Big Chemical Encyclopedia

Chemical substances, components, reactions, process design ...

Articles Figures Tables About

Cyber Computers

An earlier Fortran version of SIMCA is available for use in the ARTHUR package available from Chemical Information Systems, Box 2227, Falls Church, VA. Recently, the operating system was changed on the CDC Cyber computer system at the University of Illinois. The new operating system does not allow the earlier SIMCA-2T version used to perform the environmental analyses to operate correctly. The authors expect that a new version of SIMCA will be installed that will function with the current operating system in use on the CDC Cyber computer. [Pg.226]

K bytes of memory, maintaining the dimension of 70 x 70 arrays. The extended version of the program for CDC CYBER computers, Gaussian 76, may also accommodate d-functions. As in Gaussian 70, certain standard basis sets such as e.g. ST0-3G, 4-31G and 6-31G are stored internally for easy use. [Pg.212]

An earlier implementation of the CASTOR system on a CDC-Cyber computer system, using the CDC-IMF-facihty (formerly EDMS) had proven the practical applicability of the underlying theory as well as the usability of the ancillary systems, e.g., data capture and conversion, semi-automatic addition of by-products, paphical output. The database model of EDMS was CODASYL-based. Our implementation, however, used the hierarchical components, e.g., the member-owner construct, for the sole purpose of data storage optimisation. The main parts used a relational model. The relational model became dominant in an ADABAS implementation, where member-owner sentences were replaced by dynamic field constructs. The present goal of development is a purely relational implementation under a portable relational DBMS. [Pg.439]

B. L. Vickery, D. Bright, and P. R. Mallinson, XRAYARC IBMl 130 Program System, Modified for a Cyber Computer , Agricultural Research Council, University College, London, 1971. [Pg.3246]

Results. Values computed on the John von Neumann Center s Control Data Corporation Cyber 205 are displayed and compared to literature results for other model-chains in Figure 3. Squares indicate values obtained in our Monte Carlo simulations, while diamonds are results of Priest s (12) analytical approximation for very narrow pores. [Pg.170]

Mathematical models require computation to secure concrete predictions. Successes in relatively simple cases spurs interest in more complex situations. Somewhat specialized computer hardware and software have emerged in response to these demands. Examples are the high-end processors with vector architecture, such as the Cray series, the CDC Cyber 205, and the recently announced IBM 3090 with vector attachment. When a computation can effectively utilize vector architecture, such machines will out-perform even the most powerful conventional scalar machine by a substantial margin. Such performance has given rise to the term supercomputer. ... [Pg.237]

The central processor (CP) time is based on a CDC Cyber 73 computer. [Pg.151]

Various cyber protection devices are currently available for use in protecting utility computer systems. These protection devices include anti-virus and pest eradication software, firewalls, and network intrusion hardware/software. These products are discussed in this section. [Pg.208]

To illustrate the environmental application of the SIMCA method we examined a set of isomer specific analyses of sediment samples. The data examined were derived from more than 200 sediment samples taken from a study site on the Upper Mississippi River (41). These analytical data were transferred via magnetic tape from the laboratory data base to the Cyber 175 computer where principal component analysis were conducted on the isomer concentration data (ug/g each isomer). [Pg.223]

Consequently, quantum chemists are daily confronted with the following dilemma either to waste the budget of five years of research to solve a given problem at any price with the help of the CYBER 205, the biggest computer in the world, or to join the Seven Wise Men. . . and to stop working. [Pg.72]

The Internet and the global information society are all targets of attacks that can come from any point in the global computer network. Nowadays, terrorists and cyber-criminals use the speed and global connectivity of the Internet for making attacks. [Pg.194]

Some people use honeynets to investigate cyber-criminal behavior and to discover new types of cyber-attacks. We should mention that a honeynet is a computer network created especially to attract cyber-attacks. Whenever a honeynet is attacked, lots of information is collected and then analyzed in order to better understand the cyber-criminals activity. A key step in protecting a network is to detect defects in the defense systems and removing them immediately. [Pg.194]

Most contemporary computer environments have very primitive facilities for localizing and tracing sources of cyber-attacks [2], Contemporary tools are incapable of effectively identifying the source of cyber-attacks. Nowadays computer criminals are very good in staying anonymous while committing criminal activities during unauthorized access to networks [4],... [Pg.194]

After casting the equations in dimensionless form, they were solved by an Euler s method integration on the University of Minnesota Cyber 7000 computer system. The accuracy of this method was checked by a fourth order Runge-Kutta integration, which gave agreement to within 0.5%. [Pg.303]

The mathematical models of the reacting polydispersed particles usually have stiff ordinary differential equations. Stiffness arises from the effect of particle sizes on the thermal transients of the particles and from the strong temperature dependence of the reactions like combustion and devolatilization. The computation time for the numerical solution using commercially available stiff ODE solvers may take excessive time for some systems. A model that uses K discrete size cuts and N gas-solid reactions will have K(N + 1) differential equations. As an alternative to the numerical solution of these equations an iterative finite difference method was developed and tested on the pyrolysis model of polydispersed coal particles in a transport reactor. The resulting 160 differential equations were solved in less than 30 seconds on a CDC Cyber 73. This is compared to more than 10 hours on the same machine using a commercially available stiff solver which is based on Gear s method. [Pg.215]

The CRAY-1 vector processing computer at the Science Research Council s (S.E.R.C) Daresbury Laboratory, is at the centre of a network providing large scale computational facilities for Universities in the United Kingdom. This is the only supercomputer available at present to Quantum Chemists in the U.K., and this article will therefore be restricted to experience gained on the CRAY-1, although this experience will undoubtedly be relevant to future applications on machines such as the ICL Distributed Array Processor (DAP) (see reference (2) for a detailed description) and the CDC Cyber 203/205. [Pg.9]

Wfe now aim to compute the G-matrix 64 elements at a time (this is the optimum for the CRAY, an appropriate vector length for the CDC CYBER 205 would be the size of the G-matrix). We now order the P Supermatrix so that the first 64 elements are Pi-6 wl the second 64 are Pi-6 /2 until all kfc indices are exhausted, when comes P65 128rlt >65-128/2 etc. This ordering permits us to evaluate 64 elements of the G-matrix at a time, where each ki pair index gives rise to the equation... [Pg.22]

The computer time for simulating 50 hours of deactivation was 13 seconds for the one-dimensional model and 15 seconds for the two-dimensional model on the CDC Cyber 174 (13). [Pg.385]

The collected data were analyzed with the microprocessor and either a Digital Equipment PDF 11/34 minicomputer or a Control Data Cyber 175 mainframe computer (2,5). The digitized data from the 0MA2 could then be presented In several forms (1) an Iso-lntenslty contour plot, (2) a three dimensional Intensity versus x-y position plot, or (3) an Intensity versus scattering angle plot from a specified azimuthal data slice. [Pg.227]


See other pages where Cyber Computers is mentioned: [Pg.112]    [Pg.191]    [Pg.4]    [Pg.246]    [Pg.120]    [Pg.3]    [Pg.108]    [Pg.112]    [Pg.168]    [Pg.170]    [Pg.191]    [Pg.201]    [Pg.70]    [Pg.132]    [Pg.691]    [Pg.143]    [Pg.147]    [Pg.298]    [Pg.80]    [Pg.194]    [Pg.195]    [Pg.205]    [Pg.223]    [Pg.230]    [Pg.273]    [Pg.177]    [Pg.246]    [Pg.264]    [Pg.89]    [Pg.868]   
See also in sourсe #XX -- [ Pg.311 ]




SEARCH



CDC Cyber Computers

Cyber

© 2024 chempedia.info