Stagnant Timing investigation of Embedded Software on Advanced Processor Architectures
Journal Title: International Journal of Electronics Communication and Computer Technology - Year 2012, Vol 2, Issue 1
Abstract
Most processors today are embedded in products like mobile phones, microwave owns, welding machines etc and are not used in PC’s as many believe Since some of these embedded computers are used in time-critical or safety-critical systems it is very important that the behaviour of these systems are well known. One part of that is to know the Worst Case Execution Time (WCET) of the different tasks in the embedded system. First, shortcomings in current as well as future standards to controlling the power grid are outlined. From these economic and safety threats, we derive an immediate need to invest in research on the protection of the power grid, both from the perspective of cyber attacks and distributed control system problems. Second, current software design practice does not adequately verify and validate worst-case timing scenarios that have to be guaranteed in order to meet deadlines in safety-critical embedded systems. This equally applies to avionics and the automotive industry, both of which are increasingly requiring their suppliers to provide variable bounds on worst-case execution time of software.
Authors and Affiliations
M. Shankar| Associate Professor, KEC, Kuppam, AP, India Email: magaprajin@gmail.com, Dr. M. Sridar| Director of International Relations Bharath University, Chennai, TN, India, Email: deaninternational@bharathuniv.ac.in, Dr. M. Rajani| Director of R & D Bharath University, Chennai, TN, India Email: deanrd@bharathuniv.ac.in
Design of Pulse Triggered FlipFlop for Low Power Applications
Most important challenge in modern VLSI design along with area and speed is the power consumption. Flip flop is the basic element in digital system which plays very important role. In this paper, a low power pulse tri...
Assigning Subjects to Teachers Using Apriori Algorithm
Data mining is a computerized technology that uses complicated algorithms to find relationships in large data bases Extensive growth of data gives the motivation to find meaningful patterns among the huge data. Aprior...
Voice Based Elderly Assistance Using Wireless Technology
The voice controlled wheel robot system needs to make use of the latest technological components available. In this paper, we present the design and implementation of a voice based wheel chair system where communication...
A High Capacitive and Confidentiality Steganography Using Private key
Steganography and Steganalysis are two important areas of research that involve a number of applications. These two areas of research are important especially when reliable and secure information exchange is required. To...
System On Chip: Performance Analysis Of VLSI Based Networking System
The swell in the numeral of cores that can be incorporated on a distinct chip has forced the designer to use computer system concepts for design of System on Chip (SoC).The supplementary is of multiple protocols being...