Parallel computations of turbulent diffusion in convective boundary layers on shared-memory machines

Prasad Pai, Tate T.H. Tsang

Research output: Contribution to journalArticlepeer-review

5 Scopus citations


Currently, time-splitting finite difference or finite element schemes are commonly used in air-pollution modeling. In light of the recent advances in parallel processing, it is crucial to evaluate the performance of these time-splitting schemes on different multiprocessors. In this paper, we use a K-theory diffusion model and a second-order closure model to simulate turbulent diffusion in convective boundary layers. The objective is to assess the "portability" of time-splitting finite element schemes for shared-memory multiprocessors, such as IBM 3090-600J, the Alliant FX/8, the Sequent Symmetry S81 and the Encore Multimax. It was found that significant speed-ups were obtained as a result of parallelization with small programming efforts. Furthermore, our two- and three-dimensional results also suggest that second-order closure models are now computationally affordable and feasible for realistic air pollution modeling.

Original languageEnglish
Pages (from-to)2425-2435
Number of pages11
JournalAtmospheric Environment Part A, General Topics
Issue number13
StatePublished - Sep 1992

Bibliographical note

Funding Information:
Acknowledgements--This work was partially supported by the Center for Computational Sciences at the University of Kentucky and the U.S. Army Chemical Research and Development Engineering Center. Computations were performed at the University of Kentucky, Comell National Supercomputing Facility and the Advanced Computing Resources Facility, Mathematics and Computer Sciences Division, Argonne National Laboratory.


  • K-theory diffusion model
  • Turbulent diffusion
  • convective boundary layer
  • parallelization
  • second-order closure model
  • time-splitting finite element

ASJC Scopus subject areas

  • Pollution


Dive into the research topics of 'Parallel computations of turbulent diffusion in convective boundary layers on shared-memory machines'. Together they form a unique fingerprint.

Cite this