scholarly journals DATeS: a highly extensible data assimilation testing suite v1.0

2019 ◽  
Vol 12 (2) ◽  
pp. 629-649 ◽  
Author(s):  
Ahmed Attia ◽  
Adrian Sandu

Abstract. A flexible and highly extensible data assimilation testing suite, named DATeS, is described in this paper. DATeS aims to offer a unified testing environment that allows researchers to compare different data assimilation methodologies and understand their performance in various settings. The core of DATeS is implemented in Python and takes advantage of its object-oriented capabilities. The main components of the package (the numerical models, the data assimilation algorithms, the linear algebra solvers, and the time discretization routines) are independent of each other, which offers great flexibility to configure data assimilation applications. DATeS can interface easily with large third-party numerical models written in Fortran or in C, and with a plethora of external solvers.

2018 ◽  
Author(s):  
Ahmed Attia ◽  
Adrian Sandu

Abstract. A flexible and highly-extensible data assimilation testing suite, named DATeS, is described in this paper. DATeS aims to offer a unified testing environment that allows researchers to compare different data assimilation methodologies and understand their performance in various settings. The core of DATeS is implemented in Python and takes advantage of its object-oriented capabilities. The main components of the package (the numerical models, the data assimilation algorithms, the linear algebra solvers, and the time discretization routines) are independent of each other, which offers great flexibility to configure data assimilation applications. DATeS can interface easily with large third-party numerical models written in Fortran or in C, and with a plethora of external solvers.


2014 ◽  
Vol 1 (1) ◽  
pp. 35-45
Author(s):  
Fenty Simanjuntak ◽  
Bobby Suryajaya

Many banks are looking for a better core banking system to support their business growth with a more efficient and flexible core banking system to improve their sales and services in the competitive market and to fulfill regulatory requirements. The decision of replacing the legacy core banking system is difficult due to the high IT investment cost required for banks because they are also trying to cut costs. But maintaining the legacy system is costly in terms of upgrade. Changing the core banking system is also a difficult process and increases risks. To have a successful Core Banking System implementation, risk assessment is required to be performed prior to starting any activities. The assessment can help project teams to identify the risks and then to mitigate the risks as part of the plan. In this research the Core Banking System replacement risks were assessed based on ISACA Framework for IT Risk. Fourteen risk scenarios related to Core Banking System Replacement were identified. The high and medium rated inherent risks can become medium and low residual risk after assessment by putting the relevant control in place. The result proves that by adding mitigation plan it will help to mitigate the Residual Risk to become low risk. There are still three residual risk which categorized as medium risk and should be further mitigated they are Software Implementation, Project Delivery and Selection/Performance of Third Party Suppliers. It is also found that COBIT 5 has considered some specific process capabilities that can be used to improve the processes to mitigate the medium risks.


2021 ◽  
Vol 11 (9) ◽  
pp. 4011
Author(s):  
Dan Wang ◽  
Jindong Zhao ◽  
Chunxiao Mu

In the field of modern bidding, electronic bidding leads a new trend of development, convenience and efficiency and other significant advantages effectively promote the reform and innovation of China’s bidding field. Nowadays, most systems require a strong and trusted third party to guarantee the integrity and security of the system. However, with the development of blockchain technology and the rise of privacy protection, researchers has begun to emphasize the core concept of decentralization. This paper introduces a decentralized electronic bidding system based on blockchain and smart contract. The system uses blockchain to replace the traditional database and uses chaincode to process business logic. In data interaction, encryption techniques such as zero-knowledge proof based on graph isomorphism are used to improve privacy protection, which improves the anonymity of participants, the privacy of data transmission, and the traceability and verifiable of data. Compared with other electronic bidding systems, this system is more secure and efficient, and has the nature of anonymous operation, which fully protects the privacy information in the bidding process.


2021 ◽  
Author(s):  
Leonardo Mingari ◽  
Andrew Prata ◽  
Federica Pardini

<p>Modelling atmospheric dispersion and deposition of volcanic ash is becoming increasingly valuable for understanding the potential impacts of explosive volcanic eruptions on infrastructures, air quality and aviation. The generation of high-resolution forecasts depends on the accuracy and reliability of the input data for models. Uncertainties in key parameters such as eruption column height injection, physical properties of particles or meteorological fields, represent a major source of error in forecasting airborne volcanic ash. The availability of nearly real time geostationary satellite observations with high spatial and temporal resolutions provides the opportunity to improve forecasts in an operational context. Data assimilation (DA) is one of the most effective ways to reduce the error associated with the forecasts through the incorporation of available observations into numerical models. Here we present a new implementation of an ensemble-based data assimilation system based on the coupling between the FALL3D dispersal model and the Parallel Data Assimilation Framework (PDAF). The implementation is based on the last version release of FALL3D (versions 8.x) tailored to the extreme-scale computing requirements, which has been redesigned and rewritten from scratch in the framework of the EU Center of Excellence for Exascale in Solid Earth (ChEESE). The proposed methodology can be efficiently implemented in an operational environment by exploiting high-performance computing (HPC) resources. The FALL3D+PDAF system can be run in parallel and supports online-coupled DA, which allows an efficient information transfer through parallel communication. Satellite-retrieved data from recent volcanic eruptions were considered as input observations for the assimilation system.</p>


2014 ◽  
Author(s):  
Felipe V Leprevost

The neXtProt database is a comprehensive knowledge platform recently adopted by the Chromosome-centric Human Proteome Project as the main reference database. The primary goal of the project is to identify and catalog every human protein encoded in the human genome. For such, computational approaches have an important role as data analysis and dedicated software are indispensable. Here we describe Bio::DB::NextProt, a Perl module that provides an object-oriented access to the neXtProt REST Web services, enabling the programatically retrieval of structured information. The Bio::DB::NextProt module presents a new way to interact and download information from the neXtProt database. Every parameter available through REST API is covered by the module allowing a fast, dynamic and ready-to-use alternative for those who need to access neXtProt data. Bio::DB::NextProt is an easy-to-use module that provides automatically retrieval of data, ready to be integrated into third-party software or to be used by other programmers on the fly. The module is freely available from from CPAN (metacpan.org/release/Bio-DB-NextProt) and GitHub (github.com/Leprevost/Bio-DB-NextProt) and is released under the perl\_5 license.


2021 ◽  
Vol 7 ◽  
pp. 1
Author(s):  
Bertrand Mercier ◽  
Di Yang ◽  
Ziyue Zhuang ◽  
Jiajie Liang

We show with simplified numerical models, that for the kind of RBMK operated in Chernobyl: The core was unstable due to its large size and to its weak power counter-reaction coefficient, so that the power of the reactor was not easy to control even with an automatic system. Xenon oscillations could easily be activated. When there was xenon poisoning in the upper half of the core, the safety rods were designed in such a way that, at least initially, they were increasing (and not decreasing) the core reactivity. This reactivity increase has been sufficient to lead to a very high pressure increase in a significant amount of liquid water in the fuel channels thus inducing a strong propagating shock wave leading to a failure of half the pressure tubes at their junction with the drum separators. The depressurization phase (flash evaporation) following this failure has produced, after one second, a significant decrease of the water density in half the pressure tubes and then a strong reactivity accident due to the positive void effect reactivity coefficient. We evaluate the fission energy released by the accident


Author(s):  
Liudmyla Kozliuk

Due to the fact that our society lives in a state of criminality, this study theoretically attempts to show the value of research on the perpetrator's identity and the need to oppose criminality thereof. The purpose of the study is to understand one of the main components of the subject of criminology, which is the perpetrator's identity, to clarify his role and place in the opposing against criminality. The study applied the principle of social naturalism. It is proved that the study of the identity of the perpetrator on the basis of the principle of social naturalism opens up new opportunities in finding, more successful influence on the behavior of persons committing criminal offenses. Because it determines that the core of the perpetrator's identity is an arbitrariness and illusions complex. Liquidation of which will help increase efficiency in the development and implementation of measures to opposing criminality. Under implementing countermeasures, it is important to know on what aspects to focus on to prevent the mechanism of criminal behavior. It is the study of the perpetrator’s identity from the standpoint of socio-naturalistic criminology opens the way for a successful response to the causes and conditions that shape the perpetrator’s identity and contribute thereof to manifestation in the commission of a crime. The socio-naturalistic approach to the study of perpetrator’s identity allows the subjects of counteraction accordingly: develop countermeasures and respond to criminality in general. It is argued that the positive aspect in opposing criminality directly depends on the perpetrator’s identity because through the knowledge of the personal characteristics of those who commit illegal acts, criminogenic factors of crime are explained. These are two interdependent processes. Scientifically substantiated researches of the perpetrator’s identity give the chance to carry out, to correct opposition to criminality. Thus, there is a natural formula: an effective study of the perpetrator’s identity is equal to the effective opposition against criminality. It has been proven that effective research into the perpetrator’s identity is tied to a logical chain of solving extremely complex criminological problems, including the opposing against criminality. And the successful opposition to this socially negative phenomenon shows that there is an adequate influence on criminogenic factors that give rise to criminality, that is, that the developed measures to opposing criminality are effective. The close connection between the perpetrator’s identity and the opposition against criminality is that the perpetrator’s identity is central to the opposition against criminality, due to the fact that effective research on the perpetrator’s identity, it is possible to implement effective measures.


Author(s):  
Michael Hunter

In recent years, major steps have been taken in terms of understanding and exploiting the vast archive of Robert Boyle (1627–91), which was presented to The Royal Society in 1769. The collection was first catalogued in the 1980s; since then, it has been extensively used in preparing the definitive editions of Boyle's Works (14 vols, 1999–2000) and Correspondence (6 vols, 2001), both published by Pickering & Chatto, and the edition of his ‘workdiaries’, which has been available online since 2001. Now, thanks to a generous grant from the Heritage Lottery Fund, various steps have been taken to enhance access to the archive—particularly by electronic means, and especially through the provision of high–quality digitized images of its key components—and thus to increase understanding of Boyle and his significance for the origins of modern science. The project, entitled ‘Robert Boyle for the twenty–first century’, is a joint initiative between Birkbeck (University of London), The Royal Society and Access to Archives. It has three main components: first, the revision of the catalogue of the Boyle archive and its presentation in online, searchable form; second, the creation of digitized images of the entire content of the core volumes of the Boyle Papers and the publication of these on the World Wide Web, some as illustrations to an updated edition of the workdiaries; and third, the provision of introductory material on Boyle aimed at schools on the Boyle website at Birkbeck.


Sign in / Sign up

Export Citation Format

Share Document