinpoor, Mohsen (Albuquerque, NM); Martinez, David R. (Albuquerque, NM)

    1998-01-01T23:59:59.000Z

    A sensor permanently indicates that it has been exposed to temperatures exceeding a critical temperature for a predetermined time period. An element of the sensor made from shape memory alloy changes shape when exposed, even temporarily, to temperatures above the Austenitic temperature of the shape memory alloy. The shape change of the SMA element causes the sensor to change between two readily distinguishable states.

  10. Paver Program Oklahoma Memorial Union

    E-Print Network [OSTI]

    Oklahoma, University of

    Paver Program Oklahoma Memorial Union The UniversiTy of oklahoma Alumni Association Pave the Way in the Oklahoma Memorial Union Courtyard. Now you can. The UniversiTy of oklahoma Alumni Association 900 Asp Ave of Oklahoma is an equal opportunity institution. This brochure was printed at no cost to the taxpayers

  11. Multiassociative Memory John F. Kolen

    E-Print Network [OSTI]

    Pollack, Jordan B.

    Multiassociative Memory John F. Kolen Jordan B. Pollack The Laboratory for AI Research Department)292-7402 kolen-j@cis.ohio-state.edu pollack@cis.ohio-state.edu Abstract This paper discusses the problem of how Conference of the Cognitive Science Society. August 7-10, 1991. #12;Multiassociative Memory1 John F. Kolen

  12. Multiassociative Memory John F. Kolen

    E-Print Network [OSTI]

    Pollack, Jordan B.

    Multiassociative Memory John F. Kolen Jordan B. Pollack The Laboratory for AI Research Department)292­7402 kolen­j@cis.ohio­state.edu pollack@cis.ohio­state.edu Abstract This paper discusses the problem of how Conference of the Cognitive Science Society. August 7­10, 1991. #12; Multiassociative Memory 1 John F. Kolen

  13. Approximate error conjugation gradient minimization methods

    DOE Patents [OSTI]

    Kallman, Jeffrey S

    2013-05-21T23:59:59.000Z

    In one embodiment, a method includes selecting a subset of rays from a set of all rays to use in an error calculation for a constrained conjugate gradient minimization problem, calculating an approximate error using the subset of rays, and calculating a minimum in a conjugate gradient direction based on the approximate error. In another embodiment, a system includes a processor for executing logic, logic for selecting a subset of rays from a set of all rays to use in an error calculation for a constrained conjugate gradient minimization problem, logic for calculating an approximate error using the subset of rays, and logic for calculating a minimum in a conjugate gradient direction based on the approximate error. In other embodiments, computer program products, methods, and systems are described capable of using approximate error in constrained conjugate gradient minimization problems.

  14. RON MINER MEMORIAL BIOENGINEERING SCHOLARSHIP The Ron Miner Memorial Scholarship honors the memory of J. Ronald Miner, an

    E-Print Network [OSTI]

    Tullos, Desiree

    RON MINER MEMORIAL BIOENGINEERING SCHOLARSHIP The Ron Miner Memorial Scholarship honors the memory of J. Ronald Miner, an Agricultural Engineering professor at OSU for over thirty years. Ron came to OSU from the Ron Miner Memorial Scholarship which resides with the OSU Foundation. The name

  15. CHARACTERIZATION OF SHAPE MEMORY ALLOY BEHAVIOR AND

    E-Print Network [OSTI]

    Valasek, John

    CHARACTERIZATION OF SHAPE MEMORY ALLOY BEHAVIOR AND POSITION CONTROL USING REINFORCEMENT LEARNING for Intelligent Bio-Nano Materials and Structures for Aerospace Vehicles Problem: Shape Memory Alloy and Structures for Aerospace Vehicles 4 Shape Memory Alloys (SMAs) Metallic Alloys used as actuators Shape Memory

  16. Thermomechanical behavior of shape memory elastomeric composites

    E-Print Network [OSTI]

    Mather, Patrick T.

    Thermomechanical behavior of shape memory elastomeric composites Qi Ge a , Xiaofan Luo b,c , Erika September 2011 Available online 1 October 2011 Keywords: Shape memory Shape memory polymers Soft active materials Thermomechanical behaviors Constitutive models a b s t r a c t Shape memory polymers (SMPs) can

  17. Error handling strategies in multiphase inverse modeling

    SciTech Connect (OSTI)

    Finsterle, S.; Zhang, Y.

    2010-12-01T23:59:59.000Z

    Parameter estimation by inverse modeling involves the repeated evaluation of a function of residuals. These residuals represent both errors in the model and errors in the data. In practical applications of inverse modeling of multiphase flow and transport, the error structure of the final residuals often significantly deviates from the statistical assumptions that underlie standard maximum likelihood estimation using the least-squares method. Large random or systematic errors are likely to lead to convergence problems, biased parameter estimates, misleading uncertainty measures, or poor predictive capabilities of the calibrated model. The multiphase inverse modeling code iTOUGH2 supports strategies that identify and mitigate the impact of systematic or non-normal error structures. We discuss these approaches and provide an overview of the error handling features implemented in iTOUGH2.

  18. Estimating IMU heading error from SAR images.

    SciTech Connect (OSTI)

    Doerry, Armin Walter

    2009-03-01T23:59:59.000Z

    Angular orientation errors of the real antenna for Synthetic Aperture Radar (SAR) will manifest as undesired illumination gradients in SAR images. These gradients can be measured, and the pointing error can be calculated. This can be done for single images, but done more robustly using multi-image methods. Several methods are provided in this report. The pointing error can then be fed back to the navigation Kalman filter to correct for problematic heading (yaw) error drift. This can mitigate the need for uncomfortable and undesired IMU alignment maneuvers such as S-turns.

  19. Flux recovery and a posteriori error estimators

    E-Print Network [OSTI]

    2010-05-20T23:59:59.000Z

    bility and the local efficiency bounds for this estimator are established provided that the ... For simple model problems, the energy norm of the true error is equal.

  20. Original Article Error Bounds and Metric Subregularity

    E-Print Network [OSTI]

    2014-06-18T23:59:59.000Z

    theory of error bounds of extended real-valued functions. Another objective is to ... Another observation is that neighbourhood V in the original definition of metric.

  1. External-Memory Computational Geometry

    E-Print Network [OSTI]

    Goodrich, Michael T.; Tsay, Jyh-Jong; Vengroff, Darren Erik; Vitter, Jeffrey Scott

    1993-01-01T23:59:59.000Z

    the rst known optimal al- gorithms for a wide range of two-level and hierarchical multilevel memory models, including parallel models. The algorithms are optimal both in terms of I/O cost and internal computation....

  2. The Leadership Cluster Memorial Union

    E-Print Network [OSTI]

    Escher, Christine

    The Leadership Cluster Memorial Union Student Leadership and Involvement Student Media Something New @ OSU #12;Access Diversity "Leadership/Citizenship" Community Connection Health & Wellness Housing & Dining Administrative Leadership #12;Student Leadership & Involvement SLI-Activities Program Club

  3. Wind Power Forecasting Error Distributions over Multiple Timescales (Presentation)

    SciTech Connect (OSTI)

    Hodge, B. M.; Milligan, M.

    2011-07-01T23:59:59.000Z

    This presentation presents some statistical analysis of wind power forecast errors and error distributions, with examples using ERCOT data.

  4. Shape memory alloy thaw sensors

    DOE Patents [OSTI]

    Shahinpoor, M.; Martinez, D.R.

    1998-04-07T23:59:59.000Z

    A sensor permanently indicates that it has been exposed to temperatures exceeding a critical temperature for a predetermined time period. An element of the sensor made from shape memory alloy changes shape when exposed, even temporarily, to temperatures above the austenitic temperature of the shape memory alloy. The shape change of the SMA element causes the sensor to change between two readily distinguishable states. 16 figs.

  5. An Efficient Transparent Test Scheme for Embedded Word-Oriented Memories

    E-Print Network [OSTI]

    Li, Jin-Fu; Wey, Chin-Long

    2011-01-01T23:59:59.000Z

    Memory cores are usually the densest portion with the smallest feature size in system-on-chip (SOC) designs. The reliability of memory cores thus has heavy impact on the reliability of SOCs. Transparent test is one of useful technique for improving the reliability of memories during life time. This paper presents a systematic algorithm used for transforming a bit-oriented march test into a transparent word-oriented march test. The transformed transparent march test has shorter test complexity compared with that proposed in the previous works [Theory of transparent BIST for RAMs, A transparent online memory test for simultaneous detection of functional faults and soft errors in memories]. For example, if a memory with 32-bit words is tested with March C-, time complexity of the transparent word-oriented test transformed by the proposed scheme is only about 56% or 19% time complexity of the transparent word-oriented test converted by the scheme reported in [Theory of transparent BIST for RAMs] or [A transparent...

  6. Energy Efficient Memory Speculation With Memory Latency Tolerance Supporting Sequential Consistency Without A Coherence Protocol

    E-Print Network [OSTI]

    Munday, David Alexander

    2013-01-01T23:59:59.000Z

    1–17, Sept. 2006. [35] Derek Hower. Acoherent shared memory.memory consistency models. Derek Hower [35] pro- posed the

  7. Error Mining on Dependency Trees Claire Gardent

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    Error Mining on Dependency Trees Claire Gardent CNRS, LORIA, UMR 7503 Vandoeuvre-l`es-Nancy, F-l`es-Nancy, F-54600, France shashi.narayan@loria.fr Abstract In recent years, error mining approaches were propose an algorithm for mining trees and ap- ply it to detect the most likely sources of gen- eration

  8. SEU induced errors observed in microprocessor systems

    SciTech Connect (OSTI)

    Asenek, V.; Underwood, C.; Oldfield, M. [Univ. of Surrey, Guildford (United Kingdom). Surrey Space Centre] [Univ. of Surrey, Guildford (United Kingdom). Surrey Space Centre; Velazco, R.; Rezgui, S.; Cheynet, P. [TIMA Lab., Grenoble (France)] [TIMA Lab., Grenoble (France); Ecoffet, R. [Centre National d`Etudes Spatiales, Toulouse (France)] [Centre National d`Etudes Spatiales, Toulouse (France)

    1998-12-01T23:59:59.000Z

    In this paper, the authors present software tools for predicting the rate and nature of observable SEU induced errors in microprocessor systems. These tools are built around a commercial microprocessor simulator and are used to analyze real satellite application systems. Results obtained from simulating the nature of SEU induced errors are shown to correlate with ground-based radiation test data.

  9. Remarks on statistical errors in equivalent widths

    E-Print Network [OSTI]

    Klaus Vollmann; Thomas Eversberg

    2006-07-03T23:59:59.000Z

    Equivalent width measurements for rapid line variability in atomic spectral lines are degraded by increasing error bars with shorter exposure times. We derive an expression for the error of the line equivalent width $\\sigma(W_\\lambda)$ with respect to pure photon noise statistics and provide a correction value for previous calculations.

  10. Remote direct memory access

    DOE Patents [OSTI]

    Archer, Charles J.; Blocksome, Michael A.

    2012-12-11T23:59:59.000Z

    Methods, parallel computers, and computer program products are disclosed for remote direct memory access. Embodiments include transmitting, from an origin DMA engine on an origin compute node to a plurality target DMA engines on target compute nodes, a request to send message, the request to send message specifying a data to be transferred from the origin DMA engine to data storage on each target compute node; receiving, by each target DMA engine on each target compute node, the request to send message; preparing, by each target DMA engine, to store data according to the data storage reference and the data length, including assigning a base storage address for the data storage reference; sending, by one or more of the target DMA engines, an acknowledgment message acknowledging that all the target DMA engines are prepared to receive a data transmission from the origin DMA engine; receiving, by the origin DMA engine, the acknowledgement message from the one or more of the target DMA engines; and transferring, by the origin DMA engine, data to data storage on each of the target compute nodes according to the data storage reference using a single direct put operation.

  11. Stabilizer Formalism for Operator Quantum Error Correction

    E-Print Network [OSTI]

    Poulin, D

    2005-01-01T23:59:59.000Z

    Operator quantum error correction is a recently developed theory that provides a generalized framework for active error correction and passive error avoiding schemes. In this paper, we describe these codes in the language of the stabilizer formalism of standard quantum error correction theory. This is achieved by adding a "gauge" group to the standard stabilizer definition of a code. Gauge transformations leave the encoded information unchanged; their effect is absorbed by virtual gauge qubits that do not carry useful information. We illustrate the construction by identifying a gauge symmetry in Shor's 9-qubit code that allows us to remove 3 of its 8 stabilizer generators, leading to a simpler decoding procedure without affecting its essential properties. This opens the path to possible improvement of the error threshold of fault tolerant quantum computing. We also derive a modified Hamming bound that applies to all stabilizer codes, including degenerate ones.

  12. Stabilizer Formalism for Operator Quantum Error Correction

    E-Print Network [OSTI]

    David Poulin

    2006-06-14T23:59:59.000Z

    Operator quantum error correction is a recently developed theory that provides a generalized framework for active error correction and passive error avoiding schemes. In this paper, we describe these codes in the stabilizer formalism of standard quantum error correction theory. This is achieved by adding a "gauge" group to the standard stabilizer definition of a code that defines an equivalence class between encoded states. Gauge transformations leave the encoded information unchanged; their effect is absorbed by virtual gauge qubits that do not carry useful information. We illustrate the construction by identifying a gauge symmetry in Shor's 9-qubit code that allows us to remove 4 of its 8 stabilizer generators, leading to a simpler decoding procedure and a wider class of logical operations without affecting its essential properties. This opens the path to possible improvements of the error threshold of fault-tolerant quantum computing.

  13. Prediction Error and Event Boundaries 1 Running Head: PREDICTION ERROR AND EVENT BOUNDARIES

    E-Print Network [OSTI]

    Zacks, Jeffrey M.

    Prediction Error and Event Boundaries 1 Running Head: PREDICTION ERROR AND EVENT BOUNDARIES A computational model of event segmentation from perceptual prediction. Jeremy R. Reynolds, Jeffrey M. Zacks, and Todd S. Braver Washington University Manuscript #12;Prediction Error and Event Boundaries 2 People tend

  14. V-194: Citrix XenServer Memory Management Error Lets Local Administrative

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742Energy China 2015of 2005UNSDepartmentFebruaryPhase|PotomacDepartmentRemoteVulnerabilityAppleUsers

  15. Characterization of Shape Memory Alloys Using Artificial Neural Networks

    E-Print Network [OSTI]

    Valasek, John

    1 Characterization of Shape Memory Alloys Using Artificial Neural Networks Jim Henrickson, Kenton ­ Shape Memory Alloys ­ Artificial Neural Networks Process ­ Implement Shape Memory Alloy Model;3 Introduction Shape memory alloys (SMAs) ­ Active material: material that undergoes macroscopic change

  16. Error Detection and Error Classification: Failure Awareness in Data Transfer Scheduling

    SciTech Connect (OSTI)

    Louisiana State University; Balman, Mehmet; Kosar, Tevfik

    2010-10-27T23:59:59.000Z

    Data transfer in distributed environment is prone to frequent failures resulting from back-end system level problems, like connectivity failure which is technically untraceable by users. Error messages are not logged efficiently, and sometimes are not relevant/useful from users point-of-view. Our study explores the possibility of an efficient error detection and reporting system for such environments. Prior knowledge about the environment and awareness of the actual reason behind a failure would enable higher level planners to make better and accurate decisions. It is necessary to have well defined error detection and error reporting methods to increase the usability and serviceability of existing data transfer protocols and data management systems. We investigate the applicability of early error detection and error classification techniques and propose an error reporting framework and a failure-aware data transfer life cycle to improve arrangement of data transfer operations and to enhance decision making of data transfer schedulers.

  17. acquired immunologic memory: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    and investigates urinary metabolomic biomarkers (more) Skappak, Christopher Dustin 163 Memory traces of trace memories: neurogenesis, synaptogenesis and Biology and...

  18. Hipikat: A Project Memory for Software Development

    E-Print Network [OSTI]

    van der Hoek, André

    Hipikat: A Project Memory for Software Development Davor CCubranicc, Gail C. Murphy, Member, IEEE's usefulness in software modification tasks. One study evaluated the usefulness of Hipikat's recommendations Terms--Software development teams, project memory, software artifacts, recommender system, user studies

  19. Program Transformations in Weak Memory Models 

    E-Print Network [OSTI]

    Sevcik, Jaroslav

    2009-01-01T23:59:59.000Z

    We analyse the validity of common optimisations on multi-threaded programs in two memory models—the DRF guarantee and the Java Memory Model. Unlike in the single-threaded world, even simple program transformations, such ...

  20. E cient Use of Memory-Mapped Network Interfaces for Shared Memory Computing

    E-Print Network [OSTI]

    Scott, Michael L.

    E cient Use of Memory-Mapped Network Interfaces for Shared Memory Computing Nikolaos Hardavellas@cs.rochester.edu Abstract Memory-mapped network interfaces provide users with fast and cheap access to remote memory access capabilities of these networks suggest the need to re-evaluate the assumptions underlying

  1. Exploring the interaction between working memory and long-term memory: Evidence for the workspace model 

    E-Print Network [OSTI]

    van der Meulen, Marian

    There is a large range of models of working memory, each with different scopes and emphases. Current interest focuses strongly on the interaction of working memory with long-term memory, as it has become clear that models of working memory alone...

  2. A study of analog memories

    E-Print Network [OSTI]

    Ott, Joseph Michael

    1983-01-01T23:59:59.000Z

    A STUDY OF ANALOG MEMORIES A Thesis by JOSEPH MICHAEL OTT Submitted to the Graduate College of Texas A&M University in partial fulfillment of the requirements tor the degree of MASTER OF SCIENCE August 1983 Major Subject: Electrical... Fngineering A STUDY OF ANALOG MEMORIES A Thesis JOSEPH MZCHAEL OTT Approved as to style and content by: P. E. Allen (Chairman of Committee) N. R. Strader (Member) W. M. Lxvely (Member) W. B. Jones (Head of Department) August 1983 , 0 AS STRA C...

  3. Memory Usage Considerations on Hopper

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645U.S. DOE Office of Science (SC)Integrated Codes |IsLove Your Home andDispositionMechanicalAboutMembersMemoryMemory

  4. Quantum error-correcting codes and devices

    DOE Patents [OSTI]

    Gottesman, Daniel (Los Alamos, NM)

    2000-10-03T23:59:59.000Z

    A method of forming quantum error-correcting codes by first forming a stabilizer for a Hilbert space. A quantum information processing device can be formed to implement such quantum codes.

  5. Organizational Errors: Directions for Future Research

    E-Print Network [OSTI]

    Carroll, John Stephen

    The goal of this chapter is to promote research about organizational errors—i.e., the actions of multiple organizational participants that deviate from organizationally specified rules and can potentially result in adverse ...

  6. Particle-induced bit errors in high performance fiber optic data links for satellite data management

    SciTech Connect (OSTI)

    Marshall, P.W.; Carts, M.A. (Naval Research Lab., Washington, DC (United States) SFA, Inc., Landover, MD (United States)); Dale, C.J. (Naval Research Lab., Washington, DC (United States)); LaBel, K.A. (NASA Goddard Space Flight Center, Greenbelt, MD (United States))

    1994-12-01T23:59:59.000Z

    Experimental test methods and analysis tools are demonstrated to assess particle-induced bit errors on fiber optic link receivers for satellites. Susceptibility to direct ionization from low LET particles is quantified by analyzing proton and helium ion data as a function of particle LET. Existing single event analysis approaches are shown to apply, with appropriate modifications, to the regime of temporally (rather than spatially) distributed bits, even though the sensitivity to single events exceeds conventional memory technologies by orders of magnitude. The cross-section LET dependence follows a Weibull distribution at data rates from 200 to 1,000 Mbps and at various incident optical power levels. The LET threshold for errors is shown, through both experiment and modeling, to be 0 in all cases. The error cross-section exhibits a strong inverse dependence on received optical power in the LET range where most orbital single events would occur, thus indicating that errors can be minimized by operating links with higher incident optical power. Also, an analytic model is described which incorporates the appropriate physical characteristics of the link as well as the optical and receiver electrical characteristics. Results indicate appropriate steps to assure suitable link performance even in severe particle orbits.

  7. Parameters and error of a theoretical model

    SciTech Connect (OSTI)

    Moeller, P.; Nix, J.R.; Swiatecki, W.

    1986-09-01T23:59:59.000Z

    We propose a definition for the error of a theoretical model of the type whose parameters are determined from adjustment to experimental data. By applying a standard statistical method, the maximum-likelihoodlmethod, we derive expressions for both the parameters of the theoretical model and its error. We investigate the derived equations by solving them for simulated experimental and theoretical quantities generated by use of random number generators. 2 refs., 4 tabs.

  8. Government User Session Translation Memory TechnologyTranslation Memory Technology

    E-Print Network [OSTI]

    Gupta, Kalyan Moy

    Rachael Richardson Tucker Maney Naval Research Laboratory Carol Van Ess-Dykema Susan Converse John S Requirements for Multi-Genre Translation · Motivations for TM Technology Assessment · Pilot Study · ResultsPoint slides, etc. #12;Government User Session Translation Memory Technology Assessment: Pilot Study Goals

  9. Shape memory polymer foams for endovascular therapies

    DOE Patents [OSTI]

    Wilson, Thomas S. (Castro Valley, CA); Maitland, Duncan J. (Pleasant Hill, CA)

    2012-03-13T23:59:59.000Z

    A system for occluding a physical anomaly. One embodiment comprises a shape memory material body wherein the shape memory material body fits within the physical anomaly occluding the physical anomaly. The shape memory material body has a primary shape for occluding the physical anomaly and a secondary shape for being positioned in the physical anomaly.

  10. Memory Optimization for Phase-field Simulations

    SciTech Connect (OSTI)

    Derek Gaston; John Peterson; Andrew Slaughter; Cody Permann; David Andrs

    2014-08-01T23:59:59.000Z

    Phase-field simulations are computationally and memory intensive applications. Many of the phase-field simulations being conducted in support of NEAMS were not capable of running on “normal clusters” with 2-4GB of RAM per core, and instead required specialized “big-memory” clusters with 64GB per core. To address this issue, the MOOSE team developed a new Python-based utility called MemoryLogger, and applied it to locate, diagnose, and eradicate memory bottlenecks within the MOOSE framework. MemoryLogger allows for a better understanding of the memory usage of an application being run in parallel across a cluster. Memory usage information is captured for every individual process in a parallel job, and communicated to the head node of the cluster. Console text output from the application itself is automatically matched with this memory usage information to produce a detailed picture of memory usage over time, making it straightforward to identify the subroutines which contribute most to the application’s peak memory usage. The information produced by the MemoryLogger quickly and effectively narrows the search for memory optimizations to the most data-intensive parts of the simulation.

  11. The Error-Pattern-Correcting Turbo Equalizer

    E-Print Network [OSTI]

    Alhussien, Hakim

    2010-01-01T23:59:59.000Z

    The error-pattern correcting code (EPCC) is incorporated in the design of a turbo equalizer (TE) with aim to correct dominant error events of the inter-symbol interference (ISI) channel at the output of its matching Viterbi detector. By targeting the low Hamming-weight interleaved errors of the outer convolutional code, which are responsible for low Euclidean-weight errors in the Viterbi trellis, the turbo equalizer with an error-pattern correcting code (TE-EPCC) exhibits a much lower bit-error rate (BER) floor compared to the conventional non-precoded TE, especially for high rate applications. A maximum-likelihood upper bound is developed on the BER floor of the TE-EPCC for a generalized two-tap ISI channel, in order to study TE-EPCC's signal-to-noise ratio (SNR) gain for various channel conditions and design parameters. In addition, the SNR gain of the TE-EPCC relative to an existing precoded TE is compared to demonstrate the present TE's superiority for short interleaver lengths and high coding rates.

  12. Configurable memory system and method for providing atomic counting operations in a memory device

    DOE Patents [OSTI]

    Bellofatto, Ralph E. (Ridgefield, CT); Gara, Alan G. (Mount Kisco, NY); Giampapa, Mark E. (Irvington, NY); Ohmacht, Martin (Yorktown Heights, NY)

    2010-09-14T23:59:59.000Z

    A memory system and method for providing atomic memory-based counter operations to operating systems and applications that make most efficient use of counter-backing memory and virtual and physical address space, while simplifying operating system memory management, and enabling the counter-backing memory to be used for purposes other than counter-backing storage when desired. The encoding and address decoding enabled by the invention provides all this functionality through a combination of software and hardware.

  13. Mentoring@Memorial Mentor Application

    E-Print Network [OSTI]

    Oyet, Alwell

    Mentoring@Memorial Mentor Application The Department of Human Resources offers a mentoring program for staff, administrative leaders, and academic leaders. To participate in the program, we require mentors Mentoring Agreement; · Provide evaluative feedback by completing an evaluation form; and · Agree to disclose

  14. Mentoring@Memorial Mentee Application

    E-Print Network [OSTI]

    Oyet, Alwell

    Mentoring@Memorial Mentee Application The Department of Human Resources offers a mentoring program for staff, administrative leaders, and academic leaders. To participate in the program, we require mentors Mentoring Agreement; · Provide evaluative feedback by completing an evaluation form; and · Agree to disclose

  15. A systems approach to reducing utility billing errors

    E-Print Network [OSTI]

    Ogura, Nori

    2013-01-01T23:59:59.000Z

    Many methods for analyzing the possibility of errors are practiced by organizations who are concerned about safety and error prevention. However, in situations where the error occurrence is random and difficult to track, ...

  16. Error Detection and Recovery for Robot Motion Planning with Uncertainty

    E-Print Network [OSTI]

    Donald, Bruce Randall

    1987-07-01T23:59:59.000Z

    Robots must plan and execute tasks in the presence of uncertainty. Uncertainty arises from sensing errors, control errors, and uncertainty in the geometry of the environment. The last, which is called model error, has ...

  17. Running jobs error: "inet_arp_address_lookup"

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    jobs error: "inetarpaddresslookup" Resolved: Running jobs error: "inetarpaddresslookup" September 22, 2013 by Helen He (0 Comments) Symptom: After the Hopper August 14...

  18. Global Error bounds for systems of convex polynomials over ...

    E-Print Network [OSTI]

    2011-11-11T23:59:59.000Z

    This paper is devoted to study the Lipschitzian/Holderian type global error ...... set is not neccessarily compact, we obtain the Hölder global error bound result.

  19. Shape memory alloy/shape memory polymer tools

    DOE Patents [OSTI]

    Seward, Kirk P.; Krulevitch, Peter A.

    2005-03-29T23:59:59.000Z

    Micro-electromechanical tools for minimally invasive techniques including microsurgery. These tools utilize composite shape memory alloy (SMA), shape memory polymer (SMP) and combinations of SMA and SMP to produce catheter distal tips, actuators, etc., which are bistable. Applications for these structures include: 1) a method for reversible fine positioning of a catheter tip, 2) a method for reversible fine positioning of tools or therapeutic catheters by a guide catheter, 3) a method for bending articulation through the body's vasculature, 4) methods for controlled stent delivery, deployment, and repositioning, and 5) catheters with variable modulus, with vibration mode, with inchworm capability, and with articulated tips. These actuators and catheter tips are bistable and are opportune for in vivo usage because the materials are biocompatible and convenient for intravascular use as well as other minimal by invasive techniques.

  20. Optimal error estimates for corrected trapezoidal rules

    E-Print Network [OSTI]

    Talvila, Erik

    2012-01-01T23:59:59.000Z

    Corrected trapezoidal rules are proved for $\\int_a^b f(x)\\,dx$ under the assumption that $f"\\in L^p([a,b])$ for some $1\\leq p\\leq\\infty$. Such quadrature rules involve the trapezoidal rule modified by the addition of a term $k[f'(a)-f'(b)]$. The coefficient $k$ in the quadrature formula is found that minimizes the error estimates. It is shown that when $f'$ is merely assumed to be continuous then the optimal rule is the trapezoidal rule itself. In this case error estimates are in terms of the Alexiewicz norm. This includes the case when $f"$ is integrable in the Henstock--Kurzweil sense or as a distribution. All error estimates are shown to be sharp for the given assumptions on $f"$. It is shown how to make these formulas exact for all cubic polynomials $f$. Composite formulas are computed for uniform partitions.

  1. Integrating human related errors with technical errors to determine causes behind offshore accidents

    E-Print Network [OSTI]

    Aamodt, Agnar

    Integrating human related errors with technical errors to determine causes behind offshore of offshore accidents there is a continuous focus on safety improvements. An improved evaluation method concepts in the model are structured in hierarchical categories, based on well-established knowledge

  2. Uncertainty and error in computational simulations

    SciTech Connect (OSTI)

    Oberkampf, W.L.; Diegert, K.V.; Alvin, K.F.; Rutherford, B.M.

    1997-10-01T23:59:59.000Z

    The present paper addresses the question: ``What are the general classes of uncertainty and error sources in complex, computational simulations?`` This is the first step of a two step process to develop a general methodology for quantitatively estimating the global modeling and simulation uncertainty in computational modeling and simulation. The second step is to develop a general mathematical procedure for representing, combining and propagating all of the individual sources through the simulation. The authors develop a comprehensive view of the general phases of modeling and simulation. The phases proposed are: conceptual modeling of the physical system, mathematical modeling of the system, discretization of the mathematical model, computer programming of the discrete model, numerical solution of the model, and interpretation of the results. This new view is built upon combining phases recognized in the disciplines of operations research and numerical solution methods for partial differential equations. The characteristics and activities of each of these phases is discussed in general, but examples are given for the fields of computational fluid dynamics and heat transfer. They argue that a clear distinction should be made between uncertainty and error that can arise in each of these phases. The present definitions for uncertainty and error are inadequate and. therefore, they propose comprehensive definitions for these terms. Specific classes of uncertainty and error sources are then defined that can occur in each phase of modeling and simulation. The numerical sources of error considered apply regardless of whether the discretization procedure is based on finite elements, finite volumes, or finite differences. To better explain the broad types of sources of uncertainty and error, and the utility of their categorization, they discuss a coupled-physics example simulation.

  3. Laser Phase Errors in Seeded FELs

    SciTech Connect (OSTI)

    Ratner, D.; Fry, A.; Stupakov, G.; White, W.; /SLAC

    2012-03-28T23:59:59.000Z

    Harmonic seeding of free electron lasers has attracted significant attention from the promise of transform-limited pulses in the soft X-ray region. Harmonic multiplication schemes extend seeding to shorter wavelengths, but also amplify the spectral phase errors of the initial seed laser, and may degrade the pulse quality. In this paper we consider the effect of seed laser phase errors in high gain harmonic generation and echo-enabled harmonic generation. We use simulations to confirm analytical results for the case of linearly chirped seed lasers, and extend the results for arbitrary seed laser envelope and phase.

  4. On the Error in QR Integration

    E-Print Network [OSTI]

    Dieci, Luca; Van Vleck, Erik

    2008-03-07T23:59:59.000Z

    ] . . . [R(t2, t1) +E2][R(t1, t0) +E1]R(t0) , k = 1, 2, . . . , where Q(tk) is the exact Q-factor at tk and the triangular transitions R(tj , tj?1) are also the exact ones. Moreover, the factors Ej , j = 1, . . . , k, are bounded in norm by the local error... committed during integration of the relevant differential equations; see Theorems 3.1 and 3.16.” We will henceforth simply write (2.7) ?Ej? ? ?, j = 1, 2, . . . , and stress that ? is computable, in fact controllable, in terms of local error tolerances...

  5. Corruption and Sustainable Development

    E-Print Network [OSTI]

    Aidt, Toke S.

    warming. An estimate of the social cost of carbon dioxide emissions is subtracted from national savings, with the assumption that the average social cost of a tonne of carbon is US$30. The second part is designed to capture the impact of local... is also ignored.21 The calculations are also sensitive to the choice of wealth to GNI ratios. The social cost of carbon emissions seems on the low side and, in any case, represents an average value rather than social marginal cost. It is clear...

  6. High Performance Dense Linear System Solver with Soft Error Resilience

    E-Print Network [OSTI]

    Dongarra, Jack

    High Performance Dense Linear System Solver with Soft Error Resilience Peng Du, Piotr Luszczek systems, and in some scientific applications C/R is not applicable for soft error at all due to error) high performance dense linear system solver with soft error resilience. By adopting a mathematical

  7. Distribution of Wind Power Forecasting Errors from Operational Systems (Presentation)

    SciTech Connect (OSTI)

    Hodge, B. M.; Ela, E.; Milligan, M.

    2011-10-01T23:59:59.000Z

    This presentation offers new data and statistical analysis of wind power forecasting errors in operational systems.

  8. Verifying Volume Rendering Using Discretization Error Analysis

    E-Print Network [OSTI]

    Kirby, Mike

    Verifying Volume Rendering Using Discretization Error Analysis Tiago Etiene, Daniel Jo¨nsson, Timo--We propose an approach for verification of volume rendering correctness based on an analysis of the volume rendering integral, the basis of most DVR algorithms. With respect to the most common discretization

  9. MEASUREMENT AND CORRECTION OF ULTRASONIC ANEMOMETER ERRORS

    E-Print Network [OSTI]

    Heinemann, Detlev

    commonly show systematic errors depending on wind speed due to inaccurate ultrasonic transducer mounting three- dimensional wind speed time series. Results for the variance and power spectra are shown. 1 wind speeds with ultrasonic anemometers: The measu- red flow is distorted by the probe head

  10. Hierarchical Classification of Documents with Error Control

    E-Print Network [OSTI]

    King, Kuo Chin Irwin

    Hierarchical Classification of Documents with Error Control Chun-hung Cheng1 , Jian Tang2 , Ada Wai is a function that matches a new object with one of the predefined classes. Document classification is characterized by the large number of attributes involved in the objects (documents). The traditional method

  11. Hierarchical Classification of Documents with Error Control

    E-Print Network [OSTI]

    Fu, Ada Waichee

    Hierarchical Classification of Documents with Error Control Chun­hung Cheng 1 , Jian Tang 2 , Ada. Classification is a function that matches a new object with one of the predefined classes. Document classification is characterized by the large number of attributes involved in the objects (documents

  12. Immunological Memory is Associative Derek J. Smith

    E-Print Network [OSTI]

    Somayaji, Anil

    Immunological Memory is Associative Derek J. Smith Department of Computer Science University of New , 1989; Nara & Goudsmit, 1990; Smith, 1994). Immunologists refer to associative recall as a cross

  13. Video Stores, Media Technologies, and Memory

    E-Print Network [OSTI]

    Wilken, Rowan

    2010-01-01T23:59:59.000Z

    a collection entitled Mobile Technology & Place (Routledge,Identity,” in Mobile Technologies: From Telecommunicationsin an essay on mobile media technologies and memory, Nicola

  14. Battelle Memorial Institute Technologies Available for Licensing...

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    and Fuels Wind Energy Partners (27) Visual Patent Search Success Stories News Events Battelle Memorial Institute Technologies Available for Licensing Battelle is the world's...

  15. Shape memory response of ni2mnga and nimncoin magnetic shape memory alloys under compression

    E-Print Network [OSTI]

    Brewer, Andrew Lee

    2009-05-15T23:59:59.000Z

    In this study, the shape memory response of Ni2MnGa and NiMnCoIn magnetic shape memory alloys was observed under compressive stresses. Ni2MnGa is a magnetic shape memory alloy (MSMA) that has been shown to exhibit fully reversible, stressassisted...

  16. Energy Efficient Phase Change Memory Based Main Memory for Future High Performance Systems

    E-Print Network [OSTI]

    Conte, Thomas M.

    hybrid system using a commodity DRAM cache. Keywords-Memory Controller, DRAM, PCM, Energy I. INTRODUCTIONEnergy Efficient Phase Change Memory Based Main Memory for Future High Performance Systems Abstract system of similar storage size. Our proposed system is highly energy efficient and provides 35

  17. Cu-based shape memory microwires : towards complex structures

    E-Print Network [OSTI]

    Gager, Mac (Brian McClure, Jr.)

    2014-01-01T23:59:59.000Z

    Shape memory alloys are a distinctive type of material that exhibits the fascinating properties of the shape memory effect and superelasticity. Shape memory properties are characterized by the diffusionless phase transformation ...

  18. Grain constraint and size effects in shape memory alloy microwires

    E-Print Network [OSTI]

    Ueland, Stian Melhus

    2013-01-01T23:59:59.000Z

    Shape memory alloys exhibit interesting and useful properties, such as the shape memory effect and superelasticity. Among the many alloy families that have been shown to exhibit shape memory properties the ones based on ...

  19. Data Representation for Efficient and Reliable Storage in Flash Memories

    E-Print Network [OSTI]

    Wang, Yue

    2013-05-02T23:59:59.000Z

    challenges. In addition, we present an overview of related works on ash memories. 1.1 Flash Memories and Their Properties Flash memory, invented by Dr. Fujio Masuoka, is a type of non-volatile memory that can be electrically erased and reprogrammed... years have witnessed a proliferation of ash memories as an emerging storage technology with wide applications in many important areas. Like magnetic recording and optimal recording, ash memories have their own distinct properties and usage...

  20. Quantum Latin squares and unitary error bases

    E-Print Network [OSTI]

    Benjamin Musto; Jamie Vicary

    2015-04-10T23:59:59.000Z

    In this paper we introduce quantum Latin squares, combinatorial quantum objects which generalize classical Latin squares, and investigate their applications in quantum computer science. Our main results are on applications to unitary error bases (UEBs), basic structures in quantum information which lie at the heart of procedures such as teleportation, dense coding and error correction. We present a new method for constructing a UEB from a quantum Latin square equipped with extra data. Developing construction techniques for UEBs has been a major activity in quantum computation, with three primary methods proposed: shift-and-multiply, Hadamard, and algebraic. We show that our new approach simultaneously generalizes the shift-and-multiply and Hadamard methods. Furthermore, we explicitly construct a UEB using our technique which we prove cannot be obtained from any of these existing methods.

  1. Generation-based memory synchronization in a multiprocessor system with weakly consistent memory accesses

    DOE Patents [OSTI]

    Ohmacht, Martin

    2014-09-09T23:59:59.000Z

    In a multiprocessor system, a central memory synchronization module coordinates memory synchronization requests responsive to memory access requests in flight, a generation counter, and a reclaim pointer. The central module communicates via point-to-point communication. The module includes a global OR reduce tree for each memory access requesting device, for detecting memory access requests in flight. An interface unit is implemented associated with each processor requesting synchronization. The interface unit includes multiple generation completion detectors. The generation count and reclaim pointer do not pass one another.

  2. Using on-package memory

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645U.S. DOE Office of ScienceandMesa del SolStrengthening aTurbulence mayUndergraduateAboutUserHadoopon-package memory Using

  3. Memory Usage Considerations on Franklin

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645U.S. DOE Office of Science (SC)Integrated Codes |IsLove Your Home andDispositionMechanicalAboutMembersMemory

  4. Modesto Memorial Hospital Space Heating Low Temperature Geothermal...

    Open Energy Info (EERE)

    Memorial Hospital Space Heating Low Temperature Geothermal Facility Jump to: navigation, search Name Modesto Memorial Hospital Space Heating Low Temperature Geothermal Facility...

  5. attention working memory: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    and working memory. (more) Mayer, Jamie F. 2010-01-01 30 Working Memory and Dyslexia CiteSeer Summary: Recent research has demonstrated that dyslexic children suffer...

  6. associative memory models: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    David 1971-01-01 2 COMPLEX ASSOCIATIVE MEMORY NEURAL NETWORK MODEL FOR INVARIANT PATTERN RECOGNITION Engineering Websites Summary: COMPLEX ASSOCIATIVE MEMORY NEURAL...

  7. associative memory model: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    David 1971-01-01 2 COMPLEX ASSOCIATIVE MEMORY NEURAL NETWORK MODEL FOR INVARIANT PATTERN RECOGNITION Engineering Websites Summary: COMPLEX ASSOCIATIVE MEMORY NEURAL...

  8. Systematic Errors in measurement of b1

    SciTech Connect (OSTI)

    Wood, S A

    2014-10-27T23:59:59.000Z

    A class of spin observables can be obtained from the relative difference of or asymmetry between cross sections of different spin states of beam or target particles. Such observables have the advantage that the normalization factors needed to calculate absolute cross sections from yields often divide out or cancel to a large degree in constructing asymmetries. However, normalization factors can change with time, giving different normalization factors for different target or beam spin states, leading to systematic errors in asymmetries in addition to those determined from statistics. Rapidly flipping spin orientation, such as what is routinely done with polarized beams, can significantly reduce the impact of these normalization fluctuations and drifts. Target spin orientations typically require minutes to hours to change, versus fractions of a second for beams, making systematic errors for observables based on target spin flips more difficult to control. Such systematic errors from normalization drifts are discussed in the context of the proposed measurement of the deuteron b(1) structure function at Jefferson Lab.

  9. Performance evaluation of NUMA and COMA distributed shared-memory multiprocessors

    E-Print Network [OSTI]

    Holzrichter, Michael Warren

    1995-01-01T23:59:59.000Z

    Memory architecture is an important component in a distributed shared-memory parallel computer. This thesis studies three shared-memory architectures-Non-Uniform Memory Access (NUMA) with full-mapped directories, Cache-Only Memory Architecture (COMA...

  10. Message passing in fault tolerant quantum error correction

    E-Print Network [OSTI]

    Z. W. E. Evans; A. M. Stephens

    2008-06-13T23:59:59.000Z

    Inspired by Knill's scheme for message passing error detection, here we develop a scheme for message passing error correction for the nine-qubit Bacon-Shor code. We show that for two levels of concatenated error correction, where classical information obtained at the first level is used to help interpret the syndrome at the second level, our scheme will correct all cases with four physical errors. This results in a reduction of the logical failure rate relative to conventional error correction by a factor proportional to the reciprocal of the physical error rate.

  11. Memorial University of Newfoundland Indirect Costs Report

    E-Print Network [OSTI]

    deYoung, Brad

    Memorial University of Newfoundland Indirect Costs Report 2012-13 The grant provided through the Government of Canada Indirect Costs Program (ICP) is essential to Memorial's research success. Funding and impact can be found in the following section. Total 2013 Indirect Costs Grant: $4,318,814 Management

  12. Enhancing Compiler Techniques for Memory Energy Optimizations

    E-Print Network [OSTI]

    Kuzmanovic, Aleksandar

    in the total energy consumption equation. 1 Introduction As the market for embedded systems continues to grow for Memory Energy Optimizations 365 tend to increase code size. This increased code size is an important. An increase in instruction memory size, in turn, increases both per access dynamic energy consumption and leak

  13. Cultural differences on the children's memory scale

    E-Print Network [OSTI]

    Cash, Deborah Dyer

    2009-05-15T23:59:59.000Z

    ) is an assessment instrument used to identify memory and learning deficits and strengths in children ages five through 16. This study investigated the impact of culture and parent educational level (PEL) on student performance on the Children’s Memory Scale using...

  14. How Minds Work Memories and Learning

    E-Print Network [OSTI]

    Memphis, University of

    & Learning 7 Types of Human Learning Requiring Distinct Mechanisms · Perceptual learning ­ Identify1 How Minds Work Memories and Learning Stan Franklin Computer Science Division & Institute for Intelligent Systems The University of Memphis #12;How Minds Work: Memory & Learning 2 Human Learning

  15. Learning and Memory Eric R. Kandel

    E-Print Network [OSTI]

    Ulanovsky, Nachum

    and memory we are interested in several questions. What are the major forms of P.1228 learning? What types of information about the environment are learned most easily? Do different types of learning give riseBack 62 Learning and Memory Eric R. Kandel Irving Kupfermann Susan Iversen BEHAVIOR IS THE RESULT

  16. Shape memory polymer actuator and catheter

    DOE Patents [OSTI]

    Maitland, Duncan J. (Pleasant Hill, CA); Lee, Abraham P. (Walnut Creek, CA); Schumann, Daniel L. (Concord, CA); Matthews, Dennis L. (Moss Beach, CA); Decker, Derek E. (Byron, CA); Jungreis, Charles A. (Pittsburgh, PA)

    2007-11-06T23:59:59.000Z

    An actuator system is provided for acting upon a material in a vessel. The system includes an optical fiber and a shape memory polymer material operatively connected to the optical fiber. The shape memory polymer material is adapted to move from a first shape for moving through said vessel to a second shape where it can act upon said material.

  17. Shape memory polymer actuator and catheter

    SciTech Connect (OSTI)

    Maitland, Duncan J.; Lee, Abraham P.; Schumann, Daniel L.; Matthews, Dennis L.; Decker, Derek E.; Jungreis, Charles A.

    2004-05-25T23:59:59.000Z

    An actuator system is provided for acting upon a material in a vessel. The system includes an optical fiber and a shape memory polymer material operatively connected to the optical fiber. The shape memory polymer material is adapted to move from a first shape for moving through said vessel to a second shape where it can act upon said material.

  18. Online Data Structures in External Memory

    E-Print Network [OSTI]

    Vitter, Jeffrey Scott

    1999-01-01T23:59:59.000Z

    /output communication (or I/O) between the external and internal memories. In this paper we discuss a variety of online data structures for external memory, some very old and some very new, such as hashing (for dictionaries), B-trees (for dictionaries and 1-D range...

  19. Tier identification (TID) for tiered memory characteristics

    DOE Patents [OSTI]

    Chang, Jichuan; Lim, Kevin T; Ranganathan, Parthasarathy

    2014-03-25T23:59:59.000Z

    A tier identification (TID) is to indicate a characteristic of a memory region associated with a virtual address in a tiered memory system. A thread may be serviced according to a first path based on the TID indicating a first characteristic. The thread may be serviced according to a second path based on the TID indicating a second characteristic.

  20. Synaptic plasticity and memory Richard Kempter

    E-Print Network [OSTI]

    Kempter, Richard

    Synaptic plasticity and memory Richard Kempter 1,2,3 & Dietmar Schmitz 2,3 1 Institute in the central nervous system. In its most general form, the "synaptic plasticity and memory hypothesis" states, and that synaptic plasticity is both necessary and sufficient for the storage of information underlying

  1. Adiabatic Quantum Optimization for Associative Memory Recall

    E-Print Network [OSTI]

    Hadayat Seddiqi; Travis S. Humble

    2014-12-12T23:59:59.000Z

    Hopfield networks are a variant of associative memory that recall information stored in the couplings of an Ising model. Stored memories are fixed points for the network dynamics that correspond to energetic minima of the spin state. We formulate the recall of memories stored in a Hopfield network using energy minimization by adiabatic quantum optimization (AQO). Numerical simulations of the quantum dynamics allow us to quantify the AQO recall accuracy with respect to the number of stored memories and the noise in the input key. We also investigate AQO performance with respect to how memories are stored in the Ising model using different learning rules. Our results indicate that AQO performance varies strongly with learning rule due to the changes in the energy landscape. Consequently, learning rules offer indirect methods for investigating change to the computational complexity of the recall task and the computational efficiency of AQO.

  2. Temperature and electrical memory of polymer fibers

    SciTech Connect (OSTI)

    Yuan, Jinkai; Zakri, Cécile; Grillard, Fabienne; Neri, Wilfrid; Poulin, Philippe [Centre de Recherche Paul Pascal - CNRS, University of Bordeaux, Avenue Schweitzer, 33600 Pessac (France)

    2014-05-15T23:59:59.000Z

    We report in this work studies of the shape memory behavior of polymer fibers loaded with carbon nanotubes or graphene flakes. These materials exhibit enhanced shape memory properties with the generation of a giant stress upon shape recovery. In addition, they exhibit a surprising temperature memory with a peak of generated stress at a temperature nearly equal to the temperature of programming. This temperature memory is ascribed to the presence of dynamical heterogeneities and to the intrinsic broadness of the glass transition. We present recent experiments related to observables other than mechanical properties. In particular nanocomposite fibers exhibit variations of electrical conductivity with an accurate memory. Indeed, the rate of conductivity variations during temperature changes reaches a well defined maximum at a temperature equal to the temperature of programming. Such materials are promising for future actuators that couple dimensional changes with sensing electronic functionalities.

  3. Performing an allreduce operation using shared memory

    SciTech Connect (OSTI)

    Archer, Charles J. (Rochester, MN); Dozsa, Gabor (Ardsley, NY); Ratterman, Joseph D. (Rochester, MN); Smith, Brian E. (Rochester, MN)

    2012-04-17T23:59:59.000Z

    Methods, apparatus, and products are disclosed for performing an allreduce operation using shared memory that include: receiving, by at least one of a plurality of processing cores on a compute node, an instruction to perform an allreduce operation; establishing, by the core that received the instruction, a job status object for specifying a plurality of shared memory allreduce work units, the plurality of shared memory allreduce work units together performing the allreduce operation on the compute node; determining, by an available core on the compute node, a next shared memory allreduce work unit in the job status object; and performing, by that available core on the compute node, that next shared memory allreduce work unit.

  4. Performing an allreduce operation using shared memory

    SciTech Connect (OSTI)

    Archer, Charles J; Dozsa, Gabor; Ratterman, Joseph D; Smith, Brian E

    2014-06-10T23:59:59.000Z

    Methods, apparatus, and products are disclosed for performing an allreduce operation using shared memory that include: receiving, by at least one of a plurality of processing cores on a compute node, an instruction to perform an allreduce operation; establishing, by the core that received the instruction, a job status object for specifying a plurality of shared memory allreduce work units, the plurality of shared memory allreduce work units together performing the allreduce operation on the compute node; determining, by an available core on the compute node, a next shared memory allreduce work unit in the job status object; and performing, by that available core on the compute node, that next shared memory allreduce work unit.

  5. Efficient Error Calculation for Multiresolution Texture-Based Volume Visualization

    SciTech Connect (OSTI)

    LaMar, E; Hamann, B; Joy, K I

    2001-10-16T23:59:59.000Z

    Multiresolution texture-based volume visualization is an excellent technique to enable interactive rendering of massive data sets. Interactive manipulation of a transfer function is necessary for proper exploration of a data set. However, multiresolution techniques require assessing the accuracy of the resulting images, and re-computing the error after each change in a transfer function is very expensive. They extend their existing multiresolution volume visualization method by introducing a method for accelerating error calculations for multiresolution volume approximations. Computing the error for an approximation requires adding individual error terms. One error value must be computed once for each original voxel and its corresponding approximating voxel. For byte data, i.e., data sets where integer function values between 0 and 255 are given, they observe that the set of error pairs can be quite large, yet the set of unique error pairs is small. instead of evaluating the error function for each original voxel, they construct a table of the unique combinations and the number of their occurrences. To evaluate the error, they add the products of the error function for each unique error pair and the frequency of each error pair. This approach dramatically reduces the amount of computation time involved and allows them to re-compute the error associated with a new transfer function quickly.

  6. Quantum Error Correcting Subsystem Codes From Two Classical Linear Codes

    E-Print Network [OSTI]

    Dave Bacon; Andrea Casaccino

    2006-10-17T23:59:59.000Z

    The essential insight of quantum error correction was that quantum information can be protected by suitably encoding this quantum information across multiple independently erred quantum systems. Recently it was realized that, since the most general method for encoding quantum information is to encode it into a subsystem, there exists a novel form of quantum error correction beyond the traditional quantum error correcting subspace codes. These new quantum error correcting subsystem codes differ from subspace codes in that their quantum correcting routines can be considerably simpler than related subspace codes. Here we present a class of quantum error correcting subsystem codes constructed from two classical linear codes. These codes are the subsystem versions of the quantum error correcting subspace codes which are generalizations of Shor's original quantum error correcting subspace codes. For every Shor-type code, the codes we present give a considerable savings in the number of stabilizer measurements needed in their error recovery routines.

  7. Reply To "Comment on 'Quantum Convolutional Error-Correcting Codes' "

    E-Print Network [OSTI]

    H. F. Chau

    2005-06-02T23:59:59.000Z

    In their comment, de Almedia and Palazzo \\cite{comment} discovered an error in my earlier paper concerning the construction of quantum convolutional codes (quant-ph/9712029). This error can be repaired by modifying the method of code construction.

  8. Human error contribution to nuclear materials-handling events

    E-Print Network [OSTI]

    Sutton, Bradley (Bradley Jordan)

    2007-01-01T23:59:59.000Z

    This thesis analyzes a sample of 15 fuel-handling events from the past ten years at commercial nuclear reactors with significant human error contributions in order to detail the contribution of human error to fuel-handling ...

  9. Evolved Error Management Biases in the Attribution of Anger

    E-Print Network [OSTI]

    Galperin, Andrew

    2012-01-01T23:59:59.000Z

    von Hippel, W. , Poore, J. C. , Buss, D. M. , et al. (under27, 733-763. Haselton, M. G. , & Buss, D. M. (2000). Error27, 733-763. Haselton, M. G. , & Buss, D. M. (2000). Error

  10. A random access memory immune to single event upset using a T-Resistor

    DOE Patents [OSTI]

    Ochoa, A. Jr.

    1987-10-28T23:59:59.000Z

    In a random access memory cell, a resistance ''T'' decoupling network in each leg of the cell reduces random errors caused by the interaction of energetic ions with the semiconductor material forming the cell. The cell comprises two parallel legs each containing a series pair of complementary MOS transistors having a common gate connected to the node between the transistors of the opposite leg. The decoupling network in each leg is formed by a series pair of resistors between the transistors together with a third resistor interconnecting the junction between the pair of resistors and the gate of the transistor pair forming the opposite leg of the cell. 4 figs.

  11. Elastic Constants of Ni-Mn-Ga Magnetic Shape Memory Alloys

    SciTech Connect (OSTI)

    Stipcich, M. [Universitat de Barcelona; Manosa, L. [Universitat de Barcelona; Planes, A. [Universitat de Barcelona; Morin, M. [INSA de Lyon; Zarestky, Jerel L [ORNL; Lograsso, Tom [Ames Laboratory; Stassis, C. [Ames Laboratory

    2004-01-01T23:59:59.000Z

    We have measured the adiabatic second order elastic constants of two Ni-Mn-Ga magnetic shape memory crystals with different martensitic transition temperatures, using ultrasonic methods. The temperature dependence of the elastic constants has been followed across the ferromagnetic transition and down to the martensitic transition temperature. Within experimental errors no noticeable change in any of the elastic constants has been observed at the Curie point. The temperature dependence of the shear elastic constant C' has been found to be very different for the two alloys. Such a different behavior is in agreement with recent theoretical predictions for systems undergoing multi-stage structural transitions.

  12. Clustered Error Correction of Codeword-Stabilized Quantum Codes

    E-Print Network [OSTI]

    Yunfan Li; Ilya Dumer; Leonid P. Pryadko

    2010-03-08T23:59:59.000Z

    Codeword stabilized (CWS) codes are a general class of quantum codes that includes stabilizer codes and many families of non-additive codes with good parameters. For such a non-additive code correcting all t-qubit errors, we propose an algorithm that employs a single measurement to test all errors located on a given set of t qubits. Compared with exhaustive error screening, this reduces the total number of measurements required for error recovery by a factor of about 3^t.

  13. Efficient Semiparametric Estimators for Biological, Genetic, and Measurement Error Applications

    E-Print Network [OSTI]

    Garcia, Tanya

    2012-10-19T23:59:59.000Z

    to the models considered in Tsiatis and Ma (2004), our model is less stringent because it allows an unspecified model error distribution and unspecified covariate distribution, not just the latter. With an unspecified model error distribution, the RMM... with measurement error is a very different problem compared to the model considered in Tsiatis and Ma (2004), where the model error distribution has a known parametric form. Consequently, the semiparamet- ric treatment here is also drastically different. Our...

  14. Error Analysis in Nuclear Density Functional Theory

    E-Print Network [OSTI]

    Nicolas Schunck; Jordan D. McDonnell; Jason Sarich; Stefan M. Wild; Dave Higdon

    2014-07-11T23:59:59.000Z

    Nuclear density functional theory (DFT) is the only microscopic, global approach to the structure of atomic nuclei. It is used in numerous applications, from determining the limits of stability to gaining a deep understanding of the formation of elements in the universe or the mechanisms that power stars and reactors. The predictive power of the theory depends on the amount of physics embedded in the energy density functional as well as on efficient ways to determine a small number of free parameters and solve the DFT equations. In this article, we discuss the various sources of uncertainties and errors encountered in DFT and possible methods to quantify these uncertainties in a rigorous manner.

  15. Franklin Trouble Shooting and Error Messages

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645U.S. DOE Office of Science (SC) Environmental Assessments (EA)Budget(DANCE) TargetFormsTrouble Shooting and Error

  16. Edison Trouble Shooting and Error Messages

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625govInstrumentstdmadapInactiveVisitingContract ManagementDiscoveringESnet UpdateEarthTrouble Shooting and Error

  17. A Taxonomy of Number Entry Error Sarah Wiseman

    E-Print Network [OSTI]

    Cairns, Paul

    A Taxonomy of Number Entry Error Sarah Wiseman UCLIC MPEB, Malet Place London, WC1E 7JE sarah and the subsequent process of creating a taxonomy of errors from the information gathered. A total of 350 errors were. These codes are then organised into a taxonomy similar to that of Zhang et al (2004). We show how

  18. A Taxonomy of Number Entry Error Sarah Wiseman

    E-Print Network [OSTI]

    Subramanian, Sriram

    A Taxonomy of Number Entry Error Sarah Wiseman UCLIC MPEB, Malet Place London, WC1E 7JE sarah and the subsequent process of creating a taxonomy of errors from the information gathered. A total of 345 errors were. These codes are then organised into a taxonomy similar to that of Zhang et al (2004). We show how

  19. Predictors of Threat and Error Management: Identification of Core

    E-Print Network [OSTI]

    Predictors of Threat and Error Management: Identification of Core Nontechnical Skills In normal flight operations, crews are faced with a variety of external threats and commit a range of errors of these threats and errors therefore forms an essential element of enhancing performance and minimizing risk

  20. Error rate and power dissipation in nano-logic devices

    E-Print Network [OSTI]

    Kim, Jong Un

    2004-01-01T23:59:59.000Z

    Current-controlled logic and single electron logic processors have been investigated with respect to thermal-induced bit error. A maximal error rate for both logic processors is regarded as one bit-error/year/chip. A maximal clock frequency...

  1. Bolstered Error Estimation Ulisses Braga-Neto a,c

    E-Print Network [OSTI]

    Braga-Neto, Ulisses

    the bolstered error estimators proposed in this paper, as part of a larger library for classification and error of the data. It has a direct geometric interpretation and can be easily applied to any classification rule as smoothed error estimation. In some important cases, such as a linear classification rule with a Gaussian

  2. Learning, Memory, and Education Lessons for the Classroom

    E-Print Network [OSTI]

    Rose, Michael R.

    Learning, Memory, and Education Lessons for the Classroom Michael A. Yassa, M.A. Ph.D. Candidate memory? How can we optimize individual learning? How do lessons from memory apply to the classroom? Brain individual learning? How do lessons from memory apply to the classroom? Brain-based learning: fact or fiction

  3. UTILIZING THE SHAPE MEMORY EFFECT TO ENABLE FLEXIBLE ELECTRONICS

    E-Print Network [OSTI]

    Petta, Jason

    UTILIZING THE SHAPE MEMORY EFFECT TO ENABLE FLEXIBLE ELECTRONICS Abhishek Raj The University under strain #12;The Shape Memory Effect Shape-memory polymer (SMP) orthopedic cast 4 #12;Polymer Glass Transition Temperature Yakacki CM, Willis S, Luders C, and Gall K. Deformation Limits in Shape-Memory

  4. Organizational Memory: Processes, Boundary Objects, and Trajectories Mark S. Ackerman

    E-Print Network [OSTI]

    Ackerman, Mark S.

    Organizational Memory: Processes, Boundary Objects, and Trajectories Mark S. Ackerman Information 7751 krys@watson.ibm.com Abstract The term organizational memory is due for an overhaul. Memory appears and analyzing organizational memory. 1. Introduction After nearly ten years of research, the term organizational

  5. Row Buffer Locality Aware Caching Policies for Hybrid Memories

    E-Print Network [OSTI]

    strengths · A hybrid memory system (DRAM-PCM) aims for best of both · Problem: How to place data between static energy (no refresh) 6 DRAM PCM CPU MC MC #12;Hybrid Memory · Design direction: DRAM as a cache memory devices? 8 DRAM PCM CPU MC MC #12;Outline · Background: Hybrid Memory Systems · Motivation: Row

  6. Non-volatile memory for checkpoint storage

    DOE Patents [OSTI]

    Blumrich, Matthias A.; Chen, Dong; Cipolla, Thomas M.; Coteus, Paul W.; Gara, Alan; Heidelberger, Philip; Jeanson, Mark J.; Kopcsay, Gerard V.; Ohmacht, Martin; Takken, Todd E.

    2014-07-22T23:59:59.000Z

    A system, method and computer program product for supporting system initiated checkpoints in high performance parallel computing systems and storing of checkpoint data to a non-volatile memory storage device. The system and method generates selective control signals to perform checkpointing of system related data in presence of messaging activity associated with a user application running at the node. The checkpointing is initiated by the system such that checkpoint data of a plurality of network nodes may be obtained even in the presence of user applications running on highly parallel computers that include ongoing user messaging activity. In one embodiment, the non-volatile memory is a pluggable flash memory card.

  7. Securing non-volatile memory regions

    DOE Patents [OSTI]

    Faraboschi, Paolo; Ranganathan, Parthasarathy; Muralimanohar, Naveen

    2013-08-20T23:59:59.000Z

    Methods, apparatus and articles of manufacture to secure non-volatile memory regions are disclosed. An example method disclosed herein comprises associating a first key pair and a second key pair different than the first key pair with a process, using the first key pair to secure a first region of a non-volatile memory for the process, and using the second key pair to secure a second region of the non-volatile memory for the same process, the second region being different than the first region.

  8. Direct access inter-process shared memory

    DOE Patents [OSTI]

    Brightwell, Ronald B; Pedretti, Kevin; Hudson, Trammell B

    2013-10-22T23:59:59.000Z

    A technique for directly sharing physical memory between processes executing on processor cores is described. The technique includes loading a plurality of processes into the physical memory for execution on a corresponding plurality of processor cores sharing the physical memory. An address space is mapped to each of the processes by populating a first entry in a top level virtual address table for each of the processes. The address space of each of the processes is cross-mapped into each of the processes by populating one or more subsequent entries of the top level virtual address table with the first entry in the top level virtual address table from other processes.

  9. An Improved Technique for Reducing False Alarms Due to Soft Errors A significant fraction of soft errors in modern

    E-Print Network [OSTI]

    Polian, Ilia

    of soft errors in modern microprocessors has been reported to never lead to a system failure. Any techniques are enhanced by a methodology to handle soft errors on address bits. Furthermore, we demonstrate]. Consequently, many state-of-the art systems provide soft error detection and correction capabilities [Hass 89

  10. Technological Advancements and Error Rates in Radiation Therapy Delivery

    SciTech Connect (OSTI)

    Margalit, Danielle N., E-mail: dmargalit@partners.org [Harvard Radiation Oncology Program, Boston, MA (United States); Harvard Cancer Consortium and Brigham and Women's Hospital/Dana Farber Cancer Institute, Boston, MA (United States); Chen, Yu-Hui; Catalano, Paul J.; Heckman, Kenneth; Vivenzio, Todd; Nissen, Kristopher; Wolfsberger, Luciant D.; Cormack, Robert A.; Mauch, Peter; Ng, Andrea K. [Harvard Cancer Consortium and Brigham and Women's Hospital/Dana Farber Cancer Institute, Boston, MA (United States)

    2011-11-15T23:59:59.000Z

    Purpose: Technological advances in radiation therapy (RT) delivery have the potential to reduce errors via increased automation and built-in quality assurance (QA) safeguards, yet may also introduce new types of errors. Intensity-modulated RT (IMRT) is an increasingly used technology that is more technically complex than three-dimensional (3D)-conformal RT and conventional RT. We determined the rate of reported errors in RT delivery among IMRT and 3D/conventional RT treatments and characterized the errors associated with the respective techniques to improve existing QA processes. Methods and Materials: All errors in external beam RT delivery were prospectively recorded via a nonpunitive error-reporting system at Brigham and Women's Hospital/Dana Farber Cancer Institute. Errors are defined as any unplanned deviation from the intended RT treatment and are reviewed during monthly departmental quality improvement meetings. We analyzed all reported errors since the routine use of IMRT in our department, from January 2004 to July 2009. Fisher's exact test was used to determine the association between treatment technique (IMRT vs. 3D/conventional) and specific error types. Effect estimates were computed using logistic regression. Results: There were 155 errors in RT delivery among 241,546 fractions (0.06%), and none were clinically significant. IMRT was commonly associated with errors in machine parameters (nine of 19 errors) and data entry and interpretation (six of 19 errors). IMRT was associated with a lower rate of reported errors compared with 3D/conventional RT (0.03% vs. 0.07%, p = 0.001) and specifically fewer accessory errors (odds ratio, 0.11; 95% confidence interval, 0.01-0.78) and setup errors (odds ratio, 0.24; 95% confidence interval, 0.08-0.79). Conclusions: The rate of errors in RT delivery is low. The types of errors differ significantly between IMRT and 3D/conventional RT, suggesting that QA processes must be uniquely adapted for each technique. There was a lower error rate with IMRT compared with 3D/conventional RT, highlighting the need for sustained vigilance against errors common to more traditional treatment techniques.

  11. Locked modes and magnetic field errors in MST

    SciTech Connect (OSTI)

    Almagri, A.F.; Assadi, S.; Prager, S.C.; Sarff, J.S.; Kerst, D.W.

    1992-06-01T23:59:59.000Z

    In the MST reversed field pinch magnetic oscillations become stationary (locked) in the lab frame as a result of a process involving interactions between the modes, sawteeth, and field errors. Several helical modes become phase locked to each other to form a rotating localized disturbance, the disturbance locks to an impulsive field error generated at a sawtooth crash, the error fields grow monotonically after locking (perhaps due to an unstable interaction between the modes and field error), and over the tens of milliseconds of growth confinement degrades and the discharge eventually terminates. Field error control has been partially successful in eliminating locking.

  12. Laser annealing of amorphous NiTi shape memory alloy thin films to locally induce shape memory properties

    E-Print Network [OSTI]

    Laser annealing of amorphous NiTi shape memory alloy thin films to locally induce shape memory the results of a crystallization study on NiTi shape memory thin films in which amorphous films are annealed by a scanning laser. This technique has the advantage that shape memory properties can be spatially distributed

  13. Evaluating and Minimizing Distributed Cavity Phase Errors in Atomic Clocks

    E-Print Network [OSTI]

    Li, Ruoxin

    2010-01-01T23:59:59.000Z

    We perform 3D finite element calculations of the fields in microwave cavities and analyze the distributed cavity phase errors of atomic clocks that they produce. The fields of cylindrical cavities are treated as an azimuthal Fourier series. Each of the lowest components produces clock errors with unique characteristics that must be assessed to establish a clock's accuracy. We describe the errors and how to evaluate them. We prove that sharp structures in the cavity do not produce large frequency errors, even at moderately high powers, provided the atomic density varies slowly. We model the amplitude and phase imbalances of the feeds. For larger couplings, these can lead to increased phase errors. We show that phase imbalances produce a novel distributed cavity phase error that depends on the cavity detuning. We also design improved cavities by optimizing the geometry and tuning the mode spectrum so that there are negligible phase variations, allowing this source of systematic error to be dramatically reduced.

  14. Evaluating and Minimizing Distributed Cavity Phase Errors in Atomic Clocks

    E-Print Network [OSTI]

    Ruoxin Li; Kurt Gibble

    2010-08-09T23:59:59.000Z

    We perform 3D finite element calculations of the fields in microwave cavities and analyze the distributed cavity phase errors of atomic clocks that they produce. The fields of cylindrical cavities are treated as an azimuthal Fourier series. Each of the lowest components produces clock errors with unique characteristics that must be assessed to establish a clock's accuracy. We describe the errors and how to evaluate them. We prove that sharp structures in the cavity do not produce large frequency errors, even at moderately high powers, provided the atomic density varies slowly. We model the amplitude and phase imbalances of the feeds. For larger couplings, these can lead to increased phase errors. We show that phase imbalances produce a novel distributed cavity phase error that depends on the cavity detuning. We also design improved cavities by optimizing the geometry and tuning the mode spectrum so that there are negligible phase variations, allowing this source of systematic error to be dramatically reduced.

  15. In Search of a Taxonomy for Classifying Qualitative Spreadsheet Errors

    E-Print Network [OSTI]

    Przasnyski, Zbigniew; Seal, Kala Chand

    2011-01-01T23:59:59.000Z

    Most organizations use large and complex spreadsheets that are embedded in their mission-critical processes and are used for decision-making purposes. Identification of the various types of errors that can be present in these spreadsheets is, therefore, an important control that organizations can use to govern their spreadsheets. In this paper, we propose a taxonomy for categorizing qualitative errors in spreadsheet models that offers a framework for evaluating the readiness of a spreadsheet model before it is released for use by others in the organization. The classification was developed based on types of qualitative errors identified in the literature and errors committed by end-users in developing a spreadsheet model for Panko's (1996) "Wall problem". Closer inspection of the errors reveals four logical groupings of the errors creating four categories of qualitative errors. The usability and limitations of the proposed taxonomy and areas for future extension are discussed.

  16. Analysis of Errors in a Special Perturbations Satellite Orbit Propagator

    SciTech Connect (OSTI)

    Beckerman, M.; Jones, J.P.

    1999-02-01T23:59:59.000Z

    We performed an analysis of error densities for the Special Perturbations orbit propagator using data for 29 satellites in orbits of interest to Space Shuttle and International Space Station collision avoidance. We find that the along-track errors predominate. These errors increase monotonically over each 36-hour prediction interval. The predicted positions in the along-track direction progressively either leap ahead of or lag behind the actual positions. Unlike the along-track errors the radial and cross-track errors oscillate about their nearly zero mean values. As the number of observations per fit interval decline the along-track prediction errors, and amplitudes of the radial and cross-track errors, increase.

  17. E791 DATA ACQUISITION SYSTEM Error reports received ; no new errors reported

    E-Print Network [OSTI]

    Fermi National Accelerator Laboratory

    of events written to tape. 18 #12; Error and Status Displays Mailbox For Histogram Requests Vax­online Event Display VAX 11 / 780 Event Reconstruction Event Display Detector Monitoring 3 VAX Workstations 42 EXABYTE of the entire E791 DA system. The VAX 11/780 was the user interface to the VME part of the system, via the DA

  18. Orthopaedic applications of ferromagnetic shape memory alloys

    E-Print Network [OSTI]

    Guo, Weimin, M. Eng. Massachusetts Institute of Technology

    2008-01-01T23:59:59.000Z

    Ferromagnetic shape memory alloys (FSMAs) are a new class of magnetic field-actuated active materials with no current commercial applications. By applying a magnetic field of around 0.4 T, they can exert a stress of ...

  19. Thermomechanical modeling of a shape memory polymer 

    E-Print Network [OSTI]

    Ghosh, Pritha B.

    2009-05-15T23:59:59.000Z

    The aim of this work is to demonstrate a Helmholtz potential based approach for the development of the constitutive equations for a shape memory polymer undergoing a thermomechanical cycle. The approach is motivated by the use of a simple spring...

  20. ACOHERENT SHARED MEMORY Derek R. Hower

    E-Print Network [OSTI]

    Hill, Mark D.

    ACOHERENT SHARED MEMORY by Derek R. Hower A dissertation submitted in partial fulfillment. Hower 2012 All Rights Reserved #12;i Abstract The computer industry has entered an era where energy

  1. Thermomechanical modeling of a shape memory polymer

    E-Print Network [OSTI]

    Ghosh, Pritha B.

    2009-05-15T23:59:59.000Z

    The aim of this work is to demonstrate a Helmholtz potential based approach for the development of the constitutive equations for a shape memory polymer undergoing a thermomechanical cycle. The approach is motivated by the use of a simple spring...

  2. Size Effects in Ferromagnetic Shape Memory Alloys

    E-Print Network [OSTI]

    Ozdemir, Nevin

    2012-07-16T23:59:59.000Z

    effects in these mechanisms has both scientific and technological relevance. Superelastic behavior of Ni54Fe19Ga27 shape memory alloy single crystalline pillars was studied under compression as a function of pillar diameter. Multiple pillars...

  3. Funes the Memorious by Jorge Luis Borges

    E-Print Network [OSTI]

    Funes, who, after falling off his horse and receiving a bad head injury, acquired the amazing talent on the morning of April 30, 1882, and he could compare them in his memory with the veins in the marbled binding

  4. Housing memory: architecture, materiality and time 

    E-Print Network [OSTI]

    Spanou, Sofia-Irini

    2008-01-01T23:59:59.000Z

    , and cognition – and their intricate relationships with material culture, especially architecture, landscapes, practical action and social life, the aim is to suggest a theoretical and methodological framework within which to explore how memory of the past...

  5. Video Stores, Media Technologies, and Memory

    E-Print Network [OSTI]

    Wilken, Rowan

    2010-01-01T23:59:59.000Z

    both for analogue and digital media (e.g. , memory loss duefrom all forms of digital media usage (broadband downloadingin relation to digital media is signal compression and audio

  6. Aggressive children's memory for attachment relevant information

    E-Print Network [OSTI]

    Collie, Claire Futamase

    2004-09-30T23:59:59.000Z

    This study examined a measure of children's memory for information from a story about a hypothetical mother and child, the Story Task, as a potential tool to delineate subtypes of aggressive children based on the pattern of information processing...

  7. Graphical Quantum Error-Correcting Codes

    E-Print Network [OSTI]

    Sixia Yu; Qing Chen; C. H. Oh

    2007-09-12T23:59:59.000Z

    We introduce a purely graph-theoretical object, namely the coding clique, to construct quantum errorcorrecting codes. Almost all quantum codes constructed so far are stabilizer (additive) codes and the construction of nonadditive codes, which are potentially more efficient, is not as well understood as that of stabilizer codes. Our graphical approach provides a unified and classical way to construct both stabilizer and nonadditive codes. In particular we have explicitly constructed the optimal ((10,24,3)) code and a family of 1-error detecting nonadditive codes with the highest encoding rate so far. In the case of stabilizer codes a thorough search becomes tangible and we have classified all the extremal stabilizer codes up to 8 qubits.

  8. Output error identification of hydrogenerator conduit dynamics

    SciTech Connect (OSTI)

    Vogt, M.A.; Wozniak, L. (Illinois Univ., Urbana, IL (USA)); Whittemore, T.R. (Bureau of Reclamation, Denver, CO (USA))

    1989-09-01T23:59:59.000Z

    Two output error model reference adaptive identifiers are considered for estimating the parameters in a reduced order gate position to pressure model for the hydrogenerator. This information may later be useful in an adaptive controller. Gradient and sensitivity functions identifiers are discussed for the hydroelectric application and connections are made between their structural differences and relative performance. Simulations are presented to support the conclusion that the latter algorithm is more robust, having better disturbance rejection and less plant model mismatch sensitivity. For identification from recorded plant data from step gate inputs, the other algorithm even fails to converge. A method for checking the estimated parameters is developed by relating the coefficients in the reduced order model to head, an externally measurable parameter.

  9. Pressure Change Measurement Leak Testing Errors

    SciTech Connect (OSTI)

    Pryor, Jeff M [ORNL] [ORNL; Walker, William C [ORNL] [ORNL

    2014-01-01T23:59:59.000Z

    A pressure change test is a common leak testing method used in construction and Non-Destructive Examination (NDE). The test is known as being a fast, simple, and easy to apply evaluation method. While this method may be fairly quick to conduct and require simple instrumentation, the engineering behind this type of test is more complex than is apparent on the surface. This paper intends to discuss some of the more common errors made during the application of a pressure change test and give the test engineer insight into how to correctly compensate for these factors. The principals discussed here apply to ideal gases such as air or other monoatomic or diatomic gasses; however these same principals can be applied to polyatomic gasses or liquid flow rate with altered formula specific to those types of tests using the same methodology.

  10. Quantum Error Correction with magnetic molecules

    E-Print Network [OSTI]

    José J. Baldoví; Salvador Cardona-Serra; Juan M. Clemente-Juan; Luis Escalera-Moreno; Alejandro Gaita-Ariño; Guillermo Mínguez Espallargas

    2014-08-22T23:59:59.000Z

    Quantum algorithms often assume independent spin qubits to produce trivial $|\\uparrow\\rangle=|0\\rangle$, $|\\downarrow\\rangle=|1\\rangle$ mappings. This can be unrealistic in many solid-state implementations with sizeable magnetic interactions. Here we show that the lower part of the spectrum of a molecule containing three exchange-coupled metal ions with $S=1/2$ and $I=1/2$ is equivalent to nine electron-nuclear qubits. We derive the relation between spin states and qubit states in reasonable parameter ranges for the rare earth $^{159}$Tb$^{3+}$ and for the transition metal Cu$^{2+}$, and study the possibility to implement Shor's Quantum Error Correction code on such a molecule. We also discuss recently developed molecular systems that could be adequate from an experimental point of view.

  11. Distributed trace using central performance counter memory

    DOE Patents [OSTI]

    Satterfield, David L; Sexton, James C

    2013-10-22T23:59:59.000Z

    A plurality of processing cores, are central storage unit having at least memory connected in a daisy chain manner, forming a daisy chain ring layout on an integrated chip. At least one of the plurality of processing cores places trace data on the daisy chain connection for transmitting the trace data to the central storage unit, and the central storage unit detects the trace data and stores the trace data in the memory co-located in with the central storage unit.

  12. Distributed trace using central performance counter memory

    DOE Patents [OSTI]

    Satterfield, David L.; Sexton, James C.

    2013-01-22T23:59:59.000Z

    A plurality of processing cores, are central storage unit having at least memory connected in a daisy chain manner, forming a daisy chain ring layout on an integrated chip. At least one of the plurality of processing cores places trace data on the daisy chain connection for transmitting the trace data to the central storage unit, and the central storage unit detects the trace data and stores the trace data in the memory co-located in with the central storage unit.

  13. Post polymerization cure shape memory polymers

    SciTech Connect (OSTI)

    Wilson, Thomas S; Hearon, Michael Keith; Bearinger, Jane P

    2014-11-11T23:59:59.000Z

    This invention relates to chemical polymer compositions, methods of synthesis, and fabrication methods for devices regarding polymers capable of displaying shape memory behavior (SMPs) and which can first be polymerized to a linear or branched polymeric structure, having thermoplastic properties, subsequently processed into a device through processes typical of polymer melts, solutions, and dispersions and then crossed linked to a shape memory thermoset polymer retaining the processed shape.

  14. Associative memory in phasing neuron networks

    SciTech Connect (OSTI)

    Nair, Niketh S [ORNL; Bochove, Erik J. [United States Air Force Research Laboratory, Kirtland Air Force Base; Braiman, Yehuda [ORNL

    2014-01-01T23:59:59.000Z

    We studied pattern formation in a network of coupled Hindmarsh-Rose model neurons and introduced a new model for associative memory retrieval using networks of Kuramoto oscillators. Hindmarsh-Rose Neural Networks can exhibit a rich set of collective dynamics that can be controlled by their connectivity. Specifically, we showed an instance of Hebb's rule where spiking was correlated with network topology. Based on this, we presented a simple model of associative memory in coupled phase oscillators.

  15. Theoretical analysis of reflected ray error from surface slope error and their application to the solar concentrated collector

    E-Print Network [OSTI]

    Huang, Weidong

    2011-01-01T23:59:59.000Z

    Surface slope error of concentrator is one of the main factors to influence the performance of the solar concentrated collectors which cause deviation of reflected ray and reduce the intercepted radiation. This paper presents the general equation to calculate the standard deviation of reflected ray error from slope error through geometry optics, applying the equation to calculate the standard deviation of reflected ray error for 5 kinds of solar concentrated reflector, provide typical results. The results indicate that the slope error is transferred to the reflected ray in more than 2 folds when the incidence angle is more than 0. The equation for reflected ray error is generally fit for all reflection surfaces, and can also be applied to control the error in designing an abaxial optical system.

  16. Low latency memory access and synchronization

    DOE Patents [OSTI]

    Blumrich, Matthias A. (Ridgefield, CT); Chen, Dong (Croton On Hudson, NY); Coteus, Paul W. (Yorktown Heights, NY); Gara, Alan G. (Mount Kisco, NY); Giampapa, Mark E. (Irvington, NY); Heidelberger, Philip (Cortlandt Manor, NY); Hoenicke, Dirk (Ossining, NY); Ohmacht, Martin (Brewster, NY); Steinmacher-Burow, Burkhard D. (Mount Kisco, NY); Takken, Todd E. (Mount Kisco, NY), Vranas; Pavlos M. (Bedford Hills, NY)

    2010-10-19T23:59:59.000Z

    A low latency memory system access is provided in association with a weakly-ordered multiprocessor system. Bach processor in the multiprocessor shares resources, and each shared resource has an associated lock within a locking device that provides support for synchronization between the multiple processors in the multiprocessor and the orderly sharing of the resources. A processor only has permission to access a resource when it owns the lock associated with that resource, and an attempt by a processor to own a lock requires only a single load operation, rather than a traditional atomic load followed by store, such that the processor only performs a read operation and the hardware locking device performs a subsequent write operation rather than the processor. A simple prefetching for non-contiguous data structures is also disclosed. A memory line is redefined so that in addition to the normal physical memory data, every line includes a pointer that is large enough to point to any other line in the memory, wherein the pointers to determine which memory line to prefetch rather than some other predictive algorithm. This enables hardware to effectively prefetch memory access patterns that are non-contiguous, but repetitive.

  17. Low latency memory access and synchronization

    DOE Patents [OSTI]

    Blumrich, Matthias A. (Ridgefield, CT); Chen, Dong (Croton On Hudson, NY); Coteus, Paul W. (Yorktown Heights, NY); Gara, Alan G. (Mount Kisco, NY); Giampapa, Mark E. (Irvington, NY); Heidelberger, Philip (Cortlandt Manor, NY); Hoenicke, Dirk (Ossining, NY); Ohmacht, Martin (Brewster, NY); Steinmacher-Burow, Burkhard D. (Mount Kisco, NY); Takken, Todd E. (Mount Kisco, NY); Vranas, Pavlos M. (Bedford Hills, NY)

    2007-02-06T23:59:59.000Z

    A low latency memory system access is provided in association with a weakly-ordered multiprocessor system. Each processor in the multiprocessor shares resources, and each shared resource has an associated lock within a locking device that provides support for synchronization between the multiple processors in the multiprocessor and the orderly sharing of the resources. A processor only has permission to access a resource when it owns the lock associated with that resource, and an attempt by a processor to own a lock requires only a single load operation, rather than a traditional atomic load followed by store, such that the processor only performs a read operation and the hardware locking device performs a subsequent write operation rather than the processor. A simple prefetching for non-contiguous data structures is also disclosed. A memory line is redefined so that in addition to the normal physical memory data, every line includes a pointer that is large enough to point to any other line in the memory, wherein the pointers to determine which memory line to prefetch rather than some other predictive algorithm. This enables hardware to effectively prefetch memory access patterns that are non-contiguous, but repetitive.

  18. LARGE FORCE SHAPE MEMORY ALLOY LINEAR ACTUATOR JOS R. SANTIAGO ANADN

    E-Print Network [OSTI]

    Florida, University of

    LARGE FORCE SHAPE MEMORY ALLOY LINEAR ACTUATOR By JOSÉ R. SANTIAGO ANADÓN A THESIS PRESENTED ............................................................................................................1 Shape Memory Basics........................................................................................... 5 The Shape Memory Effect

  19. Public Key Encryption Which is Simultaneously a Locally-Decodable Error-Correcting Code

    E-Print Network [OSTI]

    that homomorphic encryption implies PIR, we give a general reduction from any semantically-secure homomorphic, this is a protocol that is semantically-secure in the standard sense, but possesses the additional property|) number of bits of the corrupted ciphertext and performing computation polynomial in the security

  20. Shape memory system with integrated actuation using embedded particles

    DOE Patents [OSTI]

    Buckley, Patrick R. (New York, NY); Maitland, Duncan J. (Pleasant Hill, CA)

    2012-05-29T23:59:59.000Z

    A shape memory material with integrated actuation using embedded particles. One embodiment provides a shape memory material apparatus comprising a shape memory material body and magnetic pieces in the shape memory material body. Another embodiment provides a method of actuating a device to perform an activity on a subject comprising the steps of positioning a shape memory material body in a desired position with regard to the subject, the shape memory material body capable of being formed in a specific primary shape, reformed into a secondary stable shape, and controllably actuated to recover the specific primary shape; including pieces in the shape memory material body; and actuating the shape memory material body using the pieces causing the shape memory material body to be controllably actuated to recover the specific primary shape and perform the activity on the subject.

  1. Shape memory system with integrated actuation using embedded particles

    SciTech Connect (OSTI)

    Buckley, Patrick R; Maitland, Duncan J

    2014-04-01T23:59:59.000Z

    A shape memory material with integrated actuation using embedded particles. One embodiment provides a shape memory material apparatus comprising a shape memory material body and magnetic pieces in the shape memory material body. Another embodiment provides a method of actuating a device to perform an activity on a subject comprising the steps of positioning a shape memory material body in a desired position with regard to the subject, the shape memory material body capable of being formed in a specific primary shape, reformed into a secondary stable shape, and controllably actuated to recover the specific primary shape; including pieces in the shape memory material body; and actuating the shape memory material body using the pieces causing the shape memory material body to be controllably actuated to recover the specific primary shape and perform the activity on the subject.

  2. Shape memory system with integrated actuation using embedded particles

    DOE Patents [OSTI]

    Buckley, Patrick R. (New York, NY); Maitland, Duncan J. (Pleasant Hill, CA)

    2009-09-22T23:59:59.000Z

    A shape memory material with integrated actuation using embedded particles. One embodiment provides a shape memory material apparatus comprising a shape memory material body and magnetic pieces in the shape memory material body. Another embodiment provides a method of actuating a device to perform an activity on a subject comprising the steps of positioning a shape memory material body in a desired position with regard to the subject, the shape memory material body capable of being formed in a specific primary shape, reformed into a secondary stable shape, and controllably actuated to recover the specific primary shape; including pieces in the shape memory material body; and actuating the shape memory material body using the pieces causing the shape memory material body to be controllably actuated to recover the specific primary shape and perform the activity on the subject.

  3. Missing working memory deficit in dyslexia: children writing from memory Erlijn van Genuchtena,b

    E-Print Network [OSTI]

    Cheng, Peter

    Missing working memory deficit in dyslexia: children writing from memory Erlijn van Genuchtena,b (e of writing processes of children with dyslexia, in order to examine the relationship between WM and writing. An experiment was used in which children with dyslexia, and chronological age-matched and reading age

  4. Combining Distributed Memory and Shared Memory Parallelization for Data Mining Algorithms

    E-Print Network [OSTI]

    Jin, Ruoming

    Combining Distributed Memory and Shared Memory Parallelization for Data Mining Algorithms Ruoming that are applicable to a number of common data mining algorithms. These techniques are incorpo- rated in a middleware-alone implementations of individual parallel data mining algorithms. Over- all, our work shows that a common framework

  5. Quantum root-mean-square error and measurement uncertainty relations

    E-Print Network [OSTI]

    Paul Busch; Pekka Lahti; Reinhard F Werner

    2014-10-10T23:59:59.000Z

    Recent years have witnessed a controversy over Heisenberg's famous error-disturbance relation. Here we resolve the conflict by way of an analysis of the possible conceptualizations of measurement error and disturbance in quantum mechanics. We discuss two approaches to adapting the classic notion of root-mean-square error to quantum measurements. One is based on the concept of noise operator; its natural operational content is that of a mean deviation of the values of two observables measured jointly, and thus its applicability is limited to cases where such joint measurements are available. The second error measure quantifies the differences between two probability distributions obtained in separate runs of measurements and is of unrestricted applicability. We show that there are no nontrivial unconditional joint-measurement bounds for {\\em state-dependent} errors in the conceptual framework discussed here, while Heisenberg-type measurement uncertainty relations for {\\em state-independent} errors have been proven.

  6. Deterministic treatment of model error in geophysical data assimilation

    E-Print Network [OSTI]

    Carrassi, Alberto

    2015-01-01T23:59:59.000Z

    This chapter describes a novel approach for the treatment of model error in geophysical data assimilation. In this method, model error is treated as a deterministic process fully correlated in time. This allows for the derivation of the evolution equations for the relevant moments of the model error statistics required in data assimilation procedures, along with an approximation suitable for application to large numerical models typical of environmental science. In this contribution we first derive the equations for the model error dynamics in the general case, and then for the particular situation of parametric error. We show how this deterministic description of the model error can be incorporated in sequential and variational data assimilation procedures. A numerical comparison with standard methods is given using low-order dynamical systems, prototypes of atmospheric circulation, and a realistic soil model. The deterministic approach proves to be very competitive with only minor additional computational c...

  7. A two reservoir model of quantum error correction

    E-Print Network [OSTI]

    James P. Clemens; Julio Gea-Banacloche

    2005-08-22T23:59:59.000Z

    We consider a two reservoir model of quantum error correction with a hot bath causing errors in the qubits and a cold bath cooling the ancilla qubits to a fiducial state. We consider error correction protocols both with and without measurement of the ancilla state. The error correction acts as a kind of refrigeration process to maintain the data qubits in a low entropy state by periodically moving the entropy to the ancilla qubits and then to the cold reservoir. We quantify the performance of the error correction as a function of the reservoir temperatures and cooling rate by means of the fidelity and the residual entropy of the data qubits. We also make a comparison with the continuous quantum error correction model of Sarovar and Milburn [Phys. Rev. A 72 012306].

  8. The image cannot be displayed. Your computer may not have enough memory to open the image, or the image may have been corrupted. Restart your computer, and then open the file again. If the red x still appears, you may

    E-Print Network [OSTI]

    Garfunkel, Eric

    and Developmental Biology Cellular and Molecular Pharmacology Biomedical Engineering Exposure Science and Assessment, the single worldwide repository for 3D protein structures. #12;Graduate School of Biomedical Sciences Typical and Development in May 2014 "Coordination of tRNA transcription with export at nuclear pore complexes in budding

  9. Trial application of a technique for human error analysis (ATHEANA)

    SciTech Connect (OSTI)

    Bley, D.C. [Buttonwood Consulting, Inc., Oakton, VA (United States); Cooper, S.E. [Science Applications International Corp., Reston, VA (United States); Parry, G.W. [NUS, Gaithersburg, MD (United States)] [and others

    1996-10-01T23:59:59.000Z

    The new method for HRA, ATHEANA, has been developed based on a study of the operating history of serious accidents and an understanding of the reasons why people make errors. Previous publications associated with the project have dealt with the theoretical framework under which errors occur and the retrospective analysis of operational events. This is the first attempt to use ATHEANA in a prospective way, to select and evaluate human errors within the PSA context.

  10. Temperature-dependent errors in nuclear lattice simulations

    E-Print Network [OSTI]

    Dean Lee; Richard Thomson

    2007-01-17T23:59:59.000Z

    We study the temperature dependence of discretization errors in nuclear lattice simulations. We find that for systems with strong attractive interactions the predominant error arises from the breaking of Galilean invariance. We propose a local "well-tempered" lattice action which eliminates much of this error. The well-tempered action can be readily implemented in lattice simulations for nuclear systems as well as cold atomic Fermi systems.

  11. Error estimates for the Euler discretization of an optimal control ...

    E-Print Network [OSTI]

    Joseph Frédéric Bonnans

    2014-12-10T23:59:59.000Z

    Dec 10, 2014 ... Abstract: We study the error introduced in the solution of an optimal control problem with first order state constraints, for which the trajectories ...

  12. Cosmic Ray Spectral Deformation Caused by Energy Determination Errors

    E-Print Network [OSTI]

    Per Carlson; Conny Wannemark

    2005-05-10T23:59:59.000Z

    Using simulation methods, distortion effects on energy spectra caused by errors in the energy determination have been investigated. For cosmic ray proton spectra, falling steeply with kinetic energy E as E-2.7, significant effects appear. When magnetic spectrometers are used to determine the energy, the relative error increases linearly with the energy and distortions with a sinusoidal form appear starting at an energy that depends significantly on the error distribution but at an energy lower than that corresponding to the Maximum Detectable Rigidity of the spectrometer. The effect should be taken into consideration when comparing data from different experiments, often having different error distributions.

  13. Optimized Learning with Bounded Error for Feedforward Neural Networks

    E-Print Network [OSTI]

    Maggiore, Manfredi

    Optimized Learning with Bounded Error for Feedforward Neural Networks A. Alessandri, M. Sanguineti-based learnings. A. Alessandri is with the Naval Automatio

  14. New Fractional Error Bounds for Polynomial Systems with ...

    E-Print Network [OSTI]

    2014-07-27T23:59:59.000Z

    Our major result extends the existing error bounds from the system involving only a ... linear complementarity systems with polynomial data as well as high-order ...

  15. Identification of toroidal field errors in a modified betatron accelerator

    SciTech Connect (OSTI)

    Loschialpo, P. (Beam Physics Branch, Plasma Physics Division, Naval Research Laboratory, Washington, DC 20375 (United States)); Marsh, S.J. (SFA Inc., Landover, Maryland 20785 (United States)); Len, L.K.; Smith, T. (FM Technologies Inc., 10529-B Braddock Road, Fairfax, Virginia 22032 (United States)); Kapetanakos, C.A. (Beam Physics Branch, Plasma Physics Division, Naval Research Laboratory, Washington, DC 20375 (United States))

    1993-06-01T23:59:59.000Z

    A newly developed probe, having a 0.05% resolution, has been used to detect errors in the toroidal magnetic field of the NRL modified betatron accelerator. Measurements indicate that the radial field components (errors) are 0.1%--1% of the applied toroidal field. Such errors, in the typically 5 kG toroidal field, can excite resonances which drive the beam to the wall. Two sources of detected field errors are discussed. The first is due to the discrete nature of the 12 single turn coils which generate the toroidal field. Both measurements and computer calculations indicate that its amplitude varies from 0% to 0.2% as a function of radius. Displacement of the outer leg of one of the toroidal field coils by a few millimeters has a significant effect on the amplitude of this field error. Because of uniform toroidal periodicity of these coils this error is a good suspect for causing the excitation of the damaging [ital l]=12 resonance seen in our experiments. The other source of field error is due to the current feed gaps in the vertical magnetic field coils. A magnetic field is induced inside the vertical field coils' conductor in the opposite direction of the applied toroidal field. Fringe fields at the gaps lead to additional field errors which have been measured as large as 1.0%. This source of field error, which exists at five toroidal locations around the modified betatron, can excite several integer resonances, including the [ital l]=12 mode.

  16. Homological Error Correction: Classical and Quantum Codes

    E-Print Network [OSTI]

    H. Bombin; M. A. Martin-Delgado

    2006-05-10T23:59:59.000Z

    We prove several theorems characterizing the existence of homological error correction codes both classically and quantumly. Not every classical code is homological, but we find a family of classical homological codes saturating the Hamming bound. In the quantum case, we show that for non-orientable surfaces it is impossible to construct homological codes based on qudits of dimension $D>2$, while for orientable surfaces with boundaries it is possible to construct them for arbitrary dimension $D$. We give a method to obtain planar homological codes based on the construction of quantum codes on compact surfaces without boundaries. We show how the original Shor's 9-qubit code can be visualized as a homological quantum code. We study the problem of constructing quantum codes with optimal encoding rate. In the particular case of toric codes we construct an optimal family and give an explicit proof of its optimality. For homological quantum codes on surfaces of arbitrary genus we also construct a family of codes asymptotically attaining the maximum possible encoding rate. We provide the tools of homology group theory for graphs embedded on surfaces in a self-contained manner.

  17. A technique for human error analysis (ATHEANA)

    SciTech Connect (OSTI)

    Cooper, S.E.; Ramey-Smith, A.M.; Wreathall, J.; Parry, G.W. [and others

    1996-05-01T23:59:59.000Z

    Probabilistic risk assessment (PRA) has become an important tool in the nuclear power industry, both for the Nuclear Regulatory Commission (NRC) and the operating utilities. Human reliability analysis (HRA) is a critical element of PRA; however, limitations in the analysis of human actions in PRAs have long been recognized as a constraint when using PRA. A multidisciplinary HRA framework has been developed with the objective of providing a structured approach for analyzing operating experience and understanding nuclear plant safety, human error, and the underlying factors that affect them. The concepts of the framework have matured into a rudimentary working HRA method. A trial application of the method has demonstrated that it is possible to identify potentially significant human failure events from actual operating experience which are not generally included in current PRAs, as well as to identify associated performance shaping factors and plant conditions that have an observable impact on the frequency of core damage. A general process was developed, albeit in preliminary form, that addresses the iterative steps of defining human failure events and estimating their probabilities using search schemes. Additionally, a knowledge- base was developed which describes the links between performance shaping factors and resulting unsafe actions.

  18. Simulating and Detecting Radiation-Induced Errors for Onboard Machine Learning

    E-Print Network [OSTI]

    Wagstaff, Kiri L.

    (EDAC) codes, which employ a "memory scrubber" process to run continually in the background to correct

  19. 978-3-9810801-8-6/DATE12/2012 EDAA Error Patterns in MLC NAND Flash Memory

    E-Print Network [OSTI]

    -bit multi-level cell (MLC) can only survive for ~3k P/E cycles for 30- 40nm (i.e., 3x-nm) technology patterns. Assuming typical write amplification of 2 times (due to additional writes caused by garbage

  20. Memory device using movement of protons

    DOE Patents [OSTI]

    Warren, William L. (Albuquerque, NM); Vanheusden, Karel J. R. (Albuquerque, NM); Fleetwood, Daniel M. (Albuquerque, NM); Devine, Roderick A. B. (St. Martin le Vinoux, FR)

    1998-01-01T23:59:59.000Z

    An electrically written memory element utilizing the motion of protons within a dielectric layer surrounded by layers on either side to confine the protons within the dielectric layer with electrode means attached to the surrounding layers to change the spatial position of the protons within the dielectric layer. The device is preferably constructed as a silicon-silicon dioxide-silicon layered structure with the protons being introduced to the structure laterally through the exposed edges of the silicon dioxide layer during a high temperature anneal in an atmosphere containing hydrogen gas. The device operates at low power, is preferably nonvolatile, is radiation tolerant, and is compatible with convention silicon MOS processing for integration with other microelectronic elements on the same silicon substrate. With the addition of an optically active layer, the memory element becomes an electrically written, optically read optical memory element.

  1. Memory device using movement of protons

    DOE Patents [OSTI]

    Warren, W.L.; Vanheusden, K.J.R.; Fleetwood, D.M.; Devine, R.A.B.

    1998-11-03T23:59:59.000Z

    An electrically written memory element is disclosed utilizing the motion of protons within a dielectric layer surrounded by layers on either side to confine the protons within the dielectric layer with electrode means attached to the surrounding layers to change the spatial position of the protons within the dielectric layer. The device is preferably constructed as a silicon-silicon dioxide-silicon layered structure with the protons being introduced to the structure laterally through the exposed edges of the silicon dioxide layer during a high temperature anneal in an atmosphere containing hydrogen gas. The device operates at low power, is preferably nonvolatile, is radiation tolerant, and is compatible with convention silicon MOS processing for integration with other microelectronic elements on the same silicon substrate. With the addition of an optically active layer, the memory element becomes an electrically written, optically read optical memory element. 19 figs.

  2. Ni-Mn-Ga shape memory nanoactuation

    SciTech Connect (OSTI)

    Kohl, M., E-mail: manfred.kohl@kit.edu; Schmitt, M.; Krevet, B. [Karlsruhe Institute of Technology, IMT, P.O. Box 3640, 76021 Karlsruhe (Germany); Backen, A.; Schultz, L. [IFW Dresden, P.O. Box 270116, 01171 Dresden (Germany); Fähler, S. [IFW Dresden, P.O. Box 270116, 01171 Dresden (Germany); Technische Universität Chemnitz, Institute of Physics, 09107 Chemnitz (Germany)

    2014-01-27T23:59:59.000Z

    To probe finite size effects in ferromagnetic shape memory nanoactuators, double-beam structures with minimum dimensions down to 100?nm are designed, fabricated, and characterized in-situ in a scanning electron microscope with respect to their coupled thermo-elastic and electro-thermal properties. Electrical resistance and mechanical beam bending tests demonstrate a reversible thermal shape memory effect down to 100?nm. Electro-thermal actuation involves large temperature gradients along the nanobeam in the order of 100?K/?m. We discuss the influence of surface and twin boundary energies and explain why free-standing nanoactuators behave differently compared to constrained geometries like films and nanocrystalline shape memory alloys.

  3. Memory device using movement of protons

    DOE Patents [OSTI]

    Warren, William L. (Albuquerque, NM); Vanheusden, Karel J. R. (Albuquerque, NM); Fleetwood, Daniel M. (Albuquerque, NM); Devine, Roderick A. B. (St. Martin le Vinoux, FR)

    2000-01-01T23:59:59.000Z

    An electrically written memory element utilizing the motion of protons within a dielectric layer surrounded by layers on either side to confine the protons within the dielectric layer with electrode means attached to the surrounding layers to change the spatial position of the protons within the dielectric layer. The device is preferably constructed as a silicon-silicon dioxide-silicon layered structure with the protons being introduced to the structure laterally through the exposed edges of the silicon dioxide layer during a high temperature anneal in an atmosphere containing hydrogen gas. The device operates at low power, is preferably nonvolatile, is radiation tolerant, and is compatible with convention silicon MOS processing for integration with other microelectronic elements on the same silicon substrate. With the addition of an optically active layer, the memory element becomes an electrically written, optically read optical memory element.

  4. Structural Thermomechanical Models for Shape Memory Alloy Components

    E-Print Network [OSTI]

    Rao, Ashwin

    2014-04-18T23:59:59.000Z

    Thermally responsive shape memory alloys (SMA) demonstrate interesting properties like shape memory effect (SME) and superelasticity (SE). SMA components in the form of wires, springs and beams typically exhibit complex, nonlinear hysteretic...

  5. Early remodeling of the neocortex upon episodic memory encoding

    E-Print Network [OSTI]

    Ericsson, M.

    Understanding the mechanisms by which long-term memories are formed and stored in the brain represents a central aim of neuroscience. Prevailing theory suggests that long-term memory encoding involves early plasticity ...

  6. Intellectual property strategy : analysis of the flash memory industry

    E-Print Network [OSTI]

    Ogura, Tomoko H

    2006-01-01T23:59:59.000Z

    This thesis studies the intellectual property strategy of companies in the flash memory industry, with special emphasis on technology and the development of nitride-based flash, a new and emerging type of memory technology. ...

  7. Main Memory Management for Persistence Antony L. Hosking

    E-Print Network [OSTI]

    Hosking, Antony

    Reachability-based persistence imposes new requirements for main memory management in general, and garbage col memory heap. However, objects may survive from one run of a program to the next, by virtue of being

  8. Linking dopaminergic physiology to working memory related neural circuitry

    E-Print Network [OSTI]

    Bolton, Andrew D. (Andrew Donald)

    2014-01-01T23:59:59.000Z

    Working memory is the ability to hold information "online" over a delay in order to perform a task. This kind of memory is thought to be encoded in the brain by persistent neural activity that outlasts the presentation of ...

  9. Reversible neural inactivation reveals hippocampal particin several memory processesipation 

    E-Print Network [OSTI]

    Riedel, G; Micheau, J; Lam, A G M; Roloff, E.v.L.; Martin, Stephen J; Bridge, H; de Hoz, L; Poeschel, B; McCulloch, J; Morris, Richard G M

    Studies of patients and animals with brain lesions have implicated the hippocampal formation in spatial, declarative/relational and episodic types of memory. These and other types of memory consist of a series of ...

  10. Development of Superelastic Effects in Ferrous Shape Memory Alloy

    E-Print Network [OSTI]

    Olson, Scott Michael

    SE: Superelastic effect SME: Shape memory effect Nitinol:shape memory effect, (SME), whereby the material returns toelastic strain. In SMAs, the SME and SE are based on the

  11. Curating Memory: 9/11 Commemoration and Foucault's Archive 

    E-Print Network [OSTI]

    Rowe, Sara 1988-

    2012-08-17T23:59:59.000Z

    This study of commemoration of 9/11 on the 10th anniversary is performed at the intersection of public memory and rhetorical studies. Examining the role of the individual within public memory, this study furthers both ...

  12. Good Programming in Transactional Memory$ Game Theory Meets Multicore Architecture

    E-Print Network [OSTI]

    Good Programming in Transactional Memory$ Game Theory Meets Multicore Architecture Raphael compatible. Keywords: transactional memory, game theory, multicore architecture, concurrency, contention management, mechanism design, human factors 1. Introduction In traditional single core architecture

  13. Method for refreshing a non-volatile memory

    SciTech Connect (OSTI)

    Riekels, James E. (New Hope, MN); Schlesinger, Samuel (Aventura, FL)

    2008-11-04T23:59:59.000Z

    A non-volatile memory and a method of refreshing a memory are described. The method includes allowing an external system to control refreshing operations within the memory. The memory may generate a refresh request signal and transmit the refresh request signal to the external system. When the external system finds an available time to process the refresh request, the external system acknowledges the refresh request and transmits a refresh acknowledge signal to the memory. The memory may also comprise a page register for reading and rewriting a data state back to the memory. The page register may comprise latches in lieu of supplemental non-volatile storage elements, thereby conserving real estate within the memory.

  14. ERROR VISUALIZATION FOR TANDEM ACOUSTIC MODELING ON THE AURORA TASK

    E-Print Network [OSTI]

    Ellis, Dan

    ERROR VISUALIZATION FOR TANDEM ACOUSTIC MODELING ON THE AURORA TASK Manuel J. Reyes. This structure reduces the error rate on the Aurora 2 noisy English digits task by more than 50% compared development of tandem systems showed an improvement in the performance on the Aurora task [2] of these systems

  15. Numerical Construction of Likelihood Distributions and the Propagation of Errors

    E-Print Network [OSTI]

    J. Swain; L. Taylor

    1997-12-12T23:59:59.000Z

    The standard method for the propagation of errors, based on a Taylor series expansion, is approximate and frequently inadequate for realistic problems. A simple and generic technique is described in which the likelihood is constructed numerically, thereby greatly facilitating the propagation of errors.

  16. Calibration and Error in Placental Molecular Clocks: A Conservative

    E-Print Network [OSTI]

    Hadly, Elizabeth

    Calibration and Error in Placental Molecular Clocks: A Conservative Approach Using for calibrating both mitogenomic and nucleogenomic placental timescales. We applied these reestimates to the most calibration error may inflate the power of the molecular clock when testing the time of ordinal

  17. Error Control of Iterative Linear Solvers for Integrated Groundwater Models

    E-Print Network [OSTI]

    Bai, Zhaojun

    gradient method or Generalized Minimum RESidual (GMRES) method, is how to choose the residual tolerance for integrated groundwater models, which are implicitly coupled to another model, such as surface water models the correspondence between the residual error in the preconditioned linear system and the solution error. Using

  18. PROPAGATION OF ERRORS IN SPATIAL ANALYSIS Peter P. Siska

    E-Print Network [OSTI]

    Hung, I-Kuai

    , the conversion of data from analog to digital form used to be an extremely time-consuming process. At present process then the resulting error is inflated up to 20 percent for each grid cell of the final map. The magnitude of errors naturally increases with an addition of every new layer entering the overlay process

  19. Error detection through consistency checking Peng Gong* Lan Mu#

    E-Print Network [OSTI]

    Silver, Whendee

    Error detection through consistency checking Peng Gong* Lan Mu# *Center for Assessment & Monitoring Hall, University of California, Berkeley, Berkeley, CA 94720-3110 gong@nature.berkeley.edu mulan, accessibility, and timeliness as recorded in the lineage data (Chen and Gong, 1998). Spatial error refers

  20. Mutual information, bit error rate and security in Wójcik's scheme

    E-Print Network [OSTI]

    Zhanjun Zhang

    2004-02-21T23:59:59.000Z

    In this paper the correct calculations of the mutual information of the whole transmission, the quantum bit error rate (QBER) are presented. Mistakes of the general conclusions relative to the mutual information, the quantum bit error rate (QBER) and the security in W\\'{o}jcik's paper [Phys. Rev. Lett. {\\bf 90}, 157901(2003)] have been pointed out.

  1. Uniform and optimal error estimates of an exponential wave ...

    E-Print Network [OSTI]

    2014-05-01T23:59:59.000Z

    of the error propagation, cut-off of the nonlinearity, and the energy method. ...... gives Lemma 3.4 for the local truncation error, which is of spectral order in ... estimates, we adopt a strategy similar to the finite difference method [4] (cf. diagram.

  2. Quasi-sparse eigenvector diagonalization and stochastic error correction

    E-Print Network [OSTI]

    Dean Lee

    2000-08-30T23:59:59.000Z

    We briefly review the diagonalization of quantum Hamiltonians using the quasi-sparse eigenvector (QSE) method. We also introduce the technique of stochastic error correction, which systematically removes the truncation error of the QSE result by stochastically sampling the contribution of the remaining basis states.

  3. Mining API Error-Handling Specifications from Source Code

    E-Print Network [OSTI]

    Xie, Tao

    Mining API Error-Handling Specifications from Source Code Mithun Acharya and Tao Xie Department it difficult to mine error-handling specifications through manual inspection of source code. In this paper, we, without any user in- put. In our framework, we adapt a trace generation technique to distinguish

  4. Entanglement and Quantum Error Correction with Superconducting Qubits

    E-Print Network [OSTI]

    Entanglement and Quantum Error Correction with Superconducting Qubits A Dissertation Presented David Reed All rights reserved. #12;Entanglement and Quantum Error Correction with Superconducting is to use superconducting quantum bits in the circuit quantum electro- dynamics (cQED) architecture. There

  5. ARTIFICIAL INTELLIGENCE 223 A Geometric Approach to Error

    E-Print Network [OSTI]

    Richardson, David

    may not even exist. For this reason we investigate error detection and recovery (EDR) strategies. We may not even exist. For this reason we investigate error detection and recovery (EDR ) strategies. We and implementational questions remain. The second contribution is a formal, geometric approach to EDR. While EDR

  6. Upper bounds on the error probabilities and asymptotic error exponents in quantum multiple state discrimination

    SciTech Connect (OSTI)

    Audenaert, Koenraad M. R., E-mail: koenraad.audenaert@rhul.ac.uk [Department of Mathematics, Royal Holloway University of London, Egham TW20 0EX (United Kingdom); Department of Physics and Astronomy, University of Ghent, S9, Krijgslaan 281, B-9000 Ghent (Belgium); Mosonyi, Milán, E-mail: milan.mosonyi@gmail.com [Física Teòrica: Informació i Fenomens Quàntics, Universitat Autònoma de Barcelona, ES-08193 Bellaterra, Barcelona (Spain); Mathematical Institute, Budapest University of Technology and Economics, Egry József u 1., Budapest 1111 (Hungary)

    2014-10-15T23:59:59.000Z

    We consider the multiple hypothesis testing problem for symmetric quantum state discrimination between r given states ?{sub 1}, …, ?{sub r}. By splitting up the overall test into multiple binary tests in various ways we obtain a number of upper bounds on the optimal error probability in terms of the binary error probabilities. These upper bounds allow us to deduce various bounds on the asymptotic error rate, for which it has been hypothesized that it is given by the multi-hypothesis quantum Chernoff bound (or Chernoff divergence) C(?{sub 1}, …, ?{sub r}), as recently introduced by Nussbaum and Szko?a in analogy with Salikhov's classical multi-hypothesis Chernoff bound. This quantity is defined as the minimum of the pairwise binary Chernoff divergences min{sub j

  7. Paging memory from random access memory to backing storage in a parallel computer

    DOE Patents [OSTI]

    Archer, Charles J; Blocksome, Michael A; Inglett, Todd A; Ratterman, Joseph D; Smith, Brian E

    2013-05-21T23:59:59.000Z

    Paging memory from random access memory (`RAM`) to backing storage in a parallel computer that includes a plurality of compute nodes, including: executing a data processing application on a virtual machine operating system in a virtual machine on a first compute node; providing, by a second compute node, backing storage for the contents of RAM on the first compute node; and swapping, by the virtual machine operating system in the virtual machine on the first compute node, a page of memory from RAM on the first compute node to the backing storage on the second compute node.

  8. Life-cycle assessment of NAND flash memory

    E-Print Network [OSTI]

    Boyd, Sarah; Horvath, A; Dornfeld, David

    2010-01-01T23:59:59.000Z

    global warming potential (GWP) of ?ash memory are abatement of per?uorinated compounds (PFCs) and reduction of electricity-

  9. Making Memorial Day Plans? Be Sure They're Efficient

    Broader source: Energy.gov [DOE]

    Useful tips from Energy Savers - from cooking, to entertaining, to driving - how to stay energy efficient this Memorial Day weekend.

  10. Development of Superelastic Effects in Ferrous Shape Memory Alloy

    E-Print Network [OSTI]

    Olson, Scott Michael

    titanium shape memory alloy SIM: Stress-induced martensite LOM: Light optical microscopy SEM: Scanning electron microscope EDS: Energy

  11. Shape memory and pseudoelasticity in metal nanowires.

    SciTech Connect (OSTI)

    Zimmerman, Jonathan A.; Park, Harold S.; Gall, Ken

    2005-07-01T23:59:59.000Z

    Structural reorientations in metallic fcc nanowires are controlled by a combination of size, thermal energy, and the type of defects formed during inelastic deformation. By utilizing atomistic simulations, we show that certain fcc nanowires can exhibit both shape memory and pseudoelastic behavior. We also show that the formation of defect-free twins, a process related to the material stacking fault energy, nanometer size scale, and surface stresses is the mechanism that controls the ability of fcc nanowires of different materials to show a reversible transition between two crystal orientations during loading and thus shape memory and pseudoelasticity.

  12. Circular polarization memory in polydisperse scattering media

    E-Print Network [OSTI]

    Macdonald, Callum M; Meglinski, Igor

    2015-01-01T23:59:59.000Z

    We investigate the survival of circularly polarized light in random scattering media. The surprising persistence of this form of polarization has a known dependence on the size and refractive index of scattering particles, however a general description regarding polydisperse media is lacking. Through analysis of Mie theory, we present a means of calculating the magnitude of circular polarization memory in complex media, with total generality in the distribution of particle sizes and refractive indices. Quantification of this memory effect enables an alternate pathway towards recovering particle size distribution, based on measurements of diffusing circularly polarized light.

  13. An Efficient Approach towards Mitigating Soft Errors Risks

    E-Print Network [OSTI]

    Sadi, Muhammad Sheikh; Uddin, Md Nazim; Jürjens, Jan

    2011-01-01T23:59:59.000Z

    Smaller feature size, higher clock frequency and lower power consumption are of core concerns of today's nano-technology, which has been resulted by continuous downscaling of CMOS technologies. The resultant 'device shrinking' reduces the soft error tolerance of the VLSI circuits, as very little energy is needed to change their states. Safety critical systems are very sensitive to soft errors. A bit flip due to soft error can change the value of critical variable and consequently the system control flow can completely be changed which leads to system failure. To minimize soft error risks, a novel methodology is proposed to detect and recover from soft errors considering only 'critical code blocks' and 'critical variables' rather than considering all variables and/or blocks in the whole program. The proposed method shortens space and time overhead in comparison to existing dominant approaches.

  14. Shape memory behavior of ultrafine grained NiTi and TiNiPd shape memory alloys

    E-Print Network [OSTI]

    Kockar, Benat

    2009-05-15T23:59:59.000Z

    The cyclic instability in shape memory characteristics of NiTi-based shape memory alloys (SMAs), such as transformation temperatures, transformation and irrecoverable strains and transformation hysteresis upon thermal and mechanical cycling limits...

  15. The nature of the working memory system underlying language processing and its relationship to the long-term memory system

    E-Print Network [OSTI]

    Fedorenko, Evelina Georgievna

    2007-01-01T23:59:59.000Z

    This thesis examines two questions concerning the working memory system underlying language processing: (1) To what extent is the working memory system underlying language processing domain-specific? and (2) What is the ...

  16. Evaluating Memory Energy Efficiency in Parallel I/O Workloads

    E-Print Network [OSTI]

    Zhu, Yifeng

    Evaluating Memory Energy Efficiency in Parallel I/O Workloads Jianhui Yue,Yifeng Zhu , Zhao Cai the ever- widening gap between disk and processor speeds, memory energy efficiency becomes an increasingly management policies heavily influence the overall memory energy efficiency. In partic- ular, under the same

  17. Reinforcement Learning for Active Length Control of Shape Memory Alloys

    E-Print Network [OSTI]

    Valasek, John

    Reinforcement Learning for Active Length Control of Shape Memory Alloys Kenton Kirkpatrick John Valasek Aerospace Engineering Department Texas A&M University AIAA GNC Conference 21 August 2008 Honolulu;Kirkpatrick & Valasek - 5 Shape Memory Alloys (SMA) Metallic Alloys used as actuators Shape Memory Effect

  18. An Instance Theory of Attention and Memory Gordon D. Logan

    E-Print Network [OSTI]

    Logan, Gordon D.

    of attention and memory (ITAM) is presented that integrates formal theories of attention and memory phenomena; objects are categorized by attending to them. ITAM incorporates each of its ancestors as a special case of this heritage, I call the new theory the instance theory of attention and memory (ITAM). Its ancestors on each

  19. Using Multilevel Phase Change Memory to Build Data Storage: A

    E-Print Network [OSTI]

    Zhang, Tong

    cache. It is well known that phase-change material resistance drift gradually reduces memory deviceUsing Multilevel Phase Change Memory to Build Data Storage: A Time-Aware System Design Perspective per cell (MLC) phase-change memory (PCM) in data storage systems such as solid-state disk and disk

  20. Phase Change Memory An Architecture and Systems Perspective

    E-Print Network [OSTI]

    Lee, Benjamin C.

    #12;Phase Change Memory Store data within phase change material [Ovshinsky68] Set phase via currentPhase Change Memory An Architecture and Systems Perspective Benjamin Lee Computer Architecture lifetime 1 B.Lee et al. "Architecting phase change memory as a scalable DRAM alternative." ISCA-36

  1. Coding-based Energy Minimization for Phase Change Memory

    E-Print Network [OSTI]

    -1-4503-1199-1/12/06 ...$10.00. states of the phase-change material. In one state, the ma- terial is amorphous with a highCoding-based Energy Minimization for Phase Change Memory Azalia Mirhoseini Electrical and Computer Phase Change Memory write energy. Our method minimizes the energy required for memory rewrites

  2. Guide wire extension for shape memory polymer occlusion removal devices

    DOE Patents [OSTI]

    Maitland, Duncan J. (Pleasant Hill, CA); Small, IV, Ward (Livermore, CA); Hartman, Jonathan (Sacramento, CA)

    2009-11-03T23:59:59.000Z

    A flexible extension for a shape memory polymer occlusion removal device. A shape memory polymer instrument is transported through a vessel via a catheter. A flexible elongated unit is operatively connected to the distal end of the shape memory polymer instrument to enhance maneuverability through tortuous paths en route to the occlusion.

  3. Design of Innovative Thermoset Shape Memory Polyurethanes (SMPUs)

    E-Print Network [OSTI]

    Dalang, Robert C.

    Design of Innovative Thermoset Shape Memory Polyurethanes (SMPUs) Author: Yaobo Ding Supervisor, École Polytechnique Fédérale de Lausanne Email: yaobo.ding@epfl.ch Motivation Shape memory polymers-based shape memory polymers, and microfludic devices is one of them. Low cost SMPUs for microfluidics

  4. Shape Memory Polymer Patrick T. Mather,1,2

    E-Print Network [OSTI]

    Mather, Patrick T.

    Shape Memory Polymer Research Patrick T. Mather,1,2 Xiaofan Luo,1,2 and Ingrid A. Rousseau3 1-145419 Copyright c 2009 by Annual Reviews. All rights reserved 1531-7331/09/0804-0445$20.00 Key Words shape memory witnessed significant advances in the field of shape memory polymers (SMPs) with the elucidation of new

  5. Introduction Nickel Titanium exhibits shape-memory or

    E-Print Network [OSTI]

    Dalang, Robert C.

    Introduction Nickel Titanium exhibits shape-memory or superelastic effect coupled with good of the implant. Figure 1: (a) Shape-memory effect. (b) Superelastic effect Processing and Characterization of NiTi Shape-Memory Alloys with 3D Interconnected Porosity Antoine Emery Supervisors: Prof. A. Mortensen (EPFL

  6. Shape Memory Assisted Self-Healing Coating Xiaofan Luo

    E-Print Network [OSTI]

    Mather, Patrick T.

    Shape Memory Assisted Self-Healing Coating Xiaofan Luo and Patrick T. Mather* Department and characterization of new shape memory assisted self- healing (SMASH) coatings. The coatings feature a phase in a shape memory epoxy matrix. Mechanical damage to the coating can be self-healed via heating, which

  7. Toward Evaluation of Shape Memory Alloy Actuators for Endosurgery

    E-Print Network [OSTI]

    Toward Evaluation of Shape Memory Alloy Actuators for Endosurgery Kaari Koehn and Shahram Payandeh the movements of MIS tools. One such altemative could be the e:lectromechanical shape memory alloy actuators as in teleoperation. Nickel-Titanium (NiTi)alloy is a commerciallyavailable member of the family of Shape Memory

  8. Dynamic Buckling and Recovery of Thin Cylindrical Shape Memory Shells

    E-Print Network [OSTI]

    Nemat-Nasser, Sia

    Dynamic Buckling and Recovery of Thin Cylindrical Shape Memory Shells Mahmoud Reza Amini and Sia@ucsd.edu Phone: (858) 534-6525 FAX: (858) 534-2727 Abstract Shape-memory alloys can sustain relatively large consisting of shape-memory alloys in order to understand the response when used as the core of the sandwich

  9. Shape memory and nanostructure in poly(norbornyl-POSS) copolymers

    E-Print Network [OSTI]

    Mather, Patrick T.

    Shape memory and nanostructure in poly(norbornyl-POSS) copolymers HG Jeon,1 * PT Mather2 and TS Blvd., Edwards AFB, CA 93524­7680, USA Abstract: The microstructure and shape-memory properties by rapid quenching in LN2. Shape-memory properties of such drawn samples were explored by measuring

  10. A shape memory-based multifunctional structural actuator panel

    E-Print Network [OSTI]

    Wadley, Haydn

    A shape memory-based multifunctional structural actuator panel Dana M. Elzey *, Aarash Y.N. Sofla significant load. The shape change is effected by shape memory alloy face sheet elements, which exploit a ``one-way'' shape memory effect only. Unlike other related designs, no external or bias forces

  11. Characterization of Shape Memory Alloys Using Artificial Neural Networks

    E-Print Network [OSTI]

    Valasek, John

    Characterization of Shape Memory Alloys Using Artificial Neural Networks James V. Henrickson , Kenton Kirkpatrick, and John Valasek Texas A&M University, College Station, Texas 77843-3141 Shape memory of shape memory alloys, however, is often com- plicated by their hysteretic, non-linear, thermo

  12. Combining Pattern Instability and Shape-Memory Hysteresis for Phononic

    E-Print Network [OSTI]

    Combining Pattern Instability and Shape-Memory Hysteresis for Phononic Switching Ji-Hyun Jang Received April 10, 2009 ABSTRACT We report a fully reversible and robust shape-memory effect in a two simulations correctly capture the three steps of the shape-memory cycle observed experimentally. Structures

  13. On the thermomechanical deformation of silver shape memory nanowires

    E-Print Network [OSTI]

    Lin, Xi

    On the thermomechanical deformation of silver shape memory nanowires Harold S. Park *, Changjiang an analysis of the uniaxial thermomechanical deformation of single-crystal silver shape memory nanowires using atomistic simulations. We first demonstrate that silver nanowires can show both shape memory

  14. Model-Free Control of Shape Memory Alloys Antagonistic Actuators

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    Model-Free Control of Shape Memory Alloys Antagonistic Actuators Pierre-Antoine G´edouin , C with a first application of the new framework of model-free control to the promising technology of shape memory alloys actuators. In particular antagonistic shape memory alloys actuator. These devices are known

  15. Direct match data flow memory for data driven computing

    DOE Patents [OSTI]

    Davidson, George S. (8516 San Francisco NE., Albuquerque, NM 87109); Grafe, Victor Gerald (1909 Saturn Ct. NE., Albuquerque, NM 87112)

    1997-01-01T23:59:59.000Z

    A data flow computer and method of computing is disclosed which utilizes a data driven processor node architecture. The apparatus in a preferred embodiment includes a plurality of First-In-First-Out (FIFO) registers, a plurality of related data flow memories, and a processor. The processor makes the necessary calculations and includes a control unit to generate signals to enable the appropriate FIFO register receiving the result. In a particular embodiment, there are three FIFO registers per node: an input FIFO register to receive input information form an outside source and provide it to the data flow memories; an output FIFO register to provide output information from the processor to an outside recipient; and an internal FIFO register to provide information from the processor back to the data flow memories. The data flow memories are comprised of four commonly addressed memories. A parameter memory holds the A and B parameters used in the calculations; an opcode memory holds the instruction; a target memory holds the output address; and a tag memory contains status bits for each parameter. One status bit indicates whether the corresponding parameter is in the parameter memory and one status bit to indicate whether the stored information in the corresponding data parameter is to be reused. The tag memory outputs a "fire" signal (signal R VALID) when all of the necessary information has been stored in the data flow memories, and thus when the instruction is ready to be fired to the processor.

  16. Direct match data flow memory for data driven computing

    DOE Patents [OSTI]

    Davidson, G.S.; Grafe, V.G.

    1997-10-07T23:59:59.000Z

    A data flow computer and method of computing is disclosed which utilizes a data driven processor node architecture. The apparatus in a preferred embodiment includes a plurality of First-In-First-Out (FIFO) registers, a plurality of related data flow memories, and a processor. The processor makes the necessary calculations and includes a control unit to generate signals to enable the appropriate FIFO register receiving the result. In a particular embodiment, there are three FIFO registers per node: an input FIFO register to receive input information form an outside source and provide it to the data flow memories; an output FIFO register to provide output information from the processor to an outside recipient; and an internal FIFO register to provide information from the processor back to the data flow memories. The data flow memories are comprised of four commonly addressed memories. A parameter memory holds the A and B parameters used in the calculations; an opcode memory holds the instruction; a target memory holds the output address; and a tag memory contains status bits for each parameter. One status bit indicates whether the corresponding parameter is in the parameter memory and one status bit to indicate whether the stored information in the corresponding data parameter is to be reused. The tag memory outputs a ``fire`` signal (signal R VALID) when all of the necessary information has been stored in the data flow memories, and thus when the instruction is ready to be fired to the processor. 11 figs.

  17. Behavioral/Systems/Cognitive Consolidation Patterns of Human Motor Memory

    E-Print Network [OSTI]

    Shadmehr, Reza

    Behavioral/Systems/Cognitive Consolidation Patterns of Human Motor Memory Sarah E. Criscimagna-Hemminger and Reza Shadmehr Laboratory for Computational Motor Control, Department of Biomedical Engineering, Johns of acquiring a new memory that competes with the old, effectively masking it? We considered motor memories

  18. An implementation of SISAL for distributed-memory architectures

    SciTech Connect (OSTI)

    Beard, P.C.

    1995-06-01T23:59:59.000Z

    This thesis describes a new implementation of the implicitly parallel functional programming language SISAL, for massively parallel processor supercomputers. The Optimizing SISAL Compiler (OSC), developed at Lawrence Livermore National Laboratory, was originally designed for shared-memory multiprocessor machines and has been adapted to distributed-memory architectures. OSC has been relatively portable between shared-memory architectures, because they are architecturally similar, and OSC generates portable C code. However, distributed-memory architectures are not standardized -- each has a different programming model. Distributed-memory SISAL depends on a layer of software that provides a portable, distributed, shared-memory abstraction. This layer is provided by Split-C, a dialect of the C programming language developed at U.C. Berkeley, which has demonstrated good performance on distributed-memory architectures. Split-C provides important capabilities for good performance: support for program-specific distributed data structures, and split-phase memory operations. Distributed data structures help achieve good memory locality, while split-phase memory operations help tolerate the longer communication latencies inherent in distributed-memory architectures. The distributed-memory SISAL compiler and run-time system takes advantage of these capabilities. The results of these efforts is a compiler that runs identically on the Thinking Machines Connection Machine (CM-5), and the Meiko Computing Surface (CS-2).

  19. SECURITY REFRESH: PROTECTING PHASE-CHANGE MEMORY AGAINST

    E-Print Network [OSTI]

    Lee, Hsien-Hsin "Sean"

    SOFTWARE. ......Given the grim prospect of technology scaling in flash memories and dynamic RAM (DRAM), designers are seeking alternative memory technologies to continue the prophecy of Moore's law for memories device totally useless in a matter of minutes because it has a faster ac- cess speed than flash

  20. Energy Efficient Proactive Thermal Management in Memory Subsystem

    E-Print Network [OSTI]

    Simunic, Tajana

    Energy Efficient Proactive Thermal Management in Memory Subsystem Raid Ayoub rayoub management of memory subsystem is challenging due to performance and thermal constraints. Big energy gains appreciable energy savings in memory sub-system and mini- mize thermal problems. We adopt the consolidation

  1. GENETIC HEURISTICS FOR REDUCING MEMORY ENERGY CONSUMPTION IN EMBEDDED SYSTEMS

    E-Print Network [OSTI]

    Schott, René - Institut de Mathématiques Élie Cartan, Université Henri Poincaré

    GENETIC HEURISTICS FOR REDUCING MEMORY ENERGY CONSUMPTION IN EMBEDDED SYSTEMS Maha IDRISSI AOUAD.loria.fr/zendra Keywords: Energy consumption reduction, Genetic heuristics, memory allocation management, optimizations on heuristic methods for SPMs careful management in order to reduce memory energy consumption. We propose

  2. Teuchos C++ memory management classes, idioms, and related topics, the complete reference : a comprehensive strategy for safe and efficient memory management in C++ for high performance computing.

    SciTech Connect (OSTI)

    Bartlett, Roscoe Ainsworth

    2010-05-01T23:59:59.000Z

    The ubiquitous use of raw pointers in higher-level code is the primary cause of all memory usage problems and memory leaks in C++ programs. This paper describes what might be considered a radical approach to the problem which is to encapsulate the use of all raw pointers and all raw calls to new and delete in higher-level C++ code. Instead, a set of cooperating template classes developed in the Trilinos package Teuchos are used to encapsulate every use of raw C++ pointers in every use case where it appears in high-level code. Included in the set of memory management classes is the typical reference-counted smart pointer class similar to boost::shared ptr (and therefore C++0x std::shared ptr). However, what is missing in boost and the new standard library are non-reference counted classes for remaining use cases where raw C++ pointers would need to be used. These classes have a debug build mode where nearly all programmer errors are caught and gracefully reported at runtime. The default optimized build mode strips all runtime checks and allows the code to perform as efficiently as raw C++ pointers with reasonable usage. Also included is a novel approach for dealing with the circular references problem that imparts little extra overhead and is almost completely invisible to most of the code (unlike the boost and therefore C++0x approach). Rather than being a radical approach, encapsulating all raw C++ pointers is simply the logical progression of a trend in the C++ development and standards community that started with std::auto ptr and is continued (but not finished) with std::shared ptr in C++0x. Using the Teuchos reference-counted memory management classes allows one to remove unnecessary constraints in the use of objects by removing arbitrary lifetime ordering constraints which are a type of unnecessary coupling [23]. The code one writes with these classes will be more likely to be correct on first writing, will be less likely to contain silent (but deadly) memory usage errors, and will be much more robust to later refactoring and maintenance. The level of debug-mode runtime checking provided by the Teuchos memory management classes is stronger in many respects than what is provided by memory checking tools like Valgrind and Purify while being much less expensive. However, tools like Valgrind and Purify perform a number of types of checks (like usage of uninitialized memory) that makes these tools very valuable and therefore complement the Teuchos memory management debug-mode runtime checking. The Teuchos memory management classes and idioms largely address the technical issues in resolving the fragile built-in C++ memory management model (with the exception of circular references which has no easy solution but can be managed as discussed). All that remains is to teach these classes and idioms and expand their usage in C++ codes. The long-term viability of C++ as a usable and productive language depends on it. Otherwise, if C++ is no safer than C, then is the greater complexity of C++ worth what one gets as extra features? Given that C is smaller and easier to learn than C++ and since most programmers don't know object-orientation (or templates or X, Y, and Z features of C++) all that well anyway, then what really are most programmers getting extra out of C++ that would outweigh the extra complexity of C++ over C? C++ zealots will argue this point but the reality is that C++ popularity has peaked and is becoming less popular while the popularity of C has remained fairly stable over the last decade22. Idioms like are advocated in this paper can help to avert this trend but it will require wide community buy-in and a change in the way C++ is taught in order to have the greatest impact. To make these programs more secure, compiler vendors or static analysis tools (e.g. klocwork23) could implement a preprocessor-like language similar to OpenMP24 that would allow the programmer to declare (in comments) that certain blocks of code should be ''pointer-free'' or allow smaller blocks to be 'pointers allowed'. This would signific

  3. Exploring Phase Change Memory and 3D Die-Stacking for Power/Thermal Friendly, Fast and Durable Memory Architectures

    E-Print Network [OSTI]

    Kavi, Krishna

    Exploring Phase Change Memory and 3D Die-Stacking for Power/Thermal Friendly, Fast and Durable) as a promising candidate to achieve scalable, low power and thermal friendly memory system architecture leakages and retention time. DRAM-based main memory is also consuming an increasing proportion of the power

  4. Protist Web Alert Memories of Times Past

    E-Print Network [OSTI]

    Simpson, Larry

    Protist Web Alert Memories of Times Past The Euglenoid Project (http that the Euglenoids have always fascinated me and so did this site. Micro*scope Astrobiology Institute Web Site from reviewed this site in a previous Web Alert, but it has been revised and updated and so is worth another

  5. Characterizing Flash Memory: Anomalies, Observations, and Applications

    E-Print Network [OSTI]

    Wang, Deli

    ), and reliability of flash memory. In addition, we must understand how different usage patterns affect char- acteristics and show how we can use them to improve responsive- ness and energy consumption begun to make the transi- tion from embedded devices to laptops, desktops, and data cen- ters

  6. Rewritable Memory by Controllable Nanopatterning of DNA

    E-Print Network [OSTI]

    Pierce, Niles A.

    ABSTRACT Fabricating a nanostructure capable of reversibly patterning molecules is a fundamental goal within nanotechnology, underlying diverse processes such as information storage, scaffold functioning of the device as rewritable memory. The bit state of each address is controlled by specific DNA

  7. Memorial University of Newfoundland Diving Safety

    E-Print Network [OSTI]

    deYoung, Brad

    .2 Maintenance and Inspections 17 9.3 Use of Diving Equipment 17 9.4 Equipment Procedures 18 9.5 Inspection PROCEDURES 20 12.1 Planning of Diving Operations 21 12.2 Adherence to Planned Depth Procedures 21 12 safety manual is designed to provide Memorial University scientific divers with standards and procedures

  8. Dahlia Greidinger Memorial Symposium Department of Environmental,

    E-Print Network [OSTI]

    and Agricultural Engineering Organized and supported by: The Dahlia Greidinger Memorial Fund and BARD, The United dynamics and reaction mechanisms, particularly those of nitrogen and phosphorus in crop/food production systems, with special emphasis on interactions with organic loads/wastes and under possible global changes

  9. Finding Memory Leaks in Java with JDeveloper

    E-Print Network [OSTI]

    Livshits, Ben

    believe, Java's garbage collector does not solve all me- mory problems that might occur in practice feature of memory management in Java is its garbage-collected heap. A typical garbage collector that comes all objects reach- able from a set of roots. These reachable objects survive collections because

  10. 11. Memory Limitations in Artificial Intelligence

    E-Print Network [OSTI]

    [424], take the oldest known scien- tific treatise surviving from the ancient world, the surgical confronted to AI for many years. As an example, take the garbage collector problem. Min- sky [551] proposes the first copying garbage collector for LISP; an algorithm using serial secondary memory. The live data

  11. Memory in the system: trajectory-environment

    E-Print Network [OSTI]

    Maxim Budaev

    2007-08-10T23:59:59.000Z

    In the paper the memory effect in the system consisting from a trajectory of process and an environment is considered. The environment is presented by scalar potential and noise. The evolution of system is interpreted as process of the continuous "measurement" of a trajectory by an environment and\\or on the contrary. In this sense the measured value is entropy-the information about embedding of the trajectory into configurations space. The concepts "measurement" and "interaction" are identified alike in quantum theory. Thus, the entropy evolution is not only the effect of dynamics, but also its cause, if it is possible to speak about causality in this case. It is shown, that such non-elastic interaction leads to occurrence of memory in the system. The reflex memory mechanism is realized as a real conformal dynamic metrics. The metastable event (attractor) is defined and time of its life is estimated. It is shown, that in the system there is a change of dynamic modes from spatial localization to random walk (fluctuation, relaxation). On scale of the attractors dynamics the memory is appearing as a semi-regular (in some information sense) drift of the image of fluctuations in a power spectrum of environment to absolute minimum. The latter properties (topological convergence) attract the attention to algorithmic aspect of a considered system.

  12. External Memory Data Structures (Invited Paper)

    E-Print Network [OSTI]

    Arge, Lars

    bottleneck. In this paper we survey recent advances in the development of worst­case I/O­efficient external databases for objects that satisfy certain spatial constraints. Typical queries include reporting the ob­purpose) external memory data structures (or indexes) has always been a main concern in the database community, most

  13. Allegories of Modernity, Geographies of Memory

    E-Print Network [OSTI]

    Jeon, Seenhwa

    2012-10-19T23:59:59.000Z

    imaginary with mirror images and events. The postmodernist narrative of memory in these novels turns the time of the now into a time for the "past as to come," a time to detect the unrealized and unfulfilled possibilities of the past, through retellings...

  14. Logical Error Rate Scaling of the Toric Code

    E-Print Network [OSTI]

    Fern H. E. Watson; Sean D. Barrett

    2014-09-26T23:59:59.000Z

    To date, a great deal of attention has focused on characterizing the performance of quantum error correcting codes via their thresholds, the maximum correctable physical error rate for a given noise model and decoding strategy. Practical quantum computers will necessarily operate below these thresholds meaning that other performance indicators become important. In this work we consider the scaling of the logical error rate of the toric code and demonstrate how, in turn, this may be used to calculate a key performance indicator. We use a perfect matching decoding algorithm to find the scaling of the logical error rate and find two distinct operating regimes. The first regime admits a universal scaling analysis due to a mapping to a statistical physics model. The second regime characterizes the behavior in the limit of small physical error rate and can be understood by counting the error configurations leading to the failure of the decoder. We present a conjecture for the ranges of validity of these two regimes and use them to quantify the overhead -- the total number of physical qubits required to perform error correction.

  15. Slope Error Measurement Tool for Solar Parabolic Trough Collectors: Preprint

    SciTech Connect (OSTI)

    Stynes, J. K.; Ihas, B.

    2012-04-01T23:59:59.000Z

    The National Renewable Energy Laboratory (NREL) has developed an optical measurement tool for parabolic solar collectors that measures the combined errors due to absorber misalignment and reflector slope error. The combined absorber alignment and reflector slope errors are measured using a digital camera to photograph the reflected image of the absorber in the collector. Previous work using the image of the reflection of the absorber finds the reflector slope errors from the reflection of the absorber and an independent measurement of the absorber location. The accuracy of the reflector slope error measurement is thus dependent on the accuracy of the absorber location measurement. By measuring the combined reflector-absorber errors, the uncertainty in the absorber location measurement is eliminated. The related performance merit, the intercept factor, depends on the combined effects of the absorber alignment and reflector slope errors. Measuring the combined effect provides a simpler measurement and a more accurate input to the intercept factor estimate. The minimal equipment and setup required for this measurement technique make it ideal for field measurements.

  16. Wind Power Forecasting Error Distributions: An International Comparison; Preprint

    SciTech Connect (OSTI)

    Hodge, B. M.; Lew, D.; Milligan, M.; Holttinen, H.; Sillanpaa, S.; Gomez-Lazaro, E.; Scharff, R.; Soder, L.; Larsen, X. G.; Giebel, G.; Flynn, D.; Dobschinski, J.

    2012-09-01T23:59:59.000Z

    Wind power forecasting is expected to be an important enabler for greater penetration of wind power into electricity systems. Because no wind forecasting system is perfect, a thorough understanding of the errors that do occur can be critical to system operation functions, such as the setting of operating reserve levels. This paper provides an international comparison of the distribution of wind power forecasting errors from operational systems, based on real forecast data. The paper concludes with an assessment of similarities and differences between the errors observed in different locations.

  17. Universal Framework for Quantum Error-Correcting Codes

    E-Print Network [OSTI]

    Zhuo Li; Li-Juan Xing

    2009-01-04T23:59:59.000Z

    We present a universal framework for quantum error-correcting codes, i.e., the one that applies for the most general quantum error-correcting codes. This framework is established on the group algebra, an algebraic notation for the nice error bases of quantum systems. The nicest thing about this framework is that we can characterize the properties of quantum codes by the properties of the group algebra. We show how it characterizes the properties of quantum codes as well as generates some new results about quantum codes.

  18. Servo control booster system for minimizing following error

    DOE Patents [OSTI]

    Wise, William L. (Mountain View, CA)

    1985-01-01T23:59:59.000Z

    A closed-loop feedback-controlled servo system is disclosed which reduces command-to-response error to the system's position feedback resolution least increment, .DELTA.S.sub.R, on a continuous real-time basis for all operating speeds. The servo system employs a second position feedback control loop on a by exception basis, when the command-to-response error .gtoreq..DELTA.S.sub.R, to produce precise position correction signals. When the command-to-response error is less than .DELTA.S.sub.R, control automatically reverts to conventional control means as the second position feedback control loop is disconnected, becoming transparent to conventional servo control means. By operating the second unique position feedback control loop used herein at the appropriate clocking rate, command-to-response error may be reduced to the position feedback resolution least increment. The present system may be utilized in combination with a tachometer loop for increased stability.

  19. A Posteriori Error Estimation for - Department of Mathematics ...

    E-Print Network [OSTI]

    Shuhao Cao supervised under Professor Zhiqiang Cai

    2013-10-31T23:59:59.000Z

    Oct 19, 2013 ... the “correct” Hilbert space the true flux µ?1?×u lies in, to recover a ...... The error heat map shows that ZZ-patch recovery estimator leads.

  20. Quantum error correcting codes based on privacy amplification

    E-Print Network [OSTI]

    Zhicheng Luo

    2008-08-10T23:59:59.000Z

    Calderbank-Shor-Steane (CSS) quantum error-correcting codes are based on pairs of classical codes which are mutually dual containing. Explicit constructions of such codes for large blocklengths and with good error correcting properties are not easy to find. In this paper we propose a construction of CSS codes which combines a classical code with a two-universal hash function. We show, using the results of Renner and Koenig, that the communication rates of such codes approach the hashing bound on tensor powers of Pauli channels in the limit of large block-length. While the bit-flip errors can be decoded as efficiently as the classical code used, the problem of efficiently decoding the phase-flip errors remains open.

  1. avoid vocal errors: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    16 17 18 19 20 21 22 23 24 25 Next Page Last Page Topic Index 1 Error Avoiding Quantum Codes Quantum Physics (arXiv) Summary: The existence is proved of a class of open quantum...

  2. Rateless and rateless unequal error protection codes for Gaussian channels

    E-Print Network [OSTI]

    Boyle, Kevin P. (Kevin Patrick)

    2007-01-01T23:59:59.000Z

    In this thesis we examine two different rateless codes and create a rateless unequal error protection code, all for the additive white Gaussian noise (AWGN) channel. The two rateless codes are examined through both analysis ...

  3. An Approximation Algorithm for Constructing Error Detecting Prefix ...

    E-Print Network [OSTI]

    2006-09-02T23:59:59.000Z

    Sep 2, 2006 ... 2-bit Hamming prefix code problem. Our algorithm spends O(n log3 n) time to calculate a 2-bit. Hamming prefix code with an additive error of at ...

  4. Secured Pace Web Server with Collaboration and Error Logging Capabilities

    E-Print Network [OSTI]

    Tao, Lixin

    : Secure Sockets Layer (SSL) using the Java Secure Socket Extension (JSSE) API, error logging............................................................................................ 8 Chapter 3 Secure Pace Web Server with SSL........................................................... 29 3.1 Introduction to SSL

  5. Transition state theory: Variational formulation, dynamical corrections, and error estimates

    E-Print Network [OSTI]

    Van Den Eijnden, Eric

    Transition state theory: Variational formulation, dynamical corrections, and error estimates Eric, Brazil Received 18 February 2005; accepted 9 September 2005; published online 7 November 2005 Transition which aim at computing dynamical corrections to the TST transition rate constant. The theory

  6. YELLOW SEA ACOUSTIC UNCERTAINTY CAUSED BY HYDROGRAPHIC DATA ERROR

    E-Print Network [OSTI]

    Chu, Peter C.

    the littoral and blue waters. After a weapon platform has detected its targets, the sensors on torpedoes, bathymetry, bottom type, and sound speed profiles. Here, the effect of sound speed errors (i.e., hydrographic

  7. Strontium-90 Error Discovered in Subcontract Laboratory Spreadsheet

    SciTech Connect (OSTI)

    D. D. Brown A. S. Nagel

    1999-07-31T23:59:59.000Z

    West Valley Demonstration Project health physicists and environment scientists discovered a series of errors in a subcontractor's spreadsheet being used to reduce data as part of their strontium-90 analytical process.

  8. Sample covariance based estimation of Capon algorithm error probabilities

    E-Print Network [OSTI]

    Richmond, Christ D.

    The method of interval estimation (MIE) provides a strategy for mean squared error (MSE) prediction of algorithm performance at low signal-to-noise ratios (SNR) below estimation threshold where asymptotic predictions fail. ...

  9. Sensitivity of OFDM Systems to Synchronization Errors and Spatial Diversity

    E-Print Network [OSTI]

    Zhou, Yi

    2012-02-14T23:59:59.000Z

    jitter cause inter-carrier interference. The overall system performance in terms of symbol error rate is limited by the inter-carrier interference. For a reliable information reception, compensatory measures must be taken. The second part...

  10. Diagnosing multiplicative error by lensing magnification of type Ia supernovae

    E-Print Network [OSTI]

    Zhang, Pengjie

    2015-01-01T23:59:59.000Z

    Weak lensing causes spatially coherent fluctuations in flux of type Ia supernovae (SNe Ia). This lensing magnification allows for weak lensing measurement independent of cosmic shear. It is free of shape measurement errors associated with cosmic shear and can therefore be used to diagnose and calibrate multiplicative error. Although this lensing magnification is difficult to measure accurately in auto correlation, its cross correlation with cosmic shear and galaxy distribution in overlapping area can be measured to significantly higher accuracy. Therefore these cross correlations can put useful constraint on multiplicative error, and the obtained constraint is free of cosmic variance in weak lensing field. We present two methods implementing this idea and estimate their performances. We find that, with $\\sim 1$ million SNe Ia that can be achieved by the proposed D2k survey with the LSST telescope (Zhan et al. 2008), multiplicative error of $\\sim 0.5\\%$ for source galaxies at $z_s\\sim 1$ can be detected and la...

  11. Model Error Correction for Linear Methods in PET Neuroreceptor Measurements

    E-Print Network [OSTI]

    Renaut, Rosemary

    Model Error Correction for Linear Methods in PET Neuroreceptor Measurements Hongbin Guo address: hguo1@asu.edu (Hongbin Guo) Preprint submitted to NeuroImage December 11, 2008 #12;reached. A new

  12. Universally Valid Error-Disturbance Relations in Continuous Measurements

    E-Print Network [OSTI]

    Atsushi Nishizawa; Yanbei Chen

    2015-05-31T23:59:59.000Z

    In quantum physics, measurement error and disturbance were first naively thought to be simply constrained by the Heisenberg uncertainty relation. Later, more rigorous analysis showed that the error and disturbance satisfy more subtle inequalities. Several versions of universally valid error-disturbance relations (EDR) have already been obtained and experimentally verified in the regimes where naive applications of the Heisenberg uncertainty relation failed. However, these EDRs were formulated for discrete measurements. In this paper, we consider continuous measurement processes and obtain new EDR inequalities in the Fourier space: in terms of the power spectra of the system and probe variables. By applying our EDRs to a linear optomechanical system, we confirm that a tradeoff relation between error and disturbance leads to the existence of an optimal strength of the disturbance in a joint measurement. Interestingly, even with this optimal case, the inequality of the new EDR is not saturated because of doublely existing standard quantum limits in the inequality.

  13. Robust mixtures in the presence of measurement errors

    E-Print Network [OSTI]

    Jianyong Sun; Ata Kaban; Somak Raychaudhury

    2007-09-06T23:59:59.000Z

    We develop a mixture-based approach to robust density modeling and outlier detection for experimental multivariate data that includes measurement error information. Our model is designed to infer atypical measurements that are not due to errors, aiming to retrieve potentially interesting peculiar objects. Since exact inference is not possible in this model, we develop a tree-structured variational EM solution. This compares favorably against a fully factorial approximation scheme, approaching the accuracy of a Markov-Chain-EM, while maintaining computational simplicity. We demonstrate the benefits of including measurement errors in the model, in terms of improved outlier detection rates in varying measurement uncertainty conditions. We then use this approach in detecting peculiar quasars from an astrophysical survey, given photometric measurements with errors.

  14. TESLA-FEL 2009-07 Errors in Reconstruction of Difference Orbit

    E-Print Network [OSTI]

    Contents 1 Introduction 1 2 Standard Least Squares Solution 2 3 Error Emittance and Error Twiss Parameters as the position of the reconstruction point changes, we will introduce error Twiss parameters and invariant error in the point of interest has to be achieved by matching error Twiss parameters in this point to the desired

  15. A Taxonomy to Enable Error Recovery and Correction in Software Vilas Sridharan

    E-Print Network [OSTI]

    Kaeli, David R.

    A Taxonomy to Enable Error Recovery and Correction in Software Vilas Sridharan ECE Department years, reliability research has largely used the following taxonomy of errors: Undetected Errors Errors (CE). While this taxonomy is suitable to characterize hardware error detection and correction

  16. Using doppler radar images to estimate aircraft navigational heading error

    DOE Patents [OSTI]

    Doerry, Armin W. (Albuquerque, NM); Jordan, Jay D. (Albuquerque, NM); Kim, Theodore J. (Albuquerque, NM)

    2012-07-03T23:59:59.000Z

    A yaw angle error of a motion measurement system carried on an aircraft for navigation is estimated from Doppler radar images captured using the aircraft. At least two radar pulses aimed at respectively different physical locations in a targeted area are transmitted from a radar antenna carried on the aircraft. At least two Doppler radar images that respectively correspond to the at least two transmitted radar pulses are produced. These images are used to produce an estimate of the yaw angle error.

  17. Systematic errors in current quantum state tomography tools

    E-Print Network [OSTI]

    Christian Schwemmer; Lukas Knips; Daniel Richart; Tobias Moroder; Matthias Kleinmann; Otfried Gühne; Harald Weinfurter

    2014-07-22T23:59:59.000Z

    Common tools for obtaining physical density matrices in experimental quantum state tomography are shown here to cause systematic errors. For example, using maximum likelihood or least squares optimization for state reconstruction, we observe a systematic underestimation of the fidelity and an overestimation of entanglement. A solution for this problem can be achieved by a linear evaluation of the data yielding reliable and computational simple bounds including error bars.

  18. Fault-Tolerant Thresholds for Encoded Ancillae with Homogeneous Errors

    E-Print Network [OSTI]

    Bryan Eastin

    2006-11-14T23:59:59.000Z

    I describe a procedure for calculating thresholds for quantum computation as a function of error model given the availability of ancillae prepared in logical states with independent, identically distributed errors. The thresholds are determined via a simple counting argument performed on a single qubit of an infinitely large CSS code. I give concrete examples of thresholds thus achievable for both Steane and Knill style fault-tolerant implementations and investigate their relation to threshold estimates in the literature.

  19. Electoral Corruption in Developing Democracies

    E-Print Network [OSTI]

    Cantu, Francisco

    Nieto’s votes. Mexico, 2012 Campeche, PRI Expected votesChiapas, PRD Expected votes Campeche, PRD Expected votesQueretaro Michoacan Durango Campeche Last Digit Distrito

  20. Electoral Corruption in Developing Democracies

    E-Print Network [OSTI]

    Cantu, Francisco

    Results . . . . . 5.3 Bolivia . . . . . . . . . . 5.3.1Bolivia. . . . . . . . . . . . . . . . . . . . . . . . . . . .Administrative departments in Bolivia. Departments in black

  1. A new and efficient error resilient entropy code for image and video compression

    E-Print Network [OSTI]

    Min, Jungki

    1999-01-01T23:59:59.000Z

    Image and video compression standards such as JPEG, MPEG, H.263 are severely sensitive to errors. Among typical error propagation mechanisms in video compression schemes, loss of block synchronization causes the worst result. Even one bit error...

  2. Error Monitoring: A Learning Strategy for Improving Academic Performance of LD Adolescents

    E-Print Network [OSTI]

    Schumaker, Jean B.; Deshler, Donald D.; Nolan, Susan; Clark, Frances L.; Alley, Gordon R.; Warner, Michael M.

    1981-04-01T23:59:59.000Z

    Error monitoring, a learning strategy for detecting and correcting errors in written products, was taught to nine learning disabled adolescents. Students could detect and correct more errors after they received training ...

  3. Assessing the Impact of Differential Genotyping Errors on Rare Variant Tests of Association

    E-Print Network [OSTI]

    Fast, Shannon Marie

    Genotyping errors are well-known to impact the power and type I error rate in single marker tests of association. Genotyping errors that happen according to the same process in cases and controls are known as non-differential ...

  4. Shape Memory Polymer Therapeutic Devices for Stroke

    SciTech Connect (OSTI)

    Wilson, T S; Small IV, W; Benett, W J; Bearinger, J P; Maitland, D J

    2005-10-11T23:59:59.000Z

    Shape memory polymers (SMPs) are attracting a great deal of interest in the scientific community for their use in applications ranging from light weight structures in space to micro-actuators in MEMS devices. These relatively new materials can be formed into a primary shape, reformed into a stable secondary shape, and then controllably actuated to recover their primary shape. The first part of this presentation will be a brief review of the types of polymeric structures which give rise to shape memory behavior in the context of new shape memory polymers with highly regular network structures recently developed at LLNL for biomedical devices. These new urethane SMPs have improved optical and physical properties relative to commercial SMPs, including improved clarity, high actuation force, and sharper actuation transition. In the second part of the presentation we discuss the development of SMP based devices for mechanically removing neurovascular occlusions which result in ischemic stroke. These devices are delivered to the site of the occlusion in compressed form, are pushed through the occlusion, actuated (usually optically) to take on an expanded conformation, and then used to dislodge and grip the thrombus while it is withdrawn through the catheter.

  5. Thermomechanical indentation of shape memory polymers.

    SciTech Connect (OSTI)

    Long, Kevin N. (University of Colorado, Boulder, CO); Nguyen, Thao D.; Castro, Francisco (University of Colorado, Boulder, CO); Qi, H. Jerry (University of Colorado, Boulder, CO); Dunn, Martin L. (University of Colorado, Boulder, CO); Shandas, Robin (University of Colorado, Boulder, CO)

    2007-04-01T23:59:59.000Z

    Shape memory polymers (SMPs) are receiving increasing attention because of their ability to store a temporary shape for a prescribed period of time, and then when subjected to an environmental stimulus, recover an original programmed shape. They are attractive candidates for a wide range of applications in microsystems, biomedical devices, deployable aerospace structures, and morphing structures. In this paper we investigate the thermomechanical behavior of shape memory polymers due to instrumented indentation, a loading/deformation scenario that represents complex multiaxial deformation. The SMP sample is indented using a spherical indenter at a temperature T{sub 1} (>T{sub g}). The temperature is then lowered to T{sub 2} (memory is then activated by increasing the temperature to T{sub 1} (>T{sub g}) during free recovery the indentation impression disappears and the surface of the SMP recovers to its original profile. A recently-developed three-dimensional finite deformation constitutive model for the thermomechanical behavior of SMPs is then used with the finite element method to simulate this process. Measurement and simulation results are compared for cases of free and constrained recovery and good agreement is obtained, suggesting the appropriateness of the simulation approach for complex multiaxial loading/deformations that are likely to occur in applications.

  6. DESIGN OF A VARIABLE STIFFNESS LEG USING SHAPE MEMORY POLYMER COMPOSITES

    E-Print Network [OSTI]

    Collins, Emmanuel

    571 DESIGN OF A VARIABLE STIFFNESS LEG USING SHAPE MEMORY POLYMER COMPOSITES DUNCAN W. HALDANE materials called shape memory polymers. Shape Memory Polymers (SMPs) experience a several order of magnitude a SMP as the resin matrix, a shape memory polymer composite is formed. A shape memory polymer composite

  7. SHEAN (Simplified Human Error Analysis code) and automated THERP

    SciTech Connect (OSTI)

    Wilson, J.R.

    1993-06-01T23:59:59.000Z

    One of the most widely used human error analysis tools is THERP (Technique for Human Error Rate Prediction). Unfortunately, this tool has disadvantages. The Nuclear Regulatory Commission, realizing these drawbacks, commissioned Dr. Swain, the author of THERP, to create a simpler, more consistent tool for deriving human error rates. That effort produced the Accident Sequence Evaluation Program Human Reliability Analysis Procedure (ASEP), which is more conservative than THERP, but a valuable screening tool. ASEP involves answering simple questions about the scenario in question, and then looking up the appropriate human error rate in the indicated table (THERP also uses look-up tables, but four times as many). The advantages of ASEP are that human factors expertise is not required, and the training to use the method is minimal. Although not originally envisioned by Dr. Swain, the ASEP approach actually begs to be computerized. That WINCO did, calling the code SHEAN, for Simplified Human Error ANalysis. The code was done in TURBO Basic for IBM or IBM-compatible MS-DOS, for fast execution. WINCO is now in the process of comparing this code against THERP for various scenarios. This report provides a discussion of SHEAN.

  8. On admissible memory kernels for random unitary qubit evolution

    E-Print Network [OSTI]

    Filip A. Wudarski; Pawe? Nale?yty; Gniewomir Sarbicki; Dariusz Chru?ci?ski

    2015-04-12T23:59:59.000Z

    We analyze random unitary evolution of the qubit within memory kernel approach. We provide su?cient conditions which guarantee that the corresponding memory kernel generates physically legitimate quantum evolution. Interestingly, we are able to recover several well known examples and generate new classes of nontrivial qubit evolution. Surprisingly, it turns out that quantum evolution with memory kernel generated by our approach gives rise to vanishing non-Markovianity measure based on the distinguishability of quantum states.

  9. Texture memory and strain-texture mapping in a NiTi shape memory alloy

    SciTech Connect (OSTI)

    Ye, B.; Majumdar, B. S.; Dutta, I. [Materials Department, New Mexico Tech, 801 Leroy Place, Socorro, New Mexico 87801 (United States); Center for Materials Science, Naval Postgraduate School, Monterey, California 93943 (United States)

    2007-08-06T23:59:59.000Z

    The authors report on the near-reversible strain hysteresis during thermal cycling of a polycrystalline NiTi shape memory alloy at a constant stress that is below the yield strength of the martensite. In situ neutron diffraction experiments are used to demonstrate that the strain hysteresis occurs due to a texture memory effect, where the martensite develops a texture when it is cooled under load from the austenite phase and is thereafter ''remembered.'' Further, the authors quantitatively relate the texture to the strain by developing a calculated strain-texture map or pole figure for the martensite phase, and indicate its applicability in other martensitic transformations.

  10. autobiographical memory recall: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Inc. All rights reserved Boahen, Kwabena 93 Memory Distortion in People Reporting Abduction by Aliens Susan A. Clancy, Richard J. McNally, Biology and Medicine Websites...

  11. aversive memory recall: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Inc. All rights reserved Boahen, Kwabena 119 Memory Distortion in People Reporting Abduction by Aliens Susan A. Clancy, Richard J. McNally, Biology and Medicine Websites...

  12. Adaptive memory in humans from a comparative perspective

    E-Print Network [OSTI]

    Krause, Mark

    2015-01-01T23:59:59.000Z

    support a specific type of learning (e.g. , taste aversions,appear to be a distinct type of learning or memory process

  13. Building Green in Greensburg: Kiowa County Memorial Hospital

    Office of Energy Efficiency and Renewable Energy (EERE)

    This poster highlights energy efficiency, renewable energy, and sustainable features of the high-performing Kiowa County Memorial Hospital building in Greensburg, Kansas.

  14. Rebuilding it Better: Greensburg, Kansas, Kiowa County Memorial Hospital (Brochure)

    SciTech Connect (OSTI)

    Not Available

    2010-03-01T23:59:59.000Z

    This brochure details the sustainable and green aspects of the LEED Platinum-designed Kiowa County Memorial Hospital in Greensburg, Kansas.

  15. auditory working memory: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    requires not only attention Sturm, Alexandra Noelle 2013-01-01 9 Working Memory and Dyslexia CiteSeer Summary: Recent research has demonstrated that dyslexic children suffer...

  16. Recommendation 196: Alternatives to Memorialize the K-25 Building

    Broader source: Energy.gov [DOE]

    The ORSSAB Recommends to DOE Alternatives to Memorialize the K-25 Building at East Tennessee Technology Park and Manhattan Project Exhibits in Oak Ridge, Tennessee.

  17. Life-cycle assessment of NAND flash memory

    E-Print Network [OSTI]

    Boyd, Sarah; Horvath, A; Dornfeld, David

    2010-01-01T23:59:59.000Z

    paired trends, primary energy consumption per gigabyte (GB)energy consumption per memory capacity (MJ/GB), over ?ve technology nodes relatively ?at. In Fig 3 the trends

  18. Neuromorphic, Digital and Quantum Computation with Memory Circuit Elements

    E-Print Network [OSTI]

    Yuriy V. Pershin; Massimiliano Di Ventra

    2011-09-28T23:59:59.000Z

    Memory effects are ubiquitous in nature and the class of memory circuit elements - which includes memristors, memcapacitors and meminductors - shows great potential to understand and simulate the associated fundamental physical processes. Here, we show that such elements can also be used in electronic schemes mimicking biologically-inspired computer architectures, performing digital logic and arithmetic operations, and can expand the capabilities of certain quantum computation schemes. In particular, we will discuss few examples where the concept of memory elements is relevant to the realization of associative memory in neuronal circuits, spike-timing-dependent plasticity of synapses, digital and field-programmable quantum computing.

  19. Institute of Computer Science A modified limited-memory BNS ...

    E-Print Network [OSTI]

    2014-03-12T23:59:59.000Z

    Institute of Computer Science. Academy of Sciences of the Czech Republic. A modified limited-memory BNS method for unconstrained minimization based on ...

  20. Debugging Fortran on a shared memory machine

    SciTech Connect (OSTI)

    Allen, T.R.; Padua, D.A.

    1987-01-01T23:59:59.000Z

    Debugging on a parallel processor is more difficult than debugging on a serial machine because errors in a parallel program may introduce nondeterminism. The approach to parallel debugging presented here attempts to reduce the problem of debugging on a parallel machine to that of debugging on a serial machine by automatically detecting nondeterminism. 20 refs., 6 figs.

  1. Development of an integrated system for estimating human error probabilities

    SciTech Connect (OSTI)

    Auflick, J.L.; Hahn, H.A.; Morzinski, J.A.

    1998-12-01T23:59:59.000Z

    This is the final report of a three-year, Laboratory Directed Research and Development (LDRD) project at the Los Alamos National Laboratory (LANL). This project had as its main objective the development of a Human Reliability Analysis (HRA), knowledge-based expert system that would provide probabilistic estimates for potential human errors within various risk assessments, safety analysis reports, and hazard assessments. HRA identifies where human errors are most likely, estimates the error rate for individual tasks, and highlights the most beneficial areas for system improvements. This project accomplished three major tasks. First, several prominent HRA techniques and associated databases were collected and translated into an electronic format. Next, the project started a knowledge engineering phase where the expertise, i.e., the procedural rules and data, were extracted from those techniques and compiled into various modules. Finally, these modules, rules, and data were combined into a nearly complete HRA expert system.

  2. Representing cognitive activities and errors in HRA trees

    SciTech Connect (OSTI)

    Gertman, D.I.

    1992-01-01T23:59:59.000Z

    A graphic representation method is presented herein for adapting an existing technology--human reliability analysis (HRA) event trees, used to support event sequence logic structures and calculations--to include a representation of the underlying cognitive activity and corresponding errors associated with human performance. The analyst is presented with three potential means of representing human activity: the NUREG/CR-1278 HRA event tree approach; the skill-, rule- and knowledge-based paradigm; and the slips, lapses, and mistakes paradigm. The above approaches for representing human activity are integrated in order to produce an enriched HRA event tree -- the cognitive event tree system (COGENT)-- which, in turn, can be used to increase the analyst's understanding of the basic behavioral mechanisms underlying human error and the representation of that error in probabilistic risk assessment. Issues pertaining to the implementation of COGENT are also discussed.

  3. Representing cognitive activities and errors in HRA trees

    SciTech Connect (OSTI)

    Gertman, D.I.

    1992-05-01T23:59:59.000Z

    A graphic representation method is presented herein for adapting an existing technology--human reliability analysis (HRA) event trees, used to support event sequence logic structures and calculations--to include a representation of the underlying cognitive activity and corresponding errors associated with human performance. The analyst is presented with three potential means of representing human activity: the NUREG/CR-1278 HRA event tree approach; the skill-, rule- and knowledge-based paradigm; and the slips, lapses, and mistakes paradigm. The above approaches for representing human activity are integrated in order to produce an enriched HRA event tree -- the cognitive event tree system (COGENT)-- which, in turn, can be used to increase the analyst`s understanding of the basic behavioral mechanisms underlying human error and the representation of that error in probabilistic risk assessment. Issues pertaining to the implementation of COGENT are also discussed.

  4. Non-Gaussian numerical errors versus mass hierarchy

    E-Print Network [OSTI]

    Y. Meurice; M. B. Oktay

    2000-05-12T23:59:59.000Z

    We probe the numerical errors made in renormalization group calculations by varying slightly the rescaling factor of the fields and rescaling back in order to get the same (if there were no round-off errors) zero momentum 2-point function (magnetic susceptibility). The actual calculations were performed with Dyson's hierarchical model and a simplified version of it. We compare the distributions of numerical values obtained from a large sample of rescaling factors with the (Gaussian by design) distribution of a random number generator and find significant departures from the Gaussian behavior. In addition, the average value differ (robustly) from the exact answer by a quantity which is of the same order as the standard deviation. We provide a simple model in which the errors made at shorter distance have a larger weight than those made at larger distance. This model explains in part the non-Gaussian features and why the central-limit theorem does not apply.

  5. Reducing Collective Quantum State Rotation Errors with Reversible Dephasing

    E-Print Network [OSTI]

    Kevin C. Cox; Matthew A. Norcia; Joshua M. Weiner; Justin G. Bohnet; James K. Thompson

    2014-07-16T23:59:59.000Z

    We demonstrate that reversible dephasing via inhomogeneous broadening can greatly reduce collective quantum state rotation errors, and observe the suppression of rotation errors by more than 21 dB in the context of collective population measurements of the spin states of an ensemble of $2.1 \\times 10^5$ laser cooled and trapped $^{87}$Rb atoms. The large reduction in rotation noise enables direct resolution of spin state populations 13(1) dB below the fundamental quantum projection noise limit. Further, the spin state measurement projects the system into an entangled state with 9.5(5) dB of directly observed spectroscopic enhancement (squeezing) relative to the standard quantum limit, whereas no enhancement would have been obtained without the suppression of rotation errors.

  6. Meta learning of bounds on the Bayes classifier error

    E-Print Network [OSTI]

    Moon, Kevin R; Hero, Alfred O

    2015-01-01T23:59:59.000Z

    Meta learning uses information from base learners (e.g. classifiers or estimators) as well as information about the learning problem to improve upon the performance of a single base learner. For example, the Bayes error rate of a given feature space, if known, can be used to aid in choosing a classifier, as well as in feature selection and model selection for the base classifiers and the meta classifier. Recent work in the field of f-divergence functional estimation has led to the development of simple and rapidly converging estimators that can be used to estimate various bounds on the Bayes error. We estimate multiple bounds on the Bayes error using an estimator that applies meta learning to slowly converging plug-in estimators to obtain the parametric convergence rate. We compare the estimated bounds empirically on simulated data and then estimate the tighter bounds on features extracted from an image patch analysis of sunspot continuum and magnetogram images.

  7. Reinforcement Learning for Characterization of Hysteresis Behavior in Shape Memory Alloys, and Application to

    E-Print Network [OSTI]

    Valasek, John

    Reinforcement Learning for Characterization of Hysteresis Behavior in Shape Memory Alloys & Valasek - 2 Briefing Agenda Shape Memory Alloy Characterization and Control Learning Simulation Results Membrane Air #12;Kirkpatrick & Valasek - 4 Shape Memory Alloys (SMA) Metallic Alloys used as actuators

  8. A microscopically motivated constitutive model for shape memory alloys: formulation, analysis

    E-Print Network [OSTI]

    Rheinisch-Westfälische Technische Hochschule Aachen (RWTH)

    A microscopically motivated constitutive model for shape memory alloys: formulation, analysisTi polycrystalline shape memory alloys exhibiting transformations between three solid phases (austenite, R presented. 1 Introduction Shape memory alloys (SMA) are metallic materials exhibiting remarkable properties

  9. Altered gene regulation and synaptic morphology in Drosophila learning and memory mutants

    E-Print Network [OSTI]

    Guan, Zhuo

    Genetic studies in Drosophila have revealed two separable long-term memory pathways defined as anesthesia-resistant memory (ARM) and long-lasting long-term memory (LLTM). ARM is disrupted in radish (rsh) mutants, whereas ...

  10. Trade-off between the tolerance of located and unlocated errors in nondegenerate quantum error-correcting codes

    E-Print Network [OSTI]

    Henry L. Haselgrove; Peter P. Rohde

    2007-07-03T23:59:59.000Z

    In a recent study [Rohde et al., quant-ph/0603130 (2006)] of several quantum error correcting protocols designed for tolerance against qubit loss, it was shown that these protocols have the undesirable effect of magnifying the effects of depolarization noise. This raises the question of which general properties of quantum error-correcting codes might explain such an apparent trade-off between tolerance to located and unlocated error types. We extend the counting argument behind the well-known quantum Hamming bound to derive a bound on the weights of combinations of located and unlocated errors which are correctable by nondegenerate quantum codes. Numerical results show that the bound gives an excellent prediction to which combinations of unlocated and located errors can be corrected with high probability by certain large degenerate codes. The numerical results are explained partly by showing that the generalized bound, like the original, is closely connected to the information-theoretic quantity the quantum coherent information. However, we also show that as a measure of the exact performance of quantum codes, our generalized Hamming bound is provably far from tight.

  11. Are you getting an error message in UniFi Plus? (suggestion...check the auto-hint line!) In most cases, Unifi Plus does not prominently display error messages; instead, the error message will be

    E-Print Network [OSTI]

    Peak, Derek

    Are you getting an error message in UniFi Plus? (suggestion...check the auto-hint line!) In most cases, Unifi Plus does not prominently display error messages; instead, the error message and processing messages Keyboard shortcuts Instructions for accessing other blocks, windows or forms from

  12. Error estimates and specification parameters for functional renormalization

    SciTech Connect (OSTI)

    Schnoerr, David [Institute for Theoretical Physics, University of Heidelberg, D-69120 Heidelberg (Germany)] [Institute for Theoretical Physics, University of Heidelberg, D-69120 Heidelberg (Germany); Boettcher, Igor, E-mail: I.Boettcher@thphys.uni-heidelberg.de [Institute for Theoretical Physics, University of Heidelberg, D-69120 Heidelberg (Germany)] [Institute for Theoretical Physics, University of Heidelberg, D-69120 Heidelberg (Germany); Pawlowski, Jan M. [Institute for Theoretical Physics, University of Heidelberg, D-69120 Heidelberg (Germany) [Institute for Theoretical Physics, University of Heidelberg, D-69120 Heidelberg (Germany); ExtreMe Matter Institute EMMI, GSI Helmholtzzentrum für Schwerionenforschung mbH, D-64291 Darmstadt (Germany); Wetterich, Christof [Institute for Theoretical Physics, University of Heidelberg, D-69120 Heidelberg (Germany)] [Institute for Theoretical Physics, University of Heidelberg, D-69120 Heidelberg (Germany)

    2013-07-15T23:59:59.000Z

    We present a strategy for estimating the error of truncated functional flow equations. While the basic functional renormalization group equation is exact, approximated solutions by means of truncations do not only depend on the choice of the retained information, but also on the precise definition of the truncation. Therefore, results depend on specification parameters that can be used to quantify the error of a given truncation. We demonstrate this for the BCS–BEC crossover in ultracold atoms. Within a simple truncation the precise definition of the frequency dependence of the truncated propagator affects the results, indicating a shortcoming of the choice of a frequency independent cutoff function.

  13. JLab SRF Cavity Fabrication Errors, Consequences and Lessons Learned

    SciTech Connect (OSTI)

    Frank Marhauser

    2011-09-01T23:59:59.000Z

    Today, elliptical superconducting RF (SRF) cavities are preferably made from deep-drawn niobium sheets as pursued at Jefferson Laboratory (JLab). The fabrication of a cavity incorporates various cavity cell machining, trimming and electron beam welding (EBW) steps as well as surface chemistry that add to forming errors creating geometrical deviations of the cavity shape from its design. An analysis of in-house built cavities over the last years revealed significant errors in cavity production. Past fabrication flaws are described and lessons learned applied successfully to the most recent in-house series production of multi-cell cavities.

  14. Quantum error correcting codes and 4-dimensional arithmetic hyperbolic manifolds

    SciTech Connect (OSTI)

    Guth, Larry, E-mail: lguth@math.mit.edu [Department of Mathematics, MIT, Cambridge, Massachusetts 02139 (United States); Lubotzky, Alexander, E-mail: alex.lubotzky@mail.huji.ac.il [Institute of Mathematics, Hebrew University, Jerusalem 91904 (Israel)

    2014-08-15T23:59:59.000Z

    Using 4-dimensional arithmetic hyperbolic manifolds, we construct some new homological quantum error correcting codes. They are low density parity check codes with linear rate and distance n{sup ?}. Their rate is evaluated via Euler characteristic arguments and their distance using Z{sub 2}-systolic geometry. This construction answers a question of Zémor [“On Cayley graphs, surface codes, and the limits of homological coding for quantum error correction,” in Proceedings of Second International Workshop on Coding and Cryptology (IWCC), Lecture Notes in Computer Science Vol. 5557 (2009), pp. 259–273], who asked whether homological codes with such parameters could exist at all.

  15. Full protection of superconducting qubit systems from coupling errors

    E-Print Network [OSTI]

    M. J. Storcz; J. Vala; K. R. Brown; J. Kempe; F. K. Wilhelm; K. B. Whaley

    2005-08-09T23:59:59.000Z

    Solid state qubits realized in superconducting circuits are potentially extremely scalable. However, strong decoherence may be transferred to the qubits by various elements of the circuits that couple individual qubits, particularly when coupling is implemented over long distances. We propose here an encoding that provides full protection against errors originating from these coupling elements, for a chain of superconducting qubits with a nearest neighbor anisotropic XY-interaction. The encoding is also seen to provide partial protection against errors deriving from general electronic noise.

  16. Laser Phase Errors in Seeded Free Electron Lasers

    SciTech Connect (OSTI)

    Ratner, D.; Fry, A.; Stupakov, G.; White, W.; /SLAC

    2012-04-17T23:59:59.000Z

    Harmonic seeding of free electron lasers has attracted significant attention as a method for producing transform-limited pulses in the soft x-ray region. Harmonic multiplication schemes extend seeding to shorter wavelengths, but also amplify the spectral phase errors of the initial seed laser, and may degrade the pulse quality and impede production of transform-limited pulses. In this paper we consider the effect of seed laser phase errors in high gain harmonic generation and echo-enabled harmonic generation. We use simulations to confirm analytical results for the case of linearly chirped seed lasers, and extend the results for arbitrary seed laser envelope and phase.

  17. Correctable noise of Quantum Error Correcting Codes under adaptive concatenation

    E-Print Network [OSTI]

    Jesse Fern

    2008-02-27T23:59:59.000Z

    We examine the transformation of noise under a quantum error correcting code (QECC) concatenated repeatedly with itself, by analyzing the effects of a quantum channel after each level of concatenation using recovery operators that are optimally adapted to use error syndrome information from the previous levels of the code. We use the Shannon entropy of these channels to estimate the thresholds of correctable noise for QECCs and find considerable improvements under this adaptive concatenation. Similar methods could be used to increase quantum fault tolerant thresholds.

  18. Effects of Constrained Aging on the Shape Memory Response of Nickel Rich Niti Shape Memory Alloys

    E-Print Network [OSTI]

    Barrie, Fatmata Haja

    2011-02-22T23:59:59.000Z

    Ni50.6Ti49.4 single and Ni52Ti48 polycrystalline shape memory alloy samples were subjected to aging under a uniaxial stress, to form a single Ni4Ti3 precipitate variant and to investigate the effects of single versus multi-variant coherent...

  19. Oil Price Trackers Inspired by Immune Memory

    E-Print Network [OSTI]

    Wilson, WIlliam; Aickelin, Uwe

    2010-01-01T23:59:59.000Z

    We outline initial concepts for an immune inspired algorithm to evaluate and predict oil price time series data. The proposed solution evolves a short term pool of trackers dynamically, with each member attempting to map trends and anticipate future price movements. Successful trackers feed into a long term memory pool that can generalise across repeating trend patterns. The resulting sequence of trackers, ordered in time, can be used as a forecasting tool. Examination of the pool of evolving trackers also provides valuable insight into the properties of the crude oil market.

  20. Nickel porphyrins for memory optical applications

    DOE Patents [OSTI]

    Shelnutt, John A. (Tijeras, NM); Jia, Songling (Albuquerque, NM); Medforth, Craig (Vacaville, CA); Holten, Dewey (St. Louis, MO); Nelson, Nora Y. (Manteca, CA); Smith, Kevin M. (Davis, CA)

    2000-01-01T23:59:59.000Z

    The present invention relates to a nickel-porphyrin derivative in a matrix, the nickel-porphyrin derivative comprising at least two conformational isomers, a lower-energy-state conformer and a higher-energy-state conformer, such that when the higher-energy-state conformer is generated from the lower-energy-state conformer following absorption of a photon of suitable energy, the time to return to the lower-energy-state conformer is greater than 40 nanoseconds at approximately room temperature. The nickel-porphyrin derivative is useful in optical memory applications.

  1. Localized quantum walks as secured quantum memory

    E-Print Network [OSTI]

    C. M. Chandrashekar; Th. Busch

    2015-04-21T23:59:59.000Z

    We show that a quantum walk process can be used to construct and secure quantum memory. More precisely, we show that a localized quantum walk with temporal disorder can be engineered to store the information of a single, unknown qubit on a compact position space and faithfully recover it on demand. Since the localization occurss with a finite spread in position space, the stored information of the qubit will be naturally secured from the simple eavesdropper. Our protocol can be adopted to any quantum system for which experimental control over quantum walk dynamics can be achieved.

  2. Remote preparation of an atomic quantum memory

    E-Print Network [OSTI]

    Wenjamin Rosenfeld; Stefan Berner; Juergen Volz; Markus Weber; Harald Weinfurter

    2006-08-29T23:59:59.000Z

    Storage and distribution of quantum information are key elements of quantum information processing and quantum communication. Here, using atom-photon entanglement as the main physical resource, we experimentally demonstrate the preparation of a distant atomic quantum memory. Applying a quantum teleportation protocol on a locally prepared state of a photonic qubit, we realized this so-called remote state preparation on a single, optically trapped 87Rb atom. We evaluated the performance of this scheme by the full tomography of the prepared atomic state, reaching an average fidelity of 82%.

  3. Molecular mechanisms of memory in imprinting

    E-Print Network [OSTI]

    Solomonia, Revaz O.; McCabe, Brian J.

    2014-10-02T23:59:59.000Z

    an ess the chick (s In additi for study, r by the fact robiology o It is also a the recentl trolled, faci changes in or water for tive period animals tha A Fig. 1. Positio of section for mesopallium; vocalize ex which learn Imprinting with proce... . mulated evidence strongly indicates that formation of tion memory of imprinting involves a time-dependent ochemical processes in the IMM. Such processes are essed in the left side of this region. Changes in the right raining, though resembling events...

  4. Painted Ponies: Essays on Memory and Loss

    E-Print Network [OSTI]

    Klayder, Mary

    2008-12-30T23:59:59.000Z

    , and galloping around the neighborhood. I refused to neigh. After I finished reading The Wizard of Oz enough times that I bored my mother with the highlights, someone – I have no memory of who – took me to the library to check out the other books.... It was a humid June night. A thunderhead rose to the south like a mountain. Clouds like that were so common I used to pretend I lived in Colorado, imagined I could go hiking on the cloud hills, hills that moved to different sides of the town...

  5. Gist Memory in Alzheimer's Disease: Evidence From Categorized Pictures Andrew E. Budson

    E-Print Network [OSTI]

    Schacter, Daniel

    Gist Memory in Alzheimer's Disease: Evidence From Categorized Pictures Andrew E. Budson Edith of items (gist memory; Reyna & Brainerd, 1995; Schacter, Norman, & Koutstaal, 1998). We have argued

  6. A signal-detection-based investigation into the nature of recognition memory

    E-Print Network [OSTI]

    Mickes, Laura Beth

    2010-01-01T23:59:59.000Z

    memory. Memory & Cognition, Speer, N. K. , & Curran, T. (Eichenbaum, 2008; Speer & Curran, 2007; Turriziani, Fadda,unitized familiarity (cf. Speer & Curran, 2007). While this

  7. auditory-verbal working memory: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Memory 4 Percept Result of filtering Memphis, University of 4 Working Memory and Dyslexia CiteSeer Summary: Recent research has demonstrated that dyslexic children suffer...

  8. Soft Error Modeling and Protection for Sequential Elements Hossein Asadi and Mehdi B. Tahoori

    E-Print Network [OSTI]

    on system-level soft error rate. The number of clock cycles required for an error in a bistable to be propagated to system outputs is used to measure the vulnerability of bistables to soft errors. 1 Introduction, soft errors become the main reliability concern during lifetime operation of digital systems. Soft

  9. Low-Cost Hardening of Image Processing Applications Against Soft Errors Ilia Polian1,2

    E-Print Network [OSTI]

    Polian, Ilia

    , and their hardening against soft errors becomes an issue. We propose a methodology to identify soft errors as uncritical based on their impact on the system's functionality. We call a soft error uncritical if its impact are imperceivable for the human user of the system. We focus on soft errors in the motion esti- mation subsystem

  10. Distinguishing congestion and error losses: an ECN/ELN based scheme

    E-Print Network [OSTI]

    Kamakshisundaram, Raguram

    2001-01-01T23:59:59.000Z

    error rates, like wireless links, packets are lost more due to error than due to congestion. But TCP does not differentiate between error and congestion losses and hence reduces the sending rate for losses due to error also, which unnecessarily reduces...

  11. Designing Automation to Reduce Operator Errors Nancy G. Leveson

    E-Print Network [OSTI]

    Leveson, Nancy

    Designing Automation to Reduce Operator Errors Nancy G. Leveson Computer Science and Engineering University of Washington Everett Palmer NASA Ames Research Center Introduction Advanced automation has been of mode­related problems [SW95]. After studying accidents and incidents in the new, highly automated

  12. Measurement Errors in Visual Servoing V. Kyrki ,1

    E-Print Network [OSTI]

    Kragic, Danica

    feedback for closed loop control of a robot motion termed visual servoing has received a significant amount robot trajectory and its uncertainty. The procedures of camera calibration have improved enormously over on the modeling of an error function and thus has a major effect on the robot's trajectory. On the other hand

  13. Energy efficiency of error correction for wireless communication

    E-Print Network [OSTI]

    Havinga, Paul J.M.

    -control is an important issue for mobile computing systems. This includes energy spent in the physical radio transmission and Networking Conference 1999 [7]. #12;ENERGY EFFICIENCY OF ERROR CORRECTION FOR WIRELESS COMMUNICATIONA ­ 2 on the energy of transmission and the energy of redundancy computation. We will show that the computational cost

  14. Effects of errors in the solar radius on helioseismic inferences

    E-Print Network [OSTI]

    Sarbani Basu

    1997-12-09T23:59:59.000Z

    Frequencies of intermediate-degree f-modes of the Sun seem to indicate that the solar radius is smaller than what is normally used in constructing solar models. We investigate the possible consequences of an error in radius on results for solar structure obtained using helioseismic inversions. It is shown that solar sound speed will be overestimated if oscillation frequencies are inverted using reference models with a larger radius. Using solar models with radius of 695.78 Mm and new data sets, the base of the solar convection zone is estimated to be at radial distance of $0.7135\\pm 0.0005$ of the solar radius. The helium abundance in the convection zone as determined using models with OPAL equation of state is $0.248\\pm 0.001$, where the errors reflect the estimated systematic errors in the calculation, the statistical errors being much smaller. Assuming that the OPAL opacities used in the construction of the solar models are correct, the surface $Z/X$ is estimated to be $0.0245\\pm 0.0006$.

  15. Error field and magnetic diagnostic modeling for W7-X

    SciTech Connect (OSTI)

    Lazerson, Sam A. [PPPL; Gates, David A. [PPPL; NEILSON, GEORGE H. [PPPL; OTTE, M.; Bozhenkov, S.; Pedersen, T. S.; GEIGER, J.; LORE, J.

    2014-07-01T23:59:59.000Z

    The prediction, detection, and compensation of error fields for the W7-X device will play a key role in achieving a high beta (? = 5%), steady state (30 minute pulse) operating regime utilizing the island divertor system [1]. Additionally, detection and control of the equilibrium magnetic structure in the scrape-off layer will be necessary in the long-pulse campaign as bootstrapcurrent evolution may result in poor edge magnetic structure [2]. An SVD analysis of the magnetic diagnostics set indicates an ability to measure the toroidal current and stored energy, while profile variations go undetected in the magnetic diagnostics. An additional set of magnetic diagnostics is proposed which improves the ability to constrain the equilibrium current and pressure profiles. However, even with the ability to accurately measure equilibrium parameters, the presence of error fields can modify both the plasma response and diverter magnetic field structures in unfavorable ways. Vacuum flux surface mapping experiments allow for direct measurement of these modifications to magnetic structure. The ability to conduct such an experiment is a unique feature of stellarators. The trim coils may then be used to forward model the effect of an applied n = 1 error field. This allows the determination of lower limits for the detection of error field amplitude and phase using flux surface mapping. *Research supported by the U.S. DOE under Contract No. DE-AC02-09CH11466 with Princeton University.

  16. Two infinite families of nonadditive quantum error-correcting codes

    E-Print Network [OSTI]

    Sixia Yu; Qing Chen; C. H. Oh

    2009-01-14T23:59:59.000Z

    We construct explicitly two infinite families of genuine nonadditive 1-error correcting quantum codes and prove that their coding subspaces are 50% larger than those of the optimal stabilizer codes of the same parameters via the linear programming bound. All these nonadditive codes can be characterized by a stabilizer-like structure and thus their encoding circuits can be designed in a straightforward manner.

  17. Threshold error rates for the toric and surface codes

    E-Print Network [OSTI]

    D. S. Wang; A. G. Fowler; A. M. Stephens; L. C. L. Hollenberg

    2009-05-05T23:59:59.000Z

    The surface code scheme for quantum computation features a 2d array of nearest-neighbor coupled qubits yet claims a threshold error rate approaching 1% (NJoP 9:199, 2007). This result was obtained for the toric code, from which the surface code is derived, and surpasses all other known codes restricted to 2d nearest-neighbor architectures by several orders of magnitude. We describe in detail an error correction procedure for the toric and surface codes, which is based on polynomial-time graph matching techniques and is efficiently implementable as the classical feed-forward processing step in a real quantum computer. By direct simulation of this error correction scheme, we determine the threshold error rates for the two codes (differing only in their boundary conditions) for both ideal and non-ideal syndrome extraction scenarios. We verify that the toric code has an asymptotic threshold of p = 15.5% under ideal syndrome extraction, and p = 7.8 10^-3 for the non-ideal case, in agreement with prior work. Simulations of the surface code indicate that the threshold is close to that of the toric code.

  18. RESIDUAL TYPE A POSTERIORI ERROR ESTIMATES FOR ELLIPTIC OBSTACLE PROBLEMS

    E-Print Network [OSTI]

    Nochetto, Ricardo H.

    to double obstacle problems are briefly discussed. Key words. a posteriori error estimates, residual Science Foundation under the grant No.19771080 and China National Key Project ``Large Scale Scientific\\Gamma satisfies / Ÿ 0 on @ and K is the convex set of admissible displacements K := fv 2 H 1 0(\\Omega\\Gamma : v

  19. Multilayer Perceptron Error Surfaces: Visualization, Structure and Modelling

    E-Print Network [OSTI]

    Gallagher, Marcus

    . This is commonly formulated as a multivariate non­linear optimization problem over a very high­dimensional space of analysis are not well­suited to this problem. Visualizing and describ­ ing the error surface are also three related methods. Firstly, Principal Component Analysis (PCA) is proposed as a method

  20. Multi-layer Perceptron Error Surfaces: Visualization, Structure and Modelling

    E-Print Network [OSTI]

    Gallagher, Marcus

    . This is commonly formulated as a multivariate non-linear optimization problem over a very high-dimensional space of analysis are not well-suited to this problem. Visualizing and describ- ing the error surface are also three related methods. Firstly, Principal Component Analysis (PCA) is proposed as a method

  1. Analysis of possible systematic errors in the Oslo method

    E-Print Network [OSTI]

    A. C. Larsen; M. Guttormsen; M. Krticka; E. Betak; A. Bürger; A. Görgen; H. T. Nyhus; J. Rekstad; A. Schiller; S. Siem; H. K. Toft; G. M. Tveten; A. V. Voinov; K. Wikan

    2012-11-27T23:59:59.000Z

    In this work, we have reviewed the Oslo method, which enables the simultaneous extraction of level density and gamma-ray transmission coefficient from a set of particle-gamma coincidence data. Possible errors and uncertainties have been investigated. Typical data sets from various mass regions as well as simulated data have been tested against the assumptions behind the data analysis.

  2. Flexible Error Protection for Energy Efficient Reliable Architectures Timothy Miller

    E-Print Network [OSTI]

    Xuan, Dong

    Flexible Error Protection for Energy Efficient Reliable Architectures Timothy Miller , Nagarjuna and Computer Engineering The Ohio State University {millerti,teodores}@cse.ohio-state.edu, nagarjun. To deal with these com- peting trends, energy-efficient solutions are needed to deal with reli- ability

  3. Fast Error Estimates For Indirect Measurements: Applications To Pavement Engineering

    E-Print Network [OSTI]

    Kreinovich, Vladik

    Fast Error Estimates For Indirect Measurements: Applications To Pavement Engineering Carlos that is difficult to measure directly (e.g., lifetime of a pavement, efficiency of an engine, etc). To estimate y computation time. As an example of this methodology, we give pavement lifetime estimates. This work

  4. A Method for Treating Discretization Error in Nondeterministic Analysis

    SciTech Connect (OSTI)

    Alvin, K.F.

    1999-01-27T23:59:59.000Z

    A response surface methodology-based technique is presented for treating discretization error in non-deterministic analysis. The response surface, or metamodel, is estimated from computer experiments which vary both uncertain physical parameters and the fidelity of the computational mesh. The resultant metamodel is then used to propagate the variabilities in the continuous input parameters, while the mesh size is taken to zero, its asymptotic limit. With respect to mesh size, the metamodel is equivalent to Richardson extrapolation, in which solutions on coarser and finer meshes are used to estimate discretization error. The method is demonstrated on a one dimensional prismatic bar, in which uncertainty in the third vibration frequency is estimated by propagating variations in material modulus, density, and bar length. The results demonstrate the efficiency of the method for combining non-deterministic analysis with error estimation to obtain estimates of total simulation uncertainty. The results also show the relative sensitivity of failure estimates to solution bias errors in a reliability analysis, particularly when the physical variability of the system is low.

  5. Considering Workload Input Variations in Error Coverage Estimation

    E-Print Network [OSTI]

    Karlsson, Johan

    different parts of the workload code to be executed different number of times. By using the results from in the workload input when estimating error detection coverage using fault injection are investigated. Results sequence based on results from fault injection experiments with another input sequence is presented

  6. Data aware, Low cost Error correction for Wireless Sensor Networks

    E-Print Network [OSTI]

    California at San Diego, University of

    Data aware, Low cost Error correction for Wireless Sensor Networks Shoubhik Mukhopadhyay, Debashis challenges in adoption and deployment of wireless networked sensing applications is ensuring reliable sensor of such applications. A wireless sensor network is inherently vulnerable to different sources of unreliability

  7. Error Minimization Methods in Biproportional Apportionment Federica Ricca Andrea Scozzari

    E-Print Network [OSTI]

    Serafini, Paolo

    as an alternative to the classical axiomatic approach introduced by Balinski and Demange in 1989. We provide and in the statistical literature. A milestone theoretical setting was given by Balinski and Demange in 1989 [5, 6 a class of methods for Biproportional Apportionment characterized by an "error minimization" approach

  8. DISCRIMINATION AND CLASSIFICATION OF UXO USING MAGNETOMETRY: INVERSION AND ERROR

    E-Print Network [OSTI]

    Sambridge, Malcolm

    DISCRIMINATION AND CLASSIFICATION OF UXO USING MAGNETOMETRY: INVERSION AND ERROR ANALYSIS USING for the different solutions didn't even overlap. Introduction A discrimination and classification strategy ambiguity and possible remanent magnetization the recovered dipole moment is compared to a library

  9. Error Exponent for Discrete Memoryless Multiple-Access Channels

    E-Print Network [OSTI]

    Anastasopoulos, Achilleas

    Error Exponent for Discrete Memoryless Multiple-Access Channels by Ali Nazari A dissertation Bayraktar Associate Professor Jussi Keppo #12;c Ali Nazari 2011 All Rights Reserved #12;To my parents. ii Becky Turanski, Nancy Goings, Michele Feldkamp, Ann Pace, Karen Liska and Beth Lawson for efficiently

  10. Time reversal in thermoacoustic tomography - an error estimate

    E-Print Network [OSTI]

    Hristova, Yulia

    2008-01-01T23:59:59.000Z

    The time reversal method in thermoacoustic tomography is used for approximating the initial pressure inside a biological object using measurements of the pressure wave made outside the object. This article presents error estimates for the time reversal method in the cases of variable, non-trapping sound speeds.

  11. IPASS: Error Tolerant NMR Backbone Resonance Assignment by Linear Programming

    E-Print Network [OSTI]

    Waterloo, University of

    IPASS: Error Tolerant NMR Backbone Resonance Assignment by Linear Programming Babak Alipanahi1 automatically picked peaks. IPASS is proposed as a novel integer linear programming (ILP) based assignment assignment method. Although a variety of assignment approaches have been developed, none works well on noisy

  12. Research Article Preschool Speech Error Patterns Predict Articulation

    E-Print Network [OSTI]

    -age clinical outcomes. Many atypical speech sound errors in preschoolers may be indicative of weak phonological Outcomes in Children With Histories of Speech Sound Disorders Jonathan L. Preston,a,b Margaret Hull disorders (SSDs) predict articulation and phonological awareness (PA) outcomes almost 4 years later. Method

  13. Edinburgh Research Explorer Prevalence and Causes of Prescribing Errors

    E-Print Network [OSTI]

    Hall, Christopher

    of Prescribing Errors: The PRescribing Outcomes for Trainee Doctors Engaged in Clinical Training (PROTECT) Study: The PRescribing Outcomes for Trainee Doctors Engaged in Clinical Training (PROTECT) Study Cristi´n Ryan1 , Sarah Kingdom, 7 Health Psychology, University of Aberdeen, Aberdeen, United Kingdom, 8 Clinical Pharmacology

  14. Verification of unfold error estimates in the unfold operator code

    SciTech Connect (OSTI)

    Fehl, D.L.; Biggs, F. [Sandia National Laboratories, Albuquerque, New Mexico 87185 (United States)] [Sandia National Laboratories, Albuquerque, New Mexico 87185 (United States)

    1997-01-01T23:59:59.000Z

    Spectral unfolding is an inverse mathematical operation that attempts to obtain spectral source information from a set of response functions and data measurements. Several unfold algorithms have appeared over the past 30 years; among them is the unfold operator (UFO) code written at Sandia National Laboratories. In addition to an unfolded spectrum, the UFO code also estimates the unfold uncertainty (error) induced by estimated random uncertainties in the data. In UFO the unfold uncertainty is obtained from the error matrix. This built-in estimate has now been compared to error estimates obtained by running the code in a Monte Carlo fashion with prescribed data distributions (Gaussian deviates). In the test problem studied, data were simulated from an arbitrarily chosen blackbody spectrum (10 keV) and a set of overlapping response functions. The data were assumed to have an imprecision of 5{percent} (standard deviation). One hundred random data sets were generated. The built-in estimate of unfold uncertainty agreed with the Monte Carlo estimate to within the statistical resolution of this relatively small sample size (95{percent} confidence level). A possible 10{percent} bias between the two methods was unresolved. The Monte Carlo technique is also useful in underdetermined problems, for which the error matrix method does not apply. UFO has been applied to the diagnosis of low energy x rays emitted by Z-pinch and ion-beam driven hohlraums. {copyright} {ital 1997 American Institute of Physics.}

  15. Achievable Error Exponents for the Private Fingerprinting Game

    E-Print Network [OSTI]

    Merhav, Neri

    Achievable Error Exponents for the Private Fingerprinting Game Anelia Somekh-Baruch and Neri Merhav a forgery of the data while aiming at erasing the fingerprints in order not to be detected. Their action have presented and analyzed a game-theoretic model of private2 fingerprinting systems in the presence

  16. RESOLVE Upgrades for on Line Lattice Error Analysis

    SciTech Connect (OSTI)

    Lee, M.; Corbett, J.; White, G.; /SLAC; Zambre, Y.; /Unlisted

    2011-08-25T23:59:59.000Z

    We have increased the speed and versatility of the orbit analysis process by adding a command file, or 'script' language, to RESOLVE. This command file feature enables us to automate data analysis procedures to detect lattice errors. We describe the RESOLVE command file and present examples of practical applications.

  17. Stereoscopic Light Stripe Scanning: Interference Rejection, Error Minimization and Calibration

    E-Print Network [OSTI]

    This paper addresses the problem of rejecting interfer- ence due to secondary specular reflections, cross structure, acquisition delay, lack of error recovery, and incorrect modelling of measurement noise. We cause secondary reflections, edges and textures may have a stripe-like appearance, and cross-talk can

  18. Error Control Based Model Reduction for Parameter Optimization of Elliptic

    E-Print Network [OSTI]

    of technical devices that rely on multiscale processes, such as fuel cells or batteries. As the solutionError Control Based Model Reduction for Parameter Optimization of Elliptic Homogenization Problems optimization of elliptic multiscale problems with macroscopic optimization functionals and microscopic material

  19. Development of an Expert System for Classification of Medical Errors

    E-Print Network [OSTI]

    Kopec, Danny

    in the United States. There has been considerable speculation that these figures are either overestimated published by the Institute of Medicine (IOM) indicated that between 44,000 and 98,000 unnecessary deaths per in hospitals in the IOM report, what is of importance is that the number of deaths caused by such errors

  20. Odometry Error Covariance Estimation for Two Wheel Robot Vehicles

    E-Print Network [OSTI]

    Robotics Research Centre Department of Electrical and Computer Systems Engineering Monash University Technical Report MECSE-95-1 1995 ABSTRACT This technical report develops a simple statistical error model of the robot. Other paths can be composed of short segments of constant curvature arcs without great loss

  1. 2001 Special issue Associative memory in networks of spiking neurons

    E-Print Network [OSTI]

    Wennekers, Thomas

    of the network dynamics. The memory is displayed rhythmically, coded by phase-locked bursts or regular spikes activity and trigger a phase-locked association event within one gamma period. Unlike as under tonic of ef®cient retrieval varying the memory load, the excitation/inhibition parameters, and background

  2. Rosebud: A Place for Interaction between Memory, Story, and Self

    E-Print Network [OSTI]

    Nehaniv, Chrystopher

    as part of the human­computer interaction. Ullmer & Ishii [55] make a comparison between levels of stories, memories, and identity. We describe the cognitive, social, and psychological aspects of one, identity, stuffed animals, tangible interfaces, memory, children, education. Scenario Susan, an eight year

  3. Immune Inspired Memory Algorithms Applied to Unknown Motif Detection

    E-Print Network [OSTI]

    Aickelin, Uwe

    . Wilson, P. Birkin and U. Aickelin. Oil Price Trackers Inspired by Immune Memory. AISB 2006 Bristol, intuitive and meaningful manner. Motifs help identify relationships in the data and they can aid. W. O. Wilson, P. Birkin and U. Aickelin. Price Trackers Inspired by Im- mune Memory. 5th

  4. Software Verification for Weak Memory via Program Transformation

    E-Print Network [OSTI]

    Kröning, Daniel

    on a PowerPC cluster, due to the memory model. We study this bug in detail in Sec. 5. This observation handle the write atomicity relaxation of Power/ARM: generality remains a challenge. Since we want verification w.r.t. weak memory. We present experi- ments for a broad variety of models (from x86-TSO to Power

  5. Forgotten, but Not Gone: Recovering Memories of Emotional Stories

    E-Print Network [OSTI]

    Handy, Justin Dean

    2012-02-14T23:59:59.000Z

    FORGOTTEN, BUT NOT GONE: RECOVERING MEMORIES OF EMOTIONAL STORIES A Thesis by JUSTIN DEAN HANDY Submitted to the Office of Graduate Studies of Texas A&M University in partial fulfillment of the requirements for the degree... of MASTER OF SCIENCE December 2011 Major Subject: Psychology Forgotten, but Not Gone: Recovering Memories of Emotional Stories Copyright 2011 Justin Dean Handy FORGOTTEN, BUT NOT GONE...

  6. Silicon optical nanocrystal memory R. J. Walters,a)

    E-Print Network [OSTI]

    Atwater, Harry

    Silicon optical nanocrystal memory R. J. Walters,a) P. G. Kik, J. D. Casperson, and H. A. Atwater (Received 19 January 2004; accepted 22 July 2004) We describe the operation of a silicon optical nanocrystal memory device. The programmed logic state of the device is read optically by the detection of high or low

  7. Memory Scaling: A Systems Architecture Perspective Carnegie Mellon University

    E-Print Network [OSTI]

    @cmu.edu http://users.ece.cmu.edu/omutlu/ Abstract--The memory system is a fundamental performance and energy technology scaling challenges that make the maintenance and enhancement of its capacity, energy, whether they be server, embedded, desktop, mobile, sensor. Memory capacity, energy, cost, performance

  8. Business surveys modelling with Seasonal-Cyclical Long Memory models

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    Business surveys modelling with Seasonal-Cyclical Long Memory models Ferrara L. and Guégan D. 2nd business surveys released by the European Commission. We introduce an innovative way for modelling those linear models. Keywords: Euro area, nowcasting, business surveys, seasonal, long memory. JEL

  9. Word learning, phonological short-term memory, phonotactic probability and

    E-Print Network [OSTI]

    Gupta, Prahlad

    for thinking about various types of studies of word learning. We then review a number of themes that in recent as a useful organizing scheme for thinking about various types of studies of word learning. In §2, we reviewWord learning, phonological short-term memory, phonotactic probability and long-term memory

  10. ORIGINAL PAPER Prevention of cerebral ischemia-induced memory deficits

    E-Print Network [OSTI]

    memory impairment produced pharmacologically or genetically. Comparably, much less is known about4 activity in the hippocam- pus. Memory was examined using Morris water-maze and step-through passive avoidance tests in rats subjected to global cerebral ischemia with or without repeated treatment

  11. MEMORY DESIGN AND EXPLORATION FOR LOW POWER, EMBEDDED SYSTEMS

    E-Print Network [OSTI]

    Kambhampati, Subbarao

    by (i) applying memory optimizing transformations such as loop transformations, (ii) storing frequently transformations. In this paper, we describe a procedure for memory design and exploration for low power embedded optimizing transformations such as loop transformations. While there exists a large number of loop

  12. Performance Directed Energy Management for Main Memory and Disks #

    E-Print Network [OSTI]

    Zhou, Yuanyuan

    in the design of computing systems. For battery­operated mobile devices, energy consumption directly affects]. The storage hierarchy, which includes memory and disks, is a major energy consumer in computer systemsPerformance Directed Energy Management for Main Memory and Disks # Xiaodong Li, Zhenmin Li, Francis

  13. ESSES 2003 2003, Carla Schlatter Ellis Power-Aware Memory

    E-Print Network [OSTI]

    Ellis, Carla

    1 ESSES 2003© 2003, Carla Schlatter Ellis Power-Aware Memory Management 2ESSES 2003© 2003, Carla management · OS page allocation policies · Experimental results · Future work, open questions #12;2 3ESSES Allocation [ASPLOS00] ESSES 2003© 2003, Carla Schlatter Ellis Memory System Power Consumption · Laptop

  14. Algorithms and Data Representations for Emerging Non-Volatile Memories

    E-Print Network [OSTI]

    Li, Yue

    2014-04-29T23:59:59.000Z

    . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . vii LIST OF FIGURES . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . x LIST OF TABLES . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . xiii 1. INTRODUCTION... . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1 1.1 Basic Concepts of Flash Memory and PCM . . . . . . . . . . . . . . . . 2 1.2 Data Reliability Challenges for Flash Memory and PCM . . . . . . . . . 8 1.3 Overview of Research Directions . . . . . . . . . . . . . . . . . . . . . . 10 2...

  15. Quantum computing with nearest neighbor interactions and error rates over 1%

    E-Print Network [OSTI]

    David S. Wang; Austin G. Fowler; Lloyd C. L. Hollenberg

    2010-09-20T23:59:59.000Z

    Large-scale quantum computation will only be achieved if experimentally implementable quantum error correction procedures are devised that can tolerate experimentally achievable error rates. We describe a quantum error correction procedure that requires only a 2-D square lattice of qubits that can interact with their nearest neighbors, yet can tolerate quantum gate error rates over 1%. The precise maximum tolerable error rate depends on the error model, and we calculate values in the range 1.1--1.4% for various physically reasonable models. Even the lowest value represents the highest threshold error rate calculated to date in a geometrically constrained setting, and a 50% improvement over the previous record.

  16. Fault-tolerant logical gates in quantum error-correcting codes

    E-Print Network [OSTI]

    Fernando Pastawski; Beni Yoshida

    2014-08-07T23:59:59.000Z

    Recently, Bravyi and K\\"onig have shown that there is a tradeoff between fault-tolerantly implementable logical gates and geometric locality of stabilizer codes. They consider locality-preserving operations which are implemented by a constant depth geometrically local circuit and are thus fault-tolerant by construction. In particular, they shown that, for local stabilizer codes in D spatial dimensions, locality preserving gates are restricted to a set of unitary gates known as the D-th level of the Clifford hierarchy. In this paper, we elaborate this idea and provide several extensions and applications of their characterization in various directions. First, we present a new no-go theorem for self-correcting quantum memory. Namely, we prove that a three-dimensional stabilizer Hamiltonian with a locality-preserving implementation of a non-Clifford gate cannot have a macroscopic energy barrier. Second, we prove that the code distance of a D-dimensional local stabilizer code with non-trivial locality-preserving m-th level Clifford logical gate is upper bounded by $O(L^{D+1-m})$. For codes with non-Clifford gates (m>2), this improves the previous best bound by Bravyi and Terhal. Third we prove that a qubit loss threshold of codes with non-trivial transversal m-th level Clifford logical gate is upper bounded by 1/m. As such, no family of fault-tolerant codes with transversal gates in increasing level of the Clifford hierarchy may exist. This result applies to arbitrary stabilizer and subsystem codes, and is not restricted to geometrically-local codes. Fourth we extend the result of Bravyi and K\\"onig to subsystem codes. A technical difficulty is that, unlike stabilizer codes, the so-called union lemma does not apply to subsystem codes. This problem is avoided by assuming the presence of error threshold in a subsystem code, and the same conclusion as Bravyi-K\\"onig is recovered.

  17. Probabilistic growth of large entangled states with low error accumulation

    E-Print Network [OSTI]

    Yuichiro Matsuzaki; Simon C Benjamin; Joseph Fitzsimons

    2009-08-03T23:59:59.000Z

    The creation of complex entangled states, resources that enable quantum computation, can be achieved via simple 'probabilistic' operations which are individually likely to fail. However, typical proposals exploiting this idea carry a severe overhead in terms of the accumulation of errors. Here we describe an method that can rapidly generate large entangled states with an error accumulation that depends only logarithmically on the failure probability. We find that the approach may be practical for success rates in the sub-10% range, while ultimately becoming unfeasible at lower rates. The assumptions that we make, including parallelism and high connectivity, are appropriate for real systems including measurement-induced entanglement. This result therefore shows the feasibility for real devices based on such an approach.

  18. Method and system for reducing errors in vehicle weighing systems

    DOE Patents [OSTI]

    Hively, Lee M. (Philadelphia, TN); Abercrombie, Robert K. (Knoxville, TN)

    2010-08-24T23:59:59.000Z

    A method and system (10, 23) for determining vehicle weight to a precision of <0.1%, uses a plurality of weight sensing elements (23), a computer (10) for reading in weighing data for a vehicle (25) and produces a dataset representing the total weight of a vehicle via programming (40-53) that is executable by the computer (10) for (a) providing a plurality of mode parameters that characterize each oscillatory mode in the data due to movement of the vehicle during weighing, (b) by determining the oscillatory mode at which there is a minimum error in the weighing data; (c) processing the weighing data to remove that dynamical oscillation from the weighing data; and (d) repeating steps (a)-(c) until the error in the set of weighing data is <0.1% in the vehicle weight.

  19. On the Fourier Transform Approach to Quantum Error Control

    E-Print Network [OSTI]

    Hari Dilip Kumar

    2012-08-24T23:59:59.000Z

    Quantum codes are subspaces of the state space of a quantum system that are used to protect quantum information. Some common classes of quantum codes are stabilizer (or additive) codes, non-stabilizer (or non-additive) codes obtained from stabilizer codes, and Clifford codes. These are analyzed in a framework using the Fourier transform on finite groups, the finite group in question being a subgroup of the quantum error group considered. All the classes of codes that can be obtained in this framework are explored, including codes more general than Clifford codes. The error detection properties of one of these more general classes ("direct sums of translates of Clifford codes") are characterized. Examples codes are constructed, and computer code search results presented and analysed.

  20. Comparison of Wind Power and Load Forecasting Error Distributions: Preprint

    SciTech Connect (OSTI)

    Hodge, B. M.; Florita, A.; Orwig, K.; Lew, D.; Milligan, M.

    2012-07-01T23:59:59.000Z

    The introduction of large amounts of variable and uncertain power sources, such as wind power, into the electricity grid presents a number of challenges for system operations. One issue involves the uncertainty associated with scheduling power that wind will supply in future timeframes. However, this is not an entirely new challenge; load is also variable and uncertain, and is strongly influenced by weather patterns. In this work we make a comparison between the day-ahead forecasting errors encountered in wind power forecasting and load forecasting. The study examines the distribution of errors from operational forecasting systems in two different Independent System Operator (ISO) regions for both wind power and load forecasts at the day-ahead timeframe. The day-ahead timescale is critical in power system operations because it serves the unit commitment function for slow-starting conventional generators.

  1. On the efficiency of nondegenerate quantum error correction codes for Pauli channels

    E-Print Network [OSTI]

    Gunnar Bjork; Jonas Almlof; Isabel Sainz

    2009-05-19T23:59:59.000Z

    We examine the efficiency of pure, nondegenerate quantum-error correction-codes for Pauli channels. Specifically, we investigate if correction of multiple errors in a block is more efficient than using a code that only corrects one error per block. Block coding with multiple-error correction cannot increase the efficiency when the qubit error-probability is below a certain value and the code size fixed. More surprisingly, existing multiple-error correction codes with a code length equal or less than 256 qubits have lower efficiency than the optimal single-error correcting codes for any value of the qubit error-probability. We also investigate how efficient various proposed nondegenerate single-error correcting codes are compared to the limit set by the code redundancy and by the necessary conditions for hypothetically existing nondegenerate codes. We find that existing codes are close to optimal.

  2. Correlated bursts and the role of memory range

    E-Print Network [OSTI]

    Jo, Hang-Hyun; Kaski, Kimmo; Kertesz, Janos

    2015-01-01T23:59:59.000Z

    Inhomogeneous temporal processes in natural and social phenomena have been described by bursts that are rapidly occurring events within short time periods alternating with long periods of low activity. In addition to the analysis of heavy-tailed inter-event time distributions, higher-order correlations between inter-event times, called \\emph{correlated bursts}, have been studied only recently. As the possible mechanisms underlying such correlated bursts are far from being fully understood, we devise a simple model for correlated bursts by using a self-exciting point process with variable memory range. Here the probability that a new event occurs is determined by a memory function that is the sum of decaying memories of the past events. In order to incorporate the noise and/or limited memory capacity of systems, we apply two memory loss mechanisms, namely either fixed number or variable number of memories. By using theoretical analysis and numerical simulations we find that excessive amount of memory effect ma...

  3. Scaling behavior of discretization errors in renormalization and improvement constants

    E-Print Network [OSTI]

    Bhattacharya, T; Lee, W; Sharpe, S R; Bhattacharya, Tanmoy; Gupta, Rajan; Lee, Weonjong; Sharpe, Stephen R.

    2006-01-01T23:59:59.000Z

    Non-perturbative results for improvement and renormalization constants needed for on-shell and off-shell O(a) improvement of bilinear operators composed of Wilson fermions are presented. The calculations have been done in the quenched approximation at beta=6.0, 6.2 and 6.4. To quantify residual discretization errors we compare our data with results from other non-perturbative calculations and with one-loop perturbation theory.

  4. Error message recording and reporting in the SLC control system

    SciTech Connect (OSTI)

    Spencer, N.; Bogart, J.; Phinney, N.; Thompson, K.

    1985-04-01T23:59:59.000Z

    Error or information messages that are signaled by control software either in the VAX host computer or the local microprocessor clusters are handled by a dedicated VAX process (PARANOIA). Messages are recorded on disk for further analysis and displayed at the appropriate console. Another VAX process (ERRLOG) can be used to sort, list and histogram various categories of messages. The functions performed by these processes and the algorithms used are discussed.

  5. Error message recording and reporting in the SLC control system

    SciTech Connect (OSTI)

    Spencer, N.; Bogart, J.; Phinney, N.; Thompson, K.

    1985-10-01T23:59:59.000Z

    Error or information messages that are signaled by control software either in the VAX host computer or the local microprocessor clusters are handled by a dedicated VAX process (PARANOIA). Messages are recorded on disk for further analysis and displayed at the appropriate console. Another VAX process (ERRLOG) can be used to sort, list and histogram various categories of messages. The functions performed by these processes and the algorithms used are discussed.

  6. Topics in measurement error and missing data problems

    E-Print Network [OSTI]

    Liu, Lian

    2009-05-15T23:59:59.000Z

    reasons. In this research, the impact of missing genotypes is investigated for high resolution combined linkage and association mapping of quantitative trait loci (QTL). We assume that the genotype data are missing completely at random (MCAR). Two... and asymptotic properties. In the genetics study, a new method is proposed to account for the missing genotype in a combined linkage and association study. We have concluded that this method does not improve power but it will provide better type I error rates...

  7. Serotoninmushroom body circuit modulating the formation of anesthesia-resistant memory

    E-Print Network [OSTI]

    Huang, Haimei

    Serotonin­mushroom body circuit modulating the formation of anesthesia-resistant memory in Drosophila produces two genetically distinct forms of intermediate-term memories: anesthesia-sensitive memory, which requires the amnesiac gene, and anesthesia- resistant memory (ARM), which requires the radish gene

  8. Identification of Quaternary Shape Memory Alloys with Near-Zero Thermal Hysteresis and Unprecedented

    E-Print Network [OSTI]

    Rubloff, Gary W.

    Identification of Quaternary Shape Memory Alloys with Near-Zero Thermal Hysteresis the class of materials showing a reversible martensitic phase transformation and a shape memory effect (SME fatigue of shape memory alloys (SMAs) resulting in changes of physical, mechan- ical, and shape memory (SM

  9. THE EFFECTS OF LASER FORMING ON SUPERELASTIC NITI SHAPE MEMORY ALLOYS Paper # P529

    E-Print Network [OSTI]

    Yao, Y. Lawrence

    THE EFFECTS OF LASER FORMING ON SUPERELASTIC NITI SHAPE MEMORY ALLOYS Paper # P529 Andrew J Abstract This work focuses on application of the laser forming process to NiTi shape memory alloys. While all NiTi shape memory alloys exhibit both superlasticity and the shape memory effect, this study

  10. Behavior and modeling of superelastic shape memory alloy reinforced concrete beams

    E-Print Network [OSTI]

    Vecchio, Frank J.

    Behavior and modeling of superelastic shape memory alloy reinforced concrete beams Alaa Abdulridha analysis a b s t r a c t The re-centering phenomenon of superelastic Shape Memory Alloy (SMA) reinforced as Shape Memory Alloys (SMAs) has emerged in the research community. Shape memory al- loys have the ability

  11. Age Differences in the Frontal Lateralization of Verbal and Spatial Working Memory

    E-Print Network [OSTI]

    working memory in the human brain (Petrides, Alivisatos, Meyer, & Evans, 1993; Smith & Jonides, 1998; cf

  12. Estimating the error in simulation prediction over the design space

    SciTech Connect (OSTI)

    Shinn, R. (Rachel); Hemez, F. M. (François M.); Doebling, S. W. (Scott W.)

    2003-01-01T23:59:59.000Z

    This study addresses the assessrnent of accuracy of simulation predictions. A procedure is developed to validate a simple non-linear model defined to capture the hardening behavior of a foam material subjected to a short-duration transient impact. Validation means that the predictive accuracy of the model must be established, not just in the vicinity of a single testing condition, but for all settings or configurations of the system. The notion of validation domain is introduced to designate the design region where the model's predictive accuracy is appropriate for the application of interest. Techniques brought to bear to assess the model's predictive accuracy include test-analysis coi-relation, calibration, bootstrapping and sampling for uncertainty propagation and metamodeling. The model's predictive accuracy is established by training a metalnodel of prediction error. The prediction error is not assumed to be systcmatic. Instead, it depends on which configuration of the system is analyzed. Finally, the prediction error's confidence bounds are estimated by propagating the uncertainty associated with specific modeling assumptions.

  13. Direct memory access transfer completion notification

    DOE Patents [OSTI]

    Chen, Dong (Croton on Hudson, NY); Giampapa, Mark E. (Irvington, NY); Heidelberger, Philip (Cortlandt Manor, NY); Kumar, Sameer (White Plains, NY); Parker, Jeffrey J. (Rochester, MN); Steinmacher-Burow, Burkhard D. (Esslingen, DE); Vranas, Pavlos (Danville, CA)

    2010-07-27T23:59:59.000Z

    Methods, compute nodes, and computer program products are provided for direct memory access (`DMA`) transfer completion notification. Embodiments include determining, by an origin DMA engine on an origin compute node, whether a data descriptor for an application message to be sent to a target compute node is currently in an injection first-in-first-out (`FIFO`) buffer in dependence upon a sequence number previously associated with the data descriptor, the total number of descriptors currently in the injection FIFO buffer, and the current sequence number for the newest data descriptor stored in the injection FIFO buffer; and notifying a processor core on the origin DMA engine that the message has been sent if the data descriptor for the message is not currently in the injection FIFO buffer.

  14. Direct memory access transfer completion notification

    DOE Patents [OSTI]

    Archer, Charles J. (Rochester, MN); Blocksome, Michael A. (Rochester, MN); Parker, Jeffrey J. (Rochester, MN)

    2011-02-15T23:59:59.000Z

    DMA transfer completion notification includes: inserting, by an origin DMA engine on an origin node in an injection first-in-first-out (`FIFO`) buffer, a data descriptor for an application message to be transferred to a target node on behalf of an application on the origin node; inserting, by the origin DMA engine, a completion notification descriptor in the injection FIFO buffer after the data descriptor for the message, the completion notification descriptor specifying a packet header for a completion notification packet; transferring, by the origin DMA engine to the target node, the message in dependence upon the data descriptor; sending, by the origin DMA engine, the completion notification packet to a local reception FIFO buffer using a local memory FIFO transfer operation; and notifying, by the origin DMA engine, the application that transfer of the message is complete in response to receiving the completion notification packet in the local reception FIFO buffer.

  15. Memory device using movement of protons

    DOE Patents [OSTI]

    Warren, William L. (900 N. Randolph St., Arlington, VA 22203); Vanheusden, Karel J. R. (8401 Spain Rd., Albuquerque, NM 87111); Fleetwood, Daniel M. (5513 Estrellita del Norte, NE., Albuquerque, NM 87111); Devine, Roderick A. B. (12 Impasse de la Liberation, 38950 St. Martin le Vinoux, FR); Archer, Leo B. (3108 Vicky Ct., Garland, TX 75044); Brown, George A. (1512 Ridgeview Dr., Arlington, TX 76012-1940); Wallace, Robert M. (428 Park Bend Dr., Richardson, TX 75081)

    2000-01-01T23:59:59.000Z

    An enhancement of an electrically written memory element utilizing the motion of protons within a dielectric layer surrounded by layers on either side to confine the protons within the dielectric layer with electrode means attached to the surrounding layers to change the spatial position of the protons within the dielectric layer. The device is preferably constructed as a silicon-silicon dioxide-silicon layered structure with the protons being introduced to the structure during an anneal in an atmosphere containing hydrogen gas. Device operation is enhanced by concluding this anneal step with a sudden cooling. The device operates at low power, is preferably nonvolatile, is radiation tolerant, and is compatible with convention silicon MOS processing for integration with other microelectronics elements on the same silicon substrate.

  16. Solid state engine using nitinol memory alloy

    DOE Patents [OSTI]

    Golestaneh, Ahmad A. (Bolingbrook, IL)

    1981-01-01T23:59:59.000Z

    A device for converting heat energy to mechanical energy includes a reservoir of a hot fluid and a rotor assembly mounted thereabove so a portion of it dips into the hot fluid. The rotor assembly may include a shaft having four spokes extending radially outwardly therefrom at right angles to each other, a floating ring and four flexible elements composed of a thermal memory material having a critical temperature between the temperature of the hot fluid and that of the ambient atmosphere extending between the ends of the spokes and the floating ring. Preferably, the flexible elements are attached to the floating ring through curved leaf springs. Energetic shape recovery of the flexible elements in the hot fluid causes the rotor assembly to rotate.

  17. Release mechanism utilizing shape memory polymer material

    DOE Patents [OSTI]

    Lee, Abraham P. (Walnut Creek, CA); Northrup, M. Allen (Berkeley, CA); Ciarlo, Dino R. (Livermore, CA); Krulevitch, Peter A. (Pleasanton, CA); Benett, William J. (Livermore, CA)

    2000-01-01T23:59:59.000Z

    Microfabricated therapeutic actuators are fabricated using a shape memory polymer (SMP), a polyurethane-based material that undergoes a phase transformation at a specified temperature (Tg). At a temperature above temperature Tg material is soft and can be easily reshaped into another configuration. As the temperature is lowered below temperature Tg the new shape is fixed and locked in as long as the material stays below temperature Tg. Upon reheating the material to a temperature above Tg, the material will return to its original shape. By the use of such SMP material, SMP microtubing can be used as a release actuator for the delivery of embolic coils through catheters into aneurysms, for example. The microtubing can be manufactured in various sizes and the phase change temperature Tg is determinate for an intended temperature target and intended use.

  18. Remote direct memory access over datagrams

    DOE Patents [OSTI]

    Grant, Ryan Eric; Rashti, Mohammad Javad; Balaji, Pavan; Afsahi, Ahmad

    2014-12-02T23:59:59.000Z

    A communication stack for providing remote direct memory access (RDMA) over a datagram network is disclosed. The communication stack has a user level interface configured to accept datagram related input and communicate with an RDMA enabled network interface card (NIC) via an NIC driver. The communication stack also has an RDMA protocol layer configured to supply one or more data transfer primitives for the datagram related input of the user level. The communication stack further has a direct data placement (DDP) layer configured to transfer the datagram related input from a user storage to a transport layer based on the one or more data transfer primitives by way of a lower layer protocol (LLP) over the datagram network.

  19. Solid state engine using nitinol memory alloy

    DOE Patents [OSTI]

    Golestaneh, A.A.

    1980-01-21T23:59:59.000Z

    A device for converting heat energy to mechanical energy includes a reservoir of a hot fluid and a rotor assembly mounted thereabove so a portion of it dips into the hot fluid. The rotor assembly may include a shaft having four spokes extending radially outwardly therefrom at right angles to each other, a floating ring and four flexible elements composed of a thermal memory material having a critical temperature between the temperature of the hot fluid and that of the ambient atmosphere extending between the ends of the spokes and the floating ring. Preferably, the flexible elements are attached to the floating ring through curved leaf springs. Energetic shape recovery of the flexible elements in the hot fluid causes the rotor assembly to rotate.

  20. Hardware support for collecting performance counters directly to memory

    DOE Patents [OSTI]

    Gara, Alan; Salapura, Valentina; Wisniewski, Robert W.

    2012-09-25T23:59:59.000Z

    Hardware support for collecting performance counters directly to memory, in one aspect, may include a plurality of performance counters operable to collect one or more counts of one or more selected activities. A first storage element may be operable to store an address of a memory location. A second storage element may be operable to store a value indicating whether the hardware should begin copying. A state machine may be operable to detect the value in the second storage element and trigger hardware copying of data in selected one or more of the plurality of performance counters to the memory location whose address is stored in the first storage element.