Hardware Implementation
نویسندگان
چکیده
Computing systems play a vital role in our society, influencing both industry and academia, and the spectrum of applications executing on these systems and their complexity varies widely. Future generations of computing systems are expected to execute processes which are more complex and larger in size. The tasks comprising these applications will have many constraints associated with their execution, and scheduling of such tasks using exact methods will become intractable or Non Polynomial (NP) complete. The NP completeness of the task scheduling problem has incited the use of various heuristics to obtain good solutions in a reasonable amount of time. In this thesis one such meta-heuristic known as a genetic algorithm (GA) is used. GAs are generic, domain independent search and optimization techniques based on the theory of evolution. GAs have been successfully applied to many classes of scheduling problems. However, with the increase in the size of the scheduling problem, the time complexity of the software implementation of a GA becomes high. To reduce the time complexity without compromising the solution quality, GAs have been parallelized. However, parallelization demands additional resources leading to a poor cost performance tradeoff. The advent of hardware technologies and design tools in the field of reconfigurable devices has enabled us to achieve better cost performance tradeoff. This thesis explores one such approach where a parallelized hardware-based GA task scheduler is implemented and its performance is compared to that of parallelized software-based GA.
منابع مشابه
Decrease in Hardware Consumption and Quantization Noise of Digital Delta-Sigma Modulators and Implementation by VHDL
A new structure is presented for digital delta-sigma modulator (DDSM). Novel architecture decreases hardware consumption, output quantization noise and spurs in Comparison to previous architectures. In order to reduce the delay, power consumption and increase maximum working frequency, the pipelining technique and the carry skip adder are used. Simulation proposed architecture shows that the qu...
متن کاملHardwar Trojan classification and implementation and offer a new detection approach
A hardware attack that enables the attacker to alter the main circuit with malicious hardware during either design or the fabrication process is studied and analyzed. This attack, known as the hardware Trojan, has different objectives such as destroying hardware, changing circuit characteristics or extracting sensitive information. So hardware Trojan detection and hardware security are critical...
متن کاملModel Based Design approach for Implementation of PHEV Energy Management
Hardware implementation of the Plug-in hybrid electric vehicles (PHEVs) control strategy is an important stage of the development of the vehicle electric control unit (ECU). This paper introduces Model-Based Design (MBD) approach for implementation of PHEV energy management. Based on this approach, implementation of the control algorithm on an electronic hardware is performed using automatic co...
متن کاملFPGA Implementation of JPEG and JPEG2000-Based Dynamic Partial Reconfiguration on SOC for Remote Sensing Satellite On-Board Processing
This paper presents the design procedure and implementation results of a proposed hardware which performs different satellite Image compressions using FPGA Xilinx board. First, the method is described and then VHDL code is written and synthesized by ISE software of Xilinx Company. The results show that it is easy and useful to design, develop and implement the hardware image compressor using ne...
متن کاملLightweight 4x4 MDS Matrices for Hardware-Oriented Cryptographic Primitives
Linear diffusion layer is an important part of lightweight block ciphers and hash functions. This paper presents an efficient class of lightweight 4x4 MDS matrices such that the implementation cost of them and their corresponding inverses are equal. The main target of the paper is hardware oriented cryptographic primitives and the implementation cost is measured in terms of the required number ...
متن کاملHardware Implementation of Dynamic S-BOX to Use in AES Cryptosystem
One of the major cipher symmetric algorithms is AES. Its main feature is to use S-BOX step, which is the only non-linear part of this standard possessing fixed structure. During the previous studies, it was shown that AES standard security was increased by changing the design concepts of S-BOX and production of dynamic S-BOX. In this paper, a change of AES standard security is studied by produc...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2006