1,483 research outputs found

    Exact Speedup Factors and Sub-Optimality for Non-Preemptive Scheduling

    Get PDF
    Fixed priority scheduling is used in many real-time systems; however, both preemptive and non-preemptive variants (FP-P and FP-NP) are known to be sub-optimal when compared to an optimal uniprocessor scheduling algorithm such as preemptive earliest deadline first (EDF-P). In this paper, we investigate the sub-optimality of fixed priority non-preemptive scheduling. Specifically, we derive the exact processor speed-up factor required to guarantee the feasibility under FP-NP (i.e. schedulability assuming an optimal priority assignment) of any task set that is feasible under EDF-P. As a consequence of this work, we also derive a lower bound on the sub-optimality of non-preemptive EDF (EDF-NP). As this lower bound matches a recently published upper bound for the same quantity, it closes the exact sub-optimality for EDF-NP. It is known that neither preemptive, nor non-preemptive fixed priority scheduling dominates the other, in other words, there are task sets that are feasible on a processor of unit speed under FP-P that are not feasible under FP-NP and vice-versa. Hence comparing these two algorithms, there are non-trivial speedup factors in both directions. We derive the exact speed-up factor required to guarantee the FP-NP feasibility of any FP-P feasible task set. Further, we derive the exact speed-up factor required to guarantee FP-P feasibility of any constrained-deadline FP-NP feasible task set

    Feedback-based admission control for hard real-time task allocation under dynamic workload on many-core systems

    Get PDF
    In hard real-time systems, a computationally expensive schedulability analysis has to be performed for every task. Fulfilling this requirement is particularly tough when system workload and service capacity are not available a priori and thus the analysis has to be conducted at runtime. This paper presents an approach for applying controltheory-based admission control to predict the task schedulability so that the exact schedulability analysis is performed only to the tasks with positive prediction results. In case of a careful fine-tuning of parameters, the proposed approach can be successfully applied even to many-core embedded systems with hard real-time constraints and other time-critical systems. The provided experimental results demonstrate that, on average, only 62% of the schedulability tests have to be performed in comparison with the traditional, open-loop approach. The proposed approach is particularly beneficial for heavier workloads, where the number of executed tasks is almost unchanged in comparison with the traditional open-loop approach. By our approach, only 32% of exact schedulability tests have to be conducted. Moreover, for the analysed industrial workloads with dependent jobs, the proposed technique admitted and executed 11% more tasks while not violating any timing constraints

    Identifying component modules

    Get PDF
    A computer-based system for modelling component dependencies and identifying component modules is presented. A variation of the Dependency Structure Matrix (DSM) representation was used to model component dependencies. The system utilises a two-stage approach towards facilitating the identification of a hierarchical modular structure. The first stage calculates a value for a clustering criterion that may be used to group component dependencies together. A Genetic Algorithm is described to optimise the order of the components within the DSM with the focus of minimising the value of the clustering criterion to identify the most significant component groupings (modules) within the product structure. The second stage utilises a 'Module Strength Indicator' (MSI) function to determine a value representative of the degree of modularity of the component groupings. The application of this function to the DSM produces a 'Module Structure Matrix' (MSM) depicting the relative modularity of available component groupings within it. The approach enabled the identification of hierarchical modularity in the product structure without the requirement for any additional domain specific knowledge within the system. The system supports design by providing mechanisms to explicitly represent and utilise component and dependency knowledge to facilitate the nontrivial task of determining near-optimal component modules and representing product modularity

    A case report of bilateral synovial chondromatosis of the ankle

    Get PDF
    <p>Abstract</p> <p>Background</p> <p>Synovial chondromatosis is a rare, generally benign condition which affects synovial membranes. It most commonly involves large joints such as the knee, hip, and elbow, but its presence in smaller joints has also been reported. The diagnosis of synovial chondromatosis is commonly made following a thorough history, physical examination, and radiographic examination. Patients may report pain and swelling within a joint which is often aggravated with physical activity.</p> <p>Case presentation</p> <p>A rare case of bilateral synovial chondromatosis of the ankle is reviewed. A 26 year-old male presented with chronic bilateral ankle pain. Physical examination suggested and imaging confirmed multiple synovial chondromatoses bilaterally, likely secondary to previous trauma.</p> <p>Conclusion</p> <p>The clinical and imaging findings, along with potential differential diagnoses, are described. Since this condition tends to be progressive but self-limiting, indications for surgery depend on the level of symptomatic presentation in addition to the functional demands of the patient. Following a surgical consultation, it was decided that it was not appropriate to pursue surgery at the present time.</p

    The Hidden Sexuality of Alexandrium Minutum: An Example of Overlooked Sex in Dinoflagellates

    Get PDF
    Dinoflagellates are haploid eukaryotic microalgae in which rapid proliferation causes dense blooms, with harmful health and economic effects to humans. The proliferation mode is mainly asexual, as the sexual cycle is believed to be rare and restricted to stressful environmental conditions. However, sexuality is key to explaining the recurrence of many dinoflagellate blooms because in many species the fate of the planktonic zygotes (planozygotes) is the formation of resistant cysts in the seabed (encystment). Nevertheless, recent research has shown that individually isolated planozygotes in the lab can enter other routes besides encystment, a behavior of which the relevance has not been explored at the population level. In this study, using imaging flow cytometry, cell sorting, and Fluorescence In Situ Hybridization (FISH), we followed DNA content and nuclear changes in a population of the toxic dinoflagellate Alexandrium minutum that was induced to encystment. Our results first show that planozygotes behave like a population with an “encystment-independent” division cycle, which is light-controlled and follows the same Light:Dark (L:D) pattern as the cycle governing the haploid mitosis. Resting cyst formation was the fate of just a small fraction of the planozygotes formed and was restricted to a period of strongly limited nutrient conditions. The diploid-haploid turnover between L:D cycles was consistent with two-step meiosis. However, the diel and morphological division pattern of the planozygote division also suggests mitosis, which would imply that this species is not haplontic, as previously considered, but biphasic, because individuals could undergo mitotic divisions in both the sexual (diploid) and the asexual (haploid) phases. We also report incomplete genome duplication processes. Our work calls for a reconsideration of the dogma of rare sex in dinoflagellates.Versión del edito

    An extensible framework for multicore response time analysis

    Get PDF
    In this paper, we introduce a multicore response time analysis (MRTA) framework, which decouples response time analysis from a reliance on context independent WCET values. Instead, the analysis formulates response times directly from the demands placed on different hardware resources. The MRTA framework is extensible to different multicore architectures, with a variety of arbitration policies for the common interconnects, and different types and arrangements of local memory. We instantiate the framework for single level local data and instruction memories (cache or scratchpads), for a variety of memory bus arbitration policies, including: Round-Robin, FIFO, Fixed-Priority, Processor-Priority, and TDMA, and account for DRAM refreshes. The MRTA framework provides a general approach to timing verification for multicore systems that is parametric in the hardware configuration and so can be used at the architectural design stage to compare the guaranteed levels of real-time performance that can be obtained with different hardware configurations. We use the framework in this way to evaluate the performance of multicore systems with a variety of different architectural components and policies. These results are then used to compose a predictable architecture, which is compared against a reference architecture designed for good average-case behaviour. This comparison shows that the predictable architecture has substantially better guaranteed real-time performance, with the precision of the analysis verified using cycle-accurate simulation

    A new chemical formulation for control of dental unit water line contamination: An 'in vitro' and clinical 'study'

    Get PDF
    BACKGROUND: Water delivered by dental units during routine dental practice is highly contaminated. The aim of this study is to evaluate the efficacy of a new chemical solution flushed through Dental Unit Water Lines (DUWL) for the control of contamination inside dental units. MATERIALS AND METHODS: Six old dental units equipped with a device designed to automatically flush disinfecting solutions through the water system (Castellini Autosteril) were selected. Water samples from DUWL effluents were collected in each dental unit for 10 randomly selected days, before and after a 5 minute DUWL disinfecting cycle with TetraAcetylEthileneDiamine (TAED) and persalt (Ster4spray produced by Farmec spa, and distributed by Castellini spa). Water samples were plated in R2A Agar and cultured at room temperature for 7 days, and the total number of heterotrophic microorganisms counted and expressed in Log(10) CFU/mL A general linear model was fitted and multiple regression ANOVA for repeated measures was used for the statistical analysis. RESULTS: The mean contamination in DUWL effluent at baseline was 5.45 ± 0.35 CFU/mL (range 4.79 to 5.93 CFU/mL). When water samples were tested "in vitro" against the chemical, no growth of heterotrophic bacteria was detected after a 5 minute contact in any of the water samples tested. After undergoing a 5 minute disinfecting cycle with the chemical, DUWL mean contamination in water effluents was 2.01 ± 0.32 CFU/mL (range 1.30 to 2.74 CFU/mL) (significant difference with respect to baseline). CONCLUSIONS: An inbetween patient disinfecting procedure consisting of flushing DUWL with TAED and persalt equivalent to 0.26% peracetic acid could be useful in routine dental practice for cross-contamination control

    The loop structure and the RNA helicase p72/DDX17 influence the processing efficiency of the mice miR-132

    Get PDF
    miRNAs are small RNAs that are key regulators of gene expression in eukaryotic organisms. The processing of miRNAs is regulated by structural characteristics of the RNA and is also tightly controlled by auxiliary protein factors. Among them, RNA binding proteins play crucial roles to facilitate or inhibit miRNA maturation and can be controlled in a cell, tissue and species-specific manners or in response to environmental stimuli. In this study we dissect the molecular mechanism that promotes the overexpression of miR-132 in mice over its related, co-transcribed and co-regulated miRNA, miR-212. We have shown that the loop structure of miR-132 is a key determinant for its efficient processing in cells. We have also identified a range of RNA binding proteins that recognize the loop of miR-132 and influence both miR-132 and miR-212 processing. The DEAD box helicase p72/DDX17 was identified as a factor that facilitates the specific processing of miR-132

    Oldest known pantherine skull and evolution of the tiger

    Get PDF
    The tiger is one of the most iconic extant animals, and its origin and evolution have been intensely debated. Fossils attributable to extant pantherine species-lineages are less than 2 MYA and the earliest tiger fossils are from the Calabrian, Lower Pleistocene. Molecular studies predict a much younger age for the divergence of modern tiger subspecies at <100 KYA, although their cranial morphology is readily distinguishable, indicating that early Pleistocene tigers would likely have differed markedly anatomically from extant tigers. Such inferences are hampered by the fact that well-known fossil tiger material is middle to late Pleistocene in age. Here we describe a new species of pantherine cat from Longdan, Gansu Province, China, Panthera zdanskyi sp. nov. With an estimated age of 2.55–2.16 MYA it represents the oldest complete skull of a pantherine cat hitherto found. Although smaller, it appears morphologically to be surprisingly similar to modern tigers considering its age. Morphological, morphometric, and cladistic analyses are congruent in confirming its very close affinity to the tiger, and it may be regarded as the most primitive species of the tiger lineage, demonstrating the first unequivocal presence of a modern pantherine species-lineage in the basal stage of the Pleistocene (Gelasian; traditionally considered to be Late Pliocene). This find supports a north-central Chinese origin of the tiger lineage, and demonstrates that various parts of the cranium, mandible, and dentition evolved at different rates. An increase in size and a reduction in the relative size of parts of the dentition appear to have been prominent features of tiger evolution, whereas the distinctive cranial morphology of modern tigers was established very early in their evolutionary history. The evolutionary trend of increasing size in the tiger lineage is likely coupled to the evolution of its primary prey species
    corecore