In multitasking real-timesystems it is required to compute the WCET of each task and also the effects of interferences between tasks in the worst case. this is complex with variable latency hardware usually found in ...
详细信息
ISBN:
(纸本)9780769541556
In multitasking real-timesystems it is required to compute the WCET of each task and also the effects of interferences between tasks in the worst case. this is complex with variable latency hardware usually found in the fetch path of commercial processors. Some methods disable cache replacement so that it is easier to model the cache behavior. Lock-MS is an ILP based method to obtain the best selection of memory lines to be locked in a dynamic locking instruction cache. In this paper we first propose a simple memory architecture implementing the next-line tagged prefetch, specially designed for hard real-timesystems. then, we extend Lock-MS to add support for hardware instruction prefetch. Our results show that the WCET of a system with prefetch and an instruction cache with size 5% of the total code size is better than that of a system having no prefetch and cache size 80% of the code. We also evaluate the effects of the prefetch penalty on the resulting WCET, showing that a system without prefetch penalties has a worst-case performance 95% of the ideal case. this highlights the importance of a good prefetch design. Finally, the computation time of our analysis method is relatively short, analyzing tasks of 96 KB with 10(65) paths in less than 3 minutes.
High definition (HD) video decoder processes a great amount of data within a bounded time and thus requires high memory bandwidth. the memory bandwidth will dominate system performance, especially in embeddedsystems....
详细信息
ISBN:
(纸本)9781467351652;9780769549149
High definition (HD) video decoder processes a great amount of data within a bounded time and thus requires high memory bandwidth. the memory bandwidth will dominate system performance, especially in embeddedsystems. In this paper, we propose a lossless hybrid display frame compression algorithm called HPE (Hybrid Pixel Encoding) for HD video decoder considering high compression performance and realtime operation. the algorithm combines dictionary coding and run length coding to achieve a low compression ratio. We integrate the proposed design into an H. 264 decoder. Experimental results show that the proposed algorithm gains 67.7% of data reduction ratio on average when decoding 1080-HD video. It is much more effective than all previous works.
the paper presents a distributed computing environment for embedded control systems withtime-triggered and event-triggered distributed processing. We have already presented a time-triggered distributed object model a...
详细信息
ISBN:
(纸本)9780769533490
the paper presents a distributed computing environment for embedded control systems withtime-triggered and event-triggered distributed processing. We have already presented a time-triggered distributed object model and a time-triggered distributed computing environment for embedded control systems. However there are many embedded control systems withtime-triggered and event-triggered processing. In this paper we present two kinds of event-triggered distributed object models, a pure event-triggered distributed object model and a data-triggered distributed object model, in addition to the time-triggered distributed object model. We also present a distributed object computing environment based on a time-division scheduling for the mixed architecture withtime-triggered and event-triggered distributed processing. the time division scheduling divides an execution cycle into a time-triggered processing segment and a non-time-triggered processing segment. the time-triggered distributed processing is executed in the former segment, and the event-triggered distributed processing is executed in the latter segment. the distributed object computing environment consists of a real-time operating system withthe time division scheduling and distributed computing middleware to support the three kinds of distributed object models. We provide a development environment that generates stubs and configuration data to build distributed control systems.
Data Distribution Service (DDS) middleware facilitates interoperability and portability of components by building the underlying communication network in mixed-criticality systems withreal-time requirements, especial...
详细信息
ISBN:
(纸本)9781728151694
Data Distribution Service (DDS) middleware facilitates interoperability and portability of components by building the underlying communication network in mixed-criticality systems withreal-time requirements, especially those in conformity with Future Airborne Capability Environment (FACE) technical standard. Partitioning is the key technology permitting applications with different levels of criticality to execute in a same hardware on strict isolation in time and space. A system architecture is proposed to realize the integration of DDS into partitioned real-timeembeddedsystems compliant with ARINC-653 specification. the architecture allows communications among applicationsthrough the DDS middleware, whether they are executed in a partitioned system or not. then an Unmanned Aerial Vehicle (UAV) combat scenario is simulated to exemplify - the design feasibility. Evaluation tests show the communication stability can be obtained whether an ARINC-653 compliance system interconnect with heterogeneous systems or homogeneous systems. Based on the reliable configuration, the average communication time is stable at around 272.0 mu s in former situation and 281.32 mu s in the latter. And the specific performance difference between the two cases is further analyzed.
the Robotic Mobile Fulfillment System (RMFS) is an automated technology to fulfill various types of orders (e.g.,vehicle assembly) in modern warehouses or factories. In particular, battery-equipped mobile robots move ...
详细信息
ISBN:
(纸本)9798350387964;9798350387957
the Robotic Mobile Fulfillment System (RMFS) is an automated technology to fulfill various types of orders (e.g.,vehicle assembly) in modern warehouses or factories. In particular, battery-equipped mobile robots move racks that contain various components (Stock Keeping Unit) by visiting replenishment or picking stations to complete orders. We formulate the preliminary system model to optimize the order throughput and energy consumption of mobile robots, which consists of (i) rack allocation, (ii) task allocation, and (iii) route routing.
Cache locking is a commonly used mechanism to improve both performance and predictability for embedded programs. Dynamic cache locking methods proposed in the literature, where the locked content is modified during ex...
详细信息
ISBN:
(纸本)9798350387964;9798350387957
Cache locking is a commonly used mechanism to improve both performance and predictability for embedded programs. Dynamic cache locking methods proposed in the literature, where the locked content is modified during execution, require inserting locking and unlocking instructions in the program's code. In this paper, we introduce a novel hardware mechanism that leverages the LRU age bits to perform duration-based locking. Our proposed mechanism dynamically locks and unlocks cache lines for different durations at run-time, without the need to modify the program's code. We further devise a heuristic that analyzes a program's loop structure and selects the set of addresses to be locked in a L1 instruction cache alongside their locking durations. Evaluation results show that our duration-based locking mechanism achieves comparable results to the dynamic approach while substantially reducing the initialization overhead and avoiding program code modifications.
In recent years, there has been much research on ubiquitous computing, including context aware computingthat is an important field in ubiquitous computing. the primary focus of this paper is on context modeling. We s...
详细信息
ISBN:
(纸本)0769523463
In recent years, there has been much research on ubiquitous computing, including context aware computingthat is an important field in ubiquitous computing. the primary focus of this paper is on context modeling. We study the characteristics of context and so the requirements on the modeling. Besides, we also take into account the development requirements of next generation context-aware application. We study the context modeling approaches of some famous existing projects and find that few models meet all these requirements. In this paper, we propose a comprehensive model, which meets these requirements. We implement this model in a middleware called Scudware.
Internet of things enabled applications are an amalgamation of many physical devices embedded with electronics, sensors etc. whose data can be successfully used for monitoring of nature induced hazards. One such speci...
详细信息
ISBN:
(纸本)9781538677476
Internet of things enabled applications are an amalgamation of many physical devices embedded with electronics, sensors etc. whose data can be successfully used for monitoring of nature induced hazards. One such special case of hazard is seismic hazard which is a common occurrence in underground mines. It is very hard to detect and predict and can thus be compared to an earthquake. Detection of a seismic hazard is therefore of utmost importance for a healthy mining activity. this work presents a Grey systemstheory based classification method for the detection of seismic hazard in underground mines. the proposed approach has been applied on a real life data set to verify its viability. the simulation results show that the proposed approach showcases better performance than some of the state-of-the-art machine learning techniques.
We present a garbage collector scheduling algorithm for dynamic multiprocessor real-timesystems called GCMUA. the algorithm considers mutator activities that are subject to time/utility function time constraints, sto...
详细信息
ISBN:
(纸本)0769526764
We present a garbage collector scheduling algorithm for dynamic multiprocessor real-timesystems called GCMUA. the algorithm considers mutator activities that are subject to time/utility function time constraints, stochastic execution-time and memory demands, and overloads. We prove that GCMUA probabilistically lower bounds each mutator's accrued utility, lower bounds the total accrued utility, and upper bounds the assurances' sensitivity to variations in execution-time and memory demand estimates. Our simulation results confirm our analytical results.
embeddedsystems have been used to control physical environments for decades. Usually, such use cases require low latencies between commands and actions as well as a high predictability of the expected worst-case dela...
详细信息
ISBN:
(纸本)9781728198293
embeddedsystems have been used to control physical environments for decades. Usually, such use cases require low latencies between commands and actions as well as a high predictability of the expected worst-case delay. To achieve this on small, low-powered microcontrollers, real-time Operating systems (RTOSs) are used to manage the different tasks on these machines as deterministically as possible. However, withthe advent of the Internet of things (IoT) in industrial applications, the same embeddedsystems are now equipped with networking capabilities, possibly endangering critical real-timesystemsthrough an open gate to interrupts. this paper presents our initial study of the impact network connections can have on real-timeembeddedsystems. Specifically, we look at three aspects: the impact of network-generated interrupts, the overhead of the related networking tasks, and the feasibility of sharing computing resources between networking and real-time tasks. We conducted experiments on two setups: One treating NICs and drivers as black boxes and one simulating network interrupts on the machines. the preliminary results show that a critical task performance loss of up to 6.67% per received packet per second could be induced where lateness impacts of 1% per packet per second can be attributed exclusively to ISR-generated delays.
暂无评论