WorldWideScience

Sample records for cache valley utah

  1. Preliminary pumping strategy analyses for southeastern Cache Valley, Utah and river baseflow impacts

    OpenAIRE

    Chowdhury, Shyamal B.; Peralta, R. C.

    1995-01-01

    US/REMAX, a linear optimization model for groundwater management, is used to compute preliminary optimal sustained groundwater pumping increases for southeastern Cache Valley. US/REMAX employs the response matrix method of representing system response to stimuli as constraint equations within an optimization problem. The management objective is to maximize groundwater extraction at four specified locations subject to constrai~ts on aquifer potentiometric head, aquifer/river interflow, and the...

  2. Cache valley virus in a patient diagnosed with aseptic meningitis.

    Science.gov (United States)

    Nguyen, Nang L; Zhao, Guoyan; Hull, Rene; Shelly, Mark A; Wong, Susan J; Wu, Guang; St George, Kirsten; Wang, David; Menegus, Marilyn A

    2013-06-01

    Cache Valley virus was initially isolated from mosquitoes and had been linked to central nervous system-associated diseases. A case of Cache Valley virus infection is described. The virus was cultured from a patient's cerebrospinal fluid and identified with real-time reverse transcription-PCR and sequencing, which also yielded the complete viral coding sequences.

  3. A novel cause of chronic viral meningoencephalitis: Cache Valley virus.

    Science.gov (United States)

    Wilson, Michael R; Suan, Dan; Duggins, Andrew; Schubert, Ryan D; Khan, Lillian M; Sample, Hannah A; Zorn, Kelsey C; Rodrigues Hoffman, Aline; Blick, Anna; Shingde, Meena; DeRisi, Joseph L

    2017-07-01

    Immunodeficient patients are particularly vulnerable to neuroinvasive infections that can be challenging to diagnose. Metagenomic next generation sequencing can identify unusual or novel microbes and is therefore well suited for investigating the etiology of chronic meningoencephalitis in immunodeficient patients. We present the case of a 34-year-old man with X-linked agammaglobulinemia from Australia suffering from 3 years of meningoencephalitis that defied an etiologic diagnosis despite extensive conventional testing, including a brain biopsy. Metagenomic next generation sequencing of his cerebrospinal fluid and brain biopsy tissue was performed to identify a causative pathogen. Sequences aligning to multiple Cache Valley virus genes were identified via metagenomic next generation sequencing. Reverse transcription polymerase chain reaction and immunohistochemistry subsequently confirmed the presence of Cache Valley virus in the brain biopsy tissue. Cache Valley virus, a mosquito-borne orthobunyavirus, has only been identified in 3 immunocompetent North American patients with acute neuroinvasive disease. The reported severity ranges from a self-limiting meningitis to a rapidly fatal meningoencephalitis with multiorgan failure. The virus has never been known to cause a chronic systemic or neurologic infection in humans. Cache Valley virus has also never previously been detected on the Australian continent. Our research subject traveled to North and South Carolina and Michigan in the weeks prior to the onset of his illness. This report demonstrates that metagenomic next generation sequencing allows for unbiased pathogen identification, the early detection of emerging viruses as they spread to new locales, and the discovery of novel disease phenotypes. Ann Neurol 2017;82:105-114. © 2017 The Authors Annals of Neurology published by Wiley Periodicals, Inc. on behalf of American Neurological Association.

  4. Hydrologic reconnaissance of Rush Valley, Tooele County, Utah

    Science.gov (United States)

    Hood, James W.; Price, Don; Waddell, K.M.

    1969-01-01

    This report is the third in a series by the U. S. Geological Survey in cooperation with the Utah Department of Natural Resources, Division of Water Rights, which describes the water resources of the western basins of Utah. Its purpose is to present available hydrologic data for Rush Valley, to provide an evaluation of the potential water-resources development of the valley, and to identify needed studies that would help provide an understanding of the valley's water supply.

  5. Hydrologic reconnaissance of Skull Valley, Tooele County, Utah

    Science.gov (United States)

    Hood, James W.; Waddell, K.M.

    1968-01-01

    This report is the second in a series by the U.S. Geological Survey in cooperation with the Utah Department of Natural Resources, Division of Water Rights, which describes the water resources of the western basins of Utah. Its purpose is to present available hydrologic data on Skull Valley, to provide an evaluation of the potential water-resource development of the valley, and to identify needed studies that would help provide an understandingof the valley's water supply.

  6. Hydrology of Northern Utah Valley, Utah County, Utah, 1975-2005

    Science.gov (United States)

    Cederberg, Jay R.; Gardner, Philip M.; Thiros, Susan A.

    2009-01-01

    The ground-water resources of northern Utah Valley, Utah, were assessed during 2003-05 to describe and quantify components of the hydrologic system, determine a hydrologic budget for the basin-fill aquifer, and evaluate changes to the system relative to previous studies. Northern Utah Valley is a horst and graben structure with ground water occurring in both the mountain-block uplands surrounding the valley and in the unconsolidated basin-fill sediments. The principal aquifer in northern Utah Valley occurs in the unconsolidated basin-fill deposits where a deeper unconfined aquifer occurs near the mountain front and laterally grades into multiple confined aquifers near the center of the valley. Sources of water to the basin-fill aquifers occur predominantly as either infiltration of streamflow at or near the interface of the mountain front and valley or as subsurface inflow from the adjacent mountain blocks. Sources of water to the basin-fill aquifers were estimated to average 153,000 (+/- 31,500) acre-feet annually during 1975-2004 with subsurface inflow and infiltration of streamflow being the predominant sources. Discharge from the basin-fill aquifers occurs in the valley lowlands as flow to waterways, drains, ditches, springs, as diffuse seepage, and as discharge from flowing and pumping wells. Ground-water discharge from the basin-fill aquifers during 1975-2004 was estimated to average 166,700 (+/- 25,900) acre-feet/year where discharge to wells for consumptive use and discharge to waterways, drains, ditches, and springs were the principal sources. Measured water levels in wells in northern Utah Valley declined an average of 22 feet from 1981 to 2004. Water-level declines are consistent with a severe regional drought beginning in 1999 and continuing through 2004. Water samples were collected from 36 wells and springs throughout the study area along expected flowpaths. Water samples collected from 34 wells were analyzed for dissolved major ions, nutrients, and

  7. Underground water in the valleys of Utah Lake and Jordan River, Utah

    Science.gov (United States)

    Richardson, George Burr

    1906-01-01

    The valleys of Utah Lake and Jordan River are situated in north-central Utah, in the extreme eastern part of the Great Basin. The lofty Wasatch Range (Pl. I), the westernmost of the Rocky Mountain system, limits the valleys on the east, and relatively low basin ranges - the Oquirrh, Lake, and East Tintic mountains - determine them on the west. The valleys trend north and south, and are almost separated by the low east-west Traverse Range, the slopes of which constitute a dam for Utah Lake, which drains through Jordan River to Great Salt Lake.The area under consideration is the most populous and flourishing part of the State, Salt Lake City and Provo, the first and third cities in the State, and many other thriving settlements are there located. At Bingham Junction and Murray a number of smelters treat the ores from near-by mines, but agriculture is the main industry. Water for irrigation is supplied by mountain streams, and intensive farming is successfully pursued. The practice of irrigation was begun by the Mormon pioneers in 1847, and has been discussed in several publications; little attention, however, has been given to the underground water resources, and, so far as the writer is aware, they have not before been described. The present paper outlines conditions of occurrence of the subterranean waters and describes their development in the valleys of Utah Lake and Jordan River.

  8. Three-dimensional numerical model of ground-water flow in northern Utah Valley, Utah County, Utah

    Science.gov (United States)

    Gardner, Philip M.

    2009-01-01

    A three-dimensional, finite-difference, numerical model was developed to simulate ground-water flow in northern Utah Valley, Utah. The model includes expanded areal boundaries as compared to a previous ground-water flow model of the valley and incorporates more than 20 years of additional hydrologic data. The model boundary was generally expanded to include the bedrock in the surrounding mountain block as far as the surface-water divide. New wells have been drilled in basin-fill deposits near the consolidated-rock boundary. Simulating the hydrologic conditions within the bedrock allows for improved simulation of the effect of withdrawal from these wells. The inclusion of bedrock also allowed for the use of a recharge model that provided an alternative method for spatially distributing areal recharge over the mountains.The model was calibrated to steady- and transient-state conditions. The steady-state simulation was developed and calibrated by using hydrologic data that represented average conditions for 1947. The transient-state simulation was developed and calibrated by using hydrologic data collected from 1947 to 2004. Areally, the model grid is 79 rows by 70 columns, with variable cell size. Cells throughout most of the model domain represent 0.3 mile on each side. The largest cells are rectangular with dimensions of about 0.3 by 0.6 mile. The largest cells represent the mountain block on the eastern edge of the model domain where the least hydrologic data are available. Vertically, the aquifer system is divided into 4 layers which incorporate 11 hydrogeologic units. The model simulates recharge to the ground-water flow system as (1) infiltration of precipitation over the mountain block, (2) infiltration of precipitation over the valley floor, (3) infiltration of unconsumed irrigation water from fields, lawns, and gardens, (4) seepage from streams and canals, and (5) subsurface inflow from Cedar Valley. Discharge of ground water is simulated by the model to (1

  9. Water resources of Parowan Valley, Iron County, Utah

    Science.gov (United States)

    Marston, Thomas M.

    2017-08-29

    Parowan Valley, in Iron County, Utah, covers about 160 square miles west of the Red Cliffs and includes the towns of Parowan, Paragonah, and Summit. The valley is a structural depression formed by northwest-trending faults and is, essentially, a closed surface-water basin although a small part of the valley at the southwestern end drains into the adjacent Cedar Valley. Groundwater occurs in and has been developed mainly from the unconsolidated basin-fill aquifer. Long-term downward trends in groundwater levels have been documented by the U.S. Geological Survey (USGS) since the mid-1950s. The water resources of Parowan Valley were assessed during 2012 to 2014 with an emphasis on refining the understanding of the groundwater and surface-water systems and updating the groundwater budget.Surface-water discharge of five perennial mountain streams that enter Parowan Valley was measured from 2013 to 2014. The total annual surface-water discharge of the five streams during 2013 to 2014 was about 18,000 acre-feet (acre-ft) compared to the average annual streamflow of about 22,000 acre-ft from USGS streamgages operated on the three largest of these streams from the 1940s to the 1980s. The largest stream, Parowan Creek, contributes more than 50 percent of the annual surface-water discharge to the valley, with smaller amounts contributed by Red, Summit, Little, and Cottonwood Creeks.Average annual recharge to the Parowan Valley groundwater system was estimated to be about 25,000 acre-ft from 1994 to 2013. Nearly all recharge occurs as direct infiltration of snowmelt and rainfall on the Markagunt Plateau east of the valley. Smaller amounts of recharge occur as infiltration of streamflow and unconsumed irrigation water near the east side of the valley on alluvial fans associated with mountain streams at the foot of the Red Cliffs. Subsurface flow from the mountain block to the east of the valley is a significant source of groundwater recharge to the basin-fill aquifer

  10. Selected hydrologic data for Juab Valley, Utah, 1935-94

    Science.gov (United States)

    Steiger, Judy I.

    1995-01-01

    This report contains selected hydrologic data collected in Juab Valley, Utah, from 1935 to 1994. The study area is in eastern Juab County in central Utah. The area is bounded on the east by the Wasatch Range and San Pitch Mountains and on the west by Long Ridge and West Hills. A ground-water divide exists south of Levan Ridge, a topographic divide that separates the valley into northern and southern parts. The area is in the Basin and Range Physiographic Province described by Fenneman (1931) and includes about 171 square miles of basin-fill deposits (pl. 1).Most of the data in this report were collected by the U.S. Geological Survey in cooperation with the Central Utah Water Conservancy District and the East Juab Water Conservancy District. Some of the earlier data were published previously by Bjorklund (1967) and Bjorklund and Robinson (1968). Some well-location names have been changed from those published previously because new larger-scale maps allow location to be plotted more accurately. The changes are footnoted in the tables.The purpose of this report is to provide hydrologic data for use by the general public and by officials managing the water resources of the area and to supplement interpretive reports for the area. Selected well, spring, surface-water, and rock-sample data are reported in tables 1 to 10. Selected data, including well depth and water level, are reported for 283 wells, and results of chemical analyses are reported for samples from 74 wells, 15 springs, and 7 surface-water sites. The numbering system used in Utah for hydrologic data sites is shown in figure 1. Locations of the hydrologic-data sites and the rock-sample site are shown on plate 1. Discharge-measurement sites on Salt Creek, on selected canals, and in the West Creek area are shown in figure 2.These data could not have been collected without the cooperation of local residents and officials of irrigation companies and municipalities that permitted access to their wells, springs

  11. Epidemiology of cognitive aging and Alzheimer's disease: contributions of the cache county utah study of memory, health and aging.

    Science.gov (United States)

    Hayden, Kathleen M; Welsh-Bohmer, Kathleen A

    2012-01-01

    Epidemiological studies of Alzheimer's disease (AD) provide insights into changing public health trends and their contribution to disease incidence. The current chapter considers how the population-based approach has contributed to our understanding of lifetime exposures that contribute to later disease risk and may act to modify onset of symptoms. We focus on the findings from a recent survey of an exceptionally long-lived population, the Cache County Utah Study of Memory, Health, and Aging. This study is confined to a single geographic population has allowed estimation of the genetic and environmental influences on AD expression across the expected human lifespan of 95+ years. Given the emphasis of this text on the behavioral neurosciences of aging, we highlight within the current chapter the particular contributions of this population-based study to the neuropsychology of aging and AD. We also discuss hypotheses generated from this survey with respect to factors that may either accelerate or delay symptom onset in AD and the conditions that appear to be associated with successful cognitive aging.

  12. PROSPECTIVE STUDY OF READY-TO-EAT BREAKFAST CEREAL CONSUMPTION AND COGNITIVE DECLINE AMONG ELDERLY MEN AND WOMEN IN CACHE COUNTY, UTAH, STUDY ON MEMORY, HEALTH, AND AGING

    Science.gov (United States)

    WENGREEN, H.; NELSON, C.; MUNGER, R.G.; CORCORAN, C.

    2013-01-01

    Objective To examine associations between frequency of ready-to-eat-cereal (RTEC) consumption and cognitive function among elderly men and women of the Cache County Study on Memory and Aging in Utah. Design A population-based prospective cohort study established in Cache County, Utah in 1995. Setting and Participants 3831 men and women > 65 years of age who were living in Cache County, Utah in 1995. Measurement Diet was assessed using a 142-item food frequency questionnaire at baseline. Cognitive function was assessed using an adapted version of the Modified Mini-Mental State examination (3MS) at baseline and three subsequent interviews over 11 years. RTEC consumption was defined as daily, weekly, or infrequent use. Results In multivariable models, more frequent RTEC consumption was not associated with a cognitive benefit. Those consuming RTEC weekly but less than daily scored higher on their baseline 3MS than did those consuming RTEC more or less frequently (91.7, 90.6, 90.6, respectively; p-value <0.001). This association was maintained across 11 years of observation such that those consuming RTEC weekly but less than daily declined on average 3.96 points compared to an average 5.13 and 4.57 point decline for those consuming cereal more or less frequently (p-value = 0.0009). Conclusion Those consuming RTEC at least daily had poorer cognitive performance at baseline and over 11 years of follow-up compared to those who consumed cereal more or less frequently. RTEC is a nutrient dense food, but should not replace the consumption of other healthy foods in the diets’ of elderly people. Associations between RTEC consumption, dietary patterns, and cognitive function deserve further study. PMID:21369668

  13. Hydrologic reconnaissance of Deep Creek valley, Tooele and Juab Counties, Utah and Elko and White Pine Counties, Nevada

    Science.gov (United States)

    Hood, James W.; Waddell, K.M.

    1969-01-01

    This report, the fourth in a series by the U. S. Geological Survey in cooperation with the Utah Department of Natural Resources, Division of Water Rights, describes water resources of the western basins of Utah. Its purpose is to present available hydrologic data on Deep Creek valley, to provide an evaluation of the potential water-resource development of the valley, and to identify needed studies that would help provide an understanding of the valley's water supply.

  14. Paired, facing monoclines in the Sanpete-Sevier Valley area, central Utah

    Science.gov (United States)

    Witkind, I.J.

    1992-01-01

    Several major monoclines that trend northward through the Sanpete-Sevier Valley area of central Utah are paired and face one another. This pairing of monoclines may have occurred when near-horizontal sedimentary and volcanic strata subsided into voids created as salt was removed from a salt diapir concealed beneath valley fill. Removal was mostly by dissolution or extrusion during Neogene time. The paired monoclines, thus, are viewed as collapse features rather than as normal synclinal folds. -from Author

  15. Chemical quality of ground water in Salt Lake Valley, Utah, 1969-85

    Science.gov (United States)

    Waddell, K.M.; Seiler, R.L.; Solomon, D.K.

    1987-01-01

    During 1979-84, 35 wells completed in the principal aquifer in the Salt Lake Valley, Utah, that had been sampled during 1962-67 were resampled to determine if water-quality changes had occurred. The dissolved-solids concentration of the water from 13 of the wells has increased by more than 10 percent since 1962-67.

  16. Geology and ground-water resources of Ogden Valley, Utah

    Science.gov (United States)

    Leggette, R.M.; Taylor, G.H.

    1937-01-01

    Ogden Valley is a fault trough bounded on both the east and west by faults that dip toward the middle of the valley. This fault trough contains unconsolidated deposits of clay, sand, and gravel, whose thickness is more than 600 feet. These materials are stream and lake deposits and in places are well sorted and stratified. The lake sediments were laid down in a small lake that occupied Ogden Valley and that was connected with glacial Lake Bonneville at its high stage by an arm of water that occupied Ogden Canyon. During this stage of Lake Bonneville the Ogden Valley was completely filled with lake sediments up to an altitude of about 4,900 feet. These sediments include about 70 feet of clay, sand, and gravel in alternating layers, below which is a bed of varved clay whose maximum thickness is about 70 feet. This clay is continuous under the lower parts of the valley and is the confining bed that produces the artesian conditions. Below the varved clay is a deposit of silt, sand, and gravel of unknown thickness, most of which is believed to be pre-Bonneville alluvium.In most summers the streams entering Ogden Valley are diverted for irrigation, and the upper parts of their channels are generally dry during the irrigation season. Lower down in the valley seepage water appears in the channels, and below these points there is continuous flow. The flow of the Ogden River increases as it passes through Ogden Canyon. This gain in flow is believed to be derived chiefly from ground-water seepage from the canyon walls, although there is probably some groundwater underflow from Ogden Valley at the head of Ogden Canyon. Some of the gain is also due to leakage from pipe lines in the canyon.Of the 146 wells whose records are given in this report, 70 are flowing wells.

  17. Culicoides sonorensis (Diptera: Ceratopogonidae) is not a competent vector of Cache Valley virus (family Bunyaviridae, genus Orthobunyavirus).

    Science.gov (United States)

    Reeves, Will K; Miller, Myrna M

    2013-10-01

    We investigated the susceptibility of Culicoides sonorensis to Cache Valley virus (CVV) (family Bunyaviridae, genus Orthobunyavirus) infection and the potential that it could be a vector or site of virus reassortment. CVV is native to the New World and causes disease in livestock. Infected blood meals were fed to both a competent vector, Anopheles quadrimaculatus, and Culicoides sonorensis. All Anopheles mosquitoes were infected as expected, but only 21 % of the C. sonorensis insects were susceptible to infection. These appeared to present a midgut barrier, because virus persisted but did not disseminate. This means Culicoides sonorensis is not likely to be a vector of CVV but could be involved in viral reassortment. Schmallenberg virus (SBV) (family Bunyaviridae, genus Orthobunyavirus) was recently discovered in Europe and probably is a novel virus resulting from a reassortment of two orthobunyaviruses, and an ongoing epizootic in cattle and small ruminants has caused significant economic damage.

  18. Assessment of watershed vulnerability to climate change for the Uinta-Wasatch-Cache and Ashley National Forests, Utah

    Science.gov (United States)

    Janine Rice; Tim Bardsley; Pete Gomben; Dustin Bambrough; Stacey Weems; Sarah Leahy; Christopher Plunkett; Charles Condrat; Linda A. Joyce

    2017-01-01

    Watersheds on the Uinta-Wasatch-Cache and Ashley National Forests provide many ecosystem services, and climate change poses a risk to these services. We developed a watershed vulnerability assessment to provide scientific information for land managers facing the challenge of managing these watersheds. Literature-based information and expert elicitation is used to...

  19. Hydrology and simulation of ground-water flow in Juab Valley, Juab County, Utah.

    Science.gov (United States)

    Thiros, Susan A.; Stolp, Bernard J.; Hadley, Heidi K.; Steiger, Judy I.

    1996-01-01

    Plans to import water to Juab Valley, Utah, primarily for irrigation, are part of the Central Utah Project. A better understanding of the hydrology of the valley is needed to help manage the water resources and to develop conjunctive-use plans.The saturated unconsolidated basin-fill deposits form the ground-water system in Juab Valley. Recharge is by seepage from streams, unconsumed irrigation water, and distribution systems; infiltration of precipitation; and subsurface inflow from consolidated rocks that surround the valley. Discharge is by wells, springs, seeps, evapotranspiration, and subsurface outflow to consolidated rocks. Ground-water pumpage is used to supplement surface water for irrigation in most of the valley and has altered the direction of groundwater flow from that of pre-ground-water development time in areas near and in Nephi and Levan.Greater-than-average precipitation during 1980-87 corresponds with a rise in water levels measured in most wells in the valley and the highest water level measured in some wells. Less-than average precipitation during 1988-91 corresponds with a decline in water levels measured during 1988-93 in most wells. Geochemical analyses indicate that the sources of dissolved ions in water sampled from the southern part of the valley are the Arapien Shale, evaporite deposits that occur in the unconsolidated basin-fill deposits, and possibly residual sea water that has undergone evaporation in unconsolidated basin-fill deposits in selected areas. Water discharging from a spring at Burriston Ponds is a mixture of about 70 percent ground water from a hypothesized flow path that extends downgradient from where Salt Creek enters Juab Valley and 30 percent from a hypothesized flow path from the base of the southern Wasatch Range.The ground-water system of Juab Valley was simulated by using the U.S. Geological Survey modular, three-dimensional, finite-difference, ground-water flow model. The numerical model was calibrated to simulate

  20. Utah

    Science.gov (United States)

    2002-01-01

    With its myriad of canyons, unusual rock formations and ancient lakebeds, Utah is a geologist's playground. This true-color image of Utah was acquired on June 20, 2000, by the Moderate-resolution Imaging Spectroradiometer (MODIS), flying aboard NASA's Terra spacecraft. The dark aquamarine feature in the northern part of the state is the Great Salt Lake. Fourteen thousand years ago, the Great Salt Lake was part of Lake Bonneville, which covered much of northern and western Utah. The extent of the lakebed can be seen in light tan covering much of northern and western Utah and extending into Idaho. (Click for more details on the history of Lake Bonneville.) Other remnants of Lake Bonneville include the Great Salt Lake Desert (the white expanse to the left of the Great Salt Lake) and Lake Utah (the lake to the south of Salt Lake City). The white color of the Great Salt Lake Desert is due to the mineral deposits left by Lake Bonneville as it drained out into the Snake River and then proceeded to dry up. The dark bands running through the center and northeastern part of the state are the western edge of the Rockies. The dark color is likely due to the coniferous vegetation that grows along the range. The tallest mountains in the Utah Rockies are the Uinta Mountains, which can be seen in the northeastern corner of the state bordering Colorado and Wyoming. The white fishbone pattern in the center of the Uinta Mountains is snow that hadn't yet melted. To the southeast, one can see the reddish-orange rocks of the northernmost section of the Colorado Plateau. Utah's well-known desert attractions, including Arches National Park, Canyonlands National Park, and Glen Canyon, are located in this region. The long, narrow lake is Lake Powell, created after the construction of Glen Canyon Dam in the 1950s. Image courtesy NASA MODIS Science Team

  1. Reconnaissance of the shallow-unconfined aquifer in Salt Lake Valley, Utah

    Science.gov (United States)

    Seiler, R.L.; Waddell, K.M.

    1984-01-01

    The shallow-unconfined aquifer in Salt Lake (Jordan) Valley, Utah, seldom is used for domestic or industrial purposes because it yields water slowly and is readily contaminated. The water in the aquifer, however, can flood basements and is a potential source of contamination to other water supplies. In about one-half of the valley, water in the shallow-unconfined aquifer is less than 10 feet below land surface. The general direction of flow in the shallow aquifer is toward the Jordan River. Water levels in the north part of the valley and along the Jordan River are highest in March or April and in the south part of the valley are highest in late summer. The smallest concentrations of dissolved solids in water from wells along the east side of the valley, and the greatest concentrations are in the northwest part of the valley near the Great Salt Lake. Large dissolved-solids concentrations are found near some landfills and tailings areas. Nitrate-nitrogen concentrations ranged from less than 0.1 to 86 milligrams per liter and nitrate-nitrogen concentrations from less than 0.02 to 0.85 milligram per liter. Some of the largest nitrate-nitrogen concentrations were found in water wells near animal pens. The greatest concentrations of trace elements generally came from wells near landfills and tailings area. The greatest measured concentration of cadmium was 200 microgram per liter, of mercury 0.1 microgram per liter, of lead 46 micrograms per liter, of iron 37,000 micrograms per liter and of arsenic 360 micrograms per liter. Synthetic organic chemicals were found in water from several wells. The greatest measured concentration of benzene was 400 micrograms per liter, of phenol 660 micrograms per liter, of 1,1 dichloroethane 20 micrograms per liter, of tichloroethylene 8 micrograms per liter , and of chloroethylene, 11 micrograms per liter. The greatest concentrations were in water from wells near landfills. (USGS)

  2. Hydrology and simulation of ground-water flow in Kamas Valley, Summit County, Utah

    Science.gov (United States)

    Brooks, L.E.; Stolp, B.J.; Spangler, L.E.

    2003-01-01

    Kamas Valley, Utah, is located about 50 miles east of Salt Lake City and is undergoing residential development. The increasing number of wells and septic systems raised concerns of water managers and prompted this hydrologic study. About 350,000 acre-feet per year of surface water flows through Kamas Valley in the Weber River, Beaver Creek, and Provo River, which originate in the Uinta Mountains east of the study area. The ground-water system in this area consists of water in unconsolidated deposits and consolidated rock; water budgets indicate very little interaction between consolidated rock and unconsolidated deposits. Most recharge to consolidated rock occurs at higher altitudes in the mountains and discharges to streams and springs upgradient of Kamas Valley. About 38,000 acre-feet per year of water flows through the unconsolidated deposits in Kamas Valley. Most recharge is from irrigation and seepage from major streams; most discharge is to Beaver Creek in the middle part of the valley. Long-term water-level fluctuations range from about 3 to 17 feet. Seasonal fluctuations exceed 50 feet. Transmissivity varies over four orders of magnitude in both the unconsolidated deposits and consolidated rock and is typically 1,000 to 10,000 feet squared per day in unconsolidated deposits and 100 feet squared per day in consolidated rock as determined from specific capacity. Water samples collected from wells, streams, and springs had nitrate plus nitrite concentrations (as N) substantially less than 10 mg/L. Total and fecal coliform bacteria were detected in some surface-water samples and probably originate from livestock. Septic systems do not appear to be degrading water quality. A numerical ground-water flow model developed to test the conceptual understanding of the ground-water system adequately simulates water levels and flow in the unconsolidated deposits. Analyses of model fit and sensitivity were used to refine the conceptual and numerical models.

  3. Subsurface geology of a potential waste emplacement site, Salt Valley Anticline, Grand County, Utah

    Science.gov (United States)

    Hite, R.J.

    1977-01-01

    The Salt Valley anticline, which is located about 32 km northeast of Moab, Utah, is perhaps one of the most favorable waste emplacement sites in the Paradox basin. The site, which includes about 7.8 km 2, is highly accessible and is adjacent to a railroad. The anticline is one of a series of northwest-trending salt anticlines lying along the northeast edge of the Paradox basin. These anticlines are cored by evaporites of the Paradox Member of the Hermosa Formation of Middle Pennsylvanian age. The central core of the Salt Valley anticline forms a ridgelike mass of evaporites that has an estimated amplitude of 3,600 m. The evaporite core consists of about 87 percent halite rock, which includes some potash deposits; the remainder is black shale, silty dolomite, and anhydrite. The latter three lithologies are referred to as 'marker beds.' Using geophysical logs from drill holes on the anticline, it is possible to demonstrate that the marker beds are complexly folded and faulted. Available data concerning the geothermal gradient and heatflow at the site indicate that heat from emplaced wastes should be rapidly dissipated. Potentially exploitable resources of potash and petroleum are present at Salt Valley. Development of these resources may conflict with use of the site for waste emplacement.

  4. Lateral spread hazard mapping of the northern Salt Lake Valley, Utah, for a M7.0 scenario earthquake

    Science.gov (United States)

    Olsen, M.J.; Bartlett, S.F.; Solomon, B.J.

    2007-01-01

    This paper describes the methodology used to develop a lateral spread-displacement hazard map for northern Salt Lake Valley, Utah, using a scenario M7.0 earthquake occurring on the Salt Lake City segment of the Wasatch fault. The mapping effort is supported by a substantial amount of geotechnical, geologic, and topographic data compiled for the Salt Lake Valley, Utah. ArcGIS?? routines created for the mapping project then input this information to perform site-specific lateral spread analyses using methods developed by Bartlett and Youd (1992) and Youd et al. (2002) at individual borehole locations. The distributions of predicted lateral spread displacements from the boreholes located spatially within a geologic unit were subsequently used to map the hazard for that particular unit. The mapped displacement zones consist of low hazard (0-0.1 m), moderate hazard (0.1-0.3 m), high hazard (0.3-1.0 m), and very high hazard (> 1.0 m). As expected, the produced map shows the highest hazard in the alluvial deposits at the center of the valley and in sandy deposits close to the fault. This mapping effort is currently being applied to the southern part of the Salt Lake Valley, Utah, and probabilistic maps are being developed for the entire valley. ?? 2007, Earthquake Engineering Research Institute.

  5. Reconnaissance of the chemical quality of water in western Utah, Part I: Sink Valley area, drainage basins of Skull, Rush, and Government Creek Valleys, and the Dugway Valley-Old River Bed area

    Science.gov (United States)

    Waddell, K.M.

    1967-01-01

    This report presents data collected during the first part of an investigation that was started in 1963 by the U.S. Geological Survey in cooperation with the Utah Geological and Mineralogical Survey. The investigation has the purpose of providing information about the chemical quality of water in western Utah that will help interested parties to evaluate the suitability of the water for various uses in a broad area of Utah where little information of this type previously has been available. The area studied includes the Sink Valley area, the drainage basins of Skull, Rush, and Government Creek Valleys, and the Dugway Valley-Old River Bed area (fig. 1). Osamu Hattori and G. L. Hewitt started the investigation, and the author completed it and prepared the report.

  6. Convergence in nitrogen deposition and cryptic isotopic variation across urban and agricultural valleys in northern Utah

    Science.gov (United States)

    Hall, S. J.; Ogata, E. M.; Weintraub, S. R.; Baker, M. A.; Ehleringer, J. R.; Czimczik, C. I.; Bowling, D. R.

    2016-09-01

    The extent to which atmospheric nitrogen (N) deposition reflects land use differences and biogenic versus fossil fuel reactive N sources remains unclear yet represents a critical uncertainty in ecosystem N budgets. We compared N concentrations and isotopes in precipitation-event bulk (wet + dry) deposition across nearby valleys in northern Utah with contrasting land use (highly urban versus intensive agriculture/low-density urban). We predicted greater nitrate (NO3-) versus ammonium (NH4+) and higher δ15N of NO3- and NH4+ in urban valley sites. Contrary to expectations, annual N deposition (3.5-5.1 kg N ha-1 yr-1) and inorganic N concentrations were similar within and between valleys. Significant summertime decreases in δ15N of NO3- possibly reflected increasing biogenic emissions in the agricultural valley. Organic N was a relatively minor component of deposition ( 13%). Nearby paired wildland sites had similar bulk deposition N concentrations as the urban and agricultural sites. Weighted bulk deposition δ15N was similar to natural ecosystems (-0.6 ± 0.7‰). Fine atmospheric particulate matter (PM2.5) had consistently high values of bulk δ15N (15.6 ± 1.4‰), δ15N in NH4+ (22.5 ± 1.6‰), and NO3- (8.8 ± 0.7‰), consistent with equilibrium fractionation with gaseous species. The δ15N in bulk deposition NH4+ varied by more than 40‰, and spatial variation in δ15N within storms exceeded 10‰. Sporadically high values of δ15N were thus consistent with increased particulate N contributions as well as potential N source variation. Despite large differences in reactive N sources, urban and agricultural landscapes are not always strongly reflected in the composition and fluxes of local N deposition—an important consideration for regional-scale ecosystem models.

  7. Geology of the north end of the Salt Valley Anticline, Grand County, Utah

    Science.gov (United States)

    Gard, Leonard Meade

    1976-01-01

    This report describes the geology and hydrology of a portion of the Salt Valley anticline lying north of Moab, Utah, that is being studied as a potential site for underground storage of nuclear waste in salt. Selection of this area was based on recommendations made in an earlier appraisal of the potential of Paradox basin salt deposits for such use. Part of sec. 5, T. 23 S., R. 20 E. has been selected as a site for subsurface investigation as a potential repository for radioactive waste. This site has easy access to transportation, is on public land, is isolated from human habitation, is not visible from Arches National Park, and the salt body lies within about 800 feet (244 m) of the surface. Further exploration should include investigation of possible ground water in the caprock and physical exploration of the salt body to identify a thick bed of salt for use as a storage zone that can be isolated from the shaly interbeds that possibly contain quantities of hydrocarbons. Salt Valley anticline, a northwest-trending diapiric structure, consists of Mesozoic sedimentary rocks arched over a thick core of salt of the Paradox Member of the Middle Pennsylvanian Hermosa Formation. Salt began to migrate to form and/or develop this structure shortly after it was deposited, probably in response to faulting. This migration caused upwelling of the salt creating a linear positive area. This positive area, in turn, caused increased deposition of sediments in adjacent areas which further enhanced salt migration. Not until late Jurassic time had flowage of the salt slowed sufficiently to allow sediments of the Morrison and younger formations to be deposited across the salt welt. A thick cap of insoluble residue was formed on top of the salt diapir as a result of salt dissolution through time. The crest of the anticline is breached; it collapsed in two stages during the Tertiary Period. The first stage was graben collapse during the early Tertiary; the second stage occurred after

  8. Geology and geomorphology of Bear Lake Valley and upper Bear River, Utah and Idaho

    Science.gov (United States)

    Reheis, M.C.; Laabs, B.J.C.; Kaufman, D.S.

    2009-01-01

    Bear Lake, on the Idaho-Utah border, lies in a fault-bounded valley through which the Bear River flows en route to the Great Salt Lake. Surficial deposits in the Bear Lake drainage basin provide a geologic context for interpretation of cores from Bear Lake deposits. In addition to groundwater discharge, Bear Lake received water and sediment from its own small drainage basin and sometimes from the Bear River and its glaciated headwaters. The lake basin interacts with the river in complex ways that are modulated by climatically induced lake-level changes, by the distribution of active Quaternary faults, and by the migration of the river across its fluvial fan north of the present lake. The upper Bear River flows northward for ???150 km from its headwaters in the northwestern Uinta Mountains, generally following the strike of regional Laramide and late Cenozoic structures. These structures likely also control the flow paths of groundwater that feeds Bear Lake, and groundwater-fed streams are the largest source of water when the lake is isolated from the Bear River. The present configuration of the Bear River with respect to Bear Lake Valley may not have been established until the late Pliocene. The absence of Uinta Range-derived quartzites in fluvial gravel on the crest of the Bear Lake Plateau east of Bear Lake suggests that the present headwaters were not part of the drainage basin in the late Tertiary. Newly mapped glacial deposits in the Bear River Range west of Bear Lake indicate several advances of valley glaciers that were probably coeval with glaciations in the Uinta Mountains. Much of the meltwater from these glaciers may have reached Bear Lake via groundwater pathways through infiltration in the karst terrain of the Bear River Range. At times during the Pleistocene, the Bear River flowed into Bear Lake and water level rose to the valley threshold at Nounan narrows. This threshold has been modified by aggradation, downcutting, and tectonics. Maximum lake

  9. Hydrology and geochemistry of carbonate springs in Mantua Valley, northern Utah

    Science.gov (United States)

    Rice, Karen C.; Spangler, Lawrence E.; Spangler, Lawrence E.; Allen, Constance J.

    1999-01-01

    Water chemistry, tritium data, precipitation-discharge relations, geology, topography, and dye tracing were used to determine recharge areas, ground-water residence times, factors influencing ground-water flow, and aquifer characteristic for five springs that discharge from Paleozoic limestones and dolostones along the margin of Manuta Valley, northern Utah.Temperature of Mantua Valley spring water ranged between 6.0 and 15.0 degrees Celsius. Spring-water temperature indicates that depth of circulation of ground water could be as shallow as 80 feet (25 meters) to as much as 1,150 feet (350 meters). Dissolved-solids concentration in the water from springs ranged from 176 to 268 milligrams per liter. Average total hardness of spring water ranged from 157 to 211 milligrams per liter. Water from all of the springs is a calcium-magnesium-bicarbonate type that generally is undersaturated with respect to calcite and dolomite. The molar calcium/magnesium ratio in spring water ranged from 1.21 to 1.88, and indicates that ground water flows through impure dolostone or a mixed limestone and dolostone terrace.Discharge from carbonate springs in Mantua Valley ranges from about to 10 to 4,300 gallons per minute (0.6 to 271 liters per second). Seasonal variations in chemical parameters and discharge indicate that the aquifers supplying water to most of these springs are predominantly diffuse-flow systems that have been locally enhanced by bedrock dissolution. Estimated recharge area for th springs ranges from 2.7 to 7 square miles (7 to 18 square kilometers).On the basis of tritium age dating, the mean residence time of ground water discharges from Olsens-West Hallins and Maple Springs was determined to be from 3 to 9, and from 4 to 15 years, respectively. Dye tracing from point sources 2.65 miles (4.26 kilometers) southeast of Maple Spring, however, indicates a substantially faster component of flow during snowmelt runoff, with a travel time of about 5 days, or an average ground

  10. Guide to user modification of a three-dimensional digital ground-water model for Salt Lake Valley, Utah

    Science.gov (United States)

    Seiler, R.L.; Waddell, K.M.

    1986-01-01

    A digital-computer model was calibrated to simulate, in three dimensions, the ground-water flow in the principal and shallow-unconfined aquifers in Salt Lake Valley, Utah. The model can be used to predict water-level and waterbudget changes that would be caused by changes in well recharge or discharge. This report shows how a user can revise the input data so that recharging or discharging wells may be simulated and how stress-period intervals can be varied to simulate different periods of recharge or discharge.

  11. Web Caching

    Indian Academy of Sciences (India)

    E-commerce and security. The World Wide Web has been growing in leaps and bounds. Studies have indicated that this massive distributed system can benefit greatly by making use of appropriate caching methods. Intelligent Web caching can lessen the burden on. Web servers, improves its performance and at the same ...

  12. Web Caching

    Indian Academy of Sciences (India)

    Home; Journals; Resonance – Journal of Science Education; Volume 7; Issue 7. Web Caching - A Technique to Speedup Access to Web Contents. Harsha Srinath Shiva Shankar Ramanna. General Article Volume 7 Issue 7 July 2002 pp 54-62 ... Keywords. World wide web; data caching; internet traffic; web page access.

  13. Processor Cache

    NARCIS (Netherlands)

    P.A. Boncz (Peter); L. Liu (Lei); M. Tamer Özsu

    2008-01-01

    htmlabstractTo hide the high latencies of DRAM access, modern computer architecture now features a memory hierarchy that besides DRAM also includes SRAM cache memories, typically located on the CPU chip. Memory access first check these caches, which takes only a few cycles. Only if the needed data

  14. A Comparison of Four-Step Model and Path Flow Estimator for Forecasting Network Flow: A Case Study of Cache County in Utah

    OpenAIRE

    Pedaballi, Siddareddy B.

    2006-01-01

    Development of alternative methodologies for travel demand modeling has become important in recent years due to the lack of resources for small and medium communities to adopt conventional four step travel models. Many researchers have proposed alternative tools of travel demand modeling for these communities. But majority of them still require large amount of data and technical sophistication. In this study, the Path Flow Estimator (PFE) is used to estimate the network traffic of Cache Co...

  15. Population dynamics, movement and home range of black-tailed jackrabbits (Lepus californicus) in Curlew Valley, northern Utah. Final report

    Energy Technology Data Exchange (ETDEWEB)

    Stoddart, L.C.

    1978-12-01

    The long-term objective of the jackrabbit study in Curlew Valley, Utah and on the Idaho National Engineering Laboratory was to describe observed changes in rabbit density in terms of mortality and natality rates and to relate changes in these two population parameters to variation in environmental factors. Fall rabbit density in Curlew Valley has been observed to change by a factor of 17; changes appear to be largely determined by variation in mortality rates, as shown with K-factor analysis. Mortality of the population from fall--spring is correlated with the coyote/rabbit ratio. Spring--fall adult mortality and birth-fall loss of juveniles are correlated with coyote numbers. Coyote numbers in the relationships are modified to reflect variation in coyote feeding behavior with changes in rabbit and rodent numbers as indicated by coyote food habits studies in Curlew Valley. Coyote predation rates have varied markedly between years as a result of functional and numerical responses in the coyote population. Proposed coyote predation models, which account for the entire observed jackrabbit cycle, are consistent with existing predation theory.

  16. Libraries in Utah: MedlinePlus

    Science.gov (United States)

    ... this page: https://medlineplus.gov/libraries/utah.html Libraries in Utah To use the sharing features on ... please enable JavaScript. Provo Utah Valley Hospital Medical Library ILL 1134 North 500 West Provo, UT 84604- ...

  17. Role of Anopheles quadrimaculatus and Coquillettidia perturbans (Diptera: Culicidae) in the transmission cycle of Cache Valley virus (Bunyaviridae: Bunyavirus) in the midwest, USA.

    Science.gov (United States)

    Blackmore, C G; Blackmore, M S; Grimstad, P R

    1998-09-01

    Midwestern populations of Coquillettidia perturbans (Walker) and Anopheles quadrimaculatus (Say) were tested for their ability to transmit Cache Valley virus (CV), a recognized human and animal pathogen. Field-collected mosquitoes were fed artificial blood meals containing 5.2-6.2 log10 pfu/ml of CV. After 9-23 d at 28 degrees C, 75-93% of blood-fed Cq. perturbans had disseminated infections and 6-62% transmitted the virus to suckling mice. However, when infected with a lower virus titer (3.3 log10 pfu/ml), only 10-36% of the mosquitoes had disseminated infections and 0-10% transmitted the virus to suckling mice. A similar infection rate (21%) was observed in Cq. perturbans fed on viremic (3.2 log10 pfu/ml) hamsters. An. quadrimaculatus were infected (81-100%) by both doses used, with transmission rates ranging from 13-67% after 16-23 d of incubation. Transmission rates for the laboratory strain An. quadrimaculatus SAVANNAH ranged from 20 to 33% after 7-14 d of incubation. Our data show that although An. quadrimaculatus is more susceptible to CV infections than Cq. perturbans, both mosquito species could be involved in the midwestern transmission cycle of the virus.

  18. Field Surveys, IOC Valleys. Volume II, Part II. Biological Resources Survey, Pine and Wah Wah Valleys, Utah.

    Science.gov (United States)

    1981-08-01

    galleta grass (Hilaria jamesii), is found in large areas of Wah Wah Valley. Winterfat (Ceratoides lanata) is often found in pure stands within the...America. Domestic livestock eating green Salsola are subject to scours (Hitchcock et al., 1964). Blackbrush (Coleogyne ramosissima) and galleta grass...glabrata The galleta grass (Hilaria spp.)/three-awn grass (Aristida spp.) community is considered by Conquist (1972) to belong to the sagebrush zone

  19. High-resolution seismic profiling reveals faulting associated with the 1934 Ms 6.6 Hansel Valley earthquake (Utah, USA)

    Science.gov (United States)

    Bruno, Pier Paolo G.; Duross, Christopher; Kokkalas, Sotirios

    2017-01-01

    The 1934 Ms 6.6 Hansel Valley, Utah, earthquake produced an 8-km-long by 3-km-wide zone of north-south−trending surface deformation in an extensional basin within the easternmost Basin and Range Province. Less than 0.5 m of purely vertical displacement was measured at the surface, although seismologic data suggest mostly strike-slip faulting at depth. Characterization of the origin and kinematics of faulting in the Hansel Valley earthquake is important to understand how complex fault ruptures accommodate regions of continental extension and transtension. Here, we address three questions: (1) How does the 1934 surface rupture compare with faults in the subsurface? (2) Are the 1934 fault scarps tectonic or secondary features? (3) Did the 1934 earthquake have components of both strike-slip and dip-slip motion? To address these questions, we acquired a 6.6-km-long, high-resolution seismic profile across Hansel Valley, including the 1934 ruptures. We observed numerous east- and west-dipping normal faults that dip 40°−70° and offset late Quaternary strata from within a few tens of meters of the surface down to a depth of ∼1 km. Spatial correspondence between the 1934 surface ruptures and subsurface faults suggests that ruptures associated with the earthquake are of tectonic origin. Our data clearly show complex basin faulting that is most consistent with transtensional tectonics. Although the kinematics of the 1934 earthquake remain underconstrained, we interpret the disagreement between surface (normal) and subsurface (strike-slip) kinematics as due to slip partitioning during fault propagation and to the effect of preexisting structural complexities. We infer that the 1934 earthquake occurred along an ∼3-km wide, off-fault damage zone characterized by distributed deformation along small-displacement faults that may be alternatively activated during different earthquake episodes.

  20. Quality and sources of ground water used for public supply in Salt Lake Valley, Salt Lake County, Utah, 2001

    Science.gov (United States)

    Thiros, Susan A.; Manning, Andrew H.

    2004-01-01

    Ground water supplies about one-third of the water used by the public in Salt Lake Valley, Utah. The occurrence and distribution of natural and anthropogenic compounds in ground water used for public supply in the valley were evaluated. Water samples were collected from 31 public-supply wells in 2001 and analyzed for major ions, trace elements, radon, nutrients, dissolved organic carbon, methylene blue active substances, pesticides, and volatile organic compounds. The samples also were analyzed for the stable isotopes of water (oxygen-18 and deuterium), tritium, chlorofluorocarbons, and dissolved gases to determine recharge sources and ground-water age.Dissolved-solids concentration ranged from 157 to 1,280 milligrams per liter (mg/L) in water from the 31 public-supply wells. Comparison of dissolved-solids concentration of water sampled from the principal aquifer during 1988-92 and 1998-2002 shows a reduction in the area where water with less than 500 mg/L occurs. Nitrate concentration in water sampled from 12 of the 31 public-supply wells was higher than an estimated background level of 2 mg/L, indicating a possible human influence. At least one pesticide or pesticide degradation product was detected at a concentration much lower than drinking-water standards in water from 13 of the 31 wells sampled. Chloroform was the most frequently detected volatile organic compound (17 of 31 samples). Its widespread occurrence in deeper ground water is likely a result of the recharge of chlorinated public-supply water used to irrigate lawns and gardens in residential areas of Salt Lake Valley.Environmental tracers were used to determine the sources of recharge to the principal aquifer used for public supply in the valley. Oxygen-18 values and recharge temperatures computed from dissolved noble gases in the ground water were used to differentiate between mountain and valley recharge. Maximum recharge temperatures in the eastern part of the valley generally are below the range

  1. 75 FR 70024 - Notice of Expansion of the Lisbon Valley Known Potash Leasing Area, Utah

    Science.gov (United States)

    2010-11-16

    ... extract deep potash deposits using dissolution. Based on this new technology, the BLM approved new mineral... available drilling information to determine that the Lisbon Valley KPLA should be expanded to include deep... the following Web site: http://www.blm.gov/ut/st/en/prog/more/Land_Records.html . The lands included...

  2. Hydrogeologic and geochemical characterization of groundwater resources in Rush Valley, Tooele County, Utah

    Science.gov (United States)

    Gardner, Philip M.; Kirby, Stefan

    2011-01-01

    The water resources of Rush Valley were assessed during 2008–2010 with an emphasis on refining the understanding of the groundwater-flow system and updating the groundwater budget. Surface-water resources within Rush Valley are limited and are generally used for agriculture. Groundwater is the principal water source for most other uses including supplementing irrigation. Most groundwater withdrawal in Rush Valley is from the unconsolidated basin-fill aquifer where conditions are generally unconfined near the mountain front and confined at lower altitudes near the valley center. Productive aquifers also occur in fractured bedrock along the valley margins and beneath the basin-fill deposits in some areas.Drillers’ logs and geophysical gravity data were compiled and used to delineate seven hydrogeologic units important to basin-wide groundwater movement. The principal basin-fill aquifer includes the unconsolidated Quaternary-age alluvial and lacustrine deposits of (1) the upper basin-fill aquifer unit (UBFAU) and the consolidated and semiconsolidated Tertiary-age lacustrine and alluvial deposits of (2) the lower basin-fill aquifer unit (LBFAU). Bedrock hydrogeologic units include (3) the Tertiary-age volcanic unit (VU), (4) the Pennsylvanian- to Permian-age upper carbonate aquifer unit (UCAU), (5) the upper Mississippian- to lower Pennsylvanian-age upper siliciclastic confining unit (USCU), (6) the Middle Cambrian- to Mississippian-age lower carbonate aquifer unit (LCAU), and (7) the Precambrian- to Lower Cambrian-age noncarbonate confining unit (NCCU). Most productive bedrock wells in the Rush Valley groundwater basin are in the UCAU.Average annual recharge to the Rush Valley groundwater basin is estimated to be about 39,000 acre-feet. Nearly all recharge occurs as direct infiltration of snowmelt and rainfall within the mountains with smaller amounts occurring as infiltration of streamflow and unconsumed irrigation water at or near the mountain front. Groundwater

  3. MX Siting Investigation. Mineral Resources Survey, Seven Additional Valleys, Nevada/Utah Siting Area. Volume I.

    Science.gov (United States)

    1981-06-23

    DIVIDE DISTRICT WITH MONTEZUMA VAL LEY IN THE CENTER BACKGROUND. B - VIEW W - OLD CHERRY CREEK MILL WITH NEW HEAP LEACH PADS UNDER CONSTRUCTION MX...LEFT), AND OLD GOLD PITS (LOWER-CENTER). B - VIEWW CYPRUS VINE’S LEACH PADS AND MILL FACILITIES IN BIG SMOKY VALLEY. ! MX SITING INVESTIGATION ! ErUC...potential is also assigned to most of the Pinto District where Diamond Silverado, Inc. is mining silver and has a heap leach mill operating (Photograph 11B

  4. Spatial-Temporal Analysis of Cache Valley Virus (Bunyaviridae: Orthobunyavirus) Infection in Anopheline and Culicine Mosquitoes (Diptera: Culicidae) in the Northeastern United States, 1997–2012

    Science.gov (United States)

    Armstrong, Philip M.; Anderson, John F.; Main, Andrew J.

    2014-01-01

    Abstract Cache Valley virus (CVV) is a mosquito-borne bunyavirus (family Bunyaviridae, genus Orthobunyavirus) that is enzootic throughout much of North and Central America. White-tailed deer (Odocoileus virginianus) have been incriminated as important reservoir and amplification hosts. CVV has been found in a diverse array of mosquito species, but the principal vectors are unknown. A 16-year study was undertaken to identify the primary mosquito vectors in Connecticut, quantify seasonal prevalence rates of infection, and define the spatial geographic distribution of CVV in the state as a function of land use and white-tailed deer populations, which have increased substantially over this period. CVV was isolated from 16 mosquito species in seven genera, almost all of which were multivoltine and mammalophilic. Anopheles (An.) punctipennis was incriminated as the most consistent and likely vector in this region on the basis of yearly isolation frequencies and the spatial geographic distribution of infected mosquitoes. Other species exhibiting frequent temporal and moderate spatial geographic patterns of virus isolation within the state included Ochlerotatus (Oc.) trivittatus, Oc. canadensis, Aedes (Ae.) vexans, and Ae. cinereus. New isolation records for CVV were established for An. walkeri, Culiseta melanura, and Oc. cantator. Other species from which CVV was isolated included An. quadrimaculatus, Coquillettidia perturbans, Culex salinarius, Oc. japonicus, Oc. sollicitans, Oc. taeniorhynchus, Oc. triseriatus, and Psorophora ferox. Mosquitoes infected with CVV were equally distributed throughout urban, suburban, and rural locales, and infection rates were not directly associated with the localized abundance of white-tailed deer, possibly due to their saturation throughout the region. Virus activity in mosquitoes was episodic with no consistent pattern from year-to-year, and fluctuations in yearly seasonal infection rates did not appear to be directly impacted by

  5. Spatial-temporal analysis of Cache Valley virus (Bunyaviridae: Orthobunyavirus) infection in anopheline and culicine mosquitoes (Diptera: Culicidae) in the northeastern United States, 1997-2012.

    Science.gov (United States)

    Andreadis, Theodore G; Armstrong, Philip M; Anderson, John F; Main, Andrew J

    2014-10-01

    Cache Valley virus (CVV) is a mosquito-borne bunyavirus (family Bunyaviridae, genus Orthobunyavirus) that is enzootic throughout much of North and Central America. White-tailed deer (Odocoileus virginianus) have been incriminated as important reservoir and amplification hosts. CVV has been found in a diverse array of mosquito species, but the principal vectors are unknown. A 16-year study was undertaken to identify the primary mosquito vectors in Connecticut, quantify seasonal prevalence rates of infection, and define the spatial geographic distribution of CVV in the state as a function of land use and white-tailed deer populations, which have increased substantially over this period. CVV was isolated from 16 mosquito species in seven genera, almost all of which were multivoltine and mammalophilic. Anopheles (An.) punctipennis was incriminated as the most consistent and likely vector in this region on the basis of yearly isolation frequencies and the spatial geographic distribution of infected mosquitoes. Other species exhibiting frequent temporal and moderate spatial geographic patterns of virus isolation within the state included Ochlerotatus (Oc.) trivittatus, Oc. canadensis, Aedes (Ae.) vexans, and Ae. cinereus. New isolation records for CVV were established for An. walkeri, Culiseta melanura, and Oc. cantator. Other species from which CVV was isolated included An. quadrimaculatus, Coquillettidia perturbans, Culex salinarius, Oc. japonicus, Oc. sollicitans, Oc. taeniorhynchus, Oc. triseriatus, and Psorophora ferox. Mosquitoes infected with CVV were equally distributed throughout urban, suburban, and rural locales, and infection rates were not directly associated with the localized abundance of white-tailed deer, possibly due to their saturation throughout the region. Virus activity in mosquitoes was episodic with no consistent pattern from year-to-year, and fluctuations in yearly seasonal infection rates did not appear to be directly impacted by overall

  6. Utah Valley University Field Station at Capitol Reef National Park: A Venue for Improved Student Learning and Retention

    Science.gov (United States)

    Nielsen, K.; Schultz, M.; Williams, B.; Gay, J.; Johnson, S.; Dunn, P.

    2015-12-01

    The unique geo-environment offered in Capitol Reef National Park and its surrounding areas has a long-standing history of inspiring geological scientific exploration. The Capitol Reef Field Station was established in 2008 as part of collaboration between the National Park and Utah Valley University in order to support teaching and research of the natural environment found within the park and on the Colorado Plateau. The facility itself situated deep within the park, well off any public road system offers state of the art alternative energy and sustainable construction and makes extensive use of passive heating and cooling, in order to maintain its status of being "off-grid." The field station is a 6200 square foot complex of classrooms and dormitories supporting university level education and field studies of the Colorado Plateau. The complex includes a classroom and dining area, professional kitchen, and two separate dormitories, which can sleep up to 24 overnight visitors, while the daytime usage can accommodate up to 40 visitors. The vision of the facility is to support teaching and research toward responsible, respectful, and sustainable stewardship of the natural world - including Interdisciplinary learning between arts and sciences Student internships and service learning in collaboration with the National Park Service Field-based scientific research (as well as inventorying and assessing Park ecosystems changes) Field training in scientific research Collaboration between National Park Service scientists and local, regional, and national institutions The park is situated at 38°N 249°E at elevations greater than 2000 m in Southern Utah. In contrast to the more famous neighboring sister parks such as Zion and Bryce Canyon National Parks, which are in relatively close proximity to large road systems and cities, Capitol Reef offers what is believed to be the darkest night sky in the US. The culmination of features creates an ideal location for studies of the

  7. Stack Caching Using Split Data Caches

    DEFF Research Database (Denmark)

    Nielsen, Carsten; Schoeberl, Martin

    2015-01-01

    In most embedded and general purpose architectures, stack data and non-stack data is cached together, meaning that writing to or loading from the stack may expel non-stack data from the data cache. Manipulation of the stack has a different memory access pattern than that of non-stack data, showing...... higher temporal and spatial locality. We propose caching stack and non-stack data separately and develop four different stack caches that allow this separation without requiring compiler support. These are the simple, window, and prefilling with and without tag stack caches. The performance of the stack...... cache architectures was evaluated using the Simple Scalar toolset where the window and prefilling stack cache without tag resulted in an execution speedup of up to 3.5% for the MiBench benchmarks, executed on an out-of-order processor with the ARM instruction set....

  8. Low-temperature geothermal assessment of the Santa Clara and Virgin River Valleys, Washington County, Utah

    Energy Technology Data Exchange (ETDEWEB)

    Budding, K.E.; Sommer, S.N.

    1986-01-01

    Exploration techniques included the following: (1) a temperature survey of springs, (2) chemical analyses and calculated geothermometer temperatures of water samples collected from selected springs and wells, (3) chemical analyses and calculated geothermometer temperatures of spring and well water samples in the literature, (4) thermal gradients measured in accessible wells, and (5) geology. The highest water temperature recorded in the St. George basin is 42/sup 0/C at Pah Tempe Hot Springs. Additional spring temperatures higher than 20/sup 0/C are at Veyo Hot Spring, Washington hot pot, and Green Spring. The warmest well water in the study area is 40/sup 0/C in Middleton Wash. Additional warm well water (higher than 24.5/sup 0/C) is present north of St. George, north of Washington, southeast of St. George, and in Dameron Valley. The majority of the Na-K-Ca calculated reservoir temperatures range between 30/sup 0/ and 50/sup 0/C. Anomalous geothermometer temperatures were calculated for water from Pah Tempe and a number of locations in St. George and vicinity. In addition to the known thermal areas of Pah Tempe and Veyo Hot Spring, an area north of Washington and St. George is delineated in this study to have possible low-temperature geothermal potential.

  9. Thermal Water of Utah Topical Report

    Energy Technology Data Exchange (ETDEWEB)

    Goode, Harry D.

    1978-11-01

    Western and central Utah has 16 areas whose wells or springs yield hot water (35 C or higher), warm water (20-34.5 C), and slightly warm water (15.5-19.5 C). These areas and the highest recorded water temperature for each are: Lower Bear River Area, 105 C; Bonneville Salt Flats, 88 C; Cove Fort-Sulphurdale, 77 C; Curlew Valley, 43 C; East Shore Area, 60 C; Escalante Desert, 149 C; Escalante Valley (Roosevelt, 269 C, and Thermo, 85C); Fish Springs, 60.5 C; Grouse Creek Valley, 42 C; Heber Valley (Midway, 45 C); Jordan Valley, 58.5 C; Pavant Valley-Black Rock Desert, 67 C; Sevier Desert ( Abraham-Crater Hot Springs, 82 C); Sevier Valley (Monroe-Red Hill, 76.5 C, and Joseph Hot Spring, 64 C); Utah Valley, 46 C; and Central Virgin River Basin, 42 C. The only hot water in eastern Utah comes from the oil wells of the Ashley Valley Oil Field, which in 1977 yielded 4400 acre-feet of water at 43 C to 55 C. Many other areas yield warm water (20 to 34.5 C) and slightly warm water (15.5 to 19.5 C). With the possible exception of the Roosevelt KGRA, Crater Hot Springs in the Sevier Desert, Escalante Desert, Pavant-Black Rock, Cove Fort-Sulphurdale, and Coyote Spring in Curlew Valley, which may derive their heat from buried igneous bodies, the heat that warms the thermal water is derived from the geothermal gradient. Meteoric water circulates through fractures or permeable rocks deep within the earth, where it is warmed; it then rises by convection or artesian pressure and issues at the surface as springs or is tapped by wells. Most thermal springs thus rise along faults, but some thermal water is trapped in confined aquifers so that it spreads laterally as it mixes with and warms cooler near-surface water. This spreading of thermal waters is evident in Cache Valley, in Jordan Valley, and in southern Utah Valley; likely the spreading occurs in many other artesian basins where it has not yet been recognized. In the East Shore Area thermal water trapped in confined aquifers warms

  10. Decadal-scale changes in dissolved-solids concentrations in groundwater used for public supply, Salt Lake Valley, Utah

    Science.gov (United States)

    Thiros, Susan A.; Spangler, Larry

    2010-01-01

    Basin-fill aquifers are a major source of good-quality water for public supply in many areas of the southwestern United States and have undergone increasing development as populations have grown over time. During 2005, the basin-fill aquifer in Salt Lake Valley, Utah, provided approximately 75,000 acre-feet, or about 29 percent of the total amount of water used by a population of 967,000. Groundwater in the unconsolidated basin-fill deposits that make up the aquifer occurs under unconfined and confined conditions. Water in the shallow unconfined part of the groundwater system is susceptible to near-surface contamination and generally is not used as a source of drinking water. Groundwater for public supply is withdrawn from the deeper unconfined and confined parts of the system, termed the principal aquifer, because yields generally are greater and water quality is better (including lower dissolved-solids concentrations) than in the shallower parts of the system. Much of the water in the principal aquifer is derived from recharge in the adjacent Wasatch Range (mountain-block recharge). In many areas, the principal aquifer is separated from the overlying shallow aquifer by confining layers of less permeable, fine-grained sediment that inhibit the downward movement of water and any potential contaminants from the surface. Nonetheless, under certain hydrologic conditions, human-related activities can increase dissolved-solids concentrations in the principal aquifer and result in groundwater becoming unsuitable for consumption without treatment or mixing with water having lower dissolved-solids concentrations. Dissolved-solids concentrations in areas of the principal aquifer used for public supply typically are less than 500 milligrams per liter (mg/L), the U.S. Environmental Protection Agency (EPA) secondary (nonenforceable) drinking-water standard. However, substantial increases in dissolved-solids concentrations in the principal aquifer have been documented in some

  11. Carbon Isotope Ratios Of Carbon Dioxide In The Urban Salt Lake Valley, Utah USA: Source And Long-Term Monitoring Observations

    Science.gov (United States)

    Ehleringer, J.; Lai, C.; Strong, C.; Pataki, D. E.; Bowling, D. R.; Schauer, A. J.; Bush, S.

    2011-12-01

    A high-precision, decadal record of carbon isotope ratios in atmospheric carbon dioxide has been produced for the urbanized Salt Lake Valley, Utah USA. These data complement a similar time series of atmospheric carbon dioxide concentrations for different locations in the same urban region. This isotopic record includes diurnal and nocturnal observations based on flask (IRMS-based) and continuous (TDL-based) measurement systems. These data reveal repeatable diurnal and seasonal variations in the anthropogenic and biogenic carbon sources that can be used to reconstruct different source inputs. As the Salt Lake Valley is an isolated urban region, the impacts of local anthropogenic inputs can be distinguished from regional patterns as measured by NOAA at the rural Wendover monitoring station 200 km to the west of the Salt Lake Valley. Complementary data, such as vehicle exhaust, emission from power plants and household furnaces, plant and soil organic matter, are also provided to quantify the carbon isotope ratios of the predominant anthropogenic and biogenic sources within the Salt Lake Valley. The combined source and long-term observational values will be made freely available and their utility is discussed for modeling efforts including urban metabolism modeling and atmospheric trace gas modeling.

  12. Caching Servers for ATLAS

    CERN Document Server

    Gardner, Robert; The ATLAS collaboration

    2017-01-01

    As many LHC Tier-3 and some Tier-2 centers look toward streamlining operations, they are considering autonomously managed storage elements as part of the solution. These storage elements are essentially file caching servers. They can operate as whole file or data block level caches. Several implementations exist. In this paper we explore using XRootD caching servers that can operate in either mode. They can also operate autonomously (i.e. demand driven), be centrally managed (i.e. a Rucio managed cache), or operate in both modes. We explore the pros and cons of various configurations as well as practical requirements for caching to be effective. While we focus on XRootD caches, the analysis should apply to other kinds of caches as well.

  13. Caching Servers for ATLAS

    CERN Document Server

    Gardner, Robert; The ATLAS collaboration

    2016-01-01

    As many Tier 3 and some Tier 2 centers look toward streamlining operations, they are considering autonomously managed storage elements as part of the solution. These storage elements are essentially file caching servers. They can operate as whole file or data block level caches. Several implementations exist. In this paper we explore using XRootD caching servers that can operate in either mode. They can also operate autonomously (i.e. demand driven), be centrally managed (i.e. a Rucio managed cache), or operate in both modes. We explore the pros and cons of various configurations as well as practical requirements for caching to be effective. While we focus on XRootD caches, the analysis should apply to other kinds of caches as well.

  14. Caching Servers for ATLAS

    Science.gov (United States)

    Gardner, R. W.; Hanushevsky, A.; Vukotic, I.; Yang, W.

    2017-10-01

    As many LHC Tier-3 and some Tier-2 centers look toward streamlining operations, they are considering autonomously managed storage elements as part of the solution. These storage elements are essentially file caching servers. They can operate as whole file or data block level caches. Several implementations exist. In this paper we explore using XRootD caching servers that can operate in either mode. They can also operate autonomously (i.e. demand driven), be centrally managed (i.e. a Rucio managed cache), or operate in both modes. We explore the pros and cons of various configurations as well as practical requirements for caching to be effective. While we focus on XRootD caches, the analysis should apply to other kinds of caches as well.

  15. Population dynamics, movement and home range of black-tailed jackrabbits (Lepus californicus) in Curlen Valley, Northern Utah. Progress report, October 1, 1976--September 30, 1977

    Energy Technology Data Exchange (ETDEWEB)

    Stoddart, L.C.

    1977-06-01

    The long-term objective of the jackrabbit study in Curlew Valley, Utah and on the Idaho National Engineering Laboratory is to describe observed changes in rabbit density in terms of mortality and natality rates and to relate changes in these two population parameters to variation in environmental factors. Spring rabbit density in Curlew Valley has been observed to change by a factor of 60; changes appear to be largely determined by variation in mortality rates, as shown with K-factor analysis. Mortality of the population from fall-spring is correlated with the coyote/rabbit ratio. Spring-fall adult mortality and birth-fall loss of juveniles are correlated with coyote numbers. Coyote numbers in the relationships are modified to reflect variation in coyote feeding behavior with changes in rabbit and rodent numbers as indicated by coyote food habits studies in Curlew Valley. Coyote predation rates have varied markedly between years as a result of functional and numerical responses in the coyote population. Proposed coyote predation models, which account for the entire observed jackrabbit cycle, are consistent with existing predation theory.

  16. A method cache for Patmos

    DEFF Research Database (Denmark)

    Degasperi, Philipp; Hepp, Stefan; Puffitsch, Wolfgang

    2014-01-01

    For real-time systems we need time-predictable processors. This paper presents a method cache as a time-predictable solution for instruction caching. The method cache caches whole methods (or functions) and simplifies worst-case execution time analysis. We have integrated the method cache...

  17. Pipelined Asynchronous Cache Design

    OpenAIRE

    Nyströem, Mika

    1997-01-01

    This thesis describes the development of pipelined asynchronous cache memories. The work is done in the context of the performance characteristics of memories and transistor logic of a late 1990's high-performance asynchronous microprocessor. We describe the general framework of asynchronous memory systems, caching, and those system characteristics that make caching of growing importance and keep it an interesting research topic. Finally, we present the main contribution of this work, whi...

  18. Sedimentology and reservoir heterogeneity of a valley-fill deposit-A field guide to the Dakota Sandstone of the San Rafael Swell, Utah

    Science.gov (United States)

    Kirschbaum, Mark A.; Schenk, Christopher J.

    2010-01-01

    Valley-fill deposits form a significant class of hydrocarbon reservoirs in many basins of the world. Maximizing recovery of fluids from these reservoirs requires an understanding of the scales of fluid-flow heterogeneity present within the valley-fill system. The Upper Cretaceous Dakota Sandstone in the San Rafael Swell, Utah contains well exposed, relatively accessible outcrops that allow a unique view of the external geometry and internal complexity of a set of rocks interpreted to be deposits of an incised valley fill. These units can be traced on outcrop for tens of miles, and individual sandstone bodies are exposed in three dimensions because of modern erosion in side canyons in a semiarid setting and by exhumation of the overlying, easily erodible Mancos Shale. The Dakota consists of two major units: (1) a lower amalgamated sandstone facies dominated by large-scale cross stratification with several individual sandstone bodies ranging in thickness from 8 to 28 feet, ranging in width from 115 to 150 feet, and having lengths as much as 5,000 feet, and (2) an upper facies composed of numerous mud-encased lenticular sandstones, dominated by ripple-scale lamination, in bedsets ranging in thickness from 5 to 12 feet. The lower facies is interpreted to be fluvial, probably of mainly braided stream origin that exhibits multiple incisions amalgamated into a complex sandstone body. The upper facies has lower energy, probably anastomosed channels encased within alluvial and coastal-plain floodplain sediments. The Dakota valley-fill complex has multiple scales of heterogeneity that could affect fluid flow in similar oil and gas subsurface reservoirs. The largest scale heterogeneity is at the formation level, where the valley-fill complex is sealed within overlying and underlying units. Within the valley-fill complex, there are heterogeneities between individual sandstone bodies, and at the smallest scale, internal heterogeneities within the bodies themselves. These

  19. Cache Consistency by Design

    NARCIS (Netherlands)

    Brinksma, Hendrik

    In this paper we present a proof of the sequential consistency of the lazy caching protocol of Afek, Brown, and Merritt. The proof will follow a strategy of stepwise refinement, developing the distributed caching memory in five transformation steps from a specification of the serial memory, whilst

  20. Hydrology and simulation of ground-water flow in the Tooele Valley ground-water basin, Tooele County, Utah

    Science.gov (United States)

    Stolp, Bernard J.; Brooks, Lynette E.

    2009-01-01

    Ground water is the sole source of drinking water within Tooele Valley. Transition from agriculture to residential land and water use necessitates additional understanding of water resources. The ground-water basin is conceptualized as a single interconnected hydrologic system consisting of the consolidated-rock mountains and adjoining unconsolidated basin-fill valleys. Within the basin fill, unconfined conditions exist along the valley margins and confined conditions exist in the central areas of the valleys. Transmissivity of the unconsolidated basin-fill aquifer ranges from 1,000 to 270,000 square feet per day. Within the consolidated rock of the mountains, ground-water flow largely is unconfined, though variability in geologic structure, stratigraphy, and lithology has created some areas where ground-water flow is confined. Hydraulic conductivity of the consolidated rock ranges from 0.003 to 100 feet per day. Ground water within the basin generally moves from the mountains toward the central and northern areas of Tooele Valley. Steep hydraulic gradients exist at Tooele Army Depot and near Erda. The estimated average annual ground-water recharge within the basin is 82,000 acre-feet per year. The primary source of recharge is precipitation in the mountains; other sources of recharge are irrigation water and streams. Recharge from precipitation was determined using the Basin Characterization Model. Estimated average annual ground-water discharge within the basin is 84,000 acre-feet per year. Discharge is to wells, springs, and drains, and by evapotranspiration. Water levels at wells within the basin indicate periods of increased recharge during 1983-84 and 1996-2000. During these periods annual precipitation at Tooele City exceeded the 1971-2000 annual average for consecutive years. The water with the lowest dissolved-solids concentrations exists in the mountain areas where most of the ground-water recharge occurs. The principal dissolved constituents are calcium

  1. Remedial Action Plan for the codisposal and stabilization of the Monument Valley and Mexican Hat uranium mill tailings at Mexican Hat, Utah

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    1993-02-01

    This document is a revision of the original Mexiacan Hat Remedial Action Plan (RAP) and RAP Modification submitted in July 1988 and January 1989, respectively, along with updated design documents. This RAP has been developed to serve a two-fold purpose. It presents the activities proposed by the Department of Energy (DOE) to accomplish long-term stabilization and control of the residual radioactive materials (RRM) from Monument Valley, Arizona, and Mexican Hat, Utah, at the Mexican Hat disposal site. It also serves to document the concurrence of both the Navajo Nation and the Nuclear Regulatory Commission (NRC) in the remedial action. This agreement, upon execution by DOE and the Navajo Nation and concurrence by the NRC, becomes Appendix B of the Cooperative Agreement. This document has been structured to provide a comprehensive understanding of the remedial action proposed for the Monument Valley and Mexican Hat sites. It includes specific design and construction requirements for the remedial action. Pertinent information and data are included with reference given to the supporting documents. Section 2.0 presents the EPA standards, including a discussion of their objectives. Section 3. 0 summarizes the present site characteristics and provides a definition of site-specific problems. Section 4.0 is the site design for the proposed action. Section 5.0 presents the water resources protection strategy. Section 6.0 summarizes the plan for ensuring health and safety protection for the surrounding community and the on- site workers. Section 7.0 lists the responsibilities of the project participants. Section 8.0 describes the features of the long-term surveillance and maintenance plan.

  2. Cache Creek mercury investigation

    Data.gov (United States)

    US Fish and Wildlife Service, Department of the Interior — The Cache Creek watershed is located in the California Coastal range approximately 100 miles north of San Francisco in Lake, Colusa and Yolo Counties. Wildlife...

  3. Maintaining Web Cache Coherency

    Directory of Open Access Journals (Sweden)

    2000-01-01

    Full Text Available Document coherency is a challenging problem for Web caching. Once the documents are cached throughout the Internet, it is often difficult to keep them coherent with the origin document without generating a new traffic that could increase the traffic on the international backbone and overload the popular servers. Several solutions have been proposed to solve this problem, among them two categories have been widely discussed: the strong document coherency and the weak document coherency. The cost and the efficiency of the two categories are still a controversial issue, while in some studies the strong coherency is far too expensive to be used in the Web context, in other studies it could be maintained at a low cost. The accuracy of these analysis is depending very much on how the document updating process is approximated. In this study, we compare some of the coherence methods proposed for Web caching. Among other points, we study the side effects of these methods on the Internet traffic. The ultimate goal is to study the cache behavior under several conditions, which will cover some of the factors that play an important role in the Web cache performance evaluation and quantify their impact on the simulation accuracy. The results presented in this study show indeed some differences in the outcome of the simulation of a Web cache depending on the workload being used, and the probability distribution used to approximate updates on the cached documents. Each experiment shows two case studies that outline the impact of the considered parameter on the performance of the cache.

  4. Simulations of a Cold-Air Pool in Utah's Salt Lake Valley: Sensitivity to Land Use and Snow Cover

    Science.gov (United States)

    Foster, Christopher S.; Crosman, Erik T.; Horel, John D.

    2017-02-01

    Obtaining realistic land-surface states for initial and boundary conditions is important for the numerical weather prediction of many atmospheric phenomena. Here we investigate model sensitivity to land use and snow cover for a persistent wintertime cold-air pool in northern Utah during 1-8 January 2011. A Weather Research and Forecast model simulation using the 1993 United States Geological Survey land-use and North American Mesoscale model reanalysis snow-cover datasets is compared to an improved configuration using the modified 2011 National Land Cover Database and a more realistic representation of snow cover. The improved surface specification results in an increase (decrease) in urban land cover (Great Salt Lake surface area), and changes to the snow-cover initialization, depth, extent, and albedo. The results obtained from the model simulations are compared to observations collected during the Persistent Cold-Air Pool Study. The changes in land use and snow cover and the resulting impacts on the surface albedo and surface heat fluxes contributed to near-surface air temperature increases of 1-2°C in urban areas and decreases of 2-4°C in areas surrounding the Great Salt Lake. Although wind speeds in the boundary layer were overestimated in both simulations, shallow thermally-driven and terrain-forced flows were generally lessened in intensity and breadth in response to the decreased areal extent of the Great Salt Lake and increases in the urban footprint.

  5. Cache Oblivious Distribution Sweeping

    DEFF Research Database (Denmark)

    Brodal, G.S.; Fagerberg, R.

    2002-01-01

    We adapt the distribution sweeping method to the cache oblivious model. Distribution sweeping is the name used for a general approach for divide-and-conquer algorithms where the combination of solved subproblems can be viewed as a merging process of streams. We demonstrate by a series of algorith...

  6. Hydrology of the Sevier-Sigurd ground-water basin and other ground-water basins, central Sevier Valley, Utah.

    Science.gov (United States)

    Lambert, P.M.; Mason, J.L.; Puchta, R.W

    1995-01-01

    The hydrologic system in the central Sevier Valley, and more specifically the Sevier-Sigurd basin, is a complex system in which surface- and ground-water systems are interrelated. Seepage from an extensive irrigation system is the primary source of recharge to the basin-fill aquifer in the Sevier-Sigurd basin.Water-quality data indicate that inflow from streams and subsurface inflow that intersect evaporite deposits in the Arapien Shale does not adversely affect ground-water quality in the Sevier-Sigurd basin. Stable-isotope data indicate that large sulfate concentrations in water from wells are from the dissolution of gypsum within the basin fill rather than inflow from the Arapien Shale.A ground-water-flow model of the basin-fill aquifer in the Sevier-Sigurd basin was calibrated to steady-state conditions and transient conditions using yearly water-level changes from 1957-88 and monthly water-level changes from 1958-59. Predictive simulations were made to test the effects of reduced recharge from irrigation and increased well discharge. To simulate the effects of conversion from flood to sprinkler irrigation, recharge from irrigated fields was reduced by 50 percent. After twenty years, this reduction resulted in water-level declines of 1 to 8 feet in most of the basin, and a reduction in ground-water discharge to the Sevier River of 4,800 acre-ft/yr. Water-level declines of as much as 12 feet and a reduction in recharge to the Sevier River of 4,800 acre-ft/yr were the result of increasing well discharge near Richfield and Monroe by 25,000 acre-ft/yr. 

  7. Tephra layers of blind Spring Valley and related upper pliocene and pleistocene tephra layers, California, Nevada, and Utah: isotopic ages, correlation, and magnetostratigraphy

    Science.gov (United States)

    Sarna-Wojcicki, Andrei M.; Reheis, Marith C.; Pringle, Malcolm S.; Fleck, Robert J.; Burbank, Doug; Meyer, Charles E.; Slate, Janet L.; Wan, Elmira; Budahn, James R.; Troxel, Bennie; Walker, James P.

    2005-01-01

    Numerical ages have been determined for a stratigraphic sequence of silicic tephra layers exposed at the Cowan Pumice Mine in Blind Spring Valley, near Benton Hot Springs, east-central California, as well as at Chalk Cliffs, north of Bishop, Calif. The tephra layers at these sites were deposited after eruptions from nearby sources, most of them from near Glass Mountain, and some from unknown sources. The ages were determined primarily by the laser-fusion 40Ar/39Ar method, mostly on sanidine feldspar; two were determined by conventional K-Ar analysis on obsidian clasts. These tephra layers, all underlying the Bishop ash bed and listed in order of concordant age and stratigraphic position, are: Tephra Unit Method Material Age Bishop Tuff (air-fall pumice) Ar/Ar sanidine 0.759?0.002 Ma* Upper tuffs of Glass Mountain Ar/Ar sanidine 0.87?0.02 Ma Upper tuffs of Glass Mountain Ar/Ar sanidine 1.13?0.19 Ma Lower tuffs of Glass Mountain K-Ar obsidian 1.86?0.09 Ma (avg of 2 dates) Ar/Ar sanidine 1.92?0.02 Ma (avg of 2 dates) Tuffs of Blind Spring Valley Ar/Ar sanidine 2.135?0.02 to sanidine 2.219?0.006 Ma (10 dates) Tuffs of Benton Hot Springs Ar/Ar plagioclase 2.81?0.02 Ma *Date published previously The above tephra layers were also petrographically examined and the volcanic glass shards of the layers were chemically analyzed using the electron microprobe and, for some samples, instrumental neutron activation analysis and X-ray fluorescence. The same types of chemical and petrographic analyses were conducted on stratigraphic sequences of tephra layers of suspected upper Pliocene and Pleistocene age in several past and present depositional basins within the region outside of Blind Spring Valley. Chemical characterization, combined with additional dates and with magnetostratigraphy of thick sections at two of the distal sites, allow correlation of the tephra layers at the Cowan Pumice Mine with layers present at the distal sites and provide age constraints for other

  8. Cooperative Proxy Caching for Wireless Base Stations

    Directory of Open Access Journals (Sweden)

    James Z. Wang

    2007-01-01

    Full Text Available This paper proposes a mobile cache model to facilitate the cooperative proxy caching in wireless base stations. This mobile cache model uses a network cache line to record the caching state information about a web document for effective data search and cache space management. Based on the proposed mobile cache model, a P2P cooperative proxy caching scheme is proposed to use a self-configured and self-managed virtual proxy graph (VPG, independent of the underlying wireless network structure and adaptive to the network and geographic environment changes, to achieve efficient data search, data cache and date replication. Based on demand, the aggregate effect of data caching, searching and replicating actions by individual proxy servers automatically migrates the cached web documents closer to the interested clients. In addition, a cache line migration (CLM strategy is proposed to flow and replicate the heads of network cache lines of web documents associated with a moving mobile host to the new base station during the mobile host handoff. These replicated cache line heads provide direct links to the cached web documents accessed by the moving mobile hosts in the previous base station, thus improving the mobile web caching performance. Performance studies have shown that the proposed P2P cooperative proxy caching schemes significantly outperform existing caching schemes.

  9. Cache-oblivious String Dictionaries

    DEFF Research Database (Denmark)

    Brodal, Gerth Stølting; Fagerberg, Rolf

    2006-01-01

    We present static cache-oblivious dictionary structures for strings which provide analogues of tries and suffix trees in the cache-oblivious model. Our construction takes as input either a set of strings to store, a single string for which all suffixes are to be stored, a trie, a compressed trie...

  10. Random Fill Cache Architecture (Preprint)

    Science.gov (United States)

    2014-10-01

    D. Gullasch, E. Bangerter, and S. Krenn, “Cache Games — Bringing Access-Based Cache Attacks on AES to Practice,” in Proc. IEEE Symposium on Security...Effectiveness,” in Cryptogra- phers’ Track at the RSA Conference (CT-RSA’04), 2004, pp. 222–235. [27] K. Tiri, O. Aciicmez, M. Neve, and F. Andersen , “An

  11. Cache-Oblivious Hashing

    DEFF Research Database (Denmark)

    Pagh, Rasmus; Wei, Zhewei; Yi, Ke

    2014-01-01

    conditions hold: (a) b is a power of 2; and (b) every block starts at a memory address divisible by b. Note that the two conditions hold on a real machine, although they are not stated in the cache-oblivious model. Interestingly, we also show that neither condition is dispensable: if either of them......The hash table, especially its external memory version, is one of the most important index structures in large databases. Assuming a truly random hash function, it is known that in a standard external hash table with block size b, searching for a particular key only takes expected average t q =1......+1/2 Ω(b) disk accesses for any load factor α bounded away from 1. However, such near-perfect performance is achieved only when b is known and the hash table is particularly tuned for working with such a blocking. In this paper we study if it is possible to build a cache-oblivious hash table that works...

  12. Hydrogeologic and geochemical characterization of groundwater resources in Deep Creek Valley and adjacent areas, Juab and Tooele Counties, Utah, and Elko and White Pine Counties, Nevada

    Science.gov (United States)

    Gardner, Philip M.; Masbruch, Melissa D.

    2015-09-18

    The water resources of Deep Creek Valley were assessed during 2012–13 with an emphasis on better understanding the groundwater flow system and groundwater budget. Surface-water resources are limited in Deep Creek Valley and are generally used for agriculture. Groundwater is the predominant water source for most other uses and to supplement irrigation. Most groundwater withdrawal in Deep Creek Valley occurs from the unconsolidated basin-fill deposits, in which conditions are generally unconfined near the mountain front and confined in the lower-altitude parts of the valley. Productive aquifers are also present in fractured bedrock that occurs along the valley margins and beneath the basin-fill deposits. The consolidated-rock and basin-fill aquifers are hydraulically connected in many areas with much of the recharge occurring in the consolidated-rock mountain blocks and most of the discharge occurring from the lower-altitude basin-fill deposits.

  13. Time-predictable Stack Caching

    DEFF Research Database (Denmark)

    Abbaspourseyedi, Sahar

    complicated and less imprecise. Time-predictable computer architectures provide solutions to this problem. As accesses to the data in caches are one source of timing unpredictability, devising methods for improving the timepredictability of caches are important. Stack data, with statically analyzable...... completely. Thus, in systems with hard deadlines the worst-case execution time (WCET) of the real-time software running on them needs to be bounded. Modern architectures use features such as pipelining and caches for improving the average performance. These features, however, make the WCET analysis more...

  14. Cache-Oblivious Algorithms and Data Structures

    DEFF Research Database (Denmark)

    Brodal, Gerth Stølting

    2004-01-01

    Frigo, Leiserson, Prokop and Ramachandran in 1999 introduced the ideal-cache model as a formal model of computation for developing algorithms in environments with multiple levels of caching, and coined the terminology of cache-oblivious algorithms. Cache-oblivious algorithms are described as stan...... apply to multi-level memory hierarchies. This paper gives an overview of the results achieved on cache-oblivious algorithms and data structures since the seminal paper by Frigo et al....

  15. Significance of new potassium-argon ages from the Goldens Ranch and Moroni Formations, Sanpete-Sevier Valley area, central Utah

    Science.gov (United States)

    Witkind, I.J.; Marvin, R.F.

    1989-01-01

    Exposures of volcanic-sedimentary strata are widely distributed within central Utah. We believe that these volcanic and stratified sedimentary rocks, known by different formational names in different parts of this region, are, in fact, segments of one and the same suite of rocks that formed during the early and middle Tertiary. Potassium-argon ages indicate that both the Goldens Ranch and Moroni Formations formed during the late Eocene to middle Oligocene. The geochronology and stratigraphic relations are stong evidence that the Goldens Ranch and Moroni Formations are correlative, and that they are one and the same depositional unit. We recognize two sequences of repeated deformation: one that occurred prior to deposition and consolidation of the Goldens Ranch and Moroni Formations, and a second that occurred after these formations were emplaced, in essence, after early Oligocene time. In our view, multiple episodes of salt diapirism explain the structural complexity in central Utah. -from Authors

  16. [Remedial action plan for the codisposal and stabilization of the Monument Valley and Mexican Hat uranium mill tailings at Mexican Hat, Utah]. Appendix F, Groundwater hydrology calculations

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    1993-12-31

    This document contains the ground water hydrology calculations for the remedial action plan for the codisposal and stabilization of uranium mill tailings at Mexican Hat, Utah. Included are calculations for the following: slug test analyses for monitor wells, analyses of packer tests, hydraulic gradients and ground water velocities, volume of released water, aquifer pumping test analysis, slug test analysis to determine hydraulic conductivity, and gradient calculations.

  17. A Time-predictable Stack Cache

    DEFF Research Database (Denmark)

    Abbaspour, Sahar; Brandner, Florian; Schoeberl, Martin

    2013-01-01

    Real-time systems need time-predictable architectures to support static worst-case execution time (WCET) analysis. One architectural feature, the data cache, is hard to analyze when different data areas (e.g., heap allocated and stack allocated data) share the same cache. This sharing leads to less...... precise results of the cache analysis part of the WCET analysis. Splitting the data cache for different data areas enables composable data cache analysis. The WCET analysis tool can analyze the accesses to these different data areas independently. In this paper we present the design and implementation...... of a cache for stack allocated data. Our port of the LLVM C++ compiler supports the management of the stack cache. The combination of stack cache instructions and the hardware implementation of the stack cache is a further step towards timepredictable architectures....

  18. A Time-predictable Stack Cache

    DEFF Research Database (Denmark)

    Abbaspourseyedi, Sahar; Brandner, Florian; Schoeberl, Martin

    2013-01-01

    Real-time systems need time-predictable architectures to support static worst-case execution time (WCET) analysis. One architectural feature, the data cache, is hard to analyze when different data areas (e.g., heap allocated and stack allocated data) share the same cache. This sharing leads to le...... of a cache for stack allocated data. Our port of the LLVM C++ compiler supports the management of the stack cache. The combination of stack cache instructions and the hardware implementation of the stack cache is a further step towards timepredictable architectures....

  19. Specific Water Quality Sites for Cache County, Utah

    Data.gov (United States)

    U.S. Geological Survey, Department of the Interior — This map shows specific water-quality items and hydrologic data site information which come from QWDATA (Water Quality) and GWSI (Ground Water Information System)....

  20. Cache-oblivious mesh layouts

    Energy Technology Data Exchange (ETDEWEB)

    Yoon, Sung-Eui [Univ. of North Carolina, Chapel Hill, NC (United States); Lindstrom, Peter [Lawrence Livermore National Lab. (LLNL), Livermore, CA (United States); Pascucci, Valerio [Lawrence Livermore National Lab. (LLNL), Livermore, CA (United States); Manocha, Dinesh [Univ. of North Carolina, Chapel Hill, NC (United States)

    2005-07-01

    We present a novel method for computing cache-oblivious layouts of large meshes that improve the performance of interactive visualization and geometric processing algorithms. Given that the mesh is accessed in a reasonably coherent manner, we assume no particular data access patterns or cache parameters of the memory hierarchy involved in the computation. Furthermore, our formulation extends directly to computing layouts of multi-resolution and bounding volume hierarchies of large meshes. We develop a simple and practical cache-oblivious metric for estimating cache misses. Computing a coherent mesh layout is reduced to a combinatorial optimization problem. We designed and implemented an out-of-core multilevel minimization algorithm and tested its performance on unstructured meshes composed of tens to hundreds of millions of triangles. Our layouts can significantly reduce the number of cache misses. We have observed 2-20 times speedups in view-dependent rendering, collision detection, and isocontour extraction without any modification of the algorithms or runtime applications.

  1. Cache-Aware and Cache-Oblivious Adaptive Sorting

    DEFF Research Database (Denmark)

    Brodal, Gerth Stølting; Fagerberg, Rolf; Moruz, Gabriel

    2005-01-01

    Two new adaptive sorting algorithms are introduced which perform an optimal number of comparisons with respect to the number of inversions in the input. The first algorithm is based on a new linear time reduction to (non-adaptive) sorting. The second algorithm is based on a new division protocol...... for the GenericSort algorithm by Estivill-Castro and Wood. From both algorithms we derive I/O-optimal cache-aware and cache-oblivious adaptive sorting algorithms. These are the first I/O-optimal adaptive sorting algorithms....

  2. Data cache organization for accurate timing analysis

    DEFF Research Database (Denmark)

    Schoeberl, Martin; Huber, Benedikt; Puffitsch, Wolfgang

    2013-01-01

    Caches are essential to bridge the gap between the high latency main memory and the fast processor pipeline. Standard processor architectures implement two first-level caches to avoid a structural hazard in the pipeline: an instruction cache and a data cache. For tight worst-case execution times...... different data areas, such as stack, global data, and heap allocated data, share the same cache. Some addresses are known statically, other addresses are only known at runtime. With a standard cache organization all those different data areas must be considered by worst-case execution time analysis...... associative cache for the heap area. We designed and implemented a static analysis for this cache, and integrated it into a worst-case execution time analysis tool....

  3. Ground-water hydrology of the upper Sevier River Basin, south-central Utah, and simulation of ground-water flow in the valley-fill in Panguitch Valley.

    Science.gov (United States)

    Thiros, Susan A.; Brothers, William C.

    1993-01-01

    The ground-water hydrology of the upper Sevier River basin, primarily of the unconsolidated valley-fill aquifers, was studied from 1988 to 1989. Recharge to the valley-fill aquifers is mostly by seepage from surface-water sources. Changes in soil-moisture content am water levels were measured in Panguitch Valley both at a flood-irrigated and at a sprinkler-irrigated alfalfa field to quantify seepage from unconsumed irrigation water. Lag time between irrigation and water-level response decreased from 6 to 2 days in the flood-irrigated field as the soil-moisture content increased. Water levels measured in the sprinkler-irrigated field did not respond to irrigation. Discharge from the valley-fill aquifer to the Sevier River in Panguitch Valley is about 53,570 acre-feet per year.Water levels measured in wells from 1951 to 1989 tend to fluctuate with the quantity of precipitation falling at higher elevations. Ground-water discharge to the Sevier River in Panguitch Valley causes a general increase in the specific conductance of the river in a downstream direction.A three-layered ground-water-flow model was used to simulate the effects of changes in irrigation practices am increased ground-water withdrawals in Panguitch Valley. The establishment of initial conditions consisted of comparing simulated water levels and simulated gains and losses from the Sevier River and selected canals with values measured during the 1988 irrigation season. The model was calibrated by comparing water-level changes measured from 1961 to 1963 to simulated changes. A simulated change from flood to sprinkler irrigation resulted in a maximum decline in water level of 0.9 feet after the first year of change. Simulating additional discharge from wells resulted in drawdowns of about 20 feet after the first year of pumping.

  4. Cache Timing Analysis of HC-256

    DEFF Research Database (Denmark)

    Zenner, Erik

    2008-01-01

    In this paper, we describe an abstract model of cache timing attacks that can be used for designing ciphers. We then analyse HC-256 under this model, demonstrating a cache timing attack under certain strong assumptions. From the observations made in our analysis, we derive a number of design...... principles for hardening ciphers against cache timing attacks....

  5. Hydrology and numerical simulation of groundwater movement and heat transport in Snake Valley and surrounding areas, Juab, Miller, and Beaver Counties, Utah, and White Pine and Lincoln Counties, Nevada

    Science.gov (United States)

    Masbruch, Melissa D.; Gardner, Philip M.; Brooks, Lynette E.

    2014-01-01

    Snake Valley and surrounding areas, along the Utah-Nevada state border, are part of the Great Basin carbonate and alluvial aquifer system. The groundwater system in the study area consists of water in unconsolidated deposits in basins and water in consolidated rock underlying the basins and in the adjacent mountain blocks. Most recharge occurs from precipitation on the mountain blocks and most discharge occurs from the lower altitude basin-fill deposits mainly as evapotranspiration, springflow, and well withdrawals.The Snake Valley area regional groundwater system was simulated using a three-dimensional model incorporating both groundwater flow and heat transport. The model was constructed with MODFLOW-2000, a version of the U.S. Geological Survey’s groundwater flow model, and MT3DMS, a transport model that simulates advection, dispersion, and chemical reactions of solutes or heat in groundwater systems. Observations of groundwater discharge by evapotranspiration, springflow, mountain stream base flow, and well withdrawals; groundwater-level altitudes; and groundwater temperatures were used to calibrate the model. Parameter values estimated by regression analyses were reasonable and within the range of expected values.This study represents one of the first regional modeling efforts to include calibration to groundwater temperature data. The inclusion of temperature observations reduced parameter uncertainty, in some cases quite significantly, over using just water-level altitude and discharge observations. Of the 39 parameters used to simulate horizontal hydraulic conductivity, uncertainty on 11 of these parameters was reduced to one order of magnitude or less. Other significant reductions in parameter uncertainty occurred in parameters representing the vertical anisotropy ratio, drain and river conductance, recharge rates, and well withdrawal rates.The model provides a good representation of the groundwater system. Simulated water-level altitudes range over

  6. Funnel Heap - A Cache Oblivious Priority Queue

    DEFF Research Database (Denmark)

    Brodal, Gerth Stølting; Fagerberg, Rolf

    2002-01-01

    model. Arge et al. recently presented the first optimal cache oblivious priority queue, and demonstrated the importance of this result by providing the first cache oblivious algorithms for graph problems. Their structure uses cache oblivious sorting and selection as subroutines. In this paper, we devise......The cache oblivious model of computation is a two-level memory model with the assumption that the parameters of the model are unknown to the algorithms. A consequence of this assumption is that an algorithm efficient in the cache oblivious model is automatically efficient in a multi-level memory...

  7. Management of Sodic Soils in Utah

    OpenAIRE

    James, D. W.

    1993-01-01

    Sodic soils are soils with excess sodium. Sodic soils are encountered with increasing frequency in Utah, usually in the lower, flatter areas of our valleys. Sodic soils probably developed over many years when the water table was high and the soils were to wet for cultivation.

  8. On the Limits of Cache-Obliviousness

    DEFF Research Database (Denmark)

    Brodal, Gerth Stølting; Fagerberg, Rolf

    2003-01-01

    In this paper, we present lower bounds for permuting and sorting in the cache-oblivious model. We prove that (1) I/O optimal cache-oblivious comparison based sorting is not possible without a tall cache assumption, and (2) there does not exist an I/O optimal cache-oblivious algorithm for permuting......, not even in the presence of a tall cache assumption.Our results for sorting show the existence of an inherent trade-off in the cache-oblivious model between the strength of the tall cache assumption and the overhead for the case M » B, and show that Funnelsort and recursive binary mergesort are optimal...... algorithms in the sense that they attain this trade-off....

  9. The Cache County Study on Memory in Aging: factors affecting risk of Alzheimer's disease and its progression after onset.

    Science.gov (United States)

    Tschanz, Joann T; Norton, Maria C; Zandi, Peter P; Lyketsos, Constantine G

    2013-12-01

    The Cache County Study on Memory in Aging is a longitudinal, population-based study of Alzheimer's disease (AD) and other dementias. Initiated in 1995 and extending to 2013, the study has followed over 5,000 elderly residents of Cache County, Utah (USA) for over twelve years. Achieving a 90% participation rate at enrolment, and spawning two ancillary projects, the study has contributed to the literature on genetic, psychosocial and environmental risk factors for AD, late-life cognitive decline, and the clinical progression of dementia after its onset. This paper describes the major study contributions to the literature on AD and dementia.

  10. CryptoCache: A Secure Sharable File Cache for Roaming Users

    DEFF Research Database (Denmark)

    Jensen, Christian D.

    2000-01-01

    Small mobile computers are now sufficiently powerful to run many applications, but storage capacity remains limited so working files cannot be cached or stored locally. Even if files can be stored locally, the mobile device is not powerful enough to act as server in collaborations with other users....... Conventional distributed file systems cache everything locally or not at all; there is no possibility to cache files on nearby nodes.In this paper we present the design of a secure cache system called CryptoCache that allows roaming users to cache files on untrusted file hosting servers. The system allows...

  11. 77 FR 5617 - Notice of Final Federal Agency Action on Proposed Highway in Utah

    Science.gov (United States)

    2012-02-03

    ... proposed transportation improvement project (Logan 200 East, minor arterial project) in Logan, Cache County... approvals for the following highway project in the State of Utah: The Logan 200 East Minor Arterial Project...; E.O. 12898, Federal Actions to address Environmental Justice in Minority Populations and Low Income...

  12. Evaluation of 20-min and Annual Radiation Budget Components and Cloudiness in a Mountainous Valley

    Science.gov (United States)

    Malek, E.

    2007-05-01

    Logan, Utah (USA) is among cities located in the mountainous valley in the western portion of Rocky Mountains in North America. It is the county seat of Cache Valley, a metropolitan area with a population of about 100,000. The valley had the polluted air in the USA during January 2004. To evaluate the daily and annual radiation budget and cloudiness in this mountainous valley, we set up a radiation station in the middle of the valley to measure the 20- min radiation budget components namely: incoming (Rso) and outgoing (Rso) solar or shortwave radiation, using to CM21 Kipp and Zonen (one inverted) and incoming (Rli) (or atmospheric) and outgoing (Rlo) or terrestrial) longwave radiation using two CG1 Kipp and Zonen Pyrgeometers (one inverted) during the year of 2003. All pyranometers and Pyrgeometers were ventilated with four CV2 Kipp and Zonen ventilation systems throughout the year to prevent deposition of dew, frost and snow, which otherwise would disturb the measurements. We also measured the 2-m air temperature and relative humidity along with surface temperature. All measurements were taken every 2 s, averaged to 20 min, continuously throughout the year 2000. A Met One heated rain gauge measured precipitation. Comparison of the annual radiation budget components indicates that about 25% of the annual Rsi (5848.6 MJ/ (squared m-y)) was reflected back to sky as Rso. Rli and Rlo amounted to 9968.7 and 13303.5 MJ/ (squared m-y)), respectively. This yielded about 1364.9 MJ/ (squared m- y)) available energy (Rn). Having the 2-m air temperature and moisture data and comparison between the theoretical and the measured longwave radiation, we evaluated the 20-m cloudy conditions throughout the year of 2003. The average cloud base height was 587 m (ranged from zero for foggy conditions to about 3000 m). Annual cloudiness contributed about 139.1 MJ/ (squared m-y)) more energy in this valley.

  13. Engineering a Cache-Oblivious Sorting Algorithm

    DEFF Research Database (Denmark)

    Brodal, Gerth Stølting; Fagerberg, Rolf; Vinther, Kristoffer

    2007-01-01

    This paper is an algorithmic engineering study of cache-oblivious sorting. We investigate by empirical methods a number of implementation issues and parameter choices for the cache-oblivious sorting algorithm Lazy Funnelsort, and compare the final algorithm with Quicksort, the established standard...... for comparison-based sorting, as well as with recent cache-aware proposals. The main result is a carefully implemented cache-oblivious sorting algorithm, which our experiments show can be faster than the best Quicksort implementation we are able to find, already for input sizes well within the limits of RAM....... It is also at least as fast as the recent cache-aware implementations included in the test. On disk the difference is even more pronounced regarding Quicksort and the cache-aware algorithms, whereas the algorithm is slower than a careful implementation of multiway Mergesort such as TPIE....

  14. Scope-Based Method Cache Analysis

    DEFF Research Database (Denmark)

    Huber, Benedikt; Hepp, Stefan; Schoeberl, Martin

    2014-01-01

    The quest for time-predictable systems has led to the exploration of new hardware architectures that simplify analysis and reasoning in the temporal domain, while still providing competitive performance. For the instruction memory, the method cache is a conceptually attractive solution, as it req......The quest for time-predictable systems has led to the exploration of new hardware architectures that simplify analysis and reasoning in the temporal domain, while still providing competitive performance. For the instruction memory, the method cache is a conceptually attractive solution......, as it requests memory transfers at well-defined instructions only. In this article, we present a new cache analysis framework that generalizes and improves work on cache persistence analysis. The analysis demonstrates that a global view on the cache behavior permits the precise analyses of caches which are hard...

  15. Potential effects of existing and proposed groundwater withdrawals on water levels and natural groundwater discharge in Snake Valley and surrounding areas, Utah and Nevada

    Science.gov (United States)

    Masbruch, Melissa D.; Brooks, Lynette E.

    2017-04-14

    Several U.S. Department of Interior (DOI) agencies are concerned about the cumulative effects of groundwater development on groundwater resources managed by, and other groundwater resources of interest to, these agencies in Snake Valley and surrounding areas. The new water uses that potentially concern the DOI agencies include 12 water-right applications filed in 2005, totaling approximately 8,864 acre-feet per year. To date, only one of these applications has been approved and partially developed. In addition, the DOI agencies are interested in the potential effects of three new water-right applications (UT 18-756, UT 18-758, and UT 18-759) and one water-right change application (UT a40687), which were the subject of a water-right hearing on April 19, 2016.This report presents a hydrogeologic analysis of areas in and around Snake Valley to assess potential effects of existing and future groundwater development on groundwater resources, specifically groundwater discharge sites, of interest to the DOI agencies. A previously developed steady-state numerical groundwater-flow model was modified to transient conditions with respect to well withdrawals and used to quantify drawdown and capture (withdrawals that result in depletion) of natural discharge from existing and proposed groundwater withdrawals. The original steady-state model simulates and was calibrated to 2009 conditions. To investigate the potential effects of existing and proposed groundwater withdrawals on the groundwater resources of interest to the DOI agencies, 10 withdrawal scenarios were simulated. All scenarios were simulated for periods of 5, 10, 15, 30, 55, and 105 years from the start of 2010; additionally, all scenarios were simulated to a new steady state to determine the ultimate long-term effects of the withdrawals. Capture maps were also constructed as part of this analysis. The simulations used to develop the capture maps test the response of the system, specifically the reduction of natural

  16. Store operations to maintain cache coherence

    Energy Technology Data Exchange (ETDEWEB)

    Evangelinos, Constantinos; Nair, Ravi; Ohmacht, Martin

    2017-08-01

    In one embodiment, a computer-implemented method includes encountering a store operation during a compile-time of a program, where the store operation is applicable to a memory line. It is determined, by a computer processor, that no cache coherence action is necessary for the store operation. A store-without-coherence-action instruction is generated for the store operation, responsive to determining that no cache coherence action is necessary. The store-without-coherence-action instruction specifies that the store operation is to be performed without a cache coherence action, and cache coherence is maintained upon execution of the store-without-coherence-action instruction.

  17. Store operations to maintain cache coherence

    Energy Technology Data Exchange (ETDEWEB)

    Evangelinos, Constantinos; Nair, Ravi; Ohmacht, Martin

    2017-09-12

    In one embodiment, a computer-implemented method includes encountering a store operation during a compile-time of a program, where the store operation is applicable to a memory line. It is determined, by a computer processor, that no cache coherence action is necessary for the store operation. A store-without-coherence-action instruction is generated for the store operation, responsive to determining that no cache coherence action is necessary. The store-without-coherence-action instruction specifies that the store operation is to be performed without a cache coherence action, and cache coherence is maintained upon execution of the store-without-coherence-action instruction.

  18. A Survey of Cache Bypassing Techniques

    Directory of Open Access Journals (Sweden)

    Sparsh Mittal

    2016-04-01

    Full Text Available With increasing core-count, the cache demand of modern processors has also increased. However, due to strict area/power budgets and presence of poor data-locality workloads, blindly scaling cache capacity is both infeasible and ineffective. Cache bypassing is a promising technique to increase effective cache capacity without incurring power/area costs of a larger sized cache. However, injudicious use of cache bypassing can lead to bandwidth congestion and increased miss-rate and hence, intelligent techniques are required to harness its full potential. This paper presents a survey of cache bypassing techniques for CPUs, GPUs and CPU-GPU heterogeneous systems, and for caches designed with SRAM, non-volatile memory (NVM and die-stacked DRAM. By classifying the techniques based on key parameters, it underscores their differences and similarities. We hope that this paper will provide insights into cache bypassing techniques and associated tradeoffs and will be useful for computer architects, system designers and other researchers.

  19. La honte qui cache la honte qui cache...

    OpenAIRE

    Dussy, Dorothée

    2004-01-01

    Sommaire : http://www.sigila.msh-paris.fr/la_honte.htm; International audience; Ce texte explore les mécanismes par lesquels Louise, ancienne religieuse et secrétaire médicale à la retraite, a tout au long de sa vie enchaîné les raisons d'avoir honte se rapportant invariablement à une infraction à son intimité. Louise amnésique a caché une honte par une autre honte, sans souvenir de son secret originel. Jusqu'à ce que la mémoire lui revienne un matin, sur le trajet la menant à son travail, gr...

  20. A Stack Cache for Real-Time Systems

    DEFF Research Database (Denmark)

    Schoeberl, Martin; Nielsen, Carsten

    2016-01-01

    Real-time systems need time-predictable computing platforms to allowfor static analysis of the worst-case execution time. Caches are important for good performance, but data caches arehard to analyze for the worst-case execution time. Stack allocated data has different properties related...... data cache. As stack allocated datahas a high locality, even a small stack cache gives a high hit rate. A stack cache added to a write-through data cache considerablyimproves the performance, while a stack cache compared tothe harder to analyze write-back cache has about the sameaverage case...

  1. Modifying dementia risk and trajectories of cognitive decline in aging: the Cache County Memory Study.

    Science.gov (United States)

    Welsh-Bohmer, Kathleen A; Breitner, John C S; Hayden, Kathleen M; Lyketsos, Constantine; Zandi, Peter P; Tschanz, Joann T; Norton, Maria C; Munger, Ron

    2006-07-01

    The Cache County Study of Memory, Health, and Aging, more commonly referred to as the "Cache County Memory Study (CCMS)" is a longitudinal investigation of aging and Alzheimer's disease (AD) based in an exceptionally long-lived population residing in northern Utah. The study begun in 1994 has followed an initial cohort of 5,092 older individuals (many over age 84) and has examined the development of cognitive impairment and dementia in relation to genetic and environmental antecedents. This article summarizes the major contributions of the CCMS towards the understanding of mild cognitive disorders and AD across the lifespan, underscoring the role of common health exposures in modifying dementia risk and trajectories of cognitive change. The study now in its fourth wave of ascertainment illustrates the role of population-based approaches in informing testable models of cognitive aging and Alzheimer's disease.

  2. Caching at a distance: a cache protection strategy in Eurasian jays.

    Science.gov (United States)

    Legg, Edward W; Ostojić, Ljerka; Clayton, Nicola S

    2016-07-01

    A fundamental question about the complexity of corvid social cognition is whether behaviours exhibited when caching in front of potential pilferers represent specific attempts to prevent cache loss (cache protection hypothesis) or whether they are by-products of other behaviours (by-product hypothesis). Here, we demonstrate that Eurasian jays preferentially cache at a distance when observed by conspecifics. This preference for a 'far' location could be either a by-product of a general preference for caching at that specific location regardless of the risk of cache loss or a by-product of a general preference to be far away from conspecifics due to low intra-species tolerance. Critically, we found that neither by-product account explains the jays' behaviour: the preference for the 'far' location was not shown when caching in private or when eating in front of a conspecific. In line with the cache protection hypothesis we found that jays preferred the distant location only when caching in front of a conspecific. Thus, it seems likely that for Eurasian jays, caching at a distance from an observer is a specific cache protection strategy.

  3. A Cache Timing Analysis of HC-256

    DEFF Research Database (Denmark)

    Zenner, Erik

    2009-01-01

    In this paper, we describe a cache-timing attack against the stream cipher HC-256, which is the strong version of eStream winner HC-128. The attack is based on an abstract model of cache timing attacks that can also be used for designing stream ciphers. From the observations made in our analysis,...

  4. Search-Order Independent State Caching

    DEFF Research Database (Denmark)

    Evangelista, Sami; Kristensen, Lars Michael

    2010-01-01

    State caching is a memory reduction technique used by model checkers to alleviate the state explosion problem. It has traditionally been coupled with a depth-first search to ensure termination.We propose and experimentally evaluate an extension of the state caching method for general state...

  5. Improving Internet Archive Service through Proxy Cache.

    Science.gov (United States)

    Yu, Hsiang-Fu; Chen, Yi-Ming; Wang, Shih-Yong; Tseng, Li-Ming

    2003-01-01

    Discusses file transfer protocol (FTP) servers for downloading archives (files with particular file extensions), and the change to HTTP (Hypertext transfer protocol) with increased Web use. Topics include the Archie server; proxy cache servers; and how to improve the hit rate of archives by a combination of caching and better searching mechanisms.…

  6. Optoelectronic-cache memory system architecture.

    Science.gov (United States)

    Chiarulli, D M; Levitan, S P

    1996-05-10

    We present an investigation of the architecture of an optoelectronic cache that can integrate terabit optical memories with the electronic caches associated with high-performance uniprocessors and multiprocessors. The use of optoelectronic-cache memories enables these terabit technologies to provide transparently low-latency secondary memory with frame sizes comparable with disk pages but with latencies that approach those of electronic secondary-cache memories. This enables the implementation of terabit memories with effective access times comparable with the cycle times of current microprocessors. The cache design is based on the use of a smart-pixel array and combines parallel free-space optical input-output to-and-from optical memory with conventional electronic communication to the processor caches. This cache and the optical memory system to which it will interface provide a large random-access memory space that has a lower overall latency than that of magnetic disks and disk arrays. In addition, as a consequence of the high-bandwidth parallel input-output capabilities of optical memories, fault service times for the optoelectronic cache are substantially less than those currently achievable with any rotational media.

  7. Search-Order Independent State Caching

    DEFF Research Database (Denmark)

    Evangelista, Sami; Kristensen, Lars Michael

    2009-01-01

    State caching is a memory reduction technique used by model checkers to alleviate the state explosion problem. It has traditionally been coupled with a depth-first search to ensure termination.We propose and experimentally evaluate an extension of the state caching method for general state...

  8. Cache Energy Optimization Techniques For Modern Processors

    Energy Technology Data Exchange (ETDEWEB)

    Mittal, Sparsh [ORNL

    2013-01-01

    Modern multicore processors are employing large last-level caches, for example Intel's E7-8800 processor uses 24MB L3 cache. Further, with each CMOS technology generation, leakage energy has been dramatically increasing and hence, leakage energy is expected to become a major source of energy dissipation, especially in last-level caches (LLCs). The conventional schemes of cache energy saving either aim at saving dynamic energy or are based on properties specific to first-level caches, and thus these schemes have limited utility for last-level caches. Further, several other techniques require offline profiling or per-application tuning and hence are not suitable for product systems. In this book, we present novel cache leakage energy saving schemes for single-core and multicore systems; desktop, QoS, real-time and server systems. Also, we present cache energy saving techniques for caches designed with both conventional SRAM devices and emerging non-volatile devices such as STT-RAM (spin-torque transfer RAM). We present software-controlled, hardware-assisted techniques which use dynamic cache reconfiguration to configure the cache to the most energy efficient configuration while keeping the performance loss bounded. To profile and test a large number of potential configurations, we utilize low-overhead, micro-architecture components, which can be easily integrated into modern processor chips. We adopt a system-wide approach to save energy to ensure that cache reconfiguration does not increase energy consumption of other components of the processor. We have compared our techniques with state-of-the-art techniques and have found that our techniques outperform them in terms of energy efficiency and other relevant metrics. The techniques presented in this book have important applications in improving energy-efficiency of higher-end embedded, desktop, QoS, real-time, server processors and multitasking systems. This book is intended to be a valuable guide for both

  9. The dCache scientific storage cloud

    CERN Multimedia

    CERN. Geneva

    2014-01-01

    For over a decade, the dCache team has provided software for handling big data for a diverse community of scientists. The team has also amassed a wealth of operational experience from using this software in production. With this experience, the team have refined dCache with the goal of providing a "scientific cloud": a storage solution that satisfies all requirements of a user community by exposing different facets of dCache with which users interact. Recent development, as part of this "scientific cloud" vision, has introduced a new facet: a sync-and-share service, often referred to as "dropbox-like storage". This work has been strongly focused on local requirements, but will be made available in future releases of dCache allowing others to adopt dCache solutions. In this presentation we will outline the current status of the work: both the successes and limitations, and the direction and time-scale of future work.

  10. The Cost of Cache-Oblivious Searching

    DEFF Research Database (Denmark)

    Bender, Michael A.; Brodal, Gerth Stølting; Fagerberg, Rolf

    2011-01-01

    This paper gives tight bounds on the cost of cache-oblivious searching. The paper shows that no cache-oblivious search structure can guarantee a search performance of fewer than lg elog  B N memory transfers between any two levels of the memory hierarchy. This lower bound holds even if all...... increases. The expectation is taken over the random placement in memory of the first element of the structure. Because searching in the disk-access machine (DAM) model can be performed in log  B N+O(1) block transfers, this result establishes a separation between the (2-level) DAM model and cache......-oblivious model. The DAM model naturally extends to k levels. The paper also shows that as k grows, the search costs of the optimal k-level DAM search structure and the optimal cache-oblivious search structure rapidly converge. This result demonstrates that for a multilevel memory hierarchy, a simple cache...

  11. Efficient sorting using registers and caches

    DEFF Research Database (Denmark)

    Wickremesinghe, Rajiv; Arge, Lars Allan; Chase, Jeffrey S.

    2002-01-01

    on sorting performance. We introduce a new cache-conscious sorting algorithm, R-MERGE, which achieves better performance in practice over algorithms that are superior in the theoretical models. R-MERGE is designed to minimize memory stall cycles rather than cache misses by considering features common to many......Modern computer systems have increasingly complex memory systems. Common machine models for algorithm analysis do not reflect many of the features of these systems, e.g., large register sets, lockup-free caches, cache hierarchies, associativity, cache line fetching, and streaming behavior....... Inadequate models lead to poor algorithmic choices and an incomplete understanding of algorithm behavior on real machines.A key step toward developing better models is to quantify the performance effects of features not reflected in the models. This paper explores the effect of memory system features...

  12. Geothermal Technologies Program: Utah

    Energy Technology Data Exchange (ETDEWEB)

    2005-06-01

    Geothermal Technologies Program Utah fact sheet describes the geothermal areas and use in Utah, focusing on power generation as well as direct use, including geothermally heated greenhouses, swimming pools, and therapeutic baths.

  13. Supplementary report on Pony Express-Overland Stage sites in western Utah

    Data.gov (United States)

    US Fish and Wildlife Service, Department of the Interior — The following report is a description by site of Pony Express and Overland Stage stations between Rush Valley and Deep Creek, Utah. Descriptions, including...

  14. WATCHMAN: A Data Warehouse Intelligent Cache Manager

    Science.gov (United States)

    Scheuermann, Peter; Shim, Junho; Vingralek, Radek

    1996-01-01

    Data warehouses store large volumes of data which are used frequently by decision support applications. Such applications involve complex queries. Query performance in such an environment is critical because decision support applications often require interactive query response time. Because data warehouses are updated infrequently, it becomes possible to improve query performance by caching sets retrieved by queries in addition to query execution plans. In this paper we report on the design of an intelligent cache manager for sets retrieved by queries called WATCHMAN, which is particularly well suited for data warehousing environment. Our cache manager employs two novel, complementary algorithms for cache replacement and for cache admission. WATCHMAN aims at minimizing query response time and its cache replacement policy swaps out entire retrieved sets of queries instead of individual pages. The cache replacement and admission algorithms make use of a profit metric, which considers for each retrieved set its average rate of reference, its size, and execution cost of the associated query. We report on a performance evaluation based on the TPC-D and Set Query benchmarks. These experiments show that WATCHMAN achieves a substantial performance improvement in a decision support environment when compared to a traditional LRU replacement algorithm.

  15. Corvid caching: Insights from a cognitive model.

    Science.gov (United States)

    van der Vaart, Elske; Verbrugge, Rineke; Hemelrijk, Charlotte K

    2011-07-01

    Caching and recovery of food by corvids is well-studied, but some ambiguous results remain. To help clarify these, we built a computational cognitive model. It is inspired by similar models built for humans, and it assumes that memory strength depends on frequency and recency of use. We compared our model's behavior to that of real birds in previously published experiments. Our model successfully replicated the outcomes of two experiments on recovery behavior and two experiments on cache site choice. Our "virtual birds" reproduced declines in recovery accuracy across sessions, revisits to previously emptied cache sites, a lack of correlation between caching and recovery order, and a preference for caching in safe locations. The model also produced two new explanations. First, that Clark's nutcrackers may become less accurate as recovery progresses not because of differential memory for different cache sites, as was once assumed, but because of chance effects. And second, that Western scrub jays may choose their cache sites not on the basis of negative recovery experiences only, as was previously thought, but on the basis of positive recovery experiences instead. Alternatively, both "punishment" and "reward" may be playing a role. We conclude with a set of new insights, a testable prediction, and directions for future work. PsycINFO Database Record (c) 2011 APA, all rights reserved

  16. Geology of the Oquirrh Mountains, Utah

    OpenAIRE

    United States Geological Survey

    1999-01-01

    The Oquirrh Mountains are located in north-central Utah, immediately south of the Great Salt Lake, in the easternmost part of the Basin and Range physiographic province. The range consists of northerly-trending aligned peaks 56 kilometers long flanked on the west by Tooele and Rush Valleys and on the east by Jordan and Cedar Valleys. The range hosts several of the more prominent base- and precious-metal and desseminated-gold mining areas in the western United States. The 130-year old Bingh...

  17. A Simple Cache Emulator for Evaluating Cache Behavior for SMP Systems

    Directory of Open Access Journals (Sweden)

    I. Šimeček

    2006-01-01

    Full Text Available Every modern CPU uses a complex memory hierarchy, which consists of multiple cache memory levels. It is very difficult to predict the behavior of this hierarchy for a given program (for details see [1, 2]. The situation is even worse for systems with a shared memory. The most important example is the case of SMP (symmetric multiprocessing systems [3]. The importance of these systems is growing due to the multi-core feature of the newest CPUs.The Cache Emulator (CE can simulate the behavior of caches inside an SMP system and compute the number of cache misses during a computation. All measurements are done in the “off-line” mode on a single CPU. The CE uses its own emulated cache memory for an exact simulation. This means that no other CPU activity influences the behavior of the CE. This work extends the Cache Analyzer introduced in [4]. 

  18. Use of diuretics is associated with reduced risk of Alzheimer's disease: the Cache County Study.

    Science.gov (United States)

    Chuang, Yi-Fang; Breitner, John C S; Chiu, Yen-Ling; Khachaturian, Ara; Hayden, Kathleen; Corcoran, Chris; Tschanz, JoAnn; Norton, Maria; Munger, Ron; Welsh-Bohmer, Kathleen; Zandi, Peter P

    2014-11-01

    Although the use of antihypertensive medications has been associated with reduced risk of Alzheimer's disease (AD), it remains unclear which class provides the most benefit. The Cache County Study of Memory Health and Aging is a prospective longitudinal cohort study of dementing illnesses among the elderly population of Cache County, Utah. Using waves I to IV data of the Cache County Study, 3417 participants had a mean of 7.1 years of follow-up. Time-varying use of antihypertensive medications including different class of diuretics, angiotensin converting enzyme inhibitors, β-blockers, and calcium channel blockers was used to predict the incidence of AD using Cox proportional hazards analyses. During follow-up, 325 AD cases were ascertained with a total of 23,590 person-years. Use of any antihypertensive medication was associated with lower incidence of AD (adjusted hazard ratio [aHR], 0.77; 95% confidence interval [CI], 0.61-0.97). Among different classes of antihypertensive medications, thiazide (aHR, 0.7; 95% CI, 0.53-0.93), and potassium-sparing diuretics (aHR, 0.69; 95% CI, 0.48-0.99) were associated with the greatest reduction of AD risk. Thiazide and potassium-sparing diuretics were associated with decreased risk of AD. The inverse association of potassium-sparing diuretics confirms an earlier finding in this cohort, now with longer follow-up, and merits further investigation. Copyright © 2014 Elsevier Inc. All rights reserved.

  19. Determination of hydrologic properties needed to calculate average linear velocity and travel time of ground water in the principal aquifer underlying the southeastern part of Salt Lake Valley, Utah

    Science.gov (United States)

    Freethey, G.W.; Spangler, L.E.; Monheiser, W.J.

    1994-01-01

    A 48-square-mile area in the southeastern part of the Salt Lake Valley, Utah, was studied to determine if generalized information obtained from geologic maps, water-level maps, and drillers' logs could be used to estimate hydraulic conduc- tivity, porosity, and slope of the potentiometric surface: the three properties needed to calculate average linear velocity of ground water. Estimated values of these properties could be used by water- management and regulatory agencies to compute values of average linear velocity, which could be further used to estimate travel time of ground water along selected flow lines, and thus to determine wellhead protection areas around public- supply wells. The methods used to estimate the three properties are based on assumptions about the drillers' descriptions, the depositional history of the sediments, and the boundary con- ditions of the hydrologic system. These assump- tions were based on geologic and hydrologic infor- mation determined from previous investigations. The reliability of the estimated values for hydro- logic properties and average linear velocity depends on the accuracy of these assumptions. Hydraulic conductivity of the principal aquifer was estimated by calculating the thickness- weighted average of values assigned to different drillers' descriptions of material penetrated during the construction of 98 wells. Using these 98 control points, the study area was divided into zones representing approximate hydraulic- conductivity values of 20, 60, 100, 140, 180, 220, and 250 feet per day. This range of values is about the same range of values used in developing a ground-water flow model of the principal aquifer in the early 1980s. Porosity of the principal aquifer was estimated by compiling the range of porosity values determined or estimated during previous investigations of basin-fill sediments, and then using five different values ranging from 15 to 35 percent to delineate zones in the study area that were assumed to

  20. Ten Utah Painters

    OpenAIRE

    Whitlock, Andrew

    1984-01-01

    Today the art world is rich and diverse with regional as well as national art centers. As in the past, art is alive and well in Utah. The show Ten Utah Painters invites us to see and experiece what some of Utah's best contemporary artists are doing. Their paintings invite us to look and to enjoy but also to learn and open up our visual senses to a broader vista.

  1. Status of Utah Bats

    Science.gov (United States)

    2009-01-27

    DAVIS DUCHESNE EMERY GARFIELD GRAND IRON JUAB KANE MILLARD MORGAN PIUTE RICH SALT LAKE SAN JUAN SANPETE SEVIER SUMMIT TOOELE UINTAH UTAH WASATCH...LAKESAN JUANSANPETE SEVIER SUMMIT TOOELEUINTAH UTAH WASATCH WASHINGTON WAYNE WEBER Townsend’s Big‐eared bat  Figure 26b. Proportion of Townsend’s...KANE MILLARDMORGAN PIUTE RICH SALT LAKE SAN JUAN SANPETE SEVIER SUMMIT TOOELE UINTAH UTAH WASATCH WASHINGTON WAYNE WEBER big brown bat  Figure 26c

  2. BidCache: Auction-based in-network caching in ICN

    NARCIS (Netherlands)

    Gill, A.S.; D'Acunto, L.; Trichias, K.; Brandenburg, R. van

    2016-01-01

    In Information Centric Networks, each node on the Data delivery path has the ability to cache the data items that flow through it. However, each node takes the decision on whether to cache a particular data item or not independently from the other nodes on the Data delivery path. This approach might

  3. dCache, agile adoption of storage technology

    Energy Technology Data Exchange (ETDEWEB)

    Millar, A. P. [Hamburg U.; Baranova, T. [Hamburg U.; Behrmann, G. [Unlisted, DK; Bernardt, C. [Hamburg U.; Fuhrmann, P. [Hamburg U.; Litvintsev, D. O. [Fermilab; Mkrtchyan, T. [Hamburg U.; Petersen, A. [Hamburg U.; Rossi, A. [Fermilab; Schwank, K. [Hamburg U.

    2012-01-01

    For over a decade, dCache has been synonymous with large-capacity, fault-tolerant storage using commodity hardware that supports seamless data migration to and from tape. In this paper we provide some recent news of changes within dCache and the community surrounding it. We describe the flexible nature of dCache that allows both externally developed enhancements to dCache facilities and the adoption of new technologies. Finally, we present information about avenues the dCache team is exploring for possible future improvements in dCache.

  4. The Role of Diet, Erythrocyte Membrane Fatty Acid Composition, and Alzheimer's-related Genes in Systemic Inflammation in the Cache County Memory Study

    OpenAIRE

    Jalloun, Rola Adnan

    2015-01-01

    This project examined the association between dietary patterns, erythrocyte membrane fatty acids concentration, and Alzheimer’s-related genes in systemic inflammation, as indicated by C-reactive protein (CRP) levels, in order to achieve more comprehensive knowledge of how nutrition and genetics influence systemic inflammation among the elderly residents of Cache County, Utah. First, the associations between dietary patterns defined by Dietary Approaches to Stop Hypertension (DASH) and Medi...

  5. Memory Map: A Multiprocessor Cache Simulator

    Directory of Open Access Journals (Sweden)

    Shaily Mittal

    2012-01-01

    Full Text Available Nowadays, Multiprocessor System-on-Chip (MPSoC architectures are mainly focused on by manufacturers to provide increased concurrency, instead of increased clock speed, for embedded systems. However, managing concurrency is a tough task. Hence, one major issue is to synchronize concurrent accesses to shared memory. An important characteristic of any system design process is memory configuration and data flow management. Although, it is very important to select a correct memory configuration, it might be equally imperative to choreograph the data flow between various levels of memory in an optimal manner. Memory map is a multiprocessor simulator to choreograph data flow in individual caches of multiple processors and shared memory systems. This simulator allows user to specify cache reconfigurations and number of processors within the application program and evaluates cache miss and hit rate for each configuration phase taking into account reconfiguration costs. The code is open source and in java.

  6. Best practice for caching of single-path code

    DEFF Research Database (Denmark)

    Schoeberl, Martin; Cilku, Bekim; Prokesch, Daniel

    2017-01-01

    Single-path code has some unique properties that make it interesting to explore different caching and prefetching alternatives for the stream of instructions. In this paper, we explore different cache organizations and how they perform with single-path code.......Single-path code has some unique properties that make it interesting to explore different caching and prefetching alternatives for the stream of instructions. In this paper, we explore different cache organizations and how they perform with single-path code....

  7. DSP code optimization based on cache

    Science.gov (United States)

    Xu, Chengfa; Li, Chengcheng; Tang, Bin

    2013-03-01

    DSP program's running efficiency on board is often lower than which via the software simulation during the program development, which is mainly resulted from the user's improper use and incomplete understanding of the cache-based memory. This paper took the TI TMS320C6455 DSP as an example, analyzed its two-level internal cache, and summarized the methods of code optimization. Processor can achieve its best performance when using these code optimization methods. At last, a specific algorithm application in radar signal processing is proposed. Experiment result shows that these optimization are efficient.

  8. Victim Migration: Dynamically Adapting Between Private and Shared CMP Caches

    National Research Council Canada - National Science Library

    Zhang, Michael; Asanovic, Krste

    2005-01-01

    .... Victim replication was previously introduced as a way of reducing the average hit latency of a shared cache by allowing a processor to make a replica of a primary cache victim in its local slice of the global L2 cache...

  9. Don't make cache too complex: A simple probability-based cache management scheme for SSDs.

    Directory of Open Access Journals (Sweden)

    Seungjae Baek

    Full Text Available Solid-state drives (SSDs have recently become a common storage component in computer systems, and they are fueled by continued bit cost reductions achieved with smaller feature sizes and multiple-level cell technologies. However, as the flash memory stores more bits per cell, the performance and reliability of the flash memory degrade substantially. To solve this problem, a fast non-volatile memory (NVM-based cache has been employed within SSDs to reduce the long latency required to write data. Absorbing small writes in a fast NVM cache can also reduce the number of flash memory erase operations. To maximize the benefits of an NVM cache, it is important to increase the NVM cache utilization. In this paper, we propose and study ProCache, a simple NVM cache management scheme, that makes cache-entrance decisions based on random probability testing. Our scheme is motivated by the observation that frequently written hot data will eventually enter the cache with a high probability, and that infrequently accessed cold data will not enter the cache easily. Owing to its simplicity, ProCache is easy to implement at a substantially smaller cost than similar previously studied techniques. We evaluate ProCache and conclude that it achieves comparable performance compared to a more complex reference counter-based cache-management scheme.

  10. Don't make cache too complex: A simple probability-based cache management scheme for SSDs.

    Science.gov (United States)

    Baek, Seungjae; Cho, Sangyeun; Choi, Jongmoo

    2017-01-01

    Solid-state drives (SSDs) have recently become a common storage component in computer systems, and they are fueled by continued bit cost reductions achieved with smaller feature sizes and multiple-level cell technologies. However, as the flash memory stores more bits per cell, the performance and reliability of the flash memory degrade substantially. To solve this problem, a fast non-volatile memory (NVM-)based cache has been employed within SSDs to reduce the long latency required to write data. Absorbing small writes in a fast NVM cache can also reduce the number of flash memory erase operations. To maximize the benefits of an NVM cache, it is important to increase the NVM cache utilization. In this paper, we propose and study ProCache, a simple NVM cache management scheme, that makes cache-entrance decisions based on random probability testing. Our scheme is motivated by the observation that frequently written hot data will eventually enter the cache with a high probability, and that infrequently accessed cold data will not enter the cache easily. Owing to its simplicity, ProCache is easy to implement at a substantially smaller cost than similar previously studied techniques. We evaluate ProCache and conclude that it achieves comparable performance compared to a more complex reference counter-based cache-management scheme.

  11. Cache-mesh, a Dynamics Data Structure for Performance Optimization

    DEFF Research Database (Denmark)

    Nguyen, Tuan T.; Dahl, Vedrana Andersen; Bærentzen, J. Andreas

    2017-01-01

    This paper proposes the cache-mesh, a dynamic mesh data structure in 3D that allows modifications of stored topological relations effortlessly. The cache-mesh can adapt to arbitrary problems and provide fast retrieval to the most-referred-to topological relations. This adaptation requires trivial...... of the cache-mesh, and the extra work for caching is also trivial. Though it appears that it takes effort for initial implementation, building the cache-mesh is comparable to a traditional mesh in terms of implementation....

  12. Meat and Dairy Goats in Cache County

    OpenAIRE

    Extension, USU

    2000-01-01

    Cache County, like other counties in the Western United States, is experiencing a major transition in land use. Though we still have a host of relatively large acreage, well managed crop and livestock farms, the number of smaller acreages is increasing.

  13. Corvid Caching : Insights From a Cognitive Model

    NARCIS (Netherlands)

    van der Vaart, Elske; Verbrugge, Rineke; Hemelrijk, Charlotte K.

    Caching and recovery of food by corvids is well-studied, but some ambiguous results remain. To help clarify these, we built a computational cognitive model. It is inspired by similar models built for humans, and it assumes that memory strength depends on frequency and recency of use. We compared our

  14. The Cost of Cache-Oblivious Searching

    DEFF Research Database (Denmark)

    Bender, Michael A.; Brodal, Gert Stølting; Fagerberg, Rolf

    2003-01-01

    Tight bounds on the cost of cache-oblivious searching are proved. It is shown that no cache-oblivious search structure can guarantee that a search performs fewer than lg e log B N block transfers between any two levels of the memory hierarchy. This lower bound holds even if all of the block sizes......, multilevel memory hierarchies can be modelled. It is shown that as k grows, the search costs of the optimal k-level DAM search structure and of the optimal cache-oblivious search structure rapidly converge. This demonstrates that for a multilevel memory hierarchy, a simple cache-oblivious structure almost...... are limited to be powers of 2. A modied version of the van Emde Boas layout is proposed, whose expected block transfers between any two levels of the memory hierarchy arbitrarily close to [lg e +O(lg lg B = lg B)] log B N +O(1). This factor approaches lg e 1:443 as B increases. The expectation is taken over...

  15. Cache-conscious radix-decluster projections

    NARCIS (Netherlands)

    S. Manegold (Stefan); P.A. Boncz (Peter); N.J. Nes (Niels); M.L. Kersten (Martin)

    2004-01-01

    textabstractAs CPUs become more powerful with Moore's law and memory latencies stay constant, the impact of the memory access performance bottleneck continues to grow on relational operators like join, which can exhibit random access on a memory region larger than the hardware caches. While

  16. Cache-Conscious Radix-Decluster Projections

    NARCIS (Netherlands)

    S. Manegold (Stefan); P.A. Boncz (Peter); N.J. Nes (Niels); M.L. Kersten (Martin)

    2004-01-01

    textabstractAs CPUs become more powerful with Moore's law and memory latencies stay constant, the impact of the memory access performance bottleneck continues to grow on relational operators like join, which can exhibit random access on a memory region larger than the hardware caches. While

  17. C-Aware: A Cache Management Algorithm Considering Cache Media Access Characteristic in Cloud Computing

    Directory of Open Access Journals (Sweden)

    Zhu Xudong

    2013-01-01

    Full Text Available Data congestion and network delay are the important factors that affect performance of cloud computing systems. Using local disk of computing nodes as a cache can sometimes get better performance than accessing data through the network. This paper presents a storage cache placement algorithm—C-Aware, which traces history access information of cache and data source, adaptively decides whether to cache data according to cache media characteristic and current access environment, and achieves good performance under different workload on storage server. We implement this algorithm in both simulated and real environments. Our simulation results using OLTP and WebSearch traces demonstrate that C-Aware achieves better adaptability to the changes of server workload. Our benchmark results in real system show that, in the scenario where the size of local cache is half of data set, C-Aware gets nearly 80% improvement compared with traditional methods when the server is not busy and still presents comparable performance when there is high workload on server side.

  18. Integration of recommender system for Web cache management

    Directory of Open Access Journals (Sweden)

    Pattarasinee Bhattarakosol

    2013-06-01

    Full Text Available Web caching is widely recognised as an effective technique that improves the quality of service over the Internet, such as reduction of user latency and network bandwidth usage. However, this method has limitations due to hardware and management policies of caches. The Behaviour-Based Cache Management Model (BBCMM is therefore proposed as an alternative caching architecture model with the integration of a recommender system. This architecture is a cache grouping mechanism where browsing characteristics are applied to improve the performance of the Internet services. The results indicate that the byte hit rate of the new architecture increases by more than 18% and the delay measurement drops by more than 56%. In addition, a theoretical comparison between the proposed model and the traditional cooperative caching models shows a performance improvement of the proposed model in the cache system.

  19. Multi-level Hybrid Cache: Impact and Feasibility

    Energy Technology Data Exchange (ETDEWEB)

    Zhang, Zhe [ORNL; Kim, Youngjae [ORNL; Ma, Xiaosong [ORNL; Shipman, Galen M [ORNL; Zhou, Yuanyuan [University of California, San Diego

    2012-02-01

    Storage class memories, including flash, has been attracting much attention as promising candidates fitting into in today's enterprise storage systems. In particular, since the cost and performance characteristics of flash are in-between those of DRAM and hard disks, it has been considered by many studies as an secondary caching layer underneath main memory cache. However, there has been a lack of studies of correlation and interdependency between DRAM and flash caching. This paper views this problem as a special form of multi-level caching, and tries to understand the benefits of this multi-level hybrid cache hierarchy. We reveal that significant costs could be saved by using Flash to reduce the size of DRAM cache, while maintaing the same performance. We also discuss design challenges of using flash in the caching hierarchy and present potential solutions.

  20. Alfalfa Weevil in Utah

    OpenAIRE

    Evans, Edward W.

    1989-01-01

    The alfalfa weevil is a major pest throughout Utah. It is a beetle with one generation per year. Eggs hatch in the spring, and the grub-like immature weevils (larvae) feed by chewing on the alfalfa foliage. In high numbers, alfalfa weevils can cause severe damage to Utah alfalfa. In any given year, however, the weevils are few enough in number in many fields to cause only minor damage.

  1. The oldest vertebrate trace fossils from Comb Ridge (Bears Ears Region, southeastern Utah)

    OpenAIRE

    Gay, Robert J.; Jenkins, Xavier A.; Lepore, Taormina

    2017-01-01

    Vertebrate trace fossils are common in Upper Triassic deposits across the American southwest. These ichnofauna are dominated by Grallator, Brachychirotherium, and Pseudotetrasauropus, and lack ichnotaxa traditionally considered to be Early Jurassic in age, such as Eubrontes and Anomoepus. While known from Indian Creek and Lisbon Valley, Utah, vertebrate trace fossils have not been previously reported from Comb Ridge, Utah. This is significant considering that lithostratigraphic work has been ...

  2. Scatter hoarding by the Central American agouti : a test of optimal cache spacing theory

    NARCIS (Netherlands)

    Galvez, Dumas; Kranstauber, Bart; Kays, Roland W.; Jansen, Patrick A.

    2009-01-01

    Optimal cache spacing theory predicts that scatter-hoarding animals store food at a density that balances the gains of reducing cache robbery against the costs of spacing out caches further. We tested the key prediction that cache robbery and cache spacing increase with the economic value of food:

  3. Scatter hoarding by the Central American agouti: a test of optimal cache spacing theory

    NARCIS (Netherlands)

    Gálvez, D.; Kranstauber, B.; Kays, R.W.; Jansen, P.A.

    2009-01-01

    Optimal cache spacing theory predicts that scatter-hoarding animals store food at a density that balances the gains of reducing cache robbery against the costs of spacing out caches further. We tested the key prediction that cache robbery and cache spacing increase with the economic value of food:

  4. Cache write generate for parallel image processing on shared memory architectures.

    Science.gov (United States)

    Wittenbrink, C M; Somani, A K; Chen, C H

    1996-01-01

    We investigate cache write generate, our cache mode invention. We demonstrate that for parallel image processing applications, the new mode improves main memory bandwidth, CPU efficiency, cache hits, and cache latency. We use register level simulations validated by the UW-Proteus system. Many memory, cache, and processor configurations are evaluated.

  5. Cooperative Caching Framework for Mobile Cloud Computing

    OpenAIRE

    Joy, Preetha Theresa; Jacob, K. Poulose

    2013-01-01

    Due to the advancement in mobile devices and wireless networks mobile cloud computing, which combines mobile computing and cloud computing has gained momentum since 2009. The characteristics of mobile devices and wireless network makes the implementation of mobile cloud computing more complicated than for fixed clouds. This section lists some of the major issues in Mobile Cloud Computing. One of the key issues in mobile cloud computing is the end to end delay in servicing a request. Data cach...

  6. Virentrack: A heuristic for reducing cache contention

    OpenAIRE

    Kumar, Viren

    2009-01-01

    Multicore processors are the dominant paradigm in mainstream computing for the present and foreseeable future. Current operating system schedulers on multicore systems co-schedule applications on cores at random. This often exacerbates issues such as cache contention, leading to a performance decrease. Optimally scheduling applications to take advantage of multicore characteristics remains a difficult and open problem. In this thesis, I advocate a method of optimized scheduling on multicore sys...

  7. A Multiresolution Image Cache for Volume Rendering

    Energy Technology Data Exchange (ETDEWEB)

    LaMar, E; Pascucci, V

    2003-02-27

    The authors discuss the techniques and implementation details of the shared-memory image caching system for volume visualization and iso-surface rendering. One of the goals of the system is to decouple image generation from image display. This is done by maintaining a set of impostors for interactive display while the production of the impostor imagery is performed by a set of parallel, background processes. The system introduces a caching basis that is free of the gap/overlap artifacts of earlier caching techniques. instead of placing impostors at fixed, pre-defined positions in world space, the technique is to adaptively place impostors relative to the camera viewpoint. The positions translate with the camera but stay aligned to the data; i.e., the positions translate, but do not rotate, with the camera. The viewing transformation is factored into a translation transformation and a rotation transformation. The impostor imagery is generated using just the translation transformation and visible impostors are displayed using just the rotation transformation. Displayed image quality is improved by increasing the number of impostors and the frequency that impostors are re-rendering is improved by decreasing the number of impostors.

  8. OPTIMAL DATA REPLACEMENT TECHNIQUE FOR COOPERATIVE CACHING IN MANET

    Directory of Open Access Journals (Sweden)

    P. Kuppusamy

    2014-09-01

    Full Text Available A cooperative caching approach improves data accessibility and reduces query latency in Mobile Ad hoc Network (MANET. Maintaining the cache is challenging issue in large MANET due to mobility, cache size and power. The previous research works on caching primarily have dealt with LRU, LFU and LRU-MIN cache replacement algorithms that offered low query latency and greater data accessibility in sparse MANET. This paper proposes Memetic Algorithm (MA to locate the better replaceable data based on neighbours interest and fitness value of cached data to store the newly arrived data. This work also elects ideal CH using Meta heuristic search Ant Colony Optimization algorithm. The simulation results shown that proposed algorithm reduces the latency, control overhead and increases the packet delivery rate than existing approach by increasing nodes and speed respectively.

  9. Static analysis of worst-case stack cache behavior

    DEFF Research Database (Denmark)

    Jordan, Alexander; Brandner, Florian; Schoeberl, Martin

    2013-01-01

    Utilizing a stack cache in a real-time system can aid predictability by avoiding interference that heap memory traffic causes on the data cache. While loads and stores are guaranteed cache hits, explicit operations are responsible for managing the stack cache. The behavior of these operations can......-graph, the worst-case bounds can be efficiently yet precisely determined. Our evaluation using the MiBench benchmark suite shows that only 37% and 21% of potential stack cache operations actually store to and load from memory, respectively. Analysis times are modest, on average running between 0.46s and 1.30s per...... be analyzed statically. We present algorithms that derive worst-case bounds on the latency-inducing operations of the stack cache. Their results can be used by a static WCET tool. By breaking the analysis down into subproblems that solve intra-procedural data-flow analysis and path searches on the call...

  10. The Influence of Cache Organization on E-learning Environments

    Directory of Open Access Journals (Sweden)

    Ayman Al-Nsour

    2009-06-01

    Full Text Available In this study, the performance of an e-learning environment is analyzed and evaluated in terms of average network traffic and upload/download rates under various cache memory organizations. In particular, we study the influence of three cache organizations, namely fully associative, direct, and set associative caches. As a result of this work, we recommend the set associative cache memory organization with the LFU replacement policy, as this led to optimal performance in e-learning environments with the highest hit ratio and upload/download rates.

  11. Cache-based error recovery for shared memory multiprocessor systems

    Science.gov (United States)

    Wu, Kun-Lung; Fuchs, W. Kent; Patel, Janak H.

    1989-01-01

    A multiprocessor cache-based checkpointing and recovery scheme for of recovering from transient processor errors in a shared-memory multiprocessor with private caches is presented. New implementation techniques that use checkpoint identifiers and recovery stacks to reduce performance degradation in processor utilization during normal execution are examined. This cache-based checkpointing technique prevents rollback propagation, provides for rapid recovery, and can be integrated into standard cache coherence protocols. An analytical model is used to estimate the relative performance of the scheme during normal execution. Extensions that take error latency into account are presented.

  12. Corvid re-caching without 'theory of mind': a model.

    Directory of Open Access Journals (Sweden)

    Elske van der Vaart

    Full Text Available Scrub jays are thought to use many tactics to protect their caches. For instance, they predominantly bury food far away from conspecifics, and if they must cache while being watched, they often re-cache their worms later, once they are in private. Two explanations have been offered for such observations, and they are intensely debated. First, the birds may reason about their competitors' mental states, with a 'theory of mind'; alternatively, they may apply behavioral rules learned in daily life. Although this second hypothesis is cognitively simpler, it does seem to require a different, ad-hoc behavioral rule for every caching and re-caching pattern exhibited by the birds. Our new theory avoids this drawback by explaining a large variety of patterns as side-effects of stress and the resulting memory errors. Inspired by experimental data, we assume that re-caching is not motivated by a deliberate effort to safeguard specific caches from theft, but by a general desire to cache more. This desire is brought on by stress, which is determined by the presence and dominance of onlookers, and by unsuccessful recovery attempts. We study this theory in two experiments similar to those done with real birds with a kind of 'virtual bird', whose behavior depends on a set of basic assumptions about corvid cognition, and a well-established model of human memory. Our results show that the 'virtual bird' acts as the real birds did; its re-caching reflects whether it has been watched, how dominant its onlooker was, and how close to that onlooker it has cached. This happens even though it cannot attribute mental states, and it has only a single behavioral rule assumed to be previously learned. Thus, our simulations indicate that corvid re-caching can be explained without sophisticated social cognition. Given our specific predictions, our theory can easily be tested empirically.

  13. Clark’s Nutcrackers (Nucifraga columbiana Flexibly Adapt Caching Behaviour to a Cooperative Context

    Directory of Open Access Journals (Sweden)

    Dawson Clary

    2016-10-01

    Full Text Available Corvids recognize when their caches are at risk of being stolen by others and have developed strategies to protect these caches from pilferage. For instance, Clark’s nutcrackers will suppress the number of caches they make if being observed by a potential thief. However, cache protection has most often been studied using competitive contexts, so it is unclear whether corvids can adjust their caching in beneficial ways to accommodate non-competitive situations. Therefore, we examined whether Clark’s nutcrackers, a non-social corvid, would flexibly adapt their caching behaviours to a cooperative context. To do so, birds were given a caching task during which caches made by one individual were reciprocally exchanged for the caches of a partner bird over repeated trials. In this scenario, if caching behaviours can be flexibly deployed, then the birds should recognize the cooperative nature of the task and maintain or increase caching levels over time. However, if cache protection strategies are applied independent of social context and simply in response to cache theft, then cache suppression should occur. In the current experiment, we found that the birds maintained caching throughout the experiment. We report that males increased caching in response to a manipulation in which caches were artificially added, suggesting the birds could adapt to the cooperative nature of the task. Additionally, we show that caching decisions were not solely due to motivational factors, instead showing an additional influence attributed to the behaviour of the partner bird.

  14. Utah Bouguer Gravity Grid

    Data.gov (United States)

    National Oceanic and Atmospheric Administration, Department of Commerce — A 2.5 kilometer Bouguer anomaly grid for the state of Utah. Number of columns is 196 and number of rows is 245. The order of the data is from the lower left to the...

  15. Cache directory lookup reader set encoding for partial cache line speculation support

    Science.gov (United States)

    Gara, Alan; Ohmacht, Martin

    2014-10-21

    In a multiprocessor system, with conflict checking implemented in a directory lookup of a shared cache memory, a reader set encoding permits dynamic recordation of read accesses. The reader set encoding includes an indication of a portion of a line read, for instance by indicating boundaries of read accesses. Different encodings may apply to different types of speculative execution.

  16. Instant Varnish Cache how-to

    CERN Document Server

    Moutinho, Roberto

    2013-01-01

    Filled with practical, step-by-step instructions and clear explanations for the most important and useful tasks. Get the job done and learn as you go. Easy-to-follow, step-by-step recipes which will get you started with Varnish Cache. Practical examples will help you to get set up quickly and easily.This book is aimed at system administrators and web developers who need to scale websites without tossing money on a large and costly infrastructure. It's assumed that you have some knowledge of the HTTP protocol, how browsers and server communicate with each other, and basic Linux systems.

  17. Cache timing attacks on recent microarchitectures

    DEFF Research Database (Denmark)

    Andreou, Alexandres; Bogdanov, Andrey; Tischhauser, Elmar Wolfgang

    2017-01-01

    AES or similar algorithms in virtualized environments. This paper applies variants of this cache timing attack to Intel's latest generation of microprocessors. It enables a spy-process to recover cryptographic keys, interacting with the victim processes only over TCP. The threat model is a logically...... separated but CPU co-located attacker with root privileges. We report successful and practically verified applications of this attack against a wide range of microarchitectures, from a two-core Nehalem processor (i5-650) to two-core Haswell (i7-4600M) and four-core Skylake processors (i7-6700). The attack...

  18. Formal verification of an MMU and MMU cache

    Science.gov (United States)

    Schubert, E. T.

    1991-01-01

    We describe the formal verification of a hardware subsystem consisting of a memory management unit and a cache. These devices are verified independently and then shown to interact correctly when composed. The MMU authorizes memory requests and translates virtual addresses to real addresses. The cache improves performance by maintaining a LRU (least recently used) list from the memory resident segment table.

  19. Design Space Exploration of Object Caches with Cross-Profiling

    DEFF Research Database (Denmark)

    Schoeberl, Martin; Binder, Walter; Villazon, Alex

    2011-01-01

    . However, before implementing such an object cache, an empirical analysis of different organization forms is needed. We use a cross-profiling technique based on aspect-oriented programming in order to evaluate different object cache organizations with standard Java benchmarks. From the evaluation we...

  20. Smart Caching for Efficient Information Sharing in Distributed Information Systems

    Science.gov (United States)

    2008-09-01

    Leighton, Matthew Levine, Daniel Lewin , Rina Panigrahy (1997), “Consistent Hashing and Random Trees: Distributed Caching Protocols for Relieving Hot...Danzig, Chuck Neerdaels, Michael Schwartz and Kurt Worrell (1996), “A Hierarchical Internet Object Cache,” in USENIX Proceedings, 1996. 51 INITIAL

  1. Test Set Development for Cache Memory in Modern Microprocessors

    NARCIS (Netherlands)

    Al-Ars, Z.; Hamdioui, S.; Gaydadjiev, G.; Vassiliadis, S.

    2008-01-01

    Up to 53% of the time spent on testing current Intel microprocessors is needed to test on-chip caches, due to the high complexity of memory tests and to the large amount of transistors dedicated to such memories. This paper discusses the methodology used to develop effective and efficient cache

  2. Best Practice for Caching of Single-Path Code

    DEFF Research Database (Denmark)

    Schoeberl, Martin; Cilku, Bekim; Prokesch, Daniel

    2017-01-01

    Single-path code has some unique properties that make it interesting to explore different caching and prefetching alternatives for the stream of instructions. In this paper, we explore different cache organizations and how they perform with single-path code....

  3. Evidence for cache surveillance by a scatter-hoarding rodent

    NARCIS (Netherlands)

    Hirsch, B. T.; Kays, R.; Jansen, P. A.

    The mechanisms by which food-hoarding animals are capable of remembering the locations of numerous cached food items over long time spans has been the focus of intensive research. The 'memory enhancement hypothesis' states that hoarders reinforce spatial memory of their caches by repeatedly

  4. Evidence for cache surveillance by a scatter-hoarding rodent

    NARCIS (Netherlands)

    Hirsch, B.T.; Kays, R.; Jansen, P.A.

    2013-01-01

    The mechanisms by which food-hoarding animals are capable of remembering the locations of numerous cached food items over long time spans has been the focus of intensive research. The ‘memory enhancement hypothesis’ states that hoarders reinforce spatial memory of their caches by repeatedly

  5. Experimental Results of Rover-Based Coring and Caching

    Science.gov (United States)

    Backes, Paul G.; Younse, Paulo; DiCicco, Matthew; Hudson, Nicolas; Collins, Curtis; Allwood, Abigail; Paolini, Robert; Male, Cason; Ma, Jeremy; Steele, Andrew; hide

    2011-01-01

    Experimental results are presented for experiments performed using a prototype rover-based sample coring and caching system. The system consists of a rotary percussive coring tool on a five degree-of-freedom manipulator arm mounted on a FIDO-class rover and a sample caching subsystem mounted on the rover. Coring and caching experiments were performed in a laboratory setting and in a field test at Mono Lake, California. Rock abrasion experiments using an abrading bit on the coring tool were also performed. The experiments indicate that the sample acquisition and caching architecture is viable for use in a 2018 timeframe Mars caching mission and that rock abrasion using an abrading bit may be feasible in place of a dedicated rock abrasion tool.

  6. Cache Timing Analysis of LFSR-based Stream Ciphers

    DEFF Research Database (Denmark)

    Zenner, Erik; Leander, Gregor; Hawkes, Philip

    2009-01-01

    Cache timing attacks are a class of side-channel attacks that is applicable against certain software implementations. They have generated significant interest when demonstrated against the Advanced Encryption Standard (AES), but have more recently also been applied against other cryptographic...... primitives. In this paper, we give a cache timing cryptanalysis of stream ciphers using word-based linear feedback shift registers (LFSRs), such as Snow, Sober, Turing, or Sosemanuk. Fast implementations of such ciphers use tables that can be the target for a cache timing attack. Assuming that a small number...... of noise-free cache timing measurements are possible, we describe a general framework showing how the LFSR state for any such cipher can be recovered using very little computational effort. For the ciphers mentioned above, we show how this knowledge can be turned into efficient cache-timing attacks against...

  7. Compiler-Enforced Cache Coherence Using a Functional Language

    Directory of Open Access Journals (Sweden)

    Rich Wolski

    1996-01-01

    Full Text Available The cost of hardware cache coherence, both in terms of execution delay and operational cost, is substantial for scalable systems. Fortunately, compiler-generated cache management can reduce program serialization due to cache contention; increase execution performance; and reduce the cost of parallel systems by eliminating the need for more expensive hardware support. In this article, we use the Sisal functional language system as a vehicle to implement and investigate automatic, compiler-based cache management. We describe our implementation of Sisal for the IBM Power/4. The Power/4, briefly available as a product, represents an early attempt to build a shared memory machine that relies strictly on the language system for cache coherence. We discuss the issues associated with deterministic execution and program correctness on a system without hardware coherence, and demonstrate how Sisal (as a functional language is able to address those issues.

  8. A Refreshable, On-line Cache for HST Data Retrieval

    Science.gov (United States)

    Fraquelli, Dorothy A.; Ellis, Tracy A.; Ridgaway, Michael; DPAS Team

    2016-01-01

    We discuss upgrades to the HST Data Processing System, with an emphasis on the changes Hubble Space Telescope (HST) Archive users will experience. In particular, data are now held on-line (in a cache) removing the need to reprocess the data every time they are requested from the Archive. OTFR (on the fly reprocessing) has been replaced by a reprocessing system, which runs in the background. Data in the cache are automatically placed in the reprocessing queue when updated calibration reference files are received or when an improved calibration algorithm is installed. Data in the on-line cache are expected to be the most up to date version. These changes were phased in throughout 2015 for all active instruments.The on-line cache was populated instrument by instrument over the course of 2015. As data were placed in the cache, the flag that triggers OTFR was reset so that OTFR no longer runs on these data. "Hybrid" requests to the Archive are handled transparently, with data not yet in the cache provided via OTFR and the remaining data provided from the cache. Users do not need to make separate requests.Users of the MAST Portal will be able to download data from the cache immediately. For data not in the cache, the Portal will send the user to the standard "Retrieval Options Page," allowing the user to direct the Archive to process and deliver the data.The classic MAST Search and Retrieval interface has the same look and feel as previously. Minor changes, unrelated to the cache, have been made to the format of the Retrieval Options Page.

  9. 20-year study of Barn Owl (Tyto alba) reproduction in northern Utah

    Science.gov (United States)

    Carl D. Marti

    1997-01-01

    I studied reproduction of the Barn Owl (Tyto alba) in northern Utah from 1977 through 1996 documenting 451 nesting attempts by at least 500 individuals. The study site was a narrow valley bounded by the Wasatch Mountains and the Great Salt Lake. This area was formerly shrubsteppe desert, but that community is now entirely supplanted by irrigated...

  10. Cache Memory: An Analysis on Replacement Algorithms and Optimization Techniques

    Directory of Open Access Journals (Sweden)

    QAISAR JAVAID

    2017-10-01

    Full Text Available Caching strategies can improve the overall performance of a system by allowing the fast processor and slow memory to at a same pace. One important factor in caching is the replacement policy. Advancement in technology results in evolution of a huge number of techniques and algorithms implemented to improve cache performance. In this paper, analysis is done on different cache optimization techniques as well as replacement algorithms. Furthermore this paper presents a comprehensive statistical comparison of cache optimization techniques.To the best of our knowledge there is no numerical measure which can tell us the rating of specific cache optimization technique. We tried to come up with such a numerical figure. By statistical comparison we find out which technique is more consistent among all others. For said purpose we calculated mean and CV (Coefficient of Variation. CV tells us about which technique is more consistent. Comparative analysis of different techniques shows that victim cache has more consistent technique among all.

  11. A two-level cache for distributed information retrieval in search engines.

    Science.gov (United States)

    Zhang, Weizhe; He, Hui; Ye, Jianwei

    2013-01-01

    To improve the performance of distributed information retrieval in search engines, we propose a two-level cache structure based on the queries of the users' logs. We extract the highest rank queries of users from the static cache, in which the queries are the most popular. We adopt the dynamic cache as an auxiliary to optimize the distribution of the cache data. We propose a distribution strategy of the cache data. The experiments prove that the hit rate, the efficiency, and the time consumption of the two-level cache have advantages compared with other structures of cache.

  12. Cache and memory hierarchy design a performance directed approach

    CERN Document Server

    Przybylski, Steven A

    1991-01-01

    An authoritative book for hardware and software designers. Caches are by far the simplest and most effective mechanism for improving computer performance. This innovative book exposes the characteristics of performance-optimal single and multi-level cache hierarchies by approaching the cache design process through the novel perspective of minimizing execution times. It presents useful data on the relative performance of a wide spectrum of machines and offers empirical and analytical evaluations of the underlying phenomena. This book will help computer professionals appreciate the impact of ca

  13. Efficient Context Switching for the Stack Cache: Implementation and Analysis

    DEFF Research Database (Denmark)

    Abbaspourseyedi, Sahar; Brandner, Florian; Naji, Amine

    2015-01-01

    The design of tailored hardware has proven a successful strategy to reduce the timing analysis overhead for (hard) real-time systems. The stack cache is an example of such a design that has been proven to provide good average-case performance, while being easy to analyze. So far, however, the ana...... and restored when a task is preempted. We propose (a) an analysis exploiting the simplicity of the stack cache to bound the overhead induced by task pre-emption and (b) an extension of the design that allows to (partially) hide the overhead by virtualizing stack caches....

  14. A Software Managed Stack Cache for Real-Time Systems

    DEFF Research Database (Denmark)

    Jordan, Alexander; Abbaspourseyedi, Sahar; Schoeberl, Martin

    2016-01-01

    to scratchpad memory regions aids predictability, it is limited to non-recursive programs and static allocation has to take different calling contexts into account. Using a stack cache that dynamically spills data to and fills data from external memory avoids these problems, while its simple design allows...... for efficiently deriving worst-case bounds through static analysis. In this paper we present the design and implementation of software managed caching of stack allocated data in a scratchpad memory. We demonstrate a compiler-aided implementation of a stack cache using the LLVM compiler framework and report on its...

  15. Performance of defect-tolerant set-associative cache memories

    Science.gov (United States)

    Frenzel, J. F.

    1991-01-01

    The increased use of on-chip cache memories has led researchers to investigate their performance in the presence of manufacturing defects. Several techniques for yield improvement are discussed and results are presented which indicate that set-associativity may be used to provide defect tolerance as well as improve the cache performance. Tradeoffs between several cache organizations and replacement strategies are investigated and it is shown that token-based replacement may be a suitable alternative to the widely-used LRU strategy.

  16. Error recovery in shared memory multiprocessors using private caches

    Science.gov (United States)

    Wu, Kun-Lung; Fuchs, W. Kent; Patel, Janak H.

    1990-01-01

    The problem of recovering from processor transient faults in shared memory multiprocesses systems is examined. A user-transparent checkpointing and recovery scheme using private caches is presented. Processes can recover from errors due to faulty processors by restarting from the checkpointed computation state. Implementation techniques using checkpoint identifiers and recovery stacks are examined as a means of reducing performance degradation in processor utilization during normal execution. This cache-based checkpointing technique prevents rollback propagation, provides rapid recovery, and can be integrated into standard cache coherence protocols. An analytical model is used to estimate the relative performance of the scheme during normal execution. Extensions to take error latency into account are presented.

  17. A distributed storage system with dCache

    DEFF Research Database (Denmark)

    Behrmann, Gerd; Fuhrmann, Patrick; Grønager, Michael

    2008-01-01

    The LCG collaboration is encompassed by a number of Tier 1 centers. The Nordic LCG Tier 1, operated by NDGF, is in contrast to many other Tier 1 centers distributed over the Nordic countries. A distributed setup was chosen for both political and technical reasons, but also provides a number...... of unique challenges. dCache is well known and respected as a powerful distributed storage resource manager, and was chosen for implementing the storage aspects of the Nordic Tier 1. In contrast to classic dCache deployments, we deploy dCache over a WAN with limited bandwidth, high latency, frequent network...

  18. Finite Automata Implementations Considering CPU Cache

    Directory of Open Access Journals (Sweden)

    J. Holub

    2007-01-01

    Full Text Available The finite automata are mathematical models for finite state systems. More general finite automaton is the nondeterministic finite automaton (NFA that cannot be directly used. It is usually transformed to the deterministic finite automaton (DFA that then runs in time O(n, where n is the size of the input text. We present two main approaches to practical implementation of DFA considering CPU cache. The first approach (represented by Table Driven and Hard Coded implementations is suitable forautomata being run very frequently, typically having cycles. The other approach is suitable for a collection of automata from which various automata are retrieved and then run. This second kind of automata are expected to be cycle-free. 

  19. Coupling between Chemical and Meteorological Processes under Persistent Cold-Air Pool Conditions: Evolution of Wintertime PM2.5 Pollution Events and N2O5 Observations in Utah's Salt Lake Valley.

    Science.gov (United States)

    Baasandorj, Munkhbayar; Hoch, Sebastian W; Bares, Ryan; Lin, John C; Brown, Steven S; Millet, Dylan B; Martin, Randal; Kelly, Kerry; Zarzana, Kyle J; Whiteman, C David; Dube, William P; Tonnesen, Gail; Jaramillo, Isabel Cristina; Sohl, John

    2017-06-06

    The Salt Lake Valley experiences severe fine particulate matter pollution episodes in winter during persistent cold-air pools (PCAPs). We employ measurements throughout an entire winter from different elevations to examine the chemical and dynamical processes driving these episodes. Whereas primary pollutants such as NOx and CO were enhanced twofold during PCAPs, O3 concentrations were approximately threefold lower. Atmospheric composition varies strongly with altitude within a PCAP at night with lower NOx and higher oxidants (O3) and oxidized reactive nitrogen (N2O5) aloft. We present observations of N2O5 during PCAPs that provide evidence for its role in cold-pool nitrate formation. Our observations suggest that nighttime and early morning chemistry in the upper levels of a PCAP plays an important role in aerosol nitrate formation. Subsequent daytime mixing enhances surface PM2.5 by dispersing the aerosol throughout the PCAP. As pollutants accumulate and deplete oxidants, nitrate chemistry becomes less active during the later stages of the pollution episodes. This leads to distinct stages of PM2.5 pollution episodes, starting with a period of PM2.5 buildup and followed by a period with plateauing concentrations. We discuss the implications of these findings for mitigation strategies.

  20. Automated Cache Performance Analysis And Optimization

    Energy Technology Data Exchange (ETDEWEB)

    Mohror, Kathryn [Lawrence Livermore National Lab. (LLNL), Livermore, CA (United States)

    2013-12-23

    While there is no lack of performance counter tools for coarse-grained measurement of cache activity, there is a critical lack of tools for relating data layout to cache behavior to application performance. Generally, any nontrivial optimizations are either not done at all, or are done ”by hand” requiring significant time and expertise. To the best of our knowledge no tool available to users measures the latency of memory reference instructions for partic- ular addresses and makes this information available to users in an easy-to-use and intuitive way. In this project, we worked to enable the Open|SpeedShop performance analysis tool to gather memory reference latency information for specific instructions and memory ad- dresses, and to gather and display this information in an easy-to-use and intuitive way to aid performance analysts in identifying problematic data structures in their codes. This tool was primarily designed for use in the supercomputer domain as well as grid, cluster, cloud-based parallel e-commerce, and engineering systems and middleware. Ultimately, we envision a tool to automate optimization of application cache layout and utilization in the Open|SpeedShop performance analysis tool. To commercialize this soft- ware, we worked to develop core capabilities for gathering enhanced memory usage per- formance data from applications and create and apply novel methods for automatic data structure layout optimizations, tailoring the overall approach to support existing supercom- puter and cluster programming models and constraints. In this Phase I project, we focused on infrastructure necessary to gather performance data and present it in an intuitive way to users. With the advent of enhanced Precise Event-Based Sampling (PEBS) counters on recent Intel processor architectures and equivalent technology on AMD processors, we are now in a position to access memory reference information for particular addresses. Prior to the introduction of PEBS counters

  1. Results of a conservation agreement and strategy for Rabbit Valley gilia (Gilia caespitosa)

    Science.gov (United States)

    L. A. Armstrong; T. O. Clark; R. B. Campbell

    2001-01-01

    Gilia caespitosa Gray (Rabbit Valley gilia) is a rare species restricted to scattered occurrences from the northern Waterpocket Fold to Thousand Lakes Mountain and Rabbit Valley in Wayne County, Utah. This species is a very narrow endemic, known only from unstable and faulting soils of detrital Navajo Sandstone. Species occurrences are often found with limited numbers...

  2. NIC atomic operation unit with caching and bandwidth mitigation

    Energy Technology Data Exchange (ETDEWEB)

    Hemmert, Karl Scott; Underwood, Keith D.; Levenhagen, Michael J.

    2016-03-01

    A network interface controller atomic operation unit and a network interface control method comprising, in an atomic operation unit of a network interface controller, using a write-through cache and employing a rate-limiting functional unit.

  3. Reducing Soft-error Vulnerability of Caches using Data Compression

    Energy Technology Data Exchange (ETDEWEB)

    Mittal, Sparsh [ORNL; Vetter, Jeffrey S [ORNL

    2016-01-01

    With ongoing chip miniaturization and voltage scaling, particle strike-induced soft errors present increasingly severe threat to the reliability of on-chip caches. In this paper, we present a technique to reduce the vulnerability of caches to soft-errors. Our technique uses data compression to reduce the number of vulnerable data bits in the cache and performs selective duplication of more critical data-bits to provide extra protection to them. Microarchitectural simulations have shown that our technique is effective in reducing architectural vulnerability factor (AVF) of the cache and outperforms another technique. For single and dual-core system configuration, the average reduction in AVF is 5.59X and 8.44X, respectively. Also, the implementation and performance overheads of our technique are minimal and it is useful for a broad range of workloads.

  4. Data Resilience in the dCache Storage System

    Science.gov (United States)

    Rossi, A. L.; Adeyemi, F.; Ashish, A.; Behrmann, G.; Fuhrmann, P.; Litvintsev, D.; Millar, P.; Mkrtchyan, T.; Mohiuddin, A.; Sahakyan, M.; Starek, J.; Yasar, S.

    2017-10-01

    In this paper we discuss design, implementation considerations, and performance of a new Resilience Service in the dCache storage system responsible for file availability and durability functionality.

  5. Distributed caching mechanism for various MPE software services

    CERN Document Server

    Svec, Andrej

    2017-01-01

    The MPE Software Section provides multiple software services to facilitate the testing and the operation of the CERN Accelerator complex. Continuous growth in the number of users and the amount of processed data result in the requirement of high scalability. Our current priority is to move towards a distributed and properly load balanced set of services based on containers. The aim of this project is to implement the generic caching mechanism applicable to our services and chosen architecture. The project will at first require research about the different aspects of distributed caching (persistence, no gc-caching, cache consistency etc.) and the available technologies followed by the implementation of the chosen solution. In order to validate the correctness and performance of the implementation in the last phase of the project it will be required to implement a monitoring layer and integrate it with the current ELK stack.

  6. Caching Strategy Based on Hierarchical Cluster for Named Data Networking

    National Research Council Canada - National Science Library

    Yan, Huan; Gao, Deyun; Su, Wei; Foh, Chuan Heng; Zhang, Hongke; Vasilakos, Athanasios V

    2017-01-01

    The in-network caching strategy in named data networking can not only reduce the unnecessary fetching of content from the original content server deep in the core network and improve the user response...

  7. Cache River National Wildlife Refuge Water Resource Inventory and Assessment

    Data.gov (United States)

    US Fish and Wildlife Service, Department of the Interior — This Water Resource Inventory and Assessment (WRIA) for Cache River National Wildlife Refuge summarizes available and relevant information for refuge water...

  8. STANSBURY ROADLESS AREAS, UTAH.

    Science.gov (United States)

    Sorensen, Martin L.; Kness, Richard F.

    1984-01-01

    A mineral-resource survey of the Stansbury Roadless Areas, Utah was conducted and showed that there is little likelihood for the occurrence of metallic mineral resources in the areas. Limestone and dolomite underlie approximately 50 acres in the roadless areas and constitute a nonmetallic mineral resource of undetermined value. The oil and gas potential is not known and cannot be assessed without exploratory geophysical and drilling programs. There are no known geothermal resources. An extensive program of geophysical exploration and exploratory drilling would be necessary to determine the potential for oil and gas in the Stansbury Roadless Areas.

  9. Energy Constraint Node Cache Based Routing Protocol For Adhoc Network

    OpenAIRE

    Dhiraj Nitnaware; Ajay Verma

    2010-01-01

    Mobile Adhoc Networks (MANETs) is a wireless infrastructureless network, where nodes are free to move independently in any direction. The nodes have limited battery power; hence we require energy efficient routing protocols to optimize network performance. This paper aims to develop a new routing algorithm based on the energy status of the node cache. We have named this algorithm as ECNC_AODV (Energy Constraint Node Cache) based routing protocol which is derived from the AODV protocol. The al...

  10. Food caching in orb-web spiders (Araneae: Araneoidea)

    Science.gov (United States)

    Champion de Crespigny, Fleur E.; Herberstein, Marie E.; Elgar, Mark A.

    2001-01-01

    Caching or storing surplus prey may reduce the risk of starvation during periods of food deprivation. While this behaviour occurs in a variety of birds and mammals, it is infrequent among invertebrates. However, golden orb-web spiders, Nephila edulis, incorporate a prey cache in their relatively permanent web, which they feed on during periods of food shortage. Heavier spiders significantly reduced weight loss if they were able to access a cache, but lost weight if the cache was removed. The presence or absence of stored prey had no effect on the weight loss of lighter spiders. Furthermore, N. edulis always attacked new prey, irrespective of the number of unprocessed prey in the web. In contrast, females of Argiope keyserlingi, who build a new web every day and do not cache prey, attacked fewer new prey items if some had already been caught. Thus, a necessary pre-adaptation to the evolution of prey caching in orb-web spiders may be a durable or permanent web, such as that constructed by Nephila.

  11. Binary mesh partitioning for cache-efficient visualization.

    Science.gov (United States)

    Tchiboukdjian, Marc; Danjean, Vincent; Raffin, Bruno

    2010-01-01

    One important bottleneck when visualizing large data sets is the data transfer between processor and memory. Cache-aware (CA) and cache-oblivious (CO) algorithms take into consideration the memory hierarchy to design cache efficient algorithms. CO approaches have the advantage to adapt to unknown and varying memory hierarchies. Recent CA and CO algorithms developed for 3D mesh layouts significantly improve performance of previous approaches, but they lack of theoretical performance guarantees. We present in this paper a {\\schmi O}(N\\log N) algorithm to compute a CO layout for unstructured but well shaped meshes. We prove that a coherent traversal of a N-size mesh in dimension d induces less than N/B+{\\schmi O}(N/M;{1/d}) cache-misses where B and M are the block size and the cache size, respectively. Experiments show that our layout computation is faster and significantly less memory consuming than the best known CO algorithm. Performance is comparable to this algorithm for classical visualization algorithm access patterns, or better when the BSP tree produced while computing the layout is used as an acceleration data structure adjusted to the layout. We also show that cache oblivious approaches lead to significant performance increases on recent GPU architectures.

  12. Dietary folate, vitamin B-12, vitamin B-6 and incident Alzheimer's disease: the cache county memory, health and aging study.

    Science.gov (United States)

    Nelson, C; Wengreen, H J; Munger, R G; Corcoran, C D

    2009-12-01

    To examine associations between dietary and supplemental folate, vitamin B-12 and vitamin B-6 and incident Alzheimer's disease (AD) among elderly men and women. Data collected were from participants of the Cache County Memory, Health and Aging Study, a longitudinal study of 5092 men and women 65 years and older who were residents of Cache County, Utah in 1995. Multistage clinical assessment procedures were used to identify incident cases of AD. Dietary data were collected using a 142-item food frequency questionnaire. Cox Proportional Hazards (CPH) modeling was used to determine hazard ratios across quintiles of micronutrient intake. 202 participants were diagnosed with incident AD during follow-up (1995-2004). In multivariable CPH models that controlled for the effects of gender, age, education, and other covariates there were no observed differences in risk of AD or dementia by increasing quintiles of total intake of folate, vitamin B-12, or vitamin B-6. Similarly, there were no observed differences in risk of AD by regular use of either folate or B6 supplements. Dietary intake of B-vitamins from food and supplemental sources appears unrelated to incidence of dementia and AD. Further studies examining associations between dietary intakes of B-vitamins, biomarkers of B-vitamin status and cognitive endpoints are warranted.

  13. A Fuzzy Inference System Design for ICP Protocol Optimization in Cache Appliances Hierarchies

    Directory of Open Access Journals (Sweden)

    Oscar Linares

    2007-12-01

    Full Text Available A cache appliance is a network terminal which provides cache memory functions, such as object queries service from a user; such objects could be stored in one cache or in a cache hierarchy, trying to avoid carry out service from an origin server. This cache appliance structure improves network performance and quality of service. These appliances use ICP protocol (Internet Cache Protocol to support interoperation between existing cache hierarchies and web servers, through implementation of a message format to communicate web caches. One cache sends an ICP query to its neighbors. The neighbors send back ICP replies indicating "HIT" or "MISS". When one cache faces an excessive traffic situation, that is, a very high number of service queries from users, ICP protocol may allocate the service to cache which has the desired object. Because of traffic conditions, specific appliance may congests and the requests may be refused, which can decrease network's quality of service. So, a system designed for optimizing cache allocation, considering factors as traffic and priority could be useful. This paper presents a fuzzy inference system design, which uses entries such as number of queries over a time interval and traffic tendency, and as output, the web cache allocation decision that will provides the service; this design is proposed to optimize allocation of caches into a hierarchy for network services performance, so balancing out requesting among hierarchy members and improving services performance.

  14. Pilfering Eurasian jays use visual and acoustic information to locate caches.

    Science.gov (United States)

    Shaw, Rachael C; Clayton, Nicola S

    2014-11-01

    Pilfering corvids use observational spatial memory to accurately locate caches that they have seen another individual make. Accordingly, many corvid cache-protection strategies limit the transfer of visual information to potential thieves. Eurasian jays (Garrulus glandarius) employ strategies that reduce the amount of visual and auditory information that is available to competitors. Here, we test whether or not the jays recall and use both visual and auditory information when pilfering other birds' caches. When jays had no visual or acoustic information about cache locations, the proportion of available caches that they found did not differ from the proportion expected if jays were searching at random. By contrast, after observing and listening to a conspecific caching in gravel or sand, jays located a greater proportion of caches, searched more frequently in the correct substrate type and searched in fewer empty locations to find the first cache than expected. After only listening to caching in gravel and sand, jays also found a larger proportion of caches and searched in the substrate type where they had heard caching take place more frequently than expected. These experiments demonstrate that Eurasian jays possess observational spatial memory and indicate that pilfering jays may gain information about cache location merely by listening to caching. This is the first evidence that a corvid may use recalled acoustic information to locate and pilfer caches.

  15. Lazy Spilling for a Time-Predictable Stack Cache: Implementation and Analysis

    DEFF Research Database (Denmark)

    Abbaspourseyedi, Sahar; Jordan, Alexander; Brandner, Florian

    2014-01-01

    of the cache content to main memory, if the content was not modified in the meantime. At first sight, this appears to be an average-case optimization. Indeed, measurements show that the number of cache blocks spilled is reduced to about 17% and 30% in the mean, depending on the stack cache size. Furthermore...... this problem. A stack cache, for instance, allows the compiler to efficiently cache a program's stack, while static analysis of its behavior remains easy. Likewise, its implementation requires little hardware overhead. This work introduces an optimization of the standard stack cache to avoid redundant spilling...

  16. dCache on Steroids - Delegated Storage Solutions

    Science.gov (United States)

    Mkrtchyan, T.; Adeyemi, F.; Ashish, A.; Behrmann, G.; Fuhrmann, P.; Litvintsev, D.; Millar, P.; Rossi, A.; Sahakyan, M.; Starek, J.

    2017-10-01

    For over a decade, dCache.org has delivered a robust software used at more than 80 Universities and research institutes around the world, allowing these sites to provide reliable storage services for the WLCG experiments as well as many other scientific communities. The flexible architecture of dCache allows running it in a wide variety of configurations and platforms - from a SoC based all-in-one Raspberry-Pi up to hundreds of nodes in a multipetabyte installation. Due to lack of managed storage at the time, dCache implemented data placement, replication and data integrity directly. Today, many alternatives are available: S3, GlusterFS, CEPH and others. While such solutions position themselves as scalable storage systems, they cannot be used by many scientific communities out of the box. The absence of community-accepted authentication and authorization mechanisms, the use of product specific protocols and the lack of namespace are some of the reasons that prevent wide-scale adoption of these alternatives. Most of these limitations are already solved by dCache. By delegating low-level storage management functionality to the above-mentioned new systems and providing the missing layer through dCache, we provide a solution which combines the benefits of both worlds - industry standard storage building blocks with the access protocols and authentication required by scientific communities. In this paper, we focus on CEPH, a popular software for clustered storage that supports file, block and object interfaces. CEPH is often used in modern computing centers, for example as a backend to OpenStack services. We will show prototypes of dCache running with a CEPH backend and discuss the benefits and limitations of such an approach. We will also outline the roadmap for supporting ‘delegated storage’ within the dCache releases.

  17. Field guide to geologic excursions in southwestern Utah and adjacent areas of Arizona and Nevada

    Science.gov (United States)

    Lund, William R.; Lund, William R.

    2002-01-01

    This field guide contains road logs for field trips planned in conjunction with the 2002 Rocky Mountain Section meeting of the Geological Society of America held at Southern Utah University in Cedar City, Utah. There are a total of eight field trips, covering various locations and topics in southwestern Utah and adjacent areas of Arizona and Nevada. In addition, the field guide contains a road log for a set of Geological Engineering Field Camp Exercises run annually by the University of Missouri at Rolla in and around Cedar City. Two of the field trips address structural aspects of the geology in southwestern Utah and northwestern Arizona; two trips deal with ground water in the region; and along with the Field Camp Exercises, one trip, to the Grand Staircase, is designed specifically for educators. The remaining trips examine the volcanology and mineral resources of a large area in and around the Tusher Mountains in Utah; marine and brackish water strata in the Grand Staircase-Escalante National Monument; and the Pine Valley Mountains, which are cored by what may be the largest known laccolith in the world. The "Three Corners" area of Utah, Arizona, and Nevada is home to truly world-class geology, and I am confident that all of the 2002 Rocky Mountain Section meeting attendees will find a field trip suited to their interests.

  18. The Lincoln Highway in Utah

    Data.gov (United States)

    US Fish and Wildlife Service, Department of the Interior — This guidebook is on the Lincoln Highway in the state of Utah. Its purpose is to describe as closely as possible the original route of the Highway, the major changes...

  19. Ground-water resources of the Sevier River basin between Yuba Dam and Leamington Canyon, Utah

    Science.gov (United States)

    Bjorklund, Louis Jay; Robinson, Gerald B.

    1968-01-01

    The area investigated is a segment of the Sevier River basin, Utah, comprising about 900 square miles and including a 19-mile reach of the Sevier River between Yuba Dam and Leamington Canyon. The larger valleys in the area are southern Juab, Round, and Scipio Valleys. The smaller valleys are Mills, Little, Dog, and Tinctic Wash Valleys.The geology of parts of Scipio, Little, and Mills Valleys and parts of the surrounding highlands was mapped and studied to explain the occurrence of numerous sinkholes in the thre valleys and to show their relation to the large springs in Mills Valley. The sinkholes, which are formed in the alluvium, are alined along faults, which penetrate both the alluvium and the underlying bedrock, and they have been formed by collapse of solution cavities in the underlying bedrock. The bedrock is mostly sandy limestone beds of the upper part of the North Horn Formation and of the Flagstaff Limestone. The numerous faults traversing Scipio Valley in a north-northeasterly direction trend directly toward Molter and Blue Springs in Mills Valley. One fault, which can be traced directly between the springs, probably is the principal channelway for the ground water moving from Scipio and Little Valleys to the springs.

  20. Utah Heavy Oil Program

    Energy Technology Data Exchange (ETDEWEB)

    J. Bauman; S. Burian; M. Deo; E. Eddings; R. Gani; R. Goel; C.K. Huang; M. Hogue; R. Keiter; L. Li; J. Ruple; T. Ring; P. Rose; M. Skliar; P.J. Smith; J.P. Spinti; P. Tiwari; J. Wilkey; K. Uchitel

    2009-10-20

    The Utah Heavy Oil Program (UHOP) was established in June 2006 to provide multidisciplinary research support to federal and state constituents for addressing the wide-ranging issues surrounding the creation of an industry for unconventional oil production in the United States. Additionally, UHOP was to serve as an on-going source of unbiased information to the nation surrounding technical, economic, legal and environmental aspects of developing heavy oil, oil sands, and oil shale resources. UHOP fulGilled its role by completing three tasks. First, in response to the Energy Policy Act of 2005 Section 369(p), UHOP published an update report to the 1987 technical and economic assessment of domestic heavy oil resources that was prepared by the Interstate Oil and Gas Compact Commission. The UHOP report, entitled 'A Technical, Economic, and Legal Assessment of North American Heavy Oil, Oil Sands, and Oil Shale Resources' was published in electronic and hard copy form in October 2007. Second, UHOP developed of a comprehensive, publicly accessible online repository of unconventional oil resources in North America based on the DSpace software platform. An interactive map was also developed as a source of geospatial information and as a means to interact with the repository from a geospatial setting. All documents uploaded to the repository are fully searchable by author, title, and keywords. Third, UHOP sponsored Give research projects related to unconventional fuels development. Two projects looked at issues associated with oil shale production, including oil shale pyrolysis kinetics, resource heterogeneity, and reservoir simulation. One project evaluated in situ production from Utah oil sands. Another project focused on water availability and produced water treatments. The last project considered commercial oil shale leasing from a policy, environmental, and economic perspective.

  1. Episodic-like memory during cache recovery by scrub jays.

    Science.gov (United States)

    Clayton, N S; Dickinson, A

    1998-09-17

    The recollection of past experiences allows us to recall what a particular event was, and where and when it occurred, a form of memory that is thought to be unique to humans. It is known, however, that food-storing birds remember the spatial location and contents of their caches. Furthermore, food-storing animals adapt their caching and recovery strategies to the perishability of food stores, which suggests that they are sensitive to temporal factors. Here we show that scrub jays (Aphelocoma coerulescens) remember 'when' food items are stored by allowing them to recover perishable 'wax worms' (wax-moth larvae) and non-perishable peanuts which they had previously cached in visuospatially distinct sites. Jays searched preferentially for fresh wax worms, their favoured food, when allowed to recover them shortly after caching. However, they rapidly learned to avoid searching for worms after a longer interval during which the worms had decayed. The recovery preference of jays demonstrates memory of where and when particular food items were cached, thereby fulfilling the behavioural criteria for episodic-like memory in non-human animals.

  2. Air pollution and gastrointestinal diseases in Utah

    Science.gov (United States)

    Maestas, Melissa May

    The valleys of northern Utah, where most of Utah's population resides, experience episodic air pollution events well in excess of the National Ambient Air Quality Standards. Most of the events are due to an accumulation of particulate matter during persistent cold air pools in winter from both direct emissions and secondary chemical reactions in the atmosphere. High wintertime ozone concentrations are occasionally observed in the Uintah Basin, in addition to particulate matter. At other times of the year, blowing dust, wildland fires, fireworks, and summertime ozone formation contribute to local air pollution. The objective of this dissertation is to investigate one facet of the health effects of Utah's air pollution on its residents: the acute impacts of air pollution on gastrointestinal (GI) disease. To study the health effects of these episodic pollution events, some measure of air pollution exposure must be matched to the health data. Time and place are used to link the health data for a person with the pollution data. This dissertation describes the method of kriging data from the sparse pollution monitoring network to estimate personal air pollution history based on the zip code of residence. This dissertation then describes the application of these exposure estimates to a health study on GI disease. The purpose of the GI study is to retrospectively look at two groups of patients during 2000-2014: those with autoimmune disease of the GI tract (inflammatory bowel disease, IBD) and those with allergic disease of the GI tract (eosinophilic esophagitis, EoE) to determine whether disease exacerbations occur more commonly during and following periods of poor air quality compared to periods of good air quality. The primary analysis method is case crossover design. In addition to using the kriged air pollution estimates, the analysis was repeated using simpler empirical estimation methods to assess whether the odds ratios are sensitive to the air pollution estimation

  3. Fundamental Parallel Algorithms for Private-Cache Chip Multiprocessors

    DEFF Research Database (Denmark)

    Arge, Lars Allan; Goodrich, Michael T.; Nelson, Michael

    2008-01-01

    about the way cores are interconnected, for we assume that all inter-processor communication occurs through the memory hierarchy. We study several fundamental problems, including prefix sums, selection, and sorting, which often form the building blocks of other parallel algorithms. Indeed, we present...... two sorting algorithms, a distribution sort and a mergesort. Our algorithms are asymptotically optimal in terms of parallel cache accesses and space complexity under reasonable assumptions about the relationships between the number of processors, the size of memory, and the size of cache blocks....... In addition, we study sorting lower bounds in a computational model, which we call the parallel external-memory (PEM) model, that formalizes the essential properties of our algorithms for private-cache CMPs....

  4. Valley fever

    Science.gov (United States)

    ... especially the first trimester) People of Native American, African, or Philippine descent may also get more severe ... that causes Valley fever) Chest x-ray Sputum culture Sputum smear (KOH test) Tests done for more ...

  5. Valley Fever

    Science.gov (United States)

    ... loss Headache Valley fever Symptoms & causes Diagnosis & treatment Advertisement Mayo Clinic does not endorse companies or products. ... a Job Site Map About This Site Twitter Facebook Google YouTube Pinterest Mayo Clinic is a not- ...

  6. Lock and Unlock: A Data Management Algorithm for A Security-Aware Cache

    OpenAIRE

    Inoue, Koji

    2006-01-01

    This paper proposes an efficient cache line management algorithm for a security-aware cache architecture (SCache). SCache attempts to detect the corruption of return address values at runtime. When a return address store is executed, the cache generates a replica of the return address. This copied data is treated as read only. Subsequently, when the corresponding return address load is performed, the cache verifies the return address value loaded from the memory stack by means of comparing it...

  7. The Spy in the Sandbox: Practical Cache Attacks in JavaScript and their Implications

    Science.gov (United States)

    2015-10-16

    attacks that are relevant to personal computers are cache attacks, which exploit the use of cache memory as a shared resource be- tween different...speed CPUs and a large amount of lower-speed RAM. To bridge the per- formance gap between these two components, they make use of cache memory : a...type of memory that is smaller but faster than RAM (in terms of access time). Cache memory contains a subset of the RAM’s contents recently accessed by

  8. SUCCESS Utah Polarization Diversity LIDAR data set

    Data.gov (United States)

    National Aeronautics and Space Administration — The SUCCESS_UTAH_PDL data set contains ground-based measurements made by the University of Utah Polarization Diversity LIDAR at the CART site during the April-May...

  9. Language-Based Caching of Dynamically Generated HTML

    DEFF Research Database (Denmark)

    Brabrand, Claus; Møller, Anders; Olesen, Steffan

    2002-01-01

    Increasingly, HTML documents are dynamically generated by interactive Web services. To ensure that the client is presented with the newest versions of such documents it is customary to disable client caching causing a seemingly inevitable performance penalty. In the system, dynamic HTML documents...... are composed of higher-order templates that are plugged together to construct complete documents. We show how to exploit this feature to provide an automatic fine-grained caching of document templates, based on the service source code. A service transmits not the full HTML document but instead a compact Java...

  10. A Primer on Memory Consistency and Cache Coherence

    CERN Document Server

    Sorin, Daniel; Wood, David

    2011-01-01

    Many modern computer systems and most multicore chips (chip multiprocessors) support shared memory in hardware. In a shared memory system, each of the processor cores may read and write to a single shared address space. For a shared memory machine, the memory consistency model defines the architecturally visible behavior of its memory system. Consistency definitions provide rules about loads and stores (or memory reads and writes) and how they act upon memory. As part of supporting a memory consistency model, many machines also provide cache coherence protocols that ensure that multiple cached

  11. Effectiveness of caching in a distributed digital library system

    DEFF Research Database (Denmark)

    Hollmann, J.; Ardø, Anders; Stenstrom, P.

    2007-01-01

    offers a tremendous functional advantage to a user, the fulltext download delays caused by the network and queuing in servers make the user-perceived interactive performance poor. This paper studies how effective caching of articles at the client level can be achieved as well as at intermediate points...... as manifested by gateways that implement the interfaces to the many fulltext archives. A central research question in this approach is: What is the nature of locality in the user access stream to such a digital library? Based on access logs that drive the simulations, it is shown that client-side caching can...

  12. Web proxy cache replacement strategies simulation, implementation, and performance evaluation

    CERN Document Server

    ElAarag, Hala; Cobb, Jake

    2013-01-01

    This work presents a study of cache replacement strategies designed for static web content. Proxy servers can improve performance by caching static web content such as cascading style sheets, java script source files, and large files such as images. This topic is particularly important in wireless ad hoc networks, in which mobile devices act as proxy servers for a group of other mobile devices. Opening chapters present an introduction to web requests and the characteristics of web objects, web proxy servers and Squid, and artificial neural networks. This is followed by a comprehensive review o

  13. Scatter hoarding and cache pilferage by superior competitors: an experiment with wild boar, Sus scrofa

    NARCIS (Netherlands)

    Suselbeek, L.; Adamczyk, V.M.A.P.; Bongers, F.; Nolet, B.A.; Prins, H.H.T.; Wieren, van S.E.; Jansen, P.A.

    2014-01-01

    Food-hoarding patterns range between larder hoarding (a few large caches) and scatter hoarding (many small caches), and are, in essence, the outcome of a hoard size–number trade-off in pilferage risk. Animals that scatter hoard are believed to do so, despite higher costs, to reduce loss of cached

  14. Cache directory look-up re-use as conflict check mechanism for speculative memory requests

    Science.gov (United States)

    Ohmacht, Martin

    2013-09-10

    In a cache memory, energy and other efficiencies can be realized by saving a result of a cache directory lookup for sequential accesses to a same memory address. Where the cache is a point of coherence for speculative execution in a multiprocessor system, with directory lookups serving as the point of conflict detection, such saving becomes particularly advantageous.

  15. Cache-Oblivious Implicit Predecessor Dictionaries with the Working-Set Property

    DEFF Research Database (Denmark)

    Kejlberg-Rasmussen, Casper; Brodal, Gerth Stølting

    2012-01-01

    * additional space. In the cache-oblivious model the log is base B and the cache-obliviousness is due to our black box use of an existing cache-oblivious implicit dictionary. This is the first implicit dictionary supporting predecessor and successor searches in the working-set bound. Previous implicit...

  16. Great Salt Lake, Utah

    Science.gov (United States)

    Stephens, Doyle W.; Gardner, Joe F.

    1999-01-01

    This document is intended as a source of general information and facts about Great Salt Lake, Utah. This U.S. Geological Survey information sheet answers frequently asked questions about Great Salt Lake. Topics include: History, salinity, brine shrimp, brine flies, migratory birds, and recreation. Great Salt Lake, the shrunken remnant of prehistoric Lake Bonneville, has no outlet. Dissolved salts accumulate in the lake by evaporation. Salinity south of the causeway has ranged from 6 percent to 27 percent over a period of 22 years (2 to 7 times saltier than the ocean). The high salinity supports a mineral industry that extracts about 2 million tons of salt from the lake each year. The aquatic ecosystem consists of more than 30 species of organisms. Harvest of its best-known species, the brine shrimp, annually supplies millions of pounds of food for the aquaculture industry worldwide. The lake is used extensively by millions of migratory and nesting birds and is a place of solitude for people. All this occurs in a lake that is located at the bottom of a 35,000-square-mile drainage basin that has a human population of more than 1.5 million.

  17. MX Siting Investigation. Aggregate Resources Study, Tule Valley, Utah.

    Science.gov (United States)

    1981-07-03

    and cross-stratification in sedimentary rocks: Geological Society America Bulletin, v. 64, p. 381-389. Mower, R. W. and R. M. Cordova , 1974, Water...ROCK COARSE (c) AND FINE (f) SAMPLE NOTE: SEE CORRESPONDING MAP NUMBER IN APP 6 DETAILED INFORMATION 8RC N -Q ~ .~. =Ere.~cMX SITING INV DEPARTMENT

  18. Verification Study - Wah Wah Valley, Utah. Volume I. Synthesis.

    Science.gov (United States)

    1981-03-24

    bearing ratio reported for the soil is normally the one at 0.1 inch (2.5 mm) penetration. CLAST - An individual constituent, grain, or fragment of a...tacts and define engineering characterisitics of photogeologic units. At each location, observations of grain-size distribu- tion, color, clast ...Moisture Content Density Plasticity Moisture Content Reaction to HCl Particle Shape Reaction to HCI Some additional descriptions or information recorded

  19. Assessment of LANDSAT for rangeland mapping, Rush Valley, Utah

    Science.gov (United States)

    Ridd, M. K.; Price, K. P.; Douglass, G. E.

    1984-01-01

    The feasibility of using LANDSAT MSS (multispectral scanner) data to identify and map cover types for rangeland, and to determine comparative condition of the ecotypes was assessed. A supporting objective is to assess the utility of various forms of aerial photography in the process. If rangelands can be efficiently mapped with Landsat data, as supported by appropriate aerial photography and field data, then uniform standards of cover classification and condition may be applied across the rangelands of the state. Further, a foundation may be established for long-term monitoring of range trend, using the same satellite system over time.

  20. MX Siting Investigation. Gravity Survey - Sevier Desert Valley, Utah.

    Science.gov (United States)

    1981-01-24

    Stokes, 1963). The late Triassic to early Cenozoic Sevier Orogeny accounted for the majority of the folding and faulting observed in the mountains...These instruments are sealed and compen- sated for atmospheric pressure changes. They are maintained at a constant temperature by an internal heater

  1. The Newcastle geothermal system, Iron County, Utah

    Energy Technology Data Exchange (ETDEWEB)

    Blackett, R.E.; Shubat, M.A.; Bishop, C.E. (Utah Geological and Mineral Survey, Salt Lake City, UT (USA)); Chapman, D.S.; Forster, C.B.; Schlinger, C.M. (Utah Univ., Salt Lake City, UT (USA). Dept. of Geology and Geophysics)

    1990-03-01

    Geological, geophysical and geochemical studies contributed to conceptual hydrologic model of the blind'' (no surface expression), moderate-temperature (greater than 130{degree}C) Newcastle geothermal system, located in the Basin and Range-Colorado Plateau transition zone of southwestern Utah. Temperature gradient measurements define a thermal anomaly centered near the surface trace of the range-bounding Antelope Range fault with and elongate dissipative plume extending north into the adjacent Escalante Valley. Spontaneous potential and resistivity surveys sharply define the geometry of the dominant upflow zone (not yet explored), indicating that most of the thermal fluid issues form a short segment along the Antelope Range fault and discharges into a gently-dipping aquifer. Production wells show that this aquifer lies at a depth between 85 and 95 meter. Electrical surveys also show that some leakage of thermal fluid occurs over a 1.5 km (minimum) interval along the trace of the Antelope Range fault. Major element, oxygen and hydrogen isotopic analyses of water samples indicate that the thermal fluid is a mixture of meteoric water derived from recharge areas in the Pine Valley Mountains and cold, shallow groundwater. A northwest-southeast trending system of faults, encompassing a zone of increased fracture permeability, collects meteoric water from the recharge area, allows circulation to a depth of 3 to 5 kilometers, and intersects the northeast-striking Antelope Range fault. We postulate that mineral precipitates form a seal along the Antelope Range fault, preventing the discharge of thermal fluids into basin-fill sediments at depth, and allowing heated fluid to approach the surface. Eventually, continued mineral deposition could result in the development of hot springs at the ground surface.

  2. Dynamic web cache publishing for IaaS clouds using Shoal

    Science.gov (United States)

    Gable, Ian; Chester, Michael; Armstrong, Patrick; Berghaus, Frank; Charbonneau, Andre; Leavett-Brown, Colin; Paterson, Michael; Prior, Robert; Sobie, Randall; Taylor, Ryan

    2014-06-01

    We have developed a highly scalable application, called Shoal, for tracking and utilizing a distributed set of HTTP web caches. Our application uses the Squid HTTP cache. Squid servers advertise their existence to the Shoal server via AMQP messaging by running Shoal Agent. The Shoal server provides a simple REST interface that allows clients to determine their closest Squid cache. Our goal is to dynamically instantiate Squid caches on IaaS clouds in response to client demand. Shoal provides the VMs on IaaS clouds with the location of the nearest dynamically instantiated Squid Cache.

  3. Alignment of Memory Transfers of a Time-Predictable Stack Cache

    DEFF Research Database (Denmark)

    Abbaspourseyedi, Sahar; Brandner, Florian

    2014-01-01

    Modern computer architectures use features which often complicate the WCET analysis of real-time software. Alternative time-predictable designs, and in particular caches, thus are gaining more and more interest. A recently proposed stack cache, for instance, avoids the need for the analysis...... of complex cache states. Instead, only the occupancy level of the cache has to be determined. The memory transfers generated by the standard stack cache are not generally aligned. These unaligned accesses risk to introduce complexity to the otherwise simple WCET analysis. In this work, we investigate three...... average-case performance and analysis complexity....

  4. Unfavorable Strides in Cache Memory Systems (RNR Technical Report RNR-92-015

    Directory of Open Access Journals (Sweden)

    David H. Bailey

    1995-01-01

    Full Text Available An important issue in obtaining high performance on a scientific application running on a cache-based computer system is the behavior of the cache when data are accessed at a constant stride. Others who have discussed this issue have noted an odd phenomenon in such situations: A few particular innocent-looking strides result in sharply reduced cache efficiency. In this article, this problem is analyzed, and a simple formula is presented that accurately gives the cache efficiency for various cache parameters and data strides.

  5. dCache, agile adoption of storage technology

    CERN Multimedia

    CERN. Geneva

    2012-01-01

    For over a decade, dCache has been synonymous with large-capacity, fault-tolerant storage using commodity hardware that supports seamless data migration to and from tape. Over that time, it has satisfied the requirements of various demanding scientific user communities to store their data, transfer it between sites and fast, site-local access. When the dCache project started, the focus was on managing a relatively small disk cache in front of large tape archives. Over the project's lifetime storage technology has changed. During this period, technology changes have driven down the cost-per-GiB of harddisks. This resulted in a shift towards systems where the majority of data is stored on disk. More recently, the availability of Solid State Disks, while not yet a replacement for magnetic disks, offers an intriguing opportunity for significant performance improvement if they can be used intelligently within an existing system. New technologies provide new opportunities and dCache user communities' computi...

  6. Geometric Algorithms for Private-Cache Chip Multiprocessors

    DEFF Research Database (Denmark)

    Ajwani, Deepak; Sitchinava, Nodari; Zeh, Norbert

    2010-01-01

    We study techniques for obtaining efficient algorithms for geometric problems on private-cache chip multiprocessors. We show how to obtain optimal algorithms for interval stabbing counting, 1-D range counting, weighted 2-D dominance counting, and for computing 3-D maxima, 2-D lower envelopes, and 2...

  7. Caching Over-The-Top Services, the Netflix Case

    DEFF Research Database (Denmark)

    Jensen, Stefan; Jensen, Michael; Gutierrez Lopez, Jose Manuel

    2015-01-01

    Problem (LLB-CFL). The solution search processes are implemented based on Genetic Algorithms (GA), designing genetic operators highly targeted towards this specific problem. The proposed methods are applied to a case study focusing on the demand and cache specifications of Netflix, and framed into a real...

  8. ARC Cache: A solution for lightweight Grid sites in ATLAS

    CERN Document Server

    Garonne, Vincent; The ATLAS collaboration

    2016-01-01

    Many Grid sites have the need to reduce operational manpower, and running a storage element consumes a large amount of effort. In addition, setting up a new Grid site including a storage element involves a steep learning curve and large investment of time. For these reasons so-called storage-less sites are becoming more popular as a way to provide Grid computing resources with less operational overhead. ARC CE is a widely-used and mature Grid middleware which was designed from the start to be used on sites with no persistent storage element. Instead, it maintains a local self-managing cache of data which retains popular data for future jobs. As the cache is simply an area on a local posix shared filesystem with no external-facing service, it requires no extra maintenance. The cache can be scaled up as required by increasing the size of the filesystem or adding new filesystems. This paper describes how ARC CE and its cache are an ideal solution for lightweight Grid sites in the ATLAS experiment, and the integr...

  9. Effective caching of shortest paths for location-based services

    DEFF Research Database (Denmark)

    Jensen, Christian S.; Thomsen, Jeppe Rishede; Yiu, Man Lung

    2012-01-01

    Web search is ubiquitous in our daily lives. Caching has been extensively used to reduce the computation time of the search engine and reduce the network traffic beyond a proxy server. Another form of web search, known as online shortest path search, is popular due to advances in geo-positioning...

  10. Fast and Cache-Oblivious Dynamic Programming with Local Dependencies

    DEFF Research Database (Denmark)

    Bille, Philip; Stöckel, Morten

    2012-01-01

    -oblivious algorithm for this type of local dynamic programming suitable for comparing large-scale strings. Our algorithm outperforms the previous state-of-the-art solutions. Surprisingly, our new simple algorithm is competitive with a complicated, optimized, and tuned implementation of the best cache-aware algorithm...

  11. Something different - caching applied to calculation of impedance matrix elements

    CSIR Research Space (South Africa)

    Lysko, AA

    2012-09-01

    Full Text Available This paper introduces a new method generally termed memoization, to accelerate filling in the impedance matrix, e.g. in the method of moments (MoM). The memoization stores records for recently computed matrix elements in a cache, and, when...

  12. Cache Timing Analysis of eStream Finalists

    DEFF Research Database (Denmark)

    Zenner, Erik

    2009-01-01

    Cache Timing Attacks have attracted a lot of cryptographic attention due to their relevance for the AES. However, their applicability to other cryptographic primitives is less well researched. In this talk, we give an overview over our analysis of the stream ciphers that were selected for phase 3...

  13. A Cache-Based Hardware Accelerator for Memory Data Movements

    NARCIS (Netherlands)

    Duarte, F.

    2008-01-01

    This dissertation presents a hardware accelerator that is able to accelerate large (including non-parallel) memory data movements, in particular memory copies, performed traditionally by the processors. As todays processors are tied with or have integrated caches with varying sizes (from several

  14. Cache-based memory copy hardware accelerator for multicore systems

    NARCIS (Netherlands)

    Duarte, F.; Wong, S.

    2010-01-01

    In this paper, we present a new architecture of the cache-based memory copy hardware accelerator in a multicore system supporting message passing. The accelerator is able to accelerate memory data movements, in particular memory copies. We perform an analytical analysis based on open-queuing theory

  15. A Cache Architecture for Counting Bloom Filters: Theory and Application

    Directory of Open Access Journals (Sweden)

    Mahmood Ahmadi

    2011-01-01

    Full Text Available Within packet processing systems, lengthy memory accesses greatly reduce performance. To overcome this limitation, network processors utilize many different techniques, for example, utilizing multilevel memory hierarchies, special hardware architectures, and hardware threading. In this paper, we introduce a multilevel memory architecture for counting Bloom filters. Based on the probabilities of incrementing of the counters in the counting Bloom filter, a multi-level cache architecture called the cached counting Bloom filter (CCBF is presented, where each cache level stores the items with the same counters. To test the CCBF architecture, we implement a software packet classifier that utilizes basic tuple space search using a 3-level CCBF. The results of mathematical analysis and implementation of the CCBF for packet classification show that the proposed cache architecture decreases the number of memory accesses when compared to a standard Bloom filter. Based on the mathematical analysis of CCBF, the number of accesses is decreased by at least 53%. The implementation results of the software packet classifier are at most 7.8% (3.5% in average less than corresponding mathematical analysis results. This difference is due to some parameters in the packet classification application such as number of tuples, distribution of rules through the tuples, and utilized hashing functions.

  16. Combining instruction prefetching with partial cache locking to improve WCET in real-time systems.

    Science.gov (United States)

    Ni, Fan; Long, Xiang; Wan, Han; Gao, Xiaopeng

    2013-01-01

    Caches play an important role in embedded systems to bridge the performance gap between fast processor and slow memory. And prefetching mechanisms are proposed to further improve the cache performance. While in real-time systems, the application of caches complicates the Worst-Case Execution Time (WCET) analysis due to its unpredictable behavior. Modern embedded processors often equip locking mechanism to improve timing predictability of the instruction cache. However, locking the whole cache may degrade the cache performance and increase the WCET of the real-time application. In this paper, we proposed an instruction-prefetching combined partial cache locking mechanism, which combines an instruction prefetching mechanism (termed as BBIP) with partial cache locking to improve the WCET estimates of real-time applications. BBIP is an instruction prefetching mechanism we have already proposed to improve the worst-case cache performance and in turn the worst-case execution time. The estimations on typical real-time applications show that the partial cache locking mechanism shows remarkable WCET improvement over static analysis and full cache locking.

  17. Combining instruction prefetching with partial cache locking to improve WCET in real-time systems.

    Directory of Open Access Journals (Sweden)

    Fan Ni

    Full Text Available Caches play an important role in embedded systems to bridge the performance gap between fast processor and slow memory. And prefetching mechanisms are proposed to further improve the cache performance. While in real-time systems, the application of caches complicates the Worst-Case Execution Time (WCET analysis due to its unpredictable behavior. Modern embedded processors often equip locking mechanism to improve timing predictability of the instruction cache. However, locking the whole cache may degrade the cache performance and increase the WCET of the real-time application. In this paper, we proposed an instruction-prefetching combined partial cache locking mechanism, which combines an instruction prefetching mechanism (termed as BBIP with partial cache locking to improve the WCET estimates of real-time applications. BBIP is an instruction prefetching mechanism we have already proposed to improve the worst-case cache performance and in turn the worst-case execution time. The estimations on typical real-time applications show that the partial cache locking mechanism shows remarkable WCET improvement over static analysis and full cache locking.

  18. Cache-Aware Asymptotically-Optimal Sampling-Based Motion Planning.

    Science.gov (United States)

    Ichnowski, Jeffrey; Prins, Jan F; Alterovitz, Ron

    2014-05-01

    We present CARRT* (Cache-Aware Rapidly Exploring Random Tree*), an asymptotically optimal sampling-based motion planner that significantly reduces motion planning computation time by effectively utilizing the cache memory hierarchy of modern central processing units (CPUs). CARRT* can account for the CPU's cache size in a manner that keeps its working dataset in the cache. The motion planner progressively subdivides the robot's configuration space into smaller regions as the number of configuration samples rises. By focusing configuration exploration in a region for periods of time, nearest neighbor searching is accelerated since the working dataset is small enough to fit in the cache. CARRT* also rewires the motion planning graph in a manner that complements the cache-aware subdivision strategy to more quickly refine the motion planning graph toward optimality. We demonstrate the performance benefit of our cache-aware motion planning approach for scenarios involving a point robot as well as the Rethink Robotics Baxter robot.

  19. a Cache Design Method for Spatial Information Visualization in 3d Real-Time Rendering Engine

    Science.gov (United States)

    Dai, X.; Xiong, H.; Zheng, X.

    2012-07-01

    A well-designed cache system has positive impacts on the 3D real-time rendering engine. As the amount of visualization data getting larger, the effects become more obvious. They are the base of the 3D real-time rendering engine to smoothly browsing through the data, which is out of the core memory, or from the internet. In this article, a new kind of caches which are based on multi threads and large file are introduced. The memory cache consists of three parts, the rendering cache, the pre-rendering cache and the elimination cache. The rendering cache stores the data that is rendering in the engine; the data that is dispatched according to the position of the view point in the horizontal and vertical directions is stored in the pre-rendering cache; the data that is eliminated from the previous cache is stored in the eliminate cache and is going to write to the disk cache. Multi large files are used in the disk cache. When a disk cache file size reaches the limit length(128M is the top in the experiment), no item will be eliminated from the file, but a new large cache file will be created. If the large file number is greater than the maximum number that is pre-set, the earliest file will be deleted from the disk. In this way, only one file is opened for writing and reading, and the rest are read-only so the disk cache can be used in a high asynchronous way. The size of the large file is limited in order to map to the core memory to save loading time. Multi-thread is used to update the cache data. The threads are used to load data to the rendering cache as soon as possible for rendering, to load data to the pre-rendering cache for rendering next few frames, and to load data to the elimination cache which is not necessary for the moment. In our experiment, two threads are designed. The first thread is to organize the memory cache according to the view point, and created two threads: the adding list and the deleting list, the adding list index the data that should be

  20. Residential Energy Efficiency Potential: Utah

    Energy Technology Data Exchange (ETDEWEB)

    Wilson, Eric J [National Renewable Energy Laboratory (NREL), Golden, CO (United States)

    2017-11-22

    Energy used by Utah single-family homes that can be saved through cost-effective improvements. Prepared by Eric Wilson and Noel Merket, NREL, and Erin Boyd, U.S. Department of Energy Office of Energy Policy and Systems Analysis.

  1. Ground water in Utah's densely populated Wasatch Front area - The challenge and the choices

    Science.gov (United States)

    Price, Don

    1985-01-01

    Utah's Wasatch Front area comprises about 4,000 square miles in the north-central part of the State. I n 1980, the area had a population of more than 1.1 million, or about 77 percent of Utah's total population. It contains several large cities, including Salt Lake City, Ogden, and Provo, and is commonly called Utah's urban corridor.Most of the water supply for the Wasatch Front area comes from streams that originate in the Wasatch Range and nearby Uinta Mountains; however, ground water has played an important role in the economic growth of the area. The principal source of ground water is the unconsolidated fill (sedimentary deposits) in the valleys of the Wasatch Front area northern Juab, Utah, Goshen, and Salt Lake Valleys; the East Shore area (a valley area east of the Great Salt Lake), and the Bear River Bay area. Maximum saturated thickness of the fill in the principal ground-water reservoirs in these valleys exceeds 6,000 feet, and the estimated volume of water that can be withdrawn from just the upper 100 feet of the saturated fill is about 8 million acre-feet. In most places the water is fresh, containing less than 1,000 milligrams per liter of dissolved solids; in much of the Bear River Bay area and most of Goshen Valley (and locally in the other valleys), the water is slightly to moderately saline, with 1,000 to 10,000 milligrams per liter of dissolved solids.The principal ground-water reservoirs receive recharge at an annual rate that is estimated to exceed 1 million acre-feet chiefly as seepage from consolidated rocks in the adjacent mountains from canals, ditches, and irrigated land, directly from precipitation, and from streams. Discharge during 1980 (which was chiefly from springs, seepage to streams, evapotranspiration, and withdrawal by wells) was estimated to be about 1.1 million acre-feet. Withdrawal from wells, which began within a few years after the arrival of the Mormon pioneers in the Salt Lake Valley in 1847, and had increased to about 320

  2. Mental and behavioral disturbances in dementia: findings from the Cache County Study on Memory in Aging.

    Science.gov (United States)

    Lyketsos, C G; Steinberg, M; Tschanz, J T; Norton, M C; Steffens, D C; Breitner, J C

    2000-05-01

    The authors report findings from a study of 5,092 community residents who constituted 90% of the elderly resident population of Cache County, Utah. The 5,092 participants, who were 65 years old or older, were screened for dementia. Based on the results of this screen, 1,002 participants (329 with dementia and 673 without dementia) underwent comprehensive neuropsychiatric examinations and were rated on the Neuropsychiatric Inventory, a widely used method for ascertainment and classification of dementia-associated mental and behavioral disturbances. Of the 329 participants with dementia, 214 (65%) had Alzheimer's disease, 62 (19%) had vascular dementia, and 53 (16%) had another DSM-IV dementia diagnosis; 201 (61%) had exhibited one or more mental or behavioral disturbances in the past month. Apathy (27%), depression (24%), and agitation/aggression (24%) were the most common in participants with dementia. These disturbances were almost four times more common in participants with dementia than in those without. Only modest differences were observed in the prevalence of mental or behavioral disturbances in different types of dementia or at different stages of illness: participants with Alzheimer's disease were more likely to have delusions and less likely to have depression. Agitation/aggression and aberrant motor behavior were more common in participants with advanced dementia. On the basis of their findings in this large community population of elderly people, the authors conclude that a wide range of dementia-associated mental and behavioral disturbances afflict the majority of individuals with dementia. Because of their frequency and their adverse effects on patients and their caregivers, these disturbances should be ascertained and treated in all cases of dementia.

  3. Mobility-Aware Caching and Computation Offloading in 5G Ultra-Dense Cellular Networks

    Directory of Open Access Journals (Sweden)

    Min Chen

    2016-06-01

    Full Text Available Recent trends show that Internet traffic is increasingly dominated by content, which is accompanied by the exponential growth of traffic. To cope with this phenomena, network caching is introduced to utilize the storage capacity of diverse network devices. In this paper, we first summarize four basic caching placement strategies, i.e., local caching, Device-to-Device (D2D caching, Small cell Base Station (SBS caching and Macrocell Base Station (MBS caching. However, studies show that so far, much of the research has ignored the impact of user mobility. Therefore, taking the effect of the user mobility into consideration, we proposes a joint mobility-aware caching and SBS density placement scheme (MS caching. In addition, differences and relationships between caching and computation offloading are discussed. We present a design of a hybrid computation offloading and support it with experimental results, which demonstrate improved performance in terms of energy cost. Finally, we discuss the design of an incentive mechanism by considering network dynamics, differentiated user’s quality of experience (QoE and the heterogeneity of mobile terminals in terms of caching and computing capabilities.

  4. Mobility-Aware Caching and Computation Offloading in 5G Ultra-Dense Cellular Networks.

    Science.gov (United States)

    Chen, Min; Hao, Yixue; Qiu, Meikang; Song, Jeungeun; Wu, Di; Humar, Iztok

    2016-06-25

    Recent trends show that Internet traffic is increasingly dominated by content, which is accompanied by the exponential growth of traffic. To cope with this phenomena, network caching is introduced to utilize the storage capacity of diverse network devices. In this paper, we first summarize four basic caching placement strategies, i.e., local caching, Device-to-Device (D2D) caching, Small cell Base Station (SBS) caching and Macrocell Base Station (MBS) caching. However, studies show that so far, much of the research has ignored the impact of user mobility. Therefore, taking the effect of the user mobility into consideration, we proposes a joint mobility-aware caching and SBS density placement scheme (MS caching). In addition, differences and relationships between caching and computation offloading are discussed. We present a design of a hybrid computation offloading and support it with experimental results, which demonstrate improved performance in terms of energy cost. Finally, we discuss the design of an incentive mechanism by considering network dynamics, differentiated user's quality of experience (QoE) and the heterogeneity of mobile terminals in terms of caching and computing capabilities.

  5. A high level implementation and performance evaluation of level-I asynchronous cache on FPGA

    Directory of Open Access Journals (Sweden)

    Mansi Jhamb

    2017-07-01

    Full Text Available To bridge the ever-increasing performance gap between the processor and the main memory in a cost-effective manner, novel cache designs and implementations are indispensable. Cache is responsible for a major part of energy consumption (approx. 50% of processors. This paper presents a high level implementation of a micropipelined asynchronous architecture of L1 cache. Due to the fact that each cache memory implementation is time consuming and error-prone process, a synthesizable and a configurable model proves out to be of immense help as it aids in generating a range of caches in a reproducible and quick fashion. The micropipelined cache, implemented using C-Elements acts as a distributed message-passing system. The RTL cache model implemented in this paper, comprising of data and instruction caches has a wide array of configurable parameters. In addition to timing robustness our implementation has high average cache throughput and low latency. The implemented architecture comprises of two direct-mapped, write-through caches for data and instruction. The architecture is implemented in a Field Programmable Gate Array (FPGA chip using Very High Speed Integrated Circuit Hardware Description Language (VHSIC HDL along with advanced synthesis and place-and-route tools.

  6. Data Cache-Energy and Throughput Models: Design Exploration for Embedded Processors

    Directory of Open Access Journals (Sweden)

    Qadri MuhammadYasir

    2009-01-01

    Full Text Available Abstract Most modern 16-bit and 32-bit embedded processors contain cache memories to further increase instruction throughput of the device. Embedded processors that contain cache memories open an opportunity for the low-power research community to model the impact of cache energy consumption and throughput gains. For optimal cache memory configuration mathematical models have been proposed in the past. Most of these models are complex enough to be adapted for modern applications like run-time cache reconfiguration. This paper improves and validates previously proposed energy and throughput models for a data cache, which could be used for overhead analysis for various cache types with relatively small amount of inputs. These models analyze the energy and throughput of a data cache on an application basis, thus providing the hardware and software designer with the feedback vital to tune the cache or application for a given energy budget. The models are suitable for use at design time in the cache optimization process for embedded processors considering time and energy overhead or could be employed at runtime for reconfigurable architectures.

  7. Data Cache-Energy and Throughput Models: Design Exploration for Embedded Processors

    Directory of Open Access Journals (Sweden)

    Muhammad Yasir Qadri

    2009-01-01

    Full Text Available Most modern 16-bit and 32-bit embedded processors contain cache memories to further increase instruction throughput of the device. Embedded processors that contain cache memories open an opportunity for the low-power research community to model the impact of cache energy consumption and throughput gains. For optimal cache memory configuration mathematical models have been proposed in the past. Most of these models are complex enough to be adapted for modern applications like run-time cache reconfiguration. This paper improves and validates previously proposed energy and throughput models for a data cache, which could be used for overhead analysis for various cache types with relatively small amount of inputs. These models analyze the energy and throughput of a data cache on an application basis, thus providing the hardware and software designer with the feedback vital to tune the cache or application for a given energy budget. The models are suitable for use at design time in the cache optimization process for embedded processors considering time and energy overhead or could be employed at runtime for reconfigurable architectures.

  8. Food availability and animal space use both determine cache density of Eurasian red squirrels.

    Directory of Open Access Journals (Sweden)

    Ke Rong

    Full Text Available Scatter hoarders are not able to defend their caches. A longer hoarding distance combined with lower cache density can reduce cache losses but increase the costs of hoarding and retrieving. Scatter hoarders arrange their cache density to achieve an optimal balance between hoarding costs and main cache losses. We conducted systematic cache sampling investigations to estimate the effects of food availability on cache patterns of Eurasian red squirrels (Sciurus vulgaris. This study was conducted over a five-year period at two sample plots in a Korean pine (Pinus koraiensis-dominated forest with contrasting seed production patterns. During these investigations, the locations of nest trees were treated as indicators of squirrel space use to explore how space use affected cache pattern. The squirrels selectively hoarded heavier pine seeds farther away from seed-bearing trees. The heaviest seeds were placed in caches around nest trees regardless of the nest tree location, and this placement was not in response to decreased food availability. The cache density declined with the hoarding distance. Cache density was lower at sites with lower seed production and during poor seed years. During seed mast years, the cache density around nest trees was higher and invariant. The pine seeds were dispersed over a larger distance when seed availability was lower. Our results suggest that 1 animal space use is an important factor that affects food hoarding distance and associated cache densities, 2 animals employ different hoarding strategies based on food availability, and 3 seed dispersal outside the original stand is stimulated in poor seed years.

  9. Seed perishability determines the caching behaviour of a food-hoarding bird.

    Science.gov (United States)

    Neuschulz, Eike Lena; Mueller, Thomas; Bollmann, Kurt; Gugerli, Felix; Böhning-Gaese, Katrin

    2015-01-01

    Many animals hoard seeds for later consumption and establish seed caches that are often located at sites with specific environmental characteristics. One explanation for the selection of non-random caching locations is the avoidance of pilferage by other animals. Another possible hypothesis is that animals choose locations that hamper the perishability of stored food, allowing the consumption of unspoiled food items over long time periods. We examined seed perishability and pilferage avoidance as potential drivers for caching behaviour of spotted nutcrackers (Nucifraga caryocatactes) in the Swiss Alps where the birds are specialized on caching seeds of Swiss stone pine (Pinus cembra). We used seedling establishment as an inverse measure of seed perishability, as established seedlings cannot longer be consumed by nutcrackers. We recorded the environmental conditions (i.e. canopy openness and soil moisture) of seed caching, seedling establishment and pilferage sites. Our results show that sites of seed caching and seedling establishment had opposed microenvironmental conditions. Canopy openness and soil moisture were negatively related to seed caching but positively related to seedling establishment, i.e. nutcrackers cached seeds preferentially at sites where seed perishability was low. We found no effects of environmental factors on cache pilferage, i.e. neither canopy openness nor soil moisture had significant effects on pilferage rates. We thus could not relate caching behaviour to pilferage avoidance. Our study highlights the importance of seed perishability as a mechanism for seed-caching behaviour, which should be considered in future studies. Our findings could have important implications for the regeneration of plants whose seeds are dispersed by seed-caching animals, as the potential of seedlings to establish may strongly decrease if animals cache seeds at sites that favour seed perishability rather than seedling establishment. © 2014 The Authors. Journal

  10. Hybrid update / invalidate schemes for cache coherence protocols

    Directory of Open Access Journals (Sweden)

    R. V. Dovgopol

    2015-01-01

    Full Text Available In general when considering cache coherence, write back schemes are the default. These schemes invalidate all other copies of a data block during a write. In this paper we propose several hybrid schemes that will switch between updating and invalidating on processor writes at runtime, depending on program conditions. This kind of approaches tend to improve the overall performance of systems in numerous fields ranging from the Information Security to the Civil Aviation. We created our own cache simulator on which we could implement our schemes, and generated data sets from both commercial benchmarks and through artificial methods to run on the simulator. We analyze the results of running the benchmarks with various schemes, and suggest further research that can be done in this area.

  11. DIETARY FOLATE, VITAMIN B-12, VITAMIN B-6 AND INCIDENT ALZHEIMER’S DISEASE: THE CACHE COUNTY MEMORY, HEALTH, AND AGING STUDY

    Science.gov (United States)

    NELSON, C.; WENGREEN, H.J.; MUNGER, R.G.; CORCORAN, C.D.

    2013-01-01

    Objective To examine associations between dietary and supplemental folate, vitamin B-12 and vitamin B-6 and incident Alzheimer’s disease (AD) among elderly men and women. Design, Setting and Participants Data collected were from participants of the Cache County Memory, Health and Aging Study, a longitudinal study of 5092 men and women 65 years and older who were residents of Cache County, Utah in 1995. Measurements Multistage clinical assessment procedures were used to identify incident cases of AD. Dietary data were collected using a 142-item food frequency questionnaire. Cox Proportional Hazards (CPH) modeling was used to determine hazard ratios across quintiles of micronutrient intake. Results 202 participants were diagnosed with incident AD during follow-up (1995–2004). In multivariable CPH models that controlled for the effects of gender, age, education, and other covariates there were no observed differences in risk of AD or dementia by increasing quintiles of total intake of folate, vitamin B-12, or vitamin B-6. Similarly, there were no observed differences in risk of AD by regular use of either folate or B6 supplements. Conclusion Dietary intake of B-vitamins from food and supplemental sources appears unrelated to incidence of dementia and AD. Further studies examining associations between dietary intakes of B-vitamins, biomarkers of B-vitamin status and cognitive endpoints are warranted. PMID:19924351

  12. The Design and Evaluation of In-Cache Address Translation

    Science.gov (United States)

    1990-02-01

    past and present. IEEE Transactions on Software Engi- neering, 6(1):64-84, January 1980. [25] Malcom C. Easton and Ronald Fagin. Cold-start vs. warm...mul- tiprocessing environments. In Proceedings of the 18th Annual Hawaii Int’l Conference on System Sciences, pages 477-486, 1985. [53] A. E. Knowles ...Manchester, January 1985. [54] Alan Knowles and Shreekant Thakkar. The MU6-G virtual address cache. Technical Report CS/E 84-007, University of

  13. Caching Strategies for Data-Intensive Web Sites

    OpenAIRE

    Florescu, Daniela; Issarny, Valérie; Valduriez, Patrick; Yagoub, Khaled

    2000-01-01

    Projet CARAVEL; A data-intensive Web site is a Web server that accesses large numbers of pages whose content is dynamically extracted from a database. In this context, returning a Web page may require costly interaction with the database system (for connection and querying) thereby increasing much the response time. In this paper, we address this performance problem. Our approach relies on the declarative specification of the Web site. We propose a customizable cache system architecture and i...

  14. Cache-enabled small cell networks: modeling and tradeoffs.

    Science.gov (United States)

    Baştuǧ, Ejder; Bennis, Mehdi; Kountouris, Marios; Debbah, Mérouane

    We consider a network model where small base stations (SBSs) have caching capabilities as a means to alleviate the backhaul load and satisfy users' demand. The SBSs are stochastically distributed over the plane according to a Poisson point process (PPP) and serve their users either (i) by bringing the content from the Internet through a finite rate backhaul or (ii) by serving them from the local caches. We derive closed-form expressions for the outage probability and the average delivery rate as a function of the signal-to-interference-plus-noise ratio (SINR), SBS density, target file bitrate, storage size, file length, and file popularity. We then analyze the impact of key operating parameters on the system performance. It is shown that a certain outage probability can be achieved either by increasing the number of base stations or the total storage size. Our results and analysis provide key insights into the deployment of cache-enabled small cell networks (SCNs), which are seen as a promising solution for future heterogeneous cellular networks.

  15. Efficient Resource Scheduling by Exploiting Relay Cache for Cellular Networks

    Directory of Open Access Journals (Sweden)

    Chun He

    2015-01-01

    Full Text Available In relay-enhanced cellular systems, throughput of User Equipment (UE is constrained by the bottleneck of the two-hop link, backhaul link (or the first hop link, and access link (the second hop link. To maximize the throughput, resource allocation should be coordinated between these two hops. A common resource scheduling algorithm, Adaptive Distributed Proportional Fair, only ensures that the throughput of the first hop is greater than or equal to that of the second hop. But it cannot guarantee a good balance of the throughput and fairness between the two hops. In this paper, we propose a Two-Hop Balanced Distributed Scheduling (TBS algorithm by exploiting relay cache for non-real-time data traffic. The evolved Node Basestation (eNB adaptively adjusts the number of Resource Blocks (RBs allocated to the backhaul link and direct links based on the cache information of relays. Each relay allocates RBs for relay UEs based on the size of the relay UE’s Transport Block. We also design a relay UE’s ACK feedback mechanism to update the data at relay cache. Simulation results show that the proposed TBS can effectively improve resource utilization and achieve a good trade-off between system throughput and fairness by balancing the throughput of backhaul and access link.

  16. Caching Eliminates the Wireless Bottleneck in Video Aware Wireless Networks

    Directory of Open Access Journals (Sweden)

    Andreas F. Molisch

    2014-01-01

    Full Text Available Wireless video is the main driver for rapid growth in cellular data traffic. Traditional methods for network capacity increase are very costly and do not exploit the unique features of video, especially asynchronous content reuse. In this paper we give an overview of our work that proposed and detailed a new transmission paradigm exploiting content reuse and the widespread availability of low-cost storage. Our network structure uses caching in helper stations (femtocaching and/or devices, combined with highly spectrally efficient short-range communications to deliver video files. For femtocaching, we develop optimum storage schemes and dynamic streaming policies that optimize video quality. For caching on devices, combined with device-to-device (D2D communications, we show that communications within clusters of mobile stations should be used; the cluster size can be adjusted to optimize the tradeoff between frequency reuse and the probability that a device finds a desired file cached by another device in the same cluster. In many situations the network throughput increases linearly with the number of users, and the tradeoff between throughput and outage is better than in traditional base-station centric systems. Simulation results with realistic numbers of users and channel conditions show that network throughput can be increased by two orders of magnitude compared to conventional schemes.

  17. Storageless and caching Tier-2 models in the UK context

    Science.gov (United States)

    Cadellin Skipsey, Samuel; Dewhurst, Alastair; Crooks, David; MacMahon, Ewan; Roy, Gareth; Smith, Oliver; Mohammed, Kashif; Brew, Chris; Britton, David

    2017-10-01

    Operational and other pressures have lead to WLCG experiments moving increasingly to a stratified model for Tier-2 resources, where “fat” Tier-2s (“T2Ds”) and “thin” Tier-2s (“T2Cs”) provide different levels of service. In the UK, this distinction is also encouraged by the terms of the current GridPP5 funding model. In anticipation of this, testing has been performed on the implications, and potential implementation, of such a distinction in our resources. In particular, this presentation presents the results of testing of storage T2Cs, where the “thin” nature is expressed by the site having either no local data storage, or only a thin caching layer; data is streamed or copied from a “nearby” T2D when needed by jobs. In OSG, this model has been adopted successfully for CMS AAA sites; but the network topology and capacity in the USA is significantly different to that in the UK (and much of Europe). We present the result of several operational tests: the in-production University College London (UCL) site, which runs ATLAS workloads using storage at the Queen Mary University of London (QMUL) site; the Oxford site, which has had scaling tests performed against T2Ds in various locations in the UK (to test network effects); and the Durham site, which has been testing the specific ATLAS caching solution of “Rucio Cache” integration with ARC’s caching layer.

  18. Using Shadow Page Cache to Improve Isolated Drivers Performance

    Directory of Open Access Journals (Sweden)

    Hao Zheng

    2015-01-01

    Full Text Available With the advantage of the reusability property of the virtualization technology, users can reuse various types and versions of existing operating systems and drivers in a virtual machine, so as to customize their application environment. In order to prevent users’ virtualization environments being impacted by driver faults in virtual machine, Chariot examines the correctness of driver’s write operations by the method of combining a driver’s write operation capture and a driver’s private access control table. However, this method needs to keep the write permission of shadow page table as read-only, so as to capture isolated driver’s write operations through page faults, which adversely affect the performance of the driver. Based on delaying setting frequently used shadow pages’ write permissions to read-only, this paper proposes an algorithm using shadow page cache to improve the performance of isolated drivers and carefully study the relationship between the performance of drivers and the size of shadow page cache. Experimental results show that, through the shadow page cache, the performance of isolated drivers can be greatly improved without impacting Chariot’s reliability too much.

  19. The NOAO Data Cache Initiative - Building a Distributed Online Datastore

    Science.gov (United States)

    Seaman, R.; Barg, I.; Zárate, N.; Smith, C.; Saavedra, N.

    2005-12-01

    The Data Cache Initiative (DCI) of the NOAO Data Products Program is a prototype Data Transport System for NOAO and affiliate facilities. DCI provides pre-tested solutions for conveying data from our large suite of instrumentation to a central mountain data cache. The heart of DCI is an extension of the Save-the-Bits safestore, running for more than a decade (more than 4 million images saved, comprising more than 40 Tbytes). The iSTB server has been simplified by the removal of STB's media handling functionality, and iSTB has been enhanced to remediate each incoming header with information from a database of NOAO instrumentation and an interface to the NOAO proposal database. Each mountain data cache has been implemented on commodity hardware running Redhat 9.0. Software RAID 1 runs over hardware RAID 5 to provide maximum storage reliability for each copy of the data. Each image is transferred from Kitt Peak or Cerro Tololo to the corresponding datastore at the Tucson or La Serena data centers using an rsync-based queue adopted from NCSA. From each data center, the files are transported to the other NOAO data center and also to NCSA for off-site storage using the Storage Resource Broker (SRB) of the San Diego Supercomputer Center. Thus we have three copies of each file on spinning disks or near-online. Major institutional users will be given access to the datastores.

  20. The impact of using combinatorial optimisation for static caching of posting lists

    DEFF Research Database (Denmark)

    Petersen, Casper; Simonsen, Jakob Grue; Lioma, Christina

    2015-01-01

    policies such as LRU and LFU. However, a greedy method does not formally guarantee an optimal solution. We investigate whether the use of methods guaranteed, in theory, to and an approximately optimal solution would yield higher hit rates. Thus, we cast the selection of posting lists for caching......Caching posting lists can reduce the amount of disk I/O required to evaluate a query. Current methods use optimisation procedures for maximising the cache hit ratio. A recent method selects posting lists for static caching in a greedy manner and obtains higher hit rates than standard cache eviction...... as an integer linear programming problem and perform a series of experiments using heuristics from combinatorial optimisation (CCO) to nd optimal solutions. Using simulated query logs we nd that CCO yields comparable results to a greedy baseline using cache sizes between 200 and 1000 MB, with modest...

  1. WCET-based comparison of an instruction scratchpad and a method cache

    DEFF Research Database (Denmark)

    Whitham, Jack; Schoeberl, Martin

    2014-01-01

    This paper compares two proposed alternatives to conventional instruction caches: a scratchpad memory (SPM) and a method cache. The comparison considers the true worst-case execution time (WCET) and the estimated WCET bound of programs using either an SPM or a method cache, using large numbers...... of randomly generated programs. For these programs, we find that a method cache is preferable to an SPM if the true WCET is used, because it leads to execution times that are no greater than those for SPM, and are often lower. However, we also find that analytical pessimism is a significant problem...... for a method cache. If WCET bounds are derived by analysis, the WCET bounds for an instruction SPM are often lower than the bounds for a method cache. This means that an SPM may be preferable in practical systems....

  2. Cache and energy efficient algorithms for Nussinov's RNA Folding.

    Science.gov (United States)

    Zhao, Chunchun; Sahni, Sartaj

    2017-12-06

    An RNA folding/RNA secondary structure prediction algorithm determines the non-nested/pseudoknot-free structure by maximizing the number of complementary base pairs and minimizing the energy. Several implementations of Nussinov's classical RNA folding algorithm have been proposed. Our focus is to obtain run time and energy efficiency by reducing the number of cache misses. Three cache-efficient algorithms, ByRow, ByRowSegment and ByBox, for Nussinov's RNA folding are developed. Using a simple LRU cache model, we show that the Classical algorithm of Nussinov has the highest number of cache misses followed by the algorithms Transpose (Li et al.), ByRow, ByRowSegment, and ByBox (in this order). Extensive experiments conducted on four computational platforms-Xeon E5, AMD Athlon 64 X2, Intel I7 and PowerPC A2-using two programming languages-C and Java-show that our cache efficient algorithms are also efficient in terms of run time and energy. Our benchmarking shows that, depending on the computational platform and programming language, either ByRow or ByBox give best run time and energy performance. The C version of these algorithms reduce run time by as much as 97.2% and energy consumption by as much as 88.8% relative to Classical and by as much as 56.3% and 57.8% relative to Transpose. The Java versions reduce run time by as much as 98.3% relative to Classical and by as much as 75.2% relative to Transpose. Transpose achieves run time and energy efficiency at the expense of memory as it takes twice the memory required by Classical. The memory required by ByRow, ByRowSegment, and ByBox is the same as that of Classical. As a result, using the same amount of memory, the algorithms proposed by us can solve problems up to 40% larger than those solvable by Transpose.

  3. Geochemistry and hydrothermal alteration at selected Utah hot springs. Final report: Volume 3 (revised)

    Energy Technology Data Exchange (ETDEWEB)

    Parry, W.T.; Benson, N.L.; Miller, C.D.

    1976-07-01

    Application of Na-K-Ca geothermometry to warm springs in Utah indicates several areas with sufficiently high apparent temperatures to be of interest as geothermal exploration targets. A zone of warm springs in the Bonneville Basin show Na-K-Ca temperatures from 150/sup 0/C to 233/sup 0/C. Examination of Great Salt Lake, Bonneville sediment pore water, and Jordan Valley well-water chemistry indicates that mixing a small percent of these fluids with warm spring water can cause substantial errors in Na-K-Ca temperature estimates. Other saline deposits which may influence Na-K-Ca temperature estimates are the Paradox formation in southeastern Utah, the Muddy Creek formation in southwestern Utah, the Arapien shale in central Utah, the Preuss formation in northeastern Utah, and Playa salts in much of western Utah. The Roosevelt KGRA is the most attractive target identified by Na-K-Ca geothermometry. Hydrothermal alteration, heavy metal distribution, and water chemistry provide additional characterization of the Roosevelt system. Chemistry of a cool water seep (25/sup 0/C) shows Na-K-Ca temperature of 241/sup 0/C and SiO/sub 2/ temperature of 125/sup 0/C. A Phillips well flowing from below 1500' (457m) shows Na-K-Ca temperature of 262/sup 0/C, SiO/sub 2/ temperature of 262/sup 0/C, and K of 1.5 times the surface spring value. The near surface alteration assemblage is best explained in terms of a decrease in pH of near surface fluids as sulfide oxidizes. Increasing potassium and pH with depth indicates that a K-feldspar stable zone may be intersected with deeper drilling. Geology and alteration were mapped in the Monroe KGRA. (JGB)

  4. The Effects of Music on Subjects with Alzheimer and Dementia Disease in Cache Valley

    OpenAIRE

    Frost, Landon

    2014-01-01

    Music has been shown to trigger old memories and induce various levels of stress relief and relaxation. My research focused on the effects of music on subjects with Alzheimer and Dementia disease. Eleven patients were selected through an informed consent process which included permission from responsible family members. During the course of three or more visits to patients in their care centers, the subjects listened to a variety of songs. These included songs that family members thought woul...

  5. Organizing the pantry: cache management improves quality of overwinter food stores in a montane mammal

    Science.gov (United States)

    Jakopak, Rhiannon P.; Hall, L. Embere; Chalfoun, Anna

    2017-01-01

    Many mammals create food stores to enhance overwinter survival in seasonal environments. Strategic arrangement of food within caches may facilitate the physical integrity of the cache or improve access to high-quality food to ensure that cached resources meet future nutritional demands. We used the American pika (Ochotona princeps), a food-caching lagomorph, to evaluate variation in haypile (cache) structure (i.e., horizontal layering by plant functional group) in Wyoming, United States. Fifty-five percent of 62 haypiles contained at least 2 discrete layers of vegetation. Adults and juveniles layered haypiles in similar proportions. The probability of layering increased with haypile volume, but not haypile number per individual or nearby forage diversity. Vegetation cached in layered haypiles was also higher in nitrogen compared to vegetation in unlayered piles. We found that American pikas frequently structured their food caches, structured caches were larger, and the cached vegetation in structured piles was of higher nutritional quality. Improving access to stable, high-quality vegetation in haypiles, a critical overwinter food resource, may allow individuals to better persist amidst harsh conditions.

  6. Behavior-aware cache hierarchy optimization for low-power multi-core embedded systems

    Science.gov (United States)

    Zhao, Huatao; Luo, Xiao; Zhu, Chen; Watanabe, Takahiro; Zhu, Tianbo

    2017-07-01

    In modern embedded systems, the increasing number of cores requires efficient cache hierarchies to ensure data throughput, but such cache hierarchies are restricted by their tumid size and interference accesses which leads to both performance degradation and wasted energy. In this paper, we firstly propose a behavior-aware cache hierarchy (BACH) which can optimally allocate the multi-level cache resources to many cores and highly improved the efficiency of cache hierarchy, resulting in low energy consumption. The BACH takes full advantage of the explored application behaviors and runtime cache resource demands as the cache allocation bases, so that we can optimally configure the cache hierarchy to meet the runtime demand. The BACH was implemented on the GEM5 simulator. The experimental results show that energy consumption of a three-level cache hierarchy can be saved from 5.29% up to 27.94% compared with other key approaches while the performance of the multi-core system even has a slight improvement counting in hardware overhead.

  7. A Cache System Design for CMPs with Built-In Coherence Verification

    Directory of Open Access Journals (Sweden)

    Mamata Dalui

    2016-01-01

    Full Text Available This work reports an effective design of cache system for Chip Multiprocessors (CMPs. It introduces built-in logic for verification of cache coherence in CMPs realizing directory based protocol. It is developed around the cellular automata (CA machine, invented by John von Neumann in the 1950s. A special class of CA referred to as single length cycle 2-attractor cellular automata (TACA has been planted to detect the inconsistencies in cache line states of processors’ private caches. The TACA module captures coherence status of the CMPs’ cache system and memorizes any inconsistent recording of the cache line states during the processors’ reference to a memory block. Theory has been developed to empower a TACA to analyse the cache state updates and then to settle to an attractor state indicating quick decision on a faulty recording of cache line status. The introduction of segmentation of the CMPs’ processor pool ensures a better efficiency, in determining the inconsistencies, by reducing the number of computation steps in the verification logic. The hardware requirement for the verification logic points to the fact that the overhead of proposed coherence verification module is much lesser than that of the conventional verification units and is insignificant with respect to the cost involved in CMPs’ cache system.

  8. Cache-Oblivious Data Structures and Algorithms for Undirected Breadth-First Search and Shortest Paths

    DEFF Research Database (Denmark)

    Brodal, G.S.; Fagerberg, R.; Meyer, U.

    2004-01-01

    We present improved cache-oblivious data structures and algorithms for breadth-first search and the single-source shortest path problem on undirected graphs with non-negative edge weights. Our results removes the performance gap between the currently best cache-aware algorithms for these problems...... and their cache-oblivious counterparts. Our shortest-path algorithm relies on a new data structure, called bucket heap, which is the first cache-oblivious priority queue to efficiently support a weak DecreaseKey operation....

  9. Church attendance and new episodes of major depression in a community study of older adults: the Cache County Study.

    Science.gov (United States)

    Norton, Maria C; Singh, Archana; Skoog, Ingmar; Corcoran, Christopher; Tschanz, Joann T; Zandi, Peter P; Breitner, John C S; Welsh-Bohmer, Kathleen A; Steffens, David C

    2008-05-01

    We examined the relation between church attendance, membership in the Church of Jesus Christ of Latter-Day Saints (LDS), and major depressive episode, in a population-based study of aging and dementia in Cache County, Utah. Participants included 2,989 nondemented individuals aged between 65 and 100 years who were interviewed initially in 1995 to 1996 and again in 1998 to 1999. LDS church members reported twice the rate of major depression that non-LDS members did (odds ratio = 2.56, 95% confidence interval = 1.07-6.08). Individuals attending church weekly or more often had a significantly lower risk for major depression. After controlling for demographic and health variables and the strongest predictor of future episodes of depression, a prior depression history, we found that church attendance more often than weekly remained a significant protectant (odds ratio = 0.51, 95% confidence interval = 0.28-0.92). Results suggest that there may be a threshold of church attendance that is necessary for a person to garner long-term protection from depression. We discuss sociological factors relevant to LDS culture.

  10. Cache-Oblivious Red-Blue Line Segment Intersection

    DEFF Research Database (Denmark)

    Arge, Lars; Mølhave, Thomas; Zeh, Norbert

    2008-01-01

    We present an optimal cache-oblivious algorithm for finding all intersections between a set of non-intersecting red segments and a set of non-intersecting blue segments in the plane. Our algorithm uses $O(\\frac{N}{B}\\log_{M/B}\\frac{N}{B}+T/B)$ memory transfers, where N is the total number...... of segments, M and B are the memory and block transfer sizes of any two consecutive levels of any multilevel memory hierarchy, and T is the number of intersections....

  11. Assessment of aspen ecosystem vulnerability to climate change for the Uinta-Wasatch-Cache and Ashley National Forests, Utah

    Science.gov (United States)

    Janine Rice; Tim Bardsley; Pete Gomben; Dustin Bambrough; Stacey Weems; Allen Huber; Linda A. Joyce

    2017-01-01

    Aspen ecosystems are valued because they add biodiversity and ecological value to the landscape. They provide rich and productive habitats and increase aesthetic value. Climate change poses the risk of altering and disrupting these ecosystems, and it may worsen the effects of non-climate stressors. To provide scientific information for land managers facing the...

  12. 77 FR 26733 - Uinta-Wasatch-Cache National Forest; Evanston-Mountain View Ranger District; Utah; Smiths Fork...

    Science.gov (United States)

    2012-05-07

    ... Highway 150, Suite A, Evanston, Wyoming. In addition, comments can be submitted electronically to... effects of tree mortality associated with the mountain pine beetle epidemic to restore healthy ecological...

  13. Visits, Hits, Caching and Counting on the World Wide Web: Old Wine in New Bottles?

    Science.gov (United States)

    Berthon, Pierre; Pitt, Leyland; Prendergast, Gerard

    1997-01-01

    Although web browser caching speeds up retrieval, reduces network traffic, and decreases the load on servers and browser's computers, an unintended consequence for marketing research is that Web servers undercount hits. This article explores counting problems, caching, proxy servers, trawler software and presents a series of correction factors…

  14. Static probabilistic timing analysis for real-time systems using random replacement caches

    NARCIS (Netherlands)

    Altmeyer, S.; Cucu-Grosjean, L.; Davis, R.I.

    2015-01-01

    In this paper, we investigate static probabilistic timing analysis (SPTA) for single processor real-time systems that use a cache with an evict-on-miss random replacement policy. We show that previously published formulae for the probability of a cache hit can produce results that are optimistic and

  15. Selfish-LRU: Preemption-Aware Caching for Predictability and Performance

    NARCIS (Netherlands)

    Reineke, J.; Altmeyer, S.; Grund, D.; Hahn, S.; Maiza, C.

    2014-01-01

    We introduce Selfish-LRU, a variant of the LRU (least recently used) cache replacement policy that improves performance and predictability in preemptive scheduling scenarios. In multitasking systems with conventional caches, a single memory access by a preempting task can trigger a chain reaction

  16. An Efficient Schema for Cloud Systems Based on SSD Cache Technology

    Directory of Open Access Journals (Sweden)

    Jinjiang Liu

    2013-01-01

    Full Text Available Traditional caching strategy is mainly based on the memory cache, taking read-write speed as its ultimate goal. However, with the emergence of SSD, the design ideas of traditional cache are no longer applicable. Considering the read-write characteristics and times limit of erasing, the characteristics of SSD are taken into account as far as possible at the same time of designing caching strategy. In this paper, the flexible and adaptive cache strategy based on SSD is proposed, called FAC, which gives full consideration to the characteristics of SSD itself, combines traditional caching strategy design ideas, and then maximizes the role SSD has played. The core mechanism is based on the dynamic adjustment capabilities of access patterns and the efficient selection algorithm of hot data. We have developed dynamical adjust section hot data algorithm, DASH in short, to adjust the read-write area capacity to suit the current usage scenario dynamically. The experimental results show that both read and write performance of caching strategy based on SSD have improved a lot, especially for read performance. Compared with traditional caching strategy, the technique can be used in engineering to reduce write times to SSD and prolong its service life without lowering read-write performance.

  17. Re-caching by Western scrub-jays (Aphelocoma californica cannot be attributed to stress.

    Directory of Open Access Journals (Sweden)

    James M Thom

    Full Text Available Western scrub-jays (Aphelocoma californica live double lives, storing food for the future while raiding the stores of other birds. One tactic scrub-jays employ to protect stores is "re-caching"-relocating caches out of sight of would-be thieves. Recent computational modelling work suggests that re-caching might be mediated not by complex cognition, but by a combination of memory failure and stress. The "Stress Model" asserts that re-caching is a manifestation of a general drive to cache, rather than a desire to protect existing stores. Here, we present evidence strongly contradicting the central assumption of these models: that stress drives caching, irrespective of social context. In Experiment (i, we replicate the finding that scrub-jays preferentially relocate food they were watched hiding. In Experiment (ii we find no evidence that stress increases caching. In light of our results, we argue that the Stress Model cannot account for scrub-jay re-caching.

  18. Integrating Cache Related Pre-emption Delay Analysis into EDF Scheduling

    NARCIS (Netherlands)

    Lunniss, W.; Altmeyer, S.; Maiza, C.; Davis, R.I.

    2013-01-01

    Cache memories have been introduced into embedded systems to prevent memory access times from becoming an unacceptable performance bottleneck. Memory and cache are split into blocks containing instructions and data. During a pre-emption, blocks from the pre-empting task can evict those of the

  19. Web Cache Prefetching as an Aspect: Towards a Dynamic-Weaving Based Solution

    DEFF Research Database (Denmark)

    Segura-Devillechaise, Marc; Menaud, Jean-Marc; Muller, Gilles

    2003-01-01

    application characteristics. Thus, new prefetching policies must be loaded dynamically as needs change.Most Web caches are large C programs, and thus adding one or more prefetching policies to an existing Web cache is a daunting task. The main problem is that prefetching concerns crosscut the cache structure......Given the high proportion of HTTP traffic in the Internet, Web caches are crucial to reduce user access time, network latency, and bandwidth consumption. Prefetching in a Web cache can further enhance these benefits. For the best performance, however, the prefetching policy must match user and Web....... Aspect-oriented programming is a natural technique to address this issue. Nevertheless, existing approaches either do not provide dynamic weaving, incur a high overhead for invocation of dynamically loaded code, or do not target C applications. In this paper we present µ-Dyner, which addresses...

  20. Adaptive Neuro-fuzzy Inference System as Cache Memory Replacement Policy

    Directory of Open Access Journals (Sweden)

    CHUNG, Y. M.

    2014-02-01

    Full Text Available To date, no cache memory replacement policy that can perform efficiently for all types of workloads is yet available. Replacement policies used in level 1 cache memory may not be suitable in level 2. In this study, we focused on developing an adaptive neuro-fuzzy inference system (ANFIS as a replacement policy for improving level 2 cache performance in terms of miss ratio. The recency and frequency of referenced blocks were used as input data for ANFIS to make decisions on replacement. MATLAB was employed as a training tool to obtain the trained ANFIS model. The trained ANFIS model was implemented on SimpleScalar. Simulations on SimpleScalar showed that the miss ratio improved by as high as 99.95419% and 99.95419% for instruction level 2 cache, and up to 98.04699% and 98.03467% for data level 2 cache compared with least recently used and least frequently used, respectively.

  1. Broadcasted Location-Aware Data Cache for Vehicular Application

    Directory of Open Access Journals (Sweden)

    Fukuda Akira

    2007-01-01

    Full Text Available There has been increasing interest in the exploitation of advances in information technology, for example, mobile computing and wireless communications in ITS (intelligent transport systems. Classes of applications that can benefit from such an infrastructure include traffic information, roadside businesses, weather reports, entertainment, and so on. There are several wireless communication methods currently available that can be utilized for vehicular applications, such as cellular phone networks, DSRC (dedicated short-range communication, and digital broadcasting. While a cellular phone network is relatively slow and a DSRC has a very small communication area, one-segment digital terrestrial broadcasting service was launched in Japan in 2006, high-performance digital broadcasting for mobile hosts has been available recently. However, broadcast delivery methods have the drawback that clients need to wait for the required data items to appear on the broadcast channel. In this paper, we propose a new cache system to effectively prefetch and replace broadcast data using "scope" (an available area of location-dependent data and "mobility specification" (a schedule according to the direction in which a mobile host moves. We numerically evaluate the cache system on the model close to the traffic road environment, and implement the emulation system to evaluate this location-aware data delivery method for a concrete vehicular application that delivers geographic road map data to a car navigation system.

  2. Improved Space Bounds for Cache-Oblivious Range Reporting

    DEFF Research Database (Denmark)

    Afshani, Peyman; Zeh, Norbert

    2011-01-01

    second main result shows that any cache-oblivious 2-d three-sided range reporting data structure with the optimal query bound has to use Ω(N logε N) space, thereby improving on a recent lower bound for the same problem. Using known transformations, the lower bound extends to 3-d dominance reporting and 3......We provide improved bounds on the size of cacheoblivious range reporting data structures that achieve the optimal query bound of O(logB N + K/B) block transfers. Our first main result is an O(N √ logN log logN)-space data structure that achieves this query bound for 3-d dominance reporting and 2-d...... three-sided range reporting. No cache-oblivious o(N log N/ log logN)-space data structure for these problems was known before, even when allowing a query bound of O(logO(1) 2 N + K/B) block transfers.1 Our result also implies improved space bounds for general 2-d and 3-d orthogonal range reporting. Our...

  3. Broadcasted Location-Aware Data Cache for Vehicular Application

    Directory of Open Access Journals (Sweden)

    Kenya Sato

    2007-05-01

    Full Text Available There has been increasing interest in the exploitation of advances in information technology, for example, mobile computing and wireless communications in ITS (intelligent transport systems. Classes of applications that can benefit from such an infrastructure include traffic information, roadside businesses, weather reports, entertainment, and so on. There are several wireless communication methods currently available that can be utilized for vehicular applications, such as cellular phone networks, DSRC (dedicated short-range communication, and digital broadcasting. While a cellular phone network is relatively slow and a DSRC has a very small communication area, one-segment digital terrestrial broadcasting service was launched in Japan in 2006, high-performance digital broadcasting for mobile hosts has been available recently. However, broadcast delivery methods have the drawback that clients need to wait for the required data items to appear on the broadcast channel. In this paper, we propose a new cache system to effectively prefetch and replace broadcast data using “scope” (an available area of location-dependent data and “mobility specification” (a schedule according to the direction in which a mobile host moves. We numerically evaluate the cache system on the model close to the traffic road environment, and implement the emulation system to evaluate this location-aware data delivery method for a concrete vehicular application that delivers geographic road map data to a car navigation system.

  4. Cache-Oblivious Planar Orthogonal Range Searching and Counting

    DEFF Research Database (Denmark)

    Arge, Lars; Brodal, Gerth Stølting; Fagerberg, Rolf

    2005-01-01

    present the first cache-oblivious data structure for planar orthogonal range counting, and improve on previous results for cache-oblivious planar orthogonal range searching. Our range counting structure uses O(Nlog2 N) space and answers queries using O(logB N) memory transfers, where B is the block...... size of any memory level in a multilevel memory hierarchy. Using bit manipulation techniques, the space can be further reduced to O(N). The structure can also be modified to support more general semigroup range sum queries in O(logB N) memory transfers, using O(Nlog2 N) space for three-sided queries...... and O(Nlog22 N/log2log2 N) space for four-sided queries. Based on the O(Nlog N) space range counting structure, we develop a data structure that uses O(Nlog2 N) space and answers three-sided range queries in O(logB N+T/B) memory transfers, where T is the number of reported points. Based...

  5. Groundwater conditions in Utah, spring of 2013

    Science.gov (United States)

    Burden, Carole B.; Birken, Adam S.; Derrick, V. Noah; Fisher, Martel J.; Holt, Christopher M.; Downhour, Paul; Smith, Lincoln; Eacret, Robert J.; Gibson, Travis L.; Slaugh, Bradley A.; Whittier, Nickolas R.; Howells, James H.; Christiansen, Howard K.

    2013-01-01

    This is the fiftieth in a series of annual reports that describe groundwater conditions in Utah. Reports in this series, published cooperatively by the U.S. Geological Survey and the Utah Department of Natural Resources, Division of Water Rights, and the Utah Department of Environmental Quality, Division of Water Quality, provide data to enable interested parties to maintain awareness of changing groundwater conditions. This report, like the others in the series, contains information on well construction, groundwater withdrawals from wells, water-level changes, precipitation, streamflow, and chemical quality of water. Information on well construction included in this report refers only to wells constructed for new appropriations of groundwater. Supplementary data are included in reports of this series only for those years or areas that are important to a discussion of changing groundwater conditions and for which applicable data are available.This report includes individual discussions of selected significant areas of groundwater development in the State for calendar year 2012. Most of the reported data were collected by the U.S. Geological Survey in cooperation with the Utah Department of Natural Resources, Division of Water Rights, and the Utah Department of Environmental Quality, Division of Water Quality. This report is also available online at http://www.waterrights.utah.gov/techinfo/ and http://ut.water. usgs.gov/publications/GW2013.pdf. Groundwater conditions in Utah for calendar year 2011 are reported in Burden and others (2012) and available online at http://ut.water.usgs.gov/ publications/GW2012.pdf

  6. Utah Wolf Management Plan, Utah Division of Wildlife Resources Publication #: 05-17

    OpenAIRE

    The Utah Division of Wildlife Resources; The Utah Wolf Working Group

    2005-01-01

    This plan will guide management of wolves in Utah during an interim period from delisting until 2015, or until it is determined that wolves have established1 in Utah, or assumptions of the plan (political, social, biological, or legal) change. During this interim period, arriving wolves will be studied to determine where they are most likely to settle without conflict. The goal of this plan is to manage, study, and conserve wolves moving into Utah while avoiding conflicts with the wildlife...

  7. Evidence against observational spatial memory for cache locations of conspecifics in marsh tits Poecile palustris.

    Science.gov (United States)

    Urhan, A Utku; Emilsson, Ellen; Brodin, Anders

    2017-01-01

    Many species in the family Paridae, such as marsh tits Poecile palustris, are large-scale scatter hoarders of food that make cryptic caches and disperse these in large year-round territories. The perhaps most well-known species in the family, the great tit Parus major, does not store food itself but is skilled in stealing caches from the other species. We have previously demonstrated that great tits are able to memorise positions of caches they have observed marsh tits make and later return and steal the food. As great tits are explorative in nature and unusually good learners, it is possible that such "memorisation of caches from a distance" is a unique ability of theirs. The other possibility is that this ability is general in the parid family. Here, we tested marsh tits in the same experimental set-up as where we previously have tested great tits. We allowed caged marsh tits to observe a caching conspecific in a specially designed indoor arena. After a retention interval of 1 or 24 h, we allowed the observer to enter the arena and search for the caches. The marsh tits showed no evidence of such observational memorization ability, and we believe that such ability is more useful for a non-hoarding species. Why should a marsh tit that memorises hundreds of their own caches in the field bother with the difficult task of memorising other individuals' caches? We argue that the close-up memorisation procedure that marsh tits use at their own caches may be a different type of observational learning than memorisation of caches made by others. For example, the latter must be done from a distance and hence may require the ability to adopt an allocentric perspective, i.e. the ability to visualise the cache from the hoarder's perspective. Members of the Paridae family are known to possess foraging techniques that are cognitively advanced. Previously, we have demonstrated that a non-hoarding parid species, the great tit P. major, is able to memorise positions of caches that

  8. Simulations of potential future conditions in the cache critical groundwater area, Arkansas

    Science.gov (United States)

    Rashid, Haveen M.; Clark, Brian R.; Mahdi, Hanan H.; Rifai, Hanadi S.; Al-Shukri, Haydar J.

    2015-01-01

    A three-dimensional finite-difference model for part of the Mississippi River Valley alluvial aquifer in the Cache Critical Groundwater Area of eastern Arkansas was constructed to simulate potential future conditions of groundwater flow. The objectives of this study were to test different pilot point distributions to find reasonable estimates of aquifer properties for the alluvial aquifer, to simulate flux from rivers, and to demonstrate how changes in pumping rates for different scenarios affect areas of long-term water-level declines over time. The model was calibrated using the parameter estimation code. Additional calibration was achieved using pilot points with regularization and singular value decomposition. Pilot point parameter values were estimated at a number of discrete locations in the study area to obtain reasonable estimates of aquifer properties. Nine pumping scenarios for the years 2011 to 2020 were tested and compared to the simulated water-level heads from 2010. Hydraulic conductivity values from pilot point calibration ranged between 42 and 173 m/d. Specific yield values ranged between 0.19 and 0.337. Recharge rates ranged between 0.00009 and 0.0006 m/d. The model was calibrated using 2,322 hydraulic head measurements for the years 2000 to 2010 from 150 observation wells located in the study area. For all scenarios, the volume of water depleted ranged between 5.7 and 23.3 percent, except in Scenario 2 (minimum pumping rates), in which the volume increased by 2.5 percent.

  9. A Victorious Defeat: Mission Command Failure of the 1857-1858 Utah Expedition

    Science.gov (United States)

    2016-05-26

    across Canada, Mexico, and California. Satisfied that the Mormons had found the isolation they were seeking, Young made the somewhat prophetic statement...for the ‘American Dream ’ are clamoring for the government to protect them from the abuses of the Mormon’s leadership in Utah.”52 Brigham Young...years, we will ask no odds of them.”69 Prophetic or not, the coincidence is uncanny that almost to the day a rider arrived in the valley with reports

  10. Client-Driven Joint Cache Management and Rate Adaptation for Dynamic Adaptive Streaming over HTTP

    Directory of Open Access Journals (Sweden)

    Chenghao Liu

    2013-01-01

    Full Text Available Due to the fact that proxy-driven proxy cache management and the client-driven streaming solution of Dynamic Adaptive Streaming over HTTP (DASH are two independent processes, some difficulties and challenges arise in media data management at the proxy cache and rate adaptation at the DASH client. This paper presents a novel client-driven joint proxy cache management and DASH rate adaptation method, named CLICRA, which moves prefetching intelligence from the proxy cache to the client. Based on the philosophy of CLICRA, this paper proposes a rate adaptation algorithm, which selects bitrates for the next media segments to be requested by using the predicted buffered media time in the client. CLICRA is realized by conveying information on the segments that are likely to be fetched subsequently to the proxy cache so that it can use the information for prefetching. Simulation results show that the proposed method outperforms the conventional segment-fetch-time-based rate adaptation and the proxy-driven proxy cache management significantly not only in streaming quality at the client but also in bandwidth and storage usage in proxy caches.

  11. Adjustable Two-Tier Cache for IPTV Based on Segmented Streaming

    Directory of Open Access Journals (Sweden)

    Kai-Chun Liang

    2012-01-01

    Full Text Available Internet protocol TV (IPTV is a promising Internet killer application, which integrates video, voice, and data onto a single IP network, and offers viewers an innovative set of choices and control over their TV content. To provide high-quality IPTV services, an effective strategy is based on caching. This work proposes a segment-based two-tier caching approach, which divides each video into multiple segments to be cached. This approach also partitions the cache space into two layers, where the first layer mainly caches to-be-played segments and the second layer saves possibly played segments. As the segment access becomes frequent, the proposed approach enlarges the first layer and reduces the second layer, and vice versa. Because requested segments may not be accessed frequently, this work further designs an admission control mechanism to determine whether an incoming segment should be cached or not. The cache architecture takes forward/stop playback into account and may replace the unused segments under the interrupted playback. Finally, we conduct comprehensive simulation experiments to evaluate the performance of the proposed approach. The results show that our approach can yield higher hit ratio than previous work under various environmental parameters.

  12. Nature as a treasure map! Teaching geoscience with the help of earth caches?!

    Science.gov (United States)

    Zecha, Stefanie; Schiller, Thomas

    2015-04-01

    This presentation looks at how earth caches are influence the learning process in the field of geo science in non-formal education. The development of mobile technologies using Global Positioning System (GPS) data to point geographical location together with the evolving Web 2.0 supporting the creation and consumption of content, suggest a potential for collaborative informal learning linked to location. With the help of the GIS in smartphones you can go directly in nature, search for information by your smartphone, and learn something about nature. Earth caches are a very good opportunity, which are organized and supervised geocaches with special information about physical geography high lights. Interested people can inform themselves about aspects in geoscience area by earth caches. The main question of this presentation is how these caches are created in relation to learning processes. As is not possible, to analyze all existing earth caches, there was focus on Bavaria and a certain feature of earth caches. At the end the authors show limits and potentials for the use of earth caches and give some remark for the future.

  13. Caching for where and what: evidence for a mnemonic strategy in a scatter-hoarder.

    Science.gov (United States)

    Delgado, Mikel M; Jacobs, Lucia F

    2017-09-01

    Scatter-hoarding animals face the task of maximizing retrieval of their scattered food caches while minimizing loss to pilferers. This demand should select for mnemonics, such as chunking, i.e. a hierarchical cognitive representation that is known to improve recall. Spatial chunking, where caches with the same type of content are related to each other in physical location and memory, would be one such mechanism. Here we tested the hypothesis that scatter-hoarding eastern fox squirrels (Sciurus niger) are organizing their caches in spatial patterns consistent with a chunking strategy. We presented 45 individual wild fox squirrels with a series of 16 nuts of four different species, either in runs of four of the same species or 16 nuts offered in a pseudorandom order. Squirrels either collected each nut from a different location or collected all nuts from a single location; we then mapped their subsequent cache distributions using GPS. The chunking hypothesis predicted that squirrels would spatially organize caches by nut species, regardless of presentation order. Our results instead demonstrated that squirrels spatially chunked their caches by nut species but only when caching food that was foraged from a single location. This first demonstration of spatial chunking in a scatter hoarder underscores the cognitive demand of scatter hoarding.

  14. Do Clark's nutcrackers demonstrate what-where-when memory on a cache-recovery task?

    Science.gov (United States)

    Gould, Kristy L; Ort, Amy J; Kamil, Alan C

    2012-01-01

    What-where-when (WWW) memory during cache recovery was investigated in six Clark's nutcrackers. During caching, both red- and blue-colored pine seeds were cached by the birds in holes filled with sand. Either a short (3 day) retention interval (RI) or a long (9 day) RI was followed by a recovery session during which caches were replaced with either a single seed or wooden bead depending upon the color of the cache and length of the retention interval. Knowledge of what was in the cache (seed or bead), where it was located, and when the cache had been made (3 or 9 days ago) were the three WWW memory components under investigation. Birds recovered items (bead or seed) at above chance levels, demonstrating accurate spatial memory. They also recovered seeds more than beads after the long RI, but not after the short RI, when they recovered seeds and beads equally often. The differential recovery after the long RI demonstrates that nutcrackers may have the capacity for WWW memory during this task, but it is not clear why it was influenced by RI duration.

  15. A Scalable and Highly Configurable Cache-Aware Hybrid Flash Translation Layer

    Directory of Open Access Journals (Sweden)

    Jalil Boukhobza

    2014-03-01

    Full Text Available This paper presents a cache-aware configurable hybrid flash translation layer (FTL, named CACH-FTL. It was designed based on the observation that most state-of­­-the-art flash-specific cache systems above FTLs flush groups of pages belonging to the same data block. CACH-FTL relies on this characteristic to optimize flash write operations placement, as large groups of pages are flushed to a block-mapped region, named BMR, whereas small groups are buffered into a page-mapped region, named PMR. Page group placement is based on a configurable threshold defining the limit under which it is more cost-effective to use page mapping (PMR and wait for grouping more pages before flushing to the BMR. CACH-FTL is scalable in terms of mapping table size and flexible in terms of Input/Output (I/O workload support. CACH-FTL performs very well, as the performance difference with the ideal page-mapped FTL is less than 15% in most cases and has a mean of 4% for the best CACH-FTL configurations, while using at least 78% less memory for table mapping storage on RAM.

  16. Hydrologic Data Sites for Iron County, Utah

    Data.gov (United States)

    U.S. Geological Survey, Department of the Interior — This map shows the USGS (United States Geologic Survey), NWIS (National Water Inventory System) Hydrologic Data Sites for Iron County, Utah. The scope and purpose of...

  17. Seismic retrofit guidelines for Utah highway bridges.

    Science.gov (United States)

    2009-05-01

    Much of Utahs population dwells in a seismically active region, and many of the bridges connecting transportation lifelines predate the rigorous seismic design standards that have been developed in the past 10-20 years. Seismic retrofitting method...

  18. Value-Based Caching in Information-Centric Wireless Body Area Networks

    Directory of Open Access Journals (Sweden)

    Fadi M. Al-Turjman

    2017-01-01

    Full Text Available We propose a resilient cache replacement approach based on a Value of sensed Information (VoI policy. To resolve and fetch content when the origin is not available due to isolated in-network nodes (fragmentation and harsh operational conditions, we exploit a content caching approach. Our approach depends on four functional parameters in sensory Wireless Body Area Networks (WBANs. These four parameters are: age of data based on periodic request, popularity of on-demand requests, communication interference cost, and the duration for which the sensor node is required to operate in active mode to capture the sensed readings. These parameters are considered together to assign a value to the cached data to retain the most valuable information in the cache for prolonged time periods. The higher the value, the longer the duration for which the data will be retained in the cache. This caching strategy provides significant availability for most valuable and difficult to retrieve data in the WBANs. Extensive simulations are performed to compare the proposed scheme against other significant caching schemes in the literature while varying critical aspects in WBANs (e.g., data popularity, cache size, publisher load, connectivity-degree, and severe probabilities of node failures. These simulation results indicate that the proposed VoI-based approach is a valid tool for the retrieval of cached content in disruptive and challenging scenarios, such as the one experienced in WBANs, since it allows the retrieval of content for a long period even while experiencing severe in-network node failures.

  19. Evidence against observational spatial memory for cache locations of conspecifics in marsh tits Poecile palustris

    OpenAIRE

    Urhan, A. Utku; Emilsson, Ellen; Brodin, Anders

    2017-01-01

    Abstract Many species in the family Paridae, such as marsh tits Poecile palustris, are large-scale scatter hoarders of food that make cryptic caches and disperse these in large year-round territories. The perhaps most well-known species in the family, the great tit Parus major, does not store food itself but is skilled in stealing caches from the other species. We have previously demonstrated that great tits are able to memorise positions of caches they have observed marsh tits make and later...

  20. Accurate low-cost methods for performance evaluation of cache memory systems

    Science.gov (United States)

    Laha, Subhasis; Patel, Janak H.; Iyer, Ravishankar K.

    1988-01-01

    Methods of simulation based on statistical techniques are proposed to decrease the need for large trace measurements and for predicting true program behavior. Sampling techniques are applied while the address trace is collected from a workload. This drastically reduces the space and time needed to collect the trace. Simulation techniques are developed to use the sampled data not only to predict the mean miss rate of the cache, but also to provide an empirical estimate of its actual distribution. Finally, a concept of primed cache is introduced to simulate large caches by the sampling-based method.

  1. Optical RAM-enabled cache memory and optical routing for chip multiprocessors: technologies and architectures

    Science.gov (United States)

    Pleros, Nikos; Maniotis, Pavlos; Alexoudi, Theonitsa; Fitsios, Dimitris; Vagionas, Christos; Papaioannou, Sotiris; Vyrsokinos, K.; Kanellos, George T.

    2014-03-01

    The processor-memory performance gap, commonly referred to as "Memory Wall" problem, owes to the speed mismatch between processor and electronic RAM clock frequencies, forcing current Chip Multiprocessor (CMP) configurations to consume more than 50% of the chip real-estate for caching purposes. In this article, we present our recent work spanning from Si-based integrated optical RAM cell architectures up to complete optical cache memory architectures for Chip Multiprocessor configurations. Moreover, we discuss on e/o router subsystems with up to Tb/s routing capacity for cache interconnection purposes within CMP configurations, currently pursued within the FP7 PhoxTrot project.

  2. Cache Sharing and Isolation Tradeoffs in Multicore Mixed-Criticality Systems

    Science.gov (United States)

    2015-05-01

    common practice today to allow hardware com- ponents such as last-level caches (LLCs) and memory con- trollers to be shared across cores; this can be...CAMA: A pre- dictable cache -aware memory allocator. In ECRTS ’11. [10] R. Kessler and M. Hill. Page placement algorithms for large real- indexed...allocation for real-time) cache design. In RTSS ’89. [14] L. Liu, Z. Cui, M. Xing, Y. Bao, M. Chen, and C. Wu. A software memory partition approach for

  3. A Multi-Layered Image Cache for Scientific Visualization

    Energy Technology Data Exchange (ETDEWEB)

    LaMar, E C

    2003-06-26

    We introduce a multi-layered image cache system that is designed to work with a pool of rendering engines to facilitate an interactive, frameless, asynchronous rendering environment. Our system decouples the rendering from the display of imagery. Therefore, it decouples render frequency and resolution from display frequency and resolution, and allows asynchronous transmission of imagery instead of the compute/send cycle of standard parallel systems. It also allows local, incremental refinement of imagery without requiring all imagery to be re-rendered. Images are placed in fixed position in camera (vs. world) space to eliminate occlusion artifacts. Display quality is improved by increasing the number of images. Interactivity is improved by decreasing the number of images.

  4. Memory-Intensive Benchmarks: IRAM vs. Cache-Based Machines

    Science.gov (United States)

    Biswas, Rupak; Gaeke, Brian R.; Husbands, Parry; Li, Xiaoye S.; Oliker, Leonid; Yelick, Katherine A.; Biegel, Bryan (Technical Monitor)

    2002-01-01

    The increasing gap between processor and memory performance has lead to new architectural models for memory-intensive applications. In this paper, we explore the performance of a set of memory-intensive benchmarks and use them to compare the performance of conventional cache-based microprocessors to a mixed logic and DRAM processor called VIRAM. The benchmarks are based on problem statements, rather than specific implementations, and in each case we explore the fundamental hardware requirements of the problem, as well as alternative algorithms and data structures that can help expose fine-grained parallelism or simplify memory access patterns. The benchmarks are characterized by their memory access patterns, their basic control structures, and the ratio of computation to memory operation.

  5. dCache, towards Federated Identities & Anonymized Delegation

    Science.gov (United States)

    Ashish, A.; Millar, AP; Mkrtchyan, T.; Fuhrmann, P.; Behrmann, G.; Sahakyan, M.; Adeyemi, O. S.; Starek, J.; Litvintsev, D.; Rossi, A.

    2017-10-01

    For over a decade, dCache has relied on the authentication and authorization infrastructure (AAI) offered by VOMS, Kerberos, Xrootd etc. Although the established infrastructure has worked well and provided sufficient security, the implementation of procedures and the underlying software is often seen as a burden, especially by smaller communities trying to adopt existing HEP software stacks [1]. Moreover, scientists are increasingly dependent on service portals for data access [2]. In this paper, we describe how federated identity management systems can facilitate the transition from traditional AAI infrastructure to novel solutions like OpenID Connect. We investigate the advantages offered by OpenID Connect in regards to ‘delegation of authentication’ and ‘credential delegation for offline access’. Additionally, we demonstrate how macaroons can provide a more fine-granular authorization mechanism that supports anonymized delegation.

  6. The University of Utah Urban Undertaking (U4)

    Science.gov (United States)

    Lin, J. C.; Mitchell, L.; Bares, R.; Mendoza, D. L.; Fasoli, B.; Bowling, D. R.; Garcia, M. A.; Buchert, M.; Pataki, D. E.; Crosman, E.; Horel, J.; Catharine, D.; Strong, C.; Ehleringer, J. R.

    2015-12-01

    The University of Utah is leading efforts to understand the spatiotemporal patterns in both emissions and concentrations of greenhouse gases (GHG) and criteria pollutants within urban systems. The urbanized corridor in northern Utah along the Wasatch Front, anchored by Salt Lake City, is undergoing rapid population growth that is projected to double in the next few decades. The Wasatch Front offers multiple advantages as an unique "urban laboratory": urban regions in multiple valleys spanning numerous orders of magnitude in population, each with unique airsheds, well-defined boundary conditions along deserts and tall mountains, strong signals during cold air pool events, seasonal contrasts in pollution, and a legacy of productive partnerships with local stakeholders and governments. We will show results from GHG measurements from the Wasatch Front, including one of the longest running continuous CO2 records in urban areas. Complementing this record are comprehensive meteorological observations and GHG/pollutant concentrations on mobile platforms: light rail, helicopter, and research vans. Variations in the GHG and pollutant observations illustrate human behavior and the resulting "urban metabolism" taking place on hourly, weekly, and seasonal cycles, resulting in a coupling between GHG and criteria pollutants. Moreover, these observations illustrate systematic spatial gradients in GHG and pollutant distributions between and within urban areas, traced to underlying gradients in population, energy use, terrain, and land use. Over decadal time scales the observations reveal growth of the "urban dome" due to expanding urban development. Using numerical models of the atmosphere, we further link concentrations of GHG and air quality-relevant pollutants to underlying emissions at the neighborhood scale as well as urban planning considerations.

  7. Energy valley in transition

    NARCIS (Netherlands)

    Verwayen, Barbara

    2006-01-01

    The Energy Valley foundation was born in 2004. It functions as a catalyst and platform for private and public organisations. It has a supporting and facilitating role in realising projects on energy conservation and sustainable energy. The Energy Valley a

  8. Ten dimensions of health and their relationships with overall self-reported health and survival in a predominately religiously active elderly population: the cache county memory study.

    Science.gov (United States)

    Østbye, Truls; Krause, Katrina M; Norton, Maria C; Tschanz, JoAnn; Sanders, Linda; Hayden, Kathleen; Pieper, Carl; Welsh-Bohmer, Kathleen A

    2006-02-01

    To document the extent of healthy aging along 10 different dimensions in a population known for its longevity. A cohort study with baseline measures of overall self-reported health and health along 10 specific dimensions; analyses investigated the 10 dimensions as predictors of self-reported health and 10-year mortality. Cache County, Utah, which is among the areas with the highest conditional life expectancy at age 65 in the United States. Inhabitants of Cache County aged 65 and older (January 1, 1995). Self-reported overall health and 10 specific dimensions of healthy aging: independent living, vision, hearing, activities of daily living, instrumental activities of daily living, absence of physical illness, cognition, healthy mood, social support and participation, and religious participation and spirituality. This elderly population was healthy overall. With few exceptions, 80% to 90% of persons aged 65 to 75 were healthy according to each measure used. Prevalence of excellent and good self-reported health decreased with age, to approximately 60% in those aged 85 and older. Even in the oldest old, the majority of respondents were independent in activities of daily living. Although vision, hearing, and mood were significant predictors of overall self-reported health in the final models, age, sex, and cognition were significant only in the final survival models. This population has a high prevalence of most factors representing healthy aging. The predictors of overall self-reported health are distinct from the predictors of survival in this age group and, being potentially modifiable, are amenable to clinical and public health efforts.

  9. Cache River National Wildlife Refuge [Land Status Map: Sheet 5 of 9

    Data.gov (United States)

    US Fish and Wildlife Service, Department of the Interior — This map was produced by the Division of Realty to depict landownership at Cache River National Wildlife Refuge. It was generated from rectified aerial photography,...

  10. Cache River National Wildlife Refuge: Annual Water Management Program : Calendar Year 1991

    Data.gov (United States)

    US Fish and Wildlife Service, Department of the Interior — The Cache River National Wildlife Refuge's Annual Water Management Plan has been developed to meet the station objectives. The purpose of this plan is to establish a...

  11. Energy-Efficient Caching for Mobile Edge Computing in 5G Networks

    National Research Council Canada - National Science Library

    Zhaohui Luo; Minghui LiWang; Zhijian Lin; Lianfen Huang; Xiaojiang Du; Mohsen Guizani

    2017-01-01

    Mobile Edge Computing (MEC), which is considered a promising and emerging paradigm to provide caching capabilities in proximity to mobile devices in 5G networks, enables fast, popular content delivery of delay-sensitive...

  12. Applying Data Mining Techniques to Improve Information Security in the Cloud: A Single Cache System Approach

    Directory of Open Access Journals (Sweden)

    Amany AlShawi

    2016-01-01

    Full Text Available Presently, the popularity of cloud computing is gradually increasing day by day. The purpose of this research was to enhance the security of the cloud using techniques such as data mining with specific reference to the single cache system. From the findings of the research, it was observed that the security in the cloud could be enhanced with the single cache system. For future purposes, an Apriori algorithm can be applied to the single cache system. This can be applied by all cloud providers, vendors, data distributors, and others. Further, data objects entered into the single cache system can be extended into 12 components. Database and SPSS modelers can be used to implement the same.

  13. Mobile Acoustical Bat Monitoring Annual Summary Report CY 2014- Cache River National Wildlife Refuge

    Data.gov (United States)

    US Fish and Wildlife Service, Department of the Interior — These reports summarize bat calls collected along transects at Cache River National Wildlife Refuge for the CY 2014. Calls were classified using Bat Call ID software...

  14. Minimizing cache misses in an event-driven network server: A case study of TUX

    DEFF Research Database (Denmark)

    Bhatia, Sapan; Consel, Charles; Lawall, Julia Laetitia

    2006-01-01

    servers by optimizing their use of the L2 CPU cache in the context of the TUX Web server, known for its robustness to heavy load. Our approach is based on a novel cache-aware memory allocator and a specific scheduling strategy that together ensure that the total working data set of the server stays......We analyze the performance of CPU-bound network servers and demonstrate experimentally that the degradation in the performance of these servers under high-concurrency workloads is largely due to inefficient use of the hardware caches. We then describe an approach to speeding up event-driven network...... in the L2 cache. Experiments show that under high concurrency, our optimizations improve the throughput of TUX by up to 40% and the number of requests serviced at the time of failure by 21%....

  15. Routing metrics for cache-based reliable transport in wireless sensor networks: Doc 721

    National Research Council Canada - National Science Library

    António M Grilo; Mike Heidrich

    2013-01-01

    .... The energy and bandwidth constraints of WSNs have motivated the development of new reliable transport protocols in which intermediate nodes are able to cache packets and to retransmit them to the...

  16. Routing metrics for cache-based reliable transport in wireless sensor networks

    National Research Council Canada - National Science Library

    Grilo, António M; Heidrich, Mike

    2013-01-01

    .... The energy and bandwidth constraints of WSNs have motivated the development of new reliable transport protocols in which intermediate nodes are able to cache packets and to retransmit them to the...

  17. Groundwater conditions in Utah, spring of 2014

    Science.gov (United States)

    Burden, Carole B.; Birken, Adam S.; Gerner, Steven J.; Carricaburu, John P.; Derrick, V. Noah; Downhour, Paul; Smith, Lincoln; Eacret, Robert J.; Gibson, Travis L.; Slaugh, Bradley A.; Whittier, Nickolas R.; Howells, James H.; Christiansen, Howard K.; Fisher, Martel J.

    2014-01-01

    This is the fifty-first in a series of annual reports that describe groundwater conditions in Utah. Reports in this series, published cooperatively by the U.S. Geological Survey and the Utah Department of Natural Resources, Division of Water Rights, and the Utah Department of Environmental Quality, Division of Water Quality, provide data to enable interested parties to maintain awareness of changing groundwater conditions.This report, like the others in the series, contains information on well construction, groundwater withdrawal from wells, water-level changes, precipitation, streamflow, and chemical quality of water. Information on well construction included in this report refers only to wells constructed for new appropriations of groundwater. Supplementary data are included in reports of this series only for those years or areas that are important to a discussion of changing groundwater conditions and for which applicable data are available.This report includes individual discussions of selected significant areas of groundwater development in the State for calendar year 2013. Most of the reported data were collected by the U.S. Geological Survey in cooperation with the Utah Department of Natural Resources, Division of Water Rights, and the Utah Department of Environmental Quality, Division of Water Quality. This report is also available online at http://www.waterrights.utah.gov/techinfo/ and http://ut.water. usgs.gov/publications/GW2014.pdf. Groundwater conditions in Utah for calendar year 2012 are reported in Burden and others (2013) and are available online at http://ut.water.usgs. gov/publications/GW2013.pdf

  18. Groundwater conditions in Utah, spring of 2016

    Science.gov (United States)

    Burden, Carole B.

    2016-01-01

    This is the fifty-third in a series of annual reports that describe groundwater conditions in Utah. Reports in this series, published cooperatively by the U.S. Geological Survey and the Utah Department of Natural Resources, Division of Water Rights, and the Utah Department of Environmental Quality, Division of Water Quality, provide data to enable interested parties to maintain awareness of changing groundwater conditions. This report, like the others in the series, contains information on well construction, groundwater withdrawals from wells, water-level changes, precipitation, streamflow, and chemical quality of water. Information on well construction included in this report refers only to new wells constructed for withdrawal of groundwater. Supplementary data are included in reports of this series only for those years or areas that are important to a discussion of changing groundwater conditions and for which applicable data are available.This report includes individual discussions of selected significant areas of groundwater development in the State for calendar year 2015. Most of the reported data were collected by the U.S. Geological Survey in cooperation with the Utah Department of Natural Resources, Division of Water Rights, and the Utah Department of Environmental Quality, Division of Water Quality. This report is also available online at http://www.waterrights.utah.gov/techinfo/ and http://ut.water.usgs.gov/publications/GW2016.pdf. Groundwater conditions in Utah for calendar year 2014 are reported in Burden and others (2015) and are available online at http://ut.water.usgs.gov/publications/GW2015.pdf

  19. Groundwater conditions in Utah, Spring of 2017

    Science.gov (United States)

    Burden, Carole B.

    2017-01-01

    This is the fifty-fourth in a series of annual reports that describe groundwater conditions in Utah. Reports in this series, published cooperatively by the U.S. Geological Survey and the Utah Department of Natural Resources, Division of Water Rights, and the Utah Department of Environmental Quality, Division of Water Quality, provide data to enable interested parties to maintain awareness of changing groundwater conditions.This report, like the others in the series, contains information on well construction, groundwater withdrawals from wells, water-level changes, precipitation, streamflow, and chemical quality of water. Information on well construction included in this report refers only to new wells constructed for withdrawal of groundwater. Supplementary data are included in reports of this series only for those years or areas that are important to a discussion of changing groundwater conditions and for which applicable data are available.This report includes individual discussions of selected significant areas of groundwater development in the State for calendar year 2016. Most of the reported data were collected by the U.S. Geological Survey in cooperation with the Utah Department of Natural Resources, Division of Water Rights, and the Utah Department of Environmental Quality, Division of Water Quality. This report is also available online at http://www.waterrights.utah.gov/techinfo/ and http://ut.water.usgs.gov/publications/GW2017.pdf. Groundwater conditions in Utah for calendar year 2015 are reported in Burden and others (2016) and are available online at http://ut.water.usgs.gov/publications/GW2016.pdf.

  20. Groundwater conditions in Utah, spring of 2012

    Science.gov (United States)

    Burden, Carole B.; Allen, David V.; Holt, Christopher M.; Fisher, Martel J.; Downhour, Paul; Smith, Lincoln; Eacret, Robert J.; Gibson, Travis L.; Slaugh, Bradley A.; Whittier, Nickolas R.; Howells, James H.; Christiansen, Howard K.

    2012-01-01

    This is the forty-ninth in a series of annual reports that describe groundwater conditions in Utah. Reports in this series, published cooperatively by the U.S. Geological Survey and the Utah Department of Natural Resources, Division of Water Rights, and the Utah Department of Environmental Quality, Division of Water Quality, provide data to enable interested parties to maintain awareness of changing groundwater conditions. This report, like the others in the series, contains information on well construction, groundwater withdrawal from wells, water-level changes, precipitation, streamflow, and chemical quality of water. Information on well construction included in this report refers only to wells constructed for new appropriations of groundwater. Supplementary data are included in reports of this series only for those years or areas that are important to a discussion of changing groundwater conditions and for which applicable data are available.This report includes individual discussions of selected significant areas of groundwater development in the State for calendar year 2011. Most of the reported data were collected by the U.S. Geological Survey in cooperation with the Utah Department of Natural Resources, Division of Water Rights, and the Utah Department of Environmental Quality, Division of Water Quality. This report is also available online at http:// www.waterrights.utah.gov/techinfo/ and http://ut.water.usgs. gov/publications/GW2012.pdf. Groundwater conditions in Utah for calendar year 2010 are reported in Burden and others (2011) and available online at http://ut.water.usgs.gov/ publications/GW2011.pdf.

  1. Content Delivery in Fog-Aided Small-Cell Systems with Offline and Online Caching: An Information—Theoretic Analysis

    Directory of Open Access Journals (Sweden)

    Seyyed Mohammadreza Azimi

    2017-07-01

    Full Text Available The storage of frequently requested multimedia content at small-cell base stations (BSs can reduce the load of macro-BSs without relying on high-speed backhaul links. In this work, the optimal operation of a system consisting of a cache-aided small-cell BS and a macro-BS is investigated for both offline and online caching settings. In particular, a binary fading one-sided interference channel is considered in which the small-cell BS, whose transmission is interfered by the macro-BS, has a limited-capacity cache. The delivery time per bit (DTB is adopted as a measure of the coding latency, that is, the duration of the transmission block, required for reliable delivery. For offline caching, assuming a static set of popular contents, the minimum achievable DTB is characterized through information-theoretic achievability and converse arguments as a function of the cache capacity and of the capacity of the backhaul link connecting cloud and small-cell BS. For online caching, under a time-varying set of popular contents, the long-term (average DTB is evaluated for both proactive and reactive caching policies. Furthermore, a converse argument is developed to characterize the minimum achievable long-term DTB for online caching in terms of the minimum achievable DTB for offline caching. The performance of both online and offline caching is finally compared using numerical results.

  2. dCache: Big Data storage for HEP communities and beyond

    Energy Technology Data Exchange (ETDEWEB)

    Millar, A. P. [DESY; Behrmann, G. [Unlisted, DK; Bernardt, C. [DESY; Fuhrmann, P. [DESY; Litvintsev, D. [Fermilab; Mkrtchyan, T. [DESY; Petersen, A. [DESY; Rossi, A. [Fermilab; Schwank, K. [DESY

    2014-01-01

    With over ten years in production use dCache data storage system has evolved to match ever changing lansdcape of continually evolving storage technologies with new solutions to both existing problems and new challenges. In this paper, we present three areas of innovation in dCache: providing efficient access to data with NFS v4.1 pNFS, adoption of CDMI and WebDAV as an alternative to SRM for managing data, and integration with alternative authentication mechanisms.

  3. A Birdstone and Phallic Pestle Cache from CA-ORA-365

    OpenAIRE

    Desautels, Nancy A.; Koerper, Henry C.; Couch, Jeffrey S.

    2005-01-01

    This study describes a ceremonial cache containing miniature pestle-like artifacts, a "spike " fragment, an obsidian biface, and a steatite birdstone recovered at Huntington Beach Mesa, Orange County. The phallic naturalism of one "pestle" suggests that more stylized specimens likewise denoted phallic symbols. The direct association of small "pestles" with birdstones, in this and other caches, supports the proposition that birdstones communicated fertility/fecundity symbolism.

  4. The relationship between dominance, corticosterone, memory, and food caching in mountain chickadees (Poecile gambeli).

    Science.gov (United States)

    Pravosudov, Vladimir V; Mendoza, Sally P; Clayton, Nicola S

    2003-08-01

    It has been hypothesized that in avian social groups subordinate individuals should maintain more energy reserves than dominants, as an insurance against increased perceived risk of starvation. Subordinates might also have elevated baseline corticosterone levels because corticosterone is known to facilitate fattening in birds. Recent experiments showed that moderately elevated corticosterone levels resulting from unpredictable food supply are correlated with enhanced cache retrieval efficiency and more accurate performance on a spatial memory task. Given the correlation between corticosterone and memory, a further prediction is that subordinates might be more efficient at cache retrieval and show more accurate performance on spatial memory tasks. We tested these predictions in dominant-subordinate pairs of mountain chickadees (Poecile gambeli). Each pair was housed in the same cage but caching behavior was tested individually in an adjacent aviary to avoid the confounding effects of small spaces in which birds could unnaturally and directly influence each other's behavior. In sharp contrast to our hypothesis, we found that subordinate chickadees cached less food, showed less efficient cache retrieval, and performed significantly worse on the spatial memory task than dominants. Although the behavioral differences could have resulted from social stress of subordination, and dominant birds reached significantly higher levels of corticosterone during their response to acute stress compared to subordinates, there were no significant differences between dominants and subordinates in baseline levels or in the pattern of adrenocortical stress response. We find no evidence, therefore, to support the hypothesis that subordinate mountain chickadees maintain elevated baseline corticosterone levels whereas lower caching rates and inferior cache retrieval efficiency might contribute to reduced survival of subordinates commonly found in food-caching parids.

  5. LPPS: A Distributed Cache Pushing Based K-Anonymity Location Privacy Preserving Scheme

    Directory of Open Access Journals (Sweden)

    Ming Chen

    2016-01-01

    Full Text Available Recent years have witnessed the rapid growth of location-based services (LBSs for mobile social network applications. To enable location-based services, mobile users are required to report their location information to the LBS servers and receive answers of location-based queries. Location privacy leak happens when such servers are compromised, which has been a primary concern for information security. To address this issue, we propose the Location Privacy Preservation Scheme (LPPS based on distributed cache pushing. Unlike existing solutions, LPPS deploys distributed cache proxies to cover users mostly visited locations and proactively push cache content to mobile users, which can reduce the risk of leaking users’ location information. The proposed LPPS includes three major process. First, we propose an algorithm to find the optimal deployment of proxies to cover popular locations. Second, we present cache strategies for location-based queries based on the Markov chain model and propose update and replacement strategies for cache content maintenance. Third, we introduce a privacy protection scheme which is proved to achieve k-anonymity guarantee for location-based services. Extensive experiments illustrate that the proposed LPPS achieves decent service coverage ratio and cache hit ratio with lower communication overhead compared to existing solutions.

  6. Milestone Report - Level-2 Milestone 5589: Modernization and Expansion of LLNL Archive Disk Cache

    Energy Technology Data Exchange (ETDEWEB)

    Shoopman, J. D. [Lawrence Livermore National Lab. (LLNL), Livermore, CA (United States)

    2016-02-04

    This report documents Livermore Computing (LC) activities in support of ASC L2 milestone 5589: Modernization and Expansion of LLNL Archive Disk Cache, due March 31, 2016. The full text of the milestone is included in Attachment 1. The description of the milestone is: Description: Configuration of archival disk cache systems will be modernized to reduce fragmentation, and new, higher capacity disk subsystems will be deployed. This will enhance archival disk cache capability for ASC archive users, enabling files written to the archives to remain resident on disk for many (6–12) months, regardless of file size. The milestone was completed in three phases. On August 26, 2015 subsystems with 6PB of disk cache were deployed for production use in LLNL’s unclassified HPSS environment. Following that, on September 23, 2015 subsystems with 9 PB of disk cache were deployed for production use in LLNL’s classified HPSS environment. On January 31, 2016, the milestone was fully satisfied when the legacy Data Direct Networks (DDN) archive disk cache subsystems were fully retired from production use in both LLNL’s unclassified and classified HPSS environments, and only the newly deployed systems were in use.

  7. A Technique for Improving Lifetime of Non-Volatile Caches Using Write-Minimization

    Directory of Open Access Journals (Sweden)

    Sparsh Mittal

    2016-01-01

    Full Text Available While non-volatile memories (NVMs provide high-density and low-leakage, they also have low write-endurance. This, along with the write-variation introduced by the cache management policies, can lead to very small cache lifetime. In this paper, we propose ENLIVE, a technique for ENhancing the LIfetime of non-Volatile cachEs. Our technique uses a small SRAM (static random access memory storage, called HotStore. ENLIVE detects frequently written blocks and transfers them to the HotStore so that they can be accessed with smaller latency and energy. This also reduces the number of writes to the NVM cache which improves its lifetime. We present microarchitectural schemes for managing the HotStore. Simulations have been performed using an x86-64 simulator and benchmarks from SPEC2006 suite. We observe that ENLIVE provides higher improvement in lifetime and better performance and energy efficiency than two state-of-the-art techniques for improving NVM cache lifetime. ENLIVE provides 8.47×, 14.67× and 15.79× improvement in lifetime or two, four and eight core systems, respectively. In addition, it works well for a range of system and algorithm parameters and incurs only small overhead.

  8. Groundwater conditions in Utah, spring of 2011

    Science.gov (United States)

    Burden, Carole B.

    2011-01-01

    This is the forty-eighth in a series of annual reports that describe groundwater conditions in Utah. Reports in this series, published cooperatively by the U.S. Geological Survey and the Utah Department of Natural Resources, Division of Water Rights, and the Utah Department of Environmental Quality, Division of Water Quality, provide data to enable interested parties to maintain awareness of changing groundwater conditions. This report, like the others in the series, contains information on well construction, groundwater withdrawal from wells, water-level changes, precipitation, streamflow, and chemical quality of water. Information on well construction included in this report refers only to wells constructed for new appropriations of groundwater. Supplementary data are included in reports of this series only for those years or areas that are important to a discussion of changing groundwater conditions and for which applicable data are available.This report includes individual discussions of selected significant areas of groundwater development in the State for calendar year 2010. Most of the reported data were collected by the U.S. Geological Survey in cooperation with the Utah Department of Natural Resources, Division of Water Rights, and the Utah Department of Environmental Quality, Division of Water Quality. This report is also available online at http:// www.waterrights.utah.gov/techinfo/ and http://ut.water.usgs. gov/publications/GW2011.pdf. Groundwater conditions in Utah for calendar year 2009 are reported in Burden and others (2010) and available online at http://ut.water.usgs.gov/ publications/GW2010.pdf.Analytical results associated with water samples collected from each area of groundwater development were compared to State of Utah Maximum Contaminant Levels (MCLs) and secondary drinking-water standards of routinely measureable substances present in water supplies. The MCLs and secondary drinking-water standards can be accessed online at http://www.rules.utah

  9. Seepage water of northern Utah

    Science.gov (United States)

    Fortier, Samuel

    1897-01-01

    The term “seepage water” is used by the irrigators of the West to designate the water which reaches the lowest grounds or the stream channels, swelling the latter by imperceptible degrees and keeping up the flow long after the rains have ceased and the snow has melted. The word “seepage” is applied particularly to the water which begins to appear in spots below irrigation canals and cultivated fields, usually some months or even years after irrigation has been introduced, and which tends to convert the lowlands into marshes and gives rise to springs, which in turn may be employed in watering other fields.The importance of a thorough knowledge of the behavior of seepage water is obvious when consideration is given to the close relationship which exists between the available water supply and the material prosperity of the arid region where irrigation is practiced. This is particularly true of Utah, where every readily available source of supply has long since been utilized and where the rapidly increasing agricultural population necessitates the complete utilization of all fresh waters.

  10. Dendrochronology of Utah Juniper (Juniperus osteosperma (Torr.) Little)

    Science.gov (United States)

    R. Justin Derose; Matthew F. Bekker; Roger Kjelgren; Brendan M. Buckley; James H. Speer; Eric B. Allen

    2016-01-01

    Utah juniper was a foundational species for the discipline of dendrochronology, having been used in the early 20th Century investigations of Mesa Verde, but has been largely ignored by dendrochronologists since. Here we present dendrochronological investigations of Utah juniper core and cross-sectional samples from four sites in northern Utah. We demonstrate that,...

  11. Utah Article Delivery: A New Model for Consortial Resource Sharing.

    Science.gov (United States)

    Kochan, Carol A.; Lee, Daniel R.

    1998-01-01

    Describes the UTAD (Utah Article Delivery) Pilot Project, an innovative resource-sharing service that provides journal articles to the Utah higher education community, developed by the Utah Academic Library Consortium (UALC) in partnership with EBSCO Document Services. Highlights include goals, options considered, challenges, and evaluation. The…

  12. 75 FR 12562 - Central Utah Project Completion Act

    Science.gov (United States)

    2010-03-16

    ...: Department of the Interior, Office of the Assistant Secretary-- Water and Science; Utah Reclamation... River and its interface with Utah Lake related to flow, food supply and shelter. A compounding factor is... Utah Lake; Expedite recovery of the endangered June sucker by re- establishing essential June sucker...

  13. Preliminary isostatic gravity map of the Grouse Creek and east part of the Jackpot 30 by 60 quadrangles, Box Elder County, Utah, and Cassia County, Idaho

    Science.gov (United States)

    Langenheim, Victoria; Willis, H.; Athens, N.D.; Chuchel, Bruce A.; Roza, J.; Hiscock, H.I.; Hardwick, C.L.; Kraushaar, S.M.; Knepprath, N.E.; Rosario, Jose J.

    2013-01-01

    A new isostatic residual gravity map of the northwest corner of Utah is based on compilation of preexisting data and new data collected by the Utah and United States Geological Surveys. Pronounced gravity lows occur over Junction, Grouse Creek, and upper Raft River Valleys, indicating significant thickness of low-density Tertiary sedimentary rocks and deposits. Gravity highs coincide with exposures of dense pre-Cenozoic rocks in the Raft River Mountains. Higher values in the eastern part of the map may be produced in part by deeper crustal density variations or crustal thinning. Steep linear gravity gradients coincide with mapped Neogene normal faults near Goose Creek and may define basin-bounding faults concealed beneath Junction and Upper Raft River Valleys.

  14. 76 FR 69296 - University of Utah, University of Utah TRIGA Nuclear Reactor, Notice of Issuance of Renewed...

    Science.gov (United States)

    2011-11-08

    ... COMMISSION University of Utah, University of Utah TRIGA Nuclear Reactor, Notice of Issuance of Renewed... Test Reactor Licensing Branch, Division of Policy and Rulemaking, Office of Nuclear Reactor Regulation... University of Utah (UU, the licensee), which authorizes continued operation of the UU TRIGA Nuclear Reactor...

  15. Anaglyph, Salt Lake City, Utah

    Science.gov (United States)

    2002-01-01

    The 2002 Winter Olympics are hosted by Salt Lake City at several venues within the city, in nearby cities, and within the adjacent Wasatch Mountains. This anaglyph image provides a stereoscopic map view of north central Utah that includes all of these Olympic sites. In the south, next to Utah Lake, Provo hosts the ice hockey competition. In the north, northeast of the Great Salt Lake, Ogden hosts curling and the nearby Snowbasin ski area hosts the downhill events. In between, southeast of the Great Salt Lake, Salt Lake City hosts the Olympic Village and the various skating events. Further east, across the Wasatch Mountains, the Park City ski resort hosts the bobsled, ski jumping, and snowboarding events. The Winter Olympics are always hosted in mountainous terrain. This view shows the dramatic landscape that makes the Salt Lake City region a world-class center for winter sports.The stereoscopic effect of this anaglyph was created by first draping a Landsat satellite image over a Shuttle Radar Topography Mission digital elevation model and then generating two differing perspectives, one for each eye. When viewed through special glasses, the result is a vertically exaggerated view of Earth's surface in its full three dimensions. Anaglyph glasses cover the left eye with a red filter and cover the right eye with a blue filter.Landsat has been providing visible and infrared views of the Earth since 1972. SRTM elevation data matches the 30-meter (98-foot) resolution of most Landsat images and will substantially help in analyzing the large and growing Landsat image archive, managed by the U.S. Geological Survey (USGS).Elevation data used in this image was acquired by the Shuttle Radar Topography Mission (SRTM) aboard the Space Shuttle Endeavour, launched on Feb. 11, 2000. SRTM used the same radar instrument that comprised the Spaceborne Imaging Radar-C/X-Band Synthetic Aperture Radar (SIR-C/X-SAR) that flew twice on the Space Shuttle Endeavour in 1994. SRTM was designed

  16. Innovative Mobile E-Healthcare Systems: A New Rule-Based Cache Replacement Strategy Using Least Profit Values

    Directory of Open Access Journals (Sweden)

    Ramzi A. Haraty

    2016-01-01

    Full Text Available Providing and managing e-health data from heterogeneous and ubiquitous e-health service providers in a content distribution network (CDN for providing e-health services is a challenging task. A content distribution network is normally utilized to cache e-health media contents such as real-time medical images and videos. Efficient management, storage, and caching of distributed e-health data in a CDN or in a cloud computing environment of mobile patients facilitate that doctors, health care professionals, and other e-health service providers have immediate access to e-health information for efficient decision making as well as better treatment. Caching is one of the key methods in distributed computing environments to improve the performance of data retrieval. To find which item in the cache can be evicted and replaced, cache replacement algorithms are used. Many caching approaches are proposed, but the SACCS—Scalable Asynchronous Cache Consistency Scheme—has proved to be more scalable than the others. In this work, we propose a new cache replacement algorithm—Profit SACCS—that is based on the rule-based least profit value. It replaces the least recently used strategy that SACCS uses. A comparison with different cache replacement strategies is also presented.

  17. Geology, selected geophysics, and hydrogeology of the White River and parts of the Great Salt Lake Desert regional groundwater flow systems, Utah and Nevada

    Science.gov (United States)

    Rowley, Peter D.; Dixon, Gary L.; Watrus , James M.; Burns, Andrews G.; Mankinen, Edward A.; McKee, Edwin H.; Pari, Keith T.; Ekren, E. Bartlett; Patrick , William G.; Comer, John B.; Inkenbrandt, Paul C.; Krahulec, K.A.; Pinnell, Michael L.

    2016-01-01

    The east-central Great Basin near the Utah-Nevada border contains two great groundwater flow systems. The first, the White River regional groundwater flow system, consists of a string of hydraulically connected hydrographic basins in Nevada spanning about 270 miles from north to south. The northernmost basin is Long Valley and the southernmost basin is the Black Mountain area, a valley bordering the Colorado River. The general regional groundwater flow direction is north to south. The second flow system, the Great Salt Lake Desert regional groundwater flow system, consists of hydrographic basins that straddle

  18. Accurate modeling of cache replacement policies in a Data-Grid.

    Energy Technology Data Exchange (ETDEWEB)

    Otoo, Ekow J.; Shoshani, Arie

    2003-01-23

    Caching techniques have been used to improve the performance gap of storage hierarchies in computing systems. In data intensive applications that access large data files over wide area network environment, such as a data grid,caching mechanism can significantly improve the data access performance under appropriate workloads. In a data grid, it is envisioned that local disk storage resources retain or cache the data files being used by local application. Under a workload of shared access and high locality of reference, the performance of the caching techniques depends heavily on the replacement policies being used. A replacement policy effectively determines which set of objects must be evicted when space is needed. Unlike cache replacement policies in virtual memory paging or database buffering, developing an optimal replacement policy for data grids is complicated by the fact that the file objects being cached have varying sizes and varying transfer and processing costs that vary with time. We present an accurate model for evaluating various replacement policies and propose a new replacement algorithm referred to as ''Least Cost Beneficial based on K backward references (LCB-K).'' Using this modeling technique, we compare LCB-K with various replacement policies such as Least Frequently Used (LFU), Least Recently Used (LRU), Greedy DualSize (GDS), etc., using synthetic and actual workload of accesses to and from tertiary storage systems. The results obtained show that (LCB-K) and (GDS) are the most cost effective cache replacement policies for storage resource management in data grids.

  19. Baseline risk assessment of ground water contamination at the Monument Valley Uranium Mill Tailings Site, Cane Valley, Arizona. Revision 1

    Energy Technology Data Exchange (ETDEWEB)

    1994-08-01

    This baseline risk assessment evaluates potential impact to public health or the environment from ground water contamination at the former uranium mill processing site in Cane Valley near Monument Valley, Arizona. The US Department of Energy (DOE) Uranium Mill Tailings Remedial Action (UMTRA) Project has relocated and stabilized this site`s tailings and other contaminated material in a disposal cell at Mexican Hat, Utah. The second phase of the UMTRA Project is to evaluate ground water contamination. This risk assessment is the first document specific to this site for the Ground Water Project that evaluates potential health and environmental risks. It will help determine the approach required to address contaminated ground water at the site.

  20. Bibliography of Utah radioactive occurrences. Volume I

    Energy Technology Data Exchange (ETDEWEB)

    Doelling, H.H. (comp.)

    1983-07-01

    The references in this bibliography were assembled by reviewing published bibliographies of Utah geology, unpublished reports of the US Geological Survey and the Department of Energy, and various university theses. Each of the listings is cross-referenced by location and subject matter. This report is published in two volumes.

  1. Utah Science Vol. 62 No. 1, 2003

    OpenAIRE

    2003-01-01

    2 PUTTING FAT ON THE TASTE MAP 8 GAINING WEIGHT AND LOSING YOUR MIND 18 THINKING LIKE YOUR ANIMALS 12 SEEDS -new people, grants and contracts in science 15 SYNTHESIS -science at Utah State 24 SEEK -discoveries in science 25 SEARCH -science on the web

  2. Utah Youth Suicide Study: Psychological Autopsy

    Science.gov (United States)

    Moskos, Michelle; Olson, Lenora; Halbern, Sarah; Keller, Trisha; Gray, Doug

    2005-01-01

    We conducted a psychological autopsy study to further understand youth suicide in Utah. While traditional psychological autopsy studies primarily focus on the administration of psychometric measures to identify any underlying diagnosis of mental illness for the suicide decedent, we focused our interviews to identify which contacts in the…

  3. Project Horizon: How Utah Is Reducing Recidivism.

    Science.gov (United States)

    Robinson, Daimar

    2000-01-01

    Project Horizon, Utah's statute to reduce the economic and social cost of recidivism, shifted funding for correctional education to the state education agency. Parolees who participated in Project Horizon had an 18-20 percent lower recidivism rate than nonparticipants and found post-release jobs 89 percent of the time. (JOW)

  4. Bibliography of Utah radioactive occurrences. Volume II

    Energy Technology Data Exchange (ETDEWEB)

    Doelling, H.H. (comp.)

    1983-07-01

    The references in this bibliography were assembled by reviewing published bibliographies of Utah geology, unpublished reports of the US Geological Survey and the Department of Energy, and various university theses. Each of the listings is cross-referenced by location and subject matter. This report is published in two volumes.

  5. 40 CFR 81.345 - Utah.

    Science.gov (United States)

    2010-07-01

    ... County Salt Lake County (part) Remainder of Salt Lake County San Juan County Sanpete County Sevier County... Morgan County Piute County Rich County San Juan County Sanpete County Sevier County Summit County Tooele... Sanpete County Sevier County Summit County Tooele County Uintah County Utah County Wasatch County...

  6. 78 FR 9807 - Utah Regulatory Program

    Science.gov (United States)

    2013-02-12

    ... did not respond to our request. State Historic Preservation Officer (SHPO) and the Advisory Council on Historic Preservation (ACHP) Under 30 CFR 732.17(h)(4), we are required to request comments from the SHPO... Utah program. We find that good cause exists under 5 U.S.C. 553(d)(3) to make this final rule effective...

  7. Food-caching in timber wolves, and the question of rules of action syntax.

    Science.gov (United States)

    Phillips, D P; Danilchuk, W; Ryon, J; Fentress, J C

    1990-04-16

    This report presents data on the sequence of motor operations used by captive timber wolves to cache food. Videotapes were obtained of 151 caching episodes by 8 wolves. The vast majority of these episodes contained 3 distinct phases, each composed of movements unique to that phase. The excavation of the cache site was always done with the forefeet, and burying of the food was always done with the snout. Both the identity of the movements, and the serial order of phases were independent of the sex of the animal, the season in which the observations were made, and the nature of the substrate. A comparison of the temporal sequencing of these actions with the temporal stereotypy seen in rodent motor patterns (e.g. grooming) revealed a striking phenomenological similarity. The factors shaping the temporal sequencing in the two behaviors are, however, probably very different. This is because much, though not all, of the temporal stereotypy in the sequence of movements used by the wolf in caching is constrained by the logistics of the cache operation, while this is not the case for the phases of facial grooming in rodents. The implications of our data for the kinds of behavioral evidence required for ascription of such stereotypy to a central pattern generator are discussed.

  8. Dynamic Allocation of SPM Based on Time-Slotted Cache Conflict Graph for System Optimization

    Science.gov (United States)

    Wu, Jianping; Ling, Ming; Zhang, Yang; Mei, Chen; Wang, Huan

    This paper proposes a novel dynamic Scratch-pad Memory allocation strategy to optimize the energy consumption of the memory sub-system. Firstly, the whole program execution process is sliced into several time slots according to the temporal dimension; thereafter, a Time-Slotted Cache Conflict Graph (TSCCG) is introduced to model the behavior of Data Cache (D-Cache) conflicts within each time slot. Then, Integer Nonlinear Programming (INP) is implemented, which can avoid time-consuming linearization process, to select the most profitable data pages. Virtual Memory System (VMS) is adopted to remap those data pages, which will cause severe Cache conflicts within a time slot, to SPM. In order to minimize the swapping overhead of dynamic SPM allocation, a novel SPM controller with a tightly coupled DMA is introduced to issue the swapping operations without CPU's intervention. Last but not the least, this paper discusses the fluctuation of system energy profit based on different MMU page size as well as the Time Slot duration quantitatively. According to our design space exploration, the proposed method can optimize all of the data segments, including global data, heap and stack data in general, and reduce the total energy consumption by 27.28% on average, up to 55.22% with a marginal performance promotion. And comparing to the conventional static CCG (Cache Conflicts Graph), our approach can obtain 24.7% energy profit on average, up to 30.5% with a sight boost in performance.

  9. Two-Layer Error Control Codes Combining Rectangular and Hamming Product Codes for Cache Error

    Directory of Open Access Journals (Sweden)

    Meilin Zhang

    2014-02-01

    Full Text Available We propose a novel two-layer error control code, combining error detection capability of rectangular codes and error correction capability of Hamming product codes in an efficient way, in order to increase cache error resilience for many core systems, while maintaining low power, area and latency overhead. Based on the fact of low latency and overhead of rectangular codes and high error control capability of Hamming product codes, two-layer error control codes employ simple rectangular codes for each cache line to detect cache errors, while loading the extra Hamming product code checks bits in the case of error detection; thus enabling reliable large-scale cache operations. Analysis and experiments are conducted to evaluate the cache fault-tolerant capability of various existing solutions and the proposed approach. The results show that the proposed approach can significantly increase Mean-Error-To-Failure (METF and Mean-Time-To-failure (MTTF up to 2.8×, reduce storage overhead by over 57%, and increase instruction per-cycle (IPC up to 7%, compared to complex four-way 4EC5ED; and it increases METF and MTTF up to 133×, reduces storage overhead by over 11%, and achieves a similar IPC compared to simple eight-way single-error correcting double-error detecting (SECDED. The cost of the proposed approach is no more than 4% external memory access overhead.

  10. Improving the performance of heterogeneous multi-core processors by modifying the cache coherence protocol

    Science.gov (United States)

    Fang, Juan; Hao, Xiaoting; Fan, Qingwen; Chang, Zeqing; Song, Shuying

    2017-05-01

    In the Heterogeneous multi-core architecture, CPU and GPU processor are integrated on the same chip, which poses a new challenge to the last-level cache management. In this architecture, the CPU application and the GPU application execute concurrently, accessing the last-level cache. CPU and GPU have different memory access characteristics, so that they have differences in the sensitivity of last-level cache (LLC) capacity. For many CPU applications, a reduced share of the LLC could lead to significant performance degradation. On the contrary, GPU applications can tolerate increase in memory access latency when there is sufficient thread-level parallelism. Taking into account the GPU program memory latency tolerance characteristics, this paper presents a method that let GPU applications can access to memory directly, leaving lots of LLC space for CPU applications, in improving the performance of CPU applications and does not affect the performance of GPU applications. When the CPU application is cache sensitive, and the GPU application is insensitive to the cache, the overall performance of the system is improved significantly.

  11. Analysis of power gating in different hierarchical levels of 2MB cache, considering variation

    Science.gov (United States)

    Jafari, Mohsen; Imani, Mohsen; Fathipour, Morteza

    2015-09-01

    This article reintroduces power gating technique in different hierarchical levels of static random-access memory (SRAM) design including cell, row, bank and entire cache memory in 16 nm Fin field effect transistor. Different structures of SRAM cells such as 6T, 8T, 9T and 10T are used in design of 2MB cache memory. The power reduction of the entire cache memory employing cell-level optimisation is 99.7% with the expense of area and other stability overheads. The power saving of the cell-level optimisation is 3× (1.2×) higher than power gating in cache (bank) level due to its superior selectivity. The access delay times are allowed to increase by 4% in the same energy delay product to achieve the best power reduction for each supply voltages and optimisation levels. The results show the row-level power gating is the best for optimising the power of the entire cache with lowest drawbacks. Comparisons of cells show that the cells whose bodies have higher power consumption are the best candidates for power gating technique in row-level optimisation. The technique has the lowest percentage of saving in minimum energy point (MEP) of the design. The power gating also improves the variation of power in all structures by at least 70%.

  12. Will video caching remain energy efficient in future core optical networks?

    Directory of Open Access Journals (Sweden)

    Niemah Izzeldin Osman

    2017-02-01

    Full Text Available Optical networks are expected to cater for the future Internet due to the high speed and capacity that they offer. Caching in the core network has proven to reduce power usage for various video services in current optical networks. This paper investigates whether video caching will still remain power efficient in future optical networks. The study compares the power consumption of caching in a current IP over WDM core network to a future network. The study considers a number of features to exemplify future networks. Future optical networks are considered where: (1 network devices consume less power, (2 network devices have sleep-mode capabilities, (3 IP over WDM implements lightpath bypass, and (4 the demand for video content significantly increases and high definition video dominates. Results show that video caching in future optical networks saves up to 42% of power consumption even when the power consumption of transport reduces. These results suggest that video caching is expected to remain a green option in video services in the future Internet.

  13. Groundwater conditions in Utah, spring of 2015

    Science.gov (United States)

    Burden, Carole B.

    2015-01-01

    This is the fifty-second in a series of annual reports that describe groundwater conditions in Utah. Reports in this series, published cooperatively by the U.S. Geological Survey and the Utah Department of Natural Resources, Division of Water Rights, and the Utah Department of Environmental Quality, Division of Water Quality, provide data to enable interested parties to maintain awareness of changing groundwater conditions. This report, like the others in the series, contains information on well construction, groundwater withdrawals from wells, water-level changes, precipitation, streamflow, and chemical quality of water. Information on well construction included in this report refers only to new wells constructed for withdrawal of groundwater. Supplementary data are included in reports of this series only for those years or areas that are important to a discussion of changing groundwater conditions and for which applicable data are available.This report includes individual discussions of selected significant areas of groundwater development in the State for calendar year 2014. Most of the reported data were collected by the U.S. Geological Survey in cooperation with the Utah Department of Natural Resources, Division of Water Rights, and the Utah Department of Environmental Quality, Division of Water Quality. This report is also available online at http://www.waterrights.utah.gov/techinfo/ and http://ut.water.usgs.gov/publications/GW2015.pdf. Groundwater conditions in Utah for calendar year 2013 are reported in Burden and others (2014) and are available online at http://ut.water.usgs.gov/publications/GW2014.pdf.The water-level change maps in this report show the difference between water levels measured in the same well at two distinct times: in the spring of 1985 and the spring of 2015. Throughout the state, many groundwater levels were near their peak in or around 1985 following a multiple-year period of above average precipitation in the early 1980s. Conversely

  14. Evict on write, a management strategy for a prefetch unit and/or first level cache in a multiprocessor system with speculative execution

    Science.gov (United States)

    Gara, Alan; Ohmacht, Martin

    2014-09-16

    In a multiprocessor system with at least two levels of cache, a speculative thread may run on a core processor in parallel with other threads. When the thread seeks to do a write to main memory, this access is to be written through the first level cache to the second level cache. After the write though, the corresponding line is deleted from the first level cache and/or prefetch unit, so that any further accesses to the same location in main memory have to be retrieved from the second level cache. The second level cache keeps track of multiple versions of data, where more than one speculative thread is running in parallel, while the first level cache does not have any of the versions during speculation. A switch allows choosing between modes of operation of a speculation blind first level cache.

  15. Silicon Valley: Planet Startup

    NARCIS (Netherlands)

    Dr. P. Ester; dr. A. Maas

    2016-01-01

    For decades now, Silicon Valley has been the home of the future. It's the birthplace of the world's most successful high-tech companies-including Apple, Yahoo, Google, Facebook, Twitter, and many more. So what's the secret? What is it about Silicon Valley that fosters entrepreneurship and

  16. Haemoragisk Rift Valley Fever

    DEFF Research Database (Denmark)

    Fabiansen, Christian; Thybo, Søren

    2007-01-01

    A case of fatal hemorrhagic Rift Valley fever during an epidemic in Kenya's North Eastern Province in January 2007 is described.......A case of fatal hemorrhagic Rift Valley fever during an epidemic in Kenya's North Eastern Province in January 2007 is described....

  17. A Network-Aware Distributed Storage Cache for Data Intensive Environments

    Energy Technology Data Exchange (ETDEWEB)

    Tierney, B.L.; Lee, J.R.; Johnston, W.E.; Crowley, B.; Holding, M.

    1999-12-23

    Modern scientific computing involves organizing, moving, visualizing, and analyzing massive amounts of data at multiple sites around the world. The technologies, the middleware services, and the architectures that are used to build useful high-speed, wide area distributed systems, constitute the field of data intensive computing. In this paper the authors describe an architecture for data intensive applications where they use a high-speed distributed data cache as a common element for all of the sources and sinks of data. This cache-based approach provides standard interfaces to a large, application-oriented, distributed, on-line, transient storage system. They describe their implementation of this cache, how they have made it network aware, and how they do dynamic load balancing based on the current network conditions. They also show large increases in application throughput by access to knowledge of the network conditions.

  18. Security Enhancement Using Cache Based Reauthentication in WiMAX Based E-Learning System

    Directory of Open Access Journals (Sweden)

    Chithra Rajagopal

    2015-01-01

    Full Text Available WiMAX networks are the most suitable for E-Learning through their Broadcast and Multicast Services at rural areas. Authentication of users is carried out by AAA server in WiMAX. In E-Learning systems the users must be forced to perform reauthentication to overcome the session hijacking problem. The reauthentication of users introduces frequent delay in the data access which is crucial in delaying sensitive applications such as E-Learning. In order to perform fast reauthentication caching mechanism known as Key Caching Based Authentication scheme is introduced in this paper. Even though the cache mechanism requires extra storage to keep the user credentials, this type of mechanism reduces the 50% of the delay occurring during reauthentication.

  19. Simplifying and speeding the management of intra-node cache coherence

    Energy Technology Data Exchange (ETDEWEB)

    Blumrich, Matthias A [Ridgefield, CT; Chen, Dong [Croton on Hudson, NY; Coteus, Paul W [Yorktown Heights, NY; Gara, Alan G [Mount Kisco, NY; Giampapa, Mark E [Irvington, NY; Heidelberger, Phillip [Cortlandt Manor, NY; Hoenicke, Dirk [Ossining, NY; Ohmacht, Martin [Yorktown Heights, NY

    2012-04-17

    A method and apparatus for managing coherence between two processors of a two processor node of a multi-processor computer system. Generally the present invention relates to a software algorithm that simplifies and significantly speeds the management of cache coherence in a message passing parallel computer, and to hardware apparatus that assists this cache coherence algorithm. The software algorithm uses the opening and closing of put/get windows to coordinate the activated required to achieve cache coherence. The hardware apparatus may be an extension to the hardware address decode, that creates, in the physical memory address space of the node, an area of virtual memory that (a) does not actually exist, and (b) is therefore able to respond instantly to read and write requests from the processing elements.

  20. Memory for multiple cache locations and prey quantities in a food-hoarding songbird

    Directory of Open Access Journals (Sweden)

    Nicola eArmstrong

    2012-12-01

    Full Text Available Most animals can discriminate between pairs of numbers that are each less than four without training. However, North Island robins (Petroica longipes, a food hoarding songbird endemic to New Zealand, can discriminate between quantities of items as high as eight without training. Here we investigate whether robins are capable of other complex quantity discrimination tasks. We test whether their ability to discriminate between small quantities declines with 1. the number of cache sites containing prey rewards and 2. the length of time separating cache creation and retrieval (retention interval. Results showed that subjects generally performed above chance expectations. They were equally able to discriminate between different combinations of prey quantities that were hidden from view in 2, 3 and 4 cache sites from between 1, 10 and 60 seconds. Overall results indicate that North Island robins can process complex quantity information involving more than two discrete quantities of items for up to one minute long retention intervals without training.

  1. Interacting Cache memories: evidence for flexible memory use by Western Scrub-Jays (Aphelocoma californica).

    Science.gov (United States)

    Clayton, Nicola S; Yu, Kara Shirley; Dickinson, Anthony

    2003-01-01

    When Western Scrub-Jays (Aphelocoma californica) cached and recovered perishable crickets, N. S. Clayton, K. S. Yu, and A. Dickinson (2001) reported that the jays rapidly learned to search for fresh crickets after a 1-day retention interval (RI) between caching and recovery but to avoid searching for perished crickets after a 4-day RI. In the present experiments, the jays generalized their search preference for crickets to intermediate RIs and used novel information about the rate of decay of crickets presented during the RI to reverse these search preferences at recovery. The authors interpret this reversal as evidence that the birds can integrate information about the caching episode with new information presented during the RI.

  2. Killing and caching of an adult White-tailed deer, Odocoileus virginianus, by a single Gray Wolf, Canis lupus

    Science.gov (United States)

    Nelson, Michael E.

    2011-01-01

    A single Gray Wolf (Canis lupus) killed an adult male White-tailed Deer (Odocoileus virginianus) and cached the intact carcass in 76 cm of snow. The carcass was revisited and entirely consumed between four and seven days later. This is the first recorded observation of a Gray Wolf caching an entire adult deer.

  3. Advantages of masting in European beech: timing of granivore satiation and benefits of seed caching support the predator dispersal hypothesis.

    Science.gov (United States)

    Zwolak, Rafał; Bogdziewicz, Michał; Wróbel, Aleksandra; Crone, Elizabeth E

    2016-03-01

    The predator satiation and predator dispersal hypotheses provide alternative explanations for masting. Both assume satiation of seed-eating vertebrates. They differ in whether satiation occurs before or after seed removal and caching by granivores (predator satiation and predator dispersal, respectively). This difference is largely unrecognized, but it is demographically important because cached seeds are dispersed and often have a microsite advantage over nondispersed seeds. We conducted rodent exclosure experiments in two mast and two nonmast years to test predictions of the predator dispersal hypothesis in our study system of yellow-necked mice (Apodemus flavicollis) and European beech (Fagus sylvatica). Specifically, we tested whether the fraction of seeds removed from the forest floor is similar during mast and nonmast years (i.e., lack of satiation before seed caching), whether masting decreases the removal of cached seeds (i.e., satiation after seed storage), and whether seed caching increases the probability of seedling emergence. We found that masting did not result in satiation at the seed removal stage. However, masting decreased the removal of cached seeds, and seed caching dramatically increased the probability of seedling emergence relative to noncached seeds. European beech thus benefits from masting through the satiation of scatterhoarders that occurs only after seeds are removed and cached. Although these findings do not exclude other evolutionary advantages of beech masting, they indicate that fitness benefits of masting extend beyond the most commonly considered advantages of predator satiation and increased pollination efficiency.

  4. Long-term moderate elevation of corticosterone facilitates avian food-caching behaviour and enhances spatial memory.

    Science.gov (United States)

    Pravosudov, Vladimir V

    2003-12-22

    It is widely assumed that chronic stress and corresponding chronic elevations of glucocorticoid levels have deleterious effects on animals' brain functions such as learning and memory. Some animals, however, appear to maintain moderately elevated levels of glucocorticoids over long periods of time under natural energetically demanding conditions, and it is not clear whether such chronic but moderate elevations may be adaptive. I implanted wild-caught food-caching mountain chickadees (Poecile gambeli), which rely at least in part on spatial memory to find their caches, with 90-day continuous time-release corticosterone pellets designed to approximately double the baseline corticosterone levels. Corticosterone-implanted birds cached and consumed significantly more food and showed more efficient cache recovery and superior spatial memory performance compared with placebo-implanted birds. Thus, contrary to prevailing assumptions, long-term moderate elevations of corticosterone appear to enhance spatial memory in food-caching mountain chickadees. These results suggest that moderate chronic elevation of corticosterone may serve as an adaptation to unpredictable environments by facilitating feeding and food-caching behaviour and by improving cache-retrieval efficiency in food-caching birds.

  5. Groundwater conditions in Utah, spring of 2010

    Science.gov (United States)

    Burden, Carole B.; Allen, David V.; Cederberg, Jay R.; Fisher, Martel J.; Freeman, Michael L.; Downhour, Paul; Enright, Michael; Eacret, Robert J.; Guzman, Manuel; Slaugh, Bradley A.; Swenson, Robert L.; Howells, James H.; Christiansen, Howard K.

    2010-01-01

    This is the forty-seventh in a series of annual reports that describe groundwater conditions in Utah. Reports in this series, published cooperatively by the U.S. Geological Survey and the Utah Department of Natural Resources, Division of Water Resources and Division of Water Rights, and the Utah Department of Environmental Quality, Division of Water Quality, provide data to enable interested parties to maintain awareness of changing groundwater conditions.This report, like the others in the series, contains information on well construction, groundwater withdrawal from wells, water-level changes, precipitation, streamflow, and chemical quality of water. Information on well construction included in this report refers only to wells constructed for new appropriations of groundwater. Supplementary data are included in reports of this series only for those years or areas which are important to a discussion of changing groundwater conditions and for which applicable data are available.This report includes individual discussions of selected significant areas of groundwater development in the State for calendar year 2009. Most of the reported data were collected by the U.S. Geological Survey in cooperation with the Utah Department of Natural Resources, Division of Water Resources and Division of Water Rights, and the Utah Department of Environmental Quality, Division of Water Quality. This report is also available online at http://www. waterrights.utah.gov/techinfo/ and http://ut.water.usgs.gov/ publications/GW2010.pdf. Groundwater conditions in Utah for calendar year 2008 are reported in Burden and others (2009) and available online at http://ut.water.usgs.gov/publications/ GW2009.pdf.Analytical results associated with water samples collected from each area of groundwater development were compared to State of Utah maximum contaminant levels (MCLs) and secondary drinking-water standards of routinely measureable substances present in water supplies. The MCLs and secondary

  6. Aeromagnetic map of northwest Utah and adjacent parts of Nevada and Idaho

    Science.gov (United States)

    Langenheim, Victoria

    2016-01-01

    Two aeromagnetic surveys were flown to promote further understanding of the geology and structure in northwest Utah and adjacent parts of Nevada and Idaho by serving as a basis for geophysical interpretations and by supporting geological mapping, water and mineral resource investigations, and other topical studies. Although this area is in general sparsely populated, (except for cities and towns along the Wasatch Front such as Ogden and Brigham City), it encompasses metamorphic core complexes in the Grouse Creek and Raft River Mountains (figure 1) of interest to earth scientists studying Cenozoic extension. The region was shaken in 1909 and 1934 by M6+ earthquakes east of the Hansel Mountains (Doser, 1989; Arabasz and others, 1994); damage from the 1934 earthquake occurred as far east as Logan, Utah (http:// www.seis.utah.edu/lqthreat/nehrp_htm/1934hans/n1934ha1. shtml#urbse). The presence of Quaternary shield volcanoes and bimodal Pleistocene volcanism in Curlew Valley (Miller and others, 1995; Felger and others, 2016) as well as relatively high temperature gradients encountered in the Indian Cove drillhole in the north arm of Great Salt Lake (Blackett and others, 2014) may indicate some potential for geothermal energy development in the area (Miller and others, 1995). The area also hosts four significant mining districts, in the northern Pilot Range, the Goose Creek Mountains in the northwest corner of the map, the southern end of the Promontory Mountains, and the southwest part of the Raft River Mountains, although production notably waned after World War II (Doelling, 1980). Other prospects of interest include those in the southern Grouse Creek Mountains, Silver Island, and the northern Newfoundland Mountains.Large areas of northwest Utah are covered by young, surficial deposits or by Great Salt Lake or are down-dropped into deep Cenozoic basins, making extrapolation of bedrock geology from widely spaced exposures difficult or tenuous (figure 1). Local spatial

  7. Consistencia de ejecución: una propuesta no cache coherente

    OpenAIRE

    García, Rafael B.; Ardenghi, Jorge Raúl

    2005-01-01

    La presencia de uno o varios niveles de memoria cache en los procesadores modernos, cuyo objetivo es reducir el tiempo efectivo de acceso a memoria, adquiere especial relevancia en un ambiente multiprocesador del tipo DSM dado el mucho mayor costo de las referencias a memoria en módulos remotos. Claramente, el protocolo de coherencia de cache debe responder al modelo de consistencia de memoria adoptado. El modelo secuencial SC, aceptado generalmente como el más natural, junto a una serie de m...

  8. Implementació d'una Cache per a un processador MIPS d'una FPGA

    OpenAIRE

    Riera Villanueva, Marc

    2013-01-01

    [CATALÀ] Primer s'explicarà breument l'arquitectura d'un MIPS, la jerarquia de memòria i el funcionament de la cache. Posteriorment s'explicarà com s'ha dissenyat i implementat una jerarquia de memòria per a un MIPS implementat en VHDL en una FPGA. [ANGLÈS] First, the MIPS architecture, memory hierarchy and the functioning of the cache will be explained briefly. Then, the design and implementation of a memory hierarchy for a MIPS processor implemented in VHDL on an FPGA will be explained....

  9. A Way Memoization Technique for Reducing Power Consumption of Caches in Application Specific Integrated Processors

    OpenAIRE

    Ishihara, Tohru; Fallah, Farzan

    2005-01-01

    Submitted on behalf of EDAA (http://www.edaa.com/); International audience; This paper presents a technique for eliminating redundant cache-tag and cache-way accesses to reduce power consumption. The basic idea is to keep a small number of Most Recently Used (MRU) addresses in a Memory Address Buffer (MAB) and to omit redundant tag and way accesses when there is a MAB-hit. Since the approach keeps only tag and set-index values in the MAB, the energy and area overheads are relatively small eve...

  10. Using XRootD to provide caches for CernVM-FS

    CERN Document Server

    Domenighini, Matteo

    2017-01-01

    CernVM-FS recently added the possibility of using plugin for cache management. In order to investigate the capabilities and limits of such possibility, an XRootD plugin was written and benchmarked; as a byproduct, a POSIX plugin was also generated. The tests revealed that the plugin interface introduces no signicant performance over- head; moreover, the XRootD plugin performance was discovered to be worse than the ones of the built-in cache manager and the POSIX plugin. Further test of the XRootD component revealed that its per- formance is dependent on the server disk speed.

  11. Security in the CernVM File System and the Frontier Distributed Database Caching System

    CERN Document Server

    Dykstra, David

    2014-01-01

    Both the CernVM File System (CVMFS) and the Frontier Distributed Database Caching System (Frontier) distribute centrally updated data worldwide for LHC experiments using http proxy caches. Neither system provides privacy or access control on reading the data, but both control access to updates of the data and can guarantee the integrity of the data transferred to clients over the internet. CVMFS has since its early days required digital signatures and secure hashes on all distributed data, and recently both CVMFS and Frontier have added X509-based integrity checking. In this paper we detail and compare the security models of CVMFS and Frontier.

  12. Education for sustainability and environmental education in National Geoparks. EarthCaching - a new method?

    Science.gov (United States)

    Zecha, Stefanie; Regelous, Anette

    2017-04-01

    National Geoparks are restricted areas incorporating educational resources of great importance in promoting education for sustainable development, mobilizing knowledge inherent to the EarthSciences. Different methods can be used to implement the education of sustainability. Here we present possibilities for National Geoparks to support sustainability focusing on new media and EarthCaches based on the data set of the "EarthCachers International EarthCaching" conference in Goslar in October 2015. Using an empirical study designed by ourselves we collected actual information about the environmental consciousness of Earthcachers. The data set was analyzed using SPSS and statistical methods. Here we present the results and their consequences for National Geoparks.

  13. Reader set encoding for directory of shared cache memory in multiprocessor system

    Science.gov (United States)

    Ahn, Dnaiel; Ceze, Luis H.; Gara, Alan; Ohmacht, Martin; Xiaotong, Zhuang

    2014-06-10

    In a parallel processing system with speculative execution, conflict checking occurs in a directory lookup of a cache memory that is shared by all processors. In each case, the same physical memory address will map to the same set of that cache, no matter which processor originated that access. The directory includes a dynamic reader set encoding, indicating what speculative threads have read a particular line. This reader set encoding is used in conflict checking. A bitset encoding is used to specify particular threads that have read the line.

  14. Triangular Energy-Saving Cache-Based Routing Protocol by Energy Sieving

    OpenAIRE

    Chiu-Ching Tuan; Yi-Chao Wu

    2012-01-01

    In wireless ad hoc networks, designing an energy-efficient routing protocol is a major issue since nodes are energy limited. To address energy issue, we proposed a triangular energy-saving cached-based routing protocol by energy sieving (TESCES). TESCES offered a grid leader election by energy sieving (GLEES), a cache-based grid leader maintenance (CGLM), and a triangular energy-saving routing discovery (TESRD). In GLEES, only few nodes join in grid leader election to be elected as a grid lea...

  15. Cost-Effectiveness Analysis of the Residential Provisions of the 2015 IECC for Utah

    Energy Technology Data Exchange (ETDEWEB)

    Mendon, Vrushali V. [Pacific Northwest National Lab. (PNNL), Richland, WA (United States); Zhao, Mingjie [Pacific Northwest National Lab. (PNNL), Richland, WA (United States); Taylor, Zachary T. [Pacific Northwest National Lab. (PNNL), Richland, WA (United States); Poehlman, Eric A. [Pacific Northwest National Lab. (PNNL), Richland, WA (United States)

    2016-02-15

    The 2015 IECC provides cost-effective savings for residential buildings in Utah. Moving to the 2015 IECC from the 2012 Utah State Code base code is cost-effective for residential buildings in all climate zones in Utah.

  16. 76 FR 16808 - Notice of Invitation to Participate In Coal Exploration License, Utah

    Science.gov (United States)

    2011-03-25

    ... exploration of coal deposits owned by the United States of America in Sevier County, Utah. DATES: The notice... following-described lands in Sevier County, Utah: Salt Lake Meridian, Utah T. 22 S., R. 4 E., Sec. 14, all...

  17. Utah's Mobile Earth Science Outreach Vehicle

    Science.gov (United States)

    Schoessow, F. S.; Christian, L.

    2016-12-01

    Students at Utah State University's College of Natural Resources have engineered the first mobile Earth Science outreach platform capable of delivering high-tech and interactive solar-powered educational resources to the traditionally-underserved, remote communities of rural Utah. By retrofitting and modifying an industrial box-truck, this project effectively created a highly mobile and energy independent "school in a box" which seeks to help change the way that Earth science is communicated, eliminate traditional barriers, and increase science accessibility - both physically and conceptually. The project's education platform is focused on developing a more effective, sustainable, and engaging platform for presenting Earth science outreach curricula to community members of all ages in an engaging fashion. Furthermore, this project affords university students the opportunity to demonstrate innovative science communication techniques, translating vital university research into educational outreach operations aimed at doing real, measurable good for local communities.

  18. MAJOR OIL PLAYS IN UTAH AND VICINITY

    Energy Technology Data Exchange (ETDEWEB)

    Thomas C. Chidsey, Jr.

    2003-01-01

    Utah oil fields have produced a total of 1.2 billion barrels (191 million m{sup 3}). However, the 15 million barrels (2.4 million m{sup 3}) of production in 2000 was the lowest level in over 40 years and continued the steady decline that began in the mid-1980s. The Utah Geological Survey believes this trend can be reversed by providing play portfolios for the major oil producing provinces (Paradox Basin, Uinta Basin, and thrust belt) in Utah and adjacent areas in Colorado and Wyoming. Oil plays are geographic areas with petroleum potential caused by favorable combinations of source rock, migration paths, reservoir rock characteristics, and other factors. The play portfolios will include: descriptions and maps of the major oil plays by reservoir; production and reservoir data; case-study field evaluations; summaries of the state-of-the-art drilling, completion, and secondary/tertiary techniques for each play; locations of major oil pipelines; descriptions of reservoir outcrop analogs; and identification and discussion of land use constraints. All play maps, reports, databases, and so forth, produced for the project will be published in interactive, menu-driven digital (web-based and compact disc) and hard-copy formats. This report covers research activities for the first quarter of the first project year (July 1 through September 30, 2002). This work included producing general descriptions of Utah's major petroleum provinces, gathering field data, and analyzing best practices in the Utah Wyoming thrust belt. Major Utah oil reservoirs and/or source rocks are found in Devonian through Permian, Jurassic, Cretaceous, and Tertiary rocks. Stratigraphic traps include carbonate buildups and fluvial-deltaic pinchouts, and structural traps include basement-involved and detached faulted anticlines. Best practices used in Utah's oil fields consist of waterflood, carbon-dioxide flood, gas-injection, and horizontal drilling programs. Nitrogen injection and horizontal

  19. Reconnaissance of the hydrothermal resources of Utah

    Energy Technology Data Exchange (ETDEWEB)

    Rush, F.E.

    1983-01-01

    Geologic factors in the Basin and Range province in Utah are more favorable for the occurrence of geothermal resources than in other areas on the Colorado Plateaus or in the Middle Rocky Mountains. These geologic factors are principally crustal extension and crustal thinning during the last 17 million years. Basalts as young as 10,000 years have been mapped in the area. High-silica volcanic and intrusive rocks of Quaternary age can be used to locate hydrothermal convection systems. Drilling for hot, high-silica, buried rock bodies is most promising in the areas of recent volcanic activity. Southwestern Utah has more geothermal potential than other parts of the Basin and Range province in Utah. The Roosevelt Hot Springs area, the Cove Fort-Sulphurdale area, and the area to the north as far as 60 kilometers from them probably have the best potential for geothermal development for generation of electricity. Other areas with estimated reservoir temperatures greater than 150/sup 0/C are Thermo, Monroe, Red Hill (in the Monroe-Joseph Known Geothermal Resource Area), Joseph Hot Springs, and the Newcastle area. The rates of heat and water discharge are high at Crater, Meadow, and Hatton Hot Springs, but estimated reservoir temperatures there are less than 150/sup 0/C. Additional exploration is needed to define the potential in three additional areas in the Escalante Desert. 28 figs., 18 tabs.

  20. Exploitation of pocket gophers and their food caches by grizzly bears

    Science.gov (United States)

    Mattson, D.J.

    2004-01-01

    I investigated the exploitation of pocket gophers (Thomomys talpoides) by grizzly bears (Ursus arctos horribilis) in the Yellowstone region of the United States with the use of data collected during a study of radiomarked bears in 1977-1992. My analysis focused on the importance of pocket gophers as a source of energy and nutrients, effects of weather and site features, and importance of pocket gophers to grizzly bears in the western contiguous United States prior to historical extirpations. Pocket gophers and their food caches were infrequent in grizzly bear feces, although foraging for pocket gophers accounted for about 20-25% of all grizzly bear feeding activity during April and May. Compared with roots individually excavated by bears, pocket gopher food caches were less digestible but more easily dug out. Exploitation of gopher food caches by grizzly bears was highly sensitive to site and weather conditions and peaked during and shortly after snowmelt. This peak coincided with maximum success by bears in finding pocket gopher food caches. Exploitation was most frequent and extensive on gently sloping nonforested sites with abundant spring beauty (Claytonia lanceolata) and yampah (Perdieridia gairdneri). Pocket gophers are rare in forests, and spring beauty and yampah roots are known to be important foods of both grizzly bears and burrowing rodents. Although grizzly bears commonly exploit pocket gophers only in the Yellowstone region, this behavior was probably widespread in mountainous areas of the western contiguous United States prior to extirpations of grizzly bears within the last 150 years.

  1. On-chip COMA cache-coherence protocol for microgrids of microthreaded cores

    NARCIS (Netherlands)

    Zhang, L.; Jesshope, C.

    2008-01-01

    This paper describes an on-chip COMA cache coherency protocol to support the microthread model of concurrent program composition. The model gives a sound basis for building multi-core computers as it captures concurrency, abstracts communication and identifies resources, such as processor groups

  2. Model checking a cache coherence protocol for a Java DSM implementation

    NARCIS (Netherlands)

    J. Pang; W.J. Fokkink (Wan); R. Hofman (Rutger); R. Veldema

    2007-01-01

    textabstractJackal is a fine-grained distributed shared memory implementation of the Java programming language. It aims to implement Java's memory model and allows multithreaded Java programs to run unmodified on a distributed memory system. It employs a multiple-writer cache coherence

  3. Model checking a cache coherence protocol of a Java DSM implementation

    NARCIS (Netherlands)

    Pang, J.; Fokkink, W.J.; Hofman, R.; Veldema, R.S.

    2007-01-01

    Jackal is a fine-grained distributed shared memory implementation of the Java programming language. It aims to implement Java's memory model and allows multithreaded Java programs to run unmodified on a distributed memory system. It employs a multiple-writer cache coherence protocol. In this paper,

  4. Use of the sun as a heading indicator when caching and recovering in a wild rodent

    Science.gov (United States)

    Samson, Jamie; Manser, Marta B.

    2016-01-01

    A number of diurnal species have been shown to use directional information from the sun to orientate. The use of the sun in this way has been suggested to occur in either a time-dependent (relying on specific positional information) or a time-compensated manner (a compass that adjusts itself over time with the shifts in the sun’s position). However, some interplay may occur between the two where a species could also use the sun in a time-limited way, whereby animals acquire certain information about the change of position, but do not show full compensational abilities. We tested whether Cape ground squirrels (Xerus inauris) use the sun as an orientation marker to provide information for caching and recovery. This species is a social sciurid that inhabits arid, sparsely vegetated habitats in Southern Africa, where the sun is nearly always visible during the diurnal period. Due to the lack of obvious landmarks, we predicted that they might use positional cues from the sun in the sky as a reference point when caching and recovering food items. We provide evidence that Cape ground squirrels use information from the sun’s position while caching and reuse this information in a time-limited way when recovering these caches. PMID:27580797

  5. Randomized Caches Can Be Pretty Useful to Hard Real-Time Systems

    Directory of Open Access Journals (Sweden)

    Enrico Mezzetti

    2015-03-01

    Full Text Available Cache randomization per se, and its viability for probabilistic timing analysis (PTA of critical real-time systems, are receiving increasingly close attention from the scientific community and the industrial practitioners. In fact, the very notion of introducing randomness and probabilities in time-critical systems has caused strenuous debates owing to the apparent clash that this idea has with the strictly deterministic view traditionally held for those systems. A paper recently appeared in LITES (Reineke, J. (2014. Randomized Caches Considered Harmful in Hard Real-Time Systems. LITES, 1(1, 03:1-03:13. provides a critical analysis of the weaknesses and risks entailed in using randomized caches in hard real-time systems. In order to provide the interested reader with a fuller, balanced appreciation of the subject matter, a critical analysis of the benefits brought about by that innovation should be provided also. This short paper addresses that need by revisiting the array of issues addressed in the cited work, in the light of the latest advances to the relevant state of the art. Accordingly, we show that the potential benefits of randomized caches do offset their limitations, causing them to be - when used in conjunction with PTA - a serious competitor to conventional designs.

  6. OneService - Generic Cache Aggregator Framework for Service Depended Cloud Applications

    NARCIS (Netherlands)

    Tekinerdogan, B.; Oral, O.A.

    2017-01-01

    Current big data cloud systems often use different data migration strategies from providers to customers. This often results in increased bandwidth usage and herewith a decrease of the performance. To enhance the performance often caching mechanisms are adopted. However, the implementations of these

  7. Query Load Balancing by Caching Search Results in Peer-to-Peer Information Retrieval Networks

    NARCIS (Netherlands)

    Tigelaar, A.S.; Hiemstra, Djoerd

    2011-01-01

    For peer-to-peer web search engines it is important to keep the delay between receiving a query and providing search results within an acceptable range for the end user. How to achieve this remains an open challenge. One way to reduce delays is by caching search results for queries and allowing

  8. Search Result Caching in Peer-to-Peer Information Retrieval Networks

    NARCIS (Netherlands)

    Tigelaar, A.S.; Hiemstra, Djoerd; Trieschnigg, Rudolf Berend

    2011-01-01

    For peer-to-peer web search engines it is important to quickly process queries and return search results. How to keep the perceived latency low is an open challenge. In this paper we explore the solution potential of search result caching in large-scale peer-to-peer information retrieval networks by

  9. Acorn Caching in Tree Squirrels: Teaching Hypothesis Testing in the Park

    Science.gov (United States)

    McEuen, Amy B.; Steele, Michael A.

    2012-01-01

    We developed an exercise for a university-level ecology class that teaches hypothesis testing by examining acorn preferences and caching behavior of tree squirrels (Sciurus spp.). This exercise is easily modified to teach concepts of behavioral ecology for earlier grades, particularly high school, and provides students with a theoretical basis for…

  10. Delivery Time Minimization in Edge Caching: Synergistic Benefits of Subspace Alignment and Zero Forcing

    KAUST Repository

    Kakar, Jaber

    2017-10-29

    An emerging trend of next generation communication systems is to provide network edges with additional capabilities such as additional storage resources in the form of caches to reduce file delivery latency. To investigate this aspect, we study the fundamental limits of a cache-aided wireless network consisting of one central base station, $M$ transceivers and $K$ receivers from a latency-centric perspective. We use the normalized delivery time (NDT) to capture the per-bit latency for the worst-case file request pattern at high signal-to-noise ratios (SNR), normalized with respect to a reference interference-free system with unlimited transceiver cache capabilities. For various special cases with $M=\\\\{1,2\\\\}$ and $K=\\\\{1,2,3\\\\}$ that satisfy $M+K\\\\leq 4$, we establish the optimal tradeoff between cache storage and latency. This is facilitated through establishing a novel converse (for arbitrary $M$ and $K$) and an achievability scheme on the NDT. Our achievability scheme is a synergistic combination of multicasting, zero-forcing beamforming and interference alignment.

  11. CAChe Molecular Modeling: A Visualization Tool Early in the Undergraduate Chemistry Curriculum.

    Science.gov (United States)

    Crouch, R. David; And Others

    1996-01-01

    Describes a "Synthesis and Reactivity" curriculum that focuses on the correlation of laboratory experiments with lecture topics and the extension of laboratory exercises beyond the usual four-hour period. Highlights experiments developed and an out-of-class computational chemistry exercise using CAChe, a versatile molecular modeling…

  12. I/O-Optimal Distribution Sweeping on Private-Cache Chip Multiprocessors

    DEFF Research Database (Denmark)

    Ajwani, Deepak; Sitchinava, Nodar; Zeh, Norbert

    2011-01-01

    The parallel external memory (PEM) model has been used as a basis for the design and analysis of a wide range of algorithms for private-cache multi-core architectures. As a tool for developing geometric algorithms in this model, a parallel version of the I/O-efficient distribution sweeping framew...

  13. Two-dimensional cache-oblivious sparse matrix–vector multiplication

    NARCIS (Netherlands)

    Yzelman, A.N.|info:eu-repo/dai/nl/313872643; Bisseling, R.H.|info:eu-repo/dai/nl/304828068

    2011-01-01

    In earlier work, we presented a one-dimensional cache-oblivious sparse matrix–vector (SpMV) multiplication scheme which has its roots in one-dimensional sparse matrix partitioning. Partitioning is often used in distributed-memory parallel computing for the SpMV multiplication, an important kernel in

  14. Sex, estradiol, and spatial memory in a food-caching corvid.

    Science.gov (United States)

    Rensel, Michelle A; Ellis, Jesse M S; Harvey, Brigit; Schlinger, Barney A

    2015-09-01

    Estrogens significantly impact spatial memory function in mammalian species. Songbirds express the estrogen synthetic enzyme aromatase at relatively high levels in the hippocampus and there is evidence from zebra finches that estrogens facilitate performance on spatial learning and/or memory tasks. It is unknown, however, whether estrogens influence hippocampal function in songbirds that naturally exhibit memory-intensive behaviors, such as cache recovery observed in many corvid species. To address this question, we examined the impact of estradiol on spatial memory in non-breeding Western scrub-jays, a species that routinely participates in food caching and retrieval in nature and in captivity. We also asked if there were sex differences in performance or responses to estradiol. Utilizing a combination of an aromatase inhibitor, fadrozole, with estradiol implants, we found that while overall cache recovery rates were unaffected by estradiol, several other indices of spatial memory, including searching efficiency and efficiency to retrieve the first item, were impaired in the presence of estradiol. In addition, males and females differed in some performance measures, although these differences appeared to be a consequence of the nature of the task as neither sex consistently out-performed the other. Overall, our data suggest that a sustained estradiol elevation in a food-caching bird impairs some, but not all, aspects of spatial memory on an innate behavioral task, at times in a sex-specific manner. Copyright © 2015 Elsevier Inc. All rights reserved.

  15. Dependability Aspects Regarding the Cache Level of a Memory Hierarchy using Hamming Codes

    Science.gov (United States)

    Novac, O.; Vari-Kakas, St.; Novac, Mihaela; Vladu, Ecaterina; Indrie, Liliana

    In this paper we will apply a SEC-DED code to the cache level of a memory hierarchy. From the category of SEC-DED (Single Error Correction Double Error Detection) codes we select the Hamming code. For correction of single-bit error we use a syndrome decoder, a syndrome generator and the check bits generator circuit.

  16. Greatly improved cache update times for conditions data with Frontier/Squid

    Energy Technology Data Exchange (ETDEWEB)

    Dykstra, Dave; Lueking, Lee; /Fermilab

    2009-05-01

    The CMS detector project loads copies of conditions data to over 100,000 computer cores worldwide by using a software subsystem called Frontier. This subsystem translates database queries into HTTP, looks up the results in a central database at CERN, and caches the results in an industry-standard HTTP proxy/caching server called Squid. One of the most challenging aspects of any cache system is coherency, that is, ensuring that changes made to the underlying data get propagated out to all clients in a timely manner. Recently, the Frontier system was enhanced to drastically reduce the time for changes to be propagated everywhere without heavily loading servers. The propagation time is now as low as 15 minutes for some kinds of data and no more than 60 minutes for the rest of the data. This was accomplished by taking advantage of an HTTP and Squid feature called If-Modified-Since. In order to use this feature, the Frontier server sends a Last-Modified timestamp, but since modification times are not normally tracked by Oracle databases, a PL/SQL program was developed to track the modification times of database tables. We discuss the details of this caching scheme and the obstacles overcome including database and Squid bugs.

  17. Geometry of Valley Growth

    CERN Document Server

    Petroff, Alexander P; Abrams, Daniel M; Lobkovsky, Alexander E; Kudrolli, Arshad; Rothman, Daniel H

    2011-01-01

    Although amphitheater-shaped valley heads can be cut by groundwater flows emerging from springs, recent geological evidence suggests that other processes may also produce similar features, thus confounding the interpretations of such valley heads on Earth and Mars. To better understand the origin of this topographic form we combine field observations, laboratory experiments, analysis of a high-resolution topographic map, and mathematical theory to quantitatively characterize a class of physical phenomena that produce amphitheater-shaped heads. The resulting geometric growth equation accurately predicts the shape of decimeter-wide channels in laboratory experiments, 100-meter wide valleys in Florida and Idaho, and kilometer wide valleys on Mars. We find that whenever the processes shaping a landscape favor the growth of sharply protruding features, channels develop amphitheater-shaped heads with an aspect ratio of pi.

  18. Intermontane valley fills

    OpenAIRE

    Mey, Jürgen (Diplom-Geologe)

    2017-01-01

    Sedimentary valley fills are a widespread characteristic of mountain belts around the world. They transiently store material over time spans ranging from thousands to millions of years and therefore play an important role in modulating the sediment flux from the orogen to the foreland and to oceanic depocenters. In most cases, their formation can be attributed to specific fluvial conditions, which are closely related to climatic and tectonic processes. Hence, valley-fill deposits constitute v...

  19. CAChe Molecular Modeling: A Visualization Tool Early in the Undergraduate Chemistry Curriculum

    Science.gov (United States)

    Crouch, R. David; Holden, Michael S.; Samet, Cindy

    1996-10-01

    In Dickinson's chemistry curriculum, "Synthesis & Reactivity" replaces the traditional organic chemistry sequence and begins in the second semester of the freshman year. A key aspect of our sequence is the correlation of laboratory experiments with lecture topics and the extension of laboratory exercises beyond the usual 4-hour period. With this goal in mind, a number of "Synthesis & Reactivity" experiments have been developed that include an out-of-class computational chemistry exercise using CAChe (1), a versatile molecular modeling software package. Because the first semester of "Synthesis & Reactivity" has a large number of freshmen, emphasis is placed on developing an insight for where nucleophiles and electrophiles might attack a molecule. The Visualizer+ routine in CAChe generates striking graphical images of these sites and the reaction of NBS/H2O with 3-sulfolene (2) presents an excellent opportunity to introduce CAChe into an experiment. Before the laboratory, students are introduced to CAChe to determine how NBS might interact with a nucleophile such as an alkene. Students then return to the laboratory to perform the bromohydrin synthesis but are asked to consider what the regiochemistry would be were the alkene not symmetric. Specifically, students are instructed to visit the computer laboratory during the week and perform calculations on the bromonium ion formed from 2-methylpropene to determine where a nucleophilic H2O molecule might attack. The MOPAC routine in CAChe provides data that are converted to a graphical depiction of the frontier density of the intermediate, indicating potential reactive sites based on electron distribution of orbitals near the HOMO and LUMO. When these data are manipulated by Visualizer+, the obvious conclusion is that the nucleophilic water molecule should attack the more highly substituted carbon of the bromonium ion (Fig. 1) and generate one regioisomer. Figure 1. Relative nucleophilic susceptibilities ofr the

  20. MAJOR OIL PLAYS IN UTAH AND VICINITY

    Energy Technology Data Exchange (ETDEWEB)

    Thomas C. Chidsey; Craig D. Morgan; Kevin McClure; Grant C. Willis

    2003-09-01

    Utah oil fields have produced over 1.2 billion barrels (191 million m{sup 3}). However, the 13.7 million barrels (2.2 million m{sup 3}) of production in 2002 was the lowest level in over 40 years and continued the steady decline that began in the mid-1980s. The Utah Geological Survey believes this trend can be reversed by providing play portfolios for the major oil-producing provinces (Paradox Basin, Uinta Basin, and thrust belt) in Utah and adjacent areas in Colorado and Wyoming. Oil plays are geographic areas with petroleum potential caused by favorable combinations of source rock, migration paths, reservoir rock characteristics, and other factors. The play portfolios will include: descriptions and maps of the major oil plays by reservoir; production and reservoir data; case-study field evaluations; summaries of the state-of-the-art drilling, completion, and secondary/tertiary techniques for each play; locations of major oil pipelines; descriptions of reservoir outcrop analogs; and identification and discussion of land use constraints. All play maps, reports, databases, and so forth, produced for the project will be published in interactive, menu-driven digital (web-based and compact disc) and hard-copy formats. This report covers research activities for the fourth quarter of the first project year (April 1 through June 30, 2003). This work included describing outcrop analogs to the Jurassic Nugget Sandstone and Pennsylvanian Paradox Formation, the major oil producers in the thrust belt and Paradox Basin, respectively. Production-scale outcrop analogs provide an excellent view, often in three dimensions, of reservoir-facies characteristics and boundaries contributing to the overall heterogeneity of reservoir rocks. They can be used as a ''template'' for evaluation of data from conventional core, geophysical and petrophysical logs, and seismic surveys. The Nugget Sandstone was deposited in an extensive dune field that extended from Wyoming to

  1. Quantifying animal movement for caching foragers: the path identification index (PII) and cougars, Puma concolor

    Science.gov (United States)

    Ironside, Kirsten E.; Mattson, David J.; Theimer, Tad; Jansen, Brian; Holton, Brandon; Arundel, Terry; Peters, Michael; Sexton, Joseph O.; Edwards, Thomas C.

    2017-01-01

    Relocation studies of animal movement have focused on directed versus area restricted movement, which rely on correlations between step-length and turn angles, along with a degree of stationarity through time to define behavioral states. Although these approaches may work well for grazing foraging strategies in a patchy landscape, species that do not spend a significant amount of time searching out and gathering small dispersed food items, but instead feed for short periods on large, concentrated sources or cache food result in movements that maybe difficult to analyze using turning and velocity alone. We use GPS telemetry collected from a prey-caching predator, the cougar (Puma concolor), to test whether adding additional movement metrics capturing site recursion, to the more traditional velocity and turning, improve the ability to identify behaviors. We evaluated our movement index’s ability to identify behaviors using field investigations. We further tested for statistical stationarity across behaviors for use of topographic view-sheds. We found little correlation between turn angle, velocity, tortuosity, and site fidelity and combined them into a movement index used to identify movement paths (temporally autocorrelated movements) related to fast directed movements (taxis), area restricted movements (search), and prey caching (foraging). Changes in the frequency and duration of these movements were helpful for identifying seasonal activities such as migration and denning in females. Comparison of field investigations of cougar activities to behavioral classes defined using the movement index and found an overall classification accuracy of 81%. Changes in behaviors resulted in changes in how cougars used topographic view-sheds, showing statistical non-stationarity over time. The movement index shows promise for identifying behaviors in species that frequently return to specific locations such as food caches, watering holes, or dens, and highlights the role

  2. Enhancement web proxy cache performance using Wrapper Feature Selection methods with NB and J48

    Science.gov (United States)

    Mahmoud Al-Qudah, Dua’a.; Funke Olanrewaju, Rashidah; Wong Azman, Amelia

    2017-11-01

    Web proxy cache technique reduces response time by storing a copy of pages between client and server sides. If requested pages are cached in the proxy, there is no need to access the server. Due to the limited size and excessive cost of cache compared to the other storages, cache replacement algorithm is used to determine evict page when the cache is full. On the other hand, the conventional algorithms for replacement such as Least Recently Use (LRU), First in First Out (FIFO), Least Frequently Use (LFU), Randomized Policy etc. may discard important pages just before use. Furthermore, using conventional algorithm cannot be well optimized since it requires some decision to intelligently evict a page before replacement. Hence, most researchers propose an integration among intelligent classifiers and replacement algorithm to improves replacement algorithms performance. This research proposes using automated wrapper feature selection methods to choose the best subset of features that are relevant and influence classifiers prediction accuracy. The result present that using wrapper feature selection methods namely: Best First (BFS), Incremental Wrapper subset selection(IWSS)embedded NB and particle swarm optimization(PSO)reduce number of features and have a good impact on reducing computation time. Using PSO enhance NB classifier accuracy by 1.1%, 0.43% and 0.22% over using NB with all features, using BFS and using IWSS embedded NB respectively. PSO rises J48 accuracy by 0.03%, 1.91 and 0.04% over using J48 classifier with all features, using IWSS-embedded NB and using BFS respectively. While using IWSS embedded NB fastest NB and J48 classifiers much more than BFS and PSO. However, it reduces computation time of NB by 0.1383 and reduce computation time of J48 by 2.998.

  3. Environmental Assessment Proposed Demolition Plan Hill Air Force Base, Utah

    Science.gov (United States)

    2010-04-01

    Hill AFB Historic Buildings and Structures Reassessment ( Salo E., et al, 2003). The Utah SHPO concurred with the Hill AFB determinations in April...communications made by URS to Utah DEQ Air Quality. September. Salo , Edward, Marsha Prior, and John Ferguson, 2003. Hill AFB Historic Buildings and

  4. Strong motion instrumentation plan for Utah Department of Transportation.

    Science.gov (United States)

    2012-01-18

    The State of Utah, and its people have invested a considerable amount of money to construct and maintain the infrastructure and bridges in the state. This entire transportation network is at risk in the event of an earthquake. To protect Utah's bridg...

  5. Telepractice Services at Sound Beginnings at Utah State University

    Science.gov (United States)

    Blaiser, Kristina M.; Edwards, Marge; Behl, Diane; Munoz, Karen F.

    2012-01-01

    The Utah State University Sound Beginnings program originated in 2007 as a laboratory school to serve children with hearing loss from birth to age 6 years old living in Northern Utah. Sound Beginnings offers an interdisciplinary listening and spoken language educational option for families through the following services: toddler and preschool…

  6. Major Oil Plays in Utah and Vicinity

    Energy Technology Data Exchange (ETDEWEB)

    Thomas C. Chidsey; Craig D. Morgan; Kevin McClure; Douglas A. Sprinkel; Roger L. Bon; Hellmut H. Doelling

    2003-12-31

    Utah oil fields have produced over 1.2 billion barrels (191 million m{sup 3}). However, the 13.7 million barrels (2.2 million m{sup 3}) of production in 2002 was the lowest level in over 40 years and continued the steady decline that began in the mid-1980s. The Utah Geological Survey believes this trend can be reversed by providing play portfolios for the major oil-producing provinces (Paradox Basin, Uinta Basin, and thrust belt) in Utah and adjacent areas in Colorado and Wyoming. Oil plays are geographic areas with petroleum potential caused by favorable combinations of source rock, migration paths, reservoir rock characteristics, and other factors. The play portfolios will include: descriptions and maps of the major oil plays by reservoir; production and reservoir data; case-study field evaluations; locations of major oil pipelines; identification and discussion of land-use constraints; descriptions of reservoir outcrop analogs; and summaries of the state-of-the-art drilling, completion, and secondary/tertiary techniques for each play. This report covers research activities for the sixth quarter of the project (October 1 through December 31, 2003). This work included describing outcrop analogs for the Jurassic Twin Creek Limestone and Mississippian Leadville Limestone, major oil producers in the thrust belt and Paradox Basin, respectively, and analyzing best practices used in the southern Green River Formation play of the Uinta Basin. Production-scale outcrop analogs provide an excellent view of reservoir petrophysics, facies characteristics, and boundaries contributing to the overall heterogeneity of reservoir rocks. They can be used as a ''template'' for evaluation of data from conventional core, geophysical and petrophysical logs, and seismic surveys. In the Utah/Wyoming thrust belt province, the Jurassic Twin Creek Limestone produces from subsidiary closures along major ramp anticlines where the low-porosity limestone beds are extensively

  7. Utah Guidance and Toolkit for Student Learning Objectives: Instructions and Materials. Utah SLOs. Updated

    Science.gov (United States)

    Utah State Office of Education, 2014

    2014-01-01

    This document is intended to help teachers understand and create Student Learning Objectives (SLOs). This resource is a practical guide intended to provide clarity to a complex but worthwhile task. This resource may also be used by administrators for professional learning. As Utah moves toward providing a "Model for Measuring Educator…

  8. 78 FR 49400 - Approval and Promulgation of Air Quality Implementation Plans; Utah; Revisions to Utah...

    Science.gov (United States)

    2013-08-14

    ...''). The Program requires the inspection of diesel-powered vehicles by means of an emissions opacity test... AGENCY 40 CFR Part 52 Approval and Promulgation of Air Quality Implementation Plans; Utah; Revisions to...). Mail: Carl Daly, Director, Air Program, Environmental Protection Agency (EPA), Region 8, Mailcode 8P-AR...

  9. 76 FR 28068 - Notice of Inventory Completion: Utah State University/College of Eastern Utah Prehistoric Museum...

    Science.gov (United States)

    2011-05-13

    ... Prehistoric Museum, Price, UT AGENCY: National Park Service, Interior. ACTION: Notice. ] Notice is here given... control of the Utah State University/College of Eastern Utah Prehistoric Museum, Price, UT. The human... NAGPRA, 25 U.S.C. 3003(d)(3). The determinations in this notice are the sole responsibility of the museum...

  10. Field Surveys, IOC Valleys. Volume III, Part II. Cultural Resources Survey, Pine and Wah Wah Valleys, Utah.

    Science.gov (United States)

    1981-08-01

    including horse, camel, mammoth, Ertm E-TR-48-III-II 20 musk ox, and certain species of bison, goat, and bear, which had previously inhabited the marsh and...34 - - -9,$.. 𔄃 Im I I I Si to * Location lype/Contents Affiliation 42B@644 rid e over cr ek - P/J depression, cleared areas, Fr elon (f4-5-18-92) ground

  11. High-speed mapping of water isotopes and residence time in Cache Slough Complex, San Francisco Bay Delta, CA

    Data.gov (United States)

    Department of the Interior — Real-time, high frequency (1-second sample interval) GPS location, water quality, and water isotope (δ2H, δ18O) data was collected in the Cache Slough Complex (CSC),...

  12. Servidor proxy caché: comprensión y asimilación tecnológica

    Directory of Open Access Journals (Sweden)

    Carlos E. Gómez

    2012-01-01

    Full Text Available Los proveedores de acceso a Internet usualmente incluyen el concepto de aceleradores de Internet para reducir el tiempo promedio que tarda un navegador en obtener los archivos solicitados. Para los administradores del sistema es difícil elegir la configuración del servidor proxy caché, ya que es necesario decidir los valores que se deben usar en diferentes variables. En este artículo se presenta la forma como se abordó el proceso de comprensión y asimilación tecnológica del servicio de proxy caché, un servicio de alto impacto organizacional. Además, este artículo es producto del proyecto de investigación “Análisis de configuraciones de servidores proxy caché”, en el cual se estudiaron aspectos relevantes del rendimiento de Squid como servidor proxy caché.

  13. Preliminary isostatic residual gravity map of the Newfoundland Mountains 30' by 60' quadrangle and east part of the Wells 30' by 60' quadrangle, Box Elder County, Utah

    Science.gov (United States)

    Langenheim, Victoria; Athens, N.D.; Churchel, B.A.; Willis, H.; Knepprath, N.E.; Rosario, Jose J.; Roza, J.; Kraushaar, S.M.; Hardwick, C.L.

    2013-01-01

    A new isostatic residual gravity map of the Newfoundland Mountains and east of the Wells 30×60 quadrangles of Utah is based on compilation of preexisting data and new data collected by the Utah and U.S. Geological Surveys. Pronounced gravity lows occur over Grouse Creek Valley and locally beneath the Great Salt Lake Desert, indicating significant thickness of low-density Tertiary sedimentary rocks and deposits. Gravity highs coincide with exposures of dense pre-Cenozoic rocks in the Newfoundland, Silver Island, and Little Pigeon Mountains. Gravity values measured on pre-Tertiary basement to the north in the Bovine and Hogup Mountains are as much as 10mGal lower. Steep, linear gravity gradients may define basin-bounding faults concealed along the margins of the Newfoundland, Silver Island, and Little Pigeon Mountains, Lemay Island and the Pilot Range.

  14. Wolves, Canis lupus, carry and cache the collars of radio-collared White-tailed Deer, Odocoileus virginianus, they killed

    Science.gov (United States)

    Nelson, Michael E.; Mech, L. David

    2011-01-01

    Wolves (Canis lupus) in northeastern Minnesota cached six radio-collars (four in winter, two in spring-summer) of 202 radio-collared White-tailed Deer (Odocoileus virginianus) they killed or consumed from 1975 to 2010. A Wolf bedded on top of one collar cached in snow. We found one collar each at a Wolf den and Wolf rendezvous site, 2.5 km and 0.5 km respectively, from each deer's previous locations.

  15. EqualChance: Addressing Intra-set Write Variation to Increase Lifetime of Non-volatile Caches

    Energy Technology Data Exchange (ETDEWEB)

    Mittal, Sparsh [ORNL; Vetter, Jeffrey S [ORNL

    2014-01-01

    To address the limitations of SRAM such as high-leakage and low-density, researchers have explored use of non-volatile memory (NVM) devices, such as ReRAM (resistive RAM) and STT-RAM (spin transfer torque RAM) for designing on-chip caches. A crucial limitation of NVMs, however, is that their write endurance is low and the large intra-set write variation introduced by existing cache management policies may further exacerbate this problem, thereby reducing the cache lifetime significantly. We present EqualChance, a technique to increase cache lifetime by reducing intra-set write variation. EqualChance works by periodically changing the physical cache-block location of a write-intensive data item within a set to achieve wear-leveling. Simulations using workloads from SPEC CPU2006 suite and HPC (high-performance computing) field show that EqualChance improves the cache lifetime by 4.29X. Also, its implementation overhead is small, and it incurs very small performance and energy loss.

  16. Ecosystem services from keystone species: diversionary seeding and seed-caching desert rodents can enhance Indian ricegrass seedling establishment

    Science.gov (United States)

    Longland, William; Ostoja, Steven M.

    2013-01-01

    Seeds of Indian ricegrass (Achnatherum hymenoides), a native bunchgrass common to sandy soils on arid western rangelands, are naturally dispersed by seed-caching rodent species, particularly Dipodomys spp. (kangaroo rats). These animals cache large quantities of seeds when mature seeds are available on or beneath plants and recover most of their caches for consumption during the remainder of the year. Unrecovered seeds in caches account for the vast majority of Indian ricegrass seedling recruitment. We applied three different densities of white millet (Panicum miliaceum) seeds as “diversionary foods” to plots at three Great Basin study sites in an attempt to reduce rodents' over-winter cache recovery so that more Indian ricegrass seeds would remain in soil seedbanks and potentially establish new seedlings. One year after diversionary seed application, a moderate level of Indian ricegrass seedling recruitment occurred at two of our study sites in western Nevada, although there was no recruitment at the third site in eastern California. At both Nevada sites, the number of Indian ricegrass seedlings sampled along transects was significantly greater on all plots treated with diversionary seeds than on non-seeded control plots. However, the density of diversionary seeds applied to plots had a marginally non-significant effect on seedling recruitment, and it was not correlated with recruitment patterns among plots. Results suggest that application of a diversionary seed type that is preferred by seed-caching rodents provides a promising passive restoration strategy for target plant species that are dispersed by these rodents.

  17. Secure File Allocation and Caching in Large-scale Distributed Systems

    DEFF Research Database (Denmark)

    Di Mauro, Alessio; Mei, Alessandro; Jajodia, Sushil

    2012-01-01

    In this paper, we present a file allocation and caching scheme that guarantees high assurance, availability, and load balancing in a large-scale distributed file system that can support dynamic updates of authorization policies. The scheme uses fragmentation and replication to store files with hi......-balancing, and reducing delay of read operations. The system offers a trade-off-between performance and security that is dynamically tunable according to the current level of threat. We validate our mechanisms with extensive simulations in an Internet-like network....... security requirements in a system composed of a majority of low-security servers. We develop mechanisms to fragment files, to allocate them into multiple servers, and to cache them as close as possible to their readers while preserving the security requirement of the files, providing load...

  18. Cache-Oblivious Search Trees via Binary Trees of Small Height

    DEFF Research Database (Denmark)

    Brodal, G.S.; Fagerberg, R.; Jacob, R.

    2002-01-01

    We propose a version of cache oblivious search trees which is simpler than the previous proposal of Bender, Demaine and Farach-Colton and has the same complexity bounds. In particular, our data structure avoids the use of weight balanced B-trees, and can be implemented as just a single array...... oblivious fashion, using the van Emde Boas layout of Prokop.We also investigate the practicality of cache obliviousness in the area of search trees, by providing an empirical comparison of different methods for laying out a search tree in memory....... of data elements, without the use of pointers. The structure also improves space utilization.For storing n elements, our proposal uses (1 + ε)n times the element size of memory, and performs searches in worst case O(logB n) memory transfers, updates in amortized O((log2 n)/(εB)) memory transfers...

  19. Real-Time Scheduling in Heterogeneous Systems Considering Cache Reload Time Using Genetic Algorithms

    Science.gov (United States)

    Miryani, Mohammad Reza; Naghibzadeh, Mahmoud

    Since optimal assignment of tasks in a multiprocessor system is, in almost all practical cases, an NP-hard problem, in recent years some algorithms based on genetic algorithms have been proposed. Some of these algorithms have considered real-time applications with multiple objectives, total tardiness, completion time, etc. Here, we propose a suboptimal static scheduler of nonpreemptable tasks in hard real-time heterogeneous multiprocessor systems considering time constraints and cache reload time. The approach makes use of genetic algorithm to minimize total completion time and number of processors used, simultaneously. One important issue which makes this research different from previous ones is cache reload time. The method is implemented and the results are compared against a similar method.

  20. Seepage study of the Sevier River Basin above Sevier Bridge Reservoir, Utah, 1988

    Science.gov (United States)

    Sandberg, George W.; Smith, Cynthia J.

    1995-01-01

    A seepage study was done during 1988 on selected reaches of the Sevier River in Utah above Sevier Bridge Reservoir, the East Fork Sevier River in Black Canyon and Kingston Canyon, Long-East Bench and McEwen Canals in the upper Sevier River basin, and the San Pitch River in Sanpete Valley to determine gain or loss of flow from seepage. A net gain occurred in all of the reaches except Kingston Canyon on the East Fork Sevier River, which had a net loss. In the upper Sevier River basin, the Sevier River between Hatch and Circleville Canyon had a net gain of about 125 cubic feet per second; Long-East Bench Canal had a net gain of about 0.7 cubic foot per second; McEwen Canal had a net gain of about 0.9 cubic foot per second; the East Fork Sevier River in Black Canyon had a net gain of about 3.0 cubic feet per second; and the East Fork Sevier River in Kingston Canyon had a net loss of about 8.0 cubic feet per second. In central Sevier Valley, both the south and the north sections had large gains. The net gain for both sections, combined, was about 213 cubic feet per second for August 1988 and about 230 cubic feet per second for October 1988. The reach of the San Pitch River studied had a net gain of about 23.4 cubic feet per second.

  1. Data Rate Estimation for Wireless Core-to-Cache Communication in Multicore CPUs

    OpenAIRE

    Komar, M.; Petrov, V.; K. Borunova; D. Moltchanov; E. Koucheryavy

    2015-01-01

    In this paper, a principal architecture of common purpose CPU and its main components are discussed, CPUs evolution is considered and drawbacks that prevent future CPU development are mentioned. Further, solutions proposed so far are addressed and a new CPU architecture is introduced. The proposed architecture is based on wireless cache access that enables a reliable interaction between cores in multicore CPUs using terahertz band, 0.1-10THz. The presented architecture addresses the scalabili...

  2. Worst-case execution time analysis-driven object cache design

    DEFF Research Database (Denmark)

    Huber, Benedikt; Puffitsch, Wolfgang; Schoeberl, Martin

    2012-01-01

    Hard real‐time systems need a time‐predictable computing platform to enable static worst‐case execution time (WCET) analysis. All performance‐enhancing features need to be WCET analyzable. However, standard data caches containing heap‐allocated data are very hard to analyze statically. In this pa...... result in overly pessimistic WCET estimations. We therefore believe that an early architecture exploration by means of static timing analysis techniques helps to identify configurations suitable for hard real‐time systems....

  3. Proxy-based Video Transmission: Error Resiliency, Resource Allocation, and Dynamic Caching

    OpenAIRE

    Tu, Wei

    2009-01-01

    In this dissertation, several approaches are proposed to improve the quality of video transmission over wired and wireless networks. To improve the robustness of video transmission over error-prone mobile networks, a proxy-based reference picture selection scheme is proposed. In the second part of the dissertation, rate-distortion optimized rate adaptation algorithms are proposed for video applications over congested network nodes. A segment-based proxy caching algorithm for video-on-demand a...

  4. Fox squirrels match food assessment and cache effort to value and scarcity.

    Directory of Open Access Journals (Sweden)

    Mikel M Delgado

    Full Text Available Scatter hoarders must allocate time to assess items for caching, and to carry and bury each cache. Such decisions should be driven by economic variables, such as the value of the individual food items, the scarcity of these items, competition for food items and risk of pilferage by conspecifics. The fox squirrel, an obligate scatter-hoarder, assesses cacheable food items using two overt movements, head flicks and paw manipulations. These behaviors allow an examination of squirrel decision processes when storing food for winter survival. We measured wild squirrels' time allocations and frequencies of assessment and investment behaviors during periods of food scarcity (summer and abundance (fall, giving the squirrels a series of 15 items (alternating five hazelnuts and five peanuts. Assessment and investment per cache increased when resource value was higher (hazelnuts or resources were scarcer (summer, but decreased as scarcity declined (end of sessions. This is the first study to show that assessment behaviors change in response to factors that indicate daily and seasonal resource abundance, and that these factors may interact in complex ways to affect food storing decisions. Food-storing tree squirrels may be a useful and important model species to understand the complex economic decisions made under natural conditions.

  5. A cache-friendly sampling strategy for texture-based volume rendering on GPU

    Directory of Open Access Journals (Sweden)

    Junpeng Wang

    2017-06-01

    Full Text Available The texture-based volume rendering is a memory-intensive algorithm. Its performance relies heavily on the performance of the texture cache. However, most existing texture-based volume rendering methods blindly map computational resources to texture memory and result in incoherent memory access patterns, causing low cache hit rates in certain cases. The distance between samples taken by threads of an atomic scheduling unit (e.g. a warp of 32 threads in CUDA of the GPU is a crucial factor that affects the texture cache performance. Based on this fact, we present a new sampling strategy, called Warp Marching, for the ray-casting algorithm of texture-based volume rendering. The effects of different sample organizations and different thread-pixel mappings in the ray-casting algorithm are thoroughly analyzed. Also, a pipeline manner color blending approach is introduced and the power of warp-level GPU operations is leveraged to improve the efficiency of parallel executions on the GPU. In addition, the rendering performance of the Warp Marching is view-independent, and it outperforms existing empty space skipping techniques in scenarios that need to render large dynamic volumes in a low resolution image. Through a series of micro-benchmarking and real-life data experiments, we rigorously analyze our sampling strategies and demonstrate significant performance enhancements over existing sampling methods.

  6. The role of seed mass on the caching decision by agoutis, Dasyprocta leporina (Rodentia: Agoutidae

    Directory of Open Access Journals (Sweden)

    Mauro Galetti

    2010-06-01

    Full Text Available It has been shown that the local extinction of large-bodied frugivores may cause cascading consequences for plant recruitment and overall plant diversity. However, to what extent the resilient mammals can compensate the role of seed dispersal in defaunated sites is poorly understood. Caviomorph rodents, especially Dasyprocta spp., are usually resilient frugivores in hunted forests and their seed caching behavior may be important for many plant species which lack primary dispersers. We compared the effect of the variation in seed mass of six vertebrate-dispersed plant species on the caching decision by the red-rumped agoutis Dasyprocta leporina Linnaeus, 1758 in a land-bridge island of the Atlantic forest, Brazil. We found a strong positive effect of seed mass on seed fate and dispersal distance, but there was a great variation between species. Agoutis never cached seeds smaller than 0.9 g and larger seeds were dispersed for longer distances. Therefore, agoutis can be important seed dispersers of large-seeded species in defaunated forests.

  7. Greatly improved cache update times for conditions data with Frontier/Squid

    CERN Document Server

    Dykstra, Dave

    2009-01-01

    The CMS detector project loads copies of conditions data to over 100,000 computer cores worldwide by using a software subsystem called Frontier. This subsystem translates database queries into HTTP, looks up the results in a central database at CERN, and caches the results in an industry-standard HTTP proxy/caching server called Squid. One of the most challenging aspects of any cache system is coherency, that is, ensuring that changes made to the underlying data get propagated out to all clients in a timely manner. Recently, the Frontier system was enhanced to drastically reduce the time for changes to be propagated everywhere without heavily loading servers. The propagation time is now as low as 15 minutes for some kinds of data and no more than 60 minutes for the rest of the data. This was accomplished by taking advantage of an HTTP and Squid feature called If-Modified-Since. In order to use this feature, the Frontier server sends a Last-Modified timestamp, but since modification times are not normally trac...

  8. Memory for multiple cache locations and prey quantities in a food-hoarding songbird.

    Science.gov (United States)

    Armstrong, Nicola; Garland, Alexis; Burns, K C

    2012-01-01

    Most animals can discriminate between pairs of numbers that are each less than four without training. However, North Island robins (Petroica longipes), a food-hoarding songbird endemic to New Zealand, can discriminate between quantities of items as high as eight without training. Here we investigate whether robins are capable of other complex quantity discrimination tasks. We test whether their ability to discriminate between small quantities declines with (1) the number of cache sites containing prey rewards and (2) the length of time separating cache creation and retrieval (retention interval). Results showed that subjects generally performed above-chance expectations. They were equally able to discriminate between different combinations of prey quantities that were hidden from view in 2, 3, and 4 cache sites from between 1, 10, and 60 s. Overall results indicate that North Island robins can process complex quantity information involving more than two discrete quantities of items for up to 1 min long retention intervals without training.

  9. Improving Image Processing Systems by Using Software Simulated LRU Cache Algorithms

    Directory of Open Access Journals (Sweden)

    Cosmin CIORANU

    2012-01-01

    Full Text Available Today’s scientific progress is closely related with data processing, a process is implemented using algorithms, but in order to have a result, algorithms need data, and data are generated by sensors, particularly satellite imagery or collaborative GIS platforms. The progress has made those imaging capturing sensors more and more accurate therefore the generated data are becoming larger and larger. The problem is mostly related to the operating system and sometimes software design’s inability to manage contiguous spaces of memory. In an ironic turn of events, those data sometimes cannot be held all at once in a computer system to be analyzed. A solution needed to be devised to overcome this easy problem at first, but complex in implementation. The answer is somehow hidden, but is has been around since the birth of computer science, and is called a memory cache, which is basically at its origins a fast memory. We can adjust this concept in software programming by identifying the problem and coming up with an implementation. The data cache can be implemented in many various ways but here we will present one based on LRU (least recently used algorithm mostly to handle three dimension arrays, called 3dCache which is widely compatible with software packages that supports external tools such as Matlab or a programming environment like C++.

  10. Boyne Valley Tombs

    Science.gov (United States)

    Prendergast, Frank

    The passage tombs of the Boyne Valley exhibit the greatest level of development of the megalithic tomb building tradition in Ireland in terms of their morphology, embellishment, burial tradition, grave goods, clustering, and landscape siting. This section examines these characteristics and gives a summary archaeoastronomical appraisal of their orientation and detected astronomical alignment.

  11. Breathing Valley Fever

    Centers for Disease Control (CDC) Podcasts

    2014-02-04

    Dr. Duc Vugia, chief of the Infectious Diseases Branch in the California Department of Public Health, discusses Valley Fever.  Created: 2/4/2014 by National Center for Emerging and Zoonotic Infectious Diseases (NCEZID).   Date Released: 2/5/2014.

  12. The Basin and Range Province in Utah, Nevada, and California

    Science.gov (United States)

    Nolan, Thomas B.

    1943-01-01

    In this report an attempt has been made to summarize and in places to interpret the published information that was available through 1938 on the geology of those parts of Nevada, California, and Utah that are included in the geologic province known as the Basin and Range province. This region includes most of the Great Basin, from which no water flows to the sea, as well as part of the drainage basin of the lower Colorado River. It is characterized by numerous parallel, linear mountain ranges that are separated from one another by wide valleys or topographic basins. All the major divisions of geologic time are represented by the rocks exposed in this region. The oldest are of pre-Cambrian age and crop out chiefly along the eastern and southern borders. They have been carefully studied at only a few localities, and the correlation and extent of the subdivision so far recognized is uncertain. There appear to be at least three series of pre-Cambrian rocks which are probably separated from one another by profound unconformities. Large masses of intrusive igneous rocks have been recognized only in the oldest series. During the Paleozoic era the region was a part of the Cordilleran geosyncline, and sediments were deposited during all of the major and most of the minor subdivisions of the era. There are thick and widespread accumulations of Cambrian and Ordovician strata, the maximum aggregate thickness possibly exceeding 23,000 feet. The eastern and western boundaries of the province were approximately those of the area of rapid subsidence within the geosyncline, though the axes of maximum subsidence oscillated back and forth during the two periods. The Silurian and Devonian seas, on the other hand, extended beyond the province and, possibly as a consequence, are represented by much thinner sections - of the order of 6,000 feet. At the end of the Devonian period the geosyncline was split by the emergence of a geanticline in western Nevada, and Mississippian and

  13. Bringing Silicon Valley inside.

    Science.gov (United States)

    Hamel, G

    1999-01-01

    In 1998, Silicon Valley companies produced 41 IPOs, which by January 1999 had a combined market capitalization of $27 billion--that works out to $54,000 in new wealth creation per worker in a single year. Multiply the number of employees in your company by $54,000. Did your business create that much new wealth last year? Half that amount? It's not a group of geniuses generating such riches. It's a business model. In Silicon Valley, ideas, capital, and talent circulate freely, gathering into whatever combinations are most likely to generate innovation and wealth. Unlike most traditional companies, which spend their energy in resource allocation--a system designed to avoid failure--the Valley operates through resource attraction--a system that nurtures innovation. In a traditional company, people with innovative ideas must go hat in hand to the guardians of the old ideas for funding and for staff. But in Silicon Valley, a slew of venture capitalists vie to attract the best new ideas, infusing relatively small amounts of capital into a portfolio of ventures. And talent is free to go to the companies offering the most exhilarating work and the greatest potential rewards. It should actually be easier for large, traditional companies to set up similar markets for capital, ideas, and talent internally. After all, big companies often already have extensive capital, marketing, and distribution resources, and a first crack at the talent in their own ranks. And some of them are doing it. The choice is yours--you can do your best to make sure you never put a dollar of capital at risk, or you can tap into the kind of wealth that's being created every day in Silicon Valley.

  14. Role of white matter lesions, cerebral atrophy, and APOE on cognition in older persons with and without dementia: the Cache County, Utah, study of memory and aging.

    Science.gov (United States)

    Bigler, Erin D; Lowry, Christopher M; Kerr, Burton; Tate, David F; Hessel, Cory D; Earl, Heath D; Miller, Michael J; Rice, Sara A; Smith, Kay H; Tschanz, JoAnn T; Welsh-Bohmer, Kathleen; Plassman, Brenda; Victoroff, Jeff

    2003-07-01

    Neuropsychological, qualitative, and quantitative magnetic resonance imaging findings were examined in subjects with Alzheimer's disease (AD), non-AD dementia or mixed neuropsychiatric disorder, subjects characterized as mild/ambiguous, and controls, all with known apolipoprotein E (APOE) genotype. Neuropsychological tasks included an expanded Consortium to Establish a Registery for Alzheimer's Disease (J. T. Tschanz et al., 2000; K. A. Welsh, J. M. Hoffman, N. L. Earl, & M. W. Hanson 1994) battery and the Mini-Mental Status Examination (M. F. Folstein, S. E. Folstein, & P. R. McHugh, 1975). Periventricular white matter lesions were the most clinically salient, and generalized measures of cerebral atrophy were the most significant quantitative indicators. APOE genotype was unrelated to imaging or neuropsychological performance. Neuropsychological relationships with neuroimaging findings depend on the qualitative or quantitative method used.

  15. Footprints of Buildings at Cedar Breaks National Monument, Utah (footprints)

    Data.gov (United States)

    National Park Service, Department of the Interior — This is an Arc/INFO coverage consisting of 10 polygons representing the buildings' footprints at Cedar Breaks National Monument, Utah. The footprints were collected...

  16. Pliocene diatoms from the Bryce Canyon Area, Utah

    Digital Repository Service at National Institute of Oceanography (India)

    Setty, M.G.A.P.

    The diatomite deposits were collected at 6,650 foot elevation near Hillsdale (vicinity of Bryce Canyon National Park), Utah, Preliminary investigation showed that the deposits were of pliocene age and probably equivalent to the Salt Lake group...

  17. Assessing approaches to manage Phragmites in Utah wetlands

    Data.gov (United States)

    US Fish and Wildlife Service, Department of the Interior — Given the extent of the Phragmites problem in Utah and elsewhere, managers are eager to understand what techniques are most effective for killing Phragmites while...

  18. Utilities at Cedar Breaks National Monument, Utah (utilpnt)

    Data.gov (United States)

    National Park Service, Department of the Interior — This feature class represents various types of utilities, including water- and power-related utilities, at Cedar Breaks National Monument, Utah. The utilities were...

  19. Culvert roughness elements for native Utah fish passage : phase I.

    Science.gov (United States)

    2011-01-01

    Laboratory flume testing of native Utah non-salmonid fish was performed to observe how : they use altered flow around obstacles to swim upstream. Three experimental setups included : a bare Plexiglas flume, vertical cylinders, and natural substrate p...

  20. MX Siting Investigation Geotechnical Evaluation Verification Study - Pine Valley Utah. Volume I. Synthesis.

    Science.gov (United States)

    1981-03-24

    The bearing ratio reported for the soil is normally the one at 0.1 inch (2.5 mm) penetration. CLAST - An individual constituent, grain, or fragment of...At each location, observations of grain-size distribu- tion, color, clast lithology, surface-soil development, and a variety of engineering...it y Plasticity Moisture Content Reaction to HCl Particle Shape Reaction to HCl Some additional descriptions or information recorded for both coarse

  1. Mineral Resources Survey, Seven Additional Valleys, Nevada/Utah Siting Area. Volume III.

    Science.gov (United States)

    1981-06-23

    Ag X T- Docite, andesite (sil alunitized) aied Hills None None X T - Andesite nham a Garside, 1979, Hose 81 Others, 1976, Humphrey , 1960, Kleinhampl...PARAI I fL CuvrV~ ’’r ;l a. so * ’gAl Is, 1Adm Ioo T E rr-g ’ ’ti’ m a, s It*~--~-- Dori Oi ’ Q Ie v~dtLAI i Lt 7 NN ’I’.tl u t P Ol .e .... r& ftu n L

  2. Irrigation drainage: Green River basin, Utah

    Science.gov (United States)

    Stephens, Doyle W.; Waddell, Bruce; Miller, Jerry B.

    1988-01-01

    A reconnaissance of wildlife areas in the middle Green River basin of Utah during 1986-87 determined that concentrations of selenium in water and biological tissues were potentially harmful to wildlife at the Stewart Lake Waterfowl Management Area and in the Ouray National Wildlife Refuge. Concentations of selenium in irrigation drainage entering Stewart Lake ranged from 14 to 140 micrograms per liter; liver tissue from coots collected from the lake contained selenium concentrations of as much as 26 micrograms per gram and samples of tissue from carp contained as much as 31 micrograms per gram. Concentrations of selenium in a pond at the Ouray National Wildlife Refuge, which receives irrigation water and shallow ground water, were as much as 93 micrograms per liter. Liver tissue from coots collected from this pond contained selenium concentrations of as much as 43 micrograms per gram; eggs of water birds contained as much as 120 micrograms per gram.

  3. 75 FR 18877 - Notice of Invitation to Participate; Exploration for Coal in Utah License Application UTU-87041

    Science.gov (United States)

    2010-04-13

    ... located in Emery and Sevier Counties, Utah. DATES: Any party electing to participate in this exploration... in Emery and Sevier Counties, Utah: T. 23 S., R. 5 E., SLM, Utah Sec. 1, all; Sec. 11, all; Sec. 12...

  4. Major Oil Plays In Utah And Vicinity

    Energy Technology Data Exchange (ETDEWEB)

    Thomas Chidsey

    2007-12-31

    Utah oil fields have produced over 1.33 billion barrels (211 million m{sup 3}) of oil and hold 256 million barrels (40.7 million m{sup 3}) of proved reserves. The 13.7 million barrels (2.2 million m3) of production in 2002 was the lowest level in over 40 years and continued the steady decline that began in the mid-1980s. However, in late 2005 oil production increased, due, in part, to the discovery of Covenant field in the central Utah Navajo Sandstone thrust belt ('Hingeline') play, and to increased development drilling in the central Uinta Basin, reversing the decline that began in the mid-1980s. The Utah Geological Survey believes providing play portfolios for the major oil-producing provinces (Paradox Basin, Uinta Basin, and thrust belt) in Utah and adjacent areas in Colorado and Wyoming can continue this new upward production trend. Oil plays are geographic areas with petroleum potential caused by favorable combinations of source rock, migration paths, reservoir rock characteristics, and other factors. The play portfolios include descriptions and maps of the major oil plays by reservoir; production and reservoir data; case-study field evaluations; locations of major oil pipelines; identification and discussion of land-use constraints; descriptions of reservoir outcrop analogs; and summaries of the state-of-the-art drilling, completion, and secondary/tertiary recovery techniques for each play. The most prolific oil reservoir in the Utah/Wyoming thrust belt province is the eolian, Jurassic Nugget Sandstone, having produced over 288 million barrels (46 million m{sup 3}) of oil and 5.1 trillion cubic feet (145 billion m{sup 3}) of gas. Traps form on discrete subsidiary closures along major ramp anticlines where the depositionally heterogeneous Nugget is also extensively fractured. Hydrocarbons in Nugget reservoirs were generated from subthrust Cretaceous source rocks. The seals for the producing horizons are overlying argillaceous and gypsiferous beds in

  5. Geophysical setting of western Utah and eastern Nevada between latitudes 37°45′ and 40°N

    Science.gov (United States)

    Mankinen, Edward A.; McKee, Edwin H.; Tripp, Bryce; Krahulec, Ken; Jordan, Lucy

    2009-01-01

    Gravity and aeromagnetic data refine the structural setting for the region of western Utah and eastern Nevada between Snake and Hamlin Valleys on the west and Tule Valley on the east. These data are used here as part of a regional analysis. An isostatic gravity map shows large areas underlain by gravity lows, the most prominent of which is a large semi-circular low associated with the Indian Peak caldera complex in the southwestern part of the study area. Another low underlies the Thomas caldera in the northeast, and linear lows elsewhere indicate low-density basin-fill in all major north-trending graben valleys. Gravity highs reflect pre-Cenozoic rocks mostly exposed in the mountain ranges. In the Confusion Range, however, the gravity high extends about 15 km east of the range front to Coyote Knolls, indicating a broad pediment cut on upper Paleozoic rocks and covered by a thin veneer of alluvium. Aeromagnetic highs sharply delineate Oligocene and Miocene volcanic rocks and intracaldera plutons associated with the Indian Peak caldera complex and the Pioche–Marysvale igneous belt. Jurassic to Eocene plutons and volcanic rocks elsewhere in the study area, however, have much more modest magnetic signatures. Some relatively small magnetic highs in the region are associated with outcrops of volcanic rock, and the continuation of those anomalies indicates that the rocks are probably extensive in the subsurface. A gravity inversion method separating the isostatic gravity anomaly into fields representing pre-Cenozoic basement rocks and Cenozoic basin deposits was used to calculate depth to basement and estimate maximum amounts of alluvial and volcanic fill within the valleys. Maximum depths within the Indian Peak caldera complex average about 2.5 km, locally reaching 3 km. North of the caldera complex, thickness of valley fill in most graben valleys ranges from 1.5 to 3 km thick, with Hamlin and Pine Valleys averaging ~3 km. The main basin beneath Tule Valley is

  6. Assessment and use of drug information references in Utah pharmacies.

    Science.gov (United States)

    Moorman, Krystal L; Macdonald, Elyse A; Trovato, Anthony; Tak, Casey R

    2017-01-01

    To determine which drug references Utah pharmacists use most frequently. To determine which types of drug information questions are most commonly asked, and whether Utah pharmacists have access to adequate references to respond to these questions. A 19-question survey was created using Qualtrics, LLC (Provo, Utah) software. An electronic survey link was sent to 1,431 pharmacists with a valid e-mail address listed in the Department of Professional Licensing database. Questions focused on available references in the participant's pharmacy, how current the references are, and the participant's use of the references. Surveys were analyzed for participants practicing in either community or hospital pharmacies in the state of Utah. A total of 147 responses were included in the analysis. Approximately 44% of respondents practiced in the community, and 56% practiced in a hospital setting. The most commonly used references by Utah pharmacists are Micromedex, Lexicomp, UpToDate, Clinical Pharmacology, and Drug Facts & Comparisons. Pharmacists in the community frequently receive questions related to adverse drug reactions, drug interactions, and over-the-counter medications. Pharmacists in the hospital frequently receive questions relating to dosage and administration, drug interactions, and adverse drug reactions. About 89% of community pharmacists and 96% of hospital pharmacists feel available references are adequate to answer the questions they receive. Utah pharmacists generally use large reference suites to answer drug information questions. The majority of pharmacists consider the references available to them to be adequate to answer the questions they receive.

  7. Ground-water conditions in Utah, spring of 2009

    Science.gov (United States)

    Burden, Carole B.; Allen, David V.; Rowland, Ryan C.; Fisher, Martel J.; Freeman, Michael L.; Downhour, Paul; Nielson, Ashley; Eacret, Robert J.; Myers, Andrew; Slaugh, Bradley A.; Swenson, Robert L.; Howells, James H.; Christiansen, Howard K.

    2009-01-01

    This is the forty-sixth in a series of annual reports that describe ground-water conditions in Utah. Reports in this series, published cooperatively by the U.S. Geological Survey and the Utah Department of Natural Resources, Division of Water Resources and Division of Water Rights, and the Utah Department of Environmental Quality, Division of Water Quality, provide data to enable interested parties to maintain awareness of changing ground-water conditions. This report, like the others in the series, contains information on well construction, ground-water withdrawal from wells, water-level changes, precipitation, streamflow, and chemical quality of water. Information on well construction included in this report refers only to wells constructed for new appropriations of ground water. Supplementary data are included in reports of this series only for those years or areas which are important to a discussion of changing ground-water conditions and for which applicable data are available.This report includes individual discussions of selected significant areas of ground-water development in the State for calendar year 2008. Most of the reported data were collected by the U.S. Geological Survey in cooperation with the Utah Department of Natural Resources, Division of Water Resources and Division of Water Rights, and the Utah Department of Environmental Quality, Division of Water Quality. This report is available online at http://www.waterrights. utah.gov/techinfo/ and http://ut.water.usgs.gov/publications/ GW2009.pdf.

  8. Green valley galaxies

    Directory of Open Access Journals (Sweden)

    Salim S.

    2014-01-01

    Full Text Available The “green valley” is a wide region separating the blue and the red peaks in the ultraviolet-optical color magnitude diagram, first revealed using GALEX UV photometry. The term was coined by Christopher Martin (Caltech, in 2005. Green valley highlights the discriminating power of UV to very low relative levels of ongoing star formation, to which the optical colors, including u−r, are insensitive. It corresponds to massive galaxies below the star-forming, “main” sequence, and therefore represents a critical tool for the study of the quenching of star formation and its possible resurgence in otherwise quiescent galaxies. This article reviews the results pertaining to (predominantly disk morphology, structure, environment, dust content and gas properties of green valley galaxies in the local universe. Their relationship to AGN is also discussed. Attention is given to biases emerging from defining the “green valley” using optical colors. We review various evolutionary scenarios and we present evidence for a new one, the quasi-static view of the green valley, in which the majority (but not all of galaxies currently in the green valley were only partially quenched in the distant past and now participate in a slow cosmic decline of star formation, which also drives down the activity on the main sequence, presumably as a result of the dwindling accretion/cooling onto galaxy disks. This emerging synthetic picture is based on the findings from Fang et al. (2012, Salim et al. (2012 and Martin et al. (2007, as well as other results.

  9. Geophysical Data from Spring Valley to Delamar Valley, East-Central Nevada

    Science.gov (United States)

    Mankinen, Edward A.; Roberts, Carter W.; McKee, Edwin H.; Chuchel, Bruce A.; Morin, Robert L.

    2007-01-01

    Cenozoic basins in eastern Nevada and western Utah constitute major ground-water recharge areas in the eastern part of the Great Basin and these were investigated to characterize the geologic framework of the region. Prior to these investigations, regional gravity coverage was variable over the region, adequate in some areas and very sparse in others. Cooperative studies described herein have established 1,447 new gravity stations in the region, providing a detailed description of density variations in the middle to upper crust. All previously available gravity data for the study area were evaluated to determine their reliability, prior to combining with our recent results and calculating an up-to-date isostatic residual gravity map of the area. A gravity inversion method was used to calculate depths to pre-Cenozoic basement rock and estimates of maximum alluvial/volcanic fill in the major valleys of the study area. The enhanced gravity coverage and the incorporation of lithologic information from several deep oil and gas wells yields a much improved view of subsurface shapes of these basins and provides insights useful for the development of hydrogeologic models for the region.

  10. Tuning the cache memory usage in tomographic reconstruction on standard computers with Advanced Vector eXtensions (AVX

    Directory of Open Access Journals (Sweden)

    Jose-Ignacio Agulleiro

    2015-06-01

    Full Text Available Cache blocking is a technique widely used in scientific computing to minimize the exchange of information with main memory by reusing the data kept in cache memory. In tomographic reconstruction on standard computers using vector instructions, cache blocking turns out to be central to optimize performance. To this end, sinograms of the tilt-series and slices of the volumes to be reconstructed have to be divided into small blocks that fit into the different levels of cache memory. The code is then reorganized so as to operate with a block as much as possible before proceeding with another one. This data article is related to the research article titled Tomo3D 2.0 – Exploitation of Advanced Vector eXtensions (AVX for 3D reconstruction (Agulleiro and Fernandez, 2015 [1]. Here we present data of a thorough study of the performance of tomographic reconstruction by varying cache block sizes, which allows derivation of expressions for their automatic quasi-optimal tuning.

  11. Tuning the cache memory usage in tomographic reconstruction on standard computers with Advanced Vector eXtensions (AVX).

    Science.gov (United States)

    Agulleiro, Jose-Ignacio; Fernandez, Jose-Jesus

    2015-06-01

    Cache blocking is a technique widely used in scientific computing to minimize the exchange of information with main memory by reusing the data kept in cache memory. In tomographic reconstruction on standard computers using vector instructions, cache blocking turns out to be central to optimize performance. To this end, sinograms of the tilt-series and slices of the volumes to be reconstructed have to be divided into small blocks that fit into the different levels of cache memory. The code is then reorganized so as to operate with a block as much as possible before proceeding with another one. This data article is related to the research article titled Tomo3D 2.0 - Exploitation of Advanced Vector eXtensions (AVX) for 3D reconstruction (Agulleiro and Fernandez, 2015) [1]. Here we present data of a thorough study of the performance of tomographic reconstruction by varying cache block sizes, which allows derivation of expressions for their automatic quasi-optimal tuning.

  12. dCache: implementing a high-end NFSv4.1 service using a Java NIO framework

    CERN Multimedia

    CERN. Geneva

    2012-01-01

    dCache is a high performance scalable storage system widely used by HEP community. In addition to set of home grown protocols we also provide industry standard access mechanisms like WebDAV and NFSv4.1. This support places dCache as a direct competitor to commercial solutions. Nevertheless conforming to a protocol is not enough; our implementations must perform comparably or even better than commercial systems. To achieve this, dCache uses two high-end IO frameworks from well know application servers: GlassFish and JBoss. This presentation describes how we implemented an rfc1831 and rfc2203 compliant ONC RPC (Sun RPC) service based on the Grizzly NIO framework, part of the GlassFish application server. This ONC RPC service is the key component of dCache’s NFSv4.1 implementation, but is independent of dCache and available for other projects. We will also show some details of dCache NFS v4.1 implementations, describe some of the Java NIO techniques used and, finally, present details of our performance e...

  13. Map showing drainage basins and historic cloudburst floods in the Salina quadrangle, Utah

    Science.gov (United States)

    Hackman, Robert J.; Williams, Paul L.

    1972-01-01

    In the Salina quadrangle, as in most of the arid West, summer precipitation commonly occurs as thunderstorms. Suring these storms, rain falls as a torrential downpour, or cloudburst, in a local area. An inch of rain or more may fall in half an hour; U.S. Weather Bureau records show that o.4 inch of rain has fallen in a period of 5 minutes (Woolley, 1946). Such a fall of water far exceeds the absorptive capacity of the ground surface, and in areas of steep sparsely vegetated terrain the runoff forms a cloudburst flood in which loose rock, soil, and alluvium combine with water to form a debris-laden mudflow. The mudflow then moves rapidly down gullies and canyons with power great enough to erode and to transport debris, and to destroy the works of man lying in its path. When the mudflow pours from the canyon mount into an open valley, solid debris separates from the water and is added to the alluvial fan built by numerous previous floods. Because many towns in Utah are built on fans at the mouths of canyons, there has been loss of life and considerable damage to buildings, streets, and crops since 1847, when white men first settled in Utah.This map shows historical cloudburst floods for which records exist; data were taken from the sources listed below. Most of the flooded areas shown are in or near populated places, and so the floods were observed and recorded. Actually, no part of the quadrangle is exempt from cloudburst floods; every canyon, dry wash, and swale is visited sooner or later by a cloudburst and becomes, briefly, the site of a destructive mudflow. The traveler is advised to exercise caution in all drainageways, especially during July and August, when 80 percent of the cloudbursts occur.

  14. Fluvial valleys and Martian palaeoclimates

    Science.gov (United States)

    Gulick, Virginia C.; Baker, Victor R.

    1989-10-01

    Theoretical models of early Martian atmospheric evolution describe the maintenance of a dense CO2 atmosphere and a warm, wet climate until the end of the heavy-bombardment phase of impacting. However, the presence of very young, earthlike fluvial valleys on the northern flank of Alba Patera conflicts with this scenario. Whereas the widespread ancient Martian valleys generally have morphologies indicative of sapping erosion by the slow outflow of subsurface water, the local Alba valleys were probably formed by surface-runoff processes. Because subsurface water flow might be maintained by hydrothermal energy inputs and because surface-runoff valleys developed late in Martian history, it is not necessary to invoke drastically different planet-wide climatic conditions to explain valley development on Mars. The Alba fluvial valleys can be explained by hydrothermal activity or outflow-channel discharges that locally modified the atmosphere, including precipitation and local overland flow on low-permeability volcanic ash.

  15. University of Utah, Energy Commercialization Center

    Energy Technology Data Exchange (ETDEWEB)

    Thompson, James [Univ. of Utah, Salt Lake City, UT (United States)

    2014-01-17

    During the Energy Commercialization Center’s (ECC) three years in operation, the only thing constant was change. The world of commercialization and cleantech evolved significantly during the time the ECC was formed and operating, including: the availability of cleantech funding lessoned, the growth of incubators and accelerators skyrocketed, the State of Utah created an office dedicated to energy development, the University of Utah was both praised and criticized for its success in commercialization, and the Federal government temporarily shut down. During the three-year grant there were three principle investigators on the grant, as well as three directors for the University’s Commercialization Office. Change can be hard for an organization,but as we instruct the companies we support, “Fail fast and fail often, because it is the fastest path to success.” Although there were some unanticipated challenges along the way, the local ecosystem is stronger because of the ECC’s efforts. Perhaps the greatest lesson learned was the importance of aligned incentives between key stakeholders in the commercialization process and the need for resources at the company and individual entrepreneur levels. The universities have systems and incentives to commercialize technologies, but creating value and companies generally rest with the individuals and entrepreneurs. Unfortunately the ECC was unable to create a viable mechanism to transfer the commercialization process that successfully aligned incentives and achieve a more effective ecosystem within the Rocky Mountain West. However, the ECC was successful in adding value to the individual ecosystems, and connecting national resources to regional and local needs. Regarding the ECC’s effectiveness in developing a cleantech commercialization ecosystem, initial inroads and relationships were established with key stakeholders. However, incentives, perceived or real competition, differences in commercialization processes, and

  16. Cliff swallows Petrochelidon pyrrhonota as bioindicators of environmental mercury, Cache Creek Watershed, California

    Science.gov (United States)

    Hothem, Roger L.; Trejo, Bonnie S.; Bauer, Marissa L.; Crayon, John J.

    2008-01-01

    To evaluate mercury (Hg) and other element exposure in cliff swallows (Petrochelidon pyrrhonota), eggs were collected from 16 sites within the mining-impacted Cache Creek watershed, Colusa, Lake, and Yolo counties, California, USA, in 1997-1998. Nestlings were collected from seven sites in 1998. Geometric mean total Hg (THg) concentrations ranged from 0.013 to 0.208 ??g/g wet weight (ww) in cliff swallow eggs and from 0.047 to 0.347 ??g/g ww in nestlings. Mercury detected in eggs generally followed the spatial distribution of Hg in the watershed based on proximity to both anthropogenic and natural sources. Mean Hg concentrations in samples of eggs and nestlings collected from sites near Hg sources were up to five and seven times higher, respectively, than in samples from reference sites within the watershed. Concentrations of other detected elements, including aluminum, beryllium, boron, calcium, manganese, strontium, and vanadium, were more frequently elevated at sites near Hg sources. Overall, Hg concentrations in eggs from Cache Creek were lower than those reported in eggs of tree swallows (Tachycineta bicolor) from highly contaminated locations in North America. Total Hg concentrations were lower in all Cache Creek egg samples than adverse effects levels established for other species. Total Hg concentrations in bullfrogs (Rana catesbeiana) and foothill yellow-legged frogs (Rana boylii) collected from 10 of the study sites were both positively correlated with THg concentrations in cliff swallow eggs. Our data suggest that cliff swallows are reliable bioindicators of environmental Hg. ?? Springer Science+Business Media, LLC 2007.

  17. Turtle: identifying frequent k-mers with cache-efficient algorithms.

    Science.gov (United States)

    Roy, Rajat Shuvro; Bhattacharya, Debashish; Schliep, Alexander

    2014-07-15

    Counting the frequencies of k-mers in read libraries is often a first step in the analysis of high-throughput sequencing data. Infrequent k-mers are assumed to be a result of sequencing errors. The frequent k-mers constitute a reduced but error-free representation of the experiment, which can inform read error correction or serve as the input to de novo assembly methods. Ideally, the memory requirement for counting should be linear in the number of frequent k-mers and not in the, typically much larger, total number of k-mers in the read library. We present a novel method that balances time, space and accuracy requirements to efficiently extract frequent k-mers even for high-coverage libraries and large genomes such as human. Our method is designed to minimize cache misses in a cache-efficient manner by using a pattern-blocked Bloom filter to remove infrequent k-mers from consideration in combination with a novel sort-and-compact scheme, instead of a hash, for the actual counting. Although this increases theoretical complexity, the savings in cache misses reduce the empirical running times. A variant of method can resort to a counting Bloom filter for even larger savings in memory at the expense of false-negative rates in addition to the false-positive rates common to all Bloom filter-based approaches. A comparison with the state-of-the-art shows reduced memory requirements and running times. The tools are freely available for download at http://bioinformatics.rutgers.edu/Software/Turtle and http://figshare.com/articles/Turtle/791582. © The Author 2014. Published by Oxford University Press. All rights reserved. For Permissions, please e-mail: journals.permissions@oup.com.

  18. A Comparison between Fixed Priority and EDF Scheduling accounting for Cache Related Pre-emption Delays

    Directory of Open Access Journals (Sweden)

    Will Lunniss

    2014-04-01

    Full Text Available In multitasking real-time systems, the choice of scheduling algorithm is an important factor to ensure that response time requirements are met while maximising limited system resources. Two popular scheduling algorithms include fixed priority (FP and earliest deadline first (EDF. While they have been studied in great detail before, they have not been compared when taking into account cache related pre-emption delays (CRPD. Memory and cache are split into a number of blocks containing instructions and data. During a pre-emption, cache blocks from the pre-empting task can evict those of the pre-empted task. When the pre-empted task is resumed, if it then has to re-load the evicted blocks, CRPD are introduced which then affect the schedulability of the task. In this paper we compare FP and EDF scheduling algorithms in the presence of CRPD using the state-of-the-art CRPD analysis. We find that when CRPD is accounted for, the performance gains offered by EDF over FP, while still notable, are diminished. Furthermore, we find that under scenarios that cause relatively high CRPD, task layout optimisation techniques can be applied to allow FP to schedule tasksets at a similar processor utilisation to EDF. Thus making the choice of the task layout in memory as important as the choice of scheduling algorithm. This is very relevant for industry, as it is much cheaper and simpler to adjust the task layout through the linker than it is to switch the scheduling algorithm.

  19. Incorporating cache management behavior into seed dispersal: the effect of pericarp removal on acorn germination.

    Directory of Open Access Journals (Sweden)

    Xianfeng Yi

    Full Text Available Selecting seeds for long-term storage is a key factor for food hoarding animals. Siberian chipmunks (Tamias sibiricus remove the pericarp and scatter hoard sound acorns of Quercus mongolica over those that are insect-infested to maximize returns from caches. We have no knowledge of whether these chipmunks remove the pericarp from acorns of other species of oaks and if this behavior benefits seedling establishment. In this study, we tested whether Siberian chipmunks engage in this behavior with acorns of three other Chinese oak species, Q. variabilis, Q. aliena and Q. serrata var. brevipetiolata, and how the dispersal and germination of these acorns are affected. Our results show that when chipmunks were provided with sound and infested acorns of Quercus variabilis, Q. aliena and Q. serrata var. brevipetiolata, the two types were equally harvested and dispersed. This preference suggests that Siberian chipmunks are incapable of distinguishing between sound and insect-infested acorns. However, Siberian chipmunks removed the pericarp from acorns of these three oak species prior to dispersing and caching them. Consequently, significantly more sound acorns were scatter hoarded and more infested acorns were immediately consumed. Additionally, indoor germination experiments showed that pericarp removal by chipmunks promoted acorn germination while artificial removal showed no significant effect. Our results show that pericarp removal allows Siberian chipmunks to effectively discriminate against insect-infested acorns and may represent an adaptive behavior for cache management. Because of the germination patterns of pericarp-removed acorns, we argue that the foraging behavior of Siberian chipmunks could have potential impacts on the dispersal and germination of acorns from various oak species.

  20. Incorporating cache management behavior into seed dispersal: the effect of pericarp removal on acorn germination.

    Science.gov (United States)

    Yi, Xianfeng; Zhang, Mingming; Bartlow, Andrew W; Dong, Zhong

    2014-01-01

    Selecting seeds for long-term storage is a key factor for food hoarding animals. Siberian chipmunks (Tamias sibiricus) remove the pericarp and scatter hoard sound acorns of Quercus mongolica over those that are insect-infested to maximize returns from caches. We have no knowledge of whether these chipmunks remove the pericarp from acorns of other species of oaks and if this behavior benefits seedling establishment. In this study, we tested whether Siberian chipmunks engage in this behavior with acorns of three other Chinese oak species, Q. variabilis, Q. aliena and Q. serrata var. brevipetiolata, and how the dispersal and germination of these acorns are affected. Our results show that when chipmunks were provided with sound and infested acorns of Quercus variabilis, Q. aliena and Q. serrata var. brevipetiolata, the two types were equally harvested and dispersed. This preference suggests that Siberian chipmunks are incapable of distinguishing between sound and insect-infested acorns. However, Siberian chipmunks removed the pericarp from acorns of these three oak species prior to dispersing and caching them. Consequently, significantly more sound acorns were scatter hoarded and more infested acorns were immediately consumed. Additionally, indoor germination experiments showed that pericarp removal by chipmunks promoted acorn germination while artificial removal showed no significant effect. Our results show that pericarp removal allows Siberian chipmunks to effectively discriminate against insect-infested acorns and may represent an adaptive behavior for cache management. Because of the germination patterns of pericarp-removed acorns, we argue that the foraging behavior of Siberian chipmunks could have potential impacts on the dispersal and germination of acorns from various oak species.

  1. Optical manipulation of valley pseudospin

    Science.gov (United States)

    Ye, Ziliang; Sun, Dezheng; Heinz, Tony F.

    2017-01-01

    The coherent manipulation of spin and pseudospin underlies existing and emerging quantum technologies, including quantum communication and quantum computation. Valley polarization, associated with the occupancy of degenerate, but quantum mechanically distinct valleys in momentum space, closely resembles spin polarization and has been proposed as a pseudospin carrier for the future quantum electronics. Valley exciton polarization has been created in the transition metal dichalcogenide monolayers using excitation by circularly polarized light and has been detected both optically and electrically. In addition, the existence of coherence in the valley pseudospin has been identified experimentally. The manipulation of such valley coherence has, however, remained out of reach. Here we demonstrate all-optical control of the valley coherence by means of the pseudomagnetic field associated with the optical Stark effect. Using below-bandgap circularly polarized light, we rotate the valley exciton pseudospin in monolayer WSe2 on the femtosecond timescale. Both the direction and speed of the rotation can be manipulated optically by tuning the dynamic phase of excitons in opposite valleys. This study unveils the possibility of generation, manipulation, and detection of the valley pseudospin by coupling to photons.

  2. Behavior characterization of the shared last-level cache in a chip multiprocessor

    OpenAIRE

    Benedicte Illescas, Pedro

    2014-01-01

    [CATALÀ] Aquest projecte consisteix a analitzar diferents aspectes de la jerarquia de memòria i entendre la seva influència al rendiment del sistema. Els aspectes que s'analitzaran són els algorismes de reemplaçament, els esquemes de mapeig de memòria i les polítiques de pàgina de memòria. [ANGLÈS] This project consists in analyzing different aspects of the memory hierarchy and understanding its influence in the overall system performance. The aspects that will be analyzed are cache replac...

  3. Analytical derivation of traffic patterns in cache-coherent shared-memory systems

    DEFF Research Database (Denmark)

    Stuart, Matthias Bo; Sparsø, Jens

    2011-01-01

    This paper presents an analytical method to derive the worst-case traffic pattern caused by a task graph mapped to a cache-coherent shared-memory system. Our analysis allows designers to rapidly evaluate the impact of different mappings of tasks to IP cores on the traffic pattern. The accuracy...... varies with the application’s data sharing pattern, and is around 65% in the average case and 1% in the best case when considering the traffic pattern as a whole. For individual connections, our method produces tight worst-case bandwidths....

  4. Comparison of the Frontier Distributed Database Caching System with NoSQL Databases

    CERN Multimedia

    CERN. Geneva

    2012-01-01

    Non-relational "NoSQL" databases such as Cassandra and CouchDB are best known for their ability to scale to large numbers of clients spread over a wide area. The Frontier distributed database caching system, used in production by the Large Hadron Collider CMS and ATLAS detector projects, is based on traditional SQL databases but also has the same high scalability and wide-area distributability for an important subset of applications. This paper compares the architectures, behavior, performance, and maintainability of the two different approaches and identifies the criteria for choosing which approach to prefer over the other.

  5. Cache la Poudre River Basin, Larimer - Weld Counties, Colorado. Volume 3. Flood Plain Analysis Sheep Draw.

    Science.gov (United States)

    1981-10-01

    Flooded areas represent existing conditions. SCALE IN FEET 200 0 200 400 ISO . SPECIAL STUDY ?24 CACHE LA POUDRE RIVER BASIN 12930N I"!LARIMER-WELD...FEE ar wfltrI ’JIJU~~~~.rLJ z~ Utl4~dItrJI C,) cn" C;D 32000 31500 31000 30500 30000 29500 29000 28500 STREAMI DISTANCE IN FEET UPSTREAM FROM MOUTH...PLATE 24 REPRODUCED AT GOVERNMENT FXPENSE ORO ECTED URBA14IZATI()N ND EIST114G Co 4DITIO 4S cv, co, Lo 12000 31500 31000 30500 30000 29500 29000 28500

  6. Cache Domains That are Homologous to, but Different from PAS Domains Comprise the Largest Superfamily of Extracellular Sensors in Prokaryotes.

    Science.gov (United States)

    Upadhyay, Amit A; Fleetwood, Aaron D; Adebali, Ogun; Finn, Robert D; Zhulin, Igor B

    2016-04-01

    Cellular receptors usually contain a designated sensory domain that recognizes the signal. Per/Arnt/Sim (PAS) domains are ubiquitous sensors in thousands of species ranging from bacteria to humans. Although PAS domains were described as intracellular sensors, recent structural studies revealed PAS-like domains in extracytoplasmic regions in several transmembrane receptors. However, these structurally defined extracellular PAS-like domains do not match sequence-derived PAS domain models, and thus their distribution across the genomic landscape remains largely unknown. Here we show that structurally defined extracellular PAS-like domains belong to the Cache superfamily, which is homologous to, but distinct from the PAS superfamily. Our newly built computational models enabled identification of Cache domains in tens of thousands of signal transduction proteins including those from important pathogens and model organisms. Furthermore, we show that Cache domains comprise the dominant mode of extracellular sensing in prokaryotes.

  7. Gravity and ground magnetic surveys in the Monroe and Joseph KGRA's and surrounding region, South Central Utah

    Energy Technology Data Exchange (ETDEWEB)

    Halliday, M.E.; Cook, K.L.

    1978-06-01

    Regional gravity data were collected in portions of the Pavant Range, Tushar Mountains, northern Sevier Plateau, the Antelope Range, and throughout Sevier Valley approximately between the towns of Richfield and Junction, Utah. Additionally, detailed gravity and ground magnetic data were collected in the vicinity of hot springs in both the Monroe and Joseph Known Geothermal Resource Areas (KGRA's) and subsurface geologic models were constructed. The regional gravity data were terrain corrected out to a distance of 167 km from the station and 948 gravity station values were compiled into a complete Bouguer gravity anomaly map of the survey area. This map shows a strong correlation with most structural features mapped in the survey area. Four regional gravity profiles were modeled using two-dimensional formerd and inverse algorithms.

  8. Hydrogeology of the Markagunt Plateau, Southwestern Utah

    Science.gov (United States)

    Spangler, Lawrence E.

    2010-01-01

    The Markagunt Plateau, in southwestern Utah, lies at an altitude of about 9,500 feet and is capped primarily by Quaternary-age basalt that overlies Eocene-age freshwater limestone of the Claron Formation. Over large parts of the Markagunt Plateau, dissolution of the Claron limestone and subsequent collapse of the overlying basalt have produced a terrain characterized by sinkholes as much as 1,000 feet across and 100 feet deep. Numerous large springs discharge from the basalt and underlying limestone on the plateau, including Mammoth Spring, one of the largest springs in Utah, with a discharge that can exceed 300 cubic feet per second. Discharge from Mammoth Spring is from the Claron Formation; however, recharge to the spring largely takes place by both focused and diffuse infiltration through the basalt that caps the limestone. Results of dye tracing to Mammoth Spring indicate that recharge originates largely southwest of the spring outside of the Mammoth Creek watershed, as well as from losing reaches along Mammoth Creek. Maximum groundwater travel time to the spring from dye-tracer tests during the snowmelt runoff period was about 1 week. Specific conductance and water temperature data from the spring show an inverse relation to discharge during snowmelt runoff and rainfall events, also indicating short groundwater residence times. Results of major-ion analyses for samples collected from Mammoth and other springs on the plateau indicate calcium-bicarbonate type water containing low (less than 200 mg/L) dissolved-solids concentrations. Investigations in the Navajo Lake area along the southern margin of the plateau have shown that water losing to sinkholes bifurcates and discharges to both Cascade and Duck Creek Springs, which subsequently flow into the Virgin and Sevier River basins, respectively. Groundwater travel times to these springs, on the basis of dye tracing, were about 8.5 and 53 hours, respectively. Similarly, groundwater travel time from Duck Creek

  9. Ground-water data, Sevier Desert, Utah

    Science.gov (United States)

    Mower, Reed W.; Feltis, Richard D.

    1964-01-01

    This report is intended to serve two purposes: (1) to make available to the public basic ground-water data useful in planning and studying development of water resources, and (2) to supplement an interpretive report that will be published later.Records were collected during the period 1935-64 by the U.S. Geological survey in cooperation with the Utah State Engineer as part of the investigation of ground-water conditions in the Sevier Desert, in Juab and Millard Counties, Utah. The interpretive material will be published in a companion report by R. W. Mower and R. D. Feltis.This report is most useful in predicting conditions likely to be found in areas that are being considered as well sites. The person considering the new well can spot the proposed site on plate 1 and examine the records of nearby wells as shown in the tables and figures. From table 1 he can note such things as depth, diameter, water level, yield, use of water, temperature of water, and depth of perforations. By comparing the depth of perforations with the drillers' logs in table 3 he can note the type of material that yields water to the wells. Table 2 and figure 2 show the historic fluctuations and trends of water levels in the vicinity. From table 4 he can note the chemical quality of the water from wells in the vicinity. Table 5 shows the amount of water discharged during 1951-63 from the pumped irrigation, public supply, and industrial wells. If the reader decides from his examination that conditions are favorable, he can place an application to drill a well with the state Engineer. If the State Engineer believes unappropriated water is available, the application may be approved after minimum statutory requirements have been satisfied.The report is also useful when planning large-scale developments of water supply. This and other uses of the report will be helped by use of the interpretive report upon its release.

  10. Impact of high efficiency vehicles on future fuel tax revenues in Utah.

    Science.gov (United States)

    2015-05-01

    The Utah Department of Transportation Research Division has analyzed the potential impact of : high-efficiency motor vehicles on future State of Utah motor fuel tax revenues used to construct and maintain the : highway network. High-efficiency motor ...

  11. Wolves in Utah: An analysis of potential impacts and recommendations for management

    OpenAIRE

    Switalski, T. Adam; Simmons, Trey; Duncan, Shiree L.; Chavez, Andreas S.; Schmidt, Robert H.

    2002-01-01

    The historic range of gray wolves (Canis lupus) in Utah was essentially statewide. Although their presence cannot be disputed, the historic abundance of wolves in Utah is unknown. The release of gray wolves into Yellowstone National Park and central Idaho in 1995 established growing populations, and increasing dispersal is bringing these wolves closer to Utah. It seems likely that wolves will commingle with Utah's other native mammals in the near future. The potential presence of wolves in Ut...

  12. iUTAH Summer Research: Analyzing diel variations of MeHg in the Provo River, Utah

    Science.gov (United States)

    Hamilton, G. L.; Packer, B. N.; Carling, G. T.; Checketts, H. N.; Shepherd Barkdull, N.

    2016-12-01

    iUTAH is an interdisciplinary research program aimed at strengthening science for Utah's water future and funded by the National Science Foundation. iUTAH is comprised of three research areas with an overarching goal of understanding how Utah's water system operates as an integrated physical, chemical, biological, and social system. During the Summer of 2016, I participated in the iUTAH (Innovative Urban Transitions and Aridregion Hydro-sustainability) iFellows undergraduate research program. iUTAH provided the opportunity to conduct research at Brigham Young University with graduate students studying trace metal dynamics in the Provo River, Utah, USA. This report presents the chemical system evaluation of methylmercury (MeHg) during diurnal variations from snowmelt runoff. Water samples were collected during peak discharge from Soapstone Basin, a site along the Upper Provo River watershed, every hour over a 24-hour (diel) period. Sampling began at 1200 hours on June 1 and ended at 1100 hours on June 2, 2016. The results of the Provo River MeHg analysis showed dissolved MeHg had a concentration variance of 0.027 ng/L and particulate MeHg had a concentration variance of 0.056 ng/L. The variances during the diel cycle represent more than a two-fold change in concentration. The hourly MeHg concentration levels demonstrated an inverse relationship with gage height indicative of dilution. The purpose of the study is to develop a more thorough understanding of short-term variances over time and the potential affect on long-term interpretations of MeHg fluctuations in the river. The Provo River flows through Jordanelle Reservoir where there is a mercury advisory for two fish species. MeHg is a bioaccumulative neurotoxin that humans are primarily exposed to by the consumption of contaminated fish. The strong correlation between the levels of MeHg in water and fish make the river concentrations an important factor.

  13. Human Rabies - Wyoming and Utah, 2015.

    Science.gov (United States)

    Harrist, Alexia; Styczynski, Ashley; Wynn, DonRaphael; Ansari, Safdar; Hopkin, Justin; Rosado-Santos, Harry; Baker, JoDee; Nakashima, Allyn; Atkinson, Annette; Spencer, Melanie; Dean, Debbie; Teachout, Leslie; Mayer, Jeanmarie; Condori, Rene E; Orciari, Lillian; Wadhwa, Ashutosh; Ellison, James; Niezgoda, Michael; Petersen, Brett; Wallace, Ryan; Musgrave, Karl

    2016-06-03

    In September 2015, a Wyoming woman was admitted to a local hospital with a 5-day history of progressive weakness, ataxia, dysarthria, and dysphagia. Because of respiratory failure, she was transferred to a referral hospital in Utah, where she developed progressive encephalitis. On day 8 of hospitalization, the patient's family told clinicians they recalled that, 1 month before admission, the woman had found a bat on her neck upon waking, but had not sought medical care. The patient's husband subsequently had contacted county invasive species authorities about the incident, but he was not advised to seek health care for evaluation of his wife's risk for rabies. On October 2, CDC confirmed the patient was infected with a rabies virus variant that was enzootic to the silver-haired bat (Lasionycteris noctivagans). The patient died on October 3. Public understanding of rabies risk from bat contact needs to be improved; cooperation among public health and other agencies can aid in referring persons with possible bat exposure for assessment of rabies risk.

  14. Environmental assessment: Davis Canyon site, Utah

    Energy Technology Data Exchange (ETDEWEB)

    none,

    1986-05-01

    In February 1983, the US Department of Energy (DOE) identified the Davis Canyon site in Utah as one of the nine potentially acceptable sites for a mined geologic repository for spent nuclear fuel and high- level radioactive waste. To determine their suitability, the Davis Canyon site and the eight other potentially acceptable sites have been evaluated in accordance with the DOE's General Guidelines for the Recommendation of Sites for the Nuclear Waste Repositories. These evaluations were reported in draft environmental assessments (EAs), which were issued for public review and comment. After considering the comments received on the draft EAs, the DOE prepared the final EA. The Davis Canyon site is in the Paradox Basin, which is one of five distinct geohydrologic settings considered for the first repository. This setting contains one other potentially acceptable site -- the Lavender Canyon site. Although the Lavender Canyon site is suitable for site characterization, the DOE has concluded that the Davis Canyon site is the preferred site in the Paradox Basin. On the basis of the evaluations reported in this EA, the DOE has found that the Davis Canyon site is not disqualified under the guidelines. Furthermore, the DOE has found that the site is suitable for site characterization because the evidence does not support a conclusion that the site will not be able to meet each of the qualifying conditions specified in the guidelines. On the basis of these findings, the DOE is nominating the Davis Canyon site as one of the five sites suitable for characterization.

  15. Environmental assessment: Davis Canyon site, Utah

    Energy Technology Data Exchange (ETDEWEB)

    none,

    1986-05-01

    In February 1983, the US Department of Energy (DOE) identified the Davis Canyon site in Utah as one of the nine potentially acceptable sites for a mined geologic repository for spent nuclear fuel and high-level radioactive waste. To determine their suitability, the Davis Canyon site and the eight other potentially acceptable sites have been evaluated in accordance with the DOE's General Guidelines for the Recommendation of Sites for the Nuclear Waste Repositories. These evaluations were reported in draft environmental assessments (EAs), which were issued for public review and comment. After considering the comments received on the draft EAs, the DOE prepared the final EA. The Davis Canyon site is in the Paradox Basin, which is one of five distinct geohydrologic settings considering for the first repository. This setting contains one other potentially acceptable site -- the Lavender Canyon site. Although the Lavender Canyon site is suitable for site characterization, the DOE has concluded that the Davis Canyon site is the preferred site in the Paradox Basin. On the basis of the evaluations reported in this EA, the DOE has found that the Davis Canyon site is not disqualified under the guidelines. Furthermore, the DOE has found that the site is suitable for site characterization because the evidence does not support a conclusion that the site will not be able to meet each of the qualifying conditions specified in the guidelines. On the basis of these findings, the DOE is nominating the Davis Canyon site as one of five sites suitable for characterization.

  16. Parental hesitation in immunizing children in Utah.

    Science.gov (United States)

    Luthy, Karlen E; Beckstrand, Renea L; Callister, Lynn Clark

    2010-01-01

    To determine why parents in a Utah community hesitated in immunizing their children. Cross-sectional descriptive study. Data were collected from a convenience sample of 86 parents of under-immunized children in the county health department and local pediatric and family practice offices. Participants were asked to complete an immunization hesitancy survey including questions regarding why parents hesitated to immunize their children, parental concerns regarding immunizations, and what advice they would give to a friend or family member who had concerns about childhood vaccines. Parents could also write in any other comment, concern, or suggestion they had regarding childhood immunizations. 2 major themes were identified: concerns regarding immunization safety and lack of perceived need. The most commonly reported concerns regarding immunization safety included autism, immune system overload, and other adverse reactions. Many parents did not recognize the need for childhood immunizations, especially multiple immunizations given simultaneously on a strict timeline. The manner in which immunization information is shared with hesitant parents can be particularly important. There is a need for health care providers to assess and increase parental knowledge regarding immunizations.

  17. Runoff conditions in Utah for water year 2011

    Science.gov (United States)

    Cordova, Jeffrey T.; Angeroth, Cory E.

    2012-01-01

    In May 2011, the snowpack conditions in the mountains of central and northern Utah had emergency planners and water managers preparing for levels of runoff similar to the record year of 1983. The SNOwpack TELemetry (SNOTEL) records from the Natural Resources Conservation Service (NRCS) reported that the amount of water contained in the snowpack in May 2011 was greater than it was in either May of 1983 or 2005.Despite the above average snowpack,which lasted into the summer of 2011, runoff from snowmelt in 2011 did not create the widespread damage observed in 1983 and 2005. Cooler than normal temperatures resulted in slower snowmelt rates, which produced a prolonged and elevated runoff. Annual streamflow for water year 2011 was well above average, but few records of peak streamflow were set. The increase in water-surface elevation of Great Salt Lake was also above average. Ten streamgages in central and northern Utah, with records spanning greater than 20 years, have been selected to highlight the runoff conditions in Utah during water year 2011. Streamflow on the Duchesne River near Randlett, Utah, and on the Bear River near Utah-Wyoming state line is affected by several upstream diversions. These two streamgages were included in the analysis because their streamflow records have shown responses to spring snowmelt. The annual streamflow in all 10 of these streamgages was greater than 150 percent of average, and 3 streamgages set new records for total annual streamflow in water year 2011. One streamgage set a new peak streamflow record.

  18. 78 FR 2430 - Notice of Inventory Completion: Natural History Museum of Utah, Salt Lake City, UT

    Science.gov (United States)

    2013-01-11

    ... National Park Service Notice of Inventory Completion: Natural History Museum of Utah, Salt Lake City, UT... February 11, 2013. ADDRESSES: Duncan Metcalfe, Natural History Museum of Utah, 301 Wakara Way, Salt Lake... funerary objects should contact Duncan Metcalfe, Natural History Museum of Utah, 301 Wakara Way, Salt Lake...

  19. 30 CFR 944.25 - Approval of Utah abandoned mine land reclamation plan amendments.

    Science.gov (United States)

    2010-07-01

    ... STATE UTAH § 944.25 Approval of Utah abandoned mine land reclamation plan amendments. The following is a... 30 Mineral Resources 3 2010-07-01 2010-07-01 false Approval of Utah abandoned mine land reclamation plan amendments. 944.25 Section 944.25 Mineral Resources OFFICE OF SURFACE MINING RECLAMATION AND...

  20. 30 CFR 944.20 - Approval of Utah abandoned mine plan.

    Science.gov (United States)

    2010-07-01

    ... 30 Mineral Resources 3 2010-07-01 2010-07-01 false Approval of Utah abandoned mine plan. 944.20 Section 944.20 Mineral Resources OFFICE OF SURFACE MINING RECLAMATION AND ENFORCEMENT, DEPARTMENT OF THE... Utah abandoned mine plan. The Utah Abandoned Mine Plan, as submitted on February 9, 1983, and as...

  1. 75 FR 8397 - Notice of Utah's Resource Advisory Council (RAC)/Recreation RAC Meeting

    Science.gov (United States)

    2010-02-24

    ... Bureau of Land Management Notice of Utah's Resource Advisory Council (RAC)/Recreation RAC Meeting AGENCY: Bureau of Land Management, Interior. ACTION: Notice of Utah's Resource Advisory Council (RAC)/Recreation... Management's (BLM) Utah Resource Advisory Council (RAC)/Recreation RAC will meet as indicated below. DATES...

  2. A general approach for cache-oblivious range reporting and approximate range counting

    DEFF Research Database (Denmark)

    Afshani, Peyman; Hamilton, Chris; Zeh, Norbert

    2010-01-01

    of points in the query range. As a corollary, we also obtain the first approximate 3-d halfspace range counting and 3-d dominance counting data structures with a worst-case query time of O(log(N/K)) in internal memory. An easy but important consequence of our main result is the existence of -space cache...... counting queries. This class includes three-sided range counting in the plane, 3-d dominance counting, and 3-d halfspace range counting. The constructed data structures use linear space and answer queries in the optimal query bound of O(logB(N/K)) block transfers in the worst case, where K is the number......-oblivious data structures with an optimal query bound of O(logBN+K/B) block transfers for the reporting versions of the above problems. Using standard reductions, these data structures allow us to obtain the first cache-oblivious data structures that use almost linear space and achieve the optimal query bound...

  3. Flood Frequency Analysis of Future Climate Projections in the Cache Creek Watershed

    Science.gov (United States)

    Fischer, I.; Trihn, T.; Ishida, K.; Jang, S.; Kavvas, E.; Kavvas, M. L.

    2014-12-01

    Effects of climate change on hydrologic flow regimes, particularly extreme events, necessitate modeling of future flows to best inform water resources management. Future flow projections may be modeled through the joint use of carbon emission scenarios, general circulation models and watershed models. This research effort ran 13 simulations for carbon emission scenarios (taken from the A1, A2 and B1 families) over the 21st century (2001-2100) for the Cache Creek watershed in Northern California. Atmospheric data from general circulation models, CCSM3 and ECHAM5, were dynamically downscaled to a 9 km resolution using MM5, a regional mesoscale model, before being input into the physically based watershed environmental hydrology (WEHY) model. Ensemble mean and standard deviation of simulated flows describe the expected hydrologic system response. Frequency histograms and cumulative distribution functions characterize the range of hydrologic responses that may occur. The modeled flow results comprise a dataset suitable for time series and frequency analysis allowing for more robust system characterization, including indices such as the 100 year flood return period. These results are significant for water quality management as the Cache Creek watershed is severely impacted by mercury pollution from historic mining activities. Extreme flow events control mercury fate and transport affecting the downstream water bodies of the Sacramento River and Sacramento- San Joaquin Delta which provide drinking water to over 25 million people.

  4. Transient Variable Caching in Java’s Stack-Based Intermediate Representation

    Directory of Open Access Journals (Sweden)

    Paul Týma

    1999-01-01

    Full Text Available Java’s stack‐based intermediate representation (IR is typically coerced to execute on register‐based architectures. Unoptimized compiled code dutifully replicates transient variable usage designated by the programmer and common optimization practices tend to introduce further usage (i.e., CSE, Loop‐invariant Code Motion, etc.. On register based machines, often transient variables are cached within registers (when available saving the expense of actually accessing memory. Unfortunately, in stack‐based environments because of the need to push and pop the transient values, further performance improvement is possible. This paper presents Transient Variable Caching (TVC, a technique for eliminating transient variable overhead whenever possible. This optimization would find a likely home in optimizers attached to the back of popular Java compilers. Side effects of the algorithm include significant instruction reordering and introduction of many stack‐manipulation operations. This combination has proven to greatly impede the ability to decompile stack‐based IR code sequences. The code that results from the transform is faster, smaller, and greatly impedes decompilation.

  5. Observations of territorial breeding common ravens caching eggs of greater sage-grouse

    Science.gov (United States)

    Howe, Kristy B.; Coates, Peter S.

    2015-01-01

    Previous investigations using continuous video monitoring of greater sage-grouse Centrocercus urophasianus nests have unambiguously identified common ravens Corvus corax as an important egg predator within the western United States. The quantity of greater sage-grouse eggs an individual common raven consumes during the nesting period and the extent to which common ravens actively hunt greater sage-grouse nests are largely unknown. However, some evidence suggests that territorial breeding common ravens, rather than nonbreeding transients, are most likely responsible for nest depredations. We describe greater sage-grouse egg depredation observations obtained opportunistically from three common raven nests located in Idaho and Nevada where depredated greater sage-grouse eggs were found at or in the immediate vicinity of the nest site, including the caching of eggs in nearby rock crevices. We opportunistically monitored these nests by counting and removing depredated eggs and shell fragments from the nest sites during each visit to determine the extent to which the common raven pairs preyed on greater sage-grouse eggs. To our knowledge, our observations represent the first evidence that breeding, territorial pairs of common ravens cache greater sage-grouse eggs and are capable of depredating multiple greater sage-grouse nests.

  6. VEGETATION COVER ANALYSIS OF HAZARDOUS WASTE SITES IN UTAH AND ARIZONA USING HYPERSPECTRAL REMOTE SENSING

    Energy Technology Data Exchange (ETDEWEB)

    Serrato, M.; Jungho, I.; Jensen, J.; Jensen, R.; Gladden, J.; Waugh, J.

    2012-01-17

    Remote sensing technology can provide a cost-effective tool for monitoring hazardous waste sites. This study investigated the usability of HyMap airborne hyperspectral remote sensing data (126 bands at 2.3 x 2.3 m spatial resolution) to characterize the vegetation at U.S. Department of Energy uranium processing sites near Monticello, Utah and Monument Valley, Arizona. Grass and shrub species were mixed on an engineered disposal cell cover at the Monticello site while shrub species were dominant in the phytoremediation plantings at the Monument Valley site. The specific objectives of this study were to: (1) estimate leaf-area-index (LAI) of the vegetation using three different methods (i.e., vegetation indices, red-edge positioning (REP), and machine learning regression trees), and (2) map the vegetation cover using machine learning decision trees based on either the scaled reflectance data or mixture tuned matched filtering (MTMF)-derived metrics and vegetation indices. Regression trees resulted in the best calibration performance of LAI estimation (R{sup 2} > 0.80). The use of REPs failed to accurately predict LAI (R{sup 2} < 0.2). The use of the MTMF-derived metrics (matched filter scores and infeasibility) and a range of vegetation indices in decision trees improved the vegetation mapping when compared to the decision tree classification using just the scaled reflectance. Results suggest that hyperspectral imagery are useful for characterizing biophysical characteristics (LAI) and vegetation cover on capped hazardous waste sites. However, it is believed that the vegetation mapping would benefit from the use of 1 higher spatial resolution hyperspectral data due to the small size of many of the vegetation patches (< 1m) found on the sites.

  7. Simulation analysis of the unconfined aquifer, Raft River geothermal area, Idaho-Utah

    Science.gov (United States)

    Nichols, William D.

    1979-01-01

    This study covers about 1,000 mi2 (2,600 km2 ) of the southern Raft River drainage basin in south-central Idaho and northwest Utah. The main area of interest, approximately 200 mi2 (520 km2 ) of semiarid agricultural and rangeland in the southern Raft River Valley that includes the known Geothermal Resource Area near Bridge, Idaho, was modelled numerically to evaluate the hydrodynamics of the unconfined aquifer. Computed and estimated transmissivity values range from 1,200 feet squared per day (110 meters squared per day) to 73,500 feet squared per day (6,830 meters squared per day). Water budgets, including ground-water recharge and discharge for approximate equilibrium conditions, have been computed by several previous investigators; their estimates of available ground-water recharge range from about 46,000 acre-feet per year (57 cubic hectometers per year) to 100,000 acre-feet per year (123 cubic hectometers per year).Simulation modeling of equilibrium conditions represented by 1952 water levels suggests: (1) recharge to the water-table aquifer is about 63,000 acre-feet per year (77 cubic hectometers per year); (2) a significant volume of ground water is discharged through evapotranspiration by phreatophytes growing on the valley bottomlands; (3) the major source of recharge may be from upward leakage of water from a deeper, confined reservoir; and (4) the aquifer transmissivity probably does not exceed about 12,000 feet squared per day (3,100 meters squared per day). Additional analysis carried out by simulating transient conditions from 1952 to 1965 strongly suggests that aquifer transmissivity does not exceed about 7,700 feet squared per day (700 meters squared per day). The model was calibrated using slightly modified published pumpage data; it satisfactorily reproduced the historic water-level decline over the period 1952-65.

  8. Assessment and use of drug information references in Utah pharmacies

    Directory of Open Access Journals (Sweden)

    Moorman KL

    2017-03-01

    Full Text Available Objective: To determine which drug references Utah pharmacists use most frequently. To determine which types of drug information questions are most commonly asked, and whether Utah pharmacists have access to adequate references to respond to these questions. Methods: A 19-question survey was created using Qualtrics, LLC (Provo, Utah software. An electronic survey link was sent to 1,431 pharmacists with a valid e-mail address listed in the Department of Professional Licensing database. Questions focused on available references in the participant’s pharmacy, how current the references are, and the participant’s use of the references. Surveys were analyzed for participants practicing in either community or hospital pharmacies in the state of Utah. Results: A total of 147 responses were included in the analysis. Approximately 44% of respondents practiced in the community, and 56% practiced in a hospital setting. The most commonly used references by Utah pharmacists are Micromedex, Lexicomp, UpToDate, Clinical Pharmacology, and Drug Facts & Comparisons. Pharmacists in the community frequently receive questions related to adverse drug reactions, drug interactions, and over-the-counter medications. Pharmacists in the hospital frequently receive questions relating to dosage and administration, drug interactions, and adverse drug reactions. About 89% of community pharmacists and 96% of hospital pharmacists feel available references are adequate to answer the questions they receive. Conclusions: Utah pharmacists generally use large reference suites to answer drug information questions. The majority of pharmacists consider the references available to them to be adequate to answer the questions they receive.

  9. 78 FR 6832 - Notice of Mailing Address Change for the Utah State Office, Salt Lake City, UT

    Science.gov (United States)

    2013-01-31

    ... Bureau of Land Management Notice of Mailing Address Change for the Utah State Office, Salt Lake City, UT... of Land Management (BLM), Utah State Office, in Salt Lake City, Utah, will be changing from P.O. Box 45155-0155 to 440 West 200 South, Suite 500, Salt Lake City, Utah 84101-1345. The proposed date will be...

  10. 75 FR 57055 - Endangered and Threatened Wildlife and Plants; Draft Revised Recovery Plan for Utah Prairie Dog

    Science.gov (United States)

    2010-09-17

    ... for Utah Prairie Dog AGENCY: Fish and Wildlife Service, Interior. ACTION: Notice of document... availability of a draft revised recovery plan for the Utah prairie dog (Cynomys parvidens). This species is.... The Utah prairie dog (Cynomys parvidens), found only in southwestern and central Utah, was listed as...

  11. Stereo Pair, Salt Lake City, Utah

    Science.gov (United States)

    2002-01-01

    The 2002 Winter Olympics are hosted by Salt Lake City at several venues within the city, in nearby cities, and within the adjacent Wasatch Mountains. This image pair provides a stereoscopic map view of north central Utah that includes all of these Olympic sites. In the south, next to Utah Lake, Provo hosts the ice hockey competition. In the north, northeast of the Great Salt Lake, Ogden hosts curling and the nearby Snowbasin ski area hosts the downhill events. In between, southeast of the Great Salt Lake, Salt Lake City hosts the Olympic Village and the various skating events. Further east, across the Wasatch Mountains, the Park City ski resort hosts the bobsled, ski jumping, and snowboarding events. The Winter Olympics are always hosted in mountainous terrain. This view shows the dramatic landscape that makes the Salt Lake City region a world-class center for winter sports.This stereoscopic image was generated by draping a Landsat satellite image over a Shuttle Radar Topography Mission digital elevation model. Two differing perspectives were then calculated, one for each eye. They can be seen in 3-D by viewing the left image with the right eye and the right image with the left eye (cross-eyed viewing or by downloading and printing the image pair and viewing them with a stereoscope. When stereoscopically merged, the result is a vertically exaggerated view of Earth's surface in its full three dimensions.Landsat has been providing visible and infrared views of the Earth since 1972. SRTM elevation data matches the 30-meter (98-foot) resolution of most Landsat images and will substantially help in analyzing the large and growing Landsat image archive, managed by the U.S. Geological Survey (USGS).Elevation data used in this image was acquired by the Shuttle Radar Topography Mission (SRTM) aboard the Space Shuttle Endeavour, launched on Feb. 11, 2000. SRTM used the same radar instrument that comprised the Spaceborne Imaging Radar-C/X-Band Synthetic Aperture Radar (SIR

  12. An update of Utah State University's GAS activities

    Science.gov (United States)

    Megill, L. R.

    1986-01-01

    The highlights of the Utah State University's participation in the space program are listed. Proposed experiments include: a study of the velocity of a bubble in water under the influence of a temperature gradient; reflight of an experiment on surface tension driven convective flow; surface waves in zero-G; crystallization in zero-G (vapor phase and liquid phase); bio gas generation; and penicillum growth; study of undamped oscillations in a vacuum and zero-G. The effect that spinoffs have had on the Utah State University were discussed.

  13. Environmental assessment: Davis Canyon site, Utah

    Energy Technology Data Exchange (ETDEWEB)

    none,

    1986-05-01

    In February 1983, the US Department of Energy (DOE) identified the Davis Canyon site in Utah as one of the nine potentially acceptable sites for a mined geologic repository for spent nuclear fuel and high-level radioactive waste. To determine their suitability, the Davis Canyon site and the eight other potentially acceptable sites have been evaluated in accordance with the DOE's General Guidelines for the Recommendation of Sites for the Nuclear Waste Repositories. These evaluations were reported in draft environmental assessments (EAs), which were issued for public review and comment. After considering the comments received on the draft EAs, the DOE prepared the final EA. The Davis Canyon site is in the Paradox Basin, which is one of five distinct geohydrologic settings considered for the first repository. This setting contains one other potentially acceptable site -- the Lavender Canyon site. Although the Lavender Canyon site is suitable for site characterization, the DOE has concluded that the Davis Canyon site is the preferred site in the Paradox Basin. On the basis of the evaluations reported in this EA, the DOE has found that the Davis Canyon site is not disqualified under the guidelines. Furthermore, the DOE has fond that the site is suitable for site characterization because the evidence does not support a conclusion that the site will not be able to meet each of the qualifying conditions specified in the guidelines. On the basis of these findings, the DOE is nominating the Davis Canyon site as one of five sites suitable for characterization. 181 figs., 175 tabs.

  14. Computational Fluid Dynamics (CFD) Modeling And Analysis Delivery Order 0006: Cache-Aware Air Vehicles Unstructured Solver (AVUS)

    Science.gov (United States)

    2005-08-01

    AFRL-VA-WP-TM-2006-3009 COMPUTATIONAL FLUID DYNAMICS ( CFD ) MODELING AND ANALYSIS Delivery Order 0006: Cache-Aware Air Vehicles Unstructured...CONTRACT NUMBER F33615-03-D-3307-0006 5b. GRANT NUMBER 4. TITLE AND SUBTITLE COMPUTATIONAL FLUID DYNAMICS ( CFD ) MODELING AND ANALYSIS

  15. Application of computer graphics to generate coal resources of the Cache coal bed, Recluse geologic model area, Campbell County, Wyoming

    Science.gov (United States)

    Schneider, G.B.; Crowley, S.S.; Carey, M.A.

    1982-01-01

    Low-sulfur subbituminous coal resources have been calculated, using both manual and computer methods, for the Cache coal bed in the Recluse Model Area, which covers the White Tail Butte, Pitch Draw, Recluse, and Homestead Draw SW 7 1/2 minute quadrangles, Campbell County, Wyoming. Approximately 275 coal thickness measurements obtained from drill hole data are evenly distributed throughout the area. The Cache coal and associated beds are in the Paleocene Tongue River Member of the Fort Union Formation. The depth from the surface to the Cache bed ranges from 269 to 1,257 feet. The thickness of the coal is as much as 31 feet, but in places the Cache coal bed is absent. Comparisons between hand-drawn and computer-generated isopach maps show minimal differences. Total coal resources calculated by computer show the bed to contain 2,316 million short tons or about 6.7 percent more than the hand-calculated figure of 2,160 million short tons.

  16. Groundwater model of the Great Basin carbonate and alluvial aquifer system version 3.0: Incorporating revisions in southwestern Utah and east central Nevada

    Science.gov (United States)

    Brooks, Lynette E.

    2017-12-01

    The groundwater model described in this report is a new version of previously published steady-state numerical groundwater flow models of the Great Basin carbonate and alluvial aquifer system, and was developed in conjunction with U.S. Geological Survey studies in Parowan, Pine, and Wah Wah Valleys, Utah. This version of the model is GBCAAS v. 3.0 and supersedes previous versions. The objectives of the model for Parowan Valley were to simulate revised conceptual estimates of recharge and discharge, to estimate simulated aquifer storage properties and the amount of reduction in storage as a result of historical groundwater withdrawals, and to assess reduction in groundwater withdrawals necessary to mitigate groundwater-level declines in the basin. The objectives of the model for the area near Pine and Wah Wah Valleys were to recalibrate the model using new observations of groundwater levels and evapotranspiration of groundwater; to provide new estimates of simulated recharge, hydraulic conductivity, and interbasin flow; and to simulate the effects of proposed groundwater withdrawals on the regional flow system. Meeting these objectives required the addition of 15 transient calibration stress periods and 14 projection stress periods, aquifer storage properties, historical withdrawals in Parowan Valley, and observations of water-level changes in Parowan Valley. Recharge in Parowan Valley and withdrawal from wells in Parowan Valley and two nearby wells in Cedar City Valley vary for each calibration stress period representing conditions from March 1940 to November 2013. Stresses, including recharge, are the same in each stress period as in the steady-state stress period for all areas outside of Parowan Valley. The model was calibrated to transient conditions only in Parowan Valley. Simulated storage properties outside of Parowan Valley were set the same as the Parowan Valley properties and are not considered calibrated. Model observations in GBCAAS v. 3.0 are

  17. Earthquake probabilities for the Wassatch front region in Utah, Idaho, and Wyoming

    Science.gov (United States)

    Wong, Ivan G.; Lund, William R.; Duross, Christopher; Thomas, Patricia; Arabasz, Walter; Crone, Anthony J.; Hylland, Michael D.; Luco, Nicolas; Olig, Susan S.; Pechmann, James; Personius, Stephen; Petersen, Mark D.; Schwartz, David P.; Smith, Robert B.; Rowman, Steve

    2016-01-01

    In a letter to The Salt Lake Daily Tribune in September 1883, U.S. Geological Survey (USGS) geologist G.K. Gilbert warned local residents about the implications of observable fault scarps along the western base of the Wasatch Range. The scarps were evidence that large surface-rupturing earthquakes had occurred in the past and more would likely occur in the future. The main actor in this drama is the 350-km-long Wasatch fault zone (WFZ), which extends from central Utah to southernmost Idaho. The modern Wasatch Front urban corridor, which follows the valleys on the WFZ’s hanging wall between Brigham City and Nephi, is home to nearly 80% of Utah’s population of 3 million. Adding to this circumstance of “lots of eggs in one basket,” more than 75% of Utah’s economy is concentrated along the Wasatch Front in Utah’s four largest counties, literally astride the five central and most active segments of the WFZ.

  18. Dark Valley in Newton Crater

    Science.gov (United States)

    2003-01-01

    MGS MOC Release No. MOC2-418, 11 July 2003This Mars Global Surveyor (MGS) Mars Orbiter Camera (MOC) high resolution image shows part of a dark-floored valley system in northern Newton Crater. The valley might have been originally formed by liquid water; the dark material is probably sand that has blown into the valley in more recent times. The picture was acquired earlier this week on July 6, 2003, and is located near 39.2oS, 157.9oW. The picture covers an area 2.3 km (1.4 mi) across; sunlight illuminates the scene from the upper left.

  19. gpuSPHASE-A shared memory caching implementation for 2D SPH using CUDA

    Science.gov (United States)

    Winkler, Daniel; Meister, Michael; Rezavand, Massoud; Rauch, Wolfgang

    2017-04-01

    Smoothed particle hydrodynamics (SPH) is a meshless Lagrangian method that has been successfully applied to computational fluid dynamics (CFD), solid mechanics and many other multi-physics problems. Using the method to solve transport phenomena in process engineering requires the simulation of several days to weeks of physical time. Based on the high computational demand of CFD such simulations in 3D need a computation time of years so that a reduction to a 2D domain is inevitable. In this paper gpuSPHASE, a new open-source 2D SPH solver implementation for graphics devices, is developed. It is optimized for simulations that must be executed with thousands of frames per second to be computed in reasonable time. A novel caching algorithm for Compute Unified Device Architecture (CUDA) shared memory is proposed and implemented. The software is validated and the performance is evaluated for the well established dambreak test case.

  20. Caching behaviour by red squirrels may contribute to food conditioning of grizzly bears

    Directory of Open Access Journals (Sweden)

    Julia Elizabeth Put

    2017-08-01

    Full Text Available We describe an interspecific relationship wherein grizzly bears (Ursus arctos horribilis appear to seek out and consume agricultural seeds concentrated in the middens of red squirrels (Tamiasciurus hudsonicus, which had collected and cached spilled grain from a railway. We studied this interaction by estimating squirrel density, midden density and contents, and bear activity along paired transects that were near (within 50 m or far (200 m from the railway. Relative to far ones, near transects had 2.4 times more squirrel sightings, but similar numbers of squirrel middens. Among 15 middens in which agricultural products were found, 14 were near the rail and 4 subsequently exhibited evidence of bear digging. Remote cameras confirmed the presence of squirrels on the rail and bears excavating middens. We speculate that obtaining grain from squirrel middens encourages bears to seek grain on the railway, potentially contributing to their rising risk of collisions with trains.