Overload Identification for Multiprocessor in Real Time System
Journal Title: International Journal on Computer Science and Engineering - Year 2010, Vol 2, Issue 9
Abstract
In spite of many real time scheduling algorithms available it is not clear that these scheduling algorithms support fully the problems in the real time system in a local area network. There are certain “open loop” algorithm that can support only some set of characteristics such as the deadlines, precedence constraints, shared resources and future release time etc. Open loop are being referred as once the schedules are fixed there is no alterations. Open loop is fine for the static or dynamic models where the job is perfectly modeled and assigned. But when it executed for unpredictable dynamic systems the open loop does not offer its full performance due the problem of overloading in the processor. In this paper, the overloading of the processor is detected and rectified to give full performance of the processors in the network for the real time system. Here the case is studied from the worst case to the best case.
Authors and Affiliations
JESTIN RAJAMONY , Dr. K. RAMAR , K. P. AJITHA GLADIS
MISSING DATA IMPUTATION IN CARDIAC DATA SET (SURVIVAL PROGNOSIS
Treating missing value is very big task in the data preprocessing methods. Missing data are a potential source of bias when analyzing clinical trials. In this paper we analyze the performance of different data imputatio...
A Novel approach for identifying greedy nodes in wireless sensor network by using EEGN algorithm
WSN have attracted a great deal of research attention due to then wide range of applications. The life span of the sensor network is limited to its residual power. In order to increase the energy of the nodes it is neces...
A Research paper: An ASCII value based data encryption algorithm and its comparison with other symmetric data encryption algorithms
Encryption is the process of transforming plaintext into the ciphertext where plaintext is the input to the encryption process and ciphertext is the output of the encryption process. Decryption is the process of transfor...
MRI Brain Image Tissue Segmentation analysis using Possibilistic Fuzzy C-means Method
In this paper, we analyzed the segmentation of MRI brain image into different tissue types on brain image using Possibilistic fuzzy c-means (PFCM) clustering. Application of this method to MRI brain image gives the bette...
Specifying a model of semantic web service composition
One of the major issues of semantic web is the discovery and identification of the best service that responds to a user request. In this article we specify a semantic web services composition model built through an ontol...