“天河一号”创造分子模拟计算世界纪录

 

勾画出约为1100亿个原子的微观行为
发布时间: 2011-06-12  |   作者:毛振华
http://www.stdaily.com 2011年06月12日 来源: 科技日报 作者: 毛振华  最新发现与创新
  新华社天津6月11日电(记者毛振华)中国科学院过程工程研究所科研人员日前利用全球最快计算机“天河一号”的GPU超强计算能力,运行了一项分子动力学模拟项目,成功创下全球分子模拟计算的世界纪录。

  中国科学院过程工程研究所研究员葛蔚在接受新华社记者采访时说,研究所的科研人员采用“天河一号”上的7168颗“英伟达GPU”,开展了一项规模巨大的分子动力学模拟,以了解太阳能电池和半导体行业中常用的晶体硅的微观行为。为此,他们编写的程序大约有10000行,其中最核心的计算由约2000行CUDA代码执行,最终取得了每秒1.87千万亿次单精度浮点运算的可持续性能。

  整个模拟总共用了3个小时左右,达到了深入统计分析所需的时间尺度。通过反复验证,科研人员确认模拟结果与真实材料相符。目前,科研人员仍在紧张分析模拟结果和改进程序,最终的计算性能有望进一步提高。

  据“天河一号”GPU生产方英伟达公司对外发布的消息称,此次模拟的运行性能是之前最高性能的分子模拟的五倍,而模拟规模也在其两倍以上。这次模拟勾画出了约为1100亿个原子的微观行为,而之前此类模拟的纪录是对490亿个原子达到每秒369万亿次浮点运算性能。

  业内专家表示,计算机模拟对于新材料的研究与生产具有非常重要的意义,可最大限度地揭示细节,但成本却比实验要低得多。

  据了解,“天河一号”位于国家超级计算天津中心,曾于去年荣膺TOP500组织颁发的全球最快超级计算机称号。目前被广泛应用于勘探石油、医药开发、天气建模、数据备份等领域。

(科技日报)
本篇文章来源于 科技网|www.stdaily.com
原文链接:http://www.stdaily.com/kjrb/content/2011-06/12/content_314055.htm

  • 0
    点赞
  • 0
    收藏
    觉得还不错? 一键收藏
  • 0
    评论
當封包從應用程式層到 UDP 層時,就把封包的序號、時間、和大小紀錄到一個檔案中(發送端記錄檔) 當封包到達接收端時,同樣把收到的封包序號、傳送時間(在傳送端要發送封包時會把當時的時間放在封包的標頭檔(common header)中)、到達時間、封包延遲時間( = 到達時間 - 傳送時間)、和封包大小紀錄到另一個檔案中(接收端記錄檔) 有了這兩個記錄檔,我們要求得吞吐量、封包延遲、抖動率、或封包遺失率就變得很簡單了。 mUDP是UDP的延伸,除了具有UDP的功能外,還能記錄所發送的封包的訊息。mUdpSink可以把接收到的封包訊息記錄到文件中。 mTcpSink是TCPsink的延伸,除了具有TCPSink功能外,還能記錄所發出的封包的訊息。 1.下載 measure.zip 內容: mudp.cc mudp.h mudpsink.cc mudpsink.h mtcpsink.cc mtcpsink.h 2.新建 //ns-allinone-2.33/ns-2.33/measure 文件夾,把這些文件放入其中 3.修改 //ns-allinone-2.33/ns-2.33/common/packet.h 如下 struct hdr_cmn { ...... dir_t direction_; // direction: 0=none, 1=up, -1=down int frametype_; double sendtime_; unsigned int pkt_id_; unsigned int frame_pkt_id_; // source routing char src_rt_valid; ...... }; 4.修改 //ns-allinone-2.33/ns-2.33/Makefile 如下 OBJ_CC = \ ...... apps/pbc.o \ measure/mtcpsink.o measure/mudp.o measure/mudpsink.o \ $(OBJ_STL) ...... 5.修改 //ns-allinone-2.33/ns-2.33/tcl/lib/ns-default.tcl 如下 ...... Agent/Ping set packetSize_ 64 Agent/mUDP set packetSize_ 1000 Agent/UDP set packetSize_ 1000 ...... 6.重新編譯NS2 # make clean # make 若編譯成功,即加入完成 7.使用 於 tcl 檔內加入 ...... #使用mTcpSink set sink [new Agent/TCPSink/mTcpSink] $sink set_filename tcp_sink ...... ...... #使用mUDP set udp [new Agent/mUDP] $udp set_filename sd_udp #使用mUdpSink set null [new Agent/mUdpSink] $null set_filename rd_udp ...... 即可使用 [編輯] 使用threshold程式 由於 Hidden Terminal Problem 與有效的傳輸距離有關,所以如何計算出有效的傳輸距離和其相關參數就變的非常重要 NS2有提供一個小工具,讓使用者輸入有效的傳輸距離和使用的傳輸模型後,即顯示相對應的參數 1.編譯程式 # cd ns-allinone-2.33/ns-2.33/indep-utils/propagation # g++ -lm threshold.cc -o threshold 2.使用 # ./threshold USAGE: find receiving threshold for certain communication range (distance) SYNOPSIS: threshold -m [other-options] distance : FreeSpace, TwoRayGround or Shadowing [other-options]: set parameters other than default values: Common parameters: -Pt -fr -Gt -Gr -L For two-ray ground model: -ht -hr For shadowing model: -pl -std -d0 -r
A compendium of essential information for the modern security entrepreneur and practitioner The modern security practitioner has shifted from a predominantly protective site and assets manager to a leading contributor to overall organizational resilience. Accordingly, The Security Consultant's Handbook sets out a holistic overview of the essential core knowledge, emerging opportunities, and approaches to corporate thinking that are increasingly demanded by employers and buyers in the security market. This book provides essential direction for those who want to succeed in security, either individually or as part of a team. It also aims to stimulate some fresh ideas and provide new market routes for security professionals who may feel that they are underappreciated and overexerted in traditional business domains. Product overview Distilling the author's fifteen years' experience as a security practitioner, and incorporating the results of some fifty interviews with leading security practitioners and a review of a wide range of supporting business literature, The Security Consultant's Handbook provides a wealth of knowledge for the modern security practitioner, covering: Entrepreneurial practice (including business intelligence, intellectual property rights, emerging markets, business funding, and business networking) Management practice (including the security function's move from basement to boardroom, fitting security into the wider context of organizational resilience, security management leadership, adding value, and professional proficiency) Legislation and regulation (including relevant UK and international laws such as the Human Rights Act 1998, the Data Protection Act 1998 and the Geneva Conventions) Private investigations (including surveillance techniques, tracing missing people, witness statements and evidence, and surveillance and the law) Information and cybersecurity (including why information needs protection, intelligence and espionage, cybersecurity threats, and mitigation approaches such as the ISO 27001 standard for information security management) Protective security (including risk assessment methods, person-focused threat assessments, protective security roles, piracy, and firearms) Safer business travel (including government assistance, safety tips, responding to crime, kidnapping, protective approaches to travel security and corporate liability) Personal and organizational resilience (including workplace initiatives, crisis management, and international standards such as ISO 22320, ISO 22301 and PAS 200) Featuring case studies, checklists, and helpful chapter summaries, The Security Consultant's Handbook aims to be a practical and enabling guide for security officers and contractors. Its purpose is to plug information gaps or provoke new ideas, and provide a real-world support tool for those who want to offer their clients safe, proportionate, and value-driven security services. About the author Richard Bingley is a senior lecturer in security and organizational resilience at Buckinghamshire New University, and co-founder of CSARN, the popular business security advisory network. He has more than fifteen years' experience in a range of high-profile security and communications roles, including as a close protection operative at London's 2012 Olympics and in Russia for the 2014 Winter Olympic Games. He is a licensed close protection operative in the UK, and holds a postgraduate certificate in teaching and learning in higher education. Richard is the author of two previous books: Arms Trade: Just the Facts (2003) and Terrorism: Just the Facts (2004). Table of Contents Chapter 1: Becoming an Entrepreneur in the Security Business Chapter 2: Becoming a Developed Security Manager Chapter 3: Security Legislation and Regulation Chapter 4: Private Investigations Chapter 5: Information Security Chapter 6: Protective Security Chapter 7: Safe Business Travel Chapter 8: Personal and Organisational Resilience
评论
添加红包

请填写红包祝福语或标题

红包个数最小为10个

红包金额最低5元

当前余额3.43前往充值 >
需支付:10.00
成就一亿技术人!
领取后你会自动成为博主和红包主的粉丝 规则
hope_wisdom
发出的红包
实付
使用余额支付
点击重新获取
扫码支付
钱包余额 0

抵扣说明:

1.余额是钱包充值的虚拟货币,按照1:1的比例进行支付金额的抵扣。
2.余额无法直接购买下载,可以购买VIP、付费专栏及课程。

余额充值