ABACUSAtomic-orbital Based Ab-initio Computation at UStc) is an open-source computer code package based on density functional theory (DFT). The package utilizes both plane wave and numerical atomic basis sets with the usage of norm-conserving pseudopotentials to describe the interactions between nuclear ions and valence electrons. ABACUS supports LDA, GGA, meta-GGA, and hybrid functionals. Apart from single-point calculations, the package allows geometry optimizations and ab-initio molecular dynamics with various ensembles. The package also provides a variety of advanced functionalities for simulating materials, including the DFT+U, VdW corrections, and implicit solvation model, etc. In addition, ABACUS strives to provide a general infrastructure to facilitate the developments and applications of novel machine-learning-assisted DFT methods (DeePKS, DP-GEN, DeepH, etc.) in molecular and material simulations.
The ACAB code is a computer program designed to perform activation and transmutation calculations for nuclear applications. ACAB has been used to simulate realistic operational scenarios of very different nuclear systems: inertial fusion, magnetic fusion, accelerator driven systems, fission reactors,...
generate radionuclide activities, afterheat (total and contributions from the different types of radiation), neutron emission, radiotoxicity, decay gamma spectra, contact dose rates, waste disposal ratings, offsite doses to the most exposed individual, as well as collective doses and associated consequences
The method to compute uncertainties is based on the application of the Monte Carlo technique, and allows dealing efficiently with the synergic/global effect of the uncertainties of the total set of cross sections to obtain the overall uncertainty on the radiological calculations.
The distributed version includes a pre-processing code (PROCDECAY) to convert Evaluated Nuclear Decay Libraries into ACAB format. Evaluated Cross Sections libraries could be processed by the user with NJOY; otherwise, EAF multigroup libraries can be directly used by ACAB. The EAF libraries (cited as examples) must be requested separately from NEA or UKAEA.
COLLAPS can use fission yield data in conjunction with fission cross sections and neutron spectrum to compute effective fission yield cross sections, (gamma-sigma), and effective fission yields, (gamma).
Finally, CHAINS code is included to analyze the possible pathways for the formation of a particular nuclide. All possible pathways that require up to a specified number of steps are ranked according to their estimated importance to the total production of the nuclide. The user gives an importance cutoff that is used to truncate the list of possible pathways.
Keywords: accelerators, activation, decay, decay heat, fission products, fission reactors, fusion reactors, inventories, irradiation, isotope production, neutron emission, neutron flux, nuclear cascades, nuclear reaction yield, radioactivity, radiotoxicity, transmutation.
Avnet's Code of Conduct clearly details how we conduct ourselves in every aspect of business. It is a commitment to our stakeholders that they can count on us to operate with respect, honesty and fairness in all interactions.
When you visit any web site, it may store or retrieve information on your browser, mostly in the form of cookies. This information might be about you, your preferences or your device and is mostly used to make the site work as you expect it to. The information does not usually directly identify you, but it can give you a more personalized web experience.
Because we respect your right to privacy, you can choose not to allow some types of cookies. Click on the different category headings to find out more and change our default settings. However, blocking some types of cookies may impact your experience of the site and the services we are able to offer.
These cookies are necessary for the website to function and cannot be switched off in our systems. They are usually only set in response to actions made by you which amount to a request for services, such as setting your privacy preferences, logging in or filling in forms. You can set your browser to block or alert you about these cookies, but some parts of the site may not work then.
This cookie is to track if you have accepted the cookie policy. It will be random characters to create a unique id for you. This id will be stored in a database on a server that Avnet owns and would be used to filter the cookies that you have chosen to allow/deny.
These cookies allow us to count visits and traffic sources, so we can measure and improve the performance of our site. They help us know which pages are the most and least popular and see how visitors move around the site. All information these cookies collect is aggregated and therefore anonymous. If you do not allow these cookies, we will not know when you have visited our site.
This cookie is set and read by the JavaScript code when the SelectMap functionality or the Activity Map functionality are enabled; it contains information about the previous link that was selected on by the user.
These cookies are set through our site by our advertising partners. They may be used by those companies to build a profile of your interests and show you relevant ads on other sites. They work by uniquely identifying your browser and device. If you do not allow these cookies, you will not experience our targeted advertising across different websites.
Audience Manager sets this cookie to assign a unique ID to a site visitor. The demdex cookie helps Audience Manger perform basic functions, such as visitor identification, ID synchronization, segmentation, modeling, reporting, and so on.
In the spirit of fair and transparent processing of personal data, this policy provides detailed information about how and when we use cookies and/or other analytics tools. This cookie policy applies to any Avnet product or service that links to this policy or incorporates it by reference.
Attorney Code Types
Abacus Credit Counseling offers three (3) types of attorney accounts, to best accommodate our attorneys' needs. For all of our accounts, clients using your billing code are added to your profile, and their certificates may be downloaded if you log in to your account on our Attorneys page.
1. Pay and Send Certificate Immediately
With this option, your client enters your attorney billing code, and the client is automatically added to your account. Thecertificate is sent to you the instant the client completes the course, by your preferred method(s), as well as to your client. With this option, the debtor education course is discounted to $15/household for internet and $25/household for phone.
2. Log in to Pay and Download Certificates
With this option, your client enters your attorney billing code, however, no certificate is issued and you are not billed without your approval. When a client completes the course, you are notified (by fax or email) that your client has completed the course, and you are given a link to download the certificate. Once you download the certificate, the client is added to your account. With this option, the debtor education course is discounted to $15/household for internet and $25/household for phone.
3. Certificates emailed/faxed when client pays (no billing)
With this option, clients are responsible for paying for their own courses. However, when clients enter your billing code, they are automatically added to your profile, and their certificates are sent to you by your preferred method(s), as well as to your clients.
Payment Method
Abacus can bill you for clients in two ways. First, you can keep a credit card on file. The card would be charged at the beginning of each month for the previous month's clients, and you receive an email statement showing the names of all clients billed that month. Second, you can receive a monthly invoice by email showing all clients from the previous month. Payment is due upon receipt, and may be made by credit card or check.
AbacusSummit was performed with the Abacus code on the Summit supercomputer at the Oak Ridge Leadership Computing Facility (OLCF) using time from the ALCC program. AbacusSummit provides nearly 60 trillion simulated particles over 97 cosmologies, including 140 examples of 330 billion particles in 2 Gpc/h boxes. It generated about 2 petabytes of data products, comprising halo catalogs, merger trees, and particle subsamples. These data products are being placed in the public domain, with access arranged for large collaborations. More details are available here.
The Abacus code aims to produce extremely high-performance and high-accuracy simulations, leveraging the opportunities of a new mathematical algorithm for the solution of gravitational forces and the high speed of graphics processing units (GPUs). The code has been exquisitely optimized and indeed co-developed with custom-built computers. Abacus has been developed over a decade. Currently it is actively developed by Lehman Garrison, Nina Maksimova, and Daniel Eisenstein, with contributions from Boryana Hadzhiyska and Sownak Bose and consulting from Philip Pinto. Abacus was initially developed by Marc Metchnik and Philip Pinto, with contributions from Daniel Eisenstein and later development led by Douglas Ferrer.
Abacus found a superb match with the OLCF Summit supercomputer, which featured a combination of GPU power, CPU power, memory, and storage that allowed large Abacus simulations to be run. Abacus achieved very high performance on Summit, completing this world-leading suite in about 350,000 node-hours.
All Abacus.AI employees and contractors undergo security training as part of the orientation process and receive ongoing security training throughout their tenure. During orientation, new employees must read and agree to the Abacus.AI Acceptable Use Policy (AUP) and Code of Conduct, which highlights our commitment to keep customer information safe and secure. Depending on their job role, additional training on specific aspects of security may be required. For instance, the information security team instructs new engineers on topics like secure coding practices, product design and automated vulnerability testing tools. We also cover topics like phishing, ransomware, social engineering etc. topics.
3a8082e126