211 research outputs found

    Implementing Dynamically Evolvable Communication with Embedded Systems through WEB Services

    Get PDF
    Embedded systems that monitor and control safety and mission critical system are communicated with by a HOST located at a remote location through Internet. Such kind of embedded systems are developed to be dynamically evolvable with respect to syntax, semantics, online testing and communication subsystems. All these systems are to be dynamically evolvable and the components needed for evolution are also to be added into the embedded system. Architectural  models describe  various components using which dynamically evolvable sub-systems are realised through implementation by using specific and related technologies. Implementation system describe the platform, code units and the interlacing of various processes/tasks to the elementary level of details. WEB services place an excellent platform for implementing dynamically evolvable  systems due to the use of open standards. This paper presents an implementation system that is related to dynamically evolvable communication and other sub-systems using web services technologies

    POWER OPTIMIZED MEMORY ORGANIZATION USING GATED DRIVER TREE

    Get PDF
    This project presents circuit design of a low-power delay buffer. The proposed delay buffer uses several new techniques to reduce its power consumption. Since delay buffers are accessed sequentially, it adopts a ring-counter addressing scheme. In the ring counter, double-edge-triggered (DET) flip-flops are utilized to reduce the operating frequency by half and the C-element gated-clock strategy is proposed. A novel gated-clock-driver tree is then applied to further reduce the activity along the clock distribution network. Moreover, the gated-driver-tree idea is also employed in the input and output ports of the memory block to decrease their loading, thus saving even more power. And also, we are presenting less area over head in this project by using FIFO (First In First Out) technique. FIFO is a technique, which is having the capability to store the DATA with out any write operation and retrieving the DATA without any read operation

    Implementing Syntax Evolution of Embedded Systems

    Get PDF
    Safety critical systems such as nuclear recator systems cannot be shutdown as restrating is a huge process and incurs heavy cost.  The embedded systems which are used for monitoring and controlling the safety critival systems cannot be shut down as well. ES systems which drives safety critical systems must be communicated from remote locations generally through a HOST connected on to Internet. Communication between the HOST and ES system is done using commnd lanaguage which has to be evolved from time to time.  The chnage to the commnd lanauage must be undertaken while the embedded system is up and running, the evolution thus must be dynamic. Many architetcuers have been propsoed in the lieteratuer for evolving  synatx of command lanaguage.The implemntaion of effcient architetcuer as such has not been found in the literatuer without which existing architetcuer as such has no menaing.The paper presntes a set of methods using which the syntax evolution of embedded systems as such can be achived. The synatx evolution methods have been applied to a safety critical system that monitors and controls tempartuers within a Nuclear recator system

    A Fuzzy Approach for Feature Evaluation and Dimensionality Reduction to Improve the Quality of Web Usage Mining Results

    Get PDF
    The explosive growth in the information available on the Web has necessitated the need for developing Web personalization systems that understand user preferences to dynamically serve customized content to individual users. Web server access logs contain substantial data about the accesses of users to a Web site. Hence, if properly exploited, the log data can reveal useful information about the navigational behaviour of users in a site. In order to reveal the information about user preferences from, Web Usage Mining is being performed. Web Usage Mining is the application of data mining techniques to web usage log repositories in order to discover the usage patterns that can be used to analyze the user’s navigational behavior. WUM contains three main steps: preprocessing, knowledge extraction and results analysis. During the preprocessing stage, raw web log data is transformed into a set of user profiles. Each user profile captures a set of URLs representing a user session. Clustering can be applied to this sessionized data in order to capture similar interests and trends among users’ navigational patterns. Since the sessionized data may contain thousands of user sessions and each user session may consist of hundreds of URL accesses, dimensionality reduction is achieved by eliminating the low support URLs. Very small sessions are also removed in order to filter out the noise from the data. But direct elimination of low support URLs and small sized sessions may results in loss of a significant amount of information especially when the count of low support URLs and small sessions is large. We propose a fuzzy solution to deal with this problem by assigning weights to URLs and user sessions based on a fuzzy membership function. After assigning the weights we apply a "Fuzzy c-Mean Clustering" algorithm to discover the clusters of user profiles. In this paper, we describe our fuzzy set theoretic approach to perform feature selection (or dimensionality reduction) and session weight assignment. Finally we compare our soft computing based approach of dimensionality reduction with the traditional approach of direct elimination of small sessions and low support count URLs. Our results show that fuzzy feature evaluation and dimensionality  reduction results in better performance and validity indices for the discovered clusters
    • …
    corecore