-
A Detailed Historical and Statistical Analysis of the Influence of Hardware Artifacts on SPEC Integer Benchmark Performance
Authors:
Yueyao Wang,
Samuel Furman,
Nicolas Hardy,
Margaret Ellis,
Godmar Back,
Yili Hong,
Kirk Cameron
Abstract:
The Standard Performance Evaluation Corporation (SPEC) CPU benchmark has been widely used as a measure of computing performance for decades. The SPEC is an industry-standardized, CPU-intensive benchmark suite and the collective data provide a proxy for the history of worldwide CPU and system performance. Past efforts have not provided or enabled answers to questions such as, how has the SPEC bench…
▽ More
The Standard Performance Evaluation Corporation (SPEC) CPU benchmark has been widely used as a measure of computing performance for decades. The SPEC is an industry-standardized, CPU-intensive benchmark suite and the collective data provide a proxy for the history of worldwide CPU and system performance. Past efforts have not provided or enabled answers to questions such as, how has the SPEC benchmark suite evolved empirically over time and what micro-architecture artifacts have had the most influence on performance? -- have any micro-benchmarks within the suite had undue influence on the results and comparisons among the codes? -- can the answers to these questions provide insights to the future of computer system performance? To answer these questions, we detail our historical and statistical analysis of specific hardware artifacts (clock frequencies, core counts, etc.) on the performance of the SPEC benchmarks since 1995. We discuss in detail several methods to normalize across benchmark evolutions. We perform both isolated and collective sensitivity analyses for various hardware artifacts and we identify one benchmark (libquantum) that had somewhat undue influence on performance outcomes. We also present the use of SPEC data to predict future performance.
△ Less
Submitted 29 January, 2024;
originally announced January 2024.
-
Machine Learning Subsystem for Autonomous Collision Avoidance on a small UAS with Embedded GPU
Authors:
Nicholas Polosky,
Tyler Gwin,
Sean Furman,
Parth Barhanpurkar,
Jithin Jagannath
Abstract:
Interest in unmanned aerial system (UAS) powered solutions for 6G communication networks has grown immensely with the widespread availability of machine learning based autonomy modules and embedded graphical processing units (GPUs). While these technologies have revolutionized the possibilities of UAS solutions, designing an operable, robust autonomy framework for UAS remains a multi-faceted and d…
▽ More
Interest in unmanned aerial system (UAS) powered solutions for 6G communication networks has grown immensely with the widespread availability of machine learning based autonomy modules and embedded graphical processing units (GPUs). While these technologies have revolutionized the possibilities of UAS solutions, designing an operable, robust autonomy framework for UAS remains a multi-faceted and difficult problem. In this work, we present our novel, modular framework for UAS autonomy, entitled MR-iFLY, and discuss how it may be extended to enable 6G swarm solutions. We begin by detailing the challenges associated with machine learning based UAS autonomy on resource constrained devices. Next, we describe in depth, how MR-iFLY's novel depth estimation and collision avoidance technology meets these challenges. Lastly, we describe the various evaluation criteria we have used to measure performance, show how our optimized machine vision components provide up to 15X speedup over baseline models and present a flight demonstration video of MR-iFLY's vision-based collision avoidance technology. We argue that these empirical results substantiate MR-iFLY as a candidate for use in reducing communication overhead between nodes in 6G communication swarms by providing standalone collision avoidance and navigation capabilities.
△ Less
Submitted 2 December, 2021;
originally announced December 2021.
-
Deep Learning and Reinforcement Learning for Autonomous Unmanned Aerial Systems: Roadmap for Theory to Deployment
Authors:
Jithin Jagannath,
Anu Jagannath,
Sean Furman,
Tyler Gwin
Abstract:
Unmanned Aerial Systems (UAS) are being increasingly deployed for commercial, civilian, and military applications. The current UAS state-of-the-art still depends on a remote human controller with robust wireless links to perform several of these applications. The lack of autonomy restricts the domains of application and tasks for which a UAS can be deployed. Enabling autonomy and intelligence to t…
▽ More
Unmanned Aerial Systems (UAS) are being increasingly deployed for commercial, civilian, and military applications. The current UAS state-of-the-art still depends on a remote human controller with robust wireless links to perform several of these applications. The lack of autonomy restricts the domains of application and tasks for which a UAS can be deployed. Enabling autonomy and intelligence to the UAS will help overcome this hurdle and expand its use improving safety and efficiency. The exponential increase in computing resources and the availability of large amount of data in this digital era has led to the resurgence of machine learning from its last winter. Therefore, in this chapter, we discuss how some of the advances in machine learning, specifically deep learning and reinforcement learning can be leveraged to develop next-generation autonomous UAS. We first begin motivating this chapter by discussing the application, challenges, and opportunities of the current UAS in the introductory section. We then provide an overview of some of the key deep learning and reinforcement learning techniques discussed throughout this chapter. A key area of focus that will be essential to enable autonomy to UAS is computer vision. Accordingly, we discuss how deep learning approaches have been used to accomplish some of the basic tasks that contribute to providing UAS autonomy. Then we discuss how reinforcement learning is explored for using this information to provide autonomous control and navigation for UAS. Next, we provide the reader with directions to choose appropriate simulation suites and hardware platforms that will help to rapidly prototype novel machine learning based solutions for UAS. We additionally discuss the open problems and challenges pertaining to each aspect of develo** autonomous UAS solutions to shine light on potential research areas.
△ Less
Submitted 8 September, 2020; v1 submitted 7 September, 2020;
originally announced September 2020.
-
HELPER: Heterogeneous Efficient Low Power Radio for Enabling Ad Hoc Emergency Public Safety Networks
Authors:
Jithin Jagannath,
Sean Furman,
Anu Jagannath,
Luther Ling,
Andrew Burger,
Andrew Drozd
Abstract:
Natural and man-made disasters have been causing destruction and distress to humanity all over the world. In these scenarios, communication infrastructures are the most affected entities making emergency response operations extremely challenging. This invokes a need to equip the affected people and the emergency responders with the ability to rapidly set up and use independent means of communicati…
▽ More
Natural and man-made disasters have been causing destruction and distress to humanity all over the world. In these scenarios, communication infrastructures are the most affected entities making emergency response operations extremely challenging. This invokes a need to equip the affected people and the emergency responders with the ability to rapidly set up and use independent means of communication. Therefore, in this work, we present a complete end-to-end solution that can connect survivors of a disaster with each other and the authorities using a completely self-sufficient ad hoc network that can be setup rapidly. Accordingly, we develop a Heterogeneous Efficient Low Power Radio (HELPER) that acts as an access point for end-users to connect using custom website application. These HELPERs then coordinate with each other to form a LoRa based ad hoc network. To this end, we propose a novel cross-layer optimized distributed energy-efficient routing (SEEK) algorithm that aims to maximize the network lifetime. The HELPER is prototyped using WiFi enabled Raspberry Pi and LoRa module that is configured to run using Li-ion batteries. We implement the required cross-layer protocol stack along with the SEEK routing algorithm. We have conducted demonstrations to establish the feasibility of exchanging of text messages over the HELPER network, live map updates, ability to send distress messages to authorities. Emergency responders can leverage this technology to remotely monitor the connectivity of the affected area and alert users of imminent dangers. SEEK algorithm was shown to outperform a greedy geographical routing algorithm implemented on HELPER testbed by up to 53 % in terms of network lifetime and up to 28 % in terms of throughput. Overall, we hope this technology will become instrumental in improving the efficiency and effectiveness of public safety activities.
△ Less
Submitted 21 March, 2019;
originally announced March 2019.
-
Consequences of negative differential electron mobility in insulated gate field effect transistors
Authors:
A. S. Furman
Abstract:
We study the consequences of negative differential electron mobility in insulated gate field effect transistors (FETS) using the field model. We show that, in contrast to the case of the monotonic velocity saturation model, the field distributions in a short-channel FET may be described by the gradual channel approximation even for high drain-to-source voltages. The current-voltage dependence of…
▽ More
We study the consequences of negative differential electron mobility in insulated gate field effect transistors (FETS) using the field model. We show that, in contrast to the case of the monotonic velocity saturation model, the field distributions in a short-channel FET may be described by the gradual channel approximation even for high drain-to-source voltages. The current-voltage dependence of the short-channel FET should have a branch with a negative slope. The FET exhibits a negative differential resistance and may show convective or absolute instability, depending on the applied voltages. The fluctuation growth is governed by the diffusion law with a negative effective diffusion coefficient.
△ Less
Submitted 18 November, 2023; v1 submitted 30 March, 2006;
originally announced March 2006.
-
Magnetotransport in 2D electron systems with a Rashba spin-orbit interaction
Authors:
M. V. Cheremisin,
A. S. Furman
Abstract:
The beating pattern of Shubnikov-de Haas oscillations in 2D electron system in the presence of a Rashba zero-field spin splitting is reproduced. It is shown, taking into account the Zeeman splitting, that the explicit formulae for the node position well describes the experimental data. The spin-orbit interaction strength obtained is found to be magnetic field independent in an agreement with the…
▽ More
The beating pattern of Shubnikov-de Haas oscillations in 2D electron system in the presence of a Rashba zero-field spin splitting is reproduced. It is shown, taking into account the Zeeman splitting, that the explicit formulae for the node position well describes the experimental data. The spin-orbit interaction strength obtained is found to be magnetic field independent in an agreement with the basic assumptions of the Rashba model.
△ Less
Submitted 3 January, 2006; v1 submitted 18 January, 2005;
originally announced January 2005.