Spelling suggestions: "subject:"analytical models""
1 |
An Analysis of NoCs in FPGAsBinesh, Marvasti Mohammadreza 10 1900 (has links)
<p>Accurate analytic models for the area, delay and power of NoC routers realized in FPGA technology are presented. Several router designs are explored, including the demultiplexer-multiplexer design, the broadcast-and-select design, a RAM-based design, and pipelined designs with arbitrary amounts of buffering. The analytic models are compared with extensive experimental results, and shown to be very accurate. Using these router models, accurate analytic models for the area, delay and power of graph-based and hypergraph-based NoC topologies realized in FPGAs are presented, including 2D Mesh, Torus, Binary Hypercube (BHC), Generalized Hypercube (GHC), and Hypermesh. Three traffic patterns are considered, (a) Random-Uniform traffic patterns, (b) traffic patterns in Bitonic sorting algorithm, and (c) traffic patterns in FFT parallel algorithm.</p> <p>The analytic models for NoCs are compared to extensive experimental results and shown to be very accurate, typically within 10%. Using these analytical models, architectural choices such as NoC topology, buffer sizing, crossbar switch design, and degree of pipelining can be explored analytically early in the design-space exploration process. It has been observed that an efficient and accurate early design process results in lower system costs, and in order to come up with feasible designs, early design-space exploration tools are essential.</p> <p>Early design-space exploration tools using analytic models are ideal, as they do not require the generation of detailed logic design in a hardware description language such as VHDL or Verilog. However, to date there are no analytic models for NoCs in FPGAs. This thesis addresses this problem. According to our analytic power models, in an FPGA environment with equal bisection bandwidth the 2D BHC outperforms the 2D Mesh and Torus significantly. For example under equivalent bisection bandwidth, when performing FFT computations in an FPGA environment the 2D BHC consumes 8% of the power of a 2D Mesh, and 15% of the power of a 2D Torus.</p> <p>Hypermeshes are based on the concept of hypergraphs, which consist of a set of nodes and a set of hyperedges, where the hyperedges represent low-latency switches. Under equivalent bisection bandwidth, 2D Hypermesh NoCs outperform the 2D Mesh and Torus significantly. To improve the performance of the Hypermesh, two new hyperedge designs are proposed. We propose the energy-area product as a design metric to compare the NoCs. The energy-area product reflects both the cost and performance design metrics. Our analysis indicates that the 2D Hypermesh NoCs generally have considerably lower area, energy, and energy-area product compared to the 2D Hypercubes. Under equal bisection bandwidth, the area usage of the 2D Hypermesh using the broadcast-and-select designs as the hyperedges uses 30% of the area of the GHC and 42% of the area of the BHC. The energy-area product of the 2D Hypermesh under the FFT algorithm is 9% of the GHC, and 29% of the BHC.</p> / Doctor of Philosophy (PhD)
|
2 |
Fidelidade, álibi ou traição: ressignificação e perspectivas sobre o comportamento decisório do STF / Faithfulness, álibi or treason: perspectives on judicial behavior and its resignification.Avelino, Pedro Buck 13 April 2015 (has links)
A tese apresenta modelo de classificação de ações judiciais categorias e de ressignificação escalas da decisão judicial em categoria dicotômica (Liberal e Garantista), calcada em modelo teórico de definição da direção do resultado judicial institucional (decisão) e individual (voto) . Testa o modelo em face de decisões do STF no período de 1988 e 1989, em sede de controle de constitucionalidade (ADI). Apresenta as inferências extraíveis dos dados quantitativos, sob 03 perspectivas fidelidade, álibi e traição. / This research presents model and methodology for classifying judicial cases, according to categories, and its opinions, through scales, in two behavioral patterns (Liberal and Garantista), which summarize the decision and vote directions. The model is tested against a specific set of STFs judicial opinions from 1988 and 1989 (direct judicial review). Possible inferences are extracted from the quantitative results produced, using a threefold perspective, labeled as faithfulness, alibi and treason. Concludes that the model can be used by different analytic models, such as Legal, Attitudinal and Formal Theory.
|
3 |
Fidelidade, álibi ou traição: ressignificação e perspectivas sobre o comportamento decisório do STF / Faithfulness, álibi or treason: perspectives on judicial behavior and its resignification.Pedro Buck Avelino 13 April 2015 (has links)
A tese apresenta modelo de classificação de ações judiciais categorias e de ressignificação escalas da decisão judicial em categoria dicotômica (Liberal e Garantista), calcada em modelo teórico de definição da direção do resultado judicial institucional (decisão) e individual (voto) . Testa o modelo em face de decisões do STF no período de 1988 e 1989, em sede de controle de constitucionalidade (ADI). Apresenta as inferências extraíveis dos dados quantitativos, sob 03 perspectivas fidelidade, álibi e traição. / This research presents model and methodology for classifying judicial cases, according to categories, and its opinions, through scales, in two behavioral patterns (Liberal and Garantista), which summarize the decision and vote directions. The model is tested against a specific set of STFs judicial opinions from 1988 and 1989 (direct judicial review). Possible inferences are extracted from the quantitative results produced, using a threefold perspective, labeled as faithfulness, alibi and treason. Concludes that the model can be used by different analytic models, such as Legal, Attitudinal and Formal Theory.
|
4 |
Modelos par análise de disponibilidade em uma plataforma de mobile backend as a serviceCOSTA, Igor de Oliveira 31 August 2015 (has links)
Submitted by Fabio Sobreira Campos da Costa (fabio.sobreira@ufpe.br) on 2016-03-15T13:05:35Z
No. of bitstreams: 2
license_rdf: 1232 bytes, checksum: 66e71c371cc565284e70f40736c94386 (MD5)
Disserta__o_Igor_Costa__Copy_(1).pdf: 11507063 bytes, checksum: f631fc6dd87314e89ea560a118301875 (MD5) / Made available in DSpace on 2016-03-15T13:05:35Z (GMT). No. of bitstreams: 2
license_rdf: 1232 bytes, checksum: 66e71c371cc565284e70f40736c94386 (MD5)
Disserta__o_Igor_Costa__Copy_(1).pdf: 11507063 bytes, checksum: f631fc6dd87314e89ea560a118301875 (MD5)
Previous issue date: 2015-08-31 / As limitações da computação móvel abrem caminhos para utilizar recursos de computação
em nuvem voltadas à dispositivos móveis, sendo este o principal objetivo da Mobile Cloud
Computing (MCC). Questões como armazenamento e processamento podem afetar a disponibilidade
de um serviço no dispositivo móvel, assim, para minimizar esses problemas é possível
o particionamento da aplicação em frontend e backend. Os serviços de nuvem auxiliam esse
processo com a utilização de ambientes Mobile Backend-as-a-Service (MBaaS), que permitem os
desenvolvedores conectar o backend de suas aplicações para o armazenamento em nuvem. Uma
plataforma de MBaaS oferece um serviço de sincronização completa para aplicações móveis.
Uma vez que os dados armazenados no dispositivo móvel estão sincronizados com os centros
de dados distribuídos, a disponibilidade do sistema no lado servidor é um atributo fundamental
que requer investigação, pois sistemas computacionais tendem a falhar. As falhas podem ocorrer
em hardwares, softwares e meios de conexão, acarretando assim, em prejuízos financeiros
e comprometendo a credibilidade das empresas provedoras do serviço. Os administradores
necessitam de mecanismos para estimar a disponibilidade de seus sistemas, podendo definir
Service Level Agreement (SLA) com mais propriedade. Assim, modelos analíticos podem ser
utilizados para avaliar a disponibilidade destes tipos de ambientes, bem como auxiliar a mitigar
o downtime, aumentando a disponibilidade do serviço. Este trabalho propõe modelos analíticos
para avaliar a disponibilidade desses ambientes. Para tanto, foi adotada uma metodologia: primeiramente
definiu-se a arquitetura básica do serviço; a qual foi modelada a partir de um modelo
hierárquico, composto de diagramas de blocos de confiabilidade (RBD) e cadeias de Markov de
tempo contínuo (CTMC) e validado através de um testbed de injeção de falhas e reparos em um
ambiente real. Baseado no modelo de serviço proposto, foi efetuada a análise de sensibilidade,
que identificou o sistema como componente crítico. A partir disto, foram sugeridos modelos
hierárquicos que representem o ambiente de nuvem, e com base neste ambiente, através da
técnica de análise de sensibilidade, foram propostas quatro arquiteturas, sendo estas avaliados em
termos de disponibilidade e downtime anual. Os resultados demonstram que a implementação de
um processo de recuperação automática sobre o componente de software, Java Virtual Machine,
reduz o downtime anual na arquitetura básica em cerca de 10%, bem como é possível observar
que no ambiente de nuvem utilizando o mecanismo de redundância warm-standby nos nós e
no frontend apresenta efetiva melhora na disponibilidade. Desta forma, a presente pesquisa
pode orientar os administradores de sistemas MBaaS no planejamento de suas políticas de
manutenção. / The mobile computer restrictions propose new ways to use cloud computing resources
aimed at mobile devices, this is the Mobile Cloud Computing (MCC) primary goal. Issues
such as storage and processing can impact the service availability on the mobile device. With
the reducing purpose, these questions are its possible divide the application into two pieces,
frontend, and backend. The cloud services assist this process with the Mobile Backend-as-a-
Service (MBaaS) use. This tool allows the developers connect yours application backend to
cloud storage. The MBaaS OpenMobster platform offers complete synchronization service
to mobile applications. Since the data stored on mobile was synchronized distributed data
center, the server’s system availability is an essential attribute and request attention, because
computer systems will sometimes fail. The failures can happen on components variety as
hardware, software and connections, causing financial losses and reliability compromising of
the companies, which offer this services. The administrators need tools to project the system
availability, with this they can define the SLA with more assurance. Analytic models can be used
to availability evaluate in this environment and mitigate the downtime risk, this improves the
service availability. This work primary goal is proposed analytic models to availability evaluated
in these environments. It was adopted a methodology as follow: First, define the base service
architecture. It was modeled by use a hierarchical model, using a reliability block diagram
(RBD) and continuous-time Markov chain (CTMC). The validation considers a fault injection
testbed and repairs on real environment. Considering the model proposed, it was done sensitivity
analysis, these results present the system as a critical component. This analysis was proposed
hierarchical models to represents cloud environment. On these sensibility analysis, a background
was offered four scenarios. The scenarios were evaluated to determine the availability and annual
downtime. The results show that the an automatic recovery implementation process on the
software component, Java Virtual Machine, decrease the annual downtime on base architecture
to 10%. The results present the availability improvement when adopted redundancy strategy
as warm standby on a cloud environment. This way, the work can guide the MBaaS system
administrators in planning their maintenance policies.
|
5 |
Generic inhibitors to conserve and transform traditional technologies : the case of EthiopiaNegassi Yosseph G-Egziabher 12 1900 (has links)
Traditional technologies are revelations of knowledge, skill, and wisdom of ancestors that have been used to facilitate and enhance the performance of socio-economic activities, overcome environmental challenges, and magnify symbolic presentations of cultural and spiritual engagements. Traditional technologies are still practiced in many communities despite the strides made in the advancement of modern technologies. The socio-economic significance of traditional technologies in the context of Ethiopia is even more profound. There are hardly social, economic, and spiritual activities that are not, directly or indirectly, influenced by the application of traditional technologies. The irony is, however, they are not appreciated and conserved in spite that they have been proving a sustained significance across generations while, to the contrary, modern technologies are even staggering to outlive the stage of product introduction. Although still proving to be useful, traditional technologies have been marginalized as if they are symbols of backwardness belonging to the past as irrelevant to the modern day settings. It was, therefore, the urge to look into this dilemma that became the basis for the initiation to conduct a research on the captioned topic. The study has endeavored to address how traditional technologies, specifically that of Ethiopia, are able to sustain contrary to extant theoretical predictions of technologies, and investigate why they have been deterred from getting the conservation and transformation they deserve in spite of the socio-economic significant role they have continued to play as capitulated in the statement of the problem.
In addressing the statement of the problem, the paradigm of the world outlook within which the research was situated is found to be related to the Critical Theory paradigm. As a result, a qualitative research methodology based on a case study design was framed and a longitudinal field study on the sampled cases was conducted. The data generated from the study were
ix
filtered, coded, organized, categorized, and ultimately analyzed and interpreted using apparent analytic models until saturated and triangulated findings were established. Accordingly, the core constructs that has been defining the fate of traditional technologies were induced and their impact in deterring or promoting the conservation and transformation of traditional technologies were synthesized. Based on the outcomes of data analysis and interpretation, appropriate methods of reshaping the societal attitude and orientation in terms of conserving and transforming traditional practices are proposed as induced recommendations ultimately requiring a timely intervention. / Business Management / D. Litt. et Phil. (Business Leadership)
|
Page generated in 0.0441 seconds