709 research outputs found
Fairness and desert in tournaments
We model the behavior of agents who care about receiving what they feel they deserve in a two-player rank-order tournament. Perceived entitlements are sensitive to how hard an agent has worked relative to her rival, and agents are loss averse around their meritocratically determined endogenous reference points. In a fair tournament sufficiently large desert concerns drive identical agents to push their effort levels apart in order to end up closer to their reference points on average. In an unfair tournament, where one agent is advantaged, the equilibrium is symmetric in the absence of desert, but asymmetric in the presence of desert. We find that desert concerns can undermine the standard conclusion that competition for a fixed supply of status is socially wasteful and explain why, when the distribution of output noise is fat-tailed, an employer might use a rank-order incentive scheme. Keywords; desert, equity, tournament, loss aversion, reference-dependent preferences, reference point, psychological game theory, status, relative performance evaluation
A Radar Kit for Hands-On Distance-Learning
We present an approach to experimental radar systems education based on a
combination of commercial low-cost hardware with modern open-source software
technologies. Following a discussion of the general top-level architecture of
flexible, software-defined radar systems, we introduce the specific selection
of subsystems, their capabilities, and current system limitations. Compared to
existing approaches to practical radar education, a more top-level modular
design with a greater focus on performance and flexibility of baseband
processing is selected while reducing the complexity of circuit and subsystem
assembly and total system cost. We present example measurements obtained from
the radar kit. The radar kit allows for bringing a radar lab to the students
instead of students into the labs. It enables practical hands-on radar
education also in distance-only-learning scenarios.Comment: Presented at the European Microwave Week 2021, Focussed Session on on
Teaching Methods for Microwave Engineerin
Design and Characterization of Null Convention Self-Timed Multipliers
Self-timed multipliers, designed using the delay-insensitive null convention logic (NCL) paradigm, were analyzed. NCL require less power, generate less noise, produce less electromagnetic interference, and allow easier reuse of components. Simulation results show a large variance in circuit performance in terms of power, area, and speed. NCL paradigm also represent bit-serial, iterative, and fully parallel multiplication architectures. They reduce the effort required to ensure correct operation under all timing scenarios, compared to equivalent synchronous designs
Embedded dynamic programming networks for networks-on-chip
PhD ThesisRelentless technology downscaling and recent technological advancements
in three dimensional integrated circuit (3D-IC) provide a promising
prospect to realize heterogeneous system-on-chip (SoC) and homogeneous
chip multiprocessor (CMP) based on the networks-onchip
(NoCs) paradigm with augmented scalability, modularity and
performance. In many cases in such systems, scheduling and managing
communication resources are the major design and implementation
challenges instead of the computing resources. Past research
efforts were mainly focused on complex design-time or simple heuristic
run-time approaches to deal with the on-chip network resource
management with only local or partial information about the network.
This could yield poor communication resource utilizations and amortize
the benefits of the emerging technologies and design methods.
Thus, the provision for efficient run-time resource management in
large-scale on-chip systems becomes critical. This thesis proposes a
design methodology for a novel run-time resource management infrastructure
that can be realized efficiently using a distributed architecture,
which closely couples with the distributed NoC infrastructure. The
proposed infrastructure exploits the global information and status
of the network to optimize and manage the on-chip communication
resources at run-time.
There are four major contributions in this thesis. First, it presents a
novel deadlock detection method that utilizes run-time transitive closure
(TC) computation to discover the existence of deadlock-equivalence
sets, which imply loops of requests in NoCs. This detection scheme,
TC-network, guarantees the discovery of all true-deadlocks without
false alarms in contrast to state-of-the-art approximation and heuristic
approaches. Second, it investigates the advantages of implementing
future on-chip systems using three dimensional (3D) integration and
presents the design, fabrication and testing results of a TC-network
implemented in a fully stacked three-layer 3D architecture using a
through-silicon via (TSV) complementary metal-oxide semiconductor
(CMOS) technology. Testing results demonstrate the effectiveness
of such a TC-network for deadlock detection with minimal computational
delay in a large-scale network. Third, it introduces an adaptive
strategy to effectively diffuse heat throughout the three dimensional
network-on-chip (3D-NoC) geometry. This strategy employs a dynamic
programming technique to select and optimize the direction of data
manoeuvre in NoC. It leads to a tool, which is based on the accurate
HotSpot thermal model and SystemC cycle accurate model, to simulate
the thermal system and evaluate the proposed approach. Fourth, it
presents a new dynamic programming-based run-time thermal management
(DPRTM) system, including reactive and proactive schemes, to
effectively diffuse heat throughout NoC-based CMPs by routing packets
through the coolest paths, when the temperature does not exceed
chip’s thermal limit. When the thermal limit is exceeded, throttling is
employed to mitigate heat in the chip and DPRTM changes its course
to avoid throttled paths and to minimize the impact of throttling on
chip performance.
This thesis enables a new avenue to explore a novel run-time resource
management infrastructure for NoCs, in which new methodologies
and concepts are proposed to enhance the on-chip networks for
future large-scale 3D integration.Iraqi Ministry of Higher Education and Scientific Research (MOHESR)
Bardian, Vol. 16, No. 11 (March 11, 1937)
https://digitalcommons.bard.edu/bardian/1186/thumbnail.jp
Microwave Power Transmission System Studies. Volume 1: Executive Summary
A study of microwave power generation, transmission, reception and control was conducted as a part of a program to demonstrate the feasibility of power transmission from geosynchronous orbit. A summary is presented of results concerning design approaches, estimated costs (ROM), critical technology, associated ground and orbital test programs with emphasis on dc to rf conversion, transmitting antenna, phase control, mechanical systems, flight operations, ground power receiving-rectifying antenna with systems analysis, and evaluation. Recommendations for early further in-depth studies complementing the technology program are included
Recommended from our members
Enterprise platform systems management security threats and mitigation techniques
Developers and technologists of enterprise systems such as servers, storage and networking products must constantly anticipate new cybersecurity threats and evolving security requirements. These requirements are typically sourced from marketing, customer expectations, manufacturing and evolving government standards. Much ongoing major research focus has been on securing the main enterprise system purpose functionality, operating system, network and storage. There appears, however, to be far less research and a growing number of reports of vulnerabilities in the area of enterprise systems management hardware and software subsystems. Many recent examples are within types of subsystems such as baseboard management controllers (BMCs), which are intricate embedded subsystems, independent of the host server system functionality. A BMC is typically comprised of a specialized system-on-a-chip, RAM, non-volatile storage, and sensors, and runs an embedded LINUX Operating System. The BMC’s primary roles are always increasing in scope including managing system inventory, system operational health, thermal and power control, event logging, remote console access, provisioning, performance monitoring, software updates and failure prediction and remediation. To compromise or create a denial of service of such subsystems has an increasing impact on equipment manufacturers and large and small enterprises. This report’s primary objective is to research real-world and theoretical hardware and software cyber-attack vectors on enterprise product platforms, inclusive of BMCs, BIOS and other embedded systems within such products. For each presented attack vector, best practices and suggestions for effective avoidance and mitigation are explored. Domains of particular interest are physical access security, hardware manipulation and secure boot protections against software image manipulation, BIOS recovery and secure field debug techniques.Electrical and Computer Engineerin
- …