Integrated data and energy transfer(IDET)enables the electromagnetic waves to transmit wireless energy at the same time of data delivery for lowpower devices.In this paper,an energy harvesting modulation(EHM)assisted ...Integrated data and energy transfer(IDET)enables the electromagnetic waves to transmit wireless energy at the same time of data delivery for lowpower devices.In this paper,an energy harvesting modulation(EHM)assisted multi-user IDET system is studied,where all the received signals at the users are exploited for energy harvesting without the degradation of wireless data transfer(WDT)performance.The joint IDET performance is then analysed theoretically by conceiving a practical time-dependent wireless channel.With the aid of the AO based algorithm,the average effective data rate among users are maximized by ensuring the BER and the wireless energy transfer(WET)performance.Simulation results validate and evaluate the IDET performance of the EHM assisted system,which also demonstrates that the optimal number of user clusters and IDET time slots should be allocated,in order to improve the WET and WDT performance.展开更多
Integrated data and energy transfer(IDET)is capable of simultaneously delivering on-demand data and energy to low-power Internet of Everything(Io E)devices.We propose a multi-carrier IDET transceiver relying on superp...Integrated data and energy transfer(IDET)is capable of simultaneously delivering on-demand data and energy to low-power Internet of Everything(Io E)devices.We propose a multi-carrier IDET transceiver relying on superposition waveforms consisting of multi-sinusoidal signals for wireless energy transfer(WET)and orthogonal-frequency-divisionmultiplexing(OFDM)signals for wireless data transfer(WDT).The outdated channel state information(CSI)in aging channels is employed by the transmitter to shape IDET waveforms.With the constraints of transmission power and WDT requirement,the amplitudes and phases of the IDET waveform at the transmitter and the power splitter at the receiver are jointly optimised for maximising the average directcurrent(DC)among a limited number of transmission frames with the existence of carrier-frequencyoffset(CFO).For the amplitude optimisation,the original non-convex problem can be transformed into a reversed geometric programming problem,then it can be effectively solved with existing tools.As for the phase optimisation,the artificial bee colony(ABC)algorithm is invoked in order to deal with the nonconvexity.Iteration between the amplitude optimisation and phase optimisation yields our joint design.Numerical results demonstrate the advantage of our joint design for the IDET waveform shaping with the existence of the CFO and the outdated CSI.展开更多
Efficient real time data exchange over the Internet plays a crucial role in the successful application of web-based systems. In this paper, a data transfer mechanism over the Internet is proposed for real time web bas...Efficient real time data exchange over the Internet plays a crucial role in the successful application of web-based systems. In this paper, a data transfer mechanism over the Internet is proposed for real time web based applications. The mechanism incorporates the eXtensible Markup Language (XML) and Hierarchical Data Format (HDF) to provide a flexible and efficient data format. Heterogeneous transfer data is classified into light and heavy data, which are stored using XML and HDF respectively; the HDF data format is then mapped to Java Document Object Model (JDOM) objects in XML in the Java environment. These JDOM data objects are sent across computer networks with the support of the Java Remote Method Invocation (RMI) data transfer infrastructure. Client's defined data priority levels are implemented in RMI, which guides a server to transfer data objects at different priorities. A remote monitoring system for an industrial reactor process simulator is used as a case study to illustrate the proposed data transfer mechanism.展开更多
This paper proposes the solution of tasks set required for autonomous robotic group behavior optimization during the mission on a distributed area in a cluttered hazardous terrain.The navigation scheme uses the benefi...This paper proposes the solution of tasks set required for autonomous robotic group behavior optimization during the mission on a distributed area in a cluttered hazardous terrain.The navigation scheme uses the benefits of the original real-time technical vision system(TVS)based on a dynamic triangulation principle.The method uses TVS output data with fuzzy logic rules processing for resolution stabilization.Based on previous researches,the dynamic communication network model is modified to implement the propagation of information with a feedback method for more stable data exchange inside the robotic group.According to the comparative analysis of approximation methods,in this paper authors are proposing to use two-steps post-processing path planning aiming to get a smooth and energy-saving trajectory.The article provides a wide range of studies and computational experiment results for different scenarios for evaluation of common cloud point influence on robotic motion planning.展开更多
Although the existing legal norms and judicial practic-es can provide basic guidance for the right to personal data portabili-ty, it can be concluded that there are obstacles to the realization of this right through e...Although the existing legal norms and judicial practic-es can provide basic guidance for the right to personal data portabili-ty, it can be concluded that there are obstacles to the realization of this right through empirical research of the privacy policies of 66 mobile apps, such as whether they have stipulations on the right to personal data portability, whether they are able to derive copies of personal in-formation automatically, whether there are textual examples, whether ID verification is required, whether the copied documents are encrypt-ed, and whether the scope of personal information involved is consis-tent. This gap in practice, on the one hand, reflects the misunderstand-ing of the right to personal data portability, and on the other hand, is a result of the negative externalities, practical costs and technical lim-itations of the right to personal data portability. Based on rethinking the right to data portability, we can somehow solve practical problems concerning the right to personal data portability through multiple measures such as promoting the fulfillment of this right by legislation, optimizing technology-oriented operations, refining response process mechanisms, and enhancing system interoperability.展开更多
In earthquake early warning systems, real-time shake prediction through wave propagation simulation is a promising approach. Compared with traditional methods, it does not suffer from the inaccurate estimation of sour...In earthquake early warning systems, real-time shake prediction through wave propagation simulation is a promising approach. Compared with traditional methods, it does not suffer from the inaccurate estimation of source parameters. For computation efficiency, wave direction is assumed to propagate on the 2-D surface of the earth in these methods. In fact, since the seismic wave propagates in the 3-D sphere of the earth, the 2-D space modeling of wave direction results in inaccurate wave estimation. In this paper, we propose a 3-D space numerical shake pre- diction method, which simulates the wave propagation in 3-D space using radiative transfer theory, and incorporate data assimilation technique to estimate the distribution of wave energy. 2011 Tohoku earthquake is studied as an example to show the validity of the proposed model. 2-D space model and 3-D space model are compared in this article, and the prediction results show that numerical shake prediction based on 3-D space model can estimate the real-time ground motion precisely, and overprediction is alleviated when using 3-D space model.展开更多
As a kind of parallel storage system, RAID5 has been becoming a popular solution for providing better performance at low cost and without sacrificing much redundant data, its main disadvantage is poor performance. It ...As a kind of parallel storage system, RAID5 has been becoming a popular solution for providing better performance at low cost and without sacrificing much redundant data, its main disadvantage is poor performance. It is a general method to improve RAID5 performance by using cache. However, it often happens that the data is not hit in cache, in this case, the RAID5 performance also will be very poor. The method based on combination of disk I/O operations has been proposed for impriving the I/O response time through reducing the number of low-level operations. According to theoretic analysis and experimental test, we find that RAID5 access time and data transfer rate could be largely improved than conventional method.展开更多
In the network for data transmission using CMT,there are multiple paths to choose,and the time delay of each path is not the same,there is a certain issue packet out-of-order.This article studied and analyzed the pack...In the network for data transmission using CMT,there are multiple paths to choose,and the time delay of each path is not the same,there is a certain issue packet out-of-order.This article studied and analyzed the packet transmission in the sender,for each path assigned specific packet sequence number,in order to reduce the random sequence problem,improve the efficiency of network transmission.In the network for data transmission using CMT,there are multiple paths to choose,and the time delay of each path is not the same,there is a certain issue packet out-of-order.This article studied and analyzed the packet transmission in the sender,for each path assigned specific packet sequence number,in order to reduce the random sequence problem,improve the efficiency of network transmission.展开更多
The dataflow architecture,which is characterized by a lack of a redundant unified control logic,has been shown to have an advantage over the control-flow architecture as it improves the computational performance and p...The dataflow architecture,which is characterized by a lack of a redundant unified control logic,has been shown to have an advantage over the control-flow architecture as it improves the computational performance and power efficiency,especially of applications used in high-performance computing(HPC).Importantly,the high computational efficiency of systems using the dataflow architecture is achieved by allowing program kernels to be activated in a simultaneous manner.Therefore,a proper acknowledgment mechanism is required to distinguish the data that logically belongs to different contexts.Possible solutions include the tagged-token matching mechanism in which the data is sent before acknowledgments are received but retried after rejection,or a handshake mechanism in which the data is only sent after acknowledgments are received.However,these mechanisms are characterized by both inefficient data transfer and increased area cost.Good performance of the dataflow architecture depends on the efficiency of data transfer.In order to optimize the efficiency of data transfer in existing dataflow architectures with a minimal increase in area and power cost,we propose a Look-Ahead Acknowledgment(LAA)mechanism.LAA accelerates the execution flow by speculatively acknowledging ahead without penalties.Our simulation analysis based on a handshake mechanism shows that our LAA increases the average utilization of computational units by 23.9%,with a reduction in the average execution time by 17.4%and an increase in the average power efficiency of dataflow processors by 22.4%.Crucially,our novel approach results in a relatively small increase in the area and power consumption of the on-chip logic of less than 0.9%.In conclusion,the evaluation results suggest that Look-Ahead Acknowledgment is an effective improvement for data transfer in existing dataflow architectures.展开更多
Due to advances in semiconductor techniques, many-core processors have been widely used in high performance computing. However, many applications still cannot be carried out efficiently due to the memory wall, which h...Due to advances in semiconductor techniques, many-core processors have been widely used in high performance computing. However, many applications still cannot be carried out efficiently due to the memory wall, which has become a bottleneck in many-core processors. In this paper, we present a novel heterogeneous many-core processor architecture named deeply fused many-core (DFMC) for high performance computing systems. DFMC integrates management processing ele- ments (MPEs) and computing processing elements (CPEs), which are heterogeneous processor cores for different application features with a unified ISA (instruction set architecture), a unified execution model, and share-memory that supports cache coherence. The DFMC processor can alleviate the memory wall problem by combining a series of cooperative computing techniques of CPEs, such as multi-pattern data stream transfer, efficient register-level communication mechanism, and fast hardware synchronization technique. These techniques are able to improve on-chip data reuse and optimize memory access performance. This paper illustrates an implementation of a full system prototype based on FPGA with four MPEs and 256 CPEs. Our experimental results show that the effect of the cooperative computing techniques of CPEs is significant, with DGEMM (double-precision matrix multiplication) achieving an efficiency of 94%, FFT (fast Fourier transform) obtaining a performance of 207 GFLOPS and FDTD (finite-difference time-domain) obtaining a performance of 27 GFLOPS.展开更多
We experimentally demonstrate a high-speed phosphorescent white light emitting diode (LED) visible light communication (VLC) system without utilizing an optical blue filter. Here, the white light response is equal...We experimentally demonstrate a high-speed phosphorescent white light emitting diode (LED) visible light communication (VLC) system without utilizing an optical blue filter. Here, the white light response is equalized by using the proposed analog equalizers. The 3 dB bandwidth of the VLC link could be extended from 3 to 132 MHz, which allows 330 Mbit/s non-return-to-zero on-off keying (NRZ-OOK) data transmission with a bit error ratio (BER) of 7,2 × 10^-10 and 672 Mbit/s 64-quadrature amplitude modulation (64-QAM) data transmission with a BER of 3.2 × 10^-3. These resultant BERs are less than the forward error correction (FEC) limit of 3.8× 10^-3. The VLC link distance is 1 m using a single 1 W LED. The transmitter and receiver modules are integrated to a compact size. Furthermore, the relationships between the signal performance and illumination level or optical power are investigated and analyzed.展开更多
Lightning strike is a complicated process involving multi-field coupling.In order to investigate the thermal damage mechanism of carbon fiber reinforced composites subject to lightning swept stroke,a complete numerica...Lightning strike is a complicated process involving multi-field coupling.In order to investigate the thermal damage mechanism of carbon fiber reinforced composites subject to lightning swept stroke,a complete numerical method is presented.Numerical model of lightning discharge is established based on Magneto Hydro Dynamics(MHD)and calculated by FLUENT secondary development technology.Considering aerodynamic flow effect,channel formation and evolution process during lightning discharge is analyzed for lightning current waveform A.Thermal-electric Coupling model is presented according to Radial Basis Function(RBF)interpolation theory,which is implemented by compiling program to make lightning current and heat energy inject into composite laminate.Consequently,damage mechanism of composite laminate under lightning swept stroke is studied based on the coupled numerical model and element deletion method.Ablation damage morphology of composite laminate is analyzed to understand plasma expansion and reattachment in arc root.The results show that aerodynamic flow makes the lightning channel move fast and composite laminate is deteriorated due to thermal damage.展开更多
A combination of light-emitting diode(LED) identification and a time-division multiplexing scheme is proposed in this Letter for indoor location-based service. With the scheme, the arrangement of white LED lamps and...A combination of light-emitting diode(LED) identification and a time-division multiplexing scheme is proposed in this Letter for indoor location-based service. With the scheme, the arrangement of white LED lamps and the structure of a data frame are designed to realize high-accuracy indoor positioning and location-based payload data transmission simultaneously. The results of the experiment demonstrate that the indoor positioning accuracy is 10 cm and 2 Mb/s data transmission with high signal quality is realized.展开更多
Visible light wavelength division multiplexing (VWDM) experiment was performed using polymer optical fiber (POF). Lights of two different wavelengths (650 and 530 nm) were sent to a single POF. Red light (650 n...Visible light wavelength division multiplexing (VWDM) experiment was performed using polymer optical fiber (POF). Lights of two different wavelengths (650 and 530 nm) were sent to a single POF. Red light (650 nm) was used for 100-Mb/s full duplex IP data transmission and green light (530 nm) was used for voice signal transmission. Light sources are light-emitting diodes (LEDs). A POF coupler (splitter) and the prisms were employed as multiplexer and demultiplexer, respectively. The channel isolation and insert loss were measured, which are 20.5 and 17.65 dB for 650-nm channel respectively, and 19.16 and 20.55 dB for 530 nm one respectively.展开更多
This paper discusses the application of several techniques involved in the development of the 3D finite element (FE) models of rod and wire continuous rolling process.The FE models are implemented into the FE-program ...This paper discusses the application of several techniques involved in the development of the 3D finite element (FE) models of rod and wire continuous rolling process.The FE models are implemented into the FE-program MSC.Marc and used to investigate the thermal and mechanical behavior of billet during the rolling process.All nonlinear equations included in the models are solved by the static and dynamic procedures,respectively.Data transfer technique is proposed to keep the continuity of simulation results.And the computational time of static procedure is significantly reduced by using a rigid pushing body.In all models,the constant time step method and the auto time step method are respectively used to define time step for the solution of equations.Simulation results of the models with different time step methods are compared.And comparison between calculated values and measured ones of the temperature at the surface of billet shows the validity of the FE models.展开更多
In this paper,the problem of increasing information transfer authenticity is formulated.And to reach a decision,the control methods and algorithms based on the use of statistical and structural information redundancy ...In this paper,the problem of increasing information transfer authenticity is formulated.And to reach a decision,the control methods and algorithms based on the use of statistical and structural information redundancy are presented.It is assumed that the controllable information is submitted as the text element images and it contains redundancy,caused by statistical relations and non-uniformity probability distribution of the transmitted data.The use of statistical redundancy allows to develop the adaptive rules of the authenticity control which take into account non-stationarity properties of image data while transferring the information.The structural redundancy peculiar to the container of image in a data transfer package is used for developing new rules to control the information authenticity on the basis of pattern recognition mechanisms.The techniques offered in this work are used to estimate the authenticity in structure of data transfer packages.The results of comparative analysis for developed methods and algorithms show that their parameters of efficiency are increased by criterion of probability of undetected mistakes,labour input and cost of realization.展开更多
Social Media have increasingly provided data about the movement of people in cities making them useful in understanding the daily life of people in different geographies.Particularly useful for travel analysis is when...Social Media have increasingly provided data about the movement of people in cities making them useful in understanding the daily life of people in different geographies.Particularly useful for travel analysis is when Social Media users allow(voluntarily or not)tracing their movement using geotagged information of their communication with these online platforms.In this paper we use geotagged tweets from 10 cities in the European Union and United States of America to extract spatiotemporal patterns,study differences and commonalities among these cities,and explore the nature of user location recurrence.The analysis here shows the distinction between residents and tourists is fundamental for the development of city-wide models.Identification of repeated rates of location(recurrence)can be used to define activity spaces.Differences and similarities across different geographies emerge from this analysis in terms of local distributions but also in terms of the worldwide reach among the cities explored here.The comparison of the temporal signature between geotagged and non-geotagged tweets also shows similar temporal distributions that capture in essence city rhythms of tweets and activity spaces.展开更多
A substation system requires that communica-tion be transmitted reliably,accurately and in real-time.Aimed at solving problems,e.g.,flow confliction and sensi-tive data transmission,a model of the communication sys-te...A substation system requires that communica-tion be transmitted reliably,accurately and in real-time.Aimed at solving problems,e.g.,flow confliction and sensi-tive data transmission,a model of the communication sys-tem of an agent-based automated substation is introduced.The running principle is discussed in detail and each type of agent is discussed further.At the end,the realization of the agent system applied to the substation is presented.The outcome shows that the communication system of an agent-based automated substation improves the accuracy and reliability of the data transfer and presents it in real-time.展开更多
The present study introduces a Gauss-Seidel fluid-structure interaction(FSI)method including the flow solver,structural statics solver and a fast data transfer technique,for the research of structural deformation and ...The present study introduces a Gauss-Seidel fluid-structure interaction(FSI)method including the flow solver,structural statics solver and a fast data transfer technique,for the research of structural deformation and flow field variation of rotor blades under the combined influence of steady aerodynamic and centrifugal forces.The FSI method is illustrated and validated by the static aeroelasticity analysis of a transonic compressor rotor blade,NASA Rotor 37.An improved local interpolation with data reduction(LIWDR)algorithm is introduced for fast data transfer on the fluid-solid interface of blade.The results of FSI calculation of NASA Rotor 37 show that when compared with the radial basis function(RBF)based interpolation algorithm,LIWDR meets the interpolation accuracy requirements,while the calculation cost can be greatly improved.The data transmission time is only about 1%of that of RBF.Moreover,the iteration step of steady flow computation within one single FSI has little impact on the converged aerodynamic and structural results.The aerodynamic load-caused deformation accounts for nearly 50%of the total.The effects of blade deformation on the variations of aerodynamic performance are given,demonstrating that when static aeroelasticity is taken into account,the choke mass flow rate increases and the peak adiabatic efficiency slightly decreases.The impact mechanisms on performance variations are presented in detail.展开更多
基金supported in part by the MOST Major Research and Development Project(Grant No.2021YFB2900204)the National Natural Science Foundation of China(NSFC)(Grant No.62201123,No.62132004,No.61971102)+3 种基金China Postdoctoral Science Foundation(Grant No.2022TQ0056)in part by the financial support of the Sichuan Science and Technology Program(Grant No.2022YFH0022)Sichuan Major R&D Project(Grant No.22QYCX0168)the Municipal Government of Quzhou(Grant No.2022D031)。
文摘Integrated data and energy transfer(IDET)enables the electromagnetic waves to transmit wireless energy at the same time of data delivery for lowpower devices.In this paper,an energy harvesting modulation(EHM)assisted multi-user IDET system is studied,where all the received signals at the users are exploited for energy harvesting without the degradation of wireless data transfer(WDT)performance.The joint IDET performance is then analysed theoretically by conceiving a practical time-dependent wireless channel.With the aid of the AO based algorithm,the average effective data rate among users are maximized by ensuring the BER and the wireless energy transfer(WET)performance.Simulation results validate and evaluate the IDET performance of the EHM assisted system,which also demonstrates that the optimal number of user clusters and IDET time slots should be allocated,in order to improve the WET and WDT performance.
基金financial support of Natural Science Foundation of China(No.61971102,62132004)MOST Major Research and Development Project(No.2021YFB2900204)+1 种基金Sichuan Science and Technology Program(No.2022YFH0022)Key Research and Development Program of Zhejiang Province(No.2022C01093)。
文摘Integrated data and energy transfer(IDET)is capable of simultaneously delivering on-demand data and energy to low-power Internet of Everything(Io E)devices.We propose a multi-carrier IDET transceiver relying on superposition waveforms consisting of multi-sinusoidal signals for wireless energy transfer(WET)and orthogonal-frequency-divisionmultiplexing(OFDM)signals for wireless data transfer(WDT).The outdated channel state information(CSI)in aging channels is employed by the transmitter to shape IDET waveforms.With the constraints of transmission power and WDT requirement,the amplitudes and phases of the IDET waveform at the transmitter and the power splitter at the receiver are jointly optimised for maximising the average directcurrent(DC)among a limited number of transmission frames with the existence of carrier-frequencyoffset(CFO).For the amplitude optimisation,the original non-convex problem can be transformed into a reversed geometric programming problem,then it can be effectively solved with existing tools.As for the phase optimisation,the artificial bee colony(ABC)algorithm is invoked in order to deal with the nonconvexity.Iteration between the amplitude optimisation and phase optimisation yields our joint design.Numerical results demonstrate the advantage of our joint design for the IDET waveform shaping with the existence of the CFO and the outdated CSI.
文摘Efficient real time data exchange over the Internet plays a crucial role in the successful application of web-based systems. In this paper, a data transfer mechanism over the Internet is proposed for real time web based applications. The mechanism incorporates the eXtensible Markup Language (XML) and Hierarchical Data Format (HDF) to provide a flexible and efficient data format. Heterogeneous transfer data is classified into light and heavy data, which are stored using XML and HDF respectively; the HDF data format is then mapped to Java Document Object Model (JDOM) objects in XML in the Java environment. These JDOM data objects are sent across computer networks with the support of the Java Remote Method Invocation (RMI) data transfer infrastructure. Client's defined data priority levels are implemented in RMI, which guides a server to transfer data objects at different priorities. A remote monitoring system for an industrial reactor process simulator is used as a case study to illustrate the proposed data transfer mechanism.
文摘This paper proposes the solution of tasks set required for autonomous robotic group behavior optimization during the mission on a distributed area in a cluttered hazardous terrain.The navigation scheme uses the benefits of the original real-time technical vision system(TVS)based on a dynamic triangulation principle.The method uses TVS output data with fuzzy logic rules processing for resolution stabilization.Based on previous researches,the dynamic communication network model is modified to implement the propagation of information with a feedback method for more stable data exchange inside the robotic group.According to the comparative analysis of approximation methods,in this paper authors are proposing to use two-steps post-processing path planning aiming to get a smooth and energy-saving trajectory.The article provides a wide range of studies and computational experiment results for different scenarios for evaluation of common cloud point influence on robotic motion planning.
基金the current result of the “research on the basic category system of contemporary Chinese digital law” (23&ZD154), a major project of the National Social Science Fund of China.
文摘Although the existing legal norms and judicial practic-es can provide basic guidance for the right to personal data portabili-ty, it can be concluded that there are obstacles to the realization of this right through empirical research of the privacy policies of 66 mobile apps, such as whether they have stipulations on the right to personal data portability, whether they are able to derive copies of personal in-formation automatically, whether there are textual examples, whether ID verification is required, whether the copied documents are encrypt-ed, and whether the scope of personal information involved is consis-tent. This gap in practice, on the one hand, reflects the misunderstand-ing of the right to personal data portability, and on the other hand, is a result of the negative externalities, practical costs and technical lim-itations of the right to personal data portability. Based on rethinking the right to data portability, we can somehow solve practical problems concerning the right to personal data portability through multiple measures such as promoting the fulfillment of this right by legislation, optimizing technology-oriented operations, refining response process mechanisms, and enhancing system interoperability.
基金supported by the National Key Technology Research and Development Program of the Ministry of Science and Technology of China(grant No.2014BAK03B02)Science for Earthquake Resilience(grant Nos XH16021 and XH16022Y)
文摘In earthquake early warning systems, real-time shake prediction through wave propagation simulation is a promising approach. Compared with traditional methods, it does not suffer from the inaccurate estimation of source parameters. For computation efficiency, wave direction is assumed to propagate on the 2-D surface of the earth in these methods. In fact, since the seismic wave propagates in the 3-D sphere of the earth, the 2-D space modeling of wave direction results in inaccurate wave estimation. In this paper, we propose a 3-D space numerical shake pre- diction method, which simulates the wave propagation in 3-D space using radiative transfer theory, and incorporate data assimilation technique to estimate the distribution of wave energy. 2011 Tohoku earthquake is studied as an example to show the validity of the proposed model. 2-D space model and 3-D space model are compared in this article, and the prediction results show that numerical shake prediction based on 3-D space model can estimate the real-time ground motion precisely, and overprediction is alleviated when using 3-D space model.
基金Supported by the National Natural Science Foundation of China under grant6 97730 46 and(6 99730 17) and Defense Advanced Resea
文摘As a kind of parallel storage system, RAID5 has been becoming a popular solution for providing better performance at low cost and without sacrificing much redundant data, its main disadvantage is poor performance. It is a general method to improve RAID5 performance by using cache. However, it often happens that the data is not hit in cache, in this case, the RAID5 performance also will be very poor. The method based on combination of disk I/O operations has been proposed for impriving the I/O response time through reducing the number of low-level operations. According to theoretic analysis and experimental test, we find that RAID5 access time and data transfer rate could be largely improved than conventional method.
文摘In the network for data transmission using CMT,there are multiple paths to choose,and the time delay of each path is not the same,there is a certain issue packet out-of-order.This article studied and analyzed the packet transmission in the sender,for each path assigned specific packet sequence number,in order to reduce the random sequence problem,improve the efficiency of network transmission.In the network for data transmission using CMT,there are multiple paths to choose,and the time delay of each path is not the same,there is a certain issue packet out-of-order.This article studied and analyzed the packet transmission in the sender,for each path assigned specific packet sequence number,in order to reduce the random sequence problem,improve the efficiency of network transmission.
基金This work was supported by the Project of the State Grid Corporation of China in 2020"Integration Technology Research and Prototype Development for High End Controller Chip"under Grant No.5700-202041264A-0-0-00.
文摘The dataflow architecture,which is characterized by a lack of a redundant unified control logic,has been shown to have an advantage over the control-flow architecture as it improves the computational performance and power efficiency,especially of applications used in high-performance computing(HPC).Importantly,the high computational efficiency of systems using the dataflow architecture is achieved by allowing program kernels to be activated in a simultaneous manner.Therefore,a proper acknowledgment mechanism is required to distinguish the data that logically belongs to different contexts.Possible solutions include the tagged-token matching mechanism in which the data is sent before acknowledgments are received but retried after rejection,or a handshake mechanism in which the data is only sent after acknowledgments are received.However,these mechanisms are characterized by both inefficient data transfer and increased area cost.Good performance of the dataflow architecture depends on the efficiency of data transfer.In order to optimize the efficiency of data transfer in existing dataflow architectures with a minimal increase in area and power cost,we propose a Look-Ahead Acknowledgment(LAA)mechanism.LAA accelerates the execution flow by speculatively acknowledging ahead without penalties.Our simulation analysis based on a handshake mechanism shows that our LAA increases the average utilization of computational units by 23.9%,with a reduction in the average execution time by 17.4%and an increase in the average power efficiency of dataflow processors by 22.4%.Crucially,our novel approach results in a relatively small increase in the area and power consumption of the on-chip logic of less than 0.9%.In conclusion,the evaluation results suggest that Look-Ahead Acknowledgment is an effective improvement for data transfer in existing dataflow architectures.
文摘Due to advances in semiconductor techniques, many-core processors have been widely used in high performance computing. However, many applications still cannot be carried out efficiently due to the memory wall, which has become a bottleneck in many-core processors. In this paper, we present a novel heterogeneous many-core processor architecture named deeply fused many-core (DFMC) for high performance computing systems. DFMC integrates management processing ele- ments (MPEs) and computing processing elements (CPEs), which are heterogeneous processor cores for different application features with a unified ISA (instruction set architecture), a unified execution model, and share-memory that supports cache coherence. The DFMC processor can alleviate the memory wall problem by combining a series of cooperative computing techniques of CPEs, such as multi-pattern data stream transfer, efficient register-level communication mechanism, and fast hardware synchronization technique. These techniques are able to improve on-chip data reuse and optimize memory access performance. This paper illustrates an implementation of a full system prototype based on FPGA with four MPEs and 256 CPEs. Our experimental results show that the effect of the cooperative computing techniques of CPEs is significant, with DGEMM (double-precision matrix multiplication) achieving an efficiency of 94%, FFT (fast Fourier transform) obtaining a performance of 207 GFLOPS and FDTD (finite-difference time-domain) obtaining a performance of 27 GFLOPS.
基金supported by the National 973Program of China(No.2013CB329205)the National 863Program of China(Nos.2013AA013602,2013AA013603,2013AA03A104,and 2013AA031903)+1 种基金the National Natural Science Foundation of China(Nos.61036002 and61178051)the Beijing Municipal Science and Technology Project(No.Z141100001414004)
文摘We experimentally demonstrate a high-speed phosphorescent white light emitting diode (LED) visible light communication (VLC) system without utilizing an optical blue filter. Here, the white light response is equalized by using the proposed analog equalizers. The 3 dB bandwidth of the VLC link could be extended from 3 to 132 MHz, which allows 330 Mbit/s non-return-to-zero on-off keying (NRZ-OOK) data transmission with a bit error ratio (BER) of 7,2 × 10^-10 and 672 Mbit/s 64-quadrature amplitude modulation (64-QAM) data transmission with a BER of 3.2 × 10^-3. These resultant BERs are less than the forward error correction (FEC) limit of 3.8× 10^-3. The VLC link distance is 1 m using a single 1 W LED. The transmitter and receiver modules are integrated to a compact size. Furthermore, the relationships between the signal performance and illumination level or optical power are investigated and analyzed.
基金supported by the National Natural Science Foundation of China(No.51875463)the Natural Science Basic Research Plain in Shaanxi Province of China(No.2018JM1001)the Research Funds of Shanxi Key Laboratory of Electromagnetic Protection Material and Technology(No.33ZD1807KF001C)。
文摘Lightning strike is a complicated process involving multi-field coupling.In order to investigate the thermal damage mechanism of carbon fiber reinforced composites subject to lightning swept stroke,a complete numerical method is presented.Numerical model of lightning discharge is established based on Magneto Hydro Dynamics(MHD)and calculated by FLUENT secondary development technology.Considering aerodynamic flow effect,channel formation and evolution process during lightning discharge is analyzed for lightning current waveform A.Thermal-electric Coupling model is presented according to Radial Basis Function(RBF)interpolation theory,which is implemented by compiling program to make lightning current and heat energy inject into composite laminate.Consequently,damage mechanism of composite laminate under lightning swept stroke is studied based on the coupled numerical model and element deletion method.Ablation damage morphology of composite laminate is analyzed to understand plasma expansion and reattachment in arc root.The results show that aerodynamic flow makes the lightning channel move fast and composite laminate is deteriorated due to thermal damage.
基金supported by the National Natural Science Foundation of China(No.61475094)the National 973 Program of China(No.2013CB329202)
文摘A combination of light-emitting diode(LED) identification and a time-division multiplexing scheme is proposed in this Letter for indoor location-based service. With the scheme, the arrangement of white LED lamps and the structure of a data frame are designed to realize high-accuracy indoor positioning and location-based payload data transmission simultaneously. The results of the experiment demonstrate that the indoor positioning accuracy is 10 cm and 2 Mb/s data transmission with high signal quality is realized.
基金This work was supported by the National Natural ScienceFoundation of China (No. 90201013) and the ProvincialNatural Science Foundation of Anhui (No. 03042402).
文摘Visible light wavelength division multiplexing (VWDM) experiment was performed using polymer optical fiber (POF). Lights of two different wavelengths (650 and 530 nm) were sent to a single POF. Red light (650 nm) was used for 100-Mb/s full duplex IP data transmission and green light (530 nm) was used for voice signal transmission. Light sources are light-emitting diodes (LEDs). A POF coupler (splitter) and the prisms were employed as multiplexer and demultiplexer, respectively. The channel isolation and insert loss were measured, which are 20.5 and 17.65 dB for 650-nm channel respectively, and 19.16 and 20.55 dB for 530 nm one respectively.
基金the financial support received from the Dalian City Government and the Dongbei Special Steel Group Corpo-ration
文摘This paper discusses the application of several techniques involved in the development of the 3D finite element (FE) models of rod and wire continuous rolling process.The FE models are implemented into the FE-program MSC.Marc and used to investigate the thermal and mechanical behavior of billet during the rolling process.All nonlinear equations included in the models are solved by the static and dynamic procedures,respectively.Data transfer technique is proposed to keep the continuity of simulation results.And the computational time of static procedure is significantly reduced by using a rigid pushing body.In all models,the constant time step method and the auto time step method are respectively used to define time step for the solution of equations.Simulation results of the models with different time step methods are compared.And comparison between calculated values and measured ones of the temperature at the surface of billet shows the validity of the FE models.
文摘In this paper,the problem of increasing information transfer authenticity is formulated.And to reach a decision,the control methods and algorithms based on the use of statistical and structural information redundancy are presented.It is assumed that the controllable information is submitted as the text element images and it contains redundancy,caused by statistical relations and non-uniformity probability distribution of the transmitted data.The use of statistical redundancy allows to develop the adaptive rules of the authenticity control which take into account non-stationarity properties of image data while transferring the information.The structural redundancy peculiar to the container of image in a data transfer package is used for developing new rules to control the information authenticity on the basis of pattern recognition mechanisms.The techniques offered in this work are used to estimate the authenticity in structure of data transfer packages.The results of comparative analysis for developed methods and algorithms show that their parameters of efficiency are increased by criterion of probability of undetected mistakes,labour input and cost of realization.
基金partially funded by the DAAD Project(No.57474280)Verkehr-SuTra:Technologies for Sustainable Transportation,within the Programme:A New Passage to India—Deutsch-Indische Hochschulkooperationen ab 2019the German Federal Ministry of Education and Research,Bundesministerium für Bildung und Forschung(BMBF),project FuturTrans:Indo-German Collaborative Research Center on Intelligent Transportation Systemsby the European Union's Horizon 2020 research and innovation programme under grant agreement No.815069(project MOMENTUM(Modelling Emerging Transport Solutions for Urban Mobility)).
文摘Social Media have increasingly provided data about the movement of people in cities making them useful in understanding the daily life of people in different geographies.Particularly useful for travel analysis is when Social Media users allow(voluntarily or not)tracing their movement using geotagged information of their communication with these online platforms.In this paper we use geotagged tweets from 10 cities in the European Union and United States of America to extract spatiotemporal patterns,study differences and commonalities among these cities,and explore the nature of user location recurrence.The analysis here shows the distinction between residents and tourists is fundamental for the development of city-wide models.Identification of repeated rates of location(recurrence)can be used to define activity spaces.Differences and similarities across different geographies emerge from this analysis in terms of local distributions but also in terms of the worldwide reach among the cities explored here.The comparison of the temporal signature between geotagged and non-geotagged tweets also shows similar temporal distributions that capture in essence city rhythms of tweets and activity spaces.
文摘A substation system requires that communica-tion be transmitted reliably,accurately and in real-time.Aimed at solving problems,e.g.,flow confliction and sensi-tive data transmission,a model of the communication sys-tem of an agent-based automated substation is introduced.The running principle is discussed in detail and each type of agent is discussed further.At the end,the realization of the agent system applied to the substation is presented.The outcome shows that the communication system of an agent-based automated substation improves the accuracy and reliability of the data transfer and presents it in real-time.
基金the Zhejiang Provincial Natural Science Foundation of China(Grant no.LXR22E060001)the National Science and Technology Major Project of China(Grant no.2017-II-0006-0020)the National Natural Science Foundation of China(Grant no.92152202).
文摘The present study introduces a Gauss-Seidel fluid-structure interaction(FSI)method including the flow solver,structural statics solver and a fast data transfer technique,for the research of structural deformation and flow field variation of rotor blades under the combined influence of steady aerodynamic and centrifugal forces.The FSI method is illustrated and validated by the static aeroelasticity analysis of a transonic compressor rotor blade,NASA Rotor 37.An improved local interpolation with data reduction(LIWDR)algorithm is introduced for fast data transfer on the fluid-solid interface of blade.The results of FSI calculation of NASA Rotor 37 show that when compared with the radial basis function(RBF)based interpolation algorithm,LIWDR meets the interpolation accuracy requirements,while the calculation cost can be greatly improved.The data transmission time is only about 1%of that of RBF.Moreover,the iteration step of steady flow computation within one single FSI has little impact on the converged aerodynamic and structural results.The aerodynamic load-caused deformation accounts for nearly 50%of the total.The effects of blade deformation on the variations of aerodynamic performance are given,demonstrating that when static aeroelasticity is taken into account,the choke mass flow rate increases and the peak adiabatic efficiency slightly decreases.The impact mechanisms on performance variations are presented in detail.