794 research outputs found

    An extensive study on iterative solver resilience : characterization, detection and prediction

    Get PDF
    Soft errors caused by transient bit flips have the potential to significantly impactan applicalion's behavior. This has motivated the design of an array of techniques to detect, isolate, and correct soft errors using microarchitectural, architectural, compilation­based, or application-level techniques to minimize their impact on the executing application. The first step toward the design of good error detection/correction techniques involves an understanding of an application's vulnerability to soft errors. This work focuses on silent data e orruption's effects on iterative solvers and efforts to mitigate those effects. In this thesis, we first present the first comprehensive characterizalion of !he impact of soft errors on !he convergen ce characteris tics of six iterative methods using application-level fault injection. We analyze the impact of soft errors In terms of the type of error (single-vs multi-bit), the distribution and location of bits affected, the data structure and statement impacted, and varialion with time. We create a public access database with more than 1.5 million fault injection results. We then analyze the performance of soft error detection mechanisms and present the comparalive results. Molivated by our observations, we evaluate a machine-learning based detector that takes as features that are the runtime features observed by the individual detectors to arrive al their conclusions. Our evalualion demonstrates improved results over individual detectors. We then propase amachine learning based method to predict a program's error behavior to make fault injection studies more efficient. We demonstrate this method on asse ssing the performance of soft error detectors. We show that our method maintains 84% accuracy on average with up to 53% less cost. We also show, once a model is trained further fault injection tests would cost 10% of the expected full fault injection runs.“Soft errors” causados por cambios de estado transitorios en bits, tienen el potencial de impactar significativamente el comportamiento de una aplicación. Esto, ha motivado el diseño de una variedad de técnicas para detectar, aislar y corregir soft errors aplicadas a micro-arquitecturas, arquitecturas, tiempo de compilación y a nivel de aplicación para minimizar su impacto en la ejecución de una aplicación. El primer paso para diseñar una buna técnica de detección/corrección de errores, implica el conocimiento de las vulnerabilidades de la aplicación ante posibles soft errors. Este trabajo se centra en los efectos de la corrupción silenciosa de datos en soluciones iterativas, así como en los esfuerzos para mitigar esos efectos. En esta tesis, primeramente, presentamos la primera caracterización extensiva del impacto de soft errors sobre las características convergentes de seis métodos iterativos usando inyección de fallos a nivel de aplicación. Analizamos el impacto de los soft errors en términos del tipo de error (único vs múltiples-bits), de la distribución y posición de los bits afectados, las estructuras de datos, instrucciones afectadas y de las variaciones en el tiempo. Creamos una base de datos pública con más de 1.5 millones de resultados de inyección de fallos. Después, analizamos el desempeño de mecanismos de detección de soft errors actuales y presentamos los resultados de su comparación. Motivados por las observaciones de los resultados presentados, evaluamos un detector de soft errors basado en técnicas de machine learning que toma como entrada las características observadas en el tiempo de ejecución individual de los detectores anteriores al llegar a su conclusión. La evaluación de los resultados obtenidos muestra una mejora por sobre los detectores individualmente. Basados en estos resultados propusimos un método basado en machine learning para predecir el comportamiento de los errores en un programa con el fin de hacer el estudio de inyección de errores mas eficiente. Presentamos este método para evaluar el rendimiento de los detectores de soft errors. Demostramos que nuestro método mantiene una precisión del 84% en promedio con hasta un 53% de mejora en el tiempo de ejecución. También mostramos que una vez que un modelo ha sido entrenado, las pruebas de inyección de errores siguientes costarían 10% del tiempo esperado de ejecución.Postprint (published version

    Design of dual-frequency probe-fed microstrip antennas with genetic optimization algorithm

    Get PDF
    Cataloged from PDF version of article.Dual-frequency operation of antennas has become a necessity for many applications in recent wireless communication systems, such as GPS, GSM services operating at two different frequency bands, and services of PCS and IMT-2000 applications. Although there are various techniques to achieve dual-band operation from various types of microstrip antennas, there is no efficient design tool that has been incorporated with a suitable optimization algorithm. In this paper, the cavity-model based simulation tool along with the genetic optimization algorithm is presented for the design of dual-band microstrip antennas, using multiple slots in the patch or multiple shorting strips between the patch and the ground plane. Since this approach is based on the cavity model, the multiport approach is efficiently employed to analyze the effects of the slots and shorting strips on the input impedance. Then, the optimization of the positions of slots and shorting strips is performed via a genetic optimization algorithm, to achieve an acceptable antenna operation over the desired frequency bands. The antennas designed by this efficient design procedure were realized experimentally, and the results are compared. In addition, these results are also compared to the results obtained by the commercial electromagnetic simulation tool, the FEM-based software HFSS by ANSOFT

    Protest-er:Retraining bert for protest event extraction

    Get PDF
    We analyze the effect of further retraining BERT with different domain specific data as an unsupervised domain adaptation strategy for event extraction. Portability of event extraction models is particularly challenging, with large performance drops affecting data on the same text genres (eg, news). We present PROTEST-ER, a retrained BERT model for protest event extraction. PROTEST-ER outperforms a corresponding generic BERT on out-of-domain data of 8.1 points. Our best performing models reach 51.91-46.39 F1 across both domains

    The effects of nitrogen and phosphorus deficiencies and nitrite addition on the lipid content of Chlorella vulgaris (Chlorophyceae)

    Get PDF
    The effect of 50% N, 100% N, 50% N plus 50% P and 50% P deficiencies and nitrite addition were treated on Chlorella vulgaris (Chlorophyceae) was studied in laboratory conditions with the aim to determine the effects of the deficient nutrient and different nitrogen sources on lipid and protein contents. Proteinand lipid values of the biomass were found as 50.8 and 12.29% for the control group, 20.3 and 17.5% for 50% N(-), 13.01 and 35.6% for 100% N(-), 21.37 and 20.5% for 50% N(-) and 50% P(-), 38.16 and 16.7% for 50% P(-) and 41.03 and 13.04% for the nitrite group that was added. The highest lipid content was recorded with the culture to which 100% N(-) was treated with 0.18 g/L dry-weight.Key words: Chlorella vulgaris, lipid, nitrogen and phosphorus deficiencies, nitrite

    Ground-truth prediction to accelerate soft-error impact analysis for iterative methods

    Get PDF
    Understanding the impact of soft errors on applications can be expensive. Often, it requires an extensive error injection campaign involving numerous runs of the full application in the presence of errors. In this paper, we present a novel approach to arriving at the ground truth-the true impact of an error on the final output-for iterative methods by observing a small number of iterations to learn deviations between normal and error-impacted execution. We develop a machine learning based predictor for three iterative methods to generate ground-truth results without running them to completion for every error injected. We demonstrate that this approach achieves greater accuracy than alternative prediction strategies, including three existing soft error detection strategies. We demonstrate the effectiveness of the ground truth prediction model in evaluating vulnerability and the effectiveness of soft error detection strategies in the context of iterative methods.This material is based upon work supported by the U.S. Department of Energy, Office of Science, Office of Advanced Scientific Computing Research under Award Number 66905, program manager Lucy Nowell. Pacific Northwest National Laboratory is operated by Battelle for DOE under Contract DE-AC05-76RL01830.Peer ReviewedPostprint (author's final draft

    Exploiting Inter- and Intra-Memory Asymmetries for Data Mapping in Hybrid Tiered-Memories

    Full text link
    Modern computing systems are embracing hybrid memory comprising of DRAM and non-volatile memory (NVM) to combine the best properties of both memory technologies, achieving low latency, high reliability, and high density. A prominent characteristic of DRAM-NVM hybrid memory is that it has NVM access latency much higher than DRAM access latency. We call this inter-memory asymmetry. We observe that parasitic components on a long bitline are a major source of high latency in both DRAM and NVM, and a significant factor contributing to high-voltage operations in NVM, which impact their reliability. We propose an architectural change, where each long bitline in DRAM and NVM is split into two segments by an isolation transistor. One segment can be accessed with lower latency and operating voltage than the other. By introducing tiers, we enable non-uniform accesses within each memory type (which we call intra-memory asymmetry), leading to performance and reliability trade-offs in DRAM-NVM hybrid memory. We extend existing NVM-DRAM OS in three ways. First, we exploit both inter- and intra-memory asymmetries to allocate and migrate memory pages between the tiers in DRAM and NVM. Second, we improve the OS's page allocation decisions by predicting the access intensity of a newly-referenced memory page in a program and placing it to a matching tier during its initial allocation. This minimizes page migrations during program execution, lowering the performance overhead. Third, we propose a solution to migrate pages between the tiers of the same memory without transferring data over the memory channel, minimizing channel occupancy and improving performance. Our overall approach, which we call MNEME, to enable and exploit asymmetries in DRAM-NVM hybrid tiered memory improves both performance and reliability for both single-core and multi-programmed workloads.Comment: 15 pages, 29 figures, accepted at ACM SIGPLAN International Symposium on Memory Managemen

    Zoledronic acid induces apoptosis via stimulating the expressions of ERN1, TLR2, and IRF5 genes in glioma cells

    Get PDF
    Glioblastoma multiforme (GBM) is the most common and aggressive brain tumor that affects older people. Although the current therapeutic approaches for GBM include surgical resection, radiotherapy, and chemotherapeutic agent temozolomide, the median survival of patients is 14.6 months because of its aggressiveness. Zoledronic acid (ZA) is a nitrogen-containing bisphosphonate that exhibited anticancer activity in different cancers. The purpose of this study was to assess the potential effect of ZA in distinct signal transduction pathways in U87-MG cells. In this study, experiments performed on U87-MG cell line (Human glioblastoma-astrocytoma, epithelial-like cell line) which is an in vitro model of human glioblastoma cells to examine the cytotoxic and apoptotic effects of ZA. IC50 dose of ZA, 25 μM, applied on U87-MG cells during 72 h. ApoDIRECT In Situ DNA Fragmentation Assay was used to investigate apoptosis of U87MG cells. The quantitative reverse transcription polymerase chain reaction (qRT-PCR) (LightCycler480 System) was carried out for 48 gene expression like NF-κB, Toll-like receptors, cytokines, and inteferons. Our results indicated that ZA (IC50 dose) increased apoptosis 1.27-fold in U87MG cells according to control cells. According to qRT-PCR data, expression levels of the endoplasmic reticulum-nuclei-1 (ERN1), Toll-like receptor 2 (TLR2), and human IFN regulatory factor 5 (IRF5) tumor suppressor genes elevated 2.05-, 2.08-, and 2.3-fold by ZA, respectively, in U87MG cells. Our recent results indicated that ZA have a key role in GBM progression and might be considered as a potential agent in glioma treatment. © 2015, International Society of Oncology and BioMarkers (ISOBM)

    Improving Phase Change Memory Performance with Data Content Aware Access

    Full text link
    A prominent characteristic of write operation in Phase-Change Memory (PCM) is that its latency and energy are sensitive to the data to be written as well as the content that is overwritten. We observe that overwriting unknown memory content can incur significantly higher latency and energy compared to overwriting known all-zeros or all-ones content. This is because all-zeros or all-ones content is overwritten by programming the PCM cells only in one direction, i.e., using either SET or RESET operations, not both. In this paper, we propose data content aware PCM writes (DATACON), a new mechanism that reduces the latency and energy of PCM writes by redirecting these requests to overwrite memory locations containing all-zeros or all-ones. DATACON operates in three steps. First, it estimates how much a PCM write access would benefit from overwriting known content (e.g., all-zeros, or all-ones) by comprehensively considering the number of set bits in the data to be written, and the energy-latency trade-offs for SET and RESET operations in PCM. Second, it translates the write address to a physical address within memory that contains the best type of content to overwrite, and records this translation in a table for future accesses. We exploit data access locality in workloads to minimize the address translation overhead. Third, it re-initializes unused memory locations with known all-zeros or all-ones content in a manner that does not interfere with regular read and write accesses. DATACON overwrites unknown content only when it is absolutely necessary to do so. We evaluate DATACON with workloads from state-of-the-art machine learning applications, SPEC CPU2017, and NAS Parallel Benchmarks. Results demonstrate that DATACON significantly improves system performance and memory system energy consumption compared to the best of performance-oriented state-of-the-art techniques.Comment: 18 pages, 21 figures, accepted at ACM SIGPLAN International Symposium on Memory Management (ISMM
    corecore