5,353 research outputs found
The future of computing beyond Moore's Law.
Moore's Law is a techno-economic model that has enabled the information technology industry to double the performance and functionality of digital electronics roughly every 2 years within a fixed cost, power and area. Advances in silicon lithography have enabled this exponential miniaturization of electronics, but, as transistors reach atomic scale and fabrication costs continue to rise, the classical technological driver that has underpinned Moore's Law for 50 years is failing and is anticipated to flatten by 2025. This article provides an updated view of what a post-exascale system will look like and the challenges ahead, based on our most recent understanding of technology roadmaps. It also discusses the tapering of historical improvements, and how it affects options available to continue scaling of successors to the first exascale machine. Lastly, this article covers the many different opportunities and strategies available to continue computing performance improvements in the absence of historical technology drivers. This article is part of a discussion meeting issue 'Numerical algorithms for high-performance computational science'
Collective Communication Patterns Using Time-Reversal Terahertz Links at the Chip Scale
Wireless communications in the terahertz band have been recently proposed as
complement to conventional wired interconnects within computing packages. Such
environments are typically highly reverberant, hence showing long channel
impulse responses and severely limiting the achievable rates. Fortunately, this
communications scenario is static and can be pre-characterized, which opens the
door to techniques such as time reversal. Time reversal acts a spatial matched
filter and has a spatiotemporal focusing effect, which allows not only to
increase the achievable symbol rates, but also to create multiple spatial
channels. In this paper, the multi-user capability of time reversal is explored
in the context of wireless communications in the terahertz band within a
computing package. Full-wave simulations are carried out to validate the
approach, whereas modulation streams are simulated to evaluate the error rate
as a function of the transmitted power, symbol rate, and number of simultaneous
transmissions
Security of Electrical, Optical and Wireless On-Chip Interconnects: A Survey
The advancement of manufacturing technologies has enabled the integration of
more intellectual property (IP) cores on the same system-on-chip (SoC).
Scalable and high throughput on-chip communication architecture has become a
vital component in today's SoCs. Diverse technologies such as electrical,
wireless, optical, and hybrid are available for on-chip communication with
different architectures supporting them. Security of the on-chip communication
is crucial because exploiting any vulnerability would be a goldmine for an
attacker. In this survey, we provide a comprehensive review of threat models,
attacks, and countermeasures over diverse on-chip communication technologies as
well as sophisticated architectures.Comment: 41 pages, 24 figures, 4 table
A comparison of processing techniques for producing prototype injection moulding inserts.
This project involves the investigation of processing techniques for producing low-cost moulding inserts used in the particulate injection moulding (PIM) process. Prototype moulds were made from both additive and subtractive processes as well as a combination of the two. The general motivation for this was to reduce the entry cost of users when considering PIM.
PIM cavity inserts were first made by conventional machining from a polymer block using the pocket NC desktop mill. PIM cavity inserts were also made by fused filament deposition modelling using the Tiertime UP plus 3D printer.
The injection moulding trials manifested in surface finish and part removal defects. The feedstock was a titanium metal blend which is brittle in comparison to commodity polymers. That in combination with the mesoscale features, small cross-sections and complex geometries were considered the main problems. For both processing methods, fixes were identified and made to test the theory. These consisted of a blended approach that saw a combination of both the additive and subtractive processes being used.
The parts produced from the three processing methods are investigated and their respective merits and issues are
discussed
Reducing risk in pre-production investigations through undergraduate engineering projects.
This poster is the culmination of final year Bachelor of Engineering Technology (B.Eng.Tech) student projects
in 2017 and 2018. The B.Eng.Tech is a level seven qualification that aligns with the Sydney accord for a three-year engineering degree and hence is internationally benchmarked. The enabling mechanism of these projects is the industry connectivity that creates real-world projects and highlights the benefits of the investigation of process at the technologist level.
The methodologies we use are basic and transparent, with enough depth of technical knowledge to ensure the industry partners gain from the collaboration process. The process we use minimizes the disconnect between the student and the industry supervisor while maintaining the academic freedom of the student and the commercial sensitivities of the supervisor.
The general motivation for this approach is the reduction of the entry cost of the industry to enable consideration of new technologies and thereby reducing risk to core business and shareholder profits.
The poster presents several images and interpretive dialogue to explain the positive and negative aspects of the student process
Beasts in Collaboration: A Study of Biomimicry and Evolutionary Principles applied to Management Innovation
This research describes the frontier of bio-inspired management innovation and how it may lead to a paradigm shift in how we structure and lead organizations. As an exploratory foray into a subculture of bio-inspired experts, it asks how we might apply evolutionary principles to creating more resilient and adaptive organizations. The experts hail from both science-based and organizational management backgrounds, showcasing a distinct divergence in how biomimicry is applied in their work. A review of contributions from these pioneering practitioners discovers the impetus and resulting benefits of their application. This is contrasted with the barriers that currently limit further development of biomimicry for organizational change. Ultimately there remains a common understanding among these practitioners that involves the intention to learn from nature. The research therefore analyzes the study of nature for informed and intentional change, and provides examples of edge corporations leading the way.
As we are frantically racing to reverse the consequences of our actions on the planet’s finite resources, the potential for a new paradigm that might consciously change how we model our organizations will have a direct impact on our resilience as a species
Business Case and Technology Analysis for 5G Low Latency Applications
A large number of new consumer and industrial applications are likely to
change the classic operator's business models and provide a wide range of new
markets to enter. This article analyses the most relevant 5G use cases that
require ultra-low latency, from both technical and business perspectives. Low
latency services pose challenging requirements to the network, and to fulfill
them operators need to invest in costly changes in their network. In this
sense, it is not clear whether such investments are going to be amortized with
these new business models. In light of this, specific applications and
requirements are described and the potential market benefits for operators are
analysed. Conclusions show that operators have clear opportunities to add value
and position themselves strongly with the increasing number of services to be
provided by 5G.Comment: 18 pages, 5 figure
Emerging Security Threats in Modern Digital Computing Systems: A Power Management Perspective
Design of computing systems — from pocket-sized smart phones to massive cloud based data-centers — have one common daunting challenge : minimizing the power consumption. In this effort, power management sector is undergoing a rapid and profound transformation to promote clean and energy proportional computing. At the hardware end of system design, there is proliferation of specialized, feature rich and complex power management hardware components. Similarly, in the software design layer complex power management suites are growing rapidly. Concurrent to this development, there has been an upsurge in the integration of third-party components to counter the pressures of shorter time-to-market. These trends collectively raise serious concerns about trust and security of power management solutions.
In recent times, problems such as overheating, performance degradation and poor battery life, have dogged the mobile devices market, including the infamous recall of Samsung Note 7. Power outage in the data-center of a major airline left innumerable passengers stranded, with thousands of canceled flights costing over 100 million dollars. This research examines whether such events of unintentional reliability failure, can be replicated using targeted attacks by exploiting the security loopholes in the complex power management infrastructure of a computing system.
At its core, this research answers an imminent research question: How can system designers ensure secure and reliable operation of third-party power management units? Specifically, this work investigates possible attack vectors, and novel non-invasive detection and defense mechanisms to safeguard system against malicious power attacks. By a joint exploration of the threat model and techniques to seamlessly detect and protect against power attacks, this project can have a lasting impact, by enabling the design of secure and cost-effective next generation hardware platforms
Supporting collaborative biodesign ideation with contextualised knowledge from bioscience
The objective of this work is to support co-creation of novel ideas in biodesign during fast-paced and facilitated workshops. We created a card-based tool which simultaneously provides knowledge on both ‘science’ and ‘context’. The tool was used to trigger and inspire collaborative ideation in two biodesign workshops in which participants from scientific and design backgrounds produced ideas for healthcare-related innovations. To understand the perception of the tool and the mechanism of scientific knowledge integration in ideation, we conducted post-workshop interviews with 10 participants. Our qualitative analysis shows that the exposure to contextualised scientific knowledge provided by the tool enabled participants to generate ideas that cover a wide spectrum from the micro-scale of bioscience to the macro-scale of socio-political contexts, and thus supported the acceleration of ideation in biodesign workshops
- …