SlideShare ist ein Scribd-Unternehmen logo
1 von 8
Downloaden Sie, um offline zu lesen
International Journal of Advanced Research in Engineering and Technology (IJARET), ISSN 0976 –
6480(Print), ISSN 0976 – 6499(Online) Volume 5, Issue 7, July (2014), pp. 63-70 © IAEME
63
COMPARISON OF CO-PROCESSOR AND TRADITIONAL PROCESSOR IN
TERMS OF TIME CYCLE
Viral V Kapadia1
, Dr. V K Thakar2
1
Computer Science & Engg Dept, The M S University of Baroda
2
Head & Professor, A D Patel Institute of Technology
ABSTRACT
The major issue in today’s world of computing is improvement in performance of memory.
The major issue at processor level is to identify the data block or data that is required for processing
either address or data, which is stored in memory. The data needs to be fetched from memory (RAM)
to register and vice versa. Here the traditional processor waste a big amount of cycles for memory
management and hence if a better co-processor is available than we can increase the performance of
processor by increasing time cycles.
Keywords: VHDL, Verlilog, Garbage Collection, Processor, Clock Cycle, Delay, Xilinx
I. INTRODUCTION
Memory management is one of the most vital researched areas in computer engineering since
their goals are to understand and improve the usage of the two most crucial resources in virtually
every computer system memory and processor. In both research areas, work has been done in many
directions including theory, hardware, algorithms, and implementation and so on. A typical
methodology is to investigate issues in only one area, assuming the system’s behaviour in the other
area has no influence at all, or at most, very little influence on the issues under investigation.
Although such a methodology is very successful in terms of reducing research scope and simplifying
the targeted issues, it is not sufficient to reflect the system level nature of processor and memory
usage, which is that they interact and even conflict with each other. Therefore, the two dimensions of
time and space must be considered together in many cases so that the result will be a well designed
system that has acceptable performance in both dimensions, rather than being extremely good in one
dimension but unacceptable in the other one. This is the famous time-space tradeoff [1].
INTERNATIONAL JOURNAL OF ADVANCED RESEARCH
IN ENGINEERING AND TECHNOLOGY (IJARET)
ISSN 0976 - 6480 (Print)
ISSN 0976 - 6499 (Online)
Volume 5, Issue 7, July (2014), pp. 63-70
© IAEME: http://www.iaeme.com/IJARET.asp
Journal Impact Factor (2014): 7.8273 (Calculated by GISI)
www.jifactor.com
IJARET
© I A E M E
International Journal of Advanced Research in Engineering and Technology (IJARET), ISSN 0976 –
6480(Print), ISSN 0976 – 6499(Online) Volume 5, Issue 7, July (2014), pp. 63-70 © IAEME
64
Memory management on which researchers are mainly focusing are the different techniques
related to memory management i.e. garbage collection techniques, scheduling, real time system, user
oriented design and many more. The major problem found out in memory management is processor
and operating system delays. We don’t have good performance in Real time system since we are
using the software approach which ultimately depends on operating system. So virtually we try to
say we are having real-time memory management but physically not performing the intended task
more convincingly. Here we are trying to design a hardware design that can perform all memory
management tasks with additional power of VLIW instruction word and parallel processing.
Real-time requirements are far and wide in modern applications, from multimedia players to
communication controls, aviation systems, safety critical control systems, etc. Garbage collection is
widely acknowledged to speed up software development while increasing security and reliability.
However, garbage collectors that support real-time applications are notoriously hard to build.
Traditional garbage collectors stop the application to perform the entire collection or even just to
initiate or finish up the collection. Stopping all threads creates a computation pause which is
unacceptable for real-time systems [1].
Such atomic operations create ordering constraints that do not leave much room for
reordering of memory accesses. Thus, a more sophisticated compaction mechanism must be used. As
part of our real-time system, we want to provide a novel concurrent collector, which provides a
solution to the above challenge.
Real-time requirements are far and wide in modern applications, from multimedia players to
communication controls, aviation systems, safety critical control systems, etc. Garbage collection is
widely acknowledged to speed up software development while increasing security and reliability.
However, garbage collectors that support real-time applications are notoriously hard to build.
Traditional garbage collectors stop the application to perform the entire collection or even just to
initiate or finish up the collection. Stopping all threads creates a computation pause which is
unacceptable for real-time systems [1].
Classical real-time systems typically operate with a certain amount of slack. If there is no
slack, then the system can’t guarantee to meet its bounds. But interactive systems may become
sluggish during bursts of other activity on the machine, and in some cases this is the desired
behaviour. Queued systems may absorb temporary load spikes and tolerate a certain fraction of
outliers depending on a service-level agreement [1].
Such, atomic operations create ordering constraints that do not leave much room for
reordering of memory accesses. Thus, a more sophisticated compaction mechanism must be used. As
part of our real-time system, we want to provide a novel concurrent collector, which provides a
solution to the above challenge.
To measure responsiveness of our collector, we propose a mutator responsiveness measure,
attempting to check how responsive the system is for events that get generated at a high frequency.
Currently there is no Distributed Object Store that Implement an Algorithm of Distributed
Garbage Collectors that can do processor management and provide adaptive garbage collection. We
have to use different garbage collection techniques for different environment. There is partly
memory allocation and deallocation Implementation of the System function which doing memory
allocation and deallocation that can be optimize in our implementation of algorithm.
II. GARBAGE COLLECTION
One of the potential disadvantages of garbage collection compared to the explicit freeing of
objects is that garbage collection gives programmers less control over the scheduling of CPU time
devoted to reclaiming memory. It is in general impossible to predict exactly when (or even if) a
garbage collector will be invoked and how long it will take to run. Because garbage collectors
International Journal of Advanced Research in Engineering and Technology (IJARET), ISSN 0976 –
6480(Print), ISSN 0976 – 6499(Online) Volume 5, Issue 7, July (2014), pp. 63-70 © IAEME
65
usually stop the entire program while seeking and collecting garbage objects, they can cause
arbitrarily long pauses at arbitrary times during the execution of the program. Such garbage
collection pauses can sometimes be long enough to be noticed by users. Garbage collection pauses
can also prevent programs from responding to events quickly enough to satisfy the requirements of
real-time systems. If a garbage collection algorithm is capable of generating pauses lengthy- enough
to be either noticeable to the user or make the program unsuitable for real-time environments, the
algorithm is said to be disruptive. To minimize the potential disadvantages of garbage collection
compared to the explicit freeing of objects, a common design goal for garbage collection algorithms
is to minimize or, if possible, eliminate their disruptive nature [1].
The process of distributed garbage collection can be categorized by two approaches:
A. Software approach
The software approach for garbage collection is very famous and it is implemented in many
of the application software such as JAVA, .Net etc. the main disadvantage of this system is works
under the control of operating system and for each and every instruction operating system calls the
main processor through any interrupts. As whenever there is a requirement of memory in application,
it runs the garbage collection process and in that process also the main processor is interrupted. The
main processor is wasting its time in garbage collection where as other process are waiting for
processor. The software approach is easy to implement compare to hardware approach. At the same
time is also slower compare to hardware approach. We will discuss the software approach in detail.
A widely accepted method to control software complexity and to increase software quality is
automatic dynamic memory management, also referred to as garbage collection. Unfortunately, it is
difficult to implement garbage collection for real-time systems. Because of high overhead and
unpredictable pauses, most embedded system designers still consider garbage collection an
unaffordable luxury. Consequently, they have to resort to manual memory management with the
well-known problems: Freeing memory too early causes “dangling references”, while freeing
memory too late or not at all gives rise to memory leaks. But worst of all, manual memory
reclamation requires the programmer’s global view of a software system and contradicts
modularization [5].
A widely accepted method to control software complexity and to increase software quality is
automatic dynamic memory management, also referred to as garbage collection. Unfortunately, it is
difficult to implement garbage collection for real-time systems. Because of high overhead and
unpredictable pauses, most embedded system designers still consider garbage collection an
unaffordable luxury. Consequently, they have to resort to manual memory management with the
well-known problems: Freeing memory too early causes “dangling references”, while freeing
memory too late or not at all gives rise to memory leaks. But worst of all, manual memory
reclamation requires the programmer’s global view of a software system and contradicts
modularization [5].
Real-time applications require a small upper bound on any pause the garbage collector might
cause. Garbage collection in software, however, faces an inevitable trade-off between the granularity
of garbage collection (i.e. the maximum pause length) and the code-size and runtime overhead
caused by synchronization. To prevent this overhead from becoming unjustifiably high, software
collectors have to rely on indivisible operations such as processing an entire object or the complete
root set [4]. Since the duration of these operations is potentially unlimited, these software collectors
are not suited for hard real-time environments [5].
International Journal of Advanced Research in Engineering and Technology (IJARET), ISSN 0976 –
6480(Print), ISSN 0976 – 6499(Online) Volume 5, Issue 7, July (2014), pp. 63-70 © IAEME
66
B. Hardware approach
Following Programming Tools are available for hardware designing.
1) VHDL : VHDL (VHSIC hardware description language; VHSIC: very-high-speed integrated
circuit) is a hardware description language used in electronic design automation to describe
digital and mixed-signal systems such as field-programmable gate arrays and integrated circuits.
VHDL is a fairly general-purpose language, and it doesn't require a simulator on which
to run the code. There are many VHDL compilers, which build executable binaries. It can read
and write files on the host computer, so a VHDL program can be written that generates another
VHDL program to be incorporated in the design being developed. Because of this general-
purpose nature, it is possible to use VHDL to write a test bench that verifies the functionality of
the design using files on the host computer to define stimuli, interacts with the user, and
compares results with those expected.
It is relatively easy for an inexperienced developer to produce code that simulates
successfully but that cannot be synthesized into a real device, or is too large to be practical.
One particular pitfall is the accidental production of transparent latches rather than D-type flip-
flops as storage elements.
The key advantage of VHDL when used for systems design is that it allows the
behaviour of the required system to be described (modeled) and verified (simulated) before
synthesis tools translate the design into real hardware (gates and wires).
Another benefit is that VHDL allows the description of a concurrent system (many
parts, each with its own sub-behaviour, working together at the same time). VHDL is a
Dataflow language, unlike procedural computing languages such as BASIC, C, and assembly
code, which all run sequentially, one instruction at a time.
A final point is that when a VHDL model is translated into the "gates and wires" that
are mapped onto a programmable logic device such as a CPLD or FPGA, then it is the actual
hardware being configured, rather than the VHDL code being "executed" as if on some form of
a processor chip.
Figure 1: Coprocessor Architecture
International Journal of Advanced Research in Engineering and Technology (IJARET), ISSN 0976 –
6480(Print), ISSN 0976 – 6499(Online) Volume 5, Issue 7, July (2014), pp. 63-70 © IAEME
67
III. IMPLEMENTATION
In digital systems encompasses a range of systems from low-level components to complete
system-on-a-chip and board-level designs. If we are to encompass this range of views of digital
systems, we must recognize the complexity with which we are dealing. The most important way of
meeting this challenge is to adopt a systematic methodology of design. If we start with a
requirements document for the system, we can design an abstract structure that meets the
requirements. We can then decompose this structure into a collection of components that interact to
perform the same function.
Each of these components can in turn be decomposed until we get to a level where we have
some ready-made, primitive components that perform a required function. The advantage of this
methodology is that each subsystem can be designed independently of others. We use the term model
to mean our understanding of a system. The model represents that information which is relevant and
abstracts away from irrelevant detail. The implication of this is that there may be several models of
the same system, since different information is relevant in different contexts. In our design we have
define the CMS.vhd for advance code morphing software and ALU.vhd that performs the task of
arithmetic and logical unit and various required data manipulation functionalities.
Figure 2: DSM using shared variables
Distributed shared memory management modelling scenario presents distributed shared
memory management techniques and their performance impact for multicore environments. By
removing imbalance between processor and memory performance it becomes more important to
optimize the shared memory management features to obtain the maximum possible performance out
of the memory subsystem. It has consideration that no of processors that communicating through
shared variables. Here, figure 2 below shows the view of shared variable used concurrently by three
processors P_1, P_2 and P_3 to manipulate the data in the system. The system can have more no of
processor and large shared memory size depends on the requirements.
System Architecture
In distributed shared memory systems processes share data transparently across node
boundaries; data faulting, location, and movement is handled by the underlying system. While the
performance implications cannot be ignored, the advantages of the shared memory programming
model are well known:
Programming with shared memory is a well-understood problem.
International Journal of Advanced Research in Engineering and Technology (IJARET), ISSN 0976 –
6480(Print), ISSN 0976 – 6499(Online) Volume 5, Issue 7, July (2014), pp. 63-70 © IAEME
68
Shared memory programs are usually shorter and easier to understand than equivalent
message passing programs.
Consumes less design time compared to others
Large or complex data structures may easily be communicated.
Shared memory gives transparent process-to-process communication.
Cheaper to implement system model using shared memory
IV. RESULTS
Figure 3: Simulation window consisting of Input and Output
The objective over here is to prove the difference of efficiency of memory management at the
processor level and traditional approach. Here we have taken an 8 bit processor to prove the same.
Figure 3 is the snapshot of processor that we have simulated in Xilinx ISE 9.2. It won’t make a
difference for the higher level of processors also as we are providing the comparison between an 8
bit traditional processor and 8 bit memory processor. The same is to implied for the higher level of
processors also. The first row in figure 3 indicates the CLK (clock) for the processor. Processing is
done after the delay of 3micro seconds to let the signal stabilize.
D0 to D4 stands for the data / address lines. S0, S1 and S2 are control signals. Hence we have
8 instructions set.
I0, I1, I2,I3, I4 and Y are output signals used for checking various operations performed by
the processor as shown in the figure 3.
Table 1: Comparative time cycles
Experiment
No
Memory
status
(Occupied)
Memory
Block to
be
allocated
Search
Traditional
Manner
(Cumulative)
Search with
Coprocessor
% Time
cycles
Improved
Remarks
1 25 % 1 5 1 16 Random
Memory
Allocation
2 50% 1 20 1 32
3 75% 1 50 1 48
4 100% 1 64 1 64
International Journal of Advanced Research in Engineering and Technology (IJARET), ISSN 0976 –
6480(Print), ISSN 0976 – 6499(Online) Volume 5, Issue 7, July (2014), pp. 63-70 © IAEME
69
Figure 2: Comparative time cycles
V. CONCLUSION
The Best Way to provide trade of between Garbage collection and processor utilization is to
have another software coded processor dedicated for Garbage collection which works independently
of main processor. Since technological and economical reasons have put a stop to the increase of
clock frequency, performance improvements now come in the form of additional parallelism
Figure 5: Input Wave supplied for simulation
Figure 6: Comparative cycles
0
10
20
30
40
50
60
70
25 50 75 100
Traditional
Coprocessor
International Journal of Advanced Research in Engineering and Technology (IJARET), ISSN 0976 –
6480(Print), ISSN 0976 – 6499(Online) Volume 5, Issue 7, July (2014), pp. 63-70 © IAEME
70
In the simulator the check the exact behaviour of the processor the input needs to be in the
form of wave form and hence we get a wave form as an output we can map the in the input signal at
a particular clock cycle and at the same time we can also observe the output wave form on the same
clock cycle that provides us the information of processing of the processor. Output wave form is
missing in figure 6 as it would be generated after the processing
REFERENCES
[1] Yang Chang, PhD Thesis on, “Garbage Collection for Flexible Hard Real-Time Systems"
University of York, July 2007
[2] Steffen Grarup and Jacob Seligmann: Incremental Mature Garbage Collection, M.Sc. thesis
August 1993. Also published as Technical Report DAIMI IR-122, Computer Science
Department, Aarhus University, Denmark; September 1994; ftp.daimi.au.dk as
pub/thesis/gcthesis.ps.{Z,gz}.
[3] Thesis of Pointer Tracking algorithm for DMOS By: Sudarshan N. Patel
[4] Jones, R., Lins, R.: Garbage Collection: Algorithms for Automatic Dynamic Memory
Management, Wiley, 1996.
[5] Matthias Meyer, "An On-Chip Garbage Collection Coprocessor for Embedded Real-Time
Systems" Proceedings of the 11th IEEE International Conference on Embedded and Real-
Time Computing Systems and Applications (RTCSA’05), IEEE Computer Society, 2000.
[6] Witawas Srisa-an, Chia-Tien Dan Lo & Ji-en Morris Chang, "Active Memory Processor: A
Hardware Garbage Collector for Real-Time Java Embedded Devices" at in IEEE
TRANSACTIONS ON MOBILE COMPUTING , April-June 2003 Page No. 95
[7] Guang Hu, Zhilei Chai, Shiliang Tu "Memory Access Mechanism in Embedded Real-Time
Java Processor", International Conference on Computer and Automation Engineering
Volume: 5 Location: Singapore Print ISBN: 978-1-4244-5585-0, Issue Date : 26-28 Feb.
2010, pp.786.
[8] Guang Hu, Zhilei Chai, Wenke Zhao, Shiliang Tu, "Towards Garbage Collection Mechanism
for RTSJ-Oriented Embedded Java Processor" 2010 10th IEEE International Conference on
Computer and Information Technology (CIT 2010), Location: Bradford Print ISBN:
978-1-4244-7547-6 On page(s): 1312.
[9] E. Ayeh, K. Agbedanu, Y. Morita, O. Adamo, and P. Guturu “FPGA Implementation of an
8-bit Simple Processor” 978-1-4244-2077-3/08 , IEEE Transactions 2008.
[10] Viral V Kapadia, “Trade-Off Between Traditional Garbage Collection Vs Hardware
Garbage Collection”, International Journal of Computer Engineering & Technology (IJCET),
Volume 5, Issue 7, 2014, pp. 55 - 61, ISSN Print: 0976 – 6367, ISSN Online: 0976 – 6375.
[11] Vinay Bk and Sunil MP, “FPGA Based Design & Implementation of Orthogonal Frequency
Division Multiplexing Transciever Module using VHDL”, International Journal of Advanced
Research in Engineering & Technology (IJARET), Volume 4, Issue 6, 2013, pp. 70 - 83,
ISSN Print: 0976-6480, ISSN Online: 0976-6499.
[12] Addanki Purna Ramesh, Dr. A.V.N.Tilak and Dr.A.M.Prasad, “FPGA Based Implementation
of Double Precision Floating Point Arithmetic Operations using Verilog”, International
Journal of Computer Engineering & Technology (IJCET), Volume 3, Issue 2, 2012,
pp. 92 - 107, ISSN Print: 0976 – 6367, ISSN Online: 0976 – 6375.

Weitere Àhnliche Inhalte

Ähnlich wie Comparison of co processor and traditional processor in terms of time cycle

Collaborative Memory Management for Reactive Sensor/Actor Systems
Collaborative Memory Management for Reactive Sensor/Actor SystemsCollaborative Memory Management for Reactive Sensor/Actor Systems
Collaborative Memory Management for Reactive Sensor/Actor SystemsSnehal Belsare Mokashi
 
A Survey on Heuristic Based Techniques in Cloud Computing
A Survey on Heuristic Based Techniques in Cloud ComputingA Survey on Heuristic Based Techniques in Cloud Computing
A Survey on Heuristic Based Techniques in Cloud ComputingIRJET Journal
 
Discovering Robustness Amongst CBIR Features
Discovering Robustness Amongst CBIR Features     Discovering Robustness Amongst CBIR Features
Discovering Robustness Amongst CBIR Features dannyijwest
 
A Review of Memory Allocation and Management in Computer Systems
A Review of Memory Allocation and Management in Computer SystemsA Review of Memory Allocation and Management in Computer Systems
A Review of Memory Allocation and Management in Computer SystemsCSEIJJournal
 
Computer Science & Engineering: An International Journal (CSEIJ)
Computer Science & Engineering: An International Journal (CSEIJ)Computer Science & Engineering: An International Journal (CSEIJ)
Computer Science & Engineering: An International Journal (CSEIJ)cseij
 
A REVIEW OF MEMORY ALLOCATION AND MANAGEMENT IN COMPUTER SYSTEMS
A REVIEW OF MEMORY ALLOCATION AND MANAGEMENT IN COMPUTER SYSTEMSA REVIEW OF MEMORY ALLOCATION AND MANAGEMENT IN COMPUTER SYSTEMS
A REVIEW OF MEMORY ALLOCATION AND MANAGEMENT IN COMPUTER SYSTEMScseij
 
VIEW OF MEMORY ALLOCATION AND MANAGEMENT IN COMPUTER SYSTEMS
VIEW OF MEMORY ALLOCATION AND MANAGEMENT IN COMPUTER SYSTEMSVIEW OF MEMORY ALLOCATION AND MANAGEMENT IN COMPUTER SYSTEMS
VIEW OF MEMORY ALLOCATION AND MANAGEMENT IN COMPUTER SYSTEMScseij
 
6416cseij01
6416cseij016416cseij01
6416cseij01cseij
 
26 7956 8212-1-rv software (edit)
26 7956 8212-1-rv software (edit)26 7956 8212-1-rv software (edit)
26 7956 8212-1-rv software (edit)IAESIJEECS
 
26 7956 8212-1-rv software (edit)
26 7956 8212-1-rv software (edit)26 7956 8212-1-rv software (edit)
26 7956 8212-1-rv software (edit)IAESIJEECS
 
Artificial intelligence could help data centers run far more efficiently
Artificial intelligence could help data centers run far more efficientlyArtificial intelligence could help data centers run far more efficiently
Artificial intelligence could help data centers run far more efficientlyvenkatvajradhar1
 
IRJET- Analysis of Micro Inversion to Improve Fault Tolerance in High Spe...
IRJET-  	  Analysis of Micro Inversion to Improve Fault Tolerance in High Spe...IRJET-  	  Analysis of Micro Inversion to Improve Fault Tolerance in High Spe...
IRJET- Analysis of Micro Inversion to Improve Fault Tolerance in High Spe...IRJET Journal
 
A CLOUD BASED ARCHITECTURE FOR WORKING ON BIG DATA WITH WORKFLOW MANAGEMENT
A CLOUD BASED ARCHITECTURE FOR WORKING ON BIG DATA WITH WORKFLOW MANAGEMENTA CLOUD BASED ARCHITECTURE FOR WORKING ON BIG DATA WITH WORKFLOW MANAGEMENT
A CLOUD BASED ARCHITECTURE FOR WORKING ON BIG DATA WITH WORKFLOW MANAGEMENTIJwest
 
Cost-Efficient Task Scheduling with Ant Colony Algorithm for Executing Large ...
Cost-Efficient Task Scheduling with Ant Colony Algorithm for Executing Large ...Cost-Efficient Task Scheduling with Ant Colony Algorithm for Executing Large ...
Cost-Efficient Task Scheduling with Ant Colony Algorithm for Executing Large ...Editor IJCATR
 
Entity resolution for hierarchical data using attributes value comparison ove...
Entity resolution for hierarchical data using attributes value comparison ove...Entity resolution for hierarchical data using attributes value comparison ove...
Entity resolution for hierarchical data using attributes value comparison ove...IAEME Publication
 

Ähnlich wie Comparison of co processor and traditional processor in terms of time cycle (20)

50120140507008
5012014050700850120140507008
50120140507008
 
50120140504001
5012014050400150120140504001
50120140504001
 
Collaborative Memory Management for Reactive Sensor/Actor Systems
Collaborative Memory Management for Reactive Sensor/Actor SystemsCollaborative Memory Management for Reactive Sensor/Actor Systems
Collaborative Memory Management for Reactive Sensor/Actor Systems
 
A Survey on Heuristic Based Techniques in Cloud Computing
A Survey on Heuristic Based Techniques in Cloud ComputingA Survey on Heuristic Based Techniques in Cloud Computing
A Survey on Heuristic Based Techniques in Cloud Computing
 
Discovering Robustness Amongst CBIR Features
Discovering Robustness Amongst CBIR Features     Discovering Robustness Amongst CBIR Features
Discovering Robustness Amongst CBIR Features
 
A Review of Memory Allocation and Management in Computer Systems
A Review of Memory Allocation and Management in Computer SystemsA Review of Memory Allocation and Management in Computer Systems
A Review of Memory Allocation and Management in Computer Systems
 
Computer Science & Engineering: An International Journal (CSEIJ)
Computer Science & Engineering: An International Journal (CSEIJ)Computer Science & Engineering: An International Journal (CSEIJ)
Computer Science & Engineering: An International Journal (CSEIJ)
 
A REVIEW OF MEMORY ALLOCATION AND MANAGEMENT IN COMPUTER SYSTEMS
A REVIEW OF MEMORY ALLOCATION AND MANAGEMENT IN COMPUTER SYSTEMSA REVIEW OF MEMORY ALLOCATION AND MANAGEMENT IN COMPUTER SYSTEMS
A REVIEW OF MEMORY ALLOCATION AND MANAGEMENT IN COMPUTER SYSTEMS
 
VIEW OF MEMORY ALLOCATION AND MANAGEMENT IN COMPUTER SYSTEMS
VIEW OF MEMORY ALLOCATION AND MANAGEMENT IN COMPUTER SYSTEMSVIEW OF MEMORY ALLOCATION AND MANAGEMENT IN COMPUTER SYSTEMS
VIEW OF MEMORY ALLOCATION AND MANAGEMENT IN COMPUTER SYSTEMS
 
6416cseij01
6416cseij016416cseij01
6416cseij01
 
20120140502016
2012014050201620120140502016
20120140502016
 
26 7956 8212-1-rv software (edit)
26 7956 8212-1-rv software (edit)26 7956 8212-1-rv software (edit)
26 7956 8212-1-rv software (edit)
 
26 7956 8212-1-rv software (edit)
26 7956 8212-1-rv software (edit)26 7956 8212-1-rv software (edit)
26 7956 8212-1-rv software (edit)
 
Module 4 memory management
Module 4 memory managementModule 4 memory management
Module 4 memory management
 
Artificial intelligence could help data centers run far more efficiently
Artificial intelligence could help data centers run far more efficientlyArtificial intelligence could help data centers run far more efficiently
Artificial intelligence could help data centers run far more efficiently
 
IRJET- Analysis of Micro Inversion to Improve Fault Tolerance in High Spe...
IRJET-  	  Analysis of Micro Inversion to Improve Fault Tolerance in High Spe...IRJET-  	  Analysis of Micro Inversion to Improve Fault Tolerance in High Spe...
IRJET- Analysis of Micro Inversion to Improve Fault Tolerance in High Spe...
 
A CLOUD BASED ARCHITECTURE FOR WORKING ON BIG DATA WITH WORKFLOW MANAGEMENT
A CLOUD BASED ARCHITECTURE FOR WORKING ON BIG DATA WITH WORKFLOW MANAGEMENTA CLOUD BASED ARCHITECTURE FOR WORKING ON BIG DATA WITH WORKFLOW MANAGEMENT
A CLOUD BASED ARCHITECTURE FOR WORKING ON BIG DATA WITH WORKFLOW MANAGEMENT
 
Cost-Efficient Task Scheduling with Ant Colony Algorithm for Executing Large ...
Cost-Efficient Task Scheduling with Ant Colony Algorithm for Executing Large ...Cost-Efficient Task Scheduling with Ant Colony Algorithm for Executing Large ...
Cost-Efficient Task Scheduling with Ant Colony Algorithm for Executing Large ...
 
Entity resolution for hierarchical data using attributes value comparison ove...
Entity resolution for hierarchical data using attributes value comparison ove...Entity resolution for hierarchical data using attributes value comparison ove...
Entity resolution for hierarchical data using attributes value comparison ove...
 
Ijetr012052
Ijetr012052Ijetr012052
Ijetr012052
 

Mehr von IAEME Publication

IAEME_Publication_Call_for_Paper_September_2022.pdf
IAEME_Publication_Call_for_Paper_September_2022.pdfIAEME_Publication_Call_for_Paper_September_2022.pdf
IAEME_Publication_Call_for_Paper_September_2022.pdfIAEME Publication
 
MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...
MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...
MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...IAEME Publication
 
A STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURS
A STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURSA STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURS
A STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURSIAEME Publication
 
BROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURS
BROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURSBROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURS
BROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURSIAEME Publication
 
DETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONS
DETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONSDETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONS
DETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONSIAEME Publication
 
ANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONS
ANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONSANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONS
ANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONSIAEME Publication
 
VOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINO
VOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINOVOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINO
VOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINOIAEME Publication
 
IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...
IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...
IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...IAEME Publication
 
VISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMY
VISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMYVISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMY
VISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMYIAEME Publication
 
A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...
A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...
A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...IAEME Publication
 
GANDHI ON NON-VIOLENT POLICE
GANDHI ON NON-VIOLENT POLICEGANDHI ON NON-VIOLENT POLICE
GANDHI ON NON-VIOLENT POLICEIAEME Publication
 
A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...
A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...
A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...IAEME Publication
 
ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...
ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...
ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...IAEME Publication
 
INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...
INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...
INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...IAEME Publication
 
A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...
A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...
A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...IAEME Publication
 
EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...
EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...
EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...IAEME Publication
 
ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...
ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...
ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...IAEME Publication
 
OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...
OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...
OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...IAEME Publication
 
APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...
APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...
APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...IAEME Publication
 
A MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENT
A MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENTA MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENT
A MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENTIAEME Publication
 

Mehr von IAEME Publication (20)

IAEME_Publication_Call_for_Paper_September_2022.pdf
IAEME_Publication_Call_for_Paper_September_2022.pdfIAEME_Publication_Call_for_Paper_September_2022.pdf
IAEME_Publication_Call_for_Paper_September_2022.pdf
 
MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...
MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...
MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...
 
A STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURS
A STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURSA STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURS
A STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURS
 
BROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURS
BROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURSBROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURS
BROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURS
 
DETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONS
DETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONSDETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONS
DETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONS
 
ANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONS
ANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONSANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONS
ANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONS
 
VOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINO
VOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINOVOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINO
VOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINO
 
IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...
IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...
IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...
 
VISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMY
VISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMYVISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMY
VISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMY
 
A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...
A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...
A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...
 
GANDHI ON NON-VIOLENT POLICE
GANDHI ON NON-VIOLENT POLICEGANDHI ON NON-VIOLENT POLICE
GANDHI ON NON-VIOLENT POLICE
 
A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...
A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...
A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...
 
ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...
ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...
ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...
 
INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...
INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...
INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...
 
A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...
A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...
A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...
 
EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...
EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...
EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...
 
ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...
ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...
ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...
 
OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...
OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...
OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...
 
APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...
APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...
APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...
 
A MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENT
A MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENTA MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENT
A MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENT
 

KĂŒrzlich hochgeladen

GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxOnBoard
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Google AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAGGoogle AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAGSujit Pal
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel AraĂșjo
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Alan Dix
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Paola De la Torre
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 

KĂŒrzlich hochgeladen (20)

GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptx
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Google AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAGGoogle AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAG
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 

Comparison of co processor and traditional processor in terms of time cycle

  • 1. International Journal of Advanced Research in Engineering and Technology (IJARET), ISSN 0976 – 6480(Print), ISSN 0976 – 6499(Online) Volume 5, Issue 7, July (2014), pp. 63-70 © IAEME 63 COMPARISON OF CO-PROCESSOR AND TRADITIONAL PROCESSOR IN TERMS OF TIME CYCLE Viral V Kapadia1 , Dr. V K Thakar2 1 Computer Science & Engg Dept, The M S University of Baroda 2 Head & Professor, A D Patel Institute of Technology ABSTRACT The major issue in today’s world of computing is improvement in performance of memory. The major issue at processor level is to identify the data block or data that is required for processing either address or data, which is stored in memory. The data needs to be fetched from memory (RAM) to register and vice versa. Here the traditional processor waste a big amount of cycles for memory management and hence if a better co-processor is available than we can increase the performance of processor by increasing time cycles. Keywords: VHDL, Verlilog, Garbage Collection, Processor, Clock Cycle, Delay, Xilinx I. INTRODUCTION Memory management is one of the most vital researched areas in computer engineering since their goals are to understand and improve the usage of the two most crucial resources in virtually every computer system memory and processor. In both research areas, work has been done in many directions including theory, hardware, algorithms, and implementation and so on. A typical methodology is to investigate issues in only one area, assuming the system’s behaviour in the other area has no influence at all, or at most, very little influence on the issues under investigation. Although such a methodology is very successful in terms of reducing research scope and simplifying the targeted issues, it is not sufficient to reflect the system level nature of processor and memory usage, which is that they interact and even conflict with each other. Therefore, the two dimensions of time and space must be considered together in many cases so that the result will be a well designed system that has acceptable performance in both dimensions, rather than being extremely good in one dimension but unacceptable in the other one. This is the famous time-space tradeoff [1]. INTERNATIONAL JOURNAL OF ADVANCED RESEARCH IN ENGINEERING AND TECHNOLOGY (IJARET) ISSN 0976 - 6480 (Print) ISSN 0976 - 6499 (Online) Volume 5, Issue 7, July (2014), pp. 63-70 © IAEME: http://www.iaeme.com/IJARET.asp Journal Impact Factor (2014): 7.8273 (Calculated by GISI) www.jifactor.com IJARET © I A E M E
  • 2. International Journal of Advanced Research in Engineering and Technology (IJARET), ISSN 0976 – 6480(Print), ISSN 0976 – 6499(Online) Volume 5, Issue 7, July (2014), pp. 63-70 © IAEME 64 Memory management on which researchers are mainly focusing are the different techniques related to memory management i.e. garbage collection techniques, scheduling, real time system, user oriented design and many more. The major problem found out in memory management is processor and operating system delays. We don’t have good performance in Real time system since we are using the software approach which ultimately depends on operating system. So virtually we try to say we are having real-time memory management but physically not performing the intended task more convincingly. Here we are trying to design a hardware design that can perform all memory management tasks with additional power of VLIW instruction word and parallel processing. Real-time requirements are far and wide in modern applications, from multimedia players to communication controls, aviation systems, safety critical control systems, etc. Garbage collection is widely acknowledged to speed up software development while increasing security and reliability. However, garbage collectors that support real-time applications are notoriously hard to build. Traditional garbage collectors stop the application to perform the entire collection or even just to initiate or finish up the collection. Stopping all threads creates a computation pause which is unacceptable for real-time systems [1]. Such atomic operations create ordering constraints that do not leave much room for reordering of memory accesses. Thus, a more sophisticated compaction mechanism must be used. As part of our real-time system, we want to provide a novel concurrent collector, which provides a solution to the above challenge. Real-time requirements are far and wide in modern applications, from multimedia players to communication controls, aviation systems, safety critical control systems, etc. Garbage collection is widely acknowledged to speed up software development while increasing security and reliability. However, garbage collectors that support real-time applications are notoriously hard to build. Traditional garbage collectors stop the application to perform the entire collection or even just to initiate or finish up the collection. Stopping all threads creates a computation pause which is unacceptable for real-time systems [1]. Classical real-time systems typically operate with a certain amount of slack. If there is no slack, then the system can’t guarantee to meet its bounds. But interactive systems may become sluggish during bursts of other activity on the machine, and in some cases this is the desired behaviour. Queued systems may absorb temporary load spikes and tolerate a certain fraction of outliers depending on a service-level agreement [1]. Such, atomic operations create ordering constraints that do not leave much room for reordering of memory accesses. Thus, a more sophisticated compaction mechanism must be used. As part of our real-time system, we want to provide a novel concurrent collector, which provides a solution to the above challenge. To measure responsiveness of our collector, we propose a mutator responsiveness measure, attempting to check how responsive the system is for events that get generated at a high frequency. Currently there is no Distributed Object Store that Implement an Algorithm of Distributed Garbage Collectors that can do processor management and provide adaptive garbage collection. We have to use different garbage collection techniques for different environment. There is partly memory allocation and deallocation Implementation of the System function which doing memory allocation and deallocation that can be optimize in our implementation of algorithm. II. GARBAGE COLLECTION One of the potential disadvantages of garbage collection compared to the explicit freeing of objects is that garbage collection gives programmers less control over the scheduling of CPU time devoted to reclaiming memory. It is in general impossible to predict exactly when (or even if) a garbage collector will be invoked and how long it will take to run. Because garbage collectors
  • 3. International Journal of Advanced Research in Engineering and Technology (IJARET), ISSN 0976 – 6480(Print), ISSN 0976 – 6499(Online) Volume 5, Issue 7, July (2014), pp. 63-70 © IAEME 65 usually stop the entire program while seeking and collecting garbage objects, they can cause arbitrarily long pauses at arbitrary times during the execution of the program. Such garbage collection pauses can sometimes be long enough to be noticed by users. Garbage collection pauses can also prevent programs from responding to events quickly enough to satisfy the requirements of real-time systems. If a garbage collection algorithm is capable of generating pauses lengthy- enough to be either noticeable to the user or make the program unsuitable for real-time environments, the algorithm is said to be disruptive. To minimize the potential disadvantages of garbage collection compared to the explicit freeing of objects, a common design goal for garbage collection algorithms is to minimize or, if possible, eliminate their disruptive nature [1]. The process of distributed garbage collection can be categorized by two approaches: A. Software approach The software approach for garbage collection is very famous and it is implemented in many of the application software such as JAVA, .Net etc. the main disadvantage of this system is works under the control of operating system and for each and every instruction operating system calls the main processor through any interrupts. As whenever there is a requirement of memory in application, it runs the garbage collection process and in that process also the main processor is interrupted. The main processor is wasting its time in garbage collection where as other process are waiting for processor. The software approach is easy to implement compare to hardware approach. At the same time is also slower compare to hardware approach. We will discuss the software approach in detail. A widely accepted method to control software complexity and to increase software quality is automatic dynamic memory management, also referred to as garbage collection. Unfortunately, it is difficult to implement garbage collection for real-time systems. Because of high overhead and unpredictable pauses, most embedded system designers still consider garbage collection an unaffordable luxury. Consequently, they have to resort to manual memory management with the well-known problems: Freeing memory too early causes “dangling references”, while freeing memory too late or not at all gives rise to memory leaks. But worst of all, manual memory reclamation requires the programmer’s global view of a software system and contradicts modularization [5]. A widely accepted method to control software complexity and to increase software quality is automatic dynamic memory management, also referred to as garbage collection. Unfortunately, it is difficult to implement garbage collection for real-time systems. Because of high overhead and unpredictable pauses, most embedded system designers still consider garbage collection an unaffordable luxury. Consequently, they have to resort to manual memory management with the well-known problems: Freeing memory too early causes “dangling references”, while freeing memory too late or not at all gives rise to memory leaks. But worst of all, manual memory reclamation requires the programmer’s global view of a software system and contradicts modularization [5]. Real-time applications require a small upper bound on any pause the garbage collector might cause. Garbage collection in software, however, faces an inevitable trade-off between the granularity of garbage collection (i.e. the maximum pause length) and the code-size and runtime overhead caused by synchronization. To prevent this overhead from becoming unjustifiably high, software collectors have to rely on indivisible operations such as processing an entire object or the complete root set [4]. Since the duration of these operations is potentially unlimited, these software collectors are not suited for hard real-time environments [5].
  • 4. International Journal of Advanced Research in Engineering and Technology (IJARET), ISSN 0976 – 6480(Print), ISSN 0976 – 6499(Online) Volume 5, Issue 7, July (2014), pp. 63-70 © IAEME 66 B. Hardware approach Following Programming Tools are available for hardware designing. 1) VHDL : VHDL (VHSIC hardware description language; VHSIC: very-high-speed integrated circuit) is a hardware description language used in electronic design automation to describe digital and mixed-signal systems such as field-programmable gate arrays and integrated circuits. VHDL is a fairly general-purpose language, and it doesn't require a simulator on which to run the code. There are many VHDL compilers, which build executable binaries. It can read and write files on the host computer, so a VHDL program can be written that generates another VHDL program to be incorporated in the design being developed. Because of this general- purpose nature, it is possible to use VHDL to write a test bench that verifies the functionality of the design using files on the host computer to define stimuli, interacts with the user, and compares results with those expected. It is relatively easy for an inexperienced developer to produce code that simulates successfully but that cannot be synthesized into a real device, or is too large to be practical. One particular pitfall is the accidental production of transparent latches rather than D-type flip- flops as storage elements. The key advantage of VHDL when used for systems design is that it allows the behaviour of the required system to be described (modeled) and verified (simulated) before synthesis tools translate the design into real hardware (gates and wires). Another benefit is that VHDL allows the description of a concurrent system (many parts, each with its own sub-behaviour, working together at the same time). VHDL is a Dataflow language, unlike procedural computing languages such as BASIC, C, and assembly code, which all run sequentially, one instruction at a time. A final point is that when a VHDL model is translated into the "gates and wires" that are mapped onto a programmable logic device such as a CPLD or FPGA, then it is the actual hardware being configured, rather than the VHDL code being "executed" as if on some form of a processor chip. Figure 1: Coprocessor Architecture
  • 5. International Journal of Advanced Research in Engineering and Technology (IJARET), ISSN 0976 – 6480(Print), ISSN 0976 – 6499(Online) Volume 5, Issue 7, July (2014), pp. 63-70 © IAEME 67 III. IMPLEMENTATION In digital systems encompasses a range of systems from low-level components to complete system-on-a-chip and board-level designs. If we are to encompass this range of views of digital systems, we must recognize the complexity with which we are dealing. The most important way of meeting this challenge is to adopt a systematic methodology of design. If we start with a requirements document for the system, we can design an abstract structure that meets the requirements. We can then decompose this structure into a collection of components that interact to perform the same function. Each of these components can in turn be decomposed until we get to a level where we have some ready-made, primitive components that perform a required function. The advantage of this methodology is that each subsystem can be designed independently of others. We use the term model to mean our understanding of a system. The model represents that information which is relevant and abstracts away from irrelevant detail. The implication of this is that there may be several models of the same system, since different information is relevant in different contexts. In our design we have define the CMS.vhd for advance code morphing software and ALU.vhd that performs the task of arithmetic and logical unit and various required data manipulation functionalities. Figure 2: DSM using shared variables Distributed shared memory management modelling scenario presents distributed shared memory management techniques and their performance impact for multicore environments. By removing imbalance between processor and memory performance it becomes more important to optimize the shared memory management features to obtain the maximum possible performance out of the memory subsystem. It has consideration that no of processors that communicating through shared variables. Here, figure 2 below shows the view of shared variable used concurrently by three processors P_1, P_2 and P_3 to manipulate the data in the system. The system can have more no of processor and large shared memory size depends on the requirements. System Architecture In distributed shared memory systems processes share data transparently across node boundaries; data faulting, location, and movement is handled by the underlying system. While the performance implications cannot be ignored, the advantages of the shared memory programming model are well known: Programming with shared memory is a well-understood problem.
  • 6. International Journal of Advanced Research in Engineering and Technology (IJARET), ISSN 0976 – 6480(Print), ISSN 0976 – 6499(Online) Volume 5, Issue 7, July (2014), pp. 63-70 © IAEME 68 Shared memory programs are usually shorter and easier to understand than equivalent message passing programs. Consumes less design time compared to others Large or complex data structures may easily be communicated. Shared memory gives transparent process-to-process communication. Cheaper to implement system model using shared memory IV. RESULTS Figure 3: Simulation window consisting of Input and Output The objective over here is to prove the difference of efficiency of memory management at the processor level and traditional approach. Here we have taken an 8 bit processor to prove the same. Figure 3 is the snapshot of processor that we have simulated in Xilinx ISE 9.2. It won’t make a difference for the higher level of processors also as we are providing the comparison between an 8 bit traditional processor and 8 bit memory processor. The same is to implied for the higher level of processors also. The first row in figure 3 indicates the CLK (clock) for the processor. Processing is done after the delay of 3micro seconds to let the signal stabilize. D0 to D4 stands for the data / address lines. S0, S1 and S2 are control signals. Hence we have 8 instructions set. I0, I1, I2,I3, I4 and Y are output signals used for checking various operations performed by the processor as shown in the figure 3. Table 1: Comparative time cycles Experiment No Memory status (Occupied) Memory Block to be allocated Search Traditional Manner (Cumulative) Search with Coprocessor % Time cycles Improved Remarks 1 25 % 1 5 1 16 Random Memory Allocation 2 50% 1 20 1 32 3 75% 1 50 1 48 4 100% 1 64 1 64
  • 7. International Journal of Advanced Research in Engineering and Technology (IJARET), ISSN 0976 – 6480(Print), ISSN 0976 – 6499(Online) Volume 5, Issue 7, July (2014), pp. 63-70 © IAEME 69 Figure 2: Comparative time cycles V. CONCLUSION The Best Way to provide trade of between Garbage collection and processor utilization is to have another software coded processor dedicated for Garbage collection which works independently of main processor. Since technological and economical reasons have put a stop to the increase of clock frequency, performance improvements now come in the form of additional parallelism Figure 5: Input Wave supplied for simulation Figure 6: Comparative cycles 0 10 20 30 40 50 60 70 25 50 75 100 Traditional Coprocessor
  • 8. International Journal of Advanced Research in Engineering and Technology (IJARET), ISSN 0976 – 6480(Print), ISSN 0976 – 6499(Online) Volume 5, Issue 7, July (2014), pp. 63-70 © IAEME 70 In the simulator the check the exact behaviour of the processor the input needs to be in the form of wave form and hence we get a wave form as an output we can map the in the input signal at a particular clock cycle and at the same time we can also observe the output wave form on the same clock cycle that provides us the information of processing of the processor. Output wave form is missing in figure 6 as it would be generated after the processing REFERENCES [1] Yang Chang, PhD Thesis on, “Garbage Collection for Flexible Hard Real-Time Systems" University of York, July 2007 [2] Steffen Grarup and Jacob Seligmann: Incremental Mature Garbage Collection, M.Sc. thesis August 1993. Also published as Technical Report DAIMI IR-122, Computer Science Department, Aarhus University, Denmark; September 1994; ftp.daimi.au.dk as pub/thesis/gcthesis.ps.{Z,gz}. [3] Thesis of Pointer Tracking algorithm for DMOS By: Sudarshan N. Patel [4] Jones, R., Lins, R.: Garbage Collection: Algorithms for Automatic Dynamic Memory Management, Wiley, 1996. [5] Matthias Meyer, "An On-Chip Garbage Collection Coprocessor for Embedded Real-Time Systems" Proceedings of the 11th IEEE International Conference on Embedded and Real- Time Computing Systems and Applications (RTCSA’05), IEEE Computer Society, 2000. [6] Witawas Srisa-an, Chia-Tien Dan Lo & Ji-en Morris Chang, "Active Memory Processor: A Hardware Garbage Collector for Real-Time Java Embedded Devices" at in IEEE TRANSACTIONS ON MOBILE COMPUTING , April-June 2003 Page No. 95 [7] Guang Hu, Zhilei Chai, Shiliang Tu "Memory Access Mechanism in Embedded Real-Time Java Processor", International Conference on Computer and Automation Engineering Volume: 5 Location: Singapore Print ISBN: 978-1-4244-5585-0, Issue Date : 26-28 Feb. 2010, pp.786. [8] Guang Hu, Zhilei Chai, Wenke Zhao, Shiliang Tu, "Towards Garbage Collection Mechanism for RTSJ-Oriented Embedded Java Processor" 2010 10th IEEE International Conference on Computer and Information Technology (CIT 2010), Location: Bradford Print ISBN: 978-1-4244-7547-6 On page(s): 1312. [9] E. Ayeh, K. Agbedanu, Y. Morita, O. Adamo, and P. Guturu “FPGA Implementation of an 8-bit Simple Processor” 978-1-4244-2077-3/08 , IEEE Transactions 2008. [10] Viral V Kapadia, “Trade-Off Between Traditional Garbage Collection Vs Hardware Garbage Collection”, International Journal of Computer Engineering & Technology (IJCET), Volume 5, Issue 7, 2014, pp. 55 - 61, ISSN Print: 0976 – 6367, ISSN Online: 0976 – 6375. [11] Vinay Bk and Sunil MP, “FPGA Based Design & Implementation of Orthogonal Frequency Division Multiplexing Transciever Module using VHDL”, International Journal of Advanced Research in Engineering & Technology (IJARET), Volume 4, Issue 6, 2013, pp. 70 - 83, ISSN Print: 0976-6480, ISSN Online: 0976-6499. [12] Addanki Purna Ramesh, Dr. A.V.N.Tilak and Dr.A.M.Prasad, “FPGA Based Implementation of Double Precision Floating Point Arithmetic Operations using Verilog”, International Journal of Computer Engineering & Technology (IJCET), Volume 3, Issue 2, 2012, pp. 92 - 107, ISSN Print: 0976 – 6367, ISSN Online: 0976 – 6375.