Analogue and digital computers and systems
More general concepts than this:
More specific concepts than this:
Filter by subject:
- Computer and control engineering [1017]
- Computer hardware [1017]
- Analogue and digital computers and systems [1017]
- Multiprocessing systems [481]
- Electrical and electronic engineering [463]
- Logic design and digital techniques [345]
- Performance evaluation and testing [300]
- Computer software [295]
- Software techniques and systems [295]
- Circuit theory and circuits [254]
- [251]
- http://iet.metastore.ingenta.com/content/subject/b1200,http://iet.metastore.ingenta.com/content/subject/c5100,http://iet.metastore.ingenta.com/content/subject/b1265,http://iet.metastore.ingenta.com/content/subject/c5220,http://iet.metastore.ingenta.com/content/subject/c7400,http://iet.metastore.ingenta.com/content/subject/c1000,http://iet.metastore.ingenta.com/content/subject/b6000,http://iet.metastore.ingenta.com/content/subject/c5430,http://iet.metastore.ingenta.com/content/subject/c5220p,http://iet.metastore.ingenta.com/content/subject/c4000,http://iet.metastore.ingenta.com/content/subject/c1100,http://iet.metastore.ingenta.com/content/subject/b6100,http://iet.metastore.ingenta.com/content/subject/b0000,http://iet.metastore.ingenta.com/content/subject/c7410,http://iet.metastore.ingenta.com/content/subject/c6150,http://iet.metastore.ingenta.com/content/subject/b1265f,http://iet.metastore.ingenta.com/content/subject/c5130,http://iet.metastore.ingenta.com/content/subject/c4200,http://iet.metastore.ingenta.com/content/subject/b0200,http://iet.metastore.ingenta.com/content/subject/c5260,http://iet.metastore.ingenta.com/content/subject/c5600,http://iet.metastore.ingenta.com/content/subject/c6110,http://iet.metastore.ingenta.com/content/subject/e,http://iet.metastore.ingenta.com/content/subject/c5120,http://iet.metastore.ingenta.com/content/subject/b6200,http://iet.metastore.ingenta.com/content/subject/c3000,http://iet.metastore.ingenta.com/content/subject/c5420,http://iet.metastore.ingenta.com/content/subject/c6130,http://iet.metastore.ingenta.com/content/subject/b1265b,http://iet.metastore.ingenta.com/content/subject/b2000,http://iet.metastore.ingenta.com/content/subject/b8000,http://iet.metastore.ingenta.com/content/subject/c5620,http://iet.metastore.ingenta.com/content/subject/c3300,http://iet.metastore.ingenta.com/content/subject/c4230,http://iet.metastore.ingenta.com/content/subject/e0000,http://iet.metastore.ingenta.com/content/subject/b2500,http://iet.metastore.ingenta.com/content/subject/b7000,http://iet.metastore.ingenta.com/content/subject/c1200,http://iet.metastore.ingenta.com/content/subject/c5300,http://iet.metastore.ingenta.com/content/subject/c5460,http://iet.metastore.ingenta.com/content/subject/c6190,http://iet.metastore.ingenta.com/content/subject/c7420,http://iet.metastore.ingenta.com/content/subject/c1180,http://iet.metastore.ingenta.com/content/subject/c4100,http://iet.metastore.ingenta.com/content/subject/b6210,http://iet.metastore.ingenta.com/content/subject/b8100,http://iet.metastore.ingenta.com/content/subject/c7410b,http://iet.metastore.ingenta.com/content/subject/b2570,http://iet.metastore.ingenta.com/content/subject/c0000,http://iet.metastore.ingenta.com/content/subject/b6210l,http://iet.metastore.ingenta.com/content/subject/b6140,http://iet.metastore.ingenta.com/content/subject/a,http://iet.metastore.ingenta.com/content/subject/c5260b,http://iet.metastore.ingenta.com/content/subject/c4230m,http://iet.metastore.ingenta.com/content/subject/c6150n,http://iet.metastore.ingenta.com/content/subject/b8110,http://iet.metastore.ingenta.com/content/subject/c6150j,http://iet.metastore.ingenta.com/content/subject/b1265a,http://iet.metastore.ingenta.com/content/subject/c1160,http://iet.metastore.ingenta.com/content/subject/c5320,http://iet.metastore.ingenta.com/content/subject/b6250,http://iet.metastore.ingenta.com/content/subject/c1140,http://iet.metastore.ingenta.com/content/subject/c5210,http://iet.metastore.ingenta.com/content/subject/c6130s,http://iet.metastore.ingenta.com/content/subject/e1000,http://iet.metastore.ingenta.com/content/subject/b0290,http://iet.metastore.ingenta.com/content/subject/c5450,http://iet.metastore.ingenta.com/content/subject/e0200,http://iet.metastore.ingenta.com/content/subject/b0260,http://iet.metastore.ingenta.com/content/subject/b1265d,http://iet.metastore.ingenta.com/content/subject/c4240,http://iet.metastore.ingenta.com/content/subject/b5000,http://iet.metastore.ingenta.com/content/subject/a8000,http://iet.metastore.ingenta.com/content/subject/b7200,http://iet.metastore.ingenta.com/content/subject/c0200,http://iet.metastore.ingenta.com/content/subject/c5500,http://iet.metastore.ingenta.com/content/subject/b5200,http://iet.metastore.ingenta.com/content/subject/c5320g,http://iet.metastore.ingenta.com/content/subject/b6150,http://iet.metastore.ingenta.com/content/subject/c7100,http://iet.metastore.ingenta.com/content/subject/c7300,http://iet.metastore.ingenta.com/content/subject/b6135,http://iet.metastore.ingenta.com/content/subject/c7410d,http://iet.metastore.ingenta.com/content/subject/c6110p,http://iet.metastore.ingenta.com/content/subject/c6120,http://iet.metastore.ingenta.com/content/subject/b0100,http://iet.metastore.ingenta.com/content/subject/e0210,http://iet.metastore.ingenta.com/content/subject/b6250f,http://iet.metastore.ingenta.com/content/subject/c1140z
- b1200,c5100,b1265,c5220,c7400,c1000,b6000,c5430,c5220p,c4000,c1100,b6100,b0000,c7410,c6150,b1265f,c5130,c4200,b0200,c5260,c5600,c6110,e,c5120,b6200,c3000,c5420,c6130,b1265b,b2000,b8000,c5620,c3300,c4230,e0000,b2500,b7000,c1200,c5300,c5460,c6190,c7420,c1180,c4100,b6210,b8100,c7410b,b2570,c0000,b6210l,b6140,a,c5260b,c4230m,c6150n,b8110,c6150j,b1265a,c1160,c5320,b6250,c1140,c5210,c6130s,e1000,b0290,c5450,e0200,b0260,b1265d,c4240,b5000,a8000,b7200,c0200,c5500,b5200,c5320g,b6150,c7100,c7300,b6135,c7410d,c6110p,c6120,b0100,e0210,b6250f,c1140z
- [243],[219],[216],[215],[190],[181],[172],[141],[132],[130],[119],[115],[111],[106],[105],[103],[97],[90],[89],[89],[86],[82],[74],[70],[69],[69],[68],[63],[62],[59],[56],[54],[53],[53],[51],[50],[48],[48],[47],[47],[47],[47],[46],[46],[45],[45],[45],[44],[44],[43],[42],[39],[39],[38],[38],[37],[37],[35],[35],[35],[34],[34],[34],[34],[34],[33],[33],[33],[32],[31],[31],[30],[28],[28],[28],[28],[27],[27],[26],[26],[26],[25],[25],[24],[24],[23],[23],[22],[22]
- /search/morefacet;jsessionid=49ud4o9dgibv4.x-iet-live-01
- /content/searchconcept;jsessionid=49ud4o9dgibv4.x-iet-live-01?option1=pub_concept&sortField=prism_publicationDate&pageSize=20&sortDescending=true&value1=c5400&facetOptions=2&facetNames=pub_concept_facet&operator2=AND&option2=pub_concept_facet&value2=
- See more See less
Filter by content type:
Filter by publication date:
- 1997 [43]
- 2003 [43]
- 2019 [43]
- 1995 [40]
- 2012 [40]
- 1998 [38]
- 1990 [33]
- 1996 [30]
- 1994 [29]
- 2015 [28]
- 2000 [27]
- 2004 [27]
- 2010 [27]
- 1991 [26]
- 2005 [26]
- 2011 [24]
- 2020 [22]
- 2013 [21]
- 1985 [20]
- 2016 [20]
- 1989 [19]
- 2017 [17]
- 1987 [16]
- 1988 [16]
- 1999 [15]
- 1967 [14]
- 2009 [13]
- 1978 [12]
- 1986 [12]
- 1993 [12]
- 1968 [11]
- 2002 [11]
- 2008 [11]
- 1977 [10]
- 1984 [10]
- 1992 [10]
- 2006 [10]
- 2007 [10]
- 1981 [9]
- 2001 [9]
- 1970 [8]
- 1971 [8]
- 1976 [8]
- 2018 [8]
- 1966 [7]
- 1972 [7]
- 1973 [7]
- 1975 [7]
- 2014 [7]
- 1982 [6]
- 1983 [6]
- 1974 [5]
- 1979 [5]
- 1969 [4]
- 1980 [3]
- 2021 [1]
- See more See less
Filter by author:
- C. Edwards [12]
- C. Baber [7]
- A.F. Clark [5]
- A. Tyrrell [4]
- C. Halatsis [4]
- D.M. Taub [4]
- F. Lombardi [4]
- H. Chen [4]
- P. Dempsey [4]
- P. Mars [4]
- P.J. Fleming [4]
- Roger Dettmer [4]
- A. Pombortsis [3]
- A. Schwirtz [3]
- A. Symons [3]
- A. Thompson [3]
- A.C. Downton [3]
- C. Ortega [3]
- C.-P. Chung [3]
- D. Woods [3]
- D.J. Johnston [3]
- E.L. Dagless [3]
- H. Bristow [3]
- J. Cross [3]
- J. Owczarczyk [3]
- J.M. Bass [3]
- J.S. Ward [3]
- Jesus Carretero [3]
- K. Van Laerhoven [3]
- K.E. Forward [3]
- K.W. Chan [3]
- Leonel Sousa [3]
- M.O. Tokhi [3]
- N. Bagherzadeh [3]
- P. Eles [3]
- P.G. Depledge [3]
- R.M. Lea [3]
- S.-M. Moon [3]
- S.I. Woolley [3]
- T.S. Dillon [3]
- V. Lakshmi Narasimhan [3]
- W.R. Moore [3]
- Y. Li [3]
- Yu Zhang [3]
- A. Baniasadi [2]
- A. Burns [2]
- A. Dasu [2]
- A. El-Amawy [2]
- A. Florea [2]
- A. Gellert [2]
- A. Ghafoor [2]
- A. Ignjatovic [2]
- A.A. Kassim [2]
- A.F. Murray [2]
- A.I.S. Ahmad [2]
- A.J. Allen [2]
- A.M. Tyrrell [2]
- A.R. Daniels [2]
- Ahmad Khademzadeh [2]
- Ahmad Patooghy [2]
- Alex Yakovlev [2]
- Amit Kumar Singh [2]
- B.I. Vichev [2]
- B.J. Cory [2]
- B.M. Al-Hashimi [2]
- B.S. Hoyle [2]
- B.W. Hogg [2]
- C. Randell [2]
- C.-C. Hsu [2]
- C.-Y. Chen [2]
- C.A. Prete [2]
- C.C. Lau [2]
- C.J. Kelley [2]
- C.J. Theaker [2]
- C.M. Krishna [2]
- Chrysostomos Nicopoulos [2]
- D. Aspinall [2]
- D. Atienza [2]
- D. Edwards [2]
- D.I. Jones [2]
- D.J. Sandoz [2]
- D.J. Woollons [2]
- D.K.S. Bain [2]
- D.M. Imeson [2]
- D.R. Coulson [2]
- D.R. Noaks [2]
- D.R. Wilson [2]
- Dimitrios S. Nikolopoulos [2]
- F. Catthoor [2]
- F. Halsall [2]
- F. Özgüner [2]
- F.G. Heath [2]
- G. Morgan [2]
- G. Reynolds [2]
- G.N. Khan [2]
- G.R. Redinbo [2]
- Geoff V. Merrett [2]
- H. Cho [2]
- H.R. Mclean [2]
- H.S. Singh [2]
- See more See less
Filter by access type:
ReRAM neural networks with focus on intensive matrix multiplication operations. ReRAM-crossbar network can be used as matrix-vector multiplication accelerator and then to illustrate the detailed mapping. The coupled ReRAM oscillator network can be applied for low-power and high-throughput L2-norm calculation. The 3D single-layer CMOS-ReRAM architecture will be used for tensorized neural network (TNN). A 3D multilayer CMOS-ReRAM architecture has advantages in three man-ifold. First, by utilizing ReRAM crossbar for input data storage, leakage power of memory is largely removed. In a 3D architecture with TSV interconnection, the bandwidth from this layer to next layer is sufficiently large to perform parallel computation. Second, ReRAM crossbar can be configured as computational units for the matrix-vector multiplication with high parallelism and low power. Lastly, with an additional layer of CMOS-ASIC, more complicated tasks such as division and non-linear mapping can be performed. As a result, the whole training process of ML can be fully mapped to the proposed 3D multilayer CMOS-ReRAM accelerator architecture towards real-time training and testing.
A metal-rim-connected inductive coupler with series-none compensation topology is proposed for smartwatch applications. By cross-connecting the receiving coil to the metal rim with a 1 mm slot, the direction of the induced current on the metal rim is transformed to be the same as the current flowing on the receiving coil, leading to a strong magnetic coupling between the transmitting coil and receiving coil. Considering the space limitation in the smartwatch, non-compensation components are needed inside the smartwatch and only a series capacitance is integrated on the transmitter side. A prototype of the proposed inductive coupler has been built and the wireless power transfer through metal rim has been validated via experiment. The experimental results show that the prototype achieves 5 W output power with 87.4% coil-to-coil efficiency.
The categorisation of network packets according to multiple parameters such as sender and receiver addresses is called packet classification. Packet classification lies at the core of Software-Defined Networking (SDN)-based network applications. Due to the increasing speed of network traffic, there is an urgent need for packet classification at higher speeds. Although it is possible to accelerate packet classification algorithms through hardware implementation, this solution imposes high costs and offers limited development capacity. On the other hand, current software methods to solve this problem are relatively slow. A practical solution to this problem is to parallelise packet classification using multi-core processors. In this study, the Thread, parallel patterns library (PPL), open multi-processing (OpenMP), and threading building blocks (TBB) libraries are examined and implemented to parallelise three packet classification algorithms, i.e. tuple space search, tuple pruning search, and hierarchical tree. According to the results, the type of algorithm and rulesets may influence the performance of parallelisation libraries. In general, the TBB-based method shows the best performance among parallelisation libraries due to using a theft mechanism and can accelerate the classification process up to 8.3 times on a system with a quad-core processor.
The increasing demand for high-performance computing has emphasised the invocation of sophisticated multi/many-core computing architecture. Graphical Processing Unit (GPU) is considered to be an essential innovation in this regard as GPU offers a significant amount of parallelism in the execution of complex computing applications. The performance of GPUs in reducing the computational time of such applications is worth mentioning. Although GPUs appear to be a problem-solving solution for complex applications yet high power consumption has been a challenging problem, associated with this many-core computer architecture. Efficient resource management is a emerging and promising solution to this challenge; however, reducing the resources would degrade the system's overall performance. On the other hand, reducing the resources based on the analysis of workload can save significant power without degrading the system's overall performance. Therefore, a smart controller to optimise the resources of general purpose-GPU (GP-GPU) architecture is required. AFBRMC-2, a neuro-fuzzy type-2 based controller, is presented for GP-GPU architecture and, based on a feedback mechanism, keeps analysing the stats of processor and manages resources using dynamic voltage frequency scaling and core gating techniques. The proposed controller achieved up to 55% reduction in power consumption against various benchmarks on the NVIDIA TK1 GPU kit.
To meet rising demands for computing resources, information technology service providers need to select cloud-based services for their vitality and elasticity. Enormous numbers of data centres are designed to meet customer needs. Burning up energy by data centre is very high with the large-scale deployment of cloud data centres. Virtual machine consolidation strategy implementation reduces the data centre energy consumption and guarantees service level agreements. This study proposes a machine learning-based method in cloud computing for the automated use of virtual machines. Machine learning-based virtual machine selection approach integrates the migration control mechanism that enhances selection strategy efficiency. The experiment is performed with various real machine workload circumstances to provide proof and effectiveness of the proposed method. The exploratory outcome shows that the proposed approach streamlines the utilisation of the virtual machine and diminishes the consumption of energy and improves infringement of service level agreements to accomplish better performance.
This chapter introduces the basic concepts on energy efficiency and non -orthogonal multiple access (NOMA) to unlock the potentials of future communication networks. The energy -efficient resource allocation design for NOMA systems is formulated as a non -convex optimization problem. Based on the fractional programming and successive convex approximation (SCA), a generic algorithm is proposed to achieve a suboptimal solution of the formulated problem. Simulation results are provided to verify the convergence of the proposed algorithm and to evaluate the system energy efficiency of the proposed design.
Geometric primitives contained in three-dimensional (3D) point clouds can provide the meaningful and concise abstraction of 3D data, which plays a vital role in improving 3D vision-based intelligent applications. However, how to efficiently and robustly extract multiple geometric primitives from point clouds is still a challenge, especially when multiple instances of multiple classes of geometric primitives are present. In this study, a novel energy minimisation-based algorithm for multi-class multi-instance geometric primitives extraction from the 3D point cloud is proposed. First, an improved sampling strategy is proposed to generate model hypotheses. Then, an improved strategy to establish the neighbourhood is proposed to help construct and optimise an energy function for points labelling. After that, hypotheses and parameters of models are refined. Iterate this process until the energy does not decrease. Finally, models of multi-class multi-instance geometric primitives are simultaneously and robustly extracted from the 3D point cloud. In comparison with the state-of-the-art methods, it can automatically determine the classes and numbers of geometric primitives in the 3D point cloud. Experimental results with synthetic and real data validate the proposed algorithm.
Public transport operators often struggle to provide a reliable and efficient transport service. A lack of comprehensive real-time operational data is often cited as a major cause for this state of things. In this study, the authors report on the design, implementation and testing of an Internet of Things-based system, named Bus Seating Information Technology system, which dynamically determines vehicle occupancy while the bus is in service. It uses an array of sensors for detecting events in the vehicle: infrared sensors ascertain whether passengers are entering or leaving the bus; force-sensitive resistors facilitate seat-occupancy detection; a Global Positioning System shield in conjunction with a Raspberry Pi microcomputer enables real-time tracking of the bus; and a USB camera connected to the same Raspberry Pi assist in cross-checking and validating the preceding information. The data collected is uploaded to an online IoT platform (thinger.io), through 3G or 4G if available, and can be visualised via an android app as well as through a desktop computer user interface. The planned functions of the system were tested in a 20-seater bus. Results showed that the system can track the vehicle location, as well as vehicle occupancy in real-time in most cases.
One of the primary purposes of reliability evaluation is to identify and protect vulnerable components of a system. At the hardware level, the results of the evaluation can lead to design revisions that aim to increase the fault tolerance of the system. Every potential change is subject to validation and additionally requires more iterations of reliability evaluation. This back-and-forth process is expensive, especially when considering that hardware design changes require significant amounts of time to be applied. To address this problem, microarchitecture-level reliability assessment has been proposed. Instead of assessing the actual hardware design, the evaluation can be performed at microarchitecture-level (or performance) models that are often available very early in the design chain and are both flexible and allow high observability. The existence of reliability evaluation results before the actual design implementation enables early reliability-related design decisions and significantly decreases the cost of redesign cycles. But the absence of transistor-level detail on the evaluation inheritably results to some accuracy loss. Only components that are accurately modeled at the microarchitecture level, which are mostly memory elements (Static Random-Access Memory (SRAM) arrays, flops, and latches), can be assessed. Combinational logic and sequential elements are (in majority) functionally modeled, and thus, they cannot be evaluated at microarchitecture level. Fortunately, literature suggests that only a small portion (< 10%) of failures sources from these elements, which implies that the accuracy loss that can be attributed to the un-modeled resources at microarchitecture-level is limited. In this chapter, we present the throughput, capabilities, and accuracy of microarchitecturelevel reliability assessment, and how it can be effectively used at early design stages.
It is clear from the previous chapters of this book that both fault-injection techniques and analytical approaches for cross-layer reliability analysis have both positive and negative aspects that must be carefully analyzed whenever choosing the best approach to evaluate the reliability of a computing system, and none of them alone represents an optimal solution. With the increasing complexity of future computing systems, analyzing the impact on system reliability of any change in the technology, circuit, microarchitecture and software is a critical and complex design task that requires proper tools and models. The adoption of cross-layer reliability techniques makes this analysis even more complex and challenging. Therefore, there is an increasing interest into stochastic reliability models that are able to combine the benefit of fault-injection techniques at different abstraction levels and analytical approaches such as Register Data Lifetime [1] or Architectural Correct Execution [2-4] analysis into a unified stochastic model that is able to cope with the complexity of the target design together. This is favored by an increasing discussion on the use of these models in the framework of relevant reliability and safety-related standards such as the IEC 61508 [5] and ISO 26262 [6].
Reliability has always been a major concern in designing computing systems. However, the increasing complexity of such systems has led to a situation where efforts for assuring reliability have become extremely costly, both for the design of solutions for the mitigation of possible faults, and for the reliability assessment of such techniques. Cross-layer reliability is fast becoming the preferred solution. In a cross-layer resilient system, physical and circuit level techniques can mitigate low-level faults. Hardware redundancy can be used to manage errors at the hardware architecture layer. Eventually, software implemented error detection and correction mechanisms can manage those errors that escaped the lower layers of the stack. This book presents state-of-the-art solutions for increasing the resilience of computing systems, both at single levels of abstraction and multi-layers. The book begins by addressing design techniques to improve the resilience of computing systems, covering the logic layer, the architectural layer and the software layer. The second part of the book focuses on cross-layer resilience, including coverage of physical stress, reliability assessment approaches, fault injection at the ISA level, analytical modelling for cross-later resiliency, and stochastic methods. Cross-Layer Reliability of Computing Systems is a valuable resource for researchers, postgraduate students and professional computer architects focusing on the dependability of computing systems.
In a Eukaryotic gene, identification of exon regions is crucial for protein formation. The periodic-3 property of exon regions has been used for its identification. An anti-notch infinite impulse response (IIR) filter is mostly employed to recognise this periodic-3 property. The lattice structure realisation of anti-notch IIR filter requires less hardware over direct from-II structures. In this study, a hardware implementation of IIR anti-notch filter lattice structure is carried out on Zynq-series (Zybo board) field programmable gate array (FPGA). The performance of hardware design has been improved using techniques like retiming, pipelining and unfolding and finally assessed on various Eukaryotic genes. The hardware implementation reduces the time frame to analyse the DNA sequence of Eukaryotic genes for protein formation, which plays a significant role in detecting individual diseases from genetic reports. Here, the performance evaluation is carried out in MATLAB simulation environment and the results are found similar. Application-specific integrated circuit (ASIC) implementation of the anti-notch filter lattice structure is also carried out on CADENCE-RTL compiler. It is observed that the FPGA implementation is 31 to 34 times faster and ASIC implementation is 58 to 64 times faster compared to the results generated by MATLAB platform with similar prediction accuracy.
Fog computing is a decentralised model which can help cloud computing for providing high quality-of-service (QoS) for the Internet of Things (IoT) application services. Service placement problem (SPP) is the mapping of services among fog and cloud resources. It plays a vital role in response time and energy consumption in fog–cloud environments. However, providing an efficient solution to this problem is a challenging task due to difficulties such as different requirements of services, limited computing resources, different delay, and power consumption profile of devices in fog domain. Motivated by this, in this study, we propose an efficient policy, called MinRE, for SPP in fog–cloud systems. To provide both QoS for IoT services and energy efficiency for fog service providers, we classify services into two categories: critical services and normal ones. For critical services, we propose MinRes, which aims to minimise response time, and for normal ones, we propose MinEng, whose goal is reducing the energy consumption of fog environment. Our extensive simulation experiments show that our policy improves the energy consumption up to 18%, the percentage of deadline satisfied services up to 14% and the average response time up to 10% in comparison with the second-best results.
Exascale computing systems (ECS) are anticipated to perform at Exaflop speed (1018 operations per second) using power consumption <20 MW. This ultrascale performance requires the speedup in the system by thousand-fold enhancement in current Petascale. For future high-performance computing (HPC), power consumption is one of the vital challenges faced to achieve Exaflops through the traditional way of increasing clock-speed. One standard way to attain such significant performance is through massive parallelism. In the early stages, it is hard to decide the promising parallel programming approach that can provide massive parallelism to attain ExaFlops. This article commences with a short description and implementation of algorithms of various hybrid parallel programming models (PPMs) for homogeneous and heterogeneous cluster systems. Furthermore, the authors evaluated performance and power consumption in these hybrid models by implementing in two HPC benchmarking applications such as square matrix multiplication and Jacobi iterative solver for two-dimensional Laplace equation. The results demonstrated that the hybrid of heterogeneous (MPI + X) outperformed to homogeneous parallel programming (MPI + OpenMP) model. This empirical investigation of hybrid PPMs is a leading step for researchers and development communities to select a promising model for emerging ECS.
This Letter reports a method to obtain fine-grained energy consumption analysis of programs running on the low-power internet of things (IoT) devices. In the energy estimation domain, most state-of-the-art solutions focus on the coarse-grained approach to monitor the energy consumption of a device or an application. However, few solutions addressed energy monitoring to analyse fine-grained energy consumption of a program, especially for IoT appliances. Therefore, the authors present a fine-grained gem5-based energy profiling tool to help developers to evaluate the energy efficiency of hot spots in their programs. The authors demonstrate its usability by applying it to profiling garbage collection and property lookup in Jerryscript, a JavaScript engine specifically designed for resource-constrained IoT devices, and discover that these two operations are consuming, as they account for 17.67 and 12.26% of total energy, respectively. Therefore, this tool can aid the developers to gain insight into the energy efficiency of their software.
Smart cities are evolving globally and many governments have invested large sums of monies to develop smart cities. This development is not a result of an overnight decision but rather, smart cities have evolved through a period of time, directly from earlier work on the digital city to ubiquitous city, green city, connected city, sustainable city, eco-city etc. The present age sees the arrival of very high-speed wireless 5G connectivity, fast GPU multi-core-based servers, big data, cloud computing, artificial intelligence, and data analytics. Many of these new technologies have supported the development and realisation of smart cities. In this study, the authors present an outline of security for smart cities and provide a deeper understanding of what we meant by securing smart cities. They discuss the applicability of existing security methods of authentication, access control, encryption, firewalls, and their appropriateness to defending a smart city. Specifically, we cover the security of data, internet, water supply, electricity supply, city brain, and other critical city services and present the possible malicious attacks on a smart city and consequences. Finally, they discuss security best practices for smart cities.
Mobile edge computing (MEC) is an effective assistant technology that can overcome some defects of cloud computing. For the sake of alleviating the clashes between the capability constraint of cloudlets and the needs of mobile devices (MDs) for reducing executing latency as well as decreasing the power consumption of MDs, a user-oriented use case in the MEC named computation offloading is taken into consideration. Computation offloading is capable of effectively making the MEC adapt to the resources of cloudlets and MDs in different environments, and it is very beneficial to the development of the internet of things. Owing to the finite computation capabilities of the MDs and the resources of cloudlets are heterogeneous and limited; a three-objective model is established to optimise the time consumption, and the energy consumption of MDs as well as the load balancing of cloudlets jointly. Technically, the authors propose an effective multi-user multi-application computation offloading method in the multi-cloudlet environment on the basis of improved non-dominated sorting genetic algorithm III. Finally, comprehensive experiments and analysis were conducted to validate the effectiveness and efficiency of the proposed method.
This work presents an efficient approach for the generation of distributed Sparse Approximate Inverse preconditioners based on the near-field coupling information for the analysis of electromagnetic problems on large computing clusters. This scheme combines the Message Passing Interface and Open Multi-Processing paradigms in order to minimise the CPU time and memory footprint of the preconditioner, making use of specific algorithms tailored to balance the load and reduce the amount ot information shared between nodes. Some representative examples provide insight into the scalability and performance of the described approach addressing large and realistic scenarios.
Flash controller is the core hardware embedded in today's mobile device storage, and the flash translation layer (FTL) is the key system of controller. This Letter proposes a high-efficient superblock FTL (HSPB) to satisfy the demand of large media files and application files storage, which implements the cross-block sequential writing strategy and the shared cached mapping table scheme. Test results show that HSPB reduces the time and power consumption by 7–30% in seq/random write and gains up to 60% improvement in sequential/random read compared to other FTLs.
Digital embedded systems in safety-critical cyber-physical-systems (CPSs) require high levels of resilience and robustness against different fault classes. In recent years, self-healing concepts based on biological physiology have received attention for the design and implementation of reliable systems. However, many of these approaches have not been architected from the outset with safety in mind, nor have they been targeted for the safety-related automation industry where the significant need exists. This study presents a new self-healing hardware architecture inspired by integrating biological concepts, fault tolerance techniques, and IEC 61131-3 operational schematics to facilitate adaption in automation and critical infrastructure. The proposed architecture is organised in two levels: the critical functions layer used for providing the intended service of the application and the healing layer that continuously monitors the correct execution of that application and generates health syndromes to heal any failure occurrence inside the functions layer. Finally, two industrial applications have been mapped on this architecture to date, and the authors believe the nexus of its concepts can positively impact the next generation of critical CPSs in industrial automation.