Computer Science ›› 2019, Vol. 46 ›› Issue (4): 329-333.doi: 10.11896/j.issn.1002-137X.2019.04.051

• Interdiscipline & Frontier • Previous Articles    

Sustainable Cooling Method of CPU Hot Spot Based on Target Matrix

YAN Bing-qing1, YUAN Jing-ling1,2, CHEN Min-cheng1, LIU Dong-ling1, JIANG Tao1   

  1. College of Computer Science and Technology,Wuhan University of Technology,Wuhan 430070,China1
    Hubei Key Laboratory of Transportation Internet of Things,Wuhan 430070,China2
  • Received:2018-01-05 Online:2019-04-15 Published:2019-04-23

Abstract: In order to solve the CPU overheating problems,many scholars have proposed their own CPU cooling models to achieve energy saving.Based on the previous model of heat cycling,this paper quantitatively analyzed the mathematical conditions of the establishment of the CPU hotspot sustainable cooling model,established the target heat matrix model based on the temperature change during the CPU cooling process,analyzed the temperature change of the hot spot,and verified the correctness of the mathematical relation model.On the basis of comparing the previous models of heat recovery,a cooling model considering the self-heating factor of the system was proposed,which can be carried out by using our proposed target heat matrix.The experimental results show that the cooling efficiency of the cooling model is 0.937%.

Key words: CPU hot spot, Self-cooling factor of system, Sustainable cooling model, Target heat matrix

CLC Number: 

  • TP393
[1]DENG W,LIU F M,JIN H,et al.Leveraging Renewable Energy in Cloud Computing Datacenters:State of the Art and Future Research.Chinese Journal of Computers,2013,36(3):582-598.(in Chinese) 邓维,刘方明,金海,等.云计算数据中心的新能源应用:研究现状与趋势[J].计算机学报,2013,36(3):582-598.
[2]VALENTINI G L,LASSONDE W,KHAN S U,et al.An overview of energy efficiency techniques in cluster computing systems[J].Cluster Computing,2013,16(1):3-15.
[3]WANG W,LUO J Z,SONG A B.Dynamic Pricing Based Energy Cost Optimization in Data Center Environments.Chinese Journal of Computers,2013,36(3):599-612.(in Chinese) 王巍,罗军舟,宋爱波.基于动态定价策略的数据中心能耗成本优化[J].计算机学报,2013,36(3):599-612.
[4]LEE S,PHELAN P E,WU C J.Hot spot cooling and harvesting CPU waste heat using thermoelectric modules∥ASME 2014 International Mechanical Engineering Congress and Exposition.American Society of Mechanical Engineers,2014.
[5]WU C J.Architectural Thermal Energy Harvesting Opportunities for Sustainable Computing[J].IEEE Computer Architecture Letters,2014,13(2):65-68.
[6]SHUJA J,GANI A,SHAMSHIRB S,et al.Sustainable Cloud Data Centers:A survey of enabling techniques and technologies[J].Renewable & Sustainable Energy Reviews,2016,62(9):195-214.
[7]EBRAHIMI K,JONES G F,FLEISCHER A S.A review of data center cooling technology,operating conditions and the corresponding low-grade waste heat recovery opportunities[J].Renewable & Sustainable Energy Reviews,2014,31(2):622-638.
[8]ZHOU R,WANG Z,BASH C E,et al.Data center coolingmana- gement and analysis-a model based approach[C]∥Semiconductor Thermal Measurement and Management Symposium.IEEE,2012:98-103.
[9]ZHU Y,HALPERN M,REDDI V J.Event-based scheduling for energy-efficient QoS (eQoS) in mobile Web applications[C]∥2015 IEEE 21st International Symposium on High Performance Computer Architecture (HPCA).IEEE,2015.
[10]EGILMEZ B,MEMIK G,OGRENCI-MEMIK S,et al.User- specific skin temperature-aware DVFS for smartphones[C]∥Design,Automation and Test in Europe.2015:1217-1220.
[11]LEE S,PANDIYAN D,SEO J S,et al.Thermoelectric-based sustainable self-cooling for fine-grained processor hot spots[C]∥IEEE Intersociety Conference on Thermal and Thermomechanical Phenomena in Electronic Systems.IEEE,2016:847-856.
[1] LIU Xin, WANG Jun, SONG Qiao-feng, LIU Jia-hao. Collaborative Multicast Proactive Caching Scheme Based on AAE [J]. Computer Science, 2022, 49(9): 260-267.
[2] GUO Peng-jun, ZHANG Jing-zhou, YANG Yuan-fan, YANG Shen-xiang. Study on Wireless Communication Network Architecture and Access Control Algorithm in Aircraft [J]. Computer Science, 2022, 49(9): 268-274.
[3] HU An-xiang, YIN Xiao-kang, ZHU Xiao-ya, LIU Sheng-li. Strcmp-like Function Identification Method Based on Data Flow Feature Matching [J]. Computer Science, 2022, 49(9): 326-332.
[4] JIANG Yang-yang, SONG Li-hua, XING Chang-you, ZHANG Guo-min, ZENG Qing-wei. Belief Driven Attack and Defense Policy Optimization Mechanism in Honeypot Game [J]. Computer Science, 2022, 49(9): 333-339.
[5] WANG Lei, LI Xiao-yu. LBS Mobile Privacy Protection Scheme Based on Random Onion Routing [J]. Computer Science, 2022, 49(9): 347-354.
[6] WANG Xing-wei, XIN Jun-chang, SHAO An-lin, BI Yuan-guo, YI Xiu-shuang. Study on Development Status and Countermeasures of Industrial Intranet in Enterprises [J]. Computer Science, 2022, 49(7): 1-9.
[7] ZHANG Chong-yu, CHEN Yan-ming, LI Wei. Task Offloading Online Algorithm for Data Stream Edge Computing [J]. Computer Science, 2022, 49(7): 263-270.
[8] FEI Xing-rui, XIE Yi. Click Streams Recognition for Web Users Based on HMM-NN [J]. Computer Science, 2022, 49(7): 340-349.
[9] ZHAO Dong-mei, WU Ya-xing, ZHANG Hong-bin. Network Security Situation Prediction Based on IPSO-BiLSTM [J]. Computer Science, 2022, 49(7): 357-362.
[10] WANG Si-ming, TAN Bei-hai, YU Rong. Blockchain Sharding and Incentive Mechanism for 6G Dependable Intelligence [J]. Computer Science, 2022, 49(6): 32-38.
[11] Ran WANG, Jiang-tian NIE, Yang ZHANG, Kun ZHU. Clustering-based Demand Response for Intelligent Energy Management in 6G-enabled Smart Grids [J]. Computer Science, 2022, 49(6): 44-54.
[12] WEI Hui, CHEN Ze-mao, ZHANG Li-qiang. Anomaly Detection Framework of System Call Trace Based on Sequence and Frequency Patterns [J]. Computer Science, 2022, 49(6): 350-355.
[13] TAO Li-jing, QIU Han, ZHU Jun-hu, LI Hang-tian. Model for the Description of Trainee Behavior for Cyber Security Exercises Assessment [J]. Computer Science, 2022, 49(6A): 480-484.
[14] HE Xi, HE Ke-tai, WANG Jin-shan, LIN Shen-wen, YANG Jing-lin, FENG Yu-chao. Analysis of Bitcoin Entity Transaction Patterns [J]. Computer Science, 2022, 49(6A): 502-507.
[15] GAO Wen-long, ZHOU Tian-yang, ZHU Jun-hu, ZHAO Zi-heng. Network Attack Path Discovery Method Based on Bidirectional Ant Colony Algorithm [J]. Computer Science, 2022, 49(6A): 516-522.
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!