WorldWideScience

Sample records for technology computer numerical

  1. Technology and Jobs: Computer-Aided Design. Numerical-Control Machine-Tool Operators. Office Automation.

    Science.gov (United States)

    Stanton, Michael; And Others

    1985-01-01

    Three reports on the effects of high technology on the nature of work include (1) Stanton on applications and implications of computer-aided design for engineers, drafters, and architects; (2) Nardone on the outlook and training of numerical-control machine tool operators; and (3) Austin and Drake on the future of clerical occupations in automated…

  2. Curriculums in Industrial Technology. Plastics Technology. Industrial Maintenance. Computer Numerical Control. Teacher's Manuals and Student Learning Guides.

    Science.gov (United States)

    El Paso Community Coll., TX.

    Curriculum guides are provided for plastics technology, industrial maintenance, and computer numerical control. Each curriculum is divided into a number of courses. For each course these instructor materials are presented in the official course outline: course description, course objectives, unit titles, texts and materials, instructor resources,…

  3. Research on Modeling and Reusing of Computer Numerical Control Software with Object-oriented Technology

    Institute of Scientific and Technical Information of China (English)

    胡俊; 王宇晗; 王涛; 蔡建国

    2001-01-01

    To improve the reusable and configurable ability of computer numerical control ( CNC ) software, a new method to construct reusable model of CNC software with object-oriented (OO) technology is proposed. Based on analyzing function of CNC software, the article presents how to construct a general class library of CNC software with OO technology. Most function modules of CNC software can he reused because of inheritable capability of classes. Besides, the article analyzes the object relational model in request/report mode, and multitask concurrent management model, which can he applied on double-CPU hardware platform and Windows 95/NT environment. Finally, the method has been successfully applied on a turning CNC system and a milling CNC system, and some function modules have been reused.

  4. Research on assembly reliability control technology for computer numerical control machine tools

    Directory of Open Access Journals (Sweden)

    Yan Ran

    2017-01-01

    Full Text Available Nowadays, although more and more companies focus on improving the quality of computer numerical control machine tools, its reliability control still remains as an unsolved problem. Since assembly reliability control is very important in product reliability assurance in China, a new key assembly processes extraction method based on the integration of quality function deployment; failure mode, effects, and criticality analysis; and fuzzy theory for computer numerical control machine tools is proposed. Firstly, assembly faults and assembly reliability control flow of computer numerical control machine tools are studied. Secondly, quality function deployment; failure mode, effects, and criticality analysis; and fuzzy theory are integrated to build a scientific extraction model, by which the key assembly processes meeting both customer functional demands and failure data distribution can be extracted, also an example is given to illustrate the correctness and effectiveness of the method. Finally, the assembly reliability monitoring system is established based on key assembly processes to realize and simplify this method.

  5. Numerical computations with GPUs

    CERN Document Server

    Kindratenko, Volodymyr

    2014-01-01

    This book brings together research on numerical methods adapted for Graphics Processing Units (GPUs). It explains recent efforts to adapt classic numerical methods, including solution of linear equations and FFT, for massively parallel GPU architectures. This volume consolidates recent research and adaptations, covering widely used methods that are at the core of many scientific and engineering computations. Each chapter is written by authors working on a specific group of methods; these leading experts provide mathematical background, parallel algorithms and implementation details leading to

  6. Computing the Alexander Polynomial Numerically

    DEFF Research Database (Denmark)

    Hansen, Mikael Sonne

    2006-01-01

    Explains how to construct the Alexander Matrix and how this can be used to compute the Alexander polynomial numerically.......Explains how to construct the Alexander Matrix and how this can be used to compute the Alexander polynomial numerically....

  7. Essential numerical computer methods

    CERN Document Server

    Johnson, Michael L

    2010-01-01

    The use of computers and computational methods has become ubiquitous in biological and biomedical research. During the last 2 decades most basic algorithms have not changed, but what has is the huge increase in computer speed and ease of use, along with the corresponding orders of magnitude decrease in cost. A general perception exists that the only applications of computers and computer methods in biological and biomedical research are either basic statistical analysis or the searching of DNA sequence data bases. While these are important applications they only scratch the surface

  8. Program Verification of Numerical Computation

    OpenAIRE

    Pantelis, Garry

    2014-01-01

    These notes outline a formal method for program verification of numerical computation. It forms the basis of the software package VPC in its initial phase of development. Much of the style of presentation is in the form of notes that outline the definitions and rules upon which VPC is based. The initial motivation of this project was to address some practical issues of computation, especially of numerically intensive programs that are commonplace in computer models. The project evolved into a...

  9. Numerical Analysis of Multiscale Computations

    CERN Document Server

    Engquist, Björn; Tsai, Yen-Hsi R

    2012-01-01

    This book is a snapshot of current research in multiscale modeling, computations and applications. It covers fundamental mathematical theory, numerical algorithms as well as practical computational advice for analysing single and multiphysics models containing a variety of scales in time and space. Complex fluids, porous media flow and oscillatory dynamical systems are treated in some extra depth, as well as tools like analytical and numerical homogenization, and fast multipole method.

  10. Multiaxis Computer Numerical Control Internship Report

    Science.gov (United States)

    Rouse, Sharon M.

    2012-01-01

    (Purpose) The purpose of this paper was to examine the issues associated with bringing new technology into the classroom, in particular, the vocational/technical classroom. (Methodology) A new Haas 5 axis vertical Computer Numerical Control machining center was purchased to update the CNC machining curriculum at a community college and the process…

  11. Cloud Computing Technologies

    Directory of Open Access Journals (Sweden)

    Sean Carlin

    2012-06-01

    Full Text Available This paper outlines the key characteristics that cloud computing technologies possess and illustrates the cloud computing stack containing the three essential services (SaaS, PaaS and IaaS that have come to define the technology and its delivery model. The underlying virtualization technologies that make cloud computing possible are also identified and explained. The various challenges that face cloud computing technologies today are investigated and discussed. The future of cloud computing technologies along with its various applications and trends are also explored, giving a brief outlook of where and how the technology will progress into the future.

  12. Numerical and symbolic scientific computing

    CERN Document Server

    Langer, Ulrich

    2011-01-01

    The book presents the state of the art and results and also includes articles pointing to future developments. Most of the articles center around the theme of linear partial differential equations. Major aspects are fast solvers in elastoplasticity, symbolic analysis for boundary problems, symbolic treatment of operators, computer algebra, and finite element methods, a symbolic approach to finite difference schemes, cylindrical algebraic decomposition and local Fourier analysis, and white noise analysis for stochastic partial differential equations. Further numerical-symbolic topics range from

  13. Computational color technology

    CERN Document Server

    Kang, Henry R

    2006-01-01

    Henry Kang provides the fundamental color principles and mathematical tools to prepare the reader for a new era of color reproduction, and for subsequent applications in multispectral imaging, medical imaging, remote sensing, and machine vision. This book is intended to bridge the gap between color science and computational color technology, putting color adaptation, color constancy, color transforms, color display, and color rendition in the domain of vector-matrix representations and theories. Computational Color Technology deals with color digital images on the spectral level using vector-m

  14. Computer architecture technology trends

    CERN Document Server

    1991-01-01

    Please note this is a Short Discount publication. This year's edition of Computer Architecture Technology Trends analyses the trends which are taking place in the architecture of computing systems today. Due to the sheer number of different applications to which computers are being applied, there seems no end to the different adoptions which proliferate. There are, however, some underlying trends which appear. Decision makers should be aware of these trends when specifying architectures, particularly for future applications. This report is fully revised and updated and provides insight in

  15. International Symposium on Scientific Computing, Computer Arithmetic and Validated Numerics

    CERN Document Server

    DEVELOPMENTS IN RELIABLE COMPUTING

    1999-01-01

    The SCAN conference, the International Symposium on Scientific Com­ puting, Computer Arithmetic and Validated Numerics, takes place bian­ nually under the joint auspices of GAMM (Gesellschaft fiir Angewandte Mathematik und Mechanik) and IMACS (International Association for Mathematics and Computers in Simulation). SCAN-98 attracted more than 100 participants from 21 countries all over the world. During the four days from September 22 to 25, nine highlighted, plenary lectures and over 70 contributed talks were given. These figures indicate a large participation, which was partly caused by the attraction of the organizing country, Hungary, but also the effec­ tive support system have contributed to the success. The conference was substantially supported by the Hungarian Research Fund OTKA, GAMM, the National Technology Development Board OMFB and by the J6zsef Attila University. Due to this funding, it was possible to subsidize the participation of over 20 scientists, mainly from Eastern European countries. I...

  16. Numerical optimization with computational errors

    CERN Document Server

    Zaslavski, Alexander J

    2016-01-01

    This book studies the approximate solutions of optimization problems in the presence of computational errors. A number of results are presented on the convergence behavior of algorithms in a Hilbert space; these algorithms are examined taking into account computational errors. The author illustrates that algorithms generate a good approximate solution, if computational errors are bounded from above by a small positive constant. Known computational errors are examined with the aim of determining an approximate solution. Researchers and students interested in the optimization theory and its applications will find this book instructive and informative. This monograph contains 16 chapters; including a chapters devoted to the subgradient projection algorithm, the mirror descent algorithm, gradient projection algorithm, the Weiszfelds method, constrained convex minimization problems, the convergence of a proximal point method in a Hilbert space, the continuous subgradient method, penalty methods and Newton’s meth...

  17. A History of Computer Numerical Control.

    Science.gov (United States)

    Haggen, Gilbert L.

    Computer numerical control (CNC) has evolved from the first significant counting method--the abacus. Babbage had perhaps the greatest impact on the development of modern day computers with his analytical engine. Hollerith's functioning machine with punched cards was used in tabulating the 1890 U.S. Census. In order for computers to become a…

  18. Fluid dynamics theory, computation, and numerical simulation

    CERN Document Server

    Pozrikidis, C

    2001-01-01

    Fluid Dynamics Theory, Computation, and Numerical Simulation is the only available book that extends the classical field of fluid dynamics into the realm of scientific computing in a way that is both comprehensive and accessible to the beginner The theory of fluid dynamics, and the implementation of solution procedures into numerical algorithms, are discussed hand-in-hand and with reference to computer programming This book is an accessible introduction to theoretical and computational fluid dynamics (CFD), written from a modern perspective that unifies theory and numerical practice There are several additions and subject expansions in the Second Edition of Fluid Dynamics, including new Matlab and FORTRAN codes Two distinguishing features of the discourse are solution procedures and algorithms are developed immediately after problem formulations are presented, and numerical methods are introduced on a need-to-know basis and in increasing order of difficulty Matlab codes are presented and discussed for a broad...

  19. Fluid Dynamics Theory, Computation, and Numerical Simulation

    CERN Document Server

    Pozrikidis, Constantine

    2009-01-01

    Fluid Dynamics: Theory, Computation, and Numerical Simulation is the only available book that extends the classical field of fluid dynamics into the realm of scientific computing in a way that is both comprehensive and accessible to the beginner. The theory of fluid dynamics, and the implementation of solution procedures into numerical algorithms, are discussed hand-in-hand and with reference to computer programming. This book is an accessible introduction to theoretical and computational fluid dynamics (CFD), written from a modern perspective that unifies theory and numerical practice. There are several additions and subject expansions in the Second Edition of Fluid Dynamics, including new Matlab and FORTRAN codes. Two distinguishing features of the discourse are: solution procedures and algorithms are developed immediately after problem formulations are presented, and numerical methods are introduced on a need-to-know basis and in increasing order of difficulty. Matlab codes are presented and discussed for ...

  20. Computer Science and Technology Board

    Energy Technology Data Exchange (ETDEWEB)

    Blumenthal, M.S.

    1990-01-01

    The Computer Science and Technology Board (CSTB) meets three times a year to consider scientific and policy issues in computer science as well as relevant problems in associated technologies. The objectives of the Board include: initiating studies involving computer science and technology as a critical national resource; responding to requests from the government, nonprofit foundations, and industry for advice on computer science and technology; promoting the health of the technology and other fields of pure and applied science and technology; and providing a base of expertise within the NRC in the area of computer science and technology.

  1. CLOUD COMPUTING TECHNOLOGY TRENDS

    Directory of Open Access Journals (Sweden)

    Cristian IVANUS

    2014-05-01

    Full Text Available Cloud computing has been a tremendous innovation, through which applications became available online, accessible through an Internet connection and using any computing device (computer, smartphone or tablet. According to one of the most recent studies conducted in 2012 by Everest Group and Cloud Connect, 57% of companies said they already use SaaS application (Software as a Service, and 38% reported using standard tools PaaS (Platform as a Service. However, in the most cases, the users of these solutions highlighted the fact that one of the main obstacles in the development of this technology is the fact that, in cloud, the application is not available without an Internet connection. The new challenge of the cloud system has become now the offline, specifically accessing SaaS applications without being connected to the Internet. This topic is directly related to user productivity within companies as productivity growth is one of the key promises of cloud computing system applications transformation. The aim of this paper is the presentation of some important aspects related to the offline cloud system and regulatory trends in the European Union (EU.

  2. Probabilistic numerics and uncertainty in computations.

    Science.gov (United States)

    Hennig, Philipp; Osborne, Michael A; Girolami, Mark

    2015-07-08

    We deliver a call to arms for probabilistic numerical methods: algorithms for numerical tasks, including linear algebra, integration, optimization and solving differential equations, that return uncertainties in their calculations. Such uncertainties, arising from the loss of precision induced by numerical calculation with limited time or hardware, are important for much contemporary science and industry. Within applications such as climate science and astrophysics, the need to make decisions on the basis of computations with large and complex data have led to a renewed focus on the management of numerical uncertainty. We describe how several seminal classic numerical methods can be interpreted naturally as probabilistic inference. We then show that the probabilistic view suggests new algorithms that can flexibly be adapted to suit application specifics, while delivering improved empirical performance. We provide concrete illustrations of the benefits of probabilistic numeric algorithms on real scientific problems from astrometry and astronomical imaging, while highlighting open problems with these new algorithms. Finally, we describe how probabilistic numerical methods provide a coherent framework for identifying the uncertainty in calculations performed with a combination of numerical algorithms (e.g. both numerical optimizers and differential equation solvers), potentially allowing the diagnosis (and control) of error sources in computations.

  3. Introduction to numerical computation in Pascal

    CERN Document Server

    Dew, P M

    1983-01-01

    Our intention in this book is to cover the core material in numerical analysis normally taught to students on degree courses in computer science. The main emphasis is placed on the use of analysis and programming techniques to produce well-designed, reliable mathematical software. The treatment should be of interest also to students of mathematics, science and engineering who wish to learn how to write good programs for mathematical computations. The reader is assumed to have some acquaintance with Pascal programming. Aspects of Pascal particularly relevant to numerical computation are revised and developed in the first chapter. Although Pascal has some drawbacks for serious numerical work (for example, only one precision for real numbers), the language has major compensating advantages: it is a widely used teaching language that will be familiar to many students and it encourages the writing of clear, well­ structured programs. By careful use of structure and documentation, we have produced codes that we be...

  4. Infinite possibilities: Computational structures technology

    Science.gov (United States)

    Beam, Sherilee F.

    1994-01-01

    Computational Fluid Dynamics (or CFD) methods are very familiar to the research community. Even the general public has had some exposure to CFD images, primarily through the news media. However, very little attention has been paid to CST--Computational Structures Technology. Yet, no important design can be completed without it. During the first half of this century, researchers only dreamed of designing and building structures on a computer. Today their dreams have become practical realities as computational methods are used in all phases of design, fabrication and testing of engineering systems. Increasingly complex structures can now be built in even shorter periods of time. Over the past four decades, computer technology has been developing, and early finite element methods have grown from small in-house programs to numerous commercial software programs. When coupled with advanced computing systems, they help engineers make dramatic leaps in designing and testing concepts. The goals of CST include: predicting how a structure will behave under actual operating conditions; designing and complementing other experiments conducted on a structure; investigating microstructural damage or chaotic, unpredictable behavior; helping material developers in improving material systems; and being a useful tool in design systems optimization and sensitivity techniques. Applying CST to a structure problem requires five steps: (1) observe the specific problem; (2) develop a computational model for numerical simulation; (3) develop and assemble software and hardware for running the codes; (4) post-process and interpret the results; and (5) use the model to analyze and design the actual structure. Researchers in both industry and academia continue to make significant contributions to advance this technology with improvements in software, collaborative computing environments and supercomputing systems. As these environments and systems evolve, computational structures technology will

  5. Infinite possibilities: Computational structures technology

    Science.gov (United States)

    Beam, Sherilee F.

    1994-12-01

    Computational Fluid Dynamics (or CFD) methods are very familiar to the research community. Even the general public has had some exposure to CFD images, primarily through the news media. However, very little attention has been paid to CST--Computational Structures Technology. Yet, no important design can be completed without it. During the first half of this century, researchers only dreamed of designing and building structures on a computer. Today their dreams have become practical realities as computational methods are used in all phases of design, fabrication and testing of engineering systems. Increasingly complex structures can now be built in even shorter periods of time. Over the past four decades, computer technology has been developing, and early finite element methods have grown from small in-house programs to numerous commercial software programs. When coupled with advanced computing systems, they help engineers make dramatic leaps in designing and testing concepts. The goals of CST include: predicting how a structure will behave under actual operating conditions; designing and complementing other experiments conducted on a structure; investigating microstructural damage or chaotic, unpredictable behavior; helping material developers in improving material systems; and being a useful tool in design systems optimization and sensitivity techniques. Applying CST to a structure problem requires five steps: (1) observe the specific problem; (2) develop a computational model for numerical simulation; (3) develop and assemble software and hardware for running the codes; (4) post-process and interpret the results; and (5) use the model to analyze and design the actual structure. Researchers in both industry and academia continue to make significant contributions to advance this technology with improvements in software, collaborative computing environments and supercomputing systems. As these environments and systems evolve, computational structures technology will

  6. Program Verification of Numerical Computation - Part 2

    OpenAIRE

    Pantelis, Garry

    2014-01-01

    These notes present some extensions of a formal method introduced in an earlier paper. The formal method is designed as a tool for program verification of numerical computation and forms the basis of the software package VPC. Included in the extensions that are presented here are disjunctions and methods for detecting non-computable programs. A more comprehensive list of the construction rules as higher order constructs is also presented.

  7. Computer science and technologies

    Energy Technology Data Exchange (ETDEWEB)

    Kitagawa, T.

    1988-01-01

    This volume aims to provide up-to-date information on recent research and development in computer science and technology in Japan. In view of the rapid developments in these fields and the urgent demand for more detailed information about Japanese activities and achievements, it has been decided to concentrate on only a few selected topics in each volume. The topics covered will change each year so as to obtain adequate coverage of a broad range of activities over a period of a few years. This edition should not only contribute to the international understanding of technical developments in Japan, but also shed light on the cultural background to these theoretical and practical developments.

  8. Smooth structures on Eschenburg spaces: numerical computations

    CERN Document Server

    Butler, Leo T

    2009-01-01

    This paper numerically computes the topological and smooth invariants of Eschenburg spaces with small fourth cohomology group, following Kruggel's determination of the Kreck-Stolz invariants of Eschenburg spaces that satisfy condition C. The GNU GMP arbitrary-precision library is utilised.

  9. Fluid dynamics theory, computation, and numerical simulation

    CERN Document Server

    Pozrikidis, C

    2017-01-01

    This book provides an accessible introduction to the basic theory of fluid mechanics and computational fluid dynamics (CFD) from a modern perspective that unifies theory and numerical computation. Methods of scientific computing are introduced alongside with theoretical analysis and MATLAB® codes are presented and discussed for a broad range of topics: from interfacial shapes in hydrostatics, to vortex dynamics, to viscous flow, to turbulent flow, to panel methods for flow past airfoils. The third edition includes new topics, additional examples, solved and unsolved problems, and revised images. It adds more computational algorithms and MATLAB programs. It also incorporates discussion of the latest version of the fluid dynamics software library FDLIB, which is freely available online. FDLIB offers an extensive range of computer codes that demonstrate the implementation of elementary and advanced algorithms and provide an invaluable resource for research, teaching, classroom instruction, and self-study. This ...

  10. Computer Viruses. Technology Update.

    Science.gov (United States)

    Ponder, Tim, Comp.; Ropog, Marty, Comp.; Keating, Joseph, Comp.

    This document provides general information on computer viruses, how to help protect a computer network from them, measures to take if a computer becomes infected. Highlights include the origins of computer viruses; virus contraction; a description of some common virus types (File Virus, Boot Sector/Partition Table Viruses, Trojan Horses, and…

  11. [Earth Science Technology Office's Computational Technologies Project

    Science.gov (United States)

    Fischer, James (Technical Monitor); Merkey, Phillip

    2005-01-01

    This grant supported the effort to characterize the problem domain of the Earth Science Technology Office's Computational Technologies Project, to engage the Beowulf Cluster Computing Community as well as the High Performance Computing Research Community so that we can predict the applicability of said technologies to the scientific community represented by the CT project and formulate long term strategies to provide the computational resources necessary to attain the anticipated scientific objectives of the CT project. Specifically, the goal of the evaluation effort is to use the information gathered over the course of the Round-3 investigations to quantify the trends in scientific expectations, the algorithmic requirements and capabilities of high-performance computers to satisfy this anticipated need.

  12. Adapting Inspection Data for Computer Numerical Control

    Science.gov (United States)

    Hutchison, E. E.

    1986-01-01

    Machining time for repetitive tasks reduced. Program converts measurements of stub post locations by coordinate-measuring machine into form used by numerical-control computer. Work time thus reduced by 10 to 15 minutes for each post. Since there are 600 such posts on each injector, time saved per injector is 100 to 150 hours. With modifications this approach applicable to machining of many precise holes on large machine frames and similar objects.

  13. Understanding computer and information technology

    Energy Technology Data Exchange (ETDEWEB)

    Choi, Yun Cheol; Han, Tack Don; Im, Sun Beom

    2009-01-15

    This book consists of four parts. The first part describes IT technology and information community understanding of computer system, constitution of software system and information system and application of software. The second part is about computer network, information and communication, application and internet service. The third part contains application and multi media, application of mobile computer, ubiquitous computing and ubiquitous environment and computer and digital life. The last part explains information security and ethics of information-oriented society, information industry and IT venture, digital contents technology and industry and the future and development of information-oriented society.

  14. Computer Technology and Nursing Education.

    Science.gov (United States)

    Southern Council on Collegiate Education for Nursing, Atlanta, GA.

    The influences of computer technology on college nursing education programs and health care delivery systems are discussed in eight papers. The use of computers is considered, with attention to clinical care, nursing education and continuing education, administration, and research. Attention is also directed to basic computer terminology, computer…

  15. Computers: Educational Technology Paradox?

    Science.gov (United States)

    Hashim, Hajah Rugayah Hj.; Mustapha, Wan Narita

    2005-01-01

    As we move further into the new millennium, the need to involve and adapt learners with new technology have been the main aim of many institutions of higher learning in Malaysia. The involvement of the government in huge technology-based projects like the Multimedia Super Corridor Highway (MSC) and one of its flagships, the Smart Schools have…

  16. Key technologies for the novel distributed numerical control integrated system

    Institute of Scientific and Technical Information of China (English)

    TAO Guibao; LlU Fei; WANG Shilong

    2004-01-01

    A novel distributed numerical control (DNC) integrated system based on plug-in software technology is proposed. It connects new or old numerical control (NC) machine tools which haveinhomogeneous numerical control systems with CAD/CAM system by CANbus network. A DNC computer is able to control 15 sets of NC machine tools reliably at the same time. The novel DNC system increases the efficiency of machine tools and improve the production management level by realizing non-paper production, agile manufacturing, networked manufacturing and so on in the near future. Key technologies to construct the novel DNC integrated system include the integration of inhomogeneous numerical control systems, NC program restart, and algorithm for communication competition. Such system has demonstrated successful applications in some corporations that have acquired good economic benefits and social effects.

  17. Forecasting methods for computer technology

    Energy Technology Data Exchange (ETDEWEB)

    Worlton, W.J.

    1978-01-01

    How well the computer site manager avoids future dangers and takes advantage of future opportunities depends to a considerable degree on how much anticipatory information he has available. People who rise in management are expected with each successive promotion to concern themselves with events further in the future. It is the function of technology projection to increase this stock of information about possible future developments in order to put planning and decision making on a more rational basis. Past efforts at computer technology projections have an accuracy that declines exponentially with time. Thus, precisely defined technology projections beyond about three years should be used with considerable caution. This paper reviews both subjective and objective methods of technology projection and gives examples of each. For an integrated view of future prospects in computer technology, a framework for technology projection is proposed.

  18. Forecasting methods for computer technology

    Energy Technology Data Exchange (ETDEWEB)

    Worlton, W.J.

    1978-01-01

    How well the computer site manager avoids future dangers and takes advantage of future opportunities depends to a considerable degree on how much anticipatory information he has available. People who rise in management are expected with each successive promotion to concern themselves with events further in the future. It is the function of technology projection to increase this stock of information about possible future developments in order to put planning and decision making on a more rational basis. Past efforts at computer technology projections have an accuracy that declines exponentially with time. Thus, precisely defined technology projections beyond about three years should be used with considerable caution. This paper reviews both subjective and objective methods of technology projection and gives examples of each. For an integrated view of future prospects in computer technology, a framework for technology projection is proposed.

  19. Numerical characteristics of quantum computer simulation

    Science.gov (United States)

    Chernyavskiy, A.; Khamitov, K.; Teplov, A.; Voevodin, V.; Voevodin, Vl.

    2016-12-01

    The simulation of quantum circuits is significantly important for the implementation of quantum information technologies. The main difficulty of such modeling is the exponential growth of dimensionality, thus the usage of modern high-performance parallel computations is relevant. As it is well known, arbitrary quantum computation in circuit model can be done by only single- and two-qubit gates, and we analyze the computational structure and properties of the simulation of such gates. We investigate the fact that the unique properties of quantum nature lead to the computational properties of the considered algorithms: the quantum parallelism make the simulation of quantum gates highly parallel, and on the other hand, quantum entanglement leads to the problem of computational locality during simulation. We use the methodology of the AlgoWiki project (algowiki-project.org) to analyze the algorithm. This methodology consists of theoretical (sequential and parallel complexity, macro structure, and visual informational graph) and experimental (locality and memory access, scalability and more specific dynamic characteristics) parts. Experimental part was made by using the petascale Lomonosov supercomputer (Moscow State University, Russia). We show that the simulation of quantum gates is a good base for the research and testing of the development methods for data intense parallel software, and considered methodology of the analysis can be successfully used for the improvement of the algorithms in quantum information science.

  20. Computer Technology for Industry

    Science.gov (United States)

    1982-01-01

    Shell Oil Company used a COSMIC program, called VISCEL to insure the accuracy of the company's new computer code for analyzing polymers, and chemical compounds. Shell reported that there were no other programs available that could provide the necessary calculations. Shell produces chemicals for plastic products used in the manufacture of automobiles, housewares, appliances, film, textiles, electronic equipment and furniture.

  1. Ubiquitous Computing Technologies in Education

    Science.gov (United States)

    Hwang, Gwo-Jen; Wu, Ting-Ting; Chen, Yen-Jung

    2007-01-01

    The prosperous development of wireless communication and sensor technologies has attracted the attention of researchers from both computer and education fields. Various investigations have been made for applying the new technologies to education purposes, such that more active and adaptive learning activities can be conducted in the real world.…

  2. Numerical computations of explosions in gases

    Science.gov (United States)

    Chushkin, P. I.; Shurshalov, L. V.

    The development and the present-day state of the problem on numerical computations of explosions in gases are reviewed. In the first part, different one-dimensional cases are discussed: point explosion with counterpressure, blast-like expansion of volumes filled with a compressed hot gas, blast of charges of condensed explosive, explosion processes in real high-temperature air, in combustible detonating media and under action of other physical-chemical factors. In the second part devoted to two-dimensional flows, we consider explosion in the non-homogeneous atmosphere, blast of asymmetric charges, detonation in gas, explosion modelling of some cosmic phenomena (solar flares, the Tunguska meteorite). The survey includes about 110 works beginning with the first publications on the subject.

  3. Trusted Computing Technologies, Intel Trusted Execution Technology.

    Energy Technology Data Exchange (ETDEWEB)

    Guise, Max Joseph; Wendt, Jeremy Daniel

    2011-01-01

    We describe the current state-of-the-art in Trusted Computing Technologies - focusing mainly on Intel's Trusted Execution Technology (TXT). This document is based on existing documentation and tests of two existing TXT-based systems: Intel's Trusted Boot and Invisible Things Lab's Qubes OS. We describe what features are lacking in current implementations, describe what a mature system could provide, and present a list of developments to watch. Critical systems perform operation-critical computations on high importance data. In such systems, the inputs, computation steps, and outputs may be highly sensitive. Sensitive components must be protected from both unauthorized release, and unauthorized alteration: Unauthorized users should not access the sensitive input and sensitive output data, nor be able to alter them; the computation contains intermediate data with the same requirements, and executes algorithms that the unauthorized should not be able to know or alter. Due to various system requirements, such critical systems are frequently built from commercial hardware, employ commercial software, and require network access. These hardware, software, and network system components increase the risk that sensitive input data, computation, and output data may be compromised.

  4. Information technology and computational physics

    CERN Document Server

    Kóczy, László; Mesiar, Radko; Kacprzyk, Janusz

    2017-01-01

    A broad spectrum of modern Information Technology (IT) tools, techniques, main developments and still open challenges is presented. Emphasis is on new research directions in various fields of science and technology that are related to data analysis, data mining, knowledge discovery, information retrieval, clustering and classification, decision making and decision support, control, computational mathematics and physics, to name a few. Applications in many relevant fields are presented, notably in telecommunication, social networks, recommender systems, fault detection, robotics, image analysis and recognition, electronics, etc. The methods used by the authors range from high level formal mathematical tools and techniques, through algorithmic and computational tools, to modern metaheuristics.

  5. NINJA: Java for High Performance Numerical Computing

    Directory of Open Access Journals (Sweden)

    José E. Moreira

    2002-01-01

    Full Text Available When Java was first introduced, there was a perception that its many benefits came at a significant performance cost. In the particularly performance-sensitive field of numerical computing, initial measurements indicated a hundred-fold performance disadvantage between Java and more established languages such as Fortran and C. Although much progress has been made, and Java now can be competitive with C/C++ in many important situations, significant performance challenges remain. Existing Java virtual machines are not yet capable of performing the advanced loop transformations and automatic parallelization that are now common in state-of-the-art Fortran compilers. Java also has difficulties in implementing complex arithmetic efficiently. These performance deficiencies can be attacked with a combination of class libraries (packages, in Java that implement truly multidimensional arrays and complex numbers, and new compiler techniques that exploit the properties of these class libraries to enable other, more conventional, optimizations. Two compiler techniques, versioning and semantic expansion, can be leveraged to allow fully automatic optimization and parallelization of Java code. Our measurements with the NINJA prototype Java environment show that Java can be competitive in performance with highly optimized and tuned Fortran code.

  6. Computer technology and computer programming research and strategies

    CERN Document Server

    Antonakos, James L

    2011-01-01

    Covering a broad range of new topics in computer technology and programming, this volume discusses encryption techniques, SQL generation, Web 2.0 technologies, and visual sensor networks. It also examines reconfigurable computing, video streaming, animation techniques, and more. Readers will learn about an educational tool and game to help students learn computer programming. The book also explores a new medical technology paradigm centered on wireless technology and cloud computing designed to overcome the problems of increasing health technology costs.

  7. Cooling Technology for Electronic Computers

    Science.gov (United States)

    Nakayama, Wataru

    The rapid growth of data processing speed in computers has been sustained by the advances in cooling technology. This article first presents a review of the published data of heat loads in recent Japanese large-scale computers. The survey indicates that, since around 1980, the high-level integration of microelectronic circuits has brought about almost four fold increase in the power dissipation from logic chips. The integration also has invited the evolutions of multichip modules and new schemes of electronic interconnections. Forced convection air-cooling and liquid cooling coupled with thermal connectors are discussed with reference to the designs employed in actual computers. More advanced cooling schemes are also discussed. Finally, the importance of thermal environmental control of computer rooms is emphasized.

  8. Graphic interface for numerical commands on the USB port of PC compatible computers

    Directory of Open Access Journals (Sweden)

    Popa Elena

    2017-01-01

    Full Text Available Computers are increasingly used in the present technological processes. Several numerical input/ output electronic modules were designed and made to support computer automated technological process in the wood industry. This paper presents the software for these modules, built in the Delphi language and aimed to obtain numerical commands by using the USB port of a computer. As modern computers are no longer provided with parallel ports, a K8055 USB Experiment Interface Board manufactured by VELLEMAN was used. The board includes a PIC16C745-IP microcontroller, which enables communication via specific software.

  9. The NUMLAB numerical laboratory for computation and visualisation

    NARCIS (Netherlands)

    Maubach, J.; Telea, A.

    2005-01-01

    A large range of software environments addresses numerical simulation, interactive visualisation and computational steering. Most such environments are designed to cover a limited application domain, such as finite element or finite difference packages, symbolic or linear algebra computations or ima

  10. Terascale Computing in Accelerator Science and Technology

    Energy Technology Data Exchange (ETDEWEB)

    Ko, Kwok

    2002-08-21

    We have entered the age of ''terascale'' scientific computing. Processors and system architecture both continue to evolve; hundred-teraFLOP computers are expected in the next few years, and petaFLOP computers toward the end of this decade are conceivable. This ever-increasing power to solve previously intractable numerical problems benefits almost every field of science and engineering and is revolutionizing some of them, notably including accelerator physics and technology. At existing accelerators, it will help us optimize performance, expand operational parameter envelopes, and increase reliability. Design decisions for next-generation machines will be informed by unprecedented comprehensive and accurate modeling, as well as computer-aided engineering; all this will increase the likelihood that even their most advanced subsystems can be commissioned on time, within budget, and up to specifications. Advanced computing is also vital to developing new means of acceleration and exploring the behavior of beams under extreme conditions. With continued progress it will someday become reasonable to speak of a complete numerical model of all phenomena important to a particular accelerator.

  11. Research in applied mathematics, numerical analysis, and computer science

    Science.gov (United States)

    1984-01-01

    Research conducted at the Institute for Computer Applications in Science and Engineering (ICASE) in applied mathematics, numerical analysis, and computer science is summarized and abstracts of published reports are presented. The major categories of the ICASE research program are: (1) numerical methods, with particular emphasis on the development and analysis of basic numerical algorithms; (2) control and parameter identification; (3) computational problems in engineering and the physical sciences, particularly fluid dynamics, acoustics, and structural analysis; and (4) computer systems and software, especially vector and parallel computers.

  12. Higher order numerical differentiation on the Infinity Computer

    CERN Document Server

    Sergeyev, Yaroslav D

    2012-01-01

    There exist many applications where it is necessary to approximate numerically derivatives of a function which is given by a computer procedure. In particular, all the fields of optimization have a special interest in such a kind of information. In this paper, a new way to do this is presented for a new kind of a computer -- the Infinity Computer -- able to work numerically with finite, infinite, and infinitesimal numbers. It is proved that the Infinity Computer is able to calculate values of derivatives of a higher order for a wide class of functions represented by computer procedures. It is shown that the ability to compute derivatives of arbitrary order automatically and accurate to working precision is an intrinsic property of the Infinity Computer related to its way of functioning. Numerical examples illustrating the new concepts and numerical tools are given.

  13. Topics in numerical partial differential equations and scientific computing

    CERN Document Server

    2016-01-01

    Numerical partial differential equations (PDEs) are an important part of numerical simulation, the third component of the modern methodology for science and engineering, besides the traditional theory and experiment. This volume contains papers that originated with the collaborative research of the teams that participated in the IMA Workshop for Women in Applied Mathematics: Numerical Partial Differential Equations and Scientific Computing in August 2014.

  14. Introduction to numerical analysis and scientific computing

    CERN Document Server

    Nassif, Nabil

    2013-01-01

    Computer Number Systems and Floating Point Arithmetic Introduction Conversion from Base 10 to Base 2Conversion from Base 2 to Base 10Normalized Floating Point SystemsFloating Point OperationsComputing in a Floating Point SystemFinding Roots of Real Single-Valued Functions Introduction How to Locate the Roots of a Function The Bisection Method Newton's Method The Secant MethodSolving Systems of Linear Equations by Gaussian Elimination Mathematical Preliminaries Computer Storage for Matrices. Data Structures Back Substitution for Upper Triangular Systems Gauss Reduction LU DecompositionPolynomia

  15. Military engine computational structures technology

    Science.gov (United States)

    Thomson, Daniel E.

    1992-01-01

    Integrated High Performance Turbine Engine Technology Initiative (IHPTET) goals require a strong analytical base. Effective analysis of composite materials is critical to life analysis and structural optimization. Accurate life prediction for all material systems is critical. User friendly systems are also desirable. Post processing of results is very important. The IHPTET goal is to double turbine engine propulsion capability by the year 2003. Fifty percent of the goal will come from advanced materials and structures, the other 50 percent will come from increasing performance. Computer programs are listed.

  16. Numerical computation of homogeneous slope stability.

    Science.gov (United States)

    Xiao, Shuangshuang; Li, Kemin; Ding, Xiaohua; Liu, Tong

    2015-01-01

    To simplify the computational process of homogeneous slope stability, improve computational accuracy, and find multiple potential slip surfaces of a complex geometric slope, this study utilized the limit equilibrium method to derive expression equations of overall and partial factors of safety. This study transformed the solution of the minimum factor of safety (FOS) to solving of a constrained nonlinear programming problem and applied an exhaustive method (EM) and particle swarm optimization algorithm (PSO) to this problem. In simple slope examples, the computational results using an EM and PSO were close to those obtained using other methods. Compared to the EM, the PSO had a small computation error and a significantly shorter computation time. As a result, the PSO could precisely calculate the slope FOS with high efficiency. The example of the multistage slope analysis indicated that this slope had two potential slip surfaces. The factors of safety were 1.1182 and 1.1560, respectively. The differences between these and the minimum FOS (1.0759) were small, but the positions of the slip surfaces were completely different than the critical slip surface (CSS).

  17. Numerical Computation of Homogeneous Slope Stability

    Directory of Open Access Journals (Sweden)

    Shuangshuang Xiao

    2015-01-01

    Full Text Available To simplify the computational process of homogeneous slope stability, improve computational accuracy, and find multiple potential slip surfaces of a complex geometric slope, this study utilized the limit equilibrium method to derive expression equations of overall and partial factors of safety. This study transformed the solution of the minimum factor of safety (FOS to solving of a constrained nonlinear programming problem and applied an exhaustive method (EM and particle swarm optimization algorithm (PSO to this problem. In simple slope examples, the computational results using an EM and PSO were close to those obtained using other methods. Compared to the EM, the PSO had a small computation error and a significantly shorter computation time. As a result, the PSO could precisely calculate the slope FOS with high efficiency. The example of the multistage slope analysis indicated that this slope had two potential slip surfaces. The factors of safety were 1.1182 and 1.1560, respectively. The differences between these and the minimum FOS (1.0759 were small, but the positions of the slip surfaces were completely different than the critical slip surface (CSS.

  18. Numerical computations and mathematical modelling with infinite and infinitesimal numbers

    OpenAIRE

    Sergeyev, Yaroslav D.

    2012-01-01

    Traditional computers work with finite numbers. Situations where the usage of infinite or infinitesimal quantities is required are studied mainly theoretically. In this paper, a recently introduced computational methodology (that is not related to the non-standard analysis) is used to work with finite, infinite, and infinitesimal numbers \\textit{numerically}. This can be done on a new kind of a computer - the Infinity Computer - able to work with all these types of numbers. The new computatio...

  19. Computing Numerical Singular Points of Plane Algebraic Curves

    Institute of Scientific and Technical Information of China (English)

    LUO ZHONG-XUAN; FENG ER-BAO; HU WEN-YU

    2012-01-01

    Given an irreducible plane algebraic curve of degree d ≥ 3,we compute its numerical singular points,determine their multiplicities,and count the number of distinct tangents at each to decide whether the singular points are ordinary.The numerical procedures rely on computing numerical solutions of polynomial systems by homotopy continuation method and a reliable method that calculates multiple roots of the univariate polynomials accurately using standard machine precision.It is completely different from the traditional symbolic computation and provides singular points and their related properties of some plane algebraic curves that the symbolic software Maple cannot work out.Without using multiprecision arithmetic,extensive numerical experiments show that our numerical procedures are accurate,efficient and robust,even if the coefficients of plane algebraic curves are inexact.

  20. Numerical computation for teaching quantum statistics

    Science.gov (United States)

    Price, Tyson; Swendsen, Robert H.

    2013-11-01

    The study of ideal quantum gases reveals surprising quantum effects that can be observed in macroscopic systems. The properties of bosons are particularly unusual because a macroscopic number of particles can occupy a single quantum state. We describe a computational approach that supplements the usual analytic derivations applicable in the thermodynamic limit. The approach involves directly summing over the quantum states for finite systems and avoids the need for doing difficult integrals. The results display the unusual behavior of quantum gases even for relatively small systems.

  1. Windows and Fieldbus Based Software Computer Numerical Control System

    Institute of Scientific and Technical Information of China (English)

    WU Hongen; ZHANG Chengrui; LI Guili; WANG Baoren

    2006-01-01

    Computer numerical control (CNC) system is the base of modern digital and intelligent manufacturing technology. And opened its architecture and constituted based on PC and Windows operating system (OS) is the main trend of CNC system. However, even if the highest system priority is used in user mode, real-time capability of Windows (2000, NT, XP) for applications is not guaranteed. By using a device driver, which is running in kernel mode, the real time performance of Windows can be enhanced greatly. The acknowledgment performance of Windows to peripheral interrupts was evaluated. Harmonized with an intelligent real-time serial communication bus (RTSB), strict real-time performance can be achieved in Windows platform. An opened architecture software CNC system which is hardware independence is proposed based on PC and RTSB. A numerical control real time kernel (NCRTK), which is implemented as a device driver on Windows, is used to perform the NC tasks. Tasks are divided into real-time and non real-time. Real-time task is running in kernel mode and non real-time task is running in user mode. Data are exchanged between kernel and user mode by DMA and Windows Messages.

  2. Numerical computation of special functions with applications to physics

    CSIR Research Space (South Africa)

    Motsepe, K

    2008-09-01

    Full Text Available Students of mathematical physics, engineering, natural and biological sciences sometimes need to use special functions that are not found in ordinary mathematical software. In this paper a simple universal numerical algorithm is developed to compute...

  3. Computation and Visualisation in the NumLab Numerical Laboratory

    NARCIS (Netherlands)

    Maubach, J.M.L.; Telea, A.C.

    2002-01-01

    A large range of software environments addresses numerical simulation, interactive visualisation and computational steering. Most such environments are designed to cover a limited application domain, such as Finite Elements, Finite Differences, or image processing. Their software structure rarely

  4. Computation and Visualisation in the NumLab Numerical Laboratory

    NARCIS (Netherlands)

    Maubach, J.M.L.; Telea, A.C.

    2002-01-01

    A large range of software environments addresses numerical simulation, interactive visualisation and computational steering. Most such environments are designed to cover a limited application domain, such as Finite Elements, Finite Differences, or image processing. Their software structure rarely pr

  5. Numerical computations and mathematical modelling with infinite and infinitesimal numbers

    CERN Document Server

    Sergeyev, Yaroslav D

    2012-01-01

    Traditional computers work with finite numbers. Situations where the usage of infinite or infinitesimal quantities is required are studied mainly theoretically. In this paper, a recently introduced computational methodology (that is not related to the non-standard analysis) is used to work with finite, infinite, and infinitesimal numbers \\textit{numerically}. This can be done on a new kind of a computer - the Infinity Computer - able to work with all these types of numbers. The new computational tools both give possibilities to execute computations of a new type and open new horizons for creating new mathematical models where a computational usage of infinite and/or infinitesimal numbers can be useful. A number of numerical examples showing the potential of the new approach and dealing with divergent series, limits, probability theory, linear algebra, and calculation of volumes of objects consisting of parts of different dimensions are given.

  6. Numerical aspects for efficient welding computational mechanics

    Directory of Open Access Journals (Sweden)

    Aburuga Tarek Kh.S.

    2014-01-01

    Full Text Available The effect of the residual stresses and strains is one of the most important parameter in the structure integrity assessment. A finite element model is constructed in order to simulate the multi passes mismatched submerged arc welding SAW which used in the welded tensile test specimen. Sequentially coupled thermal mechanical analysis is done by using ABAQUS software for calculating the residual stresses and distortion due to welding. In this work, three main issues were studied in order to reduce the time consuming during welding simulation which is the major problem in the computational welding mechanics (CWM. The first issue is dimensionality of the problem. Both two- and three-dimensional models are constructed for the same analysis type, shell element for two dimension simulation shows good performance comparing with brick element. The conventional method to calculate residual stress is by using implicit scheme that because of the welding and cooling time is relatively high. In this work, the author shows that it could use the explicit scheme with the mass scaling technique, and time consuming during the analysis will be reduced very efficiently. By using this new technique, it will be possible to simulate relatively large three dimensional structures.

  7. Impact of new computing systems on computational mechanics and flight-vehicle structures technology

    Science.gov (United States)

    Noor, A. K.; Storaasli, O. O.; Fulton, R. E.

    1984-01-01

    Advances in computer technology which may have an impact on computational mechanics and flight vehicle structures technology were reviewed. The characteristics of supersystems, highly parallel systems, and small systems are summarized. The interrelations of numerical algorithms and software with parallel architectures are discussed. A scenario for future hardware/software environment and engineering analysis systems is presented. Research areas with potential for improving the effectiveness of analysis methods in the new environment are identified.

  8. Peer-to-Peer Secure Multi-Party Numerical Computation

    CERN Document Server

    Bickson, Danny; Dolev, Danny; Pinkas, Benny

    2008-01-01

    We propose an efficient framework for enabling secure multi-party numerical computations in a Peer-to-Peer network. This problem arises in a range of applications such as collaborative filtering, distributed computation of trust and reputation, monitoring and numerous other tasks, where the computing nodes would like to preserve the privacy of their inputs while performing a joint computation of a certain function. Although there is a rich literature in the field of distributed systems security concerning secure multi-party computation, in practice it is hard to deploy those methods in very large scale Peer-to-Peer networks. In this work, we examine several possible approaches and discuss their feasibility. Among the possible approaches, we identify a single approach which is both scalable and theoretically secure. An additional novel contribution is that we show how to compute the neighborhood based collaborative filtering, a state-of-the-art collaborative filtering algorithm, winner of the Netflix progress ...

  9. Numerical Computation of High Dimensional Solitons Via Drboux Transformation

    Institute of Scientific and Technical Information of China (English)

    ZixiangZHOU

    1997-01-01

    Darboux transformation gives explicit soliton solutions of nonlinear partial differential equations.Using numerical computation in each step of constructing Darboux transformation,one can get the graphs of the solitons practically,In n dimensions(n≥3),this method greatly increases the speed and deduces the memory usage of computation comparing to the software for algebraic computation.A technical problem concerning floating overflow is discussed.

  10. Computer vision research with new imaging technology

    Science.gov (United States)

    Hou, Guangqi; Liu, Fei; Sun, Zhenan

    2015-12-01

    Light field imaging is capable of capturing dense multi-view 2D images in one snapshot, which record both intensity values and directions of rays simultaneously. As an emerging 3D device, the light field camera has been widely used in digital refocusing, depth estimation, stereoscopic display, etc. Traditional multi-view stereo (MVS) methods only perform well on strongly texture surfaces, but the depth map contains numerous holes and large ambiguities on textureless or low-textured regions. In this paper, we exploit the light field imaging technology on 3D face modeling in computer vision. Based on a 3D morphable model, we estimate the pose parameters from facial feature points. Then the depth map is estimated through the epipolar plane images (EPIs) method. At last, the high quality 3D face model is exactly recovered via the fusing strategy. We evaluate the effectiveness and robustness on face images captured by a light field camera with different poses.

  11. Use of computer technology by the elderly

    OpenAIRE

    Akkan, Sultan

    1993-01-01

    The information technology that is available now has been developed for other populations, such as the general public, the business community, health care organizations, or the handicapped. However, much of it can be adapted to fit the needs, desires and capabilities of the elderly and computer technology can be much "friendlier" for the elderly in both a technological and a social sense. This study examines the elderly-computer technology interface. State-of -the-art co...

  12. The Application of Computer Technology in Art Design

    Directory of Open Access Journals (Sweden)

    Tao Xin

    2016-01-01

    Full Text Available After entering the twenty-first Century, computer technology has been greatly developed, applied in various fields gradually, and gained remarkable achievement. Computer technology not only is a project of great importance in China, but also cannot be ignored in the world. It has already attracted attention of numerous people, gradually integrated in daily life and closely related with it. Now how to apply it into more fields has been the main focus of our nation and also the topic we care about all the time. It is also an important project in our country to apply computer technology in art design in order to higher the art design quality. The purpose of this paper is to introduce people problems of the application of computer technology in art design, and find ways to promote cooperation and common development of them.

  13. Numerical methods design, analysis, and computer implementation of algorithms

    CERN Document Server

    Greenbaum, Anne

    2012-01-01

    Numerical Methods provides a clear and concise exploration of standard numerical analysis topics, as well as nontraditional ones, including mathematical modeling, Monte Carlo methods, Markov chains, and fractals. Filled with appealing examples that will motivate students, the textbook considers modern application areas, such as information retrieval and animation, and classical topics from physics and engineering. Exercises use MATLAB and promote understanding of computational results. The book gives instructors the flexibility to emphasize different aspects--design, analysis, or c

  14. Computer Technology-Infused Learning Enhancement

    Science.gov (United States)

    Keengwe, Jared; Anyanwu, Longy O.

    2007-01-01

    The purpose of the study was to determine students' perception of instructional integration of computer technology to improve learning. Two key questions were investigated in this study: (a) What is the students' perception of faculty integration of computer technology into classroom instruction? (b) To what extent does the students' perception of…

  15. College Students' Attitude towards Computer Technology

    Science.gov (United States)

    Njagi, K. O.; Havice, W. L.

    2011-01-01

    Recent advances in the contemporary world, especially in the area of computer technology, have heralded the development and implementation of new and innovative teaching strategies and particularly with the Internet revolution. This study assessed students' attitude towards computer technology. Specifically, the study assessed differences in…

  16. Theory-Guided Technology in Computer Science.

    Science.gov (United States)

    Ben-Ari, Mordechai

    2001-01-01

    Examines the history of major achievements in computer science as portrayed by winners of the prestigious Turing award and identifies a possibly unique activity called Theory-Guided Technology (TGT). Researchers develop TGT by using theoretical results to create practical technology. Discusses reasons why TGT is practical in computer science and…

  17. Advanced Hybrid Computer Systems. Software Technology.

    Science.gov (United States)

    This software technology final report evaluates advances made in Advanced Hybrid Computer System software technology . The report describes what...automatic patching software is available as well as which analog/hybrid programming languages would be most feasible for the Advanced Hybrid Computer...compiler software . The problem of how software would interface with the hybrid system is also presented.

  18. Theory-Guided Technology in Computer Science.

    Science.gov (United States)

    Ben-Ari, Mordechai

    2001-01-01

    Examines the history of major achievements in computer science as portrayed by winners of the prestigious Turing award and identifies a possibly unique activity called Theory-Guided Technology (TGT). Researchers develop TGT by using theoretical results to create practical technology. Discusses reasons why TGT is practical in computer science and…

  19. Numerical Methods for Stochastic Computations A Spectral Method Approach

    CERN Document Server

    Xiu, Dongbin

    2010-01-01

    The first graduate-level textbook to focus on fundamental aspects of numerical methods for stochastic computations, this book describes the class of numerical methods based on generalized polynomial chaos (gPC). These fast, efficient, and accurate methods are an extension of the classical spectral methods of high-dimensional random spaces. Designed to simulate complex systems subject to random inputs, these methods are widely used in many areas of computer science and engineering. The book introduces polynomial approximation theory and probability theory; describes the basic theory of gPC meth

  20. Numerical modeling in photonic crystals integrated technology: the COPERNICUS Project

    DEFF Research Database (Denmark)

    Malaguti, Stefania; Armaroli, Andrea; Bellanca, Gaetano

    2011-01-01

    Photonic crystals will play a fundamental role in the future of optical communications. The relevance of the numerical modeling for the success of this technology is assessed by using some examples concerning the experience of the COPERNICUS Project.......Photonic crystals will play a fundamental role in the future of optical communications. The relevance of the numerical modeling for the success of this technology is assessed by using some examples concerning the experience of the COPERNICUS Project....

  1. Numerical modeling in photonic crystals integrated technology: the COPERNICUS Project

    DEFF Research Database (Denmark)

    Malaguti, Stefania; Armaroli, Andrea; Bellanca, Gaetano

    2011-01-01

    Photonic crystals will play a fundamental role in the future of optical communications. The relevance of the numerical modeling for the success of this technology is assessed by using some examples concerning the experience of the COPERNICUS Project.......Photonic crystals will play a fundamental role in the future of optical communications. The relevance of the numerical modeling for the success of this technology is assessed by using some examples concerning the experience of the COPERNICUS Project....

  2. A Technology Assessment of Personal Computers. Vol. II: Personal Computer Technology, Users, and Uses.

    Science.gov (United States)

    Nilles, Jack M.

    This volume reports on the initial phase of a technology assessment of personal computers. First, technological developments that will influence the rate of diffusion of personal computer technology among the general populace are examined. Then the probable market for personal computers is estimated and analyzed on a functional basis, segregating…

  3. A textbook of computer based numerical and statistical techniques

    CERN Document Server

    Jaiswal, AK

    2009-01-01

    About the Book: Application of Numerical Analysis has become an integral part of the life of all the modern engineers and scientists. The contents of this book covers both the introductory topics and the more advanced topics such as partial differential equations. This book is different from many other books in a number of ways. Salient Features: Mathematical derivation of each method is given to build the students understanding of numerical analysis. A variety of solved examples are given. Computer programs for almost all numerical methods discussed have been presented in `C` langu

  4. Future Computing Technology (2/3)

    CERN Document Server

    CERN. Geneva

    2015-01-01

    Computing of the future will be affected by a number of fundamental technologies in development today, many of which are already on the way to becoming commercialized. In this series of lectures, we will discuss hardware and software development that will become mainstream in the timeframe of a few years and how they will shape or change the computing landscape - commercial and personal alike. Topics range from processor and memory aspects, programming models and the limits of artificial intelligence, up to end-user interaction with wearables or e-textiles. We discuss the impact of these technologies on the art of programming, the data centres of the future and daily life. On the second day of the Future Computing Technology series, we will talk about ubiquitous computing. From smart watches through mobile devices to virtual reality, computing devices surround us, and innovative new technologies are introduces every day. We will briefly explore how this propagation might continue, how computers can take ove...

  5. MUSICAL-COMPUTER TECHNOLOGY: THE LABORATORY

    OpenAIRE

    Gorbunova Irina B.

    2012-01-01

    The article deals with musically-computer technology in the educational system on example of the Educational and Methodical Laboratory Music & Computer Technologies at the Herzen State Pedagogical University of Russia, St. Petersburg. Interdisciplinary field of professional activities relates to the creation and application of specialized music software and hardware tools and the knowledges in music and informatics. A realization of the concept of musical-computer education in preparing music...

  6. Computer-Aided Numerical Inversion of Laplace Transform

    OpenAIRE

    Umesh Kumar

    2000-01-01

    This paper explores the technique for the computer aided numerical inversion of Laplace transform. The inversion technique is based on the properties of a family of three parameter exponential probability density functions. The only limitation in the technique is the word length of the computer being used. The Laplace transform has been used extensively in the frequency domain solution of linear, lumped time invariant networks but its application to the time domain has been limited, mainly be...

  7. SLJ Special Section: Computer Technology and Libraries.

    Science.gov (United States)

    School Library Journal, 1984

    1984-01-01

    This 5-article section provides an annotated bibliography of 39 books about computer technology; describes peripheral equipment essential for building computer systems; suggests an approach to software evaluation and selection; describes the implementation of a computer program for elementary/secondary students and teachers; and reviews 34…

  8. Computer-Numerical-Control and the EMCO Compact 5 Lathe.

    Science.gov (United States)

    Mullen, Frank M.

    This laboratory manual is intended for use in teaching computer-numerical-control (CNC) programming using the Emco Maier Compact 5 Lathe. Developed for use at the postsecondary level, this material contains a short introduction to CNC machine tools. This section covers CNC programs, CNC machine axes, and CNC coordinate systems. The following…

  9. Numerical computation of a nonlocal double obstacle problem

    NARCIS (Netherlands)

    Bhowmik, S.K.

    2009-01-01

    We consider a nonlocal double obstacle problem. This type of problems comes in various biological and physical situations, e.g., in phase transition models. We focus on numerical approximations and fast computation of such a model. We start with considering piece-wise basis functions for spatial app

  10. Introduction to Numerical Computation - analysis and Matlab illustrations

    DEFF Research Database (Denmark)

    Elden, Lars; Wittmeyer-Koch, Linde; Nielsen, Hans Bruun

    In a modern programming environment like eg MATLAB it is possible by simple commands to perform advanced calculations on a personal computer. In order to use such a powerful tool efiiciently it is necessary to have an overview of available numerical methods and algorithms and to know about...... are illustrated by examples in MATLAB....

  11. Art Therapists and Computer Technology

    Science.gov (United States)

    Peterson, Brent C.; Stovall, Kay; Elkins, David E.; Parker-Bell, Barbara

    2005-01-01

    The purpose of this study was to understand the impact of technology on art therapists by exploring how art therapists own and use technology and to determine barriers to ownership and use. A survey was conducted at the 2002 annual conference of the American Art Therapy Association in Washington, DC. Of the 250 surveys distributed, 195 were…

  12. Methodology of Numerical Computations with Infinities and Infinitesimals

    CERN Document Server

    Sergeyev, Yaroslav D

    2012-01-01

    A recently developed computational methodology for executing numerical calculations with infinities and infinitesimals is described in this paper. The developed approach has a pronounced applied character and is based on the principle `The part is less than the whole' introduced by Ancient Greeks. This principle is used with respect to all numbers (finite, infinite, and infinitesimal) and to all sets and processes (finite and infinite). The point of view on infinities and infinitesimals (and in general, on Mathematics) presented in this paper uses strongly physical ideas emphasizing interrelations holding between a mathematical object under the observation and tools used for this observation. It is shown how a new numeral system allowing one to express different infinite and infinitesimal quantities in a unique framework can be used for theoretical and computational purposes. Numerous examples dealing with infinite sets, divergent series, limits, and probability theory are given.

  13. Numerical methods for solving ODEs on the infinity computer

    Science.gov (United States)

    Mazzia, F.; Sergeyev, Ya. D.; Iavernaro, F.; Amodio, P.; Mukhametzhanov, M. S.

    2016-10-01

    New algorithms for the numerical solution of Ordinary Differential Equations (ODEs) with initial conditions are proposed. They are designed for working on a new kind of a supercomputer - the Infinity Computer - that is able to deal numerically with finite, infinite and infinitesimal numbers. Due to this fact, the Infinity Computer allows one to calculate the exact derivatives of functions using infinitesimal values of the stepsize. As a consequence, the new methods are able to work with the exact values of the derivatives, instead of their approximations. Within this context, variants of one-step multi-point methods closely related to the classical Taylor formulae and to the Obrechkoff methods are considered. To get numerical evidence of the theoretical results, test problems are solved by means of the new methods and the results compared with the performance of classical methods.

  14. Lighting Computer Programs in Lighting Technology

    OpenAIRE

    Ekren, Nazmi; Dursun, Bahtiyar; Ercan AYKUT

    2008-01-01

    It is well known that the computer in lighting technology is a vital component for lighting designers. Lighting computer programs are preferred in preparing architectural projects in lighting techniques, especially in lighting calculations. Lighting computer programs, which arise with the aim of helping lighting designers, gain more interest day by day. The most important property of lighting computer programs is the ability to enable the simulation of lighting projects without requiring any ...

  15. Grid computing for the numerical reconstruction of digital holograms

    Science.gov (United States)

    Nebrensky, J. J.; Hobson, P. R.; Fryer, P. C.

    2005-02-01

    Digital holography has the potential to greatly extend holography's applications and move it from the lab into the field: a single CCD or other solid-state sensor can capture any number of holograms while numerical reconstruction within a computer eliminates the need for chemical processing and readily allows further processing and visualization of the holographic image. The steady increase in sensor pixel count and resolution leads to the possibilities of larger sample volumes and of higher spatial resolution sampling, enabling the practical use of digital off-axis holography. However, this increase in pixel count also drives a corresponding expansion of the computational effort needed to numerically reconstruct such holograms to an extent where the reconstruction process for a single depth slice takes significantly longer than the capture process for each single hologram. Grid computing -- a recent innovation in large-scale distributed processing -- provides a convenient means of harnessing significant computing resources in ad-hoc fashion that might match the field deployment of a holographic instrument. In this paper we consider the computational needs of digital holography and discuss the deployment of numerical reconstruction software over an existing Grid testbed. The analysis of marine organisms is used as an exemplar for work flow and job execution of in-line digital holography.

  16. Numeric computation and statistical data analysis on the Java platform

    CERN Document Server

    Chekanov, Sergei V

    2016-01-01

    Numerical computation, knowledge discovery and statistical data analysis integrated with powerful 2D and 3D graphics for visualization are the key topics of this book. The Python code examples powered by the Java platform can easily be transformed to other programming languages, such as Java, Groovy, Ruby and BeanShell. This book equips the reader with a computational platform which, unlike other statistical programs, is not limited by a single programming language. The author focuses on practical programming aspects and covers a broad range of topics, from basic introduction to the Python language on the Java platform (Jython), to descriptive statistics, symbolic calculations, neural networks, non-linear regression analysis and many other data-mining topics. He discusses how to find regularities in real-world data, how to classify data, and how to process data for knowledge discoveries. The code snippets are so short that they easily fit into single pages. Numeric Computation and Statistical Data Analysis ...

  17. Computing, Information and Communications Technology (CICT) Website

    Science.gov (United States)

    Hardman, John; Tu, Eugene (Technical Monitor)

    2002-01-01

    The Computing, Information and Communications Technology Program (CICT) was established in 2001 to ensure NASA's Continuing leadership in emerging technologies. It is a coordinated, Agency-wide effort to develop and deploy key enabling technologies for a broad range of mission-critical tasks. The NASA CICT program is designed to address Agency-specific computing, information, and communications technology requirements beyond the projected capabilities of commercially available solutions. The areas of technical focus have been chosen for their impact on NASA's missions, their national importance, and the technical challenge they provide to the Program. In order to meet its objectives, the CICT Program is organized into the following four technology focused projects: 1) Computing, Networking and Information Systems (CNIS); 2) Intelligent Systems (IS); 3) Space Communications (SC); 4) Information Technology Strategic Research (ITSR).

  18. (CICT) Computing, Information, and Communications Technology Overview

    Science.gov (United States)

    VanDalsem, William R.

    2003-01-01

    The goal of the Computing, Information, and Communications Technology (CICT) program is to enable NASA's Scientific Research, Space Exploration, and Aerospace Technology Missions with greater mission assurance, for less cost, with increased science return through the development and use of advanced computing, information and communications technologies. This viewgraph presentation includes diagrams of how the political guidance behind CICT is structured. The presentation profiles each part of the NASA Mission in detail, and relates the Mission to the activities of CICT. CICT's Integrated Capability Goal is illustrated, and hypothetical missions which could be enabled by CICT are profiled. CICT technology development is profiled.

  19. Numerical computation of gravitational field for general axisymmetric objects

    Science.gov (United States)

    Fukushima, Toshio

    2016-10-01

    We developed a numerical method to compute the gravitational field of a general axisymmetric object. The method (i) numerically evaluates a double integral of the ring potential by the split quadrature method using the double exponential rules, and (ii) derives the acceleration vector by numerically differentiating the numerically integrated potential by Ridder's algorithm. Numerical comparison with the analytical solutions for a finite uniform spheroid and an infinitely extended object of the Miyamoto-Nagai density distribution confirmed the 13- and 11-digit accuracy of the potential and the acceleration vector computed by the method, respectively. By using the method, we present the gravitational potential contour map and/or the rotation curve of various axisymmetric objects: (i) finite uniform objects covering rhombic spindles and circular toroids, (ii) infinitely extended spheroids including Sérsic and Navarro-Frenk-White spheroids, and (iii) other axisymmetric objects such as an X/peanut-shaped object like NGC 128, a power-law disc with a central hole like the protoplanetary disc of TW Hya, and a tear-drop-shaped toroid like an axisymmetric equilibrium solution of plasma charge distribution in an International Thermonuclear Experimental Reactor-like tokamak. The method is directly applicable to the electrostatic field and will be easily extended for the magnetostatic field. The FORTRAN 90 programs of the new method and some test results are electronically available.

  20. Computer Programming Projects in Technology Courses.

    Science.gov (United States)

    Thomas, Charles R.

    1985-01-01

    Discusses programming projects in applied technology courses, examining documentation, formal reports, and implementation. Includes recommendations based on experience with a sophomore machine elements course which provided computers for problem solving exercises. (DH)

  1. Optical technologies for computational intelligence

    Science.gov (United States)

    Pavlov, Alexander V.

    2001-11-01

    Optics has a number of deep analogies with main principles of Computational Intelligence. We can see strong analogies between basic optical phenomena, used in Fourier-holography, and mathematical foundations of Fuzzy Set Theory. Also, analogies between optical holography technique and principles of Neural Networks Paradigm can be seen. Progress in new holographic recording media with self-developing property leads to Evolutionary Computations holographic realization. Based on these analogies we review holographic techniques from two points of view: Fuzzy Logic and Fuzzy relations.

  2. Introduction to Numerical Computation - analysis and Matlab illustrations

    DEFF Research Database (Denmark)

    Elden, Lars; Wittmeyer-Koch, Linde; Nielsen, Hans Bruun

    their properties. The book describes and analyses numerical methods for error analysis, differentiation, integration, interpolation and approximation, and the solution of nonlinear equations, linear systems of algebraic equations and systems of ordinary differential equations. Principles and algorithms......In a modern programming environment like eg MATLAB it is possible by simple commands to perform advanced calculations on a personal computer. In order to use such a powerful tool efiiciently it is necessary to have an overview of available numerical methods and algorithms and to know about...

  3. From computer-aided to intelligent machining:\\ud Recent advances in computer numerical control machining research

    OpenAIRE

    Gao, James; Lee, Chen-Han; Li, Yingguagan

    2015-01-01

    The aim of this paper is to provide an introduction and overview of recent advances in the key technologies and the supporting computerized systems, and to indicate the trend of research and development in the area of computational numerical control machining. Three main themes of recent research in CNC machining are simulation, optimization and automation, which form the key aspects of intelligent manufacturing in the digital and knowledge based manufacturing era. As the information and know...

  4. Computer Technology in Construction Project Management

    Institute of Scientific and Technical Information of China (English)

    Zhang Zhi

    2014-01-01

    Today, the network information has become a trend al of the industries have to face. For the construction project management, we must fuly master the use of computer information technology, mining its intrinsic value, so that it can promote the construction industry to meet the requirements of the times. This paper demonstrates the main application of computer technology in construction project management in a brief analysis.

  5. Integrating Numerical Computation into the Modeling Instruction Curriculum

    CERN Document Server

    Caballero, Marcos D; Aiken, John M; Douglas, Scott S; Scanlon, Erin M; Thoms, Brian; Schatz, Michael F

    2012-01-01

    We describe a way to introduce physics high school students with no background in programming to computational problem-solving experiences. Our approach builds on the great strides made by the Modeling Instruction reform curriculum. This approach emphasizes the practices of "Developing and using models" and "Computational thinking" highlighted by the NRC K-12 science standards framework. We taught 9th-grade students in a Modeling-Instruction-based physics course to construct computational models using the VPython programming environment. Numerical computation within the Modeling Instruction curriculum provides coherence among the curriculum's different force and motion models, links the various representations which the curriculum employs, and extends the curriculum to include real-world problems that are inaccessible to a purely analytic approach.

  6. Computer technology forecast study for general aviation

    Science.gov (United States)

    Seacord, C. L.; Vaughn, D.

    1976-01-01

    A multi-year, multi-faceted program is underway to investigate and develop potential improvements in airframes, engines, and avionics for general aviation aircraft. The objective of this study was to assemble information that will allow the government to assess the trends in computer and computer/operator interface technology that may have application to general aviation in the 1980's and beyond. The current state of the art of computer hardware is assessed, technical developments in computer hardware are predicted, and nonaviation large volume users of computer hardware are identified.

  7. Numerical Computation of Dynamical Schwingerlike Pair Production in Graphene

    Science.gov (United States)

    Fillion-Gourdeau, F.; Blain, P.; Gagnon, D.; Lefebvre, C.; Maclean, S.

    2017-03-01

    The density of electron-hole pairs produced in a graphene sample immersed in a homogeneous time-dependent electric field is evaluated. Because low energy charge carriers in graphene are described by relativistic quantum mechanics, the calculation is performed within the strong field quantum electrodynamics formalism, requiring a solution of the Dirac equation in momentum space. The equation is solved using a split-operator numerical scheme on parallel computers, allowing for the investigation of several field configurations. The strength of the method is illustrated by computing the electron momentum density generated from a realistic laser pulse model. We observe quantum interference patterns reminiscent of Landau-Zener-Stückelberg interferometry.

  8. Computer simulation technology in inertial confinement (ICF)

    Energy Technology Data Exchange (ETDEWEB)

    Yabe, Takashi (Gunma Univ., Kiryu (Japan). Faculty of Engineering)

    1994-12-01

    Recent development of computational technologies in inertial confinement fusion (ICF) is reviewed with a special emphasis on hydrodynamic simulations. The CIP method developed for ICF simulations is one of the typical examples that are used in various fields of physics such as variety of computational fluid dynamics, astrophysics, laser applications, geophysics, and so on. (author).

  9. Computer science research and technology volume 3

    CERN Document Server

    Bauer, Janice P

    2011-01-01

    This book presents leading-edge research from across the globe in the field of computer science research, technology and applications. Each contribution has been carefully selected for inclusion based on the significance of the research to this fast-moving and diverse field. Some topics included are: network topology; agile programming; virtualization; and reconfigurable computing.

  10. Philosophy of computing and information technology

    NARCIS (Netherlands)

    Brey, Philip; Soraker, Johnny Hartz

    2009-01-01

    Philosophy has been described as having taken a “computational turn,” referring to the ways in which computers and information technology throw new light upon traditional philosophical issues, provide new tools and concepts for philosophical reasoning, and pose theoretical and practical questions th

  11. NUMERICAL VALIDATION OF COMPUTATIONAL MODEL FOR SHEET CAVITATING FLOWS

    Institute of Scientific and Technical Information of China (English)

    2006-01-01

    A computational modeling for the sheet cavitating flows is presented. The cavitation model is implemented in a viscous Navier-Stokes solver. The cavity interface and shape are determined using an iterative procedure matching the cavity surface to a constant pressure boundary. The pressure distribution, as well as its gradient on the wall, is taken into account in updating the cavity shape iteratively. Numerical computations are performed for the sheet cavitating flows at a range of cavitation numbers across the hemispheric headform/cylinder body with different grid numbers. The influence of the relaxation factor in the cavity shape updating scheme for the algorithm accuracy and reliability is conducted through comparison with other two cavity shape updating numerical schemes.The results obtained are reasonable and the iterative procedure of cavity shape updating is quite stable, which demonstrate the superiority of the proposed cavitation model and algorithms.

  12. Computer-Aided Numerical Inversion of Laplace Transform

    Directory of Open Access Journals (Sweden)

    Umesh Kumar

    2000-01-01

    Full Text Available This paper explores the technique for the computer aided numerical inversion of Laplace transform. The inversion technique is based on the properties of a family of three parameter exponential probability density functions. The only limitation in the technique is the word length of the computer being used. The Laplace transform has been used extensively in the frequency domain solution of linear, lumped time invariant networks but its application to the time domain has been limited, mainly because of the difficulty in finding the necessary poles and residues. The numerical inversion technique mentioned above does away with the poles and residues but uses precomputed numbers to find the time response. This technique is applicable to the solution of partially differentiable equations and certain classes of linear systems with time varying components.

  13. Multi-pattern Matching Methods Based on Numerical Computation

    Directory of Open Access Journals (Sweden)

    Lu Jun

    2013-01-01

    Full Text Available Multi-pattern matching methods based on numerical computation are advanced in this paper. Firstly it advanced the multiple patterns matching algorithm based on added information. In the process of accumulating of information, the select method of byte-accumulate operation will affect the collision odds , which means that the methods or bytes involved in the different matching steps should have greater differences as much as possible. In addition, it can use balanced binary tree to manage index to reduce the average searching times, and use the characteristics of a given pattern set by setting the collision field to eliminate collision further. In order to reduce the collision odds in the initial step, the information splicing method is advanced, which has greater value space than added information method, thus greatly reducing the initial collision odds. Multiple patterns matching methods based on numerical computation fits for large multi-pattern matching.

  14. Technological Enhancements for Personal Computers

    Science.gov (United States)

    1992-03-01

    scenarios that represent some of what can be accomplished % ith personal computers. 20 D!STRIBUTION/ AVAILABILTY OF ABSTRACT 21 ABSTRACT SECURITY...not just the immediate usages . With few exceptions all of the options discussed here are available under the Desktop III contract. The new Desktop IV...Many users found them to be slow and unwieldy and consequentially they did not get the expected usage nor did they provide the advantages we find in

  15. MUSICAL-COMPUTER TECHNOLOGY: THE LABORATORY

    Directory of Open Access Journals (Sweden)

    Gorbunova Irina B.

    2012-12-01

    Full Text Available The article deals with musically-computer technology in the educational system on example of the Educational and Methodical Laboratory Music & Computer Technologies at the Herzen State Pedagogical University of Russia, St. Petersburg. Interdisciplinary field of professional activities relates to the creation and application of specialized music software and hardware tools and the knowledges in music and informatics. A realization of the concept of musical-computer education in preparing music teachers is through basic educational programs of vocational training, supplementary education, professional development of teachers and methodical support via Internet. In addition, the laboratory Music & Computer Technologies engaged in scientific activity: it is, above all, specialized researches in the field of pedagogy and international conferences.

  16. Research on Key Technologies of Cloud Computing

    Science.gov (United States)

    Zhang, Shufen; Yan, Hongcan; Chen, Xuebin

    With the development of multi-core processors, virtualization, distributed storage, broadband Internet and automatic management, a new type of computing mode named cloud computing is produced. It distributes computation task on the resource pool which consists of massive computers, so the application systems can obtain the computing power, the storage space and software service according to its demand. It can concentrate all the computing resources and manage them automatically by the software without intervene. This makes application offers not to annoy for tedious details and more absorbed in his business. It will be advantageous to innovation and reduce cost. It's the ultimate goal of cloud computing to provide calculation, services and applications as a public facility for the public, So that people can use the computer resources just like using water, electricity, gas and telephone. Currently, the understanding of cloud computing is developing and changing constantly, cloud computing still has no unanimous definition. This paper describes three main service forms of cloud computing: SAAS, PAAS, IAAS, compared the definition of cloud computing which is given by Google, Amazon, IBM and other companies, summarized the basic characteristics of cloud computing, and emphasized on the key technologies such as data storage, data management, virtualization and programming model.

  17. Voice Technology Using Personal Computers.

    Science.gov (United States)

    1987-01-01

    PROGRA -.. NDC -A85 -AiSG 743 VOICE TECNOLOGY USING PERSONAL COMPUTE3SI(U) alit FORCE 212 INST OF TECH MRIGJ4T-PATTERSON RFB ON G L TALBOT 1987...Inline( $2E/$C6/$06/ Int24Err $Ol/$50/$89/$F8/$2E/$A2/ Int24ErrCode /$58/$BO/$OO/$89/$EC/$5D/$CF); - 150 - i..r - l. .. { Turbo: PUSH BP save...caller’s stack frame MOV BP,SP Set up this procedure’s stack frame PUSH BP ? Inline: MOV BYTE CS:[INT24Err],I Set INT24Err to True PUSH AX MOV AX,DI Get INT

  18. Study of application technology of ultra-high speed computer to the elucidation of complex phenomena

    Energy Technology Data Exchange (ETDEWEB)

    Sekiguchi, Tomotsugu [Electrotechnical Lab., Tsukuba, Ibaraki (Japan)

    1996-06-01

    The basic design of numerical information library in the decentralized computer network was explained at the first step of constructing the application technology of ultra-high speed computer to the elucidation of complex phenomena. Establishment of the system makes possible to construct the efficient application environment of ultra-high speed computer system to be scalable with the different computing systems. We named the system Ninf (Network Information Library for High Performance Computing). The summary of application technology of library was described as follows: the application technology of library under the distributed environment, numeric constants, retrieval of value, library of special functions, computing library, Ninf library interface, Ninf remote library and registration. By the system, user is able to use the program concentrating the analyzing technology of numerical value with high precision, reliability and speed. (S.Y.)

  19. Future Computing Technology (3/3)

    CERN Document Server

    CERN. Geneva

    2015-01-01

    Computing of the future will be affected by a number of fundamental technologies in development today, many of which are already on the way to becoming commercialized. In this series of lectures, we will discuss hardware and software development that will become mainstream in the timeframe of a few years and how they will shape or change the computing landscape - commercial and personal alike. Topics range from processor and memory aspects, programming models and the limits of artificial intelligence, up to end-user interaction with wearables or e-textiles. We discuss the impact of these technologies on the art of programming, the data centres of the future and daily life. On the third day of the Future Computing Technology series, we will touch on societal aspects of the future of computing. Our perception of computers may at time seem passive, but in reality we are a vital chain of the feedback loop. Human-computer interaction, innovative forms of computers, privacy, process automation, threats and medica...

  20. A New Language Design for Prototyping Numerical Computation

    Directory of Open Access Journals (Sweden)

    Thomas Derby

    1996-01-01

    Full Text Available To naturally and conveniently express numerical algorithms, considerable expressive power is needed in the languages in which they are implemented. The language Matlab is widely used by numerical analysts for this reason. Expressiveness or ease-of-use can also result in a loss of efficiency, as is the case with Matlab. In particular, because numerical analysts are highly interested in the performance of their algorithms, prototypes are still often implemented in languages such as Fortran. In this article we describe a language design that is intended to both provide expressiveness for numerical computation, and at the same time provide performance guarantees. In our language, EQ, we attempt to include both syntactic and semantic features that correspond closely to the programmer's model of the problem, including unordered equations, large-granularity state transitions, and matrix notation. The resulting language does not fit into standard language categories such as functional or imperative but has features of both paradigms. We also introduce the notion of language dependability, which is the idea that a language should guarantee that certain program transformations are performed by all implementations. We first describe the interesting features of EQ, and then present three examples of algorithms written using it. We also provide encouraging performance results from an initial implementation of our language.

  1. Computational technology of multiscale modeling the gas flows in microchannels

    Science.gov (United States)

    Podryga, V. O.

    2016-11-01

    The work is devoted to modeling the gas mixture flows in engineering microchannels under conditions of many scales of computational domain. The computational technology of using the multiscale approach combining macro - and microscopic models is presented. At macrolevel the nature of the flow and the external influence on it are considered. As a model the system of quasigasdynamic equations is selected. At microlevel the correction of gasdynamic parameters and the determination of boundary conditions are made. As a numerical model the Newton's equations and the molecular dynamics method are selected. Different algorithm types used for implementation of multiscale modeling are considered. The results of the model problems for separate stages are given.

  2. Technology computer aided design simulation for VLSI MOSFET

    CERN Document Server

    Sarkar, Chandan Kumar

    2013-01-01

    Responding to recent developments and a growing VLSI circuit manufacturing market, Technology Computer Aided Design: Simulation for VLSI MOSFET examines advanced MOSFET processes and devices through TCAD numerical simulations. The book provides a balanced summary of TCAD and MOSFET basic concepts, equations, physics, and new technologies related to TCAD and MOSFET. A firm grasp of these concepts allows for the design of better models, thus streamlining the design process, saving time and money. This book places emphasis on the importance of modeling and simulations of VLSI MOS transistors and

  3. Ultimate computing. Biomolecular consciousness and nano Technology

    Energy Technology Data Exchange (ETDEWEB)

    Hameroff, S.R.

    1987-01-01

    The book advances the premise that the cytoskeleton is the cell's nervous system, the biological controller/computer. If indeed cytoskeletal dynamics in the nanoscale (billionth meter, billionth second) are the texture of intracellular information processing, emerging ''NanoTechnologies'' (scanning tunneling microscopy, Feynman machines, von Neumann replicators, etc.) should enable direct monitoring, decoding and interfacing between biological and technological information devices. This in turn could result in important biomedical applications and perhaps a merger of mind and machine: Ultimate Computing.

  4. Mathematics for engineering, technology and computing science

    CERN Document Server

    Martin, Hedley G

    1970-01-01

    Mathematics for Engineering, Technology and Computing Science is a text on mathematics for courses in engineering, technology, and computing science. It covers linear algebra, ordinary differential equations, and vector analysis, together with line and multiple integrals. This book consists of eight chapters and begins with a discussion on determinants and linear equations, with emphasis on how the value of a determinant is defined and how it may be obtained. Solution of linear equations and the dependence between linear equations are also considered. The next chapter introduces the reader to

  5. Numerical Computation of Two-loop Box Diagrams with Masses

    CERN Document Server

    Yuasa, F; Hamaguchi, N; Ishikawa, T; Kato, K; Kurihara, Y; Fujimoto, J; Shimizu, Y

    2011-01-01

    A new approach is presented to evaluate multi-loop integrals, which appear in the calculation of cross-sections in high-energy physics. It relies on a fully numerical method and is applicable to a wide class of integrals with various mass configurations. As an example, the computation of two-loop planar and non-planar box diagrams is shown. The results are confirmed by comparisons with other techniques, including the reduction method, and by a consistency check using the dispersion relation.

  6. Learning SciPy for numerical and scientific computing

    CERN Document Server

    Silva

    2013-01-01

    A step-by-step practical tutorial with plenty of examples on research-based problems from various areas of science, that prove how simple, yet effective, it is to provide solutions based on SciPy. This book is targeted at anyone with basic knowledge of Python, a somewhat advanced command of mathematics/physics, and an interest in engineering or scientific applications---this is broadly what we refer to as scientific computing.This book will be of critical importance to programmers and scientists who have basic Python knowledge and would like to be able to do scientific and numerical computatio

  7. A computational model for the numerical simulation of FSW processes

    OpenAIRE

    Agelet de Saracibar Bosch, Carlos; Chiumenti, Michèle; Santiago, Diego de; Cervera Ruiz, Miguel; Dialami, Narges; Lombera, Guillermo

    2010-01-01

    In this paper a computational model for the numerical simulation of Friction Stir Welding (FSW) processes is presented. FSW is a new method of welding in solid state in which a shouldered tool with a profile probe is rotated and slowly plunged into the joint line between two pieces of sheet or plate material which are butted together. Once the probe has been completely inserted, it is moved with a small tilt angle in the welding direction. Here a quasi-static, thermal transient, mixed mult...

  8. Existential Computer Anxiety and Changes in Computer Technology: What Past Research on Computer Anxiety Has Missed.

    Science.gov (United States)

    Worthington, Valerie L.; Zhao, Yong

    1999-01-01

    Proposes that the existing literature on computer anxiety has neglected to consider two issues: (1) that there is an existential element to computer anxiety, and (2) that computer technology has undergone historical changes that bring with them subsequent changes in the metaphors used to understand computers. (Contains 72 references.) (Author/LRW)

  9. 4th International Conference on Applied Computing and Information Technology

    CERN Document Server

    2017-01-01

    This edited book presents scientific results of the 4th International Conference on Applied Computing and Information Technology (ACIT 2016) which was held on December 12–14, 2016 in Las Vegas, USA. The aim of this conference was to bring together researchers and scientists, businessmen and entrepreneurs, teachers, engineers, computer users, and students to discuss the numerous fields of computer science and to share their experiences and exchange new ideas and information in a meaningful way. The aim of this conference was also to bring out the research results about all aspects (theory, applications and tools) of computer and information science, and to discuss the practical challenges encountered along the way and the solutions adopted to solve them. The conference organizers selected the best papers from those papers accepted for presentation at the conference. The papers were chosen based on review scores submitted by members of the Program Committee, and underwent further rigorous rounds of review. Th...

  10. RIOT: I/O-Efficient Numerical Computing without SQL

    CERN Document Server

    Zhang, Yi; Yang, Jun

    2009-01-01

    R is a numerical computing environment that is widely popular for statistical data analysis. Like many such environments, R performs poorly for large datasets whose sizes exceed that of physical memory. We present our vision of RIOT (R with I/O Transparency), a system that makes R programs I/O-efficient in a way transparent to the users. We describe our experience with RIOT-DB, an initial prototype that uses a relational database system as a backend. Despite the overhead and inadequacy of generic database systems in handling array data and numerical computation, RIOT-DB significantly outperforms R in many large-data scenarios, thanks to a suite of high-level, inter-operation optimizations that integrate seamlessly into R. While many techniques in RIOT are inspired by databases (and, for RIOT-DB, realized by a database system), RIOT users are insulated from anything database related. Compared with previous approaches that require users to learn new languages and rewrite their programs to interface with a datab...

  11. The Computer as Doorstop: Technology as Disempowerment.

    Science.gov (United States)

    Callister, Thomas A., Jr.; Dunne, Faith

    1992-01-01

    Efforts to replace teachers with technology have uniformly failed. Machines are only tools. Good classroom tools extend the teacher's power to create a rich learning environment. If the teacher perceives the tool as master or misconstrues its use, its potential will never be realized. Strategies for computer use must focus on purpose and derive…

  12. Competency Index. [Business/Computer Technologies Cluster.

    Science.gov (United States)

    Ohio State Univ., Columbus. Center on Education and Training for Employment.

    This index allows the user to scan the competencies under each title for the 28 subjects appropriate for use in a competency list for the 12 occupations within the business/computer technologies cluster. Titles of the 28 units are as follows: employability skills; professionalism; teamwork; professional and ethical standards; economic and business…

  13. Numerical computation of travelling breathers in Klein Gordon chains

    Science.gov (United States)

    Sire, Yannick; James, Guillaume

    2005-05-01

    We numerically study the existence of travelling breathers in Klein-Gordon chains, which consist of one-dimensional networks of nonlinear oscillators in an anharmonic on-site potential, linearly coupled to their nearest neighbors. Travelling breathers are spatially localized solutions having the property of being exactly translated by p sites along the chain after a fixed propagation time T (these solutions generalize the concept of solitary waves for which p=1). In the case of even on-site potentials, the existence of small amplitude travelling breathers superposed on a small oscillatory tail has been proved recently [G. James, Y. Sire, Travelling breathers with exponentially small tails in a chain of nonlinear oscillators, Commun. Math. Phys., 2005, in press (available online at http://www.springerlink.com)], the tail being exponentially small with respect to the central oscillation size. In this paper, we compute these solutions numerically and continue them into the large amplitude regime for different types of even potentials. We find that Klein-Gordon chains can support highly localized travelling breather solutions superposed on an oscillatory tail. We provide examples where the tail can be made very small and is difficult to detect at the scale of central oscillations. In addition, we numerically observe the existence of these solutions in the case of non-even potentials.

  14. Numerical Methods of Computational Electromagnetics for Complex Inhomogeneous Systems

    Energy Technology Data Exchange (ETDEWEB)

    Cai, Wei

    2014-05-15

    Understanding electromagnetic phenomena is the key in many scientific investigation and engineering designs such as solar cell designs, studying biological ion channels for diseases, and creating clean fusion energies, among other things. The objectives of the project are to develop high order numerical methods to simulate evanescent electromagnetic waves occurring in plasmon solar cells and biological ion-channels, where local field enhancement within random media in the former and long range electrostatic interactions in the latter are of major challenges for accurate and efficient numerical computations. We have accomplished these objectives by developing high order numerical methods for solving Maxwell equations such as high order finite element basis for discontinuous Galerkin methods, well-conditioned Nedelec edge element method, divergence free finite element basis for MHD, and fast integral equation methods for layered media. These methods can be used to model the complex local field enhancement in plasmon solar cells. On the other hand, to treat long range electrostatic interaction in ion channels, we have developed image charge based method for a hybrid model in combining atomistic electrostatics and continuum Poisson-Boltzmann electrostatics. Such a hybrid model will speed up the molecular dynamics simulation of transport in biological ion-channels.

  15. Numerical methods of computation of singular and hypersingular integrals

    Directory of Open Access Journals (Sweden)

    I. V. Boikov

    2001-01-01

    and technology one is faced with necessity of calculating different singular integrals. In analytical form calculation of singular integrals is possible only in unusual cases. Therefore approximate methods of singular integrals calculation are an active developing direction of computing in mathematics. This review is devoted to the optimal with respect to accuracy algorithms of the calculation of singular integrals with fixed singularity, Cauchy and Hilbert kernels, polysingular and many-dimensional singular integrals. The isolated section is devoted to the optimal with respect to accuracy algorithms of the calculation of the hypersingular integrals.

  16. Numerical simulation of NQR/NMR: Applications in quantum computing.

    Science.gov (United States)

    Possa, Denimar; Gaudio, Anderson C; Freitas, Jair C C

    2011-04-01

    A numerical simulation program able to simulate nuclear quadrupole resonance (NQR) as well as nuclear magnetic resonance (NMR) experiments is presented, written using the Mathematica package, aiming especially applications in quantum computing. The program makes use of the interaction picture to compute the effect of the relevant nuclear spin interactions, without any assumption about the relative size of each interaction. This makes the program flexible and versatile, being useful in a wide range of experimental situations, going from NQR (at zero or under small applied magnetic field) to high-field NMR experiments. Some conditions specifically required for quantum computing applications are implemented in the program, such as the possibility of use of elliptically polarized radiofrequency and the inclusion of first- and second-order terms in the average Hamiltonian expansion. A number of examples dealing with simple NQR and quadrupole-perturbed NMR experiments are presented, along with the proposal of experiments to create quantum pseudopure states and logic gates using NQR. The program and the various application examples are freely available through the link http://www.profanderson.net/files/nmr_nqr.php.

  17. Mathematical analysis and numerical methods for science and technology

    CERN Document Server

    Dautray, Robert

    These 6 volumes - the result of a 10 year collaboration between the authors, two of France's leading scientists and both distinguished international figures - compile the mathematical knowledge required by researchers in mechanics, physics, engineering, chemistry and other branches of application of mathematics for the theoretical and numerical resolution of physical models on computers. Since the publication in 1924 of the "Methoden der mathematischen Physik" by Courant and Hilbert, there has been no other comprehensive and up-to-date publication presenting the mathematical tools needed in applications of mathematics in directly implementable form. The advent of large computers has in the meantime revolutionised methods of computation and made this gap in the literature intolerable: the objective of the present work is to fill just this gap. Many phenomena in physical mathematics may be modeled by a system of partial differential equations in distributed systems: a model here means a set of equations, which ...

  18. Development of simulation tools for numerical investigation and computer-aided design (CAD) of gyrotrons

    Science.gov (United States)

    Damyanova, M.; Sabchevski, S.; Zhelyazkov, I.; Vasileva, E.; Balabanova, E.; Dankov, P.; Malinov, P.

    2016-10-01

    As the most powerful CW sources of coherent radiation in the sub-terahertz to terahertz frequency range the gyrotrons have demonstrated a remarkable potential for numerous novel and prospective applications in the fundamental physical research and the technologies. Among them are powerful gyrotrons for electron cyclotron resonance heating (ECRH) and current drive (ECCD) of magnetically confined plasma in various reactors for controlled thermonuclear fusion (e.g., tokamaks and most notably ITER), high-frequency gyrotrons for sub-terahertz spectroscopy (for example NMR-DNP, XDMR, study of the hyperfine structure of positronium, etc.), gyrotrons for thermal processing and so on. Modelling and simulation are indispensable tools for numerical studies, computer-aided design (CAD) and optimization of such sophisticated vacuum tubes (fast-wave devices) operating on a physical principle known as electron cyclotron resonance maser (ECRM) instability. During the recent years, our research team has been involved in the development of physical models and problem-oriented software packages for numerical analysis and CAD of different gyrotrons in the framework of a broad international collaboration. In this paper we present the current status of our simulation tools (GYROSIM and GYREOSS packages) and illustrate their functionality by results of numerical experiments carried out recently. Finally, we provide an outlook on the envisaged further development of the computer codes and the computational modules belonging to these packages and specialized to different subsystems of the gyrotrons.

  19. Summary of research in applied mathematics, numerical analysis, and computer sciences

    Science.gov (United States)

    1986-01-01

    The major categories of current ICASE research programs addressed include: numerical methods, with particular emphasis on the development and analysis of basic numerical algorithms; control and parameter identification problems, with emphasis on effective numerical methods; computational problems in engineering and physical sciences, particularly fluid dynamics, acoustics, and structural analysis; and computer systems and software, especially vector and parallel computers.

  20. Future Computing Technology (1/3)

    CERN Document Server

    CERN. Geneva

    2015-01-01

    Computing of the future will be affected by a number of fundamental technologies in development today, many of which are already on the way to becoming commercialized. In this series of lectures, we will discuss hardware and software development that will become mainstream in the timeframe of a few years and how they will shape or change the computing landscape - commercial and personal alike. Topics range from processor and memory aspects, programming models and the limits of artificial intelligence, up to end-user interaction with wearables or e-textiles. We discuss the impact of these technologies on the art of programming, the data centres of the future and daily life. Lecturer's short bio: Andrzej Nowak has 10 years of experience in computing technologies, primarily from CERN openlab and Intel. At CERN, he managed a research lab collaborating with Intel and was part of the openlab Chief Technology Office. Andrzej also worked closely and initiated projects with the private sector (e.g. HP and Go...

  1. Symbolic coding for noninvertible systems: uniform approximation and numerical computation

    Science.gov (United States)

    Beyn, Wolf-Jürgen; Hüls, Thorsten; Schenke, Andre

    2016-11-01

    It is well known that the homoclinic theorem, which conjugates a map near a transversal homoclinic orbit to a Bernoulli subshift, extends from invertible to specific noninvertible dynamical systems. In this paper, we provide a unifying approach that combines such a result with a fully discrete analog of the conjugacy for finite but sufficiently long orbit segments. The underlying idea is to solve appropriate discrete boundary value problems in both cases, and to use the theory of exponential dichotomies to control the errors. This leads to a numerical approach that allows us to compute the conjugacy to any prescribed accuracy. The method is demonstrated for several examples where invertibility of the map fails in different ways.

  2. Numerical computations of the dynamics of fluidic membranes and vesicles

    CERN Document Server

    Barrett, John W; Nürnberg, Robert

    2015-01-01

    Vesicles and many biological membranes are made of two monolayers of lipid molecules and form closed lipid bilayers. The dynamical behaviour of vesicles is very complex and a variety of forms and shapes appear. Lipid bilayers can be considered as a surface fluid and hence the governing equations for the evolution include the surface (Navier--)Stokes equations, which in particular take the membrane viscosity into account. The evolution is driven by forces stemming from the curvature elasticity of the membrane. In addition, the surface fluid equations are coupled to bulk (Navier--)Stokes equations. We introduce a parametric finite element method to solve this complex free boundary problem, and present the first three dimensional numerical computations based on the full (Navier--)Stokes system for several different scenarios. For example, the effects of the membrane viscosity, spontaneous curvature and area difference elasticity (ADE) are studied. In particular, it turns out, that even in the case of no viscosit...

  3. Singularities of robot mechanisms numerical computation and avoidance path planning

    CERN Document Server

    Bohigas, Oriol; Ros, Lluís

    2017-01-01

    This book presents the singular configurations associated with a robot mechanism, together with robust methods for their computation, interpretation, and avoidance path planning. Having such methods is essential as singularities generally pose problems to the normal operation of a robot, but also determine the workspaces and motion impediments of its underlying mechanical structure. A distinctive feature of this volume is that the methods are applicable to nonredundant mechanisms of general architecture, defined by planar or spatial kinematic chains interconnected in an arbitrary way. Moreover, singularities are interpreted as silhouettes of the configuration space when seen from the input or output spaces. This leads to a powerful image that explains the consequences of traversing singular configurations, and all the rich information that can be extracted from them. The problems are solved by means of effective branch-and-prune and numerical continuation methods that are of independent interest in themselves...

  4. Numerical simulation of landfill aeration using computational fluid dynamics.

    Science.gov (United States)

    Fytanidis, Dimitrios K; Voudrias, Evangelos A

    2014-04-01

    The present study is an application of Computational Fluid Dynamics (CFD) to the numerical simulation of landfill aeration systems. Specifically, the CFD algorithms provided by the commercial solver ANSYS Fluent 14.0, combined with an in-house source code developed to modify the main solver, were used. The unsaturated multiphase flow of air and liquid phases and the biochemical processes for aerobic biodegradation of the organic fraction of municipal solid waste were simulated taking into consideration their temporal and spatial evolution, as well as complex effects, such as oxygen mass transfer across phases, unsaturated flow effects (capillary suction and unsaturated hydraulic conductivity), temperature variations due to biochemical processes and environmental correction factors for the applied kinetics (Monod and 1st order kinetics). The developed model results were compared with literature experimental data. Also, pilot scale simulations and sensitivity analysis were implemented. Moreover, simulation results of a hypothetical single aeration well were shown, while its zone of influence was estimated using both the pressure and oxygen distribution. Finally, a case study was simulated for a hypothetical landfill aeration system. Both a static (steadily positive or negative relative pressure with time) and a hybrid (following a square wave pattern of positive and negative values of relative pressure with time) scenarios for the aeration wells were examined. The results showed that the present model is capable of simulating landfill aeration and the obtained results were in good agreement with corresponding previous experimental and numerical investigations.

  5. A Computational Model for the Numerical Simulation of FSW Processes

    Science.gov (United States)

    Agelet de Saracibar, C.; Chiumenti, M.; Santiago, D.; Cervera, M.; Dialami, N.; Lombera, G.

    2010-06-01

    In this paper a computational model for the numerical simulation of Friction Stir Welding (FSW) processes is presented. FSW is a new method of welding in solid state in which a shouldered tool with a profile probe is rotated and slowly plunged into the joint line between two pieces of sheet or plate material which are butted together. Once the probe has been completely inserted, it is moved with a small tilt angle in the welding direction. Here a quasi-static, thermal transient, mixed multiscale stabilized Eulerian formulation is used. Norton-Hoff and Sheppard-Wright rigid thermo-viscoplastic material models have been considered. A staggered solution algorithm is defined such that for any time step, the mechanical problem is solved at constant temperature and then the thermal problem is solved keeping constant the mechanical variables. A pressure multiscale stabilized mixed linear velocity/linear pressure finite element interpolation formulation is used to solve the mechanical problem and a convection multiscale stabilized linear temperature interpolation formulation is used to solve the thermal problem. The model has been implemented into the in-house developed FE code COMET. Results obtained in the simulation of FSW process are compared to other numerical results or experimental results, when available.

  6. Hybrid Nanoelectronics: Future of Computer Technology

    Institute of Scientific and Technical Information of China (English)

    Wei Wang; Ming Liu; Andrew Hsu

    2006-01-01

    Nanotechnology may well prove to be the 21st century's new wave of scientific knowledge that transforms people's lives. Nanotechnology research activities are booming around the globe. This article reviews the recent progresses made on nanoelectronic research in US and China, and introduces several novel hybrid solutions specifically useful for future computer technology. These exciting new directions will lead to many future inventions, and have a huge impact to research communities and industries.

  7. Computer Education and Instructional Technology Teacher Trainees' Opinions about Cloud Computing Technology

    Science.gov (United States)

    Karamete, Aysen

    2015-01-01

    This study aims to show the present conditions about the usage of cloud computing in the department of Computer Education and Instructional Technology (CEIT) amongst teacher trainees in School of Necatibey Education, Balikesir University, Turkey. In this study, a questionnaire with open-ended questions was used. 17 CEIT teacher trainees…

  8. Computer Education and Instructional Technology Teacher Trainees' Opinions about Cloud Computing Technology

    Science.gov (United States)

    Karamete, Aysen

    2015-01-01

    This study aims to show the present conditions about the usage of cloud computing in the department of Computer Education and Instructional Technology (CEIT) amongst teacher trainees in School of Necatibey Education, Balikesir University, Turkey. In this study, a questionnaire with open-ended questions was used. 17 CEIT teacher trainees…

  9. Compiler Technology for Parallel Scientific Computation

    Directory of Open Access Journals (Sweden)

    Can Özturan

    1994-01-01

    Full Text Available There is a need for compiler technology that, given the source program, will generate efficient parallel codes for different architectures with minimal user involvement. Parallel computation is becoming indispensable in solving large-scale problems in science and engineering. Yet, the use of parallel computation is limited by the high costs of developing the needed software. To overcome this difficulty we advocate a comprehensive approach to the development of scalable architecture-independent software for scientific computation based on our experience with equational programming language (EPL. Our approach is based on a program decomposition, parallel code synthesis, and run-time support for parallel scientific computation. The program decomposition is guided by the source program annotations provided by the user. The synthesis of parallel code is based on configurations that describe the overall computation as a set of interacting components. Run-time support is provided by the compiler-generated code that redistributes computation and data during object program execution. The generated parallel code is optimized using techniques of data alignment, operator placement, wavefront determination, and memory optimization. In this article we discuss annotations, configurations, parallel code generation, and run-time support suitable for parallel programs written in the functional parallel programming language EPL and in Fortran.

  10. Reviews of computing technology: Object-oriented technology

    Energy Technology Data Exchange (ETDEWEB)

    Skeen, D.C.

    1993-03-01

    A useful metaphor in introducing object-oriented concepts is the idea of a computer hardware manufacturer assembling products from an existing stock of electronic parts. In this analogy, think of the parts as pieces of computer software and of the finished products as computer applications. Like its counterpart, the object is capable of performing its specific function in a wide variety of different applications. The advantages to assembling hardware using a set of prebuilt parts are obvious. The design process is greatly simplified in this scenario, since the designer needs only to carry the design down to the chip level, rather than to the transistor level. As a result, the designer is free to develop a more reliable and feature rich product. Also, since the component parts are reused in several different products, the parts can be made more robust and subjected to more rigorous testing than would be economically feasible for a part used in only one piece of equipment. Additionally, maintenance on the resulting systems is simplified because of the part-level consistency from one type of equipment to another. The remainder of this document introduces the techniques used to develop objects, the benefits of the technology, outstanding issues that remain with the technology, industry direction for the technology, and the impact that object-oriented technology is likely to have on the organization. While going through this material, the reader will find it useful to remember the parts analogy and to keep in mind that the overall purpose of object-oriented technology is to create software parts and to construct applications using those parts.

  11. Numerical observer for atherosclerotic plaque classification in spectral computed tomography.

    Science.gov (United States)

    Lorsakul, Auranuch; Fakhri, Georges El; Worstell, William; Ouyang, Jinsong; Rakvongthai, Yothin; Laine, Andrew F; Li, Quanzheng

    2016-07-01

    Spectral computed tomography (SCT) generates better image quality than conventional computed tomography (CT). It has overcome several limitations for imaging atherosclerotic plaque. However, the literature evaluating the performance of SCT based on objective image assessment is very limited for the task of discriminating plaques. We developed a numerical-observer method and used it to assess performance on discrimination vulnerable-plaque features and compared the performance among multienergy CT (MECT), dual-energy CT (DECT), and conventional CT methods. Our numerical observer was designed to incorporate all spectral information and comprised two-processing stages. First, each energy-window domain was preprocessed by a set of localized channelized Hotelling observers (CHO). In this step, the spectral image in each energy bin was decorrelated using localized prewhitening and matched filtering with a set of Laguerre-Gaussian channel functions. Second, the series of the intermediate scores computed from all the CHOs were integrated by a Hotelling observer with an additional prewhitening and matched filter. The overall signal-to-noise ratio (SNR) and the area under the receiver operating characteristic curve (AUC) were obtained, yielding an overall discrimination performance metric. The performance of our new observer was evaluated for the particular binary classification task of differentiating between alternative plaque characterizations in carotid arteries. A clinically realistic model of signal variability was also included in our simulation of the discrimination tasks. The inclusion of signal variation is a key to applying the proposed observer method to spectral CT data. Hence, the task-based approaches based on the signal-known-exactly/background-known-exactly (SKE/BKE) framework and the clinical-relevant signal-known-statistically/background-known-exactly (SKS/BKE) framework were applied for analytical computation of figures of merit (FOM). Simulated data of a

  12. Safeguards technology and computer security training

    Energy Technology Data Exchange (ETDEWEB)

    Hunteman, W.J.; Zack, N.R.

    1992-01-01

    The Los Alamos National Laboratory Safeguards Systems Group provides a variety of training services to the federal government and its contractors. The US Department of Energy sponsors a Safeguards Technology Training Program at Los Alamos in which seminars are offered concerning materials accounting for nuclear safeguards, measurement control for materials accounting, and variance propagation and systems analysis. These seminars provide guidance and techniques for accounting for nuclear material, developing and quantifying quality nuclear material measurements, and assessing overall accounting system performance. The Safeguards Systems Group also provides training in computer and data security applications; i.e., a workshop and the Los Alamos Vulnerability/Risk Assessment System (LAVA), computer system security officer training, and nuclear material safeguards for managers training, which are available on request. This paper describes the purpose, content, and expected benefits of the training activities that can be applied at nuclear materials facilities or where there are computer and/or data security concerns.

  13. Safeguards technology and computer security training

    Energy Technology Data Exchange (ETDEWEB)

    Hunteman, W.J.; Zack, N.R.

    1992-09-01

    The Los Alamos National Laboratory Safeguards Systems Group provides a variety of training services to the federal government and its contractors. The US Department of Energy sponsors a Safeguards Technology Training Program at Los Alamos in which seminars are offered concerning materials accounting for nuclear safeguards, measurement control for materials accounting, and variance propagation and systems analysis. These seminars provide guidance and techniques for accounting for nuclear material, developing and quantifying quality nuclear material measurements, and assessing overall accounting system performance. The Safeguards Systems Group also provides training in computer and data security applications; i.e., a workshop and the Los Alamos Vulnerability/Risk Assessment System (LAVA), computer system security officer training, and nuclear material safeguards for managers training, which are available on request. This paper describes the purpose, content, and expected benefits of the training activities that can be applied at nuclear materials facilities or where there are computer and/or data security concerns.

  14. Numerical Study of Geometric Multigrid Methods on CPU--GPU Heterogeneous Computers

    CERN Document Server

    Feng, Chunsheng; Xu, Jinchao; Zhang, Chen-Song

    2012-01-01

    The geometric multigrid method (GMG) is one of the most efficient solving techniques for discrete algebraic systems arising from many types of partial differential equations. GMG utilizes a hierarchy of grids or discretizations and reduces the error at a number of frequencies simultaneously. Graphics processing units (GPUs) have recently burst onto the scientific computing scene as a technology that has yielded substantial performance and energy-efficiency improvements. A central challenge in implementing GMG on GPUs, though, is that computational work on coarse levels cannot fully utilize the capacity of a GPU. In this work, we perform numerical studies of GMG on CPU--GPU heterogeneous computers. Furthermore, we compare our implementation with an efficient CPU implementation of GMG and with the most popular fast Poisson solver, Fast Fourier Transform, in the cuFFT library developed by NVIDIA.

  15. Computational Fluid Dynamics (CFD) Technology Programme 1995- 1999

    Energy Technology Data Exchange (ETDEWEB)

    Haekkinen, R.J.; Hirsch, C.; Krause, E.; Kytoemaa, H.K. [eds.

    1997-12-31

    The report is a mid-term evaluation of the Computational Fluid Dynamics (CFD) Technology Programme started by Technology Development Centre Finland (TEKES) in 1995 as a five-year initiative to be concluded in 1999. The main goal of the programme is to increase the know-how and application of CFD in Finnish industry, to coordinate and thus provide a better basis for co-operation between national CFD activities and encouraging research laboratories and industry to establish co-operation with the international CFD community. The projects of the programme focus on the following areas: (1) studies of modeling the physics and dynamics of the behaviour of fluid material, (2) expressing the physical models in a numerical mode and developing a computer codes, (3) evaluating and testing current physical models and developing new ones, (4) developing new numerical algorithms, solvers, and pre- and post-processing software, and (5) applying the new computational tools to problems relevant to their ultimate industrial use. The report consists of two sections. The first considers issues concerning the whole programme and the second reviews each project

  16. Balanced technology initiative on computational mechanics of materials

    Science.gov (United States)

    Asaro, Robert J.

    1993-04-01

    The goal of this project, which was part of the DARPA Balanced Technology Initiative on Computational Mechanics, was to develop a comprehensive approach to the numerical modeling of the mechanical behavior of materials. Particular areas for focus in the project were the inelastic deformation of highly anisotropic materials such as single crystals and textured polycrystals, as well as evolving microstructural damage in ceramics and ductile metals in both slow and high rate deformation processes. While the contract was awarded for a period of three years, it was actually funded only for the first year. Nonetheless, significant progress can be reported as a direct result of this project.

  17. BOOK REVIEW: Numerical Relativity: Solving Einstein's Equations on the Computer Numerical Relativity: Solving Einstein's Equations on the Computer

    Science.gov (United States)

    Gourgoulhon, Eric

    2011-04-01

    clearly the research work of one of the authors, but it is also an opportunity to discuss the Cosmic Censorship conjecture and the Hoop conjecture. Chapter 11 presents the basics of hyperbolic systems and focuses on the famous BSSN formalism employed in most numerical codes. The electromagnetism analogy introduced in chapter 2 is developed, providing some very useful insight. The remainder of the book is devoted to the collapse of rotating stars (chapter 14) and to the coalescence of binary systems of compact objects, either neutron stars or black holes (chapters 12, 13, 15, 16 and 17). This is a unique introduction and review of results about the expected main sources of gravitational radiation. It includes a detailed presentation of the major triumph of numerical relativity: the successful computation of binary black hole merger. I think that Baumgarte and Shapiro have accomplished a genuine tour de force by writing such a comprehensive and self-contained textbook on a highly evolving subject. The primary value of the book is to be extremely pedagogical. The style is definitively at the textbook level and not that of a review article. One may point out the use of boxes to recap important results and the very instructive aspect of many figures, some of them in colour. There are also numerous exercises in the main text, to encourage the reader to find some useful results by himself. The pedagogical trend is manifest up to the book cover, with the subtitle explaining what the title means! Another great value of the book is indisputably its encyclopedic aspect, making it a very good starting point for research on many topics of modern relativity. I have no doubt that Baumgarte and Shapiro's monograph will quicken considerably the learning phase of any master or PhD student beginning numerical relativity. It will also prove to be very valuable for all researchers of the field and should become a major reference. Beyond numerical relativity, the richness and variety of

  18. Numerical analysis

    CERN Document Server

    Scott, L Ridgway

    2011-01-01

    Computational science is fundamentally changing how technological questions are addressed. The design of aircraft, automobiles, and even racing sailboats is now done by computational simulation. The mathematical foundation of this new approach is numerical analysis, which studies algorithms for computing expressions defined with real numbers. Emphasizing the theory behind the computation, this book provides a rigorous and self-contained introduction to numerical analysis and presents the advanced mathematics that underpin industrial software, including complete details that are missing from m

  19. Visualizing History: Computer Technology and the Graphic Presentation of the Past

    Science.gov (United States)

    Moss, Mark

    2004-01-01

    Computer technology has impacted both the study and idea of history in a number of ways. The Internet has provided numerous web-sites for students to read, see and look into for historical information. Historians, both professional and public have also begun to utilize the computer in a variety of ways, both in academic terms as well as leisure…

  20. Numerics of High Performance Computers and Benchmark Evaluation of Distributed Memory Computers

    Directory of Open Access Journals (Sweden)

    H. S. Krishna

    2004-07-01

    Full Text Available The internal representation of numerical data, their speed of manipulation to generate the desired result through efficient utilisation of central processing unit, memory, and communication links are essential steps of all high performance scientific computations. Machine parameters, in particular, reveal accuracy and error bounds of computation, required for performance tuning of codes. This paper reports diagnosis of machine parameters, measurement of computing power of several workstations, serial and parallel computers, and a component-wise test procedure for distributed memory computers. Hierarchical memory structure is illustrated by block copying and unrolling techniques. Locality of reference for cache reuse of data is amply demonstrated by fast Fourier transform codes. Cache and register-blocking technique results in their optimum utilisation with consequent gain in throughput during vector-matrix operations. Implementation of these memory management techniques reduces cache inefficiency loss, which is known to be proportional to the number of processors. Of the two Linux clusters-ANUP16, HPC22 and HPC64, it has been found from the measurement of intrinsic parameters and from application benchmark of multi-block Euler code test run that ANUP16 is suitable for problems that exhibit fine-grained parallelism. The delivered performance of ANUP16 is of immense utility for developing high-end PC clusters like HPC64 and customised parallel computers with added advantage of speed and high degree of parallelism.

  1. Energy management programs - computer technology, a tool

    Energy Technology Data Exchange (ETDEWEB)

    Perron, G

    1996-08-01

    Energy management systems were defined and reviewed, focusing on how the development in computer technology has impacted on the development of energy management systems. It was shown that the rise of micro-computer systems made it possible to create a tool that is well adapted to the urgent need for optimizing electromechanical systems to meet energy reduction criteria while still maintaining occupant comfort. Two case studies were cited to show the kind of savings realized by the different energy management systems installed. Besides managing energy, energy management systems can also help in detecting certain operating failures or irregularities in equipment configurations, monitoring and measuring energy consumption, as well as performing such peripherally related functions as gathering data about operating and space temperatures.

  2. Applications of computational intelligence in biomedical technology

    CERN Document Server

    Majernik, Jaroslav; Pancerz, Krzysztof; Zaitseva, Elena

    2016-01-01

    This book presents latest results and selected applications of Computational Intelligence in Biomedical Technologies. Most of contributions deal with problems of Biomedical and Medical Informatics, ranging from theoretical considerations to practical applications. Various aspects of development methods and algorithms in Biomedical and Medical Informatics as well as Algorithms for medical image processing, modeling methods are discussed. Individual contributions also cover medical decision making support, estimation of risks of treatments, reliability of medical systems, problems of practical clinical applications and many other topics  This book is intended for scientists interested in problems of Biomedical Technologies, for researchers and academic staff, for all dealing with Biomedical and Medical Informatics, as well as PhD students. Useful information is offered also to IT companies, developers of equipment and/or software for medicine and medical professionals.  .

  3. Improving student retention in computer engineering technology

    Science.gov (United States)

    Pierozinski, Russell Ivan

    The purpose of this research project was to improve student retention in the Computer Engineering Technology program at the Northern Alberta Institute of Technology by reducing the number of dropouts and increasing the graduation rate. This action research project utilized a mixed methods approach of a survey and face-to-face interviews. The participants were male and female, with a large majority ranging from 18 to 21 years of age. The research found that participants recognized their skills and capability, but their capacity to remain in the program was dependent on understanding and meeting the demanding pace and rigour of the program. The participants recognized that curriculum delivery along with instructor-student interaction had an impact on student retention. To be successful in the program, students required support in four domains: academic, learning management, career, and social.

  4. DIGITAL ERA: UTILIZE OF CLOUD COMPUTING TECHNOLOGY IN DIGITAL LIBRARY

    OpenAIRE

    T. RAGHUNADHA REDDY

    2012-01-01

    With the purpose of applying cloud computing to digital library, the paper initially describes cloud computing and analyzes current status of cloud computing in digital library. Then it proposes the architecture of cloud computing in digital library and summarises the application of cloud computing in digital library. Finally the author brings out the future improvement in digital library using cloud computing technology.

  5. Computer vision technology in log volume inspection

    Institute of Scientific and Technical Information of China (English)

    2002-01-01

    Log volume inspection is very important in forestry research and paper making engineering. This paper proposed a novel approach based on computer vision technology to cope with log volume inspection. The needed hardware system was analyzed and the details of the inspection algorithms were given. A fuzzy entropy based on image enhancement algorithm was presented for enhancing the image of the cross-section of log. In many practical applications the cross-section is often partially invisible, and this is the major obstacle for correct inspection. To solve this problem, a robust Hausdorff distance method was proposed to recover the whole cross-section. Experiment results showed that this method was efficient.

  6. Computer Education and Instructional Technology Prospective Teachers’ Perceptions of Technology

    Directory of Open Access Journals (Sweden)

    Ümmü Gülsüm DURUKAN

    2016-04-01

    Full Text Available The purpose of this study is to determine the “technology” perception of prospective computer and instructional technologies (CEIT teachers by metaphors. For this purpose the study was carried out with 53 first-year prospective teachers studying in the Department of CEIT in a public university in the fall term of 2014-2015 academic year. The forms consisting of the statement “Technology is like ……………because ………” written few times were used as a data collection tool. Phenomenography design was used in the study and the data were analyzed by content analysis. According to the study's findings, it was found that out of 118 valid metaphors developed by the prospective teachers, 103 of them were included in positive category, 7 were in negative category and 8 were in the neutral category.

  7. An efficient numerical integral in three-dimensional electromagnetic field computations

    Science.gov (United States)

    Whetten, Frank L.; Liu, Kefeng; Balanis, Constantine A.

    1990-01-01

    An improved algorithm for efficiently computing a sinusoid and an exponential integral commonly encountered in method-of-moments solutions is presented. The new algorithm has been tested for accuracy and computer execution time against both numerical integration and other existing numerical algorithms, and has outperformed them. Typical execution time comparisons on several computers are given.

  8. Evaluating Computer Technology Integration in a Centralized School System

    Science.gov (United States)

    Eteokleous, N.

    2008-01-01

    The study evaluated the current situation in Cyprus elementary classrooms regarding computer technology integration in an attempt to identify ways of expanding teachers' and students' experiences with computer technology. It examined how Cypriot elementary teachers use computers, and the factors that influence computer integration in their…

  9. International Conference on Computers and Advanced Technology in Education

    CERN Document Server

    Advanced Information Technology in Education

    2012-01-01

    The volume includes a set of selected papers extended and revised from the 2011 International Conference on Computers and Advanced Technology in Education. With the development of computers and advanced technology, the human social activities are changing basically. Education, especially the education reforms in different countries, has been experiencing the great help from the computers and advanced technology. Generally speaking, education is a field which needs more information, while the computers, advanced technology and internet are a good information provider. Also, with the aid of the computer and advanced technology, persons can make the education an effective combination. Therefore, computers and advanced technology should be regarded as an important media in the modern education. Volume Advanced Information Technology in Education is to provide a forum for researchers, educators, engineers, and government officials involved in the general areas of computers and advanced technology in education to d...

  10. COMPUTER NUMERICAL SIMULATION OF MECHANICAL PROPERTIES OF TUNGSTEN HEAVY ALLOYS

    Institute of Scientific and Technical Information of China (English)

    1999-01-01

    A microstructure model of tungsten heavy alloys has been developed. On the basis of the model and several assumptions, the macro-mechanical properties of 90 W heavy alloy under quasi-static tensile deformation and the effects of microstructural parameters (mechanical properties of the matrix phase and tungsten content) on them have been analyzed by computer numerical simulation. The mechanical properties of the alloy have been found to be dependent on the mechanical parameters of the matrix phase. As the elastic modulus and yield strength of the matrix phase increase, the tensile strength of the alloy increases, while the elongation decreases. If the mechanical parameters except the tensile strength of the matrix phase are constant, both the tensile strength and the elongation of the alloy increase linearly with the increase of tensile strength of the matrix phase. The properties of the alloy are very sensitive to the hardening modulus of the matrix phase. As the hardening modulus increases, both the tensile strength and the elongation of the alloy exponentially decrease. The elongation of the alloys monotonically decreases with the increase of tungsten content, while the decrease of tensile strength is not monotonic. When the tungsten content < 85 %, the strength of tungsten heavy alloys increases with the increase of tungsten content, while decreases when the tungsten content >85 %. The maximum of tensile strength of the alloys appears at the tungsten content of 85 %. The results showed that the binder phase with a higher strength and a lower hardening modulus is advantageous to obtaining an optimum combination of mechanical properties of tungsten heavy alloys.

  11. 管壳式换热器数值模拟的并行计算技术研究%Study on Parallel Computing Technology for Numerical Simulation of Shell-and-Tube Heat Exchangers

    Institute of Scientific and Technical Information of China (English)

    郭崇志; 肖乐

    2011-01-01

    利用并行计算原理,在FLUENT软件中对GAMBIT建模的管壳式换热器进行了数值模拟.通过对3种组合计算平台所消耗的机时进行比较,得到并行加速比和并行效率的规律,为复杂的管壳式换热器壳程设计的工程仿真和优化提供了一种新的处理方法.%Making use of parallel computing theory, the model for shell-and-tube heat exchangers was established with GAMBIT and simulated with FLUENT. The time of simulating three computing platforms were compared to get the trend of acceleration ratio and parallel efficiency so as to provide a new approach for design simulation and optimization of complicated shell-and-tube heat exchangers.

  12. On the development trend of computer application technology

    Institute of Scientific and Technical Information of China (English)

    Zhang Zhi

    2014-01-01

    The development of computer application technology for people living and working has a very important significance. Dependent on computers are increasingly high. It put forward the development of computer application technology higher requirements. Only constant reform and renewal can meet the needs of social development. It is the only way to meet the development of the concept of sustainable development, and provide ongoing tech driving force for China's development. Based on this, the development trend of computer technology is discused.

  13. Computer-aided design and computer science technology

    Science.gov (United States)

    Fulton, R. E.; Voigt, S. J.

    1976-01-01

    A description is presented of computer-aided design requirements and the resulting computer science advances needed to support aerospace design. The aerospace design environment is examined, taking into account problems of data handling and aspects of computer hardware and software. The interactive terminal is normally the primary interface between the computer system and the engineering designer. Attention is given to user aids, interactive design, interactive computations, the characteristics of design information, data management requirements, hardware advancements, and computer science developments.

  14. Beam damage detection using computer vision technology

    Science.gov (United States)

    Shi, Jing; Xu, Xiangjun; Wang, Jialai; Li, Gong

    2010-09-01

    In this paper, a new approach for efficient damage detection in engineering structures is introduced. The key concept is to use the mature computer vision technology to capture the static deformation profile of a structure, and then employ profile analysis methods to detect the locations of the damages. By combining with wireless communication techniques, the proposed approach can provide an effective and economical solution for remote monitoring of structure health. Moreover, a preliminary experiment is conducted to verify the proposed concept. A commercial computer vision camera is used to capture the static deformation profiles of cracked cantilever beams under loading. The profiles are then processed to reveal the existence and location of the irregularities on the deformation profiles by applying fractal dimension, wavelet transform and roughness methods, respectively. The proposed concept is validated on both one-crack and two-crack cantilever beam-type specimens. It is also shown that all three methods can produce satisfactory results based on the profiles provided by the vision camera. In addition, the profile quality is the determining factor for the noise level in resultant detection signal.

  15. The Invisible Barrier to Integrating Computer Technology in Education

    Science.gov (United States)

    Aflalo, Ester

    2014-01-01

    The article explores contradictions in teachers' perceptions regarding the place of computer technologies in education. The research population included 47 teachers who have incorporated computers in the classroom for several years. The teachers expressed positive attitudes regarding the decisive importance of computer technologies in furthering…

  16. Computer Science and Technology Publications. NBS Publications List 84.

    Science.gov (United States)

    National Bureau of Standards (DOC), Washington, DC. Inst. for Computer Sciences and Technology.

    This bibliography lists publications of the Institute for Computer Sciences and Technology of the National Bureau of Standards. Publications are listed by subject in the areas of computer security, computer networking, and automation technology. Sections list publications of: (1) current Federal Information Processing Standards; (2) computer…

  17. Computing, Information, and Communications Technology (CICT) Program Overview

    Science.gov (United States)

    VanDalsem, William R.

    2003-01-01

    The Computing, Information and Communications Technology (CICT) Program's goal is to enable NASA's Scientific Research, Space Exploration, and Aerospace Technology Missions with greater mission assurance, for less cost, with increased science return through the development and use of advanced computing, information and communication technologies

  18. Computational Notes on the Numerical Analysis of Galactic Rotation Curves

    CERN Document Server

    Scelza, G

    2014-01-01

    In this paper we present a brief discussion on the salient points of the computational analysis that are at the basis of the paper \\cite{StSc}. The computational and data analysis have been made with the software Mathematica$^\\circledR$ and presented at Mathematica Italia User Group Meeting 2011.

  19. Numerical Computation of Large Amplitude Internal Solitary Waves,

    Science.gov (United States)

    1981-03-20

    provide adequate resolution. All computations were performed on a CDC Cyber 176 computer, and it takes slightly less than one CPU second to obtain a...H. Segur , Lgn Internal Waves in Fluids of Great Depth, Studies in Applied Math., 62 (1980), pp. 249-262. [3] E. Allgower and K. Georg, Simlicial -and

  20. Numerical computation of nonlinear normal modes in mechanical engineering

    Science.gov (United States)

    Renson, L.; Kerschen, G.; Cochelin, B.

    2016-03-01

    This paper reviews the recent advances in computational methods for nonlinear normal modes (NNMs). Different algorithms for the computation of undamped and damped NNMs are presented, and their respective advantages and limitations are discussed. The methods are illustrated using various applications ranging from low-dimensional weakly nonlinear systems to strongly nonlinear industrial structures.

  1. The Application of Visual Basic Computer Programming Language to Simulate Numerical Iterations

    OpenAIRE

    Abdulkadir Baba HASSAN; Matthew Sunday ABOLARIN; Onawola Hassan JIMOH

    2006-01-01

    This paper examines the application of Visual Basic Computer Programming Language to Simulate Numerical Iterations, the merit of Visual Basic as a Programming Language and the difficulties faced when solving numerical iterations analytically, this research paper encourage the uses of Computer Programming methods for the execution of numerical iterations and finally fashion out and develop a reliable solution using Visual Basic package to write a program for some selected iteration problems.

  2. The Application of Visual Basic Computer Programming Language to Simulate Numerical Iterations

    Directory of Open Access Journals (Sweden)

    Abdulkadir Baba HASSAN

    2006-06-01

    Full Text Available This paper examines the application of Visual Basic Computer Programming Language to Simulate Numerical Iterations, the merit of Visual Basic as a Programming Language and the difficulties faced when solving numerical iterations analytically, this research paper encourage the uses of Computer Programming methods for the execution of numerical iterations and finally fashion out and develop a reliable solution using Visual Basic package to write a program for some selected iteration problems.

  3. Numerical Modeling and Simulation of the Movable Contact Tool-Workpiece and Application in Technological Processes

    Directory of Open Access Journals (Sweden)

    Leon Kukielka

    2010-06-01

    Full Text Available Grinding, embossing, burnishing, thread rolling, drawing, cutting, turning are very complicated technological processes. To increase the quality of the product and minimize the cost of process, we should know the physical phenomena which exist during the process. The phenomena on a typical incremental step were described using a step-by-step incremental procedure, with an updated Lagrange's formulation. The technological processes are considered as geometrical and physical non-linear initial and boundary problems. The finite element method (FEM and the dynamic explicit method (DEM were used to obtain the solution. The application was developed in the ANSYS/LS-DYNA system, which makes possible a complex time analysis of the physical phenomena: states of displacements, strains and stresses. Numerical computations of the strain and stress have been conducted with the use of methodology which requires a proper definition of the contact zone, without the necessity to introduce boundary conditions. Examples of calculations are presented.

  4. Relationships between Computer Self-Efficacy, Technology, Attitudes and Anxiety: Development of the Computer Technology Use Scale (CTUS)

    Science.gov (United States)

    Conrad, Agatha M.; Munro, Don

    2008-01-01

    Two studies are reported which describe the development and evaluation of a new instrument, the Computer Technology Use Scale (CTUS), comprising three domains: computer self-efficacy, attitudes to technology, and technology related anxiety. Study 1 describes the development of the instrument and explores its factor structure. Study 2 used…

  5. DIGITAL ERA: UTILIZE OF CLOUD COMPUTING TECHNOLOGY IN DIGITAL LIBRARY

    Directory of Open Access Journals (Sweden)

    T. RAGHUNADHA REDDY

    2012-09-01

    Full Text Available With the purpose of applying cloud computing to digital library, the paper initially describes cloud computing and analyzes current status of cloud computing in digital library. Then it proposes the architecture of cloud computing in digital library and summarises the application of cloud computing in digital library. Finally the author brings out the future improvement in digital library using cloud computing technology.

  6. Benchmark Numerical Toolkits for High Performance Computing Project

    Data.gov (United States)

    National Aeronautics and Space Administration — Computational codes in physics and engineering often use implicit solution algorithms that require linear algebra tools such as Ax=b solvers, eigenvalue,...

  7. A Financial Technology Entrepreneurship Program for Computer Science Students

    Science.gov (United States)

    Lawler, James P.; Joseph, Anthony

    2011-01-01

    Education in entrepreneurship is becoming a critical area of curricula for computer science students. Few schools of computer science have a concentration in entrepreneurship in the computing curricula. The paper presents Technology Entrepreneurship in the curricula at a leading school of computer science and information systems, in which students…

  8. Computational Fluid Dynamics. [numerical methods and algorithm development

    Science.gov (United States)

    1992-01-01

    This collection of papers was presented at the Computational Fluid Dynamics (CFD) Conference held at Ames Research Center in California on March 12 through 14, 1991. It is an overview of CFD activities at NASA Lewis Research Center. The main thrust of computational work at Lewis is aimed at propulsion systems. Specific issues related to propulsion CFD and associated modeling will also be presented. Examples of results obtained with the most recent algorithm development will also be presented.

  9. Pulse cleaning flow models and numerical computation of candle ceramic filters

    Institute of Scientific and Technical Information of China (English)

    2002-01-01

    Analytical and numerical computed models are developed for reverse pulse cleaning system of candle ceramic filters. A standard turbulent model is demonstrated suitably to the designing computation of reverse pulse cleaning system from the experimental and onedimensional computational result. The computed results can be used to guide the designing of reverse pulse cleaning system, which is optimum Venturi geometry. From the computed results, the general conclusions and the designing methods are obtained.

  10. 3D Printing device adaptable to Computer Numerical Control (CNC)

    OpenAIRE

    Gardan, Julien; DANESI, Frédéric; Roucoules, Lionel; Schneider, A

    2014-01-01

    This article presents the development of a 3D printing device for the additive manufacturing adapted to a CNC machining. The application involves the integration of a specific printing head. Additive manufacturing technology is most commonly used for modeling, prototyping, tooling through an exclusive machine or 3D printer. A global review and analysis of technologies show the additive manufacturing presents little independent solutions [6][9]. The problem studied especially the additive manu...

  11. 3rd International Conference on Computer & Communication Technologies

    CERN Document Server

    Bhateja, Vikrant; Raju, K; Janakiramaiah, B

    2017-01-01

    The book is a compilation of high-quality scientific papers presented at the 3rd International Conference on Computer & Communication Technologies (IC3T 2016). The individual papers address cutting-edge technologies and applications of soft computing, artificial intelligence and communication. In addition, a variety of further topics are discussed, which include data mining, machine intelligence, fuzzy computing, sensor networks, signal and image processing, human-computer interaction, web intelligence, etc. As such, it offers readers a valuable and unique resource.

  12. Numerical computation of the critical energy constant for two-dimensional Boussinesq equations

    Science.gov (United States)

    Kolkovska, N.; Angelow, K.

    2015-10-01

    The critical energy constant is of significant interest for the theoretical and numerical analysis of Boussinesq type equations. In the one-dimensional case this constant is evaluated exactly. In this paper we propose a method for numerical evaluation of this constant in the multi-dimensional cases by computing the ground state. Aspects of the numerical implementation are discussed and many numerical results are demonstrated.

  13. Cloud Computing. Technology Briefing. Number 1

    Science.gov (United States)

    Alberta Education, 2013

    2013-01-01

    Cloud computing is Internet-based computing in which shared resources, software and information are delivered as a service that computers or mobile devices can access on demand. Cloud computing is already used extensively in education. Free or low-cost cloud-based services are used daily by learners and educators to support learning, social…

  14. Advanced Numerical Methods for Computing Statistical Quantities of Interest

    Science.gov (United States)

    2014-07-10

    illustrations. =⇒ White noise random fields are in ubiquitous use in practice for modeling uncertainty in complex systems, despite the fact that the...differential equations with jumps for a class of nonlocal diffusion problems; submitted. We developed a novel numerical approach for linear nonlocal ...differential equations (BSDEs) driven by Lèvy processes with jumps. The nonlocal diffusion problem under consideration was converted into a BSDE, for which

  15. Numerical

    Directory of Open Access Journals (Sweden)

    M. Boumaza

    2015-07-01

    Full Text Available Transient convection heat transfer is of fundamental interest in many industrial and environmental situations, as well as in electronic devices and security of energy systems. Transient fluid flow problems are among the more difficult to analyze and yet are very often encountered in modern day technology. The main objective of this research project is to carry out a theoretical and numerical analysis of transient convective heat transfer in vertical flows, when the thermal field is due to different kinds of variation, in time and space of some boundary conditions, such as wall temperature or wall heat flux. This is achieved by the development of a mathematical model and its resolution by suitable numerical methods, as well as performing various sensitivity analyses. These objectives are achieved through a theoretical investigation of the effects of wall and fluid axial conduction, physical properties and heat capacity of the pipe wall on the transient downward mixed convection in a circular duct experiencing a sudden change in the applied heat flux on the outside surface of a central zone.

  16. Attitudes to Technology, Perceived Computer Self-Efficacy and Computer Anxiety as Predictors of Computer Supported Education

    Science.gov (United States)

    Celik, Vehbi; Yesilyurt, Etem

    2013-01-01

    There is a large body of research regarding computer supported education, perceptions of computer self-efficacy, computer anxiety and the technological attitudes of teachers and teacher candidates. However, no study has been conducted on the correlation between and effect of computer supported education, perceived computer self-efficacy, computer…

  17. Attitudes to Technology, Perceived Computer Self-Efficacy and Computer Anxiety as Predictors of Computer Supported Education

    Science.gov (United States)

    Celik, Vehbi; Yesilyurt, Etem

    2013-01-01

    There is a large body of research regarding computer supported education, perceptions of computer self-efficacy, computer anxiety and the technological attitudes of teachers and teacher candidates. However, no study has been conducted on the correlation between and effect of computer supported education, perceived computer self-efficacy, computer…

  18. Intelligent manufacturing system of impeller for computer numerical control (CNC) programming based on KBE

    Institute of Scientific and Technical Information of China (English)

    王凌云; 黄红辉; 王大中

    2014-01-01

    To solve the problem of advanced digital manufacturing technology in the practical application, a knowledge engineering technology was introduced into the computer numerical control (CNC) programming. The knowledge acquisition, knowledge representation and reasoning used in CNC programming were researched. The CNC programming system functional architecture of impeller parts based on knowledge based engineering (KBE) was constructed. The structural model of the general knowledge-based system (KBS) was also constructed. The KBS of CNC programming system was established through synthesizing database technology and knowledge base theory. And in the context of corporate needs, based on the knowledge-driven manufacturing platform (i.e. UG CAD/CAM), VC++6.0 and UG/Open, the KBS and UG CAD/CAM were integrated seamlessly and the intelligent CNC programming KBE system for the impeller parts was developed by integrating KBE and UG CAD/CAM system. A method to establish standard process templates was proposed, so as to develop the intelligent CNC programming system in which CNC machining process and process parameters were standardized by using this KBE system. For the impeller parts processing, the method applied in the development of the prototype system is proven to be viable, feasible and practical.

  19. International Conference on Numerical Grid Generation in Computational Fluid Dynamics

    Science.gov (United States)

    1989-04-30

    Grun Convex Computer Corporation Brunnenstr. 17 701 Piano Road 8049 Bachenhausen Richardson Germany TX 75081 Chunyuan Gu J. E.Holcomb Dept. of Gas...Lab System Dynamics Inc. L-95, PO Box 808 1211 N.W. 10th Avenue Livermore, CA 94550 Gainesville FL 32601 Bernadette Palmero Azine Renzo Universite de

  20. Bioinformatics and Computational Core Technology Center

    Data.gov (United States)

    Federal Laboratory Consortium — SERVICES PROVIDED BY THE COMPUTER CORE FACILITYEvaluation, purchase, set up, and maintenance of the computer hardware and network for the 170 users in the research...

  1. Bioinformatics and Computational Core Technology Center

    Data.gov (United States)

    Federal Laboratory Consortium — SERVICES PROVIDED BY THE COMPUTER CORE FACILITY Evaluation, purchase, set up, and maintenance of the computer hardware and network for the 170 users in the research...

  2. Computer-based numerical simulations of adsorption in nanostructures

    Science.gov (United States)

    Khashimova, Diana

    2014-08-01

    Zeolites are crystalline oxides with uniform, molecular-pore diameters of 3-14Å. Significant developments since 1950 made production of synthetic zeolites with high purity and controlled chemical composition possible. In powder-form, zeolites are major role-players in high-tech, industrial catalysis, adsorption, and ion exchange applications. Understanding properties of thin-film zeolites has been a focus of recent research. The ability to fine-tune desired macroscopic properties by controlled alteration at the molecular level is paramount. The relationships between macroscopic and molecular-level properties are established by experimental research. Because generating macroscopic, experimental data in a controlled laboratory can be prohibitively costly and time-consuming, reliable numerical simulations, which remove such difficulties, are an attractive alternative. Using a Configurational Biased Monte Carlo (CBMC) approach in grand canonical ensemble, numerical models for pure component and multicomponent adsorption processes were developed. Theoretical models such as ideal (IAST) and real adsorbed solution theory (RAST) to predict mixture adsorption in nanopores were used for comparison. Activity coefficients used in RAST calculations were determined from the Wilson, spreading pressure and COSMO-RS models. Investigative testing of the method on known materials, represented by all-silica zeolites such as MFI (channel type) and DDR (cage type), proved successful in replicating experimental data on adsorption of light hydrocarbons - alkanes, such as methane, ethane, propane and butane. Additionally, adsorption of binary and ternary mixtures was simulated. The given numerical approach developed can be a powerful, cost and time saving tool to predict process characteristics for different molecular-structure configurations. The approach used here for simulating adsorption properties of nanopore materials including process characteristics, may have great potential for

  3. Numerical Methods for Computing Turbulence-Induced Noise

    Science.gov (United States)

    2005-12-16

    consider the finite dimensional subspace Vhl C Vh . Let vhi -= phlu be the optimal representation of u in Vhl and phi : V+_+ Vhl be the appropriate...mapping. We consider the following numerical method which is obtained by replacing h with hi in (2.4). Find uhl E Vhi , such that B(whi, uhl) + M(whUhl, f...the same functional form of the model that leads to the optimal solution on Vh, also leads to the optimal solution on Vhi . Thus, requiring uhl = vh

  4. African Journals Online: Technology, Computer Science ...

    African Journals Online (AJOL)

    Items 1 - 29 of 29 ... The Ethiopian Journal of Science and Technology (EJST) publishes high .... Sciences is an international journal reporting significant new results in all .... general technology rocketry, space and astronomy, earth sciences, ...

  5. Coordinate Systems, Numerical Objects and Algorithmic Operations of Computational Experiment in Fluid Mechanics

    Directory of Open Access Journals (Sweden)

    Degtyarev Alexander

    2016-01-01

    Full Text Available The paper deals with the computer implementation of direct computational experiments in fluid mechanics, constructed on the basis of the approach developed by the authors. The proposed approach allows the use of explicit numerical scheme, which is an important condition for increasing the effciency of the algorithms developed by numerical procedures with natural parallelism. The paper examines the main objects and operations that let you manage computational experiments and monitor the status of the computation process. Special attention is given to a realization of tensor representations of numerical schemes for direct simulation; b realization of representation of large particles of a continuous medium motion in two coordinate systems (global and mobile; c computing operations in the projections of coordinate systems, direct and inverse transformation in these systems. Particular attention is paid to the use of hardware and software of modern computer systems.

  6. Cosmic Reionization On Computers: Numerical and Physical Convergence

    CERN Document Server

    Gnedin, Nickolay Y

    2016-01-01

    In this paper I show that simulations of reionization performed under the Cosmic Reionization On Computers (CROC) project do converge in space and mass, albeit rather slowly. A fully converged solution (for a given star formation and feedback model) can be determined at a level of precision of about 20%, but such a solution is useless in practice, since achieving it in production-grade simulations would require a large set of runs at various mass and spatial resolutions, and computational resources for such an undertaking are not yet readily available. In order to make progress in the interim, I introduce a weak convergence correction factor in the star formation recipe, which allows one to approximate the fully converged solution with finite resolution simulations. The accuracy of weakly converged simulations approaches a comparable, ~20% level of precision for star formation histories of individual galactic halos and other galactic properties that are directly related to star formation rates, like stellar m...

  7. Exact Symbolic-Numeric Computation of Planar Algebraic Curves

    CERN Document Server

    Berberich, Eric; Kobel, Alexander; Sagraloff, Michael

    2012-01-01

    We present a novel certified and complete algorithm to compute arrangements of real planar algebraic curves. It provides a geometric-topological analysis of the decomposition of the plane induced by a finite number of algebraic curves in terms of a cylindrical algebraic decomposition. From a high-level perspective, the overall method splits into two main subroutines, namely an algorithm denoted Bisolve to isolate the real solutions of a zero-dimensional bivariate system, and an algorithm denoted GeoTop to analyze a single algebraic curve. Compared to existing approaches based on elimination techniques, we considerably improve the corresponding lifting steps in both subroutines. As a result, generic position of the input system is never assumed, and thus our algorithm never demands for any change of coordinates. In addition, we significantly limit the types of involved exact operations, that is, we only use resultant and gcd computations as purely symbolic operations. The latter results are achieved by combini...

  8. Numerical computation of constant mean curvature surfaces using finite elements

    CERN Document Server

    Metzger, J

    2004-01-01

    This paper presents a method for computing two-dimensional constant mean curvature surfaces. The method in question uses the variational aspect of the problem to implement an efficient algorithm. In principle it is a flow like method in that it is linked to the gradient flow for the area functional, which gives reliable convergence properties. In the background a preconditioned conjugate gradient method works, that gives the speed of a direct elliptic multigrid method.

  9. Numerical Computational Technique for Scattering from Underwater Objects

    Directory of Open Access Journals (Sweden)

    T. Ratna Mani

    2013-01-01

    Full Text Available Normal 0 false false false EN-IN X-NONE X-NONE MicrosoftInternetExplorer4 This paper presents a computational technique for mono-static and bi-static scattering from underwater objects of different shape such as submarines. The scatter has been computed using finite element time domain (FETD method, based on the superposition of reflections, from the different elements reaching the receiver at a particular instant in time. The results calculated by this method has been verified with the published results based on ramp response technique. An in-depth parametric study has been carried out, by considering different pulse frequency, pulse length, pulse type (CW, LFM , SFM, sampling frequency, as well as different size , shape of the scatteringbody and grid size. It has been observed that increasing the pulse frequency, sampling frequency and number of elements leads to improved results. However, good amount of accuracy has been achieved with element size less than one third of wave length. The experimental result of the underwater object has been found very close to the`simulated result. This technique is useful for computing forward scatter for inverse scattering applications and as well as to generate forward scatter of very narrow and wide band signals of any pulse type and shape of body.Defence Science Journal, 2013, 63(1, pp.119-126, DOI:http://dx.doi.org/10.14429/dsj.63.779

  10. Numerical Computational Technique for Scattering from Underwater Objects

    Directory of Open Access Journals (Sweden)

    T. Ratna Mani

    2013-01-01

    Full Text Available This paper presents a computational technique for mono-static and bi-static scattering from underwater objects of different shape such as submarines. The scatter has been computed using finite element time domain (FETD method, based on the superposition of reflections ,from the different elements reaching the receiver at a particular instant in time. The results calculated by this method has been verified with the published results based on ramp response technique. An in-depth parametric study has been carried out, by considering different pulse frequency, pulse length, pulse type (CW, LFM , SFM, sampling frequency, as well as different size , shape of the scattering body and grid size. It has been observed that increasing the pulse frequency, sampling frequency and number of elements leads to improved results. However, good amount of accuracy has been achieved with element size less than one third of wave length. The experimental result of the underwater object has been found very close to the `simulated result. This technique is useful for computing forward scatter for inverse scattering applications and as well as to generate forward scatter of very narrow and wide band signals of any pulse type and shape of body.

  11. 3rd ACIS International Conference on Applied Computing and Information Technology

    CERN Document Server

    2016-01-01

    This edited book presents scientific results of the 3nd International Conference on Applied Computing and Information Technology (ACIT 2015) which was held on July 12-16, 2015 in Okayama, Japan. The aim of this conference was to bring together researchers and scientists, businessmen and entrepreneurs, teachers, engineers, computer users, and students to discuss the numerous fields of computer science and to share their experiences and exchange new ideas and information in a meaningful way. Research results about all aspects (theory, applications and tools) of computer and information science, and to discuss the practical challenges encountered along the way and the solutions adopted to solve them.

  12. Advances in Computing and Information Technology : Proceedings of the Second International Conference on Advances in Computing and Information Technology

    CERN Document Server

    Nagamalai, Dhinaharan; Chaki, Nabendu

    2013-01-01

    The international conference on Advances in Computing and Information technology (ACITY 2012) provides an excellent international forum for both academics and professionals for sharing knowledge and results in theory, methodology and applications of Computer Science and Information Technology. The Second International Conference on Advances in Computing and Information technology (ACITY 2012), held in Chennai, India, during July 13-15, 2012, covered a number of topics in all major fields of Computer Science and Information Technology including: networking and communications, network security and applications, web and internet computing, ubiquitous computing, algorithms, bioinformatics, digital image processing and pattern recognition, artificial intelligence, soft computing and applications. Upon a strength review process, a number of high-quality, presenting not only innovative ideas but also a founded evaluation and a strong argumentation of the same, were selected and collected in the present proceedings, ...

  13. CICT Computing, Information, and Communications Technology Program

    Science.gov (United States)

    Laufenberg, Lawrence; Tu, Eugene (Technical Monitor)

    2002-01-01

    The CICT Program is part of the NASA Aerospace Technology Enterprise's fundamental technology thrust to develop tools. processes, and technologies that enable new aerospace system capabilities and missions. The CICT Program's four key objectives are: Provide seamless access to NASA resources- including ground-, air-, and space-based distributed information technology resources-so that NASA scientists and engineers can more easily control missions, make new scientific discoveries, and design the next-generation space vehicles, provide high-data delivery from these assets directly to users for missions, develop goal-oriented human-centered systems, and research, develop and evaluate revolutionary technology.

  14. Research in progress in applied mathematics, numerical analysis, fluid mechanics, and computer science

    Science.gov (United States)

    1994-01-01

    This report summarizes research conducted at the Institute for Computer Applications in Science and Engineering in applied mathematics, fluid mechanics, and computer science during the period October 1, 1993 through March 31, 1994. The major categories of the current ICASE research program are: (1) applied and numerical mathematics, including numerical analysis and algorithm development; (2) theoretical and computational research in fluid mechanics in selected areas of interest to LaRC, including acoustics and combustion; (3) experimental research in transition and turbulence and aerodynamics involving LaRC facilities and scientists; and (4) computer science.

  15. Accelerated Numerical Processing API Based on GPU Technology Project

    Data.gov (United States)

    National Aeronautics and Space Administration — The recent performance increases in graphics processing units (GPUs) have made graphics cards an attractive platform for implementing computationally intense...

  16. Identification of risk factors of computer information technologies in education.

    OpenAIRE

    Hrebniak M.P.; Shchudro S.A.; Yakimova K.O.

    2014-01-01

    The basic direction of development of secondary school and vocational training is computer training of schoolchildren and students, including distance forms of education and widespread usage of world information systems. The purpose of the work is to determine risk factors for schoolchildren and students, when using modern information and computer technologies. Results of researches allowed to establish dynamics of formation of skills using computer information technologies in education and c...

  17. Computational thermodynamics and informational technologies in the field of computer design of materials

    Directory of Open Access Journals (Sweden)

    Udovsky A.L.

    2002-01-01

    Full Text Available Computational thermodynamics and informational technologies in the field of computer desing of materials as well as appliance of CALPHAD method on resolution of thermodynamic problems are presented in this paper.

  18. COSMIC REIONIZATION ON COMPUTERS: NUMERICAL AND PHYSICAL CONVERGENCE

    Energy Technology Data Exchange (ETDEWEB)

    Gnedin, Nickolay Y., E-mail: gnedin@fnal.gov [Particle Astrophysics Center, Fermi National Accelerator Laboratory, Batavia, IL 60510 (United States); Kavli Institute for Cosmological Physics, University of Chicago, Chicago, IL 60637 (United States); Department of Astronomy and Astrophysics, University of Chicago, Chicago, IL 60637 (United States)

    2016-04-10

    In this paper I show that simulations of reionization performed under the Cosmic Reionization On Computers project do converge in space and mass, albeit rather slowly. A fully converged solution (for a given star formation and feedback model) can be determined at a level of precision of about 20%, but such a solution is useless in practice, since achieving it in production-grade simulations would require a large set of runs at various mass and spatial resolutions, and computational resources for such an undertaking are not yet readily available. In order to make progress in the interim, I introduce a weak convergence correction factor in the star formation recipe, which allows one to approximate the fully converged solution with finite-resolution simulations. The accuracy of weakly converged simulations approaches a comparable, ∼20% level of precision for star formation histories of individual galactic halos and other galactic properties that are directly related to star formation rates, such as stellar masses and metallicities. Yet other properties of model galaxies, for example, their H i masses, are recovered in the weakly converged runs only within a factor of 2.

  19. JPRS Report, Science & Technology, USSR: Computers

    Science.gov (United States)

    2007-11-02

    AVTOMATIZATSIYA PROIZVODSTVA, No 1, Jan 87) 69 EDUCATION The Computer Has Come to School (RUSSKIY YAZYK I LITERATURA V KAZAKHSKOY SHKOLE, No 7, Jul 86) 76...avtomatizatsiya proizvodstva", 1987 12770 CSO: 1Ö63/209 75 EDUCATION THE COMPUTER HAS COME TO SCHOOL Alma-Ata RUSSKIY YAZYK I LITERATURA V...and wins over minds and inspires upperclassmen—the avant-garde of computer education. COPYRIGHT: "Russkiy yazyk i literatura v Kazakhskoy shkole

  20. The NumPy array: a structure for efficient numerical computation

    CERN Document Server

    Van Der Walt, Stefan; Varoquaux, Gaël

    2011-01-01

    In the Python world, NumPy arrays are the standard representation for numerical data. Here, we show how these arrays enable efficient implementation of numerical computations in a high-level language. Overall, three techniques are applied to improve performance: vectorizing calculations, avoiding copying data in memory, and minimizing operation counts. We first present the NumPy array structure, then show how to use it for efficient computation, and finally how to share array data with other libraries.

  1. The NumPy array: a structure for efficient numerical computation

    OpenAIRE

    Van der Walt, Stefan; Colbert, S. Chris; Varoquaux, Gaël

    2011-01-01

    International audience; In the Python world, NumPy arrays are the standard representation for numerical data. Here, we show how these arrays enable efficient implementation of numerical computations in a high-level language. Overall, three techniques are applied to improve performance: vectorizing calculations, avoiding copying data in memory, and minimizing operation counts. We first present the NumPy array structure, then show how to use it for efficient computation, and finally how to shar...

  2. An Efficient Method for Solving Spread Option Pricing Problem: Numerical Analysis and Computing

    Directory of Open Access Journals (Sweden)

    R. Company

    2016-01-01

    Full Text Available This paper deals with numerical analysis and computing of spread option pricing problem described by a two-spatial variables partial differential equation. Both European and American cases are treated. Taking advantage of a cross derivative removing technique, an explicit difference scheme is developed retaining the benefits of the one-dimensional finite difference method, preserving positivity, accuracy, and computational time efficiency. Numerical results illustrate the interest of the approach.

  3. Computer-Assisted Technology for the Twice Exceptional

    Science.gov (United States)

    Rizza, Mary

    2006-01-01

    Technology helps students develop coping strategies to deal with various learning differences. Assistive technology is a common intervention provided to students with disabilities and generally varies depending on student need. Within gifted education, the use of computers and technology is concentrated on curricular applications and activities…

  4. Impact of Computer Technology on Design and Craft Education

    Science.gov (United States)

    Thorsteinsson, Gisli

    2014-01-01

    This research aims to answer the question, "How has the use of computer technology benefited the compulsory education system, focusing on Design and Technology?" In order to reply this question, it was necessary to focus on interactive whiteboards, e-portfolios and digital projectors as the main technology formats. An initial literature…

  5. Technology Foundations for Computational Evaluation of Software Security Attributes

    Science.gov (United States)

    2006-12-01

    Technology Foundations for Computational Evaluation of Software Security Attributes Gwendolyn H. Walton Thomas A. Longstaff Richard C...security attributes to the functional behavior of the software . The emergence of CERT’s new function extraction (FX) technology , unavailable to previous... software meets security requirements if they have been specified in behavioral terms. FX technology prescribes effective means to create and record

  6. On Integrating Computer Technology into Our Curriculum

    Institute of Scientific and Technical Information of China (English)

    Jianhua Bai

    2000-01-01

    @@ 1. Introduction When something new and exciting occurs in technology, some of us foreign language teachers tend to become too excited to notice the limitations of the new technology. It is no exception with the current use of multimedia and intemet technology in our curriculum. It is my belief that,without an adequate understanding of its limitations as well as its advantages, we may find ourselves disappointed as we move ahead in integrating the multimedia technology into our instruction in a meaningful way. Therefore, in this paper, I would like to start with the discussion of the limitation of multimedia technology and then discuss how we can make use of this new technology to improve our teaching and learning of Chinese as a foreign language.

  7. Proceeding of 1998-workshop on MHD computations. Study on numerical methods related to plasma confinement

    Energy Technology Data Exchange (ETDEWEB)

    Kako, T.; Watanabe, T. [eds.

    1999-04-01

    This is the proceeding of 'Study on Numerical Methods Related to Plasma Confinement' held in National Institute for Fusion Science. In this workshop, theoretical and numerical analyses of possible plasma equilibria with their stability properties are presented. These are also various talks on mathematical as well as numerical analyses related to the computational methods for fluid dynamics and plasma physics. The 14 papers are indexed individually. (J.P.N.)

  8. New numerical analysis method in computational mechanics: composite element method

    Institute of Scientific and Technical Information of China (English)

    2000-01-01

    A new type of FEM, called CEM (composite element method), is proposed to solve the static and dynamic problems of engineering structures with high accuracy and efficiency. The core of this method is to define two sets of coordinate systems for DOF's description after discretizing the structure, i.e. the nodal coordinate system UFEM(ξ) for employing the conventional FEM, and the field coordinate system UCT(ξ) for utilizing classical theory. Then, coupling these two sets of functional expressions could obtain the composite displacement field U(ξ) of CEM. The computations of the stiffness and mass matrices can follow the conventional procedure of FEM. Since the CEM inherents some good properties of the conventional FEM and classical analytical method, it has the powerful versatility to various complex geometric shapes and excellent approximation. Many examples are presented to demonstrate the ability of CEM.

  9. Numerical Relativity As A Tool For Computational Astrophysics

    CERN Document Server

    Seidel, E; Seidel, Edward; Suen, Wai-Mo

    1999-01-01

    The astrophysics of compact objects, which requires Einstein's theory of general relativity for understanding phenomena such as black holes and neutron stars, is attracting increasing attention. In general relativity, gravity is governed by an extremely complex set of coupled, nonlinear, hyperbolic-elliptic partial differential equations. The largest parallel supercomputers are finally approaching the speed and memory required to solve the complete set of Einstein's equations for the first time since they were written over 80 years ago, allowing one to attempt full 3D simulations of such exciting events as colliding black holes and neutron stars. In this paper we review the computational effort in this direction, and discuss a new 3D multi-purpose parallel code called ``Cactus'' for general relativistic astrophysics. Directions for further work are indicated where appropriate.

  10. New numerical analysis method in computational mechanics: composite element method

    Institute of Scientific and Technical Information of China (English)

    曾攀

    2000-01-01

    A new type of FEM, called CEM (composite element method), is proposed to solve the static and dynamic problems of engineering structures with high accuracy and efficiency. The core of this method is to define two sets of coordinate systems for DOF’ s description after discretizing the structure, i.e. the nodal coordinate system UFEM(ζ) for employing the conventional FEM, and the field coordinate system UCT(ζ) for utilizing classical theory. Then, coupling these two sets of functional expressions could obtain the composite displacement field U(ζ) of CEM. The computations of the stiffness and mass matrices can follow the conventional procedure of FEM. Since the CEM inherents some good properties of the conventional FEM and classical analytical method, it has the powerful versatility to various complex geometric shapes and excellent approximation. Many examples are presented to demonstrate the ability of CEM.

  11. On the use of computation optimization opportunities in computer technologies for applied and computational mathematics problems with prescribed quality characteristics

    Science.gov (United States)

    Babich, M. D.; Zadiraka, V. K.; Lyudvichenko, V. A.; Sergienko, I. V.

    2010-12-01

    The use of various opportunities for computation optimization in computer technologies for applied and computational mathematics problems with prescribed quality characteristics is investigated. More precisely, the choice and determination of computational resources and methods of their efficient use for finding an approximate solution of problems up to prescribed accuracy in a limited amount of processor time are investigated.

  12. Microwave technology for localization of traumatic intracranial bleedings-a numerical simulation study.

    Science.gov (United States)

    Candefjord, Stefan; Winges, Johan; Yu, Yinan; Rylander, Thomas; McKelvey, Tomas

    2013-01-01

    Traumatic brain injury (TBI) is a major public health problem worldwide. Intracranial bleedings represents the most serious complication of TBI and need to be surgically evacuated promptly to save lives and mitigate injury. Microwave technology (MWT) is promising as a complement to computed tomography (CT) to be used in road and air ambulances for early detection of intracranial bleedings. In this study, we perform numerical simulations to investigate if a classification algorithm based on singular value decomposition can distinguish between bleedings at different positions adjacent to the skull bone for a similar but simplified problem. The classification accuracy is 94-100% for all classes, a result that encourages us to pursue our efforts with MWT for more realistic scenarios. This indicates that MWT has potential for localizing a detected bleeding, which would increase the diagnostic value of this technique.

  13. Cutting Technology Costs with Refurbished Computers

    Science.gov (United States)

    Dessoff, Alan

    2010-01-01

    Many district administrators are finding that they can save money on computers by buying preowned ones instead of new ones. The practice has other benefits as well: It allows districts to give more computers to more students who need them, and it also promotes good environmental practices by keeping the machines out of landfills, where they…

  14. JPRS Report, Science & Technology, USSR: Computers.

    Science.gov (United States)

    2007-11-02

    3 hours; the Leninabad Silk Combine of the Ministry of Light Industry, 2 hours; the Tadkhik Scientific Research Institute of Scientific and...established sectorial oblast computer centers in Leninabad , Kulyab, and Kurgan-Tyube. Was there a need for this if computer centers of statistical

  15. Mixing height computation from a numerical weather prediction model

    Energy Technology Data Exchange (ETDEWEB)

    Jericevic, A. [Croatian Meteorological and Hydrological Service, Zagreb (Croatia); Grisogono, B. [Univ. of Zagreb, Zagreb (Croatia). Andrija Mohorovicic Geophysical Inst., Faculty of Science

    2004-07-01

    Dispersion models require hourly values of the mixing height, H, that indicates the existence of turbulent mixing. The aim of this study was to investigate a model ability and characteristics in the prediction of H. The ALADIN, limited area numerical weather prediction (NWP) model for short-range 48-hour forecasts was used. The bulk Richardson number (R{sub iB}) method was applied to determine the height of the atmospheric boundary layer at one grid point nearest to Zagreb, Croatia. This specific location was selected because there were available radio soundings and the verification of the model could be done. Critical value of bulk Richardson number R{sub iBc}=0.3 was used. The values of H, modelled and measured, for 219 days at 12 UTC are compared, and the correlation coefficient of 0.62 is obtained. This indicates that ALADIN can be used for the calculation of H in the convective boundary layer. For the stable boundary layer (SBL), the model underestimated H systematically. Results showed that R{sub iBc} evidently increases with the increase of stability. Decoupling from the surface in the very SBL was detected, which is a consequence of the flow ease resulting in R{sub iB} becoming very large. Verification of the practical usage of the R{sub iB} method for H calculations from NWP model was performed. The necessity for including other stability parameters (e.g., surface roughness length) was evidenced. Since ALADIN model is in operational use in many European countries, this study would help the others in pre-processing NWP data for input to dispersion models. (orig.)

  16. Mistaking Computers for Technology: Technology Literacy and the Digital Divide

    Science.gov (United States)

    Amiel, Tel

    2006-01-01

    No other information and communication technology has swept the globe with greater speed than the Internet, having the potential to promote vast social, economic, and political transformations. As new technologies become available the pattern of adoption and diffusion creates disparities in access and ownership. At the most basic this gap is…

  17. A Numerical and Graphical Review of Energy Storage Technologies

    Directory of Open Access Journals (Sweden)

    Siraj Sabihuddin

    2014-12-01

    Full Text Available More effective energy production requires a greater penetration of storage technologies. This paper takes a looks at and compares the landscape of energy storage devices. Solutions across four categories of storage, namely: mechanical, chemical, electromagnetic and thermal storage are compared on the basis of energy/power density, specific energy/power, efficiency, lifespan, cycle life, self-discharge rates, capital energy/power costs, scale, application, technical maturity as well as environmental impact. It’s noted that virtually every storage technology is seeing improvements. This paper provides an overview of some of the problems with existing storage systems and identifies some key technologies that hold promise.

  18. Evolving technologies for Space Station Freedom computer-based workstations

    Science.gov (United States)

    Jensen, Dean G.; Rudisill, Marianne

    1990-01-01

    Viewgraphs on evolving technologies for Space Station Freedom computer-based workstations are presented. The human-computer computer software environment modules are described. The following topics are addressed: command and control workstation concept; cupola workstation concept; Japanese experiment module RMS workstation concept; remote devices controlled from workstations; orbital maneuvering vehicle free flyer; remote manipulator system; Japanese experiment module exposed facility; Japanese experiment module small fine arm; flight telerobotic servicer; human-computer interaction; and workstation/robotics related activities.

  19. Reviews of computing technology: Software overview

    Energy Technology Data Exchange (ETDEWEB)

    Hartshorn, W.R.; Johnson, A.L.

    1994-01-05

    The Savannah River Site Computing Architecture states that the site computing environment will be standards-based, data-driven, and workstation-oriented. Larger server systems deliver needed information to users in a client-server relationship. Goals of the Architecture include utilizing computing resources effectively, maintaining a high level of data integrity, developing a robust infrastructure, and storing data in such a way as to promote accessibility and usability. This document describes the current storage environment at Savannah River Site (SRS) and presents some of the problems that will be faced and strategies that are planned over the next few years.

  20. Audit and Evaluation of Computer Security. Computer Science and Technology.

    Science.gov (United States)

    Ruthberg, Zella G.

    This is a collection of consensus reports, each produced at a session of an invitational workshop sponsored by the National Bureau of Standards. The purpose of the workshop was to explore the state-of-the-art and define appropriate subjects for future research in the audit and evaluation of computer security. Leading experts in the audit and…

  1. Alternative energy technologies an introduction with computer simulations

    CERN Document Server

    Buxton, Gavin

    2014-01-01

    Introduction to Alternative Energy SourcesGlobal WarmingPollutionSolar CellsWind PowerBiofuelsHydrogen Production and Fuel CellsIntroduction to Computer ModelingBrief History of Computer SimulationsMotivation and Applications of Computer ModelsUsing Spreadsheets for SimulationsTyping Equations into SpreadsheetsFunctions Available in SpreadsheetsRandom NumbersPlotting DataMacros and ScriptsInterpolation and ExtrapolationNumerical Integration and Diffe

  2. Application of a numerical differencing analyzer computer program to a Modular Integrated Utility System

    Science.gov (United States)

    Brandli, A. E.; Donham, C. F.

    1974-01-01

    This paper describes the application of a numerical differencing analyzer computer program to the thermal analyzation of a MIUS model. The MIUS model which was evaluated is one which would be required to support a 648-unit Garden Apartment Complex. This computer program was capable of predicting the thermal performance of this MIUS from the impressed electrical, heating, and cooling loads.

  3. Numerical computing of elastic homogenized coefficients for periodic fibrous tissue

    Directory of Open Access Journals (Sweden)

    Roman S.

    2009-06-01

    Full Text Available The homogenization theory in linear elasticity is applied to a periodic array of cylindrical inclusions in rectangular pattern extending to infinity in the inclusions axial direction, such that the deformation of tissue along this last direction is negligible. In the plane of deformation, the homogenization scheme is based on the average strain energy whereas in the third direction it is based on the average normal stress along this direction. Namely, these average quantities have to be the same on a Repeating Unit Cell (RUC of heterogeneous and homogenized media when using a special form of boundary conditions forming by a periodic part and an affine part of displacement. It exists an infinity of RUCs generating the considered array. The computing procedure is tested with different choices of RUC to control that the results of the homogenization process are independent of the kind of RUC we employ. Then, the dependence of the homogenized coefficients on the microstructure can be studied. For instance, a special anisotropy and the role of the inclusion volume are investigated. In the second part of this work, mechanical traction tests are simulated. We consider two kinds of loading, applying a density of force or imposing a displacement. We test five samples of periodic array containing one, four, sixteen, sixty-four and one hundred of RUCs. The evolution of mean stresses, strains and energy with the numbers of inclusions is studied. Evolutions depend on the kind of loading, but not their limits, which could be predicted by simulating traction test of the homogenized medium.

  4. Key Technologies and Applications of Secure Multiparty Computation

    Directory of Open Access Journals (Sweden)

    Xiaoqiang Guo

    2013-07-01

    Full Text Available With the advent of the information age, the network security is particularly important. The secure multiparty computation is a very important branch of cryptography. It is a hotspot in the field of information security. It expanded the scope of the traditional distributed computing and information security, provided a new computing model for the network collaborative computing. First we introduced several key technologies of secure multiparty computation: secret sharing and verifiable secret sharing, homomorphic public key cryptosystem, mix network, zero knowledge proof, oblivious transfer, millionaire protocol. Second we discussed the applications of secure multiparty computation in electronic voting, electronic auctions, threshold signature, database queries, data mining, mechanical engineering and other fields.

  5. The 9th international conference on computing and information technology

    CERN Document Server

    Unger, Herwig; Boonkrong, Sirapat; IC2IT2013

    2013-01-01

    This volume contains the papers of the 9th International Conference on Computing and Information Technology (IC2IT 2013) held at King Mongkut's University of Technology North Bangkok (KMUTNB), Bangkok, Thailand, on May 9th-10th, 2013. Traditionally, the conference is organized in conjunction with the National Conference on Computing and Information Technology, one of the leading Thai national events in the area of Computer Science and Engineering. The conference as well as this volume is structured into 3 main tracks on Data Networks/Communication, Data Mining/Machine Learning, and Human Interfaces/Image processing.  

  6. Wearable computer technology for dismounted applications

    Science.gov (United States)

    Daniels, Reginald

    2010-04-01

    Small computing devices which rival the compact size of traditional personal digital assistants (PDA) have recently established a market niche. These computing devices are small enough to be considered unobtrusive for humans to wear. The computing devices are also powerful enough to run full multi-tasking general purpose operating systems. This paper will explore the wearable computer information system for dismounted applications recently fielded for ground-based US Air Force use. The environments that the information systems are used in will be reviewed, as well as a description of the net-centric, ground-based warrior. The paper will conclude with a discussion regarding the importance of intuitive, usable, and unobtrusive operator interfaces for dismounted operators.

  7. Computer technology: Silicon chips lighten up

    Science.gov (United States)

    Vivien, Laurent

    2015-12-01

    Microprocessor communications have received a boost from the integration of electronics and photonics in silicon -- a first step towards low power consumption and efficient computing systems. See Letter p.534

  8. Computational methods in molecular imaging technologies

    CERN Document Server

    Gunjan, Vinit Kumar; Venkatesh, C; Amarnath, M

    2017-01-01

    This book highlights the experimental investigations that have been carried out on magnetic resonance imaging and computed tomography (MRI & CT) images using state-of-the-art Computational Image processing techniques, and tabulates the statistical values wherever necessary. In a very simple and straightforward way, it explains how image processing methods are used to improve the quality of medical images and facilitate analysis. It offers a valuable resource for researchers, engineers, medical doctors and bioinformatics experts alike.

  9. Cloud computing technology framework and reducing risks

    OpenAIRE

    Akrir, Khaled Ali Ahmed

    2015-01-01

    The thesis investigates, in a qualitative way, the vectors that contribute to cloud computing risks in the areas of security, business, and compliance. The focus of this research is on the identification of risk vectors that affect cloud computing and the creation of a framework that can help IT managers in their cloud adoption process. Economic pressures on businesses are creating a demand for an alternative delivery of the model that can provide flexible payments, dramatic cuts in capital i...

  10. Computational intelligence for technology enhanced learning

    Energy Technology Data Exchange (ETDEWEB)

    Xhafa, Fatos [Polytechnic Univ. of Catalonia, Barcelona (Spain). Dept. of Languages and Informatics Systems; Caballe, Santi; Daradoumis, Thanasis [Open Univ. of Catalonia, Barcelona (Spain). Dept. of Computer Sciences Multimedia and Telecommunications; Abraham, Ajith [Machine Intelligence Research Labs (MIR Labs), Auburn, WA (United States). Scientific Network for Innovation and Research Excellence; Juan Perez, Angel Alejandro (eds.) [Open Univ. of Catalonia, Barcelona (Spain). Dept. of Information Sciences

    2010-07-01

    E-Learning has become one of the most wide spread ways of distance teaching and learning. Technologies such as Web, Grid, and Mobile and Wireless networks are pushing teaching and learning communities to find new and intelligent ways of using these technologies to enhance teaching and learning activities. Indeed, these new technologies can play an important role in increasing the support to teachers and learners, to shorten the time to learning and teaching; yet, it is necessary to use intelligent techniques to take advantage of these new technologies to achieve the desired support to teachers and learners and enhance learners' performance in distributed learning environments. The chapters of this volume bring advances in using intelligent techniques for technology enhanced learning as well as development of e-Learning applications based on such techniques and supported by technology. Such intelligent techniques include clustering and classification for personalization of learning, intelligent context-aware techniques, adaptive learning, data mining techniques and ontologies in e-Learning systems, among others. Academics, scientists, software developers, teachers and tutors and students interested in e-Learning will find this book useful for their academic, research and practice activity. (orig.)

  11. Numerical computation algorithm of explosion equations and thermodynamics parameters of mine explosives

    Institute of Scientific and Technical Information of China (English)

    李守巨; 刘迎曦; 何翔; 周圆π

    2001-01-01

    A new numerical algorithm is presented to simulate the explosion reaction process of mine explosives based on the equation of state, the equation of mass conservation and thermodynamics balance equation of explosion products. With the affection of reversible reaction of explosion products to explosion reaction equations and thermodynamics parameters considered, the computer program has been developed. The computation values show that computer simulation results are identical with the testinq ones.

  12. Numerical computation algorithm of explosion equations and thermodynamics parameters of mine explosives

    Institute of Scientific and Technical Information of China (English)

    LI Shou-ju; LIU Ying-xi; HE Xiang; ZHOU Y uan-pai

    2001-01-01

    A new numerical algorithm is presented to simulate the explosion reacti on process of mine explosives based on the equation of state, the equation of ma ss conservation and thermodynamics balance equation of explosion products. With the affection of reversible reaction of explosion products to explosion reaction equations and thermodynamics parameters considered, the computer program has be en developed. The computation values show that computer simulation results are i dentical with the testing ones.

  13. An efficient numerical algorithm for computing densely distributed positive interior transmission eigenvalues

    Science.gov (United States)

    Li, Tiexiang; Huang, Tsung-Ming; Lin, Wen-Wei; Wang, Jenn-Nan

    2017-03-01

    We propose an efficient eigensolver for computing densely distributed spectra of the two-dimensional transmission eigenvalue problem (TEP), which is derived from Maxwell’s equations with Tellegen media and the transverse magnetic mode. The governing equations, when discretized by the standard piecewise linear finite element method, give rise to a large-scale quadratic eigenvalue problem (QEP). Our numerical simulation shows that half of the positive eigenvalues of the QEP are densely distributed in some interval near the origin. The quadratic Jacobi-Davidson method with a so-called non-equivalence deflation technique is proposed to compute the dense spectrum of the QEP. Extensive numerical simulations show that our proposed method processes the convergence efficiently, even when it needs to compute more than 5000 desired eigenpairs. Numerical results also illustrate that the computed eigenvalue curves can be approximated by nonlinear functions, which can be applied to estimate the denseness of the eigenvalues for the TEP.

  14. Numerical Description of Dynamic U-value Technologies

    DEFF Research Database (Denmark)

    Winther, Frederik Vildbrad; Heiselberg, Per; Jensen, Rasmus Lund

    2016-01-01

    for cooling. Therefore in order to achieve zero-energy-building, optimum static U- and g-value solutions in zero-energy-building concepts needs to be supplied with renewable energy harvesting technologies. In order to lower the energy demand for heating without increasing the energy demand for cooling......The transparent part of the façade has the largest heat loss, when compared to the opaque part and an airtight envelope solution. A reduction of the heat loss through the transparent part of the façade leads to a decrease in energy demand for heating; however it increases the energy demand...... requires the development and usage of dynamic U-value technologies. A full-scale test facility, divided into two identical facades, is used, enabling the development of a calculation model for dynamic U-value technologies. The model focuses on the energy transport through the insulated part...

  15. Computational uncertainty principle in nonlinear ordinary differential equations--Numerical results

    Institute of Scientific and Technical Information of China (English)

    2000-01-01

    In a majority of cases of long-time numerical integration for initial-value problems, round-off error has received little attention. Using twenty-nine numerical methods, the influence of round-off error on numerical solutions is generally studied through a large number of numerical experiments. Here we find that there exists a strong dependence on machine precision (which is a new kind of dependence different from the sensitive dependence on initial conditions), maximally effective computation time (MECT) and optimal stepsize (OS) in solving nonlinear ordinary differential equations (ODEs) in finite machine precision. And an optimal searching method for evaluating MECT and OS under finite machine precision is presented. The relationships between MECT, OS, the order of numerical method and machine precision are found. Numerical results show that round-off error plays a significant role in the above phenomena. Moreover, we find two universal relations which are independent of the types of ODEs, initial values and numerical schemes. Based on the results of numerical experiments, we present a computational uncertainty principle, which is a great challenge to the reliability of long-time numerical integration for nonlinear ODEs.

  16. Enabling Computational Technologies for Terascale Scientific Simulations

    Energy Technology Data Exchange (ETDEWEB)

    Ashby, S.F.

    2000-08-24

    We develop scalable algorithms and object-oriented code frameworks for terascale scientific simulations on massively parallel processors (MPPs). Our research in multigrid-based linear solvers and adaptive mesh refinement enables Laboratory programs to use MPPs to explore important physical phenomena. For example, our research aids stockpile stewardship by making practical detailed 3D simulations of radiation transport. The need to solve large linear systems arises in many applications, including radiation transport, structural dynamics, combustion, and flow in porous media. These systems result from discretizations of partial differential equations on computational meshes. Our first research objective is to develop multigrid preconditioned iterative methods for such problems and to demonstrate their scalability on MPPs. Scalability describes how total computational work grows with problem size; it measures how effectively additional resources can help solve increasingly larger problems. Many factors contribute to scalability: computer architecture, parallel implementation, and choice of algorithm. Scalable algorithms have been shown to decrease simulation times by several orders of magnitude.

  17. Cloud manufacturing distributed computing technologies for global and sustainable manufacturing

    CERN Document Server

    Mehnen, Jörn

    2013-01-01

    Global networks, which are the primary pillars of the modern manufacturing industry and supply chains, can only cope with the new challenges, requirements and demands when supported by new computing and Internet-based technologies. Cloud Manufacturing: Distributed Computing Technologies for Global and Sustainable Manufacturing introduces a new paradigm for scalable service-oriented sustainable and globally distributed manufacturing systems.   The eleven chapters in this book provide an updated overview of the latest technological development and applications in relevant research areas.  Following an introduction to the essential features of Cloud Computing, chapters cover a range of methods and applications such as the factors that actually affect adoption of the Cloud Computing technology in manufacturing companies and new geometrical simplification method to stream 3-Dimensional design and manufacturing data via the Internet. This is further supported case studies and real life data for Waste Electrical ...

  18. Theories of Learning and Computer-Mediated Instructional Technologies.

    Science.gov (United States)

    Hung, David

    2001-01-01

    Describes four major models of learning: behaviorism, cognitivism, constructivism, and social constructivism. Discusses situated cognition; differences between learning theories and instructional approaches; and how computer-mediated technologies can be integrated with learning theories. (LRW)

  19. Leveraging mobile computing and communication technologies in education

    DEFF Research Database (Denmark)

    Annan, Nana Kofi

    The emergence of mobile computing and communication technologies has come with it, an unprecedented transformation in digitalising every aspect of human activities. This transformation has brought about a high degree of mobility in the way knowledge is constructed, processed, stored...... and disseminated through the use of portable information and communication technologies (ICTs) such as smart phones, tablets, personal computers and laptop computers. These mobile devices use mobile communication infrastructure to promote the mobility affordances for human activities anywhere and anytime. Although...... education and technology have evolved in tandem over the past years, this dissertation recognises the lapse that there is, in not being able to effectively leverage technology to improve education delivery by most educators. The study appreciates the enormousness of mobile computing and communication...

  20. Theories of Learning and Computer-Mediated Instructional Technologies.

    Science.gov (United States)

    Hung, David

    2001-01-01

    Describes four major models of learning: behaviorism, cognitivism, constructivism, and social constructivism. Discusses situated cognition; differences between learning theories and instructional approaches; and how computer-mediated technologies can be integrated with learning theories. (LRW)

  1. Computing handbook information systems and information technology

    CERN Document Server

    Topi, Heikki

    2014-01-01

    Disciplinary Foundations and Global ImpactEvolving Discipline of Information Systems Heikki TopiDiscipline of Information Technology Barry M. Lunt and Han ReichgeltInformation Systems as a Practical Discipline Juhani IivariInformation Technology Han Reichgelt, Joseph J. Ekstrom, Art Gowan, and Barry M. LuntSociotechnical Approaches to the Study of Information Systems Steve Sawyer and Mohammad Hossein JarrahiIT and Global Development Erkki SutinenUsing ICT for Development, Societal Transformation, and Beyond Sherif KamelTechnical Foundations of Data and Database ManagementData Models Avi Silber

  2. 10th International Conference on Computing and Information Technology

    CERN Document Server

    Unger, Herwig; Meesad, Phayung

    2014-01-01

    Computer and Information Technology (CIT) are now involved in governmental, industrial, and business domains more than ever. Thus, it is important for CIT personnel to continue academic research to improve technology and its adoption to modern applications. The up-to-date research and technologies must be distributed to researchers and CIT community continuously to aid future development. The 10th International Conference on Computing and Information Technology (IC 2 IT2014) organized by King Mongkut's University of Technology North Bangkok (KMUTNB) and partners provides an exchange of the state of the art and future developments in the two key areas of this process: Computer Networking and Data Mining. Behind the background of the foundation of ASEAN, it becomes clear that efficient languages, business principles and communication methods need to be adapted, unified and especially optimized to gain a maximum benefit to the users and customers of future IT systems.

  3. Computer technology -- 1996: Applications and methodology. PVP-Volume 326

    Energy Technology Data Exchange (ETDEWEB)

    Hulbert, G.M. [ed.] [Univ. of Michigan, Ann Arbor, MI (United States); Hsu, K.H. [ed.] [Babcock and Wilcox, Barberton, OH (United States); Lee, T.W. [ed.] [FMC Corp., Santa Clara, CA (United States); Nicholas, T. [ed.] [USAF Wright Laboratory, Wright-Patterson AFB, OH (United States)

    1996-12-01

    The primary objective of the Computer Technology Committee of the ASME Pressure Vessels and Piping Division is to promote interest and technical exchange in the field of computer technology, related to the design and analysis of pressure vessels and piping. The topics included in this volume are: analysis of bolted joints; nonlinear analysis, applications and methodology; finite element analysis and applications; and behavior of materials. Separate abstracts were prepared for 23 of the papers in this volume.

  4. Restricted access processor - An application of computer security technology

    Science.gov (United States)

    Mcmahon, E. M.

    1985-01-01

    This paper describes a security guard device that is currently being developed by Computer Sciences Corporation (CSC). The methods used to provide assurance that the system meets its security requirements include the system architecture, a system security evaluation, and the application of formal and informal verification techniques. The combination of state-of-the-art technology and the incorporation of new verification procedures results in a demonstration of the feasibility of computer security technology for operational applications.

  5. Computational uncertainty principle in nonlinear ordinary differential equations (I)——Numerical results

    Institute of Scientific and Technical Information of China (English)

    李建平[1; 曾庆存[2; 丑纪范[3

    2000-01-01

    In a majority of cases of long-time numerical integration for initial-value problems, roundoff error has received little attention. Using twenty-nine numerical methods, the influence of round-off error on numerical solutions is generally studied through a large number of numerical experiments. Here we find that there exists a strong dependence on machine precision (which is a new kind of dependence different from the sensitive dependence on initial conditions), maximally effective computation time (MECT) and optimal stepsize (OS) in solving nonlinear ordinary differential equations (ODEs) in finite machine precision. And an optimal searching method for evaluating MECT and OS under finite machine precision is presented. The relationships between MECT, OS, the order of numerical method and machine precision are found. Numerical results show that round-off error plays a significant role in the above phenomena. Moreover, we find two universal relations which are independent of the types of ODEs, initial val

  6. Technological Imperatives: Using Computers in Academic Debate.

    Science.gov (United States)

    Ticku, Ravinder; Phelps, Greg

    Intended for forensic educators and debate teams, this document details how one university debate team, at the University of Iowa, makes use of computer resources on campus to facilitate storage and retrieval of information useful to debaters. The introduction notes the problem of storing and retrieving the amount of information required by debate…

  7. USSR Report, Cybernetics, Computers and Automation Technology.

    Science.gov (United States)

    2007-11-02

    27 Automating Data Processing on the Rayon and Oblast Levels (A.P. Kolesnik, K.V. Golovin , et al.; FINANSY SSSR, No 5, May 86) 29 Development of...RSFSR Ministry of Finance, K. V. Golovin , division chief, main computer center, USSR Ministry of Finance, and V. Z. Usov, division chief, main

  8. USSR Report, Cybernetics, Computers and Automation Technology

    Science.gov (United States)

    2007-11-02

    algorithm consists in moving along RD to a particular finite node proceeding from successive analysis of characteris- tics (indexes) of the sampling...requirements on devices control system hardware complex. Characteristics of transducers. Characteristics of the computer, USO [entity connection...characteristics of these classes of tasks; these characteris- tics were used as the raw data for calculating the particular effectiveness criteria

  9. Soft Computing in Construction Information Technology

    NARCIS (Netherlands)

    Ciftcioglu, O.; Durmisevic, S.; Sariyildiz, S.

    2001-01-01

    The last decade, civil engineering has exercised a rapidly growing interest in the application of neurally inspired computing techniques. The motive for this interest was the promises of certain information processing characteristics, which are similar to some extend, to those of human brain. The im

  10. Soft Computing in Construction Information Technology

    NARCIS (Netherlands)

    Ciftcioglu, O.; Durmisevic, S.; Sariyildiz, S.

    2001-01-01

    The last decade, civil engineering has exercised a rapidly growing interest in the application of neurally inspired computing techniques. The motive for this interest was the promises of certain information processing characteristics, which are similar to some extend, to those of human brain. The im

  11. CACTUS: Calculator and Computer Technology User Service.

    Science.gov (United States)

    Hyde, Hartley

    1998-01-01

    Presents an activity in which students use computer-based spreadsheets to find out how much grain should be added to a chess board when a grain of rice is put on the first square, the amount is doubled for the next square, and the chess board is covered. (ASK)

  12. Cloud Computing Technologies Facilitate Earth Research

    Science.gov (United States)

    2015-01-01

    Under a Space Act Agreement, NASA partnered with Seattle-based Amazon Web Services to make the agency's climate and Earth science satellite data publicly available on the company's servers. Users can access the data for free, but they can also pay to use Amazon's computing services to analyze and visualize information using the same software available to NASA researchers.

  13. USSR Report: Cybernetics, Computers and Automation Technology

    Science.gov (United States)

    2007-11-02

    Georgian SSR Academy of Sciences: "Ready for Dialogue"] [Text] Computers in schools, auditoria , and educational laboratories are an phenomenon to which we...professional-technical academies and VUZ auditoria . Obviously, the color of the screens and the characters on them is of major importance for people

  14. Computer technology: its potential for industrial energy conservation. A technology applications manual

    Energy Technology Data Exchange (ETDEWEB)

    None

    1979-01-01

    Today, computer technology is within the reach of practically any industrial corporation regardless of product size. This manual highlights a few of the many applications of computers in the process industry and provides the technical reader with a basic understanding of computer technology, terminology, and the interactions among the various elements of a process computer system. The manual has been organized to separate process applications and economics from computer technology. Chapter 1 introduces the present status of process computer technology and describes the four major applications - monitoring, analysis, control, and optimization. The basic components of a process computer system also are defined. Energy-saving applications in the four major categories defined in Chapter 1 are discussed in Chapter 2. The economics of process computer systems is the topic of Chapter 3, where the historical trend of process computer system costs is presented. Evaluating a process for the possible implementation of a computer system requires a basic understanding of computer technology as well as familiarity with the potential applications; Chapter 4 provides enough technical information for an evaluation. Computer and associated peripheral costs and the logical sequence of steps in the development of a microprocessor-based process control system are covered in Chapter 5.

  15. Progress and Challenges in High Performance Computer Technology

    Institute of Scientific and Technical Information of China (English)

    Xue-Jun Yang; Yong Dou; Qing-Feng Hu

    2006-01-01

    High performance computers provide strategic computing power in the construction of national economy and defense, and become one of symbols of the country's overall strength. Over 30 years, with the supports of governments, the technology of high performance computers is in the process of rapid development, during which the computing performance increases nearly 3 million times and the processors number expands over 10 hundred thousands times. To solve the critical issues related with parallel efficiency and scalability, scientific researchers pursued extensive theoretical studies and technical innovations. The paper briefly looks back the course of building high performance computer systems both at home and abroad,and summarizes the significant breakthroughs of international high performance computer technology. We also overview the technology progress of China in the area of parallel computer architecture, parallel operating system and resource management,parallel compiler and performance optimization, environment for parallel programming and network computing. Finally, we examine the challenging issues, "memory wall", system scalability and "power wall", and discuss the issues of high productivity computers, which is the trend in building next generation high performance computers.

  16. A New Advance in Intelligent Computing Technology

    Institute of Scientific and Technical Information of China (English)

    2005-01-01

    @@ A recent study by Dr. HUANG Deshuang and his colleagues from the CAS Hefei Institute of Intelligent Machines has shed new light on the development of digital image processing technology. Their work was reported as a cover story in the July issue of the Digital Signal Processing: A Review Journal.

  17. Audio Technology and Mobile Human Computer Interaction

    DEFF Research Database (Denmark)

    Chamberlain, Alan; Bødker, Mads; Hazzard, Adrian

    2017-01-01

    Audio-based mobile technology is opening up a range of new interactive possibilities. This paper brings some of those possibilities to light by offering a range of perspectives based in this area. It is not only the technical systems that are developing, but novel approaches to the design...

  18. JPRS Report, Science & Technology, USSR: Computers

    Science.gov (United States)

    2007-11-02

    fast set-up change for manufacturing of new products" (GOST [State All-Union Standart ] 14.001-73 and GOST 26228- 85). A flexible automated...tekhnologicheskoy podgotovki proizvodstva" [Scientific Foundations of Integrated Standart izat ion of Technological Preparation of Production

  19. Advanced sensor-computer technology for urban runoff monitoring

    Science.gov (United States)

    Yu, Byunggu; Behera, Pradeep K.; Ramirez Rochac, Juan F.

    2011-04-01

    The paper presents the project team's advanced sensor-computer sphere technology for real-time and continuous monitoring of wastewater runoff at the sewer discharge outfalls along the receiving water. This research significantly enhances and extends the previously proposed novel sensor-computer technology. This advanced technology offers new computation models for an innovative use of the sensor-computer sphere comprising accelerometer, programmable in-situ computer, solar power, and wireless communication for real-time and online monitoring of runoff quantity. This innovation can enable more effective planning and decision-making in civil infrastructure, natural environment protection, and water pollution related emergencies. The paper presents the following: (i) the sensor-computer sphere technology; (ii) a significant enhancement to the previously proposed discrete runoff quantity model of this technology; (iii) a new continuous runoff quantity model. Our comparative study on the two distinct models is presented. Based on this study, the paper further investigates the following: (1) energy-, memory-, and communication-efficient use of the technology for runoff monitoring; (2) possible sensor extensions for runoff quality monitoring.

  20. Designing Pervasive Computing Technology - In a Nomadic Work Perspective

    DEFF Research Database (Denmark)

    Kristensen, Jannie Friis

    2002-01-01

    In my thesis work I am investigating how the design of pervasive/ubiquitous computing technology, relate to the flexible and individual work practice of nomadic workers. Through empirical studies and with an experimental systems development approach, the work is focused on: a) Supporting...... interpretation and inclusion of implicit and invisible as well as explicit and visible characteristics of artifacts, users and use practices. b) Identifying breakdowns in human-computer interaction situations, with particular emphasis on the computation that happens "behind the scenes" in the pervasive computing...... environment, and how that computational process at a sufficient level is made intelligible, visible, accountable and negotiable to the human participant....

  1. Design technologies for green and sustainable computing systems

    CERN Document Server

    Ganguly, Amlan; Chakrabarty, Krishnendu

    2013-01-01

    This book provides a comprehensive guide to the design of sustainable and green computing systems (GSC). Coverage includes important breakthroughs in various aspects of GSC, including multi-core architectures, interconnection technology, data centers, high-performance computing (HPC), and sensor networks. The authors address the challenges of power efficiency and sustainability in various contexts, including system design, computer architecture, programming languages, compilers and networking. ·         Offers readers a single-source reference for addressing the challenges of power efficiency and sustainability in embedded computing systems; ·         Provides in-depth coverage of the key underlying design technologies for green and sustainable computing; ·         Covers a wide range of topics, from chip-level design to architectures, computing systems, and networks.

  2. A Discussion of Thin Client Technology for Computer Labs

    CERN Document Server

    Martínez-Mateo, Jesús; Pérez-Rey, David

    2010-01-01

    Computer literacy is not negotiable for any professional in an increasingly computerised environment. Educational institutions should be equipped to provide this new basic training for modern life. Accordingly, computer labs are an essential medium for education in almost any field. Computer labs are one of the most popular IT infrastructures for technical training in primary and secondary schools, universities and other educational institutions all over the world. Unfortunately, a computer lab is expensive, in terms of both initial purchase and annual maintenance costs, and especially when we want to run the latest software. Hence, research efforts addressing computer lab efficiency, performance or cost reduction would have a worldwide repercussion. In response to this concern, this paper presents a survey on thin client technology for computer labs in educational environments. Besides setting out the advantages and drawbacks of this technology, we aim to refute false prejudices against thin clients, identif...

  3. A Technology Assessment of Personal Computers. Vol. I: Summary.

    Science.gov (United States)

    Nilles, Jack M.

    This volume summarizes the results of a 2-year technology assessment of personal computers. The purpose of this study was to explore possible future modes of growth of the personal computer and related industries, to assess the impacts and consequences of that growth, and to present some of the policy issues and options which may arise as a…

  4. Course Syllabus: The Social Impact of Computer Information Technology.

    Science.gov (United States)

    Behar, Joseph

    1988-01-01

    This syllabus describes the course background, central themes and issues, texts, resources, and recommended readings. Main topics are the sociology of information technology, computers and social change, telecommunications, computers and human interactions, applications in working, and social issues and political implications. (YP)

  5. Using Computer and Video Technologies to Develop Interpersonal Skills.

    Science.gov (United States)

    Campbell, J. Olin; And Others

    1995-01-01

    Two studies investigated ways in which computer and video technology can support expert human coaches in order to reduce instructor time and increase learner-centered environments; the goal was to train undergraduate students to facilitate others' interpersonal problem solving. Results indicate that the technology-supported methods can decrease…

  6. Computed Tomography Technology: Development and Applications for Defence

    Science.gov (United States)

    Baheti, G. L.; Saxena, Nisheet; Tripathi, D. K.; Songara, K. C.; Meghwal, L. R.; Meena, V. L.

    2008-09-01

    Computed Tomography(CT) has revolutionized the field of Non-Destructive Testing and Evaluation (NDT&E). Tomography for industrial applications warrants design and development of customized solutions catering to specific visualization requirements. Present paper highlights Tomography Technology Solutions implemented at Defence Laboratory, Jodhpur (DLJ). Details on the technological developments carried out and their utilization for various Defence applications has been covered.

  7. Building Computer Technology Skills in TESOL Teacher Education

    Science.gov (United States)

    DelliCarpini, Margo

    2012-01-01

    This paper reports on an action research study that investigated factors influencing TESOL (teaching English to speakers of other languages) teacher candidates' (TCs) selection and use of technology in the English as a second language (ESL) classroom and the influence of explicit training in context in the use of computer technology for second…

  8. COMPUGIRLS: Stepping Stone to Future Computer-Based Technology Pathways

    Science.gov (United States)

    Lee, Jieun; Husman, Jenefer; Scott, Kimberly A.; Eggum-Wilkens, Natalie D.

    2015-01-01

    The COMPUGIRLS: Culturally relevant technology program for adolescent girls was developed to promote underrepresented girls' future possible selves and career pathways in computer-related technology fields. We hypothesized that the COMPUGIRLS would promote academic possible selves and self-regulation to achieve these possible selves. We compared…

  9. Factors Influencing Cloud-Computing Technology Adoption in Developing Countries

    Science.gov (United States)

    Hailu, Alemayehu

    2012-01-01

    Adoption of new technology has complicating components both from the selection, as well as decision-making criteria and process. Although new technology such as cloud computing provides great benefits especially to the developing countries, it has challenges that may complicate the selection decision and subsequent adoption process. This study…

  10. Beyond Computer Literacy: Supporting Youth's Positive Development through Technology

    Science.gov (United States)

    Bers, Marina Umaschi

    2010-01-01

    In a digital era in which technology plays a role in most aspects of a child's life, having the competence and confidence to use computers might be a necessary step, but not a goal in itself. Developing character traits that will serve children to use technology in a safe way to communicate and connect with others, and providing opportunities for…

  11. Beyond Computer Literacy: Supporting Youth's Positive Development through Technology

    Science.gov (United States)

    Bers, Marina Umaschi

    2010-01-01

    In a digital era in which technology plays a role in most aspects of a child's life, having the competence and confidence to use computers might be a necessary step, but not a goal in itself. Developing character traits that will serve children to use technology in a safe way to communicate and connect with others, and providing opportunities for…

  12. COMPUGIRLS: Stepping Stone to Future Computer-Based Technology Pathways

    Science.gov (United States)

    Lee, Jieun; Husman, Jenefer; Scott, Kimberly A.; Eggum-Wilkens, Natalie D.

    2015-01-01

    The COMPUGIRLS: Culturally relevant technology program for adolescent girls was developed to promote underrepresented girls' future possible selves and career pathways in computer-related technology fields. We hypothesized that the COMPUGIRLS would promote academic possible selves and self-regulation to achieve these possible selves. We compared…

  13. Promoting Technology-Assisted Active Learning in Computer Science Education

    Science.gov (United States)

    Gao, Jinzhu; Hargis, Jace

    2010-01-01

    This paper describes specific active learning strategies for teaching computer science, integrating both instructional technologies and non-technology-based strategies shown to be effective in the literature. The theoretical learning components addressed include an intentional method to help students build metacognitive abilities, as well as…

  14. A Partnership Project: Integrating Computer Technology and Orff-Schulwerk.

    Science.gov (United States)

    Woody, Robert H.; Fredrickson, Julie M.

    2000-01-01

    Describes an alternative approach for general music educators wanting to study new instructional strategies in which a classroom teacher and university educator collaborated to explore the integration of computer technology with Orff-Schulwerk in second- and third-grade music classes. Discusses the project and two of its technology-assisted…

  15. Factors Influencing Cloud-Computing Technology Adoption in Developing Countries

    Science.gov (United States)

    Hailu, Alemayehu

    2012-01-01

    Adoption of new technology has complicating components both from the selection, as well as decision-making criteria and process. Although new technology such as cloud computing provides great benefits especially to the developing countries, it has challenges that may complicate the selection decision and subsequent adoption process. This study…

  16. Terminology of the Newest Technologies and Computering

    Directory of Open Access Journals (Sweden)

    Angelė Kaulakienė

    2011-04-01

    Full Text Available The thirty-five-year period of computer terminology has to be considered the initial stage of its evolution where synonymy and variability are characteristic features, which are usually determined by both extra-linguistic and linguistic factors. The choice of borrowed or Lithuanian terms is often determined by the relationship between borrowed and Lithuanian terms. The first stage of the newest dictionaries of computer terms approbated by the Commission of the Lithuanian Language shows that the terminology of the mentioned field is being systematized and normalized. However, the ratio between Lithuanian and borrowed terms is not fully acceptable yet, and it is partially determined by disagreement among specialists on the status of synonymous terms and the choice of them.

  17. Computer-generated slides: outdated technology or state-of-the-art presentation style?

    Science.gov (United States)

    Hinds, K F

    1998-01-01

    With the explosion of computerization, it appears that the business community is switching to computer-based presentations, projecting onto a screen directly from a computer, instead of the old standard of presenting with slides. However, the dental profession has been slow to follow. Although some speakers have switched to computer-based presentations, slides are still the standard in 1998. With the advent of numerous new computer software programs, clinicians are now able to generate highly sophisticated slides, that can be an equally powerful medium to communicate with the audience. Unfortunately, many clinicians are not taking advantage of the benefits of this technology. This article explains the simplicity of generating professional, high quality slides, reviews the major programs and equipment available to accomplish this task, and previews the multitude of applications this technology offers to practitioners as well as educators.

  18. JPRS Report, Science & Technology, USSR: Computers.

    Science.gov (United States)

    2007-11-02

    standpoint of task formulation and performance. These are the recognition of images created by man for Interaction with a computer; the recognition of...systems for visual inspection of the shape of tablets on a pharmaceutical conveyer line or research systems for analyzing the images of three...34 fuzziness " (disorderliness) of the knowledge. 11 It is well known that certain tasks related to image interpretation are accomplished in

  19. Medical imaging technology reviews and computational applications

    CERN Document Server

    Dewi, Dyah

    2015-01-01

    This book presents the latest research findings and reviews in the field of medical imaging technology, covering ultrasound diagnostics approaches for detecting osteoarthritis, breast carcinoma and cardiovascular conditions, image guided biopsy and segmentation techniques for detecting lung cancer, image fusion, and simulating fluid flows for cardiovascular applications. It offers a useful guide for students, lecturers and professional researchers in the fields of biomedical engineering and image processing.

  20. USSR Report, Cybernetics, Computers and Automation Technology.

    Science.gov (United States)

    1987-03-02

    quality silage preservative and shampoo from waste fat from the fish-canning industry. One can also name an improved oil shale processing technology...institution section of the CC CP of Estonia , and V. Rayangu, minister of higher and secondary special education of the EsSSR participated in the work of the...name at the Tallinn Polytechnical Institute. This is the first such department in Estonia . In practice it has already become an intersectorial

  1. USSR Report, Cybernetics, Computers and Automation Technology

    Science.gov (United States)

    2007-11-02

    genetic engineering and laser technology. And now there is a new goal, a new highly complex task: elec- tronics. According to available estimates, as...by enterprises of other ministries. More than 100 cities are to be included in this system. FTD /SNAP CSO: 1863/184 11 JPRS-UCC-85-003 23 April...robotiza- tion. FTD /SNAP CSO: 1863/184 58 JPRS-UCC-85-003 23 April 1985 ENHANCED-FLEXIBILITY ROBOT HAND MODULES INVENTED Moscow

  2. Numerical Simulation of Multi-phase Flow in Porous Media on Parallel Computers

    CERN Document Server

    Liu, Hui; Chen, Zhangxin; Luo, Jia; Deng, Hui; He, Yanfeng

    2016-01-01

    This paper is concerned with developing parallel computational methods for two-phase flow on distributed parallel computers; techniques for linear solvers and nonlinear methods are studied, and the standard and inexact Newton methods are investigated. A multi-stage preconditioner for two-phase flow is proposed and advanced matrix processing strategies are implemented. Numerical experiments show that these computational methods are scalable and efficient, and are capable of simulating large-scale problems with tens of millions of grid blocks using thousands of CPU cores on parallel computers. The nonlinear techniques, preconditioner and matrix processing strategies can also be applied to three-phase black oil, compositional and thermal models.

  3. Periodic solutions of nonlinear dynamical systems numerical computation, stability, bifurcation and transition to chaos

    CERN Document Server

    Reithmeier, Eduard

    1991-01-01

    Limit cycles or, more general, periodic solutions of nonlinear dynamical systems occur in many different fields of application. Although, there is extensive literature on periodic solutions, in particular on existence theorems, the connection to physical and technical applications needs to be improved. The bifurcation behavior of periodic solutions by means of parameter variations plays an important role in transition to chaos, so numerical algorithms are necessary to compute periodic solutions and investigate their stability on a numerical basis. From the technical point of view, dynamical systems with discontinuities are of special interest. The discontinuities may occur with respect to the variables describing the configuration space manifold or/and with respect to the variables of the vector-field of the dynamical system. The multiple shooting method is employed in computing limit cycles numerically, and is modified for systems with discontinuities. The theory is supported by numerous examples, mainly fro...

  4. Numerical Simulation of Mixing in a Micro-well Scale Bioreactor by Computational Fluid Dynamics

    Institute of Scientific and Technical Information of China (English)

    2002-01-01

    The introduction of the multi-well plate miniaturisation technology with its associated automated dispensers, readers and integrated systems coupled with advances in life sciences has a propelling effect on the rate at which new potential drug molecules are discovered. The translation of these discoveries to real outcome now demands parallel approaches which allow large numbers of process options to be rapidly assessed. The engineering challenges in achieving this provide the motivation for the proposed work. In this work we used computational fluid dynamics(CFD) analysis to study flow conditions in a gas-liquid contactor which has the potential to be used as a fermenter on a multi-well format. The bioreactor had a working volume of 6.5 mL with the major dimensions equal to those of a single well of a 24-well plate. The 6.5 mL bioreactor was mechanically agitated and aerated by a single sparger placed beneath the bottom impeller. Detailed numerical procedure for solving the governing flow equations is given. The CFD results are combined with population balance equations to establish the size of the bubbles and their distribution in the bioreactor, Power curves with and without aeration are provided based on the simulated results.

  5. Efficient numerical methods to compute unsteady subsonic flows on unstructured grids

    NARCIS (Netherlands)

    Lucas, P.

    2010-01-01

    Over the last four decades the increase in computer power and the advances in solver technology has resulted in an estimated reduction of 10 orders in magnitude to compute flow problems. However, to solve the instationairy Reynolds-averaged Navier-Stokes equations, even today, a massive amount of C

  6. Numerical Computation of the Tau Approximation for the Delayed Burgers Equation

    Science.gov (United States)

    Khaksar, Haghani F.; Karimi, Vanani S.; Sedighi, Hafshejani J.

    2013-02-01

    We investigate an efficient extension of the operational Tau method for solving the delayed Burgers equation(DBE) arising in physical problems. This extension gives a useful numerical algorithm for the DBE including linear and nonlinear terms. The orthogonality of the Laguerre polynomials as the basis function is the main characteristic behind the method to decrease the volume of computations and runtime of the method. Numerical results are also presented for some experiments to demonstrate the usefulness and accuracy of the proposed algorithm.

  7. Geometric invariants for initial data sets: analysis, exact solutions, computer algebra, numerics

    Energy Technology Data Exchange (ETDEWEB)

    Valiente Kroon, Juan A, E-mail: j.a.valiente-kroon@qmul.ac.uk [School of Mathematical Sciences, Queen Mary, University of London, Mile End Road, London, E1 4NS (United Kingdom)

    2011-09-22

    A personal perspective on the interaction of analytical, numerical and computer algebra methods in classical Relativity is given. This discussion is inspired by the problem of the construction of invariants that characterise key solutions to the Einstein field equations. It is claimed that this kind of ideas will be or importance in the analysis of dynamical black hole spacetimes by either analytical or numerical methods.

  8. 9th International Conference on Advanced Computing & Communication Technologies

    CERN Document Server

    Mandal, Jyotsna; Auluck, Nitin; Nagarajaram, H

    2016-01-01

    This book highlights a collection of high-quality peer-reviewed research papers presented at the Ninth International Conference on Advanced Computing & Communication Technologies (ICACCT-2015) held at Asia Pacific Institute of Information Technology, Panipat, India during 27–29 November 2015. The book discusses a wide variety of industrial, engineering and scientific applications of the emerging techniques. Researchers from academia and industry present their original work and exchange ideas, information, techniques and applications in the field of Advanced Computing and Communication Technology.

  9. Art and Technology of Entertainment Computing and Communication

    CERN Document Server

    Cheok, Adrian David

    2010-01-01

    "Art and Technology of Entertainment Computing and Communication" takes a blue sky research perspective on the field of interactive media for entertainment computing. Adrian David Cheok argues that entertainment as an end-product is useful for interactive play, however it is also a powerful tool for learning and communication and it is also a key driver for the development of information technology. This book explores the future of entertainment technologies used for communication and describes quantum step research. It will inform and inspire readers to create their own radical inve

  10. Identification of risk factors of computer information technologies in education

    Directory of Open Access Journals (Sweden)

    Hrebniak M.P.

    2014-03-01

    Full Text Available The basic direction of development of secondary school and vocational training is computer training of schoolchildren and students, including distance forms of education and widespread usage of world information systems. The purpose of the work is to determine risk factors for schoolchildren and students, when using modern information and computer technologies. Results of researches allowed to establish dynamics of formation of skills using computer information technologies in education and characteristics of mental ability among schoolchildren and students during training in high school. Common risk factors, while operating CIT, are: intensification and formalization of intellectual activity, adverse ergonomic parameters, unfavorable working posture, excess of hygiene standards by chemical and physical characteristics. The priority preventive directions in applying computer information technology in education are: improvement of optimal visual parameters of activity, rationalization of ergonomic parameters, minimizing of adverse effects of chemical and physical conditions, rationalization of work and rest activity.

  11. Numerical-Analytical Method for Magnetic Field Computation in Rotational Electric Machines

    Institute of Scientific and Technical Information of China (English)

    章跃进; 江建中; 屠关镇

    2003-01-01

    A numerical-analytical method is applied for the two-dimensional magnetic field computation in rotational electric machines in this paper. The analytical expressions for air gap magnetic field axe derived. The pole pairs in the expressions are taken into account so that the solution region can be reduced within one periodic range. The numerical and analytical magnetic field equations are linked with equal vector magnetic potential boundary conditions. The magnetic field of a brushless permanent magnet machine is computed by the proposed method. The result is compared to that obtained by finite element method so as to validate the correction of th method.

  12. Computational experiment on the numerical solution of some inverse problems of mathematical physics

    Science.gov (United States)

    Vasil'ev, V. I.; Kardashevsky, A. M.; Sivtsev, PV

    2016-11-01

    In this article the computational experiment on the numerical solution of the most popular linear inverse problems for equations of mathematical physics are presented. The discretization of retrospective inverse problem for parabolic equation is performed using difference scheme with non-positive weight multiplier. Similar difference scheme is also used for the numerical solution of Cauchy problem for two-dimensional Laplace equation. The results of computational experiment, performed on model problems with exact solution, including ones with randomly perturbed input data are presented and discussed.

  13. Numerical computation of soliton dynamics for NLS equations in a driving potential

    Directory of Open Access Journals (Sweden)

    Marco Caliari

    2010-06-01

    Full Text Available We provide numerical computations for the soliton dynamics of the nonlinear Schrodinger equation with an external potential. After computing the ground state solution r of a related elliptic equation we show that, in the semi-classical regime, the center of mass of the solution with initial datum built upon r is driven by the solution to $ddot x=- abla V(x$. Finally, we provide examples and analyze the numerical errors in the two dimensional case when V is a harmonic potential.

  14. Near threshold computing technology, methods and applications

    CERN Document Server

    Silvano, Cristina

    2016-01-01

    This book explores near-threshold computing (NTC), a design-space using techniques to run digital chips (processors) near the lowest possible voltage.  Readers will be enabled with specific techniques to design chips that are extremely robust; tolerating variability and resilient against errors.  Variability-aware voltage and frequency allocation schemes will be presented that will provide performance guarantees, when moving toward near-threshold manycore chips.  ·         Provides an introduction to near-threshold computing, enabling reader with a variety of tools to face the challenges of the power/utilization wall; ·         Demonstrates how to design efficient voltage regulation, so that each region of the chip can operate at the most efficient voltage and frequency point; ·         Investigates how performance guarantees can be ensured when moving towards NTC manycores through variability-aware voltage and frequency allocation schemes.  .

  15. High Performance Numerical Computing for High Energy Physics: A New Challenge for Big Data Science

    Directory of Open Access Journals (Sweden)

    Florin Pop

    2014-01-01

    Full Text Available Modern physics is based on both theoretical analysis and experimental validation. Complex scenarios like subatomic dimensions, high energy, and lower absolute temperature are frontiers for many theoretical models. Simulation with stable numerical methods represents an excellent instrument for high accuracy analysis, experimental validation, and visualization. High performance computing support offers possibility to make simulations at large scale, in parallel, but the volume of data generated by these experiments creates a new challenge for Big Data Science. This paper presents existing computational methods for high energy physics (HEP analyzed from two perspectives: numerical methods and high performance computing. The computational methods presented are Monte Carlo methods and simulations of HEP processes, Markovian Monte Carlo, unfolding methods in particle physics, kernel estimation in HEP, and Random Matrix Theory used in analysis of particles spectrum. All of these methods produce data-intensive applications, which introduce new challenges and requirements for ICT systems architecture, programming paradigms, and storage capabilities.

  16. Towards Empowering Hearing Impaired Students' Skills in Computing and Technology

    Directory of Open Access Journals (Sweden)

    Nihal Esam Abuzinadah

    2017-01-01

    Full Text Available Studies have shown that deaf and hearing-impaired students have many difficulties in learning applied disciplines such as Medicine, Engineering, and Computer Programming. This study aims to investigate the readiness of deaf students to pursue higher education in applied sciences, more specifically in computer science. This involves investigating their capabilities in computer skills and applications. Computer programming is an integral component in the technological field that can facilitate the development of further scientific advances. Devising a manner of teaching the deaf and hearing-impaired population will give them an opportunity to contribute to the technology sector. This would allow these students to join the scientific world when otherwise; they are generally unable to participate because of the limitations they encounter. The study showed that deaf students in Jeddah are eager to continue their higher education and that a large percentage of these students are keen on studying computer science, particularly if they are provided with the right tools.

  17. An approach to first principles electronic structure calculation by symbolic-numeric computation

    Directory of Open Access Journals (Sweden)

    Akihito Kikuchi

    2013-04-01

    Full Text Available There is a wide variety of electronic structure calculation cooperating with symbolic computation. The main purpose of the latter is to play an auxiliary role (but not without importance to the former. In the field of quantum physics [1-9], researchers sometimes have to handle complicated mathematical expressions, whose derivation seems almost beyond human power. Thus one resorts to the intensive use of computers, namely, symbolic computation [10-16]. Examples of this can be seen in various topics: atomic energy levels, molecular dynamics, molecular energy and spectra, collision and scattering, lattice spin models and so on [16]. How to obtain molecular integrals analytically or how to manipulate complex formulas in many body interactions, is one such problem. In the former, when one uses special atomic basis for a specific purpose, to express the integrals by the combination of already known analytic functions, may sometimes be very difficult. In the latter, one must rearrange a number of creation and annihilation operators in a suitable order and calculate the analytical expectation value. It is usual that a quantitative and massive computation follows a symbolic one; for the convenience of the numerical computation, it is necessary to reduce a complicated analytic expression into a tractable and computable form. This is the main motive for the introduction of the symbolic computation as a forerunner of the numerical one and their collaboration has won considerable successes. The present work should be classified as one such trial. Meanwhile, the use of symbolic computation in the present work is not limited to indirect and auxiliary part to the numerical computation. The present work can be applicable to a direct and quantitative estimation of the electronic structure, skipping conventional computational methods.

  18. Development of numerical algorithms for practical computation of nonlinear normal modes

    OpenAIRE

    2008-01-01

    When resorting to numerical algorithms, we show that nonlinear normal mode (NNM) computation is possible with limited implementation effort, which paves the way to a practical method for determining the NNMs of nonlinear mechanical systems. The proposed method relies on two main techniques, namely a shooting procedure and a method for the continuation of NNM motions. In addition, sensitivity analysis is used to reduce the computational burden of the algorithm. A simplified discrete model of a...

  19. AGIS: Integration of new technologies used in ATLAS Distributed Computing

    CERN Document Server

    Anisenkov, Alexey; The ATLAS collaboration; Alandes Pradillo, Maria

    2016-01-01

    AGIS is the information system designed to integrate configuration and status information about resources, services and topology of the computing infrastructure used by ATLAS Distributed Computing (ADC) applications and services. In this note, we describe the evolution and the recent developments of AGIS functionalities, related to integration of new technologies recently become widely used in ATLAS Computing like flexible computing utilization of opportunistic Cloud and HPC resources, ObjectStore services integration for Distributed Data Management (Rucio) and ATLAS workload management (PanDA) systems, unified storage protocols declaration required for PandDA Pilot site movers and others.

  20. Techniques for improving computational speed in numerical simulation of casting thermal stress based on finite difference method

    Directory of Open Access Journals (Sweden)

    Xue Xiang

    2013-03-01

    Full Text Available Finite difference method (FDM was applied to simulate thermal stress recently, which normally needs a long computational time and big computer storage. This study presents two techniques for improving computational speed in numerical simulation of casting thermal stress based on FDM, one for handling of nonconstant material properties and the other for dealing with the various coefficients in discretization equations. The use of the two techniques has been discussed and an application in wave-guide casting is given. The results show that the computational speed is almost tripled and the computer storage needed is reduced nearly half compared with those of the original method without the new technologies. The stress results for the casting domain obtained by both methods that set the temperature steps to 0.1 ℃ and 10 ℃, respectively are nearly the same and in good agreement with actual casting situation. It can be concluded that both handling the material properties as an assumption of stepwise profile and eliminating the repeated calculation are reliable and effective to improve computational speed, and applicable in heat transfer and fluid flow simulation.

  1. CNC Turning Center Operations and Prove Out. Computer Numerical Control Operator/Programmer. 444-334.

    Science.gov (United States)

    Skowronski, Steven D.

    This student guide provides materials for a course designed to instruct the student in the recommended procedures used when setting up tooling and verifying part programs for a two-axis computer numerical control (CNC) turning center. The course consists of seven units. Unit 1 discusses course content and reviews and demonstrates set-up procedures…

  2. CNC Turning Center Advanced Operations. Computer Numerical Control Operator/Programmer. 444-332.

    Science.gov (United States)

    Skowronski, Steven D.; Tatum, Kenneth

    This student guide provides materials for a course designed to introduce the student to the operations and functions of a two-axis computer numerical control (CNC) turning center. The course consists of seven units. Unit 1 presents course expectations and syllabus, covers safety precautions, and describes the CNC turning center components, CNC…

  3. Research in progress in applied mathematics, numerical analysis, and computer science

    Science.gov (United States)

    1990-01-01

    Research conducted at the Institute in Science and Engineering in applied mathematics, numerical analysis, and computer science is summarized. The Institute conducts unclassified basic research in applied mathematics in order to extend and improve problem solving capabilities in science and engineering, particularly in aeronautics and space.

  4. CNC Turning Center Operations and Prove Out. Computer Numerical Control Operator/Programmer. 444-334.

    Science.gov (United States)

    Skowronski, Steven D.

    This student guide provides materials for a course designed to instruct the student in the recommended procedures used when setting up tooling and verifying part programs for a two-axis computer numerical control (CNC) turning center. The course consists of seven units. Unit 1 discusses course content and reviews and demonstrates set-up procedures…

  5. CNC Turning Center Advanced Operations. Computer Numerical Control Operator/Programmer. 444-332.

    Science.gov (United States)

    Skowronski, Steven D.; Tatum, Kenneth

    This student guide provides materials for a course designed to introduce the student to the operations and functions of a two-axis computer numerical control (CNC) turning center. The course consists of seven units. Unit 1 presents course expectations and syllabus, covers safety precautions, and describes the CNC turning center components, CNC…

  6. Verifying the error bound of numerical computation implemented in computer systems

    Science.gov (United States)

    Sawada, Jun

    2013-03-12

    A verification tool receives a finite precision definition for an approximation of an infinite precision numerical function implemented in a processor in the form of a polynomial of bounded functions. The verification tool receives a domain for verifying outputs of segments associated with the infinite precision numerical function. The verification tool splits the domain into at least two segments, wherein each segment is non-overlapping with any other segment and converts, for each segment, a polynomial of bounded functions for the segment to a simplified formula comprising a polynomial, an inequality, and a constant for a selected segment. The verification tool calculates upper bounds of the polynomial for the at least two segments, beginning with the selected segment and reports the segments that violate a bounding condition.

  7. A Numerical Scheme for Computing Stable and Unstable Manifolds in Nonautonomous Flows

    Science.gov (United States)

    Balasuriya, Sanjeeva

    2016-12-01

    There are many methods for computing stable and unstable manifolds in autonomous flows. When the flow is nonautonomous, however, difficulties arise since the hyperbolic trajectory to which these manifolds are anchored, and the local manifold emanation directions, are changing with time. This article utilizes recent results which approximate the time-variation of both these quantities to design a numerical algorithm which can obtain high resolution in global nonautonomous stable and unstable manifolds. In particular, good numerical approximation is possible locally near the anchor trajectory. Nonautonomous manifolds are computed for two examples: a Rossby wave situation which is highly chaotic, and a nonautonomus (time-aperiodic) Duffing oscillator model in which the manifold emanation directions are rapidly changing. The numerical method is validated and analyzed in these cases using finite-time Lyapunov exponent fields and exactly known nonautonomous manifolds.

  8. 3rd International Conference on Numerical Analysis and Optimization : Theory, Methods, Applications and Technology Transfer

    CERN Document Server

    Grandinetti, Lucio; Purnama, Anton

    2015-01-01

    Presenting the latest findings in the field of numerical analysis and optimization, this volume balances pure research with practical applications of the subject. Accompanied by detailed tables, figures, and examinations of useful software tools, this volume will equip the reader to perform detailed and layered analysis of complex datasets. Many real-world complex problems can be formulated as optimization tasks. Such problems can be characterized as large scale, unconstrained, constrained, non-convex, non-differentiable, and discontinuous, and therefore require adequate computational methods, algorithms, and software tools. These same tools are often employed by researchers working in current IT hot topics such as big data, optimization and other complex numerical algorithms on the cloud, devising special techniques for supercomputing systems. The list of topics covered include, but are not limited to: numerical analysis, numerical optimization, numerical linear algebra, numerical differential equations, opt...

  9. Extending the horizons advances in computing, optimization, and decision technologies

    CERN Document Server

    Joseph, Anito; Mehrotra, Anuj; Trick, Michael

    2007-01-01

    Computer Science and Operations Research continue to have a synergistic relationship and this book represents the results of cross-fertilization between OR/MS and CS/AI. It is this interface of OR/CS that makes possible advances that could not have been achieved in isolation. Taken collectively, these articles are indicative of the state-of-the-art in the interface between OR/MS and CS/AI and of the high caliber of research being conducted by members of the INFORMS Computing Society. EXTENDING THE HORIZONS: Advances in Computing, Optimization, and Decision Technologies is a volume that presents the latest, leading research in the design and analysis of algorithms, computational optimization, heuristic search and learning, modeling languages, parallel and distributed computing, simulation, computational logic and visualization. This volume also emphasizes a variety of novel applications in the interface of CS, AI, and OR/MS.

  10. Computer technology in education and issues of power and equity

    Directory of Open Access Journals (Sweden)

    Alper Kesten

    2010-05-01

    Full Text Available This study aims to use ‘techniques of power’ classified (based on Foucault’s work by Gore in order to illustrate power relations between supporters (or non-supporters of computer technology and teachers. For this purpose, six out of eight techniques of power (surveillance, normalization, exclusion, classification, distribution and regulation is used in formulating thoughts about computer technology and issues of power and equity. In this study, these techniques of power were discussed more detailed both to exemplify how supporters (or non-supporters of computer technology exercise power over teachers (preservice or inservice by using of major techniques of power and to show how they are related to the issue of equity.

  11. Use of computer technology to enhance immigrant families' adaptation.

    Science.gov (United States)

    Tsai, Jenny Hsin-Chun

    2006-01-01

    To summarize how computer technology influenced immigrant families' adaptation to life in the United States. Critical ethnography. Data were collected from 1998 to 2000 from 13 parents and 16 children from nine Taiwanese immigrant families using semi-structured interviews and a questionnaire. Narrative analysis was used with interview data. Participants faced the demands of language proficiency, economic survival, loss of social networks, and social disconnection during resettlement. Computer technology provided participants with new occupational opportunities and strategies to overcome the barriers and stress created by resettlement. Internet and E-mail access greatly facilitated these participant families' adaptation. Study findings warrant further exploration to assess bow new computer technology promotes immigrant families' adaptation and alleviates stress associated with resettlement, including information about their health and health care.

  12. Computer technology in oil refining: cost or benefit

    Energy Technology Data Exchange (ETDEWEB)

    Payne, B. (KBC Process Technology (GB))

    1990-04-01

    There is undoubtedly a commitment in the oil refining industry to computerise wherever possible, and to develop advanced mathematical modelling techniques to improved profitability. However, many oil refiners are now asking themselves whether computer solutions are a cost, or are truly a benefit to their organisation. Problems have been caused by distributed computing running out of control in many organisations. This has been partly brought to reign recently, by advanced networking of PCs along with mainframe facilities, and development of management information systems with common data bases for all users to build their applications on. Implementation of information technology strategies helped many refiners to plan the way ahead for the future. The use of computers across the refining sector in the current marketplace is reviewed. The conclusion drawn is that although computer technology is a cost it can also be ranked as a significant benefit and success in the refining industry at present. (author).

  13. A Technology Assessment of Personal Computers. Vol. III: Personal Computer Impacts and Policy Issues.

    Science.gov (United States)

    Nilles, Jack M.; And Others

    A technology assessment of personal computers was conducted to study both the socially desirable and undesirable impacts of this new technology in three main areas: education, employment, and international trade. Information gleaned from this study was then used to generate suggestions for public policy options which could influence these impacts.…

  14. International Conference on Computer Science and Information Technology

    CERN Document Server

    Li, Xiaolong

    2014-01-01

    The main objective of CSAIT 2013 is to provide a forum for researchers, educators, engineers and government officials involved in the general areas of Computational Sciences and Information Technology to disseminate their latest research results and exchange views on the future research directions of these fields. A medium like this provides an opportunity to the academicians and industrial professionals to exchange and integrate practice of computer science, application of the academic ideas, improve the academic depth. The in-depth discussions on the subject provide an international communication platform for educational technology and scientific research for the world's universities, engineering field experts, professionals and business executives.

  15. Field-programmable custom computing technology architectures, tools, and applications

    CERN Document Server

    Luk, Wayne; Pocek, Ken

    2000-01-01

    Field-Programmable Custom Computing Technology: Architectures, Tools, and Applications brings together in one place important contributions and up-to-date research results in this fast-moving area. In seven selected chapters, the book describes the latest advances in architectures, design methods, and applications of field-programmable devices for high-performance reconfigurable systems. The contributors to this work were selected from the leading researchers and practitioners in the field. It will be valuable to anyone working or researching in the field of custom computing technology. It serves as an excellent reference, providing insight into some of the most challenging issues being examined today.

  16. Team Viewer Technology for Remote Control of a Computer

    Directory of Open Access Journals (Sweden)

    Cornelia Victoria Anghel Drugarin

    2016-10-01

    Full Text Available Team Viewer software is used to remote control our PC. We can use this remote control technology to desktop sharing, online conferences and for file transfer between computers. Basically, using this software, you can ask for help a friend, or professional software to solve problems from a distance, without it having to be physically go to each client / friend in part. After installed and configured Team Viewer application, is complete, we can remote control the computer.

  17. Computer-aided Translation Technology and Its Applications

    Institute of Scientific and Technical Information of China (English)

    汪美侠; 何大顺

    2014-01-01

    This article begins with a brief analysis of the significance of translation technology in different spheres of modern life, followed by a distinction between machine translation (MT) and computer-aided translation (CAT). It then describes some trans-lation resources and tools and examines the negative and positive aspects of computer-aided translations. Finally it comes to a conclusion that it would be greatly efficient and productive for the translators to acquire the new skills in the translation work-place.

  18. JPRS Report, Science & Technology, Europe, First International Computers Communications Conference

    Science.gov (United States)

    2007-11-02

    Hong Kong Telephone has employed fibre optic technology in its transmission network since 1981. Fibre optic transmission systems are used to...leased datalines. The potentials of fibre optic systems are large, and in this paper, some examples will be given to illustrate how the attributes of... fibre optic systems are exploited in Hong Kong Telephone. This report of Science & Technology Europe, First International Computers Communications Conference.

  19. Summary of research in applied mathematics, numerical analysis and computer science at the Institute for Computer Applications in Science and Engineering

    Science.gov (United States)

    1984-01-01

    Research conducted at the Institute for Computer Applications in Science and Engineering in applied mathematics, numerical analysis and computer science during the period October 1, 1983 through March 31, 1984 is summarized.

  20. Summary of research conducted at the Institute for Computer Applications in Science and Engineering in applied mathematics, numerical analysis and computer science

    Science.gov (United States)

    1989-01-01

    Research conducted at the Institute for Computer Applications in Science and Engineering in applied mathematics, numerical analysis, and computer science during the period October 1, 1988 through March 31, 1989 is summarized.

  1. Research conducted at the Institute for Computer Applications in Science and Engineering in applied mathematics, numerical analysis and computer science. Final semiannual report, 1 April-30 September 1986

    Energy Technology Data Exchange (ETDEWEB)

    1987-01-01

    Research conducted at the Institute for Computer Applications in Science and Engineering in applied mathematics, numerical analysis, and computer science during the period April, 1986 through September 30, 1986 is summarized.

  2. Computer Science Research: Computation Directorate

    Energy Technology Data Exchange (ETDEWEB)

    Durst, M.J. (ed.); Grupe, K.F. (ed.)

    1988-01-01

    This report contains short papers in the following areas: large-scale scientific computation; parallel computing; general-purpose numerical algorithms; distributed operating systems and networks; knowledge-based systems; and technology information systems.

  3. Computational Enhancements for Direct Numerical Simulations of Statistically Stationary Turbulent Premixed Flames

    KAUST Repository

    Mukhadiyev, Nurzhan

    2017-05-01

    Combustion at extreme conditions, such as a turbulent flame at high Karlovitz and Reynolds numbers, is still a vast and an uncertain field for researchers. Direct numerical simulation of a turbulent flame is a superior tool to unravel detailed information that is not accessible to most sophisticated state-of-the-art experiments. However, the computational cost of such simulations remains a challenge even for modern supercomputers, as the physical size, the level of turbulence intensity, and chemical complexities of the problems continue to increase. As a result, there is a strong demand for computational cost reduction methods as well as in acceleration of existing methods. The main scope of this work was the development of computational and numerical tools for high-fidelity direct numerical simulations of premixed planar flames interacting with turbulence. The first part of this work was KAUST Adaptive Reacting Flow Solver (KARFS) development. KARFS is a high order compressible reacting flow solver using detailed chemical kinetics mechanism; it is capable to run on various types of heterogeneous computational architectures. In this work, it was shown that KARFS is capable of running efficiently on both CPU and GPU. The second part of this work was numerical tools for direct numerical simulations of planar premixed flames: such as linear turbulence forcing and dynamic inlet control. DNS of premixed turbulent flames conducted previously injected velocity fluctuations at an inlet. Turbulence injected at the inlet decayed significantly while reaching the flame, which created a necessity to inject higher than needed fluctuations. A solution for this issue was to maintain turbulence strength on the way to the flame using turbulence forcing. Therefore, a linear turbulence forcing was implemented into KARFS to enhance turbulence intensity. Linear turbulence forcing developed previously by other groups was corrected with net added momentum removal mechanism to prevent mean

  4. Current research activities: Applied and numerical mathematics, fluid mechanics, experiments in transition and turbulence and aerodynamics, and computer science

    Science.gov (United States)

    1992-01-01

    Research conducted at the Institute for Computer Applications in Science and Engineering in applied mathematics, numerical analysis, fluid mechanics including fluid dynamics, acoustics, and combustion, aerodynamics, and computer science during the period 1 Apr. 1992 - 30 Sep. 1992 is summarized.

  5. Peer-to-Peer Secure Multi-Party Numerical Computation Facing Malicious Adversaries

    CERN Document Server

    Bickson, Danny; Dolev, Danny; Pinkas, Benny

    2009-01-01

    We propose an efficient framework for enabling secure multi-party numerical computations in a Peer-to-Peer network. This problem arises in a range of applications such as collaborative filtering, distributed computation of trust and reputation, monitoring and other tasks, where the computing nodes is expected to preserve the privacy of their inputs while performing a joint computation of a certain function. Although there is a rich literature in the field of distributed systems security concerning secure multi-party computation, in practice it is hard to deploy those methods in very large scale Peer-to-Peer networks. In this work, we try to bridge the gap between theoretical algorithms in the security domain, and a practical Peer-to-Peer deployment. We consider two security models. The first is the semi-honest model where peers correctly follow the protocol, but try to reveal private information. We provide three possible schemes for secure multi-party numerical computation for this model and identify a singl...

  6. Fundamentals of grid computing theory, algorithms and technologies

    CERN Document Server

    2010-01-01

    This volume discusses how the novel technologies of semantic web and workflow have been integrated into the grid and grid services. It focuses on sharing resources, data replication, data management, fault tolerance, scheduling, broadcasting, and load balancing algorithms. The book discusses emerging developments in grid computing, including cloud computing, and explores large-scale computing in high energy physics, weather forecasting, and more. The contributors often use simulations to evaluate the performance of models and algorithms. In the appendices, they present two types of easy-to-use open source software written in Java

  7. 11th International Conference on Computing and Information Technology

    CERN Document Server

    Meesad, Phayung; Boonkrong, Sirapat

    2015-01-01

    This book presents recent research work and results in the area of communication and information technologies. The book includes the main results of the 11th International Conference on Computing and Information Technology (IC2IT) held during July 2nd-3rd, 2015 in Bangkok, Thailand. The book is divided into the two main parts Data Mining and Machine Learning as well as Data Network and Communications. New algorithms and methods of data mining asr discussed as well as innovative applications and state-of-the-art technologies on data mining, machine learning and data networking.

  8. 2nd International Conference on Computer and Communication Technologies

    CERN Document Server

    Raju, K; Mandal, Jyotsna; Bhateja, Vikrant

    2016-01-01

    The book is about all aspects of computing, communication, general sciences and educational research covered at the Second International Conference on Computer & Communication Technologies held during 24-26 July 2015 at Hyderabad. It hosted by CMR Technical Campus in association with Division – V (Education & Research) CSI, India. After a rigorous review only quality papers are selected and included in this book. The entire book is divided into three volumes. Three volumes cover a variety of topics which include medical imaging, networks, data mining, intelligent computing, software design, image processing, mobile computing, digital signals and speech processing, video surveillance and processing, web mining, wireless sensor networks, circuit analysis, fuzzy systems, antenna and communication systems, biomedical signal processing and applications, cloud computing, embedded systems applications and cyber security and digital forensic. The readers of these volumes will be highly benefited from the te...

  9. Information Technology in project-organized electronic and computer technology engineering education

    DEFF Research Database (Denmark)

    Nielsen, Kirsten Mølgaard; Nielsen, Jens Frederik Dalsgaard

    1999-01-01

    This paper describes the integration of IT in the education of electronic and computer technology engineers at Institute of Electronic Systems, Aalborg Uni-versity, Denmark. At the Institute Information Technology is an important tool in the aspects of the education as well as for communication...

  10. The Adoption of Grid Computing Technology by Organizations: A Quantitative Study Using Technology Acceptance Model

    Science.gov (United States)

    Udoh, Emmanuel E.

    2010-01-01

    Advances in grid technology have enabled some organizations to harness enormous computational power on demand. However, the prediction of widespread adoption of the grid technology has not materialized despite the obvious grid advantages. This situation has encouraged intense efforts to close the research gap in the grid adoption process. In this…

  11. Troubling Discourse: Basic Writing and Computer-Mediated Technologies

    Science.gov (United States)

    Jonaitis, Leigh A.

    2012-01-01

    Through an examination of literature in the fields of Basic Writing and developmental education, this essay provides some historical perspective and examines the prevalent discourses on the use of computer-mediated technologies in the basic writing classroom. The author uses Bertram Bruce's (1997) framework of various "stances" on…

  12. Creating the Environment for the Prosperity of Cloud Computing Technology

    Directory of Open Access Journals (Sweden)

    Wen-Hsing Lai

    2012-08-01

    Full Text Available The key point for the success of clouding computing technology in terms of application is whether such operation can produce the sense of trustworthiness to its users. Technical measurement has always been the fundamental preventive precaution, no matter what kind of aspect in dealing with producing the sense of trustworthiness.  Except technical measurement, there are two developing issues surrounding the central idea worth notice, which are the protection of information privacy and the jurisdictional issue. The main purpose of this article is to focus on the issue of protecting information privacy and jurisdictional problem through the newly developed cloud computing technology. This article will first introduce the characteristics of cloud computing technology in order to pave the way for further discussion. Then the issue of protecting information privacy and jurisdictional problem will be discussed through disparity of legal protection of information privacy and principles for asserting jurisdiction within Internet. The personal observation and suggestion will be made at the end of this article for a future possible adjustment of infrastructure for the protection of information privacy and jurisdictional decision within cyberspace in order to promote the sense of trustworthiness of the cloud computing technology user.

  13. Computer-Assisted Foreign Language Teaching and Learning: Technological Advances

    Science.gov (United States)

    Zou, Bin; Xing, Minjie; Wang, Yuping; Sun, Mingyu; Xiang, Catherine H.

    2013-01-01

    Computer-Assisted Foreign Language Teaching and Learning: Technological Advances highlights new research and an original framework that brings together foreign language teaching, experiments and testing practices that utilize the most recent and widely used e-learning resources. This comprehensive collection of research will offer linguistic…

  14. Application and prospect of computer technology in welding materials field

    Institute of Scientific and Technical Information of China (English)

    2001-01-01

    This paper summarizes the application status of computer technology in welding materials field from three aspects: the CAD of welding materials, the date base system for welding materials and the expert system for welding materials .Besides, this paper explores and discusses the existing problems and the developing trend in the future.

  15. Computer Technology Integration and Student Learning: Barriers and Promise

    Science.gov (United States)

    Keengwe, Jared; Onchwari, Grace; Wachira, Patrick

    2008-01-01

    Political and institutional support has enabled many institutions of learning to spend millions of dollars to acquire educational computing tools (Ficklen and Muscara, "Am Educ" 25(3):22-29, 2001) that have not been effectively integrated into the curriculum. While access to educational technology tools has remarkably improved in most schools,…

  16. Computer Software for Forestry Technology Curricula. Final Report.

    Science.gov (United States)

    Watson, Roy C.; Scobie, Walter R.

    Since microcomputers are being used more and more frequently in the forest products industry in the Pacific Northwest, Green River Community College conducted a project to search for BASIC language computer programs pertaining to forestry, and when possible, to adapt such software for use in teaching forestry technology. The search for applicable…

  17. Computational Structures Technology for Airframes and Propulsion Systems

    Science.gov (United States)

    Noor, Ahmed K. (Compiler); Housner, Jerrold M. (Compiler); Starnes, James H., Jr. (Compiler); Hopkins, Dale A. (Compiler); Chamis, Christos C. (Compiler)

    1992-01-01

    This conference publication contains the presentations and discussions from the joint University of Virginia (UVA)/NASA Workshops. The presentations included NASA Headquarters perspectives on High Speed Civil Transport (HSCT), goals and objectives of the UVA Center for Computational Structures Technology (CST), NASA and Air Force CST activities, CST activities for airframes and propulsion systems in industry, and CST activities at Sandia National Laboratory.

  18. Pervasive Computing and Communication Technologies for U-Learning

    Science.gov (United States)

    Park, Young C.

    2014-01-01

    The development of digital information transfer, storage and communication methods influences a significant effect on education. The assimilation of pervasive computing and communication technologies marks another great step forward, with Ubiquitous Learning (U-learning) emerging for next generation learners. In the evolutionary view the 5G (or…

  19. Pervasive Computing and Communication Technologies for U-Learning

    Science.gov (United States)

    Park, Young C.

    2014-01-01

    The development of digital information transfer, storage and communication methods influences a significant effect on education. The assimilation of pervasive computing and communication technologies marks another great step forward, with Ubiquitous Learning (U-learning) emerging for next generation learners. In the evolutionary view the 5G (or…

  20. Numerical characterization of nonlinear dynamical systems using parallel computing: The role of GPUS approach

    Science.gov (United States)

    Fazanaro, Filipe I.; Soriano, Diogo C.; Suyama, Ricardo; Madrid, Marconi K.; Oliveira, José Raimundo de; Muñoz, Ignacio Bravo; Attux, Romis

    2016-08-01

    The characterization of nonlinear dynamical systems and their attractors in terms of invariant measures, basins of attractions and the structure of their vector fields usually outlines a task strongly related to the underlying computational cost. In this work, the practical aspects related to the use of parallel computing - specially the use of Graphics Processing Units (GPUS) and of the Compute Unified Device Architecture (CUDA) - are reviewed and discussed in the context of nonlinear dynamical systems characterization. In this work such characterization is performed by obtaining both local and global Lyapunov exponents for the classical forced Duffing oscillator. The local divergence measure was employed by the computation of the Lagrangian Coherent Structures (LCSS), revealing the general organization of the flow according to the obtained separatrices, while the global Lyapunov exponents were used to characterize the attractors obtained under one or more bifurcation parameters. These simulation sets also illustrate the required computation time and speedup gains provided by different parallel computing strategies, justifying the employment and the relevance of GPUS and CUDA in such extensive numerical approach. Finally, more than simply providing an overview supported by a representative set of simulations, this work also aims to be a unified introduction to the use of the mentioned parallel computing tools in the context of nonlinear dynamical systems, providing codes and examples to be executed in MATLAB and using the CUDA environment, something that is usually fragmented in different scientific communities and restricted to specialists on parallel computing strategies.

  1. Providing Assistive Technology Applications as a Service Through Cloud Computing.

    Science.gov (United States)

    Mulfari, Davide; Celesti, Antonio; Villari, Massimo; Puliafito, Antonio

    2015-01-01

    Users with disabilities interact with Personal Computers (PCs) using Assistive Technology (AT) software solutions. Such applications run on a PC that a person with a disability commonly uses. However the configuration of AT applications is not trivial at all, especially whenever the user needs to work on a PC that does not allow him/her to rely on his / her AT tools (e.g., at work, at university, in an Internet point). In this paper, we discuss how cloud computing provides a valid technological solution to enhance such a scenario.With the emergence of cloud computing, many applications are executed on top of virtual machines (VMs). Virtualization allows us to achieve a software implementation of a real computer able to execute a standard operating system and any kind of application. In this paper we propose to build personalized VMs running AT programs and settings. By using the remote desktop technology, our solution enables users to control their customized virtual desktop environment by means of an HTML5-based web interface running on any computer equipped with a browser, whenever they are.

  2. Innovative Use of Cloud Computing in Smart Phone Technology

    Directory of Open Access Journals (Sweden)

    Vaibhav Rana

    2013-07-01

    Full Text Available This paper elaborates the vital and innovative use of Cloud computing in the field of Smart Phone Technology. In the proposed environment there is a cloud server installed at the central place called as cloud center of mobile computing. The function of cloud computing is to accept the request of the end users and process the required applications accordingly. Henceforth this server is fully equipped with all advance ICT infrastructure, mobile communication utilities and full security measure, so that every feature can be used with full security. All users are having equal priority to get connection with the cloud server and use every application as well as each function equally. Due to use of this modern technology the main advantage is that a single entity is being used by many remote users for various requirements at the same time without occupying much space and infrastructure. The resulting new paradigm of mobile cloud computing is being embraced by researchers, professionals and practitioners as an exciting new way to extend the capabilities of mobile devices and mobile platforms. This has the potential for profound impacts on the business environment and people's daily life. The most salient feature of the system is that by the use of this infrastructure we can perform mobile communication and electronic communication by a single unit and the same communication spectrum. The presented cloud computing technology offers a natural solution for expending the limited capabilities of mobile devices. This process makes the whole communication system cost effective, efficient, transparent, modular system.

  3. Human-Computer Etiquette Cultural Expectations and the Design Implications They Place on Computers and Technology

    CERN Document Server

    Hayes, Caroline C

    2010-01-01

    Written by experts from various fields, this edited collection explores a wide range of issues pertaining to how computers evoke human social expectations. The book illustrates how socially acceptable conventions can strongly impact the effectiveness of human-computer interactions and how to consider such norms in the design of human-computer interfaces. Providing a complete introduction to the design of social responses to computers, the text emphasizes the value of social norms in the development of usable and enjoyable technology. It also describes the role of socially correct behavior in t

  4. Guide to cloud computing for business and technology managers from distributed computing to cloudware applications

    CERN Document Server

    Kale, Vivek

    2014-01-01

    Guide to Cloud Computing for Business and Technology Managers: From Distributed Computing to Cloudware Applications unravels the mystery of cloud computing and explains how it can transform the operating contexts of business enterprises. It provides a clear understanding of what cloud computing really means, what it can do, and when it is practical to use. Addressing the primary management and operation concerns of cloudware, including performance, measurement, monitoring, and security, this pragmatic book:Introduces the enterprise applications integration (EAI) solutions that were a first ste

  5. Numerical approximation on computing partial sum of nonlinear Schroedinger eigenvalue problems

    Institute of Scientific and Technical Information of China (English)

    JiachangSUN; DingshengWANG; 等

    2001-01-01

    In computing electronic structure and energy band in the system of multiparticles,quite a large number of problems are to obtain the partial sum of the densities and energies by using “First principle”。In the ordinary method,the so-called self-consistency approach,the procedure is limited to a small scale because of its high computing complexity.In this paper,the problem of computing the partial sum for a class of nonlinear Schroedinger eigenvalue equations is changed into the constrained functional minimization.By space decompostion and Rayleigh-Schroedinger method,one approximating formula for the minimal is provided.The numerical experiments show that this formula is more precise and its quantity of computation is smaller.

  6. Piv Method and Numerical Computation for Prediction of Liquid Steel Flow Structure in Tundish

    Directory of Open Access Journals (Sweden)

    Cwudziński A.

    2015-04-01

    Full Text Available This paper presents the results of computer simulations and laboratory experiments carried out to describe the motion of steel flow in the tundish. The facility under investigation is a single-nozzle tundish designed for casting concast slabs. For the validation of the numerical model and verification of the hydrodynamic conditions occurring in the examined tundish furniture variants, obtained from the computer simulations, a physical model of the tundish was employed. State-of-the-art vector flow field analysis measuring systems developed by Lavision were used in the laboratory tests. Computer simulations of liquid steel flow were performed using the commercial program Ansys-Fluent¯. In order to obtain a complete hydrodynamic picture in the tundish furniture variants tested, the computer simulations were performed for both isothermal and non-isothermal conditions.

  7. Overview of European technology in computers, telecommunications, and electronics

    Science.gov (United States)

    Blackburn, J. F.

    1990-05-01

    The emergence of the personal computer, the growing use of distributed systems, and the increasing demand for supercomputers and mini-supercomputers are causing a profound impact on the European computer market. An equally profound development in telecommunications is the integration of voice, data, and images in the public network systems - the Integrated Service Digital Network (ISDN). The programs being mounted in Europe to meet the challenges of these technologies are described. The Europe-wide trends and actions with respect to computers, telecommunications, and microelectronics are discussed, and the major European collaborative programs in these fields are described. Specific attention is given to the European Strategic Programme for Research and Development in Information (ESPRIT); Research in Advanced Communications for Europe (RACE); European Research Coordination Agency (Eureka) programs; Joint European Submicron Silicon Initiative (JESSI); and the recently combined programs Basic Research Industrial Technologies in Europe/European Research in Advanced Materials (BRITE/EURAM).

  8. Advanced computer modeling techniques expand belt conveyor technology

    Energy Technology Data Exchange (ETDEWEB)

    Alspaugh, M.

    1998-07-01

    Increased mining production is continuing to challenge engineers and manufacturers to keep up. The pressure to produce larger and more versatile equipment is increasing. This paper will show some recent major projects in the belt conveyor industry that have pushed the limits of design and engineering technology. Also, it will discuss the systems engineering discipline and advanced computer modeling tools that have helped make these achievements possible. Several examples of technologically advanced designs will be reviewed. However, new technology can sometimes produce increased problems with equipment availability and reliability if not carefully developed. Computer modeling techniques that help one design larger equipment can also compound operational headaches if engineering processes and algorithms are not carefully analyzed every step of the way.

  9. Numerical simulation of the stress – strain state of technological tools for fine drawing

    OpenAIRE

    Порубов, А. В.; Мельникова, Т. Е.

    2014-01-01

    An urgent task is to ensure the long life of the technological tool, namely the expensive diamond dies, which can significantly improve the efficiency of the production of wire. Strength Evaluation of technological tools, numerical simulation of the stress – strain state of the diamond drawing tool in the finite – element package ANSYS. Calculation of strain and stress state of the diamond drawing tool for drawing copper and nickel – plated wire with the operating pressure and the pressing fo...

  10. FREQFIT: Computer program which performs numerical regression and statistical chi-squared goodness of fit analysis

    Energy Technology Data Exchange (ETDEWEB)

    Hofland, G.S.; Barton, C.C.

    1990-10-01

    The computer program FREQFIT is designed to perform regression and statistical chi-squared goodness of fit analysis on one-dimensional or two-dimensional data. The program features an interactive user dialogue, numerous help messages, an option for screen or line printer output, and the flexibility to use practically any commercially available graphics package to create plots of the program`s results. FREQFIT is written in Microsoft QuickBASIC, for IBM-PC compatible computers. A listing of the QuickBASIC source code for the FREQFIT program, a user manual, and sample input data, output, and plots are included. 6 refs., 1 fig.

  11. FREQFIT: Computer program which performs numerical regression and statistical chi-squared goodness of fit analysis

    Energy Technology Data Exchange (ETDEWEB)

    Hofland, G.S.; Barton, C.C.

    1990-10-01

    The computer program FREQFIT is designed to perform regression and statistical chi-squared goodness of fit analysis on one-dimensional or two-dimensional data. The program features an interactive user dialogue, numerous help messages, an option for screen or line printer output, and the flexibility to use practically any commercially available graphics package to create plots of the program`s results. FREQFIT is written in Microsoft QuickBASIC, for IBM-PC compatible computers. A listing of the QuickBASIC source code for the FREQFIT program, a user manual, and sample input data, output, and plots are included. 6 refs., 1 fig.

  12. Problem-Oriented Simulation Packages and Computational Infrastructure for Numerical Studies of Powerful Gyrotrons

    Science.gov (United States)

    Damyanova, M.; Sabchevski, S.; Zhelyazkov, I.; Vasileva, E.; Balabanova, E.; Dankov, P.; Malinov, P.

    2016-05-01

    Powerful gyrotrons are necessary as sources of strong microwaves for electron cyclotron resonance heating (ECRH) and electron cyclotron current drive (ECCD) of magnetically confined plasmas in various reactors (most notably ITER) for controlled thermonuclear fusion. Adequate physical models and efficient problem-oriented software packages are essential tools for numerical studies, analysis, optimization and computer-aided design (CAD) of such high-performance gyrotrons operating in a CW mode and delivering output power of the order of 1-2 MW. In this report we present the current status of our simulation tools (physical models, numerical codes, pre- and post-processing programs, etc.) as well as the computational infrastructure on which they are being developed, maintained and executed.

  13. EVOLVE : a Bridge between Probability, Set Oriented Numerics and Evolutionary Computation

    CERN Document Server

    Tantar, Alexandru-Adrian; Bouvry, Pascal; Moral, Pierre; Legrand, Pierrick; Coello, Carlos; Schütze, Oliver; EVOLVE 2011

    2013-01-01

    The aim of this book is to provide a strong theoretical support for understanding and analyzing the behavior of evolutionary algorithms, as well as for creating a bridge between probability, set-oriented numerics and evolutionary computation. The volume encloses a collection of contributions that were presented at the EVOLVE 2011 international workshop, held in Luxembourg, May 25-27, 2011, coming from invited speakers and also from selected regular submissions. The aim of EVOLVE is to unify the perspectives offered by probability, set oriented numerics and evolutionary computation. EVOLVE focuses on challenging aspects that arise at the passage from theory to new paradigms and practice, elaborating on the foundations of evolutionary algorithms and theory-inspired methods merged with cutting-edge techniques that ensure performance guarantee factors. EVOLVE is also intended to foster a growing interest for robust and efficient methods with a sound theoretical background. The chapters enclose challenging theoret...

  14. Removing the Correlation Term in Option Pricing Heston Model: Numerical Analysis and Computing

    Directory of Open Access Journals (Sweden)

    R. Company

    2013-01-01

    Full Text Available This paper deals with the numerical solution of option pricing stochastic volatility model described by a time-dependent, two-dimensional convection-diffusion reaction equation. Firstly, the mixed spatial derivative of the partial differential equation (PDE is removed by means of the classical technique for reduction of second-order linear partial differential equations to canonical form. An explicit difference scheme with positive coefficients and only five-point computational stencil is constructed. The boundary conditions are adapted to the boundaries of the rhomboid transformed numerical domain. Consistency of the scheme with the PDE is shown and stepsize discretization conditions in order to guarantee stability are established. Illustrative numerical examples are included.

  15. Numerical computation of solutions of the critical nonlinear Schrodinger equation after the singularity

    CERN Document Server

    Stinis, Panagiotis

    2010-01-01

    We present numerical results for the solution of the 1D critical nonlinear Schrodinger with periodic boundary conditions and initial data that give rise to a finite time singularity. We construct, through the Mori-Zwanzig formalism, a reduced model which allows us to follow the solution after the formation of the singularity. The computed post-singularity solution exhibits the same characteristics as the post-singularity solutions constructed recently by Terence Tao.

  16. Numerical Computation of a Continuous-thrust State Transition Matrix Incorporating Accurate Hardware and Ephemeris Models

    Science.gov (United States)

    Ellison, Donald; Conway, Bruce; Englander, Jacob

    2015-01-01

    A significant body of work exists showing that providing a nonlinear programming (NLP) solver with expressions for the problem constraint gradient substantially increases the speed of program execution and can also improve the robustness of convergence, especially for local optimizers. Calculation of these derivatives is often accomplished through the computation of spacecraft's state transition matrix (STM). If the two-body gravitational model is employed as is often done in the context of preliminary design, closed form expressions for these derivatives may be provided. If a high fidelity dynamics model, that might include perturbing forces such as the gravitational effect from multiple third bodies and solar radiation pressure is used then these STM's must be computed numerically. We present a method for the power hardward model and a full ephemeris model. An adaptive-step embedded eight order Dormand-Prince numerical integrator is discussed and a method for the computation of the time of flight derivatives in this framework is presented. The use of these numerically calculated derivatieves offer a substantial improvement over finite differencing in the context of a global optimizer. Specifically the inclusion of these STM's into the low thrust missiondesign tool chain in use at NASA Goddard Spaceflight Center allows for an increased preliminary mission design cadence.

  17. Computational model for supporting SHM systems design: Damage identification via numerical analyses

    Science.gov (United States)

    Sartorato, Murilo; de Medeiros, Ricardo; Vandepitte, Dirk; Tita, Volnei

    2017-02-01

    This work presents a computational model to simulate thin structures monitored by piezoelectric sensors in order to support the design of SHM systems, which use vibration based methods. Thus, a new shell finite element model was proposed and implemented via a User ELement subroutine (UEL) into the commercial package ABAQUS™. This model was based on a modified First Order Shear Theory (FOST) for piezoelectric composite laminates. After that, damaged cantilever beams with two piezoelectric sensors in different positions were investigated by using experimental analyses and the proposed computational model. A maximum difference in the magnitude of the FRFs between numerical and experimental analyses of 7.45% was found near the resonance regions. For damage identification, different levels of damage severity were evaluated by seven damage metrics, including one proposed by the present authors. Numerical and experimental damage metrics values were compared, showing a good correlation in terms of tendency. Finally, based on comparisons of numerical and experimental results, it is shown a discussion about the potentials and limitations of the proposed computational model to be used for supporting SHM systems design.

  18. Research on application of computer technologies in jewelry process

    Directory of Open Access Journals (Sweden)

    Junbo Xia

    2017-02-01

    Full Text Available Jewelry production is a process of precious raw materials and low losses in processing. The traditional manual mode is unable to meet the needs of enterprises in reality, while the involvement of computer technology can just solve this practical problem. At present, the problem of restricting the application for computer in jewelry production is mainly a failure to find a production model that can serve the whole industry chain with the computer as the core of production. This paper designs a “synchronous and diversified” production model with “computer aided design technology” and “rapid prototyping technology” as the core, and tests with actual production cases, and achieves certain results, which are forward-looking and advanced.

  19. Numerical Modeling and the Technological Process of cleating at a Frequency of 500 Hz

    Directory of Open Access Journals (Sweden)

    Claudia Olimpia STASAC

    2009-10-01

    Full Text Available The paper refers to a technology ofachieving bimetallic combination by processingstructure in an electromagnetic field of mediumfrequency.The numerical model used in this study isbased on the finite element model and is destined tothe study of heating by induction in volume ofcyllindrical feromagnetic steel structure whoseproperties vary with temperature and suffer phasetransformation across Curie point.

  20. Numerical model for computation of effective and ambient dose equivalent at flight altitudes

    Directory of Open Access Journals (Sweden)

    Mishev Alexander

    2015-01-01

    Full Text Available A numerical model for assessment of the effective dose and ambient dose equivalent produced by secondary cosmic ray particles of galactic and solar origin at commercial aircraft altitudes is presented. The model represents a full chain analysis based on ground-based measurements of cosmic rays, from particle spectral and angular characteristics to dose estimation. The model is based on newly numerically computed yield functions and realistic propagation of cosmic ray in the Earth magnetosphere. The yield functions are computed using a straightforward full Monte Carlo simulation of the atmospheric cascade induced by primary protons and α-particles and subsequent conversion of secondary particle fluence (neutrons, protons, gammas, electrons, positrons, muons and charged pions to effective dose or the ambient dose equivalent. The ambient dose equivalent is compared with reference data at various conditions such as rigidity cut-off and level of solar activity. The method is applied for computation of the effective dose rate at flight altitude during the ground level enhancement of 13 December 2006. The solar proton spectra are derived using neutron monitor data. The computation of the effective dose rate during the event explicitly considers the derived anisotropy i.e. the pitch angle distribution as well as the propagation of the solar protons in the magnetosphere of the Earth.

  1. Computer-Based Technologies in Dentistry: Types and Applications

    Directory of Open Access Journals (Sweden)

    Rajaa Mahdi Musawi

    2016-10-01

    Full Text Available During dental education, dental students learn how to examine patients, make diagnosis, plan treatment and perform dental procedures perfectly and efficiently. However, progresses in computer-based technologies including virtual reality (VR simulators, augmented reality (AR and computer aided design/computer aided manufacturing (CAD/CAM systems have resulted in new modalities for instruction and practice of dentistry. Virtual reality dental simulators enable repeated, objective and assessable practice in various controlled situations. Superimposition of three-dimensional (3D virtual images on actual images in AR allows surgeons to simultaneously visualize the surgical site and superimpose informative 3D images of invisible regions on the surgical site to serve as a guide. The use of CAD/CAM systems for designing and manufacturing of dental appliances and prostheses has been well established.This article reviews computer-based technologies, their application in dentistry and their potentials and limitations in promoting dental education, training and practice. Practitioners will be able to choose from a broader spectrum of options in their field of practice by becoming familiar with new modalities of training and practice.Keywords: Virtual Reality Exposure Therapy; Immersion; Computer-Aided Design; Dentistry; Education

  2. Computing, information, and communications: Technologies for the 21. Century

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    1998-11-01

    To meet the challenges of a radically new and technologically demanding century, the Federal Computing, Information, and Communications (CIC) programs are investing in long-term research and development (R and D) to advance computing, information, and communications in the United States. CIC R and D programs help Federal departments and agencies to fulfill their evolving missions, assure the long-term national security, better understand and manage the physical environment, improve health care, help improve the teaching of children, provide tools for lifelong training and distance learning to the workforce, and sustain critical US economic competitiveness. One of the nine committees of the National Science and Technology Council (NSTC), the Committee on Computing, Information, and Communications (CCIC)--through its CIC R and D Subcommittee--coordinates R and D programs conducted by twelve Federal departments and agencies in cooperation with US academia and industry. These R and D programs are organized into five Program Component Areas: (1) HECC--High End Computing and Computation; (2) LSN--Large Scale Networking, including the Next Generation Internet Initiative; (3) HCS--High Confidence Systems; (4) HuCS--Human Centered Systems; and (5) ETHR--Education, Training, and Human Resources. A brief synopsis of FY 1997 accomplishments and FY 1998 goals by PCA is presented. This report, which supplements the President`s Fiscal Year 1998 Budget, describes the interagency CIC programs.

  3. Genetic Algorithm Modeling with GPU Parallel Computing Technology

    CERN Document Server

    Cavuoti, Stefano; Brescia, Massimo; Pescapé, Antonio; Longo, Giuseppe; Ventre, Giorgio

    2012-01-01

    We present a multi-purpose genetic algorithm, designed and implemented with GPGPU / CUDA parallel computing technology. The model was derived from a multi-core CPU serial implementation, named GAME, already scientifically successfully tested and validated on astrophysical massive data classification problems, through a web application resource (DAMEWARE), specialized in data mining based on Machine Learning paradigms. Since genetic algorithms are inherently parallel, the GPGPU computing paradigm has provided an exploit of the internal training features of the model, permitting a strong optimization in terms of processing performances and scalability.

  4. Digital image processing using parallel computing based on CUDA technology

    Science.gov (United States)

    Skirnevskiy, I. P.; Pustovit, A. V.; Abdrashitova, M. O.

    2017-01-01

    This article describes expediency of using a graphics processing unit (GPU) in big data processing in the context of digital images processing. It provides a short description of a parallel computing technology and its usage in different areas, definition of the image noise and a brief overview of some noise removal algorithms. It also describes some basic requirements that should be met by certain noise removal algorithm in the projection to computer tomography. It provides comparison of the performance with and without using GPU as well as with different percentage of using CPU and GPU.

  5. International Symposium on Computational Electronics—Physical Modeling, Mathematical Theory, and Numerical Algorithm

    Science.gov (United States)

    Li, Yiming

    2007-12-01

    This symposium is an open forum for discussion on the current trends and future directions of physical modeling, mathematical theory, and numerical algorithm in electrical and electronic engineering. The goal is for computational scientists and engineers, computer scientists, applied mathematicians, physicists, and researchers to present their recent advances and exchange experience. We welcome contributions from researchers of academia and industry. All papers to be presented in this symposium have carefully been reviewed and selected. They include semiconductor devices, circuit theory, statistical signal processing, design optimization, network design, intelligent transportation system, and wireless communication. Welcome to this interdisciplinary symposium in International Conference of Computational Methods in Sciences and Engineering (ICCMSE 2007). Look forward to seeing you in Corfu, Greece!

  6. Numerical approach for solving kinetic equations in two-dimensional case on hybrid computational clusters

    Science.gov (United States)

    Malkov, Ewgenij A.; Poleshkin, Sergey O.; Kudryavtsev, Alexey N.; Shershnev, Anton A.

    2016-10-01

    The paper presents the software implementation of the Boltzmann equation solver based on the deterministic finite-difference method. The solver allows one to carry out parallel computations of rarefied flows on a hybrid computational cluster with arbitrary number of central processor units (CPU) and graphical processor units (GPU). Employment of GPUs leads to a significant acceleration of the computations, which enables us to simulate two-dimensional flows with high resolution in a reasonable time. The developed numerical code was validated by comparing the obtained solutions with the Direct Simulation Monte Carlo (DSMC) data. For this purpose the supersonic flow past a flat plate at zero angle of attack is used as a test case.

  7. 12th International Conference on Computing and Information Technology

    CERN Document Server

    Boonkrong, Sirapat; Unger, Herwig

    2016-01-01

    This proceedings book presents recent research work and results in the area of communication and information technologies. The chapters of this book contain the main, well-selected and reviewed contributions of scientists who met at the 12th International Conference on Computing and Information Technology (IC2IT) held during 7th - 8th July 2016 in Khon Kaen, Thailand The book is divided into three parts: “User Centric Data Mining and Text Processing”, “Data Mining Algoritms and their Applications” and “Optimization of Complex Networks”.

  8. Cloud computing and patient engagement: leveraging available technology.

    Science.gov (United States)

    Noblin, Alice; Cortelyou-Ward, Kendall; Servan, Rosa M

    2014-01-01

    Cloud computing technology has the potential to transform medical practices and improve patient engagement and quality of care. However, issues such as privacy and security and "fit" can make incorporation of the cloud an intimidating decision for many physicians. This article summarizes the four most common types of clouds and discusses their ideal uses, how they engage patients, and how they improve the quality of care offered. This technology also can be used to meet Meaningful Use requirements 1 and 2; and, if speculation is correct, the cloud will provide the necessary support needed for Meaningful Use 3 as well.

  9. Foundations of software technology and theoretical computer science

    Energy Technology Data Exchange (ETDEWEB)

    Madhavan, C.E.V. (Indian Inst. of Science, Bangalore (IN))

    1990-01-01

    The papers in this book report on foundations of software technology and theoretical computer science project research results. The authors report on algorithmics: design and analysis of graph, geometric, algebraic and VLSI algorithms; data structures; average analysis; complexity theory; parallel parsing; concurrency; algebraic semantics, event structures; logic programming; algebraic properties, semantics; and software technology: program transformations, algebraic methods. These results together with the formal techniques employed to present them reflect current trends pursued by research groups around the world. The papers treat their topics by reviewing existing results, developing and demonstrating new techniques and suggesting further directions for research.

  10. Research on Remote Video Monitoring System Used for Numerical Control Machine Tools Based on Embedded Technology

    Institute of Scientific and Technical Information of China (English)

    LIU Quan; QU Xuehong; ZHOU Henglin; LONG Yihong

    2006-01-01

    This paper designed an embedded video monitoring system using DSP(Digital Signal Processing) and ARM(Advanced RISC Machine). This system is an important part of self-service operation of numerical control machine tools. At first the analog input signals from the CCD(Charge Coupled Device) camera are transformed into digital signals, and then output to the DSP system, where the video sequence is encoded according to the new generation image compressing standard called H.264. The code will be transmitted to the ARM system through xBus, and then be packed in the ARM system and transmitted to the client port through the gateway. Web technology, embedded technology and image compressing as well as coding technology are integrated in the system, which can be widely used in self-service operation of numerical control machine tools and intelligent robot control areas.

  11. Analytical and numerical methods for computing electron partial intensities in the case of multilayer systems

    Energy Technology Data Exchange (ETDEWEB)

    Afanas’ev, Victor P., E-mail: afanasyevvip@gmail.com [Department of General Physics and Nuclear Fusion, National Research University “Moscow Power Engineering Institute”, Krasnokazarmennaya, 14, Moscow 111250 (Russian Federation); Efremenko, Dmitry S. [Deutsches Zentrum für Luft- und Raumfahrt (DLR), Institut für Methodik der Fernerkundung (IMF), 82234 Oberpfaffenhofen (Germany); Kaplya, Pavel S., E-mail: pavel@kaplya.com [Department of General Physics and Nuclear Fusion, National Research University “Moscow Power Engineering Institute”, Krasnokazarmennaya, 14, Moscow 111250 (Russian Federation)

    2016-07-15

    Highlights: • The OKG-model is extended to finite thickness layers. • An efficient matrix technique for computing partial intensities is proposed. • Good agreement is obtained for computed partial intensities and experimental data. - Abstract: We present two novel methods for computing energy spectra and angular distributions of electrons emitted from multi-layer solids. They are based on the Ambartsumian–Chandrasekhar (AC) equations obtained by using the invariant imbedding method. The first method is analytical and relies on a linearization of AC equations and the use of the small-angle approximation. The corresponding solution is in good agreement with that computed by using the Oswald–Kasper–Gaukler (OKG) model, which is extended to the case of layers of finite thickness. The second method is based on the discrete ordinate formalism and relies on a transformation of the AC equations to the algebraic Ricatti and Lyapunov equations, which are solved by using the backward differential formula. Unlike the previous approach, this method can handle both linear and nonlinear equations. We analyze the applicability of the proposed methods to practical problems of computing REELS spectra. To demonstrate the efficiency of the proposed methods, several computational examples are considered. Obtained numerical and analytical solutions show good agreement with the experimental data and Monte-Carlo simulations. In addition, the impact of nonlinear terms in the Ambartsumian–Chandrasekhar equations is analyzed.

  12. Alternative treatment technology information center computer database system

    Energy Technology Data Exchange (ETDEWEB)

    Sullivan, D. [Environmental Protection Agency, Edison, NJ (United States)

    1995-10-01

    The Alternative Treatment Technology Information Center (ATTIC) computer database system was developed pursuant to the 1986 Superfund law amendments. It provides up-to-date information on innovative treatment technologies to clean up hazardous waste sites. ATTIC v2.0 provides access to several independent databases as well as a mechanism for retrieving full-text documents of key literature. It can be accessed with a personal computer and modem 24 hours a day, and there are no user fees. ATTIC provides {open_quotes}one-stop shopping{close_quotes} for information on alternative treatment options by accessing several databases: (1) treatment technology database; this contains abstracts from the literature on all types of treatment technologies, including biological, chemical, physical, and thermal methods. The best literature as viewed by experts is highlighted. (2) treatability study database; this provides performance information on technologies to remove contaminants from wastewaters and soils. It is derived from treatability studies. This database is available through ATTIC or separately as a disk that can be mailed to you. (3) underground storage tank database; this presents information on underground storage tank corrective actions, surface spills, emergency response, and remedial actions. (4) oil/chemical spill database; this provides abstracts on treatment and disposal of spilled oil and chemicals. In addition to these separate databases, ATTIC allows immediate access to other disk-based systems such as the Vendor Information System for Innovative Treatment Technologies (VISITT) and the Bioremediation in the Field Search System (BFSS). The user may download these programs to their own PC via a high-speed modem. Also via modem, users are able to download entire documents through the ATTIC system. Currently, about fifty publications are available, including Superfund Innovative Technology Evaluation (SITE) program documents.

  13. Suspense is the Key. Narratology, Cognitive Neurosciences and Computer Technology

    Directory of Open Access Journals (Sweden)

    Stefano Calabrese

    2016-01-01

    Full Text Available The Narratology of new generation shows renewed heuristic scenarios, providing an intense dialogue among Humanities, Cognitive Neuroscience and Computer Technology. The suspense case is emblematic: its spread and the pleasure exercised by this rhetorical strategy on the human mind can be precisely explained by identifying the mechanisms of reward provided by neurological and Imaging studies. At the same time, patterns of automatic generation of narrative highlight the profound implications of a heated debate between Narratology and Computer Technology, in order to understand the processes of reception and inference during the narrative immersion in storyworlds. At the end of overview on of a cross-disciplinary approach of suspense analysis, the authors repost a case study considered of interest, provided by the North Caroline State University researchers group, called Liquid Narrative Group. 

  14. Importance of Computer Model Validation in Pyroprocessing Technology Development

    Energy Technology Data Exchange (ETDEWEB)

    Jung, Y. E.; Li, Hui; Yim, M. S. [Korea Advanced Institute of Science and Technology, Daejeon (Korea, Republic of)

    2014-05-15

    In this research, we developed a plan for experimental validation of one of the computer models developed for ER process modeling, i. e., the ERAD code. Several candidate surrogate materials are selected for the experiment considering the chemical and physical properties. Molten salt-based pyroprocessing technology is being examined internationally as an alternative to treat spent nuclear fuel over aqueous technology. The central process in pyroprocessing is electrorefining(ER) which separates uranium from transuranic elements and fission products present in spent nuclear fuel. ER is a widely used process in the minerals industry to purify impure metals. Studies of ER by using actual spent nuclear fuel materials are problematic for both technical and political reasons. Therefore, the initial effort for ER process optimization is made by using computer models. A number of models have been developed for this purpose. But as validation of these models is incomplete and often times problematic, the simulation results from these models are inherently uncertain.

  15. Integrating computer technology in the teaching of Biology

    OpenAIRE

    GarrawayLashley, Yassanne

    2014-01-01

    Over the past decade, the number of students who gained satisfactory passes at the Caribbean Secondary Education Certificate (CSEC) in Biology in Guyana has been few. This poor performance may be attributed to the traditional method of teaching that was used to teach Biology. This study therefore ascertained if the integration of computer technology into the teaching of Biology would enhance students’ academic performance. The study was guided by a null research hypothesis. Hence, the related...

  16. Vector Field Visual Data Analysis Technologies for Petascale Computational Science

    Energy Technology Data Exchange (ETDEWEB)

    Garth, Christoph; Deines, Eduard; Joy, Kenneth I.; Bethel, E. Wes; Childs, Hank; Weber, Gunther; Ahern, Sean; Pugmire, Dave; Sanderson, Allen; Johnson, Chris

    2009-11-13

    State-of-the-art computational science simulations generate large-scale vector field data sets. Visualization and analysis is a key aspect of obtaining insight into these data sets and represents an important challenge. This article discusses possibilities and challenges of modern vector field visualization and focuses on methods and techniques developed in the SciDAC Visualization and Analytics Center for Enabling Technologies (VACET) and deployed in the open-source visualization tool, VisIt.

  17. Using Soft Computing Technologies for the Simulation of LCAC Dynamics

    Science.gov (United States)

    2011-09-01

    real-time, time-domain predictions of the vehicle’s dynamics as a function of the control signals given by the driver. Results are presented...free- running LCAC model, faster-than-real-time simulation, soft computing technology 1.0 INTRODUCTION The Maneuvering and Control Division (MCD...like all hovercraft , rides on a cushion of air. The air is supplied to the cushion by four centrifugal fans driven by the craft’s gas turbine

  18. The Application of Computer Music Technology to College Students

    Directory of Open Access Journals (Sweden)

    Wang Na

    2016-01-01

    Full Text Available Contemporary music education started late in China on the basis of western teaching theories formed its own unique system, which has a great influence on present computer music technology. This paper explores that contemporary music education is analyzed advantages and disadvantages of the influence on the development of Chinese class music, and the solutions are found out to the existing problems, summed up the reality enlightenment of that the contemporary music on the impact of education.

  19. An Overview of Computer Network security and Research Technology

    OpenAIRE

    Rathore, Vandana

    2016-01-01

    The rapid development in the field of computer networks and systems brings both convenience and security threats for users. Security threats include network security and data security. Network security refers to the reliability, confidentiality, integrity and availability of the information in the system. The main objective of network security is to maintain the authenticity, integrity, confidentiality, availability of the network. This paper introduces the details of the technologies used in...

  20. Numerical computation of discrete differential scattering cross sections for Monte Carlo charged particle transport

    Energy Technology Data Exchange (ETDEWEB)

    Walsh, Jonathan A., E-mail: walshjon@mit.edu [Department of Nuclear Science and Engineering, Massachusetts Institute of Technology, 77 Massachusetts Avenue, 24-107, Cambridge, MA 02139 (United States); Palmer, Todd S. [Department of Nuclear Engineering and Radiation Health Physics, Oregon State University, 116 Radiation Center, Corvallis, OR 97331 (United States); Urbatsch, Todd J. [XTD-IDA: Theoretical Design, Integrated Design and Assessment, Los Alamos National Laboratory, Los Alamos, NM 87545 (United States)

    2015-12-15

    Highlights: • Generation of discrete differential scattering angle and energy loss cross sections. • Gauss–Radau quadrature utilizing numerically computed cross section moments. • Development of a charged particle transport capability in the Milagro IMC code. • Integration of cross section generation and charged particle transport capabilities. - Abstract: We investigate a method for numerically generating discrete scattering cross sections for use in charged particle transport simulations. We describe the cross section generation procedure and compare it to existing methods used to obtain discrete cross sections. The numerical approach presented here is generalized to allow greater flexibility in choosing a cross section model from which to derive discrete values. Cross section data computed with this method compare favorably with discrete data generated with an existing method. Additionally, a charged particle transport capability is demonstrated in the time-dependent Implicit Monte Carlo radiative transfer code, Milagro. We verify the implementation of charged particle transport in Milagro with analytic test problems and we compare calculated electron depth–dose profiles with another particle transport code that has a validated electron transport capability. Finally, we investigate the integration of the new discrete cross section generation method with the charged particle transport capability in Milagro.

  1. Computation of optimal unstable structures for a numerical weather prediction model

    Science.gov (United States)

    Buizza, R.; Tribbia, J.; Molteni, F.; Palmer, T.

    1993-10-01

    Numerical experiments have been performed to compute the fastest growing perturbations in a finite time interval for a complex numerical weather prediction model. The models used are the tangent forward and adjoint versions of the adiabatic primitive-equation model of the Integrated Forecasting System developed at the European Centre for Medium-Range Weather Forecasts and Météo France. These have been run with a horizontal truncation T21, with 19 vertical levels. The fastest growing perturbations are the singular vectors of the propagator of the forward tangent model with the largest singular values. An iterative Lanczos algorithm has been used for the numerical computation of the perturbations. Sensitivity of the calculations to different time intervals and to the norm used in the definition of the adjoint model have been analysed. The impact of normal mode initialization has also been studied. Two classes of fastest growing perturbations have been found; one is characterized by a maximum amplitude in the middle troposphere, while the other is confined to model layers close to the surface. It is shown that the latter is damped by the boundary layer physics in the full model. The linear evolution of the perturbations has been compared to the non-linear evolution when the perturbations are superimposed on a basic state in the T63, 19-level version of the ECMWF model.

  2. Advances in parallel computer technology for desktop atmospheric dispersion models

    Energy Technology Data Exchange (ETDEWEB)

    Bian, X.; Ionescu-Niscov, S.; Fast, J.D. [Pacific Northwest National Lab., Richland, WA (United States); Allwine, K.J. [Allwine Enviornmental Serv., Richland, WA (United States)

    1996-12-31

    Desktop models are those models used by analysts with varied backgrounds, for performing, for example, air quality assessment and emergency response activities. These models must be robust, well documented, have minimal and well controlled user inputs, and have clear outputs. Existing coarse-grained parallel computers can provide significant increases in computation speed in desktop atmospheric dispersion modeling without considerable increases in hardware cost. This increased speed will allow for significant improvements to be made in the scientific foundations of these applied models, in the form of more advanced diffusion schemes and better representation of the wind and turbulence fields. This is especially attractive for emergency response applications where speed and accuracy are of utmost importance. This paper describes one particular application of coarse-grained parallel computer technology to a desktop complex terrain atmospheric dispersion modeling system. By comparing performance characteristics of the coarse-grained parallel version of the model with the single-processor version, we will demonstrate that applying coarse-grained parallel computer technology to desktop atmospheric dispersion modeling systems will allow us to address critical issues facing future requirements of this class of dispersion models.

  3. A virtual computer lab for distance biomedical technology education

    Science.gov (United States)

    Locatis, Craig; Vega, Anibal; Bhagwat, Medha; Liu, Wei-Li; Conde, Jose

    2008-01-01

    Background The National Library of Medicine's National Center for Biotechnology Information offers mini-courses which entail applying concepts in biochemistry and genetics to search genomics databases and other information sources. They are highly interactive and involve use of 3D molecular visualization software that can be computationally taxing. Methods Methods were devised to offer the courses at a distance so as to provide as much functionality of a computer lab as possible, the venue where they are normally taught. The methods, which can be employed with varied videoconferencing technology and desktop sharing software, were used to deliver mini-courses at a distance in pilot applications where students could see demonstrations by the instructor and the instructor could observe and interact with students working at their remote desktops. Results Student ratings of the learning experience and comments to open ended questions were similar to those when the courses are offered face to face. The real time interaction and the instructor's ability to access student desktops from a distance in order to provide individual assistance and feedback were considered invaluable. Conclusion The technologies and methods mimic much of the functionality of computer labs and may be usefully applied in any context where content changes frequently, training needs to be offered on complex computer applications at a distance in real time, and where it is necessary for the instructor to monitor students as they work. PMID:18366629

  4. Some Issues on Computer Networks: Architecture and Key Technologies

    Institute of Scientific and Technical Information of China (English)

    Guan-Qun Gu; Jun-Zhou Luo

    2006-01-01

    The evolution of computer networks has experienced several major steps, and research focus of each step has been kept changing and evolving, from ARPANET to OSI/RM, then HSN (high speed network) and HPN (high performance network). During the evolution, computer networks represented by Internet have made great progress and gained unprecedented success. However, with the appearance and intensification of tussle, along with the three difficult problems (service customizing, resource control and user management) of modern network, it is found that traditional Internet and its architecture no longer meet the requirements of next generation network. Therefore, it is the next generation network that current Internet must evolve to. With the mindset of achieving valuable guidance for research on next generation network, this paper firstly analyzes some dilemmas facing current Internet and its architecture, and then surveys some recent influential research work and progresses in computer networks and related areas, including new generation network architecture, network resource control technologies, network management and security, distributed computing and middleware,wireless/mobile network, new generation network services and applications, and foundational theories on network modeling.Finally, this paper concludes that within the research on next generation network, more attention should be paid to the high availability network and corresponding architecture, key theories and supporting technologies.

  5. Application of Computer Integration Technology for Fire Safety Analysis

    Institute of Scientific and Technical Information of China (English)

    SHI Jianyong; LI Yinqing; CHEN Huchuan

    2008-01-01

    With the development of information technology, the fire safety assessment of whole structure or region based on the computer simulation has become a hot topic. However, traditionally, the concemed studies are performed separately for different objectives and difficult to perform an overall evaluation. A new multi-dimensional integration model and methodology for fire safety assessment were presented and two newly developed integrated systems were introduced to demonstrate the function of integration simulation technology in this paper. The first one is the analysis on the fire-resistant behaviors of whole structure under real fire loads. The second one is the study on fire evaluation and emergency rescue of campus based on geography information technology (GIS). Some practical examples are presented to illuminate the advan-tages of computer integration technology on fire safety assessment and emphasize some problems in the simulation. The results show that the multi-dimensional integration model offers a new way and platform for the integrating fire safety assessment of whole structure or region, and the integrated software developed is the useful engineering tools for cost-saving and safe design.

  6. Discuss the Development of Computer-Aided Industrial Design Technology

    Directory of Open Access Journals (Sweden)

    Jun Yao

    2013-01-01

    Full Text Available The direction of the development of the industrial design gradually approaches mechanical-electrical integration and informational and electronic products. With an increasing improvement of its technical content, and better social economic conditions, peoples consumption concept are getting more and more different. Consumer concerns not just the functionality and quality of the product, more and more people are starting to focus on the appearance of the product, degree of innovation, environmental protection, and so on, which brings a higher degree of difficulty to the industrial technology. It is because the increasing demands of people and the industrial design, many scholars are increasingly concerned about the industrial design in recent years. With the continuous development of computer technology, a wide variety of hardware and software are developed, and a variety of ever-changing technologies are attracting the industrial design talents as well.

  7. Targeting treatment technologies to address specific stormwater pollutants and numeric discharge limits.

    Science.gov (United States)

    Clark, Shirley E; Pitt, Robert

    2012-12-15

    Stormwater treatment is entering a new phase with stormwater management systems being required to meet specific numeric objectives, as opposed to the historic approach of meeting guidance-document-provided percent removal rates. Meeting numeric discharge requirements will require designers to better understand and apply the physical, chemical, and biological processes underpinning these treatment technologies. This critical review paper focuses on the potential unit treatment operations available for stormwater treatment and outlines how to identify the most applicable treatment options based on the needed pollutant removal goals.

  8. Computational Flame Diagnostics for Direct Numerical Simulations with Detailed Chemistry of Transportation Fuels

    Energy Technology Data Exchange (ETDEWEB)

    Lu, Tianfeng [Univ. of Connecticut, Storrs, CT (United States)

    2017-02-16

    The goal of the proposed research is to create computational flame diagnostics (CFLD) that are rigorous numerical algorithms for systematic detection of critical flame features, such as ignition, extinction, and premixed and non-premixed flamelets, and to understand the underlying physicochemical processes controlling limit flame phenomena, flame stabilization, turbulence-chemistry interactions and pollutant emissions etc. The goal has been accomplished through an integrated effort on mechanism reduction, direct numerical simulations (DNS) of flames at engine conditions and a variety of turbulent flames with transport fuels, computational diagnostics, turbulence modeling, and DNS data mining and data reduction. The computational diagnostics are primarily based on the chemical explosive mode analysis (CEMA) and a recently developed bifurcation analysis using datasets from first-principle simulations of 0-D reactors, 1-D laminar flames, and 2-D and 3-D DNS (collaboration with J.H. Chen and S. Som at Argonne, and C.S. Yoo at UNIST). Non-stiff reduced mechanisms for transportation fuels amenable for 3-D DNS are developed through graph-based methods and timescale analysis. The flame structures, stabilization mechanisms, local ignition and extinction etc., and the rate controlling chemical processes are unambiguously identified through CFLD. CEMA is further employed to segment complex turbulent flames based on the critical flame features, such as premixed reaction fronts, and to enable zone-adaptive turbulent combustion modeling.

  9. Computational modeling and numerical methods for spatiotemporal calcium cycling in ventricular myocytes

    Directory of Open Access Journals (Sweden)

    Michael eNivala

    2012-05-01

    Full Text Available Intracellular calcium (Ca cycling dynamics in cardiac myocytes is regulated by a complex network of spatially distributed organelles, such as sarcoplasmic reticulum (SR, mitochondria, and myofibrils. In this study, we present a mathematical model of intracellular Ca cycling and numerical and computational methods for computer simulations. The model consists of a coupled Ca release unit (CRU network, which includes a SR domain and a myoplasm domain. Each CRU contains 10 L-type Ca channels and 100 ryanodine receptor channels, with individual channels simulated stochastically using a varient of Gillespie’s method, modified here to handle time-dependent transition rates. Both the SR domain and the myoplasm domain in each CRU are modeled by 5x5x5 voxels to maintain proper Ca diffusion. Advanced numerical algorithms implemented on graphical processing units were used for fast computational simulations. For a myocyte containing 100x20x10 CRUs, a one-second heart time simulation takes about 10 minutes of machine time on a single NVIDIA Tesla C2050. Examples of simulated Ca cycling dynamics, such as Ca sparks, Ca waves, and Ca alternans, are shown.

  10. What numerical models can and cannot tell us: Limitations on inferences in computational geomorphology

    Science.gov (United States)

    Van De Wiel, Marco

    2016-04-01

    Computer simulations and numerical experiments have become an increasingly important part of geomorphological investigation in the last decades. Process-based numerical models attempt to simulate real-world processes in a virtual environment which can be easily manipulated and studied. Conceptually, the experimental design of these simulation studies broadly falls in one of three categories: predictive modelling, explanatory modelling, and exploratory modelling. However, the epistemologies of these three modes of modelling are as of yet incomplete and not fully understood. Not only do the three modes of modelling have different underlying assumptions, they also have different criteria to establish validity and different limitations on the interpretations and inferences that can be made. These differences are usually only implicitly recognized, if at all, in computational geomorphology studies. This presentation provides an explicit, though not necessarily exhaustive, overview of the epistemological differences between the three modes of computational modelling, and of the limitations this imposes on what can and cannot be learned from simulation experiments.

  11. Numerical-computational analysis of reinforced concrete structures considering the damage, fracture and failure criterion

    Directory of Open Access Journals (Sweden)

    L. A. F. de Souza

    Full Text Available The experimental results of testing structures or structural parts are limited and, sometimes, difficult to interpret. Thus, the development of mathematical-numerical models is needed to complement the experimental analysis and allow the generalization of results for different structures and types of loading. This article makes two computational studies of reinforced concrete structures problems found in the literature, using the Finite Element Method. In these analyses, the concrete is simulated with the damage classical model proposed by Mazars and the steel by a bilinear elastoplastic constitutive model. Numerical results show the validity of the application of constitutive models which consider the coupling of theories with the technique of finite element discretization in the simulation of linear and two-dimensional reinforced concrete structures.

  12. Reconstruction Algorithms for Positron Emission Tomography and Single Photon Emission Computed Tomography and their Numerical Implementation

    CERN Document Server

    Fokas, A S; Marinakis, V

    2004-01-01

    The modern imaging techniques of Positron Emission Tomography and of Single Photon Emission Computed Tomography are not only two of the most important tools for studying the functional characteristics of the brain, but they now also play a vital role in several areas of clinical medicine, including neurology, oncology and cardiology. The basic mathematical problems associated with these techniques are the construction of the inverse of the Radon transform and of the inverse of the so called attenuated Radon transform respectively. We first show that, by employing mathematical techniques developed in the theory of nonlinear integrable equations, it is possible to obtain analytic formulas for these two inverse transforms. We then present algorithms for the numerical implementation of these analytic formulas, based on approximating the given data in terms of cubic splines. Several numerical tests are presented which suggest that our algorithms are capable of producing accurate reconstruction for realistic phanto...

  13. Numerical ray-tracing approach with laser intensity distribution for LIDAR signal power function computation

    Science.gov (United States)

    Shi, Guangyuan; Li, Song; Huang, Ke; Li, Zile; Zheng, Guoxing

    2016-10-01

    We have developed a new numerical ray-tracing approach for LIDAR signal power function computation, in which the light round-trip propagation is analyzed by geometrical optics and a simple experiment is employed to acquire the laser intensity distribution. It is relatively more accurate and flexible than previous methods. We emphatically discuss the relationship between the inclined angle and the dynamic range of detector output signal in biaxial LIDAR system. Results indicate that an appropriate negative angle can compress the signal dynamic range. This technique has been successfully proved by comparison with real measurements.

  14. Efficient numerical method for computation of thermohydrodynamics of laminar lubricating films

    Science.gov (United States)

    Elrod, Harold G.

    1989-01-01

    The purpose of this paper is to describe an accurate, yet economical, method for computing temperature effects in laminar lubricating films in two dimensions. The procedure presented here is a sequel to one presented in Leeds in 1986 that was carried out for the one-dimensional case. Because of the marked dependence of lubricant viscosity on temperature, the effect of viscosity variation both across and along a lubricating film can dwarf other deviations from ideal constant-property lubrication. In practice, a thermohydrodynamics program will involve simultaneous solution of the film lubrication problem, together with heat conduction in a solid, complex structure. The extent of computation required makes economy in numerical processing of utmost importance. In pursuit of such economy, we here use techniques similar to those for Gaussian quadrature. We show that, for many purposes, the use of just two properly positioned temperatures (Lobatto points) characterizes well the transverse temperature distribution.

  15. Numerical Simulation of Bird Flight Using Both CFD and Computational Flight Dynamics

    Science.gov (United States)

    Ueno, Yosuke; Nakamura, Yoshiaki

    A numerical simulation method taking into account both aerodynamics and flight dynamics has been developed to simulate the flight of a low speed flying object, where it undergoes unsteady deformation. This method can also be applied to simulate the unsteady motion of small vehicles such as micro air vehicles (MAV). In the present study, we take up a bird and demonstrate its flight in the air. In particular the effect of fluid forces on the bird's flying motion is examined in detail, based on CFD×CFD: Computational Fluid Dynamics (CFD) and Computational Flight Dynamics. It is found from simulated results that this bird can generate lift and thrust enough to fly by flapping its wing. In addition, it can make a level flight by adjusting its oscillation frequency. Thus, the present method is promising to study the aerodynamics and flight dynamics of a moving object with its shape morphing.

  16. Computer program for distance learning of pesticide application technology.

    Science.gov (United States)

    Maia, Bruno; Cunha, Joao P A R

    2011-12-01

    Distance learning presents great potential for mitigating field problems on pesticide application technology. Thus, due to the lack of teaching material about pesticide spraying technology in the Portuguese language and the increasing availability of distance learning, this study developed and evaluated a computer program for distance learning about the theory of pesticide spraying technology using the tools of information technology. The modules comprising the course, named Pulverizar, were: (1) Basic concepts, (2) Factors that affect application, (3) Equipments, (4) Spraying nozzles, (5) Sprayer calibration, (6) Aerial application, (7) Chemigation, (8) Physical-chemical properties, (9) Formulations, (10) Adjuvants, (11) Water quality, and (12) Adequate use of pesticides. The program was made available to the public on July 1(st), 2008, hosted at the web site www.pulverizar.iciag.ufu.br, and was simple, robust and practical on the complementation of traditional teaching for the education of professionals in Agricultural Sciences. Mastering pesticide spraying technology by people involved in agricultural production can be facilitated by the program Pulverizar, which was well accepted in its initial evaluation.

  17. Numerical investigation of a technological CO2 laser with a closed gasdynamic channel

    Science.gov (United States)

    Breev, V. V.; Gubarev, A. V.; Kazhidub, A. V.; Kukharenko, A. T.; Lebedev, F. V.; Panchenko, V. P.

    1981-08-01

    A brief description is given of a new mathematical model developed for comprehensive calculations of the parameters of an electric-discharge CO2 laser, comprising a discharge chamber, optical resonator-amplifier, focusing system, nozzle, diffuser, coolers, compressor, and connecting pipes. A file of programs developed for this purpose was applied to investigate numerically a technological CO2 laser with an output power of 10 kW.

  18. Computer technology applications in industrial and organizational psychology.

    Science.gov (United States)

    Crespin, Timothy R; Austin, James T

    2002-08-01

    This article reviews computer applications developed and utilized by industrial-organizational (I-O) psychologists, both in practice and in research. A primary emphasis is on applications developed for Internet usage, because this "network of networks" changes the way I-O psychologists work. The review focuses on traditional and emerging topics in I-O psychology. The first topic involves information technology applications in measurement, defined broadly across levels of analysis (persons, groups, organizations) and domains (abilities, personality, attitudes). Discussion then focuses on individual learning at work, both in formal training and in coping with continual automation of work. A section on job analysis follows, illustrating the role of computers and the Internet in studying jobs. Shifting focus to the group level of analysis, we briefly review how information technology is being used to understand and support cooperative work. Finally, special emphasis is given to the emerging "third discipline" in I-O psychology research-computational modeling of behavioral events in organizations. Throughout this review, themes of innovation and dissemination underlie a continuum between research and practice. The review concludes by setting a framework for I-O psychology in a computerized and networked world.

  19. Integrated Geo Hazard Management System in Cloud Computing Technology

    Science.gov (United States)

    Hanifah, M. I. M.; Omar, R. C.; Khalid, N. H. N.; Ismail, A.; Mustapha, I. S.; Baharuddin, I. N. Z.; Roslan, R.; Zalam, W. M. Z.

    2016-11-01

    Geo hazard can result in reducing of environmental health and huge economic losses especially in mountainous area. In order to mitigate geo-hazard effectively, cloud computer technology are introduce for managing geo hazard database. Cloud computing technology and it services capable to provide stakeholder's with geo hazards information in near to real time for an effective environmental management and decision-making. UNITEN Integrated Geo Hazard Management System consist of the network management and operation to monitor geo-hazard disaster especially landslide in our study area at Kelantan River Basin and boundary between Hulu Kelantan and Hulu Terengganu. The system will provide easily manage flexible measuring system with data management operates autonomously and can be controlled by commands to collects and controls remotely by using “cloud” system computing. This paper aims to document the above relationship by identifying the special features and needs associated with effective geohazard database management using “cloud system”. This system later will use as part of the development activities and result in minimizing the frequency of the geo-hazard and risk at that research area.

  20. Achieving high performance in numerical computations on RISC workstations and parallel systems

    Energy Technology Data Exchange (ETDEWEB)

    Goedecker, S. [Max-Planck Inst. for Solid State Research, Stuttgart (Germany); Hoisie, A. [Los Alamos National Lab., NM (United States)

    1997-08-20

    The nominal peak speeds of both serial and parallel computers is raising rapidly. At the same time however it is becoming increasingly difficult to get out a significant fraction of this high peak speed from modern computer architectures. In this tutorial the authors give the scientists and engineers involved in numerically demanding calculations and simulations the necessary basic knowledge to write reasonably efficient programs. The basic principles are rather simple and the possible rewards large. Writing a program by taking into account optimization techniques related to the computer architecture can significantly speedup your program, often by factors of 10--100. As such, optimizing a program can for instance be a much better solution than buying a faster computer. If a few basic optimization principles are applied during program development, the additional time needed for obtaining an efficient program is practically negligible. In-depth optimization is usually only needed for a few subroutines or kernels and the effort involved is therefore also acceptable.

  1. IMPORTANCE OF COMPUTER TECHNOLOGY IN REALIZATION OF CULTURAL AND EDUCATIONAL TASKS OF PRESCHOOL INSTITUTIONS

    Directory of Open Access Journals (Sweden)

    Zvezdan Arsić

    2016-06-01

    Full Text Available The rapid scientific and technological development imposes numerous changes in all spheres of life and work. In such circumstances, a computer has become a part of all aspects of life: economy, education, free time, family. Since children in contemporary society increasingly acquire knowledge before the school age, the question is how to prepare them for the world in which we live, bearing in mind how significantly different it is from the world in which the previous generations grew up. The research was aimed at examining the attitudes of preschool teachers about the importance of computers in the realization of educational activities in preschool institutions. The study included 54 teachers from Kosovo and Metohija: Kosovska Mitrovica, Donja Gušterica and Ropotovo. The research results indicate that digital technology is a very important and a useful didactic tool in the realization of educational activities in preschool institutions and that preschool teachers have the required competence to implement the technology. However, they are not satisfied with the quality of their ICT education and training during their studies; they also feel that their institutions do not provide adequate working conditions for the use of computers in the realization of educational tasks.

  2. Knowledge of Computer Ergonomics among Computer Science Engineering and Information Technology Students in Karnataka, India

    Directory of Open Access Journals (Sweden)

    Mohamed Sherif Sirajudeen

    2017-04-01

    Full Text Available Ergonomics is the science of designing the job to fit the worker. Neglect of ergonomic principles results in inefficiency and pain in the workplace. The objective of this research is to assess the knowledge of Computer Ergonomics among Computer Science Engineering and Information Technology Students in Karnataka. In this Cross-sectional study, 177 Computer Science Engineering and Information Technology Students were recruited. A questionnaire is used to gather details regarding Personal characteristics, Computer Usage and Knowledge of Ergonomics. Descriptive statistics was produced for Personal characteristics and Computer usage. The distribution of responses to the items related to Ergonomic knowledge was presented by percentage of the subjects who answered correctly. The results shows that Majority of the subjects were unaware of ergonomics (32.8% correct responses, cumulative trauma disorders (18.6% correct responses, healthy postures related to elbow (34.4% correct responses, wrist & hand (39.5% correct responses, Level of Monitor (35% correct responses, Position of mouse (47.4% correct responses and Mini breaks (42.9% correct responses. This research highlighted the necessity of Ergonomic training regarding healthy postures and the measures to reduce the risk of musculoskeletal disorders for the students.

  3. Advanced Topics in Computational Partial Differential Equations: Numerical Methods and Diffpack Programming

    Energy Technology Data Exchange (ETDEWEB)

    Katsaounis, T D [Department of Mathematics, University of Crete, 714 09 Heraklion, Crete (Greece)

    2005-02-25

    The scope of this book is to present well known simple and advanced numerical methods for solving partial differential equations (PDEs) and how to implement these methods using the programming environment of the software package Diffpack. A basic background in PDEs and numerical methods is required by the potential reader. Further, a basic knowledge of the finite element method and its implementation in one and two space dimensions is required. The authors claim that no prior knowledge of the package Diffpack is required, which is true, but the reader should be at least familiar with an object oriented programming language like C++ in order to better comprehend the programming environment of Diffpack. Certainly, a prior knowledge or usage of Diffpack would be a great advantage to the reader. The book consists of 15 chapters, each one written by one or more authors. Each chapter is basically divided into two parts: the first part is about mathematical models described by PDEs and numerical methods to solve these models and the second part describes how to implement the numerical methods using the programming environment of Diffpack. Each chapter closes with a list of references on its subject. The first nine chapters cover well known numerical methods for solving the basic types of PDEs. Further, programming techniques on the serial as well as on the parallel implementation of numerical methods are also included in these chapters. The last five chapters are dedicated to applications, modelled by PDEs, in a variety of fields. In summary, the book focuses on the computational and implementational issues involved in solving partial differential equations. The potential reader should have a basic knowledge of PDEs and the finite difference and finite element methods. The examples presented are solved within the programming framework of Diffpack and the reader should have prior experience with the particular software in order to take full advantage of the book. Overall

  4. Development of problem-oriented software packages for numerical studies and computer-aided design (CAD) of gyrotrons

    Science.gov (United States)

    Damyanova, M.; Sabchevski, S.; Zhelyazkov, I.; Vasileva, E.; Balabanova, E.; Dankov, P.; Malinov, P.

    2016-03-01

    Gyrotrons are the most powerful sources of coherent CW (continuous wave) radiation in the frequency range situated between the long-wavelength edge of the infrared light (far-infrared region) and the microwaves, i.e., in the region of the electromagnetic spectrum which is usually called the THz-gap (or T-gap), since the output power of other devices (e.g., solid-state oscillators) operating in this interval is by several orders of magnitude lower. In the recent years, the unique capabilities of the sub-THz and THz gyrotrons have opened the road to many novel and future prospective applications in various physical studies and advanced high-power terahertz technologies. In this paper, we present the current status and functionality of the problem-oriented software packages (most notably GYROSIM and GYREOSS) used for numerical studies, computer-aided design (CAD) and optimization of gyrotrons for diverse applications. They consist of a hierarchy of codes specialized to modelling and simulation of different subsystems of the gyrotrons (EOS, resonant cavity, etc.) and are based on adequate physical models, efficient numerical methods and algorithms.

  5. An integrated multidisciplinary design optimization method for computer numerical control machine tool development

    Directory of Open Access Journals (Sweden)

    Zaifang Zhang

    2015-02-01

    Full Text Available Computer numerical control machine tool is a typical complex product related with multidisciplinary fields, complex structure, and high-performance requirements. It is difficult to identify the overall optimal solution of the machine tool structure for their multiple objectives. A new integrated multidisciplinary design optimization method is then proposed by using a Latin hypercube sampling, a Kriging approximate model, and a multi-objective genetic algorithm. Design space and parametric model are built by choosing appropriate design variables and their value ranges. Samples in design space are generated by optimal Latin hypercube method, and design variable contributions for design performance are discussed for aiding the designer’s judgments. The Kriging model is built by using polynomial approximation according to the response outputs of these samples. The multidisciplinary design model is established based on three optimization objectives, that is, setting mass, optimum deformation, and first-order natural frequency, and two constraints, that is, second-order natural frequency and third-order natural frequency. The optimal solution is identified by using a multi-objective genetic algorithm. The proposed method is applied in a multidisciplinary optimization case study for a typical computer numerical control machine tool. In the optimal solution, the mass decreases by 3.35% and the first-order natural frequency increases by 4.34% in contrast to the original solution.

  6. Numerical Computation and Investigation of the Characteristics of Microscale Synthetic Jets

    Directory of Open Access Journals (Sweden)

    Ann Lee

    2011-01-01

    Full Text Available A synthetic jet results from periodic oscillations of a membrane in a cavity. Jet is formed when fluid is alternately sucked into and ejected from a small cavity by the motion of membrane bounding the cavity. A novel moving mesh algorithm to simulate the formation of jet is presented. The governing equations are transformed into the curvilinear coordinate system in which the grid velocities evaluated are then fed into the computation of the flow in the cavity domain thus allowing the conservation equations of mass and momentum to be solved within the stationary computational domain. Numerical solution generated using this moving mesh approach is compared with an experimental result measuring the instantaneous velocity fields obtained by μPIV measurements in the vicinity of synthetic jet orifice 241 μm in diameter issuing into confined geometry. Comparisons between experimental and numerical results on the streamwise component of velocity profiles at the orifice exit and along the centerline of the pulsating jet in microchannel as well as the location of vortex core indicate that there is good agreement, thereby demonstrating that the moving mesh algorithm developed is valid.

  7. A numerical procedure to compute the stabilising solution of game theoretic Riccati equations of stochastic control

    Science.gov (United States)

    Dragan, Vasile; Ivanov, Ivan

    2011-04-01

    In this article, the problem of the numerical computation of the stabilising solution of the game theoretic algebraic Riccati equation is investigated. The Riccati equation under consideration occurs in connection with the solution of the H ∞ control problem for a class of stochastic systems affected by state-dependent and control-dependent white noise and subjected to Markovian jumping. The stabilising solution of the considered game theoretic Riccati equation is obtained as a limit of a sequence of approximations constructed based on stabilising solutions of a sequence of algebraic Riccati equations of stochastic control with definite sign of the quadratic part. The proposed algorithm extends to this general framework the method proposed in Lanzon, Feng, Anderson, and Rotkowitz (Lanzon, A., Feng, Y., Anderson, B.D.O., and Rotkowitz, M. (2008), 'Computing the Positive Stabilizing Solution to Algebraic Riccati Equations with an Indefinite Quadratic Term Viaa Recursive Method,' IEEE Transactions on Automatic Control, 53, pp. 2280-2291). In the proof of the convergence of the proposed algorithm different concepts associated the generalised Lyapunov operators as stability, stabilisability and detectability are widely involved. The efficiency of the proposed algorithm is demonstrated by several numerical experiments.

  8. Using Computer Technology to Foster Learning for Understanding

    Directory of Open Access Journals (Sweden)

    Elaine Van Melle

    2009-12-01

    Full Text Available The literature shows that students typically use either a surface approach to learning, in which the emphasis is on memorization of facts, or a deep approach to learning, in which learning for understanding is the primary focus. This paper describes how computer technology, specifically the use of a multimedia CD-ROM, was integrated into a microbiology curriculum as part of the transition from focusing on facts to fostering learning for understanding. Evaluation of the changes in approaches to learning over the course of the term showed a statistically significant shift in a deep approach to learning, as measured by the Study Process Questionnaire. Additional data collected showed that the use of computer technology supported this shift by providing students with the opportunity to apply what they had learned in class to order tests and interpret the test results in relation to specific patient-focused case studies. The extent of the impact, however, varied among different groups of students in the class. For example, students who were recent high school graduates did not show a statistically significant increase in deep learning scores over the course of the term and did not perform as well in the course. The results also showed that a surface approach to learning was an important aspect of learning for understanding, although only those students who were able to combine a surface with a deep approach to learning were successfully able to learn for understanding. Implications of this finding for the future use of computer technology and learning for understanding are considered.

  9. Advanced intelligent computational technologies and decision support systems

    CERN Document Server

    Kountchev, Roumen

    2014-01-01

    This book offers a state of the art collection covering themes related to Advanced Intelligent Computational Technologies and Decision Support Systems which can be applied to fields like healthcare assisting the humans in solving problems. The book brings forward a wealth of ideas, algorithms and case studies in themes like: intelligent predictive diagnosis; intelligent analyzing of medical images; new format for coding of single and sequences of medical images; Medical Decision Support Systems; diagnosis of Down’s syndrome; computational perspectives for electronic fetal monitoring; efficient compression of CT Images; adaptive interpolation and halftoning for medical images; applications of artificial neural networks for real-life problems solving; present and perspectives for Electronic Healthcare Record Systems; adaptive approaches for noise reduction in sequences of CT images etc.

  10. Technologies for Large Data Management in Scientific Computing

    CERN Document Server

    Pace, A

    2014-01-01

    In recent years, intense usage of computing has been the main strategy of investigations in several scientific research projects. The progress in computing technology has opened unprecedented opportunities for systematic collection of experimental data and the associated analysis that were considered impossible only few years ago. This paper focusses on the strategies in use: it reviews the various components that are necessary for an effective solution that ensures the storage, the long term preservation, and the worldwide distribution of large quantities of data that are necessary in a large scientific research project. The paper also mentions several examples of data management solutions used in High Energy Physics for the CERN Large Hadron Collider (LHC) experiments in Geneva, Switzerland which generate more than 30,000 terabytes of data every year that need to be preserved, analyzed, and made available to a community of several tenth of thousands scientists worldwide.

  11. Application Specific Performance Technology for Productive Parallel Computing

    Energy Technology Data Exchange (ETDEWEB)

    Malony, Allen D. [Univ. of Oregon, Eugene, OR (United States); Shende, Sameer [Univ. of Oregon, Eugene, OR (United States)

    2008-09-30

    Our accomplishments over the last three years of the DOE project Application- Specific Performance Technology for Productive Parallel Computing (DOE Agreement: DE-FG02-05ER25680) are described below. The project will have met all of its objectives by the time of its completion at the end of September, 2008. Two extensive yearly progress reports were produced in in March 2006 and 2007 and were previously submitted to the DOE Office of Advanced Scientific Computing Research (OASCR). Following an overview of the objectives of the project, we summarize for each of the project areas the achievements in the first two years, and then describe in some more detail the project accomplishments this past year. At the end, we discuss the relationship of the proposed renewal application to the work done on the current project.

  12. International Conference on Soft Computing in Information Communication Technology

    CERN Document Server

    Soft Computing in Information Communication Technology

    2012-01-01

      This is a collection of the accepted papers concerning soft computing in information communication technology. All accepted papers are subjected to strict peer-reviewing by 2 expert referees. The resultant dissemination of the latest research results, and the exchanges of views concerning the future research directions to be taken in this field makes the work of immense value to all those having an interest in the topics covered. The present book represents a cooperative effort to seek out the best strategies for effecting improvements in the quality and the reliability of Neural Networks, Swarm Intelligence, Evolutionary Computing, Image Processing Internet Security, Data Security, Data Mining, Network Security and Protection of data and Cyber laws. Our sincere appreciation and thanks go to these authors for their contributions to this conference. I hope you can gain lots of useful information from the book.

  13. Numerical methods for computing the ground state of spin-1 Bose-Einstein condensates in a uniform magnetic field.

    Science.gov (United States)

    Lim, Fong Yin; Bao, Weizhu

    2008-12-01

    We propose efficient and accurate numerical methods for computing the ground-state solution of spin-1 Bose-Einstein condensates subjected to a uniform magnetic field. The key idea in designing the numerical method is based on the normalized gradient flow with the introduction of a third normalization condition, together with two physical constraints on the conservation of total mass and conservation of total magnetization. Different treatments of the Zeeman energy terms are found to yield different numerical accuracies and stabilities. Numerical comparison between different numerical schemes is made, and the best scheme is identified. The numerical scheme is then applied to compute the condensate ground state in a harmonic plus optical lattice potential, and the effect of the periodic potential, in particular to the relative population of each hyperfine component, is investigated through comparison to the condensate ground state in a pure harmonic trap.

  14. Neural computation and particle accelerators research, technology and applications

    CERN Document Server

    D'Arras, Horace

    2010-01-01

    This book discusses neural computation, a network or circuit of biological neurons and relatedly, particle accelerators, a scientific instrument which accelerates charged particles such as protons, electrons and deuterons. Accelerators have a very broad range of applications in many industrial fields, from high energy physics to medical isotope production. Nuclear technology is one of the fields discussed in this book. The development that has been reached by particle accelerators in energy and particle intensity has opened the possibility to a wide number of new applications in nuclear technology. This book reviews the applications in the nuclear energy field and the design features of high power neutron sources are explained. Surface treatments of niobium flat samples and superconducting radio frequency cavities by a new technique called gas cluster ion beam are also studied in detail, as well as the process of electropolishing. Furthermore, magnetic devises such as solenoids, dipoles and undulators, which ...

  15. Processing instrumentation technology: Process definition with a cognitive computer

    Energy Technology Data Exchange (ETDEWEB)

    Price, H.L. [Wilkes Univ., Wilkes-Barre, PA (United States). Mechanical and Materials Engineering Dept.

    1996-11-01

    Much of the polymer composites industry is built around the thermochemical conversion of raw material into useful composites. The raw materials (molding compound, prepreg) often are made up of thermosetting resins and small fibers or particles. While this conversion can follow a large number of paths, only a few paths are efficient, economical and lead to desirable composite properties. Processing instrument (P/I) technology enables a computer to sense and interpret changes taking place during the cure of prepreg or molding compound. P/I technology has been used to make estimates of gel time and cure time, thermal diffusivity measurements and transition temperature measurements. Control and sensing software is comparatively straightforward. The interpretation of results with appropriate software is under development.

  16. The Development of Sociocultural Competence with the Help of Computer Technology

    Science.gov (United States)

    Rakhimova, Alina E.; Yashina, Marianna E.; Mukhamadiarova, Albina F.; Sharipova, Astrid V.

    2017-01-01

    The article deals with the description of the process of development sociocultural knowledge and competences using computer technologies. On the whole the development of modern computer technologies allows teachers to broaden trainees' sociocultural outlook and trace their progress online. Observation of modern computer technologies and estimation…

  17. The Development of Sociocultural Competence with the Help of Computer Technology

    Science.gov (United States)

    Rakhimova, Alina E.; Yashina, Marianna E.; Mukhamadiarova, Albina F.; Sharipova, Astrid V.

    2017-01-01

    The article deals with the description of the process of development sociocultural knowledge and competences using computer technologies. On the whole the development of modern computer technologies allows teachers to broaden trainees' sociocultural outlook and trace their progress online. Observation of modern computer technologies and estimation…

  18. Relating North American Experiences with Computer-Related Technology in Education to Developing Countries.

    Science.gov (United States)

    Collis, Betty

    This essay considers several areas of research in computer technology for education in North America and the implications of these areas of focus for the implementation of educational computer technologies in developing nations. The five areas of focus are: (1) curriculum integration, or the general rationale for using computer technology in…

  19. 25 CFR 502.7 - Electronic, computer or other technologic aid.

    Science.gov (United States)

    2010-04-01

    ... 25 Indians 2 2010-04-01 2010-04-01 false Electronic, computer or other technologic aid. 502.7... DEFINITIONS OF THIS CHAPTER § 502.7 Electronic, computer or other technologic aid. (a) Electronic, computer or other technologic aid means any machine or device that: (1) Assists a player or the playing of a...

  20. Soft Computing in Information Communication Technology Volume 2

    CERN Document Server

    2012-01-01

    This book is a collection of the accepted papers concerning soft computing in information communication technology. The resultant dissemination of the latest research results, and the exchanges of views concerning the future research directions to be taken in this field makes the work of immense value to all those having an interest in the topics covered. The present book represents a cooperative effort to seek out the best strategies for effecting improvements in the quality and the reliability of Fuzzy Logic, Machine Learning, Cryptography, Pattern Recognition, Bioinformatics, Biomedical Engineering, Advancements in ICT.

  1. Computer technology for self-management: a scoping review.

    Science.gov (United States)

    Jacelon, Cynthia S; Gibbs, Molly A; Ridgway, John Ve

    2016-05-01

    The purpose of this scoping review of literature is to explore the types of computer-based systems used for self-management of chronic disease, the goals and success of these systems, the value added by technology integration and the target audience for these systems. Technology is changing the way health care is provided and the way that individuals manage their health. Individuals with chronic diseases are now able to use computer-based systems to self-manage their health. These systems have the ability to remind users of daily activities, and to help them recognise when symptoms are worsening and intervention is indicated. However, there are many questions about the types of systems available, the goals of these systems and the success with which individuals with chronic illness are using them. This is a scoping review in which the Cumulative Index of Nursing and Allied Health Literature, PubMed and IEEE Xplore databases were searched. A total of 303 articles were reviewed, 89 articles were read in-depth and 30 were included in the scoping review. The Substitution, Augmentation, Modification, Redefinition model was used to evaluate the value added by the technology integration. Research on technology for self-management was conducted in 13 countries. Data analysis identified five kinds of platforms on which the systems were based, some systems were focused on a specific disease management processes, others were not. For individuals to effectively use systems to maintain maximum wellness, the systems must have a strong component of self-management and provide the user with meaningful information regarding their health states. Clinicians should choose systems for their clients based on the design, components and goals of the systems. © 2016 John Wiley & Sons Ltd.

  2. Proceedings of the 2012 International Conference on Information Technology and Software Engineering : Information Technology & Computing Intelligence

    CERN Document Server

    Cai, Guoqiang; Liu, Weibin; Xing, Weiwei

    2013-01-01

    Proceedings of the 2012 International Conference on Information Technology and Software Engineering presents selected articles from this major event, which was held in Beijing, December 8-10, 2012. This book presents the latest research trends, methods and experimental results in the fields of information technology and software engineering, covering various state-of-the-art research theories and approaches. The subjects range from intelligent computing to information processing, software engineering, Web, unified modeling language (UML), multimedia, communication technologies, system identification, graphics and visualizing, etc. The proceedings provide a major interdisciplinary forum for researchers and engineers to present the most innovative studies and advances, which can serve as an excellent reference work for researchers and graduate students working on information technology and software engineering. Prof. Wei Lu, Dr. Guoqiang Cai, Prof. Weibin Liu and Dr. Weiwei Xing all work at Beijing Jiaotong Uni...

  3. Review of Enabling Technologies to Facilitate Secure Compute Customization

    Energy Technology Data Exchange (ETDEWEB)

    Aderholdt, Ferrol [Tennessee Technological University; Caldwell, Blake A [ORNL; Hicks, Susan Elaine [ORNL; Koch, Scott M [ORNL; Naughton, III, Thomas J [ORNL; Pelfrey, Daniel S [ORNL; Pogge, James R [Tennessee Technological University; Scott, Stephen L [Tennessee Technological University; Shipman, Galen M [ORNL; Sorrillo, Lawrence [ORNL

    2014-12-01

    High performance computing environments are often used for a wide variety of workloads ranging from simulation, data transformation and analysis, and complex workflows to name just a few. These systems may process data for a variety of users, often requiring strong separation between job allocations. There are many challenges to establishing these secure enclaves within the shared infrastructure of high-performance computing (HPC) environments. The isolation mechanisms in the system software are the basic building blocks for enabling secure compute enclaves. There are a variety of approaches and the focus of this report is to review the different virtualization technologies that facilitate the creation of secure compute enclaves. The report reviews current operating system (OS) protection mechanisms and modern virtualization technologies to better understand the performance/isolation properties. We also examine the feasibility of running ``virtualized'' computing resources as non-privileged users, and providing controlled administrative permissions for standard users running within a virtualized context. Our examination includes technologies such as Linux containers (LXC [32], Docker [15]) and full virtualization (KVM [26], Xen [5]). We categorize these different approaches to virtualization into two broad groups: OS-level virtualization and system-level virtualization. The OS-level virtualization uses containers to allow a single OS kernel to be partitioned to create Virtual Environments (VE), e.g., LXC. The resources within the host's kernel are only virtualized in the sense of separate namespaces. In contrast, system-level virtualization uses hypervisors to manage multiple OS kernels and virtualize the physical resources (hardware) to create Virtual Machines (VM), e.g., Xen, KVM. This terminology of VE and VM, detailed in Section 2, is used throughout the report to distinguish between the two different approaches to providing virtualized execution

  4. SERC School on Computational Statistical Physics held at the Indian Institute of Technology

    CERN Document Server

    Ray, Purusattam

    2011-01-01

    The present book is an outcome of the SERC school on Computational Statistical Physics held at the Indian Institute of Technology, Guwahati, in December 2008. Numerical experimentation has played an extremely important role in statistical physics in recent years. Lectures given at the School covered a large number of topics of current and continuing interest. Based on lectures by active researchers in the field- Bikas Chakrabarti, S Chaplot, Deepak Dhar, Sanjay Kumar, Prabal Maiti, Sanjay Puri, Purusattam Ray, Sitangshu Santra and Subir Sarkar- the nine chapters comprising the book deal with topics that range from the fundamentals of the field, to problems and questions that are at the very forefront of current research. This book aims to expose the graduate student to the basic as well as advanced techniques in computational statistical physics. Following a general introduction to statistical mechanics and critical phenomena, the various chapters cover Monte Carlo and molecular dynamics simulation methodolog...

  5. Counseling Student Computer Competency Skills: Effects of Technology Course in Training.

    Science.gov (United States)

    Edwards, Yolanda V.; Portman, Tarrell Awe Agahe; Bethea, James

    2002-01-01

    The focus of this article is to assess counseling student computer competency level as an effect of a one-credit hour introductory course in computer technology. Results indicate student computer competencies increased after completing the computer technology course in the following areas: ethics, assisting clients with internet searches,…

  6. Computation Directorate and Science& Technology Review Computational Science and Research Featured in 2002

    Energy Technology Data Exchange (ETDEWEB)

    Alchorn, A L

    2003-04-04

    Thank you for your interest in the activities of the Lawrence Livermore National Laboratory Computation Directorate. This collection of articles from the Laboratory's Science & Technology Review highlights the most significant computational projects, achievements, and contributions during 2002. In 2002, LLNL marked the 50th anniversary of its founding. Scientific advancement in support of our national security mission has always been the core of the Laboratory. So that researchers could better under and predict complex physical phenomena, the Laboratory has pushed the limits of the largest, fastest, most powerful computers in the world. In the late 1950's, Edward Teller--one of the LLNL founders--proposed that the Laboratory commission a Livermore Advanced Research Computer (LARC) built to Livermore's specifications. He tells the story of being in Washington, DC, when John Von Neumann asked to talk about the LARC. He thought Teller wanted too much memory in the machine. (The specifications called for 20-30,000 words.) Teller was too smart to argue with him. Later Teller invited Von Neumann to the Laboratory and showed him one of the design codes being prepared for the LARC. He asked Von Neumann for suggestions on fitting the code into 10,000 words of memory, and flattered him about ''Labbies'' not being smart enough to figure it out. Von Neumann dropped his objections, and the LARC arrived with 30,000 words of memory. Memory, and how close memory is to the processor, is still of interest to us today. Livermore's first supercomputer was the Remington-Rand Univac-1. It had 5600 vacuum tubes and was 2 meters wide by 4 meters long. This machine was commonly referred to as a 1 KFlop machine [E+3]. Skip ahead 50 years. The ASCI White machine at the Laboratory today, produced by IBM, is rated at a peak performance of 12.3 TFlops or E+13. We've improved computer processing power by 10 orders of magnitude in 50 years, and I do

  7. Numerical computation of the EOB potential q using self-force results

    CERN Document Server

    Akcay, Sarp

    2015-01-01

    The effective-one-body theory (EOB) describes the conservative dynamics of compact binary systems in terms of an effective Hamiltonian approach. The Hamiltonian for moderately eccentric motion of two non-spinning compact objects in the extreme mass-ratio limit is given in terms of three potentials: $a(v), \\bar{d}(v), q(v)$. By generalizing the first law of mechanics for (non-spinning) black hole binaries to eccentric orbits, [\\prd{\\bf92}, 084021 (2015)] recently obtained new expressions for $\\bar{d}(v)$ and $q(v)$ in terms of quantities that can be readily computed using the gravitational self-force approach. Using these expressions we present a new computation of the EOB potential $q(v)$ by combining results from two independent numerical self-force codes. We determine $q(v)$ for inverse binary separations in the range $1/1200 \\le v \\lesssim 1/6$. Our computation thus provides the first-ever strong-field results for $q(v)$. We also obtain $\\bar{d}(v)$ in our entire domain to a fractional accuracy of $\\gtrsim...

  8. Preservice teachers’ preparedness to integrate computer technology into the curriculum

    Directory of Open Access Journals (Sweden)

    Jelena Magliaro

    2008-05-01

    Full Text Available For Canada to compete effectively in the digital world, beginning teachers need to play an important role in integrating computer technology into the curriculum. Equipment and connectivity do not guarantee successful or productive use of computers in the classroom, but the combination of the teaching style and technology use has the potential to change education. In this research, the computer self-efficacy beliefs of 210 preservice teachers after their first practice teaching placements were examined. First, the quantitative component of the study involved the use of Computer User Self-Efficacy (CUSE scale where students’ previous undergraduate degree, licensure area, experience and familiarity with software packages were found to have statistically significant effects on computer self-efficacy. Second, the qualitative data indicated that society and school were the most positive factors that influenced preservice teachers’ attitudes towards computers, while the family had the highest percentage of negative influence. Findings reveal that although preservice teachers had completed only two months of the program, those with higher CUSE scores were more ready to integrate computers into their lessons than those with lower scores. Résumé: Pour que le Canada puisse entrer en compétition dans le monde numérique, les nouveaux enseignants devront jouer un rôle important d’intégration des technologies informatiques dans le curriculum. Les équipements et la connectivité ne garantissent pas une utilisation gagnante ou productive de l’ordinateur en salle de classe, mais la combinaison de styles d’enseignement et d’usages de la technologie a le potentiel de changer l’éducation. Dans cette étude, les croyances d’auto-efficacité à l’ordinateur de 210 futurs enseignants après leur première affectation ont été examinées. Premièrement, la partie quantitative de l’étude impliquait l’utilisation de l’échelle du Computer

  9. Computing Technologies for Oriented Education: Applications in Biological Sciences

    Directory of Open Access Journals (Sweden)

    Santiago Jaime Reyes

    2005-12-01

    Full Text Available The experience developing modern digital programs with highly qualified profesoors with several years of teaching postgraduate biological sciences matters is described. A small group of selected professors with a minimum knowledged or basic domain in computer software were invited to develop digital programs in the items of their interest,the purpose is to establish the bases for construction of an available digital library. The products to develop are a series of CD-ROM with program source in HTML format. The didactic strategy responds to a personal tutorship, step by step workshop, to build its own project (without programming languages. The workshop begins generating trust in very simple activities. It is designed to learn building and to advance evaluating the progress. It is fulfilled the necessity to put up-to-date the available material that regularly uses to impart the classes (video, slides, pictures, articles, examples etc. The information and computing technologies ICT are a indispensable tool to diffuse the knowledge to a coarser and more diverse public in the topics of their speciality. The obtained products are 8 CD ROM with didactic programs designed with scientific and technological bases.

  10. Using Linear Algebra to Introduce Computer Algebra, Numerical Analysis, Data Structures and Algorithms (and To Teach Linear Algebra, Too).

    Science.gov (United States)

    Gonzalez-Vega, Laureano

    1999-01-01

    Using a Computer Algebra System (CAS) to help with the teaching of an elementary course in linear algebra can be one way to introduce computer algebra, numerical analysis, data structures, and algorithms. Highlights the advantages and disadvantages of this approach to the teaching of linear algebra. (Author/MM)

  11. ABMAC-arbitrary boundary marker and cell Eulerian hydrodynamic incompressible numerical method. [In FORTRAN for CDC 6600 computer

    Energy Technology Data Exchange (ETDEWEB)

    Garcia, Jr., W. J.; Viecelli, J. A.

    1976-06-01

    This report is intended to be a ''user manual'' for the Lawrence Livermore Laboratory version of the Eulerian incompressible hydrodynamic computer code ABMAC. The theory of the numerical model is discussed in general terms. The format for data input and data printout is described in detail. A listing and flow chart of the computer code are provided.

  12. On the Cultivation of Computing Thinking Ability in Nu-merical Computing Method Course%数值计算方法课程中计算思维能力的培养

    Institute of Scientific and Technical Information of China (English)

    胡金蓉; 吴霞

    2015-01-01

    With the continuous development of computer technol-ogy, computing thinking ability has become a necessary quality that college students must possess. The inherent characteristics of knowledge structure of numerical computing method, as a foun-dation course for science and engineering students, are of great significance to the cultivation of computing thinking. With the course as the breakthrough point, under the guidance of the out-line of cultivating computing thinking ability, this paper discusses the teaching scheme of numerical computing method course based on the cultivation of computing thinking ability, aiming to train and improve students' computing thinking ability based on their mastery of knowledge on numerical computing method.%随着计算机技术的不断发展,计算思维能力已成为大学生必须具备的基本素质之一。数值计算方法作为理工科学生的专业基础课程之一,其固有的知识结构特点对计算思维的培养具有重要意义。本文以该课程作为切入点,在计算思维能力培养概要指导下讨论了基于计算思维能力培养的数值计算方法课程的教学方案,目的是在学生学习数值计算方法内容的同时,训练和提升自己的计算思维能力。

  13. A one dimensional numerical approach for computing the eigenmodes of elastic waves in buried pipelines

    Science.gov (United States)

    Duan, Wenbo; Kirby, Ray; Mudge, Peter; Gan, Tat-Hean

    2016-12-01

    Ultrasonic guided waves are often used in the detection of defects in oil and gas pipelines. It is common for these pipelines to be buried underground and this may restrict the length of the pipe that can be successfully tested. This is because acoustic energy travelling along the pipe walls may radiate out into the surrounding medium. Accordingly, it is important to develop a better understanding of the way in which elastic waves propagate along the walls of buried pipes, and so in this article a numerical model is developed that is suitable for computing the eigenmodes for uncoated and coated buried pipes. This is achieved by combining a one dimensional eigensolution based on the semi-analytic finite element (SAFE) method, with a perfectly matched layer (PML) for the infinite medium surrounding the pipe. This article also explores an alternative exponential complex coordinate stretching function for the PML in order to improve solution convergence. It is shown for buried pipelines that accurate solutions may be obtained over the entire frequency range typically used in long range ultrasonic testing (LRUT) using a PML layer with a thickness equal to the pipe wall thickness. This delivers a fast and computationally efficient method and it is shown for pipes buried in sand or soil that relevant eigenmodes can be computed and sorted in less than one second using relatively modest computer hardware. The method is also used to find eigenmodes for a buried pipe coated with the viscoelastic material bitumen. It was recently observed in the literature that a viscoelastic coating may effectively isolate particular eigenmodes so that energy does not radiate from these modes into the surrounding [elastic] medium. A similar effect is also observed in this article and it is shown that this occurs even for a relatively thin layer of bitumen, and when the shear impedance of the coating material is larger than that of the surrounding medium.

  14. A numerical method for computing unsteady 2-D boundary layer flows

    Science.gov (United States)

    Krainer, Andreas

    1988-01-01

    A numerical method for computing unsteady two-dimensional boundary layers in incompressible laminar and turbulent flows is described and applied to a single airfoil changing its incidence angle in time. The solution procedure adopts a first order panel method with a simple wake model to solve for the inviscid part of the flow, and an implicit finite difference method for the viscous part of the flow. Both procedures integrate in time in a step-by-step fashion, in the course of which each step involves the solution of the elliptic Laplace equation and the solution of the parabolic boundary layer equations. The Reynolds shear stress term of the boundary layer equations is modeled by an algebraic eddy viscosity closure. The location of transition is predicted by an empirical data correlation originating from Michel. Since transition and turbulence modeling are key factors in the prediction of viscous flows, their accuracy will be of dominant influence to the overall results.

  15. Numerical method for computing Maass cusp forms on triply punctured two-sphere

    Energy Technology Data Exchange (ETDEWEB)

    Chan, K. T.; Kamari, H. M. [Department of Physics, Faculty of Science, Universiti Putra Malaysia, 43400 UPM Serdang, Selangor (Malaysia); Zainuddin, H. [Department of Physics, Faculty of Science, Universiti Putra Malaysia, 43400 UPM Serdang, Selangor, Malaysia and Institute for Mathematical Research, Universiti Putra Malaysia, 43400 UPM Serdang, Selangor (Malaysia)

    2014-03-05

    A quantum mechanical system on a punctured surface modeled on hyperbolic space has always been an important subject of research in mathematics and physics. This corresponding quantum system is governed by the Schrödinger equation whose solutions are the Maass waveforms. Spectral studies on these Maass waveforms are known to contain both continuous and discrete eigenvalues. The discrete eigenfunctions are usually called the Maass Cusp Forms (MCF) where their discrete eigenvalues are not known analytically. We introduce a numerical method based on Hejhal and Then algorithm using GridMathematica for computing MCF on a punctured surface with three cusps namely the triply punctured two-sphere. We also report on a pullback algorithm for the punctured surface and a point locater algorithm to facilitate the complete pullback which are essential parts of the main algorithm.

  16. Numerical simulation of a direct internal reforming solid oxide fuel cell using computational fluid dynamics methodas

    Institute of Scientific and Technical Information of China (English)

    Jun LI; Ying-wei KANG; Guang-yi CAO; Xin-jian ZHU; Heng-yong TU; Jian LI

    2008-01-01

    A detailed mathematical model of a direct internal reforming solid oxide fuel cell (DIR-SOFC) incorporating with simulation of chemical and physical processes in the fuel cell is presented. The model is developed based on the reforming and electrochemical reaction mechanisms, mass and energy conservation, and heat transfer. A computational fluid dynamics (CFD) method is used for solving the complicated multiple partial differential equations (PDEs) to obtain the numerical approximations.The resulting distributions of chemical species concentrations, temperature and current density in a cross-flow DIR-SOFC are given and analyzed in detail. Further, the influence between distributions of chemical species concentrations, temperature and current density during the simulation is illustrated and discussed. The heat and mass transfer, and the kinetics of reforming and electrochemical reactions have significant effects on the parameter distributions within the cell. The results show the particularchar acteristics of the DIR-SOFC among fuel cells, and can aid in stack design and control.

  17. Programming for computations Python : a gentle introduction to numerical simulations with Python

    CERN Document Server

    Linge, Svein

    2016-01-01

    This book presents computer programming as a key method for solving mathematical problems. There are two versions of the book, one for MATLAB and one for Python. The book was inspired by the Springer book TCSE 6: A Primer on Scientific Programming with Python (by Langtangen), but the style is more accessible and concise, in keeping with the needs of engineering students. The book outlines the shortest possible path from no previous experience with programming to a set of skills that allows the students to write simple programs for solving common mathematical problems with numerical methods in engineering and science courses. The emphasis is on generic algorithms, clean design of programs, use of functions, and automatic tests for verification.

  18. Programming for computations MATLAB/Octave : a gentle introduction to numerical simulations with MATLAB/Octave

    CERN Document Server

    Linge, Svein

    2016-01-01

    This book presents computer programming as a key method for solving mathematical problems. There are two versions of the book, one for MATLAB and one for Python. The book was inspired by the Springer book TCSE 6: A Primer on Scientific Programming with Python (by Langtangen), but the style is more accessible and concise, in keeping with the needs of engineering students. The book outlines the shortest possible path from no previous experience with programming to a set of skills that allows the students to write simple programs for solving common mathematical problems with numerical methods in engineering and science courses. The emphasis is on generic algorithms, clean design of programs, use of functions, and automatic tests for verification.

  19. Numerical simulation of mechatronic sensors and actuators finite elements for computational multiphysics

    CERN Document Server

    Kaltenbacher, Manfred

    2015-01-01

    Like the previous editions also the third edition of this book combines the detailed physical modeling of mechatronic systems and their precise numerical simulation using the Finite Element (FE) method. Thereby, the basic chapter concerning the Finite Element (FE) method is enhanced, provides now also a description of higher order finite elements (both for nodal and edge finite elements) and a detailed discussion of non-conforming mesh techniques. The author enhances and improves many discussions on principles and methods. In particular, more emphasis is put on the description of single fields by adding the flow field. Corresponding to these field, the book is augmented with the new chapter about coupled flow-structural mechanical systems. Thereby, the discussion of computational aeroacoustics is extended towards perturbation approaches, which allows a decomposition of flow and acoustic quantities within the flow region. Last but not least, applications are updated and restructured so that the book meets mode...

  20. Computing the numerical solution to functional differential equations: some recent progresses towards E. Hopf's 1952 dream

    Science.gov (United States)

    Venturi, Daniele

    2016-11-01

    The fundamental importance of functional differential equations has been recognized in many areas of mathematical physics, such as fluid dynamics, quantum field theory and statistical physics. For example, in the context of fluid dynamics, the Hopf characteristic functional equation was deemed by Monin and Yaglom to be "the most compact formulation of the turbulence problem", which is the problem of determining the statistical properties of the velocity and pressure fields of Navier-Stokes equations given statistical information on the initial state. However, no effective numerical method has yet been developed to compute the solution to functional differential equations. In this talk I will provide a new perspective on this general problem, and discuss recent progresses in approximation theory for nonlinear functionals and functional equations. The proposed methods will be demonstrated through various examples.

  1. SAR Computation inside Fetus by RF Coil during MR Imaging Employing Realistic Numerical Pregnant Woman Model

    Science.gov (United States)

    Kikuchi, Satoru; Saito, Kazuyuki; Takahashi, Masaharu; Ito, Koichi; Ikehira, Hiroo

    This paper presents the computational electromagnetic dosimetry inside an anatomically based pregnant woman models exposed to electromagnetic wave during magnetic resonance imaging. The two types of pregnant woman models corresponding to early gestation and 26 weeks gestation were used for this study. The specific absorption rate (SAR) in and around a fetus were calculated by radiated electromagnetic wave from highpass and lowpass birdcage coil. Numerical calculation results showed that high SAR region is observed at the body in the vicinity of gaps of the coil, and is related to concentrated electric field in the gaps of human body such as armpit and thigh. Moreover, it has confirmed that the SAR in the fetus is less than International Electrotechnical Commission limit of 10W/kg, when whole-body average SARs are 2W/kg and 4W/kg, which are the normal operating mode and first level controlled operating mode, respectively.

  2. EVOLVE : a Bridge between Probability, Set Oriented Numerics, and Evolutionary Computation II

    CERN Document Server

    Coello, Carlos; Tantar, Alexandru-Adrian; Tantar, Emilia; Bouvry, Pascal; Moral, Pierre; Legrand, Pierrick; EVOLVE 2012

    2013-01-01

    This book comprises a selection of papers from the EVOLVE 2012 held in Mexico City, Mexico. The aim of the EVOLVE is to build a bridge between probability, set oriented numerics and evolutionary computing, as to identify new common and challenging research aspects. The conference is also intended to foster a growing interest for robust and efficient methods with a sound theoretical background. EVOLVE is intended to unify theory-inspired methods and cutting-edge techniques ensuring performance guarantee factors. By gathering researchers with different backgrounds, a unified view and vocabulary can emerge where the theoretical advancements may echo in different domains. Summarizing, the EVOLVE focuses on challenging aspects arising at the passage from theory to new paradigms and aims to provide a unified view while raising questions related to reliability,  performance guarantees and modeling. The papers of the EVOLVE 2012 make a contribution to this goal. 

  3. Numerical reconstruction of pulsatile blood flow from 4D computer tomography angiography data

    CERN Document Server

    Lovas, Attila; Csobo, Elek; Szilágyi, Brigitta; Sótonyi, Péter

    2015-01-01

    We present a novel numerical algorithm developed to reconstuct pulsatile blood flow from ECG-gated CT angiography data. A block-based optimization method was constructed to solve the inverse problem corresponding to the Riccati-type ordinary differential equation that can be deduced from conservation principles and Hooke's law. Local flow rate for 5 patients was computed in 10cm long aorta segments that are located 1cm below the heart. The wave form of the local flow rate curves seems to be realistic. Our approach is suitable for estimating characteristics of pulsatile blood flow in aorta based on ECG gated CT scan thereby contributing to more accurate description of several cardiovascular lesions.

  4. NUMERICAL COMPUTATIONS OF CO-EXISTING SUPER-CRITICAL AND SUB-CRITICAL FLOWS BASED UPON CRD SCHEMES

    Science.gov (United States)

    Horie, Katsuya; Okamura, Seiji; Kobayashi, Yusuke; Hyodo, Makoto; Hida, Yoshihisa; Nishimoto, Naoshi; Mori, Akio

    Stream flows in steep gradient bed form complicating flow configurations, where co-exist super-critical and sub-critical flows. Computing numerically such flows are the key to successful river management. This study applied CRD schemes to 1D and 2D stream flow computations and proposed genuine ways to eliminate expansion shock waves. Through various cases of computing stream flows conducted, CRD schemes showed that i) conservativeness of discharge and accuracy of four significant figures are ensured, ii) artificial viscosity is not explicitly used for computational stabilization, and thus iii) 1D and 2D computations based upon CRD schemes are applicable to evaluating complicating stream flows for river management.

  5. Numerical Simulation of Plasma-Dynamical Processes in the Technological Inductively Coupled RF Plasmatron with Gas Cooling

    Directory of Open Access Journals (Sweden)

    Yu. M. Grishin

    2016-01-01

    Full Text Available The electrodeless inductively coupled RF plasmatron (ICP torches became widely used in various fields of engineering, science and technology. Presently, owing to development of new technologies to produce very pure substances, nanopowders, etc., there is a steadily increasing interest in the induction plasma. This generates a need for a broad range of theoretical and experimental studies to optimize the design and technological parameters of different ICP equipment.The paper presents a numerical model to calculate parameters of inductively coupled RF plasmatron with gas-cooling flow. A finite volume method is used for a numerical solution of a system of Maxwell's and heat transfer equations in the application package ANSYS CFX (14.5. The pseudo-steady approach to solving problems is used.A numerical simulation has been computed in the application package ANSYS CFX (14.5 for a specific design option of the technological ICP, which has a three-coils inductor and current amplitude in the range J к = 50-170 A (3 MHz. The pure argon flows in the ICP. The paper discusses how the value of discharge current impacts on the thermodynamic parameters (pressure, temperature and the power energy in discharge zone. It shows that the ICP can generate a plasma stream with a maximum temperature of about 10 kK and an output speed of 10-15 m/s. The work determines a length of the plasma stream with a weight average temperature of more than 4 kK. It has been found that in order to keep the quartz walls in normal thermal state, the discharge current amplitude should not exceed 150 A. The paper shows the features of the velocity field distribution in the channel of the plasma torch, namely, the formation of vortex in the position of the first coil. The results obtained are important for calculating the dynamics of heating and evaporation of quartz particles in the manufacturing processes for plasma processing of quartz concentrate into high-purity quartz and

  6. Fuzzy Deduction Material Removal Rate Optimization for Computer Numerical Control Turning

    Directory of Open Access Journals (Sweden)

    Tian-Syung Lan

    2010-01-01

    Full Text Available Problem statement: Material Removal Rate (MRR is often a major consideration in the modern Computer Numerical Control (CNC turning industry. Most existing optimization researches for CNC finish turning were either accomplished within certain manufacturing circumstances, or achieved through numerous equipment operations. Therefore, a general deduction optimization scheme is deemed to be necessary proposed for the industry. Approach: In this study, four parameters (cutting depth, feed rate, speed, tool nose runoff with three levels (low, medium, high were considered to optimize the MRR in finish turning based on L9(34 orthogonal array. Additionally, nine fuzzy control rules using triangle membership function with respective to five linguistic grades for the MRR is constructed. Considering four input and twenty output intervals, the defuzzification using center of gravity was thus completed for the Taguchi experiment. Therefore, the optimum general deduction parameters can then be received. Results: The confirmation experiment for optimum general deduction parameters was furthermore performed on an ECOCA-3807 CNC lathe. It was shown that the material removal rates from the fuzzy Taguchi deduction optimization parameters are all significantly advanced comparing to those from the benchmark. Conclusion: This study not only proposed a general deduction optimization scheme using orthogonal array, but also contributed the satisfactory fuzzy linguistic approach for the MRR in CNC turning with profound insight.

  7. Numerical computation of the Shock Tube Problem by means of wave digital principles

    Directory of Open Access Journals (Sweden)

    A. Mengel

    2006-01-01

    Full Text Available Partial differential equations can be solved numerically by means of wave digital principles. The great advantage of this method is the simultaneous achievement of high robustness, massive parallelism full localness and high accuracy. Among others this method will be applied in order to solve the Euler-equations according to one dimension in space. Especially the so called Shock Tube Problem will be examined. The analytical solution of this problem contains two discontinuities, namely a shock and a contact discontinuity. These result in oscillations which are due to numerical integration methods of higher order. Also solutions of the Wave Digital Method contain these oscillations, contrary to what had been observed of Yuhui Zhu (2000. This behaviour is also known as Gibbs Phenomena. The Navier-Stokes-equations, which are from a physical point of view more exactly, additionally take viscosity terms into account. This leads to smooth solutions near shocks. It will be shown that this approach leads to the suppression of the oscillations near the shock. Furthermore it will be shown that quite good results for the computation of velocity and pressure can be obtained.

  8. A Computationally-Efficient Numerical Model to Characterize the Noise Behavior of Metal-Framed Walls

    Directory of Open Access Journals (Sweden)

    Arun Arjunan

    2015-08-01

    Full Text Available Architects, designers, and engineers are making great efforts to design acoustically-efficient metal-framed walls, minimizing acoustic bridging. Therefore, efficient simulation models to predict the acoustic insulation complying with ISO 10140 are needed at a design stage. In order to achieve this, a numerical model consisting of two fluid-filled reverberation chambers, partitioned using a metal-framed wall, is to be simulated at one-third-octaves. This produces a large simulation model consisting of several millions of nodes and elements. Therefore, efficient meshing procedures are necessary to obtain better solution times and to effectively utilise computational resources. Such models should also demonstrate effective Fluid-Structure Interaction (FSI along with acoustic-fluid coupling to simulate a realistic scenario. In this contribution, the development of a finite element frequency-dependent mesh model that can characterize the sound insulation of metal-framed walls is presented. Preliminary results on the application of the proposed model to study the geometric contribution of stud frames on the overall acoustic performance of metal-framed walls are also presented. It is considered that the presented numerical model can be used to effectively visualize the noise behaviour of advanced materials and multi-material structures.

  9. Numerical computations of interior transmission eigenvalues for scattering objects with cavities

    Science.gov (United States)

    Peters, Stefan; Kleefeld, Andreas

    2016-04-01

    In this article we extend the inside-outside duality for acoustic transmission eigenvalue problems by allowing scattering objects that may contain cavities. In this context we provide the functional analytical framework necessary to transfer the techniques that have been used in Kirsch and Lechleiter (2013 Inverse Problems, 29 104011) to derive the inside-outside duality. Additionally, extensive numerical results are presented to show that we are able to successfully detect interior transmission eigenvalues with the inside-outside duality approach for a variety of obstacles with and without cavities in three dimensions. In this context, we also discuss the advantages and disadvantages of the inside-outside duality approach from a numerical point of view. Furthermore we derive the integral equations necessary to extend the algorithm in Kleefeld (2013 Inverse Problems, 29 104012) to compute highly accurate interior transmission eigenvalues for scattering objects with cavities, which we will then use as reference values to examine the accuracy of the inside-outside duality algorithm.

  10. Research on surveying technology applied for DTM modelling and volume computation in open pit mines

    Directory of Open Access Journals (Sweden)

    Jaroslaw Wajs

    2016-01-01

    Full Text Available The spatial information systems of mining company can be used for monitoring of mining activity, excavation planning, calculations of the ore volume and decision making. Nowadays, data base has to be updated by sources such as surveying positioning technologies and remote sensed photogrammetry data. The presented paper contains review of the methodology for the digital terrain model, i.e. DTM, modelling and obtaining data from surveying technologies in an open pit mine or quarry. This paper reviews the application of GPS, total station measurements, and ground photogrammetry for the volume accuracy assessment of a selected object. The testing field was situated in Belchatow lignite open pit mine. A suitable object had been selected. The testing layer of coal seam was located at 8’th pit sidewall excavation area. The data were acquired two times within one month period and it was connected with monthly DTM actualization of excavation. This paper presents the technological process and the results of the research of using digital photogrammetry for opencast mining purposes in the scope of numerical volume computation and monitoring the mines by comparison of different sources. The results shows that the presented workflow allow to build DTM manually and remote sensed and the accuracy assessment was presented by the volume computation pathway. Major advantages of the techniques are presented illustrating how a terrestrial photogrammetry techniques provide rapid spatial measurements of breaklines 3D data utilized to volume calculation.

  11. 8th International Conference on Computer Science and its Applications (CSA-16) and the 11st International Conference on Ubiquitous Information Technologies and Applications (CUTE 2016)

    CERN Document Server

    Pan, Yi; Yi, Gangman; Loia, Vincenzo

    2017-01-01

    This book presents the combined proceedings of the 8th International Conference on Computer Science and its Applications (CSA-16) and the 11st International Conference on Ubiquitous Information Technologies and Applications (CUTE 2016), both held in Bangkok, Thailand, December 19 - 21, 2016. The aim of these two meetings was to promote discussion and interaction among academics, researchers and professionals in the field of ubiquitous computing technologies. These proceedings reflect the state-of-the-art in the development of computational methods, involving theory, algorithm, numerical simulation, error and uncertainty analysis and novel application of new processing techniques in engineering, science, and other disciplines related to ubiquitous computing.

  12. Technical Education Transfer: Perceptions of Employee Computer Technology Self-Efficacy.

    Science.gov (United States)

    Decker, C. A.

    1999-01-01

    This study investigated influences on employee self-efficacy of computer technologies resulting from computer-training programs that were intended to meet individual and organization objectives for university personnel. Influences on the transfer of training process included previous computer training, computer-use requirements, computer-use…

  13. Infragravity wave generation and dynamics over a mild slope beach : Experiments and numerical computations

    Science.gov (United States)

    Cienfuegos, R.; Duarte, L.; Hernandez, E.

    2008-12-01

    Charasteristic frequencies of gravity waves generated by wind and propagating towards the coast are usually comprised between 0.05Hz and 1Hz. Nevertheless, lower frequecy waves, in the range of 0.001Hz and 0.05Hz, have been observed in the nearshore zone. Those long waves, termed as infragravity waves, are generated by complex nonlinear mechanisms affecting the propagation of irregular waves up to the coast. The groupiness of an incident random wave field may be responsible for producing a slow modulation of the mean water surface thus generating bound long waves travelling at the group speed. Similarly, a quasi- periodic oscillation of the break-point location, will be accompained by a slow modulation of set-up/set-down in the surf zone and generation and release of long waves. If the primary structure of the carrying incident gravity waves is destroyed (e.g. by breaking), forced long waves can be freely released and even reflected at the coast. Infragravity waves can affect port operation through resonating conditions, or strongly affect sediment transport and beach morphodynamics. In the present study we investigate infragravity wave generation mechanisms both, from experiments and numerical computations. Measurements were conducted at the 70-meter long wave tank, located at the Instituto Nacional de Hidraulica (Chile), prepared with a beach of very mild slope of 1/80 in order to produce large surf zone extensions. A random JONSWAP type wave field (h0=0.52m, fp=0.25Hz, Hmo=0.17m) was generated by a piston wave-maker and measurements of the free surface displacements were performed all over its length at high spatial resolution (0.2m to 1m). Velocity profiles were also measured at four verticals inside the surf zone using an ADV. Correlation maps of wave group envelopes and infragravity waves are computed in order to identify long wave generation and dynamics in the experimental set-up. It appears that both mechanisms (groupiness and break-point oscillation) are

  14. Numerical Difficulties Computing Electrostatic Potentials Near Interfaces with the Poisson-Boltzmann Equation.

    Science.gov (United States)

    Harris, Robert C; Boschitsch, Alexander H; Fenley, Marcia O

    2017-08-08

    Many researchers compute surface maps of the electrostatic potential (φ) with the Poisson-Boltzmann (PB) equation to relate the structural information obtained from X-ray and NMR experiments to biomolecular functions. Here we demonstrate that the usual method of obtaining these surface maps of φ, by interpolating from neighboring grid points on the solution grid generated by a PB solver, generates large errors because of the large discontinuity in the dielectric constant (and thus in the normal derivative of φ) at the surface. The Cartesian Poisson-Boltzmann solver contains several features that reduce the numerical noise in surface maps of φ: First, CPB introduces additional mesh points at the Cartesian grid/surface intersections where the PB equation is solved. This procedure ensures that the solution for interior mesh points only references nodes on the interior or on the surfaces; similarly for exterior points. Second, for added points on the surface, a second order least-squares reconstruction (LSR) is implemented that analytically incorporates the discontinuities at the surface. LSR is used both during the solution phase to compute φ at the surface and during postprocessing to obtain φ, induced charges, and ionic pressures. Third, it uses an adaptive grid where the finest grid cells are located near the molecular surface.

  15. Numerical study of premixed HCCI engine combustion and its sensitivity to computational mesh and model uncertainties

    Science.gov (United States)

    Kong, Song-Charng; Reitz, Rolf D.

    2003-06-01

    This study used a numerical model to investigate the combustion process in a premixed iso-octane homogeneous charge compression ignition (HCCI) engine. The engine was a supercharged Cummins C engine operated under HCCI conditions. The CHEMKIN code was implemented into an updated KIVA-3V code so that the combustion could be modelled using detailed chemistry in the context of engine CFD simulations. The model was able to accurately simulate the ignition timing and combustion phasing for various engine conditions. The unburned hydrocarbon emissions were also well predicted while the carbon monoxide emissions were under predicted. Model results showed that the majority of unburned hydrocarbon is located in the piston-ring crevice region and the carbon monoxide resides in the vicinity of the cylinder walls. A sensitivity study of the computational grid resolution indicated that the combustion predictions were relatively insensitive to the grid density. However, the piston-ring crevice region needed to be simulated with high resolution to obtain accurate emissions predictions. The model results also indicated that HCCI combustion and emissions are very sensitive to the initial mixture temperature. The computations also show that the carbon monoxide emissions prediction can be significantly improved by modifying a key oxidation reaction rate constant.

  16. Worldline approach for numerical computation of electromagnetic Casimir energies: Scalar field coupled to magnetodielectric media

    Science.gov (United States)

    Mackrory, Jonathan B.; Bhattacharya, Tanmoy; Steck, Daniel A.

    2016-10-01

    We present a worldline method for the calculation of Casimir energies for scalar fields coupled to magnetodielectric media. The scalar model we consider may be applied in arbitrary geometries, and it corresponds exactly to one polarization of the electromagnetic field in planar layered media. Starting from the field theory for electromagnetism, we work with the two decoupled polarizations in planar media and develop worldline path integrals, which represent the two polarizations separately, for computing both Casimir and Casimir-Polder potentials. We then show analytically that the path integrals for the transverse-electric polarization coupled to a dielectric medium converge to the proper solutions in certain special cases, including the Casimir-Polder potential of an atom near a planar interface, and the Casimir energy due to two planar interfaces. We also evaluate the path integrals numerically via Monte Carlo path-averaging for these cases, studying the convergence and performance of the resulting computational techniques. While these scalar methods are only exact in particular geometries, they may serve as an approximation for Casimir energies for the vector electromagnetic field in other geometries.

  17. Energy conserving numerical methods for the computation of complex vortical flows

    Science.gov (United States)

    Allaneau, Yves

    One of the original goals of this thesis was to develop numerical tools to help with the design of micro air vehicles. Micro Air Vehicles (MAVs) are small flying devices of only a few inches in wing span. Some people consider that as their size becomes smaller and smaller, it would be increasingly more difficult to keep all the classical control surfaces such as the rudders, the ailerons and the usual propellers. Over the years, scientists took inspiration from nature. Birds, by flapping and deforming their wings, are capable of accurate attitude control and are able to generate propulsion. However, the biomimicry design has its own limitations and it is difficult to place a hummingbird in a wind tunnel to study precisely the motion of its wings. Our approach was to use numerical methods to tackle this challenging problem. In order to precisely evaluate the lift and drag generated by the wings, one needs to be able to capture with high fidelity the extremely complex vortical flow produced in the wake. This requires a numerical method that is stable yet not too dissipative, so that the vortices do not get diffused in an unphysical way. We solved this problem by developing a new Discontinuous Galerkin scheme that, in addition to conserving mass, momentum and total energy locally, also preserves kinetic energy globally. This property greatly improves the stability of the simulations, especially in the special case p=0 when the approximation polynomials are taken to be piecewise constant (we recover a finite volume scheme). In addition to needing an adequate numerical scheme, a high fidelity solution requires many degrees of freedom in the computations to represent the flow field. The size of the smallest eddies in the flow is given by the Kolmogoroff scale. Capturing these eddies requires a mesh counting in the order of Re³ cells, where Re is the Reynolds number of the flow. We show that under-resolving the system, to a certain extent, is acceptable. However our

  18. Application of modern computer technology to EPRI (Electric Power Research Institute) nuclear computer programs: Final report

    Energy Technology Data Exchange (ETDEWEB)

    Feinauer, L.R.

    1989-08-01

    Many of the nuclear analysis programs in use today were designed and developed well over a decade ago. Within this time frame, tremendous changes in hardware and software technologies have made it necessary to revise and/or restructure most of the analysis programs to take advantage of these changes. As computer programs mature from the development phase to being production programs, program maintenance and portability become very important issues. The maintenance costs associated with a particular computer program can generally be expected to exceed the total development costs by as much as a factor of two. Many of the problems associated with high maintenance costs can be traced back to either poorly designed coding structure, or ''quick fix'' modifications which do not preserve the original coding structure. The lack of standardization between hardware designs presents an obstacle to the software designer in providing 100% portable coding; however, conformance to certain guidelines can ensure portability between a wide variety of machines and operating systems. This report presents guidelines for upgrading EPRI nuclear computer programs to conform to current programming standards while maintaining flexibility for accommodating future hardware and software design trends. Guidelines for development of new computer programs are also presented. 22 refs., 10 figs.

  19. Numerical analysis

    CERN Document Server

    Khabaza, I M

    1960-01-01

    Numerical Analysis is an elementary introduction to numerical analysis, its applications, limitations, and pitfalls. Methods suitable for digital computers are emphasized, but some desk computations are also described. Topics covered range from the use of digital computers in numerical work to errors in computations using desk machines, finite difference methods, and numerical solution of ordinary differential equations. This book is comprised of eight chapters and begins with an overview of the importance of digital computers in numerical analysis, followed by a discussion on errors in comput

  20. Computer simulation of an advanced combustor for clean coal technology

    Energy Technology Data Exchange (ETDEWEB)

    Chang, S.L.; Lottes, S.A.

    1992-01-01

    Magnetohydrodynamic (MHD) power generation is a clean coal technology because of its higher thermal efficiency and lower pollutant emission. Argonne National Laboratory used a comprehensive integral combustion computer code to aid the development of a TRW's second stage combustor for MHD power generation. The integral combustion code is a computer code for two-phase, two-dimensional, steady state, turbulent, and reacting flows, based on mass, momentum, and energy conservation laws for multiple gas species and solid particles of variable sizes. In the MHD second stage combustor, opposed jets of oxidizer are injected into a confined cross-stream coal gas flow laden with seed particles. The performance of the downstream MHD power generation channel depends mainly on the degree and the uniformity of gas ionization, which, in turn, depends on the uniformity of temperature and seed vapor distributions leaving the combustor. The simulation provides in-depth information of flow, combustion, and heat transfer patterns in the combustor, which is used to predict ranges of combustor operating conditions for optimum performance of the MHD system.

  1. Computer simulation of an advanced combustor for clean coal technology

    Energy Technology Data Exchange (ETDEWEB)

    Chang, S.L.; Lottes, S.A.

    1992-09-01

    Magnetohydrodynamic (MHD) power generation is a clean coal technology because of its higher thermal efficiency and lower pollutant emission. Argonne National Laboratory used a comprehensive integral combustion computer code to aid the development of a TRW`s second stage combustor for MHD power generation. The integral combustion code is a computer code for two-phase, two-dimensional, steady state, turbulent, and reacting flows, based on mass, momentum, and energy conservation laws for multiple gas species and solid particles of variable sizes. In the MHD second stage combustor, opposed jets of oxidizer are injected into a confined cross-stream coal gas flow laden with seed particles. The performance of the downstream MHD power generation channel depends mainly on the degree and the uniformity of gas ionization, which, in turn, depends on the uniformity of temperature and seed vapor distributions leaving the combustor. The simulation provides in-depth information of flow, combustion, and heat transfer patterns in the combustor, which is used to predict ranges of combustor operating conditions for optimum performance of the MHD system.

  2. Enabling Technologies for Scalable Trapped Ion Quantum Computing

    Science.gov (United States)

    Crain, Stephen; Gaultney, Daniel; Mount, Emily; Knoernschild, Caleb; Baek, Soyoung; Maunz, Peter; Kim, Jungsang

    2013-05-01

    Scalability is one of the main challenges of trapped ion based quantum computation, mainly limited by the lack of enabling technologies needed to trap, manipulate and process the increasing number of qubits. Microelectromechanical systems (MEMS) technology allows one to design movable micromirrors to focus laser beams on individual ions in a chain and steer the focal point in two dimensions. Our current MEMS system is designed to steer 355 nm pulsed laser beams to carry out logic gates on a chain of Yb ions with a waist of 1.5 μm across a 20 μm range. In order to read the state of the qubit chain we developed a 32-channel PMT with a custom read-out circuit operating near the thermal noise limit of the readout amplifier which increases state detection fidelity. We also developed a set of digital to analog converters (DACs) used to supply analog DC voltages to the electrodes of an ion trap. We designed asynchronous DACs to avoid added noise injection at the update rate commonly found in synchronous DACs. Effective noise filtering is expected to reduce the heating rate of a surface trap, thus improving multi-qubit logic gate fidelities. Our DAC system features 96 channels and an integrated FPGA that allows the system to be controlled in real time. This work was supported by IARPA/ARO.

  3. Japanese technology assessment: Computer science, opto- and microelectronics mechatronics, biotechnology

    Energy Technology Data Exchange (ETDEWEB)

    Brandin, D.; Wieder, H.; Spicer, W.; Nevins, J.; Oxender, D.

    1986-01-01

    The series studies Japanese research and development in four high-technology areas - computer science, opto and microelectronics, mechatronics (a term created by the Japanese to describe the union of mechanical and electronic engineering to produce the next generation of machines, robots, and the like), and biotechnology. The evaluations were conducted by panels of U.S. scientists - chosen from academia, government, and industry - actively involved in research in areas of expertise. The studies were prepared for the purpose of aiding the U.S. response to Japan's technological challenge. The main focus of the assessments is on the current status and long-term direction and emphasis of Japanese research and development. Other aspects covered include evolution of the state of the art; identification of Japanese researchers, R and D organizations, and resources; and comparative U.S. efforts. The general time frame of the studies corresponds to future industrial applications and potential commercial impacts spanning approximately the next two decades.

  4. Promoting Physical Activity through Hand-Held Computer Technology

    Science.gov (United States)

    King, Abby C.; Ahn, David K.; Oliveira, Brian M.; Atienza, Audie A.; Castro, Cynthia M.; Gardner, Christopher D.

    2009-01-01

    Background Efforts to achieve population-wide increases in walking and similar moderate-intensity physical activities potentially can be enhanced through relevant applications of state-of-the-art interactive communication technologies. Yet few systematic efforts to evaluate the efficacy of hand-held computers and similar devices for enhancing physical activity levels have occurred. The purpose of this first-generation study was to evaluate the efficacy of a hand-held computer (i.e., personal digital assistant [PDA]) for increasing moderate intensity or more vigorous (MOD+) physical activity levels over 8 weeks in mid-life and older adults relative to a standard information control arm. Design Randomized, controlled 8-week experiment. Data were collected in 2005 and analyzed in 2006-2007. Setting/Participants Community-based study of 37 healthy, initially underactive adults aged 50 years and older who were randomized and completed the 8-week study (intervention=19, control=18). Intervention Participants received an instructional session and a PDA programmed to monitor their physical activity levels twice per day and provide daily and weekly individualized feedback, goal setting, and support. Controls received standard, age-appropriate written physical activity educational materials. Main Outcome Measure Physical activity was assessed via the Community Healthy Activities Model Program for Seniors (CHAMPS) questionnaire at baseline and 8 weeks. Results Relative to controls, intervention participants reported significantly greater 8-week mean estimated caloric expenditure levels and minutes per week in MOD+ activity (p<0.04). Satisfaction with the PDA was reasonably high in this largely PDA-naive sample. Conclusions Results from this first-generation study indicate that hand-held computers may be effective tools for increasing initial physical activity levels among underactive adults. PMID:18201644

  5. Advances in computer technology: impact on the practice of medicine.

    Science.gov (United States)

    Groth-Vasselli, B; Singh, K; Farnsworth, P N

    1995-01-01

    Advances in computer technology provide a wide range of applications which are revolutionizing the practice of medicine. The development of new software for the office creates a web of communication among physicians, staff members, health care facilities and associated agencies. This provides the physician with the prospect of a paperless office. At the other end of the spectrum, the development of 3D work stations and software based on computational chemistry permits visualization of protein molecules involved in disease. Computer assisted molecular modeling has been used to construct working 3D models of lens alpha-crystallin. The 3D structure of alpha-crystallin is basic to our understanding of the molecular mechanisms involved in lens fiber cell maturation, stabilization of the inner nuclear region, the maintenance of lens transparency and cataractogenesis. The major component of the high molecular weight aggregates that occur during cataractogenesis is alpha-crystallin subunits. Subunits of alpha-crystallin occur in other tissues of the body. In the central nervous system accumulation of these subunits in the form of dense inclusion bodies occurs in pathological conditions such as Alzheimer's disease, Huntington's disease, multiple sclerosis and toxoplasmosis (Iwaki, Wisniewski et al., 1992), as well as neoplasms of astrocyte origin (Iwaki, Iwaki, et al., 1991). Also cardiac ischemia is associated with an increased alpha B synthesis (Chiesi, Longoni et al., 1990). On a more global level, the molecular structure of alpha-crystallin may provide information pertaining to the function of small heat shock proteins, hsp, in maintaining cell stability under the stress of disease.

  6. Promoting physical activity through hand-held computer technology.

    Science.gov (United States)

    King, Abby C; Ahn, David K; Oliveira, Brian M; Atienza, Audie A; Castro, Cynthia M; Gardner, Christopher D

    2008-02-01

    Efforts to achieve population-wide increases in walking and similar moderate-intensity physical activities potentially can be enhanced through relevant applications of state-of-the-art interactive communication technologies. Yet few systematic efforts to evaluate the efficacy of hand-held computers and similar devices for enhancing physical activity levels have occurred. The purpose of this first-generation study was to evaluate the efficacy of a hand-held computer (i.e., personal digital assistant [PDA]) for increasing moderate intensity or more vigorous (MOD+) physical activity levels over 8 weeks in mid-life and older adults relative to a standard information control arm. Randomized, controlled 8-week experiment. Data were collected in 2005 and analyzed in 2006-2007. Community-based study of 37 healthy, initially underactive adults aged 50 years and older who were randomized and completed the 8-week study (intervention=19, control=18). Participants received an instructional session and a PDA programmed to monitor their physical activity levels twice per day and provide daily and weekly individualized feedback, goal setting, and support. Controls received standard, age-appropriate written physical activity educational materials. Physical activity was assessed via the Community Healthy Activities Model Program for Seniors (CHAMPS) questionnaire at baseline and 8 weeks. Relative to controls, intervention participants reported significantly greater 8-week mean estimated caloric expenditure levels and minutes per week in MOD+ activity (pfirst-generation study indicate that hand-held computers may be effective tools for increasing initial physical activity levels among underactive adults.

  7. Factors Contributing to Teachers' Use of Computer Technology in the Classroom

    Science.gov (United States)

    Gilakjani, Abbas Pourhosein

    2013-01-01

    There are many factors for teachers to use computer technology in their classrooms. The goal of this study is to identify some of the important factors contributing the teachers' use of computer technology. The first goal of this paper is to discuss computer self-efficacy. The second goal is to explain teaching experience. The third goal is to…

  8. A Detailed Analysis over Some Important Issues towards Using Computer Technology into the EFL Classrooms

    Science.gov (United States)

    Gilakjani, Abbas Pourhosein

    2014-01-01

    Computer technology has changed the ways we work, learn, interact and spend our leisure time. Computer technology has changed every aspect of our daily life--how and where we get our news, how we order goods and services, and how we communicate. This study investigates some of the significant issues concerning the use of computer technology…

  9. The Diffusion of Computer-Based Technology in K-12 Schools: Teachers' Perspectives

    Science.gov (United States)

    Colandrea, John Louis

    2012-01-01

    Because computer technology represents a major financial outlay for school districts and is an efficient method of preparing and delivering lessons, studying the process of teacher adoption of computer use is beneficial and adds to the current body of knowledge. Because the teacher is the ultimate user of computer technology for lesson preparation…

  10. The Acceptance of Computer Technology by Teachers in Early Childhood Education

    Science.gov (United States)

    Jeong, Hye In; Kim, Yeolib

    2017-01-01

    This study investigated kindergarten teachers' decision-making process regarding the acceptance of computer technology. We incorporated the Technology Acceptance Model framework, in addition to computer self-efficacy, subjective norm, and personal innovativeness in education technology as external variables. The data were obtained from 160…

  11. Technological Metaphors and Moral Education: The Hacker Ethic and the Computational Experience

    Science.gov (United States)

    Warnick, Bryan R.

    2004-01-01

    This essay is an attempt to understand how technological metaphors, particularly computer metaphors, are relevant to moral education. After discussing various types of technological metaphors, it is argued that technological metaphors enter moral thought through their "functional descriptions." The computer metaphor is then explored by turning to…

  12. Moving from Computer Literate to Technologically Competent: The Next Educational Reform.

    Science.gov (United States)

    Lowther, Deborah L.; Bassoppo-Moyo, Temba; Morrison, Gary R.

    1998-01-01

    Proposes that educators must go beyond computer literacy to achieve technological competence if successful integration of technology into the classroom is to occur. An educator who is technologically competent understands the relationship between basic computer functions and student learning, and uses this understanding to design, facilitate, and…

  13. Review of Enabling Technologies to Facilitate Secure Compute Customization

    Energy Technology Data Exchange (ETDEWEB)

    Aderholdt, Ferrol [Tennessee Technological University; Caldwell, Blake A [ORNL; Hicks, Susan Elaine [ORNL; Koch, Scott M [ORNL; Naughton, III, Thomas J [ORNL; Pelfrey, Daniel S [ORNL; Pogge, James R [Tennessee Technological University; Scott, Stephen L [Tennessee Technological University; Shipman, Galen M [ORNL; Sorrillo, Lawrence [ORNL

    2014-12-01

    High performance computing environments are often used for a wide variety of workloads ranging from simulation, data transformation and analysis, and complex workflows to name just a few. These systems may process data for a variety of users, often requiring strong separation between job allocations. There are many challenges to establishing these secure enclaves within the shared infrastructure of high-performance computing (HPC) environments. The isolation mechanisms in the system software are the basic building blocks for enabling secure compute enclaves. There are a variety of approaches and the focus of this report is to review the different virtualization technologies that facilitate the creation of secure compute enclaves. The report reviews current operating system (OS) protection mechanisms and modern virtualization technologies to better understand the performance/isolation properties. We also examine the feasibility of running ``virtualized'' computing resources as non-privileged users, and providing controlled administrative permissions for standard users running within a virtualized context. Our examination includes technologies such as Linux containers (LXC [32], Docker [15]) and full virtualization (KVM [26], Xen [5]). We categorize these different approaches to virtualization into two broad groups: OS-level virtualization and system-level virtualization. The OS-level virtualization uses containers to allow a single OS kernel to be partitioned to create Virtual Environments (VE), e.g., LXC. The resources within the host's kernel are only virtualized in the sense of separate namespaces. In contrast, system-level virtualization uses hypervisors to manage multiple OS kernels and virtualize the physical resources (hardware) to create Virtual Machines (VM), e.g., Xen, KVM. This terminology of VE and VM, detailed in Section 2, is used throughout the report to distinguish between the two different approaches to providing virtualized execution

  14. Direct Numerical Simulation of a Turbulent Reactive Plume on a Parallel Computer

    Science.gov (United States)

    Cook, Andrew W.; Riley, James J.

    1996-12-01

    A computational algorithm is described for direct numerical simulation (DNS) of a reactive plume in spatially evolving grid turbulence. The algorithm uses sixth-order compact differencing in conjunction with a fifth-order compact boundary scheme which has been developed and found to be stable. A compact filtering method is discussed as a means of stabilizing calculations where the viscous/diffusive terms are differenced in their conservative form. This approach serves as an alternative to nonconservative differencing, previously advocated as a means of damping the 2δ waves. In numerically solving the low Mach number equations the time derivative of the density field in the pressure Poisson equation was found to be the most destabilizing part of the calculation. Even-ordered finite difference approximations to this derivative were found to be more stable (allow for larger density gradients) than odd-ordered approximations. Turbulence at the inlet boundary is generated by scanning through an existing three-dimensional field of fully developed turbulence. In scanning through the inlet field, it was found that a high order interpolation, e.g., cubic-spline interpolation, is necessary in order to provide continuous velocity derivatives. Regarding pressure, a Neumann inlet condition combined with a Dirichlet outlet condition was found to work well. The chemistry follows the single-step, irreversible, global reaction: Fuel + ( r) Oxidizer → (1 + r)Product + Heat, with parameters chosen to match experimental data as far as allowed by resolution constraints. Simulation results are presented for four different cases in order to examine the effects of heat release, Damköhler number, and Arrhenius kinetics on the flow physics. Statistical data from the DNS are compared to theory and wind tunnel data and found in reasonable agreement with regard to growth of turbulent length scales, decay of turbulent kinetic energy, decay of centerline scalar concentration, decrease in

  15. Numerical and analytical solutions for problems relevant for quantum computers; Numerische und analytische Loesungen fuer Quanteninformatisch-relevante Probleme

    Energy Technology Data Exchange (ETDEWEB)

    Spoerl, Andreas

    2008-06-05

    Quantum computers are one of the next technological steps in modern computer science. Some of the relevant questions that arise when it comes to the implementation of quantum operations (as building blocks in a quantum algorithm) or the simulation of quantum systems are studied. Numerical results are gathered for variety of systems, e.g. NMR systems, Josephson junctions and others. To study quantum operations (e.g. the quantum fourier transform, swap operations or multiply-controlled NOT operations) on systems containing many qubits, a parallel C++ code was developed and optimised. In addition to performing high quality operations, a closer look was given to the minimal times required to implement certain quantum operations. These times represent an interesting quantity for the experimenter as well as for the mathematician. The former tries to fight dissipative effects with fast implementations, while the latter draws conclusions in the form of analytical solutions. Dissipative effects can even be included in the optimisation. The resulting solutions are relaxation and time optimised. For systems containing 3 linearly coupled spin (1)/(2) qubits, analytical solutions are known for several problems, e.g. indirect Ising couplings and trilinear operations. A further study was made to investigate whether there exists a sufficient set of criteria to identify systems with dynamics which are invertible under local operations. Finally, a full quantum algorithm to distinguish between two knots was implemented on a spin(1)/(2) system. All operations for this experiment were calculated analytically. The experimental results coincide with the theoretical expectations. (orig.)

  16. Research on Remote Monitoring and Fault Diagnosis Technology of Numerical Control Machine

    Institute of Scientific and Technical Information of China (English)

    ZHANG Jianyu; GAO Lixin; CUI Lingli; LI Xianghui; WANG Yingwang

    2006-01-01

    Based on the internet technology, it has become possible to complete remote monitoring and fault diagnosis for the numerical control machine. In order to capture the micro-shock signal induced by the incipient fault on the rotating parts, the resonance demodulation technology is utilized in the system. As a subsystem of the remote monitoring system, the embedded data acquisition instrument not only integrates the demodulation board but also complete the collection and preprocess of monitoring data from different machines. Furthermore, through connecting to the internet, the data can be transferred to the remote diagnosis center and data reading and writing function can be finished in the database. At the same time, the problem of the IP address floating in the dial-up of web server is solved by the dynamic DNS technology. Finally, the remote diagnosis software developed on the LabVIEW platform can analyze the monitoring data from manufacturing field. The research results have indicated that the equipment status can be monitored by the system effectively.

  17. A parameterization method for the computation of invariant tori and their whiskers in quasi periodic maps numerical algorithms.

    CERN Document Server

    Haro, A

    2004-01-01

    We develop numerical algorithms for the computation of invariant manifolds in quasi-periodically forced systems. We show how to compute invariant tori and invariant manifolds associated to them. In particular, the stable and unstable manifolds of invariant tori, but also {\\sl non-resonant} invariant manifolds associated to spaces invariant under the linearization. These non-resonant manifolds include the slow manifolds which dominate the asymptotic behavior. The algorithms are based on the parameterization method. Rigorous results about this method are proved in in a companion paper. In this paper, we concentrate on numerical issues of algorithm. Examples of implementations of the algorithms appear in another companion paper.

  18. Proceedings: 1989 conference on advanced computer technology for the power industry

    Energy Technology Data Exchange (ETDEWEB)

    Ghosh, B. (ed.)

    1990-07-01

    An EPRI conference to address advanced computer technology was hosted by Arizona Public Service in Scottsdale, Arizona, December 4--6, 1989. Participants represented US and foreign utilities, major electric and computer industry vendors, R D contractors, and consulting firms. These proceedings contain the text of the technical presentations and summaries of the panel discussions. The conference objectives were: to assess modern computer technologies and how they will affect utility operations; to share US and foreign utility experiences in developing computer-based technical products; and to discuss research conducted by EPRI in advanced computer technology on behalf of its utility members. Technical presentations addressed a broad range of computer-related topics: computer-based training; engineering workshops; hypermeida and other advanced user interfaces; networks and communications; expert systems and other decision-support methodologies; intelligent database management; supercomputing architectures and applications; real-time data processing; computerized technology and information transfer; and neural networks and other emerging technologies.

  19. ObjectMath – An Object-Oriented Language and Environment for Symbolic and Numerical Processing in Scientific Computing

    Directory of Open Access Journals (Sweden)

    Lars Viklund

    1995-01-01

    Full Text Available ObjectMath is a language for scientific computing that integrates object-oriented constructs with features for symbolic and numerical computation. Using ObjectMath, complex mathematical models may be implemented in a natural way. The ObjectMath programming environment provides tools for generating efficient numerical code from such models. Symbolic computation is used to rewrite and simplify equations before code is generated. One novelty of the ObjectMath approach is that it provides a comman language and an integrated environment for this kind of mixed symbolic/numerical computation. The motivation for this work is the current low-level state of the art in programming for scientific computing. Much numerical software is still being developed the traditional way in Fortran. This is especially true in application areas such as machine elements analysis, where complex nonlinear problems are the norm. We believe that tools like ObjectMath can increase productivity and quality, thus enabling users to solve problems that are too complex to handle with traditional tools.

  20. Proceeding of 1999-workshop on MHD computations 'study on numerical methods related to plasma confinement'

    Energy Technology Data Exchange (ETDEWEB)

    Kako, T.; Watanabe, T. [eds.

    2000-06-01

    This is the proceeding of 'study on numerical methods related to plasma confinement' held in National Institute for Fusion Science. In this workshop, theoretical and numerical analyses of possible plasma equilibria with their stability properties are presented. There are also various lectures on mathematical as well as numerical analyses related to the computational methods for fluid dynamics and plasma physics. Separate abstracts were presented for 13 of the papers in this report. The remaining 6 were considered outside the subject scope of INIS. (J.P.N.)