slugA Novel Approach ForHost-Compiled Processor Model With Cache And PipeliningIntegration
Journal Title: International Journal for Research in Applied Science and Engineering Technology (IJRASET) - Year 2014, Vol 2, Issue 4
Abstract
In the increasing model of the embedded system software solutions host compiled as well as the Real Time Operating System made the dramatic added applications for the mobile applications all over the world. However, designerspay the price for higher performance with a loss in timing accuracy.In this work, we introduce a novel predictive OS model toprovide fast software simulation with accurate scheduling of periodicreal-time tasks. The OS model predicts the next preemptionpoint by monitoring system state, and automatically and optimallyadjusting the granularity of back-annotated delays. We evaluatedour simulator on a range of periodic task sets. Our observationsshow that we can achieve the same 99% accuracy as a simulationat 1 s granularity with an average 230x speedup.
Authors and Affiliations
N. Vinothini, T. Uma Maheswari, K. Kannan, M. Sankar
Finite Element Analysis of Front Axle of Farm Tractor Using CAE Tools
Front Axle is attached to the front side of the Tractor and is used in the process of steering the machine towards right or left and is one of the major and very important components. Designing of the components is very...
Achieving Anonymity with Fully Anonymous Attribute-Based Encryption and Controlling Access Privilege in Cloud
Cloud computing could be a revolutionary computing paradigm, that allows versatile, on-demand, and inexpensive usage of computing resources, however the info is outsourced to some cloud servers, and varied privacy consi...
Graphical Cipher Ratification System
Graphical Cipher Ratification System is a new graphical password strategy for common terminals that restores the passive digital models commonly used in graphical password systems with materialized tokens, in the form o...
Detection and Classification of Brain Tumor Images Using Back Propagation Fuzzy Neural Network
Artificial Neural networks are a substantial research area in medical image classification. The Bio Medical image recognition techniques have been generally applied in various diagnosis diseases to predict the result mo...
Vulnerability Assessment and Penetration Testing for Url’s Using Different Sql’s Injections Manually
vapt (vulnerability assessment and penetration testing) provides a critical observation of organization operating systems, web servers, database servers, access points and loop holes or back doors. It gives a more detai...