scholarly journals AOIO: Application Oriented I/O Optimization for Buffer Management

Symmetry ◽  
2021 ◽  
Vol 13 (4) ◽  
pp. 573
Author(s):  
Xiaochang Li ◽  
Zhengjun Zhai ◽  
Xin Ye

Emerging scale-out I/O intensive applications are broadly used now, which process a large amount of data in buffer/cache for reorganization or analysis and their performances are greatly affected by the speed of the I/O system. Efficient management scheme of the limited kernel buffer plays a key role in improving I/O system performance, such as caching hinted data for reuse in future, prefetching hinted data, and expelling data not to be accessed again from a buffer, which are called proactive mechanisms in buffer management. However, most of the existing buffer management schemes cannot identify data reference regularities (i.e., sequential or looping patterns) that can benefit proactive mechanisms, and they also cannot perform in the application level for managing specified applications. In this paper, we present an A pplication Oriented I/O Optimization (AOIO) technique automatically benefiting the kernel buffer/cache by exploring the I/O regularities of applications based on program counter technique. In our design, the input/output data and the looping pattern are in strict symmetry. According to AOIO, each application can provide more appropriate predictions to operating system which achieve significantly better accuracy than other buffer management schemes. The trace-driven simulation experiment results show that the hit ratios are improved by an average of 25.9% and the execution times are reduced by as much as 20.2% compared to other schemes for the workloads we used.

2021 ◽  
Vol 13 (0203) ◽  
pp. 63-71
Author(s):  
Itfaq Ahmad Mir ◽  
G. M. Mir ◽  
Mudasir Ahmad Makhdoomi

Security has been one of the most critical concerns for wireless sensor network (WSN) systems in recent years. Application of WSN has faced criticism in several fields due to limited flexibility and security in the long term. This study aimed at reviewing the dynamic key management schemes for Heterogenous WSN systems to determine efficient management schemes. Applicability of notable schemes such as Basic scheme, and hybrid schemes under dynamic key management depends majorly on the central key controller presence


2021 ◽  
Vol 10 (1) ◽  
Author(s):  
Ikuo Kuroiwa

AbstractExtending the technique of unit structure analysis, which was originally developed by Ozaki (J Econ 73(5):720–748, 1980), this study introduces a method of value chain mapping that uses international input–output data and reveals both the upstream and downstream transactions of goods and services, as well as primary input (value added) and final output (final demand) transactions, which emerge along the entire value chain. This method is then applied to the agricultural value chain of three Greater Mekong Subregion countries: Thailand, Vietnam, and Cambodia. The results show that the agricultural value chain has been increasingly internationalized, although there is still room to benefit from participating in global value chains, especially in a country such as Cambodia. Although there are some constraints regarding the methodology and data, the method proves useful in tracing the entire value chain.


Electronics ◽  
2020 ◽  
Vol 9 (2) ◽  
pp. 346 ◽  
Author(s):  
Lili Shen ◽  
Ning Wu ◽  
Gaizhen Yan

By using through-silicon-vias (TSV), three dimension integration technology can stack large memory on the top of cores as a last-level on-chip cache (LLC) to reduce off-chip memory access and enhance system performance. However, the integration of more on-chip caches increases chip power density, which might lead to temperature-related issues in power consumption, reliability, cooling cost, and performance. An effective thermal management scheme is required to ensure the performance and reliability of the system. In this study, a fuzzy-based thermal management scheme (FBTM) is proposed that simultaneously considers cores and stacked caches. The proposed method combines a dynamic cache reconfiguration scheme with a fuzzy-based control policy in a temperature-aware manner. The dynamic cache reconfiguration scheme determines the size of the cache for the processor core according to the application that reaches a substantial amount of power consumption savings. The fuzzy-based control policy is used to change the frequency level of the processor core based on dynamic cache reconfiguration, a process which can further improve the system performance. Experiments show that, compared with other thermal management schemes, the proposed FBTM can achieve, on average, 3 degrees of reduction in temperature and a 41% reduction of leakage energy.


2014 ◽  
Vol 668-669 ◽  
pp. 879-883 ◽  
Author(s):  
Yi Gang Sun ◽  
Li Sun

In order to avoid the complex mathematical modeling and ensure the reliability of avionics system verification, this paper has designed an interfaces emulation and verification platform of avionics system based on QAR data. Platform includes 2 parts: Emulator and Simulator. Simulator generates the flight environmental data which is come from QAR and transforms the data into excitation signal of devices. Emulator emulates the interface features of avionic devices according to the ICD and can be replaced with real devices. By comparing the actual input-output data of devices with QAR theoretical data, this platform can evaluate the running performance of avionic systems or devices and the rationality of the ICD.


Sign in / Sign up

Export Citation Format

Share Document