671 research outputs found

    Rechargeable battery modeling and lifetime optimization

    Get PDF
    Battery lifetime is one of the most important design considerations in rechargeable battery operated devices. Understanding the battery nonlinear properties is essential for appropriate battery modeling. Optimizing the battery lifetime depends greatly on the discharge current profile. Changing the profile shape can be done through averaging techniques, scheduling techniques, introducing recovery periods, etc. This work investigates the different techniques that can be used to enhance the battery lifetime. It is shown that 15-60% of lifetime savings can be achieved through using average current profile instead of variable current profile. This work also provides a comparison between different configuration techniques for multi-cell systems. Also, a new hybrid battery model is introduced which combines the battery electric circuit characteristics together with the nonlinear battery properties

    Fundamental Principles in Bacterial Physiology - History, Recent progress, and the Future with Focus on Cell Size Control: A Review

    Full text link
    Bacterial physiology is a branch of biology that aims to understand overarching principles of cellular reproduction. Many important issues in bacterial physiology are inherently quantitative, and major contributors to the field have often brought together tools and ways of thinking from multiple disciplines. This article presents a comprehensive overview of major ideas and approaches developed since the early 20th century for anyone who is interested in the fundamental problems in bacterial physiology. This article is divided into two parts. In the first part (Sections 1 to 3), we review the first `golden era' of bacterial physiology from the 1940s to early 1970s and provide a complete list of major references from that period. In the second part (Sections 4 to 7), we explain how the pioneering work from the first golden era has influenced various rediscoveries of general quantitative principles and significant further development in modern bacterial physiology. Specifically, Section 4 presents the history and current progress of the `adder' principle of cell size homeostasis. Section 5 discusses the implications of coarse-graining the cellular protein composition, and how the coarse-grained proteome `sectors' re-balance under different growth conditions. Section 6 focuses on physiological invariants, and explains how they are the key to understanding the coordination between growth and the cell cycle underlying cell size control in steady-state growth. Section 7 overviews how the temporal organization of all the internal processes enables balanced growth. In the final Section 8, we conclude by discussing the remaining challenges for the future in the field.Comment: Published in Reports on Progress in Physics. (https://doi.org/10.1088/1361-6633/aaa628) 96 pages, 48 figures, 7 boxes, 715 reference

    Quantum Biomimetics

    Get PDF
    136 p.En esta tesis proponemos el concepto de Biomimética Cuántica orientado hacia la reproducción de comportamientos propios de los seres vivos en protocolos de información cuántica. En concreto, las propiedades que aspiramos a imitar emergen como resultado de fenómenos de interacción en diferentes escalas, resultando inaccesibles para un tratamiento matemático acorde al ofrecido por las plataformas de tecnologías cuánticas. Por tanto, el objetivo de la tesis es el de diseñar modelos con cabida para las mencionadas características biológicas pero simplificados de forma que puedan ser adaptados en protocolos experimentales. La tesis se divide en tres partes, una por cada rasgo biológico diferente empleado como inspiración: selección natural, memoria e inteligencia. El estudio presentado en la primera parte culmina con la obtención de un modelo de vida artificial con una identidad exclusivamente cuántica, que no solo permite la escenificación del modelo de selección natural a escala microscópica si no que proporciona un posible marco para la implementación de algoritmos genéticos y problemas de optimización en plataformas cuánticas. En la segunda parte se muestran algoritmos asociados con la simulación de evolución temporal regida por ecuaciones con una dependencia explicita en términos deslocalizados temporalmente. Estos permiten la incorporación de la retroalimentación y posalimentación al conjunto de herramientas en información cuántica. La tercera y última parte versa acerca de la posible simbiosis entre los algoritmos de aprendizaje y los protocolos cuánticos. Mostramos como aplicar técnicas de optimización clásicas para tratar problemas cuánticos así como la codificación y resolución de problemas en dinámicas puramente cuánticas

    A Latency-driven Availability Assessment for Multi-Tenant Service Chains

    Get PDF
    Nowadays, most telecommunication services adhere to the Service Function Chain (SFC) paradigm, where network functions are implemented via software. In particular, container virtualization is becoming a popular approach to deploy network functions and to enable resource slicing among several tenants. The resulting infrastructure is a complex system composed by a huge amount of containers implementing different SFC functionalities, along with different tenants sharing the same chain. The complexity of such a scenario lead us to evaluate two critical metrics: the steady-state availability (the probability that a system is functioning in long runs) and the latency (the time between a service request and the pertinent response). Consequently, we propose a latency-driven availability assessment for multi-tenant service chains implemented via Containerized Network Functions (CNFs). We adopt a multi-state system to model single CNFs and the queueing formalism to characterize the service latency. To efficiently compute the availability, we develop a modified version of the Multidimensional Universal Generating Function (MUGF) technique. Finally, we solve an optimization problem to minimize the SFC cost under an availability constraint. As a relevant example of SFC, we consider a containerized version of IP Multimedia Subsystem, whose parameters have been estimated through fault injection techniques and load tests

    Design, Fabrication, and Run-time Strategies for Hardware-Assisted Security

    Get PDF
    Today, electronic computing devices are critically involved in our daily lives, basic infrastructure, and national defense systems. With the growing number of threats against them, hardware-based security features offer the best chance for building secure and trustworthy cyber systems. In this dissertation, we investigate ways of making hardware-based security into a reality with primary focus on two areas: Hardware Trojan Detection and Physically Unclonable Functions (PUFs). Hardware Trojans are malicious modifications made to original IC designs or layouts that can jeopardize the integrity of hardware and software platforms. Since most modern systems critically depend on ICs, detection of hardware Trojans has garnered significant interest in academia, industry, as well as governmental agencies. The majority of existing detection schemes focus on test-time because of the limited hardware resources available at run-time. In this dissertation, we explore innovative run-time solutions that utilize on-chip thermal sensor measurements and fundamental estimation/detection theory to expose changes in IC power/thermal profile caused by Trojan activation. The proposed solutions are low overhead and also generalizable to many other sensing modalities and problem instances. Simulation results using state-of-the-art tools on publicly available Trojan benchmarks verify that our approaches can detect Trojans quickly and with few false positives. Physically Unclonable Functions (PUFs) are circuits that rely on IC fabrication variations to generate unique signatures for various security applications such as IC authentication, anti-counterfeiting, cryptographic key generation, and tamper resistance. While the existence of variations has been well exploited in PUF design, knowledge of exactly how variations come into existence has largely been ignored. Yet, for several decades the Design-for-Manufacturability (DFM) community has actually investigated the fundamental sources of these variations. Furthermore, since manufacturing variations are often harmful to IC yield, the existing DFM tools have been geared towards suppressing them (counter-intuitive for PUFs). In this dissertation, we make several improvements over current state-of-the-art work in PUFs. First, our approaches exploit existing DFM models to improve PUFs at physical layout and mask generation levels. Second, our proposed algorithms reverse the role of standard DFM tools and extend them towards improving PUF quality without harming non-PUF portions of the IC. Finally, since our approaches occur after design and before fabrication, they are applicable to all types of PUFs and have little overhead in terms of area, power, etc. The innovative and unconventional techniques presented in this dissertation should act as important building blocks for future work in cyber security

    Analytical Results for a Single-Unit System Subject To Markovian Wear and Shocks

    Get PDF
    This thesis develops and analyzers a mathematical model for the reliability measures of a single-unit system subject to continuous wear due to its operating environment and randomly occurring shocks that inflict a random amount of damage to the unit. Assuming a Markovian operating environment and shock arrival mechanism, Laplace-Stieltjes transform expressions are obtained for the failure time distribution and all of its moments. Moreover, an analytical expression is derived for the long-run availability of the single-unit system when it is subject to an inspect-and-replace maintenance policy. The analytical results are illustrated, and their results compared with those of Monte Carlo-simulated failure data. The numerical results indicate that the reliability measures may be accurately computed via numerical inversion of the transform expressions in a straightforward manner when the input parameters are known a priori. In stark contrast to the simulation model which requires several hours to obtain the reliability measures, the analytical procedure computes the same measures in only a few seconds

    Operator Spreading in Random Unitary Circuits

    Get PDF
    Random quantum circuits yield minimally structured models for chaotic quantum dynamics, able to capture for example universal properties of entanglement growth. We provide exact results and coarse-grained models for the spreading of operators by quantum circuits made of Haar-random unitaries. We study both 1+1D and higher dimensions, and argue that the coarse-grained pictures carry over to operator spreading in generic many-body systems. In 1+1D, we demonstrate that the out-of-time-order correlator (OTOC) satisfies a biased diffusion equation, which gives exact results for the spatial profile of the OTOC, and the butterfly speed vBv_{B}. We find that in 1+1D the `front' of the OTOC broadens diffusively, with a width scaling in time as t1/2t^{1/2}. We address fluctuations in the OTOC between different realizations of the random circuit, arguing that they are negligible in comparison to the broadening of the front. Turning to higher D, we show that the averaged OTOC can be understood exactly via a remarkable correspondence with a classical droplet growth problem. This implies that the width of the front of the averaged OTOC scales as t1/3t^{1/3} in 2+1D and t0.24t^{0.24} in 3+1D (KPZ exponents). We support our analytic argument with simulations in 2+1D. We point out that, in a lattice model, the late time shape of the spreading operator is in general not spherical. However when full spatial rotational symmetry is present in 2+1D, our mapping implies an exact asymptotic form for the OTOC in terms of the Tracy-Widom distribution. For an alternative perspective on the OTOC in 1+1D, we map it to the partition function of an Ising-like model. As a result of special structure arising from unitarity, this partition function reduces to a random walk calculation which can be performed exactly. We also use this mapping to give exact results for entanglement growth in 1+1D circuits.Comment: 29 pages, 16 figures. v2: new appendix on 'mean field
    corecore