National Library of Energy BETA

Sample records for network node manager

  1. U-229: HP Network Node Manager i Input Validation Flaw Permits Cross-Site Scripting Attacks

    Broader source: Energy.gov [DOE]

    Potential security vulnerabilities have been identified with HP Network Node Manager i (NNMi) for HP-UX, Linux, Solaris, and Windows. The vulnerabilities could be remotely exploited resulting in cross site scripting (XSS).

  2. U-204: HP Network Node Manager i Input Validation Hole Permits Cross-Site Scripting Attacks

    Broader source: Energy.gov [DOE]

    Potential security vulnerabilities have been identified with HP Network Node Manager I (NNMi) for HP-UX, Linux, Solaris, and Windows. The vulnerabilities could be remotely exploited resulting in cross site scripting (XSS).

  3. Reconfigureable network node

    DOE Patents [OSTI]

    Vanderveen, Keith B. (Tracy, CA); Talbot, Edward B. (Livermore, CA); Mayer, Laurence E. (Davis, CA)

    2008-04-08

    Nodes in a network having a plurality of nodes establish communication links with other nodes using available transmission media, as the ability to establish such links becomes available and desirable. The nodes predict when existing communications links will fail, become overloaded or otherwise degrade network effectiveness and act to establish substitute or additional links before the node's ability to communicate with the other nodes on the network is adversely affected. A node stores network topology information and programmed link establishment rules and criteria. The node evaluates characteristics that predict existing links with other nodes becoming unavailable or degraded. The node then determines whether it can form a communication link with a substitute node, in order to maintain connectivity with the network. When changing its communication links, a node broadcasts that information to the network. Other nodes update their stored topology information and consider the updated topology when establishing new communications links for themselves.

  4. Modular sensor network node

    DOE Patents [OSTI]

    Davis, Jesse Harper Zehring; Stark, Jr., Douglas Paul; Kershaw, Christopher Patrick; Kyker, Ronald Dean

    2008-06-10

    A distributed wireless sensor network node is disclosed. The wireless sensor network node includes a plurality of sensor modules coupled to a system bus and configured to sense a parameter. The parameter may be an object, an event or any other parameter. The node collects data representative of the parameter. The node also includes a communication module coupled to the system bus and configured to allow the node to communicate with other nodes. The node also includes a processing module coupled to the system bus and adapted to receive the data from the sensor module and operable to analyze the data. The node also includes a power module connected to the system bus and operable to generate a regulated voltage.

  5. Support Nodes

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Support Nodes Support Nodes xe6blade.png Hopper has nodes connected to the internal Gemini network that provide functions that support the compute nodes. These include job launch nodes (MOM nodes), Lustre router nodes, DVS nodes, networking nodes and nodes that support shared and dynamic libraries. MOM Nodes (On Compute Blades) manage and launch parallel applications execute job scripts 24 nodes 32 GB of memory per node Lustre Router Nodes (Service Nodes) route IO data to the /scratch file

  6. IEEE 342 Node Low Voltage Networked Test System

    SciTech Connect (OSTI)

    Schneider, Kevin P.; Phanivong, Phillippe K.; Lacroix, Jean-Sebastian

    2014-07-31

    The IEEE Distribution Test Feeders provide a benchmark for new algorithms to the distribution analyses community. The low voltage network test feeder represents a moderate size urban system that is unbalanced and highly networked. This is the first distribution test feeder developed by the IEEE that contains unbalanced networked components. The 342 node Low Voltage Networked Test System includes many elements that may be found in a networked system: multiple 13.2kV primary feeders, network protectors, a 120/208V grid network, and multiple 277/480V spot networks. This paper presents a brief review of the history of low voltage networks and how they evolved into the modern systems. This paper will then present a description of the 342 Node IEEE Low Voltage Network Test System and power flow results.

  7. Neural node network and model, and method of teaching same

    DOE Patents [OSTI]

    Parlos, A.G.; Atiya, A.F.; Fernandez, B.; Tsai, W.K.; Chong, K.T.

    1995-12-26

    The present invention is a fully connected feed forward network that includes at least one hidden layer. The hidden layer includes nodes in which the output of the node is fed back to that node as an input with a unit delay produced by a delay device occurring in the feedback path (local feedback). Each node within each layer also receives a delayed output (crosstalk) produced by a delay unit from all the other nodes within the same layer. The node performs a transfer function operation based on the inputs from the previous layer and the delayed outputs. The network can be implemented as analog or digital or within a general purpose processor. Two teaching methods can be used: (1) back propagation of weight calculation that includes the local feedback and the crosstalk or (2) more preferably a feed forward gradient decent which immediately follows the output computations and which also includes the local feedback and the crosstalk. Subsequent to the gradient propagation, the weights can be normalized, thereby preventing convergence to a local optimum. Education of the network can be incremental both on and off-line. An educated network is suitable for modeling and controlling dynamic nonlinear systems and time series systems and predicting the outputs as well as hidden states and parameters. The educated network can also be further educated during on-line processing. 21 figs.

  8. Neural node network and model, and method of teaching same

    DOE Patents [OSTI]

    Parlos, Alexander G.; Atiya, Amir F.; Fernandez, Benito; Tsai, Wei K.; Chong, Kil T.

    1995-01-01

    The present invention is a fully connected feed forward network that includes at least one hidden layer 16. The hidden layer 16 includes nodes 20 in which the output of the node is fed back to that node as an input with a unit delay produced by a delay device 24 occurring in the feedback path 22 (local feedback). Each node within each layer also receives a delayed output (crosstalk) produced by a delay unit 36 from all the other nodes within the same layer 16. The node performs a transfer function operation based on the inputs from the previous layer and the delayed outputs. The network can be implemented as analog or digital or within a general purpose processor. Two teaching methods can be used: (1) back propagation of weight calculation that includes the local feedback and the crosstalk or (2) more preferably a feed forward gradient decent which immediately follows the output computations and which also includes the local feedback and the crosstalk. Subsequent to the gradient propagation, the weights can be normalized, thereby preventing convergence to a local optimum. Education of the network can be incremental both on and off-line. An educated network is suitable for modeling and controlling dynamic nonlinear systems and time series systems and predicting the outputs as well as hidden states and parameters. The educated network can also be further educated during on-line processing.

  9. The Network Completion Problem: Inferring Missing Nodes and Edges in Networks

    SciTech Connect (OSTI)

    Kim, M; Leskovec, J

    2011-11-14

    Network structures, such as social networks, web graphs and networks from systems biology, play important roles in many areas of science and our everyday lives. In order to study the networks one needs to first collect reliable large scale network data. While the social and information networks have become ubiquitous, the challenge of collecting complete network data still persists. Many times the collected network data is incomplete with nodes and edges missing. Commonly, only a part of the network can be observed and we would like to infer the unobserved part of the network. We address this issue by studying the Network Completion Problem: Given a network with missing nodes and edges, can we complete the missing part? We cast the problem in the Expectation Maximization (EM) framework where we use the observed part of the network to fit a model of network structure, and then we estimate the missing part of the network using the model, re-estimate the parameters and so on. We combine the EM with the Kronecker graphs model and design a scalable Metropolized Gibbs sampling approach that allows for the estimation of the model parameters as well as the inference about missing nodes and edges of the network. Experiments on synthetic and several real-world networks show that our approach can effectively recover the network even when about half of the nodes in the network are missing. Our algorithm outperforms not only classical link-prediction approaches but also the state of the art Stochastic block modeling approach. Furthermore, our algorithm easily scales to networks with tens of thousands of nodes.

  10. Error recovery to enable error-free message transfer between nodes of a computer network

    DOE Patents [OSTI]

    Blumrich, Matthias A.; Coteus, Paul W.; Chen, Dong; Gara, Alan; Giampapa, Mark E.; Heidelberger, Philip; Hoenicke, Dirk; Takken, Todd; Steinmacher-Burow, Burkhard; Vranas, Pavlos M.

    2016-01-26

    An error-recovery method to enable error-free message transfer between nodes of a computer network. A first node of the network sends a packet to a second node of the network over a link between the nodes, and the first node keeps a copy of the packet on a sending end of the link until the first node receives acknowledgment from the second node that the packet was received without error. The second node tests the packet to determine if the packet is error free. If the packet is not error free, the second node sets a flag to mark the packet as corrupt. The second node returns acknowledgement to the first node specifying whether the packet was received with or without error. When the packet is received with error, the link is returned to a known state and the packet is sent again to the second node.

  11. Scheduling applications for execution on a plurality of compute nodes of a parallel computer to manage temperature of the nodes during execution

    DOE Patents [OSTI]

    Archer, Charles J; Blocksome, Michael A; Peters, Amanda E; Ratterman, Joseph D; Smith, Brian E

    2012-10-16

    Methods, apparatus, and products are disclosed for scheduling applications for execution on a plurality of compute nodes of a parallel computer to manage temperature of the plurality of compute nodes during execution that include: identifying one or more applications for execution on the plurality of compute nodes; creating a plurality of physically discontiguous node partitions in dependence upon temperature characteristics for the compute nodes and a physical topology for the compute nodes, each discontiguous node partition specifying a collection of physically adjacent compute nodes; and assigning, for each application, that application to one or more of the discontiguous node partitions for execution on the compute nodes specified by the assigned discontiguous node partitions.

  12. Determining a bisection bandwidth for a multi-node data communications network

    DOE Patents [OSTI]

    Faraj, Ahmad A.

    2010-01-26

    Methods, systems, and products are disclosed for determining a bisection bandwidth for a multi-node data communications network that include: partitioning nodes in the network into a first sub-network and a second sub-network in dependence upon a topology of the network; sending, by each node in the first sub-network to a destination node in the second sub-network, a first message having a predetermined message size; receiving, by each node in the first sub-network from a source node in the second sub-network, a second message; measuring, by each node in the first sub-network, the elapsed communications time between the sending of the first message and the receiving of the second message; selecting the longest elapsed communications time; and calculating the bisection bandwidth for the network in dependence upon the number of the nodes in the first sub-network, the predetermined message size of the first test message, and the longest elapsed communications time.

  13. Lambda network having 2.sup.m-1 nodes in each of m stages with each node coupled to four other nodes for bidirectional routing of data packets between nodes

    DOE Patents [OSTI]

    Napolitano, Jr., Leonard M.

    1995-01-01

    The Lambda network is a single stage, packet-switched interprocessor communication network for a distributed memory, parallel processor computer. Its design arises from the desired network characteristics of minimizing mean and maximum packet transfer time, local routing, expandability, deadlock avoidance, and fault tolerance. The network is based on fixed degree nodes and has mean and maximum packet transfer distances where n is the number of processors. The routing method is detailed, as are methods for expandability, deadlock avoidance, and fault tolerance.

  14. Wireless Sensor Networks - Node Localization for Various Industry Problems

    SciTech Connect (OSTI)

    Derr, Kurt; Manic, Milos

    2015-06-01

    Fast, effective monitoring following airborne releases of toxic substances is critical to mitigate risks to threatened population areas. Wireless sensor nodes at fixed predetermined locations may monitor such airborne releases and provide early warnings to the public. A challenging algorithmic problem is determining the locations to place these sensor nodes while meeting several criteria: 1) provide complete coverage of the domain, and 2) create a topology with problem dependent node densities, while 3) minimizing the number of sensor nodes. This manuscript presents a novel approach to determining optimal sensor placement, Advancing Front mEsh generation with Constrained dElaunay Triangulation and Smoothing (AFECETS) that addresses these criteria. A unique aspect of AFECETS is the ability to determine wireless sensor node locations for areas of high interest (hospitals, schools, high population density areas) that require higher density of nodes for monitoring environmental conditions, a feature that is difficult to find in other research work. The AFECETS algorithm was tested on several arbitrary shaped domains. AFECETS simulation results show that the algorithm 1) provides significant reduction in the number of nodes, in some cases over 40%, compared to an advancing front mesh generation algorithm, 2) maintains and improves optimal spacing between nodes, and 3) produces simulation run times suitable for real-time applications.

  15. Wireless Sensor Networks - Node Localization for Various Industry Problems

    DOE Public Access Gateway for Energy & Science Beta (PAGES Beta)

    Derr, Kurt; Manic, Milos

    2015-06-01

    Fast, effective monitoring following airborne releases of toxic substances is critical to mitigate risks to threatened population areas. Wireless sensor nodes at fixed predetermined locations may monitor such airborne releases and provide early warnings to the public. A challenging algorithmic problem is determining the locations to place these sensor nodes while meeting several criteria: 1) provide complete coverage of the domain, and 2) create a topology with problem dependent node densities, while 3) minimizing the number of sensor nodes. This manuscript presents a novel approach to determining optimal sensor placement, Advancing Front mEsh generation with Constrained dElaunay Triangulation and Smoothingmore » (AFECETS) that addresses these criteria. A unique aspect of AFECETS is the ability to determine wireless sensor node locations for areas of high interest (hospitals, schools, high population density areas) that require higher density of nodes for monitoring environmental conditions, a feature that is difficult to find in other research work. The AFECETS algorithm was tested on several arbitrary shaped domains. AFECETS simulation results show that the algorithm 1) provides significant reduction in the number of nodes, in some cases over 40%, compared to an advancing front mesh generation algorithm, 2) maintains and improves optimal spacing between nodes, and 3) produces simulation run times suitable for real-time applications.« less

  16. System and method for merging clusters of wireless nodes in a wireless network

    DOE Patents [OSTI]

    Budampati, Ramakrishna S.; Gonia, Patrick S.; Kolavennu, Soumitri N.; Mahasenan, Arun V.

    2012-05-29

    A system includes a first cluster having multiple first wireless nodes. One first node is configured to act as a first cluster master, and other first nodes are configured to receive time synchronization information provided by the first cluster master. The system also includes a second cluster having one or more second wireless nodes. One second node is configured to act as a second cluster master, and any other second nodes configured to receive time synchronization information provided by the second cluster master. The system further includes a manager configured to merge the clusters into a combined cluster. One of the nodes is configured to act as a single cluster master for the combined cluster, and the other nodes are configured to receive time synchronization information provided by the single cluster master.

  17. Synchronization in node of complex networks consist of complex chaotic system

    SciTech Connect (OSTI)

    Wei, Qiang, E-mail: qiangweibeihua@163.com [Beihua University computer and technology College, BeiHua University, Jilin, 132021, Jilin (China); Digital Images Processing Institute of Beihua University, BeiHua University, Jilin, 132011, Jilin (China); Faculty of Electronic Information and Electrical Engineering, Dalian University of Technology, Dalian, 116024 (China); Xie, Cheng-jun [Beihua University computer and technology College, BeiHua University, Jilin, 132021, Jilin (China); Digital Images Processing Institute of Beihua University, BeiHua University, Jilin, 132011, Jilin (China); Liu, Hong-jun [School of Information Engineering, Weifang Vocational College, Weifang, 261041 (China); Li, Yan-hui [The Library, Weifang Vocational College, Weifang, 261041 (China)

    2014-07-15

    A new synchronization method is investigated for node of complex networks consists of complex chaotic system. When complex networks realize synchronization, different component of complex state variable synchronize up to different scaling complex function by a designed complex feedback controller. This paper change synchronization scaling function from real field to complex field for synchronization in node of complex networks with complex chaotic system. Synchronization in constant delay and time-varying coupling delay complex networks are investigated, respectively. Numerical simulations are provided to show the effectiveness of the proposed method.

  18. Lambda network having 2{sup m{minus}1} nodes in each of m stages with each node coupled to four other nodes for bidirectional routing of data packets between nodes

    DOE Patents [OSTI]

    Napolitano, L.M. Jr.

    1995-11-28

    The Lambda network is a single stage, packet-switched interprocessor communication network for a distributed memory, parallel processor computer. Its design arises from the desired network characteristics of minimizing mean and maximum packet transfer time, local routing, expandability, deadlock avoidance, and fault tolerance. The network is based on fixed degree nodes and has mean and maximum packet transfer distances where n is the number of processors. The routing method is detailed, as are methods for expandability, deadlock avoidance, and fault tolerance. 14 figs.

  19. Minimally buffered data transfers between nodes in a data communications network

    DOE Patents [OSTI]

    Miller, Douglas R.

    2015-06-23

    Methods, apparatus, and products for minimally buffered data transfers between nodes in a data communications network are disclosed that include: receiving, by a messaging module on an origin node, a storage identifier, a origin data type, and a target data type, the storage identifier specifying application storage containing data, the origin data type describing a data subset contained in the origin application storage, the target data type describing an arrangement of the data subset in application storage on a target node; creating, by the messaging module, origin metadata describing the origin data type; selecting, by the messaging module from the origin application storage in dependence upon the origin metadata and the storage identifier, the data subset; and transmitting, by the messaging module to the target node, the selected data subset for storing in the target application storage in dependence upon the target data type without temporarily buffering the data subset.

  20. Providing full point-to-point communications among compute nodes of an operational group in a global combining network of a parallel computer

    DOE Patents [OSTI]

    Archer, Charles J; Faraj, Ahmad A; Inglett, Todd A; Ratterman, Joseph D

    2013-04-16

    Methods, apparatus, and products are disclosed for providing full point-to-point communications among compute nodes of an operational group in a global combining network of a parallel computer, each compute node connected to each adjacent compute node in the global combining network through a link, that include: receiving a network packet in a compute node, the network packet specifying a destination compute node; selecting, in dependence upon the destination compute node, at least one of the links for the compute node along which to forward the network packet toward the destination compute node; and forwarding the network packet along the selected link to the adjacent compute node connected to the compute node through the selected link.

  1. Providing nearest neighbor point-to-point communications among compute nodes of an operational group in a global combining network of a parallel computer

    DOE Patents [OSTI]

    Archer, Charles J.; Faraj, Ahmad A.; Inglett, Todd A.; Ratterman, Joseph D.

    2012-10-23

    Methods, apparatus, and products are disclosed for providing nearest neighbor point-to-point communications among compute nodes of an operational group in a global combining network of a parallel computer, each compute node connected to each adjacent compute node in the global combining network through a link, that include: identifying each link in the global combining network for each compute node of the operational group; designating one of a plurality of point-to-point class routing identifiers for each link such that no compute node in the operational group is connected to two adjacent compute nodes in the operational group with links designated for the same class routing identifiers; and configuring each compute node of the operational group for point-to-point communications with each adjacent compute node in the global combining network through the link between that compute node and that adjacent compute node using that link's designated class routing identifier.

  2. Information-based self-organization of sensor nodes of a sensor network

    DOE Patents [OSTI]

    Ko, Teresa H.; Berry, Nina M.

    2011-09-20

    A sensor node detects a plurality of information-based events. The sensor node determines whether at least one other sensor node is an information neighbor of the sensor node based on at least a portion of the plurality of information-based events. The information neighbor has an overlapping field of view with the sensor node. The sensor node sends at least one communication to the at least one other sensor node that is an information neighbor of the sensor node in response to at least one information-based event of the plurality of information-based events.

  3. Configuring compute nodes of a parallel computer in an operational group into a plurality of independent non-overlapping collective networks

    DOE Patents [OSTI]

    Archer, Charles J.; Inglett, Todd A.; Ratterman, Joseph D.; Smith, Brian E.

    2010-03-02

    Methods, apparatus, and products are disclosed for configuring compute nodes of a parallel computer in an operational group into a plurality of independent non-overlapping collective networks, the compute nodes in the operational group connected together for data communications through a global combining network, that include: partitioning the compute nodes in the operational group into a plurality of non-overlapping subgroups; designating one compute node from each of the non-overlapping subgroups as a master node; and assigning, to the compute nodes in each of the non-overlapping subgroups, class routing instructions that organize the compute nodes in that non-overlapping subgroup as a collective network such that the master node is a physical root.

  4. A Robust and Flexible Design for GCEP Unattended Online Enrichment Monitoring: An OLEM Collection Node Network

    SciTech Connect (OSTI)

    Younkin, James R; March-Leuba, Jose A; Garner, James R

    2013-01-01

    Oak Ridge National Laoratory (ORNL) has engineered an on-line enrichment monitor (OLEM) to continuously measure U-235 emissions from the UF6 gas flowing through a unit header pipe of a gas centrifuge enrichment plant (GCEP) as a component of the International Atomic Energy Agency s (IAEA) new generation of technology to support enrichment plant safeguards1. In contrast to other enrichment monitoring approaches, OLEM calibrates and corrects for the pressure and temperature dependent UF6 gas-density without external radiation sources by using the inherent unit header pipe pressure dynamics and combining U-235 gamma-ray spectrometery using a shielded NaI detector with gas pressure and temperature data near the spectrum measurement point to obtain the enrichment of the gas as a function of time. From a safeguards perspective, OLEM can provide early detection of a GCEP being misused for production of highly enriched uranium, but would not detect directly the isolation and use of a cascade within the production unit to produce HEU. OLEM may also reduce the number of samples collected for destructive assay and, if coupled with load cell monitoring, could support isotope mass balance verification and unattended cylinder verification. The earlier paper presented OLEM as one component along with shared load cells and unattended cylinder verification, in the IAEA emering toolbox for unattended instruments at GCEPs1 and described the OLEM concept and how previous modeling studies and field measurements helped confirm the viability of a passive on-line enrichment monitor for meeting IAEA objectives and to support the development of performance targets. Phase I of the United States Support Program (USSP) OLEM project completed a preliminary hardware, software and communications design; phase II will build and test field prototypes in controlled laboratory settings and then at an operational facility. That paper also discussed many of the OLEM collection node commercial off the shelf (COTS) components and summarized the OLEM collection node data security provisions. This paper will discuss a secure and redundant network of OLEM collection nodes, auxiliary detection units and supporting junction boxes distributed throughout a facility for monitoring enrichment on product, feed and tails unit header pipes; the purpose and capability of the built-in Electronic Optical Sealing System (EOSS) network gateway; and a network approach for obtaining reliable and authenticated pressure measurements.

  5. Simplifying and speeding the management of intra-node cache coherence

    DOE Patents [OSTI]

    Blumrich, Matthias A.; Chen, Dong; Coteus, Paul W.; Gara, Alan G.; Giampapa, Mark E.; Heidelberger, Phillip; Hoenicke, Dirk; Ohmacht, Martin

    2012-04-17

    A method and apparatus for managing coherence between two processors of a two processor node of a multi-processor computer system. Generally the present invention relates to a software algorithm that simplifies and significantly speeds the management of cache coherence in a message passing parallel computer, and to hardware apparatus that assists this cache coherence algorithm. The software algorithm uses the opening and closing of put/get windows to coordinate the activated required to achieve cache coherence. The hardware apparatus may be an extension to the hardware address decode, that creates, in the physical memory address space of the node, an area of virtual memory that (a) does not actually exist, and (b) is therefore able to respond instantly to read and write requests from the processing elements.

  6. Tera-node Network Technology (TASK 4) Network Infrastructure Activities (NIA) final report

    SciTech Connect (OSTI)

    Postel, John; Bannister, Joe

    2000-03-15

    The TNT project developed software technologies in scalable personal telecommunications (SPT), Reservation Protocol 2 (RSVP2), Scalable Computing Infrastructure (SCOPE), and Network Infrastructure Activities (NIA). SPT = developed many innovative protocols to support the use of videoconferencing applications on the Internet. RSVP2 = developed a new reference model and further standardization of RSVP. SCOPE = developed dynamic resource discovery techniques and distributed directory services in support of resource allocation for large distributed systems and computations. NIA = provided policy, operational, and support to the transitioning Internet.

  7. Data Transfer Nodes

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Data Transfer Nodes Data Transfer Nodes PDSF has dedicated nodes for grid services and data transfers named pdsfdtn1.nersc.gov and pdsfdtn2.nersc.gov. Both nodes have 10 Gb/s network connections to the NERSC network. Please avoid using the interactive nodes for bulk data transfer. Not only can it be disruptive to other users but the network connection is only 1 Gb/s so it will take longer. For transfers using /project and/or HPSS use the NERSC data transfer nodes - see the NERSC data transfer

  8. Embedding global barrier and collective in torus network with each node combining input from receivers according to class map for output to senders

    DOE Patents [OSTI]

    Chen, Dong; Coteus, Paul W; Eisley, Noel A; Gara, Alan; Heidelberger, Philip; Senger, Robert M; Salapura, Valentina; Steinmacher-Burow, Burkhard; Sugawara, Yutaka; Takken, Todd E

    2013-08-27

    Embodiments of the invention provide a method, system and computer program product for embedding a global barrier and global interrupt network in a parallel computer system organized as a torus network. The computer system includes a multitude of nodes. In one embodiment, the method comprises taking inputs from a set of receivers of the nodes, dividing the inputs from the receivers into a plurality of classes, combining the inputs of each of the classes to obtain a result, and sending said result to a set of senders of the nodes. Embodiments of the invention provide a method, system and computer program product for embedding a collective network in a parallel computer system organized as a torus network. In one embodiment, the method comprises adding to a torus network a central collective logic to route messages among at least a group of nodes in a tree structure.

  9. Compute Nodes

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Nodes Quad CoreAMDOpteronprocessor Compute Node Configuration 9,572 nodes 1 quad-core AMD 'Budapest' 2.3 GHz processor per node 4 cores per node (38,288 total cores) 8 GB...

  10. Active Network Management (Smart Grid Project) | Open Energy...

    Open Energy Info (EERE)

    Network Management (Smart Grid Project) Jump to: navigation, search Project Name Active Network Management Country United Kingdom Coordinates 55.378052, -3.435973 Loading...

  11. V-125: Cisco Connected Grid Network Management System Multiple...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    5: Cisco Connected Grid Network Management System Multiple Vulnerabilities V-125: Cisco Connected Grid Network Management System Multiple Vulnerabilities April 3, 2013 - 1:44am...

  12. V-120: EMC Smarts Network Configuration Manager Java RMI Access...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    0: EMC Smarts Network Configuration Manager Java RMI Access Control Flaw Lets Remote Users Gain Full Control V-120: EMC Smarts Network Configuration Manager Java RMI Access Control...

  13. Multiple node remote messaging

    DOE Patents [OSTI]

    Blumrich, Matthias A.; Chen, Dong; Gara, Alan G.; Giampapa, Mark E.; Heidelberger, Philip; Ohmacht, Martin; Salapura, Valentina; Steinmacher-Burow, Burkhard; Vranas, Pavlos

    2010-08-31

    A method for passing remote messages in a parallel computer system formed as a network of interconnected compute nodes includes that a first compute node (A) sends a single remote message to a remote second compute node (B) in order to control the remote second compute node (B) to send at least one remote message. The method includes various steps including controlling a DMA engine at first compute node (A) to prepare the single remote message to include a first message descriptor and at least one remote message descriptor for controlling the remote second compute node (B) to send at least one remote message, including putting the first message descriptor into an injection FIFO at the first compute node (A) and sending the single remote message and the at least one remote message descriptor to the second compute node (B).

  14. Login Nodes

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Login Nodes Login Nodes Franklin has 10 login nodes directly connected to the compute nodes. Another login node, named "Freedom," is connected "externally." Login nodes are used to edit files, compile codes, and submit job scripts to the batch system to run on the "compute nodes." Internal Login Nodes Quick Facts When you ssh to franklin.nersc.gov, you are connecting to an internal "login node." Franklin has 10 internal login nodes (this is largely

  15. Compute Nodes

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Compute Nodes Compute Nodes Quad CoreAMDOpteronprocessor Compute Node Configuration 9,572 nodes 1 quad-core AMD 'Budapest' 2.3 GHz processor per node 4 cores per node (38,288 total cores) 8 GB DDR3 800 MHz memory per node Peak Gflop rate 9.2 Gflops/core 36.8 Gflops/node 352 Tflops for the entire machine Each core has their own L1 and L2 caches, with 64 KB and 512KB respectively 2 MB L3 cache shared among the 4 cores Compute Node Software By default the compute nodes run a restricted low-overhead

  16. V-036: EMC Smarts Network Configuration Manager Database Authenticatio...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    V-036: EMC Smarts Network Configuration Manager Database Authentication Bypass ... Tomcat and JBOSS. Addthis Related Articles V-120: EMC Smarts Network Configuration ...

  17. Compute nodes

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Compute nodes Compute nodes Click here to see more detailed hierachical map of the topology of a compute node. Last edited: 2016-04-29 11:35:0

  18. Compute Nodes

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Compute Nodes Compute Nodes MC-proc.png Compute Node Configuration 6,384 nodes 2 twelve-core AMD 'MagnyCours' 2.1-GHz processors per node (see die image to the right and schematic below) 24 cores per node (153,216 total cores) 32 GB DDR3 1333-MHz memory per node (6,000 nodes) 64 GB DDR3 1333-MHz memory per node (384 nodes) Peak Gflop/s rate: 8.4 Gflops/core 201.6 Gflops/node 1.28 Peta-flops for the entire machine Each core has its own L1 and L2 caches, with 64 KB and 512KB respectively One 6-MB

  19. V-036: EMC Smarts Network Configuration Manager Database Authentication

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Bypass Vulnerability | Department of Energy 6: EMC Smarts Network Configuration Manager Database Authentication Bypass Vulnerability V-036: EMC Smarts Network Configuration Manager Database Authentication Bypass Vulnerability November 29, 2012 - 3:30am Addthis PROBLEM: EMC Smarts Network Configuration Manager Database Authentication Bypass Vulnerability PLATFORM: EMC Smarts Network Configuration Manager (NCM) all versions prior 9.1 ABSTRACT: Two vulnerabilities were reported in EMC Smarts

  20. Compute Nodes

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Compute Nodes Compute Nodes There are currently 2632 nodes available on PDSF. The compute (batch) nodes at PDSF are heterogenous, reflecting the periodic procurement of new nodes (and the eventual retirement of old nodes). From the user's perspective they are essentially all equivalent except that some have more memory per job slot. If your jobs have memory requirements beyond the default maximum of 1.1GB you should specify that in your job submission and the batch system will run your job on an

  1. Optimizing Data Transfer Nodes

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Optimizing Data Transfer Nodes using Packet Pacing Nathan Hanford University of California Davis, CA 95616 nhanford@ucdavis.edu Brian Tierney Energy Sciences Network Lawrence Berkeley National Laboratory Berkeley, CA 94720 bltierney@lbl.gov Dipak Ghosal University of California Davis, CA 95616 dghosal@ucdavis.edu ABSTRACT An important performance problem that we foresee with Data Transfer Nodes (DTNs) in the near future is a fast sending host over-running a slow receiving host, and packets

  2. Login Nodes

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    can be CPU and memory intensive and are popular applications on the login nodes: IDL Matlab NCL python ROOT Launching any of the above applications for a short time (< 1 hour) on...

  3. Login Nodes

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    can be CPU and memory intensive and are popular applications on the login nodes: IDL Matlab NCL python Launching any of the above applications for a short time (< 1 hour) on a...

  4. Extra-Large Memory Nodes

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    qsub -I -X -q regxlmem -l nodes1:ppn1 -l walltime01:00:00 -l mem16GB Use of NX X-windows forwarding is normally slow due to the network latency. NERSC provide the NX...

  5. U-214: HP Network Node Manager Java JDK / JRE Multiple Vulnerabilities

    Broader source: Energy.gov [DOE]

    Vulnerabilities could be remotely exploited resulting in unauthorized information disclosure, modification, Denial of Service (DoS).

  6. Radiation detection and situation management by distributed sensor networks

    SciTech Connect (OSTI)

    Jan, Frigo; Mielke, Angela; Cai, D Michael

    2009-01-01

    Detection of radioactive materials in an urban environment usually requires large, portal-monitor-style radiation detectors. However, this may not be a practical solution in many transport scenarios. Alternatively, a distributed sensor network (DSN) could complement portal-style detection of radiological materials through the implementation of arrays of low cost, small heterogeneous sensors with the ability to detect the presence of radioactive materials in a moving vehicle over a specific region. In this paper, we report on the use of a heterogeneous, wireless, distributed sensor network for traffic monitoring in a field demonstration. Through wireless communications, the energy spectra from different radiation detectors are combined to improve the detection confidence. In addition, the DSN exploits other sensor technologies and algorithms to provide additional information about the vehicle, such as its speed, location, class (e.g. car, truck), and license plate number. The sensors are in-situ and data is processed in real-time at each node. Relevant information from each node is sent to a base station computer which is used to assess the movement of radioactive materials.

  7. Node and GPU Configuration

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Node and GPU Configuration Compute Nodes and GPU Cards Dirac is a 50 GPU node cluster connected with QDR IB. Each GPU node also contains 2 Intel 5530 2.4 GHz, 8MB cache,...

  8. Social Networking for Emergency Management and Public Safety

    SciTech Connect (OSTI)

    Lesperance, Ann M.; Olson, Jarrod; Godinez, Melanie A.

    2010-08-31

    On March 10, 2010 the workshop titled Social Networking for Emergency Management and Public Safety was held in Seattle, WA. The objective of this workshop was to showcase ways social media networking technologies can be used to support emergency management and public safety operations. The workshop highlighted the current state of social networking and where this dynamic engagement is heading, demonstrated some of the more commonly used technologies, highlighted case studies on how these tools have been used in a variety of jurisdictions and engaged the private sector on how these tools might serve as a conduit for two way communication between with the public sector to address regional recovery issues and decision making.

  9. Open Problems in Network-aware Data Management in Exa-scale Computing and Terabit Networking Era

    SciTech Connect (OSTI)

    Balman, Mehmet; Byna, Surendra

    2011-12-06

    Accessing and managing large amounts of data is a great challenge in collaborative computing environments where resources and users are geographically distributed. Recent advances in network technology led to next-generation high-performance networks, allowing high-bandwidth connectivity. Efficient use of the network infrastructure is necessary in order to address the increasing data and compute requirements of large-scale applications. We discuss several open problems, evaluate emerging trends, and articulate our perspectives in network-aware data management.

  10. Synchronizing compute node time bases in a parallel computer

    DOE Patents [OSTI]

    Chen, Dong; Faraj, Daniel A; Gooding, Thomas M; Heidelberger, Philip

    2015-01-27

    Synchronizing time bases in a parallel computer that includes compute nodes organized for data communications in a tree network, where one compute node is designated as a root, and, for each compute node: calculating data transmission latency from the root to the compute node; configuring a thread as a pulse waiter; initializing a wakeup unit; and performing a local barrier operation; upon each node completing the local barrier operation, entering, by all compute nodes, a global barrier operation; upon all nodes entering the global barrier operation, sending, to all the compute nodes, a pulse signal; and for each compute node upon receiving the pulse signal: waking, by the wakeup unit, the pulse waiter; setting a time base for the compute node equal to the data transmission latency between the root node and the compute node; and exiting the global barrier operation.

  11. Synchronizing compute node time bases in a parallel computer

    DOE Patents [OSTI]

    Chen, Dong; Faraj, Daniel A; Gooding, Thomas M; Heidelberger, Philip

    2014-12-30

    Synchronizing time bases in a parallel computer that includes compute nodes organized for data communications in a tree network, where one compute node is designated as a root, and, for each compute node: calculating data transmission latency from the root to the compute node; configuring a thread as a pulse waiter; initializing a wakeup unit; and performing a local barrier operation; upon each node completing the local barrier operation, entering, by all compute nodes, a global barrier operation; upon all nodes entering the global barrier operation, sending, to all the compute nodes, a pulse signal; and for each compute node upon receiving the pulse signal: waking, by the wakeup unit, the pulse waiter; setting a time base for the compute node equal to the data transmission latency between the root node and the compute node; and exiting the global barrier operation.

  12. Wireless Sensors and Networks for Advanced Energy Management

    SciTech Connect (OSTI)

    Hardy, J.E.

    2005-05-06

    Numerous national studies and working groups have identified low-cost, very low-power wireless sensors and networks as a critical enabling technology for increasing energy efficiency, reducing waste, and optimizing processes. Research areas for developing such sensor and network platforms include microsensor arrays, ultra-low power electronics and signal conditioning, data/control transceivers, and robust wireless networks. A review of some of the research in the following areas will be discussed: (1) Low-cost, flexible multi-sensor array platforms (CO{sub 2}, NO{sub x}, CO, humidity, NH{sub 3}, O{sub 2}, occupancy, etc.) that enable energy and emission reductions in applications such as buildings and manufacturing; (2) Modeling investments (energy usage and savings to drive capital investment decisions) and estimated uptime improvements through pervasive gathering of equipment and process health data and its effects on energy; (3) Robust, self-configuring wireless sensor networks for energy management; and (4) Quality-of-service for secure and reliable data transmission from widely distributed sensors. Wireless communications is poised to support technical innovations in the industrial community, with widespread use of wireless sensors forecasted to improve manufacturing production and energy efficiency and reduce emissions. Progress being made in wireless system components, as described in this paper, is helping bring these projected improvements to reality.

  13. Sell Management on Replication and Build a Network | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Sell Management on Replication and Build a Network Sell Management on Replication and Build a Network This presentation addresses how to make the business case for replication. Raytheon provides a real-world example of how to do this. PDF icon Sell Management on Replication and Build a Network (May 24, 2011) More Documents & Publications Communicating Accomplishments to All Stakeholders Determine and Communicate the Value of Replication Having Plant Management Announce "the Prize",

  14. Extra-Large Memory Nodes

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Extra-Large Memory Nodes Extra-Large Memory Nodes Extra-Large Memory Nodes Overview Carver has two "extra-large" memory nodes; each node has four 8-core Intel X7550 ("Nehalem EX")...

  15. Data Transfer Nodes

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Transfer » Data Transfer Nodes Data Transfer Nodes A redirector page has been set up without anywhere to redirect to. Last edited: 2016-04-29 11:35:12

  16. Interactive (login) Nodes

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Interactive (login) Nodes Interactive (login) Nodes There are 3 interactive nodes at PDSF, pdsf[6-8].nersc.gov, that should be accessed via ssh to pdsf.nersc.gov. These are the gateways to accessing the rest of PDSF. Users can submit batch jobs as well as view and manipulate their files and directories from the interactive nodes. The configuration of the interactive nodes is shown in the table below. Processor Clock Speed (GHz) Architecture Cores Total Memory (GB) Scratch Space (GB) Intel Xeon

  17. U-274: HP Network Node Manager I (NNMi) for HP-UX, Linux, Solaris, and Windows, Remote Disclosure of Information

    Broader source: Energy.gov [DOE]

    Vulnerabilities can be exploited by malicious people to cause a DoS (Denial of Service) and potentially compromise a vulnerable system.

  18. Identifying messaging completion in a parallel computer by checking for change in message received and transmitted count at each node

    DOE Patents [OSTI]

    Archer, Charles J.; Hardwick, Camesha R.; McCarthy, Patrick J.; Wallenfelt, Brian P.

    2009-06-23

    Methods, parallel computers, and products are provided for identifying messaging completion on a parallel computer. The parallel computer includes a plurality of compute nodes, the compute nodes coupled for data communications by at least two independent data communications networks including a binary tree data communications network optimal for collective operations that organizes the nodes as a tree and a torus data communications network optimal for point to point operations that organizes the nodes as a torus. Embodiments include reading all counters at each node of the torus data communications network; calculating at each node a current node value in dependence upon the values read from the counters at each node; and determining for all nodes whether the current node value for each node is the same as a previously calculated node value for each node. If the current node is the same as the previously calculated node value for all nodes of the torus data communications network, embodiments include determining that messaging is complete and if the current node is not the same as the previously calculated node value for all nodes of the torus data communications network, embodiments include determining that messaging is currently incomplete.

  19. Method and apparatus for routing data in an inter-nodal communications lattice of a massively parallel computer system by routing through transporter nodes

    DOE Patents [OSTI]

    Archer, Charles Jens; Musselman, Roy Glenn; Peters, Amanda; Pinnow, Kurt Walter; Swartz, Brent Allen; Wallenfelt, Brian Paul

    2010-11-16

    A massively parallel computer system contains an inter-nodal communications network of node-to-node links. An automated routing strategy routes packets through one or more intermediate nodes of the network to reach a destination. Some packets are constrained to be routed through respective designated transporter nodes, the automated routing strategy determining a path from a respective source node to a respective transporter node, and from a respective transporter node to a respective destination node. Preferably, the source node chooses a routing policy from among multiple possible choices, and that policy is followed by all intermediate nodes. The use of transporter nodes allows greater flexibility in routing.

  20. The Node Monitoring Component of a Scalable Systems Software Environment

    SciTech Connect (OSTI)

    Samuel James Miller

    2006-08-09

    This research describes Fountain, a suite of programs used to monitor the resources of a cluster. A cluster is a collection of individual computers that are connected via a high speed communication network. They are traditionally used by users who desire more resources, such as processing power and memory, than any single computer can provide. A common drawback to effectively utilizing such a large-scale system is the management infrastructure, which often does not often scale well as the system grows. Large-scale parallel systems provide new research challenges in the area of systems software, the programs or tools that manage the system from boot-up to running a parallel job. The approach presented in this thesis utilizes a collection of separate components that communicate with each other to achieve a common goal. While systems software comprises a broad array of components, this thesis focuses on the design choices for a node monitoring component. We will describe Fountain, an implementation of the Scalable Systems Software (SSS) node monitor specification. It is targeted at aggregate node monitoring for clusters, focusing on both scalability and fault tolerance as its design goals. It leverages widely used technologies such as XML and HTTP to present an interface to other components in the SSS environment.

  1. SiNode Systems

    Broader source: Energy.gov [DOE]

    SiNode Systems is a battery materials venture developing silicon-graphene anodes for the next generation of lithium-ion batteries. SiNode anodes offer higher battery capacity and faster charging rates, all while being produced via a low cost solution chemistry-based manufacturing process.

  2. Wireless Sensor Network for Advanced Energy Management Solutions

    SciTech Connect (OSTI)

    Peter J. Theisen; Bin Lu, Charles J. Luebke

    2009-09-23

    Eaton has developed an advanced energy management solution that has been deployed to several Industries of the Future (IoF) sites. This demonstrated energy savings and reduced unscheduled downtime through an improved means for performing predictive diagnostics and energy efficiency estimation. Eaton has developed a suite of online, continuous, and inferential algorithms that utilize motor current signature analysis (MCSA) and motor power signature analysis (MPSA) techniques to detect and predict the health condition and energy usage condition of motors and their connect loads. Eaton has also developed a hardware and software platform that provided a means to develop and test these advanced algorithms in the field. Results from lab validation and field trials have demonstrated that the developed advanced algorithms are able to detect motor and load inefficiency and performance degradation. Eaton investigated the performance of Wireless Sensor Networks (WSN) within various industrial facilities to understand concerns about topology and environmental conditions that have precluded broad adoption by the industry to date. A Wireless Link Assessment System (WLAS), was used to validate wireless performance under a variety of conditions. Results demonstrated that wireless networks can provide adequate performance in most facilities when properly specified and deployed. Customers from various IoF expressed interest in applying wireless more broadly for selected applications, but continue to prefer utilizing existing, wired field bus networks for most sensor based applications that will tie into their existing Computerized Motor Maintenance Systems (CMMS). As a result, wireless technology was de-emphasized within the project, and a greater focus placed on energy efficiency/predictive diagnostics. Commercially available wireless networks were only utilized in field test sites to facilitate collection of motor wellness information, and no wireless sensor network products were developed under this project. As an outgrowth of this program, Eaton developed a patented energy-optimizing drive control technology that is complementary to a traditional variable frequency drives (VFD) to enable significant energy savings for motors with variable torque applications, such as fans, pumps, and compressors. This technology provides an estimated energy saving of 2%-10% depending on the loading condition, in addition to the savings obtained from a traditional VFD. The combination of a VFD with the enhanced energy-optimizing controls will provide significant energy savings (10% to 70% depending on the load and duty cycle) for motors that are presently connected with across the line starters. It will also provide a more favorable return on investment (ROI), thus encouraging industries to adopt VFDs for more motors within their facilities. The patented technology is based on nonintrusive algorithms that estimate the instantaneous operating efficiency and motor speed and provide active energy-optimizing control of a motor, using only existing voltage and current sensors. This technology is currently being commercialized by Eaton’s Industrial Controls Division in their next generation motor control products. Due to the common nonintrusive and inferential nature of various algorithms, this same product can also include motor and equipment condition monitoring features, providing the facility owner additional information to improve process uptime and the associated energy savings. Calculations estimated potential energy savings of 261,397GWh/Yr ($15.7B/yr), through retrofitting energy-optimizing VFDs into existing facilities, and incorporating the solution into building equipment sold by original equipment manufacturers (OEMs) and installed by mechanical and electrical contractors. Utilizing MCSA and MPSA for predictive maintenance (PM) of motors and connected equipment reduces process downtime cost and the cost of wasted energy associated with shutting down and restarting the processes. Estimated savings vary depending on the industry segment and equipment criticality per facility/process. Average downtime for an industrial facility is 4-12 hours with a cost/hr of $7500/hr, with large, critical processes reaching $50-100k/hr. Specific downtime costs are not included in this report because of customer confidentiality, but projected savings across the Industries of the Future (IoF) are still expected to be comparable to the original program estimates. Two generations of customer field deployments and evaluation have been completed during the course of this project. Results from these customer sites have been used for identifying the scope and improving the developed energy and wellness algorithms. The field deployments have confirmed that the hardware for sensing and sampling motor currents and voltages are reliable and able to provide an adequate signal-to-noise ratio from the electrical noise present on the motor signals.

  3. Distributed downhole drilling network

    DOE Patents [OSTI]

    Hall, David R.; Hall, Jr., H. Tracy; Fox, Joe; Pixton, David S.

    2006-11-21

    A high-speed downhole network providing real-time data from downhole components of a drilling strings includes a bottom-hole node interfacing to a bottom-hole assembly located proximate the bottom end of a drill string. A top-hole node is connected proximate the top end of the drill string. One or several intermediate nodes are located along the drill string between the bottom-hole node and the top-hole node. The intermediate nodes are configured to receive and transmit data packets transmitted between the bottom-hole node and the top-hole node. A communications link, integrated into the drill string, is used to operably connect the bottom-hole node, the intermediate nodes, and the top-hole node. In selected embodiments, a personal or other computer may be connected to the top-hole node, to analyze data received from the intermediate and bottom-hole nodes.

  4. Network-Driven Demand Side Management Website | Open Energy Informatio...

    Open Energy Info (EERE)

    URI: cleanenergysolutions.orgcontentnetwork-driven-demand-side-management Language: English Policies: "Deployment Programs,Regulations" is not in the list of possible...

  5. Methods and apparatus using commutative error detection values for fault isolation in multiple node computers

    DOE Patents [OSTI]

    Almasi, Gheorghe [Ardsley, NY; Blumrich, Matthias Augustin [Ridgefield, CT; Chen, Dong [Croton-On-Hudson, NY; Coteus, Paul [Yorktown, NY; Gara, Alan [Mount Kisco, NY; Giampapa, Mark E. [Irvington, NY; Heidelberger, Philip [Cortlandt Manor, NY; Hoenicke, Dirk I. [Ossining, NY; Singh, Sarabjeet [Mississauga, CA; Steinmacher-Burow, Burkhard D. [Wernau, DE; Takken, Todd [Brewster, NY; Vranas, Pavlos [Bedford Hills, NY

    2008-06-03

    Methods and apparatus perform fault isolation in multiple node computing systems using commutative error detection values for--example, checksums--to identify and to isolate faulty nodes. When information associated with a reproducible portion of a computer program is injected into a network by a node, a commutative error detection value is calculated. At intervals, node fault detection apparatus associated with the multiple node computer system retrieve commutative error detection values associated with the node and stores them in memory. When the computer program is executed again by the multiple node computer system, new commutative error detection values are created and stored in memory. The node fault detection apparatus identifies faulty nodes by comparing commutative error detection values associated with reproducible portions of the application program generated by a particular node from different runs of the application program. Differences in values indicate a possible faulty node.

  6. Vulnerability of critical infrastructures : identifying critical nodes.

    SciTech Connect (OSTI)

    Cox, Roger Gary; Robinson, David Gerald

    2004-06-01

    The objective of this research was the development of tools and techniques for the identification of critical nodes within critical infrastructures. These are nodes that, if disrupted through natural events or terrorist action, would cause the most widespread, immediate damage. This research focuses on one particular element of the national infrastructure: the bulk power system. Through the identification of critical elements and the quantification of the consequences of their failure, site-specific vulnerability analyses can be focused at those locations where additional security measures could be effectively implemented. In particular, with appropriate sizing and placement within the grid, distributed generation in the form of regional power parks may reduce or even prevent the impact of widespread network power outages. Even without additional security measures, increased awareness of sensitive power grid locations can provide a basis for more effective national, state and local emergency planning. A number of methods for identifying critical nodes were investigated: small-world (or network theory), polyhedral dynamics, and an artificial intelligence-based search method - particle swarm optimization. PSO was found to be the only viable approach and was applied to a variety of industry accepted test networks to validate the ability of the approach to identify sets of critical nodes. The approach was coded in a software package called Buzzard and integrated with a traditional power flow code. A number of industry accepted test networks were employed to validate the approach. The techniques (and software) are not unique to power grid network, but could be applied to a variety of complex, interacting infrastructures.

  7. Extra-Large Memory Nodes

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Extra-Large Memory Nodes Extra-Large Memory Nodes Extra-Large Memory Nodes Overview Carver has two "extra-large" memory nodes; each node has four 8-core Intel X7550 ("Nehalem EX") 2.0 GHz processors (32 cores total) and 1TB memory. These nodes are available through the queue "reg_xlmem". They can be used for interactive and batch jobs that require large amount of memory (16GB per core or more). reg_xlmem queue Please refer to the "Queues and Policies" page

  8. PDSF Login Node Status

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    PDSF Login Node Status Getting Started Hardware Configuration Using the PDSF Batch System Performance and Optimization Software and Tools Announcements and Meetings Cluster Statistics Getting help Group Pages Using Carver for PDSF jobs PDSF Completed Jobs Genepool Testbeds Retired Systems Storage & File Systems Data & Analytics Connecting to NERSC Queues and Scheduling Job Logs & Statistics Application Performance Training & Tutorials Software Policies User Surveys NERSC Users

  9. Data Transfer Nodes

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Data Transfer Nodes HPSS Data Archive I/O Resources for Scientific Applications at NERSC Optimizing I/O performance on the Lustre file system I/O Formats Science Databases Sharing Data Transferring Data Unix Groups at NERSC Unix File Permissions Data & Analytics Connecting to NERSC Queues and Scheduling Job Logs & Statistics Application Performance Training & Tutorials Software Policies User Surveys NERSC Users Group User Announcements Help Staff Blogs Request Repository Mailing

  10. Executing scatter operation to parallel computer nodes by repeatedly broadcasting content of send buffer partition corresponding to each node upon bitwise OR operation

    DOE Patents [OSTI]

    Archer, Charles J.; Ratterman, Joseph D.

    2009-11-06

    Executing a scatter operation on a parallel computer includes: configuring a send buffer on a logical root, the send buffer having positions, each position corresponding to a ranked node in an operational group of compute nodes and for storing contents scattered to that ranked node; and repeatedly for each position in the send buffer: broadcasting, by the logical root to each of the other compute nodes on a global combining network, the contents of the current position of the send buffer using a bitwise OR operation, determining, by each compute node, whether the current position in the send buffer corresponds with the rank of that compute node, if the current position corresponds with the rank, receiving the contents and storing the contents in a reception buffer of that compute node, and if the current position does not correspond with the rank, discarding the contents.

  11. New 1 Terabyte Memory Node

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    New 1 Terabyte Memory Node New 1 Terabyte Memory Node June 17, 2011 by Francesca Verdier A new "extra large" memory node that has four 8-core Nehalem EX processors (32 cores total) and 1TB memory has been deployed in the Carver/Magellan complex. See Memory Considerations on Carver. Subscribe via RSS Subscribe Browse by Date May 2016 April 2016 January 2016 December 2015 November 2015 October 2015 September 2015 August 2015 July 2015 April 2015 March 2015 January 2015 December 2014

  12. NUG Single Node Optimization Presentation.

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Single Node Optimization on Hopper Michael Stewart, NERSC Introduction ● Why are there so many compilers available on Hopper? ● Strengths and weaknesses of each compiler. ● Advice on choosing the most appropriate compiler for your work. ● Comparative benchmark results. ● How to compile and run with OpenMP for each compiler. ● Recommendations for running hybrid MPI/OpenMP codes on a node. Why So Many Compilers on Hopper? ● Franklin was delivered with the only commercially available

  13. Parallel-aware, dedicated job co-scheduling within/across symmetric multiprocessing nodes

    DOE Patents [OSTI]

    Jones, Terry R.; Watson, Pythagoras C.; Tuel, William; Brenner, Larry; ,Caffrey, Patrick; Fier, Jeffrey

    2010-10-05

    In a parallel computing environment comprising a network of SMP nodes each having at least one processor, a parallel-aware co-scheduling method and system for improving the performance and scalability of a dedicated parallel job having synchronizing collective operations. The method and system uses a global co-scheduler and an operating system kernel dispatcher adapted to coordinate interfering system and daemon activities on a node and across nodes to promote intra-node and inter-node overlap of said interfering system and daemon activities as well as intra-node and inter-node overlap of said synchronizing collective operations. In this manner, the impact of random short-lived interruptions, such as timer-decrement processing and periodic daemon activity, on synchronizing collective operations is minimized on large processor-count SPMD bulk-synchronous programming styles.

  14. Multi-Node Thermal System Model for Lithium-Ion Battery Packs: Preprint

    SciTech Connect (OSTI)

    Shi, Ying; Smith, Kandler; Wood, Eric; Pesaran, Ahmad

    2015-09-14

    Temperature is one of the main factors that controls the degradation in lithium ion batteries. Accurate knowledge and control of cell temperatures in a pack helps the battery management system (BMS) to maximize cell utilization and ensure pack safety and service life. In a pack with arrays of cells, a cells temperature is not only affected by its own thermal characteristics but also by its neighbors, the cooling system and pack configuration, which increase the noise level and the complexity of cell temperatures prediction. This work proposes to model lithium ion packs thermal behavior using a multi-node thermal network model, which predicts the cell temperatures by zones. The model was parametrized and validated using commercial lithium-ion battery packs. neighbors, the cooling system and pack configuration, which increase the noise level and the complexity of cell temperatures prediction. This work proposes to model lithium ion packs thermal behavior using a multi-node thermal network model, which predicts the cell temperatures by zones. The model was parametrized and validated using commercial lithium-ion battery packs.

  15. Global tree network for computing structures enabling global processing operations

    DOE Patents [OSTI]

    Blumrich; Matthias A.; Chen, Dong; Coteus, Paul W.; Gara, Alan G.; Giampapa, Mark E.; Heidelberger, Philip; Hoenicke, Dirk; Steinmacher-Burow, Burkhard D.; Takken, Todd E.; Vranas, Pavlos M.

    2010-01-19

    A system and method for enabling high-speed, low-latency global tree network communications among processing nodes interconnected according to a tree network structure. The global tree network enables collective reduction operations to be performed during parallel algorithm operations executing in a computer structure having a plurality of the interconnected processing nodes. Router devices are included that interconnect the nodes of the tree via links to facilitate performance of low-latency global processing operations at nodes of the virtual tree and sub-tree structures. The global operations performed include one or more of: broadcast operations downstream from a root node to leaf nodes of a virtual tree, reduction operations upstream from leaf nodes to the root node in the virtual tree, and point-to-point message passing from any node to the root node. The global tree network is configurable to provide global barrier and interrupt functionality in asynchronous or synchronized manner, and, is physically and logically partitionable.

  16. SensorNet Node Suite

    Energy Science and Technology Software Center (OSTI)

    2004-09-01

    The software in the SensorNet Node adopts and builds on IEEE 1451 interface principles to read data from and control sensors, stores the data in internal database structures, and transmits it in adapted Web Feature Services protocol packets to the SensorNet database. Failover software ensures that at least one available mode of communication remains alive.

  17. Controlling data transfers from an origin compute node to a target compute node

    DOE Patents [OSTI]

    Archer, Charles J.; Blocksome, Michael A.; Ratterman, Joseph D.; Smith, Brian E.

    2011-06-21

    Methods, apparatus, and products are disclosed for controlling data transfers from an origin compute node to a target compute node that include: receiving, by an application messaging module on the target compute node, an indication of a data transfer from an origin compute node to the target compute node; and administering, by the application messaging module on the target compute node, the data transfer using one or more messaging primitives of a system messaging module in dependence upon the indication.

  18. Organization of growing random networks

    SciTech Connect (OSTI)

    Krapivsky, P. L.; Redner, S.

    2001-06-01

    The organizational development of growing random networks is investigated. These growing networks are built by adding nodes successively, and linking each to an earlier node of degree k with an attachment probability A{sub k}. When A{sub k} grows more slowly than linearly with k, the number of nodes with k links, N{sub k}(t), decays faster than a power law in k, while for A{sub k} growing faster than linearly in k, a single node emerges which connects to nearly all other nodes. When A{sub k} is asymptotically linear, N{sub k}(t){similar_to}tk{sup {minus}{nu}}, with {nu} dependent on details of the attachment probability, but in the range 2{lt}{nu}{lt}{infinity}. The combined age and degree distribution of nodes shows that old nodes typically have a large degree. There is also a significant correlation in the degrees of neighboring nodes, so that nodes of similar degree are more likely to be connected. The size distributions of the in and out components of the network with respect to a given node{emdash}namely, its {open_quotes}descendants{close_quotes} and {open_quotes}ancestors{close_quotes}{emdash}are also determined. The in component exhibits a robust s{sup {minus}2} power-law tail, where s is the component size. The out component has a typical size of order lnt, and it provides basic insights into the genealogy of the network.

  19. Sandia Compact Sensor Node (SCSN) v. 1.0

    Energy Science and Technology Software Center (OSTI)

    2009-01-07

    The SCSN communication protocol is implemented in software and incorporates elements of Frequency Division Multiple Access (FDMA), Time Division Multiple Access (TDMA), and Carrier Sense Multiple Access (CSMA) to reduce radio message collisions, latency, and power consumption. Alarm messages are expeditiously routed to a central node as a 'star' network with minimum overhead. Other messages can be routed along network links between any two nodes so that peer-to-peer communication is possible. Broadcast messages can bemore » composed that flood the entire network or just specific portions with minimal radio traffic and latency. Two-way communication with sensor nodes, which sleep most of the time to conserve battery life, can occur at seven second intervals. SCSN software also incorporates special algorithms to minimize superfluous radio traffic that can result from excessive intrusion alarm messages. A built-in seismic detector is implemented with a geophone and software that distinguishes between pedestrian and vehicular targets. Other external sensors can be attached to a SCSN using supervised interface lines that are controlled by software. All software is written in the ANSI C language for ease of development, maintenance, and portability.« less

  20. Dedicated heterogeneous node scheduling including backfill scheduling

    DOE Patents [OSTI]

    Wood, Robert R. (Livermore, CA); Eckert, Philip D. (Livermore, CA); Hommes, Gregg (Pleasanton, CA)

    2006-07-25

    A method and system for job backfill scheduling dedicated heterogeneous nodes in a multi-node computing environment. Heterogeneous nodes are grouped into homogeneous node sub-pools. For each sub-pool, a free node schedule (FNS) is created so that the number of to chart the free nodes over time. For each prioritized job, using the FNS of sub-pools having nodes useable by a particular job, to determine the earliest time range (ETR) capable of running the job. Once determined for a particular job, scheduling the job to run in that ETR. If the ETR determined for a lower priority job (LPJ) has a start time earlier than a higher priority job (HPJ), then the LPJ is scheduled in that ETR if it would not disturb the anticipated start times of any HPJ previously scheduled for a future time. Thus, efficient utilization and throughput of such computing environments may be increased by utilizing resources otherwise remaining idle.

  1. Network resilience; A measure of network fault tolerance

    SciTech Connect (OSTI)

    Najjar, W. . Dept. of Computer Science); Gaudoit, J.L. . Dept. of Electrical Engineering)

    1990-02-01

    The failure of a node in a multicomputer system will not only reduce the computational power but also alter the network's topology. Network fault tolerance is a measure of the number of failures the network can sustain before a disconnection occurs. It is expressed traditionally as the network's node degree. In this paper, the authors propose a probabilistic measure of network fault tolerance expressed as the probability f a disconnection. Qualitative evaluation of this measure is presented. As expected, the single-node disconnection probability is the dominant factor irrespective of the topology under consideration. They derive an analytical approximation of the disconnection probability and verify it with Monte Carlo simulation. Based on this model, the measures of network resilience and relative network resilience are proposed as probabilistic measures of network fault tolerance. These are then used to evaluate the effects of the disconnection probability on the reliability of the system.

  2. Message communications of particular message types between compute nodes using DMA shadow buffers

    DOE Patents [OSTI]

    Blocksome, Michael A.; Parker, Jeffrey J.

    2010-11-16

    Message communications of particular message types between compute nodes using DMA shadow buffers includes: receiving a buffer identifier specifying an application buffer having a message of a particular type for transmission to a target compute node through a network; selecting one of a plurality of shadow buffers for a DMA engine on the compute node for storing the message, each shadow buffer corresponding to a slot of an injection FIFO buffer maintained by the DMA engine; storing the message in the selected shadow buffer; creating a data descriptor for the message stored in the selected shadow buffer; injecting the data descriptor into the slot of the injection FIFO buffer corresponding to the selected shadow buffer; selecting the data descriptor from the injection FIFO buffer; and transmitting the message specified by the selected data descriptor through the data communications network to the target compute node.

  3. Optimizing Cluster Heads for Energy Efficiency in Large-Scale Heterogeneous Wireless Sensor Networks

    DOE Public Access Gateway for Energy & Science Beta (PAGES Beta)

    Gu, Yi; Wu, Qishi; Rao, Nageswara S. V.

    2010-01-01

    Many complex sensor network applications require deploying a large number of inexpensive and small sensors in a vast geographical region to achieve quality through quantity. Hierarchical clustering is generally considered as an efficient and scalable way to facilitate the management and operation of such large-scale networks and minimize the total energy consumption for prolonged lifetime. Judicious selection of cluster heads for data integration and communication is critical to the success of applications based on hierarchical sensor networks organized as layered clusters. We investigate the problem of selecting sensor nodes in a predeployed sensor network to be the cluster headsmore » to minimize the total energy needed for data gathering. We rigorously derive an analytical formula to optimize the number of cluster heads in sensor networks under uniform node distribution, and propose a Distance-based Crowdedness Clustering algorithm to determine the cluster heads in sensor networks under general node distribution. The results from an extensive set of experiments on a large number of simulated sensor networks illustrate the performance superiority of the proposed solution over the clustering schemes based on k -means algorithm.« less

  4. Providing Runtime Clock Synchronization With Minimal Node-to...

    Office of Scientific and Technical Information (OSTI)

    Node-to-Node Time Deviation on XT4s and XT5s Citation Details In-Document Search Title: Providing Runtime Clock Synchronization With Minimal Node-to-Node Time Deviation on ...

  5. SBIR Phase II Final Report - Multi-Protocol Energy Management Gateway for Home-Area Networks

    SciTech Connect (OSTI)

    Hanna, Jason

    2015-02-06

    Significant amounts of electricity, natural gas, and heating oil are wasted by homeowners due to inefficient operation and inadequate maintenance of heating, ventilation, and air conditioning (HVAC) equipment. Coincident’s work under this award reduces energy waste, saves consumers money, and reduces carbon emissions. It does so in three ways: First, Coincident’s approach replaces the traditional thermostat with a wireless network of sensors and controllers that measure temperature, humidity and occupancy in multiple rooms in the house. The “Internet of Things” is a technology trend holding the promise of ubiquitous inexpensive sensors. The reality, however, is that energy and HVAC monitoring and management is a patchwork of incompatible protocols and expensive proprietary technologies. Coincident’s multi-protocol architecture, developed in part under this award tackles this problem and brings low cost interoperable sensor and control devices to market. Second, the Coincident system eliminates hard-to-program and rigid thermostat schedules and instead provides automatic operation of heating and cooling by combining individual temperature and comfort preferences with energy-saving targets, real-time utility use information, weather data, and room utilization patterns. Energy efficiency technology must be appealing to consumers otherwise it will not be used. The Coincident user interface has engaging features such as remote control from any smart phone or web browser and per-room performance breakdowns. Expected energy savings resulting from more efficient operation of heating and air conditioning equipment are in the range of 10-20%. Third, the Coincident system provides heating and air-conditioning contractors with fine-grained performance data for every residence they support (subject to customer privacy controls). This data is integrated from diverse networks within the residence and includes HVAC performance and fuel use data. This information allows the partner to validate energy savings and identify potential system faults (whether from installation problems or maintenance issues). When combined with professional installation as part of high-efficiency HVAC upgrade, energy savings levels of 20-30% can be achieved. Economic feasibility of energy efficiency technology is one of the key challenges addressed in this award. The Coincident system is engineered to be delivered at a disruptive price point, making the system financially feasible for new and retrofit homes of all types and sizes. The Coincident system is intended to be sold through the HVAC professional—the industry most capable of improving HVAC efficiency. Providing HVAC contractors with detailed home performance data motivates them to sell the product, provides them with maintenance and upgrade revenue opportunities, and therefore delivers customer savings and environmental benefits. Having demonstrated technical and financial feasibility, Coincident has won additional grants and awards, participated in pilot projects, started partnership discussions with several HVAC equipment vendors, and has lined up several large channel partners ready to participate in large pilot rollouts.

  6. Collective network for computer structures

    DOE Patents [OSTI]

    Blumrich, Matthias A.; Coteus, Paul W.; Chen, Dong; Gara, Alan; Giampapa, Mark E.; Heidelberger, Philip; Hoenicke, Dirk; Takken, Todd E.; Steinmacher-Burow, Burkhard D.; Vranas, Pavlos M.

    2011-08-16

    A system and method for enabling high-speed, low-latency global collective communications among interconnected processing nodes. The global collective network optimally enables collective reduction operations to be performed during parallel algorithm operations executing in a computer structure having a plurality of the interconnected processing nodes. Router devices ate included that interconnect the nodes of the network via links to facilitate performance of low-latency global processing operations at nodes of the virtual network and class structures. The global collective network may be configured to provide global barrier and interrupt functionality in asynchronous or synchronized manner. When implemented in a massively-parallel supercomputing structure, the global collective network is physically and logically partitionable according to needs of a processing algorithm.

  7. Collective network for computer structures

    DOE Patents [OSTI]

    Blumrich, Matthias A; Coteus, Paul W; Chen, Dong; Gara, Alan; Giampapa, Mark E; Heidelberger, Philip; Hoenicke, Dirk; Takken, Todd E; Steinmacher-Burow, Burkhard D; Vranas, Pavlos M

    2014-01-07

    A system and method for enabling high-speed, low-latency global collective communications among interconnected processing nodes. The global collective network optimally enables collective reduction operations to be performed during parallel algorithm operations executing in a computer structure having a plurality of the interconnected processing nodes. Router devices are included that interconnect the nodes of the network via links to facilitate performance of low-latency global processing operations at nodes of the virtual network. The global collective network may be configured to provide global barrier and interrupt functionality in asynchronous or synchronized manner. When implemented in a massively-parallel supercomputing structure, the global collective network is physically and logically partitionable according to the needs of a processing algorithm.

  8. Tank Waste Information Network System (TWINS) FY 2001 Data Management Plan

    SciTech Connect (OSTI)

    ADAMS, M.R.

    2000-06-12

    The mission of Tank Waste Information Network System (TWINS) is to provide system users with quality tank data and information when needed, in the form needed and at a reasonable cost.

  9. Volttron (TM) Transactive Control Node: Case Study

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    ... LinuxPython implementation. TC Node: An implementation of Transactive Energy that uses ... platform for fast development - PythonLinux are effective and efficient - VOLTTRON ...

  10. Global interrupt and barrier networks

    DOE Patents [OSTI]

    Blumrich, Matthias A. (Ridgefield, CT); Chen, Dong (Croton-On-Hudson, NY); Coteus, Paul W. (Yorktown Heights, NY); Gara, Alan G. (Mount Kisco, NY); Giampapa, Mark E (Irvington, NY); Heidelberger, Philip (Cortlandt Manor, NY); Kopcsay, Gerard V. (Yorktown Heights, NY); Steinmacher-Burow, Burkhard D. (Mount Kisco, NY); Takken, Todd E. (Mount Kisco, NY)

    2008-10-28

    A system and method for generating global asynchronous signals in a computing structure. Particularly, a global interrupt and barrier network is implemented that implements logic for generating global interrupt and barrier signals for controlling global asynchronous operations performed by processing elements at selected processing nodes of a computing structure in accordance with a processing algorithm; and includes the physical interconnecting of the processing nodes for communicating the global interrupt and barrier signals to the elements via low-latency paths. The global asynchronous signals respectively initiate interrupt and barrier operations at the processing nodes at times selected for optimizing performance of the processing algorithms. In one embodiment, the global interrupt and barrier network is implemented in a scalable, massively parallel supercomputing device structure comprising a plurality of processing nodes interconnected by multiple independent networks, with each node including one or more processing elements for performing computation or communication activity as required when performing parallel algorithm operations. One multiple independent network includes a global tree network for enabling high-speed global tree communications among global tree network nodes or sub-trees thereof. The global interrupt and barrier network may operate in parallel with the global tree network for providing global asynchronous sideband signals.

  11. Efficient implementation of multidimensional fast fourier transform on a distributed-memory parallel multi-node computer

    DOE Patents [OSTI]

    Bhanot, Gyan V.; Chen, Dong; Gara, Alan G.; Giampapa, Mark E.; Heidelberger, Philip; Steinmacher-Burow, Burkhard D.; Vranas, Pavlos M.

    2012-01-10

    The present in invention is directed to a method, system and program storage device for efficiently implementing a multidimensional Fast Fourier Transform (FFT) of a multidimensional array comprising a plurality of elements initially distributed in a multi-node computer system comprising a plurality of nodes in communication over a network, comprising: distributing the plurality of elements of the array in a first dimension across the plurality of nodes of the computer system over the network to facilitate a first one-dimensional FFT; performing the first one-dimensional FFT on the elements of the array distributed at each node in the first dimension; re-distributing the one-dimensional FFT-transformed elements at each node in a second dimension via "all-to-all" distribution in random order across other nodes of the computer system over the network; and performing a second one-dimensional FFT on elements of the array re-distributed at each node in the second dimension, wherein the random order facilitates efficient utilization of the network thereby efficiently implementing the multidimensional FFT. The "all-to-all" re-distribution of array elements is further efficiently implemented in applications other than the multidimensional FFT on the distributed-memory parallel supercomputer.

  12. Efficient implementation of a multidimensional fast fourier transform on a distributed-memory parallel multi-node computer

    DOE Patents [OSTI]

    Bhanot, Gyan V.; Chen, Dong; Gara, Alan G.; Giampapa, Mark E.; Heidelberger, Philip; Steinmacher-Burow, Burkhard D.; Vranas, Pavlos M.

    2008-01-01

    The present in invention is directed to a method, system and program storage device for efficiently implementing a multidimensional Fast Fourier Transform (FFT) of a multidimensional array comprising a plurality of elements initially distributed in a multi-node computer system comprising a plurality of nodes in communication over a network, comprising: distributing the plurality of elements of the array in a first dimension across the plurality of nodes of the computer system over the network to facilitate a first one-dimensional FFT; performing the first one-dimensional FFT on the elements of the array distributed at each node in the first dimension; re-distributing the one-dimensional FFT-transformed elements at each node in a second dimension via "all-to-all" distribution in random order across other nodes of the computer system over the network; and performing a second one-dimensional FFT on elements of the array re-distributed at each node in the second dimension, wherein the random order facilitates efficient utilization of the network thereby efficiently implementing the multidimensional FFT. The "all-to-all" re-distribution of array elements is further efficiently implemented in applications other than the multidimensional FFT on the distributed-memory parallel supercomputer.

  13. Proceedings of the sixth Berkeley workshop on distributed data management and computer networks

    SciTech Connect (OSTI)

    Various Authors

    1982-01-01

    A distributed data base management system allows data to be stored at multiple locations and to be accessed as a single unified data base. In this workshop, seventeen papers were presented which have been prepared separately for the energy data base. These items deal with data transfer, protocols and management. (GHT)

  14. Advance Liquid Metal Reactor Discrete Dynamic Event Tree/Bayesian Network Analysis and Incident Management Guidelines (Risk Management for Sodium Fast Reactors)

    SciTech Connect (OSTI)

    Denman, Matthew R.; Groth, Katrina M.; Cardoni, Jeffrey N.; Wheeler, Timothy A.

    2015-04-01

    Accident management is an important component to maintaining risk at acceptable levels for all complex systems, such as nuclear power plants. With the introduction of self-correcting, or inherently safe, reactor designs the focus has shifted from management by operators to allowing the system's design to manage the accident. Inherently and passively safe designs are laudable, but nonetheless extreme boundary conditions can interfere with the design attributes which facilitate inherent safety, thus resulting in unanticipated and undesirable end states. This report examines an inherently safe and small sodium fast reactor experiencing a beyond design basis seismic event with the intend of exploring two issues : (1) can human intervention either improve or worsen the potential end states and (2) can a Bayesian Network be constructed to infer the state of the reactor to inform (1). ACKNOWLEDGEMENTS The authors would like to acknowledge the U.S. Department of Energy's Office of Nuclear Energy for funding this research through Work Package SR-14SN100303 under the Advanced Reactor Concepts program. The authors also acknowledge the PRA teams at Argonne National Laboratory, Oak Ridge National Laboratory, and Idaho National Laboratory for their continue d contributions to the advanced reactor PRA mission area.

  15. An examination of electronic file transfer between host and microcomputers for the AMPMODNET/AIMNET (Army Material Plan Modernization Network/Acquisition Information Management Network) classified network environment

    SciTech Connect (OSTI)

    Hake, K.A.

    1990-11-01

    This report presents the results of investigation and testing conducted by Oak Ridge National Laboratory (ORNL) for the Project Manager -- Acquisition Information Management (PM-AIM), and the United States Army Materiel Command Headquarters (HQ-AMC). It concerns the establishment of file transfer capabilities on the Army Materiel Plan Modernization (AMPMOD) classified computer system. The discussion provides a general context for micro-to-mainframe connectivity and focuses specifically upon two possible solutions for file transfer capabilities. The second section of this report contains a statement of the problem to be examined, a brief description of the institutional setting of the investigation, and a concise declaration of purpose. The third section lays a conceptual foundation for micro-to-mainframe connectivity and provides a more detailed description of the AMPMOD computing environment. It gives emphasis to the generalized International Business Machines, Inc. (IBM) standard of connectivity because of the predominance of this vendor in the AMPMOD computing environment. The fourth section discusses two test cases as possible solutions for file transfer. The first solution used is the IBM 3270 Control Program telecommunications and terminal emulation software. A version of this software was available on all the IBM Tempest Personal Computer 3s. The second solution used is Distributed Office Support System host electronic mail software with Personal Services/Personal Computer microcomputer e-mail software running with IBM 3270 Workstation Program for terminal emulation. Test conditions and results are presented for both test cases. The fifth section provides a summary of findings for the two possible solutions tested for AMPMOD file transfer. The report concludes with observations on current AMPMOD understanding of file transfer and includes recommendations for future consideration by the sponsor.

  16. National Highway Planning Network

    Energy Science and Technology Software Center (OSTI)

    1992-02-02

    NHPN, the National Highway Planning Network, is a database of major highways in the continental United States that is used for national-level analyses of highway transportation issues that require use of a network, such as studies of highway performance, network design, social and environmental impacts of transportation, vehicle routing and scheduling, and mapping. The network is based on a set of roadways digitized by the U. S. Geological Survey (USGS) from the 1980 National Atlasmore » and has been enhanced with additional roads, attribute detail, and topological error corrections to produce a true analytic network. All data have been derived from or checked against information obtained from state and Federal governmental agencies. Two files comprise this network: one describing links and the other nodes. This release, NHPN1.0, contains 44,960 links and 28,512 nodes representing approximately 380,000 miles of roadway.« less

  17. Parameters affecting the resilience of scale-free networks to random failures.

    SciTech Connect (OSTI)

    Link, Hamilton E.; LaViolette, Randall A.; Lane, Terran; Saia, Jared

    2005-09-01

    It is commonly believed that scale-free networks are robust to massive numbers of random node deletions. For example, Cohen et al. in (1) study scale-free networks including some which approximate the measured degree distribution of the Internet. Their results suggest that if each node in this network failed independently with probability 0.99, most of the remaining nodes would still be connected in a giant component. In this paper, we show that a large and important subclass of scale-free networks are not robust to massive numbers of random node deletions. In particular, we study scale-free networks which have minimum node degree of 1 and a power-law degree distribution beginning with nodes of degree 1 (power-law networks). We show that, in a power-law network approximating the Internet's reported distribution, when the probability of deletion of each node is 0.5 only about 25% of the surviving nodes in the network remain connected in a giant component, and the giant component does not persist beyond a critical failure rate of 0.9. The new result is partially due to improved analytical accommodation of the large number of degree-0 nodes that result after node deletions. Our results apply to power-law networks with a wide range of power-law exponents, including Internet-like networks. We give both analytical and empirical evidence that such networks are not generally robust to massive random node deletions.

  18. Switch for serial or parallel communication networks

    DOE Patents [OSTI]

    Crosette, Dario B.

    1994-01-01

    A communication switch apparatus and a method for use in a geographically extensive serial, parallel or hybrid communication network linking a multi-processor or parallel processing system has a very low software processing overhead in order to accommodate random burst of high density data. Associated with each processor is a communication switch. A data source and a data destination, a sensor suite or robot for example, may also be associated with a switch. The configuration of the switches in the network are coordinated through a master processor node and depends on the operational phase of the multi-processor network: data acquisition, data processing, and data exchange. The master processor node passes information on the state to be assumed by each switch to the processor node associated with the switch. The processor node then operates a series of multi-state switches internal to each communication switch. The communication switch does not parse and interpret communication protocol and message routing information. During a data acquisition phase, the communication switch couples sensors producing data to the processor node associated with the switch, to a downlink destination on the communications network, or to both. It also may couple an uplink data source to its processor node. During the data exchange phase, the switch couples its processor node or an uplink data source to a downlink destination (which may include a processor node or a robot), or couples an uplink source to its processor node and its processor node to a downlink destination.

  19. Switch for serial or parallel communication networks

    DOE Patents [OSTI]

    Crosette, D.B.

    1994-07-19

    A communication switch apparatus and a method for use in a geographically extensive serial, parallel or hybrid communication network linking a multi-processor or parallel processing system has a very low software processing overhead in order to accommodate random burst of high density data. Associated with each processor is a communication switch. A data source and a data destination, a sensor suite or robot for example, may also be associated with a switch. The configuration of the switches in the network are coordinated through a master processor node and depends on the operational phase of the multi-processor network: data acquisition, data processing, and data exchange. The master processor node passes information on the state to be assumed by each switch to the processor node associated with the switch. The processor node then operates a series of multi-state switches internal to each communication switch. The communication switch does not parse and interpret communication protocol and message routing information. During a data acquisition phase, the communication switch couples sensors producing data to the processor node associated with the switch, to a downlink destination on the communications network, or to both. It also may couple an uplink data source to its processor node. During the data exchange phase, the switch couples its processor node or an uplink data source to a downlink destination (which may include a processor node or a robot), or couples an uplink source to its processor node and its processor node to a downlink destination. 9 figs.

  20. Locating hardware faults in a data communications network of a parallel computer

    DOE Patents [OSTI]

    Archer, Charles J.; Megerian, Mark G.; Ratterman, Joseph D.; Smith, Brian E.

    2010-01-12

    Hardware faults location in a data communications network of a parallel computer. Such a parallel computer includes a plurality of compute nodes and a data communications network that couples the compute nodes for data communications and organizes the compute node as a tree. Locating hardware faults includes identifying a next compute node as a parent node and a root of a parent test tree, identifying for each child compute node of the parent node a child test tree having the child compute node as root, running a same test suite on the parent test tree and each child test tree, and identifying the parent compute node as having a defective link connected from the parent compute node to a child compute node if the test suite fails on the parent test tree and succeeds on all the child test trees.

  1. Parallel processing data network of master and slave transputers controlled by a serial control network

    DOE Patents [OSTI]

    Crosetto, D.B.

    1996-12-31

    The present device provides for a dynamically configurable communication network having a multi-processor parallel processing system having a serial communication network and a high speed parallel communication network. The serial communication network is used to disseminate commands from a master processor to a plurality of slave processors to effect communication protocol, to control transmission of high density data among nodes and to monitor each slave processor`s status. The high speed parallel processing network is used to effect the transmission of high density data among nodes in the parallel processing system. Each node comprises a transputer, a digital signal processor, a parallel transfer controller, and two three-port memory devices. A communication switch within each node connects it to a fast parallel hardware channel through which all high density data arrives or leaves the node. 6 figs.

  2. Parallel processing data network of master and slave transputers controlled by a serial control network

    DOE Patents [OSTI]

    Crosetto, Dario B.

    1996-01-01

    The present device provides for a dynamically configurable communication network having a multi-processor parallel processing system having a serial communication network and a high speed parallel communication network. The serial communication network is used to disseminate commands from a master processor (100) to a plurality of slave processors (200) to effect communication protocol, to control transmission of high density data among nodes and to monitor each slave processor's status. The high speed parallel processing network is used to effect the transmission of high density data among nodes in the parallel processing system. Each node comprises a transputer (104), a digital signal processor (114), a parallel transfer controller (106), and two three-port memory devices. A communication switch (108) within each node (100) connects it to a fast parallel hardware channel (70) through which all high density data arrives or leaves the node.

  3. Zone routing in a torus network

    DOE Patents [OSTI]

    Chen, Dong; Heidelberger, Philip; Kumar, Sameer

    2013-01-29

    A system for routing data in a network comprising a network logic device at a sending node for determining a path between the sending node and a receiving node, wherein the network logic device sets one or more selection bits and one or more hint bits within the data packet, a control register for storing one or more masks, wherein the network logic device uses the one or more selection bits to select a mask from the control register and the network logic device applies the selected mask to the hint bits to restrict routing of the data packet to one or more routing directions for the data packet within the network and selects one of the restricted routing directions from the one or more routing directions and sends the data packet along a link in the selected routing direction toward the receiving node.

  4. Signaling completion of a message transfer from an origin compute node to a target compute node

    DOE Patents [OSTI]

    Blocksome, Michael A.; Parker, Jeffrey J.

    2011-05-24

    Signaling completion of a message transfer from an origin node to a target node includes: sending, by an origin DMA engine, an RTS message, the RTS message specifying an application message for transfer to the target node from the origin node; receiving, by the origin DMA engine, a remote get message containing a data descriptor for the message and a completion notification descriptor, the completion notification descriptor specifying a local direct put transfer operation for transferring data locally on the origin node; inserting, by the origin DMA engine in an injection FIFO buffer, the data descriptor followed by the completion notification descriptor; transferring, by the origin DMA engine to the target node, the message in dependence upon the data descriptor; and notifying, by the origin DMA engine, the application that transfer of the message is complete in dependence upon the completion notification descriptor.

  5. Signaling completion of a message transfer from an origin compute node to a target compute node

    DOE Patents [OSTI]

    Blocksome, Michael A.

    2011-02-15

    Signaling completion of a message transfer from an origin node to a target node includes: sending, by an origin DMA engine, an RTS message, the RTS message specifying an application message for transfer to the target node from the origin node; receiving, by the origin DMA engine, a remote get message containing a data descriptor for the message and a completion notification descriptor, the completion notification descriptor specifying a local memory FIFO data transfer operation for transferring data locally on the origin node; inserting, by the origin DMA engine in an injection FIFO buffer, the data descriptor followed by the completion notification descriptor; transferring, by the origin DMA engine to the target node, the message in dependence upon the data descriptor; and notifying, by the origin DMA engine, the application that transfer of the message is complete in dependence upon the completion notification descriptor.

  6. FLOP Counts for "Small" Single-Node Miniapplication Tests

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    FLOP Counts for "Small" Single-Node Miniapplication Tests FLOP Counts for "Small" Single-Node Miniapplication Tests These data, obtained using the NERSC Hopper system, are provided...

  7. LC Recommendations for Data Transfer Nodes (Technical Report...

    Office of Scientific and Technical Information (OSTI)

    Technical Report: LC Recommendations for Data Transfer Nodes Citation Details In-Document Search Title: LC Recommendations for Data Transfer Nodes You are accessing a document ...

  8. Dynamically reassigning a connected node to a block of compute nodes for re-launching a failed job

    DOE Patents [OSTI]

    Budnik, Thomas A.; Knudson, Brant L.; Megerian, Mark G.; Miller, Samuel J.; Stockdell, William M.

    2012-03-20

    Methods, systems, and products for dynamically reassigning a connected node to a block of compute nodes for re-launching a failed job that include: identifying that a job failed to execute on the block of compute nodes because connectivity failed between a compute node assigned as at least one of the connected nodes for the block of compute nodes and its supporting I/O node; and re-launching the job, including selecting an alternative connected node that is actively coupled for data communications with an active I/O node; and assigning the alternative connected node as the connected node for the block of compute nodes running the re-launched job.

  9. Line-plane broadcasting in a data communications network of a parallel computer

    DOE Patents [OSTI]

    Archer, Charles J.; Berg, Jeremy E.; Blocksome, Michael A.; Smith, Brian E.

    2010-11-23

    Methods, apparatus, and products are disclosed for line-plane broadcasting in a data communications network of a parallel computer, the parallel computer comprising a plurality of compute nodes connected together through the network, the network optimized for point to point data communications and characterized by at least a first dimension, a second dimension, and a third dimension, that include: initiating, by a broadcasting compute node, a broadcast operation, including sending a message to all of the compute nodes along an axis of the first dimension for the network; sending, by each compute node along the axis of the first dimension, the message to all of the compute nodes along an axis of the second dimension for the network; and sending, by each compute node along the axis of the second dimension, the message to all of the compute nodes along an axis of the third dimension for the network.

  10. Line-plane broadcasting in a data communications network of a parallel computer

    DOE Patents [OSTI]

    Archer, Charles J.; Berg, Jeremy E.; Blocksome, Michael A.; Smith, Brian E.

    2010-06-08

    Methods, apparatus, and products are disclosed for line-plane broadcasting in a data communications network of a parallel computer, the parallel computer comprising a plurality of compute nodes connected together through the network, the network optimized for point to point data communications and characterized by at least a first dimension, a second dimension, and a third dimension, that include: initiating, by a broadcasting compute node, a broadcast operation, including sending a message to all of the compute nodes along an axis of the first dimension for the network; sending, by each compute node along the axis of the first dimension, the message to all of the compute nodes along an axis of the second dimension for the network; and sending, by each compute node along the axis of the second dimension, the message to all of the compute nodes along an axis of the third dimension for the network.

  11. Providing Runtime Clock Synchronization With Minimal Node-to-Node Time

    Office of Scientific and Technical Information (OSTI)

    Deviation on XT4s and XT5s (Conference) | SciTech Connect Providing Runtime Clock Synchronization With Minimal Node-to-Node Time Deviation on XT4s and XT5s Citation Details In-Document Search Title: Providing Runtime Clock Synchronization With Minimal Node-to-Node Time Deviation on XT4s and XT5s We present a new high precision clock synchronization algorithm designed for large XT4 and XT5 leadership-class machines. The algorithm, which is designed to support OS noise reduction through

  12. Disaster risk management in prospect mining area Blitar district, East Java, using microtremor analysis and ANP (analytical network processing) approach

    SciTech Connect (OSTI)

    Parwatiningtyas, Diyan E-mail: erlinunindra@gmail.com; Ambarsari, Erlin Windia E-mail: erlinunindra@gmail.com; Marlina, Dwi E-mail: erlinunindra@gmail.com; Wiratomo, Yogi E-mail: erlinunindra@gmail.com

    2014-03-24

    Indonesia has a wealth of natural assets is so large to be managed and utilized, either from its own local government and local communities, especially in the mining sector. However, mining activities can change the state of the surface layer of the earth that have a high impact disaster risk. This could threaten the safety and disrupt human life, environmental damage, loss of property, and the psychological impact, sulking to the rule of law no 24 of 2007. That's why we strive to manage and minimize the risk of mine disasters in the region, how to use the method of calculation of Amplification Factor (AF) from the analysis based microtremor sulking Kanai and Nakamura, and decision systems were tested by analysis of ANP. Based on the amplification factor and Analytical Network Processing (ANP) obtained, some points showed instability in the surface layer of a mining area include the site of the TP-7, TP-8, TP-9, TP-10, (Birowo2). If in terms of structure, location indicated unstable due to have a sloping surface layer, resulting in the occurrence of landslides and earthquake risk is high. In the meantime, other areas of the mine site can be said to be a stable area.

  13. Using social network and stakeholder analysis to help evaluate infectious waste management: A step towards a holistic assessment

    SciTech Connect (OSTI)

    Caniato, Marco; Vaccari, Mentore; Visvanathan, Chettiyappan; Zurbrgg, Christian

    2014-05-01

    Highlights: Assessment of infectious waste management in Bangkok, in particular incineration. Integration of social network and stakeholder analysis assessment methods. Assessment of stakeholder characteristics, role, interaction and communication. Interviewees self-evaluate their own characteristics and the system. Non-technical aspects are important for system acceptability, and sustainability. - Abstract: Assessing the strengths and weaknesses of a solid waste management scheme requires an accurate analysis and integration of several determining features. In addition to the technical aspects, any such system shows a complex interaction of actors with varying stakes, decision-making power and influence, as well as a favourable or disabling environment. When capitalizing on the knowledge and experience from a specific case, it is also crucial that experts do not forget or underestimate the importance of such social determinants and that they are familiar with the methods and tools to assess them. Social network analysis (SNA) and stakeholder analysis (SA) methods can be successfully applied to better understand actors role and actions, analyse driving forces and existing coordination among stakeholders, as well as identify bottlenecks in communication which affect daily operations or strategic planning for the future way forward. SNA and SA, appropriately adjusted for a certain system, can provide a useful integration to methods by assessing other aspects to ensure a comprehensive picture of the situation. This paper describes how to integrate SNA and SA in order to survey a solid waste management system. This paper presents the results of an analysis of On-Nuch infectious waste incinerator in Bangkok, Thailand. Stakeholders were interviewed and asked to prioritize characteristics and relationships which they consider particularly important for system development and success of the scheme. In such a way, a large quantity of information about organization, communication between stakeholders and their perception about operation, environmental and health impact, and potential alternatives for the system was collected in a systematic way. The survey results suggest that stakeholders are generally satisfied with the system operation, though communication should be improved. Moreover, stakeholders should be strategically more involved in system development planning, according to their characteristics, to prevent negative reactions.

  14. Class network routing

    DOE Patents [OSTI]

    Bhanot, Gyan; Blumrich, Matthias A.; Chen, Dong; Coteus, Paul W.; Gara, Alan G.; Giampapa, Mark E.; Heidelberger, Philip; Steinmacher-Burow, Burkhard D.; Takken, Todd E.; Vranas, Pavlos M.

    2009-09-08

    Class network routing is implemented in a network such as a computer network comprising a plurality of parallel compute processors at nodes thereof. Class network routing allows a compute processor to broadcast a message to a range (one or more) of other compute processors in the computer network, such as processors in a column or a row. Normally this type of operation requires a separate message to be sent to each processor. With class network routing pursuant to the invention, a single message is sufficient, which generally reduces the total number of messages in the network as well as the latency to do a broadcast. Class network routing is also applied to dense matrix inversion algorithms on distributed memory parallel supercomputers with hardware class function (multicast) capability. This is achieved by exploiting the fact that the communication patterns of dense matrix inversion can be served by hardware class functions, which results in faster execution times.

  15. Visual Matrix Clustering of Social Networks

    SciTech Connect (OSTI)

    Wong, Pak C.; Mackey, Patrick S.; Foote, Harlan P.; May, Richard A.

    2013-07-01

    The prevailing choices to graphically represent a social network in todays literature are a node-link graph layout and an adjacency matrix. Both visualization techniques have unique strengths and weaknesses when applied to different domain applications. In this article, we focus our discussion on adjacency matrix and how to turn the matrix-based visualization technique from merely showing pairwise associations among network actors (or graph nodes) to depicting clusters of a social network. We also use node-link layouts to supplement the discussion.

  16. Clock Agreement Among Parallel Supercomputer Nodes

    DOE Data Explorer [Office of Scientific and Technical Information (OSTI)]

    Jones, Terry R.; Koenig, Gregory A.

    2014-04-30

    This dataset presents measurements that quantify the clock synchronization time-agreement characteristics among several high performance computers including the current world's most powerful machine for open science, the U.S. Department of Energy's Titan machine sited at Oak Ridge National Laboratory. These ultra-fast machines derive much of their computational capability from extreme node counts (over 18000 nodes in the case of the Titan machine). Time-agreement is commonly utilized by parallel programming applications and tools, distributed programming application and tools, and system software. Our time-agreement measurements detail the degree of time variance between nodes and how that variance changes over time. The dataset includes empirical measurements and the accompanying spreadsheets.

  17. Clock Agreement Among Parallel Supercomputer Nodes

    DOE Data Explorer [Office of Scientific and Technical Information (OSTI)]

    Jones, Terry R.; Koenig, Gregory A.

    This dataset presents measurements that quantify the clock synchronization time-agreement characteristics among several high performance computers including the current world's most powerful machine for open science, the U.S. Department of Energy's Titan machine sited at Oak Ridge National Laboratory. These ultra-fast machines derive much of their computational capability from extreme node counts (over 18000 nodes in the case of the Titan machine). Time-agreement is commonly utilized by parallel programming applications and tools, distributed programming application and tools, and system software. Our time-agreement measurements detail the degree of time variance between nodes and how that variance changes over time. The dataset includes empirical measurements and the accompanying spreadsheets.

  18. Advanced mobile networking, sensing, and controls.

    SciTech Connect (OSTI)

    Feddema, John Todd; Kilman, Dominique Marie; Byrne, Raymond Harry; Young, Joseph G.; Lewis, Christopher L.; Van Leeuwen, Brian P.; Robinett, Rush D. III; Harrington, John J.

    2005-03-01

    This report describes an integrated approach for designing communication, sensing, and control systems for mobile distributed systems. Graph theoretic methods are used to analyze the input/output reachability and structural controllability and observability of a decentralized system. Embedded in each network node, this analysis will automatically reconfigure an ad hoc communication network for the sensing and control task at hand. The graph analysis can also be used to create the optimal communication flow control based upon the spatial distribution of the network nodes. Edge coloring algorithms tell us that the minimum number of time slots in a planar network is equal to either the maximum number of adjacent nodes (or degree) of the undirected graph plus some small number. Therefore, the more spread out that the nodes are, the fewer number of time slots are needed for communication, and the smaller the latency between nodes. In a coupled system, this results in a more responsive sensor network and control system. Network protocols are developed to propagate this information, and distributed algorithms are developed to automatically adjust the number of time slots available for communication. These protocols and algorithms must be extremely efficient and only updated as network nodes move. In addition, queuing theory is used to analyze the delay characteristics of Carrier Sense Multiple Access (CSMA) networks. This report documents the analysis, simulation, and implementation of these algorithms performed under this Laboratory Directed Research and Development (LDRD) effort.

  19. Identifying failure in a tree network of a parallel computer

    DOE Patents [OSTI]

    Archer, Charles J.; Pinnow, Kurt W.; Wallenfelt, Brian P.

    2010-08-24

    Methods, parallel computers, and products are provided for identifying failure in a tree network of a parallel computer. The parallel computer includes one or more processing sets including an I/O node and a plurality of compute nodes. For each processing set embodiments include selecting a set of test compute nodes, the test compute nodes being a subset of the compute nodes of the processing set; measuring the performance of the I/O node of the processing set; measuring the performance of the selected set of test compute nodes; calculating a current test value in dependence upon the measured performance of the I/O node of the processing set, the measured performance of the set of test compute nodes, and a predetermined value for I/O node performance; and comparing the current test value with a predetermined tree performance threshold. If the current test value is below the predetermined tree performance threshold, embodiments include selecting another set of test compute nodes. If the current test value is not below the predetermined tree performance threshold, embodiments include selecting from the test compute nodes one or more potential problem nodes and testing individually potential problem nodes and links to potential problem nodes.

  20. Performing a scatterv operation on a hierarchical tree network optimized for collective operations

    DOE Patents [OSTI]

    Archer, Charles J; Blocksome, Michael A; Ratterman, Joseph D; Smith, Brian E

    2013-10-22

    Performing a scatterv operation on a hierarchical tree network optimized for collective operations including receiving, by the scatterv module installed on the node, from a nearest neighbor parent above the node a chunk of data having at least a portion of data for the node; maintaining, by the scatterv module installed on the node, the portion of the data for the node; determining, by the scatterv module installed on the node, whether any portions of the data are for a particular nearest neighbor child below the node or one or more other nodes below the particular nearest neighbor child; and sending, by the scatterv module installed on the node, those portions of data to the nearest neighbor child if any portions of the data are for a particular nearest neighbor child below the node or one or more other nodes below the particular nearest neighbor child.

  1. Data and Networking | Argonne Leadership Computing Facility

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Tape storage is used to archive data from completed projects. Disk Storage: The Blue GeneQ data systems consist of 384 IO nodes that connect to 16 storage area networks...

  2. Downhole drilling network using burst modulation techniques

    DOE Patents [OSTI]

    Hall; David R. , Fox; Joe

    2007-04-03

    A downhole drilling system is disclosed in one aspect of the present invention as including a drill string and a transmission line integrated into the drill string. Multiple network nodes are installed at selected intervals along the drill string and are adapted to communicate with one another through the transmission line. In order to efficiently allocate the available bandwidth, the network nodes are configured to use any of numerous burst modulation techniques to transmit data.

  3. Flexible network wireless transceiver and flexible network telemetry transceiver

    DOE Patents [OSTI]

    Brown, Kenneth D.

    2008-08-05

    A transceiver for facilitating two-way wireless communication between a baseband application and other nodes in a wireless network, wherein the transceiver provides baseband communication networking and necessary configuration and control functions along with transmitter, receiver, and antenna functions to enable the wireless communication. More specifically, the transceiver provides a long-range wireless duplex communication node or channel between the baseband application, which is associated with a mobile or fixed space, air, water, or ground vehicle or other platform, and other nodes in the wireless network or grid. The transceiver broadly comprises a communication processor; a flexible telemetry transceiver including a receiver and a transmitter; a power conversion and regulation mechanism; a diplexer; and a phased array antenna system, wherein these various components and certain subcomponents thereof may be separately enclosed and distributable relative to the other components and subcomponents.

  4. management

    National Nuclear Security Administration (NNSA)

    5%2A en Management and Budget http:www.nnsa.energy.govaboutusouroperationsmanagementandbudget

  5. System and method for time synchronization in a wireless network

    DOE Patents [OSTI]

    Gonia, Patrick S.; Kolavennu, Soumitri N.; Mahasenan, Arun V.; Budampati, Ramakrishna S.

    2010-03-30

    A system includes multiple wireless nodes forming a cluster in a wireless network, where each wireless node is configured to communicate and exchange data wirelessly based on a clock. One of the wireless nodes is configured to operate as a cluster master. Each of the other wireless nodes is configured to (i) receive time synchronization information from a parent node, (ii) adjust its clock based on the received time synchronization information, and (iii) broadcast time synchronization information based on the time synchronization information received by that wireless node. The time synchronization information received by each of the other wireless nodes is based on time synchronization information provided by the cluster master so that the other wireless nodes substantially synchronize their clocks with the clock of the cluster master.

  6. Thermal network reduction

    SciTech Connect (OSTI)

    Balcomb, J.D.

    1983-01-01

    A method is presented for reducing the number of elements required in a thermal network representation of a building. The method is based on matching the actual building response at two frequencies, the diurnal response and 3-day response. The procedure provides a straightforward methodology for combining all the various materials inside a discrete building zone into a few nodes while retaining a high degree of accuracy in the dynamic response. An example is given showing a comparison between a large network and the reduced network.

  7. Thermal network reduction

    SciTech Connect (OSTI)

    Balcomb, J.D.

    1983-06-01

    A method is presented for reducing the number of elements required in a thermal network representation of a building. The method is based on matching the actual building response at two frequencies, the diurnal response and 3-day response. The procedure provides a straightforward methodology for combining all the various materials inside a discrete building zone into a few nodes while retaining a high degree of accuracy in the dynamic response. An example is given showing a comparison between a large network and the reduced network.

  8. Networks of recyclable material waste-pickers cooperatives: An alternative for the solid waste management in the city of Rio de Janeiro

    SciTech Connect (OSTI)

    Tirado-Soto, Magda Martina; Zamberlan, Fabio Luiz

    2013-04-15

    Highlights: ? In the marketing of recyclable materials, the waste-pickers are the least wins. ? It is proposed creating a network of recycling cooperatives to achieve viability. ? The waste-pickers contribute to waste management to the city. - Abstract: The objective of this study is to discuss the role of networks formed of waste-picker cooperatives in ameliorating problems of final disposal of solid waste in the city of Rio de Janeiro, since the citys main landfill will soon have to close because of exhausted capacity. However, it is estimated that in the city of Rio de Janeiro there are around five thousand waste-pickers working in poor conditions, with lack of physical infrastructure and training, but contributing significantly by diverting solid waste from landfills. According to the Sustainable Development Indicators (IBGE, 2010a,b) in Brazil, recycling rates hover between 45% and 55%. In the municipality of Rio de Janeiro, only 1% of the waste produced is collected selectively by the government (COMLURB, 2010), demonstrating that recycling is mainly performed by waste-pickers. Furthermore, since the recycling market is an oligopsony that requires economies of scale to negotiate directly with industries, the idea of working in networks of cooperatives meets the demands for joint marketing of recyclable materials. Thus, this work presents a method for creating and structuring a network of recycling cooperatives, with prior training for working in networks, so that the expected synergies and joint efforts can lead to concrete results. We intend to demonstrate that it is first essential to strengthen the waste-pickers cooperatives in terms of infrastructure, governance and training so that solid waste management can be environmentally, socially and economically sustainable in the city of Rio de Janeiro.

  9. Continuum Modeling and Control of Large Nonuniform Wireless Networks via Nonlinear Partial Differential Equations

    DOE Public Access Gateway for Energy & Science Beta (PAGES Beta)

    Zhang, Yang; Chong, Edwin K. P.; Hannig, Jan; Estep, Donald

    2013-01-01

    We inmore » troduce a continuum modeling method to approximate a class of large wireless networks by nonlinear partial differential equations (PDEs). This method is based on the convergence of a sequence of underlying Markov chains of the network indexed by N , the number of nodes in the network. As N goes to infinity, the sequence converges to a continuum limit, which is the solution of a certain nonlinear PDE. We first describe PDE models for networks with uniformly located nodes and then generalize to networks with nonuniformly located, and possibly mobile, nodes. Based on the PDE models, we develop a method to control the transmissions in nonuniform networks so that the continuum limit is invariant under perturbations in node locations. This enables the networks to maintain stable global characteristics in the presence of varying node locations.« less

  10. Network Maps

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Network Maps Engineering Services The Network Network Maps Network Traffic Volume Historical Network Maps Network Facts & Stats Connected Sites Peering Connections ESnet...

  11. Dispatching packets on a global combining network of a parallel computer

    DOE Patents [OSTI]

    Almasi, Gheorghe; Archer, Charles J.

    2011-07-19

    Methods, apparatus, and products are disclosed for dispatching packets on a global combining network of a parallel computer comprising a plurality of nodes connected for data communications using the network capable of performing collective operations and point to point operations that include: receiving, by an origin system messaging module on an origin node from an origin application messaging module on the origin node, a storage identifier and an operation identifier, the storage identifier specifying storage containing an application message for transmission to a target node, and the operation identifier specifying a message passing operation; packetizing, by the origin system messaging module, the application message into network packets for transmission to the target node, each network packet specifying the operation identifier and an operation type for the message passing operation specified by the operation identifier; and transmitting, by the origin system messaging module, the network packets to the target node.

  12. management

    National Nuclear Security Administration (NNSA)

    5%2A en Management and Budget http:nnsa.energy.govaboutusouroperationsmanagementandbudget

    P...

  13. Implementing controlled-unitary operations over the butterfly network

    SciTech Connect (OSTI)

    Soeda, Akihito; Kinjo, Yoshiyuki; Turner, Peter S.; Murao, Mio

    2014-12-04

    We introduce a multiparty quantum computation task over a network in a situation where the capacities of both the quantum and classical communication channels of the network are limited and a bottleneck occurs. Using a resource setting introduced by Hayashi [1], we present an efficient protocol for performing controlled-unitary operations between two input nodes and two output nodes over the butterfly network, one of the most fundamental networks exhibiting the bottleneck problem. This result opens the possibility of developing a theory of quantum network coding for multiparty quantum computation, whereas the conventional network coding only treats multiparty quantum communication.

  14. Better Buildings Residential Network Peer Exchange Call Series...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Clean Energy Works (Network Member) Anna Markowski, Elevate Energy (Network Member) ... information. 24 Lessons Learned: Anna Markowski, Community Projects Manager ...

  15. Method and computer product to increase accuracy of time-based software verification for sensor networks

    DOE Patents [OSTI]

    Foo Kune, Denis; Mahadevan, Karthikeyan

    2011-01-25

    A recursive verification protocol to reduce the time variance due to delays in the network by putting the subject node at most one hop from the verifier node provides for an efficient manner to test wireless sensor nodes. Since the software signatures are time based, recursive testing will give a much cleaner signal for positive verification of the software running on any one node in the sensor network. In this protocol, the main verifier checks its neighbor, who in turn checks its neighbor, and continuing this process until all nodes have been verified. This ensures minimum time delays for the software verification. Should a node fail the test, the software verification downstream is halted until an alternative path (one not including the failed node) is found. Utilizing techniques well known in the art, having a node tested twice, or not at all, can be avoided.

  16. Energy efficient sensor network implementations

    SciTech Connect (OSTI)

    Frigo, Janette R; Raby, Eric Y; Brennan, Sean M; Kulathumani, Vinod; Rosten, Ed; Wolinski, Christophe; Wagner, Charles; Charot, Francois

    2009-01-01

    In this paper, we discuss a low power embedded sensor node architecture we are developing for distributed sensor network systems deployed in a natural environment. In particular, we examine the sensor node for energy efficient processing-at-the-sensor. We analyze the following modes of operation; event detection, sleep(wake-up), data acquisition, data processing modes using low power, high performance embedded technology such as specialized embedded DSP processors and a low power FPGAs at the sensing node. We use compute intensive sensor node applications: an acoustic vehicle classifier (frequency domain analysis) and a video license plate identification application (learning algorithm) as a case study. We report performance and total energy usage for our system implementations and discuss the system architecture design trade offs.

  17. Deadlock-free class routes for collective communications embedded in a multi-dimensional torus network

    DOE Patents [OSTI]

    Chen, Dong; Eisley, Noel A.; Steinmacher-Burow, Burkhard; Heidelberger, Philip

    2013-01-29

    A computer implemented method and a system for routing data packets in a multi-dimensional computer network. The method comprises routing a data packet among nodes along one dimension towards a root node, each node having input and output communication links, said root node not having any outgoing uplinks, and determining at each node if the data packet has reached a predefined coordinate for the dimension or an edge of the subrectangle for the dimension, and if the data packet has reached the predefined coordinate for the dimension or the edge of the subrectangle for the dimension, determining if the data packet has reached the root node, and if the data packet has not reached the root node, routing the data packet among nodes along another dimension towards the root node.

  18. Environmental sensor networks and continuous data quality assurance to manage salinity within a highly regulated river basin

    SciTech Connect (OSTI)

    Quinn, N.W.T.; Ortega, R.; Holm, L.

    2010-01-05

    This paper describes a new approach to environmental decision support for salinity management in the San Joaquin Basin of California that focuses on web-based data sharing using YSI Econet technology and continuous data quality management using a novel software tool, Aquarius.

  19. ALCF Systems 1: On-Node Goals of This Presentation:

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    And compare with that found in commodity HPC hardware. Highlight aspects of the architecture relevant to code optimization. A BGQ node looks like this: Not this: Data Motion,...

  20. Scaling the Earth System Grid to 100Gbps Networks

    SciTech Connect (OSTI)

    Balman, Mehmet; Sim, Alex

    2012-03-02

    The SC11 demonstration, titled Scaling the Earth System Grid to 100Gbps Networks, showed the ability to use underlying infrastructure for the movement of climate data over 100Gbps network. Climate change research is one of the critical data intensive sciences, and the amount of data is continuously growing. Climate simulation data is geographically distributed over the world, and it needs to be accessed from many sources for fast and efficient analysis and inter-comparison of simulations. We used a 100Gbps link connecting National Energy Research Scientific Computing Center (NERSC) at Lawrence Berkeley National Laboratory (LBNL), Argonne National Laboratory (ANL) and Oak Ridge National Laboratory (ORNL). In the demo, the Intergovernmental Panel on Climate Change (IPCC) Fourth Assessment Report (AR4) phase 3 of the Coupled Model Intercomparison Project (CMIP-3) dataset was staged into the memory of computing nodes at ANL and ORNL from NERSC over the 100Gbps network for analysis and visualization. In general, climate simulation data consists of relatively small and large files with irregular file size distribution in each dataset. In this demo, we addressed challenges on data management in terms of high bandwidth networks, usability of existing protocols and middleware tools, and how applications can adapt and benefit from next generation networks.

  1. Complexity analysis of pipeline mapping problems in distributed heterogeneous networks

    SciTech Connect (OSTI)

    Lin, Ying; Wu, Qishi; Zhu, Mengxia; Rao, Nageswara S

    2009-04-01

    Largescale scientific applications require using various system resources to execute complex computing pipelines in distributed networks to support collaborative research. System resources are typically shared in the Internet or over dedicated connections based on their location, availability, capability, and capacity. Optimizing the network performance of computing pipelines in such distributed environments is critical to the success of these applications. We consider two types of largescale distributed applications: (1) interactive applications where a single dataset is sequentially processed along a pipeline; and (2) streaming applications where a series of datasets continuously flow through a pipeline. The computing pipelines of these applications consist of a number of modules executed in a linear order in network environments with heterogeneous resources under different constraints. Our goal is to find an efficient mapping scheme that allocates the modules of a pipeline to network nodes for minimum endtoend delay or maximum frame rate. We formulate the pipeline mappings in distributed environments as optimization problems and categorize them into six classes with different optimization goals and mapping constraints: (1) Minimum Endtoend Delay with No Node Reuse (MEDNNR), (2) Minimum Endtoend Delay with Contiguous Node Reuse (MEDCNR), (3) Minimum Endtoend Delay with Arbitrary Node Reuse (MEDANR), (4) Maximum Frame Rate with No Node Reuse or Share (MFRNNRS), (5) Maximum Frame Rate with Contiguous Node Reuse and Share (MFRCNRS), and (6) Maximum Frame Rate with Arbitrary Node Reuse and Share (MFRANRS). Here, 'contiguous node reuse' means that multiple contiguous modules along the pipeline may run on the same node and 'arbitrary node reuse' imposes no restriction on node reuse. Note that in interactive applications, a node can be reused but its resource is not shared. We prove that MEDANR is polynomially solvable and the rest are NP-complete. MEDANR, where either contiguous or noncontiguous modules in the pipeline can be mapped onto the same node, is essentially the Maximum n-hop Shortest Path problem, and can be solved using a dynamic programming method. In MEDNNR and MFRNNRS, any network node can be used only once, which requires selecting the same number of nodes for onetoone onto mapping. We show its NP-completeness by reducing from the Hamiltonian Path problem. Node reuse is allowed in MEDCNR, MFRCNRS and MFRANRS, which are similar to the Maximum n-hop Shortest Path problem that considers resource sharing. We prove their NP-completeness by reducing from the Disjoint-Connecting-Path Problem and Widest path with the Linear Capacity Constraints problem, respectively.

  2. BER Science Network Requirements

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    BER Science Network Requirements Report of the Biological and Environmental Research Network Requirements Workshop Conducted July 26 and 27, 2007 BER Science Network Requirements Workshop Biological and Environmental Research Program Office, DOE Office of Science Energy Sciences Network Bethesda, MD - July 26 and 27, 2007 ESnet is funded by the US Dept. of Energy, Office of Science, Advanced Scientific Computing Research (ASCR) program. Dan Hitchcock is the ESnet Program Manager. ESnet is

  3. BES Science Network Requirements

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Network Requirements Report of the Basic Energy Sciences Network Requirements Workshop Conducted June 4-5, 2007 BES Science Network Requirements Workshop Basic Energy Sciences Program Office, DOE Office of Science Energy Sciences Network Washington, DC - June 4 and 5, 2007 ESnet is funded by the US Dept. of Energy, Office of Science, Advanced Scientific Computing Research (ASCR) program. Dan Hitchcock is the ESnet Program Manager. ESnet is operated by Lawrence Berkeley National Laboratory, which

  4. Metadata management staging system

    Energy Science and Technology Software Center (OSTI)

    2013-08-01

    Django application providing a user-interface for building a file and metadata management system. An evolution of our Node.js and CouchDb metadata management system. This one focuses on server functionality and uses a well-documented, rational and REST-ful API for data access.

  5. Network support for system initiated checkpoints

    DOE Patents [OSTI]

    Chen, Dong; Heidelberger, Philip

    2013-01-29

    A system, method and computer program product for supporting system initiated checkpoints in parallel computing systems. The system and method generates selective control signals to perform checkpointing of system related data in presence of messaging activity associated with a user application running at the node. The checkpointing is initiated by the system such that checkpoint data of a plurality of network nodes may be obtained even in the presence of user applications running on highly parallel computers that include ongoing user messaging activity.

  6. Multiscale wireless sensor node for impedance-based SHM and low-frequency vibration data acquisition

    SciTech Connect (OSTI)

    Taylor, Stuart G; Farinholt, Kevin M; Park, Gyuhae; Farrar, Charles R; Todd, Michael D

    2009-01-01

    This paper presents recent developments in an extremely compact, wireless impedance sensor node (WID3, Wireless Impedance Device) at Los Alamos National Laboratory for use in impedance-based structural health monitoring (SHM), Sensor diagnostics and low-frequency vibrational data acquisition. The current generation WID3 is equipped with an Analog Devices AD5933 impedance chip that can resolve measurements up to 100 kHz, a frequency range ideal for many SHM applications. An integrated set of multiplexers allows the end user to monitor seven piezoelectric sensors from a single sensor node. The WID3 combines on-board processing using an Atmega1281 microcontroller, data storage using flash memory, wireless communications capabilities, and a series of internal and external triggering options into a single package to realize a truly comprehensive, self-contained wireless active-sensor node for SHM applications. Furthermore, we recently extended the capability of this device by implementing low-frequency analog to digital and digital and analog converters so that the same device can measure structural vibration data. The WID3 requires less than 70 mW of power to operate, and it can operate in various wireless network paradigms. The performance of this miniaturized and portable device is compared to our previous results and its broader capabilities are demonstrated.

  7. Architecture of the Multi-Modal Organizational Research and Production Heterogeneous Network (MORPHnet)

    SciTech Connect (OSTI)

    Aiken, R.J.; Carlson, R.A.; Foster, I.T.

    1997-01-01

    The research and education (R&E) community requires persistent and scaleable network infrastructure to concurrently support production and research applications as well as network research. In the past, the R&E community has relied on supporting parallel network and end-node infrastructures, which can be very expensive and inefficient for network service managers and application programmers. The grand challenge in networking is to provide support for multiple, concurrent, multi-layer views of the network for the applications and the network researchers, and to satisfy the sometimes conflicting requirements of both while ensuring one type of traffic does not adversely affect the other. Internet and telecommunications service providers will also benefit from a multi-modal infrastructure, which can provide smoother transitions to new technologies and allow for testing of these technologies with real user traffic while they are still in the pre-production mode. The authors proposed approach requires the use of as much of the same network and end system infrastructure as possible to reduce the costs needed to support both classes of activities (i.e., production and research). Breaking the infrastructure into segments and objects (e.g., routers, switches, multiplexors, circuits, paths, etc.) gives the capability to dynamically construct and configure the virtual active networks to address these requirements. These capabilities must be supported at the campus, regional, and wide-area network levels to allow for collaboration by geographically dispersed groups. The Multi-Modal Organizational Research and Production Heterogeneous Network (MORPHnet) described in this report is an initial architecture and framework designed to identify and support the capabilities needed for the proposed combined infrastructure and to address related research issues.

  8. Aggregating job exit statuses of a plurality of compute nodes executing a parallel application

    DOE Patents [OSTI]

    Aho, Michael E.; Attinella, John E.; Gooding, Thomas M.; Mundy, Michael B.

    2015-07-21

    Aggregating job exit statuses of a plurality of compute nodes executing a parallel application, including: identifying a subset of compute nodes in the parallel computer to execute the parallel application; selecting one compute node in the subset of compute nodes in the parallel computer as a job leader compute node; initiating execution of the parallel application on the subset of compute nodes; receiving an exit status from each compute node in the subset of compute nodes, where the exit status for each compute node includes information describing execution of some portion of the parallel application by the compute node; aggregating each exit status from each compute node in the subset of compute nodes; and sending an aggregated exit status for the subset of compute nodes in the parallel computer.

  9. Regional Seismic Travel Time Node Get and Set

    Energy Science and Technology Software Center (OSTI)

    2012-10-24

    RSTT_NOGS allows users to easily get and set seismic velocity vs. depth profiles at specified model tessellation nodes. RSTT_NOGS uses the Sandia Seismic Location Baseline Model code that was released under BSD license in 2009.

  10. Microfluidic ultrasonic particle separators with engineered node locations

    Office of Scientific and Technical Information (OSTI)

    and geometries (Patent) | SciTech Connect SciTech Connect Search Results Patent: Microfluidic ultrasonic particle separators with engineered node locations and geometries Citation Details In-Document Search Title: Microfluidic ultrasonic particle separators with engineered node locations and geometries An ultrasonic microfluidic system includes a separation channel for conveying a sample fluid containing small particles and large particles, flowing substantially parallel, adjacent to a

  11. Microfluidic ultrasonic particle separators with engineered node locations

    Office of Scientific and Technical Information (OSTI)

    and geometries (Patent) | SciTech Connect Microfluidic ultrasonic particle separators with engineered node locations and geometries Citation Details In-Document Search Title: Microfluidic ultrasonic particle separators with engineered node locations and geometries An ultrasonic microfluidic system includes a separation channel for conveying a sample fluid containing small particles and large particles, flowing substantially parallel, adjacent to a recovery fluid, with which it is in contact.

  12. Microfluidic ultrasonic particle separators with engineered node locations

    Office of Scientific and Technical Information (OSTI)

    and geometries (Patent) | SciTech Connect Microfluidic ultrasonic particle separators with engineered node locations and geometries Citation Details In-Document Search Title: Microfluidic ultrasonic particle separators with engineered node locations and geometries An ultrasonic microfluidic system includes a separation channel for conveying a sample fluid containing small particles and large particles, flowing substantially parallel, adjacent to a recovery fluid, with which it is in contact.

  13. Microfluidic ultrasonic particle separators with engineered node locations

    Office of Scientific and Technical Information (OSTI)

    and geometries (Patent) | SciTech Connect Microfluidic ultrasonic particle separators with engineered node locations and geometries Citation Details In-Document Search Title: Microfluidic ultrasonic particle separators with engineered node locations and geometries × You are accessing a document from the Department of Energy's (DOE) SciTech Connect. This site is a product of DOE's Office of Scientific and Technical Information (OSTI) and is provided as a public service. Visit OSTI to utilize

  14. Microfluidic ultrasonic particle separators with engineered node locations

    Office of Scientific and Technical Information (OSTI)

    and geometries (Patent) | SciTech Connect Patent: Microfluidic ultrasonic particle separators with engineered node locations and geometries Citation Details In-Document Search Title: Microfluidic ultrasonic particle separators with engineered node locations and geometries × You are accessing a document from the Department of Energy's (DOE) SciTech Connect. This site is a product of DOE's Office of Scientific and Technical Information (OSTI) and is provided as a public service. Visit OSTI to

  15. Clock Agreement Among Parallel Supercomputer Nodes (Dataset) | SciTech

    Office of Scientific and Technical Information (OSTI)

    Connect Dataset: Clock Agreement Among Parallel Supercomputer Nodes Citation Details In-Document Search Title: Clock Agreement Among Parallel Supercomputer Nodes This dataset presents measurements that quantify the clock synchronization time-agreement characteristics among several high performance computers including the current world's most powerful machine for open science, the U.S. Department of Energy's Titan machine sited at Oak Ridge National Laboratory. These ultra-fast machines

  16. Toward portable programming of numerical linear algebra on manycore nodes.

    Office of Scientific and Technical Information (OSTI)

    (Conference) | SciTech Connect Toward portable programming of numerical linear algebra on manycore nodes. Citation Details In-Document Search Title: Toward portable programming of numerical linear algebra on manycore nodes. Abstract not provided. Authors: Heroux, Michael Allen Publication Date: 2011-05-01 OSTI Identifier: 1109301 Report Number(s): SAND2011-3556C 471555 DOE Contract Number: AC04-94AL85000 Resource Type: Conference Resource Relation: Conference: Toward petaflop numerical

  17. Dirac node arcs in PtSn4

    DOE Public Access Gateway for Energy & Science Beta (PAGES Beta)

    Wu, Yun; Wang, Lin -Lin; Mun, Eundeok; Johnson, D. D.; Mou, Daixiang; Huang, Lunan; Lee, Yongbin; Bud’ko, S. L.; Canfield, P. C.; Kaminski, Adam

    2016-04-04

    In topological quantum materials1,2,3 the conduction and valence bands are connected at points or along lines in the momentum space. A number of studies have demonstrated that several materials are indeed Dirac/Weyl semimetals4,5,6,7,8. However, there is still no experimental confirmation of materials with line nodes, in which the Dirac nodes form closed loops in the momentum space2,3. Here we report the discovery of a novel topological structure—Dirac node arcs—in the ultrahigh magnetoresistive material PtSn4 using laser-based angle-resolved photoemission spectroscopy data and density functional theory calculations. Unlike the closed loops of line nodes, the Dirac node arc structure arises owing tomore » the surface states and resembles the Dirac dispersion in graphene that is extended along a short line in the momentum space. Here, we propose that this reported Dirac node arc structure is a novel topological state that provides an exciting platform for studying the exotic properties of Dirac fermions.« less

  18. Complex network synchronization of chaotic systems with delay coupling

    SciTech Connect (OSTI)

    Theesar, S. Jeeva Sathya Ratnavelu, K.

    2014-03-05

    The study of complex networks enables us to understand the collective behavior of the interconnected elements and provides vast real time applications from biology to laser dynamics. In this paper, synchronization of complex network of chaotic systems has been studied. Every identical node in the complex network is assumed to be in Lur’e system form. In particular, delayed coupling has been assumed along with identical sector bounded nonlinear systems which are interconnected over network topology.

  19. Network Activity

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Statistics Network Activity Network Activity PDSF Network Uplinks to NERSC (dual 10 Gbps) NERSC Uplink to ESnet Last edited: 2011-03-31 22:20:59...

  20. Synchronization in networks of spatially extended systems

    SciTech Connect (OSTI)

    Filatova, Anastasiya E.; Hramov, Alexander E.; Koronovskii, Alexey A.; Boccaletti, Stefano

    2008-06-15

    Synchronization processes in networks of spatially extended dynamical systems are analytically and numerically studied. We focus on the relevant case of networks whose elements (or nodes) are spatially extended dynamical systems, with the nodes being connected with each other by scalar signals. The stability of the synchronous spatio-temporal state for a generic network is analytically assessed by means of an extension of the master stability function approach. We find an excellent agreement between the theoretical predictions and the data obtained by means of numerical calculations. The efficiency and reliability of this method is illustrated numerically with networks of beam-plasma chaotic systems (Pierce diodes). We discuss also how the revealed regularities are expected to take place in other relevant physical and biological circumstances.

  1. Axillary lymph node dose with tangential breast irradiation

    SciTech Connect (OSTI)

    Reed, Daniel R. . E-mail: drreed@u.washington.edu; Lindsley, Skyler Karen; Mann, Gary N.; Austin-Seymour, Mary; Korssjoen, Tammy; Anderson, Benjamin O.; Moe, Roger

    2005-02-01

    Purpose: The advent of sentinel lymph node mapping and biopsy in the staging of breast cancer has resulted in a significant decrease in the extent of axillary nodal surgery. As the extent of axillary surgery decreases, the radiation dose and distribution within the axilla becomes increasingly important for current therapy planning and future analysis of results. This analysis examined the radiation dose distribution delivered to the anatomically defined axillary level I and II lymph node volume and surgically placed axillary clips with conventional tangential breast fields and CT-based three-dimensional (3D) planning. Methods and materials: Fifty consecutive patients with early-stage breast cancer undergoing breast conservation therapy were evaluated. All patients underwent 3D CT-based planning with conventional breast tangential fields designed to encompass the entire breast parenchyma. Using CT-based 3D planning, the dose distribution of the standard tangential breast irradiation fields was examined in relationship to the axillary level I and II lymph node volumes. Axillary level I and II lymph node anatomic volumes were defined by CT and surgical clips placed during complete level I-II lymph node dissection. Axillary level I-II lymph node volume doses were examined on the basis of the prescribed breast radiation dose and 3D dose distribution. Results: All defined breast volumes received {>=}95% of the prescribed dose. By contrast, the 95% isodose line encompassed only an average of 55% (range, 23-87%) of the axillary level I-II lymph node anatomic volume. No patient had complete coverage of the axillary level I-II lymph node region by the 95% isodose line. The mean anatomic axillary level I-II volume was 146.3 cm{sup 3} (range, 83.1-313.0 cm{sup 3}). The mean anatomic axillary level I-II volume encompassed by the 95% isodose line was 84.9 cm{sup 3} (range, 25.1-219.0 cm{sup 3}). The mean 95% isodose coverage of the surgical clip volume was 80%, and the median value was 81% (range, 58-98%). The mean volume deficit between the axillary level I-II volume and the surgical clip volume was 41.7 cm{sup 3} (median, 30.0 cc). Conclusion: In this study, standard tangential breast radiation fields failed to deliver a therapeutic dose adequately to the axillary level I-II lymph node anatomic volume. No patient received complete coverage of the axillary level I-II lymph node volume. Surgically placed axillary clips also failed to delineate the level I-II axilla adequately. Definitive irradiation of the level I and II axillary lymph node region requires significant modification of standard tangential fields, best accomplished with 3D treatment planning, with specific targeting of anatomically defined axillary lymph node volumes as described, in addition to the breast parenchymal volumes.

  2. Earth System Grid (ESG) Data Node Software Stack

    Energy Science and Technology Software Center (OSTI)

    2009-12-01

    The ESG-CET system consist of two major components: 1) Gateways that support portal services, which serve as interfaces to end-users who can search, discover, and request data and data products, and 2) Data Nodes where the data actually resides. The Data is "published" to the Data Node, which makes the data visible to a Gateway and enables its delivery to end-users. It is expected that Gateways will only be installed by a small number ofmore » centers devoted to serving data (e.g., LLNL/PCMDI, NCAR, GFDL, DADC, DKRZ, ANU, JAMSTEC), whereas it is hoped that most climate modeling centers will install the Data Node software through which they can serve their model output.« less

  3. Towards A Network-of-Networks Framework for Cyber Security

    SciTech Connect (OSTI)

    Halappanavar, Mahantesh; Choudhury, Sutanay; Hogan, Emilie A.; Hui, Peter SY; Johnson, John R.; Ray, Indrajit; Holder, Lawrence B.

    2013-06-07

    Networks-of-networks (NoN) is a graph-theoretic model of interdependent networks that have distinct dynamics at each network (layer). By adding special edges to represent relationships between nodes in different layers, NoN provides a unified mechanism to study interdependent systems intertwined in a complex relationship. While NoN based models have been proposed for cyber-physical systems, in this paper we build towards a three-layer NoN model for an enterprise cyber system. Each layer captures a different facet of a cyber system. We then discuss the potential benefits of graph-theoretic analysis enabled from such a model. Our goal is to provide a novel and powerful tool for modeling and analyzing problems in cyber security.

  4. Microfluidic ultrasonic particle separators with engineered node locations and geometries

    DOE Patents [OSTI]

    Rose, Klint A; Fisher, Karl A; Wajda, Douglas A; Mariella, Jr., Raymond P; Bailey, Christopher; Dehlinger, Dietrich; Shusteff, Maxim; Jung, Byoungsok; Ness, Kevin D

    2015-03-31

    An ultrasonic microfluidic system includes a separation channel for conveying a sample fluid containing small particles and large particles, flowing substantially parallel, adjacent to a recovery fluid, with which it is in contact. An acoustic transducer produces an ultrasound standing wave, that generates a pressure field having at least one node of minimum, pressure amplitude. An acoustic extension structure is located proximate to said separation channel for positioning said acoustic node off center in said acoustic area and concentrating the large particles in said recovery fluid stream.

  5. Microfluidic ultrasonic particle separators with engineered node locations and geometries

    DOE Patents [OSTI]

    Rose, Klint A; Fisher, Karl A; Wajda, Douglas A; Mariella, Jr., Raymond P; Bailey, Christoppher; Dehlinger, Dietrich; Shusteff, Maxim; Jung, Byoungsok; Ness, Kevin D

    2014-05-20

    An ultrasonic microfluidic system includes a separation channel for conveying a sample fluid containing small particles and large particles, flowing substantially parallel, adjacent to a recovery fluid, with which it is in contact. An acoustic transducer produces an ultrasound standing wave, that generates a pressure field having at least one node of minimum pressure amplitude. An acoustic extension structure is located proximate to said separation channel for positioning said acoustic node off center in said acoustic area and concentrating the large particles in said recovery fluid stream.

  6. Performing an allreduce operation on a plurality of compute nodes of a parallel computer

    DOE Patents [OSTI]

    Faraj, Ahmad

    2013-07-09

    Methods, apparatus, and products are disclosed for performing an allreduce operation on a plurality of compute nodes of a parallel computer, each node including at least two processing cores, that include: establishing, for each node, a plurality of logical rings, each ring including a different set of at least one core on that node, each ring including the cores on at least two of the nodes; iteratively for each node: assigning each core of that node to one of the rings established for that node to which the core has not previously been assigned, and performing, for each ring for that node, a global allreduce operation using contribution data for the cores assigned to that ring or any global allreduce results from previous global allreduce operations, yielding current global allreduce results for each core; and performing, for each node, a local allreduce operation using the global allreduce results.

  7. Performing an allreduce operation on a plurality of compute nodes of a parallel computer

    DOE Patents [OSTI]

    Faraj, Ahmad

    2013-02-12

    Methods, apparatus, and products are disclosed for performing an allreduce operation on a plurality of compute nodes of a parallel computer, each node including at least two processing cores, that include: performing, for each node, a local reduction operation using allreduce contribution data for the cores of that node, yielding, for each node, a local reduction result for one or more representative cores for that node; establishing one or more logical rings among the nodes, each logical ring including only one of the representative cores from each node; performing, for each logical ring, a global allreduce operation using the local reduction result for the representative cores included in that logical ring, yielding a global allreduce result for each representative core included in that logical ring; and performing, for each node, a local broadcast operation using the global allreduce results for each representative core on that node.

  8. Software Defined Networking (SDN) Project

    Energy Savers [EERE]

    Software Defined Networking (SDN) Project Energy sector-focused SDN flow controller to manage control system networks centrally and securely Background Traditional information technology (IT) approaches to network administration and packet delivery are not always appropriate for electric industry applications. The nondeterministic latency and configuration complexity make network design difficult for the deterministic, static control systems of the energy sector. In the electric industry, it is

  9. Anomaly Detection in Dynamic Networks

    SciTech Connect (OSTI)

    Turcotte, Melissa

    2014-10-14

    Anomaly detection in dynamic communication networks has many important security applications. These networks can be extremely large and so detecting any changes in their structure can be computationally challenging; hence, computationally fast, parallelisable methods for monitoring the network are paramount. For this reason the methods presented here use independent node and edge based models to detect locally anomalous substructures within communication networks. As a first stage, the aim is to detect changes in the data streams arising from node or edge communications. Throughout the thesis simple, conjugate Bayesian models for counting processes are used to model these data streams. A second stage of analysis can then be performed on a much reduced subset of the network comprising nodes and edges which have been identified as potentially anomalous in the first stage. The first method assumes communications in a network arise from an inhomogeneous Poisson process with piecewise constant intensity. Anomaly detection is then treated as a changepoint problem on the intensities. The changepoint model is extended to incorporate seasonal behavior inherent in communication networks. This seasonal behavior is also viewed as a changepoint problem acting on a piecewise constant Poisson process. In a static time frame, inference is made on this extended model via a Gibbs sampling strategy. In a sequential time frame, where the data arrive as a stream, a novel, fast Sequential Monte Carlo (SMC) algorithm is introduced to sample from the sequence of posterior distributions of the change points over time. A second method is considered for monitoring communications in a large scale computer network. The usage patterns in these types of networks are very bursty in nature and don’t fit a Poisson process model. For tractable inference, discrete time models are considered, where the data are aggregated into discrete time periods and probability models are fitted to the communication counts. In a sequential analysis, anomalous behavior is then identified from outlying behavior with respect to the fitted predictive probability models. Seasonality is again incorporated into the model and is treated as a changepoint model on the transition probabilities of a discrete time Markov process. Second stage analytics are then developed which combine anomalous edges to identify anomalous substructures in the network.

  10. SU-E-T-51: Bayesian Network Models for Radiotherapy Error Detection

    SciTech Connect (OSTI)

    Kalet, A; Phillips, M; Gennari, J

    2014-06-01

    Purpose: To develop a probabilistic model of radiotherapy plans using Bayesian networks that will detect potential errors in radiation delivery. Methods: Semi-structured interviews with medical physicists and other domain experts were employed to generate a set of layered nodes and arcs forming a Bayesian Network (BN) which encapsulates relevant radiotherapy concepts and their associated interdependencies. Concepts in the final network were limited to those whose parameters are represented in the institutional database at a level significant enough to develop mathematical distributions. The concept-relation knowledge base was constructed using the Web Ontology Language (OWL) and translated into Hugin Expert Bayes Network files via the the RHugin package in the R statistical programming language. A subset of de-identified data derived from a Mosaiq relational database representing 1937 unique prescription cases was processed and pre-screened for errors and then used by the Hugin implementation of the Estimation-Maximization (EM) algorithm for machine learning all parameter distributions. Individual networks were generated for each of several commonly treated anatomic regions identified by ICD-9 neoplasm categories including lung, brain, lymphoma, and female breast. Results: The resulting Bayesian networks represent a large part of the probabilistic knowledge inherent in treatment planning. By populating the networks entirely with data captured from a clinical oncology information management system over the course of several years of normal practice, we were able to create accurate probability tables with no additional time spent by experts or clinicians. These probabilistic descriptions of the treatment planning allow one to check if a treatment plan is within the normal scope of practice, given some initial set of clinical evidence and thereby detect for potential outliers to be flagged for further investigation. Conclusion: The networks developed here support the use of probabilistic models into clinical chart checking for improved detection of potential errors in RT plans.

  11. Soft-core processor study for node-based architectures.

    SciTech Connect (OSTI)

    Van Houten, Jonathan Roger; Jarosz, Jason P.; Welch, Benjamin James; Gallegos, Daniel E.; Learn, Mark Walter

    2008-09-01

    Node-based architecture (NBA) designs for future satellite projects hold the promise of decreasing system development time and costs, size, weight, and power and positioning the laboratory to address other emerging mission opportunities quickly. Reconfigurable Field Programmable Gate Array (FPGA) based modules will comprise the core of several of the NBA nodes. Microprocessing capabilities will be necessary with varying degrees of mission-specific performance requirements on these nodes. To enable the flexibility of these reconfigurable nodes, it is advantageous to incorporate the microprocessor into the FPGA itself, either as a hardcore processor built into the FPGA or as a soft-core processor built out of FPGA elements. This document describes the evaluation of three reconfigurable FPGA based processors for use in future NBA systems--two soft cores (MicroBlaze and non-fault-tolerant LEON) and one hard core (PowerPC 405). Two standard performance benchmark applications were developed for each processor. The first, Dhrystone, is a fixed-point operation metric. The second, Whetstone, is a floating-point operation metric. Several trials were run at varying code locations, loop counts, processor speeds, and cache configurations. FPGA resource utilization was recorded for each configuration. Cache configurations impacted the results greatly; for optimal processor efficiency it is necessary to enable caches on the processors. Processor caches carry a penalty; cache error mitigation is necessary when operating in a radiation environment.

  12. Network for minimizing current imbalances in a faradaic battery

    DOE Patents [OSTI]

    Wozniak, Walter; Haskins, Harold J.

    1994-01-01

    A circuit for connecting a faradaic battery with circuitry for monitoring the condition of the battery includes a plurality of voltage divider networks providing battery voltage monitoring nodes and includes compensating resistors connected with the networks to maintain uniform discharge currents through the cells of the battery. The circuit also provides a reduced common mode voltage requirement for the monitoring circuitry by referencing the divider networks to one-half the battery voltage.

  13. Self-pacing direct memory access data transfer operations for compute nodes in a parallel computer

    DOE Patents [OSTI]

    Blocksome, Michael A

    2015-02-17

    Methods, apparatus, and products are disclosed for self-pacing DMA data transfer operations for nodes in a parallel computer that include: transferring, by an origin DMA on an origin node, a RTS message to a target node, the RTS message specifying an message on the origin node for transfer to the target node; receiving, in an origin injection FIFO for the origin DMA from a target DMA on the target node in response to transferring the RTS message, a target RGET descriptor followed by a DMA transfer operation descriptor, the DMA descriptor for transmitting a message portion to the target node, the target RGET descriptor specifying an origin RGET descriptor on the origin node that specifies an additional DMA descriptor for transmitting an additional message portion to the target node; processing, by the origin DMA, the target RGET descriptor; and processing, by the origin DMA, the DMA transfer operation descriptor.

  14. Reducing power consumption while synchronizing a plurality of compute nodes during execution of a parallel application

    DOE Patents [OSTI]

    Archer, Charles J.; Blocksome, Michael A.; Peters, Amanda A.; Ratterman, Joseph D.; Smith, Brian E.

    2012-01-10

    Methods, apparatus, and products are disclosed for reducing power consumption while synchronizing a plurality of compute nodes during execution of a parallel application that include: beginning, by each compute node, performance of a blocking operation specified by the parallel application, each compute node beginning the blocking operation asynchronously with respect to the other compute nodes; reducing, for each compute node, power to one or more hardware components of that compute node in response to that compute node beginning the performance of the blocking operation; and restoring, for each compute node, the power to the hardware components having power reduced in response to all of the compute nodes beginning the performance of the blocking operation.

  15. Reducing power consumption while synchronizing a plurality of compute nodes during execution of a parallel application

    DOE Patents [OSTI]

    Archer, Charles J.; Blocksome, Michael A.; Peters, Amanda E.; Ratterman, Joseph D.; Smith, Brian E.

    2012-04-17

    Methods, apparatus, and products are disclosed for reducing power consumption while synchronizing a plurality of compute nodes during execution of a parallel application that include: beginning, by each compute node, performance of a blocking operation specified by the parallel application, each compute node beginning the blocking operation asynchronously with respect to the other compute nodes; reducing, for each compute node, power to one or more hardware components of that compute node in response to that compute node beginning the performance of the blocking operation; and restoring, for each compute node, the power to the hardware components having power reduced in response to all of the compute nodes beginning the performance of the blocking operation.

  16. Implementing asyncronous collective operations in a multi-node processing system

    DOE Patents [OSTI]

    Chen, Dong; Eisley, Noel A.; Heidelberger, Philip; Kumar, Sameer; Salapura, Valentina; Steinmacher-Burow, Burkhard

    2014-07-08

    A method, system, and computer program product are disclosed for implementing an asynchronous collective operation in a multi-node data processing system. In one embodiment, the method comprises sending data to a plurality of nodes in the data processing system, broadcasting a remote get to the plurality of nodes, and using this remote get to implement asynchronous collective operations on the data by the plurality of nodes. In one embodiment, each of the nodes performs only one task in the asynchronous operations, and each nodes sets up a base address table with an entry for a base address of a memory buffer associated with said each node. In another embodiment, each of the nodes performs a plurality of tasks in said collective operations, and each task of each node sets up a base address table with an entry for a base address of a memory buffer associated with the task.

  17. Building A Science DMZ Eli Dart, Network Engineer ESnet Network Engineering Group

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    A Science DMZ Eli Dart, Network Engineer ESnet Network Engineering Group Joint Techs, Winter 2013 Honolulu, HI January 13, 2013 Lawrence Berkeley National Laboratory U.S. Department of Energy | Office of Science Outline of the Afternoon Eli Dart, ESnet * Science DMZ architecture, security Brian Tierney, ESnet * Data transfer node, tools overview Raj Kettimuthu, ANL and University of Chicago * Globus Online -Short break- Jason Zurawski, Internet2 * perfSONAR Guy Almes, Texas A&M University *

  18. Hybrid function projective synchronization in complex dynamical networks

    SciTech Connect (OSTI)

    Wei, Qiang; Wang, Xing-yuan, E-mail: wangxy@dlut.edu.cn; Hu, Xiao-peng [Faculty of Electronic Information and Electrical Engineering, Dalian University of Technology, Dalian, 116024 (China)] [Faculty of Electronic Information and Electrical Engineering, Dalian University of Technology, Dalian, 116024 (China)

    2014-02-15

    This paper investigates hybrid function projective synchronization in complex dynamical networks. When the complex dynamical networks could be synchronized up to an equilibrium or periodic orbit, a hybrid feedback controller is designed to realize the different component of vector of node could be synchronized up to different desired scaling function in complex dynamical networks with time delay. Hybrid function projective synchronization (HFPS) in complex dynamical networks with constant delay and HFPS in complex dynamical networks with time-varying coupling delay are researched, respectively. Finally, the numerical simulations show the effectiveness of theoretical analysis.

  19. Fast, moment-based estimation methods for delay network tomography (Journal

    Office of Scientific and Technical Information (OSTI)

    Article) | SciTech Connect Fast, moment-based estimation methods for delay network tomography Citation Details In-Document Search Title: Fast, moment-based estimation methods for delay network tomography Consider the delay network tomography problem where the goal is to estimate distributions of delays at the link-level using data on end-to-end delays. These measurements are obtained using probes that are injected at nodes located on the periphery of the network and sent to other nodes also

  20. The Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Network Engineering Services The Network Network Maps Network Facts & Stats Connected Sites Peering Connections ESnet Site Availabiliy OSCARS Fasterdata IPv6 Network Network Performance Tools The ESnet Engineering Team Contact Us Technical Assistance: 1 800-33-ESnet (Inside US) 1 800-333-7638 (Inside US) 1 510-486-7600 (Globally) 1 510-486-7607 (Globally) Report Network Problems: trouble@es.net Provide Web Site Feedback: info@es.net The Network A Nationwide Platform for Science Discovery The

  1. Method and apparatus for obtaining stack traceback data for multiple computing nodes of a massively parallel computer system

    DOE Patents [OSTI]

    Gooding, Thomas Michael; McCarthy, Patrick Joseph

    2010-03-02

    A data collector for a massively parallel computer system obtains call-return stack traceback data for multiple nodes by retrieving partial call-return stack traceback data from each node, grouping the nodes in subsets according to the partial traceback data, and obtaining further call-return stack traceback data from a representative node or nodes of each subset. Preferably, the partial data is a respective instruction address from each node, nodes having identical instruction address being grouped together in the same subset. Preferably, a single node of each subset is chosen and full stack traceback data is retrieved from the call-return stack within the chosen node.

  2. Identifying logical planes formed of compute nodes of a subcommunicator in a parallel computer

    DOE Patents [OSTI]

    Davis, Kristan D.; Faraj, Daniel A.

    2016-03-01

    In a parallel computer, a plurality of logical planes formed of compute nodes of a subcommunicator may be identified by: for each compute node of the subcommunicator and for a number of dimensions beginning with a first dimension: establishing, by a plane building node, in a positive direction of the first dimension, all logical planes that include the plane building node and compute nodes of the subcommunicator in a positive direction of a second dimension, where the second dimension is orthogonal to the first dimension; and establishing, by the plane building node, in a negative direction of the first dimension, all logical planes that include the plane building node and compute nodes of the subcommunicator in the positive direction of the second dimension.

  3. Broadband Energy Networks Inc | Open Energy Information

    Open Energy Info (EERE)

    Darby, Pennsylvania Zip: 19082 Product: Provides automated equipment and usage monitoring systems for energy management. References: Broadband Energy Networks Inc1 This article...

  4. Reducing power consumption while performing collective operations on a plurality of compute nodes

    DOE Patents [OSTI]

    Archer, Charles J.; Blocksome, Michael A.; Peters, Amanda E.; Ratterman, Joseph D.; Smith, Brian E.

    2011-10-18

    Methods, apparatus, and products are disclosed for reducing power consumption while performing collective operations on a plurality of compute nodes that include: receiving, by each compute node, instructions to perform a type of collective operation; selecting, by each compute node from a plurality of collective operations for the collective operation type, a particular collective operation in dependence upon power consumption characteristics for each of the plurality of collective operations; and executing, by each compute node, the selected collective operation.

  5. Analysis of Cluster Management Tools

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Analysis of Configuration Management Tools Computer System, Cluster, and Networking Summer Institute Team: Evan Leeseberg, James Kang, Katherine Nystrom Mentors: Kevin Tegtmeier,...

  6. Profiling an application for power consumption during execution on a plurality of compute nodes

    DOE Patents [OSTI]

    Archer, Charles J.; Blocksome, Michael A.; Peters, Amanda E.; Ratterman, Joseph D.; Smith, Brian E.

    2012-08-21

    Methods, apparatus, and products are disclosed for profiling an application for power consumption during execution on a compute node that include: receiving an application for execution on a compute node; identifying a hardware power consumption profile for the compute node, the hardware power consumption profile specifying power consumption for compute node hardware during performance of various processing operations; determining a power consumption profile for the application in dependence upon the application and the hardware power consumption profile for the compute node; and reporting the power consumption profile for the application.

  7. Profiling an application for power consumption during execution on a compute node

    DOE Patents [OSTI]

    Archer, Charles J; Blocksome, Michael A; Peters, Amanda E; Ratterman, Joseph D; Smith, Brian E

    2013-09-17

    Methods, apparatus, and products are disclosed for profiling an application for power consumption during execution on a compute node that include: receiving an application for execution on a compute node; identifying a hardware power consumption profile for the compute node, the hardware power consumption profile specifying power consumption for compute node hardware during performance of various processing operations; determining a power consumption profile for the application in dependence upon the application and the hardware power consumption profile for the compute node; and reporting the power consumption profile for the application.

  8. Reducing power consumption during execution of an application on a plurality of compute nodes

    DOE Patents [OSTI]

    Archer, Charles J.; Blocksome, Michael A.; Peters, Amanda E.; Ratterman, Joseph D.; Smith, Brian E.

    2012-06-05

    Methods, apparatus, and products are disclosed for reducing power consumption during execution of an application on a plurality of compute nodes that include: executing, by each compute node, an application, the application including power consumption directives corresponding to one or more portions of the application; identifying, by each compute node, the power consumption directives included within the application during execution of the portions of the application corresponding to those identified power consumption directives; and reducing power, by each compute node, to one or more components of that compute node according to the identified power consumption directives during execution of the portions of the application corresponding to those identified power consumption directives.

  9. Simple Linux Utility for Resource Management

    Energy Science and Technology Software Center (OSTI)

    2009-09-09

    SLURM is an open source, fault-tolerant, and highly scalable cluster management and job scheduling system for large and small computer clusters. As a cluster resource manager, SLURM has three key functions. First, it allocates exclusive and/or non exclusive access to resources (compute nodes) to users for some duration of time so they can perform work. Second, it provides a framework for starting, executing, and monitoring work (normally a parallel job) on the set of allciatedmore » nodes. Finally, it arbitrates conflicting requests for resouces by managing a queue of pending work.« less

  10. Low latency, high bandwidth data communications between compute nodes in a parallel computer

    DOE Patents [OSTI]

    Blocksome, Michael A

    2014-04-22

    Methods, systems, and products are disclosed for data transfers between nodes in a parallel computer that include: receiving, by an origin DMA on an origin node, a buffer identifier for a buffer containing data for transfer to a target node; sending, by the origin DMA to the target node, a RTS message; transferring, by the origin DMA, a data portion to the target node using a memory FIFO operation that specifies one end of the buffer from which to begin transferring the data; receiving, by the origin DMA, an acknowledgement of the RTS message from the target node; and transferring, by the origin DMA in response to receiving the acknowledgement, any remaining data portion to the target node using a direct put operation that specifies the other end of the buffer from which to begin transferring the data, including initiating the direct put operation without invoking an origin processing core.

  11. Low latency, high bandwidth data communications between compute nodes in a parallel computer

    DOE Patents [OSTI]

    Blocksome, Michael A

    2014-04-01

    Methods, systems, and products are disclosed for data transfers between nodes in a parallel computer that include: receiving, by an origin DMA on an origin node, a buffer identifier for a buffer containing data for transfer to a target node; sending, by the origin DMA to the target node, a RTS message; transferring, by the origin DMA, a data portion to the target node using a memory FIFO operation that specifies one end of the buffer from which to begin transferring the data; receiving, by the origin DMA, an acknowledgement of the RTS message from the target node; and transferring, by the origin DMA in response to receiving the acknowledgement, any remaining data portion to the target node using a direct put operation that specifies the other end of the buffer from which to begin transferring the data, including initiating the direct put operation without invoking an origin processing core.

  12. Chaining direct memory access data transfer operations for compute nodes in a parallel computer

    DOE Patents [OSTI]

    Archer, Charles J.; Blocksome, Michael A.

    2010-09-28

    Methods, systems, and products are disclosed for chaining DMA data transfer operations for compute nodes in a parallel computer that include: receiving, by an origin DMA engine on an origin node in an origin injection FIFO buffer for the origin DMA engine, a RGET data descriptor specifying a DMA transfer operation data descriptor on the origin node and a second RGET data descriptor on the origin node, the second RGET data descriptor specifying a target RGET data descriptor on the target node, the target RGET data descriptor specifying an additional DMA transfer operation data descriptor on the origin node; creating, by the origin DMA engine, an RGET packet in dependence upon the RGET data descriptor, the RGET packet containing the DMA transfer operation data descriptor and the second RGET data descriptor; and transferring, by the origin DMA engine to a target DMA engine on the target node, the RGET packet.

  13. Pacing a data transfer operation between compute nodes on a parallel computer

    DOE Patents [OSTI]

    Blocksome, Michael A.

    2011-09-13

    Methods, systems, and products are disclosed for pacing a data transfer between compute nodes on a parallel computer that include: transferring, by an origin compute node, a chunk of an application message to a target compute node; sending, by the origin compute node, a pacing request to a target direct memory access (`DMA`) engine on the target compute node using a remote get DMA operation; determining, by the origin compute node, whether a pacing response to the pacing request has been received from the target DMA engine; and transferring, by the origin compute node, a next chunk of the application message if the pacing response to the pacing request has been received from the target DMA engine.

  14. Low latency, high bandwidth data communications between compute nodes in a parallel computer

    DOE Patents [OSTI]

    Blocksome, Michael A

    2013-07-02

    Methods, systems, and products are disclosed for data transfers between nodes in a parallel computer that include: receiving, by an origin DMA on an origin node, a buffer identifier for a buffer containing data for transfer to a target node; sending, by the origin DMA to the target node, a RTS message; transferring, by the origin DMA, a data portion to the target node using a memory FIFO operation that specifies one end of the buffer from which to begin transferring the data; receiving, by the origin DMA, an acknowledgement of the RTS message from the target node; and transferring, by the origin DMA in response to receiving the acknowledgement, any remaining data portion to the target node using a direct put operation that specifies the other end of the buffer from which to begin transferring the data, including initiating the direct put operation without invoking an origin processing core.

  15. Performing an allreduce operation on a plurality of compute nodes of a parallel computer

    DOE Patents [OSTI]

    Faraj, Ahmad

    2012-04-17

    Methods, apparatus, and products are disclosed for performing an allreduce operation on a plurality of compute nodes of a parallel computer. Each compute node includes at least two processing cores. Each processing core has contribution data for the allreduce operation. Performing an allreduce operation on a plurality of compute nodes of a parallel computer includes: establishing one or more logical rings among the compute nodes, each logical ring including at least one processing core from each compute node; performing, for each logical ring, a global allreduce operation using the contribution data for the processing cores included in that logical ring, yielding a global allreduce result for each processing core included in that logical ring; and performing, for each compute node, a local allreduce operation using the global allreduce results for each processing core on that compute node.

  16. Cross-linked structure of network evolution

    SciTech Connect (OSTI)

    Bassett, Danielle S.; Wymbs, Nicholas F.; Grafton, Scott T.; Porter, Mason A.; CABDyN Complexity Centre, University of Oxford, Oxford, OX1 1HP ; Mucha, Peter J.; Department of Applied Physical Sciences, University of North Carolina, Chapel Hill, North Carolina 27599

    2014-03-15

    We study the temporal co-variation of network co-evolution via the cross-link structure of networks, for which we take advantage of the formalism of hypergraphs to map cross-link structures back to network nodes. We investigate two sets of temporal network data in detail. In a network of coupled nonlinear oscillators, hyperedges that consist of network edges with temporally co-varying weights uncover the driving co-evolution patterns of edge weight dynamics both within and between oscillator communities. In the human brain, networks that represent temporal changes in brain activity during learning exhibit early co-evolution that then settles down with practice. Subsequent decreases in hyperedge size are consistent with emergence of an autonomous subgraph whose dynamics no longer depends on other parts of the network. Our results on real and synthetic networks give a poignant demonstration of the ability of cross-link structure to uncover unexpected co-evolution attributes in both real and synthetic dynamical systems. This, in turn, illustrates the utility of analyzing cross-links for investigating the structure of temporal networks.

  17. Resilience of complex networks to random breakdown

    SciTech Connect (OSTI)

    Paul, Gerald; Sreenivasan, Sameet; Stanley, H. Eugene

    2005-11-01

    Using Monte Carlo simulations we calculate f{sub c}, the fraction of nodes that are randomly removed before global connectivity is lost, for networks with scale-free and bimodal degree distributions. Our results differ from the results predicted by an equation for f{sub c} proposed by Cohen et al. We discuss the reasons for this disagreement and clarify the domain for which the proposed equation is valid.

  18. Strategic Energy Management

    Broader source: Energy.gov [DOE]

    The U.S. Department of Energy (DOE) SEE Action Network and Weatherization and Intergovernmental Program Technical Assistance Program sponsored this webinar about strategic management in the public sector on November 7, 2012.

  19. NERSC Data Management Policies

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Data Management Policies NERSC Data Management Policies Introduction NERSC provides its users with the means to store, manage, and share their research data products. In addition to systems specifically tailored for data-intensive computations, we provide a variety of storage resources optimized for different phases of the data lifecycle; tools to enable users to manage, protect, and control their data; high-speed networks for intra-site and inter-site (ESnet) data transfer; gateways and portals

  20. Group key management

    SciTech Connect (OSTI)

    Dunigan, T.; Cao, C.

    1997-08-01

    This report describes an architecture and implementation for doing group key management over a data communications network. The architecture describes a protocol for establishing a shared encryption key among an authenticated and authorized collection of network entities. Group access requires one or more authorization certificates. The implementation includes a simple public key and certificate infrastructure. Multicast is used for some of the key management messages. An application programming interface multiplexes key management and user application messages. An implementation using the new IP security protocols is postulated. The architecture is compared with other group key management proposals, and the performance and the limitations of the implementation are described.

  1. RECOVERY ACT - Robust Optimization for Connectivity and Flows in Dynamic Complex Networks

    SciTech Connect (OSTI)

    Balasundaram, Balabhaskar; Butenko, Sergiy; Boginski, Vladimir; Uryasev, Stan

    2013-12-25

    The goal of this project was to study robust connectivity and flow patterns of complex multi-scale systems modeled as networks. Networks provide effective ways to study global, system level properties, as well as local, multi-scale interactions at a component level. Numerous applications from power systems, telecommunication, transportation, biology, social science, and other areas have benefited from novel network-based models and their analysis. Modeling and optimization techniques that employ appropriate measures of risk for identifying robust clusters and resilient network designs in networks subject to uncertain failures were investigated in this collaborative multi-university project. In many practical situations one has to deal with uncertainties associated with possible failures of network components, thereby affecting the overall efficiency and performance of the system (e.g., every node/connection has a probability of partial or complete failure). Some extreme examples include power grid component failures, airline hub failures due to weather, or freeway closures due to emergencies. These are also situations in which people, materials, or other resources need to be managed efficiently. Important practical examples include rerouting flow through power grids, adjusting flight plans, and identifying routes for emergency services and supplies, in the event network elements fail unexpectedly. Solutions that are robust under uncertainty, in addition to being economically efficient, are needed. This project has led to the development of novel models and methodologies that can tackle the optimization problems arising in such situations. A number of new concepts, which have not been previously applied in this setting, were investigated in the framework of the project. The results can potentially help decision-makers to better control and identify robust or risk-averse decisions in such situations. Formulations and optimal solutions of the considered problems need to capture uncertainty and risk using appropriate probabilistic, statistical and optimization concepts. The main difficulty arising in addressing these issues is the dramatic increase in the computational complexity of the resulting optimization problems. This project studied novel models and methodologies for risk-averse network optimization- specifically, network design, network flows and cluster detection problems under uncertainty. The approach taken was to incorporate a quantitative risk measure known as conditional value-at-risk that is widely used in financial applications. This approach presents a viable alternate modeling and optimization framework to chance-constrained optimization and mean-variance optimization, one that also facilitates the detection of risk-averse solutions.

  2. Position estimation of transceivers in communication networks

    DOE Patents [OSTI]

    Kent, Claudia A.; Dowla, Farid

    2008-06-03

    This invention provides a system and method using wireless communication interfaces coupled with statistical processing of time-of-flight data to locate by position estimation unknown wireless receivers. Such an invention can be applied in sensor network applications, such as environmental monitoring of water in the soil or chemicals in the air where the position of the network nodes is deemed critical. Moreover, the present invention can be arranged to operate in areas where a Global Positioning System (GPS) is not available, such as inside buildings, caves, and tunnels.

  3. Method for adding nodes to a quantum key distribution system

    DOE Patents [OSTI]

    Grice, Warren P

    2015-02-24

    An improved quantum key distribution (QKD) system and method are provided. The system and method introduce new clients at intermediate points along a quantum channel, where any two clients can establish a secret key without the need for a secret meeting between the clients. The new clients perform operations on photons as they pass through nodes in the quantum channel, and participate in a non-secret protocol that is amended to include the new clients. The system and method significantly increase the number of clients that can be supported by a conventional QKD system, with only a modest increase in cost. The system and method are compatible with a variety of QKD schemes, including polarization, time-bin, continuous variable and entanglement QKD.

  4. Criteria for stochastic pinning control of networks of chaotic maps

    SciTech Connect (OSTI)

    Mwaffo, Violet; Porfiri, Maurizio; DeLellis, Pietro

    2014-03-15

    This paper investigates the controllability of discrete-time networks of coupled chaotic maps through stochastic pinning. In this control scheme, the network dynamics are steered towards a desired trajectory through a feedback control input that is applied stochastically to the network nodes. The network controllability is studied by analyzing the local mean square stability of the error dynamics with respect to the desired trajectory. Through the analysis of the spectral properties of salient matrices, a toolbox of conditions for controllability are obtained, in terms of the dynamics of the individual maps, algebraic properties of the network, and the probability distribution of the pinning control. We demonstrate the use of these conditions in the design of a stochastic pinning control strategy for networks of Chirikov standard maps. To elucidate the applicability of the approach, we consider different network topologies and compare five different stochastic pinning strategies through extensive numerical simulations.

  5. Dynamics on modular networks with heterogeneous correlations

    SciTech Connect (OSTI)

    Melnik, Sergey; Oxford Centre for Industrial and Applied Mathematics, Mathematical Institute, University of Oxford, Oxford OX2 6GG; CABDyN Complexity Centre, University of Oxford, Oxford OX1 1HP ; Porter, Mason A.; CABDyN Complexity Centre, University of Oxford, Oxford OX1 1HP ; Mucha, Peter J.; Institute for Advanced Materials, Nanoscience and Technology, University of North Carolina, Chapel Hill, North Carolina 27599-3216 ; Gleeson, James P.

    2014-06-15

    We develop a new ensemble of modular random graphs in which degree-degree correlations can be different in each module, and the inter-module connections are defined by the joint degree-degree distribution of nodes for each pair of modules. We present an analytical approach that allows one to analyze several types of binary dynamics operating on such networks, and we illustrate our approach using bond percolation, site percolation, and the Watts threshold model. The new network ensemble generalizes existing models (e.g., the well-known configuration model and Lancichinetti-Fortunato-Radicchi networks) by allowing a heterogeneous distribution of degree-degree correlations across modules, which is important for the consideration of nonidentical interacting networks.

  6. Modeling Temporal Behavior in Large Networks: A Dynamic Mixed-Membership Model

    SciTech Connect (OSTI)

    Rossi, R; Gallagher, B; Neville, J; Henderson, K

    2011-11-11

    Given a large time-evolving network, how can we model and characterize the temporal behaviors of individual nodes (and network states)? How can we model the behavioral transition patterns of nodes? We propose a temporal behavior model that captures the 'roles' of nodes in the graph and how they evolve over time. The proposed dynamic behavioral mixed-membership model (DBMM) is scalable, fully automatic (no user-defined parameters), non-parametric/data-driven (no specific functional form or parameterization), interpretable (identifies explainable patterns), and flexible (applicable to dynamic and streaming networks). Moreover, the interpretable behavioral roles are generalizable, computationally efficient, and natively supports attributes. We applied our model for (a) identifying patterns and trends of nodes and network states based on the temporal behavior, (b) predicting future structural changes, and (c) detecting unusual temporal behavior transitions. We use eight large real-world datasets from different time-evolving settings (dynamic and streaming). In particular, we model the evolving mixed-memberships and the corresponding behavioral transitions of Twitter, Facebook, IP-Traces, Email (University), Internet AS, Enron, Reality, and IMDB. The experiments demonstrate the scalability, flexibility, and effectiveness of our model for identifying interesting patterns, detecting unusual structural transitions, and predicting the future structural changes of the network and individual nodes.

  7. XCPU2 process management system

    SciTech Connect (OSTI)

    Ionkov, Latchesar; Van Hensbergen, Eric

    2009-01-01

    Xcpu2 is a new process management system that allows the users to specify custom file system for a running job. Most cluster management systems enforce single software distribution running on all nodes. Xcpu2 allows programs running on the cluster to work in environment identical to the user's desktop, using the same versions of the libraries and tools the user installed locally, and accessing the configuration file in the same places they are located on the desktop. Xcpu2 builds on our earlier work with the Xcpu system. Like Xcpu, Xcpu2's process management interface is represented as a set of files exported by a 9P file server. It supports heterogeneous clusters and multiple head nodes. Unlike Xcpu, it uses pull instead of push model. In this paper we describe the Xcpu2 clustering model, its operation and how the per-job filesystem configuration can be used to solve some of the common problems when running a cluster.

  8. Budget-based power consumption for application execution on a plurality of compute nodes

    DOE Patents [OSTI]

    Archer, Charles J; Blocksome, Michael A; Peters, Amanda E; Ratterman, Joseph D; Smith, Brian E

    2013-02-05

    Methods, apparatus, and products are disclosed for budget-based power consumption for application execution on a plurality of compute nodes that include: assigning an execution priority to each of one or more applications; executing, on the plurality of compute nodes, the applications according to the execution priorities assigned to the applications at an initial power level provided to the compute nodes until a predetermined power consumption threshold is reached; and applying, upon reaching the predetermined power consumption threshold, one or more power conservation actions to reduce power consumption of the plurality of compute nodes during execution of the applications.

  9. Budget-based power consumption for application execution on a plurality of compute nodes

    DOE Patents [OSTI]

    Archer, Charles J; Inglett, Todd A

    2012-10-23

    Methods, apparatus, and products are disclosed for budget-based power consumption for application execution on a plurality of compute nodes that include: assigning an execution priority to each of one or more applications; executing, on the plurality of compute nodes, the applications according to the execution priorities assigned to the applications at an initial power level provided to the compute nodes until a predetermined power consumption threshold is reached; and applying, upon reaching the predetermined power consumption threshold, one or more power conservation actions to reduce power consumption of the plurality of compute nodes during execution of the applications.

  10. Gas Main Sensor and Communications Network System

    SciTech Connect (OSTI)

    Hagen Schempf

    2006-05-31

    Automatika, Inc. was contracted by the Department of Energy (DOE) and with co-funding from the Northeast Gas Association (NGA), to develop an in-pipe natural gas prototype measurement and wireless communications system for assessing and monitoring distribution networks. This projected was completed in April 2006, and culminated in the installation of more than 2 dozen GasNet nodes in both low- and high-pressure cast-iron and steel mains owned by multiple utilities in the northeastern US. Utilities are currently logging data (off-line) and monitoring data in real time from single and multiple networked sensors over cellular networks and collecting data using wireless bluetooth PDA systems. The system was designed to be modular, using in-pipe sensor-wands capable of measuring, flow, pressure, temperature, water-content and vibration. Internal antennae allowed for the use of the pipe-internals as a waveguide for setting up a sensor network to collect data from multiple nodes simultaneously. Sensor nodes were designed to be installed with low- and no-blow techniques and tools. Using a multi-drop bus technique with a custom protocol, all electronics were designed to be buriable and allow for on-board data-collection (SD-card), wireless relaying and cellular network forwarding. Installation options afforded by the design included direct-burial and external polemounted variants. Power was provided by one or more batteries, direct AC-power (Class I Div.2) and solar-array. The utilities are currently in a data-collection phase and intend to use the collected (and processed) data to make capital improvement decisions, compare it to Stoner model predictions and evaluate the use of such a system for future expansion, technology-improvement and commercialization starting later in 2006.

  11. Massively parallel processor networks with optical express channels

    DOE Patents [OSTI]

    Deri, Robert J.; Brooks, III, Eugene D.; Haigh, Ronald E.; DeGroot, Anthony J.

    1999-01-01

    An optical method for separating and routing local and express channel data comprises interconnecting the nodes in a network with fiber optic cables. A single fiber optic cable carries both express channel traffic and local channel traffic, e.g., in a massively parallel processor (MPP) network. Express channel traffic is placed on, or filtered from, the fiber optic cable at a light frequency or a color different from that of the local channel traffic. The express channel traffic is thus placed on a light carrier that skips over the local intermediate nodes one-by-one by reflecting off of selective mirrors placed at each local node. The local-channel-traffic light carriers pass through the selective mirrors and are not reflected. A single fiber optic cable can thus be threaded throughout a three-dimensional matrix of nodes with the x,y,z directions of propagation encoded by the color of the respective light carriers for both local and express channel traffic. Thus frequency division multiple access is used to hierarchically separate the local and express channels to eliminate the bucket brigade latencies that would otherwise result if the express traffic had to hop between every local node to reach its ultimate destination.

  12. Massively parallel processor networks with optical express channels

    DOE Patents [OSTI]

    Deri, R.J.; Brooks, E.D. III; Haigh, R.E.; DeGroot, A.J.

    1999-08-24

    An optical method for separating and routing local and express channel data comprises interconnecting the nodes in a network with fiber optic cables. A single fiber optic cable carries both express channel traffic and local channel traffic, e.g., in a massively parallel processor (MPP) network. Express channel traffic is placed on, or filtered from, the fiber optic cable at a light frequency or a color different from that of the local channel traffic. The express channel traffic is thus placed on a light carrier that skips over the local intermediate nodes one-by-one by reflecting off of selective mirrors placed at each local node. The local-channel-traffic light carriers pass through the selective mirrors and are not reflected. A single fiber optic cable can thus be threaded throughout a three-dimensional matrix of nodes with the x,y,z directions of propagation encoded by the color of the respective light carriers for both local and express channel traffic. Thus frequency division multiple access is used to hierarchically separate the local and express channels to eliminate the bucket brigade latencies that would otherwise result if the express traffic had to hop between every local node to reach its ultimate destination. 3 figs.

  13. Number and Location of Positive Nodes, Postoperative Radiotherapy, and Survival After Esophagectomy With Three-Field Lymph Node Dissection for Thoracic Esophageal Squamous Cell Carcinoma

    SciTech Connect (OSTI)

    Chen Junqiang; Pan Jianji; Zheng Xiongwei; Zhu Kunshou; Li Jiancheng; Chen Mingqiang; Wang Jiezhong; Liao Zhongxing

    2012-01-01

    Purpose: To analyze influences of the number and location of positive lymph nodes and postoperative radiotherapy on survival for patients with thoracic esophageal squamous cell carcinoma (TE-SCC) treated with radical esophagectomy with three-field lymphadenectomy. Methods and Materials: A total of 945 patients underwent radical esophagectomy plus three-field lymph node dissection for node-positive TE-SCC at Fujian Provincial Tumor Hospital between January 1993 and March 2007. Five hundred ninety patients received surgery only (S group), and 355 patients received surgery, followed 3 to 4 weeks later by postoperative radiotherapy (S+R group) to a median total dose of 50 Gy in 25 fractions. We assessed potential associations among patient-, tumor-, and treatment-related factors and overall survival. Results: Five-year overall survival rates were 32.8% for the entire group, 29.6% for the S group, and 38.0% for the S+R group (p = 0.001 for S vs. S+R). Treatment with postoperative radiotherapy was particularly beneficial for patients with {>=}3 positive nodes and for those with metastasis in the upper (supraclavicular and upper mediastinal) region or both the upper and lower (mediastinal and abdominal) regions (p < 0.05). Postoperative radiotherapy was also associated with lower recurrence rates in the supraclavicular and upper and middle mediastinal regions (p < 0.05). Sex, primary tumor length, number of positive nodes, pathological T category, and postoperative radiotherapy were all independent predictors of survival. Conclusions: Postoperative radiotherapy was associated with better survival for patients with node-positive TE-SCC, particularly those with three or more positive nodes and positive nodes in the supraclavicular and superior mediastinal regions.

  14. A mobile-agent based wireless sensing network for structural monitoring

    Office of Scientific and Technical Information (OSTI)

    applications (Journal Article) | SciTech Connect Journal Article: A mobile-agent based wireless sensing network for structural monitoring applications Citation Details In-Document Search Title: A mobile-agent based wireless sensing network for structural monitoring applications A new wireless sensing network paradigm is presented for structural monitoring applications. In this approach, both power and data interrogation commands are conveyed via a mobile agent that is sent to sensor nodes to

  15. Use of environmental sensors and sensor networks to develop water and salinity budgets for seasonal wetland real-time water quality management

    SciTech Connect (OSTI)

    Quinn, N.W.T.; Ortega, R.; Rahilly, P.J.A,; Royer, C.W.

    2009-10-01

    Successful management of river salt loads in complex and highly regulated river basins such as the San Joaquin of California presents significant challenges to Information Technology. Models are used as means of simulating major hydrologic processes in the basin which affect water quality and can be useful as tools for organizing basin information in a structured and readily accessible manner. Models can also be used to extrapolate the results of system monitoring since it is impossible to collect data for every point and non-point source of a pollutant in the Basin. Fundamental to every model is the concept of mass balance. This paper describes the use of state-of-the-art sensor technologies deployed in concert to obtain the first water and salinity budgets for a 60,000 hectare tract of seasonally managed wetlands in the San Joaquin Basin of California.

  16. battery electrode percolating network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    battery electrode percolating network - Sandia Energy Energy Search Icon Sandia Home Locations Contact Us Employee Locator Energy & Climate Secure & Sustainable Energy Future Stationary Power Energy Conversion Efficiency Solar Energy Wind Energy Water Power Supercritical CO2 Geothermal Natural Gas Safety, Security & Resilience of the Energy Infrastructure Energy Storage Nuclear Power & Engineering Grid Modernization Battery Testing Nuclear Fuel Cycle Defense Waste Management

  17. The Portals 4.0 network programming interface.

    SciTech Connect (OSTI)

    Barrett, Brian W.; Brightwell, Ronald Brian; Pedretti, Kevin Thomas Tauke; Wheeler, Kyle Bruce; Hemmert, Karl Scott; Riesen, Rolf E.; Underwood, Keith Douglas; Maccabe, Arthur Bernard; Hudson, Trammell B.

    2012-11-01

    This report presents a specification for the Portals 4.0 network programming interface. Portals 4.0 is intended to allow scalable, high-performance network communication between nodes of a parallel computing system. Portals 4.0 is well suited to massively parallel processing and embedded systems. Portals 4.0 represents an adaption of the data movement layer developed for massively parallel processing platforms, such as the 4500-node Intel TeraFLOPS machine. Sandia's Cplant cluster project motivated the development of Version 3.0, which was later extended to Version 3.3 as part of the Cray Red Storm machine and XT line. Version 4.0 is targeted to the next generation of machines employing advanced network interface architectures that support enhanced offload capabilities.

  18. The portals 4.0.1 network programming interface.

    SciTech Connect (OSTI)

    Barrett, Brian W.; Brightwell, Ronald Brian; Pedretti, Kevin Thomas Tauke; Wheeler, Kyle Bruce; Hemmert, Karl Scott; Riesen, Rolf E.; Underwood, Keith Douglas; Maccabe, Arthur Bernard; Hudson, Trammell B.

    2013-04-01

    This report presents a specification for the Portals 4.0 network programming interface. Portals 4.0 is intended to allow scalable, high-performance network communication between nodes of a parallel computing system. Portals 4.0 is well suited to massively parallel processing and embedded systems. Portals 4.0 represents an adaption of the data movement layer developed for massively parallel processing platforms, such as the 4500-node Intel TeraFLOPS machine. Sandia's Cplant cluster project motivated the development of Version 3.0, which was later extended to Version 3.3 as part of the Cray Red Storm machine and XT line. Version 4.0 is targeted to the next generation of machines employing advanced network interface architectures that support enhanced offload capabilities. 3

  19. Guest Editorial Introduction to the Special Issue on 'Advanced Signal Processing Techniques and Telecommunications Network Infrastructures for Smart Grid Analysis, Monitoring, and Management'

    DOE Public Access Gateway for Energy & Science Beta (PAGES Beta)

    Bracale, Antonio; Barros, Julio; Cacciapuoti, Angela Sara; Chang, Gary; Dall'Anese, Emiliano

    2015-06-10

    Electrical power systems are undergoing a radical change in structure, components, and operational paradigms, and are progressively approaching the new concept of smart grids (SGs). Future power distribution systems will be characterized by the simultaneous presence of various distributed resources, such as renewable energy systems (i.e., photovoltaic power plant and wind farms), storage systems, and controllable/non-controllable loads. Control and optimization architectures will enable network-wide coordination of these grid components in order to improve system efficiency and reliability and to limit greenhouse gas emissions. In this context, the energy flows will be bidirectional from large power plants to end users andmore » vice versa; producers and consumers will continuously interact at different voltage levels to determine in advance the requests of loads and to adapt the production and demand for electricity flexibly and efficiently also taking into account the presence of storage systems.« less

  20. Guest Editorial Introduction to the Special Issue on 'Advanced Signal Processing Techniques and Telecommunications Network Infrastructures for Smart Grid Analysis, Monitoring, and Management'

    SciTech Connect (OSTI)

    Bracale, Antonio; Barros, Julio; Cacciapuoti, Angela Sara; Chang, Gary; Dall'Anese, Emiliano

    2015-06-10

    Electrical power systems are undergoing a radical change in structure, components, and operational paradigms, and are progressively approaching the new concept of smart grids (SGs). Future power distribution systems will be characterized by the simultaneous presence of various distributed resources, such as renewable energy systems (i.e., photovoltaic power plant and wind farms), storage systems, and controllable/non-controllable loads. Control and optimization architectures will enable network-wide coordination of these grid components in order to improve system efficiency and reliability and to limit greenhouse gas emissions. In this context, the energy flows will be bidirectional from large power plants to end users and vice versa; producers and consumers will continuously interact at different voltage levels to determine in advance the requests of loads and to adapt the production and demand for electricity flexibly and efficiently also taking into account the presence of storage systems.

  1. Low latency, high bandwidth data communications between compute nodes in a parallel computer

    DOE Patents [OSTI]

    Archer, Charles J.; Blocksome, Michael A.; Ratterman, Joseph D.; Smith, Brian E.

    2010-11-02

    Methods, parallel computers, and computer program products are disclosed for low latency, high bandwidth data communications between compute nodes in a parallel computer. Embodiments include receiving, by an origin direct memory access (`DMA`) engine of an origin compute node, data for transfer to a target compute node; sending, by the origin DMA engine of the origin compute node to a target DMA engine on the target compute node, a request to send (`RTS`) message; transferring, by the origin DMA engine, a predetermined portion of the data to the target compute node using memory FIFO operation; determining, by the origin DMA engine whether an acknowledgement of the RTS message has been received from the target DMA engine; if the an acknowledgement of the RTS message has not been received, transferring, by the origin DMA engine, another predetermined portion of the data to the target compute node using a memory FIFO operation; and if the acknowledgement of the RTS message has been received by the origin DMA engine, transferring, by the origin DMA engine, any remaining portion of the data to the target compute node using a direct put operation.

  2. Experimental Network Testbeds

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Galleries ESnet Awards and Honors Blog ESnet Live Home Network R&D Experimental Network Testbeds Network R&D Overview Experimental Network Testbeds 100G SDN...

  3. Thread selection according to predefined power characteristics during context switching on compute nodes

    DOE Patents [OSTI]

    None

    2013-06-04

    Methods, apparatus, and products are disclosed for thread selection during context switching on a plurality of compute nodes that includes: executing, by a compute node, an application using a plurality of threads of execution, including executing one or more of the threads of execution; selecting, by the compute node from a plurality of available threads of execution for the application, a next thread of execution in dependence upon power characteristics for each of the available threads; determining, by the compute node, whether criteria for a thread context switch are satisfied; and performing, by the compute node, the thread context switch if the criteria for a thread context switch are satisfied, including executing the next thread of execution.

  4. Exploring network structure, dynamics, and function using networkx

    SciTech Connect (OSTI)

    Hagberg, Aric; Swart, Pieter; S Chult, Daniel

    2008-01-01

    NetworkX is a Python language package for exploration and analysis of networks and network algorithms. The core package provides data structures for representing many types of networks, or graphs, including simple graphs, directed graphs, and graphs with parallel edges and self loops. The nodes in NetworkX graphs can be any (hashable) Python object and edges can contain arbitrary data; this flexibility mades NetworkX ideal for representing networks found in many different scientific fields. In addition to the basic data structures many graph algorithms are implemented for calculating network properties and structure measures: shortest paths, betweenness centrality, clustering, and degree distribution and many more. NetworkX can read and write various graph formats for eash exchange with existing data, and provides generators for many classic graphs and popular graph models, such as the Erdoes-Renyi, Small World, and Barabasi-Albert models, are included. The ease-of-use and flexibility of the Python programming language together with connection to the SciPy tools make NetworkX a powerful tool for scientific computations. We discuss some of our recent work studying synchronization of coupled oscillators to demonstrate how NetworkX enables research in the field of computational networks.

  5. Sentient networks

    SciTech Connect (OSTI)

    Chapline, G.

    1998-03-01

    The engineering problems of constructing autonomous networks of sensors and data processors that can provide alerts for dangerous situations provide a new context for debating the question whether man-made systems can emulate the cognitive capabilities of the mammalian brain. In this paper we consider the question whether a distributed network of sensors and data processors can form ``perceptions`` based on sensory data. Because sensory data can have exponentially many explanations, the use of a central data processor to analyze the outputs from a large ensemble of sensors will in general introduce unacceptable latencies for responding to dangerous situations. A better idea is to use a distributed ``Helmholtz machine`` architecture in which the sensors are connected to a network of simple processors, and the collective state of the network as a whole provides an explanation for the sensory data. In general communication within such a network will require time division multiplexing, which opens the door to the possibility that with certain refinements to the Helmholtz machine architecture it may be possible to build sensor networks that exhibit a form of artificial consciousness.

  6. runtime error message: "apsched: request exceeds max nodes, alloc"

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    apsched: request exceeds max nodes, alloc" runtime error message: "apsched: request exceeds max nodes, alloc" September 12, 2014 Symptom: User jobs with single or multiple apruns in a batch script may get this runtime error. "apsched: request exceeds max nodes, alloc". This problem is intermittent, started in April, then mid July, and again since late August. Status: This problem is identified as a problem when Torque/Moab batch scheduler becomes out of sync with the

  7. A Network Contention Model for the Extreme-scale Simulator

    SciTech Connect (OSTI)

    Engelmann, Christian [ORNL; Naughton, III, Thomas J [ORNL

    2015-01-01

    The Extreme-scale Simulator (xSim) is a performance investigation toolkit for high-performance computing (HPC) hardware/software co-design. It permits running a HPC application with millions of concurrent execution threads, while observing its performance in a simulated extreme-scale system. This paper details a newly developed network modeling feature for xSim, eliminating the shortcomings of the existing network modeling capabilities. The approach takes a different path for implementing network contention and bandwidth capacity modeling using a less synchronous and accurate enough model design. With the new network modeling feature, xSim is able to simulate on-chip and on-node networks with reasonable accuracy and overheads.

  8. Reducing power consumption during execution of an application on a plurality of compute nodes

    DOE Patents [OSTI]

    Archer, Charles J.; Blocksome, Michael A.; Peters, Amanda E.; Ratterman, Joseph D.; Smith, Brian E.

    2013-09-10

    Methods, apparatus, and products are disclosed for reducing power consumption during execution of an application on a plurality of compute nodes that include: powering up, during compute node initialization, only a portion of computer memory of the compute node, including configuring an operating system for the compute node in the powered up portion of computer memory; receiving, by the operating system, an instruction to load an application for execution; allocating, by the operating system, additional portions of computer memory to the application for use during execution; powering up the additional portions of computer memory allocated for use by the application during execution; and loading, by the operating system, the application into the powered up additional portions of computer memory.

  9. Channel Modeling and Time Delay Estimation for Clock Synchronization Among Seaweb Nodes

    SciTech Connect (OSTI)

    Gagnon, P; Rice, J; Clark, G A

    2012-07-08

    From simulations, tracking of the impulse response is feasible. Potential to benefit other functions such as ranging between two nodes. Potential to combine the features of different protocols to create a new and more realistic clock-synchronization protocol.

  10. Safety Walkthrough Management

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Walkthrough Management

  11. LC Recommendations for Data Transfer Nodes (Technical Report) | SciTech

    Office of Scientific and Technical Information (OSTI)

    Connect LC Recommendations for Data Transfer Nodes Citation Details In-Document Search Title: LC Recommendations for Data Transfer Nodes Abstract not provided. Authors: Harr, C. M. [1] ; Long, J. W. [1] ; Heer, T. M. [1] + Show Author Affiliations Lawrence Livermore National Lab. (LLNL), Livermore, CA (United States) Publication Date: 2014-11-12 OSTI Identifier: 1178387 Report Number(s): LLNL-TR--664301 DOE Contract Number: AC52-07NA27344 Resource Type: Technical Report Research Org:

  12. Cut set-based risk and reliability analysis for arbitrarily interconnected networks

    DOE Patents [OSTI]

    Wyss, Gregory D.

    2000-01-01

    Method for computing all-terminal reliability for arbitrarily interconnected networks such as the United States public switched telephone network. The method includes an efficient search algorithm to generate minimal cut sets for nonhierarchical networks directly from the network connectivity diagram. Efficiency of the search algorithm stems in part from its basis on only link failures. The method also includes a novel quantification scheme that likewise reduces computational effort associated with assessing network reliability based on traditional risk importance measures. Vast reductions in computational effort are realized since combinatorial expansion and subsequent Boolean reduction steps are eliminated through analysis of network segmentations using a technique of assuming node failures to occur on only one side of a break in the network, and repeating the technique for all minimal cut sets generated with the search algorithm. The method functions equally well for planar and non-planar networks.

  13. Microsoft PowerPoint - PBCDL_Poster_1.ppt

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    link state between an application and data logger. PakBus Control Protocol Facilitate communication and network management By exchanging information between network nodes. *...

  14. Wireless Sensor Node Power Profiling Based on IEEE 802.11 and IEEE 802.15.4 Communication Protocols. Modeling and Simulation

    SciTech Connect (OSTI)

    Agarwal, Vivek; Richardson, Joseph; Zhang, Yanliang

    2015-10-01

    Most wireless sensor network (comprising of thousands of WSNs) applications require operation over extended periods of time beginning with their deployment. Network lifetime is extremely critical for most applications and is one of the limiting factors for energy-constrained networks. Based on applications, there are wide ranges of different energy sources suitable for powering WSNs. A battery is traditionally used to power WSNs. The deployed WSN is required to last for long time. Due to finite amount of energy present in batteries, it is not feasible to replace batteries. Recently there has been a new surge in the area of energy harvesting were ambient energy in the environment can be utilized to prolong the lifetime of WSNs. Some of the sources of ambient energies are solar power, thermal gradient, human motion and body heat, vibrations, and ambient RF energy. The design and development of TEGs to power WSNs that would remain active for a long period of time requires comprehensive understanding of WSN operational. This motivates the research in modeling the lifetime, i.e., power consumption, of a WSN by taking into consideration various node and network level activities. A WSN must perform three essential tasks: sense events, perform quick local information processing of sensed events, and wirelessly exchange locally processed data with the base station or with other WSNs in the network. Each task has a power cost per unit tine and an additional cost when switching between tasks. There are number of other considerations that must also be taken into account when computing the power consumption associated with each task. The considerations includes: number of events occurring in a fixed active time period and the duration of each event, event-information processing time, total communication time, number of retransmission, etc. Additionally, at the network level the communication of information data packets between WSNs involves collisions, latency, and retransmission, which result in unanticipated power losses. This report focuses rigorous stochastic modeling of power demand for a schedule-driven WSN utilizing Institute of Electrical and Electronics Engineers 802.11 and 802.15.4 communication protocols. The model captures the generic operation of a schedule-driven WSN when an external event occurs, i.e., sensing, following by processing, and followed by communication. The report will present development of an expression to compute the expected energy consumption per operational cycle of a schedule-driven WSN by taking into consideration the node level activities, i.e., sensing and processing, and the network level activities, i.e., channel access, packet collision, retransmission attempts, and transmission of a data packet.

  15. Network Policies

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Acceptable Use Policy About ESnet Our Mission The Network ESnet History Governance & Policies ESnet Policy Board ESCC Acceptable Use Policy Data Privacy Policy Facility Data Policy Career Opportunities ESnet Staff & Org Chart Contact Us Contact Us Technical Assistance: 1 800-33-ESnet (Inside US) 1 800-333-7638 (Inside US) 1 510-486-7600 (Globally) 1 510-486-7607 (Globally) Report Network Problems: trouble@es.net Provide Web Site Feedback: info@es.net ESnet Acceptable Use Policy The

  16. Historical Network Maps

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Network Maps Network Traffic Volume Historical Network Maps Network Facts & Stats Connected Sites Peering Connections ESnet Site Availabiliy OSCARS Fasterdata IPv6 Network Network Performance Tools The ESnet Engineering Team Network R&D Software-Defined Networking (SDN) Experimental Network Testbeds Performance (perfSONAR) Software & Tools Development Data for Researchers Partnerships Publications Workshops Science Engagement Move your data Programs & Workshops Science

  17. Nothing But Networking for Residential Network Members | Department...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Nothing But Networking for Residential Network Members Nothing But Networking for Residential Network Members Better Buildings Residential Network Peer Exchange Call: Nothing But...

  18. HPSS Yearly Network Traffic

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    HPSS Yearly Network Traffic HPSS Yearly Network Traffic Yearly Summary of IO Traffic Between Storage and Network Destinations These bar charts show the total transfer traffic for...

  19. ASCR Science Network Requirements

    SciTech Connect (OSTI)

    Dart, Eli; Tierney, Brian

    2009-08-24

    The Energy Sciences Network (ESnet) is the primary provider of network connectivity for the US Department of Energy Office of Science, the single largest supporter of basic research in the physical sciences in the United States. In support of the Office of Science programs, ESnet regularly updates and refreshes its understanding of the networking requirements of the instruments, facilities, scientists, and science programs that it serves. This focus has helped ESnet to be a highly successful enabler of scientific discovery for over 20 years. In April 2009 ESnet and the Office of Advanced Scientific Computing Research (ASCR), of the DOE Office of Science, organized a workshop to characterize the networking requirements of the programs funded by ASCR. The ASCR facilities anticipate significant increases in wide area bandwidth utilization, driven largely by the increased capabilities of computational resources and the wide scope of collaboration that is a hallmark of modern science. Many scientists move data sets between facilities for analysis, and in some cases (for example the Earth System Grid and the Open Science Grid), data distribution is an essential component of the use of ASCR facilities by scientists. Due to the projected growth in wide area data transfer needs, the ASCR supercomputer centers all expect to deploy and use 100 Gigabit per second networking technology for wide area connectivity as soon as that deployment is financially feasible. In addition to the network connectivity that ESnet provides, the ESnet Collaboration Services (ECS) are critical to several science communities. ESnet identity and trust services, such as the DOEGrids certificate authority, are widely used both by the supercomputer centers and by collaborations such as Open Science Grid (OSG) and the Earth System Grid (ESG). Ease of use is a key determinant of the scientific utility of network-based services. Therefore, a key enabling aspect for scientists beneficial use of high performance networks is a consistent, widely deployed, well-maintained toolset that is optimized for wide area, high-speed data transfer (e.g. GridFTP) that allows scientists to easily utilize the services and capabilities that the network provides. Network test and measurement is an important part of ensuring that these tools and network services are functioning correctly. One example of a tool in this area is the recently developed perfSONAR, which has already shown its usefulness in fault diagnosis during the recent deployment of high-performance data movers at NERSC and ORNL. On the other hand, it is clear that there is significant work to be done in the area of authentication and access control - there are currently compatibility problems and differing requirements between the authentication systems in use at different facilities, and the policies and mechanisms in use at different facilities are sometimes in conflict. Finally, long-term software maintenance was of concern for many attendees. Scientists rely heavily on a large deployed base of software that does not have secure programmatic funding. Software packages for which this is true include data transfer tools such as GridFTP as well as identity management and other software infrastructure that forms a critical part of the Open Science Grid and the Earth System Grid.

  20. Self organization of wireless sensor networks using ultra-wideband radios

    DOE Patents [OSTI]

    Dowla, Farid U.; Nekoogar, Franak; Spiridon, Alex

    2009-06-16

    A novel UWB communications method and system that provides self-organization for wireless sensor networks is introduced. The self-organization is in terms of scalability, power conservation, channel estimation, and node synchronization in wireless sensor networks. The UWB receiver in the present invention adds two new tasks to conventional TR receivers. The two additional units are SNR enhancing unit and timing acquisition and tracking unit.

  1. Single System Image Cluster Management

    Energy Science and Technology Software Center (OSTI)

    2004-02-13

    Cluster computing has quickly proven itself to be a capable workhorse for a wide variety of production computing tasks; however, setting up and maintaining a cluster still requires significantly more effort than administrating just a single machine. As computing hardware descreases in price and cluster sizes grow, it is becoming increasingly important to manage clusters cleverly so that a system administration effort can "scale" as well. To ease the task of mananging many machines, administratorsmore » often deploy an environment that is homogeneous across all nodes of a cluster, and maintain a snapshot of the filesystem as a 'master image'. However due to operational, behavioral, and physical constraints, many nodes often require numerous deviations from the master image in order to operate as desired.« less

  2. NetworkX

    Energy Science and Technology Software Center (OSTI)

    2004-05-17

    NetworkX (abbreviated NX in the software and documentation) is a package for studying network structure using graph theory.

  3. Using new edges for anomaly detection in computer networks

    DOE Patents [OSTI]

    Neil, Joshua Charles

    2015-05-19

    Creation of new edges in a network may be used as an indication of a potential attack on the network. Historical data of a frequency with which nodes in a network create and receive new edges may be analyzed. Baseline models of behavior among the edges in the network may be established based on the analysis of the historical data. A new edge that deviates from a respective baseline model by more than a predetermined threshold during a time window may be detected. The new edge may be flagged as potentially anomalous when the deviation from the respective baseline model is detected. Probabilities for both new and existing edges may be obtained for all edges in a path or other subgraph. The probabilities may then be combined to obtain a score for the path or other subgraph. A threshold may be obtained by calculating an empirical distribution of the scores under historical conditions.

  4. Modeling node bandwidth limits and their effects on vector combining algorithms

    SciTech Connect (OSTI)

    Littlefield, R.J.

    1992-01-13

    Each node in a message-passing multicomputer typically has several communication links. However, the maximum aggregate communication speed of a node is often less than the sum of its individual link speeds. Such computers are called node bandwidth limited (NBL). The NBL constraint is important when choosing algorithms because it can change the relative performance of different algorithms that accomplish the same task. This paper introduces a model of communication performance for NBL computers and uses the model to analyze the overall performance of three algorithms for vector combining (global sum) on the Intel Touchstone DELTA computer. Each of the three algorithms is found to be at least 33% faster than the other two for some combinations of machine size and vector length. The NBL constraint is shown to significantly affect the conditions under which each algorithm is fastest.

  5. Asynchronous broadcast for ordered delivery between compute nodes in a parallel computing system where packet header space is limited

    DOE Patents [OSTI]

    Kumar, Sameer

    2010-06-15

    Disclosed is a mechanism on receiving processors in a parallel computing system for providing order to data packets received from a broadcast call and to distinguish data packets received at nodes from several incoming asynchronous broadcast messages where header space is limited. In the present invention, processors at lower leafs of a tree do not need to obtain a broadcast message by directly accessing the data in a root processor's buffer. Instead, each subsequent intermediate node's rank id information is squeezed into the software header of packet headers. In turn, the entire broadcast message is not transferred from the root processor to each processor in a communicator but instead is replicated on several intermediate nodes which then replicated the message to nodes in lower leafs. Hence, the intermediate compute nodes become "virtual root compute nodes" for the purpose of replicating the broadcast message to lower levels of a tree.

  6. Postlumpectomy Focal Brachytherapy for Simultaneous Treatment of Surgical Cavity and Draining Lymph Nodes

    SciTech Connect (OSTI)

    Hrycushko, Brian A.; Li Shihong; Shi Chengyu; Goins, Beth; Liu Yaxi; Phillips, William T.; Otto, Pamela M.; Bao, Ande

    2011-03-01

    Purpose: The primary objective was to investigate a novel focal brachytherapy technique using lipid nanoparticle (liposome)-carried {beta}-emitting radionuclides (rhenium-186 [{sup 186}Re]/rhenium-188 [{sup 188}Re]) to simultaneously treat the postlumpectomy surgical cavity and draining lymph nodes. Methods and Materials: Cumulative activity distributions in the lumpectomy cavity and lymph nodes were extrapolated from small animal imaging and human lymphoscintigraphy data. Absorbed dose calculations were performed for lumpectomy cavities with spherical and ellipsoidal shapes and lymph nodes within human subjects by use of the dose point kernel convolution method. Results: Dose calculations showed that therapeutic dose levels within the lumpectomy cavity wall can cover 2- and 5-mm depths for {sup 186}Re and {sup 188}Re liposomes, respectively. The absorbed doses at 1 cm sharply decreased to only 1.3% to 3.7% of the doses at 2 mm for {sup 186}Re liposomes and 5 mm for {sup 188}Re liposomes. Concurrently, the draining sentinel lymph nodes would receive a high focal therapeutic absorbed dose, whereas the average dose to 1 cm of surrounding tissue received less than 1% of that within the nodes. Conclusions: Focal brachytherapy by use of {sup 186}Re/{sup 188}Re liposomes was theoretically shown to be capable of simultaneously treating the lumpectomy cavity wall and draining sentinel lymph nodes with high absorbed doses while significantly lowering dose to surrounding healthy tissue. In turn, this allows for dose escalation to regions of higher probability of containing residual tumor cells after lumpectomy while reducing normal tissue complications.

  7. Non-preconditioned conjugate gradient on cell and FPCA-based hybrid supercomputer nodes

    SciTech Connect (OSTI)

    Dubois, David H; Dubois, Andrew J; Boorman, Thomas M; Connor, Carolyn M

    2009-03-10

    This work presents a detailed implementation of a double precision, Non-Preconditioned, Conjugate Gradient algorithm on a Roadrunner heterogeneous supercomputer node. These nodes utilize the Cell Broadband Engine Architecture{trademark} in conjunction with x86 Opteron{trademark} processors from AMD. We implement a common Conjugate Gradient algorithm, on a variety of systems, to compare and contrast performance. Implementation results are presented for the Roadrunner hybrid supercomputer, SRC Computers, Inc. MAPStation SRC-6 FPGA enhanced hybrid supercomputer, and AMD Opteron only. In all hybrid implementations wall clock time is measured, including all transfer overhead and compute timings.

  8. Non-preconditioned conjugate gradient on cell and FPGA based hybrid supercomputer nodes

    SciTech Connect (OSTI)

    Dubois, David H; Dubois, Andrew J; Boorman, Thomas M; Connor, Carolyn M

    2009-01-01

    This work presents a detailed implementation of a double precision, non-preconditioned, Conjugate Gradient algorithm on a Roadrunner heterogeneous supercomputer node. These nodes utilize the Cell Broadband Engine Architecture{sup TM} in conjunction with x86 Opteron{sup TM} processors from AMD. We implement a common Conjugate Gradient algorithm, on a variety of systems, to compare and contrast performance. Implementation results are presented for the Roadrunner hybrid supercomputer, SRC Computers, Inc. MAPStation SRC-6 FPGA enhanced hybrid supercomputer, and AMD Opteron only. In all hybrid implementations wall clock time is measured, including all transfer overhead and compute timings.

  9. Optimized scalable network switch

    DOE Patents [OSTI]

    Blumrich, Matthias A. (Ridgefield, CT); Chen, Dong (Croton On Hudson, NY); Coteus, Paul W. (Yorktown Heights, NY); Gara, Alan G. (Mount Kisco, NY); Giampapa, Mark E. (Irvington, NY); Heidelberger, Philip (Cortlandt Manor, NY); Steinmacher-Burow, Burkhard D. (Mount Kisco, NY); Takken, Todd E. (Mount Kisco, NY); Vranas, Pavlos M. (Bedford Hills, NY)

    2007-12-04

    In a massively parallel computing system having a plurality of nodes configured in m multi-dimensions, each node including a computing device, a method for routing packets towards their destination nodes is provided which includes generating at least one of a 2m plurality of compact bit vectors containing information derived from downstream nodes. A multilevel arbitration process in which downstream information stored in the compact vectors, such as link status information and fullness of downstream buffers, is used to determine a preferred direction and virtual channel for packet transmission. Preferred direction ranges are encoded and virtual channels are selected by examining the plurality of compact bit vectors. This dynamic routing method eliminates the necessity of routing tables, thus enhancing scalability of the switch.

  10. Optimized scalable network switch

    DOE Patents [OSTI]

    Blumrich, Matthias A.; Chen, Dong; Coteus, Paul W.

    2010-02-23

    In a massively parallel computing system having a plurality of nodes configured in m multi-dimensions, each node including a computing device, a method for routing packets towards their destination nodes is provided which includes generating at least one of a 2m plurality of compact bit vectors containing information derived from downstream nodes. A multilevel arbitration process in which downstream information stored in the compact vectors, such as link status information and fullness of downstream buffers, is used to determine a preferred direction and virtual channel for packet transmission. Preferred direction ranges are encoded and virtual channels are selected by examining the plurality of compact bit vectors. This dynamic routing method eliminates the necessity of routing tables, thus enhancing scalability of the switch.

  11. Arithmetic functions in torus and tree networks

    DOE Patents [OSTI]

    Bhanot, Gyan; Blumrich, Matthias A.; Chen, Dong; Gara, Alan G.; Giampapa, Mark E.; Heidelberger, Philip; Steinmacher-Burow, Burkhard D.; Vranas, Pavlos M.

    2007-12-25

    Methods and systems for performing arithmetic functions. In accordance with a first aspect of the invention, methods and apparatus are provided, working in conjunction of software algorithms and hardware implementation of class network routing, to achieve a very significant reduction in the time required for global arithmetic operation on the torus. Therefore, it leads to greater scalability of applications running on large parallel machines. The invention involves three steps in improving the efficiency and accuracy of global operations: (1) Ensuring, when necessary, that all the nodes do the global operation on the data in the same order and so obtain a unique answer, independent of roundoff error; (2) Using the topology of the torus to minimize the number of hops and the bidirectional capabilities of the network to reduce the number of time steps in the data transfer operation to an absolute minimum; and (3) Using class function routing to reduce latency in the data transfer. With the method of this invention, every single element is injected into the network only once and it will be stored and forwarded without any further software overhead. In accordance with a second aspect of the invention, methods and systems are provided to efficiently implement global arithmetic operations on a network that supports the global combining operations. The latency of doing such global operations are greatly reduced by using these methods.

  12. Evaluation of Rugged Wireless Mesh Nodes for Use In Emergency Response

    SciTech Connect (OSTI)

    Kevin L Young; Alan M Snyder

    2007-11-01

    During the summer of 2007, engineers at the Idaho National Laboratory (INL) conducted a two-day evaluation of commercially available battery powered, wireless, self-forming mesh nodes for use in emergency response. In this paper, the author describes the fundamentals of this emerging technology, applciations for emergency response and specific results of the technology evaluation conducted at the Idaho National Laboratory.

  13. Groundwater Monitoring Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Groundwater Monitoring Network Groundwater Monitoring Network The network includes 92 natural sources, 102 regional aquifer wells, 41 intermediate-depth wells and springs, and 67 wells in alluvium in canyons. August 1, 2013 Map of LANL's groundwater monitoring network Map of LANL's groundwater monitoring network

  14. Having Plant Management Announce "the Prize", July 14, 2010 ...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    2010) More Documents & Publications Determine and Communicate the Value of Replication Sell Management on Replication and Build a Network Motivating Employees to Implement Projects

  15. Managing coherence via put/get windows

    DOE Patents [OSTI]

    Blumrich, Matthias A.; Chen, Dong; Coteus, Paul W.; Gara, Alan G.; Giampapa, Mark E.; Heidelberger, Philip; Hoenicke, Dirk; Ohmacht, Martin

    2012-02-21

    A method and apparatus for managing coherence between two processors of a two processor node of a multi-processor computer system. Generally the present invention relates to a software algorithm that simplifies and significantly speeds the management of cache coherence in a message passing parallel computer, and to hardware apparatus that assists this cache coherence algorithm. The software algorithm uses the opening and closing of put/get windows to coordinate the activated required to achieve cache coherence. The hardware apparatus may be an extension to the hardware address decode, that creates, in the physical memory address space of the node, an area of virtual memory that (a) does not actually exist, and (b) is therefore able to respond instantly to read and write requests from the processing elements.

  16. Managing coherence via put/get windows

    DOE Patents [OSTI]

    Blumrich, Matthias A.; Chen, Dong; Coteus, Paul W.; Gara, Alan G.; Giampapa, Mark E.; Heidelberger, Philip; Hoenicke, Dirk; Ohmacht, Martin

    2011-01-11

    A method and apparatus for managing coherence between two processors of a two processor node of a multi-processor computer system. Generally the present invention relates to a software algorithm that simplifies and significantly speeds the management of cache coherence in a message passing parallel computer, and to hardware apparatus that assists this cache coherence algorithm. The software algorithm uses the opening and closing of put/get windows to coordinate the activated required to achieve cache coherence. The hardware apparatus may be an extension to the hardware address decode, that creates, in the physical memory address space of the node, an area of virtual memory that (a) does not actually exist, and (b) is therefore able to respond instantly to read and write requests from the processing elements.

  17. A Micro-Grid Simulator Tool (SGridSim) using Effective Node-to-Node Complex Impedance (EN2NCI) Models

    SciTech Connect (OSTI)

    Udhay Ravishankar; Milos manic

    2013-08-01

    This paper presents a micro-grid simulator tool useful for implementing and testing multi-agent controllers (SGridSim). As a common engineering practice it is important to have a tool that simplifies the modeling of the salient features of a desired system. In electric micro-grids, these salient features are the voltage and power distributions within the micro-grid. Current simplified electric power grid simulator tools such as PowerWorld, PowerSim, Gridlab, etc, model only the power distribution features of a desired micro-grid. Other power grid simulators such as Simulink, Modelica, etc, use detailed modeling to accommodate the voltage distribution features. This paper presents a SGridSim micro-grid simulator tool that simplifies the modeling of both the voltage and power distribution features in a desired micro-grid. The SGridSim tool accomplishes this simplified modeling by using Effective Node-to-Node Complex Impedance (EN2NCI) models of components that typically make-up a micro-grid. The term EN2NCI models means that the impedance based components of a micro-grid are modeled as single impedances tied between their respective voltage nodes on the micro-grid. Hence the benefit of the presented SGridSim tool are 1) simulation of a micro-grid is performed strictly in the complex-domain; 2) faster simulation of a micro-grid by avoiding the simulation of detailed transients. An example micro-grid model was built using the SGridSim tool and tested to simulate both the voltage and power distribution features with a total absolute relative error of less than 6%.

  18. Interconnection networks

    DOE Patents [OSTI]

    Faber, V.; Moore, J.W.

    1988-06-20

    A network of interconnected processors is formed from a vertex symmetric graph selected from graphs GAMMA/sub d/(k) with degree d, diameter k, and (d + 1)exclamation/ (d /minus/ k + 1)exclamation processors for each d greater than or equal to k and GAMMA/sub d/(k, /minus/1) with degree d /minus/ 1, diameter k + 1, and (d + 1)exclamation/(d /minus/ k + 1)exclamation processors for each d greater than or equal to k greater than or equal to 4. Each processor has an address formed by one of the permutations from a predetermined sequence of letters chosen a selected number of letters at a time, and an extended address formed by appending to the address the remaining ones of the predetermined sequence of letters. A plurality of transmission channels is provided from each of the processors, where each processor has one less channel than the selected number of letters forming the sequence. Where a network GAMMA/sub d/(k, /minus/1) is provided, no processor has a channel connected to form an edge in a direction delta/sub 1/. Each of the channels has an identification number selected from the sequence of letters and connected from a first processor having a first extended address to a second processor having a second address formed from a second extended address defined by moving to the front of the first extended address the letter found in the position within the first extended address defined by the channel identification number. The second address is then formed by selecting the first elements of the second extended address corresponding to the selected number used to form the address permutations. 9 figs.

  19. Valley Entrepreneurs' Network (VEN) Monthly Network Meeting

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    VEN Monthly Network Meeting Valley Entrepreneurs' Network (VEN) Monthly Network Meeting WHEN: Mar 05, 2015 5:30 PM - 7:00 PM WHERE: Anthony's At the Delta North Paseo De Onate, Española, NM CATEGORY: Community INTERNAL: Calendar Login Event Description An evening of exciting enterprise networking with like-minded entrepreneurs. For more information, contact Alejandro, VEN Coordinator, at (505) 410-0959

  20. Characterizing system dynamics with a weighted and directed network constructed from time series data

    SciTech Connect (OSTI)

    Sun, Xiaoran; School of Mathematics and Statistics, The University of Western Australia, Crawley WA 6009 ; Small, Michael; Zhao, Yi; Xue, Xiaoping

    2014-06-15

    In this work, we propose a novel method to transform a time series into a weighted and directed network. For a given time series, we first generate a set of segments via a sliding window, and then use a doubly symbolic scheme to characterize every windowed segment by combining absolute amplitude information with an ordinal pattern characterization. Based on this construction, a network can be directly constructed from the given time series: segments corresponding to different symbol-pairs are mapped to network nodes and the temporal succession between nodes is represented by directed links. With this conversion, dynamics underlying the time series has been encoded into the network structure. We illustrate the potential of our networks with a well-studied dynamical model as a benchmark example. Results show that network measures for characterizing global properties can detect the dynamical transitions in the underlying system. Moreover, we employ a random walk algorithm to sample loops in our networks, and find that time series with different dynamics exhibits distinct cycle structure. That is, the relative prevalence of loops with different lengths can be used to identify the underlying dynamics.

  1. Management Rachana Ananthakrishnan

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Globus for Data Management Rachana Ananthakrishnan (ranantha@uchicago.edu) Computation Institute Data Management Challenges * "Transfers often take longer than expected based on available network capacities" * "Lack of an easy to use interface to some of the high-performance tools" * "Tools [are] too difficult to install and use" * "Time and interruption to other work required to supervise large data transfers" * "Need data transfer tools that are

  2. More Than 180 People Gather for Women of Waste Management Event

    Broader source: Energy.gov [DOE]

    More than 180 people attended the Women of Waste Management Panel and Networking Reception at the Waste Management 2014 Conference on the safe management and disposition of radioactive waste and radioactive materials in Phoenix earlier this month.

  3. Historical - EO 11988: Floodplain Management (1977) | Department of Energy

    Energy Savers [EERE]

    Historical - EO 11988: Floodplain Management (1977) Historical - EO 11988: Floodplain Management (1977) Issued in 1977 to avoid to the extent possible the long and short term adverse impacts associated with the occupancy and modification of floodplains and to avoid direct or indirect support of floodplain development wherever there is a practicable alternative. This E.O. was amended by E.O. 13690. See the amended E.O. at: http://energy.gov/node/1446141. Download Document PDF icon Executive Order

  4. Energy harvesting and wireless energy transmission for powering SHM sensor nodes

    SciTech Connect (OSTI)

    Taylor, Stuart G; Farinholt, Kevin M; Park, Gyuhae; Farrar, Charles R

    2009-01-01

    In this paper, we present a feasibility study of using energy harvesting and wireless energy transmission systems to operate SHM sensor nodes. The energy harvesting approach examines the use of kinetic energy harvesters to scavenge energy from the ambient sources. Acceleration measurements were made on a bridge, and serve as the basis for a series of laboratory experiments that replicate these sources using an electromagnetic shaker. We also investigated the use of wireless energy transmission systems to operate SHM sensor nodes. The goal of this investigation is to develop SHM sensing systems which can be permanently embedded in the host structure and do not require on-board power sources. This paper summarizes considerations needed to design such systems, experimental procedures and results, and additional issues that can be used as guidelines for future investigations.

  5. FLOP Counts for "Small" Single-Node Miniapplication Tests

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    FLOP Counts for "Small" Single-Node Miniapplication Tests FLOP Counts for "Small" Single-Node Miniapplication Tests These data, obtained using the NERSC Hopper system, are provided for reference. Code MPI Tasks Threads Reference TFLOP Count Benchmark Time (seconds) # of iterations miniFE 144 1 5.05435E+12 130.2 (total program time) miniGhost 96 1 6.55500E+12 76.5 AMG 96 1 1.30418E+12 66.95 18 UMT 96 1 1.30211E+13 416.99 49 SNAP 96 1 5.84246E+11 15.37 3059 miniDFT 40 1

  6. Application of a wireless sensor node to health monitoring of operational wind turbine blades

    SciTech Connect (OSTI)

    Taylor, Stuart G; Farinholt, Kevin M; Park, Gyuhae; Farrar, Charles R; Todd, Michael D

    2009-01-01

    Structural health monitoring (SHM) is a developing field of research with a variety of applications including civil structures, industrial equipment, and energy infrastructure. An SHM system requires an integrated process of sensing, data interrogation and statistical assessment. The first and most important stage of any SHM system is the sensing system, which is traditionally composed of transducers and data acquisition hardware. However, such hardware is often heavy, bulky, and difficult to install in situ. Furthermore, physical access to the structure being monitored may be limited or restricted, as is the case for rotating wind turbine blades or unmanned aerial vehicles, requiring wireless transmission of sensor readings. This study applies a previously developed compact wireless sensor node to structural health monitoring of rotating small-scale wind turbine blades. The compact sensor node collects low-frequency structural vibration measurements to estimate natural frequencies and operational deflection shapes. The sensor node also has the capability to perform high-frequency impedance measurements to detect changes in local material properties or other physical characteristics. Operational measurements were collected using the wireless sensing system for both healthy and damaged blade conditions. Damage sensitive features were extracted from the collected data, and those features were used to classify the structural condition as healthy or damaged.

  7. Damselfly Network Simulator

    Energy Science and Technology Software Center (OSTI)

    2014-04-01

    Damselfly is a model-based parallel network simulator. It can simulate communication patterns of High Performance Computing applications on different network topologies. It outputs steady-state network traffic for a communication pattern, which can help in studying network congestion and its impact on performance.

  8. Biological and Environmental Research Network Requirements

    SciTech Connect (OSTI)

    Balaji, V.; Boden, Tom; Cowley, Dave; Dart, Eli; Dattoria, Vince; Desai, Narayan; Egan, Rob; Foster, Ian; Goldstone, Robin; Gregurick, Susan; Houghton, John; Izaurralde, Cesar; Johnston, Bill; Joseph, Renu; Kleese-van Dam, Kerstin; Lipton, Mary; Monga, Inder; Pritchard, Matt; Rotman, Lauren; Strand, Gary; Stuart, Cory; Tatusova, Tatiana; Tierney, Brian; Thomas, Brian; Williams, Dean N.; Zurawski, Jason

    2013-09-01

    The Energy Sciences Network (ESnet) is the primary provider of network connectivity for the U.S. Department of Energy (DOE) Office of Science (SC), the single largest supporter of basic research in the physical sciences in the United States. In support of SC programs, ESnet regularly updates and refreshes its understanding of the networking requirements of the instruments, facilities, scientists, and science programs that it serves. This focus has helped ESnet be a highly successful enabler of scientific discovery for over 25 years. In November 2012, ESnet and the Office of Biological and Environmental Research (BER) of the DOE SC organized a review to characterize the networking requirements of the programs funded by the BER program office. Several key findings resulted from the review. Among them: 1) The scale of data sets available to science collaborations continues to increase exponentially. This has broad impact, both on the network and on the computational and storage systems connected to the network. 2) Many science collaborations require assistance to cope with the systems and network engineering challenges inherent in managing the rapid growth in data scale. 3) Several science domains operate distributed facilities that rely on high-performance networking for success. Key examples illustrated in this report include the Earth System Grid Federation (ESGF) and the Systems Biology Knowledgebase (KBase). This report expands on these points, and addresses others as well. The report contains a findings section as well as the text of the case studies discussed at the review.

  9. Peeking Network States with Clustered Patterns

    SciTech Connect (OSTI)

    Kim, Jinoh; Sim, Alex

    2015-10-20

    Network traffic monitoring has long been a core element for effec- tive network management and security. However, it is still a chal- lenging task with a high degree of complexity for comprehensive analysis when considering multiple variables and ever-increasing traffic volumes to monitor. For example, one of the widely con- sidered approaches is to scrutinize probabilistic distributions, but it poses a scalability concern and multivariate analysis is not gen- erally supported due to the exponential increase of the complexity. In this work, we propose a novel method for network traffic moni- toring based on clustering, one of the powerful deep-learning tech- niques. We show that the new approach enables us to recognize clustered results as patterns representing the network states, which can then be utilized to evaluate “similarity” of network states over time. In addition, we define a new quantitative measure for the similarity between two compared network states observed in dif- ferent time windows, as a supportive means for intuitive analysis. Finally, we demonstrate the clustering-based network monitoring with public traffic traces, and show that the proposed approach us- ing the clustering method has a great opportunity for feasible, cost- effective network monitoring.

  10. Open Transport Switch A Software Defined Networking Architecture

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    A demonstration use-case of an OpenFlow-enabled optical virtual switch im- plementation managing a small optical transport network for big-data applications is described. With ...

  11. V-139: Cisco Network Admission Control Input Validation Flaw...

    Broader source: Energy.gov (indexed) [DOE]

    PROBLEM: Cisco Network Admission Control Input Validation Flaw Lets Remote Users Inject SQL Commands PLATFORM: Cisco NAC Manager versions prior to 4.8.3.1 and 4.9.2 ABSTRACT: A...

  12. Calculating a checksum with inactive networking components in a computing system

    DOE Patents [OSTI]

    Aho, Michael E; Chen, Dong; Eisley, Noel A; Gooding, Thomas M; Heidelberger, Philip; Tauferner, Andrew T

    2014-12-16

    Calculating a checksum utilizing inactive networking components in a computing system, including: identifying, by a checksum distribution manager, an inactive networking component, wherein the inactive networking component includes a checksum calculation engine for computing a checksum; sending, to the inactive networking component by the checksum distribution manager, metadata describing a block of data to be transmitted by an active networking component; calculating, by the inactive networking component, a checksum for the block of data; transmitting, to the checksum distribution manager from the inactive networking component, the checksum for the block of data; and sending, by the active networking component, a data communications message that includes the block of data and the checksum for the block of data.

  13. Calculating a checksum with inactive networking components in a computing system

    DOE Patents [OSTI]

    Aho, Michael E; Chen, Dong; Eisley, Noel A; Gooding, Thomas M; Heidelberger, Philip; Tauferner, Andrew T

    2015-01-27

    Calculating a checksum utilizing inactive networking components in a computing system, including: identifying, by a checksum distribution manager, an inactive networking component, wherein the inactive networking component includes a checksum calculation engine for computing a checksum; sending, to the inactive networking component by the checksum distribution manager, metadata describing a block of data to be transmitted by an active networking component; calculating, by the inactive networking component, a checksum for the block of data; transmitting, to the checksum distribution manager from the inactive networking component, the checksum for the block of data; and sending, by the active networking component, a data communications message that includes the block of data and the checksum for the block of data.

  14. Government Energy Management | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Government Energy Management Government Energy Management EERE leads a robust network of researchers and other partners to continually develop cost-effective energy-saving solutions that help make our country run better through increased efficiency — promoting better plants, manufacturing processes, and products; more efficient new homes and improved older homes; and other solutions to enhance the buildings in which we work, shop, and lead our everyday lives. EERE leads a robust network of

  15. Method and tool for network vulnerability analysis

    DOE Patents [OSTI]

    Swiler, Laura Painton; Phillips, Cynthia A.

    2006-03-14

    A computer system analysis tool and method that will allow for qualitative and quantitative assessment of security attributes and vulnerabilities in systems including computer networks. The invention is based on generation of attack graphs wherein each node represents a possible attack state and each edge represents a change in state caused by a single action taken by an attacker or unwitting assistant. Edges are weighted using metrics such as attacker effort, likelihood of attack success, or time to succeed. Generation of an attack graph is accomplished by matching information about attack requirements (specified in "attack templates") to information about computer system configuration (contained in a configuration file that can be updated to reflect system changes occurring during the course of an attack) and assumed attacker capabilities (reflected in "attacker profiles"). High risk attack paths, which correspond to those considered suited to application of attack countermeasures given limited resources for applying countermeasures, are identified by finding "epsilon optimal paths."

  16. HPSS Yearly Network Traffic

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    HPSS Yearly Network Traffic HPSS Yearly Network Traffic Yearly Summary of I/O Traffic Between Storage and Network Destinations These bar charts show the total transfer traffic for each year between storage and network destinations (systems within and outside of NERSC). Traffic for the current year is an estimate derived by scaling the known months traffic up to 12 months. The years shown are calendar years. The first graph shows the overall growth in network traffic to storage over the years.

  17. Development of a photovoltaic power supply for wireless sensor networks.

    SciTech Connect (OSTI)

    Harvey, Matthew R.; Kyker, Ronald D.

    2005-06-01

    This report examines the design process of a photovoltaic (solar) based power supply for wireless sensor networks. Such a system stores the energy produced by an array of photovoltaic cells in a secondary (rechargeable) battery that in turn provides power to the individual node of the sensor network. The goal of such a power supply is to enable a wireless sensor network to have an autonomous operation on the order of years. Ideally, such a system is as small as possible physically while transferring the maximum amount of available solar energy to the load (the node). Within this report, there is first an overview of current solar and battery technologies, including characteristics of different technologies and their impact on overall system design. Second is a general discussion of modeling, predicting, and analyzing the extended operation of a small photovoltaic power supply and setting design parameters. This is followed by results and conclusions from the testing of a few basic systems. Lastly, some advanced concepts that may be considered in order to optimize future systems will be discussed.

  18. PNNI routing support for ad hoc mobile networking: A flat architecture

    SciTech Connect (OSTI)

    Martinez, L.; Sholander, P.; Tolendino, L.

    1997-12-01

    This contribution extends the Outside Nodal Hierarchy List (ONHL) procedures described in ATM Form Contribution 97-0766. These extensions allow multiple mobile networks to form either an ad hoc network or an extension of a fixed PNNI infrastructure. This contribution covers the simplest case where the top-most Logical Group Nodes (LGNs), in those mobile networks, all reside at the same level in a PNNI hierarchy. Future contributions will cover the general case where those top-most LGNs reside at different hierarchy levels. This contribution considers a flat ad hoc network architecture--in the sense that each mobile network always participates in the PNNI hierarchy at the preconfigured level of its top-most LGN.

  19. Sandia`s network for supercomputing `95: Validating the progress of Asynchronous Transfer Mode (ATM) switching

    SciTech Connect (OSTI)

    Pratt, T.J.; Vahle, O.; Gossage, S.A.

    1996-04-01

    The Advanced Networking Integration Department at Sandia National Laboratories has used the annual Supercomputing conference sponsored by the IEEE and ACM for the past three years as a forum to demonstrate and focus communication and networking developments. For Supercomputing `95, Sandia elected: to demonstrate the functionality and capability of an AT&T Globeview 20Gbps Asynchronous Transfer Mode (ATM) switch, which represents the core of Sandia`s corporate network, to build and utilize a three node 622 megabit per second Paragon network, and to extend the DOD`s ACTS ATM Internet from Sandia, New Mexico to the conference`s show floor in San Diego, California, for video demonstrations. This paper documents those accomplishments, discusses the details of their implementation, and describes how these demonstrations supports Sandia`s overall strategies in ATM networking.

  20. Chemical Management

    Energy Savers [EERE]

    DOE-HDBK-11391-2006 May 2006 DOE HANDBOOK CHEMICAL MANAGEMENT (Volume 1 of 3) U.S. ... and contractor managers in assessing chemical hazard management and is approved for ...

  1. Self-organization of network dynamics into local quantized states

    DOE Public Access Gateway for Energy & Science Beta (PAGES Beta)

    Nicolaides, Christos; Juanes, Ruben; Cueto-Felgueroso, Luis

    2016-02-17

    Self-organization and pattern formation in network-organized systems emerges from the collective activation and interaction of many interconnected units. A striking feature of these non-equilibrium structures is that they are often localized and robust: only a small subset of the nodes, or cell assembly, is activated. Understanding the role of cell assemblies as basic functional units in neural networks and socio-technical systems emerges as a fundamental challenge in network theory. A key open question is how these elementary building blocks emerge, and how they operate, linking structure and function in complex networks. Here we show that a network analogue of themore » Swift-Hohenberg continuum model—a minimal-ingredients model of nodal activation and interaction within a complex network—is able to produce a complex suite of localized patterns. Thus, the spontaneous formation of robust operational cell assemblies in complex networks can be explained as the result of self-organization, even in the absence of synaptic reinforcements.« less

  2. HeNCE: A Heterogeneous Network Computing Environment

    DOE Public Access Gateway for Energy & Science Beta (PAGES Beta)

    Beguelin, Adam; Dongarra, Jack J.; Geist, George Al; Manchek, Robert; Moore, Keith

    1994-01-01

    Network computing seeks to utilize the aggregate resources of many networked computers to solve a single problem. In so doing it is often possible to obtain supercomputer performance from an inexpensive local area network. The drawback is that network computing is complicated and error prone when done by hand, especially if the computers have different operating systems and data formats and are thus heterogeneous. The heterogeneous network computing environment (HeNCE) is an integrated graphical environment for creating and running parallel programs over a heterogeneous collection of computers. It is built on a lower level package called parallel virtual machine (PVM).more » The HeNCE philosophy of parallel programming is to have the programmer graphically specify the parallelism of a computation and to automate, as much as possible, the tasks of writing, compiling, executing, debugging, and tracing the network computation. Key to HeNCE is a graphical language based on directed graphs that describe the parallelism and data dependencies of an application. Nodes in the graphs represent conventional Fortran or C subroutines and the arcs represent data and control flow. This article describes the present state of HeNCE, its capabilities, limitations, and areas of future research.« less

  3. Cognitive decision errors and organization vulnerabilities in nuclear power plant safety management: Modeling using the TOGA meta-theory framework

    SciTech Connect (OSTI)

    Cappelli, M.; Gadomski, A. M.; Sepiellis, M.; Wronikowska, M. W.

    2012-07-01

    In the field of nuclear power plant (NPP) safety modeling, the perception of the role of socio-cognitive engineering (SCE) is continuously increasing. Today, the focus is especially on the identification of human and organization decisional errors caused by operators and managers under high-risk conditions, as evident by analyzing reports on nuclear incidents occurred in the past. At present, the engineering and social safety requirements need to enlarge their domain of interest in such a way to include all possible losses generating events that could be the consequences of an abnormal state of a NPP. Socio-cognitive modeling of Integrated Nuclear Safety Management (INSM) using the TOGA meta-theory has been discussed during the ICCAP 2011 Conference. In this paper, more detailed aspects of the cognitive decision-making and its possible human errors and organizational vulnerability are presented. The formal TOGA-based network model for cognitive decision-making enables to indicate and analyze nodes and arcs in which plant operators and managers errors may appear. The TOGA's multi-level IPK (Information, Preferences, Knowledge) model of abstract intelligent agents (AIAs) is applied. In the NPP context, super-safety approach is also discussed, by taking under consideration unexpected events and managing them from a systemic perspective. As the nature of human errors depends on the specific properties of the decision-maker and the decisional context of operation, a classification of decision-making using IPK is suggested. Several types of initial situations of decision-making useful for the diagnosis of NPP operators and managers errors are considered. The developed models can be used as a basis for applications to NPP educational or engineering simulators to be used for training the NPP executive staff. (authors)

  4. Network Information System

    Energy Science and Technology Software Center (OSTI)

    1996-05-01

    The Network Information System (NWIS) was initially implemented in May 1996 as a system in which computing devices could be recorded so that unique names could be generated for each device. Since then the system has grown to be an enterprise wide information system which is integrated with other systems to provide the seamless flow of data through the enterprise. The system Iracks data for two main entities: people and computing devices. The following aremore » the type of functions performed by NWIS for these two entities: People Provides source information to the enterprise person data repository for select contractors and visitors Generates and tracks unique usernames and Unix user IDs for every individual granted cyber access Tracks accounts for centrally managed computing resources, and monitors and controls the reauthorization of the accounts in accordance with the DOE mandated interval Computing Devices Generates unique names for all computing devices registered in the system Tracks the following information for each computing device: manufacturer, make, model, Sandia property number, vendor serial number, operating system and operating system version, owner, device location, amount of memory, amount of disk space, and level of support provided for the machine Tracks the hardware address for network cards Tracks the P address registered to computing devices along with the canonical and alias names for each address Updates the Dynamic Domain Name Service (DDNS) for canonical and alias names Creates the configuration files for DHCP to control the DHCP ranges and allow access to only properly registered computers Tracks and monitors classified security plans for stand-alone computers Tracks the configuration requirements used to setup the machine Tracks the roles people have on machines (system administrator, administrative access, user, etc...) Allows systems administrators to track changes made on the machine (both hardware and software) Generates an adjustment history of changes on selected fields« less

  5. Project Management

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Project Management Project Management MaRIE is the experimental facility needed to control the time-dependent properties of materials for national security science missions. It ...

  6. Deactivation Management

    Broader source: Energy.gov [DOE]

    The purpose here is to provide information for specific aspects of project management that apply to deactivation. Overall management of deactivation projects should use a traditional project...

  7. Time lagged ordinal partition networks for capturing dynamics of continuous dynamical systems

    SciTech Connect (OSTI)

    McCullough, Michael; Iu, Herbert Ho-Ching; Small, Michael; Stemler, Thomas

    2015-05-15

    We investigate a generalised version of the recently proposed ordinal partition time series to network transformation algorithm. First, we introduce a fixed time lag for the elements of each partition that is selected using techniques from traditional time delay embedding. The resulting partitions define regions in the embedding phase space that are mapped to nodes in the network space. Edges are allocated between nodes based on temporal succession thus creating a Markov chain representation of the time series. We then apply this new transformation algorithm to time series generated by the Rssler system and find that periodic dynamics translate to ring structures whereas chaotic time series translate to band or tube-like structuresthereby indicating that our algorithm generates networks whose structure is sensitive to system dynamics. Furthermore, we demonstrate that simple network measures including the mean out degree and variance of out degrees can track changes in the dynamical behaviour in a manner comparable to the largest Lyapunov exponent. We also apply the same analysis to experimental time series generated by a diode resonator circuit and show that the network size, mean shortest path length, and network diameter are highly sensitive to the interior crisis captured in this particular data set.

  8. Physical Modeling of Scaled Water Distribution System Networks.

    SciTech Connect (OSTI)

    O'Hern, Timothy J.; Hammond, Glenn Edward; Orear, Leslie ,; van Bloemen Waanders, Bart G.; Paul Molina; Ross Johnson

    2005-10-01

    Threats to water distribution systems include release of contaminants and Denial of Service (DoS) attacks. A better understanding, and validated computational models, of the flow in water distribution systems would enable determination of sensor placement in real water distribution networks, allow source identification, and guide mitigation/minimization efforts. Validation data are needed to evaluate numerical models of network operations. Some data can be acquired in real-world tests, but these are limited by 1) unknown demand, 2) lack of repeatability, 3) too many sources of uncertainty (demand, friction factors, etc.), and 4) expense. In addition, real-world tests have limited numbers of network access points. A scale-model water distribution system was fabricated, and validation data were acquired over a range of flow (demand) conditions. Standard operating variables included system layout, demand at various nodes in the system, and pressure drop across various pipe sections. In addition, the location of contaminant (salt or dye) introduction was varied. Measurements of pressure, flowrate, and concentration at a large number of points, and overall visualization of dye transport through the flow network were completed. Scale-up issues that that were incorporated in the experiment design include Reynolds number, pressure drop across nodes, and pipe friction and roughness. The scale was chosen to be 20:1, so the 10 inch main was modeled with a 0.5 inch pipe in the physical model. Controlled validation tracer tests were run to provide validation to flow and transport models, especially of the degree of mixing at pipe junctions. Results of the pipe mixing experiments showed large deviations from predicted behavior and these have a large impact on standard network operations models.3

  9. On Modeling and Analysis of MIMO Wireless Mesh Networks with Triangular Overlay Topology

    DOE Public Access Gateway for Energy & Science Beta (PAGES Beta)

    Cao, Zhanmao; Wu, Chase Q.; Zhang, Yuanping; Shiva, Sajjan G.; Gu, Yi

    2015-01-01

    Multiple input multiple output (MIMO) wireless mesh networks (WMNs) aim to provide the last-mile broadband wireless access to the Internet. Along with the algorithmic development for WMNs, some fundamental mathematical problems also emerge in various aspects such as routing, scheduling, and channel assignment, all of which require an effective mathematical model and rigorous analysis of network properties. In this paper, we propose to employ Cartesian product of graphs (CPG) as a multichannel modeling approach and explore a set of unique properties of triangular WMNs. In each layer of CPG with a single channel, we design a node coordinate scheme thatmore » retains the symmetric property of triangular meshes and develop a function for the assignment of node identity numbers based on their coordinates. We also derive a necessary-sufficient condition for interference-free links and combinatorial formulas to determine the number of the shortest paths for channel realization in triangular WMNs.« less

  10. Managing internode data communications for an uninitialized process in a parallel computer

    DOE Patents [OSTI]

    Archer, Charles J; Blocksome, Michael A; Miller, Douglas R; Parker, Jeffrey J; Ratterman, Joseph D; Smith, Brian E

    2014-05-20

    A parallel computer includes nodes, each having main memory and a messaging unit (MU). Each MU includes computer memory, which in turn includes, MU message buffers. Each MU message buffer is associated with an uninitialized process on the compute node. In the parallel computer, managing internode data communications for an uninitialized process includes: receiving, by an MU of a compute node, one or more data communications messages in an MU message buffer associated with an uninitialized process on the compute node; determining, by an application agent, that the MU message buffer associated with the uninitialized process is full prior to initialization of the uninitialized process; establishing, by the application agent, a temporary message buffer for the uninitialized process in main computer memory; and moving, by the application agent, data communications messages from the MU message buffer associated with the uninitialized process to the temporary message buffer in main computer memory.

  11. Method and apparatus for analyzing error conditions in a massively parallel computer system by identifying anomalous nodes within a communicator set

    DOE Patents [OSTI]

    Gooding, Thomas Michael

    2011-04-19

    An analytical mechanism for a massively parallel computer system automatically analyzes data retrieved from the system, and identifies nodes which exhibit anomalous behavior in comparison to their immediate neighbors. Preferably, anomalous behavior is determined by comparing call-return stack tracebacks for each node, grouping like nodes together, and identifying neighboring nodes which do not themselves belong to the group. A node, not itself in the group, having a large number of neighbors in the group, is a likely locality of error. The analyzer preferably presents this information to the user by sorting the neighbors according to number of adjoining members of the group.

  12. A Prognostic Index for Predicting Lymph Node Metastasis in Minor Salivary Gland Cancer

    SciTech Connect (OSTI)

    Lloyd, Shane; Yu, James B. [Department of Therapeutic Radiology, Yale University School of Medicine, New Haven, CT (United States); Ross, Douglas A. [Department of Surgery, St. Vincent's Medical Center, Bridgeport, CT (United States); Wilson, Lynn D. [Department of Therapeutic Radiology, Yale University School of Medicine, New Haven, CT (United States); Decker, Roy H., E-mail: roy.decker@yale.ed [Department of Therapeutic Radiology, Yale University School of Medicine, New Haven, CT (United States)

    2010-01-15

    Purpose: Large studies examining the clinical and pathological factors associated with nodal metastasis in minor salivary gland cancer are lacking in the literature. Methods and Materials: Using the Surveillance, Epidemiology, and End Results (SEER) database, we identified 2,667 minor salivary gland cancers with known lymph node status from 1988 to 2004. Univariate and multivariate analyses were conducted to identify factors associated with the use of neck dissection, the use of external beam radiation therapy, and the presence of cervical lymph node metastases. Results: Four hundred twenty-six (16.0%) patients had neck nodal involvement. Factors associated with neck nodal involvement on univariate analysis included increasing age, male sex, increasing tumor size, high tumor grade, T3-T4 stage, adenocarcinoma or mucoepidermoid carcinomas, and pharyngeal site of primary malignancy. On multivariate analysis, four statistically significant factors were identified, including male sex, T3-T4 stage, pharyngeal site of primary malignancy, and high-grade adenocarcinoma or high-grade mucoepidermoid carcinomas. The proportions (and 95% confidence intervals) of patients with lymph node involvement for those with 0, 1, 2, 3, and 4 of these prognostic factors were 0.02 (0.01-0.03), 0.09 (0.07-0.11), 0.17 (0.14-0.21), 0.41 (0.33-0.49), and 0.70 (0.54-0.85), respectively. Grade was a significant predictor of metastasis for adenocarcinoma and mucoepidermoid carcinoma but not for adenoid cystic carcinoma. Conclusions: A prognostic index using the four clinicopathological factors listed here can effectively differentiate patients into risk groups of nodal metastasis. The precision of this index is subject to the limitations of SEER data and should be validated in further clinical studies.

  13. Conference Management

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    1999-11-03

    To establish requirements and responsibilities with respect to managing conferences sponsored by the Department of Energy (DOE) or by DOE management and operating contractors and other contractors who perform work at DOE-owned or -leased facilities, including management and integration contractors and environmental restoration management contractors (when using funds that will be reimbursed by DOE). Cancels DOE N 110.3.

  14. Network II Database

    Energy Science and Technology Software Center (OSTI)

    1994-11-07

    The Oak Ridge National Laboratory (ORNL) Rail and Barge Network II Database is a representation of the rail and barge system of the United States. The network is derived from the Federal Rail Administration (FRA) rail database.

  15. Science-Driven Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Science-Driven Network Requirements for ESnet Update to the 2002 Office of Science Networking Requirements Workshop Report February 21, 2006 1-1 Science-Driven Network Requirements for ESnet Update to the 2002 Office of Science Networking Requirements Workshop Report February 21, 2006 Contributors Paul Adams, LBNL (Advanced Light Source) Shane Canon, ORNL (NLCF) Steven Carter, ORNL (NLCF) Brent Draney, LBNL (NERSC) Martin Greenwald, MIT (Magnetic Fusion Energy) Jason Hodges, ORNL (Spallation

  16. Nothing But Networking for Residential Network Members | Department of

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Energy Nothing But Networking for Residential Network Members Nothing But Networking for Residential Network Members Better Buildings Residential Network Peer Exchange Call: Nothing But Networking for Residential Network Members, Call Slides and Discussion Summary, March 12, 2015. PDF icon Call Slides and Discussion Summary More Documents & Publications Better Buildings Residential Network Orientation Webinar Community Organizing and Outreach Outreach to Multifamily Landlords and Tenants

  17. The Evolving Bioeconomy and Renewable Fuels Professional Networking Event

    Broader source: Energy.gov [DOE]

    Leaders in Energy will be hosting a networking event on June 22, 2015, prior to Bioenergy 2015 at the Washington Convention Center. Sustainability Technology Manager Kristen Johnson will be speaking on integrated landscape management as a way to enhance sustainable feedstocks.

  18. Calorimetry Network Program

    Energy Science and Technology Software Center (OSTI)

    1998-01-30

    This is a Windows NT based program to run the SRTC designed calorimeters. The network version can communicate near real time data and final data values over the network. This version, due to network specifics, can function in a stand-alone operation also.

  19. Constructing Compact and Effective Graphs for Recommender Systems via Node and Edge Aggregations

    DOE Public Access Gateway for Energy & Science Beta (PAGES Beta)

    Kahng, Minsuk; Sang-goo, Lee

    2015-01-01

    Exploiting graphs for recommender systems has great potential to flexibly incorporate heterogeneous information for producing better recommendation results. As our baseline approach, we first introduce a na ve graph-based recommendation method, which operates with a heterogeneous log-metadata graph constructed from user log and content metadata databases. Although the na ve graph-based recommendation method is simple, it allows us to take advantages of heterogeneous information and shows promising flexibility and recommendation accuracy. However, it often leads to extensive processing time due to the sheer size of the graphs constructed from entire user log and content metadata databases. In this paper, wemore » propose node and edge aggregation approaches to constructing compact and e ective graphs called Factor-Item bipartite graphs by aggregating nodes and edges of a log-metadata graph. Experimental results using real world datasets indicate that our approach can significantly reduce the size of graphs exploited for recommender systems without sacrificing the recommendation quality.« less

  20. Enerlogics Networks | Open Energy Information

    Open Energy Info (EERE)

    Networks Name: Enerlogics Networks Place: Pittsburgh, Pennsylvania Product: buidling automation control systems to utility software solutions to telecommunication systems...

  1. Gas-Dynamic Transients Flow Networks

    Energy Science and Technology Software Center (OSTI)

    1987-09-01

    TVENT1P predicts flows and pressures in a ventilation system or other air pathway caused by pressure transients, such as a tornado. For an analytical model to simulate an actual system, it must have (1) the same arrangement of components in a network of flow paths; (2) the same friction characteristics; (3) the same boundary pressures; (4) the same capacitance; and (5) the same forces that drive the air. A specific set of components used formore » constructing the analytical model includes filters, dampers, ducts, blowers, rooms, or volume connected at nodal points to form networks. The effects of a number of similar components can be lumped into a single one. TVENT1P contains a material transport algorithm and features for turning blowers off and on, changing blower speeds, changing the resistance of dampers and filters, and providing a filter model to handle very high flows. These features make it possible to depict a sequence of events during a single run. Component properties are varied using time functions. The filter model is not used by the code unless it is specified by the user. The basic results of a TVENT1P solution are flows in branches and pressures at nodes. A postprocessor program, PLTTEX, is included to produce the plots specified in the TVENT1P input. PLTTEX uses the proprietary CA-DISSPLA graphics software.« less

  2. Internet protocol network mapper

    DOE Patents [OSTI]

    Youd, David W.; Colon III, Domingo R.; Seidl, Edward T.

    2016-02-23

    A network mapper for performing tasks on targets is provided. The mapper generates a map of a network that specifies the overall configuration of the network. The mapper inputs a procedure that defines how the network is to be mapped. The procedure specifies what, when, and in what order the tasks are to be performed. Each task specifies processing that is to be performed for a target to produce results. The procedure may also specify input parameters for a task. The mapper inputs initial targets that specify a range of network addresses to be mapped. The mapper maps the network by, for each target, executing the procedure to perform the tasks on the target. The results of the tasks represent the mapping of the network defined by the initial targets.

  3. Co-scheduling of network resource provisioning and host-to-host bandwidth reservation on high-performance network and storage systems

    DOE Patents [OSTI]

    Yu, Dantong; Katramatos, Dimitrios; Sim, Alexander; Shoshani, Arie

    2014-04-22

    A cross-domain network resource reservation scheduler configured to schedule a path from at least one end-site includes a management plane device configured to monitor and provide information representing at least one of functionality, performance, faults, and fault recovery associated with a network resource; a control plane device configured to at least one of schedule the network resource, provision local area network quality of service, provision local area network bandwidth, and provision wide area network bandwidth; and a service plane device configured to interface with the control plane device to reserve the network resource based on a reservation request and the information from the management plane device. Corresponding methods and computer-readable medium are also disclosed.

  4. MANAGEMENT ALERT

    Broader source: Energy.gov (indexed) [DOE]

    COMMISSION FROM: Gregory H. Friedman Inspector General SUBJECT: INFORMATION: Management Alert: Review of Allegations of Improper Disclosure of Confidential, Nonpublic...

  5. DEACTIVATION MANAGEMENT

    Office of Environmental Management (EM)

    MANAGEMENT The purpose here is to provide information for specific aspects of project management that apply to deactivation. Overall management of deactivation projects should use a traditional project management approach, and as such is not addressed. The following specific topics are based on lessons learned during deactivation of DOE facilities.  The Deactivation Mission  The Stabilization/Deactivation "Customer"  Project Approach for a Complex Facility  Establishing the

  6. RESIDENTIAL NETWORK MEMBERS UNITE TO FORM GREEN BANK NETWORK | Department

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    of Energy RESIDENTIAL NETWORK MEMBERS UNITE TO FORM GREEN BANK NETWORK RESIDENTIAL NETWORK MEMBERS UNITE TO FORM GREEN BANK NETWORK The NY Green Bank logo. Residential Network members Connecticut Green Bank and NY Green Bank, a division of Residential Network member New York State Energy Research and Development Authority, have helped launch the Green Bank Network, a new international organization focused on collaborating to scale up private financing to meet the challenge of climate change.

  7. Intrusion detection and monitoring for wireless networks.

    SciTech Connect (OSTI)

    Thomas, Eric D.; Van Randwyk, Jamie A.; Lee, Erik J.; Stephano, Amanda; Tabriz, Parisa; Pelon, Kristen; McCoy, Damon (University of Colorado, Boulder); Lodato, Mark; Hemingway, Franklin; Custer, Ryan P.; Averin, Dimitry; Franklin, Jason; Kilman, Dominique Marie

    2005-11-01

    Wireless computer networks are increasing exponentially around the world. They are being implemented in both the unlicensed radio frequency (RF) spectrum (IEEE 802.11a/b/g) and the licensed spectrum (e.g., Firetide [1] and Motorola Canopy [2]). Wireless networks operating in the unlicensed spectrum are by far the most popular wireless computer networks in existence. The open (i.e., proprietary) nature of the IEEE 802.11 protocols and the availability of ''free'' RF spectrum have encouraged many producers of enterprise and common off-the-shelf (COTS) computer networking equipment to jump into the wireless arena. Competition between these companies has driven down the price of 802.11 wireless networking equipment and has improved user experiences with such equipment. The end result has been an increased adoption of the equipment by businesses and consumers, the establishment of the Wi-Fi Alliance [3], and widespread use of the Alliance's ''Wi-Fi'' moniker to describe these networks. Consumers use 802.11 equipment at home to reduce the burden of running wires in existing construction, facilitate the sharing of broadband Internet services with roommates or neighbors, and increase their range of ''connectedness''. Private businesses and government entities (at all levels) are deploying wireless networks to reduce wiring costs, increase employee mobility, enable non-employees to access the Internet, and create an added revenue stream to their existing business models (coffee houses, airports, hotels, etc.). Municipalities (Philadelphia; San Francisco; Grand Haven, MI) are deploying wireless networks so they can bring broadband Internet access to places lacking such access; offer limited-speed broadband access to impoverished communities; offer broadband in places, such as marinas and state parks, that are passed over by traditional broadband providers; and provide themselves with higher quality, more complete network coverage for use by emergency responders and other municipal agencies. In short, these Wi-Fi networks are being deployed everywhere. Much thought has been and is being put into evaluating cost-benefit analyses of wired vs. wireless networks and issues such as how to effectively cover an office building or municipality, how to efficiently manage a large network of wireless access points (APs), and how to save money by replacing an Internet service provider (ISP) with 802.11 technology. In comparison, very little thought and money are being focused on wireless security and monitoring for security purposes.

  8. Clinical Utility of the Modified Segmental Boost Technique for Treatment of the Pelvis and Inguinal Nodes

    SciTech Connect (OSTI)

    Moran, M.S.; Castrucci, W.A.; Ahmad, M.; Song, H.; Lund, M.W.; Mani, S.; Chamberlain, Daniel; Higgins, S.A.

    2010-03-15

    Purpose: Low-lying pelvic malignancies often require simultaneous radiation to pelvis and inguinal nodes. We previously reported improved homogeneity with the modified segmental boost technique (MSBT) compared to that with traditional methods, using phantom models. Here we report our institutional clinical experience with MSBT. Methods and Materials: MSBT patients from May 2001 to March 2007 were evaluated. Parameters analyzed included isocenter/multileaf collimation shifts, time per fraction (four fields), monitor units (MU)/fraction, femoral doses, maximal dose relative to body mass index, and inguinal node depth. In addition, a dosimetric comparison of the MSBT versus intensity modulated radiation therapy (IMRT) was conducted. Results: Of the 37 MSBT patients identified, 32 were evaluable. Port film adjustments were required in 6% of films. Median values for each analyzed parameter were as follows: MU/fraction, 298 (range, 226-348); delivery time, 4 minutes; inguinal depth, 4.5 cm; volume receiving 45 Gy (V45), 7%; V27.5, 87%; body mass index, 25 (range, 16.0-33.8). Inguinal dose was 100% in all cases; in-field inhomogeneity ranged from 111% to 118%. IMRT resulted in significantly decreased dose to normal tissue but required more time for treatment planning and a higher number of MUs (1,184 vs. 313 MU). Conclusions: In our clinical experience, the mono-isocentric MSBT provides a high degree of accuracy, improved homogeneity compared with traditional techniques, ease of simulation, treatment planning, treatment delivery, and acceptable femoral doses for pelvic/inguinal radiation fields requiring 45 to 50.4 Gy. In addition, the MSBT delivers a relatively uniform dose distribution throughout the treatment volume, despite varying body habitus. Clinical scenarios for the use of MSBT vs. intensity-modulated radiation therapy are discussed. To our knowledge, this is the first study reporting the utility of MSBT in the clinical setting.

  9. Determining when a set of compute nodes participating in a barrier operation on a parallel computer are ready to exit the barrier operation

    DOE Patents [OSTI]

    Blocksome, Michael A.

    2011-12-20

    Methods, apparatus, and products are disclosed for determining when a set of compute nodes participating in a barrier operation on a parallel computer are ready to exit the barrier operation that includes, for each compute node in the set: initializing a barrier counter with no counter underflow interrupt; configuring, upon entering the barrier operation, the barrier counter with a value in dependence upon a number of compute nodes in the set; broadcasting, by a DMA engine on the compute node to each of the other compute nodes upon entering the barrier operation, a barrier control packet; receiving, by the DMA engine from each of the other compute nodes, a barrier control packet; modifying, by the DMA engine, the value for the barrier counter in dependence upon each of the received barrier control packets; exiting the barrier operation if the value for the barrier counter matches the exit value.

  10. Environmental Management Waste Management Facility (EMWMF) at...

    Office of Environmental Management (EM)

    Review of the Environmental Management Waste Management Facility (EMWMF) at Oak Ridge ... INTRODUCTION The Environmental Management Waste Management Facility (EMWMF) is a land ...

  11. Networking and Application Strategies

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Networking and Application Strategies Networking and Application Strategies Los Alamos Lab recruits the best minds on the planet and offers job search information and assistance to our dual career spouses or partners. Contact Us dualcareers@lanl.gov You know more people than you think Having strong existing connections along with building new ones is essential to finding a job-especially for a dual career family that is new to the area. Networking is a proven and effective way to increase your

  12. Taming the Wild World of Management, Performance and Communication - 13459

    SciTech Connect (OSTI)

    Ford, Laurie

    2013-07-01

    Management has evolved a long way from its original meaning of 'governing a horse'. The industrial revolution fostered 'scientific management'; 1930's Hawthorne studies discovered that people's social interactions could alter productivity; and the dawn of the computer age in the post-war 1950's brought general systems theory into management thinking. Today, mobile wireless connectivity aims to transform ever-changing networks of players, mandates, and markets into something that can be 'managed'. So why is there no clear and simple recipe for how to practice management? We talk about financial management, safety management, and operations management, but surely the 'management' part of those endeavors will share the same set of practices. Instead, we are still arguing for 'management' to include everything from developing people to negotiating contracts. A manager's job may include many things, but one of them, the job of management, needs to be nailed down. Three standard practices for managing in a network are developed: (a) support the dialogues that connect people vital to accomplishing a goal or objective; (b) develop and sustain the scoreboards that serve as a road-map to reach the goal; and (c) control the feedback to 'govern the horse'. These three practices are useful for more than reaching goals, as they also support coordinating across boundaries and running productive meetings. The dialogues for productive relationships, scoreboards for goals and deliverables, and feedback for performance together constitute a recipe for managing in a networked world. (authors)

  13. Teaching Managers How to Manage

    SciTech Connect (OSTI)

    Hylko, J.M.

    2006-07-01

    Following graduation from a college or university with a technical degree, or through years of experience, an individual's training and career development activities typically focus on enhancing technical problem-solving skills. However, as these technical professionals, herein referred to as 'Techies', advance throughout their careers, they may be required to accept and adapt to the role of being a manager, and must undergo a transition to learn and rely on new problem-solving skills. However, unless a company has a specific manager-trainee class to address this subject and develop talent from within, an employee's management style is learned and developed 'on the job'. Both positive and negative styles are nurtured by those managers having similar qualities. Unfortunately, a negative style often contributes to the deterioration of employee morale and ultimate closing of a department or company. This paper provides the core elements of an effective management training program for 'Teaching Managers How to Manage' derived from the Department of Energy's Integrated Safety Management System and the Occupational Safety and Health Administration 's Voluntary Protection Program. Discussion topics and real-life examples concentrate on transitioning an employee from a 'Techie' to a manager; common characteristics of being a manager; the history and academic study of management; competition, change and the business of waste management; what to do after taking over a department by applying Hylko's Star of Success; command media; the formal and informal organizational charts; chain of command; hiring and developing high-degree, autonomous employees through effective communication and delegation; periodic status checks; and determining if the program is working successfully. These common characteristics of a strong management/leadership culture and practical career tips discussed herein provide a solid foundation for any company or department that is serious about developing an effective management training program for its employees. In turn, any employee in any work environment can begin using this information immediately if they want to become a better manager. (authors)

  14. Energy Efficient Digital Networks

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    ... of diverse CE devices (audio and video) - Determine best ways for people to ... research * Further exploration of digital network energy issues - Special attention ...

  15. Energy Sciences Network (ESnet)

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    making it the standard for research institutions today. Read More ESnet Releases Open Source Software from MyESnet Portal for Building Online Interactive Network Portals ESnet...

  16. Advanced Tissue-engineered Human Ectypal Networks

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Advanced Tissue-engineered Human Ectypal Networks Analyzer (ATHENA) March 30, 2016 Request for Information Los Alamos National Security, LLC (LANS) is the manager and operator of Los Alamos National Laboratory (Los Alamos) for the U.S. Department of Energy National Nuclear Security Administration under contract DE-AC52-06NA25396. Los Alamos is a mission- centric Federally Funded Research and Development Center focused on solving critical national security challenges through science and

  17. Impact of network topology on synchrony of oscillatory power grids

    SciTech Connect (OSTI)

    Rohden, Martin; Sorge, Andreas; Witthaut, Dirk; Timme, Marc; Faculty of Physics, Georg August Universitt Gttingen, Gttingen

    2014-03-15

    Replacing conventional power sources by renewable sources in current power grids drastically alters their structure and functionality. In particular, power generation in the resulting grid will be far more decentralized, with a distinctly different topology. Here, we analyze the impact of grid topologies on spontaneous synchronization, considering regular, random, and small-world topologies and focusing on the influence of decentralization. We model the consumers and sources of the power grid as second order oscillators. First, we analyze the global dynamics of the simplest non-trivial (two-node) network that exhibit a synchronous (normal operation) state, a limit cycle (power outage), and coexistence of both. Second, we estimate stability thresholds for the collective dynamics of small network motifs, in particular, star-like networks and regular grid motifs. For larger networks, we numerically investigate decentralization scenarios finding that decentralization itself may support power grids in exhibiting a stable state for lower transmission line capacities. Decentralization may thus be beneficial for power grids, regardless of the details of their resulting topology. Regular grids show a specific sharper transition not found for random or small-world grids.

  18. On Deployment of Multiple Base Stations for Energy-Efficient Communication in Wireless Sensor Networks

    DOE Public Access Gateway for Energy & Science Beta (PAGES Beta)

    Lin, Yunyue; Wu, Qishi; Cai, Xiaoshan; Du, Xiaojiang; Kwon, Ki-Hyeon

    2010-01-01

    Data transmission from sensor nodes to a base station or a sink node often incurs significant energy consumption, which critically affects network lifetime. We generalize and solve the problem of deploying multiple base stations to maximize network lifetime in terms of two different metrics under one-hop and multihop communication models. In the one-hop communication model, the sensors far away from base stations always deplete their energy much faster than others. We propose an optimal solution and a heuristic approach based on the minimal enclosing circle algorithm to deploy a base station at the geometric center of each cluster. In themore » multihop communication model, both base station location and data routing mechanism need to be considered in maximizing network lifetime. We propose an iterative algorithm based on rigorous mathematical derivations and use linear programming to compute the optimal routing paths for data transmission. Simulation results show the distinguished performance of the proposed deployment algorithms in maximizing network lifetime.« less

  19. Bibliographic Management

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    and more from varied resources and databases to organize references, keep notes to stay ahead of the game. Questions? 505-667-5809 Email Bibliographic management tools allow...

  20. acquisition management

    National Nuclear Security Administration (NNSA)

    the science, technology, and engineering base; and,

  21. Continue NNSA management reforms.


    • Our Values:<...

  1. Energy Management

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Energy Management Utilize energy efficiency to improve your industrial customer's business performance without the cost of major capital improvements. Energy efficiency is not...

  2. project management

    National Nuclear Security Administration (NNSA)

    %2A en Project Management and Systems Support http:nnsa.energy.govaboutusouroperationsapmprojectmanagementandsystemssupport

  3. Quality Management

    Broader source: Energy.gov [DOE]

    The Office of Quality Management, within the Office of Health, Safety and Security develops policies and procedures to ensure the classification and control of information is effective and...

  4. Position Management

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    1992-06-23

    The order prescribes the policies, responsibilities, and procedures for position management within (DOE). Canceled by DOE N 1321.140. Cancels DOE 3510.1

  5. Management Overview

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Management & Administration Forms (0000-1999) Management & Administration Forms (0000-1999) DOE F 206.1 (pdf) Privacy Impact Assessment (PIA) DOE F 206.4 (fillable pdf) Information Sheet for Sponsorship of HSPD-12 Credential DOE F 241.2 (fillable pdf) Notice of Energy RD&D Project DOE F 241.4 (fillable pdf) Announcement of Computer Software DOE F 241.5 (pdf) Information Collection Clearance Manager Appointment DOE F 242.1 (fillable pdf) Forms Manager Designation DOE F 243.2 (fillable

  6. project management

    National Nuclear Security Administration (NNSA)

    3%2A en Project Management and Systems Support http:www.nnsa.energy.govaboutusouroperationsapmprojectmanagementandsystemssupport

  7. Form:Networking Organization | Open Energy Information

    Open Energy Info (EERE)

    Networking Organization Jump to: navigation, search Add a Networking Organization Input your networking organization name below to add to the registry. If your networking...

  8. Comments of Tendril Networks Inc | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Tendril Networks Inc Comments of Tendril Networks Inc Tendril is pleased to provide these comments to the Department of Energy (DOE) in response to the Request for Information "Addressing Policy and Logistical Challenges to Smart Grid Implementation." Tendril offers a software and hardware solution that enables residential home energy management and demand response. Therefore, our comments will primarily address issues that affect metering technologies, consumer-facing programs and the

  9. Collective network routing

    DOE Patents [OSTI]

    Hoenicke, Dirk

    2014-12-02

    Disclosed are a unified method and apparatus to classify, route, and process injected data packets into a network so as to belong to a plurality of logical networks, each implementing a specific flow of data on top of a common physical network. The method allows to locally identify collectives of packets for local processing, such as the computation of the sum, difference, maximum, minimum, or other logical operations among the identified packet collective. Packets are injected together with a class-attribute and an opcode attribute. Network routers, employing the described method, use the packet attributes to look-up the class-specific route information from a local route table, which contains the local incoming and outgoing directions as part of the specifically implemented global data flow of the particular virtual network.

  10. Risk Factors for Regional Nodal Relapse in Breast Cancer Patients With One to Three Positive Axillary Nodes

    SciTech Connect (OSTI)

    Yates, Lucy; Kirby, Anna; Crichton, Siobhan; Gillett, Cheryl; Cane, Paul; Fentiman, Ian; Sawyer, Elinor

    2012-04-01

    Purpose: In many centers, supraclavicular fossa radiotherapy (SCF RT) is not routinely offered to breast cancer patients with one to three positive lymph nodes. We aimed to identify a subgroup of these patients who are at high risk of supra or infraclavicular fossa relapse (SCFR) such that they can be offered SCFRT at the time of diagnosis to improve long term locoregional control. Methods and Materials: We performed a retrospective analysis of the pathological features of 1,065 cases of invasive breast cancer with one to three positive axillary lymph nodes. Patients underwent radical breast conserving surgery or mastectomy. A total of 45% of patients received adjuvant chest wall/breast RT. No patients received adjuvant SCFRT. The primary outcome was SCFR. Secondary outcomes were chest wall/breast recurrence, distant metastasis, all death, and breast-cancer specific death. Kaplan-Meier estimates were used to calculate actuarial event rates and survival functions compared using log-rank tests. Multivariate analyses (MVA) of factors associated with outcome were conducted using Cox proportional hazards models. Results: Median follow-up was 9.7 years. SCFR rate was 9.2%. Median time from primary diagnosis to SCFR was 3.4 years (range, 0.7-14.4 years). SCFR was associated with significantly lower 10-year survival (18% vs. 65%; p < 0.001). Higher grade and number of positive lymph nodes were the most significant predictors of SCFR on MVA (p < 0.001). 10 year SCFR rates were less than 1% in all patients with Grade 1 cancers compared with 30% in those having Grade 3 cancers with three positive lymph nodes. Additional factors associated with SCFR on univariate analysis but not on MVA included larger nodal deposits (p = 0.002) and proportion of positive nodes (p = 0.003). Conclusions: Breast cancer patients with one to three positive lymph nodes have a heterogenous risk of SCFR. Patients with two to three positive axillary nodes and/or high-grade disease may warrant consideration of SCFRT.

  11. RESIDENTIAL NETWORK MEMBERS UNITE TO FORM GREEN BANK NETWORK...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Residential Network members Connecticut Green Bank and NY Green Bank, a division of Residential Network member New York State Energy Research and Development Authority, have helped ...

  12. Postoperative Radiation Therapy With or Without Concurrent Chemotherapy for Node-Positive Thoracic Esophageal Squamous Cell Carcinoma

    SciTech Connect (OSTI)

    Chen, Junqiang; Pan, Jianji; Liu, Jian; Li, Jiancheng; Zhu, Kunshou; Zheng, Xiongwei; Chen, Mingqiang; Chen, Ming; Liao, Zhongxing

    2013-07-15

    Purpose: To retrospectively compare the efficacy of radiation therapy (RT) and chemotherapy plus RT (CRT) for the postoperative treatment of node-positive thoracic esophageal squamous cell carcinoma (TESCC) and to determine the incidence and severity of toxic reactions. Methods and Materials: We retrospectively reviewed data from 304 patients who had undergone esophagectomy with 3-field lymph node dissection for TESCC and were determined by postoperative pathology to have lymph node metastasis without distant hematogenous metastasis. Of these patients, 164 underwent postoperative chemotherapy (cisplatin 80 mg/m{sup 2}, average days 1-3, plus paclitaxel 135 mg/m{sup 2}, day 1; 21-day cycle) plus RT (50 Gy), and 140 underwent postoperative RT alone. Results: The 5-year overall survival rates for the CRT and RT groups were 47.4% and 38.6%, respectively (P=.030). The distant metastasis rate, the mixed (regional lymph node and distant) metastasis rate, and the overall recurrence rate were significantly lower in the CRT group than in the RT group (P<.05). However, mild and severe early toxic reactions, including neutropenia, radiation esophagitis, and gastrointestinal reaction, were significantly more common in the CRT group than in the RT group (P<.05). No significant differences in incidence of late toxic reactions were found between the 2 groups. Conclusions: Our results show that in node-positive TESCC patients, postoperative CRT is significantly more effective than RT alone at increasing the overall survival and decreasing the rates of distant metastasis, mixed metastasis, and overall recurrence. Severe early toxic reactions were more common with CRT than with RT alone, but patients could tolerate CRT.

  13. Records Management

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Records Management (RM) refers to the systematic identification, creation, capture, organization, maintenance, retrieval, protection, storage and disposition of records, regardless of media, created or received in the transaction of Sandia's scientific investigations and long-term repository performance calculations within a regulatory context. Our disciplined approach to records management makes many things possible: assurance that regulatory requirements are met; reduced risk of expensive

  14. Supporting Dynamic Spectrum Access in Heterogeneous LTE+ Networks

    SciTech Connect (OSTI)

    Luiz A. DaSilva; Ryan E. Irwin; Mike Benonis

    2012-08-01

    As early as 2014, mobile network operators’ spectral capac- ity is expected to be overwhelmed by the demand brought on by new devices and applications. With Long Term Evo- lution Advanced (LTE+) networks likely as the future one world 4G standard, network operators may need to deploy a Dynamic Spectrum Access (DSA) overlay in Heterogeneous Networks (HetNets) to extend coverage, increase spectrum efficiency, and increase the capacity of these networks. In this paper, we propose three new management frameworks for DSA in an LTE+ HetNet: Spectrum Accountability Client, Cell Spectrum Management, and Domain Spectrum Man- agement. For these spectrum management frameworks, we define protocol interfaces and operational signaling scenar- ios to support cooperative sensing, spectrum lease manage- ment, and alarm scenarios for rule adjustment. We also quan- tify, through integer programs, the benefits of using DSA in an LTE+ HetNet, that can opportunistically reuse vacant TV and GSM spectrum. Using integer programs, we consider a topology using Geographic Information System data from the Blacksburg, VA metro area to assess the realistic benefits of DSA in an LTE+ HetNet.

  15. Tungsten polyoxometalate molecules as active nodes for dynamic carrier exchange in hybrid molecular/semiconductor capacitors

    SciTech Connect (OSTI)

    Balliou, A.; Douvas, A. M.; Normand, P.; Argitis, P.; Glezos, N.; Tsikritzis, D.; Kennou, S.

    2014-10-14

    In this work we study the utilization of molecular transition metal oxides known as polyoxometalates (POMs), in particular the Keggin structure anions of the formula PW₁₂O₄₀³⁻, as active nodes for potential switching and/or fast writing memory applications. The active molecules are being integrated in hybrid Metal-Insulator/POM molecules-Semiconductor capacitors, which serve as prototypes allowing investigation of critical performance characteristics towards the design of more sophisticated devices. The charging ability as well as the electronic structure of the molecular layer is probed by means of electrical characterization, namely, capacitance-voltage and current-voltage measurements, as well as transient capacitance measurements, C (t), under step voltage polarization. It is argued that the transient current peaks observed are manifestations of dynamic carrier exchange between the gate electrode and specific molecular levels, while the transient C (t) curves under conditions of molecular charging can supply information for the rate of change of the charge that is being trapped and de-trapped within the molecular layer. Structural characterization via surface and cross sectional scanning electron microscopy as well as atomic force microscopy, spectroscopic ellipsometry, UV and Fourier-transform IR spectroscopies, UPS, and XPS contribute to the extraction of accurate electronic structure characteristics and open the path for the design of new devices with on-demand tuning of their interfacial properties via the controlled preparation of the POM layer.

  16. Minor antigen graft-versus-host reactions revealed in irradiated spleen and popliteal lymph node assays

    SciTech Connect (OSTI)

    Claman, H.N.; Jaffee, B.D.

    1984-10-01

    The graft-versus-hot (GVH) reaction across minor (non-H-2) histocompatibility barriers was studied in mice, in vivo. To increase GVH potential and to mimic clinical bone marrow transplantation protocols, we modified the popliteal lymph node (PLN) and the splenomegaly assays by irradiating the recipients before they received allogeneic lymphoid cell suspensions. In several combinations across major (H-2), minor (non-H-2) and multiple minor (non-H-2 plus minor lymphocyte stimulation) barriers, increased recipient organ weight (a measure of GVH activity) was seen with irradiated F1 recipients of parental cells. The irradiated splenomegaly (x-splenomegaly) assay was more sensitive than the (x-PLN) assay, but both correlated with in vivo GVH experiments of the P----F1 variety. The x-splenomegaly test indicated histoincompatibility in a system (B10.D2----BALB/c) in which the primary in vitro mixed leukocyte reactions is nonreactive, but in which systemic GVH can be induced. The x-splenomegaly test should be useful in analyzing complex reactions involving minor histocompatibility antigens in vivo.

  17. Robust Maximum Lifetime Routing and Energy Allocation in Wireless Sensor Networks

    DOE Public Access Gateway for Energy & Science Beta (PAGES Beta)

    Paschalidis, Ioannis Ch.; Wu, Ruomin

    2012-01-01

    We consider the maximum lifetime routing problem in wireless sensor networks in two settings: (a) when nodes’ initial energy is given and (b) when it is subject to optimization. The optimal solution and objective value provide optimal flows and the corresponding predicted lifetime, respectively. We stipulate that there is uncertainty in various network parameters (available energy and energy depletion rates). In setting (a) we show that for specific, yet typical, network topologies, the actual network lifetime will reach the predicted value with a probability that converges to zero as the number of nodes grows large. In setting (b) the samemore » result holds for all topologies. We develop a series of robust problem formulations, ranging from pessimistic to optimistic. A set of parameters enable the tuning of the conservatism of the formulation to obtain network flows with a desirably high probability that the corresponding lifetime prediction is achieved. We establish a number of properties for the robust network flows and energy allocations and provide numerical results to highlight the tradeoff between predicted lifetime and the probability achieved. Further, we analyze an interesting limiting regime of massively deployed sensor networks and essentially solve a continuous version of the problem.« less

  18. Adding Links in Energy.gov Content Management System | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Energy.gov Content Management System » Adding Links in Energy.gov Content Management System Adding Links in Energy.gov Content Management System For Office of Energy Efficiency and Renewable Energy (EERE) websites, to add a link in the Energy.gov Drupal content management system (CMS), follow these steps: Edit the page (also called a node) that you want to add a link to. Select the text you want to link. Click the "Link" button. Then: If you are linking to a page on Energy.gov, select

  19. BES Science Network Requirements

    SciTech Connect (OSTI)

    Biocca, Alan; Carlson, Rich; Chen, Jackie; Cotter, Steve; Tierney, Brian; Dattoria, Vince; Davenport, Jim; Gaenko, Alexander; Kent, Paul; Lamm, Monica; Miller, Stephen; Mundy, Chris; Ndousse, Thomas; Pederson, Mark; Perazzo, Amedeo; Popescu, Razvan; Rouson, Damian; Sekine, Yukiko; Sumpter, Bobby; Dart, Eli; Wang, Cai-Zhuang -Z; Whitelam, Steve; Zurawski, Jason

    2011-02-01

    The Energy Sciences Network (ESnet) is the primary provider of network connectivityfor the US Department of Energy Office of Science (SC), the single largest supporter of basic research in the physical sciences in the United States. In support of the Office ofScience programs, ESnet regularly updates and refreshes its understanding of the networking requirements of the instruments, facilities, scientists, and science programs that it serves. This focus has helped ESnet to be a highly successful enabler of scientific discovery for over 20 years.

  20. SU-E-T-206: Improving Radiotherapy Toxicity Based On Artificial Neural Network (ANN) for Head and Neck Cancer Patients

    SciTech Connect (OSTI)

    Cho, Daniel D; Wernicke, A Gabriella; Nori, Dattatreyudu; Chao, KSC; Parashar, Bhupesh; Chang, Jenghwa

    2014-06-01

    Purpose/Objective(s): The aim of this study is to build the estimator of toxicity using artificial neural network (ANN) for head and neck cancer patients Materials/Methods: An ANN can combine variables into a predictive model during training and considered all possible correlations of variables. We constructed an ANN based on the data from 73 patients with advanced H and N cancer treated with external beam radiotherapy and/or chemotherapy at our institution. For the toxicity estimator we defined input data including age, sex, site, stage, pathology, status of chemo, technique of external beam radiation therapy (EBRT), length of treatment, dose of EBRT, status of post operation, length of follow-up, the status of local recurrences and distant metastasis. These data were digitized based on the significance and fed to the ANN as input nodes. We used 20 hidden nodes (for the 13 input nodes) to take care of the correlations of input nodes. For training ANN, we divided data into three subsets such as training set, validation set and test set. Finally, we built the estimator for the toxicity from ANN output. Results: We used 13 input variables including the status of local recurrences and distant metastasis and 20 hidden nodes for correlations. 59 patients for training set, 7 patients for validation set and 7 patients for test set and fed the inputs to Matlab neural network fitting tool. We trained the data within 15% of errors of outcome. In the end we have the toxicity estimation with 74% of accuracy. Conclusion: We proved in principle that ANN can be a very useful tool for predicting the RT outcomes for high risk H and N patients. Currently we are improving the results using cross validation.

  1. NP Science Network Requirements

    SciTech Connect (OSTI)

    Dart, Eli; Rotman, Lauren; Tierney, Brian

    2011-08-26

    The Energy Sciences Network (ESnet) is the primary provider of network connectivity for the U.S. Department of Energy (DOE) Office of Science (SC), the single largest supporter of basic research in the physical sciences in the United States. To support SC programs, ESnet regularly updates and refreshes its understanding of the networking requirements of the instruments, facilities, scientists, and science programs it serves. This focus has helped ESnet to be a highly successful enabler of scientific discovery for over 20 years. In August 2011, ESnet and the Office of Nuclear Physics (NP), of the DOE SC, organized a workshop to characterize the networking requirements of the programs funded by NP. The requirements identified at the workshop are summarized in the Findings section, and are described in more detail in the body of the report.

  2. Network Requirements Reviews

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Reviews Science Engagement Move your data Programs & Workshops Science Requirements Reviews Network Requirements Reviews Documents and Background Materials FAQ for Case Study Authors BER Requirements Review 2015 ASCR Requirements Review 2015 Previous Reviews Requirements Review Reports Case Studies Contact Us Technical Assistance: 1 800-33-ESnet (Inside US) 1 800-333-7638 (Inside US) 1 510-486-7600 (Globally) 1 510-486-7607 (Globally) Report Network Problems: trouble@es.net Provide Web Site

  3. Conference Management

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2007-01-25

    The Order establishes requirements and responsibilities for managing conferences sponsored or co-sponsored by the Department of Energy, including the National Nuclear Security Administration. Cancels DOE O 110.3. Canceled by DOE N 251.97.

  4. Management Reminders

    Broader source: Energy.gov [DOE]

    This document is normally shared by the HQ Program Manager a week prior to the scheduled mediation and is intented to serve as a reminder of the pertinent aspects of the mediation process.

  5. PROJECT MANAGEMENT PLANS Project Management Plans

    Office of Environmental Management (EM)

    MANAGEMENT PLANS Project Management Plans Overview Project Management Plan Suggested Outline Subjects Crosswalk between the Suggested PMP Outline Subjects and a Listing ...

  6. Summary - Environmental Management Waste Management Facility...

    Office of Environmental Management (EM)

    Waste Management Facility (EMWMF) at Oak Ridge, TN Why DOE-EM Did This Review The Environmental Management Waste Management Facility (EMWMF) is a land disposal facility for ...

  7. Advance Network Reservation and Provisioning for Science

    SciTech Connect (OSTI)

    Balman, Mehmet; Chaniotakis, Evangelos; Shoshani, Arie; Sim, Alex

    2009-07-10

    We are witnessing a new era that offers new opportunities to conduct scientific research with the help of recent advancements in computational and storage technologies. Computational intensive science spans multiple scientific domains, such as particle physics, climate modeling, and bio-informatics simulations. These large-scale applications necessitate collaborators to access very large data sets resulting from simulations performed in geographically distributed institutions. Furthermore, often scientific experimental facilities generate massive data sets that need to be transferred to validate the simulation data in remote collaborating sites. A major component needed to support these needs is the communication infrastructure which enables high performance visualization, large volume data analysis, and also provides access to computational resources. In order to provide high-speed on-demand data access between collaborating institutions, national governments support next generation research networks such as Internet 2 and ESnet (Energy Sciences Network). Delivering network-as-a-service that provides predictable performance, efficient resource utilization and better coordination between compute and storage resources is highly desirable. In this paper, we study network provisioning and advanced bandwidth reservation in ESnet for on-demand high performance data transfers. We present a novel approach for path finding in time-dependent transport networks with bandwidth guarantees. We plan to improve the current ESnet advance network reservation system, OSCARS [3], by presenting to the clients, the possible reservation options and alternatives for earliest completion time and shortest transfer duration. The Energy Sciences Network (ESnet) provides high bandwidth connections between research laboratories and academic institutions for data sharing and video/voice communication. The ESnet On-Demand Secure Circuits and Advance Reservation System (OSCARS) establishes guaranteed bandwidth of secure virtual circuits at a certain time, for a certain bandwidth and length of time. Though OSCARS operates within the ESnet, it also supplies end-to-end provisioning between multiple autonomous network domains. OSCARS gets reservation requests through a standard web service interface, and conducts a Quality-of-service (QoS) path for bandwidth guarantees. Multi-protocol Label Switching (MPLS) and the Resource Reservation Protocol (RSVP) enable to create a virtual circuit using Label Switched Paths (LSP's). It contains three main components: a reservation manager, a bandwidth scheduler, and a path setup subsystem. The bandwidth scheduler needs to have information about the current and future states of the network topology in order to accomplish end-to-end bandwidth guaranteed paths.

  8. Modeling attacker-defender interactions in information networks.

    SciTech Connect (OSTI)

    Collins, Michael Joseph

    2010-09-01

    The simplest conceptual model of cybersecurity implicitly views attackers and defenders as acting in isolation from one another: an attacker seeks to penetrate or disrupt a system that has been protected to a given level, while a defender attempts to thwart particular attacks. Such a model also views all non-malicious parties as having the same goal of preventing all attacks. But in fact, attackers and defenders are interacting parts of the same system, and different defenders have their own individual interests: defenders may be willing to accept some risk of successful attack if the cost of defense is too high. We have used game theory to develop models of how non-cooperative but non-malicious players in a network interact when there is a substantial cost associated with effective defensive measures. Although game theory has been applied in this area before, we have introduced some novel aspects of player behavior in our work, including: (1) A model of how players attempt to avoid the costs of defense and force others to assume these costs; (2) A model of how players interact when the cost of defending one node can be shared by other nodes; and (3) A model of the incentives for a defender to choose less expensive, but less effective, defensive actions.

  9. The Role of Pretreatment FDG-PET in Treating Cervical Cancer Patients With Enlarged Pelvic Lymph Node(s) Shown on MRI: A Phase 3 Randomized Trial With Long-Term Follow-Up

    SciTech Connect (OSTI)

    Lin, Shinn-Yn; Tsai, Chien-Sheng; Chang, Yu-Chen; Ng, Koon-Kwan; Chang, Ting-Chang; Kao, Wei-Heng; Lai, Chyong-Huey; Hong, Ji-Hong

    2015-07-01

    Purpose: This report is the second analysis of a prospective randomized trial to investigate the impact of {sup 18}F-fluorodeoxyglucose positron emission tomography (FDG-PET) on cervical cancer patients with enlarged pelvic lymph nodes identified by magnetic resonance imaging. Methods and Materials: Patients with newly diagnosed cervical cancer with enlarged pelvic lymph nodes but free of enlarged para-aortic lymph nodes (PALN) were eligible. Patients were randomized to receive either pretreatment FDG-PET (PET arm) or not (control arm). The whole pelvis was the standard irradiation field for all patients except those with FDG-avid extrapelvic findings. Results: In all, 129 patients were enrolled. Pretreatment PET detected extrapelvic metastases in 7 patients. No new patient experienced treatment failure during the additional 4-year follow-up period. There were no significant differences between the PET arm and the control arm regarding overall survival, disease-free survival, and freedom from extrapelvic metastasis. In the control arm, 8 of 10 patients with PALN relapse had limited extrapelvic nodal failures; their 5-year disease-specific survival was 34.3%. By contrast, only 1 of 5 patients with PALN relapse in the PET arm experienced such limited failures; their 5-year survival rate was 0%. Conclusions: Although the pretreatment detection of PALN did not translate into survival benefit, it indeed decreased the need for extended-field concurrent chemoradiation therapy.

  10. Evaluation of Automatic Atlas-Based Lymph Node Segmentation for Head-and-Neck Cancer

    SciTech Connect (OSTI)

    Stapleford, Liza J.; Lawson, Joshua D.; Perkins, Charles; Edelman, Scott; Davis, Lawrence

    2010-07-01

    Purpose: To evaluate if automatic atlas-based lymph node segmentation (LNS) improves efficiency and decreases inter-observer variability while maintaining accuracy. Methods and Materials: Five physicians with head-and-neck IMRT experience used computed tomography (CT) data from 5 patients to create bilateral neck clinical target volumes covering specified nodal levels. A second contour set was automatically generated using a commercially available atlas. Physicians modified the automatic contours to make them acceptable for treatment planning. To assess contour variability, the Simultaneous Truth and Performance Level Estimation (STAPLE) algorithm was used to take collections of contours and calculate a probabilistic estimate of the 'true' segmentation. Differences between the manual, automatic, and automatic-modified (AM) contours were analyzed using multiple metrics. Results: Compared with the 'true' segmentation created from manual contours, the automatic contours had a high degree of accuracy, with sensitivity, Dice similarity coefficient, and mean/max surface disagreement values comparable to the average manual contour (86%, 76%, 3.3/17.4 mm automatic vs. 73%, 79%, 2.8/17 mm manual). The AM group was more consistent than the manual group for multiple metrics, most notably reducing the range of contour volume (106-430 mL manual vs. 176-347 mL AM) and percent false positivity (1-37% manual vs. 1-7% AM). Average contouring time savings with the automatic segmentation was 11.5 min per patient, a 35% reduction. Conclusions: Using the STAPLE algorithm to generate 'true' contours from multiple physician contours, we demonstrated that, in comparison with manual segmentation, atlas-based automatic LNS for head-and-neck cancer is accurate, efficient, and reduces interobserver variability.

  11. Network analysis of proton transfer in liquid water

    SciTech Connect (OSTI)

    Shevchuk, Roman; Rao, Francesco; Agmon, Noam

    2014-06-28

    Proton transfer in macromolecular systems is a fascinating yet elusive process. In the last ten years, molecular simulations have shown to be a useful tool to unveil the atomistic mechanism. Notwithstanding, the large number of degrees of freedom involved make the accurate description of the process very hard even for the case of proton diffusion in bulk water. Here, multi-state empirical valence bond molecular dynamics simulations in conjunction with complex network analysis are applied to study proton transfer in liquid water. Making use of a transition network formalism, this approach takes into account the time evolution of several coordinates simultaneously. Our results provide evidence for a strong dependence of proton transfer on the length of the hydrogen bond solvating the Zundel complex, with proton transfer enhancement as shorter bonds are formed at the acceptor site. We identify six major states (nodes) on the network leading from the special pair to a more symmetric Zundel complex required for transferring the proton. Moreover, the second solvation shell specifically rearranges to promote the transfer, reiterating the idea that solvation beyond the first shell of the Zundel complex plays a crucial role in the process.

  12. Network Randomization and Dynamic Defense for Critical Infrastructure Systems

    SciTech Connect (OSTI)

    Chavez, Adrian R.; Martin, Mitchell Tyler; Hamlet, Jason; Stout, William M.S.; Lee, Erik

    2015-04-01

    Critical Infrastructure control systems continue to foster predictable communication paths, static configurations, and unpatched systems that allow easy access to our nation's most critical assets. This makes them attractive targets for cyber intrusion. We seek to address these attack vectors by automatically randomizing network settings, randomizing applications on the end devices themselves, and dynamically defending these systems against active attacks. Applying these protective measures will convert control systems into moving targets that proactively defend themselves against attack. Sandia National Laboratories has led this effort by gathering operational and technical requirements from Tennessee Valley Authority (TVA) and performing research and development to create a proof-of-concept solution. Our proof-of-concept has been tested in a laboratory environment with over 300 nodes. The vision of this project is to enhance control system security by converting existing control systems into moving targets and building these security measures into future systems while meeting the unique constraints that control systems face.

  13. Software-Defined Networking (SDN)

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    ENOS Experimental Network Testbeds Performance (perfSONAR) Software & Tools Development Data for Researchers Partnerships Publications Workshops Science Engagement Move your data Programs & Workshops Science Requirements Reviews Case Studies News & Publications ESnet News Publications and Presentations Galleries ESnet Awards and Honors Blog ESnet Live Home » Network R&D » Software-Defined Networking (SDN) Network R&D Software-Defined Networking (SDN) ENOS Experimental

  14. ESnet Network Operating System (ENOS)

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    ENOS Experimental Network Testbeds Performance (perfSONAR) Software & Tools Development Data for Researchers Partnerships Publications Workshops Science Engagement Move your data Programs & Workshops Science Requirements Reviews Case Studies News & Publications ESnet News Publications and Presentations Galleries ESnet Awards and Honors Blog ESnet Live Home » Network R&D » Software-Defined Networking (SDN) » ENOS Network R&D Software-Defined Networking (SDN) ENOS

  15. Autonomic Intelligent Cyber Sensor to Support Industrial Control Network Awareness

    SciTech Connect (OSTI)

    Vollmer, Todd; Manic, Milos; Linda, Ondrej

    2013-06-01

    The proliferation of digital devices in a networked industrial ecosystem, along with an exponential growth in complexity and scope, has resulted in elevated security concerns and management complexity issues. This paper describes a novel architecture utilizing concepts of Autonomic computing and a SOAP based IF-MAP external communication layer to create a network security sensor. This approach simplifies integration of legacy software and supports a secure, scalable, self-managed framework. The contribution of this paper is two-fold: 1) A flexible two level communication layer based on Autonomic computing and Service Oriented Architecture is detailed and 2) Three complementary modules that dynamically reconfigure in response to a changing environment are presented. One module utilizes clustering and fuzzy logic to monitor traffic for abnormal behavior. Another module passively monitors network traffic and deploys deceptive virtual network hosts. These components of the sensor system were implemented in C++ and PERL and utilize a common internal D-Bus communication mechanism. A proof of concept prototype was deployed on a mixed-use test network showing the possible real world applicability. In testing, 45 of the 46 network attached devices were recognized and 10 of the 12 emulated devices were created with specific Operating System and port configurations. Additionally the anomaly detection algorithm achieved a 99.9% recognition rate. All output from the modules were correctly distributed using the common communication structure.

  16. Autonomic Intelligent Cyber Sensor to Support Industrial Control Network Awareness

    DOE Public Access Gateway for Energy & Science Beta (PAGES Beta)

    Vollmer, Todd; Manic, Milos; Linda, Ondrej

    2013-06-01

    The proliferation of digital devices in a networked industrial ecosystem, along with an exponential growth in complexity and scope, has resulted in elevated security concerns and management complexity issues. This paper describes a novel architecture utilizing concepts of Autonomic computing and a SOAP based IF-MAP external communication layer to create a network security sensor. This approach simplifies integration of legacy software and supports a secure, scalable, self-managed framework. The contribution of this paper is two-fold: 1) A flexible two level communication layer based on Autonomic computing and Service Oriented Architecture is detailed and 2) Three complementary modules that dynamically reconfiguremore » in response to a changing environment are presented. One module utilizes clustering and fuzzy logic to monitor traffic for abnormal behavior. Another module passively monitors network traffic and deploys deceptive virtual network hosts. These components of the sensor system were implemented in C++ and PERL and utilize a common internal D-Bus communication mechanism. A proof of concept prototype was deployed on a mixed-use test network showing the possible real world applicability. In testing, 45 of the 46 network attached devices were recognized and 10 of the 12 emulated devices were created with specific Operating System and port configurations. Additionally the anomaly detection algorithm achieved a 99.9% recognition rate. All output from the modules were correctly distributed using the common communication structure.« less

  17. High Density Sensor Network Development | The Ames Laboratory

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    High Density Sensor Network Development

  18. An in-depth longitudinal analysis of mixing patterns in a small scientific collaboration network

    SciTech Connect (OSTI)

    Rodriguez, Marko A [Los Alamos National Laboratory; Pepe, Alberto [UCLA

    2009-01-01

    Many investigations of scientific collaboration are based on large-scale statistical analyses of networks constructed from bibliographic repositories. These investigations often rely on a wealth of bibliographic data, but very little or no other information about the individuals in the network, and thus, fail to illustate the broader social and academic landscape in which collaboration takes place. In this article, we perform an in-depth longitudinal analysis of a small-scale network of scientific collaboration (N = 291) constructed from the bibliographic record of a research center involved in the development and application of sensor network technologies. We perform a preliminary analysis of selected structural properties of the network, computing its range, configuration and topology. We then support our preliminary statistical analysis with an in-depth temporal investigation of the assortativity mixing of these node characteristics: academic department, affiliation, position, and country of origin of the individuals in the network. Our qualitative analysis of mixing patterns offers clues as to the nature of the scientific community being modeled in relation to its organizational, disciplinary, institutional, and international arrangements of collaboration.

  19. Evaluation of a CdTe semiconductor based compact gamma camera for sentinel lymph node imaging

    SciTech Connect (OSTI)

    Russo, Paolo; Curion, Assunta S.; Mettivier, Giovanni; Esposito, Michela; Aurilio, Michela; Caraco, Corradina; Aloj, Luigi; Lastoria, Secondo

    2011-03-15

    Purpose: The authors assembled a prototype compact gamma-ray imaging probe (MediPROBE) for sentinel lymph node (SLN) localization. This probe is based on a semiconductor pixel detector. Its basic performance was assessed in the laboratory and clinically in comparison with a conventional gamma camera. Methods: The room-temperature CdTe pixel detector (1 mm thick) has 256x256 square pixels arranged with a 55 {mu}m pitch (sensitive area 14.08x14.08 mm{sup 2}), coupled pixel-by-pixel via bump-bonding to the Medipix2 photon-counting readout CMOS integrated circuit. The imaging probe is equipped with a set of three interchangeable knife-edge pinhole collimators (0.94, 1.2, or 2.1 mm effective diameter at 140 keV) and its focal distance can be regulated in order to set a given field of view (FOV). A typical FOV of 70 mm at 50 mm skin-to-collimator distance corresponds to a minification factor 1:5. The detector is operated at a single low-energy threshold of about 20 keV. Results: For {sup 99m}Tc, at 50 mm distance, a background-subtracted sensitivity of 6.5x10{sup -3} cps/kBq and a system spatial resolution of 5.5 mm FWHM were obtained for the 0.94 mm pinhole; corresponding values for the 2.1 mm pinhole were 3.3x10{sup -2} cps/kBq and 12.6 mm. The dark count rate was 0.71 cps. Clinical images in three patients with melanoma indicate detection of the SLNs with acquisition times between 60 and 410 s with an injected activity of 26 MBq {sup 99m}Tc and prior localization with standard gamma camera lymphoscintigraphy. Conclusions: The laboratory performance of this imaging probe is limited by the pinhole collimator performance and the necessity of working in minification due to the limited detector size. However, in clinical operative conditions, the CdTe imaging probe was effective in detecting SLNs with adequate resolution and an acceptable sensitivity. Sensitivity is expected to improve with the future availability of a larger CdTe detector permitting operation at shorter distances from the patient skin.

  20. Alignment Focus of Daily Image Guidance for Concurrent Treatment of Prostate and Pelvic Lymph Nodes

    SciTech Connect (OSTI)

    Ferjani, Samah; Huang, Guangshun; Shang, Qingyang; Stephans, Kevin L.; Zhong, Yahua; Qi, Peng; Tendulkar, Rahul D.; Xia, Ping, E-mail: xiap@ccf.org

    2013-10-01

    Purpose: To determine the dosimetric impact of daily imaging alignment focus on the prostate soft tissue versus the pelvic bones for the concurrent treatment of the prostate and pelvic lymph nodes (PLN) and to assess whether multileaf collimator (MLC) tracking or adaptive planning (ART) is necessary with the current clinical planning margins of 8 mm/6 mm posterior to the prostate and 5 mm to the PLN. Methods and Materials: A total of 124 kilovoltage cone-beam computed tomography (kV-CBCT) images from 6 patients were studied. For each KV-CBCT, 4 plans were retrospectively created using an isocenter shifting method with 2 different alignment focuses (prostate, PLN), an MLC shifting method, and the ART method. The selected dosimetric endpoints were compared among these plans. Results: For the isoshift contour, isoshift bone, MLC shift, and ART plans, D99 of the prostate was ?97% of the prescription dose in 97.6%, 73.4%, 98.4%, and 96.8% of 124 fractions, respectively. Accordingly, D99 of the PLN was ?97% of the prescription dose in 98.4%, 98.4%, 98.4%, and 100% of 124 fractions, respectively. For the rectum, D5 exceeded 105% of the planned D5 (and D5 of ART plans) in 11% (4%), 10% (2%), and 13% (5%) of 124 fractions, respectively. For the bladder, D5 exceeded 105% of the planned D5 (and D5 of ART) plans in 0% (2%), 0% (2%), and 0% (1%) of 124 fractions, respectively. Conclusion: For concurrent treatment of the prostate and PLN, with a planning margin to the prostate of 8 mm/6 mm posterior and a planning margin of 5 mm to the PLN, aligning to the prostate soft tissue can achieve adequate dose coverage to the both target volumes; aligning to the pelvic bone would result in underdosing to the prostate in one-third of fractions. With these planning margins, MLC tracking and ART methods have no dosimetric advantages.

  1. Data Management

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Data Management Data Management PDSF and IHEP, in Beijing, China, are the two main computing facitilies for the Daya Bay experiment with PDSF being used primarily by North American collaborators and IHEP by Asian collaborators. All raw data from the experimental facility is first transferred to IHEP and then transferred to PDSF. Data transfer rates of 5 to 10 MB/s result in up to about 500GB transferred daily. The tool used to transfer the data is called SPADE and has also been used at PDSF by

  2. Data Management

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Data Management Data Management Data Transfer STAR makes use of grid-based file transfers between PDSF and Brookhaven for two main purposes. The first is to transfer input/output files for simulation jobs submitted from Brookhaven to/from PDSF. The jobs come in through pdsfgrid.nersc.gov making use of the OSG software installation and the files are transferred through pdsfdtn1.nersc.gov to and from /project/projectdirs/osg. The second purpose is for bulk replication of microDST's from

  3. Energy-efficient distributed constructions of miniumum spanning tree for wireless ad-hoc networks

    SciTech Connect (OSTI)

    Kumar, V. S. A.; Pandurangan, G.; Khan, M.

    2004-01-01

    The Minimum Spanning Tree (MST) problem is one of the most important and commonly occurring primitive in the design and operation of data and communication networks. While there a redistributed algorithms for the MST problem these require relatively large number of messages and time, and are fairly involved, require synchronization and a lot of book keeping; this makes these algorithms impractical for emerging technologies such as ad hoc and sensor networks. In such networks, a sensor has very limited power, and any algorithm needs to be simple, local and energy efficient for being practical. Motivated by these considerations, we study the performance of a class of simple and local algorithms called Nearest Neighbor Tree (NNT) algorithms for energy-efficient construction of MSTs in a wireless ad hoc setting. These employ a very simple idea to eliminate the work involved in cycle detection in other MST algorithms: each node chooses a distinct rank, and connects to the closest node of higher rank. We consider two variants of the NNT algorithms, obtained by two ways of choosing the ranks: (i) Random NNT, in which each node chooses a rank randomly, and (ii) Directional NNT, in which each node uses directional information for choosing the rank. We show provable bounds on the performance of these algorithms in instances obtained by uniformly distributed points in the unit square. Finally, we perform extensive simulations of our algorithms. We tested our algorithms on both uniformly random distributions of points, and on realistic distributions of points in an urban setting. The cost of the tree found by the NNT algorithms is within a factor of 2 of the MST, but there is more than a ten-fold saving on the energy and about a five fold saving on the number of messages sent. Also, our algorithms are significantly simpler to implement compared to, for instance, the GHS algorithm, which is essentially optimal with regards to the message complexity. Thus, our results demonstrate the first such tradeoff between the quality of approximation and the energy cost for spanning trees on ad hoc networks, and motivates similar considerations for other important problems.

  4. Network topology mapper

    DOE Patents [OSTI]

    Quist, Daniel A. (Los Alamos, NM); Gavrilov, Eugene M. (Los Alamos, NM); Fisk, Michael E. (Jemez, NM)

    2008-01-15

    A method enables the topology of an acyclic fully propagated network to be discovered. A list of switches that comprise the network is formed and the MAC address cache for each one of the switches is determined. For each pair of switches, from the MAC address caches the remaining switches that see the pair of switches are located. For each pair of switches the remaining switches are determined that see one of the pair of switches on a first port and the second one of the pair of switches on a second port. A list of insiders is formed for every pair of switches. It is determined whether the insider for each pair of switches is a graph edge and adjacent ones of the graph edges are determined. A symmetric adjacency matrix is formed from the graph edges to represent the topology of the data link network.

  5. A Framework for Supporting Survivability, Network Planning and Cross-Layer Optimization in Future Multi-Domain Terabit Networks

    SciTech Connect (OSTI)

    Baldin, Ilya; Huang, Shu; Gopidi, Rajesh

    2015-01-28

    This final project report describes the accomplishments, products and publications from the award. It includes the overview of the project goals to devise a framework for managing resources in multi-domain, multi-layer networks, as well the details of the mathematical problem formulation and the description of the prototype built to prove the concept.

  6. Oracle Management Tool Suite

    Energy Science and Technology Software Center (OSTI)

    2007-06-01

    The Oracle Management Tool Suite is used to automatically manage Oracle based systems. This includes startup and shutdown of databases and application servers as well as backup, space management, workload management and log file management.

  7. Self-Configuring Network Monitor

    Energy Science and Technology Software Center (OSTI)

    2004-05-01

    Self-Configuring Network Monitor (SCNM) is a passive monitoring that can collect packet headers from any point in a network path. SCNM uses special activation packets to automatically activate monitors deployed at the layer three ingress and egress routers of the wide-area network, and at critical points within the site networks. Monitoring output data is sent back to the application data source or destination host. No modifications are required to the application or network routing infrastructuremore » in order to activate monitoring of traffic for an application. This ensures that the monitoring operation does not add a burden to the networks administrator.« less

  8. Better Buildings Residential Network Case Study: Partnerships...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Network Case Study: Partnerships Better Buildings Residential Network Case Study: Partnerships Better Buildings Residential Network Case Study: Partnerships, from the U.S. ...

  9. Vehicle Technologies Office: National Idling Reduction Network...

    Office of Environmental Management (EM)

    Idling Reduction Network News Archives Vehicle Technologies Office: National Idling Reduction Network News Archives The National Idling Reduction Network brings together trucking...

  10. Northwest Biodiesel Network | Open Energy Information

    Open Energy Info (EERE)

    Biodiesel Network Jump to: navigation, search Logo: Northwest Biodiesel Network Name: Northwest Biodiesel Network Address: 6532 Phinney Ave N Place: Seattle, Washington Zip: 98103...

  11. Sustainable Agriculture Network | Open Energy Information

    Open Energy Info (EERE)

    Agriculture Network Jump to: navigation, search Logo: Sustainable Agriculture Network Name: Sustainable Agriculture Network Website: clima.sanstandards.org References: Sustainable...

  12. National Network for Manufacturing Innovation: A Preliminary...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Network for Manufacturing Innovation: A Preliminary Design National Network for Manufacturing Innovation: A Preliminary Design The Federal investment in the National Network for ...

  13. Clean Economy Network Foundation | Open Energy Information

    Open Energy Info (EERE)

    Clean Economy Network Foundation Jump to: navigation, search Logo: Clean Economy Network Foundation Name: Clean Economy Network Foundation Address: 1301 Pennsylvania Ave NW, Suite...

  14. Fact Sheet: Better Buildings Residential Network | Department...

    Energy Savers [EERE]

    Fact Sheet: Better Buildings Residential Network Fact Sheet: Better Buildings Residential Network Fact Sheet: Better Buildings Residential Network, increasing the number of...

  15. Benefits of Better Buildings Residential Network Reporting |...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Benefits of Better Buildings Residential Network Reporting Benefits of Better Buildings Residential Network Reporting Better Buildings Residential Network All-Member Peer Exchange ...

  16. IP address management : augmenting Sandia's capabilities through open source tools.

    SciTech Connect (OSTI)

    Nayar, R. Daniel

    2005-08-01

    Internet Protocol (IP) address management is an increasingly growing concern at Sandia National Laboratories (SNL) and the networking community as a whole. The current state of the available IP addresses indicates that they are nearly exhausted. Currently SNL doesn't have the justification to obtain more IP address space from Internet Assigned Numbers Authority (IANA). There must exist a local entity to manage and allocate IP assignments efficiently. Ongoing efforts at Sandia have been in the form of a multifunctional database application notably known as Network Information System (NWIS). NWIS is a database responsible for a multitude of network administrative services including IP address management. This study will explore the feasibility of augmenting NWIS's IP management capabilities utilizing open source tools. Modifications of existing capabilities to better allocate available IP address space are studied.

  17. Energy Materials Network Workshop

    Broader source: Energy.gov [DOE]

    The Energy Materials Network (EMN) is a national lab-led initiative that aims to dramatically decrease the time-to-market for advanced materials innovations critical to many clean energy technologies. Through targeted consortia offering accessible suites of advanced research and development capabilities, EMN is accelerating materials development to address U.S. manufacturers' most pressing materials challenges.

  18. Microsystem process networks

    DOE Patents [OSTI]

    Wegeng, Robert S. (Richland, WA); TeGrotenhuis, Ward E. (Kennewick, WA); Whyatt, Greg A. (West Richland, WA)

    2007-09-18

    Various aspects and applications of microsystem process networks are described. The design of many types of Microsystems can be improved by ortho-cascading mass, heat, or other unit process operations. Microsystems having energetically efficient microchannel heat exchangers are also described. Detailed descriptions of numerous design features in microcomponent systems are also provided.

  19. Microsystem process networks

    DOE Patents [OSTI]

    Wegeng, Robert S [Richland, WA; TeGrotenhuis, Ward E [Kennewick, WA; Whyatt, Greg A [West Richland, WA

    2010-01-26

    Various aspects and applications or microsystem process networks are described. The design of many types of microsystems can be improved by ortho-cascading mass, heat, or other unit process operations. Microsystems having energetically efficient microchannel heat exchangers are also described. Detailed descriptions of numerous design features in microcomponent systems are also provided.

  20. Microsystem process networks

    DOE Patents [OSTI]

    Wegeng, Robert S. (Richland, WA); TeGrotenhuis, Ward E. (Kennewick, WA); Whyatt, Greg A. (West Richland, WA)

    2006-10-24

    Various aspects and applications of microsystem process networks are described. The design of many types of microsystems can be improved by ortho-cascading mass, heat, or other unit process operations. Microsystems having exergetically efficient microchannel heat exchangers are also described. Detailed descriptions of numerous design features in microcomponent systems are also provided.

  1. Transactional Network Platform: Applications

    SciTech Connect (OSTI)

    Katipamula, Srinivas; Lutes, Robert G.; Ngo, Hung; Underhill, Ronald M.

    2013-10-31

    In FY13, Pacific Northwest National Laboratory (PNNL) with funding from the Department of Energy’s (DOE’s) Building Technologies Office (BTO) designed, prototyped and tested a transactional network platform to support energy, operational and financial transactions between any networked entities (equipment, organizations, buildings, grid, etc.). Initially, in FY13, the concept demonstrated transactions between packaged rooftop air conditioners and heat pump units (RTUs) and the electric grid using applications or "agents" that reside on the platform, on the equipment, on a local building controller or in the Cloud. The transactional network project is a multi-lab effort with Oakridge National Laboratory (ORNL) and Lawrence Berkeley National Laboratory (LBNL) also contributing to the effort. PNNL coordinated the project and also was responsible for the development of the transactional network (TN) platform and three different applications associated with RTUs. This document describes two applications or "agents" in details, and also summarizes the platform. The TN platform details are described in another companion document.

  2. Managing Critical Management Improvement Initiatives

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2003-10-01

    Provides requirements and responsibilities for planning, executing and assessing critical management improvement initiatives within DOE. DOE N 251.59, dated 9/27/2004, extends this Notice until 10/01/2005. Archived 11-8-10. Does not cancel other directives.

  3. High Fidelity Simulations of Large-Scale Wireless Networks

    SciTech Connect (OSTI)

    Onunkwo, Uzoma; Benz, Zachary

    2015-11-01

    The worldwide proliferation of wireless connected devices continues to accelerate. There are 10s of billions of wireless links across the planet with an additional explosion of new wireless usage anticipated as the Internet of Things develops. Wireless technologies do not only provide convenience for mobile applications, but are also extremely cost-effective to deploy. Thus, this trend towards wireless connectivity will only continue and Sandia must develop the necessary simulation technology to proactively analyze the associated emerging vulnerabilities. Wireless networks are marked by mobility and proximity-based connectivity. The de facto standard for exploratory studies of wireless networks is discrete event simulations (DES). However, the simulation of large-scale wireless networks is extremely difficult due to prohibitively large turnaround time. A path forward is to expedite simulations with parallel discrete event simulation (PDES) techniques. The mobility and distance-based connectivity associated with wireless simulations, however, typically doom PDES and fail to scale (e.g., OPNET and ns-3 simulators). We propose a PDES-based tool aimed at reducing the communication overhead between processors. The proposed solution will use light-weight processes to dynamically distribute computation workload while mitigating communication overhead associated with synchronizations. This work is vital to the analytics and validation capabilities of simulation and emulation at Sandia. We have years of experience in Sandia’s simulation and emulation projects (e.g., MINIMEGA and FIREWHEEL). Sandia’s current highly-regarded capabilities in large-scale emulations have focused on wired networks, where two assumptions prevent scalable wireless studies: (a) the connections between objects are mostly static and (b) the nodes have fixed locations.

  4. Storm: lightning-fast resource management

    SciTech Connect (OSTI)

    Frachtenberg, E.; Petrini, F.; Fernández, J. C.; Pakin, S. D.; Coll, S.

    2002-01-01

    Although workstation clusters are a common platform for high-performance computing (HPC), they remain more difficult to manage than sequential systems or even symmetric multiprocessors. Furthermore, as cluster sizes increase, the quality of the resource-management subsystem - essentially, all of the code that runs on a cluster other than the applications - increasingly impacts application efficiency. In this paper, we present STORM, a resource-management framework designed for scalability and performance. The key innovation behind STORMis a software architecture that enables resource management to exploit low-level network features. As a result of this HPC-application-like design, STORM is orders of magnitude faster than the best reported results in the literature on two sample resource-management functions: job launching and process scheduling.

  5. Influence of Lymphatic Invasion on Locoregional Recurrence Following Mastectomy: Indication for Postmastectomy Radiotherapy for Breast Cancer Patients With One to Three Positive Nodes

    SciTech Connect (OSTI)

    Matsunuma, Ryoichi; Oguchi, Masahiko; Fujikane, Tomoko; Matsuura, Masaaki; Sakai, Takehiko; Kimura, Kiyomi; Morizono, Hidetomo; Iijima, Kotaro; Izumori, Ayumi; Miyagi, Yumi; Nishimura, Seiichiro; Makita, Masujiro; Gomi, Naoya; Horii, Rie; Akiyama, Futoshi; Iwase, Takuji

    2012-07-01

    Purpose: The indication for postmastectomy radiotherapy (PMRT) in breast cancer patients with one to three positive lymph nodes has been in discussion. The purpose of this study was to identify patient groups for whom PMRT may be indicated, focusing on varied locoregional recurrence rates depending on lymphatic invasion (ly) status. Methods and Materials: Retrospective analysis of 1,994 node-positive patients who had undergone mastectomy without postoperative radiotherapy between January 1990 and December 2000 at our hospital was performed. Patient groups for whom PMRT should be indicated were assessed using statistical tests based on the relationship between locoregional recurrence rate and ly status. Results: Multivariate analysis showed that the ly status affected the locoregional recurrence rate to as great a degree as the number of positive lymph nodes (p < 0.001). Especially for patients with one to three positive nodes, extensive ly was a more significant factor than stage T3 in the TNM staging system for locoregional recurrence (p < 0.001 vs. p = 0.295). Conclusion: Among postmastectomy patients with one to three positive lymph nodes, patients with extensive ly seem to require local therapy regimens similar to those used for patients with four or more positive nodes and also seem to require consideration of the use of PMRT.

  6. Environmental Management

    SciTech Connect (OSTI)

    2014-11-12

    Another key aspect of the NNSS mission is Environmental Management program, which addresses the environmental legacy from historic nuclear weapons related activities while also ensuring the health and safety of present day workers, the public, and the environment as current and future missions are completed. The Area 5 Radioactive Waste Management site receives low-level and mixed low-level waste from some 28 different generators from across the DOE complex in support of the legacy clean-up DOE Environmental Management project. Without this capability, the DOE would not be able to complete the clean up and proper disposition of these wastes. The program includes environmental protection, compliance, and monitoring of the air, water, plants, animals, and cultural resources at the NNSS. Investigation and implementation of appropriate corrective actions to address the contaminated ground water facilities and soils resulting from historic nuclear testing activities, the demolition of abandoned nuclear facilities, as well as installation of ground water wells to identify and monitor the extent of ground water contamination.

  7. Environmental Management

    ScienceCinema (OSTI)

    None

    2015-01-07

    Another key aspect of the NNSS mission is Environmental Management program, which addresses the environmental legacy from historic nuclear weapons related activities while also ensuring the health and safety of present day workers, the public, and the environment as current and future missions are completed. The Area 5 Radioactive Waste Management site receives low-level and mixed low-level waste from some 28 different generators from across the DOE complex in support of the legacy clean-up DOE Environmental Management project. Without this capability, the DOE would not be able to complete the clean up and proper disposition of these wastes. The program includes environmental protection, compliance, and monitoring of the air, water, plants, animals, and cultural resources at the NNSS. Investigation and implementation of appropriate corrective actions to address the contaminated ground water facilities and soils resulting from historic nuclear testing activities, the demolition of abandoned nuclear facilities, as well as installation of ground water wells to identify and monitor the extent of ground water contamination.

  8. System-wide power management control via clock distribution network

    DOE Patents [OSTI]

    Coteus, Paul W.; Gara, Alan; Gooding, Thomas M.; Haring, Rudolf A.; Kopcsay, Gerard V.; Liebsch, Thomas A.; Reed, Don D.

    2015-05-19

    An apparatus, method and computer program product for automatically controlling power dissipation of a parallel computing system that includes a plurality of processors. A computing device issues a command to the parallel computing system. A clock pulse-width modulator encodes the command in a system clock signal to be distributed to the plurality of processors. The plurality of processors in the parallel computing system receive the system clock signal including the encoded command, and adjusts power dissipation according to the encoded command.

  9. Sensor Network for Motor Energy Management | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Remote Sensing Electric Motor Operation Optimizes Maintenance and Energy Efficiency ... and the additional benefits of optimized preventative maintenance and improved uptime. ...

  10. Belgium east loop active network management (Smart Grid Project...

    Open Energy Info (EERE)

    Cancel Submit Categories: Smart Grid Projects Smart Grid Projects in Europe Smart Grid Projects - Grid Automation Distribution Smart Grid Projects - Grid Automation Transmission...

  11. Management & Administration | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Management & Administration Management & Administration Management & Administration The Office of Management and Administration directs the development, coordination, and execution ...

  12. Multiple network interface core apparatus and method

    DOE Patents [OSTI]

    Underwood, Keith D.; Hemmert, Karl Scott

    2011-04-26

    A network interface controller and network interface control method comprising providing a single integrated circuit as a network interface controller and employing a plurality of network interface cores on the single integrated circuit.

  13. Environmental Management System

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Management System Environmental Management System An Environmental Management System (EMS) is a set of processes and practices that enable an organization to reduce its...

  14. ORISE: Emergency Management

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Management Emergency Management Effective emergency management relies on thorough integration of preparedness plans at all levels of government. The Oak Ridge Institute for Science...

  15. Wireless Sensor Network for Electric Transmission Line Monitoring

    SciTech Connect (OSTI)

    Alphenaar, Bruce

    2009-06-30

    Generally, federal agencies tasked to oversee power grid reliability are dependent on data from grid infrastructure owners and operators in order to obtain a basic level of situational awareness. Since there are many owners and operators involved in the day-to-day functioning of the power grid, the task of accessing, aggregating and analyzing grid information from these sources is not a trivial one. Seemingly basic tasks such as synchronizing data timestamps between many different data providers and sources can be difficult as evidenced during the post-event analysis of the August 2003 blackout. In this project we investigate the efficacy and cost effectiveness of deploying a network of wireless power line monitoring devices as a method of independently monitoring key parts of the power grid as a complement to the data which is currently available to federal agencies from grid system operators. Such a network is modeled on proprietary power line monitoring technologies and networks invented, developed and deployed by Genscape, a Louisville, Kentucky based real-time energy information provider. Genscape measures transmission line power flow using measurements of electromagnetic fields under overhead high voltage transmission power lines in the United States and Europe. Opportunities for optimization of the commercial power line monitoring technology were investigated in this project to enable lower power consumption, lower cost and improvements to measurement methodologies. These optimizations were performed in order to better enable the use of wireless transmission line monitors in large network deployments (perhaps covering several thousand power lines) for federal situational awareness needs. Power consumption and cost reduction were addressed by developing a power line monitor using a low power, low cost wireless telemetry platform known as the ''Mote''. Motes were first developed as smart sensor nodes in wireless mesh networking applications. On such a platform, it has been demonstrated in this project that wireless monitoring units can effectively deliver real-time transmission line power flow information for less than $500 per monitor. The data delivered by such a monitor has during the course of the project been integrated with a national grid situational awareness visualization platform developed by Oak Ridge National Laboratory. Novel vibration energy scavenging methods based on piezoelectric cantilevers were also developed as a proposed method to power such monitors, with a goal of further cost reduction and large-scale deployment. Scavenging methods developed during the project resulted in 50% greater power output than conventional cantilever-based vibrational energy scavenging devices typically used to power smart sensor nodes. Lastly, enhanced and new methods for electromagnetic field sensing using multi-axis magnetometers and infrared reflectometry were investigated for potential monitoring applications in situations with a high density of power lines or high levels of background 60 Hz noise in order to isolate power lines of interest from other power lines in close proximity. The goal of this project was to investigate and demonstrate the feasibility of using small form factor, highly optimized, low cost, low power, non-contact, wireless electric transmission line monitors for delivery of real-time, independent power line monitoring for the US power grid. The project was divided into three main types of activity as follows; (1) Research into expanding the range of applications for non-contact power line monitoring to enable large scale low cost sensor network deployments (Tasks 1, 2); (2) Optimization of individual sensor hardware components to reduce size, cost and power consumption and testing in a pilot field study (Tasks 3,5); and (3) Demonstration of the feasibility of using the data from the network of power line monitors via a range of custom developed alerting and data visualization applications to deliver real-time information to federal agencies and others tasked with grid reliability (Tasks 6,8).

  16. Geometric universality of currents in an open network of interacting particles

    SciTech Connect (OSTI)

    Sinitsyn, Nikolai A; Chernyak, Vladimir Y; Chertkov, Michael

    2010-01-01

    We discuss a non-equilibrium statistical system on a graph or network. Identical particles are injected, interact with each other, traverse, and leave the graph in a stochastic manner described in terms of Poisson rates, possibly dependent on time and instantaneous occupation numbers at the nodes of the graph. We show that under the assumption of the relative rates constancy, the system demonstrates a profound statistical symmetry, resulting in geometric universality of the particle currents statistics. The phenomenon applies broadly to many man-made and natural open stochastic systems, such as queuing of packages over internet, transport of electrons and quasi-particles in mesoscopic systems, and chains of reactions in bio-chemical networks. We illustrate the utility of the general approach using two enabling examples from the two latter disciplines.

  17. M E Environmental Management Environmental Management

    Energy Savers [EERE]

    safety  performance  cleanup  closure M E Environmental Management Environmental Management safety  performance  cleanup  closure M E Environmental Management Environmental Management M E Environmental Management Environmental Management Office of Site Restoration, EM-10 Office of D&D and Facility Engineering, EM-13 Facility Deactivation & Decommissioning (D&D) D&D Program Map Addendum: Impact of American Recovery and Reinvestment Act (ARRA) on EM's D&D

  18. Better Buildings Network View | March 2014

    Broader source: Energy.gov [DOE]

    The Better Buildings Network View monthly newsletter from the U.S. Department of Energy's Better Buildings Residential Network.

  19. Better Buildings Network View | January 2015

    Broader source: Energy.gov [DOE]

    The Better Buildings Network View monthly newsletter from the U.S. Department of Energy's Better Buildings Residential Network.

  20. Better Buildings Network View | June 2015

    Broader source: Energy.gov [DOE]

    The Better Buildings Network View monthly newsletter from the U.S. Department of Energy's Better Buildings Residential Network.

  1. Better Buildings Residential Network Orientation Webinar | Department...

    Broader source: Energy.gov (indexed) [DOE]

    11, 2014. Call Slides and Discussion Summary More Documents & Publications Better Buildings Residential Network Orientation Better Buildings Residential Network Orientation...

  2. Instructions for Using Virtual Private Network (VPN)

    Broader source: Energy.gov [DOE]

    Virtual Private Network (VPN) provides access to network drives and is recommended for use only from a EITS provided laptop.

  3. Renewable Energy Nongovernmental Organization Network (RENOVE...

    Open Energy Info (EERE)

    Nongovernmental Organization Network (RENOVE) Jump to: navigation, search Name: Renewable Energy Nongovernmental Organization Network (RENOVE) Place: Brasilia, Brazil Phone Number:...

  4. Better Buildings Network View | May 2014

    Broader source: Energy.gov [DOE]

    The Better Buildings Network View monthly newsletter from the U.S. Department of Energy's Better Buildings Residential Network.

  5. Training Records And Information Network UNIX Version

    Energy Science and Technology Software Center (OSTI)

    1996-12-01

    TRAIN-UNIX is used to track training requirements, qualifications, training completion and schedule training, classrooms and instructors. TRAIN-UNIX is a requirements-based system. When the identified training requirements for specific jobs are entered into the system, the employees manager or responsible training person assigns jobs to an employee. TRAIN-UNIX will then assemble an Individual Training Plan (ITP) with all courses required. ITP''s can also be modified to add any special training directed or identified by management, bestmore » business practices, procedures, etc. TRAIN-UNIX also schedules and tracks conferences, seminars, and required reading. TRAIN-UNIX is a secure database system on a server accessible via the network. Access to the user functions (scheduling, data entry, ITP modification etc.) within TRAIN-UNIX are granted by function, as needed, by the system administrator. An additional level of security allows those who access TRAIN-UNIX to only add, modify or view information for the organizations to which they belong. TRAIN-UNIX scheduling function allows network access to scheduling of students. As a function of the scheduling process, TRAIN-UNIX checks to insure that the student is a valid employee, not double booked, and the instructor and classroom are not double booked. TRAIN-UNIX will report pending lapse of courses or qualifications. This ability to know the lapse of training along with built in training requesting function allows the training deliverers to forecast training needs.« less

  6. Best Management Practice #1: Water Management Planning

    Broader source: Energy.gov [DOE]

    A successful water management program starts with developing a comprehensive water management plan. This plan should be included within existing facility operating plans.

  7. Insecurity of Wireless Networks

    SciTech Connect (OSTI)

    Sheldon, Frederick T; Weber, John Mark; Yoo, Seong-Moo; Pan, W. David

    2012-01-01

    Wireless is a powerful core technology enabling our global digital infrastructure. Wi-Fi networks are susceptible to attacks on Wired Equivalency Privacy, Wi-Fi Protected Access (WPA), and WPA2. These attack signatures can be profiled into a system that defends against such attacks on the basis of their inherent characteristics. Wi-Fi is the standard protocol for wireless networks used extensively in US critical infrastructures. Since the Wired Equivalency Privacy (WEP) security protocol was broken, the Wi-Fi Protected Access (WPA) protocol has been considered the secure alternative compatible with hardware developed for WEP. However, in November 2008, researchers developed an attack on WPA, allowing forgery of Address Resolution Protocol (ARP) packets. Subsequent enhancements have enabled ARP poisoning, cryptosystem denial of service, and man-in-the-middle attacks. Open source systems and methods (OSSM) have long been used to secure networks against such attacks. This article reviews OSSMs and the results of experimental attacks on WPA. These experiments re-created current attacks in a laboratory setting, recording both wired and wireless traffic. The article discusses methods of intrusion detection and prevention in the context of cyber physical protection of critical Internet infrastructure. The basis for this research is a specialized (and undoubtedly incomplete) taxonomy of Wi-Fi attacks and their adaptations to existing countermeasures and protocol revisions. Ultimately, this article aims to provide a clearer picture of how and why wireless protection protocols and encryption must achieve a more scientific basis for detecting and preventing such attacks.

  8. Bicriteria network design problems

    SciTech Connect (OSTI)

    Marathe, M.V.; Ravi, R.; Sundaram, R.; Ravi, S.S.; Rosenkrantz, D.J.; Hunt, H.B. III

    1997-11-20

    The authors study a general class of bicriteria network design problems. A generic problem in this class is as follows: Given an undirected graph and two minimization objectives (under different cost functions), with a budget specified on the first, find a subgraph from a given subgraph class that minimizes the second objective subject to the budget on the first. They consider three different criteria -- the total edge cost, the diameter and the maximum degree of the network. Here, they present the first polynomial-time approximation algorithms for a large class of bicriteria network design problems for the above mentioned criteria. The following general types of results are presented. First, they develop a framework for bicriteria problems and their approximations. Second, when the two criteria are the same they present a black box parametric search technique. This black box takes in as input an (approximation) algorithm for the criterion situation and generates an approximation algorithm for the bicriteria case with only a constant factor loss in the performance guarantee. Third, when the two criteria are the diameter and the total edge costs they use a cluster based approach to devise approximation algorithms. The solutions violate both the criteria by a logarithmic factor. Finally, for the class of treewidth-bounded graphs, they provide pseudopolynomial-time algorithms for a number of bicriteria problems using dynamic programming. The authors show how these pseudopolynomial-time algorithms can be converted to fully polynomial-time approximation schemes using a scaling technique.

  9. Data Management

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Data Management Please remove ALL data from /house! Do you still have data in /house/homedirs? Do you know if you have data in /house/homedirs? Please check now and make a plan for moving that data to the archiver or one of the NERSC file systems (for more information on these filesystems go to File storage and I/O). Moving data from house to DnA The DnA file system is primarily for finished projects, data that is ready to be archived, or data that is shared between groups. It is mounted

  10. 2016 DOE Project Management Workshop - "Enhancing Project Management...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Management Workshop - "Enhancing Project Management" 2016 DOE Project Management Workshop - "Enhancing Project Management" 20160407-doe-project-management-workshop-ADJUST-slide.png ...

  11. Assessing State Nuclear Weapons Proliferation: Using Bayesian Network Analysis of Social Factors

    SciTech Connect (OSTI)

    Coles, Garill A.; Brothers, Alan J.; Olson, Jarrod; Whitney, Paul D.

    2010-04-16

    A Bayesian network (BN) model of social factors can support proliferation assessments by estimating the likelihood that a state will pursue a nuclear weapon. Social factors including political, economic, nuclear capability, security, and national identity and psychology factors may play as important a role in whether a State pursues nuclear weapons as more physical factors. This paper will show how using Bayesian reasoning on a generic case of a would-be proliferator State can be used to combine evidence that supports proliferation assessment. Theories and analysis by political scientists can be leveraged in a quantitative and transparent way to indicate proliferation risk. BN models facilitate diagnosis and inference in a probabilistic environment by using a network of nodes and acyclic directed arcs between the nodes whose connections, or absence of, indicate probabilistic relevance, or independence. We propose a BN model that would use information from both traditional safeguards and the strengthened safeguards associated with the Additional Protocol to indicate countries with a high risk of proliferating nuclear weapons. This model could be used in a variety of applications such a prioritization tool and as a component of state safeguards evaluations. This paper will discuss the benefits of BN reasoning, the development of Pacific Northwest National Laboratorys (PNNL) BN state proliferation model and how it could be employed as an analytical tool.

  12. Risk Management Process Overview

    Broader source: Energy.gov [DOE]

    The cybersecurity risk management process explained in the Electricity Sector Cybersecurity Risk Management Process (RMP) Guideline has two primary components: the risk management model and the the risk management cycle.

  13. A neural network model for predicting the silicon content of the hot metal at No. 2 blast furnace of SSAB Luleaa

    SciTech Connect (OSTI)

    Zuo Guangqing; Ma Jitang; Bo, B.

    1996-12-31

    To predict the silicon content of hot metal at No. 2 blast furnace, SSAB, Luleaa Works, a three-layer Back-Propagation network model has been established. The network consists of twenty-eight inputs, six middle nodes and one output and uses a generalized delta rule for training. Different network structures and different training strategies have been tested. A well-functioning network with dynamic updating has been designed. The off-line test and the on-line application results showed that more than 80% of the predictions can match the actual silicon content in hot metal in a normal operation, if the allowable prediction error was set to {+-}0.05% Si, while the actual fluctuation of the silicon content was larger than {+-}0.10% Si.

  14. Your Records Management Responsibilities

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Your Records Management Responsibilities Table of Contents INTRODUCTION RECORDS MANAGEMENT IN THE FEDERAL GOVERNMENT RECORDS MANAGEMENT IN THE DEPARTMENT OF ENERGY IMPORTANCE OF RECORDS MANAGEMENT YOUR RECORDS MANAGEMENT RESPONSIBILITIES RECORDS MANAGEMENT LIFE CYCLE ELECTRONIC RECORDS & RECORDKEEPING LAW, REGULATION, AND POLICY ASSISTANCE RECORDS MANAGEMENT TERMS 2 INTRODUCTION If you are a government employee or contractor working for a federal agency, records management is part of your

  15. Energy Management and Financing

    Office of Energy Efficiency and Renewable Energy (EERE)

    This Tuesday Webcast for Industry covers how to become a Certified Energy Manager and Certified Practitioner in Energy Management Systems

  16. Regional solid waste management study

    SciTech Connect (OSTI)

    Not Available

    1992-09-01

    In 1990, the Lower Savannah Council of Governments (LSCOG) began dialogue with the United States Department of Energy (DOE) regarding possibilities for cooperation and coordination of solid waste management practices among the local governments and the Savannah River Site. The Department of Energy eventually awarded a grant to the Lower Savannah Council of Governments for the development of a study, which was initiated on March 5, 1992. After careful analysis of the region`s solid waste needs, this study indicates a network approach to solid waste management to be the most viable. The network involves the following major components: (1) Rural Collection Centers, designed to provide convenience to rural citizens, while allowing some degree of participation in recycling; (2) Rural Drop-Off Centers, designed to give a greater level of education and recycling activity; (3) Inert landfills and composting centers, designed to reduce volumes going into municipal (Subtitle D) landfills and produce useable products from yard waste; (4) Transfer Stations, ultimate landfill disposal; (5) Materials Recovery Facilities, designed to separate recyclables into useable and sellable units, and (6) Subtitle D landfill for burial of all solid waste not treated through previous means.

  17. John Angelis named Manager, Information Resource Management

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Names John S. Angelis Manager of Information Resource Management CARLSBAD, N.M., March 22, 2000 - The Westinghouse Waste Isolation Division (WID) has named John S. Angelis of Carlsbad as Manager of Information Resource Management at the Waste Isolation Pilot Plant (WIPP). "John's extensive computer technology and telecommunications experience, combined with his progressive attitude, make him an ideal choice for this increasingly important position," said WID General Manager Joe

  18. Computer Networking Group | Stanford Synchrotron Radiation Lightsource

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Computer Networking Group Do you need help? For assistance please submit a CNG Help Request ticket. CNG Logo Chris Ramirez SSRL Computer and Networking Group (650) 926-2901 | email Jerry Camuso SSRL Computer and Networking Group (650) 926-2994 | email Networking Support The Networking group provides connectivity and communications services for SSRL. The services provided by the Networking Support Group include: Local Area Network support for cable and wireless connectivity. Installation and

  19. Operating Innovative Networks Workshop Series

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Operating Innovative Networks Workshop Series Science Engagement Move your data Programs & Workshops CrossConnects Workshop Series Operating Innovative Networks Workshop Series Enlighten Your Research Global Program Science Requirements Reviews Case Studies Contact Us Technical Assistance: 1 800-33-ESnet (Inside US) 1 800-333-7638 (Inside US) 1 510-486-7600 (Globally) 1 510-486-7607 (Globally) Report Network Problems: trouble@es.net Provide Web Site Feedback: info@es.net Operating Innovative

  20. New methods for computing a closest saddle node bifurcation and worst case load power margin for voltage collapse

    SciTech Connect (OSTI)

    Dobson, I. ); Lu, Liming )

    1993-08-01

    Voltage collapse and blackout can occur in an electric power system when load powers vary so that the system loses stability in a saddle node bifurcation. The authors propose new iterative and direct methods to compute load powers at which bifurcation occurs and which are locally closest to the current operating load powers. The distance in load power parameter space to this locally closest bifurcation is an index of voltage collapse. The pattern of load power increase need not be predicted; instead the index is a worst case load power margin. The computations are illustrated in the 6 dimensional load power parameter space of a 5 bus power system. The normal vector and curvature of a hypersurface of critical load powers at which bifurcation occurs are also computed. The sensitivity of the index to parameters and controls is easily obtained from the normal vector.

  1. Network interdiction with budget constraints

    SciTech Connect (OSTI)

    Santhi, Nankakishore; Pan, Feng

    2009-01-01

    Several scenarios exist in the modern interconnected world which call for efficient network interdiction algorithms. Applications are varied, including computer network security, prevention of spreading of Internet worms, policing international smuggling networks, controlling spread of diseases and optimizing the operation of large public energy grids. In this paper we consider some natural network optimization questions related to the budget constrained interdiction problem over general graphs. Many of these questions turn out to be computationally hard to tackle. We present a particularly interesting practical form of the interdiction question which we show to be computationally tractable. A polynomial time algorithm is then presented for this problem.

  2. United States National Seismographic Network

    SciTech Connect (OSTI)

    Buland, R.

    1993-09-01

    The concept of a United States National Seismograph Network (USNSN) dates back nearly 30 years. The idea was revived several times over the decades. but never funded. For, example, a national network was proposed and discussed at great length in the so called Bolt Report (U. S. Earthquake Observatories: Recommendations for a New National Network, National Academy Press, Washington, D.C., 1980, 122 pp). From the beginning, a national network was viewed as augmenting and complementing the relatively dense, predominantly short-period vertical coverage of selected areas provided by the Regional Seismograph Networks (RSN`s) with a sparse, well-distributed network of three-component, observatory quality, permanent stations. The opportunity finally to begin developing a national network arose in 1986 with discussions between the US Geological Survey (USGS) and the Nuclear Regulatory Commission (NRC). Under the agreement signed in 1987, the NRC has provided $5 M in new funding for capital equipment (over the period 1987-1992) and the USGS has provided personnel and facilities to develop. deploy, and operate the network. Because the NRC funding was earmarked for the eastern United States, new USNSN station deployments are mostly east of 105{degree}W longitude while the network in the western United States is mostly made up of cooperating stations (stations meeting USNSN design goals, but deployed and operated by other institutions which provide a logical extension to the USNSN).

  3. Regional Networks for Energy Efficiency

    Broader source: Energy.gov [DOE]

    Better Buildings Neighborhood Program Sustainability Peer Exchange Call: Regional Networks for Energy Efficiency, call slides and discussion summary, December 6, 2012.

  4. Vector Network Analysis

    Energy Science and Technology Software Center (OSTI)

    1997-10-20

    Vector network analyzers are a convenient way to measure scattering parameters of a variety of microwave devices. However, these instruments, unlike oscilloscopes for example, require a relatively high degree of user knowledge and expertise. Due to the complexity of the instrument and of the calibration process, there are many ways in which an incorrect measurement may be produced. The Microwave Project, which is part of Sandia National Laboratories Primary Standards Laboratory, routinely uses check standardsmore » to verify that the network analyzer is operating properly. In the past, these measurements were recorded manually and, sometimes, interpretation of the results was problematic. To aid our measurement assurance process, a software program was developed to automatically measure a check standard and compare the new measurements with an historical database of measurements of the same device. The program acquires new measurement data from selected check standards, plots the new data against the mean and standard deviation of prior data for the same check standard, and updates the database files for the check standard. The program is entirely menu-driven requiring little additional work by the user.« less

  5. High Performance Network Monitoring

    SciTech Connect (OSTI)

    Martinez, Jesse E

    2012-08-10

    Network Monitoring requires a substantial use of data and error analysis to overcome issues with clusters. Zenoss and Splunk help to monitor system log messages that are reporting issues about the clusters to monitoring services. Infiniband infrastructure on a number of clusters upgraded to ibmon2. ibmon2 requires different filters to report errors to system administrators. Focus for this summer is to: (1) Implement ibmon2 filters on monitoring boxes to report system errors to system administrators using Zenoss and Splunk; (2) Modify and improve scripts for monitoring and administrative usage; (3) Learn more about networks including services and maintenance for high performance computing systems; and (4) Gain a life experience working with professionals under real world situations. Filters were created to account for clusters running ibmon2 v1.0.0-1 10 Filters currently implemented for ibmon2 using Python. Filters look for threshold of port counters. Over certain counts, filters report errors to on-call system administrators and modifies grid to show local host with issue.

  6. Outcomes of Node-Negative Breast Cancer 5 Centimeters and Larger Treated With and Without Postmastectomy Radiotherapy

    SciTech Connect (OSTI)

    Goulart, Jennifer; Truong, Pauline; Woods, Ryan; Speers, Caroline H.; Kennecke, Hagen; Nichol, Alan

    2011-07-01

    Purpose: The role of adjuvant postmastectomy radiotherapy (PMRT) remains controversial for the rare presentation of pT3pN0cM0 breast cancer. The present analysis examined locoregional recurrence (LRR) and breast cancer-specific survival (BCSS) in pT2 = 5.0-cm and pT3 >5.0-cm tumors treated with mastectomy, stratified by PMRT use. Materials and Methods: Between January 1, 1989 and December 31, 2000, the British Columbia provincial database yielded 100 node-negative patients with tumors {>=}5 cm of 19,846 nonmetastatic breast cancer patients (0.5%). Of these 100 patients, 44 (44%) had received adjuvant PMRT. Results: The PMRT group contained significantly more pT3 >5-cm cases (p = 0.001) and margin-positive cases (p = .03). With a median follow-up of 10 years, the cumulative 10-year LRR rate was 2.3% (95% confidence interval, 0.2-10.5) in the PMRT group vs. 8.9% (95% confidence interval, 3.2-18.2) in the no-PMRT group (p = .2). Regarding LRR in the no-PMRT group, all patients had Grade 3 histologic features (LRR 17%, 5 of 29) and had not received hormonal therapy (LRR 15%, 5 of 34). The 10-year breast cancer-specific survival rate was 85.8% (95% confidence interval 71.0-93.4) in the PMRT group vs. 74.6% (95% confidence interval 59.9-84.5) in the no-PMRT group (p = .2). On multivariate analysis, adjusted for the prognostic and predictive variables, PMRT did not significantly improve the LRR or breast cancer-specific survival rates. Conclusion: The present study demonstrated a low LRR rate for node-negative breast cancer {>=}5 cm. Our results indicate that PMRT should be considered for Grade 3 histologic features and patients not undergoing hormonal therapy.

  7. Converging Redundant Sensor Network Information for Improved Building Control

    SciTech Connect (OSTI)

    Dale K. Tiller; Gregor P. Henze

    2005-12-01

    This project is investigating the development and application of sensor networks to enhance building energy management and security. Commercial, industrial and residential buildings often incorporate systems used to determine occupancy, but current sensor technology and control algorithms limit the effectiveness of these systems. For example, most of these systems rely on single monitoring points to detect occupancy, when more than one monitoring point would improve system performance. Phase I of the project focused on instrumentation and data collection. In Phase I, a new occupancy detection system was developed, commissioned and installed in a sample of private offices and open-plan office workstations. Data acquisition systems were developed and deployed to collect data on space occupancy profiles. In phase II of the project, described in this report, we demonstrate that a network of several sensors provides a more accurate measure of occupancy than is possible using systems based on single monitoring points. We also establish that analysis algorithms can be applied to the sensor network data stream to improve the accuracy of system performance in energy management and security applications, and show that it may be possible to use sensor network pulse rate to distinguish the number of occupants in a space. Finally, in this phase of the project we also developed a prototype web-based display that portrays the current status of each detector in a sensor network monitoring building occupancy. This basic capability will be extended in the future by applying an algorithm-based inference to the sensor network data stream, so that the web page displays the likelihood that each monitored office or area is occupied, as a supplement to the actual status of each sensor.

  8. Converging Redundant Sensor Network Information for Improved Building Control

    SciTech Connect (OSTI)

    Dale Tiller; D. Phil; Gregor Henze; Xin Guo

    2007-09-30

    This project investigated the development and application of sensor networks to enhance building energy management and security. Commercial, industrial and residential buildings often incorporate systems used to determine occupancy, but current sensor technology and control algorithms limit the effectiveness of these systems. For example, most of these systems rely on single monitoring points to detect occupancy, when more than one monitoring point could improve system performance. Phase I of the project focused on instrumentation and data collection. During the initial project phase, a new occupancy detection system was developed, commissioned and installed in a sample of private offices and open-plan office workstations. Data acquisition systems were developed and deployed to collect data on space occupancy profiles. Phase II of the project demonstrated that a network of several sensors provides a more accurate measure of occupancy than is possible using systems based on single monitoring points. This phase also established that analysis algorithms could be applied to the sensor network data stream to improve the accuracy of system performance in energy management and security applications. In Phase III of the project, the sensor network from Phase I was complemented by a control strategy developed based on the results from the first two project phases: this controller was implemented in a small sample of work areas, and applied to lighting control. Two additional technologies were developed in the course of completing the project. A prototype web-based display that portrays the current status of each detector in a sensor network monitoring building occupancy was designed and implemented. A new capability that enables occupancy sensors in a sensor network to dynamically set the 'time delay' interval based on ongoing occupant behavior in the space was also designed and implemented.

  9. Transcript of See Action and Technical Assistance Program Webinar: Strategic Energy Management

    Broader source: Energy.gov [DOE]

    The U.S. Department of Energy (DOE) See Action Network and Weatherization and Intergovernmental Program Technical Assistance Program sponsored this webinar about strategic management in the public sector on November 7, 2012.

  10. EIA - Natural Gas Pipeline Network - Underground Natural Gas Storage

    U.S. Energy Information Administration (EIA) Indexed Site

    Storage About U.S. Natural Gas Pipelines - Transporting Natural Gas based on data through 2007/2008 with selected updates Underground Natural Gas Storage Overview | Regional Breakdowns Overview Underground natural gas storage provides pipelines, local distribution companies, producers, and pipeline shippers with an inventory management tool, seasonal supply backup, and access to natural gas needed to avoid imbalances between receipts and deliveries on a pipeline network. There are three

  11. Fault-tolerant interconnection network and image-processing applications for the PASM parallel processing system

    SciTech Connect (OSTI)

    Adams, G.B. III

    1984-01-01

    The demand for very high speed data processing coupled with falling hardware costs has made large-scale parallel and distributed computer systems both desirable and feasible. Two modes of parallel processing are single instruction stream-multiple data stream (SIMD) and multiple instruction stream-multiple data stream (MIMD). PASM, a partitionable SIMD/MIMD system, is a reconfigurable multimicroprocessor system being designed for image processing and pattern recognition. An important component of these systems is the interconnection network, the mechanism for communication among the computation nodes and memories. Assuring high reliability for such complex systems is a significant task. Thus, a crucial practical aspect of an interconnection network is fault tolerance. In answer to this need, the Extra Stage Cube (ESC), a fault-tolerant, multistage cube-type interconnection network, is define. The fault tolerance of the ESC is explored for both single and multiple faults, routing tags are defined, and consideration is given to permuting data and partitioning the ESC in the presence of faults. The ESC is compared with other fault-tolerant multistage networks. Finally, reliability of the ESC and an enhanced version of it are investigated.

  12. Network Analysis of Epidermal Growth Factor Signaling using Integrated Genomic, Proteomic and Phosphorylation Data

    SciTech Connect (OSTI)

    Waters, Katrina M.; Liu, Tao; Quesenberry, Ryan D.; Willse, Alan R.; Bandyopadhyay, Somnath; Kathmann, Loel E.; Weber, Thomas J.; Smith, Richard D.; Wiley, H. S.; Thrall, Brian D.

    2012-03-29

    To understand how integration of multiple data types can help decipher cellular responses at the systems level, we analyzed the mitogenic response of human mammary epithelial cells to epidermal growth factor (EGF) using whole genome microarrays, mass spectrometry-based proteomics and large-scale western blots with over 1000 antibodies. A time course analysis revealed significant differences in the expression of 3172 genes and 596 proteins, including protein phosphorylation changes measured by western blot. Integration of these disparate data types showed that each contributed qualitatively different components to the observed cell response to EGF and that varying degrees of concordance in gene expression and protein abundance measurements could be linked to specific biological processes. Networks inferred from individual data types were relatively limited, whereas networks derived from the integrated data recapitulated the known major cellular responses to EGF and exhibited more highly connected signaling nodes than networks derived from any individual dataset. While cell cycle regulatory pathways were altered as anticipated, we found the most robust response to mitogenic concentrations of EGF was induction of matrix metalloprotease cascades, highlighting the importance of the EGFR system as a regulator of the extracellular environment. These results demonstrate the value of integrating multiple levels of biological information to more accurately reconstruct networks of cellular response.

  13. Triangular Alignment (TAME). A Tensor-based Approach for Higher-order Network Alignment

    SciTech Connect (OSTI)

    Mohammadi, Shahin; Gleich, David F.; Kolda, Tamara G.; Grama, Ananth

    2015-11-01

    Network alignment is an important tool with extensive applications in comparative interactomics. Traditional approaches aim to simultaneously maximize the number of conserved edges and the underlying similarity of aligned entities. We propose a novel formulation of the network alignment problem that extends topological similarity to higher-order structures and provide a new objective function that maximizes the number of aligned substructures. This objective function corresponds to an integer programming problem, which is NP-hard. Consequently, we approximate this objective function as a surrogate function whose maximization results in a tensor eigenvalue problem. Based on this formulation, we present an algorithm called Triangular AlignMEnt (TAME), which attempts to maximize the number of aligned triangles across networks. We focus on alignment of triangles because of their enrichment in complex networks; however, our formulation and resulting algorithms can be applied to general motifs. Using a case study on the NAPABench dataset, we show that TAME is capable of producing alignments with up to 99% accuracy in terms of aligned nodes. We further evaluate our method by aligning yeast and human interactomes. Our results indicate that TAME outperforms the state-of-art alignment methods both in terms of biological and topological quality of the alignments.

  14. A High Performance Computing Network and System Simulator for the Power Grid: NGNS^2

    SciTech Connect (OSTI)

    Villa, Oreste; Tumeo, Antonino; Ciraci, Selim; Daily, Jeffrey A.; Fuller, Jason C.

    2012-11-11

    Designing and planing next generation power grid sys- tems composed of large power distribution networks, monitoring and control networks, autonomous generators and consumers of power requires advanced simulation infrastructures. The objective is to predict and analyze in time the behavior of networks of systems for unexpected events such as loss of connectivity, malicious attacks and power loss scenarios. This ultimately allows one to answer questions such as: What could happen to the power grid if .... We want to be able to answer as many questions as possible in the shortest possible time for the largest possible systems. In this paper we present a new High Performance Computing (HPC) oriented simulation infrastructure named Next Generation Network and System Simulator (NGNS2 ). NGNS2 allows for the distribution of a single simulation among multiple computing elements by using MPI and OpenMP threads. NGNS2 provides extensive configuration, fault tolerant and load balancing capabilities needed to simulate large and dynamic systems for long periods of time. We show the preliminary results of the simulator running approximately two million simulated entities both on a 64-node commodity Infiniband cluster and a 48-core SMP workstation.

  15. Network Bandwidth Utilization Forecast Model on High Bandwidth Network

    SciTech Connect (OSTI)

    Yoo, Wucherl; Sim, Alex

    2014-07-07

    With the increasing number of geographically distributed scientific collaborations and the scale of the data size growth, it has become more challenging for users to achieve the best possible network performance on a shared network. We have developed a forecast model to predict expected bandwidth utilization for high-bandwidth wide area network. The forecast model can improve the efficiency of resource utilization and scheduling data movements on high-bandwidth network to accommodate ever increasing data volume for large-scale scientific data applications. Univariate model is developed with STL and ARIMA on SNMP path utilization data. Compared with traditional approach such as Box-Jenkins methodology, our forecast model reduces computation time by 83.2percent. It also shows resilience against abrupt network usage change. The accuracy of the forecast model is within the standard deviation of the monitored measurements.

  16. ESnet: Large-Scale Science and Data Management ( (LBNL Summer Lecture Series)

    ScienceCinema (OSTI)

    Johnston, Bill

    2011-04-28

    Summer Lecture Series 2004: Bill Johnston of Berkeley Lab's Computing Sciences is a distinguished networking and computing researcher. He managed the Energy Sciences Network (ESnet), a leading-edge, high-bandwidth network funded by DOE's Office of Science. Used for everything from videoconferencing to climate modeling, and flexible enough to accommodate a wide variety of data-intensive applications and services, ESNet's traffic volume is doubling every year and currently surpasses 200 terabytes per month.

  17. Site Management Guide (Blue Book)

    SciTech Connect (OSTI)

    2014-03-01

    The U.S. Department of Energy (Department) Office of Legacy Management (LM), established in 2003, manages the Department’s postclosure responsibilities and ensures the future protection of human health and the environment. During World War II and the Cold War, the Federal government developed and operated a vast network of industrial facilities for the research, production, and testing of nuclear weapons, as well as other scientific and engineering research. These processes left a legacy of radioactive and chemical waste, environmental contamination, and hazardous facilities and materials at well over 100 sites. Since 1989, the Department has taken an aggressive accelerated cleanup approach to reduce risks and cut costs. At most Departmental sites undergoing cleanup, some residual hazards will remain at the time cleanup is completed due to financial and technical impracticality. However, the Department still has an obligation to protect human health and the environment after cleanup is completed. LM fulfills DOE’s postclosure obligation by providing long-term management of postcleanup sites which do not have continuing missions. LM is also responsible for sites under the Formerly Utilized Sites Remedial Action Program (FUSRAP). Currently, the U.S. Army Corps of Engineers (USACE) is responsible for site surveys and remediation at FUSRAP sites. Once remediation is completed, LM becomes responsible for long-term management. LM also has responsibility for uranium processing sites addressed by Title II of the Uranium Mill Tailings Radiation Control Act (UMTRCA). UMTRCA Title II sites are sites that were commercially owned and are regulated under a U.S. Nuclear Regulatory Commission (NRC) license. For license termination, the owner must conduct an NRC-approved cleanup of any on-site radioactive waste remaining from former uranium ore-processing operations. The site owner must also provide full funding for inspections and, if necessary, ongoing maintenance. Once site cleanup is complete, LM accepts title to these sites on behalf of the United States and assumes long-term management.

  18. Wellbore Integrity Network

    SciTech Connect (OSTI)

    Carey, James W.; Bachu, Stefan

    2012-06-21

    In this presentation, we review the current state of knowledge on wellbore integrity as developed in the IEA Greenhouse Gas Programme's Wellbore Integrity Network. Wells are one of the primary risks to the successful implementation of CO{sub 2} storage programs. Experimental studies show that wellbore materials react with CO{sub 2} (carbonation of cement and corrosion of steel) but the impact on zonal isolation is unclear. Field studies of wells in CO{sub 2}-bearing fields show that CO{sub 2} does migrate external to casing. However, rates and amounts of CO{sub 2} have not been quantified. At the decade time scale, wellbore integrity is driven by construction quality and geomechanical processes. Over longer time-scales (> 100 years), chemical processes (cement degradation and corrosion) become more important, but competing geomechanical processes may preserve wellbore integrity.

  19. RNEDE: Resilient Network Design Environment

    SciTech Connect (OSTI)

    Venkat Venkatasubramanian, Tanu Malik, Arun Giridh; Craig Rieger; Keith Daum; Miles McQueen

    2010-08-01

    Modern living is more and more dependent on the intricate web of critical infrastructure systems. The failure or damage of such systems can cause huge disruptions. Traditional design of this web of critical infrastructure systems was based on the principles of functionality and reliability. However, it is increasingly being realized that such design objectives are not sufficient. Threats, disruptions and faults often compromise the network, taking away the benefits of an efficient and reliable design. Thus, traditional network design parameters must be combined with self-healing mechanisms to obtain a resilient design of the network. In this paper, we present RNEDEa resilient network design environment that that not only optimizes the network for performance but tolerates fluctuations in its structure that result from external threats and disruptions. The environment evaluates a set of remedial actions to bring a compromised network to an optimal level of functionality. The environment includes a visualizer that enables the network administrator to be aware of the current state of the network and the suggested remedial actions at all times.

  20. Distributed resource management: garbage collection

    SciTech Connect (OSTI)

    Bagherzadeh, N.

    1987-01-01

    In recent years, there has been a great interest in designing high-performance distributed symbolic-processing computers. These architectures have special needs for resource management and dynamic reclamation of unused memory cells and objects. The memory management or garbage-collection aspects of these architectures are studied. Also introduced is a synchronous distributed algorithm for garbage collection. A special data structure is defined to handle the distributed nature of the problem. The author formally expresses the algorithm and shows the results of a synchronous garbage-collection simulation and its effect on the interconnection-network message to traffic. He presents an asynchronous distributed garbage collection to handle the resource management for a system that does not require a global synchronization mechanism. The distributed data structure is modified to include the asynchronous aspects of the algorithm. This method is extended to a multiple-mutator scheme, and the problem of having several processors share portion of a cyclical graph is discussed. Two models for the analytical study of the garbage-collection algorithms discussed are provided.

  1. DOE Jobs Online (Hiring Manager), Office of Human Capitol Management...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Jobs Online (Hiring Manager), Office of Human Capitol Management Innovation and Solutions DOE Jobs Online (Hiring Manager), Office of Human Capitol Management Innovation and ...

  2. Project Manager's Guide to Managing Impact and Process Evaluation...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Project Manager's Guide to Managing Impact and Process Evaluation Studies Project Manager's Guide to Managing Impact and Process Evaluation Studies This report provides a...

  3. AWWA Utility Management Conference

    Broader source: Energy.gov [DOE]

    Hosted by the American Water Works Association (AWWA), the Utility Management Conference is one of the leading management conferences to share experiences and learn from others in similar situations to the most pressing management issues of the day.

  4. Managing Your User Account

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Managing Your Account Managing Your User Account Use the NERSC Information Management (NIM) system to customize your user account and keep your personal information up-to-date. See...

  5. Phoebus: Network Middleware for Next-Generation Network Computing

    SciTech Connect (OSTI)

    Martin Swany

    2012-06-16

    The Phoebus project investigated algorithms, protocols, and middleware infrastructure to improve end-to-end performance in high speed, dynamic networks. The Phoebus system essentially serves as an adaptation point for networks with disparate capabilities or provisioning. This adaptation can take a variety of forms including acting as a provisioning agent across multiple signaling domains, providing transport protocol adaptation points, and mapping between distributed resource reservation paradigms and the optical network control plane. We have successfully developed the system and demonstrated benefits. The Phoebus system was deployed in Internet2 and in ESnet, as well as in GEANT2, RNP in Brazil and over international links to Korea and Japan. Phoebus is a system that implements a new protocol and associated forwarding infrastructure for improving throughput in high-speed dynamic networks. It was developed to serve the needs of large DOE applications on high-performance networks. The idea underlying the Phoebus model is to embed Phoebus Gateways (PGs) in the network as on-ramps to dynamic circuit networks. The gateways act as protocol translators that allow legacy applications to use dedicated paths with high performance.

  6. The Department's Cyber Security Incident Management Program, IG-0787 |

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Department of Energy The Department's Cyber Security Incident Management Program, IG-0787 The Department's Cyber Security Incident Management Program, IG-0787 The Department of Energy operates numerous interconnected computer networks and systems to help accon~plishit s strategic missions in the areas of energy, defense, science, and the environment. These systems are frequently subjected to sophisticated cyber attacks that could potentially affect the Department's ability to carry out its

  7. An Extensible Sensing and Control Platform for Building Energy Management

    Office of Scientific and Technical Information (OSTI)

    (Technical Report) | SciTech Connect Technical Report: An Extensible Sensing and Control Platform for Building Energy Management Citation Details In-Document Search Title: An Extensible Sensing and Control Platform for Building Energy Management The goal of this project is to develop Mortar.io, an open-source BAS platform designed to simplify data collection, archiving, event scheduling and coordination of cross-system interactions. Mortar.io is optimized for (1) robustness to network

  8. Data Management at SSRL | Stanford Synchrotron Radiation Lightsource

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Management at SSRL SSRL Users are responsible for meeting the Data Management obligations of their home institutions and granting agencies. In general, SSRL provides data acquisition systems (computers/software) and short term data storage on all of its beam lines. The beam line computers are connected to central servers via a high speed network, and data are transferred to these servers for backup and short-term storage. SSRL does not provide long term storage or archiving of data; users must

  9. Specific heat investigation for line nodes in heavily overdoped Ba1-xKxFe2As2

    DOE Public Access Gateway for Energy & Science Beta (PAGES Beta)

    Kim, J. S.; Stewart, G. R.; Liu, Yong; Lograsso, Thomas A.

    2015-06-10

    Previous research has found that the pairing symmetry in the iron-based superconductor Ba1-xKxFe2As2 changes from nodeless s-wave near optimally doped, x≈0.4-0.55 and Tc>30 K, to nodal (either d-wave or s-wave) at the pure endpoint, x=1 and Tc<4 K. Intense theoretical interest has been focused on this possibility of changing pairing symmetry, where in the transition region both order parameters would be present and time reversal symmetry would be broken. Here we report specific heat measurements in zero and applied magnetic fields down to 0.4 K of three individual single crystals, free of low temperature magnetic anomalies, of heavily overdoped Ba1-xKxFe2As2,more » x= 0.91, 0.88, and 0.81. The values for Tcmid are 5.6, 7.2 and 13 K and for Hc2≈ 4.5, 6, and 20 T respectively. Furthermore, the data can be analyzed in a two gap scenario, Δ2/Δ1 ≈ 4, with the magnetic field dependence of γ (=C/T as T→0) showing an anisotropic ‘S-shaped’ behavior vs H, with the suppression of the lower gap by 1 T and γ ≈ H1/2 overall. Although such a non-linear γ vs H is consistent with deep minima or nodes in the gap structure, it is not clear evidence for one, or both, of the gaps being nodal in these overdoped samples. Thus, following the established theoretical analysis of the specific heat of d-wave cuprate superconductors containing line nodes, we present the specific heat normalized by H1/2 plotted vs T/H1/2 of these heavily overdoped Ba1-xKxFe2As2 samples which – thanks to the absence of magnetic impurities in our sample - convincingly shows the expected scaling for line node behavior for the larger gap for all three compositions. There is however no clear observation of the nodal behavior C ∝ αT2 in zero field at low temperatures, with α ≤ 2 mJ/molK3 being consistent with the data. Together with the scaling, this leaves open the possibility of extreme anisotropy in a nodeless larger gap, Δ2, such that the scaling works for fields above 0.25 – 0.5 T (0.2 – 0.4 K in temperature units), where this an estimate for the size of the deep minima in the Δ2 ~ 20-25 K gap. Furthermore, the location of the change from nodeless→nodal gaps between optimally doped and heavily overdoped Ba1-xKxFe2As2 based on the present work may be closer to the KFe2As2 endpoint than x=0.91.« less

  10. Management of Nuclear Materials

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2009-08-17

    To establish requirements for the lifecycle management of DOE owned and/or managed accountable nuclear materials. Cancels DOE O 5660.1B.

  11. Integrated Safety Management Policy

    Broader source: Energy.gov [DOE]

    This Integrated Safety Management (ISM) System Description (ISMSD) defines how the U.S. Department of Energy (DOE) Office of Environmental Management (EM) integrates environment, safety, and health...

  12. Land Management - Hanford Site

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Land Management About Us About Hanford Cleanup Hanford History Hanford Site Wide Programs Contact Us Land Management Email Email Page | Print Print Page |Text Increase Font Size...

  13. Contract/Project Management

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Third Quarter Overall Contract and Project Management Performance Metrics and Targets 1 ContractProject Management Primary Performance Metrics FY 2010 Target FY 2010 Forecast FY ...

  14. PRC Contract Management Plan

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    ... Integrated Performance Evaluation Management System in RIMS, which includes DOE Orders 226.1B and 414.1D. The Contractor Integrated Performance Evaluation Management System ...

  15. Data Management Policy The

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Management Policy The guidelines below describe Data Management procedures, processes and resources that need to be understood by both user projects and in-house research. 1....

  16. End Points Management

    Broader source: Energy.gov [DOE]

    The policy of the EM is that a formal project management approach be used for the planning, managing, and conducting of its projects.

  17. Supply Management Specialist

    Broader source: Energy.gov [DOE]

    This position is located in the Logistics Management organization (NSL), Supply Chain Services (NS), Chief Administrative Office (N). NSL manages the warehousing of materials; the investment...

  18. COMPREHENSIVE LEGACY MANAGEMENT

    Office of Legacy Management (LM)

    Fernald Preserve, Fernald, Ohio Comprehensive Legacy Management and Institutional Controls ... blank LMSFERS03496-8.0 Comprehensive Legacy Management and Institutional Controls ...

  19. Contract/Project Management

    Office of Environmental Management (EM)

    Third Quarter Overall Contract and Project Management Improvement Performance Metrics and Targets 1 ContractProject Management Performance Metric FY 2012 Target FY 2012 Forecast ...

  20. Contract/Project Management

    Office of Environmental Management (EM)

    Fourth Quarter Overall Contract and Project Management Improvement Performance Metrics and Targets 1 ContractProject Management Primary Performance Metrics FY 2011 Target FY 2011 ...

  1. Contract/Project Management

    Office of Environmental Management (EM)

    3 First Quarter Overall Contract and Project Management Improvement Performance Metrics and Targets 1 ContractProject Management Performance Metric FY 2013 Target FY 2013 Final FY ...

  2. Contract/Project Management

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Third Quarter Overall Contract and Project Management Improvement Performance Metrics and Targets 1 ContractProject Management Primary Performance Metrics FY 2011 Target FY 2011 ...

  3. Contract/Project Management

    Energy Savers [EERE]

    Fourth Quarter Overall Contract and Project Management Improvement Performance Metrics and Targets 1 ContractProject Management Performance Metric FY 2012 Target FY 2012 Final FY ...

  4. Contract/Project Management

    Energy Savers [EERE]

    First Quarter Overall Contract and Project Management Improvement Performance Metrics and Targets 1 ContractProject Management Performance Metric FY 2012 Target FY 2012 Forecast ...

  5. Ross Management | Open Energy Information

    Open Energy Info (EERE)

    Management Jump to: navigation, search Name: Ross Management Place: Goldendale, Washington State Product: Ross Management is the management parent for a group of family owned...

  6. Fleet Management | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Property Fleet Management Fleet Management Fleet management includes commercial and agency owned motor vehicles such as cars, vans, trucks, and buses. Fleet (vehicle) management ...

  7. Operational Management | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Operational Management Operational Management Operational Management Leadership Contact Information Office of Resource Management and Planning U.S. Department of Energy, MA-1.1 ...

  8. Creative Environmental Networks | Open Energy Information

    Open Energy Info (EERE)

    Environmental Networks Jump to: navigation, search Name: Creative Environmental Networks Place: United Kingdom Zip: CR7 7JG Sector: Biomass, Renewable Energy, Services Product:...

  9. Networks, smart grids: new model for synchronization

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Networks, smart grids: new model for synchronization Networks, smart grids: new model for synchronization Researchers developed a surprisingly simple mathematical model that ...

  10. Better Buildings Network View December 2015

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    ... Email the details to Better Buildings Residential Network support. Social Media Spotlight: ... Better Buildings Residential Network is social media and in your materials. pleased to ...

  11. Better Buildings Residential Network Orientation Webinar | Department...

    Broader source: Energy.gov (indexed) [DOE]

    May 14, 2015. Call Slides and Discussion Summary More Documents & Publications Better Buildings Residential Network Orientation Webinar Better Buildings Residential Network...

  12. Better Buildings Residential Network Orientation | Department...

    Broader source: Energy.gov (indexed) [DOE]

    Summary, March 27, 2014. Call Slides and Summary More Documents & Publications Better Buildings Residential Network Orientation Webinar Better Buildings Residential Network...

  13. Structure Learning in Power Distribution Networks (Technical...

    Office of Scientific and Technical Information (OSTI)

    Structure Learning in Power Distribution Networks Citation Details In-Document Search Title: Structure Learning in Power Distribution Networks You are accessing a document from ...

  14. Clean Economy Network | Open Energy Information

    Open Energy Info (EERE)

    Network Jump to: navigation, search Name: Clean Economy Network Place: Washington, Washington, DC Zip: 20004 Product: Washingt (DC-based advocacy group focused on clean energy and...

  15. Rural Innovations Network | Open Energy Information

    Open Energy Info (EERE)

    Network Jump to: navigation, search Name: Rural Innovations Network Place: India Sector: Services Product: General Financial & Legal Services ( Charity Non-profit Association...

  16. Residential Energy Services Network (RESNET) Conference | Department...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Residential Energy Services Network (RESNET) Conference Residential Energy Services Network (RESNET) Conference February 29, 2016 9:00AM EST to March 2, 2016 5:0

  17. Indigenous Environmental Network | Open Energy Information

    Open Energy Info (EERE)

    Indigenous Environmental Network Name: Indigenous Environmental Network Address: PO Box 485 Place: Bemidji, MN Year Founded: 1990 Phone Number: (218) 751-4967 Website:...

  18. Silver Spring Networks Inc | Open Energy Information

    Open Energy Info (EERE)

    Spring Networks Inc Jump to: navigation, search Name: Silver Spring Networks Inc Place: Redwood City, California Zip: 94063 Product: California-based, developer of utility...

  19. Mesoscale Simulations of Coarsening in GB Networks

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Mukul Kumar is the Principal Investigator for Mesoscale Simulations of Coarsening in GB Networks LLNL BES Programs Highlight Mesoscale Simulations of Coarsening in GB Networks The...

  20. Grencubator. Ukrainian energy innovation network | Open Energy...

    Open Energy Info (EERE)

    Grencubator. Ukrainian energy innovation network Jump to: navigation, search Name: Greencubator. Ukrainian energy innovation network Place: Kyiv, Ukraine Number of Employees: 1-10...

  1. EA-1964: National Ecological Observation Network (NEON)

    Broader source: Energy.gov [DOE]

    The National Science Foundation (NSF) prepared an EA that evaluated potential environmental impacts of the proposed National Ecological Observation Network (NEON), a continental-scale network of...

  2. Biomass Rapid Analysis Network (BRAN)

    SciTech Connect (OSTI)

    Not Available

    2003-10-01

    Helping the emerging biotechnology industry develop new tools and methods for real-time analysis of biomass feedstocks, process intermediates and The Biomass Rapid Analysis Network is designed to fast track the development of modern tools and methods for biomass analysis to accelerate the development of the emerging industry. The network will be led by industry and organized and coordinated through the National Renewable Energy Lab. The network will provide training and other activities of interest to BRAN members. BRAN members will share the cost and work of rapid analysis method development, validate the new methods, and work together to develop the training for the future biomass conversion workforce.

  3. EIA - Natural Gas Pipeline Network - Network Configuration & System Design

    U.S. Energy Information Administration (EIA) Indexed Site

    Network Configuration & System Design About U.S. Natural Gas Pipelines - Transporting Natural Gas based on data through 2007/2008 with selected updates Network Configuration and System Design Overview | Transmission/Storage | Design Criteria | Importance of Storage| Overall Pipeline System Configuration Overview A principal requirement of the natural gas transmission system is that it be capable of meeting the peak demand of its shippers who have contracts for firm service. To meet this

  4. Chemical Management Contacts

    Broader source: Energy.gov [DOE]

    Contacts for additional information on Chemical Management and brief description on Energy Facility Contractors Group

  5. Environmental Management System

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Management System Environmental Management System An Environmental Management System is a systematic method for assessing mission activities, determining the environmental impacts of those activities, prioritizing improvements, and measuring results. May 30, 2012 The continuous improvement cycle Our Environmental Management System encourages continuous improvement of our environmental performance. Contact Environmental Communication & Public Involvement P.O. Box 1663 MS M996 Los Alamos, NM

  6. Tetraarylborate polymer networks as single-ion conducting solid electrolytes

    SciTech Connect (OSTI)

    Van Humbeck, Jeffrey F.; Aubrey, Michael L.; Alsbaiee, Alaaeddin; Ameloot, Rob; Coates, Geoffrey W.; Dichtel, William R.; Long, Jeffrey R.

    2015-06-23

    A new family of solid polymer electrolytes based upon anionic tetrakis(phenyl)borate tetrahedral nodes and linear bis-alkyne linkers is reported. Sonogashira polymerizations using tetrakis(4-iodophenyl)borate, tetrakis(4-iodo-2,3,5,6-tetrafluorophenyl)borate and tetrakis(4-bromo-2,3,5,6-tetrafluorophenyl)borate delivered highly cross-linked polymer networks with both 1,4-diethynylbeznene and a tri(ethylene glycol) substituted derivative. Promising initial conductivity metrics have been observed, including high room temperature conductivities (up to 2.7 × 10-4 S cm-1), moderate activation energies (0.25–0.28 eV), and high lithium ion transport numbers (up to tLi+ = 0.93). Initial investigations into the effects of important materials parameters such as bulk morphology, porosity, fluorination, and other chemical modification, provide starting design parameters for further development of this new class of solid electrolytes.

  7. Tetraarylborate polymer networks as single-ion conducting solid electrolytes

    DOE Public Access Gateway for Energy & Science Beta (PAGES Beta)

    Van Humbeck, Jeffrey F.; Aubrey, Michael L.; Alsbaiee, Alaaeddin; Ameloot, Rob; Coates, Geoffrey W.; Dichtel, William R.; Long, Jeffrey R.

    2015-06-23

    A new family of solid polymer electrolytes based upon anionic tetrakis(phenyl)borate tetrahedral nodes and linear bis-alkyne linkers is reported. Sonogashira polymerizations using tetrakis(4-iodophenyl)borate, tetrakis(4-iodo-2,3,5,6-tetrafluorophenyl)borate and tetrakis(4-bromo-2,3,5,6-tetrafluorophenyl)borate delivered highly cross-linked polymer networks with both 1,4-diethynylbeznene and a tri(ethylene glycol) substituted derivative. Promising initial conductivity metrics have been observed, including high room temperature conductivities (up to 2.7 × 10-4 S cm-1), moderate activation energies (0.25–0.28 eV), and high lithium ion transport numbers (up to tLi+ = 0.93). Initial investigations into the effects of important materials parameters such as bulk morphology, porosity, fluorination, and other chemical modification, provide starting design parameters for furthermore » development of this new class of solid electrolytes.« less

  8. Program for Online Network Inversion

    Energy Science and Technology Software Center (OSTI)

    2009-12-21

    PONI determines the source location of a contamination incident in a water distribution network. PONI uses large scale optimization methods to predict likely source locations by reconciling the differences between observations and numerical predictions of possible contamination incidents.

  9. Networking and Solar Technical Assistance

    Broader source: Energy.gov [DOE]

    The SunShot Initiative provides state and local decision-makers with timely and actionable resources, peer networks, and technical assistance to lower local market barriers and establish best...

  10. ARM - Field Campaign - COSMOS Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    or call us at 1-888-ARM-DATA. Send Campaign : COSMOS Network 2010.08.05 - 2013.08.01 Lead Scientist : Marek Zreda For data sets, see below. Abstract Cosmic-ray soil moisture...

  11. Better Buildings Network View | February 2015 | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    5 Better Buildings Network View | February 2015 The Better Buildings Network View monthly newsletter from the U.S. Department of Energy's Better Buildings Residential Network. PDF icon Better Buildings Network View February 2015 More Documents & Publications Better Buildings Network View | June 2015 Nothing But Networking for Residential Network Members Better Buildings Network View | November 2014

  12. High Energy Physics and Nuclear Physics Network Requirements

    SciTech Connect (OSTI)

    Dart, Eli; Bauerdick, Lothar; Bell, Greg; Ciuffo, Leandro; Dasu, Sridhara; Dattoria, Vince; De, Kaushik; Ernst, Michael; Finkelson, Dale; Gottleib, Steven; Gutsche, Oliver; Habib, Salman; Hoeche, Stefan; Hughes-Jones, Richard; Ibarra, Julio; Johnston, William; Kisner, Theodore; Kowalski, Andy; Lauret, Jerome; Luitz, Steffen; Mackenzie, Paul; Maguire, Chales; Metzger, Joe; Monga, Inder; Ng, Cho-Kuen; Nielsen, Jason; Price, Larry; Porter, Jeff; Purschke, Martin; Rai, Gulshan; Roser, Rob; Schram, Malachi; Tull, Craig; Watson, Chip; Zurawski, Jason

    2014-03-02

    The Energy Sciences Network (ESnet) is the primary provider of network connectivity for the U.S. Department of Energy (DOE) Office of Science (SC), the single largest supporter of basic research in the physical sciences in the United States. In support of SC programs, ESnet regularly updates and refreshes its understanding of the networking requirements needed by instruments, facilities, scientists, and science programs that it serves. This focus has helped ESnet to be a highly successful enabler of scientific discovery for over 25 years. In August 2013, ESnet and the DOE SC Offices of High Energy Physics (HEP) and Nuclear Physics (NP) organized a review to characterize the networking requirements of the programs funded by the HEP and NP program offices. Several key findings resulted from the review. Among them: 1. The Large Hadron Collider?s ATLAS (A Toroidal LHC Apparatus) and CMS (Compact Muon Solenoid) experiments are adopting remote input/output (I/O) as a core component of their data analysis infrastructure. This will significantly increase their demands on the network from both a reliability perspective and a performance perspective. 2. The Large Hadron Collider (LHC) experiments (particularly ATLAS and CMS) are working to integrate network awareness into the workflow systems that manage the large number of daily analysis jobs (1 million analysis jobs per day for ATLAS), which are an integral part of the experiments. Collaboration with networking organizations such as ESnet, and the consumption of performance data (e.g., from perfSONAR [PERformance Service Oriented Network monitoring Architecture]) are critical to the success of these efforts. 3. The international aspects of HEP and NP collaborations continue to expand. This includes the LHC experiments, the Relativistic Heavy Ion Collider (RHIC) experiments, the Belle II Collaboration, the Large Synoptic Survey Telescope (LSST), and others. The international nature of these collaborations makes them heavily reliant on transoceanic connectivity, which is subject to longer term service disruptions than terrestrial connectivity. The network engineering aspects of undersea connectivity will continue to be a significant part of the planning, deployment, and operation of the data analysis infrastructure for HEP and NP experiments for the foreseeable future. Given their critical dependency on networking services, the experiments have expressed the need for tight integration (both technically and operationally) of the domestic and the transoceanic parts of the network infrastructure that supports the experiments. 4. The datasets associated with simulations continue to increase in size, and the need to move these datasets between analysis centers is placing ever-increasing demands on networks and on data management systems at the supercomputing centers. In addition, there is a need to harmonize cybersecurity practice with the data transfer performance requirements of the science. This report expands on these points, and addresses others as well. The report contains a findings section in addition to the text of the case studies discussed during the review.

  13. Transactional Network | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Transactional Network Transactional Network Lead Performer: Pacific Northwest National Laboratory - Richland, WA Project Partners: -- Lawrence Berkeley National Laboratory - Berkeley, CA -- Oak Ridge National Laboratory - Oak Ridge, TN -- Transformative Wave - Kent, WA -- Emerson - St. Louis, MO -- NorthWrite - Minneapolis, MN -- EnerNOC - Baltimore, MD DOE Funding: $625,000 Cost Share: N/A Project website: http://transactionalnetwork.pnnl.gov/ Project Term: Jan. 2013 - 2016 Project Objective

  14. Manager`s views of public involvement

    SciTech Connect (OSTI)

    Branch, K.M.; Heerwagen, J.; Bradbury, J.

    1995-12-01

    Four issues commonly form the framework for debates about the acceptability of proposed projects or technologies--the substantive decision or technological choice; the treatment of the community by the proponent organization; the way the decision-making process has been structured and managed; and the status of institutional safeguards and protection. One of the clear messages of cultural theory is that differences in perspectives are a normal and inevitable part of society, and that attempts to resolve differences by persuasion are not likely to work. These findings are useful when considering the goals and possibilities of public involvement as a decision-making tool, and when designing or evaluating public involvement training programs for managers. The research reported here examines the viewpoints and concerns of managers and decision-makers about the four issues identified above, with particular emphasis on their perspectives and concerns about opening decision-making processes to the public and about managers` roles and responsibilities for structuring and managing open decision-making processes. Implications of these findings for public involvement training for managers is also discussed. The data presented in this paper were obtained from face-to-face interviews with managers and decision-makers with experience managing a variety of hazardous waste management decision-making processes. We conducted these interviews in the course of four separate research projects: needs assessments to support the design and development of a public involvement training program for managers; a study of community residents` and managers` perspectives on the chemical stockpile disposal program; an evaluation of the effectiveness of public involvement training for managers in the Department of Energy; and a study to develop indicators of the benefits and costs of public involvement.

  15. 2014 DOE Project Management Workshop

    Broader source: Energy.gov [DOE]

    What:  2014 DOE Project Management Workshop (Meeting the Challenge—Integrated Acquisition & Project Management)

  16. Fact Sheet: Better Buildings Residential Network

    Broader source: Energy.gov [DOE]

    Fact Sheet: Better Buildings Residential Network, increasing the number of American Homes that are energy efficient.

  17. Better Buildings Residential Network Orientation Webinar

    Broader source: Energy.gov [DOE]

    Better Buildings Residential Network Orientation Webinar, call slides and discussion summary, September 11, 2014.

  18. Scalable Node Monitoring

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Code Using CBTF LDMS C B T F LDMS P lugins LA---UR---12---23629 Ltool * Ltool i s t he n ame o f t he t ool w e d erived f rom LDMS * Dynamically l inked * Includes t he f ollowing...

  19. Interactive (login) Nodes

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    should be accessed via ssh to pdsf.nersc.gov. These are the gateways to accessing the rest of PDSF. Users can submit batch jobs as well as view and manipulate their files and...

  20. Data Transfer Nodes

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    to data transfer of some form or fashion. Examples of intended usage would be running python scripts to download data from a remote source, running client software to load data...