SlideShare a Scribd company logo
1 of 7
Download to read offline
International Journal of Computer Engineering and Technology (IJCET), ISSN 0976-6367(Print), 
ISSN 0976 - 6375(Online), Volume 5, Issue 7, July (2014), pp. 55-61 © IAEME 
INTERNATIONAL JOURNAL OF COMPUTER ENGINEERING  
TECHNOLOGY (IJCET) 
ISSN 0976 – 6367(Print) 
ISSN 0976 – 6375(Online) 
Volume 5, Issue 7, July (2014), pp. 55-61 
© IAEME: www.iaeme.com/IJCET.asp 
Journal Impact Factor (2014): 8.5328 (Calculated by GISI) 
www.jifactor.com 
IJCET 
© I A E M E 
TRADE-OFF BETWEEN TRADITIONAL GARBAGE COLLECTION Vs 
HARDWARE GARBAGE COLLECTION 
Viral V Kapadia 
Computer Science  Engg Dept, The M S University of Baroda 
55 
ABSTRACT 
The major issue in today’s world of computing is improvement in performance of memory. 
The most suitable way we have described over here to make a comparison between software and 
hardware memory management. The result in upcoming section also proves the same that hardware 
memory management is more preferable. 
Keywords: VHDL, Verlilog, Garbage Collection, Processor, Clock Cycle, Delay, Xilinx. 
I. INTRODUCTION 
Memory management is one of the most vital researched areas in computer engineering since 
their goals are to understand and improve the usage of the two most crucial resources in virtually 
every computer system memory and processor. In both research areas, work has been done in many 
directions including theory, hardware, algorithms, and implementation and so on. A typical 
methodology is to investigate issues in only one area, assuming the system’s behaviour in the other 
area has no influence at all, or at most, very little influence on the issues under investigation. 
Although such a methodology is very successful in terms of reducing research scope and simplifying 
the targeted issues, it is not sufficient to reflect the system level nature of processor and memory 
usage, which is that they interact and even conflict with each other. Therefore, the two dimensions of 
time and space must be considered together in many cases so that the result will be a well designed 
system that has acceptable performance in both dimensions, rather than being extremely good in one 
dimension but unacceptable in the other one. This is the famous time-space tradeoff [1]. 
Memory management on which researchers are mainly focusing are the different techniques 
related to memory management i.e. garbage collection techniques, scheduling, real time system, user 
oriented design and many more. The major problem found out in memory management is processor 
and operating system delays. We don’t have good performance in Real time system since we are 
using the software approach which ultimately depends on operating system. So virtually we try to
International Journal of Computer Engineering and Technology (IJCET), ISSN 0976-6367(Print), 
ISSN 0976 - 6375(Online), Volume 5, Issue 7, July (2014), pp. 55-61 © IAEME 
say we are having real-time memory management but physically not performing the intended task 
more convincingly. Here we are trying to design a hardware design that can perform all memory 
management tasks with additional power of VLIW instruction word and parallel processing. 
Real-time requirements are far and wide in modern applications, from multimedia players to 
communication controls, aviation systems, safety critical control systems, etc. Garbage collection is 
widely acknowledged to speed up software development while increasing security and reliability. 
However, garbage collectors that support real-time applications are notoriously hard to build. 
Traditional garbage collectors stop the application to perform the entire collection or even just to 
initiate or finish up the collection. Stopping all threads creates a computation pause which is 
unacceptable for real-time systems [1]. 
Such atomic operations create ordering constraints that do not leave much room for 
reordering of memory accesses. Thus, a more sophisticated compaction mechanism must be used. As 
part of our real-time system, we want to provide a novel concurrent collector, which provides a 
solution to the above challenge. 
Real-time requirements are far and wide in modern applications, from multimedia players to 
communication controls, aviation systems, safety critical control systems, etc. Garbage collection is 
widely acknowledged to speed up software development while increasing security and reliability. 
However, garbage collectors that support real-time applications are notoriously hard to build. 
Traditional garbage collectors stop the application to perform the entire collection or even just to 
initiate or finish up the collection. Stopping all threads creates a computation pause which is 
unacceptable for real-time systems [1]. 
Classical real-time systems typically operate with a certain amount of slack. If there is no 
slack, then the system can’t guarantee to meet its bounds. But interactive systems may become 
sluggish during bursts of other activity on the machine, and in some cases this is the desired 
behaviour. Queued systems may absorb temporary load spikes and tolerate a certain fraction of 
outliers depending on a service-level agreement [1]. 
Such atomic operations create ordering constraints that do not leave much room for 
reordering of memory accesses. Thus, a more sophisticated compaction mechanism must be used. As 
part of our real-time system, we want to provide a novel concurrent collector, which provides a 
solution to the above challenge. 
To measure responsiveness of our collector, we propose a mutator responsiveness measure, 
attempting to check how responsive the system is for events that get generated at a high frequency. 
Currently there is no Distributed Object Store that Implement an Algorithm of Distributed 
Garbage Collectors that can do processor management and provide adaptive garbage collection. We 
have to use different garbage collection techniques for different environment. There is partly 
memory allocation and deallocation Implementation of the System function which doing memory 
allocation and deallocation that can be optimize in our implementation of algorithm. 
56 
II. GARBAGE COLLECTION 
One of the potential disadvantages of garbage collection compared to the explicit freeing of 
objects is that garbage collection gives programmers less control over the scheduling of CPU time 
devoted to reclaiming memory. It is in general impossible to predict exactly when (or even if) a 
garbage collector will be invoked and how long it will take to run. Because garbage collectors 
usually stop the entire program while seeking and collecting garbage objects, they can cause 
arbitrarily long pauses at arbitrary times during the execution of the program. Such garbage 
collection pauses can sometimes be long enough to be noticed by users. Garbage collection pauses 
can also prevent programs from responding to events quickly enough to satisfy the requirements of 
real-time systems. If a garbage collection algorithm is capable of generating pauses lengthy- enough
International Journal of Computer Engineering and Technology (IJCET), ISSN 0976-6367(Print), 
ISSN 0976 - 6375(Online), Volume 5, Issue 7, July (2014), pp. 55-61 © IAEME 
to be either noticeable to the user or make the program unsuitable for real-time environments, the 
algorithm is said to be disruptive. To minimize the potential disadvantages of garbage collection 
compared to the explicit freeing of objects, a common design goal for garbage collection algorithms 
is to minimize or, if possible, eliminate their disruptive nature [1]. 
The process of distributed garbage collection can be categorized by two approaches: 
57 
A. Software approach 
The software approach for garbage collection is very famous and it is implemented in many 
of the application software such as JAVA, .Net etc. the main disadvantage of this system is works 
under the control of operating system and for each and every instruction operating system calls the 
main processor through any interrupts. As whenever there is a requirement of memory in application, 
it runs the garbage collection process and in that process also the main processor is interrupted. The 
main processor is wasting its time in garbage collection where as other process are waiting for 
processor. The software approach is easy to implement compare to hardware approach. At the same 
time is also slower compare to hardware approach. We will discuss the software approach in detail. 
A widely accepted method to control software complexity and to increase software quality is 
automatic dynamic memory management, also referred to as garbage collection. Unfortunately, it is 
difficult to implement garbage collection for real-time systems. Because of high overhead and 
unpredictable pauses, most embedded system designers still consider garbage collection an 
unaffordable luxury. Consequently, they have to resort to manual memory management with the 
well-known problems: Freeing memory too early causes “dangling references”, while freeing 
memory too late or not at all gives rise to memory leaks. But worst of all, manual memory 
reclamation requires the programmer’s global view of a software system and contradicts 
modularization [5]. 
A widely accepted method to control software complexity and to increase software quality is 
automatic dynamic memory management, also referred to as garbage collection. Unfortunately, it is 
difficult to implement garbage collection for real-time systems. Because of high overhead and 
unpredictable pauses, most embedded system designers still consider garbage collection an 
unaffordable luxury. Consequently, they have to resort to manual memory management with the 
well-known problems: Freeing memory too early causes “dangling references”, while freeing 
memory too late or not at all gives rise to memory leaks. But worst of all, manual memory 
reclamation requires the programmer’s global view of a software system and contradicts 
modularization [5]. 
Real-time applications require a small upper bound on any pause the garbage collector might 
cause. Garbage collection in software, however, faces an inevitable trade-off between the granularity 
of garbage collection (i.e. the maximum pause length) and the code-size and runtime overhead 
caused by synchronization. To prevent this overhead from becoming unjustifiably high, software 
collectors have to rely on indivisible operations such as processing an entire object or the complete 
root set [4]. Since the duration of these operations is potentially unlimited, these software collectors 
are not suited for hard real-time environments [5]. 
B. Hardware approach 
Following Programming Tools are available for hardware designing. 
1) VHDL: VHDL (VHSIC hardware description language; VHSIC: very-high-speed 
integrated circuit) is a hardware description language used in electronic design 
automation to describe digital and mixed-signal systems such as field-programmable gate 
arrays and integrated circuits.
International Journal of Computer Engineering and Technology (IJCET), ISSN 0976-6367(Print), 
ISSN 0976 - 6375(Online), Volume 5, Issue 7, July (2014), pp. 55-61 © IAEME 
VHDL is a fairly general-purpose language, and it doesn't require a simulator on 
which to run the code. There are many VHDL compilers, which build executable binaries. 
It can read and write files on the host computer, so a VHDL program can be written that 
generates another VHDL program to be incorporated in the design being developed. 
Because of this general-purpose nature, it is possible to use VHDL to write a test bench 
that verifies the functionality of the design using files on the host computer to define 
stimuli, interacts with the user, and compares results with those expected. 
It is relatively easy for an inexperienced developer to produce code that simulates 
successfully but that cannot be synthesized into a real device, or is too large to be 
practical. One particular pitfall is the accidental production of transparent latches rather 
than D-type flip-flops as storage elements. 
The key advantage of VHDL when used for systems design is that it allows the 
behaviour of the required system to be described (modeled) and verified (simulated) 
before synthesis tools translate the design into real hardware (gates and wires). 
Another benefit is that VHDL allows the description of a concurrent system 
(many parts, each with its own sub-behaviour, working together at the same time). VHDL 
is a Dataflow language, unlike procedural computing languages such as BASIC, C, and 
assembly code, which all run sequentially, one instruction at a time. 
A final point is that when a VHDL model is translated into the gates and wires 
that are mapped onto a programmable logic device such as a CPLD or FPGA, then it is 
the actual hardware being configured, rather than the VHDL code being executed as if 
on some form of a processor chip. 
58
International Journal of Computer Engineering and Technology (IJCET), ISSN 0976-6367(Print), 
ISSN 0976 - 6375(Online), Volume 5, Issue 7, July (2014), pp. 55-61 © IAEME 
59 
III. RESULTS 
The objective over here is to prove the difference of efficiency of memory management at the 
processor level and traditional approach. Here we have taken an 8 bit processor to prove the same. 
Figure 56 is the snapshot of processor that we have simulated in Xilinx ISE 9.2. It won’t make a 
difference for the higher level of processors also as we are providing the comparison between an 8 
bit traditional processor and 8 bit memory processor. The same is to implied for the higher level of 
processors also. The first row in figure 56 indicate the CLK (clock) for the processor. Processing is 
done after the delay of 3micro seconds to let the signal stabilize. 
Figure 1: Simulation window consisting of Input and Output 
D0 to D4 stands for the data / address lines. S0, S1 and S2 are control signals. Hence we have 
8 instructions set. 
I0, I1, I2, I3, I4 and Y are out put signals used for checking various operations performed by 
the processor as shown in the figure 57.
International Journal of Computer Engineering and Technology (IJCET), ISSN 0976-6367(Print), 
ISSN 0976 - 6375(Online), Volume 5, Issue 7, July (2014), pp. 55-61 © IAEME 
60 
IV. CONCLUSION 
The Best Way to provide trade of between Garbage collection and processor utilization is to 
have another software coded processor dedicated for Garbage collection which works independently 
of main processor. Since technological and economical reasons have put a stop to the increase of 
clock frequency, performance improvements now come in the form of additional parallelism 
Figure 2: Input Wave supplied for simulation 
In the simulator the check the exact behaviour of the processor the input needs to be in the 
form of wave form and hence we get a wave form as an output we can map the in the input signal at 
a particular clock cycle and at the same time we can also observe the output wave form on the same 
clock cycle that provides us the information of processing of the processor. Output wave form is 
missing in figure 57 as it would be generated after the processing
International Journal of Computer Engineering and Technology (IJCET), ISSN 0976-6367(Print), 
ISSN 0976 - 6375(Online), Volume 5, Issue 7, July (2014), pp. 55-61 © IAEME 
61 
REFERENCES 
[1] Yang Chang, PhD Thesis on “Garbage Collection for Flexible Hard Real-Time Systems 
University of York, July 2007. 
[2] Steffen Grarup and Jacob Seligmann: Incremental Mature Garbage Collection, M.Sc. thesis 
August 1993. Also published as Technical Report DAIMI IR-122, Computer Science 
Department, Aarhus University, Denmark; September 1994; ftp.daimi.au.dk as 
pub/thesis/gcthesis.ps.{Z,gz}. 
[3] Thesis of Pointer Tracking algorithm for DMOS By: Sudarshan N. Patel. 
[4] Jones, R., Lins, R.: Garbage Collection: Algorithms for Automatic Dynamic Memory 
Management, Wiley, 1996. 
[5] Matthias Meyer, An On-Chip Garbage Collection Coprocessor for Embedded Real-Time 
Systems Proceedings of the 11th IEEE International Conference on Embedded and Real- 
Time Computing Systems and Applications (RTCSA’05), IEEE Computer Society, 2000. 
[6] Witawas Srisa-an, Chia-Tien Dan Lo  Ji-en Morris Chang Active Memory Processor: A 
Hardware Garbage Collector for Real-Time Java Embedded Devices at in IEEE 
TRANSACTIONS ON MOBILE COMPUTING , April-June 2003 Page No. 95. 
[7] Guang Hu, Zhilei Chai, Shiliang Tu Memory Access Mechanism in Embedded Real-Time 
Java Processor International Conference on Computer and Automation Engineering 
Volume : 5 Location: Singapore Print ISBN: 978-1-4244-5585-0, Issue Date : 26-28 Feb. 
2010, pp.786. 
[8] Guang Hu, Zhilei Chai, Wenke Zhao, Shiliang Tu, Towards Garbage Collection Mechanism 
for RTSJ-Oriented Embedded Java Processor 2010 10th IEEE International Conference on 
Computer and Information Technology (CIT 2010), Location: Bradford Print ISBN: 
978-1-4244-7547-6 On page(s): 1312. 
[9] E. Ayeh, K. Agbedanu, Y. Morita, O. Adamo, and P. Guturu, “FPGA Implementation of an 
8-bit Simple Processor”, 978-1-4244-2077-3/08, IEEE Transactions 2008. 
[10] Vinay Bk and Sunil MP, “FPGA Based Design  Implementation of Orthogonal Frequency 
Division Multiplexing Transciever Module using VHDL”, International Journal of Advanced 
Research in Engineering  Technology (IJARET), Volume 4, Issue 6, 2013, pp. 70 - 83, 
ISSN Print: 0976-6480, ISSN Online: 0976-6499. 
[11] Addanki Purna Ramesh, Dr. A.V.N.Tilak and Dr.A.M.Prasad, “FPGA Based Implementation 
of Double Precision Floating Point Arithmetic Operations using Verilog”, International 
Journal of Computer Engineering  Technology (IJCET), Volume 3, Issue 2, 2012, 
pp. 92 - 107, ISSN Print: 0976 – 6367, ISSN Online: 0976 – 6375.

More Related Content

What's hot

The Surprising Truth About Your Disaster Recovery Maturity Level
The Surprising Truth About Your Disaster Recovery Maturity LevelThe Surprising Truth About Your Disaster Recovery Maturity Level
The Surprising Truth About Your Disaster Recovery Maturity LevelAxcient
 
Disaster Recovery Planning
Disaster Recovery Planning   Disaster Recovery Planning
Disaster Recovery Planning Keystone IT
 
Contingency Planning And Disaster Recovery Planning
Contingency Planning And Disaster Recovery PlanningContingency Planning And Disaster Recovery Planning
Contingency Planning And Disaster Recovery Planningmmohamme1124
 
Proactive cloud service assurance framework for fault remediation in cloud en...
Proactive cloud service assurance framework for fault remediation in cloud en...Proactive cloud service assurance framework for fault remediation in cloud en...
Proactive cloud service assurance framework for fault remediation in cloud en...IJECEIAES
 
What every IT audit should know about backup and recovery
What every IT audit should know about backup and recoveryWhat every IT audit should know about backup and recovery
What every IT audit should know about backup and recoveryessbaih
 
Contingency Planning Guide
Contingency Planning GuideContingency Planning Guide
Contingency Planning Guiderlynes
 

What's hot (10)

The Surprising Truth About Your Disaster Recovery Maturity Level
The Surprising Truth About Your Disaster Recovery Maturity LevelThe Surprising Truth About Your Disaster Recovery Maturity Level
The Surprising Truth About Your Disaster Recovery Maturity Level
 
BA 257 C1.C2
BA 257 C1.C2BA 257 C1.C2
BA 257 C1.C2
 
It&smart grid
It&smart gridIt&smart grid
It&smart grid
 
Disaster Recovery Plan
Disaster Recovery PlanDisaster Recovery Plan
Disaster Recovery Plan
 
Disaster Recovery Planning
Disaster Recovery Planning   Disaster Recovery Planning
Disaster Recovery Planning
 
Contingency Planning And Disaster Recovery Planning
Contingency Planning And Disaster Recovery PlanningContingency Planning And Disaster Recovery Planning
Contingency Planning And Disaster Recovery Planning
 
Proactive cloud service assurance framework for fault remediation in cloud en...
Proactive cloud service assurance framework for fault remediation in cloud en...Proactive cloud service assurance framework for fault remediation in cloud en...
Proactive cloud service assurance framework for fault remediation in cloud en...
 
Construction of a Disaster Recovery Plan with Business Only Broadband
Construction of a Disaster Recovery Plan with Business Only BroadbandConstruction of a Disaster Recovery Plan with Business Only Broadband
Construction of a Disaster Recovery Plan with Business Only Broadband
 
What every IT audit should know about backup and recovery
What every IT audit should know about backup and recoveryWhat every IT audit should know about backup and recovery
What every IT audit should know about backup and recovery
 
Contingency Planning Guide
Contingency Planning GuideContingency Planning Guide
Contingency Planning Guide
 

Viewers also liked

Beautiful sunsets 3
Beautiful  sunsets 3Beautiful  sunsets 3
Beautiful sunsets 3Nikos
 
(SLOVENIA) KARATBARS INTERNATIONAL GOLD BROCHURE
(SLOVENIA) KARATBARS INTERNATIONAL GOLD BROCHURE(SLOVENIA) KARATBARS INTERNATIONAL GOLD BROCHURE
(SLOVENIA) KARATBARS INTERNATIONAL GOLD BROCHURETaylor Richey
 
120808 21-wbeef-certif-miguel-cavalcanti
120808 21-wbeef-certif-miguel-cavalcanti120808 21-wbeef-certif-miguel-cavalcanti
120808 21-wbeef-certif-miguel-cavalcantiAgroTalento
 
02 workshop beefpoint 16mai2012
02 workshop beefpoint 16mai201202 workshop beefpoint 16mai2012
02 workshop beefpoint 16mai2012AgroTalento
 
12 rodrigo-untura-workshop-cria-beefpoint-2012
12 rodrigo-untura-workshop-cria-beefpoint-2012 12 rodrigo-untura-workshop-cria-beefpoint-2012
12 rodrigo-untura-workshop-cria-beefpoint-2012 AgroTalento
 
[Palestra] Miguel Cavalcanti: Abertura do Workshop Gerenciamento e Medição de...
[Palestra] Miguel Cavalcanti: Abertura do Workshop Gerenciamento e Medição de...[Palestra] Miguel Cavalcanti: Abertura do Workshop Gerenciamento e Medição de...
[Palestra] Miguel Cavalcanti: Abertura do Workshop Gerenciamento e Medição de...AgroTalento
 
Presentacion Final De Carman , Cindy Erika Y Pinki Si Este
Presentacion Final De Carman , Cindy   Erika Y Pinki Si EstePresentacion Final De Carman , Cindy   Erika Y Pinki Si Este
Presentacion Final De Carman , Cindy Erika Y Pinki Si Esteerika
 
Scada Café - Indicadores de Mercado
Scada Café - Indicadores de MercadoScada Café - Indicadores de Mercado
Scada Café - Indicadores de MercadoCia de Franchising
 
A NÁ L I S I S C O M P A R A T I V O D E L A S I M B O L O GÍ A D E L A...
A NÁ L I S I S  C O M P A R A T I V O  D E  L A  S I M B O L O GÍ A  D E  L A...A NÁ L I S I S  C O M P A R A T I V O  D E  L A  S I M B O L O GÍ A  D E  L A...
A NÁ L I S I S C O M P A R A T I V O D E L A S I M B O L O GÍ A D E L A...margarita
 
Improvement of accuracy in aircraft navigation by data fusion technique
Improvement of accuracy in aircraft navigation by data fusion techniqueImprovement of accuracy in aircraft navigation by data fusion technique
Improvement of accuracy in aircraft navigation by data fusion techniqueIAEME Publication
 
эколог продукты чумак и. в.
эколог продукты чумак и. в.эколог продукты чумак и. в.
эколог продукты чумак и. в.Andrey Ielkin
 
Temperature prediction of a two stage pulse tube cryocooler by neural network
Temperature prediction of a two stage pulse tube cryocooler by neural networkTemperature prediction of a two stage pulse tube cryocooler by neural network
Temperature prediction of a two stage pulse tube cryocooler by neural networkIAEME Publication
 
[Palestra] Phibro - Fernando Meirelles: Sistema de produção cria, recria e ...
[Palestra] Phibro - Fernando Meirelles: Sistema de produção cria, recria e ...[Palestra] Phibro - Fernando Meirelles: Sistema de produção cria, recria e ...
[Palestra] Phibro - Fernando Meirelles: Sistema de produção cria, recria e ...AgroTalento
 
Estudio examen de orina
Estudio examen de orinaEstudio examen de orina
Estudio examen de orinajean vega
 

Viewers also liked (20)

Beautiful sunsets 3
Beautiful  sunsets 3Beautiful  sunsets 3
Beautiful sunsets 3
 
(SLOVENIA) KARATBARS INTERNATIONAL GOLD BROCHURE
(SLOVENIA) KARATBARS INTERNATIONAL GOLD BROCHURE(SLOVENIA) KARATBARS INTERNATIONAL GOLD BROCHURE
(SLOVENIA) KARATBARS INTERNATIONAL GOLD BROCHURE
 
120808 21-wbeef-certif-miguel-cavalcanti
120808 21-wbeef-certif-miguel-cavalcanti120808 21-wbeef-certif-miguel-cavalcanti
120808 21-wbeef-certif-miguel-cavalcanti
 
02 workshop beefpoint 16mai2012
02 workshop beefpoint 16mai201202 workshop beefpoint 16mai2012
02 workshop beefpoint 16mai2012
 
12 rodrigo-untura-workshop-cria-beefpoint-2012
12 rodrigo-untura-workshop-cria-beefpoint-2012 12 rodrigo-untura-workshop-cria-beefpoint-2012
12 rodrigo-untura-workshop-cria-beefpoint-2012
 
[Palestra] Miguel Cavalcanti: Abertura do Workshop Gerenciamento e Medição de...
[Palestra] Miguel Cavalcanti: Abertura do Workshop Gerenciamento e Medição de...[Palestra] Miguel Cavalcanti: Abertura do Workshop Gerenciamento e Medição de...
[Palestra] Miguel Cavalcanti: Abertura do Workshop Gerenciamento e Medição de...
 
Presentacion Final De Carman , Cindy Erika Y Pinki Si Este
Presentacion Final De Carman , Cindy   Erika Y Pinki Si EstePresentacion Final De Carman , Cindy   Erika Y Pinki Si Este
Presentacion Final De Carman , Cindy Erika Y Pinki Si Este
 
Scada Café - Indicadores de Mercado
Scada Café - Indicadores de MercadoScada Café - Indicadores de Mercado
Scada Café - Indicadores de Mercado
 
A NÁ L I S I S C O M P A R A T I V O D E L A S I M B O L O GÍ A D E L A...
A NÁ L I S I S  C O M P A R A T I V O  D E  L A  S I M B O L O GÍ A  D E  L A...A NÁ L I S I S  C O M P A R A T I V O  D E  L A  S I M B O L O GÍ A  D E  L A...
A NÁ L I S I S C O M P A R A T I V O D E L A S I M B O L O GÍ A D E L A...
 
Improvement of accuracy in aircraft navigation by data fusion technique
Improvement of accuracy in aircraft navigation by data fusion techniqueImprovement of accuracy in aircraft navigation by data fusion technique
Improvement of accuracy in aircraft navigation by data fusion technique
 
эколог продукты чумак и. в.
эколог продукты чумак и. в.эколог продукты чумак и. в.
эколог продукты чумак и. в.
 
Irina CERNEAUSCAITE. Implicarea bibliotecii universitare în procesul de eval...
 Irina CERNEAUSCAITE. Implicarea bibliotecii universitare în procesul de eval... Irina CERNEAUSCAITE. Implicarea bibliotecii universitare în procesul de eval...
Irina CERNEAUSCAITE. Implicarea bibliotecii universitare în procesul de eval...
 
Temperature prediction of a two stage pulse tube cryocooler by neural network
Temperature prediction of a two stage pulse tube cryocooler by neural networkTemperature prediction of a two stage pulse tube cryocooler by neural network
Temperature prediction of a two stage pulse tube cryocooler by neural network
 
[Palestra] Phibro - Fernando Meirelles: Sistema de produção cria, recria e ...
[Palestra] Phibro - Fernando Meirelles: Sistema de produção cria, recria e ...[Palestra] Phibro - Fernando Meirelles: Sistema de produção cria, recria e ...
[Palestra] Phibro - Fernando Meirelles: Sistema de produção cria, recria e ...
 
Pizarra4
Pizarra4Pizarra4
Pizarra4
 
Estudio examen de orina
Estudio examen de orinaEstudio examen de orina
Estudio examen de orina
 
Taller Tics
Taller TicsTaller Tics
Taller Tics
 
Fotos úNicas
Fotos úNicasFotos úNicas
Fotos úNicas
 
Presentacionmate
PresentacionmatePresentacionmate
Presentacionmate
 
Mujeres Celtas
Mujeres CeltasMujeres Celtas
Mujeres Celtas
 

Similar to 50120140507008

A Survey on Heuristic Based Techniques in Cloud Computing
A Survey on Heuristic Based Techniques in Cloud ComputingA Survey on Heuristic Based Techniques in Cloud Computing
A Survey on Heuristic Based Techniques in Cloud ComputingIRJET Journal
 
26 7956 8212-1-rv software (edit)
26 7956 8212-1-rv software (edit)26 7956 8212-1-rv software (edit)
26 7956 8212-1-rv software (edit)IAESIJEECS
 
26 7956 8212-1-rv software (edit)
26 7956 8212-1-rv software (edit)26 7956 8212-1-rv software (edit)
26 7956 8212-1-rv software (edit)IAESIJEECS
 
An analysis of software aging in cloud environment
An analysis of software aging in cloud environment  An analysis of software aging in cloud environment
An analysis of software aging in cloud environment IJECEIAES
 
Hostel Mess Attendance Management System using Wifi
Hostel Mess Attendance Management System using WifiHostel Mess Attendance Management System using Wifi
Hostel Mess Attendance Management System using WifiIRJET Journal
 
AN INVESTIGATION OF THE MONITORING ACTIVITY IN SELF ADAPTIVE SYSTEMS
AN INVESTIGATION OF THE MONITORING ACTIVITY IN SELF ADAPTIVE SYSTEMSAN INVESTIGATION OF THE MONITORING ACTIVITY IN SELF ADAPTIVE SYSTEMS
AN INVESTIGATION OF THE MONITORING ACTIVITY IN SELF ADAPTIVE SYSTEMSijseajournal
 
Towards preventing software from becoming legacy a road map
Towards preventing software from becoming legacy a road mapTowards preventing software from becoming legacy a road map
Towards preventing software from becoming legacy a road mapIAEME Publication
 
12th CBSE Computer Science Project
12th CBSE Computer Science Project12th CBSE Computer Science Project
12th CBSE Computer Science ProjectAshwin Francis
 
Discovering Robustness Amongst CBIR Features
Discovering Robustness Amongst CBIR Features     Discovering Robustness Amongst CBIR Features
Discovering Robustness Amongst CBIR Features dannyijwest
 
A Review of Memory Allocation and Management in Computer Systems
A Review of Memory Allocation and Management in Computer SystemsA Review of Memory Allocation and Management in Computer Systems
A Review of Memory Allocation and Management in Computer SystemsCSEIJJournal
 
Computer Science & Engineering: An International Journal (CSEIJ)
Computer Science & Engineering: An International Journal (CSEIJ)Computer Science & Engineering: An International Journal (CSEIJ)
Computer Science & Engineering: An International Journal (CSEIJ)cseij
 
VIEW OF MEMORY ALLOCATION AND MANAGEMENT IN COMPUTER SYSTEMS
VIEW OF MEMORY ALLOCATION AND MANAGEMENT IN COMPUTER SYSTEMSVIEW OF MEMORY ALLOCATION AND MANAGEMENT IN COMPUTER SYSTEMS
VIEW OF MEMORY ALLOCATION AND MANAGEMENT IN COMPUTER SYSTEMScseij
 
6416cseij01
6416cseij016416cseij01
6416cseij01cseij
 
A REVIEW OF MEMORY ALLOCATION AND MANAGEMENT IN COMPUTER SYSTEMS
A REVIEW OF MEMORY ALLOCATION AND MANAGEMENT IN COMPUTER SYSTEMSA REVIEW OF MEMORY ALLOCATION AND MANAGEMENT IN COMPUTER SYSTEMS
A REVIEW OF MEMORY ALLOCATION AND MANAGEMENT IN COMPUTER SYSTEMScseij
 
An Investigation of Fault Tolerance Techniques in Cloud Computing
An Investigation of Fault Tolerance Techniques in Cloud ComputingAn Investigation of Fault Tolerance Techniques in Cloud Computing
An Investigation of Fault Tolerance Techniques in Cloud Computingijtsrd
 
ANALYSIS ON LOAD BALANCING ALGORITHMS IMPLEMENTATION ON CLOUD COMPUTING ENVIR...
ANALYSIS ON LOAD BALANCING ALGORITHMS IMPLEMENTATION ON CLOUD COMPUTING ENVIR...ANALYSIS ON LOAD BALANCING ALGORITHMS IMPLEMENTATION ON CLOUD COMPUTING ENVIR...
ANALYSIS ON LOAD BALANCING ALGORITHMS IMPLEMENTATION ON CLOUD COMPUTING ENVIR...AM Publications
 
Effektives Consulting - Performance Engineering
Effektives Consulting - Performance EngineeringEffektives Consulting - Performance Engineering
Effektives Consulting - Performance Engineeringhitdhits
 

Similar to 50120140507008 (20)

50120130406041 2
50120130406041 250120130406041 2
50120130406041 2
 
A Survey on Heuristic Based Techniques in Cloud Computing
A Survey on Heuristic Based Techniques in Cloud ComputingA Survey on Heuristic Based Techniques in Cloud Computing
A Survey on Heuristic Based Techniques in Cloud Computing
 
26 7956 8212-1-rv software (edit)
26 7956 8212-1-rv software (edit)26 7956 8212-1-rv software (edit)
26 7956 8212-1-rv software (edit)
 
26 7956 8212-1-rv software (edit)
26 7956 8212-1-rv software (edit)26 7956 8212-1-rv software (edit)
26 7956 8212-1-rv software (edit)
 
An analysis of software aging in cloud environment
An analysis of software aging in cloud environment  An analysis of software aging in cloud environment
An analysis of software aging in cloud environment
 
Hostel Mess Attendance Management System using Wifi
Hostel Mess Attendance Management System using WifiHostel Mess Attendance Management System using Wifi
Hostel Mess Attendance Management System using Wifi
 
Module 4 memory management
Module 4 memory managementModule 4 memory management
Module 4 memory management
 
AN INVESTIGATION OF THE MONITORING ACTIVITY IN SELF ADAPTIVE SYSTEMS
AN INVESTIGATION OF THE MONITORING ACTIVITY IN SELF ADAPTIVE SYSTEMSAN INVESTIGATION OF THE MONITORING ACTIVITY IN SELF ADAPTIVE SYSTEMS
AN INVESTIGATION OF THE MONITORING ACTIVITY IN SELF ADAPTIVE SYSTEMS
 
50120140504001
5012014050400150120140504001
50120140504001
 
Towards preventing software from becoming legacy a road map
Towards preventing software from becoming legacy a road mapTowards preventing software from becoming legacy a road map
Towards preventing software from becoming legacy a road map
 
12th CBSE Computer Science Project
12th CBSE Computer Science Project12th CBSE Computer Science Project
12th CBSE Computer Science Project
 
Discovering Robustness Amongst CBIR Features
Discovering Robustness Amongst CBIR Features     Discovering Robustness Amongst CBIR Features
Discovering Robustness Amongst CBIR Features
 
A Review of Memory Allocation and Management in Computer Systems
A Review of Memory Allocation and Management in Computer SystemsA Review of Memory Allocation and Management in Computer Systems
A Review of Memory Allocation and Management in Computer Systems
 
Computer Science & Engineering: An International Journal (CSEIJ)
Computer Science & Engineering: An International Journal (CSEIJ)Computer Science & Engineering: An International Journal (CSEIJ)
Computer Science & Engineering: An International Journal (CSEIJ)
 
VIEW OF MEMORY ALLOCATION AND MANAGEMENT IN COMPUTER SYSTEMS
VIEW OF MEMORY ALLOCATION AND MANAGEMENT IN COMPUTER SYSTEMSVIEW OF MEMORY ALLOCATION AND MANAGEMENT IN COMPUTER SYSTEMS
VIEW OF MEMORY ALLOCATION AND MANAGEMENT IN COMPUTER SYSTEMS
 
6416cseij01
6416cseij016416cseij01
6416cseij01
 
A REVIEW OF MEMORY ALLOCATION AND MANAGEMENT IN COMPUTER SYSTEMS
A REVIEW OF MEMORY ALLOCATION AND MANAGEMENT IN COMPUTER SYSTEMSA REVIEW OF MEMORY ALLOCATION AND MANAGEMENT IN COMPUTER SYSTEMS
A REVIEW OF MEMORY ALLOCATION AND MANAGEMENT IN COMPUTER SYSTEMS
 
An Investigation of Fault Tolerance Techniques in Cloud Computing
An Investigation of Fault Tolerance Techniques in Cloud ComputingAn Investigation of Fault Tolerance Techniques in Cloud Computing
An Investigation of Fault Tolerance Techniques in Cloud Computing
 
ANALYSIS ON LOAD BALANCING ALGORITHMS IMPLEMENTATION ON CLOUD COMPUTING ENVIR...
ANALYSIS ON LOAD BALANCING ALGORITHMS IMPLEMENTATION ON CLOUD COMPUTING ENVIR...ANALYSIS ON LOAD BALANCING ALGORITHMS IMPLEMENTATION ON CLOUD COMPUTING ENVIR...
ANALYSIS ON LOAD BALANCING ALGORITHMS IMPLEMENTATION ON CLOUD COMPUTING ENVIR...
 
Effektives Consulting - Performance Engineering
Effektives Consulting - Performance EngineeringEffektives Consulting - Performance Engineering
Effektives Consulting - Performance Engineering
 

More from IAEME Publication

IAEME_Publication_Call_for_Paper_September_2022.pdf
IAEME_Publication_Call_for_Paper_September_2022.pdfIAEME_Publication_Call_for_Paper_September_2022.pdf
IAEME_Publication_Call_for_Paper_September_2022.pdfIAEME Publication
 
MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...
MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...
MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...IAEME Publication
 
A STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURS
A STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURSA STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURS
A STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURSIAEME Publication
 
BROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURS
BROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURSBROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURS
BROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURSIAEME Publication
 
DETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONS
DETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONSDETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONS
DETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONSIAEME Publication
 
ANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONS
ANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONSANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONS
ANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONSIAEME Publication
 
VOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINO
VOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINOVOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINO
VOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINOIAEME Publication
 
IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...
IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...
IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...IAEME Publication
 
VISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMY
VISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMYVISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMY
VISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMYIAEME Publication
 
A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...
A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...
A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...IAEME Publication
 
GANDHI ON NON-VIOLENT POLICE
GANDHI ON NON-VIOLENT POLICEGANDHI ON NON-VIOLENT POLICE
GANDHI ON NON-VIOLENT POLICEIAEME Publication
 
A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...
A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...
A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...IAEME Publication
 
ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...
ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...
ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...IAEME Publication
 
INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...
INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...
INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...IAEME Publication
 
A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...
A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...
A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...IAEME Publication
 
EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...
EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...
EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...IAEME Publication
 
ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...
ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...
ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...IAEME Publication
 
OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...
OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...
OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...IAEME Publication
 
APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...
APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...
APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...IAEME Publication
 
A MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENT
A MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENTA MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENT
A MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENTIAEME Publication
 

More from IAEME Publication (20)

IAEME_Publication_Call_for_Paper_September_2022.pdf
IAEME_Publication_Call_for_Paper_September_2022.pdfIAEME_Publication_Call_for_Paper_September_2022.pdf
IAEME_Publication_Call_for_Paper_September_2022.pdf
 
MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...
MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...
MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...
 
A STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURS
A STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURSA STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURS
A STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURS
 
BROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURS
BROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURSBROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURS
BROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURS
 
DETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONS
DETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONSDETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONS
DETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONS
 
ANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONS
ANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONSANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONS
ANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONS
 
VOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINO
VOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINOVOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINO
VOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINO
 
IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...
IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...
IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...
 
VISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMY
VISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMYVISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMY
VISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMY
 
A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...
A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...
A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...
 
GANDHI ON NON-VIOLENT POLICE
GANDHI ON NON-VIOLENT POLICEGANDHI ON NON-VIOLENT POLICE
GANDHI ON NON-VIOLENT POLICE
 
A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...
A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...
A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...
 
ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...
ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...
ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...
 
INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...
INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...
INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...
 
A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...
A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...
A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...
 
EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...
EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...
EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...
 
ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...
ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...
ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...
 
OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...
OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...
OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...
 
APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...
APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...
APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...
 
A MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENT
A MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENTA MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENT
A MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENT
 

Recently uploaded

Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr LapshynFwdays
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Wonjun Hwang
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptxLBM Solutions
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
costume and set research powerpoint presentation
costume and set research powerpoint presentationcostume and set research powerpoint presentation
costume and set research powerpoint presentationphoebematthew05
 

Recently uploaded (20)

Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptx
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
costume and set research powerpoint presentation
costume and set research powerpoint presentationcostume and set research powerpoint presentation
costume and set research powerpoint presentation
 

50120140507008

  • 1. International Journal of Computer Engineering and Technology (IJCET), ISSN 0976-6367(Print), ISSN 0976 - 6375(Online), Volume 5, Issue 7, July (2014), pp. 55-61 © IAEME INTERNATIONAL JOURNAL OF COMPUTER ENGINEERING TECHNOLOGY (IJCET) ISSN 0976 – 6367(Print) ISSN 0976 – 6375(Online) Volume 5, Issue 7, July (2014), pp. 55-61 © IAEME: www.iaeme.com/IJCET.asp Journal Impact Factor (2014): 8.5328 (Calculated by GISI) www.jifactor.com IJCET © I A E M E TRADE-OFF BETWEEN TRADITIONAL GARBAGE COLLECTION Vs HARDWARE GARBAGE COLLECTION Viral V Kapadia Computer Science Engg Dept, The M S University of Baroda 55 ABSTRACT The major issue in today’s world of computing is improvement in performance of memory. The most suitable way we have described over here to make a comparison between software and hardware memory management. The result in upcoming section also proves the same that hardware memory management is more preferable. Keywords: VHDL, Verlilog, Garbage Collection, Processor, Clock Cycle, Delay, Xilinx. I. INTRODUCTION Memory management is one of the most vital researched areas in computer engineering since their goals are to understand and improve the usage of the two most crucial resources in virtually every computer system memory and processor. In both research areas, work has been done in many directions including theory, hardware, algorithms, and implementation and so on. A typical methodology is to investigate issues in only one area, assuming the system’s behaviour in the other area has no influence at all, or at most, very little influence on the issues under investigation. Although such a methodology is very successful in terms of reducing research scope and simplifying the targeted issues, it is not sufficient to reflect the system level nature of processor and memory usage, which is that they interact and even conflict with each other. Therefore, the two dimensions of time and space must be considered together in many cases so that the result will be a well designed system that has acceptable performance in both dimensions, rather than being extremely good in one dimension but unacceptable in the other one. This is the famous time-space tradeoff [1]. Memory management on which researchers are mainly focusing are the different techniques related to memory management i.e. garbage collection techniques, scheduling, real time system, user oriented design and many more. The major problem found out in memory management is processor and operating system delays. We don’t have good performance in Real time system since we are using the software approach which ultimately depends on operating system. So virtually we try to
  • 2. International Journal of Computer Engineering and Technology (IJCET), ISSN 0976-6367(Print), ISSN 0976 - 6375(Online), Volume 5, Issue 7, July (2014), pp. 55-61 © IAEME say we are having real-time memory management but physically not performing the intended task more convincingly. Here we are trying to design a hardware design that can perform all memory management tasks with additional power of VLIW instruction word and parallel processing. Real-time requirements are far and wide in modern applications, from multimedia players to communication controls, aviation systems, safety critical control systems, etc. Garbage collection is widely acknowledged to speed up software development while increasing security and reliability. However, garbage collectors that support real-time applications are notoriously hard to build. Traditional garbage collectors stop the application to perform the entire collection or even just to initiate or finish up the collection. Stopping all threads creates a computation pause which is unacceptable for real-time systems [1]. Such atomic operations create ordering constraints that do not leave much room for reordering of memory accesses. Thus, a more sophisticated compaction mechanism must be used. As part of our real-time system, we want to provide a novel concurrent collector, which provides a solution to the above challenge. Real-time requirements are far and wide in modern applications, from multimedia players to communication controls, aviation systems, safety critical control systems, etc. Garbage collection is widely acknowledged to speed up software development while increasing security and reliability. However, garbage collectors that support real-time applications are notoriously hard to build. Traditional garbage collectors stop the application to perform the entire collection or even just to initiate or finish up the collection. Stopping all threads creates a computation pause which is unacceptable for real-time systems [1]. Classical real-time systems typically operate with a certain amount of slack. If there is no slack, then the system can’t guarantee to meet its bounds. But interactive systems may become sluggish during bursts of other activity on the machine, and in some cases this is the desired behaviour. Queued systems may absorb temporary load spikes and tolerate a certain fraction of outliers depending on a service-level agreement [1]. Such atomic operations create ordering constraints that do not leave much room for reordering of memory accesses. Thus, a more sophisticated compaction mechanism must be used. As part of our real-time system, we want to provide a novel concurrent collector, which provides a solution to the above challenge. To measure responsiveness of our collector, we propose a mutator responsiveness measure, attempting to check how responsive the system is for events that get generated at a high frequency. Currently there is no Distributed Object Store that Implement an Algorithm of Distributed Garbage Collectors that can do processor management and provide adaptive garbage collection. We have to use different garbage collection techniques for different environment. There is partly memory allocation and deallocation Implementation of the System function which doing memory allocation and deallocation that can be optimize in our implementation of algorithm. 56 II. GARBAGE COLLECTION One of the potential disadvantages of garbage collection compared to the explicit freeing of objects is that garbage collection gives programmers less control over the scheduling of CPU time devoted to reclaiming memory. It is in general impossible to predict exactly when (or even if) a garbage collector will be invoked and how long it will take to run. Because garbage collectors usually stop the entire program while seeking and collecting garbage objects, they can cause arbitrarily long pauses at arbitrary times during the execution of the program. Such garbage collection pauses can sometimes be long enough to be noticed by users. Garbage collection pauses can also prevent programs from responding to events quickly enough to satisfy the requirements of real-time systems. If a garbage collection algorithm is capable of generating pauses lengthy- enough
  • 3. International Journal of Computer Engineering and Technology (IJCET), ISSN 0976-6367(Print), ISSN 0976 - 6375(Online), Volume 5, Issue 7, July (2014), pp. 55-61 © IAEME to be either noticeable to the user or make the program unsuitable for real-time environments, the algorithm is said to be disruptive. To minimize the potential disadvantages of garbage collection compared to the explicit freeing of objects, a common design goal for garbage collection algorithms is to minimize or, if possible, eliminate their disruptive nature [1]. The process of distributed garbage collection can be categorized by two approaches: 57 A. Software approach The software approach for garbage collection is very famous and it is implemented in many of the application software such as JAVA, .Net etc. the main disadvantage of this system is works under the control of operating system and for each and every instruction operating system calls the main processor through any interrupts. As whenever there is a requirement of memory in application, it runs the garbage collection process and in that process also the main processor is interrupted. The main processor is wasting its time in garbage collection where as other process are waiting for processor. The software approach is easy to implement compare to hardware approach. At the same time is also slower compare to hardware approach. We will discuss the software approach in detail. A widely accepted method to control software complexity and to increase software quality is automatic dynamic memory management, also referred to as garbage collection. Unfortunately, it is difficult to implement garbage collection for real-time systems. Because of high overhead and unpredictable pauses, most embedded system designers still consider garbage collection an unaffordable luxury. Consequently, they have to resort to manual memory management with the well-known problems: Freeing memory too early causes “dangling references”, while freeing memory too late or not at all gives rise to memory leaks. But worst of all, manual memory reclamation requires the programmer’s global view of a software system and contradicts modularization [5]. A widely accepted method to control software complexity and to increase software quality is automatic dynamic memory management, also referred to as garbage collection. Unfortunately, it is difficult to implement garbage collection for real-time systems. Because of high overhead and unpredictable pauses, most embedded system designers still consider garbage collection an unaffordable luxury. Consequently, they have to resort to manual memory management with the well-known problems: Freeing memory too early causes “dangling references”, while freeing memory too late or not at all gives rise to memory leaks. But worst of all, manual memory reclamation requires the programmer’s global view of a software system and contradicts modularization [5]. Real-time applications require a small upper bound on any pause the garbage collector might cause. Garbage collection in software, however, faces an inevitable trade-off between the granularity of garbage collection (i.e. the maximum pause length) and the code-size and runtime overhead caused by synchronization. To prevent this overhead from becoming unjustifiably high, software collectors have to rely on indivisible operations such as processing an entire object or the complete root set [4]. Since the duration of these operations is potentially unlimited, these software collectors are not suited for hard real-time environments [5]. B. Hardware approach Following Programming Tools are available for hardware designing. 1) VHDL: VHDL (VHSIC hardware description language; VHSIC: very-high-speed integrated circuit) is a hardware description language used in electronic design automation to describe digital and mixed-signal systems such as field-programmable gate arrays and integrated circuits.
  • 4. International Journal of Computer Engineering and Technology (IJCET), ISSN 0976-6367(Print), ISSN 0976 - 6375(Online), Volume 5, Issue 7, July (2014), pp. 55-61 © IAEME VHDL is a fairly general-purpose language, and it doesn't require a simulator on which to run the code. There are many VHDL compilers, which build executable binaries. It can read and write files on the host computer, so a VHDL program can be written that generates another VHDL program to be incorporated in the design being developed. Because of this general-purpose nature, it is possible to use VHDL to write a test bench that verifies the functionality of the design using files on the host computer to define stimuli, interacts with the user, and compares results with those expected. It is relatively easy for an inexperienced developer to produce code that simulates successfully but that cannot be synthesized into a real device, or is too large to be practical. One particular pitfall is the accidental production of transparent latches rather than D-type flip-flops as storage elements. The key advantage of VHDL when used for systems design is that it allows the behaviour of the required system to be described (modeled) and verified (simulated) before synthesis tools translate the design into real hardware (gates and wires). Another benefit is that VHDL allows the description of a concurrent system (many parts, each with its own sub-behaviour, working together at the same time). VHDL is a Dataflow language, unlike procedural computing languages such as BASIC, C, and assembly code, which all run sequentially, one instruction at a time. A final point is that when a VHDL model is translated into the gates and wires that are mapped onto a programmable logic device such as a CPLD or FPGA, then it is the actual hardware being configured, rather than the VHDL code being executed as if on some form of a processor chip. 58
  • 5. International Journal of Computer Engineering and Technology (IJCET), ISSN 0976-6367(Print), ISSN 0976 - 6375(Online), Volume 5, Issue 7, July (2014), pp. 55-61 © IAEME 59 III. RESULTS The objective over here is to prove the difference of efficiency of memory management at the processor level and traditional approach. Here we have taken an 8 bit processor to prove the same. Figure 56 is the snapshot of processor that we have simulated in Xilinx ISE 9.2. It won’t make a difference for the higher level of processors also as we are providing the comparison between an 8 bit traditional processor and 8 bit memory processor. The same is to implied for the higher level of processors also. The first row in figure 56 indicate the CLK (clock) for the processor. Processing is done after the delay of 3micro seconds to let the signal stabilize. Figure 1: Simulation window consisting of Input and Output D0 to D4 stands for the data / address lines. S0, S1 and S2 are control signals. Hence we have 8 instructions set. I0, I1, I2, I3, I4 and Y are out put signals used for checking various operations performed by the processor as shown in the figure 57.
  • 6. International Journal of Computer Engineering and Technology (IJCET), ISSN 0976-6367(Print), ISSN 0976 - 6375(Online), Volume 5, Issue 7, July (2014), pp. 55-61 © IAEME 60 IV. CONCLUSION The Best Way to provide trade of between Garbage collection and processor utilization is to have another software coded processor dedicated for Garbage collection which works independently of main processor. Since technological and economical reasons have put a stop to the increase of clock frequency, performance improvements now come in the form of additional parallelism Figure 2: Input Wave supplied for simulation In the simulator the check the exact behaviour of the processor the input needs to be in the form of wave form and hence we get a wave form as an output we can map the in the input signal at a particular clock cycle and at the same time we can also observe the output wave form on the same clock cycle that provides us the information of processing of the processor. Output wave form is missing in figure 57 as it would be generated after the processing
  • 7. International Journal of Computer Engineering and Technology (IJCET), ISSN 0976-6367(Print), ISSN 0976 - 6375(Online), Volume 5, Issue 7, July (2014), pp. 55-61 © IAEME 61 REFERENCES [1] Yang Chang, PhD Thesis on “Garbage Collection for Flexible Hard Real-Time Systems University of York, July 2007. [2] Steffen Grarup and Jacob Seligmann: Incremental Mature Garbage Collection, M.Sc. thesis August 1993. Also published as Technical Report DAIMI IR-122, Computer Science Department, Aarhus University, Denmark; September 1994; ftp.daimi.au.dk as pub/thesis/gcthesis.ps.{Z,gz}. [3] Thesis of Pointer Tracking algorithm for DMOS By: Sudarshan N. Patel. [4] Jones, R., Lins, R.: Garbage Collection: Algorithms for Automatic Dynamic Memory Management, Wiley, 1996. [5] Matthias Meyer, An On-Chip Garbage Collection Coprocessor for Embedded Real-Time Systems Proceedings of the 11th IEEE International Conference on Embedded and Real- Time Computing Systems and Applications (RTCSA’05), IEEE Computer Society, 2000. [6] Witawas Srisa-an, Chia-Tien Dan Lo Ji-en Morris Chang Active Memory Processor: A Hardware Garbage Collector for Real-Time Java Embedded Devices at in IEEE TRANSACTIONS ON MOBILE COMPUTING , April-June 2003 Page No. 95. [7] Guang Hu, Zhilei Chai, Shiliang Tu Memory Access Mechanism in Embedded Real-Time Java Processor International Conference on Computer and Automation Engineering Volume : 5 Location: Singapore Print ISBN: 978-1-4244-5585-0, Issue Date : 26-28 Feb. 2010, pp.786. [8] Guang Hu, Zhilei Chai, Wenke Zhao, Shiliang Tu, Towards Garbage Collection Mechanism for RTSJ-Oriented Embedded Java Processor 2010 10th IEEE International Conference on Computer and Information Technology (CIT 2010), Location: Bradford Print ISBN: 978-1-4244-7547-6 On page(s): 1312. [9] E. Ayeh, K. Agbedanu, Y. Morita, O. Adamo, and P. Guturu, “FPGA Implementation of an 8-bit Simple Processor”, 978-1-4244-2077-3/08, IEEE Transactions 2008. [10] Vinay Bk and Sunil MP, “FPGA Based Design Implementation of Orthogonal Frequency Division Multiplexing Transciever Module using VHDL”, International Journal of Advanced Research in Engineering Technology (IJARET), Volume 4, Issue 6, 2013, pp. 70 - 83, ISSN Print: 0976-6480, ISSN Online: 0976-6499. [11] Addanki Purna Ramesh, Dr. A.V.N.Tilak and Dr.A.M.Prasad, “FPGA Based Implementation of Double Precision Floating Point Arithmetic Operations using Verilog”, International Journal of Computer Engineering Technology (IJCET), Volume 3, Issue 2, 2012, pp. 92 - 107, ISSN Print: 0976 – 6367, ISSN Online: 0976 – 6375.