Showing 1 - 10 results of 10 for search 'CPU modes', query time: 0.04s Refine Results
  1. 1
  2. 2

    High-Performance Multi-Object Tracking for Autonomous Driving in Urban Scenarios With Heterogeneous Embedded Boards by Alessio Medaglini, Biagio Peccerillo, Sandro Bartolini

    Published 2025-01-01
    “…We compare our solution against a highly optimized multi-core version and show that we are able to trigger significant performance speedups (up to <inline-formula> <tex-math notation="LaTeX">$7.19\times $ </tex-math></inline-formula>) in all power-modes, sometimes even surpassing the CPU reference with the GPU in a lower-power operating mode.…”
    Get full text
    Article
  3. 3

    Architecture design of re-configurable convolutional neural network on software definition by Peijie LI, Li ZHANG, Yunfei XIA, Liming XU

    Published 2021-06-01
    “…In order to meet the flexibility and efficiency requirement in convolutional neural network (CNN), an architecture of re-configurable CNN based on software definition was proposed.In the architecture, the process of CNN could be normalized and the operation mode could be accelerated.The calculation pipeline was implemented by using dual bus architecture based on AHB and AXI protocols.By software definition, the proposed architecture, which could realize the real-time processing of data among different CNN structure, was implemented on FPGA.The result shows that at least 2 CNN models can be software defined on the FPGA circuit.The output measures an operation processing capacity of 10 times that of CPU, and an operation energy consumption ratio of 2 times that of GPU.…”
    Get full text
    Article
  4. 4

    Modeling the interrupt transmission process of SR-IOV cryptographic device by Lei SUN, Shuai LI, Songhui GUO

    Published 2019-02-01
    “…The SR-IOV cryptographic device generates a large number of I/O interrupts when performing operations in a virtualized environment,causing the CPU to frequently switch between the Root mode and the Non-Root mode,which brings huge system performance overhead and affects the operational performance of SR-IOV cryptographic device.Aiming at this problem,the I/O interrupt of SR-IOV cryptographic device was analyzed,and a M/M/1 queuing model according to the cryptographic task first-come-first-served rules was constructed.What’s more,the key factors affecting system performance were analyzed,and the validity of the model via simulation and experiment was verified,and finally the system performance was tested.The results show that the model can quantitatively analyze the impact of the interrupt frequency on the interrupt response time and system queue length.…”
    Get full text
    Article
  5. 5

    Research on flood defense mechanism of SDN control layer:detection and mitigation by Qizhao ZHOU, Junqing YU, Dong LI

    Published 2021-11-01
    “…Aiming at the problem of spoofing flood defense in the control layer of SDN, a controller defense mechanism (CDM)was proposed, including a flood detection mechanism based on key features multi-classification and a flood mitigation mechanism based on SAVI.The flood feature analysis module of the control layer was designed for flood detection, and boosting algorithm was used to overlay each feature weak classifier to form an enhanced classifier, which can achieve more accurate classification spoofing flooding attack effect by continuously reducing the residual in the calculation.In CDM, a flood mitigation mechanism based on SAVI was deployed to realize flood mitigation, which performed flood packet path filtering based on binding-verification mode, and updated the flood features of access layer switches with dynamic polling mode to reduce redundant model update load.The experimental results show that the proposed method has the characteristics of low overhead and high precision.CDM effectively increases the security of the control layer, and reduces the time of host classification of spoofing flood attack and the CPU consumption of corresponding controller.…”
    Get full text
    Article
  6. 6

    Optimization of Embedded Mobile Teaching Model Based on Network Streaming Media Technology by Jing Tian

    Published 2021-01-01
    “…In this system, the energy consumption optimization method of mobile streaming media is adopted, and Central Processing Unit (CPU) resources are allocated reasonably according to the principle of maximizing rewards, so as to achieve the purpose of reducing power consumption. …”
    Get full text
    Article
  7. 7

    Shuffled Frog Leaping Algorithm for Preemptive Project Scheduling Problems with Resource Vacations Based on Patterson Set by Yi Han, Ikou Kaku, Jianhu Cai, Yanlai Li, Chao Yang, Lili Deng

    Published 2013-01-01
    “…This paper presents a shuffled frog leaping algorithm (SFLA) for the single-mode resource-constrained project scheduling problem where activities can be divided into equant units and interrupted during processing. …”
    Get full text
    Article
  8. 8

    Efficient and safe software defined network topology discovery protocol by Dong LI, Junqing YU, Yongpu GU, Pengcheng ZHAO

    Published 2023-12-01
    “…The network topology discovery in OpenFlow-based software-defined networks is mainly achieved by utilizing the OpenFlow discovery protocol (OFDP).However, it has been observed in existing research that OFDP exhibits low updating efficiency and is susceptible to network topology pollution attacks.To address the efficiency and safety concerns of the network topology discovery protocol, an in-depth investigation was conducted on the mechanism and safety of OFDP network topology discovery.The characteristics of network topology establishment and updating in OFDP were analyzed, and an improved protocol named Im-OFDP (improved OpenFlow discovery protocol) based on the minimum vertex covering problem in graph theory was proposed.In Im-OFDP, the switch port table and network link table were initially established using prior information obtained from OFDP network topology discovery.Subsequently, a graph model of the network topology was constructed, and the minimum vertex covering algorithm in graph theory was employed to select specific switches for the reception and forwarding of topology discovery link layer discovery protocol (LLDP) packets.Multi-level flow tables were designed based on the network topology structure, and these flow entries were installed on the selected switches by the controller to process LLDP packets.To address security issues, dynamic check code verification in LLDP packets was employed to ensure the safety of network links.Additionally, a network equipment information maintenance mechanism was established based on known network topologies to ensure the safety of the network equipment.Experimental results demonstrate a significant reduction in the number of network topology discovery messages, bandwidth overhead, and CPU overhead through the deployment of Im-OFDP.Moreover, the response time for node failures and link recovery time after mode failure is substantially reduced.Im-OFDP also effectively mitigates various network topology pollution attacks, such as link fabrication and switch forgery attacks.Overall, Im-OFDP has the capability to enhance the efficiency and safety of SDN topology discovery.…”
    Get full text
    Article
  9. 9

    Physics-Based Self-Supervised Grasp Pose Detection by Jon Ander Ruiz, Ander Iriondo, Elena Lazkano, Ander Ansuategi, Iñaki Maurtua

    Published 2024-12-01
    “…The system is optimized to run on CPU in headless-parallelized mode, with the option of running in a graphical interface or headless and storing videos of the process. …”
    Get full text
    Article
  10. 10

    Data Overlay Mesh in Distributed Clouds Allowing Collaborative Applications by Milos Simic, Jovana Dedeic, Milan Stojkov, Ivan Prokic

    Published 2025-01-01
    “…In modern architecture, multi-tenancy is the design mode of operation used to reduce the resource costs of system implementation. …”
    Get full text
    Article