66 results
Search Results
2. A Cooperative Web Framework of Jini into OSGi-based Open Home Gateway.
- Author
-
Zhang-Long Chen, Wie Liu, Shi-Liang Tu, Wie Du, Zhaohui Wu, Chun Chen, Minyi Guo, and Jiajun Bu
- Abstract
The administration of heterogeneous networks with many embedded equipments and mobile devices is a hard and time-consuming task. Today’s methods only provide static configuration files and make the addition and removal of devices a manual chore. The Open Services Gateway Initiative (OSGi) specification defines a service-oriented framework for use in residential gateways. OSGi framework acts as a gateway from the Internet to consumer devices attached to the residence’s home-area network. And Jini is an infrastructure for spontaneous and ad hoc service networks. It allows users to find services which consumer devices provide without prior knowledge of their network environments. The paper presents a cooperative web framework for the integration of Jini into OSGi open home gateway which can provide much easier, more intelligent and powerful home network control service. It can federate home-area network devices and services in secure ways by Internet. This paper puts forward relative design and reference implementation. [ABSTRACT FROM AUTHOR]
- Published
- 2005
- Full Text
- View/download PDF
3. The Efficient QoS Control in Distributed Real-Time Embedded Systems.
- Author
-
You-Wei Yuan, La-Mei Yan, Qing-Ping Guo, Zhaohui Wu, Chun Chen, Minyi Guo, and Jiajun Bu
- Abstract
Developing distributed embedded systems based on Internet and Web technologies is a relative new trend in computer technologies. The paper shows the tree-layer client-server model in developing web-based distributed embedded systems. It also presents a model-driven approach for generating quality-of-service (QoS) adaptation in Distributed Real-time Embedded (DRE) Systems. Our control task model consists of the target task to be controlled, the adaptation task that implements the control algorithm. We have built a prototype of a middleware system which verifies our control model and shows the soundness of our approach. A detailed experimental analysis is also presented in this paper. Key Words. Quality of Service (QoS); Real Time; Embedded Systems; Distributed Computation [ABSTRACT FROM AUTHOR]
- Published
- 2005
- Full Text
- View/download PDF
4. Selecting a Scheduling Policy for Embedded Real-Time Monitor and Control Systems.
- Author
-
Qingxu Deng, Mingsong Lv, Ge Yu, Zhaohui Wu, Chun Chen, Minyi Guo, and Jiajun Bu
- Abstract
An integrated solution to guarantee real-time requirements in embedded real-time monitor and control systems is presented in this paper. First a typical task model is abstracted from such a control system, together with specific characteristics of the tasks. These system characteristics lead to a hybrid scheduling policy of the rate monotonic algorithm and the sporadic server algorithm. The feasibility and rationality of such a policy are also analyzed. The rate monotonic algorithm is extended in this paper, providing a schedulability test that incorporates factors such as context switching overhead and task synchronization. [ABSTRACT FROM AUTHOR]
- Published
- 2005
- Full Text
- View/download PDF
5. Robust and Adaptive Dynamic Power Management for Time Varying System.
- Author
-
Min Li, Xiaobo Wu, Menglian Zhao, Ping Li, Xiaolang Yan, Zhaohui Wu, Chun Chen, Minyi Guo, and Jiajun Bu
- Abstract
Dynamic Power Management (DPM) is an effective power reduction technique to dynamically control power state of system components. Although there are already a lot of papers on DPM, few of them present robust and adaptive solution to handle the inherent time varying behavior of real world system. In this paper, we propose techniques for targeting DPM on the time varying behaviors. In our approach, we apply efficient policy optimization method to generate online power management policy to achieve adaptiveness. Moreover, in order to handle the small scale varying behavior (perturbation) that tends to significantly degrade the performance of DPM, we apply the Bounded Parameter Markov Decision Process and Interval Value Iteration to derive robust policy tolerant to perturbations. Simulation results show that the proposed techniques are effective. [ABSTRACT FROM AUTHOR]
- Published
- 2005
- Full Text
- View/download PDF
6. New Approach for Device Driver Development – Devil+ Language.
- Author
-
Yingxi Yu, Mingyuan Zhu, Shuoying Chen, Zhaohui Wu, Chun Chen, Minyi Guo, and Jiajun Bu
- Abstract
This paper presents a new approach to develop device drivers for embedded system: Devil+ language [3, 4, 7] which can automatically generate device driver code [9]. It demonstrates the whole process to develop embedded system device driver with this new language. The example project selects SHARP KEV79520 as hardware platform [8], DeltaOS as software platform [5, 6, 7]. Development processes are illustrated with source code. Some programming details are also explained in this paper. Finally we illustrate the benefit of the new methodology in embedded system development with the comparison between the Devil+ approach and the traditional raw C language method. [ABSTRACT FROM AUTHOR]
- Published
- 2005
- Full Text
- View/download PDF
7. Smart Client Techniques for Online Game on Portable Device.
- Author
-
Huacheng Ke, Haixiang Zhang, Chun Chen, Zhaohui Wu, Minyi Guo, and Jiajun Bu
- Abstract
In this paperThis paper is supported by National High Technology Research and Development Program of China (863 Program, No. 2004AA1Z2390) and Key Technologies R & D Program of Zhejiang Province (No. 2005C23047 & No. 2004C11052), a smart client model tailored for online game on portable devices is presented. Based on the context of game environment, server-side programming paradigm and smart deployment techniques are proposed to address the problems that emerge in online mobile game development. Network traffic issues of such a model are also discussed in this paper. An illustrative example is given in the last part of the paper. [ABSTRACT FROM AUTHOR]
- Published
- 2005
- Full Text
- View/download PDF
8. Application of Cooperating and Embedded Technology for Network Computer Media Player.
- Author
-
Yue Gao, Bin Zhang, Xichang Zhong, Liuying Qu, Zhaohui Wu, Chun Chen, Minyi Guo, and Jiajun Bu
- Abstract
A network computer (NC) is a lightweight computer system like a thin client. Although a network computer has many advantages, it is less specialized to play multimedia files through network servers. The conventional mode is that network server not only reads but also decodes multimedia data and network computer just plays frames transmitted from network server. This makes network server overloaded. In this paper, we analyze principles of playing multimedia files between NC and network server, and apply cooperating and embedded technology to resolve the problem. Also, the paper details design and implementation of network computer media player and touches upon the future works. [ABSTRACT FROM AUTHOR]
- Published
- 2005
- Full Text
- View/download PDF
9. PN-based Formal Modeling and Verification for ASIP Architecture.
- Author
-
Yun Zhu, Xi Li, Yu-Chang Gong, Zhi-Gang Wang, Zhaohui Wu, Chun Chen, Minyi Guo, and Jiajun Bu
- Abstract
This paper presents a novel extended timed Petri Net model called PNPM — Petri Net based Representation for Pipeline Modeling, and a verification scheme based on PNPM called PPL-MC — PNPM and Lambda Calculus based Model Checker They focus on formal modeling and verification especially for ASIP architecture with pipeline structure. In this paper, PNPM elements have been defined, and their validity and usage are demonstrated. Also, the scheme of PPL-MC is introduced. [ABSTRACT FROM AUTHOR]
- Published
- 2005
- Full Text
- View/download PDF
10. Guaranteed Cost Control of Networked Control Systems: An LMI Approach.
- Author
-
Shanbin Li, Zhi Wang, Youxian Sun, Zhaohui Wu, Chun Chen, Minyi Guo, and Jiajun Bu
- Abstract
In this paper, networked control systems (NCS) is modeled as a discrete-time linear state-delayed system with norm-bounded uncertainty. Inspired by the so-called descriptor model transformation, a delay-dependent sufficient condition for the existence of a guaranteed cost controller for NCS is presented by a set of linear matrix inequalities (LMIs). The resulting controller can not only asymptotically stabilize the system but also guarantee an adequate level of performance. Theoretical analysis and illustrative results show that the control strategy presented in this paper is effective and feasible. [ABSTRACT FROM AUTHOR]
- Published
- 2005
- Full Text
- View/download PDF
11. Agent-Oriented Approach to Ubiquitous Computing.
- Author
-
Amamiya, Makoto, Zhaohui Wu, Chun Chen, Minyi Guo, and Jiajun Bu
- Abstract
With today’s developments in device miniaturization, wireless networking, such as PCs, PDAs, Cell phones, RFID tags and so on, we are facing great opportunities and challenges to realize the ubiquitous computing vision. In this paper, we first identify the key characteristics of ubiquitous computing systems; then argue that agents and agent networks are the right metaphor for managing the dynamism and complexity of system integration and on demand interactions in ubiquitous computing systems. [ABSTRACT FROM AUTHOR]
- Published
- 2005
- Full Text
- View/download PDF
12. Maximizing Parallelism for Non-uniform Dependence Loops Using Two Parallel Region Partitioning Method.
- Author
-
Sam Jin Jeong, Zhaohui Wu, Chun Chen, Minyi Guo, and Jiajun Bu
- Abstract
The existing parallelizing compilers can parallelize most of the loops with uniform dependences, but they do not satisfactorily handle loops with non-uniform dependences. Most of the time, the compiler leaves such loops running sequentially. Unfortunately, loops with non-uniform dependences are not so uncommon in the real world. This paper presents the two parallel region partitioning method of nested loops with non-uniform dependences for maximizing parallelism. By parallelizing anti dependence region using variable re-naming, we will divide the iteration space into two parallel regions by a line in case that FDT (Flow Dependence Tail set) does not overlap FDH (Flow Dependence Head set). Comparison with some related works shows more parallelism than other existing methods. [ABSTRACT FROM AUTHOR]
- Published
- 2005
- Full Text
- View/download PDF
13. Electronic Reading Pen: A DSP Based Portable Device for Offline OCR and Bi-linguistic Translation.
- Author
-
Qing Wang, Sicong Yue, Rongchun Zhao, David Feng, Zhaohui Wu, Chun Chen, Minyi Guo, and Jiajun Bu
- Abstract
In the paper, a portable off-line OCR and bi-linguistic translation system (Chinese to English, English to Chinese)—Electronic Reading Pen (ERPen) is designed and implemented. The constitution of ERPen hardware is designed and several modules, including CCD line array acquisition, wheel driven unit, FLASH management and USB interface are implemented. Moreover, the embedded software, consisting of image preprocessing, character segmentation and recognition, and corpus based postprocessing, is also discussed and implemented. A novel segmentation approach, central growth algorithm, is proposed and applied in ERPen system. Experimental results have shown that ERPen is effective to tackle printed character recognition and translation. [ABSTRACT FROM AUTHOR]
- Published
- 2005
- Full Text
- View/download PDF
14. Preserving Consistency in Distributed Embedded Collaborative Editing Systems.
- Author
-
Bo Jiang, Jiajun Bu, Chun Chen, Zhaohui Wu, and Minyi Guo
- Abstract
The increasing quest for mobility bolster the integration of technology of computer supported cooperative work and mobile computing. In cooperative editing systems that integrated with embedded devices, inconsistency is one of the major problems. In this paper, locking scheme and the corresponding algorithm of locking conflict solution are proposed to maintain consistency of the distributed shared documents and enhance the efficiency of collaborative users. The scheme and algorithm are realized in CoEdit – a prototype system of collaborative editing system. [ABSTRACT FROM AUTHOR]
- Published
- 2005
- Full Text
- View/download PDF
15. Chaos-Model Based Framework for Embedded Software Development.
- Author
-
Huifeng Wu, Jing Ying, Xian Chen, Minghui Wu, Changyun Li, Zhaohui Wu, Chun Chen, Minyi Guo, and Jiajun Bu
- Abstract
The main issue of today’s software development process is how to relate the schedule and coding of the software project. The chaos model of software development gave a theoretical description for it. This paper introduces the chaos model into the research of software architecture and brings forward a new software development framework CBFSD, which divides the process of software development into three levels: tasks level, codes level and components level. The construction of components level’s architecture is the core of the whole framework. In this framework, we use the chaos strategy: ”Resolve the most important issue first.” The strategy makes it more appropriate to design and develop complicated software systems. [ABSTRACT FROM AUTHOR]
- Published
- 2005
- Full Text
- View/download PDF
16. A Structure Modeling Method for Multi-task Embedded Software Design.
- Author
-
Jiamei Cai, Tieming Chen, Liying Zhu, Zhaohui Wu, Chun Chen, Minyi Guo, and Jiajun Bu
- Abstract
Development of multi-task embedded software involves very complex modeling process. Based on the data flow diagram (DFD) method, a structure modeling method for multi-task embedded system design is present in this paper. This structure modeling approach mainly depends on the task-based DFD method. As a concrete instance, the development of a project on IMS detector design is discussed using above method. It is true that DFD-based structure model is an effective solution for some real time embedded system design [ABSTRACT FROM AUTHOR]
- Published
- 2005
- Full Text
- View/download PDF
17. Using Model-Based Test Program Generator for Simulation Validation.
- Author
-
Youhui Zhang, Dongsheng Wang, Jinglei Wang, Weimin Zheng, Zhaohui Wu, Chun Chen, Minyi Guo, and Jiajun Bu
- Abstract
The continuous advances in microelectronics design are creating a significant challenge to design validation in general. Tackling pipelined microprocessors is remarkably more demanding. This paper presents a methodology to automatically produce a test program for simulation-based validation of microprocessors maximizing the given verification constraints. The approach integrates an accurate c-simulator to trace internal states, including memory access patterns, cache states, pipeline states and so on, of the target processor to generate test vectors with higher efficiency. The test program generator is integrated into a co-verification environment, which is used to verify an embedded processor with a 7-statge pipeline developed by our team and gained remarkable effects. [ABSTRACT FROM AUTHOR]
- Published
- 2005
- Full Text
- View/download PDF
18. Model Optimization Techniques in a Verification Platform for Classified Properties.
- Author
-
Ming Zhu, Jinian Bian, Weimin Wu, Zhaohui Wu, Chun Chen, Minyi Guo, and Jiajun Bu
- Abstract
In system functional verification, collaborative method is an effective technique. Co-SAM verification platform employs three verification methods, static analysis, logic simulation and model checking, to implement verification process. With the collaborative platform, system properties are classified and verified. A whole model for a system inclines to ineffectiveness and states explosion during verification. Model refinement is indispensable. This paper presents special optimization techniques for verification model refinement, i.e. property grouping, signals reordering, and model hierarchizing. Experimental results demonstrate the validity of these optimization techniques in system functional verification. [ABSTRACT FROM AUTHOR]
- Published
- 2005
- Full Text
- View/download PDF
19. Formal Verification of a Ubiquitous Hardware Component.
- Author
-
Lu Yan, Zhaohui Wu, Chun Chen, Minyi Guo, and Jiajun Bu
- Abstract
This paper is a case study of the verification of a seven-segment LED display decoder circuit design, in which two popular verification tools, HOL and PVS, are compared and evaluated. [ABSTRACT FROM AUTHOR]
- Published
- 2005
- Full Text
- View/download PDF
20. EmGen: An Automatic Test-Program Generation Tool for Embedded IP Cores.
- Author
-
Haihua Shen, Yunji Chen, Jing Huang, Zhaohui Wu, Chun Chen, Minyi Guo, and Jiajun Bu
- Abstract
Core-based system-on-chip (SoC) design is quickly becoming a new paradigm in electronic system design due to the reusability of IP cores. However, the validation of IP cores is the most time consuming task in the design flow. This paper presents EmGen, an automatic test-program generation tool designed for embedded microprocessor cores. EmGen provides an configurable formal specification model with heuristic knowledge, which can generate test programs according to different configuration of microprocessors’ architecture, a test generation scheme based on heuristic algorithms, which can efficiently provide instructions in test programs, and validation testbenches, which support simulation with generated test programs automatically and check the equivalence of microprocessors and the specified instruction reference model. EmGen is currently in use at ICT for the verification of embedded microprocessor cores. Experiments results show that EmGen can improve verification process and cut down skilled manpower obviously. [ABSTRACT FROM AUTHOR]
- Published
- 2005
- Full Text
- View/download PDF
21. EFSM-based Testing Strategy for APIs Test of Embedded OS.
- Author
-
SongXia Hao, XiChang Zhong, Yun Wang, Zhaohui Wu, Chun Chen, Minyi Guo, and Jiajun Bu
- Abstract
In this paper, we present a two-phase approach to generate test data for the EFSM model of an embedded operating system. We first build the EFSM model of the system. The model can then be used to automatically generate test data for testing of APIs. We also point out certain issues that need further study. [ABSTRACT FROM AUTHOR]
- Published
- 2005
- Full Text
- View/download PDF
22. An Efficient Verification Method for Microprocessors Based on the Virtual Machine.
- Author
-
Jianfeng An, Xiaoya Fan, Shengbing Zhang, Danghui Wang, Zhaohui Wu, Chun Chen, Minyi Guo, and Jiajun Bu
- Abstract
This paper presents an efficient verification method for microprocessors based on virtual machine. Under memory and I/O device models provided by the virtual machine, our simulation tool can not only simulate test programs but also operating systems. This simulation environment is close to the real environment of microprocessors, so it is sufficient for functional verification of microprocessors before tape out. At the same time, our simulation tool can automatically compare the simulation results using the virtual machine as reference model and find the error positions. This method takes full advantage of the virtual machine and greatly improves speed and efficiency of the verification procedure. This method has been successfully applied in the verification of an embedded microprocessor Amex86 designed in our laboratory for six months by five persons. [ABSTRACT FROM AUTHOR]
- Published
- 2005
- Full Text
- View/download PDF
23. Sharing I/O in Strongly Partitioned Real-Time Systems.
- Author
-
Shah, Ravi, Yann-Hang Lee, Daeyoung Kim, Zhaohui Wu, Chun Chen, Minyi Guo, and Jiajun Bu
- Abstract
Strongly partitioned real-time systems have been adopted to provide an integrated run time environment for applications with varied criticalities. This is achieved by guaranteeing spatial as well as temporal partitioning for the applications. To enable accesses to shared I/O devices in such an environment, this paper provides an effective model that the co-existence of any application does not hinder the execution of IO operations or spatial and temporal requirements of other applications. The model utilizes a microkernel-based approach to regulate the work of drive drivers and thus integrate the device-sharing model with the microkernel. [ABSTRACT FROM AUTHOR]
- Published
- 2005
- Full Text
- View/download PDF
24. Relating FFTW and Split-Radix.
- Author
-
Kiselyov, Oleg, Taha, Walid, Zhaohui Wu, Chun Chen, Minyi Guo, and Jiajun Bu
- Abstract
Recent work showed that staging and abstract interpretation can be used to derive correct families of combinatorial circuits, and illustrated this technique with an in-depth analysis of the Fast Fourier Transform (FFT) for sizes 2n. While the quality of the generated code was promising, it used more floating-point operations than the well-known FFTW codelets and split-radix algorithm. This paper shows that staging and abstract interpretation can in fact be used to produce circuits with the same number of floating-point operations as each of split-radix and FFTW. In addition, choosing between two standard implementations of complex multiplication produces results that match each of the two algorithms. Thus, we provide a constructive method for deriving the two distinct algorithms. [ABSTRACT FROM AUTHOR]
- Published
- 2005
- Full Text
- View/download PDF
25. An Adaptive Fault Tolerance Scheme for Applications on Real-Time Embedded System.
- Author
-
Hongzhou Chen, Guochang Gu, Yizun Guo, Zhaohui Wu, Chun Chen, Minyi Guo, and Jiajun Bu
- Abstract
An adaptive fault tolerance scheme aiming at those real-time embedded systems that have single processor and limited resources is presented in this paper. As the fault behavior exhibited by system changes with time and environment, it can decide a suitable strategy among various reliable techniques that have been introduced into application software. Prediction on fault emergence is made by strategy decider according to its memory of fault emerging history. The application module is assigned to contact with fault tolerance controller through its stubs. Performance of the scheme is measured and evaluated in experiment. Some parameters are also discussed. [ABSTRACT FROM AUTHOR]
- Published
- 2005
- Full Text
- View/download PDF
26. Why Simple Timeout Strategies Work Perfectly in Practice?
- Author
-
Qi Wu, Guang-ze Xiong, Zhaohui Wu, Chun Chen, Minyi Guo, and Jiajun Bu
- Abstract
In all kinds of dynamic power management (DPM) policies, the timeout policy works perfectly in practice, but this could not be elucidated in the traditional queuing theory. With the pareto distribution, the drawback of the exponential distribution was overcome, and this phenomena was explained well. The conclusion provided the theoretical basis for the simplification of DPM algorithm. In this paper, a simple DPM algorithm was described when the length of idle time follows the Pareto distribution. The simulation result testified the conclusion above. [ABSTRACT FROM AUTHOR]
- Published
- 2005
- Full Text
- View/download PDF
27. The Modeling for Dynamic Power Management of Embedded Systems.
- Author
-
Jiangwei Huang, Tianzhou Chen, Minjiao Ye, Yi Lian, Zhaohui Wu, Chun Chen, Minyi Guo, and Jiajun Bu
- Abstract
In this paper we present a new modeling technique using software engineering tool Flow Model for modeling and solving the Dynamic Power Management (DPM) with complex behavioral characteristics. Using this tool we can model the whole system easily. Experimental results show that the proposed technique can achieve more than 12% power saving compared to other DPM techniques. [ABSTRACT FROM AUTHOR]
- Published
- 2005
- Full Text
- View/download PDF
28. Skyeye: An Instruction Simulator with Energy Awareness.
- Author
-
Shuo Kang, Huayong Wang, Yu Chen, Xiaoge Wang, Yiqi Dai, Zhaohui Wu, Chun Chen, Minyi Guo, and Jiajun Bu
- Abstract
This paper presents a novel strategy aimed at modeling the instruction energy consumption of ARM microprocessors with dynamic voltage scaling (DVS) support. A novel energy estimation algorithm is designed, which can record the function calls, and generate a detailed energy profile for each function in a specific program. Some of the optimization policies for implementation are also discussed. These optimization policies reduce the workload of the energy estimators for the individual SOC systems. The prototype system, SKYEYE, can automatically detect the voltage/frequency variation activated by DVS system, and adjust the energy estimation model accordingly. The experiment results further prove the effectiveness of the algorithm. [ABSTRACT FROM AUTHOR]
- Published
- 2005
- Full Text
- View/download PDF
29. A Functionality Based Instruction Level Software Power Estimation Model for Embedded RISC Processors.
- Author
-
Jia Chen, Sheng-yuan Wang, Yuan Dong, Gui-lan Dai, Yang Yang, Zhaohui Wu, Chun Chen, Minyi Guo, and Jiajun Bu
- Abstract
This paper describes a functionality-based instruction-level power analysis model, which aims at reducing workload of computing inter-instruction power and keeping the convenience to observe necessary parameters from a source-code description. The model treats the total power as the sum of basic power of individual functional component and switching power of consecutive components pairs. To get the switching power, the switching activities between two functional components are treated as one changing from working state to sleeping state and the other from sleeping state to working state. NOP instructions are used to model transitions between the two states. The model is experimentally validated on a wide range of embedded software routines. Experiments show that our model is within 95% accuracy on the average, and can reduce the workload from a complexity of O(n2), which is the workload of traditional instruction-level energy estimation techniques, to a complexity of O(n). [ABSTRACT FROM AUTHOR]
- Published
- 2005
- Full Text
- View/download PDF
30. SmartOSEK: A Real-Time Operating System for Automotive Electronics.
- Author
-
Minde Zhao, Zhaohui Wu, Guoqing Yang, Lei Wang, Wei Chen, Chun Chen, Minyi Guo, and Jiajun Bu
- Abstract
This paper puts forward SmartOSEK, a dependable platform for automobile electronics, which consists of an operating system compliant with OSEK/VDX specifications and an integrated development environment (IDE) that consists of many convenient tools, such as visual designer, system generator, time analyst, scheduling analyst, and running tracer. In the operating system, SmartOSEK OS and SmartOSEK COM are presented. In the IDE, we apply the graphic design, automatic code generation and time analysis to help developers devote their mind to the modeling of the applications. A design example of automated transmission system based on SmartOSEK platform is given, and good results are achieved. [ABSTRACT FROM AUTHOR]
- Published
- 2005
- Full Text
- View/download PDF
31. On Generalizing Interrupt Handling into a Flexible Binding Model for Kernel Components.
- Author
-
Qiming Teng, Xiangqun Chen, Xia Zhao, Zhaohui Wu, Chun Chen, Minyi Guo, and Jiajun Bu
- Abstract
This paper presents a flexible binding implementation in JBEOS, a component based embedded operating system targeted at resource-constrained devices. This binding model features an extensible framework, which consists of two stub segments named prolog and epilog respectively. By making the binding service an ingredient of the run-time infrastructure, dynamic loading and binding of system components is supported in JBEOS. Synchronization, mutual exclusion issues are made transparent by manipulating the inter-component communications using the binding model given. [ABSTRACT FROM AUTHOR]
- Published
- 2005
- Full Text
- View/download PDF
32. Embedded Operating System Design: The Resolved and Intelligent Daemon Approach.
- Author
-
Hai-yan Li, Xin-ming Li, Zhaohui Wu, Chun Chen, Minyi Guo, and Jiajun Bu
- Abstract
Embedded system with the kernel of embedded operating system becomes the ubiquitous computing unit now. Embedded operating system should be of hard real-time, high reliability and high availability. Aiming at satisfying the demands of applications, based on analyzing the existing three kinds of operating system architectures and some new design technologies, this paper presents a novel design of operating system which is based on resolved and intelligent daemon and agent-based coordination managing components. [ABSTRACT FROM AUTHOR]
- Published
- 2005
- Full Text
- View/download PDF
33. Applying Component-Based Meta-service in Liquid Operating System for Pervasive Computing.
- Author
-
Bo Ma, Yi Zhang, Xingguo Shi, Zhaohui Wu, Chun Chen, Minyi Guo, and Jiajun Bu
- Abstract
Liquid meta-service, a component-based operating system layer, is intended to enable embedded operating system to support pervasive computing by meeting the requirements of being spontaneous and adaptive. This is accomplished through two key features: (1) configurable, component-based infrastructure services called meta-service, and (2) a meta-service components trading service, which provides selecting and configuring mechanism for meta-service components. In this paper, we discuss the design principle, component model, implementations of some meta-service, and analyze the performance impact of using meta-service in embedded operating system. [ABSTRACT FROM AUTHOR]
- Published
- 2005
- Full Text
- View/download PDF
34. A Novel Task Scheduling for Heterogeneous Systems.
- Author
-
XuePing Ren, Jian Wan, GuangHuan Hu, Zhaohui Wu, Chun Chen, Minyi Guo, and Jiajun Bu
- Abstract
Heterogeneous computing environments have been widely used in real-time embedded systems. Efficient task scheduling is essential for achieving reliability in embedded systems. In this paper, an algorithm called the Real and Reliable Scheduling (RRTS) has been proposed to improve the system reliability. The RRTS algorithm is achieved by applying a reliability model to a List Scheduling algorithm. The algorithm firstly calculates Earliest-Finish-Times (EFTs) and reliability costs of a task in every processor. Then the minimum EFT is selected. Finally, the task is scheduled to a processor according to the EFT and reliability costs. The experimental results and examples show that the algorithm can improve system reliability significantly while maintaining high performance. [ABSTRACT FROM AUTHOR]
- Published
- 2005
- Full Text
- View/download PDF
35. A New Approach to Deadlock Avoidance in Embedded System.
- Author
-
Gang Wu, Zhiqiang Tang, Shiliang Tu, Zhaohui Wu, Chun Chen, Minyi Guo, and Jiajun Bu
- Abstract
Deadlock avoidance algorithms help to improve fault tolerance feature of computer system. Unfortunately, few current algorithms are useful to embedded system either because they only work with single-unit resources, or because the time cost is too high. This paper improves the reduction algorithm with tree structure. According to the new algorithm, only multi-unit resources and the root process in each tree are considered when reducing, while single-unit resources and other processes are ignored because they are combined with tree structure. Thus the new algorithm works with all kinds of resources and its time cost is lower. The new algorithm is useful to embedded system. [ABSTRACT FROM AUTHOR]
- Published
- 2005
- Full Text
- View/download PDF
36. A Jitter-Free Kernel for Hard Real-Time Systems.
- Author
-
Angelov, Christo, Berthing, Jesper, Zhaohui Wu, Chun Chen, Minyi Guo, and Jiajun Bu
- Abstract
The paper presents advanced task management techniques featuring Boolean vectors and bitwise vector operations on kernel data structures in the context of the HARTEXTM hard real-time kernel. These techniques have been consistently applied to all aspects of task management and interaction. Hence, the execution time of system functions no longer depends on the number of tasks involved, resulting in predictable, jitter-free kernel operation. This approach has been further extended to time management resulting in a new type of kernel component, which can be used to implement timed multitasking - a novel technique providing for jitter-free execution of hard real-time tasks. [ABSTRACT FROM AUTHOR]
- Published
- 2005
- Full Text
- View/download PDF
37. Synchronized Data Gathering in Real-Time Embedded Fiber Sensor Network.
- Author
-
Yanfei Qiu, Fangmin Li, Ligong Xue, Zhaohui Wu, Chun Chen, Minyi Guo, and Jiajun Bu
- Abstract
An Embedded Fiber Sensor Network (EFSN) is a health monitoring network for large structure consisted of several sensor nodes, each equipped with fiber-optic sensor, embedded processor, and data transceiver. The collective sensing data of such a system of networked sensors can be utilized to evaluate structural health conditions of bridges, elevators, composites, mines, and even reactors. Key concerns for designing such networks are real-time detection, data synchronization and reliable information submission. This paper addresses these issues and presents an Independent Circular Cache Queue (ICCQ) to reduce the amount of traffic in the network. In the ICCQ mechanism, a self-managed scheme is implemented in the network to maintain stability under varying environmental disturbance and sensor sensitivities. [ABSTRACT FROM AUTHOR]
- Published
- 2005
- Full Text
- View/download PDF
38. OPC-based Architecture of Embedded Web Server.
- Author
-
Zhiping Jia, Xin Li, Zhaohui Wu, Chun Chen, Minyi Guo, and Jiajun Bu
- Abstract
This paper combines OPC (OLE for Process Control) standard to EWS (Embedded Web Server) in order to distribute an integrated service for accessing real-time and history data from control networks. A layer of OPC XML-DA (Data Access) service is added between web services interfaces and embedded operation system in OPC-EWS. Architecture of DCS (Distributed Control System) with OPC-EWS is described too. This OPC-EWS applies such technologies as OPC, Java and XML and links to Internet through TCP/IP. Therefore, accesses to all kinds of embedded devices and data share in the heterogeneous Internet/Intranet environment are implemented. At last real-time performance and security of OPC-EWS are analyzed. The experiments and application have demonstrated that the architecture has good performance and is feasible for real-time operation in DCS. [ABSTRACT FROM AUTHOR]
- Published
- 2005
- Full Text
- View/download PDF
39. Fuzzy and Real-Time Queue Management in Differentiated Services Networks.
- Author
-
Jalili-Kharaajoo, Mahdi, Sadri, Mohammad Reza, Roudsari, Farzad Habibipour, Zhaohui Wu, Chun Chen, Minyi Guo, and Jiajun Bu
- Abstract
In this paper, a robust active queue management system to secure high utilization as well as bounded delay and loss is designed. Using this system, the network complies with the demands each traffic class set. We use Fuzzy Proportional-Integral-Derivative (PID) controller in which the parameters of PID controllers are tuned based on fuzzy logic. The proposed controller is simple to implement as well as robust due to the nature of fuzzy controller. Simulation results of the proposed control action demonstrate the effectiveness of the controller in providing robust queue management system. [ABSTRACT FROM AUTHOR]
- Published
- 2005
- Full Text
- View/download PDF
40. A Sensor Media Access Control Protocol Based on TDMA.
- Author
-
Xiaohua Luo, Kougen Zheng, Yunhe Pan, Wu, Zhaohui, Chun Chen, Minyi Guo, and Jiajun Bu
- Abstract
Although numerous wireless network protocols are well-studied today, few of them are feasible for super-micro wireless networked sensors with the seriously limited system. In this paper, we present a MAC protocol named ”ST-MAC (Sensor Media Access Control protocol based on TDMA)” for wireless networked sensors with the seriously limited resource. Performance analysis in theory and experimental measurements indicate that ST-MAC achieves efficient transmission control with high packet delivery success rate, fair bandwidth allocation and acceptable adaptive ability. [ABSTRACT FROM AUTHOR]
- Published
- 2005
- Full Text
- View/download PDF
41. A New Gradient-Based Routing Protocol in Wireless Sensor Networks.
- Author
-
Li Xia, Xi Chen, Xiaohong Guan, Zhaohui Wu, Chun Chen, Minyi Guo, and Jiajun Bu
- Abstract
A new gradient-based routing protocol is proposed in this paper. It takes into account the minimum hop count and remaining energy of each node while relaying data from source node to the sink. The optimal routes can be established autonomously with our protocol. A simple acknowledgement scheme, which can be implemented without extra overheads, is proposed. Our protocol also employs data aggregation to save transmission energy. To handle the frequent change of the topology of the network, one scheme for topology update is provided. At last, simulation results illustrate the effect of system parameters on the protocol performance. [ABSTRACT FROM AUTHOR]
- Published
- 2005
- Full Text
- View/download PDF
42. Semi-Videoconference System Using Real-Time Wireless Technologies.
- Author
-
Cheng Jin, Jiajun Bu, Chun Chen, Mingli Song, Mingyu You, Zhaohui Wu, and Minyi Guo
- Abstract
We defined a novel system for wireless videoconferencing in this paper. Compared with normal videoconferencing systems, our approach does not need any visual inputs except a neutral image of the user. Our algorithm automatically calculates user expression features on conference server by corresponding voice audio input. These features are transmitted to end users’ mobile sets and final expression synthesis can be done there. Since the large visual data is replaced by a small amount of feature data, a great quantity of data bandwidth can be saved, thus improving communication qualities under wireless conditions. [ABSTRACT FROM AUTHOR]
- Published
- 2005
- Full Text
- View/download PDF
43. QoS Adaptive Algorithms Based on Resources Availability of Mobile Terminals.
- Author
-
Yun Li, Lei Luo, Zhaohui Wu, Chun Chen, Minyi Guo, and Jiajun Bu
- Abstract
For mobile terminals, the resources availability always changes continuously because of the mobility and services providing. Based on a resource-aware architecture, the paper proposes an adaptive algorithm using PID and fuzzy control model to adjust the QoS of terminals according to the resources availability. In such architecture, resources can be allocated in stable and agile way. Applications can be aware of resources, and make certain reactions to the change. [ABSTRACT FROM AUTHOR]
- Published
- 2005
- Full Text
- View/download PDF
44. ScudWare: A Context-Aware and Lightweight Middleware for Smart Vehicle Space.
- Author
-
Zhaohui Wu, Qing Wu, Jie Sun, Zhigang Gao, Bin Wu, Mingde Zhao, Chun Chen, Minyi Guo, and Jiajun Bu
- Abstract
With computing becomes more and more ubiquitous, it leads to the highly dynamic and complex computing environments. In this new computing circumstance, the need for novel middleware is widely recognized. Especially, applications should be more context-aware and based on the lightweight middleware infrastructure. In this paper, we present ScudWare, an efficient context-aware and adaptive middleware for ubiquitous computing in smart vehicle space. ScudWare is based on smart OSEK OS, ICAR hybrid network and TinyORB. Its main property is context-aware service based on ontology, which can gather, manage, and disseminate context information for applications easily. Using ScudWare ontology, we can easily tackle issues, such as wide variations in information quality. In addition, we bring forward further discussion of the smart vehicle space in ubiquitous computing environments. [ABSTRACT FROM AUTHOR]
- Published
- 2005
- Full Text
- View/download PDF
45. Prism-WM Based Connector Interaction for Middleware Systems.
- Author
-
Hwa-Young Jeong, Young-Jae Song, Zhaohui Wu, Chun Chen, Minyi Guo, and Jiajun Bu
- Abstract
A recent emergence of small, resource-constrained, and highly-mobile computing platforms presents numerous new challenges for software developers. Software developers use software architecture method for development in this setting efficiently. Architectural styles represent composition patterns and constraints at the software architectural level and are targeted at families of systems with shared characteristics. We refer to development in this new setting as programming-in-the-small-and-many (Prism). This paper provides a description and evaluation of connector’s interaction between connected software components interface, a middleware platform intending to support software architecture-based development in the Prism setting. Also, we consider the characteristics of applied components in this connector, including the bean request processing time and the memory use rate. Results of this research show that components with small memory are given process preference and the processing waiting time of component has been improved. [ABSTRACT FROM AUTHOR]
- Published
- 2005
- Full Text
- View/download PDF
46. Integration Policy in Real-Time Embedded System.
- Author
-
Hyun Chang Lee, Zhaohui Wu, Chun Chen, Minyi Guo, and Jiajun Bu
- Abstract
Interoperability of data between wire and wireless environment makes it easier for embedded and enterprise systems to interact with each other. They can exchange data, load and run application objects. These activities are getting increasingly in demand where embedded systems interact with the enterprise world. Also, the availability of technologies that enable mobile access to data has brought great expectations that users would be able to access information any time, anywhere within embedded system environment. However, the existing infrastructure and content are not well-suited for other types of accesses. In this paper, we present an incremental and efficient integration and maintenance algorithm for analytical purposes by integrating updates generated from embedded systems through a wireless PDA or smart phone, or hands-free access. The proposed algorithm can also reduce the overhead in managing queries for integration and maintenance. [ABSTRACT FROM AUTHOR]
- Published
- 2005
- Full Text
- View/download PDF
47. Association Based Prefetching Algorithm in Mobile Environments.
- Author
-
Ho-Sook Kim, Hwan-Seung Yong, Zhaohui Wu, Chun Chen, Minyi Guo, and Jiajun Bu
- Abstract
In this paper we propose a prefetching algorithm called STAP (Spatial and Temporal Association based Prefetching algorithm). Our methods are based on the analysis of the spatial and temporal associations of the user’s request using data mining techniques. First, we exploit an ”associative class set” consisting of an itemset of service classes that is close both spatially and temporally and frequently requested together. With the first method, our prefetching algorithm can select a candidate set that is spatially and temporally associated with the previous request of a user. It is shown that through performance experiments STAP is effective in improving system performance. [ABSTRACT FROM AUTHOR]
- Published
- 2005
- Full Text
- View/download PDF
48. AnyCom: A Component Framework Optimization for Pervasive Computing.
- Author
-
Wenzhi Chen, Zhou Jiang, Zhaohui Wu, Chun Chen, Minyi Guo, and Jiajun Bu
- Abstract
Pervasive computing lays emphasis on the seamless integration of human,computers as well as the environment, which challenges the traditional component-based technology. In this paper, after analyzing many previous component models, we discuss a series of problems involved in Pervasive computing: How to administer plenty of embedded computing devices, how to discover components initiatively, how to conquer the heterogeneity of different components, how to implement component cooperation mechanism, and so forth. Finally, we bring forward a new framework AnyCom (a component framework for pervasive computing) and some experiments based on it. [ABSTRACT FROM AUTHOR]
- Published
- 2005
- Full Text
- View/download PDF
49. A QoS-aware Component-Based Middleware for Pervasive Computing.
- Author
-
Yuan Liao, Mingshu Li, Zhaohui Wu, Chun Chen, Minyi Guo, and Jiajun Bu
- Abstract
In this paper, a QoS-aware component-based middleware for pervasive computing is given. The design rationale is to cope with many constraints of pervasive computing application including resource awareness, diversity, QoS-sensitive. To introduce how we achieve those system goals, we describe the details of this middleware including system architecture, service model, QoS model, algorithms of service setup, implementation, and experimentation. [ABSTRACT FROM AUTHOR]
- Published
- 2005
- Full Text
- View/download PDF
50. A New Approach for Predictable Hard Real-Time Transaction Processing in Embedded Database.
- Author
-
Tianzhou Chen, Yi Lian, Jiangwei Huang, Zhaohui Wu, Chun Chen, Minyi Guo, and Jiajun Bu
- Abstract
Real-time transaction processing becomes concerns as embedded time comes rapidly. However, the transaction process in real-time embedded system still has some problems in resource utilization at present. In this paper, a classification is designed to differentiate the hard periodic real-time transactions and hard sporadic real-time transactions. The new processing algorithm for hard sporadic real-time transactions is given. In time consuming and space consuming, this design and implementation indeed do a great deal of good. [ABSTRACT FROM AUTHOR]
- Published
- 2005
- Full Text
- View/download PDF
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.