31,831 research outputs found
Task Scheduling with RT Constraints
This paper addresses the problem of scheduling reactive realtime transactions (task groups) implementing a network of extended Finite State Machines communicating asynchronously. Task instances are..
Hard Real-Time Constraints in Implementing the Myopic Scheduling Algorithm
This paper presents an investigation into the constraints in implementing the Myopic scheduling algorithm. The Myopic algorithm is a hard real-time (RT) task scheduling algorithm for multiprocessor systems. It selects a suitable task based on a heuristic function, H from a subset (feasibility check window, K ) of all ready tasks. On the other hand, the original heuristic scheduling algorithm chooses the task with the least H value from all N ready tasks. Performance of the Myopic algorithm significantly depends on the chosen heuristic function and the size of the feasibility check window since it considers only K tasks from N tasks (where K ≤N ). This research investigates the impact of scheduling non-periodic hard RT tasks using the Myopic algorithm and evaluates the performance for different parameters to demonstrate the merits and constraints of the algorithm. The effects of the feasibility check window size, K , choice of heuristic function, H , the worst case processing time of tasks, p T on the performance of the Myopic algorithm under various loads are investigated. Finally, the performance of the algorithm is evaluated as task completion ratio, presented and discussed through a set of experiments
Securing Real-Time Internet-of-Things
Modern embedded and cyber-physical systems are ubiquitous. A large number of
critical cyber-physical systems have real-time requirements (e.g., avionics,
automobiles, power grids, manufacturing systems, industrial control systems,
etc.). Recent developments and new functionality requires real-time embedded
devices to be connected to the Internet. This gives rise to the real-time
Internet-of-things (RT-IoT) that promises a better user experience through
stronger connectivity and efficient use of next-generation embedded devices.
However RT- IoT are also increasingly becoming targets for cyber-attacks which
is exacerbated by this increased connectivity. This paper gives an introduction
to RT-IoT systems, an outlook of current approaches and possible research
challenges towards secure RT- IoT frameworks
- …