We propose a new crossbar switch structure with adaptive bandwidth control. In a complex SoC design, the proposed crossbar switch efficiently incorporates various IPs with different bandwidth requirements. Simulation ...
详细信息
ISBN:
(纸本)0780388348
We propose a new crossbar switch structure with adaptive bandwidth control. In a complex SoC design, the proposed crossbar switch efficiently incorporates various IPs with different bandwidth requirements. Simulation under various traffic scenarios shows that the throughput of the proposed crossbar switch is as high as that of a conventional switch operating at twice the speed. The proposed crossbar switch shows maximum 27% improvement in throughput and maximum 41% improvement in latency compared to the conventional one. The proposed crossbar switch is implemented using Verilog HDL, synthesized with an 0.18 /spl mu/m process library, and verified on FPGAs. The area and power overhead of the proposed crossbar switch is 21% and 15%, respectively, when compared to the conventional crossbar switch.
Most of traditional load balancing strategies are based on servers or applications architecture. Storage subsystem, as the back tier, provides file or block interface to server or application tier, is often ignored wh...
详细信息
ISBN:
(纸本)076952432X
Most of traditional load balancing strategies are based on servers or applications architecture. Storage subsystem, as the back tier, provides file or block interface to server or application tier, is often ignored when the bottleneck of service is studied. Our load balancing strategy is based on storage object, which provides object interface for the up tier. We concentrate on storage objects with massive dynamic processing. The characteristics of storage object in object storage system (OSS) enable us to apply our load balancing strategy at the back end of servers or applications in order to deal with bottlenecks at the storage tier in data-intensive applications
In recent years, Internet-scale worm incidents occurred many times. People wonder at the speediness of the worm spread and the severe damage to the Internet. So people began to find methods to detect worms as quickly ...
详细信息
In recent years, Internet-scale worm incidents occurred many times. People wonder at the speediness of the worm spread and the severe damage to the Internet. So people began to find methods to detect worms as quickly as possible. The paper first describes a worm behavior and propagation model. And then based on it, a new approach for early detection of Internet worms is proposed. This approach determines whether a worm incident has occurred by the change of the computers' connection degree. The approach is proved to be effective on early detection of unknown worms by experiments.
The current drive in an MOSFET is limited by the intrinsic channel resistance. All the other parasitic elements in a device structure play a significant role and degrade the device performance. These other resistances...
详细信息
ISBN:
(纸本)0976798522
The current drive in an MOSFET is limited by the intrinsic channel resistance. All the other parasitic elements in a device structure play a significant role and degrade the device performance. These other resistances need to be less than 10%-20% of the channel resistance. To achieve the requirements, we should investigate the methodology of separation and quantification of those resistances. In this paper, we developed the extraction method of resistances using calibrated TCAD simulation. The resistance of the extension region is also partially determined by the formation of a surface accumulation region that forms under the gate in the tail region of the extension profile. This resistance is strongly affected by the abruptness of the extension profile because the steeper the profile is, the shorter this accumulation region will be.
This paper presents a new generalized particle model approach of price and demands dynamic modulating for network bandwidth allocation. The approach transforms the complicated network bandwidth allocation problem into...
详细信息
ISBN:
(纸本)0780389379
This paper presents a new generalized particle model approach of price and demands dynamic modulating for network bandwidth allocation. The approach transforms the complicated network bandwidth allocation problem into the kinematics and dynamics of numerous link particles in force-field. The generalized particle model approach of dynamically modulating price and demands is featured by the powerful processing ability under complex environment, the market mechanism between the demands and service, and better adapting ability to the real time variation of network environment. Finally, we demonstrate the corresponding parallel algorithm and its simulations on bandwidth allocation
A projective image registration algorithm, oriented to consumer devices, is proposed. It exploits a "multi-resolution feature based method" for estimating the projective parameters through a 2D Daubechies di...
详细信息
A projective image registration algorithm, oriented to consumer devices, is proposed. It exploits a "multi-resolution feature based method" for estimating the projective parameters through a 2D Daubechies discrete wavelet transform (DWT). The algorithm has been fully tested with real image sequences acquired by CMOS sensors and compared to other registration techniques. The obtained results highlight the accuracy of the registration parameters.
A real-time simulation tool, in our case a real-time digital simulator (RTDS), gives the opportunity to study the impact of renewable energy in power systems on a real-time base, driven by actual solar and wind data. ...
详细信息
A real-time simulation tool, in our case a real-time digital simulator (RTDS), gives the opportunity to study the impact of renewable energy in power systems on a real-time base, driven by actual solar and wind data. In the first part of this paper, the real-time digital simulator (RTDS) is briefly introduced. The application of this analyzing tool is first demonstrated on a detailed model of a wind energy conversion system (WECS) whereas secondly the application on an autonomous power system is shown. Both applications demonstrate the capabilities of this simulator and the added value for power system analysis
Network storage has many advantages, it does not only provide users with large storage space, but also provides users with sorts of I/O services to satisfy users' requirements, however, it also brings new problems...
详细信息
Network storage has many advantages, it does not only provide users with large storage space, but also provides users with sorts of I/O services to satisfy users' requirements, however, it also brings new problems, such as difficult storage management and low I/O performance. The proxy cache scheme is proposed to solve those problems. The proxy is configured at user network to integrate storage space and provide users with suitable I/O interface, which can simplify clients' storage management. The cache is configured at the proxy to reduce network traffic and improve clients' I/O performance. However, the normal replace algorithms, such as LFU, LRU are not suitable in network storage. According to the I/O performance definition, a cache replace algorithm named least access time is proposed to optimize cache performance. Theory analysis and experiments proved that the scheme was feasible.
The Nearest Neighbor Algorithm (NNA) was proposed to predict the structural class of a protein domain according to its amino acid composition. Results obtained through Resubstitution test, Jackknife test and independe...
详细信息
The Nearest Neighbor Algorithm (NNA) was proposed to predict the structural class of a protein domain according to its amino acid composition. Results obtained through Resubstitution test, Jackknife test and independent dataset test are quite high. Accordingly, the present method, if effectively complemented with the existing prediction methods in this area, may become a powerful tool for predicting the structural class of protein domains
Three typical path planning methods, i.e. artificial potential field, probabilistic path planning and biologically inspired neural network, were introduced. The analysis and comparisons were made in relating to genera...
详细信息
Three typical path planning methods, i.e. artificial potential field, probabilistic path planning and biologically inspired neural network, were introduced. The analysis and comparisons were made in relating to general aspects of the complexity, robustness and adaptability of the methods.
暂无评论