density-functional theory (dFT) within the Kohn-Sham (KS) formalism is the most widely used approach to treat electronic structures of molecules and solids in physics, chemistry, and materials science, and the develop...
详细信息
density-functional theory (dFT) within the Kohn-Sham (KS) formalism is the most widely used approach to treat electronic structures of molecules and solids in physics, chemistry, and materials science, and the development of more accurate functionals for the KS exchange and correlation energy has been a majorresearch focus fordecades. The corresponding exchange and correlation potentials, on the other hand, have attracted little attention. Those cases for which reference potentials are available showed that in particular correlation potentials from common approximate density functionals are of poor quality and sometimes have little in common with the exact potentials. This hampers the furtherdevelopment of KS-dFT. Here, we show that highly accurate correlation potentials can be obtained within the random phase approximation (rPA). In conjunction with the exact exchange potential, which, like the rPA correlation potential, is accessible within the optimized effective potential method, highly accurate exchange-correlation potentials are available and provide a basis for the furtherdevelopment of dFT. We present a numerically stable approach for efficiently carrying out self-consistent rPA calculations and combine it with a KS inversion method to obtain reference correlation potentials from highly accurate electron densities from coupled cluster calculations. Accurate exchange-correlation potentials have to yield KS eigenvalues for the highest occupied molecular orbital that are close to the negative of the ionization potential. This is indeed the case, the rPA highest occupied molecular orbital eigenvalues yield ionization potentials that can compete with GW ionization potentials.
The quantum kinetic evolution of neutrinos in dense environments, such as the core-collapse supernovae or the neutron star mergers, can result in fast flavor conversion (FFC), presenting a significant challenge to ach...
详细信息
The quantum kinetic evolution of neutrinos in dense environments, such as the core-collapse supernovae or the neutron star mergers, can result in fast flavor conversion (FFC), presenting a significant challenge to achieving robust astrophysical modeling of these systems. recent works that directly simulate the quantum kinetic transport of neutrinos in localizeddomains have suggested that the asymptotic outcome of FFCs can be modeled by simple analytical prescriptions when coarse grained over a size much larger than the FFC length scale. In this Letter, by leveraging such a scale separation, we incorporate the analytical prescriptions into global simulations that solve the classical neutrino transport equation including collisions and advection under spherical symmetry. We demonstrate that taking this approach allows to obtain results that quantitatively agree with those directly from the corresponding global quantum kinetic simulations and precisely capture the collisional feedback effect for cases where the FFC happens inside the neutrinosphere. Notably, the effective scheme does not require resolving the FFC time and length scales, hence only adds negligible computational overhead to classical transport. Our work highlights that efficient androbust integration of FFCs in classical neutrino transport used in astrophysical simulation can be feasible.
Testing of parallel programs involves two parts-testing of controlflow within the processes and testing of timing-sequence. This paper focuses on thelatter, particularly on the timing-sequence of message-passing parad...
详细信息
Testing of parallel programs involves two parts-testing of controlflow within the processes and testing of timing-sequence. This paper focuses on thelatter, particularly on the timing-sequence of message-passing paradigms. Firstlythe coarse-grained SYN-sequence model is built up to describe the execution of distributed programs. All of the topics discussed in this paper are based on it. Themost direct way to test a program is to run it. A fault-free parallel program shouldbe of both correct computingresults and proper SYN-sequence. In order to analyzethe validity of observed SYN-sequence, this paper presents the formal specification(Backus Normal Form) of the valid SYN-sequence. Till now there is little workabout the testing coverage fordistributed programs. Calculating the number of thevalid SYN-sequences is the key to coverage problem, while the number of the validSYN-sequences is terribly large and it is very hard to obtain the combination lawamong SYN-events. In order to resolve this problem, this paper proposes an efficienttesting strategy- atomic SYN-event testing, which is to linearize the SYN-sequence(making it only consist of serial atomic SYN-events) first and then test each atomicSYN-event independently. This paper particularly provides the calculating formulaabout the number of the valid SYN-sequences for tree-topology atomic SYN-event(broadcast and combine). Furthermore, the number of valid SYN-sequences also,to some degree, mirrors the testability of parallel programs. Taking tree-topologyatomic SYN-event as an example, this paperdemonstrates the testability and communication speed of the tree-topology atomic SYN-event underdifferent numbersof branches in order to achieve a more satisfactory tradeoff between testability andcommunication efficiency.
In this paper, the problem of discovering association rules between items in a large database of sales transactions is discussed, and a novel algorithm, BitMatrix, is proposed. The proposed algorithm is fundamentally ...
详细信息
In this paper, the problem of discovering association rules between items in a large database of sales transactions is discussed, and a novel algorithm, BitMatrix, is proposed. The proposed algorithm is fundamentally different from the known algorithms Apriori and AprioriTid. Empirical evaluation shows that the algorithm outperforms the known ones for large databases. Scale-up experiments show that the algorithm scales linearly with the number of transactions.
When applied to mobile computing systems,checkpoint protocols fordistributedcomputing systems would face many new challenges, such as low wireless bandwidth, frequent disconnections, and lack of stable storage at mo...
详细信息
When applied to mobile computing systems,checkpoint protocols fordistributedcomputing systems would face many new challenges, such as low wireless bandwidth, frequent disconnections, and lack of stable storage at mobile hosts. This paper proposes a novel checkpoint protocol to effectively reduce the coordinating overhead. By using a communication vector, only a few processes participate in the checkpointing event. during checkpointing, the scheme can save the time used to trace the dependency tree by sending checkpoint requests to dependent processes at once. In addition, processes are non- blocking in this scheme, since the inconsistency is resolved by the piggyback technique. Hence the unnecessary and orphan messages can be avoided. Compared with the traditional coordinated checkpoint approach, the proposed non-blocking algorithm obtains a minimal number of processes to take checkpoints. It also reduces the checkpoint latency, which brings less overhead to mobile host with limitedresources.
In many models of all-optical routing, a set of communication paths in a network is given, and a wavelength is to be assigned to each path so that paths sharing an edge receive different wavelengths. The goal is to as...
详细信息
In many models of all-optical routing, a set of communication paths in a network is given, and a wavelength is to be assigned to each path so that paths sharing an edge receive different wavelengths. The goal is to assign as few wavelengths as possible, in order to use the optical bandwidth efficiently. If a node of a network contains a wavelength converter,any path that passes through this node may change its wavelength. Having converters at some of the nodes can reduce the number of wavelengths required forrouting. This paper presents a wavelength converter with degree 4 and gives a routing algorithm which shows that any routing with load L can be realized with L wavelengths when a node of an all-optical ring hosts such a wavelength converter. It is also proved that 4 is the minimum degree of the converter to reach the full utilization of the available wavelengths if only one node of an all-optical ring hosts a converter.
This study is to integrate the current monitoring systems and to develop the multicasting and peer-to-peer network environment for end users. Because the bandwidth of network is limited where the camera is located, th...
详细信息
This study is to integrate the current monitoring systems and to develop the multicasting and peer-to-peer network environment for end users. Because the bandwidth of network is limited where the camera is located, the transmission of images will delay or crash when over a few numbers of end user login simultaneously. In this paper, the middleware for sharing real-time data will be developed to solve the problem of limitation for multi-connection from fields. The monitoring systems for flood events, that are located in the rivers, creeks, reservoirs, and pump stations of Taiwan, will be integrated as a demo case to show the capability of the system integration. And in this case will also show how the performance is that sharing real-time data for unlimited number of users with limited network bandwidth.
Cloud storage has been widely used because it can provide seemingly unlimited storage space and flexible access way, while the rising cost of storage and communications is an issue. In this paper, we propose a data de...
详细信息
In light of the evidence fordynamical dark energy (dE) found from the most recent dark Energy Spectroscopic Instrument (dESI) baryon acoustic oscillation (BAO) measurements, we perform a non-parametric, model-indepen...
详细信息
暂无评论