26 research outputs found

    ProGram: A Grammar-Based Method for Specification and Hardware Synthesis of communication protocols

    No full text
    A data communication protocol is an agreement between two or more communication parties about the exchange of messages in order to provide some service. The protocol specifies the language used to communicate over the interface between the involved systems. A natural way to specify an interface protocol is in terms of a grammar expressed in the BNF notation and annotated with actions. The vocabulary of messages used to implement the protocol correspond to the grammar rules. The encoding format of each message in the vocabulary corresponds to the token terminals of the grammar. The procedure rules guarding the consistency of message exchanges are also embedded in grammar rules. The service provided by the protocol corresponds to the actions in a grammar. Assumptions about the environment can be viewed as port width and throughput constraints posed to the synthesis process. ProGram is

    Toward a Scalable Test Methodology for 2D-mesh Network-on-Chips

    No full text
    This paper presents a BIST strategy for testing the NoC interconnect network, and investigates if the strategy is a suitable approach for the task. All switches and links in the NoC are tested with BIST, running at full clock-speed, and in a functional-like mode. The BIST is carried out as a go/no-go BIST operation at start up, or on command. It is shown that the proposed methodology can be applied for different implementations of deflecting switches, and that the test time is limited to a few thousand-clock cycles with fault coverage close to 100%. 1

    A performance and energy exploration of dictionary code compression architectures

    No full text
    We have made a performance and energy exploration of a previously proposed dictionary code compression mechanism where frequently executed individual instructions and/or sequences are replaced in memory with short code words. Our simulated design shows a dramatically reduced instruction memory access frequency leading to a performance improvement for small instruction cache sizes and to significantly reduced energy consumption in the instruction fetch path. We have evaluated the performance and energy implications of three architectural parameters: branch prediction accuracy, instruction cache size and organization. To asses the complexity of the design we have implemented the critical stages in VHDL.© 2011 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media, including reprinting/republishing this material for advertising or promotional purposes, creating new collective works, for resale or redistribution to servers or lists, or reuse of any copyrighted component of this work in other works.QC 2012021

    Nurses safety in intensive care clinic working with delirium patients

    No full text
    Darba autore ir izstrādājusi bakalaura darbu par tēmu “Māsu drošība intensīvās terapijas klīnikā, strādajot ar delirioziem pacientiem”. Darba mērķis ir noskaidrot vai māsa ievēro drošības pasākumus un vai jūtās droši savā darba vidē, strādājot ar delirioziem pacientiem. Darba uzdevums ir izanalizēt un apkopot darbam atbilstošo zinātnisko literatūru, izstrādāt intervijas jautājumus un intervēt māsas. No iegūtajām jautājumu atbildēm izstrādāti secinājumi un rekomendācijas. Darbs sastāv no teorētiskās un pētnieciskās daļas. Teorētiskā sadaļā ir iekļauta delīrija apraksts, riska faktori, simptomi, ārstēšana, māsu drošības ieteikumi aprūpējot deliriozus pacientus. Pētniecības daļā ir iekļauta pētijuma metodoloģija, pētījuma rezultāti, kā arī secinājumi un rekomendācijas. Pētījumā izmantota kvalitatīvā metode – instruments – intervija. Pētījums tika veikts vienā no Rīgas lielākajām slimnīcām, intensīvās terapijas klīnikā. Tika intervētas 10 intensīvajā terapijā strādājošās māsas. Darbā tika izmantoti 32 literatūras avoti , no kuriem 10 bija latviešu valodā, 19 angļu valodā un 3 krievu valodā. Atslēgas vārdi: Delīrījs, drošība, māsa, pacients.Author has developed a bachelor thesis on topic "Nurses' safety at intensive therapy clinic while working with delirious patients." Target is to find if nurse feels safe in work environment while work with delirious patients and or nurse observe safety measures while work with delirious patients. Work target is analyze and summarize the work of the relevant scientific literature. Develop interview questions and interview nurse. From the responses obtained detailed conclusions and recommendations. Work consists of theoretical and research details. It consists of theoretical and experimental parts. In the theoretical section is included description of delirium, risk factors, symptoms, treatment, nursing care of the safety recommendations with delirious patients. Research component is included in the study methodology, the study's results as well as recommendations and conclusions. In research has been used qualitative method-tool-interview. Study work has been conducted in one of Riga's largest hospitals, intensive care clinic. Where has been interviewed 10 nurses whose is working at intensive therapy. In work was utilized 32 literature sources from which 10 was Latvian language, 19 in English language and 3 in Russian language. Keywords: Delirium, safety, nurse, patient

    Control and Communication Performance Analysis of Embedded DSP Systems in the MASIC Methodology

    No full text
    The time required by an embedded system to process information does not only depend on the amount of data; it also depends heavily on the synchronization overhead, bus protocol and communication architecture. This paper presents a technique to estimate the performance of the control and communication part of an embedded system modeled using the MASIC methodology. A key concept in MASIC is the strict separation of the computation part from the control and communication. Based on this clear separation of concerns the estimator analyzes the communication delay. Our method targets applications with intense, but regular data flow with a fair amount of complex control. Examples are base stations or mobile terminals. For these applications the method allows a cycle accurate estimation of the delay due to the communication. Hence, different architectures can be evaluated and e.g. the effect of different bus arbitration and different DMA block sizes can be assessed. Thus, the proposed method is an aid for the designer to explore the system with different system level decisions

    Control and communication performance analysis of embedded DSP systems in the MASIC methodology

    Full text link

    System Design for DSP Applications in Transaction Level Modeling Paradigm

    No full text
    In this paper, we systematically define three transaction level models (TLMs), which reside at different levels of abstraction between the functional and the implementation model of a DSP system. We also show a unique language support to build the TLMs. Our results show that the abstract TLMs can be built and simulated much faster than the implementation model at the expense of a reasonable amount of simulation accuracy
    corecore