National Library of Energy BETA

Sample records for random access memory

  1. Paging memory from random access memory to backing storage in a parallel computer

    DOE Patents [OSTI]

    Archer, Charles J; Blocksome, Michael A; Inglett, Todd A; Ratterman, Joseph D; Smith, Brian E

    2013-05-21

    Paging memory from random access memory (`RAM`) to backing storage in a parallel computer that includes a plurality of compute nodes, including: executing a data processing application on a virtual machine operating system in a virtual machine on a first compute node; providing, by a second compute node, backing storage for the contents of RAM on the first compute node; and swapping, by the virtual machine operating system in the virtual machine on the first compute node, a page of memory from RAM on the first compute node to the backing storage on the second compute node.

  2. Phase-change Random Access Memory: A Scalable Technology

    SciTech Connect (OSTI)

    Raoux, S.; Burr, G; Breitwisch, M; Rettner, C; Chen, Y; Shelby, R; Salinga, M; Krebs, D; Chen, S; Lung, H

    2008-01-01

    Nonvolatile RAM using resistance contrast in phase-change materials [or phase-change RAM (PCRAM)] is a promising technology for future storage-class memory. However, such a technology can succeed only if it can scale smaller in size, given the increasingly tiny memory cells that are projected for future technology nodes (i.e., generations). We first discuss the critical aspects that may affect the scaling of PCRAM, including materials properties, power consumption during programming and read operations, thermal cross-talk between memory cells, and failure mechanisms. We then discuss experiments that directly address the scaling properties of the phase-change materials themselves, including studies of phase transitions in both nanoparticles and ultrathin films as a function of particle size and film thickness. This work in materials directly motivated the successful creation of a series of prototype PCRAM devices, which have been fabricated and tested at phase-change material cross-sections with extremely small dimensions as low as 3 nm x 20 nm. These device measurements provide a clear demonstration of the excellent scaling potential offered by this technology, and they are also consistent with the scaling behavior predicted by extensive device simulations. Finally, we discuss issues of device integration and cell design, manufacturability, and reliability.

  3. Spin-transfer torque magnetoresistive random-access memory technologies for normally off computing (invited)

    SciTech Connect (OSTI)

    Ando, K. Yuasa, S.; Fujita, S.; Ito, J.; Yoda, H.; Suzuki, Y.; Nakatani, Y.; Miyazaki, T.

    2014-05-07

    Most parts of present computer systems are made of volatile devices, and the power to supply them to avoid information loss causes huge energy losses. We can eliminate this meaningless energy loss by utilizing the non-volatile function of advanced spin-transfer torque magnetoresistive random-access memory (STT-MRAM) technology and create a new type of computer, i.e., normally off computers. Critical tasks to achieve normally off computers are implementations of STT-MRAM technologies in the main memory and low-level cache memories. STT-MRAM technology for applications to the main memory has been successfully developed by using perpendicular STT-MRAMs, and faster STT-MRAM technologies for applications to the cache memory are now being developed. The present status of STT-MRAMs and challenges that remain for normally off computers are discussed.

  4. A random access memory immune to single event upset using a T-Resistor

    DOE Patents [OSTI]

    Ochoa, A. Jr.

    1987-10-28

    In a random access memory cell, a resistance ''T'' decoupling network in each leg of the cell reduces random errors caused by the interaction of energetic ions with the semiconductor material forming the cell. The cell comprises two parallel legs each containing a series pair of complementary MOS transistors having a common gate connected to the node between the transistors of the opposite leg. The decoupling network in each leg is formed by a series pair of resistors between the transistors together with a third resistor interconnecting the junction between the pair of resistors and the gate of the transistor pair forming the opposite leg of the cell. 4 figs.

  5. Random access memory immune to single event upset using a T-resistor

    DOE Patents [OSTI]

    Ochoa, Jr., Agustin

    1989-01-01

    In a random access memory cell, a resistance "T" decoupling network in each leg of the cell reduces random errors caused by the interaction of energetic ions with the semiconductor material forming the cell. The cell comprises two parallel legs each containing a series pair of complementary MOS transistors having a common gate connected to the node between the transistors of the opposite leg. The decoupling network in each leg is formed by a series pair of resistors between the transistors together with a third resistor interconnecting the junction between the pair of resistors and the gate of the transistor pair forming the opposite leg of the cell.

  6. Spin-transfer-torque efficiency enhanced by edge-damage of perpendicular magnetic random access memories

    SciTech Connect (OSTI)

    Song, Kyungmi; Lee, Kyung-Jin

    2015-08-07

    We numerically investigate the effect of magnetic and electrical damages at the edge of a perpendicular magnetic random access memory (MRAM) cell on the spin-transfer-torque (STT) efficiency that is defined by the ratio of thermal stability factor to switching current. We find that the switching mode of an edge-damaged cell is different from that of an undamaged cell, which results in a sizable reduction in the switching current. Together with a marginal reduction of the thermal stability factor of an edge-damaged cell, this feature makes the STT efficiency large. Our results suggest that a precise edge control is viable for the optimization of STT-MRAM.

  7. A stochastic simulation method for the assessment of resistive random access memory retention reliability

    SciTech Connect (OSTI)

    Berco, Dan Tseng, Tseung-Yuen

    2015-12-21

    This study presents an evaluation method for resistive random access memory retention reliability based on the Metropolis Monte Carlo algorithm and Gibbs free energy. The method, which does not rely on a time evolution, provides an extremely efficient way to compare the relative retention properties of metal-insulator-metal structures. It requires a small number of iterations and may be used for statistical analysis. The presented approach is used to compare the relative robustness of a single layer ZrO{sub 2} device with a double layer ZnO/ZrO{sub 2} one, and obtain results which are in good agreement with experimental data.

  8. Voltage induced magnetostrictive switching of nanomagnets: Strain assisted strain transfer torque random access memory

    SciTech Connect (OSTI)

    Khan, Asif Nikonov, Dmitri E.; Manipatruni, Sasikanth; Ghani, Tahir; Young, Ian A.

    2014-06-30

    A spintronic device, called the “strain assisted spin transfer torque (STT) random access memory (RAM),” is proposed by combining the magnetostriction effect and the spin transfer torque effect which can result in a dramatic improvement in the energy dissipation relative to a conventional STT-RAM. Magnetization switching in the device which is a piezoelectric-ferromagnetic heterostructure via the combined magnetostriction and STT effect is simulated by solving the Landau-Lifshitz-Gilbert equation incorporating the influence of thermal noise. The simulations show that, in such a device, each of these two mechanisms (magnetostriction and spin transfer torque) provides in a 90° rotation of the magnetization leading a deterministic 180° switching with a critical current significantly smaller than that required for spin torque alone. Such a scheme is an attractive option for writing magnetic RAM cells.

  9. Performance improvement of gadolinium oxide resistive random access memory treated by hydrogen plasma immersion ion implantation

    SciTech Connect (OSTI)

    Wang, Jer-Chyi Hsu, Chih-Hsien; Ye, Yu-Ren; Ai, Chi-Fong; Tsai, Wen-Fa

    2014-03-15

    Characteristics improvement of gadolinium oxide (Gd{sub x}O{sub y}) resistive random access memories (RRAMs) treated by hydrogen plasma immersion ion implantation (PIII) was investigated. With the hydrogen PIII treatment, the Gd{sub x}O{sub y} RRAMs exhibited low set/reset voltages and a high resistance ratio, which were attributed to the enhanced movement of oxygen ions within the Gd{sub x}O{sub y} films and the increased Schottky barrier height at Pt/Gd{sub x}O{sub y} interface, respectively. The resistive switching mechanism of Gd{sub x}O{sub y} RRAMs was dominated by Schottky emission, as proved by the area dependence of the resistance in the low resistance state. After the hydrogen PIII treatment, a retention time of more than 10{sup 4} s was achieved at an elevated measurement temperature. In addition, a stable cycling endurance with the resistance ratio of more than three orders of magnitude of the Gd{sub x}O{sub y} RRAMs can be obtained.

  10. Set statistics in conductive bridge random access memory device with Cu/HfO{sub 2}/Pt structure

    SciTech Connect (OSTI)

    Zhang, Meiyun; Long, Shibing Wang, Guoming; Xu, Xiaoxin; Li, Yang; Liu, Qi; Lv, Hangbing; Liu, Ming; Lian, Xiaojuan; Miranda, Enrique; Su, Jordi

    2014-11-10

    The switching parameter variation of resistive switching memory is one of the most important challenges in its application. In this letter, we have studied the set statistics of conductive bridge random access memory with a Cu/HfO{sub 2}/Pt structure. The experimental distributions of the set parameters in several off resistance ranges are shown to nicely fit a Weibull model. The Weibull slopes of the set voltage and current increase and decrease logarithmically with off resistance, respectively. This experimental behavior is perfectly captured by a Monte Carlo simulator based on the cell-based set voltage statistics model and the Quantum Point Contact electron transport model. Our work provides indications for the improvement of the switching uniformity.

  11. In situ observation of nickel as an oxidizable electrode material for the solid-electrolyte-based resistive random access memory

    SciTech Connect (OSTI)

    Sun, Jun; Wu, Xing; Xu, Feng; Xu, Tao; Sun, Litao; Liu, Qi; Xie, Hongwei; Long, Shibing; Lv, Hangbing; Li, Yingtao; Liu, Ming

    2013-02-04

    In this letter, we dynamically investigate the resistive switching characteristics and physical mechanism of the Ni/ZrO{sub 2}/Pt device. The device shows stable bipolar resistive switching behaviors after forming process, which is similar to the Ag/ZrO{sub 2}/Pt and Cu/ZrO{sub 2}/Pt devices. Using in situ transmission electron microscopy, we observe in real time that several conductive filaments are formed across the ZrO{sub 2} layer between Ni and Pt electrodes after forming. Energy-dispersive X-ray spectroscopy results confirm that Ni is the main composition of the conductive filaments. The ON-state resistance increases with increasing temperature, exhibiting the feature of metallic conduction. In addition, the calculated resistance temperature coefficient is equal to that of the 10-30 nm diameter Ni nanowire, further indicating that the nanoscale Ni conductive bridge is the physical origin of the observed conductive filaments. The resistive switching characteristics and the conductive filament's component of Ni/ZrO{sub 2}/Pt device are consistent with the characteristics of the typical solid-electrolyte-based resistive random access memory. Therefore, aside from Cu and Ag, Ni can also be used as an oxidizable electrode material for resistive random access memory applications.

  12. Effect of embedded metal nanocrystals on the resistive switching characteristics in NiN-based resistive random access memory cells

    SciTech Connect (OSTI)

    Yun, Min Ju; Kim, Hee-Dong; Man Hong, Seok; Hyun Park, Ju; Su Jeon, Dong; Geun Kim, Tae

    2014-03-07

    The metal nanocrystals (NCs) embedded-NiN-based resistive random access memory cells are demonstrated using several metal NCs (i.e., Pt, Ni, and Ti) with different physical parameters in order to investigate the metal NC's dependence on resistive switching (RS) characteristics. First, depending on the electronegativity of metal, the size of metal NCs is determined and this affects the operating current of memory cells. If metal NCs with high electronegativity are incorporated, the size of the NCs is reduced; hence, the operating current is reduced owing to the reduced density of the electric field around the metal NCs. Second, the potential wells are formed by the difference of work function between the metal NCs and active layer, and the barrier height of the potential wells affects the level of operating voltage as well as the conduction mechanism of metal NCs embedded memory cells. Therefore, by understanding these correlations between the active layer and embedded metal NCs, we can optimize the RS properties of metal NCs embedded memory cells as well as predict their conduction mechanisms.

  13. Perpendicular spin transfer torque magnetic random access memories with high spin torque efficiency and thermal stability for embedded applications (invited)

    SciTech Connect (OSTI)

    Thomas, Luc Jan, Guenole; Zhu, Jian; Liu, Huanlong; Lee, Yuan-Jen; Le, Son; Tong, Ru-Ying; Pi, Keyu; Wang, Yu-Jen; Shen, Dongna; He, Renren; Haq, Jesmin; Teng, Jeffrey; Lam, Vinh; Huang, Kenlin; Zhong, Tom; Torng, Terry; Wang, Po-Kang

    2014-05-07

    Magnetic random access memories based on the spin transfer torque phenomenon (STT-MRAMs) have become one of the leading candidates for next generation memory applications. Among the many attractive features of this technology are its potential for high speed and endurance, read signal margin, low power consumption, scalability, and non-volatility. In this paper, we discuss our recent results on perpendicular STT-MRAM stack designs that show STT efficiency higher than 5?k{sub B}T/?A, energy barriers higher than 100?k{sub B}T at room temperature for sub-40?nm diameter devices, and tunnel magnetoresistance higher than 150%. We use both single device data and results from 8?Mb array to demonstrate data retention sufficient for automotive applications. Moreover, we also demonstrate for the first time thermal stability up to 400?C exceeding the requirement of Si CMOS back-end processing, thus opening the realm of non-volatile embedded memory to STT-MRAM technology.

  14. Atomic memory access hardware implementations

    SciTech Connect (OSTI)

    Ahn, Jung Ho; Erez, Mattan; Dally, William J

    2015-02-17

    Atomic memory access requests are handled using a variety of systems and methods. According to one example method, a data-processing circuit having an address-request generator that issues requests to a common memory implements a method of processing the requests using a memory-access intervention circuit coupled between the generator and the common memory. The method identifies a current atomic-memory access request from a plurality of memory access requests. A data set is stored that corresponds to the current atomic-memory access request in a data storage circuit within the intervention circuit. It is determined whether the current atomic-memory access request corresponds to at least one previously-stored atomic-memory access request. In response to determining correspondence, the current request is implemented by retrieving data from the common memory. The data is modified in response to the current request and at least one other access request in the memory-access intervention circuit.

  15. Total ionizing dose effect of γ-ray radiation on the switching characteristics and filament stability of HfOx resistive random access memory

    SciTech Connect (OSTI)

    Fang, Runchen; Yu, Shimeng; Gonzalez Velo, Yago; Chen, Wenhao; Holbert, Keith E.; Kozicki, Michael N.; Barnaby, Hugh

    2014-05-05

    The total ionizing dose (TID) effect of gamma-ray (γ-ray) irradiation on HfOx based resistive random access memory was investigated by electrical and material characterizations. The memory states can sustain TID level ∼5.2 Mrad (HfO{sub 2}) without significant change in the functionality or the switching characteristics under pulse cycling. However, the stability of the filament is weakened after irradiation as memory states are more vulnerable to flipping under the electrical stress. X-ray photoelectron spectroscopy was performed to ascertain the physical mechanism of the stability degradation, which is attributed to the Hf-O bond breaking by the high-energy γ-ray exposure.

  16. Implementation of nitrogen-doped titanium-tungsten tunable heater in phase change random access memory and its effects on device performance

    SciTech Connect (OSTI)

    Tan, Chun Chia; Zhao, Rong Chong, Tow Chong; Shi, Luping

    2014-10-13

    Nitrogen-doped titanium-tungsten (N-TiW) was proposed as a tunable heater in Phase Change Random Access Memory (PCRAM). By tuning N-TiW's material properties through doping, the heater can be tailored to optimize the access speed and programming current of PCRAM. Experiments reveal that N-TiW's resistivity increases and thermal conductivity decreases with increasing nitrogen-doping ratio, and N-TiW devices displayed (∼33% to ∼55%) reduced programming currents. However, there is a tradeoff between the current and speed for heater-based PCRAM. Analysis of devices with different N-TiW heaters shows that N-TiW doping levels could be optimized to enable low RESET currents and fast access speeds.

  17. Remote direct memory access

    DOE Patents [OSTI]

    Archer, Charles J.; Blocksome, Michael A.

    2012-12-11

    Methods, parallel computers, and computer program products are disclosed for remote direct memory access. Embodiments include transmitting, from an origin DMA engine on an origin compute node to a plurality target DMA engines on target compute nodes, a request to send message, the request to send message specifying a data to be transferred from the origin DMA engine to data storage on each target compute node; receiving, by each target DMA engine on each target compute node, the request to send message; preparing, by each target DMA engine, to store data according to the data storage reference and the data length, including assigning a base storage address for the data storage reference; sending, by one or more of the target DMA engines, an acknowledgment message acknowledging that all the target DMA engines are prepared to receive a data transmission from the origin DMA engine; receiving, by the origin DMA engine, the acknowledgement message from the one or more of the target DMA engines; and transferring, by the origin DMA engine, data to data storage on each of the target compute nodes according to the data storage reference using a single direct put operation.

  18. Low leakage Ru-strontium titanate-Ru metal-insulator-metal capacitors for sub-20 nm technology node in dynamic random access memory

    SciTech Connect (OSTI)

    Popovici, M. Swerts, J.; Redolfi, A.; Kaczer, B.; Aoulaiche, M.; Radu, I.; Clima, S.; Everaert, J.-L.; Van Elshocht, S.; Jurczak, M.

    2014-02-24

    Improved metal-insulator-metal capacitor (MIMCAP) stacks with strontium titanate (STO) as dielectric sandwiched between Ru as top and bottom electrode are shown. The Ru/STO/Ru stack demonstrates clearly its potential to reach sub-20 nm technology nodes for dynamic random access memory. Downscaling of the equivalent oxide thickness, leakage current density (J{sub g}) of the MIMCAPs, and physical thickness of the STO have been realized by control of the Sr/Ti ratio and grain size using a heterogeneous TiO{sub 2}/STO based nanolaminate stack deposition and a two-step crystallization anneal. Replacement of TiN with Ru as both top and bottom electrodes reduces the amount of electrically active defects and is essential to achieve a low leakage current in the MIM capacitor.

  19. Detrimental effect of interfacial Dzyaloshinskii-Moriya interaction on perpendicular spin-transfer-torque magnetic random access memory

    SciTech Connect (OSTI)

    Jang, Peong-Hwa; Lee, Seo-Won E-mail: kj-lee@korea.ac.kr; Song, Kyungmi; Lee, Seung-Jae; Lee, Kyung-Jin E-mail: kj-lee@korea.ac.kr

    2015-11-16

    Interfacial Dzyaloshinskii-Moriya interaction in ferromagnet/heavy metal bilayers is recently of considerable interest as it offers an efficient control of domain walls and the stabilization of magnetic skyrmions. However, its effect on the performance of perpendicular spin transfer torque memory has not been explored yet. We show based on numerical studies that the interfacial Dzyaloshinskii-Moriya interaction decreases the thermal energy barrier while increases the switching current. As high thermal energy barrier as well as low switching current is required for the commercialization of spin torque memory, our results suggest that the interfacial Dzyaloshinskii-Moriya interaction should be minimized for spin torque memory applications.

  20. Correlative transmission electron microscopy and electrical properties study of switchable phase-change random access memory line cells

    SciTech Connect (OSTI)

    Oosthoek, J. L. M.; Kooi, B. J.; Voogt, F. C.; Attenborough, K.; Verheijen, M. A.; Hurkx, G. A. M.; Gravesteijn, D. J.

    2015-02-14

    Phase-change memory line cells, where the active material has a thickness of 15 nm, were prepared for transmission electron microscopy (TEM) observation such that they still could be switched and characterized electrically after the preparation. The result of these observations in comparison with detailed electrical characterization showed (i) normal behavior for relatively long amorphous marks, resulting in a hyperbolic dependence between SET resistance and SET current, indicating a switching mechanism based on initially long and thin nanoscale crystalline filaments which thicken gradually, and (ii) anomalous behavior, which holds for relatively short amorphous marks, where initially directly a massive crystalline filament is formed that consumes most of the width of the amorphous mark only leaving minor residual amorphous regions at its edges. The present results demonstrate that even in (purposely) thick TEM samples, the TEM sample preparation hampers the probability to observe normal behavior and it can be debated whether it is possible to produce electrically switchable TEM specimen in which the memory cells behave the same as in their original bulk embedded state.

  1. Correlation of anomalous write error rates and ferromagnetic resonance spectrum in spin-transfer-torque-magnetic-random-access-memory devices containing in-plane free layers

    SciTech Connect (OSTI)

    Evarts, Eric R.; Rippard, William H.; Pufall, Matthew R.; Heindl, Ranko

    2014-05-26

    In a small fraction of magnetic-tunnel-junction-based magnetic random-access memory devices with in-plane free layers, the write-error rates (WERs) are higher than expected on the basis of the macrospin or quasi-uniform magnetization reversal models. In devices with increased WERs, the product of effective resistance and area, tunneling magnetoresistance, and coercivity do not deviate from typical device properties. However, the field-swept, spin-torque, ferromagnetic resonance (FS-ST-FMR) spectra with an applied DC bias current deviate significantly for such devices. With a DC bias of 300 mV (producing 9.9 × 10{sup 6} A/cm{sup 2}) or greater, these anomalous devices show an increase in the fraction of the power present in FS-ST-FMR modes corresponding to higher-order excitations of the free-layer magnetization. As much as 70% of the power is contained in higher-order modes compared to ≈20% in typical devices. Additionally, a shift in the uniform-mode resonant field that is correlated with the magnitude of the WER anomaly is detected at DC biases greater than 300 mV. These differences in the anomalous devices indicate a change in the micromagnetic resonant mode structure at high applied bias.

  2. Low latency memory access and synchronization

    DOE Patents [OSTI]

    Blumrich, Matthias A.; Chen, Dong; Coteus, Paul W.; Gara, Alan G.; Giampapa, Mark E.; Heidelberger, Philip; Hoenicke, Dirk; Ohmacht, Martin; Steinmacher-Burow, Burkhard D.; Takken, Todd E. , Vranas; Pavlos M.

    2010-10-19

    A low latency memory system access is provided in association with a weakly-ordered multiprocessor system. Bach processor in the multiprocessor shares resources, and each shared resource has an associated lock within a locking device that provides support for synchronization between the multiple processors in the multiprocessor and the orderly sharing of the resources. A processor only has permission to access a resource when it owns the lock associated with that resource, and an attempt by a processor to own a lock requires only a single load operation, rather than a traditional atomic load followed by store, such that the processor only performs a read operation and the hardware locking device performs a subsequent write operation rather than the processor. A simple prefetching for non-contiguous data structures is also disclosed. A memory line is redefined so that in addition to the normal physical memory data, every line includes a pointer that is large enough to point to any other line in the memory, wherein the pointers to determine which memory line to prefetch rather than some other predictive algorithm. This enables hardware to effectively prefetch memory access patterns that are non-contiguous, but repetitive.

  3. Low latency memory access and synchronization

    DOE Patents [OSTI]

    Blumrich, Matthias A.; Chen, Dong; Coteus, Paul W.; Gara, Alan G.; Giampapa, Mark E.; Heidelberger, Philip; Hoenicke, Dirk; Ohmacht, Martin; Steinmacher-Burow, Burkhard D.; Takken, Todd E.; Vranas, Pavlos M.

    2007-02-06

    A low latency memory system access is provided in association with a weakly-ordered multiprocessor system. Each processor in the multiprocessor shares resources, and each shared resource has an associated lock within a locking device that provides support for synchronization between the multiple processors in the multiprocessor and the orderly sharing of the resources. A processor only has permission to access a resource when it owns the lock associated with that resource, and an attempt by a processor to own a lock requires only a single load operation, rather than a traditional atomic load followed by store, such that the processor only performs a read operation and the hardware locking device performs a subsequent write operation rather than the processor. A simple prefetching for non-contiguous data structures is also disclosed. A memory line is redefined so that in addition to the normal physical memory data, every line includes a pointer that is large enough to point to any other line in the memory, wherein the pointers to determine which memory line to prefetch rather than some other predictive algorithm. This enables hardware to effectively prefetch memory access patterns that are non-contiguous, but repetitive.

  4. Influence of carbon content on the copper-telluride phase formation and on the resistive switching behavior of carbon alloyed Cu-Te conductive bridge random access memory cells

    SciTech Connect (OSTI)

    Devulder, Wouter De Schutter, Bob; Detavernier, Christophe; Opsomer, Karl; Franquet, Alexis; Meersschaut, Johan; Muller, Robert; Van Elshocht, Sven; Jurczak, Malgorzata; Goux, Ludovic; Belmonte, Attilio

    2014-02-07

    In this paper, we investigate the influence of the carbon content on the Cu-Te phase formation and on the resistive switching behavior in carbon alloyed Cu{sub 0.6}Te{sub 0.4} based conductive bridge random access memory (CBRAM) cells. Carbon alloying of copper-tellurium inhibits the crystallization, while attractive switching behavior is preserved when using the material as Cu-supply layer in CBRAM cells. The phase formation is first investigated in a combinatorial way. With increasing carbon content, an enlargement of the temperature window in which the material stays amorphous was observed. Moreover, if crystalline phases are formed, subsequent phase transformations are inhibited. The electrical switching behavior of memory cells with different carbon contents is then investigated by implementing them in 580 μm diameter dot TiN/Cu{sub 0.6}Te{sub 0.4}-C/Al{sub 2}O{sub 3}/Si memory cells. Reliable switching behavior is observed for carbon contents up to 40 at. %, with a resistive window of more than 2 orders of magnitude, whereas for 50 at. % carbon, a higher current in the off state and only a small resistive window are present after repeated cycling. This degradation can be ascribed to the higher thermal and lower drift contribution to the reset operation due to a lower Cu affinity towards the supply layer, leading cycle-after-cycle to an increasing amount of Cu in the switching layer, which contributes to the current. The thermal diffusion of Cu into Al{sub 2}O{sub 3} under annealing also gives an indication of the Cu affinity of the source layer. Time of flight secondary ion mass spectroscopy was used to investigate this migration depth in Al{sub 2}O{sub 3} before and after annealing, showing a higher Cu, Te, and C migration for high carbon contents.

  5. Effect of annealing treatment on the electrical characteristics of Pt/Cr-embedded ZnO/Pt resistance random access memory devices

    SciTech Connect (OSTI)

    Chang, Li-Chun; Kao, Hsuan-Ling; Liu, Keng-Hao

    2014-03-15

    ZnO/Cr/ZnO trilayer films sandwiched with Pt electrodes were prepared for nonvolatile resistive memory applications. The threshold voltage of a ZnO device embedded with a 3-nm Cr interlayer was approximately 50% lower than that of a ZnO monolayer device. This study investigated threshold voltage as a function of Cr thickness. Both the ZnO monolayer device and the Cr-embedded ZnO device structures exhibited resistance switching under electrical bias both before and after rapid thermal annealing (RTA) treatment, but resistive switching effects in the two cases exhibited distinct characteristics. Compared with the as-fabricated device, the memory cell after RTA demonstrated remarkable device parameter improvements, including a lower threshold voltage, a lower write current, and a higher R{sub off}/R{sub on} ratio. Both transmission electron microscope observations and Auger electron spectroscopy revealed that the Cr charge trapping layer in Cr-embedded ZnO dispersed uniformly into the storage medium after RTA, and x-ray diffraction and x-ray photoelectron spectroscopy analyses demonstrated that the Cr atoms lost electrons to become Cr{sup 3+} ions after dispersion. These results indicated that the altered status of Cr in ZnO/Cr/ZnO trilayer films during RTA treatment was responsible for the switching mechanism transition.

  6. Direct memory access transfer completion notification

    DOE Patents [OSTI]

    Chen, Dong; Giampapa, Mark E.; Heidelberger, Philip; Kumar, Sameer; Parker, Jeffrey J.; Steinmacher-Burow, Burkhard D.; Vranas, Pavlos

    2010-07-27

    Methods, compute nodes, and computer program products are provided for direct memory access (`DMA`) transfer completion notification. Embodiments include determining, by an origin DMA engine on an origin compute node, whether a data descriptor for an application message to be sent to a target compute node is currently in an injection first-in-first-out (`FIFO`) buffer in dependence upon a sequence number previously associated with the data descriptor, the total number of descriptors currently in the injection FIFO buffer, and the current sequence number for the newest data descriptor stored in the injection FIFO buffer; and notifying a processor core on the origin DMA engine that the message has been sent if the data descriptor for the message is not currently in the injection FIFO buffer.

  7. Remote direct memory access over datagrams

    SciTech Connect (OSTI)

    Grant, Ryan Eric; Rashti, Mohammad Javad; Balaji, Pavan; Afsahi, Ahmad

    2014-12-02

    A communication stack for providing remote direct memory access (RDMA) over a datagram network is disclosed. The communication stack has a user level interface configured to accept datagram related input and communicate with an RDMA enabled network interface card (NIC) via an NIC driver. The communication stack also has an RDMA protocol layer configured to supply one or more data transfer primitives for the datagram related input of the user level. The communication stack further has a direct data placement (DDP) layer configured to transfer the datagram related input from a user storage to a transport layer based on the one or more data transfer primitives by way of a lower layer protocol (LLP) over the datagram network.

  8. Generation-based memory synchronization in a multiprocessor system with weakly consistent memory accesses

    SciTech Connect (OSTI)

    Ohmacht, Martin

    2014-09-09

    In a multiprocessor system, a central memory synchronization module coordinates memory synchronization requests responsive to memory access requests in flight, a generation counter, and a reclaim pointer. The central module communicates via point-to-point communication. The module includes a global OR reduce tree for each memory access requesting device, for detecting memory access requests in flight. An interface unit is implemented associated with each processor requesting synchronization. The interface unit includes multiple generation completion detectors. The generation count and reclaim pointer do not pass one another.

  9. 2015 Salishan Random Access (Conference) | SciTech Connect

    Office of Scientific and Technical Information (OSTI)

    Title: 2015 Salishan Random Access Authors: Vigil, Benny Manuel 1 ; Mattson, Tim 2 ; Coteus, Paul 3 ; Lucas, Bob 4 ; Michalak, Sarah 1 ; Choi, Sung-Eun 5 ; Mountain, ...

  10. Direct access inter-process shared memory

    DOE Patents [OSTI]

    Brightwell, Ronald B; Pedretti, Kevin; Hudson, Trammell B

    2013-10-22

    A technique for directly sharing physical memory between processes executing on processor cores is described. The technique includes loading a plurality of processes into the physical memory for execution on a corresponding plurality of processor cores sharing the physical memory. An address space is mapped to each of the processes by populating a first entry in a top level virtual address table for each of the processes. The address space of each of the processes is cross-mapped into each of the processes by populating one or more subsequent entries of the top level virtual address table with the first entry in the top level virtual address table from other processes.

  11. Fencing direct memory access data transfers in a parallel active messaging interface of a parallel computer

    DOE Patents [OSTI]

    Blocksome, Michael A.; Mamidala, Amith R.

    2013-09-03

    Fencing direct memory access (`DMA`) data transfers in a parallel active messaging interface (`PAMI`) of a parallel computer, the PAMI including data communications endpoints, each endpoint including specifications of a client, a context, and a task, the endpoints coupled for data communications through the PAMI and through DMA controllers operatively coupled to segments of shared random access memory through which the DMA controllers deliver data communications deterministically, including initiating execution through the PAMI of an ordered sequence of active DMA instructions for DMA data transfers between two endpoints, effecting deterministic DMA data transfers through a DMA controller and a segment of shared memory; and executing through the PAMI, with no FENCE accounting for DMA data transfers, an active FENCE instruction, the FENCE instruction completing execution only after completion of all DMA instructions initiated prior to execution of the FENCE instruction for DMA data transfers between the two endpoints.

  12. Fencing direct memory access data transfers in a parallel active messaging interface of a parallel computer

    DOE Patents [OSTI]

    Blocksome, Michael A; Mamidala, Amith R

    2014-02-11

    Fencing direct memory access (`DMA`) data transfers in a parallel active messaging interface (`PAMI`) of a parallel computer, the PAMI including data communications endpoints, each endpoint including specifications of a client, a context, and a task, the endpoints coupled for data communications through the PAMI and through DMA controllers operatively coupled to segments of shared random access memory through which the DMA controllers deliver data communications deterministically, including initiating execution through the PAMI of an ordered sequence of active DMA instructions for DMA data transfers between two endpoints, effecting deterministic DMA data transfers through a DMA controller and a segment of shared memory; and executing through the PAMI, with no FENCE accounting for DMA data transfers, an active FENCE instruction, the FENCE instruction completing execution only after completion of all DMA instructions initiated prior to execution of the FENCE instruction for DMA data transfers between the two endpoints.

  13. Direct memory access transfer completion notification

    DOE Patents [OSTI]

    Archer, Charles J.; Blocksome, Michael A.; Parker, Jeffrey J.

    2011-02-15

    DMA transfer completion notification includes: inserting, by an origin DMA engine on an origin node in an injection first-in-first-out (`FIFO`) buffer, a data descriptor for an application message to be transferred to a target node on behalf of an application on the origin node; inserting, by the origin DMA engine, a completion notification descriptor in the injection FIFO buffer after the data descriptor for the message, the completion notification descriptor specifying a packet header for a completion notification packet; transferring, by the origin DMA engine to the target node, the message in dependence upon the data descriptor; sending, by the origin DMA engine, the completion notification packet to a local reception FIFO buffer using a local memory FIFO transfer operation; and notifying, by the origin DMA engine, the application that transfer of the message is complete in response to receiving the completion notification packet in the local reception FIFO buffer.

  14. Kokkos: Enabling manycore performance portability through polymorphic memory access patterns

    SciTech Connect (OSTI)

    Carter Edwards, H.; Trott, Christian R.; Sunderland, Daniel

    2014-07-22

    The manycore revolution can be characterized by increasing thread counts, decreasing memory per thread, and diversity of continually evolving manycore architectures. High performance computing (HPC) applications and libraries must exploit increasingly finer levels of parallelism within their codes to sustain scalability on these devices. We found that a major obstacle to performance portability is the diverse and conflicting set of constraints on memory access patterns across devices. Contemporary portable programming models address manycore parallelism (e.g., OpenMP, OpenACC, OpenCL) but fail to address memory access patterns. The Kokkos C++ library enables applications and domain libraries to achieve performance portability on diverse manycore architectures by unifying abstractions for both fine-grain data parallelism and memory access patterns. In this paper we describe Kokkos’ abstractions, summarize its application programmer interface (API), present performance results for unit-test kernels and mini-applications, and outline an incremental strategy for migrating legacy C++ codes to Kokkos. Furthermore, the Kokkos library is under active research and development to incorporate capabilities from new generations of manycore architectures, and to address a growing list of applications and domain libraries.

  15. Kokkos: Enabling manycore performance portability through polymorphic memory access patterns

    DOE Public Access Gateway for Energy & Science Beta (PAGES Beta)

    Carter Edwards, H.; Trott, Christian R.; Sunderland, Daniel

    2014-07-22

    The manycore revolution can be characterized by increasing thread counts, decreasing memory per thread, and diversity of continually evolving manycore architectures. High performance computing (HPC) applications and libraries must exploit increasingly finer levels of parallelism within their codes to sustain scalability on these devices. We found that a major obstacle to performance portability is the diverse and conflicting set of constraints on memory access patterns across devices. Contemporary portable programming models address manycore parallelism (e.g., OpenMP, OpenACC, OpenCL) but fail to address memory access patterns. The Kokkos C++ library enables applications and domain libraries to achieve performance portability on diversemore » manycore architectures by unifying abstractions for both fine-grain data parallelism and memory access patterns. In this paper we describe Kokkos’ abstractions, summarize its application programmer interface (API), present performance results for unit-test kernels and mini-applications, and outline an incremental strategy for migrating legacy C++ codes to Kokkos. Furthermore, the Kokkos library is under active research and development to incorporate capabilities from new generations of manycore architectures, and to address a growing list of applications and domain libraries.« less

  16. Administering an epoch initiated for remote memory access

    SciTech Connect (OSTI)

    Blocksome, Michael A; Miller, Douglas R

    2014-03-18

    Methods, systems, and products are disclosed for administering an epoch initiated for remote memory access that include: initiating, by an origin application messaging module on an origin compute node, one or more data transfers to a target compute node for the epoch; initiating, by the origin application messaging module after initiating the data transfers, a closing stage for the epoch, including rejecting any new data transfers after initiating the closing stage for the epoch; determining, by the origin application messaging module, whether the data transfers have completed; and closing, by the origin application messaging module, the epoch if the data transfers have completed.

  17. Administering an epoch initiated for remote memory access

    DOE Patents [OSTI]

    Blocksome, Michael A.; Miller, Douglas R.

    2013-01-01

    Methods, systems, and products are disclosed for administering an epoch initiated for remote memory access that include: initiating, by an origin application messaging module on an origin compute node, one or more data transfers to a target compute node for the epoch; initiating, by the origin application messaging module after initiating the data transfers, a closing stage for the epoch, including rejecting any new data transfers after initiating the closing stage for the epoch; determining, by the origin application messaging module, whether the data transfers have completed; and closing, by the origin application messaging module, the epoch if the data transfers have completed.

  18. Administering an epoch initiated for remote memory access

    DOE Patents [OSTI]

    Blocksome, Michael A; Miller, Douglas R

    2012-10-23

    Methods, systems, and products are disclosed for administering an epoch initiated for remote memory access that include: initiating, by an origin application messaging module on an origin compute node, one or more data transfers to a target compute node for the epoch; initiating, by the origin application messaging module after initiating the data transfers, a closing stage for the epoch, including rejecting any new data transfers after initiating the closing stage for the epoch; determining, by the origin application messaging module, whether the data transfers have completed; and closing, by the origin application messaging module, the epoch if the data transfers have completed.

  19. Efficient Memory Access with NumPy Global Arrays using Local Memory Access

    SciTech Connect (OSTI)

    Daily, Jeffrey A.; Berghofer, Dan C.

    2013-08-03

    This paper discusses the work completed working with Global Arrays of data on distributed multi-computer systems and improving their performance. The tasks completed were done at Pacific Northwest National Laboratory in the Science Undergrad Laboratory Internship program in the summer of 2013 for the Data Intensive Computing Group in the Fundamental and Computational Sciences DIrectorate. This work was done on the Global Arrays Toolkit developed by this group. This toolkit is an interface for programmers to more easily create arrays of data on networks of computers. This is useful because scientific computation is often done on large amounts of data sometimes so large that individual computers cannot hold all of it. This data is held in array form and can best be processed on supercomputers which often consist of a network of individual computers doing their computation in parallel. One major challenge for this sort of programming is that operations on arrays on multiple computers is very complex and an interface is needed so that these arrays seem like they are on a single computer. This is what global arrays does. The work done here is to use more efficient operations on that data that requires less copying of data to be completed. This saves a lot of time because copying data on many different computers is time intensive. The way this challenge was solved is when data to be operated on with binary operations are on the same computer, they are not copied when they are accessed. When they are on separate computers, only one set is copied when accessed. This saves time because of less copying done although more data access operations were done.

  20. Mapping virtual addresses to different physical addresses for value disambiguation for thread memory access requests

    SciTech Connect (OSTI)

    Gala, Alan; Ohmacht, Martin

    2014-09-02

    A multiprocessor system includes nodes. Each node includes a data path that includes a core, a TLB, and a first level cache implementing disambiguation. The system also includes at least one second level cache and a main memory. For thread memory access requests, the core uses an address associated with an instruction format of the core. The first level cache uses an address format related to the size of the main memory plus an offset corresponding to hardware thread meta data. The second level cache uses a physical main memory address plus software thread meta data to store the memory access request. The second level cache accesses the main memory using the physical address with neither the offset nor the thread meta data after resolving speculation. In short, this system includes mapping of a virtual address to a different physical addresses for value disambiguation for different threads.

  1. Spin-Hall-assisted magnetic random access memory (Journal Article...

    Office of Scientific and Technical Information (OSTI)

    OSTI Identifier: 22257135 Resource Type: Journal Article Resource Relation: Journal Name: Applied Physics Letters; Journal Volume: 104; Journal Issue: 1; Other Information: (c) ...

  2. Accessibility

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Web Policies Accessibility Accessibility LANL places a high degree of emphasis on user ... Contact Web Team Email Reaching the broadest possible audience Los Alamos National ...

  3. Accessibility

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    is committed to providing access to our Web pages for individuals with disabilities. To meet this commitment, this site is built to comply with the requirements of...

  4. Fencing network direct memory access data transfers in a parallel active messaging interface of a parallel computer

    DOE Patents [OSTI]

    Blocksome, Michael A.; Mamidala, Amith R.

    2015-07-07

    Fencing direct memory access (`DMA`) data transfers in a parallel active messaging interface (`PAMI`) of a parallel computer, the PAMI including data communications endpoints, each endpoint including specifications of a client, a context, and a task, the endpoints coupled for data communications through the PAMI and through DMA controllers operatively coupled to a deterministic data communications network through which the DMA controllers deliver data communications deterministically, including initiating execution through the PAMI of an ordered sequence of active DMA instructions for DMA data transfers between two endpoints, effecting deterministic DMA data transfers through a DMA controller and the deterministic data communications network; and executing through the PAMI, with no FENCE accounting for DMA data transfers, an active FENCE instruction, the FENCE instruction completing execution only after completion of all DMA instructions initiated prior to execution of the FENCE instruction for DMA data transfers between the two endpoints.

  5. Fencing network direct memory access data transfers in a parallel active messaging interface of a parallel computer

    DOE Patents [OSTI]

    Blocksome, Michael A.; Mamidala, Amith R.

    2015-07-14

    Fencing direct memory access (`DMA`) data transfers in a parallel active messaging interface (`PAMI`) of a parallel computer, the PAMI including data communications endpoints, each endpoint including specifications of a client, a context, and a task, the endpoints coupled for data communications through the PAMI and through DMA controllers operatively coupled to a deterministic data communications network through which the DMA controllers deliver data communications deterministically, including initiating execution through the PAMI of an ordered sequence of active DMA instructions for DMA data transfers between two endpoints, effecting deterministic DMA data transfers through a DMA controller and the deterministic data communications network; and executing through the PAMI, with no FENCE accounting for DMA data transfers, an active FENCE instruction, the FENCE instruction completing execution only after completion of all DMA instructions initiated prior to execution of the FENCE instruction for DMA data transfers between the two endpoints.

  6. Livermore Random I/O Testbench

    Energy Science and Technology Software Center (OSTI)

    2012-09-01

    LRIOT is a test bench framework that is designed to generate sophisticated I/O rates that can stress high-performance memory and storage systems, such as non-volatile random access memories (NVRAM)and storage class memory. Furthermore, LRIOT provides the capabilities to mix multiple types of concurrency, namely threading and task parallelism, as well as distributed execution using Message Passing Interface (MPI) libraries. It will be used by algorithm designers to generate access patterns that mimic their application's behavior,more » and by system designers to test high-performance NVRAM storage.« less

  7. Data-Intensive Memory-Map simulator and runtime

    Energy Science and Technology Software Center (OSTI)

    2012-05-01

    DI-MMAP is a simulator for modeling the performance of next generation non-volatile random access memory technologies (NVRAM) and a high-perfromance memory-map runtime for the Linux operating system. It is implemented as a device driver for the Linux operating system. It will be used by algorithm designers to unserstand the impact of future NVRAM on their algorithms and will be used by application developers for high-performance access to NVRAM storage.

  8. Magnetic Random Access Memory based non-volatile asynchronous Muller cell for ultra-low power autonomous applications

    SciTech Connect (OSTI)

    Di Pendina, G. E-mail: eldar.zianbetov@cea.fr Zianbetov, E. E-mail: eldar.zianbetov@cea.fr; Beigne, E. E-mail: eldar.zianbetov@cea.fr

    2015-05-07

    Micro and nano electronic integrated circuit domain is today mainly driven by the advent of the Internet of Things for which the constraints are strong, especially in terms of power consumption and autonomy, not only during the computing phases but also during the standby or idle phases. In such ultra-low power applications, the circuit has to meet new constraints mainly linked to its changing energetic environment: long idle phases, automatic wake up, data back-up when the circuit is sporadically turned off, and ultra-low voltage power supply operation. Such circuits have to be completely autonomous regarding their unstable environment, while remaining in an optimum energetic configuration. Therefore, we propose in this paper the first MRAM-based non-volatile asynchronous Muller cell. This cell has been simulated and characterized in a very advanced 28?nm CMOS fully depleted silicon-on-insulator technology, presenting good power performance results due to an extremely efficient body biasing control together with ultra-wide supply voltage range from 160?mV up to 920?mV. The leakage current can be reduced to 154?pA thanks to reverse body biasing. We also propose an efficient standard CMOS bulk version of this cell in order to be compatible with different fabrication processes.

  9. Structural changes and conductance thresholds in metal-free intrinsic SiO{sub x} resistive random access memory

    SciTech Connect (OSTI)

    Mehonic, Adnan E-mail: t.kenyon@ucl.ac.uk; Buckwell, Mark; Montesi, Luca; Garnett, Leon; Hudziak, Stephen; Kenyon, Anthony J. E-mail: t.kenyon@ucl.ac.uk; Fearn, Sarah; Chater, Richard; McPhail, David

    2015-03-28

    We present an investigation of structural changes in silicon-rich silicon oxide metal-insulator-metal resistive RAM devices. The observed unipolar switching, which is intrinsic to the bulk oxide material and does not involve movement of metal ions, correlates with changes in the structure of the oxide. We use atomic force microscopy, conductive atomic force microscopy, x-ray photoelectron spectroscopy, and secondary ion mass spectroscopy to examine the structural changes occurring as a result of switching. We confirm that protrusions formed at the surface of samples during switching are bubbles, which are likely to be related to the outdiffusion of oxygen. This supports existing models for valence-change based resistive switching in oxides. In addition, we describe parallel linear and nonlinear conduction pathways and suggest that the conductance quantum, G{sub 0}, is a natural boundary between the high and low resistance states of our devices.

  10. Memory Considerations

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Memory Considerations Memory Considerations Memory Usage Considerations on Franklin Each Franklin compute node has 8 GB (8192 MB) of physical memory, but, not all that memory is...

  11. Memory Considerations

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Memory Considerations Memory Considerations Memory Usage Considerations on Hopper Most Hopper compute nodes have 32 GB of physical memory, but, not all that memory is available to...

  12. System for loading executable code into volatile memory in a downhole tool

    DOE Patents [OSTI]

    Hall, David R.; Bartholomew, David B.; Johnson, Monte L.

    2007-09-25

    A system for loading an executable code into volatile memory in a downhole tool string component comprises a surface control unit comprising executable code. An integrated downhole network comprises data transmission elements in communication with the surface control unit and the volatile memory. The executable code, stored in the surface control unit, is not permanently stored in the downhole tool string component. In a preferred embodiment of the present invention, the downhole tool string component comprises boot memory. In another embodiment, the executable code is an operating system executable code. Preferably, the volatile memory comprises random access memory (RAM). A method for loading executable code to volatile memory in a downhole tool string component comprises sending the code from the surface control unit to a processor in the downhole tool string component over the network. A central processing unit writes the executable code in the volatile memory.

  13. Shape memory polymers (Patent) | DOEPatents

    Office of Scientific and Technical Information (OSTI)

    polymers Title: Shape memory polymers You are accessing a document from the Department ... Sponsoring Org: USDOE Country of Publication: United States Language: English Subject: 36 ...

  14. Post-Polymerization Crosslinked Polyurethane Shape-Memory Polymers...

    Office of Scientific and Technical Information (OSTI)

    Crosslinked Polyurethane Shape-Memory Polymers Citation Details In-Document Search Title: Post-Polymerization Crosslinked Polyurethane Shape-Memory Polymers You are accessing a ...

  15. Ultra Low Density Amorphous Shape Memory polymer Foams. (Conference...

    Office of Scientific and Technical Information (OSTI)

    Ultra Low Density Amorphous Shape Memory polymer Foams. Citation Details In-Document Search Title: Ultra Low Density Amorphous Shape Memory polymer Foams. You are accessing a ...

  16. Shape Memory Polymer Therapeutic Devices for Stroke (Conference...

    Office of Scientific and Technical Information (OSTI)

    Shape Memory Polymer Therapeutic Devices for Stroke Citation Details In-Document Search Title: Shape Memory Polymer Therapeutic Devices for Stroke You are accessing a document ...

  17. Ferroelectric tunneling element and memory applications which utilize the tunneling element

    DOE Patents [OSTI]

    Kalinin, Sergei V. [Knoxville, TN; Christen, Hans M. [Knoxville, TN; Baddorf, Arthur P. [Knoxville, TN; Meunier, Vincent [Knoxville, TN; Lee, Ho Nyung [Oak Ridge, TN

    2010-07-20

    A tunneling element includes a thin film layer of ferroelectric material and a pair of dissimilar electrically-conductive layers disposed on opposite sides of the ferroelectric layer. Because of the dissimilarity in composition or construction between the electrically-conductive layers, the electron transport behavior of the electrically-conductive layers is polarization dependent when the tunneling element is below the Curie temperature of the layer of ferroelectric material. The element can be used as a basis of compact 1R type non-volatile random access memory (RAM). The advantages include extremely simple architecture, ultimate scalability and fast access times generic for all ferroelectric memories.

  18. RTDB: A memory resident real-time object database

    SciTech Connect (OSTI)

    Jerzy M. Nogiec; Eugene Desavouret

    2003-06-04

    RTDB is a fast, memory-resident object database with built-in support for distribution. It constitutes an attractive alternative for architecting real-time solutions with multiple, possibly distributed, processes or agents sharing data. RTDB offers both direct and navigational access to stored objects, with local and remote random access by object identifiers, and immediate direct access via object indices. The database supports transparent access to objects stored in multiple collaborating dispersed databases and includes a built-in cache mechanism that allows for keeping local copies of remote objects, with specifiable invalidation deadlines. Additional features of RTDB include a trigger mechanism on objects that allows for issuing events or activating handlers when objects are accessed or modified and a very fast, attribute based search/query mechanism. The overall architecture and application of RTDB in a control and monitoring system is presented.

  19. Memory Considerations

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Memory Considerations Memory Considerations Memory Usage Considerations on Edison Edison compute nodes have 64 GB of physical memory (2.67GB per core), but not all the memory is available to user programs. Compute Node Linux (the kernel), the Lustre file system software, and message passing library buffers all consume memory, as does loading the executable into the memory. Thus the precise memory available to an application varies. Approximately 61 GB of memory can be allocated from within an

  20. Memory Considerations

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Memory Considerations Memory Considerations Memory Usage Considerations on Franklin Each Franklin compute node has 8 GB (8192 MB) of physical memory, but, not all that memory is available to user programs. Compute Node Linux (the kernel), the Lustre file system software, and message passing library buffers all consume memory, as does loading the executable into memory. Thus the precise memory available to an application varies, approximately 7566 MB (7.38 GB) of memory can be allocated from

  1. Memory Considerations

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Memory Considerations Memory Considerations Memory Usage Considerations on Hopper Most Hopper compute nodes have 32 GB of physical memory, but, not all that memory is available to user programs. Compute Node Linux (the kernel), the Lustre file system software, and message passing library buffers all consume memory, as does loading the executable into memory. Thus the precise memory available to an application varies. Approximately 31 GB of memory can be allocated from within an MPI program using

  2. Mechanical memory

    DOE Patents [OSTI]

    Gilkey, Jeffrey C.; Duesterhaus, Michelle A.; Peter, Frank J.; Renn, Rosemarie A.; Baker, Michael S.

    2006-08-15

    A first-in-first-out (FIFO) microelectromechanical memory apparatus (also termed a mechanical memory) is disclosed. The mechanical memory utilizes a plurality of memory cells, with each memory cell having a beam which can be bowed in either of two directions of curvature to indicate two different logic states for that memory cell. The memory cells can be arranged around a wheel which operates as a clocking actuator to serially shift data from one memory cell to the next. The mechanical memory can be formed using conventional surface micromachining, and can be formed as either a nonvolatile memory or as a volatile memory.

  3. Mechanical memory

    DOE Patents [OSTI]

    Gilkey, Jeffrey C.; Duesterhaus, Michelle A.; Peter, Frank J.; Renn, Rosemarie A.; Baker, Michael S.

    2006-05-16

    A first-in-first-out (FIFO) microelectromechanical memory apparatus (also termed a mechanical memory) is disclosed. The mechanical memory utilizes a plurality of memory cells, with each memory cell having a beam which can be bowed in either of two directions of curvature to indicate two different logic states for that memory cell. The memory cells can be arranged around a wheel which operates as a clocking actuator to serially shift data from one memory cell to the next. The mechanical memory can be formed using conventional surface micromachining, and can be formed as either a nonvolatile memory or as a volatile memory.

  4. Memory Considerations

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Memory Considerations Memory Considerations Overview Carver login nodes each have 48GB of ... Furthermore, since Carver nodes have no disk, the "root" file system (including tmp) is ...

  5. Memory Considerations

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Memory Considerations Memory Considerations Overview Carver login nodes each have 48GB of physical memory. Most compute nodes have 24GB; however, 80 compute nodes have 48GB. Not all of this memory is available to user processes. Some memory is reserved for the Linux kernel. Furthermore, since Carver nodes have no disk, the "root" file system (including /tmp) is kept in memory ("ramdisk"). The kernel and root file system combined occupy about 4GB of memory. Therefore users

  6. Controlling the Actuation Rate of Low Density Shape Memory Polymer...

    Office of Scientific and Technical Information (OSTI)

    Memory Polymer Foams in Water Citation Details In-Document Search Title: Controlling the Actuation Rate of Low Density Shape Memory Polymer Foams in Water You are accessing a ...

  7. Open Access

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    access, is a type of unrestricted access to scholarly publications that is online, free of charge to everyone and free of most copyright and licensing restrictions. Open...

  8. Direct memory access transfer completion notification

    DOE Patents [OSTI]

    Archer, Charles J. , Blocksome; Michael A. , Parker; Jeffrey J.

    2011-02-15

    Methods, systems, and products are disclosed for DMA transfer completion notification that include: inserting, by an origin DMA on an origin node in an origin injection FIFO, a data descriptor for an application message; inserting, by the origin DMA, a reflection descriptor in the origin injection FIFO, the reflection descriptor specifying a remote get operation for injecting a completion notification descriptor in a reflection injection FIFO on a reflection node; transferring, by the origin DMA to a target node, the message in dependence upon the data descriptor; in response to completing the message transfer, transferring, by the origin DMA to the reflection node, the completion notification descriptor in dependence upon the reflection descriptor; receiving, by the origin DMA from the reflection node, a completion packet; and notifying, by the origin DMA in response to receiving the completion packet, the origin node's processing core that the message transfer is complete.

  9. Direct memory access transfer completion notification

    DOE Patents [OSTI]

    Archer, Charles J.; Blocksome, Michael A.; Parker, Jeffrey J.

    2010-08-17

    Methods, apparatus, and products are disclosed for DMA transfer completion notification that include: inserting, by an origin DMA engine on an origin compute node in an injection FIFO buffer, a data descriptor for an application message to be transferred to a target compute node on behalf of an application on the origin compute node; inserting, by the origin DMA engine, a completion notification descriptor in the injection FIFO buffer after the data descriptor for the message, the completion notification descriptor specifying an address of a completion notification field in application storage for the application; transferring, by the origin DMA engine to the target compute node, the message in dependence upon the data descriptor; and notifying, by the origin DMA engine, the application that the transfer of the message is complete, including performing a local direct put operation to store predesignated notification data at the address of the completion notification field.

  10. Remote Access

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Remote Access Remote Access Laboratory employees can access Research Library databases and products from offsite using our EZproxy service. This service is limited to LANL employees with active Z numbers and cryptocards. Access Electronic Collections with EZproxy Remote Access Journals - Books - Standards - Databases (WOK, etc) How to use EZproxy: From this page: Click on the icon above. From external site: Select "OFFSITE LANL Employee". Enter your Z number and Cryptocard passcode.

  11. RandomAccessECI_Final.pptx

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Impact o f E CI o n D OE C o---design S trategies James A . A ng, P h.D., M anager Scalable C omputer A rchitectures The S alishan C onference o n H igh S peed C ompuCng Gleneden B...

  12. Memory-bit selection and recording by rotating fields in vortex-core cross-point architecture

    SciTech Connect (OSTI)

    Yu, Y. -S.; Jung, H.; Lee, K. -S.; Fischer, P.; Kim, S. -K.

    2010-10-21

    In one of our earlier studies [Appl. Phys. Lett. 92, 022509 (2008)], we proposed a concept of robust information storage, recording and readout, which can be implementaed in nonvolatile magnetic random-access memories and is based on the energetically degenerated twofold ground states of vortex-core magnetizations. In the present study, we experimentally demonstrate reliable memory-bit selection and information recording in vortex-core cross-point architecture, specifically using a two-by-two vortex-state disk array. In order to efficiently switch a vortex core positioned at the intersection of crossed electrodes, two orthogonal addressing electrodes are selected, and then two Gaussian pulse currents of optimal pulse width and time delay are applied. Such tailored pulse-type rotating magnetic fields which occurs only at the selected intersection is prerequisite for a reliable memory-bit selection and low-power-consumption recording of information in the existing cross-point architecture.

  13. System and method for programmable bank selection for banked memory subsystems

    DOE Patents [OSTI]

    Blumrich, Matthias A.; Chen, Dong; Gara, Alan G.; Giampapa, Mark E.; Hoenicke, Dirk; Ohmacht, Martin; Salapura, Valentina; Sugavanam, Krishnan

    2010-09-07

    A programmable memory system and method for enabling one or more processor devices access to shared memory in a computing environment, the shared memory including one or more memory storage structures having addressable locations for storing data. The system comprises: one or more first logic devices associated with a respective one or more processor devices, each first logic device for receiving physical memory address signals and programmable for generating a respective memory storage structure select signal upon receipt of pre-determined address bit values at selected physical memory address bit locations; and, a second logic device responsive to each of the respective select signal for generating an address signal used for selecting a memory storage structure for processor access. The system thus enables each processor device of a computing environment memory storage access distributed across the one or more memory storage structures.

  14. V-194: Citrix XenServer Memory Management Error Lets Local Administrat...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    XenServer Memory Management Error Lets Local Administrative Users on the Guest Gain Access on the Host V-194: Citrix XenServer Memory Management Error Lets Local Administrative...

  15. Accessing HPSS

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Accessing HPSS Accessing HPSS Once you have successfully generated an HPSS token you can access NERSC's HPSS in the different ways listed below. HSI and HTAR are usually the best ways to transfer data in and out of HPSS but other methods are also included. Access Method When to use this method Features Limitations HSI When a full-featured unix-like interface is desired high performance (parallel); unix-like user interface; firewall mode client is specific to HPSS version and might not work at

  16. Accessing PDSF

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Accessing PDSF Accessing PDSF All the linux interactive nodes are known under the name of pdsf.nersc.gov and should be accessed via that name. To access them the ssh protocol should be used and you should make sure that a Keyboard Interactive method is available in your ssh client. You will probably also want to enable X11 forwarding with the -X or -Y option, i.e., ssh -Y pdsf.nersc.gov For more information see Interactive (login) Nodes. If you are in STAR your default unix group is rhstar (just

  17. Accessibility | NREL

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    making its electronic and information technologies accessible to individuals with disabilities in accordance with Section 508 of the Rehabilitation Act (29 U.S.C. 794d), as...

  18. Gate Access

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Gate Access Gate Access Print When you first arrive at the ALS, gate clearance will have been arranged for you by the User Office. Berkeley Lab employees and visiting researchers (participating guests) may arrange for gate clearance for their visitors through the Lab's Site Access Office . Please notify the Site Office by submitting a Visitor Pass Request before 3:00 p.m. on the day before the expected visit. Include the name(s) of any visitors, the time you expect them, and your name and

  19. Disorder-Induced Microscopic Magnetic Memory

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Disorder-Induced Microscopic Magnetic Memory Disorder-Induced Microscopic Magnetic Memory Print Wednesday, 26 October 2005 00:00 The magnetic-recording industry deliberately introduces carefully controlled disorder into its materials to obtain the desired magnetic properties. But as the density of magnetic disks climbs, the size of the magnetic domains responsible for storage must decrease, posing new challenges. Beautiful theories based on random microscopic disorder have been developed over

  20. Gate Access

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    to the laboratory. Visitors from outside the U.S. should be prepared to show a valid passport. See Access to the ALS for additional information about visitor procedures at the...

  1. Adiabatic quantum optimization for associative memory recall

    SciTech Connect (OSTI)

    Seddiqi, Hadayat; Humble, Travis S.

    2014-12-22

    Hopfield networks are a variant of associative memory that recall patterns stored in the couplings of an Ising model. Stored memories are conventionally accessed as fixed points in the network dynamics that correspond to energetic minima of the spin state. We show that memories stored in a Hopfield network may also be recalled by energy minimization using adiabatic quantum optimization (AQO). Numerical simulations of the underlying quantum dynamics allow us to quantify AQO recall accuracy with respect to the number of stored memories and noise in the input key. We investigate AQO performance with respect to how memories are stored in the Ising model according to different learning rules. Our results demonstrate that AQO recall accuracy varies strongly with learning rule, a behavior that is attributed to differences in energy landscapes. Consequently, learning rules offer a family of methods for programming adiabatic quantum optimization that we expect to be useful for characterizing AQO performance.

  2. Adiabatic quantum optimization for associative memory recall

    DOE Public Access Gateway for Energy & Science Beta (PAGES Beta)

    Seddiqi, Hadayat; Humble, Travis S.

    2014-12-22

    Hopfield networks are a variant of associative memory that recall patterns stored in the couplings of an Ising model. Stored memories are conventionally accessed as fixed points in the network dynamics that correspond to energetic minima of the spin state. We show that memories stored in a Hopfield network may also be recalled by energy minimization using adiabatic quantum optimization (AQO). Numerical simulations of the underlying quantum dynamics allow us to quantify AQO recall accuracy with respect to the number of stored memories and noise in the input key. We investigate AQO performance with respect to how memories are storedmore » in the Ising model according to different learning rules. Our results demonstrate that AQO recall accuracy varies strongly with learning rule, a behavior that is attributed to differences in energy landscapes. Consequently, learning rules offer a family of methods for programming adiabatic quantum optimization that we expect to be useful for characterizing AQO performance.« less

  3. Genepool Memory Heatmaps

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Genepool Memory Heatmaps Heatmap of Memory and Slots Requested vs Time Waited (in hours) | Queue: All | Last 7 Days Memory Requested Slots <5GB 5-10GB 10-20GB 20-30GB 30-40GB...

  4. Large N (=3) Neutrinos and Random Matrix Theory (Journal Article...

    Office of Scientific and Technical Information (OSTI)

    Journal Article: Large N (3) Neutrinos and Random Matrix Theory Citation Details In-Document Search Title: Large N (3) Neutrinos and Random Matrix Theory You are accessing a ...

  5. Optical memory

    DOE Patents [OSTI]

    Mao, Samuel S; Zhang, Yanfeng

    2013-07-02

    Optical memory comprising: a semiconductor wire, a first electrode, a second electrode, a light source, a means for producing a first voltage at the first electrode, a means for producing a second voltage at the second electrode, and a means for determining the presence of an electrical voltage across the first electrode and the second electrode exceeding a predefined voltage. The first voltage, preferably less than 0 volts, different from said second voltage. The semiconductor wire is optically transparent and has a bandgap less than the energy produced by the light source. The light source is optically connected to the semiconductor wire. The first electrode and the second electrode are electrically insulated from each other and said semiconductor wire.

  6. Conditional load and store in a shared memory

    SciTech Connect (OSTI)

    Blumrich, Matthias A; Ohmacht, Martin

    2015-02-03

    A method, system and computer program product for implementing load-reserve and store-conditional instructions in a multi-processor computing system. The computing system includes a multitude of processor units and a shared memory cache, and each of the processor units has access to the memory cache. In one embodiment, the method comprises providing the memory cache with a series of reservation registers, and storing in these registers addresses reserved in the memory cache for the processor units as a result of issuing load-reserve requests. In this embodiment, when one of the processor units makes a request to store data in the memory cache using a store-conditional request, the reservation registers are checked to determine if an address in the memory cache is reserved for that processor unit. If an address in the memory cache is reserved for that processor, the data are stored at this address.

  7. Nanopatterned ferroelectrics for ultrahigh density rad-hard nonvolatile memories.

    SciTech Connect (OSTI)

    Brennecka, Geoffrey L.; Stevens, Jeffrey; Scrymgeour, David; Gin, Aaron V.; Tuttle, Bruce Andrew

    2010-09-01

    Radiation hard nonvolatile random access memory (NVRAM) is a crucial component for DOE and DOD surveillance and defense applications. NVRAMs based upon ferroelectric materials (also known as FERAMs) are proven to work in radiation-rich environments and inherently require less power than many other NVRAM technologies. However, fabrication and integration challenges have led to state-of-the-art FERAMs still being fabricated using a 130nm process while competing phase-change memory (PRAM) has been demonstrated with a 20nm process. Use of block copolymer lithography is a promising approach to patterning at the sub-32nm scale, but is currently limited to self-assembly directly on Si or SiO{sub 2} layers. Successful integration of ferroelectrics with discrete and addressable features of {approx}15-20nm would represent a 100-fold improvement in areal memory density and would enable more highly integrated electronic devices required for systems advances. Towards this end, we have developed a technique that allows us to carry out block copolymer self-assembly directly on a huge variety of different materials and have investigated the fabrication, integration, and characterization of electroceramic materials - primarily focused on solution-derived ferroelectrics - with discrete features of {approx}20nm and below. Significant challenges remain before such techniques will be capable of fabricating fully integrated NVRAM devices, but the tools developed for this effort are already finding broader use. This report introduces the nanopatterned NVRAM device concept as a mechanism for motivating the subsequent studies, but the bulk of the document will focus on the platform and technology development.

  8. An optical simulation of shared memory

    SciTech Connect (OSTI)

    Goldberg, L.A.; Matias, Y.; Rao, S.

    1994-06-01

    We present a work-optimal randomized algorithm for simulating a shared memory machine (PRAM) on an optical communication parallel computer (OCPC). The OCPC model is motivated by the potential of optical communication for parallel computation. The memory of an OCPC is divided into modules, one module per processor. Each memory module only services a request on a timestep if it receives exactly one memory request. Our algorithm simulates each step of an n lg lg n-processor EREW PRAM on an n-processor OCPC in O(lg lg n) expected delay. (The probability that the delay is longer than this is at most n{sup {minus}{alpha}} for any constant {alpha}). The best previous simulation, due to Valiant, required {Theta}(lg n) expected delay.

  9. Aggregate Remote Memory Copy Interface

    Energy Science and Technology Software Center (OSTI)

    2006-02-23

    The purpose of the Aggregate Remote Memory Copy (ARMCI) library is to provide a general- purpose, efficient, and Widely portable remote memory access (RMA) operations (one-sided communication) optimized for Contiguous and noncontiguous (strided, scatter/gather, I/O vector) data transfers. In addition, ARMCI includes a set of atomic and mutual exclusion operations. The development ARMCI is driven by the need to support the global-addres space communication model in context of distributed regular or irregular distributed data structures,more » communication libraries, and compilers. ARMCI is a standalone system that could be used to support user-level libraries and applications that use MPI or PVM.« less

  10. Resistance controllability and variability improvement in a TaO{sub x}-based resistive memory for multilevel storage application

    SciTech Connect (OSTI)

    Prakash, A. E-mail: amit.knp02@gmail.com Song, J.; Hwang, H. E-mail: amit.knp02@gmail.com; Deleruyelle, D.; Bocquet, M.

    2015-06-08

    In order to obtain reliable multilevel cell (MLC) characteristics, resistance controllability between the different resistance levels is required especially in resistive random access memory (RRAM), which is prone to resistance variability mainly due to its intrinsic random nature of defect generation and filament formation. In this study, we have thoroughly investigated the multilevel resistance variability in a TaO{sub x}-based nanoscale (<30 nm) RRAM operated in MLC mode. It is found that the resistance variability not only depends on the conductive filament size but also is a strong function of oxygen vacancy concentration in it. Based on the gained insights through experimental observations and simulation, it is suggested that forming thinner but denser conductive filament may greatly improve the temporal resistance variability even at low operation current despite the inherent stochastic nature of resistance switching process.

  11. Extra-Large Memory Nodes

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Extra-Large Memory Nodes Extra-Large Memory Nodes Extra-Large Memory Nodes Overview Carver has two "extra-large" memory nodes; each node has four 8-core Intel X7550 ("Nehalem EX")...

  12. A Monte Carlo simulation for bipolar resistive memory switching in large band-gap oxides

    SciTech Connect (OSTI)

    Hur, Ji-Hyun E-mail: jeonsh@korea.ac.kr; Lee, Dongsoo; Jeon, Sanghun E-mail: jeonsh@korea.ac.kr

    2015-11-16

    A model that describes bilayered bipolar resistive random access memory (BL-ReRAM) switching in oxide with a large band gap is presented. It is shown that, owing to the large energy barrier between the electrode and thin oxide layer, the electronic conduction is dominated by trap-assisted tunneling. The model is composed of an atomic oxygen vacancy migration model and an electronic tunneling conduction model. We also show experimentally observed three-resistance-level switching in Ru/ZrO{sub 2}/TaO{sub x} BL-ReRAM that can be explained by the two types of traps, i.e., shallow and deep traps in ZrO{sub 2}.

  13. Measuring and Understanding Memory Bandwidth

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Measuring and Understanding Memory Bandwidth Measuring and Understanding Memory Bandwidth Measuring Bandwidth Usage Measuring memory bandwidth is a good way of understanding how well your application uses cache memory. Today's processors are constructed under the assumption that a small amount of (expensive) fast memory - called "cache" - is used more often than a larger amount of slower memory (DRAM). The extent to which this assumption applies to your code is referred to as memory

  14. zorder-lib: Library API for Z-Order Memory Layout

    SciTech Connect (OSTI)

    Nowell, Lucy; Edward W. Bethel

    2015-04-01

    This document describes the motivation for, elements of, and use of the zorder-lib, a library API that implements organization of and access to data in memory using either a-order (also known as "row-major" order) or z-order memory layouts. The primary motivation for this work is to improve the performance of many types of data- intensive codes by increasing both spatial and temporal locality of memory accesses. The basic idea is that the cost associated with accessing a datum is less when it is nearby in either space or time.

  15. Using DMA for copying performance counter data to memory

    DOE Patents [OSTI]

    Gara, Alan; Salapura, Valentina; Wisniewski, Robert W.

    2012-09-25

    A device for copying performance counter data includes hardware path that connects a direct memory access (DMA) unit to a plurality of hardware performance counters and a memory device. Software prepares an injection packet for the DMA unit to perform copying, while the software can perform other tasks. In one aspect, the software that prepares the injection packet runs on a processing core other than the core that gathers the hardware performance counter data.

  16. Using DMA for copying performance counter data to memory

    DOE Patents [OSTI]

    Gara, Alan; Salapura, Valentina; Wisniewski, Robert W

    2013-12-31

    A device for copying performance counter data includes hardware path that connects a direct memory access (DMA) unit to a plurality of hardware performance counters and a memory device. Software prepares an injection packet for the DMA unit to perform copying, while the software can perform other tasks. In one aspect, the software that prepares the injection packet runs on a processing core other than the core that gathers the hardware performance data.

  17. Disorder-Induced Microscopic Magnetic Memory

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Disorder-Induced Microscopic Magnetic Memory Print The magnetic-recording industry deliberately introduces carefully controlled disorder into its materials to obtain the desired magnetic properties. But as the density of magnetic disks climbs, the size of the magnetic domains responsible for storage must decrease, posing new challenges. Beautiful theories based on random microscopic disorder have been developed over the past ten years. To directly compare these theories with precise experiments,

  18. Disorder-Induced Microscopic Magnetic Memory

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Disorder-Induced Microscopic Magnetic Memory Print The magnetic-recording industry deliberately introduces carefully controlled disorder into its materials to obtain the desired magnetic properties. But as the density of magnetic disks climbs, the size of the magnetic domains responsible for storage must decrease, posing new challenges. Beautiful theories based on random microscopic disorder have been developed over the past ten years. To directly compare these theories with precise experiments,

  19. Disorder-Induced Microscopic Magnetic Memory

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Disorder-Induced Microscopic Magnetic Memory Print The magnetic-recording industry deliberately introduces carefully controlled disorder into its materials to obtain the desired magnetic properties. But as the density of magnetic disks climbs, the size of the magnetic domains responsible for storage must decrease, posing new challenges. Beautiful theories based on random microscopic disorder have been developed over the past ten years. To directly compare these theories with precise experiments,

  20. Disorder-Induced Microscopic Magnetic Memory

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Disorder-Induced Microscopic Magnetic Memory Print The magnetic-recording industry deliberately introduces carefully controlled disorder into its materials to obtain the desired magnetic properties. But as the density of magnetic disks climbs, the size of the magnetic domains responsible for storage must decrease, posing new challenges. Beautiful theories based on random microscopic disorder have been developed over the past ten years. To directly compare these theories with precise experiments,

  1. Parallel garbage collection on a virtual memory system

    SciTech Connect (OSTI)

    Abraham, S.G.; Patel, J.H.

    1987-01-01

    Since most artificial intelligence applications are programmed in list processing languages, it is important to design architectures to support efficient garbage collection. This paper presents an architecture and an associated algorithm for parallel garbage collection on a virtual memory system. All the previously proposed parallel algorithms attempt to collect cells released by the list processor during the garbage collection cycle. We do not attempt to collect such cells. As a consequence, the list processor incurs little overhead in the proposed scheme, since it need not synchronize with the collector. Most parallel algorithms are designed for shared memory machines which have certain implicit synchronization functions on variable access. The proposed algorithm is designed for virtual memory systems where both the list processor and the garbage collector have private memories. The enforcement of coherence between the two private memories can be expensive and is not necessary in our scheme. 15 refs., 3 figs.

  2. Shape memory polymers

    DOE Patents [OSTI]

    Wilson, Thomas S.; Bearinger, Jane P.

    2015-06-09

    New shape memory polymer compositions, methods for synthesizing new shape memory polymers, and apparatus comprising an actuator and a shape memory polymer wherein the shape memory polymer comprises at least a portion of the actuator. A shape memory polymer comprising a polymer composition which physically forms a network structure wherein the polymer composition has shape-memory behavior and can be formed into a permanent primary shape, re-formed into a stable secondary shape, and controllably actuated to recover the permanent primary shape. Polymers have optimal aliphatic network structures due to minimization of dangling chains by using monomers that are symmetrical and that have matching amine and hydroxyl groups providing polymers and polymer foams with clarity, tight (narrow temperature range) single transitions, and high shape recovery and recovery force that are especially useful for implanting in the human body.

  3. Myrmics Memory Allocator

    Energy Science and Technology Software Center (OSTI)

    2011-09-23

    MMA is a stand-alone memory management system for MPI clusters. It implements a shared Partitioned Global Address Space, where multiple MPI processes request objects from the allocator and the latter provides them with system-wide unique memory addresses for each object. It provides applications with an intuitive way of managing the memory system in a unified way, thus enabling easier writing of irregular application code.

  4. A hybrid magnetic/complementary metal oxide semiconductor three-context memory bit cell for non-volatile circuit design

    SciTech Connect (OSTI)

    Jovanović, B. E-mail: lionel.torres@lirmm.fr; Brum, R. M.; Torres, L.

    2014-04-07

    After decades of continued scaling to the beat of Moore's law, it now appears that conventional silicon based devices are approaching their physical limits. In today's deep-submicron nodes, a number of short-channel and quantum effects are emerging that affect the manufacturing process, as well as, the functionality of the microelectronic systems-on-chip. Spintronics devices that exploit both the intrinsic spin of the electron and its associated magnetic moment, in addition to its fundamental electronic charge, are promising solutions to circumvent these scaling threats. Being compatible with the CMOS technology, such devices offer a promising synergy of radiation immunity, infinite endurance, non-volatility, increased density, etc. In this paper, we present a hybrid (magnetic/CMOS) cell that is able to store and process data both electrically and magnetically. The cell is based on perpendicular spin-transfer torque magnetic tunnel junctions (STT-MTJs) and is suitable for use in magnetic random access memories and reprogrammable computing (non-volatile registers, processor cache memories, magnetic field-programmable gate arrays, etc). To demonstrate the potential our hybrid cell, we physically implemented a small hybrid memory block using 45 nm × 45 nm round MTJs for the magnetic part and 28 nm fully depleted silicon on insulator (FD-SOI) technology for the CMOS part. We also report the cells measured performances in terms of area, robustness, read/write speed and energy consumption.

  5. ACCESSING SUBCONTRACTOR EMPLOYMENT RECORDS

    Broader source: Energy.gov [DOE]

    Federal officials, on occasion, may seek access to contractor or subcontractor employment and personnel records. There are circumstances in which such access is appropriate and permissible. But...

  6. Using on-package memory

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    on-package memory Using on-package memory Introduction The NERSC-8 system will include a novel feature on its node architecture: 16 GB of high-bandwidth 3D stacked memory...

  7. Shape memory polymers (Patent) | DOEPatents

    Office of Scientific and Technical Information (OSTI)

    polymers Title: Shape memory polymers New shape memory polymer compositions, methods for ... Sponsoring Org: USDOE Country of Publication: United States Language: English Subject: 36 ...

  8. Computer memory management system

    DOE Patents [OSTI]

    Kirk, III, Whitson John

    2002-01-01

    A computer memory management system utilizing a memory structure system of "intelligent" pointers in which information related to the use status of the memory structure is designed into the pointer. Through this pointer system, The present invention provides essentially automatic memory management (often referred to as garbage collection) by allowing relationships between objects to have definite memory management behavior by use of coding protocol which describes when relationships should be maintained and when the relationships should be broken. In one aspect, the present invention system allows automatic breaking of strong links to facilitate object garbage collection, coupled with relationship adjectives which define deletion of associated objects. In another aspect, The present invention includes simple-to-use infinite undo/redo functionality in that it has the capability, through a simple function call, to undo all of the changes made to a data model since the previous `valid state` was noted.

  9. Cache directory look-up re-use as conflict check mechanism for speculative memory requests

    DOE Patents [OSTI]

    Ohmacht, Martin

    2013-09-10

    In a cache memory, energy and other efficiencies can be realized by saving a result of a cache directory lookup for sequential accesses to a same memory address. Where the cache is a point of coherence for speculative execution in a multiprocessor system, with directory lookups serving as the point of conflict detection, such saving becomes particularly advantageous.

  10. Effcient Shared-array Accesses in Ab Initio Nuclear Structure Calculations

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    on Multicore Architectures | Argonne Leadership Computing Facility Effcient Shared-array Accesses in Ab Initio Nuclear Structure Calculations on Multicore Architectures Authors: Srinivasa, A., Sosonkina, M., Maris, P., Vary, J.P. With the increase in the processing core counts on modern computing platforms, the main memory accesses present a considerable execution bottleneck, leading to poor scalability in multithreaded applications. Even when the memory is physically divided into separate

  11. choi_salishan15_random_access.pptx

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    upper-layer protocols and applications needs for high-performance fabric services. 2 Translation The only network API you'll ever need (we hope) 3 Why? * Today middleware needs to...

  12. Sarkar-Salishan-RandomAccess-April-2014.pptx

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    6 Replacing Shuffle by Collective Communications for Iterative MapReduce . . . . . . "Harp Collective Collection", Bingjing Zhang, Judy Qiu, Geoffrey Fox. 7 K-Means Clustering...

  13. 2015 Salishan Random Access (Conference) | SciTech Connect

    Office of Scientific and Technical Information (OSTI)

    Authors: Vigil, Benny Manuel 1 ; Mattson, Tim 2 ; Coteus, Paul 3 ; Lucas, Bob 4 ; Michalak, Sarah 1 ; Choi, Sung-Eun 5 ; Mountain, Dave 6 ; Levesque, John 5 ; Ang, ...

  14. The Unobtrusive Memory Allocator

    Energy Science and Technology Software Center (OSTI)

    2003-03-31

    This library implements a memory allocator/manager which ask its host program or library for memory refions to manage rather than requesting them from the operating system. This allocator supports multiple distinct heaps within a single executable, each of which may grow either upward or downward in memory. The GNU mmalloc library has been modified in such a way that its allocation algorithms have been preserved, but the manner in which it obtains regions to managemore » has been changed to request memory from the host program or library. Additional modifications allow the allocator to manage each heap as either upward or downward-growing. By allowing the hosting program or library to determine what memory is managed, this package allows a greater degree of control than other memory allocation/management libraries. Additional distinguishing features include the ability to manage multiple distinct heaps with in a single executable, each of which may grow either upward or downward in memory. The most common use of this library is in conjunction with the Berkeley Unified Parallel C (UPC) Runtime Library. This package is a modified version of the LGPL-licensed "mmalloc" allocator from release 5.2 of the "gdb" debugger's source code.« less

  15. Using on-package memory

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    on-package memory Using on-package memory Introduction The NERSC-8 system will include a novel feature on its node architecture: 16 GB of high-bandwidth 3D stacked memory interposed between the KNL chip and the slower off-package DDR memory. Compared to the on-node DDR4 memory, the high-bandwidth memory (HBM) has approximately 5x the bandwidth but has similar latency. This new feature has the potential to accelerate those applications which are particularly sensitive to memory bandwidth limits.

  16. Library API for Z-Order Memory Layout

    Energy Science and Technology Software Center (OSTI)

    2015-02-01

    This library provides a simple-to-use API for implementing an altnerative to traditional row-major order in-memory layout, one based on a Morton- order space filling curve (SFC) , specifically, a Z-order variant of the Morton order curve. The library enables programmers to, after a simple initialization step, to convert a multidimensional array from row-major to Z- order layouts, then use a single, generic API call to access data from any arbitrary (i,j,k) location from within themore » array, whether it it be stored in row- major or z-order format. The motivation for using a SFC in-memory layout is for improved spatial locality, which results in increased use of local high speed cache memory. The basic idea is that with row-major order layouts, a data access to some location that is nearby in index space is likely far away in physical memory, resulting in poor spatial locality and slow runtime. On the other hand, with a SFC-based layout, accesses that are nearby in index space are much more likely to also be nearby in physical memory, resulting in much better spatial locality, and better runtime performance. Numerous studies over the years have shown significant runtime performance gains are realized by using a SFC-based memory layout compared to a row-major layout, sometimes by as much as 50%, which result from the better use of the memory and cache hierarchy that are attendant with a SFC-based layout (see, for example, [Beth2012]). This library implementation is intended for use with codes that work with structured, array-based data in 2 or 3 dimensions. It is not appropriate for use with unstructured or point-based data.« less

  17. Collective Memory Transfers for Multi-Core Chips

    SciTech Connect (OSTI)

    Michelogiannakis, George; Williams, Alexander; Shalf, John

    2013-11-13

    Future performance improvements for microprocessors have shifted from clock frequency scaling towards increases in on-chip parallelism. Performance improvements for a wide variety of parallel applications require domain-decomposition of data arrays from a contiguous arrangement in memory to a tiled layout for on-chip L1 data caches and scratchpads. How- ever, DRAM performance suffers under the non-streaming access patterns generated by many independent cores. We propose collective memory scheduling (CMS) that actively takes control of collective memory transfers such that requests arrive in a sequential and predictable fashion to the memory controller. CMS uses the hierarchically tiled arrays formal- ism to compactly express collective operations, which greatly improves programmability over conventional prefetch or list- DMA approaches. CMS reduces application execution time by up to 32% and DRAM read power by 2.2×, compared to a baseline DMA architecture such as STI Cell.

  18. LANL access restrictions lifted

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    lifted LANL access restrictions lifted Vehicle access points on West Jemez Road will be open to non-badge holders. August 6, 2012 Los Alamos National Laboratory sits on top of a...

  19. Accessing Online COR Training

    Office of Energy Efficiency and Renewable Energy (EERE)

    Contracting Officer’s Representative (COR) training is now be available in an online format. "Accessing Online COR Training" provides a step-by-step guide to access the online COR course. 

  20. A fast and memory-sparing probabilistic selection algorithm for the GPU

    SciTech Connect (OSTI)

    Monroe, Laura M; Wendelberger, Joanne; Michalak, Sarah

    2010-09-29

    A fast and memory-sparing probabilistic top-N selection algorithm is implemented on the GPU. This probabilistic algorithm gives a deterministic result and always terminates. The use of randomization reduces the amount of data that needs heavy processing, and so reduces both the memory requirements and the average time required for the algorithm. This algorithm is well-suited to more general parallel processors with multiple layers of memory hierarchy. Probabilistic Las Vegas algorithms of this kind are a form of stochastic optimization and can be especially useful for processors having a limited amount of fast memory available.

  1. Access to the ALS

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Gate Access Access to the ALS Print User Access The ALS experiment floor (Building 6) is a Controlled Access Area for radiation protection. All ALS users are required to register with the ALS User Services Office and take safety training (see Complete Safety Training ) before they are issued a Berkeley Lab ID badge and granted access to the facility. Note: Users arriving at the ALS outside registration business hours (Monday-Friday 8:00 a.m.-4:00 p.m.) must notify the User Office in advance and

  2. Extra-Large Memory Nodes

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Extra-Large Memory Nodes Extra-Large Memory Nodes Extra-Large Memory Nodes Overview Carver has two "extra-large" memory nodes; each node has four 8-core Intel X7550 ("Nehalem EX") 2.0 GHz processors (32 cores total) and 1TB memory. These nodes are available through the queue "reg_xlmem". They can be used for interactive and batch jobs that require large amount of memory (16GB per core or more). reg_xlmem queue Please refer to the "Queues and Policies" page

  3. Quantum random number generation

    DOE Public Access Gateway for Energy & Science Beta (PAGES Beta)

    Ma, Xiongfeng; Yuan, Xiao; Cao, Zhu; Zhang, Zhen; Qi, Bing

    2016-06-28

    Here, quantum physics can be exploited to generate true random numbers, which play important roles in many applications, especially in cryptography. Genuine randomness from the measurement of a quantum system reveals the inherent nature of quantumness -- coherence, an important feature that differentiates quantum mechanics from classical physics. The generation of genuine randomness is generally considered impossible with only classical means. Based on the degree of trustworthiness on devices, quantum random number generators (QRNGs) can be grouped into three categories. The first category, practical QRNG, is built on fully trusted and calibrated devices and typically can generate randomness at amore » high speed by properly modeling the devices. The second category is self-testing QRNG, where verifiable randomness can be generated without trusting the actual implementation. The third category, semi-self-testing QRNG, is an intermediate category which provides a tradeoff between the trustworthiness on the device and the random number generation speed.« less

  4. Shape memory polymer medical device

    DOE Patents [OSTI]

    Maitland, Duncan; Benett, William J.; Bearinger, Jane P.; Wilson, Thomas S.; Small, IV, Ward; Schumann, Daniel L.; Jensen, Wayne A.; Ortega, Jason M.; Marion, III, John E.; Loge, Jeffrey M.

    2010-06-29

    A system for removing matter from a conduit. The system includes the steps of passing a transport vehicle and a shape memory polymer material through the conduit, transmitting energy to the shape memory polymer material for moving the shape memory polymer material from a first shape to a second and different shape, and withdrawing the transport vehicle and the shape memory polymer material through the conduit carrying the matter.

  5. Access to Capital Roundtable

    Broader source: Energy.gov (indexed) [DOE]

    ... State of Washington Chahalis and Great Wolf Lodge Streamlined environmental approval and process Price advantages due to tax preference Access to NMTC, USDA, DOE, ...

  6. Energy Data Access

    Broader source: Energy.gov [DOE]

    Access to energy data presents a significant opportunity for many organizations interested in energy management, benchmarking, disclosure, and energy efficiency services.

  7. Access to Capital

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    IPR 2008 Capital Investment Review CIR 2012 Quarterly Business Review Focus 2028 2011 Strategic Capital Discussions Access to Capital Debt Optimization Asset Management Cost...

  8. New 1 Terabyte Memory Node

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    New 1 Terabyte Memory Node New 1 Terabyte Memory Node June 17, 2011 by Francesca Verdier A new "extra large" memory node that has four 8-core Nehalem EX processors (32 cores total) and 1TB memory has been deployed in the Carver/Magellan complex. See Memory Considerations on Carver. Subscribe via RSS Subscribe Browse by Date August 2016 June 2016 May 2016 April 2016 January 2016 December 2015 November 2015 October 2015 September 2015 August 2015 July 2015 April 2015 March 2015 January

  9. Quantum random number generator

    DOE Patents [OSTI]

    Pooser, Raphael C.

    2016-05-10

    A quantum random number generator (QRNG) and a photon generator for a QRNG are provided. The photon generator may be operated in a spontaneous mode below a lasing threshold to emit photons. Photons emitted from the photon generator may have at least one random characteristic, which may be monitored by the QRNG to generate a random number. In one embodiment, the photon generator may include a photon emitter and an amplifier coupled to the photon emitter. The amplifier may enable the photon generator to be used in the QRNG without introducing significant bias in the random number and may enable multiplexing of multiple random numbers. The amplifier may also desensitize the photon generator to fluctuations in power supplied thereto while operating in the spontaneous mode. In one embodiment, the photon emitter and amplifier may be a tapered diode amplifier.

  10. Method and apparatus for faulty memory utilization

    DOE Patents [OSTI]

    Cher, Chen-Yong; Andrade Costa, Carlos H.; Park, Yoonho; Rosenburg, Bryan S.; Ryu, Kyung D.

    2016-04-19

    A method for faulty memory utilization in a memory system includes: obtaining information regarding memory health status of at least one memory page in the memory system; determining an error tolerance of the memory page when the information regarding memory health status indicates that a failure is predicted to occur in an area of the memory system affecting the memory page; initiating a migration of data stored in the memory page when it is determined that the data stored in the memory page is non-error-tolerant; notifying at least one application regarding a predicted operating system failure and/or a predicted application failure when it is determined that data stored in the memory page is non-error-tolerant and cannot be migrated; and notifying at least one application regarding the memory failure predicted to occur when it is determined that data stored in the memory page is error-tolerant.

  11. Shape memory alloy actuator

    DOE Patents [OSTI]

    Varma, Venugopal K.

    2001-01-01

    An actuator for cycling between first and second positions includes a first shaped memory alloy (SMA) leg, a second SMA leg. At least one heating/cooling device is thermally connected to at least one of the legs, each heating/cooling device capable of simultaneously heating one leg while cooling the other leg. The heating/cooling devices can include thermoelectric and/or thermoionic elements.

  12. Genepool Memory Heatmaps

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Genepool Memory Heatmaps Heatmap of Memory and Slots Requested vs Time Waited (in hours) | Queue: All | Last 7 Days Memory Requested Slots <5GB 5-10GB 10-20GB 20-30GB 30-40GB 40-50GB 50-100GB 100-150GB 150-200GB 200-256GB 256-512GB 512+GB Job Count Longest Wait 1 2.26 (2693) 10.5 (201167) 3.2 (11650) 0 1.75 (282) 1.49 (1627) 0.03 (1) 0 0 0 0 0 217420 538.96 2 0.26 (103) 1.02 (2817) 0 0 0 0 0 0 0 0 0 0 2920 9.1 4 1.55 (198) 1.48 (104) 0.34 (8) 0 0 0 1.86 (3) 0 0 0 0 0 313 20.48 6 0.01 (1) 0.09

  13. DOE Science Showcase - Shape-Memory Materials | OSTI, US Dept...

    Office of Scientific and Technical Information (OSTI)

    Shape-memory Materials, explainthatstuff.com Shape-memory Alloys, Wikipedia Shape-memory Polymers, Wikipedia Shape Memory Alloy demonstration, University of Birmingham, YouTube ...

  14. VEHICLE ACCESS PORTALS

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    ACCESS PORTALS Changes Effective January 11, 2010 Traffic Lane 1: No stop required. Drivers must slow down to 15 MPH while nearing and driving through the lane Traffic Lane 2:...

  15. Remote Access Options

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    ... Applications Features Blackberry (if applicable) Outlook Web Access (OWA) Citrix Workplace WebVPN AnyConnect VPN All methods other than Blackberry require a RSA Token Email 1 ...

  16. Accessibility - Hanford Site

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    of Energy is committed to providing access to our Web pages for individuals with disabilities. To meet this committment, this site is built to comply with the requirements of...

  17. Compiler-Assisted Detection of Transient Memory Errors

    SciTech Connect (OSTI)

    Tavarageri, Sanket; Krishnamoorthy, Sriram; Sadayappan, Ponnuswamy

    2014-06-09

    The probability of bit flips in hardware memory systems is projected to increase significantly as memory systems continue to scale in size and complexity. Effective hardware-based error detection and correction requires that the complete data path, involving all parts of the memory system, be protected with sufficient redundancy. First, this may be costly to employ on commodity computing platforms and second, even on high-end systems, protection against multi-bit errors may be lacking. Therefore, augmenting hardware error detection schemes with software techniques is of consider- able interest. In this paper, we consider software-level mechanisms to comprehensively detect transient memory faults. We develop novel compile-time algorithms to instrument application programs with checksum computation codes so as to detect memory errors. Unlike prior approaches that employ checksums on computational and architectural state, our scheme verifies every data access and works by tracking variables as they are produced and consumed. Experimental evaluation demonstrates that the proposed comprehensive error detection solution is viable as a completely software-only scheme. We also demonstrate that with limited hardware support, overheads of error detection can be further reduced.

  18. Random array grid collimator

    DOE Patents [OSTI]

    Fenimore, E.E.

    1980-08-22

    A hexagonally shaped quasi-random no-two-holes touching grid collimator. The quasi-random array grid collimator eliminates contamination from small angle off-axis rays by using a no-two-holes-touching pattern which simultaneously provides for a self-supporting array increasng throughput by elimination of a substrate. The presentation invention also provides maximum throughput using hexagonally shaped holes in a hexagonal lattice pattern for diffraction limited applications. Mosaicking is also disclosed for reducing fabrication effort.

  19. Memory-2014-salishan.key

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    WHAT'S NEXT? Bruce Jacob University of Maryland SLIDE Your Next Memory System Bruce Jacob University of Maryland PERSPECTIVE: 1 Cost for 10 GB Power for 10 GB...

  20. Carlsbad employees fund veteran memorial

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    regional veterans by purchasing and placing their own remembrance. On November 12, a dedication ceremony will recognize newly placed memorials in the Park, including one from LANL...

  1. Nanoparticle shuttle memory

    DOE Patents [OSTI]

    Zettl, Alex Karlwalter

    2012-03-06

    A device for storing data using nanoparticle shuttle memory having a nanotube. The nanotube has a first end and a second end. A first electrode is electrically connected to the first end of the nanotube. A second electrode is electrically connected to the second end of the nanotube. The nanotube has an enclosed nanoparticle shuttle. A switched voltage source is electrically connected to the first electrode and the second electrode, whereby a voltage may be controllably applied across the nanotube. A resistance meter is also connected to the first electrode and the second electrode, whereby the electrical resistance across the nanotube can be determined.

  2. Caf Systems Express Access Form

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Cognos Report Access checkboxes (as applicable). Access to Monthly Financials & Supply Chain folders is included with any selections below. BudgetCOA - Capital project,...

  3. Shape memory alloy thaw sensors

    DOE Patents [OSTI]

    Shahinpoor, Mohsen; Martinez, David R.

    1998-01-01

    A sensor permanently indicates that it has been exposed to temperatures exceeding a critical temperature for a predetermined time period. An element of the sensor made from shape memory alloy changes shape when exposed, even temporarily, to temperatures above the Austenitic temperature of the shape memory alloy. The shape change of the SMA element causes the sensor to change between two readily distinguishable states.

  4. Shape memory polymer medical device (Patent) | DOEPatents

    Office of Scientific and Technical Information (OSTI)

    Shape memory polymer medical device Title: Shape memory polymer medical device A system for removing matter from a conduit. The system includes the steps of passing a transport ...

  5. Disorder-Induced Microscopic Magnetic Memory

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Disorder-Induced Microscopic Magnetic Memory Disorder-Induced Microscopic Magnetic Memory Print Wednesday, 26 October 2005 00:00 The magnetic-recording industry deliberately...

  6. Memorandum Memorializing Ex Parte Communication | Department...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Memorandum Memorializing Ex Parte Communication Memorandum Memorializing Ex Parte Communication On March 31, 2011, a call was held between the Department of Energy and...

  7. Memorandum Memorializing Ex Parte Communication | Department...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Memorandum Memorializing Ex Parte Communication More Documents & Publications Exelon response Memorandum Memorializing Ex Parte Communication CSC Workshop Transcript 02-20-2105

  8. Memorandum Memorializing Ex Parte Communication | Department...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    PDF icon Memorandum Memorializing Ex Parte Communication More Documents & Publications Memorandum Memorializing Ex Parte Communication Public Comment re NOI on Convention on ...

  9. Public Access Policy and Communications | DOE PAGES

    Office of Scientific and Technical Information (OSTI)

    Public Access Policy and Communications Public Access Policy and Communications 72414 Department of Energy Public Access Plan DOE Public Access Plan 22213 White House Office of ...

  10. Public Access Policy and Communications | DOE PAGES

    Office of Scientific and Technical Information (OSTI)

    DOE PAGES Public Access Policy and Communications Public Access Policy and Communications 72414 Department of Energy Public Access Plan DOE Public Access Plan 22213 White House ...

  11. REMOTE ACCESS SERVICES | Department of Energy

    Office of Environmental Management (EM)

    Energy IT Services (EITS) Remote Access Services: Outlook Web Access RSA Token Login RSA ... Energy Information Administration (EIA) Remote Access Services Outlook Web Access EIA VPN ...

  12. ACCESS Project: Final Report

    SciTech Connect (OSTI)

    Weller, Heiko

    2015-04-01

    The ACCESS project addressed the development, testing, and demonstration of the proposed advanced technologies and the associated emission and fuel economy improvement at an engine dynamometer and on a full-scale vehicle. Improve fuel economy by 25% with minimum performance penalties Achieve SULEV level emissions with gasoline Demonstrate multi-mode combustion engine management system

  13. Special Access Programs

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2011-03-29

    This Order is for OFFICIAL USE ONLY and will not be distributed on the Directives' Portal. For distribution, please contact the Executive Secretary of the Special Access Program Oversight Committee at (202) 586-3345. Does not cancel/supersede other directives.

  14. ELECTROSTATIC MEMORY SYSTEM

    DOE Patents [OSTI]

    Chu, J.C.

    1958-09-23

    An improved electrostatic memory system is de scribed fer a digital computer wherein a plarality of storage tubes are adapted to operate in either of two possible modes. According to the present irvention, duplicate storage tubes are provided fur each denominational order of the several binary digits. A single discriminator system is provided between corresponding duplicate tubes to determine the character of the infurmation stored in each. If either tube produces the selected type signal, corresponding to binazy "1" in the preferred embodiment, a "1" is regenerated in both tubes. In one mode of operation each bit of information is stored in two corresponding tubes, while in the other mode of operation each bit is stored in only one tube in the conventional manner.

  15. Template Discontinuation Access

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    FOR SUBJECT FROM: Personnel Security Program Manager SUBJECT: Discontinuation of Access Eligibility Determination Reference is made to your Questionnaire for National Security Positions signed on [insert date], which was forwarded to this office in connection with a Department of Energy security clearance request. A review of that form disclosed recent use of illegal drugs. [Insert a brief description of the circumstances such as: Specifically, you listed marijuana use 1 time in 5/02; 1 time in

  16. Earthquake 'memory' could spur aftershocks

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    applied. More surprising still, the team found that the granular beads could store a "memory" even after the system had undergone a quake and the beads had rearranged themselves....

  17. Shape memory alloy thaw sensors

    DOE Patents [OSTI]

    Shahinpoor, M.; Martinez, D.R.

    1998-04-07

    A sensor permanently indicates that it has been exposed to temperatures exceeding a critical temperature for a predetermined time period. An element of the sensor made from shape memory alloy changes shape when exposed, even temporarily, to temperatures above the austenitic temperature of the shape memory alloy. The shape change of the SMA element causes the sensor to change between two readily distinguishable states. 16 figs.

  18. Multi-Level Bitmap Indexes for Flash Memory Storage

    SciTech Connect (OSTI)

    Wu, Kesheng; Madduri, Kamesh; Canon, Shane

    2010-07-23

    Due to their low access latency, high read speed, and power-efficient operation, flash memory storage devices are rapidly emerging as an attractive alternative to traditional magnetic storage devices. However, tests show that the most efficient indexing methods are not able to take advantage of the flash memory storage devices. In this paper, we present a set of multi-level bitmap indexes that can effectively take advantage of flash storage devices. These indexing methods use coarsely binned indexes to answer queries approximately, and then use finely binned indexes to refine the answers. Our new methods read significantly lower volumes of data at the expense of an increased disk access count, thus taking full advantage of the improved read speed and low access latency of flash devices. To demonstrate the advantage of these new indexes, we measure their performance on a number of storage systems using a standard data warehousing benchmark called the Set Query Benchmark. We observe that multi-level strategies on flash drives are up to 3 times faster than traditional indexing strategies on magnetic disk drives.

  19. Improving Memory Subsystem Performance Using ViVA: Virtual Vector Architecture

    SciTech Connect (OSTI)

    Gebis, Joseph; Oliker, Leonid; Shalf, John; Williams, Samuel; Yelick, Katherine

    2009-01-12

    The disparity between microprocessor clock frequencies and memory latency is a primary reason why many demanding applications run well below peak achievable performance. Software controlled scratchpad memories, such as the Cell local store, attempt to ameliorate this discrepancy by enabling precise control over memory movement; however, scratchpad technology confronts the programmer and compiler with an unfamiliar and difficult programming model. In this work, we present the Virtual Vector Architecture (ViVA), which combines the memory semantics of vector computers with a software-controlled scratchpad memory in order to provide a more effective and practical approach to latency hiding. ViVA requires minimal changes to the core design and could thus be easily integrated with conventional processor cores. To validate our approach, we implemented ViVA on the Mambo cycle-accurate full system simulator, which was carefully calibrated to match the performance on our underlying PowerPC Apple G5 architecture. Results show that ViVA is able to deliver significant performance benefits over scalar techniques for a variety of memory access patterns as well as two important memory-bound compact kernels, corner turn and sparse matrix-vector multiplication -- achieving 2x-13x improvement compared the scalar version. Overall, our preliminary ViVA exploration points to a promising approach for improving application performance on leading microprocessors with minimal design and complexity costs, in a power efficient manner.

  20. Shape memory system with integrated actuation using embedded...

    Office of Scientific and Technical Information (OSTI)

    Shape memory system with integrated actuation using embedded particles Title: Shape memory system with integrated actuation using embedded particles A shape memory material with ...

  1. Shape memory system with integrated actuation using embedded...

    Office of Scientific and Technical Information (OSTI)

    One embodiment provides a shape memory material apparatus comprising a shape memory material body and magnetic pieces in the shape memory material body. Another embodiment provides ...

  2. Shape memory polymers (Patent) | SciTech Connect

    Office of Scientific and Technical Information (OSTI)

    Citation Details In-Document Search Title: Shape memory polymers New shape memory polymer compositions, methods for synthesizing new shape memory polymers, and apparatus comprising ...

  3. System and method for memory allocation in a multiclass memory system

    DOE Patents [OSTI]

    Loh, Gabriel; Meswani, Mitesh; Ignatowski, Michael; Nutter, Mark

    2016-06-28

    A system for memory allocation in a multiclass memory system includes a processor coupleable to a plurality of memories sharing a unified memory address space, and a library store to store a library of software functions. The processor identifies a type of a data structure in response to a memory allocation function call to the library for allocating memory to the data structure. Using the library, the processor allocates portions of the data structure among multiple memories of the multiclass memory system based on the type of the data structure.

  4. Random Selection for Drug Screening

    SciTech Connect (OSTI)

    Center for Human Reliability Studies

    2007-05-01

    Simple random sampling is generally the starting point for a random sampling process. This sampling technique ensures that each individual within a group (population) has an equal chance of being selected. There are a variety of ways to implement random sampling in a practical situation.

  5. Reader set encoding for directory of shared cache memory in multiprocessor system

    SciTech Connect (OSTI)

    Ahn, Dnaiel; Ceze, Luis H.; Gara, Alan; Ohmacht, Martin; Xiaotong, Zhuang

    2014-06-10

    In a parallel processing system with speculative execution, conflict checking occurs in a directory lookup of a cache memory that is shared by all processors. In each case, the same physical memory address will map to the same set of that cache, no matter which processor originated that access. The directory includes a dynamic reader set encoding, indicating what speculative threads have read a particular line. This reader set encoding is used in conflict checking. A bitset encoding is used to specify particular threads that have read the line.

  6. Optimizing TLB entries for mixed page size storage in contiguous memory

    DOE Patents [OSTI]

    Chen, Dong; Gara, Alan; Giampapa, Mark E.; Heidelberger, Philip; Kriegel, Jon K.; Ohmacht, Martin; Steinmacher-Burow, Burkhard

    2013-04-30

    A system and method for accessing memory are provided. The system comprises a lookup buffer for storing one or more page table entries, wherein each of the one or more page table entries comprises at least a virtual page number and a physical page number; a logic circuit for receiving a virtual address from said processor, said logic circuit for matching the virtual address to the virtual page number in one of the page table entries to select the physical page number in the same page table entry, said page table entry having one or more bits set to exclude a memory range from a page.

  7. Shape memory polymers (Patent) | SciTech Connect

    Office of Scientific and Technical Information (OSTI)

    Shape memory polymers Citation Details In-Document Search Title: Shape memory polymers New shape memory polymer compositions, methods for synthesizing new shape memory polymers, and apparatus comprising an actuator and a shape memory polymer wherein the shape memory polymer comprises at least a portion of the actuator. A shape memory polymer comprising a polymer composition which physically forms a network structure wherein the polymer composition has shape-memory behavior and can be formed into

  8. Access, Compiling and Running Jobs

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Access Compiling and Running Jobs Access, Compiling and Running Jobs Access Dirac Dirac can be accessed by logging into carver.nersc.gov. Compile To compile your code, you need to land on a dirac compute node 1st: qsub -q dirac_reg -l nodes=1 -l walltime=00:30:00 -I After you are inside the job, you can load the necessary module for compile: module unload pgi module unload openmpi module unload cuda module load gcc-sl6 module load openmpi-gcc-sl6 module load cuda Now you can compile your code.

  9. Vehicle barrier with access delay

    DOE Patents [OSTI]

    Swahlan, David J; Wilke, Jason

    2013-09-03

    An access delay vehicle barrier for stopping unauthorized entry into secure areas by a vehicle ramming attack includes access delay features for preventing and/or delaying an adversary from defeating or compromising the barrier. A horizontally deployed barrier member can include an exterior steel casing, an interior steel reinforcing member and access delay members disposed within the casing and between the casing and the interior reinforcing member. Access delay members can include wooden structural lumber, concrete and/or polymeric members that in combination with the exterior casing and interior reinforcing member act cooperatively to impair an adversarial attach by thermal, mechanical and/or explosive tools.

  10. Remote Access | The Ames Laboratory

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Ames Laboratory Information Systems supports VPN for remotely accessing internal computers and network services. These are: Once connected remotely to Ames Laboratory,...

  11. Shape memory polymer foams for endovascular therapies

    DOE Patents [OSTI]

    Wilson, Thomas S.; Maitland, Duncan J.

    2015-05-26

    A system for occluding a physical anomaly. One embodiment comprises a shape memory material body wherein the shape memory material body fits within the physical anomaly occluding the physical anomaly. The shape memory material body has a primary shape for occluding the physical anomaly and a secondary shape for being positioned in the physical anomaly.

  12. Shape memory polymer foams for endovascular therapies

    DOE Patents [OSTI]

    Wilson, Thomas S.; Maitland, Duncan J.

    2012-03-13

    A system for occluding a physical anomaly. One embodiment comprises a shape memory material body wherein the shape memory material body fits within the physical anomaly occluding the physical anomaly. The shape memory material body has a primary shape for occluding the physical anomaly and a secondary shape for being positioned in the physical anomaly.

  13. Configurable memory system and method for providing atomic counting operations in a memory device

    DOE Patents [OSTI]

    Bellofatto, Ralph E.; Gara, Alan G.; Giampapa, Mark E.; Ohmacht, Martin

    2010-09-14

    A memory system and method for providing atomic memory-based counter operations to operating systems and applications that make most efficient use of counter-backing memory and virtual and physical address space, while simplifying operating system memory management, and enabling the counter-backing memory to be used for purposes other than counter-backing storage when desired. The encoding and address decoding enabled by the invention provides all this functionality through a combination of software and hardware.

  14. Memory Optimization for Phase-field Simulations

    SciTech Connect (OSTI)

    Derek Gaston; John Peterson; Andrew Slaughter; Cody Permann; David Andrs

    2014-08-01

    Phase-field simulations are computationally and memory intensive applications. Many of the phase-field simulations being conducted in support of NEAMS were not capable of running on “normal clusters” with 2-4GB of RAM per core, and instead required specialized “big-memory” clusters with 64GB per core. To address this issue, the MOOSE team developed a new Python-based utility called MemoryLogger, and applied it to locate, diagnose, and eradicate memory bottlenecks within the MOOSE framework. MemoryLogger allows for a better understanding of the memory usage of an application being run in parallel across a cluster. Memory usage information is captured for every individual process in a parallel job, and communicated to the head node of the cluster. Console text output from the application itself is automatically matched with this memory usage information to produce a detailed picture of memory usage over time, making it straightforward to identify the subroutines which contribute most to the application’s peak memory usage. The information produced by the MemoryLogger quickly and effectively narrows the search for memory optimizations to the most data-intensive parts of the simulation.

  15. Shape memory alloy/shape memory polymer tools

    DOE Patents [OSTI]

    Seward, Kirk P.; Krulevitch, Peter A.

    2005-03-29

    Micro-electromechanical tools for minimally invasive techniques including microsurgery. These tools utilize composite shape memory alloy (SMA), shape memory polymer (SMP) and combinations of SMA and SMP to produce catheter distal tips, actuators, etc., which are bistable. Applications for these structures include: 1) a method for reversible fine positioning of a catheter tip, 2) a method for reversible fine positioning of tools or therapeutic catheters by a guide catheter, 3) a method for bending articulation through the body's vasculature, 4) methods for controlled stent delivery, deployment, and repositioning, and 5) catheters with variable modulus, with vibration mode, with inchworm capability, and with articulated tips. These actuators and catheter tips are bistable and are opportune for in vivo usage because the materials are biocompatible and convenient for intravascular use as well as other minimal by invasive techniques.

  16. Targeting Atmospheric Simulation Algorithms for Large Distributed Memory GPU Accelerated Computers

    SciTech Connect (OSTI)

    Norman, Matthew R

    2013-01-01

    Computing platforms are increasingly moving to accelerated architectures, and here we deal particularly with GPUs. In [15], a method was developed for atmospheric simulation to improve efficiency on large distributed memory machines by reducing communication demand and increasing the time step. Here, we improve upon this method to further target GPU accelerated platforms by reducing GPU memory accesses, removing a synchronization point, and better clustering computations. The modification ran over two times faster in some cases even though more computations were required, demonstrating the merit of improving memory handling on the GPU. Furthermore, we discover that the modification also has a near 100% hit rate in fast on-chip L1 cache and discuss the reasons for this. In concluding, we remark on further potential improvements to GPU efficiency.

  17. Laboratory Access | Sample Preparation Laboratories

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Access Planning Ahead Planning Ahead Please complete the Beam Time Request (BTR) and Support Request forms thourgh the User Portal. Thorough chemical and sample information must be included in your BTR. Support Request forms include a list of collaborators that require laboratory access and your group's laboratory equipment requests. Researcher safety is taken seriously at SLAC. Please remember that radioactive materials, nanomaterials, and biohazardous materials have additional safety

  18. Determining Memory Use | Argonne Leadership Computing Facility

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Allinea DDT Core File Settings Determining Memory Use Using VNC with a Debugger bgq_stack gdb Coreprocessor Runjob termination TotalView Performance Tools & APIs Software & Libraries IBM References Cooley Policies Documentation Feedback Please provide feedback to help guide us as we continue to build documentation for our new computing resource. [Feedback Form] Determining Memory Use Determining the amount of memory available during the execution of the program requires the use of

  19. Improving Alloy Memory by Tuning Material Composition

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Improving Alloy Memory by Tuning Material Composition Improving Alloy Memory by Tuning Material Composition Print Wednesday, 10 August 2016 00:00 Upon deformation, some metal alloys can "remember" their original form and return to it repeatedly when heated. Called "shape memory alloys," these materials have emerging applications in medical devices (stents, artery guide wires, and heart valves) and microelectromechanical actuators and sensors. Usually, within a few cycles, the

  20. 2e Carbon Access | Open Energy Information

    Open Energy Info (EERE)

    e Carbon Access Jump to: navigation, search Name: 2e Carbon Access Place: New York, New York Zip: 10280 Sector: Carbon Product: 2E Carbon Access is an enterprise focused solely on...

  1. Biomass accessibility analysis using electron tomography

    DOE Public Access Gateway for Energy & Science Beta (PAGES Beta)

    Hinkle, Jacob D.; Ciesielski, Peter N.; Gruchalla, Kenny; Munch, Kristin R.; Donohoe, Bryon S.

    2015-12-25

    Substrate accessibility to catalysts has been a dominant theme in theories of biomass deconstruction. Furthermore, current methods of quantifying accessibility do not elucidate mechanisms for increased accessibility due to changes in microstructure following pretreatment.

  2. Disorder-Induced Microscopic Magnetic Memory

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Disorder-Induced Microscopic Magnetic Memory Print The magnetic-recording industry deliberately introduces carefully controlled disorder into its materials to obtain the desired...

  3. Disorder-Induced Microscopic Magnetic Memory

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    point for future theories. The Persistence of Memory Magnets are not just for refrigerator doors-they are of paramount importance in today's digital information age. In the...

  4. Improving Memory Error Handling Using Linux

    SciTech Connect (OSTI)

    Carlton, Michael Andrew; Blanchard, Sean P.; Debardeleben, Nathan A.

    2014-07-25

    As supercomputers continue to get faster and more powerful in the future, they will also have more nodes. If nothing is done, then the amount of memory in supercomputer clusters will soon grow large enough that memory failures will be unmanageable to deal with by manually replacing memory DIMMs. "Improving Memory Error Handling Using Linux" is a process oriented method to solve this problem by using the Linux kernel to disable (offline) faulty memory pages containing bad addresses, preventing them from being used again by a process. The process of offlining memory pages simplifies error handling and results in reducing both hardware and manpower costs required to run Los Alamos National Laboratory (LANL) clusters. This process will be necessary for the future of supercomputing to allow the development of exascale computers. It will not be feasible without memory error handling to manually replace the number of DIMMs that will fail daily on a machine consisting of 32-128 petabytes of memory. Testing reveals the process of offlining memory pages works and is relatively simple to use. As more and more testing is conducted, the entire process will be automated within the high-performance computing (HPC) monitoring software, Zenoss, at LANL.

  5. Sandia Cognitive Runtime Engine with Active Memory

    Energy Science and Technology Software Center (OSTI)

    2005-12-01

    The SCREAM (Sandia Cognitive Runtime Engine with Active memory) software implements a subset of a Cognitive Famework developed at Sandia National Laboratories. The software is implemented in the Umbra simulation and modular software framework, which is C++-based. SCREAM components include a Concept Instance Driver, Semantic Activation Network, Concept Database, Context Recognizer, Context Database, Episodic Memory, Egocentric Spatial Memory, Allocentric Spatial Memory, Comparator, and a Context to Abstract Action converter. At initialization, modules load the datamore » files that together specify all the components of a particular cognitive model, such as concept declarations, context declarations, spreading activation weights, and context/situation-cue-patterns.« less

  6. Exploiting Data Similarity to Reduce Memory Footprints

    SciTech Connect (OSTI)

    Biswas, S; de Supinski, B R; Schulz, M; Franklin, D; Sherwood, T; Chong, F T

    2011-01-28

    Memory size has long limited large-scale applications on high-performance computing (HPC) systems. Since compute nodes frequently do not have swap space, physical memory often limits problem sizes. Increasing core counts per chip and power density constraints, which limit the number of DIMMs per node, have exacerbated this problem. Further, DRAM constitutes a significant portion of overall HPC system cost. Therefore, instead of adding more DRAM to the nodes, mechanisms to manage memory usage more efficiently - preferably transparently - could increase effective DRAM capacity and thus the benefit of multicore nodes for HPC systems. MPI application processes often exhibit significant data similarity. These data regions occupy multiple physical locations across the individual rank processes within a multicore node and thus offer a potential savings in memory capacity. These regions, primarily residing in heap, are dynamic, which makes them difficult to manage statically. Our novel memory allocation library, SBLLmalloc, automatically identifies identical memory blocks and merges them into a single copy. SBLLmalloc does not require application or OS changes since we implement it as a user-level library. Overall, we demonstrate that SBLLmalloc reduces the memory footprint of a range of MPI applications by 32.03% on average and up to 60.87%. Further, SBLLmalloc supports problem sizes for IRS over 21.36% larger than using standard memory management techniques, thus significantly increasing effective system size. Similarly, SBLLmalloc requires 43.75% fewer nodes than standard memory management techniques to solve an AMG problem.

  7. Visitor Hanford Computer Access Request - Hanford Site

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Visitor Hanford Computer Access Request Visitor Hanford Computer Access Request Visitor Hanford Computer Access Request Visitor Hanford Computer Access Request Email Email Page | Print Print Page | Text Increase Font Size Decrease Font Size The U.S. Department of Energy (DOE), Richland Operations Office (RL), in compliance with the 'Tri-Party Agreement Databases, Access Mechanism and Procedures' document, DOE/RL-93-69, Revision 5; set forth the requirements for access to the Hanford Site

  8. Mitigation of cache memory using an embedded hard-core PPC440 processor in a Virtex-5 Field Programmable Gate Array.

    SciTech Connect (OSTI)

    Learn, Mark Walter

    2010-02-01

    Sandia National Laboratories is currently developing new processing and data communication architectures for use in future satellite payloads. These architectures will leverage the flexibility and performance of state-of-the-art static-random-access-memory-based Field Programmable Gate Arrays (FPGAs). One such FPGA is the radiation-hardened version of the Virtex-5 being developed by Xilinx. However, not all features of this FPGA are being radiation-hardened by design and could still be susceptible to on-orbit upsets. One such feature is the embedded hard-core PPC440 processor. Since this processor is implemented in the FPGA as a hard-core, traditional mitigation approaches such as Triple Modular Redundancy (TMR) are not available to improve the processor's on-orbit reliability. The goal of this work is to investigate techniques that can help mitigate the embedded hard-core PPC440 processor within the Virtex-5 FPGA other than TMR. Implementing various mitigation schemes reliably within the PPC440 offers a powerful reconfigurable computing resource to these node-based processing architectures. This document summarizes the work done on the cache mitigation scheme for the embedded hard-core PPC440 processor within the Virtex-5 FPGAs, and describes in detail the design of the cache mitigation scheme and the testing conducted at the radiation effects facility on the Texas A&M campus.

  9. U-205: RSA Access Manager Session Replay Flaw Lets Remote Users Access the System

    Broader source: Energy.gov [DOE]

    A vulnerability was reported in RSA Access Manager. A remote user can gain access to the target system.

  10. Access Venture Partners | Open Energy Information

    Open Energy Info (EERE)

    Venture Partners Jump to: navigation, search Logo: Access Venture Partners Name: Access Venture Partners Address: 8787 Turnpike Drive, Suite 260 Place: Westminster, Colorado Zip:...

  11. International Electricity Trade - Open Access | Department of...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    to provide non-discriminatory open access transmission services. This open access requirement would also be attached to the permit holder's authorization(s) to export electricity. ...

  12. Argonne Site Access | Advanced Photon Source

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Getting Started Users Home Introduction to APS New User Checklist Argonne Site Access My APS Portal My APS Portal Argonne Site Access Argonne National Laboratory is a...

  13. Testing Web Application Accessibility | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Testing Web Application Accessibility Testing Web Application Accessibility Section 508 requires all federal agencies to make their electronic and information technologies ...

  14. Get Access to Work Onsite

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Get Access to Work Onsite Get Access to Work Onsite Print Monday, 31 August 2009 09:48 The following process MUST be completed online by new and returning users at least TWO WEEKS prior to arrival at the ALS. Not a U.S. citizen? Please look at Documents for Foreign Nationals well ahead of your visit. Bring all relevant documents to the ALS in order to complete your registration. NOTE: Users who are citizens of, or were born in, T4 countries (Cuba, Iran, Sudan, and Syria) need DOE permission to

  15. Shape memory system with integrated actuation using embedded particles

    Office of Scientific and Technical Information (OSTI)

    (Patent) | SciTech Connect Shape memory system with integrated actuation using embedded particles Citation Details In-Document Search Title: Shape memory system with integrated actuation using embedded particles A shape memory material with integrated actuation using embedded particles. One embodiment provides a shape memory material apparatus comprising a shape memory material body and magnetic pieces in the shape memory material body. Another embodiment provides a method of actuating a

  16. Shape memory polymer actuator and catheter

    DOE Patents [OSTI]

    Maitland, Duncan J.; Lee, Abraham P.; Schumann, Daniel L.; Matthews, Dennis L.; Decker, Derek E.; Jungreis, Charles A.

    2004-05-25

    An actuator system is provided for acting upon a material in a vessel. The system includes an optical fiber and a shape memory polymer material operatively connected to the optical fiber. The shape memory polymer material is adapted to move from a first shape for moving through said vessel to a second shape where it can act upon said material.

  17. Shape memory polymer actuator and catheter

    DOE Patents [OSTI]

    Maitland, Duncan J.; Lee, Abraham P.; Schumann, Daniel L.; Matthews, Dennis L.; Decker, Derek E.; Jungreis, Charles A.

    2007-11-06

    An actuator system is provided for acting upon a material in a vessel. The system includes an optical fiber and a shape memory polymer material operatively connected to the optical fiber. The shape memory polymer material is adapted to move from a first shape for moving through said vessel to a second shape where it can act upon said material.

  18. Tier identification (TID) for tiered memory characteristics

    SciTech Connect (OSTI)

    Chang, Jichuan; Lim, Kevin T; Ranganathan, Parthasarathy

    2014-03-25

    A tier identification (TID) is to indicate a characteristic of a memory region associated with a virtual address in a tiered memory system. A thread may be serviced according to a first path based on the TID indicating a first characteristic. The thread may be serviced according to a second path based on the TID indicating a second characteristic.

  19. Self-pacing direct memory access data transfer operations for compute nodes in a parallel computer

    SciTech Connect (OSTI)

    Blocksome, Michael A

    2015-02-17

    Methods, apparatus, and products are disclosed for self-pacing DMA data transfer operations for nodes in a parallel computer that include: transferring, by an origin DMA on an origin node, a RTS message to a target node, the RTS message specifying an message on the origin node for transfer to the target node; receiving, in an origin injection FIFO for the origin DMA from a target DMA on the target node in response to transferring the RTS message, a target RGET descriptor followed by a DMA transfer operation descriptor, the DMA descriptor for transmitting a message portion to the target node, the target RGET descriptor specifying an origin RGET descriptor on the origin node that specifies an additional DMA descriptor for transmitting an additional message portion to the target node; processing, by the origin DMA, the target RGET descriptor; and processing, by the origin DMA, the DMA transfer operation descriptor.

  20. Chaining direct memory access data transfer operations for compute nodes in a parallel computer

    DOE Patents [OSTI]

    Archer, Charles J.; Blocksome, Michael A.

    2010-09-28

    Methods, systems, and products are disclosed for chaining DMA data transfer operations for compute nodes in a parallel computer that include: receiving, by an origin DMA engine on an origin node in an origin injection FIFO buffer for the origin DMA engine, a RGET data descriptor specifying a DMA transfer operation data descriptor on the origin node and a second RGET data descriptor on the origin node, the second RGET data descriptor specifying a target RGET data descriptor on the target node, the target RGET data descriptor specifying an additional DMA transfer operation data descriptor on the origin node; creating, by the origin DMA engine, an RGET packet in dependence upon the RGET data descriptor, the RGET packet containing the DMA transfer operation data descriptor and the second RGET data descriptor; and transferring, by the origin DMA engine to a target DMA engine on the target node, the RGET packet.

  1. Product-form solution techniques for the performance analysis of multiple-bus multiprocessor systems with nonuniform memory references

    SciTech Connect (OSTI)

    Chiola, G.; Marsan, M.A.; Balbo, G.

    1988-05-01

    Recursive relations are derived for the exact computation of the steady-state probability distribution of some queueing models with passive resources that can be used to analyze the performance of multiple-bus multiprocessor system architectures. The most general case that was shown to admit a product-form solution is described, and a recursive solution is obtained considering different processor access rates, different memory selection probabilities, and an FCFS bus scheduling policy. Several simpler cases allowing easier model solutions are also considered. Numerical evaluations of large computing systems with nonuniform memory references show the usefulness of the results.

  2. NBP_RFI_Data_Access.PDF | Department of Energy

    Office of Environmental Management (EM)

    NBPRFIDataAccess.PDF NBPRFIDataAccess.PDF (104.55 KB) More Documents & Publications NBPRFICommunicationsRequirements.PDF NBP RFI: Data Access RE: NBP RFI: Data Access

  3. Similarity Engine: Using Content Similarity to Improve Memory...

    Office of Scientific and Technical Information (OSTI)

    Similarity to Improve Memory Resilience. Citation Details In-Document Search Title: Similarity Engine: Using Content Similarity to Improve Memory Resilience. Abstract not provided. ...

  4. Aging and deaging effects in shape memory alloys (Journal Article...

    Office of Scientific and Technical Information (OSTI)

    Aging and deaging effects in shape memory alloys Title: Aging and deaging effects in shape memory alloys Authors: Xue, Dezhen ; Zhou, Yumei ; Ding, Xiangdong ; Lookman, Turab ; ...

  5. The Future of Memory. (Conference) | SciTech Connect

    Office of Scientific and Technical Information (OSTI)

    The Future of Memory. Citation Details In-Document Search Title: The Future of Memory. Authors: Marinella, Matthew Publication Date: 2013-01-01 OSTI Identifier: 1063520 Report ...

  6. Shape memory polymer (SMP) gripper with a release sensing system...

    Office of Scientific and Technical Information (OSTI)

    Shape memory polymer (SMP) gripper with a release sensing system Title: Shape memory polymer (SMP) gripper with a release sensing system A system for releasing a target material, ...

  7. Guide wire extension for shape memory polymer occlusion removal...

    Office of Scientific and Technical Information (OSTI)

    Guide wire extension for shape memory polymer occlusion removal devices Title: Guide wire extension for shape memory polymer occlusion removal devices A flexible extension for a ...

  8. A Shape Memory Polymer Dialysis Needle Adapter for the Reduction...

    Office of Scientific and Technical Information (OSTI)

    A Shape Memory Polymer Dialysis Needle Adapter for the Reduction of Hemodynamic Stress within Arteriovenous Grafts Citation Details In-Document Search Title: A Shape Memory Polymer ...

  9. Method for loading shape memory polymer gripper mechanisms (Patent...

    Office of Scientific and Technical Information (OSTI)

    Method for loading shape memory polymer gripper mechanisms Title: Method for loading shape memory polymer gripper mechanisms A method and apparatus for loading deposit material, ...

  10. Shape memory polymer actuator and catheter (Patent) | DOEPatents

    Office of Scientific and Technical Information (OSTI)

    Shape memory polymer actuator and catheter Title: Shape memory polymer actuator and catheter An actuator system is provided for acting upon a material in a vessel. The system ...

  11. Biomedical Applications of Thermally Activated Shape Memory Polymers...

    Office of Scientific and Technical Information (OSTI)

    Biomedical Applications of Thermally Activated Shape Memory Polymers Citation Details In-Document Search Title: Biomedical Applications of Thermally Activated Shape Memory Polymers ...

  12. Shape memory polymer foams for endovascular therapies (Patent...

    Office of Scientific and Technical Information (OSTI)

    Shape memory polymer foams for endovascular therapies Title: Shape memory polymer foams for endovascular therapies A system for occluding a physical anomaly. One embodiment ...

  13. Shape memory system with integrated actuation using embedded...

    Office of Scientific and Technical Information (OSTI)

    Patent: Shape memory system with integrated actuation using embedded particles Citation Details In-Document Search Title: Shape memory system with integrated actuation using ...

  14. Apparatus for loading shape memory gripper mechanisms (Patent...

    Office of Scientific and Technical Information (OSTI)

    Apparatus for loading shape memory gripper mechanisms Title: Apparatus for loading shape memory gripper mechanisms A method and apparatus for loading deposit material, such as an ...

  15. The Future of Memory. (Conference) | SciTech Connect

    Office of Scientific and Technical Information (OSTI)

    The Future of Memory. Citation Details In-Document Search Title: The Future of Memory. Authors: Marinella, Matthew Publication Date: 2013-03-01 OSTI Identifier: 1067546 Report ...

  16. Whirlpools on the Nanoscale Could Multiply Magnetic Memory

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Whirlpools on the Nanoscale Could Multiply Magnetic Memory Whirlpools on the Nanoscale Could Multiply Magnetic Memory Print Tuesday, 21 May 2013 00:00 Research at the Advanced...

  17. Shape memory polymer foams for endovascular therapies (Patent...

    Office of Scientific and Technical Information (OSTI)

    A system for occluding a physical anomaly. One embodiment comprises a shape memory material body wherein the shape memory material body fits within the physical anomaly occluding ...

  18. Controlling the Actuation Rate of Low Density Shape Memory Polymer...

    Office of Scientific and Technical Information (OSTI)

    Density Shape Memory Polymer Foams in Water Citation Details In-Document Search Title: Controlling the Actuation Rate of Low Density Shape Memory Polymer Foams in Water Authors: ...

  19. Aging and deaging effects in shape memory alloys (Journal Article...

    Office of Scientific and Technical Information (OSTI)

    Aging and deaging effects in shape memory alloys Citation Details In-Document Search Title: Aging and deaging effects in shape memory alloys Authors: Xue, Dezhen ; Zhou, Yumei ; ...

  20. Shape memory polymer foams for endovascular therapies (Patent...

    Office of Scientific and Technical Information (OSTI)

    Patent: Shape memory polymer foams for endovascular therapies Citation Details In-Document Search Title: Shape memory polymer foams for endovascular therapies A system for ...

  1. Modesto Memorial Hospital Space Heating Low Temperature Geothermal...

    Open Energy Info (EERE)

    Memorial Hospital Space Heating Low Temperature Geothermal Facility Jump to: navigation, search Name Modesto Memorial Hospital Space Heating Low Temperature Geothermal Facility...

  2. Low density biodegradable shape memory polyurethane foams for...

    Office of Scientific and Technical Information (OSTI)

    Low density biodegradable shape memory polyurethane foams for embolic biomedical applications Citation Details In-Document Search Title: Low density biodegradable shape memory...

  3. Rebuilding it Better: Greensburg, Kansas, Kiowa County Memorial...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    it Better: Greensburg, Kansas, Kiowa County Memorial Hospital (Brochure) (Revised) DOE and NREL Technical Assistance Building Green in Greensburg: Kiowa County Memorial Hospital

  4. Rebuilding it Better: Greensburg, Kansas, Kiowa County Memorial...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Memorial Hospital in Greensburg, Kansas. PDF icon 47461.pdf More Documents & Publications Rebuilding it Better: Greensburg, Kansas, Kiowa County Memorial Hospital (Brochure) ...

  5. Controlling the Actuation Rate of Low Density Shape Memory Polymer...

    Office of Scientific and Technical Information (OSTI)

    Memory Polymer Foams in Water Citation Details In-Document Search Title: Controlling the Actuation Rate of Low Density Shape Memory Polymer Foams in Water Authors: Singhal, P ; ...

  6. Ultralow-fatigue shape memory alloy films (Journal Article) ...

    Office of Scientific and Technical Information (OSTI)

    Ultralow-fatigue shape memory alloy films Citation Details In-Document Search Title: Ultralow-fatigue shape memory alloy films Authors: Chluba, Christoph ; Ge, Wenwei ; Lima de ...

  7. Energy scaling advantages of resistive memory crossbar based...

    Office of Scientific and Technical Information (OSTI)

    Energy scaling advantages of resistive memory crossbar based computation and its application to sparse coding Prev Next Title: Energy scaling advantages of resistive memory ...

  8. V-176: Adobe Flash Player Memory Corruption Flaw Lets Remote...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    6: Adobe Flash Player Memory Corruption Flaw Lets Remote Users Execute Arbitrary Code V-176: Adobe Flash Player Memory Corruption Flaw Lets Remote Users Execute Arbitrary Code June...

  9. Performing an allreduce operation using shared memory

    SciTech Connect (OSTI)

    Archer, Charles J; Dozsa, Gabor; Ratterman, Joseph D; Smith, Brian E

    2014-06-10

    Methods, apparatus, and products are disclosed for performing an allreduce operation using shared memory that include: receiving, by at least one of a plurality of processing cores on a compute node, an instruction to perform an allreduce operation; establishing, by the core that received the instruction, a job status object for specifying a plurality of shared memory allreduce work units, the plurality of shared memory allreduce work units together performing the allreduce operation on the compute node; determining, by an available core on the compute node, a next shared memory allreduce work unit in the job status object; and performing, by that available core on the compute node, that next shared memory allreduce work unit.

  10. (U) Computation acceleration using dynamic memory

    SciTech Connect (OSTI)

    Hakel, Peter

    2014-10-24

    Many computational applications require the repeated use of quantities, whose calculations can be expensive. In order to speed up the overall execution of the program, it is often advantageous to replace computation with extra memory usage. In this approach, computed values are stored and then, when they are needed again, they are quickly retrieved from memory rather than being calculated again at great cost. Sometimes, however, the precise amount of memory needed to store such a collection is not known in advance, and only emerges in the course of running the calculation. One problem accompanying such a situation is wasted memory space in overdimensioned (and possibly sparse) arrays. Another issue is the overhead of copying existing values to a new, larger memory space, if the original allocation turns out to be insufficient. In order to handle these runtime problems, the programmer therefore has the extra task of addressing them in the code.

  11. Performing an allreduce operation using shared memory

    DOE Patents [OSTI]

    Archer, Charles J.; Dozsa, Gabor; Ratterman, Joseph D.; Smith, Brian E.

    2012-04-17

    Methods, apparatus, and products are disclosed for performing an allreduce operation using shared memory that include: receiving, by at least one of a plurality of processing cores on a compute node, an instruction to perform an allreduce operation; establishing, by the core that received the instruction, a job status object for specifying a plurality of shared memory allreduce work units, the plurality of shared memory allreduce work units together performing the allreduce operation on the compute node; determining, by an available core on the compute node, a next shared memory allreduce work unit in the job status object; and performing, by that available core on the compute node, that next shared memory allreduce work unit.

  12. Temperature and electrical memory of polymer fibers

    SciTech Connect (OSTI)

    Yuan, Jinkai; Zakri, Ccile; Grillard, Fabienne; Neri, Wilfrid; Poulin, Philippe

    2014-05-15

    We report in this work studies of the shape memory behavior of polymer fibers loaded with carbon nanotubes or graphene flakes. These materials exhibit enhanced shape memory properties with the generation of a giant stress upon shape recovery. In addition, they exhibit a surprising temperature memory with a peak of generated stress at a temperature nearly equal to the temperature of programming. This temperature memory is ascribed to the presence of dynamical heterogeneities and to the intrinsic broadness of the glass transition. We present recent experiments related to observables other than mechanical properties. In particular nanocomposite fibers exhibit variations of electrical conductivity with an accurate memory. Indeed, the rate of conductivity variations during temperature changes reaches a well defined maximum at a temperature equal to the temperature of programming. Such materials are promising for future actuators that couple dimensional changes with sensing electronic functionalities.

  13. Boston solar retrofits: studies of solar access and economics

    SciTech Connect (OSTI)

    Shapiro, M.

    1980-11-01

    Studies of solar access and solar retrofit economics are described for residential applications in the City of Boston. The study of solar access was based upon a random sample of 94 buildings; the sample was stratified to ensure a broad geographic representation from the city's various sections. Using available data on the heights and orientations of the sampled structures and surrounding buildings, each building's hourly access to sunlight was computed separately for the roof and south facing walls. These data were then aggregated by broad structural classifications in order to provide general measures of solar access. The second study was a comparative analysis of the economics of several solar heating and hot water systems. An active hot water system, installed using pre-assembled, commercially purchased equipment, was selected as a reference technology. A variety of measures of economic performance were computed for this system, with and without existing tax credits and under various financing arrangements. Next, a number of alternative approaches for solar space and water heating were identified from interviews with individuals and groups involved in solar retrofit projects in the Boston area. The objective was to identify approaches that many of those interviewed believe to be low-cost means of applying solar energy in residential settings. The approaches selected include thermal window covers, wall collectors, bread box water heaters, and sun spaces. Preliminary estimates of the performance of several representative designs were developed and the economics of these designs evaluated.

  14. LANSCE personnel access control system

    SciTech Connect (OSTI)

    Sturrock, J.C.; Gallegos, F.R.; Hall, M.J.

    1997-01-01

    The Radiation Security System (RSS) at the Los Alamos Neutron Science Center (LANSCE) provides personnel protection from prompt radiation due to accelerated beam. The Personnel Access Control System (PACS) is a component of the RSS that is designed to prevent personnel access to areas where prompt radiation is a hazard. PACS was designed to replace several older personnel safety systems (PSS) with a single modem unified design. Lessons learned from the operation over the last 20 years were incorporated into a redundant sensor, single-point failure safe, fault tolerant, and tamper-resistant system that prevents access to the beam areas by controlling the access keys and beam stoppers. PACS uses a layered philosophy to the physical and electronic design. The most critical assemblies are battery backed up, relay logic circuits; less critical devices use Programmable Logic Controllers (PLCs) for timing functions and communications. Outside reviewers have reviewed the operational safety of the design. The design philosophy, lessons learned, hardware design, software design, operation, and limitations of the device are described.

  15. Expanding Solar Access to Nonprofits

    Broader source: Energy.gov [DOE]

    The Solar Foundation is leading a team that developed the CivicPACE program through an award from the SunShot Initiative. CivicPACE addresses the underwriting and access challenges of solar financing for tax-exempt organizations, such as churches, nonprofit affordable housing, community clinics, and education institutions.

  16. Network Randomization and Dynamic Defense for Critical Infrastructure Systems

    SciTech Connect (OSTI)

    Chavez, Adrian R.; Martin, Mitchell Tyler; Hamlet, Jason; Stout, William M.S.; Lee, Erik

    2015-04-01

    Critical Infrastructure control systems continue to foster predictable communication paths, static configurations, and unpatched systems that allow easy access to our nation's most critical assets. This makes them attractive targets for cyber intrusion. We seek to address these attack vectors by automatically randomizing network settings, randomizing applications on the end devices themselves, and dynamically defending these systems against active attacks. Applying these protective measures will convert control systems into moving targets that proactively defend themselves against attack. Sandia National Laboratories has led this effort by gathering operational and technical requirements from Tennessee Valley Authority (TVA) and performing research and development to create a proof-of-concept solution. Our proof-of-concept has been tested in a laboratory environment with over 300 nodes. The vision of this project is to enhance control system security by converting existing control systems into moving targets and building these security measures into future systems while meeting the unique constraints that control systems face.

  17. Chapter_12_Special_Access_Programs

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    2 Special Access Programs This chapter describes the DOE Special Access Program (SAP) at DOE HQ and implements the requirements of: * Executive Order 13526, Classified National Security Information, Section 4.3, Special Access Programs, and Section 5.4, General Responsibilities, subparagraph (d). * DOE Order 471.5, Special Access Programs. A SAP is a program established for a specific class of classified information that imposes safeguarding and access requirements exceeding those normally

  18. Remote Access Options | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Remote Access Options Remote Access Options A Virtual Private Network (VPN) is a private connection between two resources that uses the public telecommunication infrastructure. It maintains privacy through the use of a tunneling protocol and security procedures and provides the following abilities. * Messaging via Outlook Web Access (OWA) * Remote desktop and application access via VDI and Citrix(tm) Workplace * Secure access to DOE Headquarters mission-specific internal network resources

  19. Energy-aware Thread and Data Management in Heterogeneous Multi-core, Multi-memory Systems

    SciTech Connect (OSTI)

    Su, Chun-Yi

    2014-12-16

    By 2004, microprocessor design focused on multicore scaling—increasing the number of cores per die in each generation—as the primary strategy for improving performance. These multicore processors typically equip multiple memory subsystems to improve data throughput. In addition, these systems employ heterogeneous processors such as GPUs and heterogeneous memories like non-volatile memory to improve performance, capacity, and energy efficiency. With the increasing volume of hardware resources and system complexity caused by heterogeneity, future systems will require intelligent ways to manage hardware resources. Early research to improve performance and energy efficiency on heterogeneous, multi-core, multi-memory systems focused on tuning a single primitive or at best a few primitives in the systems. The key limitation of past efforts is their lack of a holistic approach to resource management that balances the tradeoff between performance and energy consumption. In addition, the shift from simple, homogeneous systems to these heterogeneous, multicore, multi-memory systems requires in-depth understanding of efficient resource management for scalable execution, including new models that capture the interchange between performance and energy, smarter resource management strategies, and novel low-level performance/energy tuning primitives and runtime systems. Tuning an application to control available resources efficiently has become a daunting challenge; managing resources in automation is still a dark art since the tradeoffs among programming, energy, and performance remain insufficiently understood. In this dissertation, I have developed theories, models, and resource management techniques to enable energy-efficient execution of parallel applications through thread and data management in these heterogeneous multi-core, multi-memory systems. I study the effect of dynamic concurrent throttling on the performance and energy of multi-core, non-uniform memory access

  20. Data Movement Dominates: Advanced Memory Technology to Address the Real Exascale Power Problem

    SciTech Connect (OSTI)

    Bergman, Keren

    2014-08-28

    Energy is the fundamental barrier to Exascale supercomputing and is dominated by the cost of moving data from one point to another, not computation. Similarly, performance is dominated by data movement, not computation. The solution to this problem requires three critical technologies: 3D integration, optical chip-to-chip communication, and a new communication model. The central goal of the Sandia led "Data Movement Dominates" project aimed to develop memory systems and new architectures based on these technologies that have the potential to lower the cost of local memory accesses by orders of magnitude and provide substantially more bandwidth. Only through these transformational advances can future systems reach the goals of Exascale computing with a manageable power budgets. The Sandia led team included co-PIs from Columbia University, Lawrence Berkeley Lab, and the University of Maryland. The Columbia effort of Data Movement Dominates focused on developing a physically accurate simulation environment and experimental verification for optically-connected memory (OCM) systems that can enable continued performance scaling through high-bandwidth capacity, energy-efficient bit-rate transparency, and time-of-flight latency. With OCM, memory device parallelism and total capacity can scale to match future high-performance computing requirements without sacrificing data-movement efficiency. When we consider systems with integrated photonics, links to memory can be seamlessly integrated with the interconnection network-in a sense, memory becomes a primary aspect of the interconnection network. At the core of the Columbia effort, toward expanding our understanding of OCM enabled computing we have created an integrated modeling and simulation environment that uniquely integrates the physical behavior of the optical layer. The PhoenxSim suite of design and software tools developed under this effort has enabled the co-design of and performance evaluation photonics-enabled OCM

  1. Securing non-volatile memory regions

    DOE Patents [OSTI]

    Faraboschi, Paolo; Ranganathan, Parthasarathy; Muralimanohar, Naveen

    2013-08-20

    Methods, apparatus and articles of manufacture to secure non-volatile memory regions are disclosed. An example method disclosed herein comprises associating a first key pair and a second key pair different than the first key pair with a process, using the first key pair to secure a first region of a non-volatile memory for the process, and using the second key pair to secure a second region of the non-volatile memory for the same process, the second region being different than the first region.

  2. Non-volatile memory for checkpoint storage

    SciTech Connect (OSTI)

    Blumrich, Matthias A.; Chen, Dong; Cipolla, Thomas M.; Coteus, Paul W.; Gara, Alan; Heidelberger, Philip; Jeanson, Mark J.; Kopcsay, Gerard V.; Ohmacht, Martin; Takken, Todd E.

    2014-07-22

    A system, method and computer program product for supporting system initiated checkpoints in high performance parallel computing systems and storing of checkpoint data to a non-volatile memory storage device. The system and method generates selective control signals to perform checkpointing of system related data in presence of messaging activity associated with a user application running at the node. The checkpointing is initiated by the system such that checkpoint data of a plurality of network nodes may be obtained even in the presence of user applications running on highly parallel computers that include ongoing user messaging activity. In one embodiment, the non-volatile memory is a pluggable flash memory card.

  3. Enforcement Letter, Battelle Memorial Institute- May 5, 2004

    Office of Energy Efficiency and Renewable Energy (EERE)

    Issued to Battelle Memorial Institute related to Radiological Work Practices at the Pacific Northwest National Laboratory

  4. Crystallographic attributes of a shape-memory alloy

    SciTech Connect (OSTI)

    Bhattacharya, K.

    1999-01-01

    Shape-memory alloys are attractive for many potential applications. In an attempt to provide ideas and guidelines for the development of new shape-memory alloys, this paper reports on a series of investigations that examine the reasons in the crystallography that made (i) shape-memory alloys special amongst martensites and (ii) Nickel-Titanium special among shape-memory alloys.

  5. Bulk-memory processor for data acquisition

    SciTech Connect (OSTI)

    Nelson, R.O.; McMillan, D.E.; Sunier, J.W.; Meier, M.; Poore, R.V.

    1981-01-01

    To meet the diverse needs and data rate requirements at the Van de Graaff and Weapons Neutron Research (WNR) facilities, a bulk memory system has been implemented which includes a fast and flexible processor. This bulk memory processor (BMP) utilizes bit slice and microcode techniques and features a 24 bit wide internal architecture allowing direct addressing of up to 16 megawords of memory and histogramming up to 16 million counts per channel without overflow. The BMP is interfaced to the MOSTEK MK 8000 bulk memory system and to the standard MODCOMP computer I/O bus. Coding for the BMP both at the microcode level and with macro instructions is supported. The generalized data acquisition system has been extended to support the BMP in a manner transparent to the user.

  6. Searching game trees under memory constraints

    SciTech Connect (OSTI)

    Bhattacharya, S.; Bagchi, A.

    1996-12-31

    The best-first game-tree search algorithm SSS* has greater pruning power than the depth-first algorithm Alpha-Beta. Yet it is seldom used in practice because it is slow in execution and requires substantial memory. Variants of SSS* have been proposed in recent years that overcome some, but not all, of its limitations. The recursive controlled-memory best-first search scheme MemSSS* described here is a new derivative of SSS* that compares favourably with Alpha-Beta in respect of all three major performance measures, namely, pruning power, running time and memory needs. MemSSS* improves upon an earlier controlled-memory algorithm IterSSS* which has most of the desired properties but is slow in execution.

  7. Search for: shape memory* | DOE PAGES

    Office of Scientific and Technical Information (OSTI)

    ... Stress transfer during different deformation stages in a nano-precipitate-strenthened Ni-Ti shape memory alloy Dong, Y. H. ; Cong, D. Y. ; Nie, Z. H. ; He, Z. B. ; Wang, Z. L. ; ...

  8. Associative memory in phasing neuron networks

    SciTech Connect (OSTI)

    Nair, Niketh S; Bochove, Erik J.; Braiman, Yehuda

    2014-01-01

    We studied pattern formation in a network of coupled Hindmarsh-Rose model neurons and introduced a new model for associative memory retrieval using networks of Kuramoto oscillators. Hindmarsh-Rose Neural Networks can exhibit a rich set of collective dynamics that can be controlled by their connectivity. Specifically, we showed an instance of Hebb's rule where spiking was correlated with network topology. Based on this, we presented a simple model of associative memory in coupled phase oscillators.

  9. Post polymerization cure shape memory polymers

    DOE Patents [OSTI]

    Wilson, Thomas S; Hearon, Michael Keith; Bearinger, Jane P

    2014-11-11

    This invention relates to chemical polymer compositions, methods of synthesis, and fabrication methods for devices regarding polymers capable of displaying shape memory behavior (SMPs) and which can first be polymerized to a linear or branched polymeric structure, having thermoplastic properties, subsequently processed into a device through processes typical of polymer melts, solutions, and dispersions and then crossed linked to a shape memory thermoset polymer retaining the processed shape.

  10. Memorial Gathering Pending for NERSC's Michael Welcome

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Memorial Gathering Pending for NERSC's Michael Welcome Memorial Gathering Pending for NERSC's Michael Welcome February 4, 2014 MWelcome.JPG Mike Welcome A celebration of life is pending for Michael Welcome, a member of NERSC's Mass Storage Group, who collapsed at work on Thursday, Jan. 30, and subsequently died. Welcome spent his entire career working for computing organizations at Lawrence Berkeley and Lawrence Livermore national laboratories. He was 56. During his 30-year career, Welcome made

  11. Distributed trace using central performance counter memory

    SciTech Connect (OSTI)

    Satterfield, David L.; Sexton, James C.

    2013-01-22

    A plurality of processing cores, are central storage unit having at least memory connected in a daisy chain manner, forming a daisy chain ring layout on an integrated chip. At least one of the plurality of processing cores places trace data on the daisy chain connection for transmitting the trace data to the central storage unit, and the central storage unit detects the trace data and stores the trace data in the memory co-located in with the central storage unit.

  12. Distributed trace using central performance counter memory

    DOE Patents [OSTI]

    Satterfield, David L; Sexton, James C

    2013-10-22

    A plurality of processing cores, are central storage unit having at least memory connected in a daisy chain manner, forming a daisy chain ring layout on an integrated chip. At least one of the plurality of processing cores places trace data on the daisy chain connection for transmitting the trace data to the central storage unit, and the central storage unit detects the trace data and stores the trace data in the memory co-located in with the central storage unit.

  13. Working memory, situation models, and synesthesia

    SciTech Connect (OSTI)

    Radvansky, Gabriel A.; Gibson, Bradley S.; McNerney, M. Windy

    2013-03-04

    Research on language comprehension suggests a strong relationship between working memory span measures and language comprehension. However, there is also evidence that this relationship weakens at higher levels of comprehension, such as the situation model level. The current study explored this relationship by comparing 10 grapheme–color synesthetes who have additional color experiences when they read words that begin with different letters and 48 normal controls on a number of tests of complex working memory capacity and processing at the situation model level. On all tests of working memory capacity, the synesthetes outperformed the controls. Importantly, there was no carryover benefit for the synesthetes for processing at the situation model level. This reinforces the idea that although some aspects of language comprehension are related to working memory span scores, this applies less directly to situation model levels. As a result, this suggests that theories of working memory must take into account this limitation, and the working memory processes that are involved in situation model construction and processing must be derived.

  14. Working memory, situation models, and synesthesia

    DOE Public Access Gateway for Energy & Science Beta (PAGES Beta)

    Radvansky, Gabriel A.; Gibson, Bradley S.; McNerney, M. Windy

    2013-03-04

    Research on language comprehension suggests a strong relationship between working memory span measures and language comprehension. However, there is also evidence that this relationship weakens at higher levels of comprehension, such as the situation model level. The current study explored this relationship by comparing 10 grapheme–color synesthetes who have additional color experiences when they read words that begin with different letters and 48 normal controls on a number of tests of complex working memory capacity and processing at the situation model level. On all tests of working memory capacity, the synesthetes outperformed the controls. Importantly, there was no carryover benefitmore » for the synesthetes for processing at the situation model level. This reinforces the idea that although some aspects of language comprehension are related to working memory span scores, this applies less directly to situation model levels. As a result, this suggests that theories of working memory must take into account this limitation, and the working memory processes that are involved in situation model construction and processing must be derived.« less

  15. Evaluating operating system vulnerability to memory errors.

    SciTech Connect (OSTI)

    Ferreira, Kurt Brian; Bridges, Patrick G.; Pedretti, Kevin Thomas Tauke; Mueller, Frank; Fiala, David; Brightwell, Ronald Brian

    2012-05-01

    Reliability is of great concern to the scalability of extreme-scale systems. Of particular concern are soft errors in main memory, which are a leading cause of failures on current systems and are predicted to be the leading cause on future systems. While great effort has gone into designing algorithms and applications that can continue to make progress in the presence of these errors without restarting, the most critical software running on a node, the operating system (OS), is currently left relatively unprotected. OS resiliency is of particular importance because, though this software typically represents a small footprint of a compute node's physical memory, recent studies show more memory errors in this region of memory than the remainder of the system. In this paper, we investigate the soft error vulnerability of two operating systems used in current and future high-performance computing systems: Kitten, the lightweight kernel developed at Sandia National Laboratories, and CLE, a high-performance Linux-based operating system developed by Cray. For each of these platforms, we outline major structures and subsystems that are vulnerable to soft errors and describe methods that could be used to reconstruct damaged state. Our results show the Kitten lightweight operating system may be an easier target to harden against memory errors due to its smaller memory footprint, largely deterministic state, and simpler system structure.

  16. Access to Capital | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Soft Costs Access to Capital Access to Capital Photo of a room full of people seated in rows with a few standing in the background. Two hands in the crowd are holding up sheets ...

  17. NBP RFI: Data Access | Department of Energy

    Office of Environmental Management (EM)

    Broadband Plan by Empowering Customers and the Smart Grid: Data Access, Third Party Use, and Privacy NBP RFI: Data Access (6.9 MB) More Documents & Publications RE: NBP RFI: ...

  18. Identity, Credential, and Access Management (ICAM)

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2013-02-19

    To establish requirements and responsibilities for DOE identity, credential, and access management program. Cancels DOE N 206.4.

  19. Accessibility Standard Statement | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Services » Assistive Technology » Accessibility Standard Statement Accessibility Standard Statement The U.S. Department of Energy is committed to making its electronic and information technologies accessible to individuals with disabilities in accordance with Section 508 of the Rehabilitation Act (29 U.S.C. 794d), as amended in 1998. Send feedback or concerns related to the accessibility of this website to DOE Section 508 Coordinator mailbox For more information about Section 508, please visit

  20. DOE Public Access Plan | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    DOE Public Access Plan DOE Public Access Plan On February 22, 2013, the Director of the White House Office of Science and Technology Policy (OSTP), Dr. John Holdren, issued a memorandum to all agency and department heads entitled, "Increasing Access to the Results of Federally Funded Scientific Research." The memo directed federal agencies with more than $100 million in annual conduct of research and development to develop plans for increasing public access to peer-reviewed scientific

  1. Get Access to Work Onsite

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Get Access to Work Onsite Print The following process MUST be completed online by new and returning users at least TWO WEEKS prior to arrival at the ALS. Not a U.S. citizen? Please look at Documents for Foreign Nationals well ahead of your visit. Bring all relevant documents to the ALS in order to complete your registration. NOTE: Users who are citizens of, or were born in, T4 countries (Cuba, Iran, Sudan, and Syria) need DOE permission to work at the ALS, a process which can take 4-6 months to

  2. Get Access to Work Onsite

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Get Access to Work Onsite Print The following process MUST be completed online by new and returning users at least TWO WEEKS prior to arrival at the ALS. Not a U.S. citizen? Please look at Documents for Foreign Nationals well ahead of your visit. Bring all relevant documents to the ALS in order to complete your registration. NOTE: Users who are citizens of, or were born in, T4 countries (Cuba, Iran, Sudan, and Syria) need DOE permission to work at the ALS, a process which can take 4-6 months to

  3. Access to UCNI | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    UCNI Access to UCNI An authorized person [see § 1017.20(a)] may grant routine access to UCNI to eligible individuals. In order to be eligible for routine access, the person must have a need to know the UCNI in order to perform official duties or other Government-authorized activities and meet the criteria in § 1017.20(b). If a person does not meet the criteria for routine access, a special request for limited access must be submitted in accordance with § 1017.21(a). Policy Questions and

  4. Shape memory system with integrated actuation using embedded particles

    DOE Patents [OSTI]

    Buckley, Patrick R.; Maitland, Duncan J.

    2012-05-29

    A shape memory material with integrated actuation using embedded particles. One embodiment provides a shape memory material apparatus comprising a shape memory material body and magnetic pieces in the shape memory material body. Another embodiment provides a method of actuating a device to perform an activity on a subject comprising the steps of positioning a shape memory material body in a desired position with regard to the subject, the shape memory material body capable of being formed in a specific primary shape, reformed into a secondary stable shape, and controllably actuated to recover the specific primary shape; including pieces in the shape memory material body; and actuating the shape memory material body using the pieces causing the shape memory material body to be controllably actuated to recover the specific primary shape and perform the activity on the subject.

  5. Shape memory system with integrated actuation using embedded particles

    DOE Patents [OSTI]

    Buckley, Patrick R.; Maitland, Duncan J.

    2009-09-22

    A shape memory material with integrated actuation using embedded particles. One embodiment provides a shape memory material apparatus comprising a shape memory material body and magnetic pieces in the shape memory material body. Another embodiment provides a method of actuating a device to perform an activity on a subject comprising the steps of positioning a shape memory material body in a desired position with regard to the subject, the shape memory material body capable of being formed in a specific primary shape, reformed into a secondary stable shape, and controllably actuated to recover the specific primary shape; including pieces in the shape memory material body; and actuating the shape memory material body using the pieces causing the shape memory material body to be controllably actuated to recover the specific primary shape and perform the activity on the subject.

  6. Shape memory system with integrated actuation using embedded particles

    DOE Patents [OSTI]

    Buckley, Patrick R; Maitland, Duncan J

    2014-04-01

    A shape memory material with integrated actuation using embedded particles. One embodiment provides a shape memory material apparatus comprising a shape memory material body and magnetic pieces in the shape memory material body. Another embodiment provides a method of actuating a device to perform an activity on a subject comprising the steps of positioning a shape memory material body in a desired position with regard to the subject, the shape memory material body capable of being formed in a specific primary shape, reformed into a secondary stable shape, and controllably actuated to recover the specific primary shape; including pieces in the shape memory material body; and actuating the shape memory material body using the pieces causing the shape memory material body to be controllably actuated to recover the specific primary shape and perform the activity on the subject.

  7. Search for: All records | SciTech Connect

    Office of Scientific and Technical Information (OSTI)

    ... David ; Gin, Aaron V. ; Tuttle, Bruce Andrew Radiation hard nonvolatile random access memory (NVRAM) is a crucial component for DOE and DOD surveillance and defense applications. ...

  8. Nation Radiobiology Archives Distributed Access

    Energy Science and Technology Software Center (OSTI)

    1992-06-01

    NRADA1.1 is a supplement to NRADA1.0. This version eliminates several bugs, and includes a few new features. The diskettes consist of a distributed subset of information representative of the extensive NRA databases and database access software maintained at the Pacific Northwest Laboratory which provide an introduction to the scope and style of the NRA Information Systems. Information in the NRA Summary, Inventory, and Bibliographic database is available upon request. Printed reports have been provided inmore » the past. The completion of the NRADA1.1 is the realization of a long standing goal of the staff and advisory committee. Information may be easily distributed to the user in an electronic form which preserves the relationships between the various databases.« less

  9. Sealed head access area enclosure

    DOE Patents [OSTI]

    Golden, Martin P.; Govi, Aldo R.

    1978-01-01

    A liquid-metal-cooled fast breeder power reactor is provided with a sealed head access area enclosure disposed above the reactor vessel head consisting of a plurality of prefabricated structural panels including a center panel removably sealed into position with inflatable seals, and outer panels sealed into position with semipermanent sealant joints. The sealant joints are located in the joint between the edge of the panels and the reactor containment structure and include from bottom to top an inverted U-shaped strip, a lower layer of a room temperature vulcanizing material, a separator strip defining a test space therewithin, and an upper layer of a room temperature vulcanizing material. The test space is tapped by a normally plugged passage extending to the top of the enclosure for testing the seal or introducing a buffer gas thereinto.

  10. SLAC All Access: Laser Labs

    ScienceCinema (OSTI)

    Minitti, Mike; Woods Mike

    2014-06-03

    From supermarket checkouts to video game consoles, lasers are ubiquitous in our lives. Here at SLAC, high-power lasers are critical to the cutting-edge research conducted at the laboratory. But, despite what you might imagine, SLAC's research lasers bear little resemblance to the blasters and phasers of science fiction. In this edition of All Access we put on our safety goggles for a peek at what goes on inside some of SLAC's many laser labs. LCLS staff scientist Mike Minitti and SLAC laser safety officer Mike Woods detail how these lasers are used to study the behavior of subatomic particles, broaden our understanding of cosmic rays and even unlock the mysteries of photosynthesis.

  11. IEA-Electricity Access Database | Open Energy Information

    Open Energy Info (EERE)

    - Energy Access Resource Type: Dataset Website: www.iea.orgweoelectricity.asp Language: English IEA-Electricity Access Database Screenshot References: Electricity Access...

  12. Property:EnergyAccessWebsite | Open Energy Information

    Open Energy Info (EERE)

    search Property Name EnergyAccessWebsite Property Type URL Description Energy Access Source Retrieved from "http:en.openei.orgwindex.php?titleProperty:EnergyAccessWeb...

  13. Property:EnergyAccessPartner | Open Energy Information

    Open Energy Info (EERE)

    search Property Name EnergyAccessPartner Property Type Boolean Description Energy Access Partner Retrieved from "http:en.openei.orgwindex.php?titleProperty:EnergyAccessPa...

  14. Property:EnergyAccessYearInitiated | Open Energy Information

    Open Energy Info (EERE)

    + Burkina Faso Energy Access Project + 2007 + E Ethiopia Energy Access Project + 2005 + G Ghana Energy Development and Access Project (GEDAP) + 2007 + M Mongolia Renewable Energy...

  15. Video, Audio, and Animation Text Versions for Web Accessibility...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Videos, Animations, & Audio Video, Audio, and Animation Text Versions for Web Accessibility Video, Audio, and Animation Text Versions for Web Accessibility For accessibility, ...

  16. DIODE STEERED MANGETIC-CORE MEMORY

    DOE Patents [OSTI]

    Melmed, A.S.; Shevlin, R.T.; Laupheimer, R.

    1962-09-18

    A word-arranged magnetic-core memory is designed for use in a digital computer utilizing the reverse or back current property of the semi-conductor diodes to restore the information in the memory after read-out. In order to ob tain a read-out signal from a magnetic core storage unit, it is necessary to change the states of some of the magnetic cores. In order to retain the information in the memory after read-out it is then necessary to provide a means to return the switched cores to their states before read-out. A rewrite driver passes a pulse back through each row of cores in which some switching has taken place. This pulse combines with the reverse current pulses of diodes for each column in which a core is switched during read-out to cause the particular cores to be switched back into their states prior to read-out. (AEC)

  17. Low Latency Messages on Distributed Memory Multiprocessors

    DOE Public Access Gateway for Energy & Science Beta (PAGES Beta)

    Rosing, Matt; Saltz, Joel

    1995-01-01

    This article describes many of the issues in developing an efficient interface for communication on distributed memory machines. Although the hardware component of message latency is less than 1 ws on many distributed memory machines, the software latency associated with sending and receiving typed messages is on the order of 50 μs. The reason for this imbalance is that the software interface does not match the hardware. By changing the interface to match the hardware more closely, applications with fine grained communication can be put on these machines. This article describes several tests performed and many of the issues involvedmore » in supporting low latency messages on distributed memory machines.« less

  18. Memory device using movement of protons

    DOE Patents [OSTI]

    Warren, William L.; Vanheusden, Karel J. R.; Fleetwood, Daniel M.; Devine, Roderick A. B.

    1998-01-01

    An electrically written memory element utilizing the motion of protons within a dielectric layer surrounded by layers on either side to confine the protons within the dielectric layer with electrode means attached to the surrounding layers to change the spatial position of the protons within the dielectric layer. The device is preferably constructed as a silicon-silicon dioxide-silicon layered structure with the protons being introduced to the structure laterally through the exposed edges of the silicon dioxide layer during a high temperature anneal in an atmosphere containing hydrogen gas. The device operates at low power, is preferably nonvolatile, is radiation tolerant, and is compatible with convention silicon MOS processing for integration with other microelectronic elements on the same silicon substrate. With the addition of an optically active layer, the memory element becomes an electrically written, optically read optical memory element.

  19. Ni-Mn-Ga shape memory nanoactuation

    SciTech Connect (OSTI)

    Kohl, M. Schmitt, M.; Krevet, B.; Backen, A.; Schultz, L.; Fhler, S.

    2014-01-27

    To probe finite size effects in ferromagnetic shape memory nanoactuators, double-beam structures with minimum dimensions down to 100?nm are designed, fabricated, and characterized in-situ in a scanning electron microscope with respect to their coupled thermo-elastic and electro-thermal properties. Electrical resistance and mechanical beam bending tests demonstrate a reversible thermal shape memory effect down to 100?nm. Electro-thermal actuation involves large temperature gradients along the nanobeam in the order of 100?K/?m. We discuss the influence of surface and twin boundary energies and explain why free-standing nanoactuators behave differently compared to constrained geometries like films and nanocrystalline shape memory alloys.

  20. Memory device using movement of protons

    DOE Patents [OSTI]

    Warren, W.L.; Vanheusden, K.J.R.; Fleetwood, D.M.; Devine, R.A.B.

    1998-11-03

    An electrically written memory element is disclosed utilizing the motion of protons within a dielectric layer surrounded by layers on either side to confine the protons within the dielectric layer with electrode means attached to the surrounding layers to change the spatial position of the protons within the dielectric layer. The device is preferably constructed as a silicon-silicon dioxide-silicon layered structure with the protons being introduced to the structure laterally through the exposed edges of the silicon dioxide layer during a high temperature anneal in an atmosphere containing hydrogen gas. The device operates at low power, is preferably nonvolatile, is radiation tolerant, and is compatible with convention silicon MOS processing for integration with other microelectronic elements on the same silicon substrate. With the addition of an optically active layer, the memory element becomes an electrically written, optically read optical memory element. 19 figs.

  1. Memory device using movement of protons

    DOE Patents [OSTI]

    Warren, William L.; Vanheusden, Karel J. R.; Fleetwood, Daniel M.; Devine, Roderick A. B.

    2000-01-01

    An electrically written memory element utilizing the motion of protons within a dielectric layer surrounded by layers on either side to confine the protons within the dielectric layer with electrode means attached to the surrounding layers to change the spatial position of the protons within the dielectric layer. The device is preferably constructed as a silicon-silicon dioxide-silicon layered structure with the protons being introduced to the structure laterally through the exposed edges of the silicon dioxide layer during a high temperature anneal in an atmosphere containing hydrogen gas. The device operates at low power, is preferably nonvolatile, is radiation tolerant, and is compatible with convention silicon MOS processing for integration with other microelectronic elements on the same silicon substrate. With the addition of an optically active layer, the memory element becomes an electrically written, optically read optical memory element.

  2. Shape memory and pseudoelasticity in metal nanowires.

    SciTech Connect (OSTI)

    Zimmerman, Jonathan A.; Park, Harold S.; Gall, Ken

    2005-07-01

    Structural reorientations in metallic fcc nanowires are controlled by a combination of size, thermal energy, and the type of defects formed during inelastic deformation. By utilizing atomistic simulations, we show that certain fcc nanowires can exhibit both shape memory and pseudoelastic behavior. We also show that the formation of defect-free twins, a process related to the material stacking fault energy, nanometer size scale, and surface stresses is the mechanism that controls the ability of fcc nanowires of different materials to show a reversible transition between two crystal orientations during loading and thus shape memory and pseudoelasticity.

  3. Saving Energy This Memorial Day | Department of Energy

    Energy Savers [EERE]

    This Memorial Day Saving Energy This Memorial Day May 19, 2014 - 4:07pm Addthis Be energy ... What does this mean for me? There are plenty of ways to save energy while having fun ...

  4. Method for refreshing a non-volatile memory

    DOE Patents [OSTI]

    Riekels, James E.; Schlesinger, Samuel

    2008-11-04

    A non-volatile memory and a method of refreshing a memory are described. The method includes allowing an external system to control refreshing operations within the memory. The memory may generate a refresh request signal and transmit the refresh request signal to the external system. When the external system finds an available time to process the refresh request, the external system acknowledges the refresh request and transmits a refresh acknowledge signal to the memory. The memory may also comprise a page register for reading and rewriting a data state back to the memory. The page register may comprise latches in lieu of supplemental non-volatile storage elements, thereby conserving real estate within the memory.

  5. SLAC Access Update | Stanford Synchrotron Radiation Lightsource

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    SLAC Access Update Effective October 2015, visit the SUSB VUE Center for badging and SLAC access. Before traveling to SLAC, please complete these procedures. 1. Register through the user portal to provide or update contact information; also confirm your proximity access/expiration through the user portal. 2. Alert us of all experimenters who will participate in scheduled experiments by listing everyone on proposals & beam time/support requests. Contact URA to add additional members to your

  6. Blackcomb: Hardware-Software Co-design for Non-Volatile Memory in Exascale Systems

    SciTech Connect (OSTI)

    Schreiber, Robert

    2014-11-26

    RAM array [Niu 2012b]. We have conducted an in depth analysis of the circuit and system level design implications of multi-layer cross-point Resistive RAM (MLCReRAM) from performance, power and reliability perspectives [Xu 2013]. The objective of this study is to understand the design trade-offs of this technology with respect to the MLC Phase Change Memory (MLCPCM).Our MLC ReRAM design at the circuit and system levels indicates that different resistance allocation schemes, programming strategies, peripheral designs, and material selections profoundly affect the area, latency, power, and reliability of MLC ReRAM. Based on this analysis, we conduct two case studies: first we compare MLC ReRAM design against MLC phase-change memory (PCM) and multi-layer cross-point ReRAM design, and point out why multi-level ReRAM is appealing; second we further explore the design space for MLC ReRAM. Architecture and Application We explored hybrid checkpointing using phase-change memory for future exascale systems [Dong 2011] and showed that the use of nonvolatile memory for local checkpointing significantly increases the number of faults covered by local checkpoints and reduces the probability of a global failure in the middle of a global checkpoint to less than 1%. We also proposed a technique called i2WAP to mitigate the write variations in NVM-based last-level cache for the improvement of the NVM lifetime [Wang 2013]. Our wear leveling technique attempts to work around the limitations of write endurance by arranging data access so that write operations can be distributed evenly across all the storage cells. During our intensive research on fault-tolerant NVM design, we found that ECC cannot effectively tolerate hard errors from limited write endurance and process imperfection. Therefore, we devised a novel Point and Discard (PAD) architecture in in [ 2012] as a hard-error-tolerant architecture for ReRAM-based Last Level Caches. PAD improves the lifetime of ReRAM caches by 1.6X-440X under

  7. Public Access Policy and Communications | DOE PAGES

    Office of Scientific and Technical Information (OSTI)

    to Advance Public Access Selected Articles and Interviews 81314 Federal News Radio Interview about DOE PAGESBeta with Brian Hitson, Acting Director, Office of Scientific and ...

  8. Access to Records Under The Privacy Act

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Outreach Doing Business Expand Doing Business Skip navigation links Newsroom About Us Civil Rights - EEO Freedom of Information Act The Freedom of Information Act Access to...

  9. Model Requests for Access or Correction

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Model-Requests-for-Access-or-Correction Sign In About | Careers | Contact | Investors | bpa.gov Search News & Us Expand News & Us Projects & Initiatives Expand Projects &...

  10. Access Solar Energy LLC | Open Energy Information

    Open Energy Info (EERE)

    Solar Energy LLC Jump to: navigation, search Name: Access Solar Energy LLC Place: Park CIty, Utah Zip: 84060 Sector: Renewable Energy, Solar Product: Utah-based developers of...

  11. ORISE Resources: Puerto Rico Equal Access Program

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Puerto Rico Equal Access Program: Programa de Igualdad de Acceso para Puerto Rico: Recursos de Informacin del VIHSIDA de la Biblioteca Nacional de Medicina Workbook The Oak...

  12. Colorado - Access Permit Application File Review Checklist |...

    Open Energy Info (EERE)

    Jump to: navigation, search OpenEI Reference LibraryAdd to library General: Colorado - Access Permit Application File Review Checklist Author Colorado Department of Transportation...

  13. WYDOT Access Manual | Open Energy Information

    Open Energy Info (EERE)

    search OpenEI Reference LibraryAdd to library PermittingRegulatory Guidance - GuideHandbook: WYDOT Access ManualPermittingRegulatory GuidanceGuideHandbook Abstract...

  14. Understanding and Improving Computational Science Storage Access...

    Office of Scientific and Technical Information (OSTI)

    Title: Understanding and Improving Computational Science Storage Access Through Continuous Characterization Authors: Carns, P. ; Harms, K. ; Allcock, W. ; Bacon, C. ; Lang, S. ; ...

  15. Utility Data Accessibility Map | Open Energy Information

    Open Energy Info (EERE)

    utility company to see your electricity data access options. Select the Benchmarking or Demand ResponseEnergy Efficiency map to find out whether your utility provides sufficient...

  16. Access Business Systems | Argonne National Laboratory

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    system (such as Windows, Mac, Linux, Apple IOS, Android) Through most browsers (Internet Explorer, Firefox, Safari; Chrome is not currently recommended) All access is through...

  17. Adjudicative Guidelines for Determining Eligibility for Access...

    Energy Savers [EERE]

    to include sensitive compartmented information and special access programs, and are to be used by government departments and agencies in all final clearance determinations. ...

  18. Access Fund Partners LP | Open Energy Information

    Open Energy Info (EERE)

    Partners, LP Place: San Juan Capistrano, California Zip: 92675 Product: Boutique investment banking and investment advisory firm with clean energy focus References: Access Fund...

  19. Chapter_12_Special_Access_Programs

    Broader source: Energy.gov (indexed) [DOE]

    Order 13526, Classified National Security Information, Section 4.3, Special Access ... exceeding those normally required for information at the same classification level. ...

  20. NBP RFI: Data Access | Department of Energy

    Office of Environmental Management (EM)

    Data Access (203.1 KB) More Documents & Publications Re: DOE Request for Information - Implementing the National Broadband Plan by Empowering Consumers and the Smart Grid: Data ...

  1. Ethiopia Energy Access Project | Open Energy Information

    Open Energy Info (EERE)

    Energy Access Project Location of project Ethiopia Energy Services Lighting, Cooking and water heating, Information and communications Year initiated 2005 Organization World Bank...

  2. Comments by Battelle Memorial Institute to DOE Rulemaking | Department of

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Energy by Battelle Memorial Institute to DOE Rulemaking Comments by Battelle Memorial Institute to DOE Rulemaking Comments by Battelle Memorial Institute in response to DOE' s July 27, 2010 Notice of Inquiry and Request for Comment (Notice) regarding implementation of Section 934 of the Energy Independence and Security Act of 2007 (Act). Comments by Battelle Memorial Institute to DOE Rulemaking (1.03 MB) More Documents & Publications Exelon response CSC_Extension.PDF Memorandum

  3. Rebuilding it Better: Greensburg, Kansas, Kiowa County Memorial Hospital

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    (Brochure) (Revised) | Department of Energy it Better: Greensburg, Kansas, Kiowa County Memorial Hospital (Brochure) (Revised) Rebuilding it Better: Greensburg, Kansas, Kiowa County Memorial Hospital (Brochure) (Revised) This brochure details the sustainable and green aspects of the LEED Platinum-designed Kiowa County Memorial Hospital in Greensburg, Kansas. 47461.pdf (659.27 KB) More Documents & Publications Rebuilding it Better: Greensburg, Kansas, Kiowa County Memorial Hospital

  4. Temperature and electrical memory of polymer fibers (Journal...

    Office of Scientific and Technical Information (OSTI)

    Temperature and electrical memory of polymer fibers Citation Details In-Document Search ... ACTUATORS; CARBON NANOTUBES; COMPOSITE MATERIALS; ELECTRIC CONDUCTIVITY; ...

  5. Making Memorial Day Plans? Be Sure They're Efficient

    Broader source: Energy.gov [DOE]

    Useful tips from Energy Savers - from cooking, to entertaining, to driving - how to stay energy efficient this Memorial Day weekend.

  6. A proposal for a UPC memory consistency model, v1.0

    SciTech Connect (OSTI)

    Yelick, Katherine; Bonachea, Dan; Wallace, Charles

    2004-05-05

    The memory consistency model in a language defines the order in which the results of write operations maybe observed through read operations. The behavior of a UPC program may depend on the timing of accesses to shared variables, so a program defines a set of possible executions, rather than a single execution. The memory consistency model constrains the set of possible executions for a given program; the user may then rely on properties that are true of all of those executions. The memory consistency model is defined in terms of the read and write operations issued by each thread in naive translation of the code, i.e., without any code transformations by the compiler, with each thread issuing operations as defined by the abstract machine defined in ISO C 5.1.2.3. A UPC compiler or run time system may perform various code transformations to improve performance, so long as they are not visible to the programmer - i.e., provided the set of externally-visible behaviors (the input/output dynamics and volatile behavior defined in ISO C 5.1.2.3) from any execution of the transformed program are identical to those of the original program executing on the abstract machine and adhering to the consistency model defined in this document.

  7. An implementation of SISAL for distributed-memory architectures

    SciTech Connect (OSTI)

    Beard, P.C.

    1995-06-01

    This thesis describes a new implementation of the implicitly parallel functional programming language SISAL, for massively parallel processor supercomputers. The Optimizing SISAL Compiler (OSC), developed at Lawrence Livermore National Laboratory, was originally designed for shared-memory multiprocessor machines and has been adapted to distributed-memory architectures. OSC has been relatively portable between shared-memory architectures, because they are architecturally similar, and OSC generates portable C code. However, distributed-memory architectures are not standardized -- each has a different programming model. Distributed-memory SISAL depends on a layer of software that provides a portable, distributed, shared-memory abstraction. This layer is provided by Split-C, a dialect of the C programming language developed at U.C. Berkeley, which has demonstrated good performance on distributed-memory architectures. Split-C provides important capabilities for good performance: support for program-specific distributed data structures, and split-phase memory operations. Distributed data structures help achieve good memory locality, while split-phase memory operations help tolerate the longer communication latencies inherent in distributed-memory architectures. The distributed-memory SISAL compiler and run-time system takes advantage of these capabilities. The results of these efforts is a compiler that runs identically on the Thinking Machines Connection Machine (CM-5), and the Meiko Computing Surface (CS-2).

  8. Guide wire extension for shape memory polymer occlusion removal devices

    DOE Patents [OSTI]

    Maitland, Duncan J.; Small, IV, Ward; Hartman, Jonathan

    2009-11-03

    A flexible extension for a shape memory polymer occlusion removal device. A shape memory polymer instrument is transported through a vessel via a catheter. A flexible elongated unit is operatively connected to the distal end of the shape memory polymer instrument to enhance maneuverability through tortuous paths en route to the occlusion.

  9. DOE - Office of Legacy Management -- Battelle Memorial Institute Battelle

    Office of Legacy Management (LM)

    Columbus Labs - OH 01 Memorial Institute Battelle Columbus Labs - OH 01 FUSRAP Considered Sites Site: Battelle Memorial Institute Battelle Columbus Labs (OH.01 ) Designated Name: Alternate Name: Location: Evaluation Year: Site Operations: Site Disposition: Radioactive Materials Handled: Primary Radioactive Materials Handled: Radiological Survey(s): Site Status: Also see Documents Related to Battelle Memorial Institute Battelle Columbus Labs

  10. Direct match data flow memory for data driven computing

    DOE Patents [OSTI]

    Davidson, G.S.; Grafe, V.G.

    1997-10-07

    A data flow computer and method of computing is disclosed which utilizes a data driven processor node architecture. The apparatus in a preferred embodiment includes a plurality of First-In-First-Out (FIFO) registers, a plurality of related data flow memories, and a processor. The processor makes the necessary calculations and includes a control unit to generate signals to enable the appropriate FIFO register receiving the result. In a particular embodiment, there are three FIFO registers per node: an input FIFO register to receive input information form an outside source and provide it to the data flow memories; an output FIFO register to provide output information from the processor to an outside recipient; and an internal FIFO register to provide information from the processor back to the data flow memories. The data flow memories are comprised of four commonly addressed memories. A parameter memory holds the A and B parameters used in the calculations; an opcode memory holds the instruction; a target memory holds the output address; and a tag memory contains status bits for each parameter. One status bit indicates whether the corresponding parameter is in the parameter memory and one status bit to indicate whether the stored information in the corresponding data parameter is to be reused. The tag memory outputs a ``fire`` signal (signal R VALID) when all of the necessary information has been stored in the data flow memories, and thus when the instruction is ready to be fired to the processor. 11 figs.

  11. Direct match data flow memory for data driven computing

    DOE Patents [OSTI]

    Davidson, George S.; Grafe, Victor Gerald

    1997-01-01

    A data flow computer and method of computing is disclosed which utilizes a data driven processor node architecture. The apparatus in a preferred embodiment includes a plurality of First-In-First-Out (FIFO) registers, a plurality of related data flow memories, and a processor. The processor makes the necessary calculations and includes a control unit to generate signals to enable the appropriate FIFO register receiving the result. In a particular embodiment, there are three FIFO registers per node: an input FIFO register to receive input information form an outside source and provide it to the data flow memories; an output FIFO register to provide output information from the processor to an outside recipient; and an internal FIFO register to provide information from the processor back to the data flow memories. The data flow memories are comprised of four commonly addressed memories. A parameter memory holds the A and B parameters used in the calculations; an opcode memory holds the instruction; a target memory holds the output address; and a tag memory contains status bits for each parameter. One status bit indicates whether the corresponding parameter is in the parameter memory and one status bit to indicate whether the stored information in the corresponding data parameter is to be reused. The tag memory outputs a "fire" signal (signal R VALID) when all of the necessary information has been stored in the data flow memories, and thus when the instruction is ready to be fired to the processor.

  12. A study of the viability of exploiting memory content similarity to improve resilience to memory errors

    DOE Public Access Gateway for Energy & Science Beta (PAGES Beta)

    Levy, Scott; Ferreira, Kurt B.; Bridges, Patrick G.; Thompson, Aidan P.; Trott, Christian

    2014-12-09

    Building the next-generation of extreme-scale distributed systems will require overcoming several challenges related to system resilience. As the number of processors in these systems grow, the failure rate increases proportionally. One of the most common sources of failure in large-scale systems is memory. In this paper, we propose a novel runtime for transparently exploiting memory content similarity to improve system resilience by reducing the rate at which memory errors lead to node failure. We evaluate the viability of this approach by examining memory snapshots collected from eight high-performance computing (HPC) applications and two important HPC operating systems. Based on themore » characteristics of the similarity uncovered, we conclude that our proposed approach shows promise for addressing system resilience in large-scale systems.« less

  13. A study of the viability of exploiting memory content similarity to improve resilience to memory errors

    SciTech Connect (OSTI)

    Levy, Scott; Ferreira, Kurt B.; Bridges, Patrick G.; Thompson, Aidan P.; Trott, Christian

    2014-12-09

    Building the next-generation of extreme-scale distributed systems will require overcoming several challenges related to system resilience. As the number of processors in these systems grow, the failure rate increases proportionally. One of the most common sources of failure in large-scale systems is memory. In this paper, we propose a novel runtime for transparently exploiting memory content similarity to improve system resilience by reducing the rate at which memory errors lead to node failure. We evaluate the viability of this approach by examining memory snapshots collected from eight high-performance computing (HPC) applications and two important HPC operating systems. Based on the characteristics of the similarity uncovered, we conclude that our proposed approach shows promise for addressing system resilience in large-scale systems.

  14. In-Memory Graph Databases for Web-Scale Data

    SciTech Connect (OSTI)

    Castellana, Vito G.; Morari, Alessandro; Weaver, Jesse R.; Tumeo, Antonino; Haglin, David J.; Villa, Oreste; Feo, John

    2015-03-01

    RDF databases have emerged as one of the most relevant way for organizing, integrating, and managing expo- nentially growing, often heterogeneous, and not rigidly structured data for a variety of scientific and commercial fields. In this paper we discuss the solutions integrated in GEMS (Graph database Engine for Multithreaded Systems), a software framework for implementing RDF databases on commodity, distributed-memory high-performance clusters. Unlike the majority of current RDF databases, GEMS has been designed from the ground up to primarily employ graph-based methods. This is reflected in all the layers of its stack. The GEMS framework is composed of: a SPARQL-to-C++ compiler, a library of data structures and related methods to access and modify them, and a custom runtime providing lightweight software multithreading, network messages aggregation and a partitioned global address space. We provide an overview of the framework, detailing its component and how they have been closely designed and customized to address issues of graph methods applied to large-scale datasets on clusters. We discuss in details the principles that enable automatic translation of the queries (expressed in SPARQL, the query language of choice for RDF databases) to graph methods, and identify differences with respect to other RDF databases.

  15. Organization of growing random networks

    SciTech Connect (OSTI)

    Krapivsky, P. L.; Redner, S.

    2001-06-01

    The organizational development of growing random networks is investigated. These growing networks are built by adding nodes successively, and linking each to an earlier node of degree k with an attachment probability A{sub k}. When A{sub k} grows more slowly than linearly with k, the number of nodes with k links, N{sub k}(t), decays faster than a power law in k, while for A{sub k} growing faster than linearly in k, a single node emerges which connects to nearly all other nodes. When A{sub k} is asymptotically linear, N{sub k}(t){similar_to}tk{sup {minus}{nu}}, with {nu} dependent on details of the attachment probability, but in the range 2{lt}{nu}{lt}{infinity}. The combined age and degree distribution of nodes shows that old nodes typically have a large degree. There is also a significant correlation in the degrees of neighboring nodes, so that nodes of similar degree are more likely to be connected. The size distributions of the in and out components of the network with respect to a given node{emdash}namely, its {open_quotes}descendants{close_quotes} and {open_quotes}ancestors{close_quotes}{emdash}are also determined. The in component exhibits a robust s{sup {minus}2} power-law tail, where s is the component size. The out component has a typical size of order lnt, and it provides basic insights into the genealogy of the network.

  16. T-606: Sun Java System Access Manager Lets Remote Users Partially Modify Data and Remote Authenticated Users Partially Access Data

    Broader source: Energy.gov [DOE]

    Sun Java System Access Manager Lets Remote Users Partially Modify Data and Remote Authenticated Users Partially Access Data.

  17. Foreign National Access to DOE Cyber Systems

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    1999-11-01

    DOE N 205.16, dated 9-15-05, extends this Notice until 9-30-06, unless sooner rescinded. To ensure foreign national access to DOE cyber systems continues to advance DOE program objectives while enforcing information access restrictions.

  18. Requirements definition for Hanford Access Control System

    SciTech Connect (OSTI)

    Curry, R.H.; Anema, R.J.; Byers, W.R.; Champion, R.E.; Forsberg, J.I.; Fritz, R.L.; Glasscock, J.A.; Keck, R.D.; McRae, L.P.; Morales, T.P.; Sams, M.A.; Schwartz, M.J.; Vickery, E.A.

    1990-03-01

    This document defines the philosophy for access control strategy at the Department of Energy (DOE) Hanford Site. It describes the required elements necessary for effective access control system applications. The document specifies performance requirements for various levels and types of access control equipment. It also discusses methods for measuring the performance of access control equipment and processes. Selected guidance related to testing and maintenance of various levels and types of access control equipment also is included. This document addresses an essential element of the overall security program at Hanford. It supports the DOE philosophy for security programs as defined in the DOE Orders. As stated in DOE Order 5632.1A (Protection Program Operations), ``physical protection of security interests encompasses three major activities: physical security systems, protective forces, and system performance tests.``

  19. Memory in Nonlinear Ionization of Transparent Solids

    SciTech Connect (OSTI)

    Rajeev, P. P.; Simova, E.; Hnatovsky, C.; Taylor, R. S.; Rayner, D. M.; Corkum, P. B.; Gertsvolf, M.; Bhardwaj, V. R.

    2006-12-22

    We demonstrate a shot-to-shot reduction in the threshold laser intensity for ionization of bulk glasses illuminated by intense femtosecond pulses. For SiO{sub 2} the threshold change serves as positive feedback reenforcing the process that produced it. This constitutes a memory in nonlinear ionization of the material. The threshold change saturates with the number of pulses incident at a given spot. Irrespective of the pulse energy, the magnitude of the saturated threshold change is constant ({approx}20%). However, the number of shots required to reach saturation does depend on the pulse energy. Recognition of a memory in ionization is vital to understand multishot optical or electrical breakdown phenomena in dielectrics.

  20. Memorandum Memorializing Ex Parte Communication, DOE impending

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    determination of coverage for commercial and industrial fans, blowers, and fume hoods. | Department of Energy DOE impending determination of coverage for commercial and industrial fans, blowers, and fume hoods. Memorandum Memorializing Ex Parte Communication, DOE impending determination of coverage for commercial and industrial fans, blowers, and fume hoods. The meeting was requested by AMCA International to introduce the association's leadership, standards, and experience in developing fan

  1. PERI Auto-tuning Memory Intensive Kernels

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    PERI - Auto-tuning Memory Intensive Kernels for Multicore Samuel Williams † , Kaushik Datta † , Jonathan Carter , Leonid Oliker † , John Shalf , Katherine Yelick † , David Bailey CRD/NERSC, Lawrence Berkeley National Laboratory, Berkeley, CA 94720, USA † Computer Science Division, University of California at Berkeley, Berkeley, CA 94720, USA E-mail: SWWilliams@lbl.gov, kdatta@eecs.berkeley.edu, JTCarter@lbl.gov, LOliker@lbl.gov, JShalf@lbl.gov, KAYelick@lbl.gov, DHBailey@lbl.gov

  2. Truly Random Number Generator Promises Stronger Encryption Across All

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Devices, Cloud Truly Random Number Generator Promises Stronger Encryption Across All Devices, Cloud Truly Random Number Generator Promises Stronger Encryption Across All Devices, Cloud Whitewood Encryption Systems, launched in summer 2015, introduces NetRandom, providing truly random quantum encryption. March 4, 2016 Random Number Generator Whitewood Encryption Systems, launched in summer 2015, introduces NetRandom, providing truly random quantum encryption. They were awarded a third patent

  3. Thermomechanical indentation of shape memory polymers.

    SciTech Connect (OSTI)

    Long, Kevin N.; Nguyen, Thao D.; Castro, Francisco; Qi, H. Jerry; Dunn, Martin L.; Shandas, Robin

    2007-04-01

    Shape memory polymers (SMPs) are receiving increasing attention because of their ability to store a temporary shape for a prescribed period of time, and then when subjected to an environmental stimulus, recover an original programmed shape. They are attractive candidates for a wide range of applications in microsystems, biomedical devices, deployable aerospace structures, and morphing structures. In this paper we investigate the thermomechanical behavior of shape memory polymers due to instrumented indentation, a loading/deformation scenario that represents complex multiaxial deformation. The SMP sample is indented using a spherical indenter at a temperature T{sub 1} (>T{sub g}). The temperature is then lowered to T{sub 2} (memory is then activated by increasing the temperature to T{sub 1} (>T{sub g}) during free recovery the indentation impression disappears and the surface of the SMP recovers to its original profile. A recently-developed three-dimensional finite deformation constitutive model for the thermomechanical behavior of SMPs is then used with the finite element method to simulate this process. Measurement and simulation results are compared for cases of free and constrained recovery and good agreement is obtained, suggesting the appropriateness of the simulation approach for complex multiaxial loading/deformations that are likely to occur in applications.

  4. JOBAID-ACCESSING AND MODIFYING TALENT PROFILE

    Broader source: Energy.gov [DOE]

    The purpose of this job aid is to guide users through the step-by-step process of accessing their talent profiles, adding information to their profiles, and editing existing talent profile...

  5. Access Energy Coop | Open Energy Information

    Open Energy Info (EERE)

    Energy Coop Jump to: navigation, search Name: Access Energy Coop Place: Iowa Phone Number: 319-385-1577 or 1-866-242-4232 Website: www.accessenergycoop.com Facebook: https:...

  6. Radioactive hot cell access hole decontamination machine

    DOE Patents [OSTI]

    Simpson, William E.

    1982-01-01

    Radioactive hot cell access hole decontamination machine. A mobile housing has an opening large enough to encircle the access hole and has a shielding door, with a door opening and closing mechanism, for uncovering and covering the opening. The housing contains a shaft which has an apparatus for rotating the shaft and a device for independently translating the shaft from the housing through the opening and access hole into the hot cell chamber. A properly sized cylindrical pig containing wire brushes and cloth or other disks, with an arrangement for releasably attaching it to the end of the shaft, circumferentially cleans the access hole wall of radioactive contamination and thereafter detaches from the shaft to fall into the hot cell chamber.

  7. NBP RFI: Data Access | Department of Energy

    Office of Environmental Management (EM)

    The RFI seeks information on smart grid privacy and data collection policies, as well as third-party access to smart grid data and the role of the consumer in balancing the ...

  8. CNM User Access Program Overview | Argonne National Laboratory

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    User Access Program Overview The Center for Nanoscale Materials (CNM) user program provides access to equipment, facilities, and personnel that support CNM's overall focus on nanoscale materials. The CNM makes access available to the international scientific community through a general user access program. Proposals are submitted through a web-based process. PDF icon CNM User Access Program Overview

  9. Accounts & Access | Argonne Leadership Computing Facility

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Account Information Accounts and Access FAQ Connect & Log In Using CRYPTOCards Disk Space Quota Management Allocations Mira/Cetus/Vesta Cooley Policies Documentation Feedback Please provide feedback to help guide us as we continue to build documentation for our new computing resource. [Feedback Form] Accounts & Access Account Information Account Information: All computing carried out on the ALCF systems is associated with a user "account." This account is used to log onto the

  10. Transmission Access Resources | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Transmission Access Resources Transmission Access Resources Historically, the addition of new electric generation facilities has been accompanied by new transmission systems. For example, large nuclear and coal plants built in the 1960s and 1970s required interstate transmission infrastructure to deliver the electricity they produced. Likewise, the development of solar and wind generation in the United States will likely involve the development of new transmission. Although the cost of building

  11. Fast generation of sparse random kernel graphs

    SciTech Connect (OSTI)

    Hagberg, Aric; Lemons, Nathan; Du, Wen -Bo

    2015-09-10

    The development of kernel-based inhomogeneous random graphs has provided models that are flexible enough to capture many observed characteristics of real networks, and that are also mathematically tractable. We specify a class of inhomogeneous random graph models, called random kernel graphs, that produces sparse graphs with tunable graph properties, and we develop an efficient generation algorithm to sample random instances from this model. As real-world networks are usually large, it is essential that the run-time of generation algorithms scales better than quadratically in the number of vertices n. We show that for many practical kernels our algorithm runs in time at most ο(n(logn)²). As an example, we show how to generate samples of power-law degree distribution graphs with tunable assortativity.

  12. Bayati Kim Saberi random graph sampler

    Energy Science and Technology Software Center (OSTI)

    2012-06-05

    This software package implements the algorithm from a paper by Bayati, Kim, and Saberi (first reference below) to generate a uniformly random sample of a graph with a prescribed degree distribution.

  13. Fast generation of sparse random kernel graphs

    DOE Public Access Gateway for Energy & Science Beta (PAGES Beta)

    Hagberg, Aric; Lemons, Nathan; Du, Wen -Bo

    2015-09-10

    The development of kernel-based inhomogeneous random graphs has provided models that are flexible enough to capture many observed characteristics of real networks, and that are also mathematically tractable. We specify a class of inhomogeneous random graph models, called random kernel graphs, that produces sparse graphs with tunable graph properties, and we develop an efficient generation algorithm to sample random instances from this model. As real-world networks are usually large, it is essential that the run-time of generation algorithms scales better than quadratically in the number of vertices n. We show that for many practical kernels our algorithm runs in timemore » at most ο(n(logn)²). As an example, we show how to generate samples of power-law degree distribution graphs with tunable assortativity.« less

  14. Texture memory and strain-texture mapping in a NiTi shape memory alloy

    SciTech Connect (OSTI)

    Ye, B.; Majumdar, B. S.; Dutta, I.

    2007-08-06

    The authors report on the near-reversible strain hysteresis during thermal cycling of a polycrystalline NiTi shape memory alloy at a constant stress that is below the yield strength of the martensite. In situ neutron diffraction experiments are used to demonstrate that the strain hysteresis occurs due to a texture memory effect, where the martensite develops a texture when it is cooled under load from the austenite phase and is thereafter ''remembered.'' Further, the authors quantitatively relate the texture to the strain by developing a calculated strain-texture map or pole figure for the martensite phase, and indicate its applicability in other martensitic transformations.

  15. Near-field NanoThermoMechanical memory

    SciTech Connect (OSTI)

    Elzouka, Mahmoud; Ndao, Sidy

    2014-12-15

    In this letter, we introduce the concept of NanoThermoMechanical Memory. Unlike electronic memory, a NanoThermoMechanical memory device uses heat instead of electricity to record, store, and recover data. Memory function is achieved through the coupling of near-field thermal radiation and thermal expansion resulting in negative differential thermal resistance and thermal latching. Here, we demonstrate theoretically via numerical modeling the concept of near-field thermal radiation enabled negative differential thermal resistance that achieves bistable states. Design and implementation of a practical silicon based NanoThermoMechanical memory device are proposed along with a study of its dynamic response under write/read cycles. With more than 50% of the world's energy losses being in the form of heat along with the ever increasing need to develop computer technologies which can operate in harsh environments (e.g., very high temperatures), NanoThermoMechanical memory and logic devices may hold the answer.

  16. A prototype functional language implementation for hierarchical-memory architectures

    SciTech Connect (OSTI)

    Wolski, R.; Feo, J.; Cann, D.

    1991-06-05

    The first implementation of Sisal was designed for general shared-memory architectures. Since then, we have optimized the system for vector and coherent-cache multiprocessors. Coherent-cache systems can be thought of as simple, two-level hierarchical memory systems, where the memory hierarchy is managed by the hardware. The compiler and run-time system for such an architecture needs to maintain data locality so that the processor caches are used as much as possible. In this paper, we extend the coherent-cache implementation to include explicit compiler and run-time control for medium-grain and coarse-grain hierarchical-memory architectures. We implemented the extended system on the BBN Butterfly using interleaved shared memory exclusively for the purposes of data sharing and exploiting the per-processor local memories. We give preliminary performance results for this extended system. 10 refs., 7 figs.

  17. Quasi-random array imaging collimator

    DOE Patents [OSTI]

    Fenimore, E.E.

    1980-08-20

    A hexagonally shaped quasi-random no-two-holes-touching imaging collimator. The quasi-random array imaging collimator eliminates contamination from small angle off-axis rays by using a no-two-holes-touching pattern which simultaneously provides for a self-supporting array increasing throughput by elimination of a substrate. The present invention also provides maximum throughput using hexagonally shaped holes in a hexagonal lattice pattern for diffraction limited applications. Mosaicking is also disclosed for reducing fabrication effort.

  18. FORENSIC ANALYSIS OF WINDOW’S® VIRTUAL MEMORY INCORPORATING THE SYSTEM’S PAGEFILE COUNTERINTELLIGENCE THROUGH MALICIOUS CODE ANALYSIS

    SciTech Connect (OSTI)

    Jared Stimson Edward Murphy

    2007-06-01

    FORENSIC ANALYSIS OF WINDOW’S® VIRTUAL MEMORY INCORPORATING THE SYSTEM’S PAGEFILE Computer Forensics is concerned with the use of computer investigation and analysis techniques in order to collect evidence suitable for presentation in court. The examination of volatile memory is a relatively new but important area in computer forensics. More recently criminals are becoming more forensically aware and are now able to compromise computers without accessing the hard disk of the target computer. This means that traditional incident response practice of pulling the plug will destroy the only evidence of the crime. While some techniques are available for acquiring the contents of main memory, few exist which can analyze these data in a meaningful way. One reason for this is how memory is managed by the operating system. Data belonging to one process can be distributed arbitrarily across physical memory or the hard disk, making it very difficult to recover useful information. This report will focus on how these disparate sources of information can be combined to give a single, contiguous address space for each process. Using address translation a tool is developed to reconstruct the virtual address space of a process by combining a physical memory dump with the page-file on the hard disk. COUNTERINTELLIGENCE THROUGH MALICIOUS CODE ANALYSIS As computer network technology continues to grow so does the reliance on this technology for everyday business functionality. To appeal to customers and employees alike, businesses are seeking an increased online prescience, and to increase productivity the same businesses are computerizing their day-to-day operations. The combination of a publicly accessible interface to the businesses network, and the increase in the amount of intellectual property present on these networks presents serious risks. All of this intellectual property now faces constant attacks from a wide variety of malicious software that is intended to uncover

  19. Silver Spring Networks comments on DOE NBP RFI: Data Access ...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Data Access Silver Spring Networks comments on DOE NBP RFI: Data Access Silver Spring Networks comments on DOE NBP RFI: Data Access Silver Spring Networks comments on DOE NBP RFI: ...

  20. INSTRUCTIONS FOR USING HSPD-12 AUTHENTICATED OUTLOOK WEB ACCESS...

    Broader source: Energy.gov (indexed) [DOE]

    172013 Page 1 INSTRUCTIONS FOR USING HSPD-12 AUTHENTICATED OUTLOOK WEB ACCESS (OWA) Outlook Web Access provides access to unencrypted email only and is suitable for use from any ...

  1. Instructions for Using Secure Email via Outlook Web Access |...

    Broader source: Energy.gov (indexed) [DOE]

    Outlook Web Access provides access to unencrypted email only and is suitable for use from ... DOEnet or Internet access and a supported web browser Secure Email Login Procedure: Enter ...

  2. AHRI and NATE Memorandum Memorializing Ex Parte Communication | Department

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    of Energy and NATE Memorandum Memorializing Ex Parte Communication AHRI and NATE Memorandum Memorializing Ex Parte Communication On July 31, 2012, representatives of the Air-Conditioning, Heating, and Refrigeration Institute (AHRI) and the North American Technicians Excellence (NATE) met with Department of Energy (DOE) staff to discuss the Guidelines for Home Energy Professionals: Ex Parte Memo 07312012.pdf (174.99 KB) More Documents & Publications Memorandum Memorializing Ex Parte

  3. Deformation and Failure Mechanisms of Shape Memory Alloys (Technical

    Office of Scientific and Technical Information (OSTI)

    Report) | SciTech Connect Technical Report: Deformation and Failure Mechanisms of Shape Memory Alloys Citation Details In-Document Search Title: Deformation and Failure Mechanisms of Shape Memory Alloys The goal of this research was to understand the fundamental mechanics that drive the deformation and failure of shape memory alloys (SMAs). SMAs are difficult materials to characterize because of the complex phase transformations that give rise to their unique properties, including shape

  4. Shaping nanoscale magnetic domain memory in exchange-coupled ferromagnets

    Office of Scientific and Technical Information (OSTI)

    by field cooling (Journal Article) | SciTech Connect Shaping nanoscale magnetic domain memory in exchange-coupled ferromagnets by field cooling Citation Details In-Document Search Title: Shaping nanoscale magnetic domain memory in exchange-coupled ferromagnets by field cooling The advance of magnetic nanotechnologies relies on detailed understanding of nanoscale magnetic mechanisms in materials. Magnetic domain memory (MDM), that is, the tendency for magnetic domains to repeat the same

  5. Strategic priming with multiple antigens can yield memory cell...

    Office of Scientific and Technical Information (OSTI)

    Several new vaccines are ready for human clinical trials, but these trials are ... ratio, within what we term Memory Design Space. Our model captures events involvedmore in T ...

  6. Detecting and correcting hard errors in a memory array

    DOE Patents [OSTI]

    Kalamatianos, John; John, Johnsy Kanjirapallil; Gelinas, Robert; Sridharan, Vilas K.; Nevius, Phillip E.

    2015-11-19

    Hard errors in the memory array can be detected and corrected in real-time using reusable entries in an error status buffer. Data may be rewritten to a portion of a memory array and a register in response to a first error in data read from the portion of the memory array. The rewritten data may then be written from the register to an entry of an error status buffer in response to the rewritten data read from the register differing from the rewritten data read from the portion of the memory array.

  7. Miniscule Mirrored Cavities Connect Quantum Memories | U.S. DOE...

    Office of Science (SC) Website

    Miniscule Mirrored Cavities Connect Quantum Memories Basic Energy Sciences (BES) BES Home ... Diamond optical cavities allow laser light (green arrow) to excite electrons on atoms held ...

  8. Building Green in Greensburg: Kiowa County Memorial Hospital

    Broader source: Energy.gov [DOE]

    This poster highlights energy efficiency, renewable energy, and sustainable features of the high-performing Kiowa County Memorial Hospital building in Greensburg, Kansas.

  9. Post polymerization cure shape memory polymers (Patent) | DOEPatents

    Office of Scientific and Technical Information (OSTI)

    Data Explorer Search Results Post polymerization cure shape memory polymers Title: Post ... to a linear or branched polymeric structure, having thermoplastic properties, ...

  10. DOE Science Showcase - Shape-Memory Materials | OSTI, US Dept...

    Office of Scientific and Technical Information (OSTI)

    and the international science community are taking advantage of shape-memory technology. ... SciTech Connect - reports from DOE science, technology, and engineering programs. In the ...

  11. Ultra Low Density Shape Memory Polymer Foams With Tunable Physicochemi...

    Office of Scientific and Technical Information (OSTI)

    ThesisDissertation: Ultra Low Density Shape Memory Polymer Foams With Tunable Physicochemical Properties for Treatment of intracranial Aneurysms Citation Details In-Document ...

  12. Post polymerization cure shape memory polymers (Patent) | DOEPatents

    Office of Scientific and Technical Information (OSTI)

    and then crossed linked to a shape memory thermoset polymer retaining the processed shape. ... Sponsoring Org: USDOE Country of Publication: United States Language: English Subject: 36 ...

  13. Shape memory polymer foams for endovascular therapies (Patent...

    Office of Scientific and Technical Information (OSTI)

    Title: Shape memory polymer foams for endovascular therapies A system for occluding a ... Sponsoring Org: USDOE Country of Publication: United States Language: English Subject: 59 ...

  14. Shape memory polymer foams for endovascular therapies (Patent...

    Office of Scientific and Technical Information (OSTI)

    Citation Details In-Document Search Title: Shape memory polymer foams for endovascular ... Sponsoring Org: USDOE Country of Publication: United States Language: English Subject: 59 ...

  15. Shape memory system with integrated actuation using embedded...

    Office of Scientific and Technical Information (OSTI)

    body using the pieces causing the shape memory material body to be controllably actuated ... Sponsoring Org: USDOE Country of Publication: United States Language: English Subject: 36 ...

  16. Shape memory alloy heat engines and energy harvesting systems...

    Office of Scientific and Technical Information (OSTI)

    Data Explorer Search Results Shape memory alloy heat engines and energy harvesting systems ... Sponsoring Org: USDOE Country of Publication: United States Language: English Subject: 42 ...

  17. Shape memory system with integrated actuation using embedded...

    Office of Scientific and Technical Information (OSTI)

    material body; and actuating the shape memory material body using the pieces causing ... Sponsoring Org: USDOE Country of Publication: United States Language: English Subject: 36 ...

  18. Recommendation 196: Alternatives to Memorialize the K-25 Building

    Broader source: Energy.gov [DOE]

    The ORSSAB Recommends to DOE Alternatives to Memorialize the K-25 Building at East Tennessee Technology Park and Manhattan Project Exhibits in Oak Ridge, Tennessee.

  19. DOE Cites Battelle Memorial Institute for Price-Anderson Violations

    Broader source: Energy.gov [DOE]

    WASHINGTON, DC - The Department of Energy (DOE) today issued a Preliminary Notice of Violation (PNOV) to the Battelle Memorial Institute (Battelle) for nuclear safety violations at the Pacific...

  20. T-627: Adobe Flash Player Memory Corruption | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    27: Adobe Flash Player Memory Corruption T-627: Adobe Flash Player Memory Corruption May 20, 2011 - 2:50pm Addthis PROBLEM: Adobe Flash Player Memory Corruption, Denial Of Service, Execute Code PLATFORM: Windows, Mac OS X, Linux, and Solaris ABSTRACT: Adobe Flash Player before 10.3.181.14 on Windows, Mac OS X, Linux, and Solaris and before 10.3.185.21 on Android allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via crafted Flash content, as

  1. A Study of the Viability of Exploiting Memory Content Similarity...

    Office of Scientific and Technical Information (OSTI)

    Similarity to Improve Resilience to Memory Errors. Abstract not provided. Authors: Levy, Scott N. ; Ferreira, Kurt Brian ; Thompson, Aidan Patrick ; Trott, Christian Robert ;...

  2. Enforcement Letter, Battelle Memorial Institute- May 20, 2010

    Broader source: Energy.gov [DOE]

    Issued to Battelle Memorial Institute related to an Unintentional Firearm Discharge at the Volpentest HAMMER Training and Education Center at the Hanford Site

  3. Deformation and Failure Mechanisms of Shape Memory Alloys (Technical...

    Office of Scientific and Technical Information (OSTI)

    Prior results on shape memory alloys have been largely qualitative (i.e., mapping phase ... The research funded by this award utilized new combinations of scanning electron ...

  4. V-149: Microsoft Internet Explorer Object Access Bug Lets Remote...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    9: Microsoft Internet Explorer Object Access Bug Lets Remote Users Execute Arbitrary Code V-149: Microsoft Internet Explorer Object Access Bug Lets Remote Users Execute Arbitrary...

  5. ORISE Resources: Equal Access Initiative Computer Grants Program

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Equal Access Initiative Computer Grants Program The Equal Access Initiative Computer Grants Program is sponsored by the National Minority AIDS Council (NMAC) and the National...

  6. Accessing DOE's Many Energy Efficiency Resources and Technical...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Accessing DOE's Many Energy Efficiency Resources and Technical Assistance Accessing DOE's Many Energy Efficiency Resources and Technical Assistance Discusses current DOE programs ...

  7. Pacific Ethanol Inc formerly Accessity Corporation | Open Energy...

    Open Energy Info (EERE)

    Ethanol Inc formerly Accessity Corporation Jump to: navigation, search Name: Pacific Ethanol Inc (formerly Accessity Corporation) Place: Fresno, California Zip: 93711 Product:...

  8. Web application for simplifying access to computer center resources...

    Office of Scientific and Technical Information (OSTI)

    Web application for simplifying access to computer center resources and information. Citation Details Software Request Title: Web application for simplifying access to computer ...

  9. Energy poverty: how to make modern energy access universal? ...

    Open Energy Info (EERE)

    poverty: how to make modern energy access universal? Jump to: navigation, search Tool Summary LAUNCH TOOL Name: Energy poverty: how to make modern energy access universal? Agency...

  10. V-120: EMC Smarts Network Configuration Manager Java RMI Access...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    0: EMC Smarts Network Configuration Manager Java RMI Access Control Flaw Lets Remote Users Gain Full Control V-120: EMC Smarts Network Configuration Manager Java RMI Access Control...

  11. T-701: Citrix Access Gateway Enterprise Edition Input Validation...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    1: Citrix Access Gateway Enterprise Edition Input Validation Flaw in Logon Portal Permits Cross-Site Scripting Attacks T-701: Citrix Access Gateway Enterprise Edition Input...

  12. Republic of Yemen Energy Access Project | Open Energy Information

    Open Energy Info (EERE)

    Yemen Energy Access Project Jump to: navigation, search Name of project Republic of Yemen Energy Access Project Location of project Yemen Year initiated 2006 Organization World...

  13. Montana - Access Road Easement Policy | Open Energy Information

    Open Energy Info (EERE)

    Access Road Easement Policy Jump to: navigation, search OpenEI Reference LibraryAdd to library General: Montana - Access Road Easement Policy Author Montana Department of...

  14. Burkina Faso Energy Access Project | Open Energy Information

    Open Energy Info (EERE)

    Burkina Faso Energy Access Project Jump to: navigation, search Name of project Burkina Faso Energy Access Project Location of project Burkina Faso Year initiated 2007 Organization...

  15. Thanks to Energy Department Funding, Safer Access to Offshore...

    Office of Environmental Management (EM)

    Thanks to Energy Department Funding, Safer Access to Offshore Wind Turbine Platforms is Demonstrated Thanks to Energy Department Funding, Safer Access to Offshore Wind Turbine ...

  16. CDOT - State Highway Access Permit Application | Open Energy...

    Open Energy Info (EERE)

    State Highway Access Permit Application Jump to: navigation, search OpenEI Reference LibraryAdd to library General: CDOT - State Highway Access Permit Application Author Colorado...

  17. Instructions for using HSPD-12 Authenticated Outlook Web Access...

    Energy Savers [EERE]

    Instructions for using HSPD-12 Authenticated Outlook Web Access (OWA) Instructions for using HSPD-12 Authenticated Outlook Web Access (OWA) Provides instructions for remote Outlook...

  18. Request Access to the PARSIIe Project Management Lessons Learned...

    Energy Savers [EERE]

    Request Access to the PARSIIe Project Management Lessons Learned (PMLL) Repository Request Access to the PARSIIe Project Management Lessons Learned (PMLL) Repository PURPOSE...

  19. Proposed Open Access Requirement for International Electric Transmissi...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    to provide ondiscriminatory open access transmission services. The open access requirement would also be attached to the permit holder's authorization(s) to export electricity. ...

  20. Benin: Increased Access to Modern Energy Project | Open Energy...

    Open Energy Info (EERE)

    Bank1 The objective of the Increased Access to Modern Energy Project is to improve reliability, efficiency, and access to modern energy services in Benin. There are three...

  1. A Web Accessible Scientific Workflow System for Performance Monitoring...

    Office of Scientific and Technical Information (OSTI)

    Web Accessible Scientific Workflow System for Performance Monitoring Citation Details In-Document Search Title: A Web Accessible Scientific Workflow System for Performance ...

  2. Web-Accessible Scientific Workflow System for Performance Monitoring...

    Office of Scientific and Technical Information (OSTI)

    Web-Accessible Scientific Workflow System for Performance Monitoring Citation Details In-Document Search Title: Web-Accessible Scientific Workflow System for Performance Monitoring ...

  3. OpenEI:Utility data access questionnaire | Open Energy Information

    Open Energy Info (EERE)

    Utility data access questionnaire Jump to: navigation, search Jump to Navigation Utility Access Questionnaire Thank you for participating in the U.S. Department of Energy Utility...

  4. Overview of Access Authorization Process for Applicants, May...

    Office of Environmental Management (EM)

    a Department of Energy (DOE) security clearance or access authorization This overview ... and maintain a Department of Energy (DOE) security clearance or access authorization. ...

  5. Mozambique-Biofuels, Land Access and Rural Livelihoods | Open...

    Open Energy Info (EERE)

    Biofuels, Land Access and Rural Livelihoods Jump to: navigation, search Name Mozambique-Biofuels, Land Access and Rural Livelihoods AgencyCompany Organization International...

  6. Tanzania-Biofuels, Land Access and Rural Livelihoods | Open Energy...

    Open Energy Info (EERE)

    Tanzania-Biofuels, Land Access and Rural Livelihoods Jump to: navigation, search Name Tanzania-Biofuels, Land Access and Rural Livelihoods AgencyCompany Organization...

  7. RAPID/Geothermal/Land Access/Colorado | Open Energy Information

    Open Energy Info (EERE)

    RAPIDGeothermalLand AccessColorado < RAPID | Geothermal | Land Access Jump to: navigation, search RAPID Regulatory and Permitting Information Desktop Toolkit BETA About...

  8. RAPID/Geothermal/Land Access/Oregon | Open Energy Information

    Open Energy Info (EERE)

    RAPIDGeothermalLand AccessOregon < RAPID | Geothermal | Land Access Jump to: navigation, search RAPID Regulatory and Permitting Information Desktop Toolkit BETA About Bulk...

  9. RAPID/Geothermal/Land Access/Alaska | Open Energy Information

    Open Energy Info (EERE)

    RAPIDGeothermalLand AccessAlaska < RAPID | Geothermal | Land Access Jump to: navigation, search RAPID Regulatory and Permitting Information Desktop Toolkit BETA About Bulk...

  10. RAPID/Geothermal/Land Access/Utah | Open Energy Information

    Open Energy Info (EERE)

    RAPIDGeothermalLand AccessUtah < RAPID | Geothermal | Land Access Jump to: navigation, search RAPID Regulatory and Permitting Information Desktop Toolkit BETA About Bulk...

  11. RAPID/Geothermal/Land Access/Nevada | Open Energy Information

    Open Energy Info (EERE)

    RAPIDGeothermalLand AccessNevada < RAPID | Geothermal | Land Access Jump to: navigation, search RAPID Regulatory and Permitting Information Desktop Toolkit BETA About Bulk...

  12. RAPID/Solar/Land Access/Nevada | Open Energy Information

    Open Energy Info (EERE)

    RAPIDSolarLand AccessNevada < RAPID | Solar | Land Access Jump to: navigation, search RAPID Regulatory and Permitting Information Desktop Toolkit BETA About Bulk...

  13. NBP RFI: Data Access Honeywell Responses To Request for Information...

    Office of Environmental Management (EM)

    Broadband Plan by Empowering Consumers and the Smart Grid: Data Access, Third Party Use, and Privacy NBP RFI: Data Access Honeywell Responses To Request for Information (RFI) ...

  14. National Geothermal Data Systems Data Acquisition and Access...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Systems Data Acquisition and Access National Geothermal Data Systems Data Acquisition and Access Project objective: To support the acquisition of new and legacy data from ...

  15. Department of Energy Data Access and Privacy Issues Related To...

    Office of Environmental Management (EM)

    Data Access and Privacy Issues Related To Smart Grid Technologies Department of Energy Data Access and Privacy Issues Related To Smart Grid Technologies This report by the ...

  16. NBP RFI: Data Access, Third Party Use, and Privacy- Comments...

    Office of Environmental Management (EM)

    Use, and Privacy- Comments of Oncor Electric Deliverty Company LLC NBP RFI: Data Access, ... NBP RFI: Data Access, Third Party Use, and Privacy- Comments of Oncor Electric Deliverty ...

  17. Public Roundtable- Data Access and Privacy Issues Related to...

    Energy Savers [EERE]

    Roundtable- Data Access and Privacy Issues Related to Smart Grid Technologies Public Roundtable- Data Access and Privacy Issues Related to Smart Grid Technologies Transcript of ...

  18. Instructions for using HSPD-12 Authenticated Outlook Web Access...

    Broader source: Energy.gov (indexed) [DOE]

    Provides instructions for remote Outlook access using HSPD-12 Badge. HSPD-12 Badge Instructions (388.34 KB) More Documents & Publications User Guide for Remote Access to VDI...

  19. Nickel porphyrins for memory optical applications

    DOE Patents [OSTI]

    Shelnutt, John A.; Jia, Songling; Medforth, Craig; Holten, Dewey; Nelson, Nora Y.; Smith, Kevin M.

    2000-01-01

    The present invention relates to a nickel-porphyrin derivative in a matrix, the nickel-porphyrin derivative comprising at least two conformational isomers, a lower-energy-state conformer and a higher-energy-state conformer, such that when the higher-energy-state conformer is generated from the lower-energy-state conformer following absorption of a photon of suitable energy, the time to return to the lower-energy-state conformer is greater than 40 nanoseconds at approximately room temperature. The nickel-porphyrin derivative is useful in optical memory applications.

  20. Scalla: Structured Cluster Architecture for Low Latency Access

    SciTech Connect (OSTI)

    Hanushevsky, Andrew; Wang, Daniel L.; /SLAC

    2012-03-20

    Scalla is a distributed low-latency file access system that incorporates novel techniques that minimize latency and maximize scalability over a large distributed system with a distributed namespace. Scalla's techniques have shown to be effective in nearly a decade of service for the high-energy physics community using commodity hardware and interconnects. We describe the two components used in Scalla that are instrumental in its ability to provide low-latency, fault-tolerant name resolution and load distribution, and enable its use as a high-throughput, low-latency communication layer in the Qserv system, the Large Synoptic Survey Telescope's (LSST's) prototype astronomical query system. Scalla arguably exceeded its three main design objectives: low latency, scaling, and recoverability. In retrospect, these objectives were met using a simple but effective design. Low latency was met by uniformly using linear or constant time algorithms in all high-use paths, avoiding locks whenever possible, and using compact data structures to maximize the memory caching efficiency. Scaling was achieved by architecting the system as a 64-ary tree. Nodes can be added easily and as the number of nodes increases, search performance increases at an exponential rate. Recoverability is inherent in that no permanent state information is maintained and whatever state information is needed it can be quickly constructed or reconstructed in real time. This allows dynamic changes in a cluster of servers with little impact on over-all performance or usability. Today, Scalla is being deployed in environments and for uses that were never conceived in 2001. This speaks well for the systems adaptability but the underlying reason is that the system can meet its three fundamental objectives at the same time.

  1. Quasiparticle random-phase approximation with interactions from...

    Office of Scientific and Technical Information (OSTI)

    Quasiparticle random-phase approximation with interactions from the Similarity Renormalization Group Citation Details In-Document Search Title: Quasiparticle random-phase ...

  2. Stabilizing Topological Phases in Graphene via Random Adsorption...

    Office of Scientific and Technical Information (OSTI)

    Stabilizing Topological Phases in Graphene via Random Adsorption Title: Stabilizing Topological Phases in Graphene via Random Adsorption Authors: Jiang, Hua ; Qiao, Zhenhua ; Liu, ...

  3. Listening to the noise: random fluctuations reveal gene network...

    Office of Scientific and Technical Information (OSTI)

    Journal Article: Listening to the noise: random fluctuations reveal gene network parameters Citation Details In-Document Search Title: Listening to the noise: random fluctuations ...

  4. Application of Random Vibration Theory Methodology for Seismic...

    Energy Savers [EERE]

    Application of Random Vibration Theory Methodology for Seismic Soil-Structure Interaction Analysis Application of Random Vibration Theory Methodology for Seismic Soil-Structure...

  5. Chiral random matrix model at finite chemical potential: Characteristi...

    Office of Scientific and Technical Information (OSTI)

    Chiral random matrix model at finite chemical potential: Characteristic determinant and edge universality Prev Next Title: Chiral random matrix model at finite chemical ...

  6. Final Technical Report: Nanostructured Shape Memory ALloys

    SciTech Connect (OSTI)

    Wendy Crone; Walter Drugan; Arthur Ellis; John Perepezko

    2005-07-28

    With this grant we explored the properties that result from combining the effects of nanostructuring and shape memory using both experimental and theoretical approaches. We developed new methods to make nanostructured NiTi by melt-spinning and cold rolling fabrication strategies, which elicited significantly different behavior. A template synthesis method was also used to created nanoparticles. In order to characterize the particles we created, we developed a new magnetically-assisted particle manipulation technique to manipulate and position nanoscale samples for testing. Beyond characterization, this technique has broader implications for assembly of nanoscale devices and we demonstrated promising applications for optical switching through magnetically-controlled scattering and polarization capabilities. Nanoparticles of nickel-titanium (NiTi) shape memory alloy were also produced using thin film deposition technology and nanosphere lithography. Our work revealed the first direct evidence that the thermally-induced martensitic transformation of these films allows for partial indent recovery on the nanoscale. In addition to thoroughly characterizing and modeling the nanoindentation behavior in NiTi thin films, we demonstrated the feasibility of using nanoindentation on an SMA film for write-read-erase schemes for data storage.

  7. An Application Specific Memory Characterization Technique for Co-processor Accelerators

    SciTech Connect (OSTI)

    Alam, Sadaf R; Smith, Melissa C; Vetter, Jeffrey S

    2007-01-01

    Commodity accelerator technologies including reconfigurable devices and graphical processing units (GPUs) provide an order of magnitude performance improvement compared to mainstream microprocessor systems. A number of compute-intensive, scientific applications, therefore, can potentially benefit from commodity computing devices available in the form of co-processor accelerators. However, there has been little progress in accelerating production-level scientific applications using these technologies due to several programming and performance challenges. One of the key performance challenges is performance sustainability. While computation is often accelerated substantially by accelerator devices, the achievable performance is significantly lower once the data transfer costs and overheads are incorporated. We present an application-specific memory characterization technique for an FPGA-accelerated system that enabled us to reduce data transfer overhead for a scientific application by a factor of 5. We classify large data structures in the application according to their read and write characteristics and access patterns. This classification in turn enabled us to sustain a speedup of over three for a full-scale scientific application. Our proposed technique extends to applications that exhibit similar memory behavior and to co-processor accelerator systems that support data streaming and pipelining, and allow overlapped execution between the host and the accelerator device.

  8. Arbitrary unitary transformations on optical states using a quantum memory

    SciTech Connect (OSTI)

    Campbell, Geoff T.; Pinel, Olivier; Hosseini, Mahdi; Buchler, Ben C.; Lam, Ping Koy

    2014-12-04

    We show that optical memories arranged along an optical path can perform arbitrary unitary transformations on frequency domain optical states. The protocol offers favourable scaling and can be used with any quantum memory that uses an off-resonant Raman transition to reversibly transfer optical information to an atomic spin coherence.

  9. OSTIblog Articles in the access Topic | OSTI, US Dept of Energy Office of

    Office of Scientific and Technical Information (OSTI)

    Scientific and Technical Information access

  10. WTB & Spectrum Access Overview | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    WTB & Spectrum Access Overview WTB & Spectrum Access Overview Slides from FCC's Wireless Telecommunications Bureau presentation on spectrum access. WTB & Spectrum Access Overview (1.25 MB) More Documents & Publications An Introduction to Spectrum Engineering NBP RFI: Communications Requirements Reply Comments of Southern Company Services, Inc.

  11. ETTP Security Access Control System (ESACS) | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    ETTP Security Access Control System (ESACS) ETTP Security Access Control System (ESACS) ETTP Security Access Control System (ESACS) ETTP Security Access Control System (ESACS) (218.51 KB) More Documents & Publications PIA - INL SECURITY INFORMATION MANAGEMENT SYSTEM BUSINESS ENCLAVE PIA - INL PeopleSoft - Human Resource System PIA - Human Resources - Personal Information Change Request - Idaho National Engineering Laboratory

  12. PIA - Foreign Access Central Tracking System (FACTS) | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Access Central Tracking System (FACTS) PIA - Foreign Access Central Tracking System (FACTS) PIA - Foreign Access Central Tracking System (FACTS) PIA - Foreign Access Central Tracking System (FACTS) (472.97 KB) More Documents & Publications PIA - INL SECURITY INFORMATION MANAGEMENT SYSTEM BUSINESS ENCLAVE PIA - INL PeopleSoft - Human Resource System

  13. Method for making field-structured memory materials

    DOE Patents [OSTI]

    Martin, James E.; Anderson, Robert A.; Tigges, Chris P.

    2002-01-01

    A method of forming a dual-level memory material using field structured materials. The field structured materials are formed from a dispersion of ferromagnetic particles in a polymerizable liquid medium, such as a urethane acrylate-based photopolymer, which are applied as a film to a support and then exposed in selected portions of the film to an applied magnetic or electric field. The field can be applied either uniaxially or biaxially at field strengths up to 150 G or higher to form the field structured materials. After polymerizing the field-structure materials, a magnetic field can be applied to selected portions of the polymerized field-structured material to yield a dual-level memory material on the support, wherein the dual-level memory material supports read-and-write binary data memory and write once, read many memory.

  14. Special Access Program Policies, Responsibilities, and Procedures

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2002-07-11

    Special Access Program Policies, Responsibilities, and Procedures This Manual is for OFFICIAL USE ONLY and will not be distributed on the Directives Portal. For distribution, please contact the Director, Office of Security, at 202-586-6775. Cancels: DOE M 471.2-3

  15. Special Access Program Policies, Responsibilities, and Procedure

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2007-10-29

    This Manual is for OFFICIAL USE ONLY and will not be distributed on the Directives Portal. For distribution, please contact the Executive Secretary of the Special Access Program Oversight Committee at 202-586-6775. Cancels DOE M 471.2-3A. Canceled by DOE O 471.5.

  16. A voice password system for access security

    SciTech Connect (OSTI)

    Birnbaum, M.; Cohen, L.A.; Welsh, F.X.

    1986-09-01

    A voice password system for access security using speaker verification technology has been designed for use over dial-up telephone lines. The voice password system (VPS) can provide secure access to telephone networks, computers, rooms, and buildings. It also has application in office automation systems, electric funds transfer, and ''smart cards'' (interactive computers embedded in credit-card-sized packages). As increasing attention is focused on access security in the public, private, and government sectors, the voice password system can provide a timely solution to the security dilemma. The VPS uses modes of communication available to almost everyone (the human voice and the telephone). A user calls the VPS, enters his or her identification number (ID) by touch-tone telephone, and then speaks a password. This is usually a phrase or a sentence of about seven syllables. On initial calls, the VPS creates a model of the user's voice, called a reference template, and labels it with the caller's unique user ID. To gain access later, the user calls the system, enters the proper user ID, and speaks the password phrase. The VPS compares the user's stored reference template with the spoken password and produces a distance score.

  17. Speed control system for an access gate

    SciTech Connect (OSTI)

    Bzorgi, Fariborz M.

    2012-03-20

    An access control apparatus for an access gate. The access gate typically has a rotator that is configured to rotate around a rotator axis at a first variable speed in a forward direction. The access control apparatus may include a transmission that typically has an input element that is operatively connected to the rotator. The input element is generally configured to rotate at an input speed that is proportional to the first variable speed. The transmission typically also has an output element that has an output speed that is higher than the input speed. The input element and the output element may rotate around a common transmission axis. A retardation mechanism may be employed. The retardation mechanism is typically configured to rotate around a retardation mechanism axis. Generally the retardation mechanism is operatively connected to the output element of the transmission and is configured to retard motion of the access gate in the forward direction when the first variable speed is above a control-limit speed. In many embodiments the transmission axis and the retardation mechanism axis are substantially co-axial. Some embodiments include a freewheel/catch mechanism that has an input connection that is operatively connected to the rotator. The input connection may be configured to engage an output connection when the rotator is rotated at the first variable speed in a forward direction and configured for substantially unrestricted rotation when the rotator is rotated in a reverse direction opposite the forward direction. The input element of the transmission is typically operatively connected to the output connection of the freewheel/catch mechanism.

  18. RE: NBP RFI: Data Access | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    RE: NBP RFI: Data Access RE: NBP RFI: Data Access Comments from Building Owners and Managers Association International on DOE Request for Information-Implementing the National Broadband Plan by Empowering Customers and the Smart Grid: Data Access, Third Party Use, and Privacy RE: NBP RFI: Data Access (235.11 KB) More Documents & Publications NBP RFI: Data Access Re: U.S. Department of Energy Request for Information Implementing the National Broadband Plan by Empowering Consumers and the

  19. RE: NBP RFI: Data Access | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Access RE: NBP RFI: Data Access Comments from Southern California Edison on DOE Request for Information-Implementing the National Broadband Plan by Empowering Customers and the Smart Grid: Data Access, Third Party Use, and Privacy RE: NBP RFI: Data Access (229.6 KB) More Documents & Publications Comments of San Diego Gas & Electric Company Re: DOE Request for Information - Implementing the National Broadband Plan by Empowering Consumers and the Smart Grid: Data Access, Third Party Use,

  20. Implementation of Parallel Dynamic Simulation on Shared-Memory vs. Distributed-Memory Environments

    SciTech Connect (OSTI)

    Jin, Shuangshuang; Chen, Yousu; Wu, Di; Diao, Ruisheng; Huang, Zhenyu

    2015-12-09

    Power system dynamic simulation computes the system response to a sequence of large disturbance, such as sudden changes in generation or load, or a network short circuit followed by protective branch switching operation. It consists of a large set of differential and algebraic equations, which is computational intensive and challenging to solve using single-processor based dynamic simulation solution. High-performance computing (HPC) based parallel computing is a very promising technology to speed up the computation and facilitate the simulation process. This paper presents two different parallel implementations of power grid dynamic simulation using Open Multi-processing (OpenMP) on shared-memory platform, and Message Passing Interface (MPI) on distributed-memory clusters, respectively. The difference of the parallel simulation algorithms and architectures of the two HPC technologies are illustrated, and their performances for running parallel dynamic simulation are compared and demonstrated.

  1. Memory device using movement of protons

    DOE Patents [OSTI]

    Warren, William L.; Vanheusden, Karel J. R.; Fleetwood, Daniel M.; Devine, Roderick A. B.; Archer, Leo B.; Brown, George A.; Wallace, Robert M.

    2000-01-01

    An enhancement of an electrically written memory element utilizing the motion of protons within a dielectric layer surrounded by layers on either side to confine the protons within the dielectric layer with electrode means attached to the surrounding layers to change the spatial position of the protons within the dielectric layer. The device is preferably constructed as a silicon-silicon dioxide-silicon layered structure with the protons being introduced to the structure during an anneal in an atmosphere containing hydrogen gas. Device operation is enhanced by concluding this anneal step with a sudden cooling. The device operates at low power, is preferably nonvolatile, is radiation tolerant, and is compatible with convention silicon MOS processing for integration with other microelectronics elements on the same silicon substrate.

  2. Solid state engine using nitinol memory alloy

    DOE Patents [OSTI]

    Golestaneh, A.A.

    1980-01-21

    A device for converting heat energy to mechanical energy includes a reservoir of a hot fluid and a rotor assembly mounted thereabove so a portion of it dips into the hot fluid. The rotor assembly may include a shaft having four spokes extending radially outwardly therefrom at right angles to each other, a floating ring and four flexible elements composed of a thermal memory material having a critical temperature between the temperature of the hot fluid and that of the ambient atmosphere extending between the ends of the spokes and the floating ring. Preferably, the flexible elements are attached to the floating ring through curved leaf springs. Energetic shape recovery of the flexible elements in the hot fluid causes the rotor assembly to rotate.

  3. Solid state engine using nitinol memory alloy

    DOE Patents [OSTI]

    Golestaneh, Ahmad A.

    1981-01-01

    A device for converting heat energy to mechanical energy includes a reservoir of a hot fluid and a rotor assembly mounted thereabove so a portion of it dips into the hot fluid. The rotor assembly may include a shaft having four spokes extending radially outwardly therefrom at right angles to each other, a floating ring and four flexible elements composed of a thermal memory material having a critical temperature between the temperature of the hot fluid and that of the ambient atmosphere extending between the ends of the spokes and the floating ring. Preferably, the flexible elements are attached to the floating ring through curved leaf springs. Energetic shape recovery of the flexible elements in the hot fluid causes the rotor assembly to rotate.

  4. Release mechanism utilizing shape memory polymer material

    DOE Patents [OSTI]

    Lee, Abraham P.; Northrup, M. Allen; Ciarlo, Dino R.; Krulevitch, Peter A.; Benett, William J.

    2000-01-01

    Microfabricated therapeutic actuators are fabricated using a shape memory polymer (SMP), a polyurethane-based material that undergoes a phase transformation at a specified temperature (Tg). At a temperature above temperature Tg material is soft and can be easily reshaped into another configuration. As the temperature is lowered below temperature Tg the new shape is fixed and locked in as long as the material stays below temperature Tg. Upon reheating the material to a temperature above Tg, the material will return to its original shape. By the use of such SMP material, SMP microtubing can be used as a release actuator for the delivery of embolic coils through catheters into aneurysms, for example. The microtubing can be manufactured in various sizes and the phase change temperature Tg is determinate for an intended temperature target and intended use.

  5. MULTI-ELECTRODE TUBE PULSE MEMORY CIRCUIT

    DOE Patents [OSTI]

    Gundlach, J.C.; Reeves, J.B.

    1958-05-20

    Control circuits are described for pulse memory devices for scalers and the like, and more particularly to a driving or energizing circuit for a polycathode gaseous discharge tube having an elongated anode and a successive series of cathodes spaced opposite the anode along its length. The circuit is so arranged as to utilize an arc discharge between the anode and a cathode to count a series of pulses. Upon application of an input pulse the discharge is made to occur between the anode and the next successive cathode, and an output pulse is produced when a particular subsequent cathode is reached. The circuit means for transfering the discharge by altering the anode potential and potential of the cathodes and interconnecting the cathodes constitutes the novel aspects of the invention. A low response time and reduced number of circuit components are the practical advantages of the described circuit.

  6. JOINT STUDY OF IMPROVED SAFEGUARDS METHODOLOGY USING NO-NOTICE RANDOMIZED INSPECTION AT JNC'S Pu HANDLING FACILITIES

    SciTech Connect (OSTI)

    LU,M.S.; SANBORN,J.B.

    2000-04-01

    After the Iraq war, the International Atomic Energy Agency (IAEA) 93+2 Program was developed to strengthen and improve the cost-effectiveness of the existing safeguards system. In particular, the Program aims to enhance the IAEA ability to detect undeclared nuclear activities and materials. The IAEA 93+2 Program includes: (1) Increased access to information and its effective use; (2) Increased physical access; (3) Optimum use of the existing system. The measures considered are divided in two parts: measures in Part 1 are those, which may be implemented within the existing IAEA authority; Part 2 measures require complementary legal authority, in the form of an additional Protocol, INFCIRC/540. A description of the status of its implementation can be found in ``Implementation of the Additional Protocol'' (Cooley, 1999). In particular, increased physical access includes access beyond locations requiring additional authorities derived from the INFCIRC/540 and no-notice randomized inspections. No-notice randomized inspections could enhance the inspection effectiveness and efficiency by increasing the coverage of the material involved, providing better confirmation of the operational status of the facilities and higher degree of confidence that no undeclared activities or materials existed at the facilities--including the detection of possible measures to conceal diversions.

  7. Open Access Transmission and Renewable Energy Technologies

    SciTech Connect (OSTI)

    Porter, K.

    1996-09-01

    In April 1996, the Federal Regulatory Commission (PERC) approved Orders 888 and 889 and released a draft rule for public comment on capacity reservation tariffs (CRTs). Order No. 888 requires electric utilities to file transmission tariffs that would allow transmission access to third parties who want to conduct wholesale transactions, and Order No. 889 requires transmission-owning utilities to set up open access, same-time information systems (OASIS), using commercial software and Internet protocols. This paper discusses these Orders in detail, as well as some of the issues before FERC with implications for renewables, which include: transmission pricing; transmission terms and conditions; reassignment of transmission capacity; defining state and FERC jurisdiction over transmission and distribution; the pricing of ancillary services; and the adoption and implementation of independent system operators.

  8. Visitor Control / Site Access - Hanford Site

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    About Us Hanford Site Wide Programs Visitor Control / Site Access About Us About Hanford Cleanup Hanford History Hanford Site Wide Programs Hanford Cultural Resources Contact Us Email Email Page | Print Print Page | Text Increase Font Size Decrease Font Size Planning to come to the Hanford Site? Map of Hanford Map of Hanford If you are planning on coming to Hanford as part of a job assignment, tour, or event, you need to be familiar with the requirements and restrictions associated with being on

  9. Access to generalized parton distributions at COMPASS

    SciTech Connect (OSTI)

    Nowak, Wolf-Dieter

    2015-04-10

    A brief experimentalist's introduction to Generalized Parton Distributions (GPDs) is given. Recent COMPASS results are shown on transverse target-spin asymmetries in hard exclusive ρ{sup 0} production and their interpretation in terms of a phenomenological model as indication for chiral-odd, transverse GPDs is discussed. For deeply virtual Compton scattering, it is briefly outlined how to access GPDs and projections are shown for future COMPASS measurements.

  10. Template for Discontinuation of Access Eligibility Determination

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    MEMORANDUM FOR (SUBJECT'S NAME) FROM: Personnel Security Program Manager SUBJECT: Discontinuation of Access Eligibility Determination Reference is made to your Questionnaire for National Security Positions (QNSP) signed [insert date], which was forwarded to this office in connection with a Department of Energy security clearance request. Your case was submitted to the Office of Personnel Management (OPM) and an investigation dated [insert date] has been received. [Insert a brief description of

  11. Memorial Day Message | National Nuclear Security Administration | (NNSA)

    National Nuclear Security Administration (NNSA)

    Memorial Day Message Friday, May 22, 2015 - 10:57am NNSA Blog Every year on Memorial Day, we honor the memory of those who died while defending our great Nation. We owe them, as well as their families and loved ones, more than we can ever repay for the sacrifices they have made on our behalf. At 3 p.m. on Monday, wherever you may happen to be, please stop and pause for one minute to remember those service members who answered the call to safeguard our interests around the world and to protect

  12. Hardware support for collecting performance counters directly to memory

    DOE Patents [OSTI]

    Gara, Alan; Salapura, Valentina; Wisniewski, Robert W.

    2012-09-25

    Hardware support for collecting performance counters directly to memory, in one aspect, may include a plurality of performance counters operable to collect one or more counts of one or more selected activities. A first storage element may be operable to store an address of a memory location. A second storage element may be operable to store a value indicating whether the hardware should begin copying. A state machine may be operable to detect the value in the second storage element and trigger hardware copying of data in selected one or more of the plurality of performance counters to the memory location whose address is stored in the first storage element.

  13. Resilience of complex networks to random breakdown

    SciTech Connect (OSTI)

    Paul, Gerald; Sreenivasan, Sameet; Stanley, H. Eugene

    2005-11-01

    Using Monte Carlo simulations we calculate f{sub c}, the fraction of nodes that are randomly removed before global connectivity is lost, for networks with scale-free and bimodal degree distributions. Our results differ from the results predicted by an equation for f{sub c} proposed by Cohen et al. We discuss the reasons for this disagreement and clarify the domain for which the proposed equation is valid.

  14. Electrokinetic transport in microchannels with random roughness

    SciTech Connect (OSTI)

    Wang, Moran [Los Alamos National Laboratory; Kang, Qinjun [Los Alamos National Laboratory

    2008-01-01

    We present a numerical framework to model the electrokinetic transport in microchannels with random roughness. The three-dimensional microstructure of the rough channel is generated by a random generation-growth method with three statistical parameters to control the number density, the total volume fraction, and the anisotropy characteristics of roughness elements. The governing equations for the electrokinetic transport are solved by a high-efficiency lattice Poisson?Boltzmann method in complex geometries. The effects from the geometric characteristics of roughness on the electrokinetic transport in microchannels are therefore modeled and analyzed. For a given total roughness volume fraction, a higher number density leads to a lower fluctuation because of the random factors. The electroosmotic flow rate increases with the roughness number density nearly logarithmically for a given volume fraction of roughness but decreases with the volume fraction for a given roughness number density. When both the volume fraction and the number density of roughness are given, the electroosmotic flow rate is enhanced by the increase of the characteristic length along the external electric field direction but is reduced by that in the direction across the channel. For a given microstructure of the rough microchannel, the electroosmotic flow rate decreases with the Debye length. It is found that the shape resistance of roughness is responsible for the flow rate reduction in the rough channel compared to the smooth channel even for very thin double layers, and hence plays an important role in microchannel electroosmotic flows.

  15. Local volume fraction fluctuations in random media

    SciTech Connect (OSTI)

    Quintanilla, J.; Torquato, S.

    1997-02-01

    Although the volume fraction is a constant for a statistically homogeneous random medium, on a spatially local level it fluctuates. We study the full distribution of volume fraction within an observation window of finite size for models of random media. A formula due to Lu and Torquato for the standard deviation or {open_quotes}coarseness{close_quotes} associated with the {ital local} volume fraction {xi} is extended for the nth moment of {xi} for any n. The distribution function F{sub L} of the local volume fraction of five different model microstructures is evaluated using analytical and computer-simulation methods for a wide range of window sizes and overall volume fractions. On the line, we examine a system of fully penetrable rods and a system of totally impenetrable rods formed by random sequential addition (RSA). In the plane, we study RSA totally impenetrable disks and fully penetrable aligned squares. In three dimensions, we study fully penetrable aligned cubes. In the case of fully penetrable rods, we will also simplify and numerically invert a prior analytical result for the Laplace transform of F{sub L}. In all of these models, we show that, for sufficiently large window sizes, F{sub L} can be reasonably approximated by the normal distribution. {copyright} {ital 1997 American Institute of Physics.}

  16. Random one-of-N selector

    DOE Patents [OSTI]

    Kronberg, J.W.

    1993-04-20

    An apparatus for selecting at random one item of N items on the average comprising counter and reset elements for counting repeatedly between zero and N, a number selected by the user, a circuit for activating and deactivating the counter, a comparator to determine if the counter stopped at a count of zero, an output to indicate an item has been selected when the count is zero or not selected if the count is not zero. Randomness is provided by having the counter cycle very often while varying the relatively longer duration between activation and deactivation of the count. The passive circuit components of the activating/deactivating circuit and those of the counter are selected for the sensitivity of their response to variations in temperature and other physical characteristics of the environment so that the response time of the circuitry varies. Additionally, the items themselves, which may be people, may vary in shape or the time they press a pushbutton, so that, for example, an ultrasonic beam broken by the item or person passing through it will add to the duration of the count and thus to the randomness of the selection.

  17. Random one-of-N selector

    DOE Patents [OSTI]

    Kronberg, James W.

    1993-01-01

    An apparatus for selecting at random one item of N items on the average comprising counter and reset elements for counting repeatedly between zero and N, a number selected by the user, a circuit for activating and deactivating the counter, a comparator to determine if the counter stopped at a count of zero, an output to indicate an item has been selected when the count is zero or not selected if the count is not zero. Randomness is provided by having the counter cycle very often while varying the relatively longer duration between activation and deactivation of the count. The passive circuit components of the activating/deactivating circuit and those of the counter are selected for the sensitivity of their response to variations in temperature and other physical characteristics of the environment so that the response time of the circuitry varies. Additionally, the items themselves, which may be people, may vary in shape or the time they press a pushbutton, so that, for example, an ultrasonic beam broken by the item or person passing through it will add to the duration of the count and thus to the randomness of the selection.

  18. An examination of content similarity within the memory of HPC applications.

    SciTech Connect (OSTI)

    Levy, Scott N.; Bridges, Patrick G.; Ferreira, Kurt Brian; Thompson, Aidan Patrick; Trott, Christian Robert

    2013-01-01

    Memory content similarity has been e ectively exploited for more than a decade to reduce memory consumption. By consolidating duplicate and similar pages in the address space of an application, we can reduce the amount of memory it consumes without negatively a ecting the application's perception of the memory resources available to it. In addition to memory de-duplication, there may be many other ways that we can exploit memory content similarity to improve system characteristics. In this paper, we examine the memory content similarity of several HPC applications. By characterizing the memory contents of these applications, we hope to provide a basis for ef- forts to e ectively exploit memory content similarity to improve system performance beyond memory deduplication. We show that several applications exhibit signi cant similarity and consider the source of the similarity.

  19. Controlling the Actuation Rate of Low Density Shape Memory Polymer...

    Office of Scientific and Technical Information (OSTI)

    Title: Controlling the Actuation Rate of Low Density Shape Memory Polymer Foams in Water Authors: Singhal, P ; Boyle, T ; Infanger, S ; Letts, S ; Small, W ; Maitland, D J ; Wilson...

  20. Shape memory alloy heat engines and energy harvesting systems...

    Office of Scientific and Technical Information (OSTI)

    A shape memory alloy (SMA) element is disposed about respective portions of the pulleys at an SMA pulley ratio. The SMA element includes first spring coil and a first fiber core ...

  1. T-625: Opera Frameset Handling Memory Corruption Vulnerability

    Broader source: Energy.gov [DOE]

    The vulnerability is caused due to an error when handling certain frameset constructs during page unloading and can be exploited to corrupt memory via a specially crafted web page.

  2. Multimode quantum memory based on atomic frequency combs

    SciTech Connect (OSTI)

    Afzelius, Mikael; Simon, Christoph; Riedmatten, Hugues de; Gisin, Nicolas

    2009-05-15

    An efficient multimode quantum memory is a crucial resource for long-distance quantum communication based on quantum repeaters. We propose a quantum memory based on spectral shaping of an inhomogeneously broadened optical transition into an atomic frequency comb (AFC). The spectral width of the AFC allows efficient storage of multiple temporal modes without the need to increase the absorption depth of the storage material, in contrast to previously known quantum memories. Efficient readout is possible thanks to rephasing of the atomic dipoles due to the AFC structure. Long-time storage and on-demand readout is achieved by use of spin states in a lambda-type configuration. We show that an AFC quantum memory realized in solids doped with rare-earth-metal ions could store hundreds of modes or more with close to unit efficiency, for material parameters achievable today.

  3. Multi-range force sensors utilizing shape memory alloys

    DOE Patents [OSTI]

    Varma, Venugopal K.

    2003-04-15

    The present invention provides a multi-range force sensor comprising a load cell made of a shape memory alloy, a strain sensing system, a temperature modulating system, and a temperature monitoring system. The ability of the force sensor to measure contact forces in multiple ranges is effected by the change in temperature of the shape memory alloy. The heating and cooling system functions to place the shape memory alloy of the load cell in either a low temperature, low strength phase for measuring small contact forces, or a high temperature, high strength phase for measuring large contact forces. Once the load cell is in the desired phase, the strain sensing system is utilized to obtain the applied contact force. The temperature monitoring system is utilized to ensure that the shape memory alloy is in one phase or the other.

  4. NERSC Veteran Kirby Fong Shares Fascinating Memories from the Center's

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Early Days veteran Kirby Fong shares fascinating memories from the center's early days NERSC Veteran Kirby Fong Shares Fascinating Memories from the Center's Early Days April 16, 2014 by Francesca Verdier Kirby Fong arrived at the Controlled Thermonuclear Research Computer Center, as NERSC was initially named, in June 1976. His job was to provide mathematical library software to users and to support them in finding and using it. In those days scientific programming was in Fortran, and scalar

  5. Method for fabricating uranium alloy articles without shape memory effects

    DOE Patents [OSTI]

    Banker, John G.

    1985-01-01

    Uranium-rich niobium and niobium-zirconium alloys possess a characteristic known as shape memory effect wherein shaped articles of these alloys recover their original shape when heated. The present invention circumvents this memory behavior by forming the alloys into the desired configuration at elevated temperatures with "cold" matched dies and maintaining the shaped articles between the dies until the articles cool to ambient temperature.

  6. Method for fabricating uranium alloy articles without shape memory effects

    DOE Patents [OSTI]

    Banker, J.G.

    1980-05-21

    Uranium-rich niobium and niobium-zirconium alloys possess a characteristic known as shape memory effect wherein shaped articles of these alloys recover their original shape when heated. The present invention circumvents this memory behavior by forming the alloys into the desired configuration at elevated temperatures with cold matched dies and maintaining the shaped articles between the dies until the articles cool to ambient temperature.

  7. Low density biodegradable shape memory polyurethane foams for embolic

    Office of Scientific and Technical Information (OSTI)

    biomedical applications (Journal Article) | SciTech Connect Low density biodegradable shape memory polyurethane foams for embolic biomedical applications Citation Details In-Document Search Title: Low density biodegradable shape memory polyurethane foams for embolic biomedical applications Authors: Singhal, P ; Small, W ; Cosgriff-Hernandez, E ; Maitland, D ; Wilson, T Publication Date: 2013-02-27 OSTI Identifier: 1122211 Report Number(s): LLNL-JRNL-623392 DOE Contract Number: W-7405-ENG-48

  8. Applying an Experimental Design Loop to Shape Memory Alloys (Conference) |

    Office of Scientific and Technical Information (OSTI)

    SciTech Connect Conference: Applying an Experimental Design Loop to Shape Memory Alloys Citation Details In-Document Search Title: Applying an Experimental Design Loop to Shape Memory Alloys Authors: Hogden, John Edward [1] + Show Author Affiliations Los Alamos National Laboratory Publication Date: 2016-06-01 OSTI Identifier: 1257099 Report Number(s): LA-UR-16-23811 DOE Contract Number: AC52-06NA25396 Resource Type: Conference Resource Relation: Conference: Data Science and Optimal Learning

  9. Microstructure, crystallization and shape memory behavior of titania and

    Office of Scientific and Technical Information (OSTI)

    yttria co-doped zirconia (Journal Article) | SciTech Connect Microstructure, crystallization and shape memory behavior of titania and yttria co-doped zirconia Citation Details In-Document Search This content will become publicly available on March 16, 2018 Title: Microstructure, crystallization and shape memory behavior of titania and yttria co-doped zirconia Authors: Zeng, Xiao Mei ; Du, Zehui ; Schuh, Christopher A. ; Tamura, Nobumichi ; Gan, Chee Lip Search SciTech Connect for author

  10. Photoresponsive Liquid Crystalline Epoxy Networks with Shape Memory

    Office of Scientific and Technical Information (OSTI)

    Behavior and Dynamic Ester Bonds (Journal Article) | SciTech Connect Photoresponsive Liquid Crystalline Epoxy Networks with Shape Memory Behavior and Dynamic Ester Bonds Citation Details In-Document Search Title: Photoresponsive Liquid Crystalline Epoxy Networks with Shape Memory Behavior and Dynamic Ester Bonds Authors: Li, Yuzhan ; Rios, Orlando ; Keum, Jong K. ; Chen, Jihua ; Kessler, Michael R. Publication Date: 2016-06-22 OSTI Identifier: 1256126 Grant/Contract Number: AC05-00OR22725

  11. Shape memory polymer foams for endovascular therapies (Patent) | SciTech

    Office of Scientific and Technical Information (OSTI)

    Connect Shape memory polymer foams for endovascular therapies Citation Details In-Document Search Title: Shape memory polymer foams for endovascular therapies A system for occluding a physical anomaly. One embodiment comprises a shape memory material body wherein the shape memory material body fits within the physical anomaly occluding the physical anomaly. The shape memory material body has a primary shape for occluding the physical anomaly and a secondary shape for being positioned in the

  12. TxDOT Access Management Manual | Open Energy Information

    Open Energy Info (EERE)

    Access Management Manual Jump to: navigation, search OpenEI Reference LibraryAdd to library Legal Document- OtherOther: TxDOT Access Management ManualLegal Abstract Manual prepared...

  13. U-144:Juniper Secure Access Input Validation Flaw Permits Cross...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    4:Juniper Secure Access Input Validation Flaw Permits Cross-Site Scripting Attacks U-144:Juniper Secure Access Input Validation Flaw Permits Cross-Site Scripting Attacks April 10,...

  14. CDOT State Highway Access Permit Application | Open Energy Information

    Open Energy Info (EERE)

    State Highway Access Permit Application Jump to: navigation, search OpenEI Reference LibraryAdd to library Form: CDOT State Highway Access Permit Application Abstract This is an...

  15. Wyo. Stat. 24-6 - Access Facilities | Open Energy Information

    Open Energy Info (EERE)

    24-6 - Access Facilities Jump to: navigation, search OpenEI Reference LibraryAdd to library Legal Document- StatuteStatute: Wyo. Stat. 24-6 - Access FacilitiesLegal Abstract...

  16. Colorado - State Highway Access Code | Open Energy Information

    Open Energy Info (EERE)

    - State Highway Access Code Jump to: navigation, search OpenEI Reference LibraryAdd to library Legal Document- RegulationRegulation: Colorado - State Highway Access CodeLegal...

  17. Solar/Wind Access Policy | Open Energy Information

    Open Energy Info (EERE)

    SolarWind Access Policy < Solar Jump to: navigation, search Solar and wind access laws are designed to establish a right to install and operate a solar or wind energy system at a...

  18. Public Access | OSTI, US Dept of Energy Office of Scientific...

    Office of Scientific and Technical Information (OSTI)

    Read more about STIP Slide 2014 September 1 OSTI Blog Public Access In the News Outlet: Nature U.S. Department of Energy frees up access to research The US Department of Energy ...

  19. File:03TXBLandAccess.pdf | Open Energy Information

    Open Energy Info (EERE)

    TXBLandAccess.pdf Jump to: navigation, search File File history File usage Metadata File:03TXBLandAccess.pdf Size of this preview: 463 599 pixels. Other resolution: 464 600...

  20. File:03NVBStateLandAccess.pdf | Open Energy Information

    Open Energy Info (EERE)

    NVBStateLandAccess.pdf Jump to: navigation, search File File history File usage Metadata File:03NVBStateLandAccess.pdf Size of this preview: 463 599 pixels. Other resolution:...

  1. CHANGE IN ACCEPTABLE ID DOCUMENTS FOR JLAB ACCESS:

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    JLAB ACCESS: The REAL ID Act (Public Law 109-13) now determines which state driver's license can be presented and accepted as a valid ID document for access to Jefferson Lab. The...

  2. Automotive Accessibility and Efficiency Meet in the Innovative...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Automotive Accessibility and Efficiency Meet in the Innovative MV-1 Automotive Accessibility and Efficiency Meet in the Innovative MV-1 March 11, 2011 - 4:03pm Addthis The MV-1, a ...

  3. Green Button: Providing Consumers with Access to Their Energy...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Button: Providing Consumers with Access to Their Energy Data Green Button: Providing Consumers with Access to Their Energy Data January 19, 2012 - 2:54pm Addthis Aneesh Chopra What ...

  4. Hydrodynamic 'memory' of binary fluid mixtures

    SciTech Connect (OSTI)

    Kalashnik, M. V.; Ingel, L. Kh.

    2006-07-15

    A theoretical analysis is presented of hydrostatic adjustment in a two-component fluid system, such as seawater stratified with respect to temperature and salinity. Both linear approximation and nonlinear problem are investigated. It is shown that scenarios of relaxation to a hydrostatically balanced state in binary fluid mixtures may substantially differ from hydrostatic adjustment in fluids that can be stratified only with respect to temperature. In particular, inviscid two-component fluids have 'memory': a horizontally nonuniform disturbance in the initial temperature or salinity distribution does not vanish even at the final stage, transforming into a persistent thermohaline 'trace.' Despite stability of density stratification and convective stability of the fluid system by all known criteria, an initial temperature disturbance may not decay and may even increase in amplitude. Moreover, its sign may change (depending on the relative contributions of temperature and salinity to stable background density stratification). Hydrostatic adjustment may involve development of discontinuous distributions from smooth initial temperature or concentration distributions. These properties of two-component fluids explain, in particular, the occurrence of persistent horizontally or vertically nonuniform temperature and salinity distributions in the ocean, including discontinuous ones.

  5. Apparatus for loading shape memory gripper mechanisms

    DOE Patents [OSTI]

    Lee, Abraham P.; Benett, William J.; Schumann, Daniel L.; Krulevitch, Peter A.; Fitch, Joseph P.

    2001-01-01

    A method and apparatus for loading deposit material, such as an embolic coil, into a shape memory polymer (SMP) gripping/release mechanism. The apparatus enables the application of uniform pressure to secure a grip by the SMP mechanism on the deposit material via differential pressure between, for example, vacuum within the SMP mechanism and hydrostatic water pressure on the exterior of the SMP mechanism. The SMP tubing material of the mechanism is heated to above the glass transformation temperature (Tg) while reshaping, and subsequently cooled to below Tg to freeze the shape. The heating and/or cooling may, for example, be provided by the same water applied for pressurization or the heating can be applied by optical fibers packaged to the SMP mechanism for directing a laser beam, for example, thereunto. At a point of use, the deposit material is released from the SMP mechanism by reheating the SMP material to above the temperature Tg whereby it returns to its initial shape. The reheating of the SM material may be carried out by injecting heated fluid (water) through an associated catheter or by optical fibers and an associated beam of laser light, for example.

  6. ENSURING ACCESS TO FEDERALLY CONDUCTED PROGRAMS AND ACTIVITIES...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    EEO ENSURING ACCESS TO FEDERALLY CONDUCTED PROGRAMS AND ACTIVITIES BY INDIVIDUALS WITH LIMITED ENGLISH PROFICIENCY (LEP) PLAN (61.75

  7. Request for Information NBP RFI: Data Access | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Request for Information NBP RFI: Data Access Request for Information NBP RFI: Data Access Xcel Energy, a combination electricity and natural gas utility operating in eight Midwestern states, submits these Comments in response to the Department of Energy's May 11, 2010 Request for Information: "Implementing the National Broadband Plan by Empowering Consumers and the Smart Grid: Data Access, Third Party Use, and Privacy." Request for Information NBP RFI: Data Access (1.14 MB) More

  8. Sandia National Laboratories: Employee & Retiree Resources: Remote Access

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Employee & Retiree Resources Emergency Announcements & Other Alerts Corporate Forms Technical Library Sandia Anywhere: Remote Access Sandia Anywhere: Remote Access Access Sandia's internal web-based resources You can access the following web-based resources directly with a CryptoCard from any computing device: Techweb Webmail - includes Outlook calendar and web-based IM Corporate Training (TEDS Learning Portal) Enterprise Information Management Services (EIMS) Expense Report HR Self

  9. Briefing, For Persons With Access to UCNI- June 2014

    Office of Energy Efficiency and Renewable Energy (EERE)

    Briefing provides information on Unclassified Controlled Nuclear Information (UCNI) and for persons who have access to UCNI.

  10. Improving Access to Foundational Energy Performance Data

    SciTech Connect (OSTI)

    Studer, D.; Livingood, W.; Torcellini, P.

    2014-08-01

    Access to foundational energy performance data is key to improving the efficiency of the built environment. However, stakeholders often lack access to what they perceive as credible energy performance data. Therefore, even if a stakeholder determines that a product would increase efficiency, they often have difficulty convincing their management to move forward. Even when credible data do exist, such data are not always sufficient to support detailed energy performance analyses, or the development of robust business cases. One reason for this is that the data parameters that are provided are generally based on the respective industry norms. Thus, for mature industries with extensive testing standards, the data made available are often quite detailed. But for emerging technologies, or for industries with less well-developed testing standards, available data are generally insufficient to support robust analysis. However, even for mature technologies, there is no guarantee that the data being supplied are the same data needed to accurately evaluate a product?s energy performance. To address these challenges, the U.S. Department of Energy funded development of a free, publically accessible Web-based portal, the Technology Performance Exchange(TM), to facilitate the transparent identification, storage, and sharing of foundational energy performance data. The Technology Performance Exchange identifies the intrinsic, technology-specific parameters necessary for a user to perform a credible energy analysis and includes a robust database to store these data. End users can leverage stored data to evaluate the site-specific performance of various technologies, support financial analyses with greater confidence, and make better informed procurement decisions.

  11. Open Access: From Myth to Paradox

    ScienceCinema (OSTI)

    Ginsparg, Paul [Cornell University, Ithaca, New York, United States

    2010-01-08

    True open access to scientific publications not only gives readers the possibility to read articles without paying subscription, but also makes the material available for automated ingestion and harvesting by 3rd parties. Once articles and associated data become universally treatable as computable objects, openly available to 3rd party aggregators and value-added services, what new services can we expect, and how will they change the way that researchers interact with their scholarly communications infrastructure? I will discuss straightforward applications of existing ideas and services, including citation analysis, collaborative filtering, external database linkages, interoperability, and other forms of automated markup, and speculate on the sociology of the next generation of users.

  12. Request NSF Access | Argonne National Laboratory

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Contacts Amber Dach, SSO (630) 252-8281 sso@anl.gov Request NSF Access Clearances can be passed to Argonne National Laboratory through the following means: In memo form via unsecure fax at (630) 252-5678 (receiving machine is in a locked location) In memo form via encrypted email to sso@anl.gov Via M3 using PLA DOE//SSO//ANL Please note that Argonne does not have JPAS and cannot accept SMO codes. Please include the following information: First/Last Name Social security number Date of birth

  13. Access Rate Control System | Y-12 National Security Complex

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Access Rate Control System Access Rate Control System The mp4 video format is not supported by this browser. Download video Captions: On Time: 4:03 min Developed to support safeguards and security, the Access Rate Control System (ARCS) controls the speed of entry through full-height turnstiles

  14. Alliance Project: Cyber-Physical Security Unified Access Solution

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Alliance Project: Cyber-Physical Security Unified Access Solution Unified cyber-physical security to protect energy sector control systems and facilities Background The North American Electric Reliability Corporation (NERC) Critical Infrastructure Protection (CIP) standards require utility operators to control, monitor, and record physical access to cybersecurity assets and establish physical security perimeters (PSPs). Many operators engage security contractors to provide access controls,

  15. Random Selection for Drug Screening (Technical Report) | SciTech...

    Office of Scientific and Technical Information (OSTI)

    Subject: 99 GENERAL AND MISCELLANEOUSMATHEMATICS, COMPUTING, AND INFORMATION SCIENCE; PROBABILITY; SAMPLING; DRUG ABUSE; DRUGS; CRIME DETECTION drug screenings, random selection ...

  16. Relativistic Random Phase Approximation At Finite Temperature

    SciTech Connect (OSTI)

    Niu, Y. F.; Paar, N.; Vretenar, D.; Meng, J.

    2009-08-26

    The fully self-consistent finite temperature relativistic random phase approximation (FTRRPA) has been established in the single-nucleon basis of the temperature dependent Dirac-Hartree model (FTDH) based on effective Lagrangian with density dependent meson-nucleon couplings. Illustrative calculations in the FTRRPA framework show the evolution of multipole responses of {sup 132}Sn with temperature. With increased temperature, in both monopole and dipole strength distributions additional transitions appear in the low energy region due to the new opened particle-particle and hole-hole transition channels.

  17. Statistical analysis of random duration times

    SciTech Connect (OSTI)

    Engelhardt, M.E.

    1996-04-01

    This report presents basic statistical methods for analyzing data obtained by observing random time durations. It gives nonparametric estimates of the cumulative distribution function, reliability function and cumulative hazard function. These results can be applied with either complete or censored data. Several models which are commonly used with time data are discussed, and methods for model checking and goodness-of-fit tests are discussed. Maximum likelihood estimates and confidence limits are given for the various models considered. Some results for situations where repeated durations such as repairable systems are also discussed.

  18. Experimental Analysis of a Piezoelectric Energy Harvesting System for Harmonic, Random, and Sine on Random Vibration

    SciTech Connect (OSTI)

    Cryns, Jackson W.; Hatchell, Brian K.; Santiago-Rojas, Emiliano; Silvers, Kurt L.

    2013-07-01

    Formal journal article Experimental analysis of a piezoelectric energy harvesting system for harmonic, random, and sine on random vibration Abstract: Harvesting power with a piezoelectric vibration powered generator using a full-wave rectifier conditioning circuit is experimentally compared for varying sinusoidal, random and sine on random (SOR) input vibration scenarios. Additionally, the implications of source vibration characteristics on harvester design are discussed. Studies in vibration harvesting have yielded numerous alternatives for harvesting electrical energy from vibrations but piezoceramics arose as the most compact, energy dense means of energy transduction. The rise in popularity of harvesting energy from ambient vibrations has made piezoelectric generators commercially available. Much of the available literature focuses on maximizing harvested power through nonlinear processing circuits that require accurate knowledge of generator internal mechanical and electrical characteristics and idealization of the input vibration source, which cannot be assumed in general application. In this manuscript, variations in source vibration and load resistance are explored for a commercially available piezoelectric generator. We characterize the source vibration by its acceleration response for repeatability and transcription to general application. The results agree with numerical and theoretical predictions for in previous literature that load optimal resistance varies with transducer natural frequency and source type, and the findings demonstrate that significant gains are seen with lower tuned transducer natural frequencies for similar source amplitudes. Going beyond idealized steady state sinusoidal and simplified random vibration input, SOR testing allows for more accurate representation of real world ambient vibration. It is shown that characteristic interactions from more complex vibrational sources significantly alter power generation and power processing

  19. Cycle accurate and cycle reproducible memory for an FPGA based hardware accelerator

    DOE Patents [OSTI]

    Asaad, Sameh W.; Kapur, Mohit

    2016-03-15

    A method, system and computer program product are disclosed for using a Field Programmable Gate Array (FPGA) to simulate operations of a device under test (DUT). The DUT includes a device memory having a number of input ports, and the FPGA is associated with a target memory having a second number of input ports, the second number being less than the first number. In one embodiment, a given set of inputs is applied to the device memory at a frequency Fd and in a defined cycle of time, and the given set of inputs is applied to the target memory at a frequency Ft. Ft is greater than Fd and cycle accuracy is maintained between the device memory and the target memory. In an embodiment, a cycle accurate model of the DUT memory is created by separating the DUT memory interface protocol from the target memory storage array.

  20. Global temperature deviations as a random walk

    SciTech Connect (OSTI)

    Karner, O.

    1996-12-31

    Surface air temperature is the main parameter to represent the earth`s contemporary climate. Several historical temperature records on a global/monthly basis are available. Time-series analysis shows that they can be modelled via autoregressive moving average models closely connected to the classical random walk model. Fitted models emphasize a nonstationary character of the global/monthly temperature deviation from a certain level. The nonstationarity explains all trends and periods, found in the last century`s variability of global mean temperature. This means that the short-term temperature trends are inevitable and may have little in common with a currently increasing carbon dioxide amount. The calculations show that a reasonable understanding of the contemporary global mean climate is attainable, assuming random forcing to the climate system and treating temperature deviation as a response to it. The forcings occur due to volcanic eruptions, redistribution of cloudiness, variations in snow and ice covered areas, changes in solar output, etc. Their impact can not be directly estimated from changes of the earth`s radiation budget at the top of the atmosphere, because actual measurements represent mixture of the forcings and responses. Thus, it is impossible empirically to separate the impact of one particular forcing (e.g., that due to increase of CO{sub 2} amount) from the sequence of all existing forcings in the earth climate system. More accurate modelling involving main feedback loops is necessary to ease such a separation.

  1. Random unitary maps for quantum state reconstruction

    SciTech Connect (OSTI)

    Merkel, Seth T. [Institute for Quantum Computing, Waterloo, Ontario N2L 3G1 (Canada); Riofrio, Carlos A.; Deutsch, Ivan H. [Center for Quantum Information and Control (CQuIC), Department of Physics and Astronomy, University of New Mexico, Albuquerque, New Mexico, 87131 (United States); Flammia, Steven T. [Perimeter Institute for Theoretical Physics, Waterloo, Ontario N2L 2Y5 (Canada); Kavli Institute for Theoretical Physics, University of California, Santa Barbara, California 93106 (United States)

    2010-03-15

    We study the possibility of performing quantum state reconstruction from a measurement record that is obtained as a sequence of expectation values of a Hermitian operator evolving under repeated application of a single random unitary map, U{sub 0}. We show that while this single-parameter orbit in operator space is not informationally complete, it can be used to yield surprisingly high-fidelity reconstruction. For a d-dimensional Hilbert space with the initial observable in su(d), the measurement record lacks information about a matrix subspace of dimension {>=}d-2 out of the total dimension d{sup 2}-1. We determine the conditions on U{sub 0} such that the bound is saturated, and show they are achieved by almost all pseudorandom unitary matrices. When we further impose the constraint that the physical density matrix must be positive, we obtain even higher fidelity than that predicted from the missing subspace. With prior knowledge that the state is pure, the reconstruction will be perfect (in the limit of vanishing noise) and for arbitrary mixed states, the fidelity is over 0.96, even for small d, and reaching F>0.99 for d>9. We also study the implementation of this protocol based on the relationship between random matrices and quantum chaos. We show that the Floquet operator of the quantum kicked top provides a means of generating the required type of measurement record, with implications on the relationship between quantum chaos and information gain.

  2. Scalable Memory Registration for High-Performance Networks Using Helper Threads

    SciTech Connect (OSTI)

    Li, Dong; Cameron, Kirk W.; Nikolopoulos, Dimitrios; de Supinski, Bronis R.; Schulz, Martin

    2011-01-01

    Remote DMA (RDMA) enables high performance networks to reduce data copying between an application and the operating system (OS). However RDMA operations in some high performance networks require communication memory explicitly registered with the network adapter and pinned by the OS. Memory registration and pinning limits the flexibility of the memory system and reduces the amount of memory that user processes can allocate. These issues become more significant on multicore platforms, since registered memory demand grows linearly with the number of processor cores. In this paper we propose a new memory registration/deregistration strategy to reduce registered memory on multicore architectures for HPC applications. We hide the cost of dynamic memory management by offloading all dynamic memory registration and deregistration requests to a dedicated memory management helper thread. We investigate design policies and performance implications of the helper thread approach. We evaluate our framework with the NAS parallel benchmarks, for which our registration scheme significantly reduces the registered memory (23.62% on average and up to 49.39%) and avoids memory registration/deregistration costs for reused communication memory. We show that our system enables the execution of problem sizes that could not complete under existing memory registration strategies.

  3. Ames Lab 101: Ultrafast Magnetic Switching

    SciTech Connect (OSTI)

    Jigang Wang

    2013-04-08

    Ames Laboratory physicists have found a new way to switch magnetism that is at least 1000 times faster than currently used in magnetic memory technologies. Magnetic switching is used to encode information in hard drives, magnetic random access memory and other computing devices. The discovery potentially opens the door to terahertz and faster memory speeds.

  4. Ames Lab 101: Ultrafast Magnetic Switching

    ScienceCinema (OSTI)

    Jigang Wang

    2013-06-05

    Ames Laboratory physicists have found a new way to switch magnetism that is at least 1000 times faster than currently used in magnetic memory technologies. Magnetic switching is used to encode information in hard drives, magnetic random access memory and other computing devices. The discovery potentially opens the door to terahertz and faster memory speeds.

  5. Low-temperature random matrix theory at the soft edge

    SciTech Connect (OSTI)

    Edelman, Alan; Persson, Per-Olof; Sutton, Brian D.

    2014-06-15

    Low temperature random matrix theory is the study of random eigenvalues as energy is removed. In standard notation, ? is identified with inverse temperature, and low temperatures are achieved through the limit ? ? ?. In this paper, we derive statistics for low-temperature random matrices at the soft edge, which describes the extreme eigenvalues for many random matrix distributions. Specifically, new asymptotics are found for the expected value and standard deviation of the general-? Tracy-Widom distribution. The new techniques utilize beta ensembles, stochastic differential operators, and Riccati diffusions. The asymptotics fit known high-temperature statistics curiously well and contribute to the larger program of general-? random matrix theory.

  6. Method of preparing a two-way shape memory alloy

    DOE Patents [OSTI]

    Johnson, A.D.

    1984-03-06

    A two-way shape memory alloy, a method of training a shape memory alloy, and a heat engine employing the two-way shape memory alloy to do external work during both heating and cooling phases are disclosed. The alloy is heated under a first training stress to a temperature which is above the upper operating temperature of the alloy, then cooled to a cold temperature below the zero-force transition temperature of the alloy, then deformed while applying a second training stress which is greater in magnitude than the stress at which the alloy is to be operated, then heated back to the hot temperature, changing from the second training stress back to the first training stress. 8 figs.

  7. Method of preparing a two-way shape memory alloy

    DOE Patents [OSTI]

    Johnson, Alfred D.

    1984-01-01

    A two-way shape memory alloy, a method of training a shape memory alloy, and a heat engine employing the two-way shape memory alloy to do external work during both heating and cooling phases. The alloy is heated under a first training stress to a temperature which is above the upper operating temperature of the alloy, then cooled to a cold temperature below the zero-force transition temperature of the alloy, then deformed while applying a second training stress which is greater in magnitude than the stress at which the alloy is to be operated, then heated back to the hot temperature, changing from the second training stress back to the first training stress.

  8. Standards for message-passing in a distributed memory environment

    SciTech Connect (OSTI)

    Walker, D.W.

    1992-08-01

    This report presents a summary of the main ideas presented at the First CRPC Work-shop on Standards for Message Passing in a Distributed Memory Environment, held April 29-30, 1992, in Williamsburg, Virginia. This workshop attracted 68 attendees including representative from major hardware and software vendors, and was the first in a series of workshops sponsored by the Center for Research on Parallel Computation. The aim of this series of workshops is to develop and implement a standard for message passing on distributed memory concurrent computers, thereby making it easier to develop efficient, portable application codes for such machines. The report discusses the main issues raised in the CRPC workshop, and describes proposed desirable features of a message passing standard for distributed memory environments.

  9. Memory and Spin Injection Devices Involving Half Metals (Journal...

    Office of Scientific and Technical Information (OSTI)

    Publisher: Hindawi Publishing Corporation Sponsoring Org: USDOE Country of Publication: Egypt Language: English Word Cloud More Like This Free Publicly Accessible Full Text ...

  10. Quantum anomalous Hall effect in topological insulator memory

    SciTech Connect (OSTI)

    Jalil, Mansoor B. A.; Tan, S. G.; Siu, Z. B.

    2015-05-07

    We theoretically investigate the quantum anomalous Hall effect (QAHE) in a magnetically coupled three-dimensional-topological insulator (3D-TI) system. We apply the generalized spin-orbit coupling Hamiltonian to obtain the Hall conductivity σ{sup xy} of the system. The underlying topology of the QAHE phenomenon is then analyzed to show the quantization of σ{sup xy} and its relation to the Berry phase of the system. Finally, we analyze the feasibility of utilizing σ{sup xy} as a memory read-out in a 3D-TI based memory at finite temperatures, with comparison to known magnetically doped 3D-TIs.

  11. A prototype functional language implementation for hierarchical- memory architectures

    SciTech Connect (OSTI)

    Wolski, R.; Feo, J.; Cann, D.

    1992-01-14

    Programming languages are the most important tool at a programmers' disposal. All other tools correct, visualize, or evaluate the product crafted by this tool. The advent of multiprocessor computer systems has greatly complicated the programmer's task an increased his need for high-level languages capable of automatically taming these architectures. In this paper, we describe a prototype implementation of Sisal for multiprocessor, hierarchical-memory systems. The implementation includes explicit compiler and runtime control that effectively exploits the different levels of memory and manages interprocess communications (IPC). We give preliminary performance results for this system on the BBN TC2000.

  12. International Electricity Trade - Open Access | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    International Electricity Trade - Open Access International Electricity Trade - Open Access DOE has consistently expressed its policy that international electricity trade should be subject to the same principles of comparable open access and non-discrimination that apply to transmission in interstate commerce. DOE has stated this policy in export authorizations granted to entities requesting authority to export over international transmission facilities. In those authorizations, DOE indicated it

  13. Accessing DOE's Many Energy Efficiency Resources and Technical Assistance

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    | Department of Energy Accessing DOE's Many Energy Efficiency Resources and Technical Assistance Accessing DOE's Many Energy Efficiency Resources and Technical Assistance Discusses current DOE programs and key resources (documents, tools) that can support program administrators and planners interested in pursuing energy efficiency. Accessing DOE's Many Energy Efficiency Resources and Technical Assistance (298.55 KB) More Documents & Publications How Energy Efficiency Programs Can Support

  14. Adjudicative Guidelines for Determining Eligibility for Access to Classified Information

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Adjudicative Guidelines for Determining Eligibility for Access to Classified Information 1. Introduction. The following adjudicative guidelines are established for all U.S. government civilian and military personnel, consultants, contractors, employees of contractors, licensees, certificate holders or grantees and their employees and other individuals who require access to classified information. They apply to persons being considered for initial or continued eligibility for access to classified

  15. Access Models | U.S. DOE Office of Science (SC)

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Access Models User Facilities User Facilities Home User Facilities at a Glance User Resources Getting Started User Safety Access Models User Agreements Data Management Resources Acknowledging User Facilities User Statistics Policies and Processes Frequently Asked Questions User Facility Science Highlights User Facility News Contact Information Office of Science U.S. Department of Energy 1000 Independence Ave., SW Washington, DC 20585 P: (202) 586-5430 User Resources Access Models Print Text

  16. Orange Button - Solar Bankability Data to Advance Transactions and Access

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    (SB-DATA) | Department of Energy Orange Button - Solar Bankability Data to Advance Transactions and Access (SB-DATA) Orange Button - Solar Bankability Data to Advance Transactions and Access (SB-DATA) Orange Button – Solar Bankability Data to Advance Transactions and Access (SB-DATA) Creating unified data standards will help the solar industry reduce market inefficiencies and lower costs for consumers. Orange Button℠, originally named Solar Bankability Data to Advance Transactions and

  17. Solar Access to Public Capital | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Solar Access to Public Capital Solar Access to Public Capital The Solar Access to Public Capital (SAPC) working group has developed standard residential lease and commercial power purchase agreement (PPA) contracts available for use by solar developers, customers, and third-party finance providers. These documents are designed to improve consumer transparency, reduce transaction costs in the solar asset contracting process, and facilitate the pooling of associated cash flows so that they may be

  18. Access and Use Energy Data | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Access and Use Energy Data Access and Use Energy Data SLSC_access and use.png Whether you represent a single building, campus, or municipality, any energy efficiency improvement or data management program should include activities such as benchmarking, establishing an energy baseline, and verifying and validating results to identify impacts and effectiveness. The resources available here cover the following topics related to energy data management and evaluation. Benchmarking Benchmarking

  19. PublicAccessArea.jpg | OSTI, US Dept of Energy Office of Scientific and

    Office of Scientific and Technical Information (OSTI)

    Technical Information PublicAccessArea

  20. Deadlock during first touch of upc_alloc'd remote memory when...

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Reports Deadlock during first touch of upcalloc'd remote memory when target is in upcbarrier Deadlock during first touch of upcalloc'd remote memory when target is in ...