the Beaglebone Black single-board computer is well-suited for real-timeembeddedapplications because its system-on-a-chip contains two "Programmable real-time Units" (PRUs): 200-MHz microcontrollers that ru...
详细信息
ISBN:
(纸本)9781509057184
the Beaglebone Black single-board computer is well-suited for real-timeembeddedapplications because its system-on-a-chip contains two "Programmable real-time Units" (PRUs): 200-MHz microcontrollers that run concurrently withthe main 1-GHz CPU that runs Linux. this paper introduces "Cyclops": a web-browser-based IDE that facilitates the development of embeddedapplications on the Beaglebone Black's PRU. Users write PRU code in a simple JavaScript-inspired language, which Cyclops converts to PRU assembly code and deploys to the PRU. Cyclops automatically configures the Beaglebone's pinmux controller to use common I/O peripherals like ADC and PWM. Additionally, Cyclops includes a PRU library and Linux kernel module for synchronizing the PRU withthe processor clock, enabling the PRU to time-stamp sensor measurements using the Linux processor time within sub-microsecond accuracy.
Wireless Sensor Network (WSN) and related technologies are widely used to build decision support systems to solve many real-world problems especially in agricultural environment. Using the basic principles of WSN and ...
详细信息
ISBN:
(纸本)9781509065264
Wireless Sensor Network (WSN) and related technologies are widely used to build decision support systems to solve many real-world problems especially in agricultural environment. Using the basic principles of WSN and Mobile computing technology, a Smart System for Shiitake Mushroom (SSSM) cultivation in a greenhouse environment was developed near Mount Kinabalu in Sabah, Malaysia. the wireless temperature, humidity and CO2 sensors are used to collect data in this application. the system monitors sensor data in a feedback cycle where the control devices are activated based on pre-defined threshold values. Implementation of SSSM will optimize the usage of human resources and also maximized the yield of the mushroom.
the proceedings contain 65 papers. the topics discussed include: performance and implementation of a FPGA-based cross polar interference canceller;ISMS planning based on ISO/IEC 27001:2013 using analytical hierarchy p...
ISBN:
(纸本)9781538635469
the proceedings contain 65 papers. the topics discussed include: performance and implementation of a FPGA-based cross polar interference canceller;ISMS planning based on ISO/IEC 27001:2013 using analytical hierarchy process at gap analysis phase (case study : XYZ Institute);comparison of A∗ and dynamic Pathfinding algorithm with dynamic Pathfinding algorithm for NPC on car racing game;secure VANET protocol using hierarchical pseudonyms with blind signature;traveling salesman problem using multi-element genetic algorithm;VP-LAB : a virtual way to stay connected with programming laboratory;alert, monitoring and tracking for electronic device prototype;satellite deployment strategy for an archipelagic state: the case of Indonesia;quantitative study of thresholding for device-to-device communication in 5G networks;statistical test on lightweight block cipher-based PRNG;transformation of time Petri net into PROMELA;design and implementation of government cloud computing requirements: TOGAF;architectural design of token based authentication of MQTT protocol in constrained IOT device;formal modeling for consistency checking of signal transition graph;and wideband monofilar helical antenna for wireless communication in remote area.
A software locking mechanism commonly protects shared resources for multithreaded applications. this mechanism can, especially in chip-multiprocessor systems, result in a large synchronization overhead. For real-time ...
详细信息
A software locking mechanism commonly protects shared resources for multithreaded applications. this mechanism can, especially in chip-multiprocessor systems, result in a large synchronization overhead. For real-timesystems in particular, this overhead increases the worst-case execution time and may void a task set's schedulability. this paper presents 2 hardware locking mechanisms to reduce the worst-case time required to acquire and release synchronization locks. these solutions are implemented for the chip-multiprocessor version of the Java Optimized Processor. the 2 hardware locking mechanisms are compared with a software locking solution as well as the original locking system of the processor. the hardware cost and performance are evaluated for all presented locking mechanisms. the performance of the better-performing hardware locks is comparable withthat of the original single global lock when contending for the same lock. When several noncontending locks are used, the hardware locks enable true concurrency for critical sections. Benchmarks show that using the hardware locks yields performance ranging from no worse than the original locks to more than twice their best performance. this improvement can allow a larger number of real-time tasks to be reliably scheduled on a multiprocessor real-time platform. Copyright (C) 2016 John Wiley & Sons, Ltd.
the advanced driver assistance system (ADAS) has been actively researched to enable adaptive cruise control and collision avoidance, however, conventional ADAS is not capable of more advanced functions due to the abse...
详细信息
ISBN:
(数字)9783319683454
ISBN:
(纸本)9783319683454;9783319683447
the advanced driver assistance system (ADAS) has been actively researched to enable adaptive cruise control and collision avoidance, however, conventional ADAS is not capable of more advanced functions due to the absence of intelligent decision making algorithms such as behavior analysis. Moreover, most algorithms in automotive applications are accelerated by GPUs where its power consumption exceeds the power requirement for practical usage. In this paper, we present a deep risk prediction algorithm, which predicts risky objects prior to collision by behavior prediction. Also, a real-timeembedded system with high energy efficiency is proposed to provide practical application of our algorithm to the intelligent ADAS, consuming only similar to 1 Win average. For validation, we build the risky urban scene stereo (RUSS) database including 50 stereo video sequences captured under various risky road situations. the system is tested with various databases including the RUSS, and it can maximally achieve 30 frames/s throughput with 720p stereo images with 98.1% of risk prediction accuracy.
FlexRay is becoming a popular in-vehicle communication protocol for the next generation x-by-wire applications such as drive-by-wire and steer-by-wire. the protocol supports bothtime-triggered and event-triggered tra...
详细信息
Hardware/software codesign involves various design problems including system specification, design space exploration and hardware/software partitioning. An effective codesign process requires accurately predicting the...
详细信息
ISBN:
(纸本)9783319625690;9783319625683
Hardware/software codesign involves various design problems including system specification, design space exploration and hardware/software partitioning. An effective codesign process requires accurately predicting the performance, cost and power consequence of any design trade-off in algorithms or hardware characterization. In order to satisfy these design constraints we developed a new codesign methodology: I-codesign. It starts with describing the system specification with probabilistic estimations of the execution scenarios along withreal-time and inclusion/exclusion parameters. then, a three phase partitioning approach is applied to the specification where each phase deals with a specific set of constraints. An embedded controller code is generated at the end of the methodology that acts at run-time on the reconfiguration requests.
Object tracking and localization is a complex task that typically requires processing power beyond the capabilities of low-power embedded cameras. this paper presents a new approach to real-time object tracking and lo...
详细信息
Stream processing has emerged as the major paradigm to tackle the digital information flood. Within stream processing, complex event processing (CEP) represents a pattern-based approach that enables automated situatio...
详细信息
Inherent resilience of applications enables the design paradigm of approximate computingthat exploits computation in-exactness by trading off output quality for runtime system resources. When executing such quality-s...
详细信息
ISBN:
(纸本)9781450344876
Inherent resilience of applications enables the design paradigm of approximate computingthat exploits computation in-exactness by trading off output quality for runtime system resources. When executing such quality-scalable applications on multiprocessor embeddedsystems, it is expected not only to achieve the highest possible output quality, but also to handle the critical thermal challenge spurred by vastly increased chip density. While the rising temperature causes significant quality distortion at runtime, existing thermal-management techniques, such as dynamic frequency scaling, rarely take into account the trade-off possibilities between output quality and thermal budget. In this paper, we explore the application-level quality-scaling features of resilient applications to achieve effective temperature control as well as quality maximization. We propose an efficient iterative pseudo quadratic programming heuristic to decide the optimal frequency and application execution cycles, in order to achieve quality optimization, under temperature, timing, and energy constraints. Our approaches are evaluated using realistic benchmarks with known platform thermal parameters. the proposed methods show a 98.5% quality improvement with temperature violation awareness.
暂无评论