In a preemptive priority based RTOS, priority inversion problem is among the major sources of deadline violations. Priority inheritance protocol is one of the approaches to reduce priority inversion. Unfortunately, RTOS like uC/OS can’t support priority inheritance protocol since it does not allow kernel to have multiple tasks at the same priority. Although it has different ways to avoid priority inversion such as priority ceiling protocol, developers still have some difficulties in programming real time applications with it. In this paper, we redesign the uC/OS kernel to provide the ability to support round robin scheduling and implement priority inheritance semaphore on the modified kernel. As result, we port new kernel with priority inheritance semaphore to evaluation board, and evaluate the execution time of each of the kernel service as well as verify the operations of our implementation.
標簽: priority preemptive inversion problem
上傳時間: 2015-12-14
上傳用戶:氣溫達上千萬的
基于DDS的信號發生器的設計與開發 The Design and Development of Function Generator Based on DDS
標簽: Development DDS Generator Function
上傳時間: 2014-01-03
上傳用戶:stewart·
一般使用PC Based Controller 都是當作現場設備的一種,也就是要接受 主系統的命令,做一些操作控制。以Modbus 來看屬于Slave 的角色,隨 時等待接收Modbus Master 的Query Message,然后依據內容做控制,最后 將控制結果以Response Message 回傳。本章將以ICP 7524 及ICP 7188E5 等 兩種設備分別設計Modbus RTU、ASCII 及Modbus/TCP 的Slave 應用程序, 讀者可以將此兩種程序的架構再延伸設計至各種實際應用程序。
標簽: Controller Based 現場設備
上傳時間: 2015-12-16
上傳用戶:nanxia
Search Engine Based on P2p Technology.
標簽: Technology Search Engine Based
上傳時間: 2015-12-20
上傳用戶:zhouchang199
Quantum Platform(QP) is a family of very lightweight, state machine-based frameworks for embedded systems. QP enables developing well-structured embedded applications as a set of concurrently executing hierarchical state machines (UML statecharts).
標簽: machine-based lightweight frameworks Platform
上傳時間: 2015-12-22
上傳用戶:jichenxi0730
DCT-based image watermarking
標簽: watermarking DCT-based image
上傳時間: 2014-01-24
上傳用戶:kikye
The Stanford IBE library is a C implementation of the Boneh-Franklin identity-based encryption scheme. (See Boneh and Franklin, "Identity-Based Encryption from the Weil Pairing", CRYPTO 2001.) There are a few modifications and additions. The Boneh-Franklin scheme is used as a Key Encapsulation Mechanism, and off-the-shelf ciphers and HMACs are used for the actual encryption. (See Lynn, "Authenticated Identity-Based Encryption", available on eprint.
標簽: Boneh-Franklin implementation identity-based encryption
上傳時間: 2013-12-20
上傳用戶:yan2267246
understanding the module load and run of brew
標簽: understanding module load brew
上傳時間: 2014-01-25
上傳用戶:cjl42111
Apply the standard QR-decomposition based LSL algorithm using angle-normalized error to predict/estimate complex-valued processes.
標簽: QR-decomposition angle-normalized algorithm standard
上傳時間: 2015-12-27
上傳用戶:cc1
qrd_rls_AR_pred.m - use the QR decomposition-based RLS algorithm to predict complex-valued AR process.
標簽: decomposition-based qrd_rls_AR_pred complex-valued algorithm
上傳時間: 2015-12-27
上傳用戶:trepb001