SREENATH M | Visvesvaraya Technological University (original) (raw)

Papers by SREENATH M

Research paper thumbnail of A REVIEW ON PERFORMANCE EVALUATION OF MULTIPROCESSOR BASED SYSTEM USING SCHEDULING ALGORITHMS AND SIMULATION TOOLS

The scheduling algorithm determines the process of execution by allocating the tasks to the avail... more The scheduling algorithm determines the process of execution by allocating the tasks to the available processors in a system. In an embedded system, real time control is essential for different applications like aircraft, manufacturing, information processing systems, etc. Multiprocessor based systems play a vital role to satisfy the real time performance constraints. In this aspect, different issues came to light when using scheduling algorithms for proper resource allocation and utilization. Many of the research scholars face difficulty in choosing the suitable platform for developing the new scheduling algorithms. For this concern, we acknowledge the performance parameters reviewed in the evaluation of multiprocessor based system using scheduling algorithms and simulation tools. Traditional real time scheduling algorithms are implemented using standard structure on suitable simulation tools for improved performance in terms of makespan, latency, flow time, utilization, success ratio, throughput and energy consumption. The main objective of this review is to find the optimum solution for multi-processor based system using scheduling algorithms in supported simulation tools.

Research paper thumbnail of Characterization of Ag/Ti Schottky contact on ZnO thin film under UV exposure

ZnO thin film is fabricated by using thermal vacuum coating unit and exposed to the UV light wher... more ZnO thin film is fabricated by using thermal vacuum coating unit and exposed to the UV light where the target is the glass substrate. ZnO thin film is fabricated and Ti (100 nm)/Ag (100 nm) are deposited by the vacuum evaporation technique and shadow mask. The deposited contacts undergo annealing treatment to improve the crystal properties of the substrate. The substrate is exposed then to the UV light to analyse the thin film current and voltage performance characteristics of the deposited contacts by using a I-V parameter analyzer (Keysight B2902A). Several parameters like barrier height, saturation current, ideality factor and specific contact resistance are also estimated using a special method using the Schottky barrier height (SBH) method instead of another mechanism like transmission line method (TLM).

Research paper thumbnail of Preemptive scheduling algorithm based object tracking system by using ARM processor

RTOS is an operating system that supports real-time applications and embedded systems by providin... more RTOS is an operating system that supports real-time applications and embedded systems by providing logically correct result within the deadline. In this, dealing with the effect of gain time on soft task scheduling in RTOS based application. In Multitasking gain time is a key factor which explicit the difference between the actual time and maximum time for completion of a process. In some real time applications, delay in a particular process may lead to severe effects. In this, delay in a task execution is avoided by using an effective preemptive scheduling and giving importance to high priority interrupts even though if there is any pending low priority interrupts on semaphore.

Research paper thumbnail of Amalgamate Scheduling Of Real-Time Tasks And Effective Utilization On Multiprocessors With Work-Stealing

The load balancing between resources in order to get effective utilization when many jobs are run... more The load balancing between resources in order to get effective utilization when many jobs are running with varying characteristics. The system speed is reduced when the work load is not properly balanced and idle processors are not involve for tasks execution, due to single processor may execute limit number of tasks. Thus the tasks steal from master processor to idle processors. Here work stealing is efficient approach to the distributed dynamic load balancing for the load among different processors. But Our proposal is priority based deque in place of the non-priority deque of work -stealing. Work stealing will increase the speedup of Parallel applications without affecting the schedulability of the other jobs scheduled by EDF-HSB.

Research paper thumbnail of Performance Evaluation of Embedded System Using Scheduling Algorithms

The main aim is to share or allocate the processor time to all the tasks using scheduling algorit... more The main aim is to share or allocate the processor time to all the tasks using scheduling algorithm in a system. The List and McNaughton's scheduling algorithms, minimize the maximum completion time of all tasks (Cmax). An ordered list of processes will be made and assign priorities to them by using List scheduling algorithm. McNaughton's scheduling algorithm only for independent tasks has to be scheduled on identical processors for the sake of schedule length minimization. Hu's algorithm is planned to schedule the tasks with in-tree precedence constraints, consider unit length tasks. In Hu's algorithm all processors should be of same type. These scheduling algorithms mainly for enhance the performance levels of the system by reducing the time delay. Thus, preferably use these algorithms in the areas of manufacturing & production, Transportation & distribution and Informationprocessing. List, and McNaughton's scheduling algorithms are used to reduce the difficulty in allocating the tasks to the processors. TORSCHE scheduling toolbox for MATLAB is used to schedule the tasks on processors. User can solve, scheduling problems with the help of MATLAB routines and functions by considering appropriate configurations like resources, task parameters and optimization criterion.

Research paper thumbnail of National Conference On Emerging Trends in Information, Digital & Embedded Systems (NC'e-TIDES -15) Organized by MSP 430 Based Wireless Power Theft Monitoring System by Using Energy Meter

In normal way power theft is by shorting the input and the output terminals or by placing a magne... more In normal way power theft is by shorting the input and the output terminals or by placing a magnet on the wheel in case of old meters. So by sensing current flow through the energy and line feedback, another common form is by inverting the meter and bypassing the meter. These can be prevented by using a circuit breaker. In this system, a micro controller is interfaced with an energy metering circuit, GSM communication, current sensing circuit & a contactor to make or break power line, with all energy meters. In normal condition, micro controller reads energy pulses and current signals. If current is drawing and energy pulses are normal, then no power theft is being done and the output is connected. If current is drawing and energy pulses are not coming, then it indicates that power theft. So microcontroller trips the output using relay driver. This information is sent to substation using wireless GSM communication in the form of alerting SMS messages. In the substation, it receives the information in the form of SMS messages we can know that power theft occurred.

Research paper thumbnail of Aevm

Research paper thumbnail of A REVIEW ON PERFORMANCE EVALUATION OF MULTIPROCESSOR BASED SYSTEM USING SCHEDULING ALGORITHMS AND SIMULATION TOOLS

The scheduling algorithm determines the process of execution by allocating the tasks to the avail... more The scheduling algorithm determines the process of execution by allocating the tasks to the available processors in a system. In an embedded system, real time control is essential for different applications like aircraft, manufacturing, information processing systems, etc. Multiprocessor based systems play a vital role to satisfy the real time performance constraints. In this aspect, different issues came to light when using scheduling algorithms for proper resource allocation and utilization. Many of the research scholars face difficulty in choosing the suitable platform for developing the new scheduling algorithms. For this concern, we acknowledge the performance parameters reviewed in the evaluation of multiprocessor based system using scheduling algorithms and simulation tools. Traditional real time scheduling algorithms are implemented using standard structure on suitable simulation tools for improved performance in terms of makespan, latency, flow time, utilization, success ratio, throughput and energy consumption. The main objective of this review is to find the optimum solution for multi-processor based system using scheduling algorithms in supported simulation tools.

Research paper thumbnail of Characterization of Ag/Ti Schottky contact on ZnO thin film under UV exposure

ZnO thin film is fabricated by using thermal vacuum coating unit and exposed to the UV light wher... more ZnO thin film is fabricated by using thermal vacuum coating unit and exposed to the UV light where the target is the glass substrate. ZnO thin film is fabricated and Ti (100 nm)/Ag (100 nm) are deposited by the vacuum evaporation technique and shadow mask. The deposited contacts undergo annealing treatment to improve the crystal properties of the substrate. The substrate is exposed then to the UV light to analyse the thin film current and voltage performance characteristics of the deposited contacts by using a I-V parameter analyzer (Keysight B2902A). Several parameters like barrier height, saturation current, ideality factor and specific contact resistance are also estimated using a special method using the Schottky barrier height (SBH) method instead of another mechanism like transmission line method (TLM).

Research paper thumbnail of Preemptive scheduling algorithm based object tracking system by using ARM processor

RTOS is an operating system that supports real-time applications and embedded systems by providin... more RTOS is an operating system that supports real-time applications and embedded systems by providing logically correct result within the deadline. In this, dealing with the effect of gain time on soft task scheduling in RTOS based application. In Multitasking gain time is a key factor which explicit the difference between the actual time and maximum time for completion of a process. In some real time applications, delay in a particular process may lead to severe effects. In this, delay in a task execution is avoided by using an effective preemptive scheduling and giving importance to high priority interrupts even though if there is any pending low priority interrupts on semaphore.

Research paper thumbnail of Amalgamate Scheduling Of Real-Time Tasks And Effective Utilization On Multiprocessors With Work-Stealing

The load balancing between resources in order to get effective utilization when many jobs are run... more The load balancing between resources in order to get effective utilization when many jobs are running with varying characteristics. The system speed is reduced when the work load is not properly balanced and idle processors are not involve for tasks execution, due to single processor may execute limit number of tasks. Thus the tasks steal from master processor to idle processors. Here work stealing is efficient approach to the distributed dynamic load balancing for the load among different processors. But Our proposal is priority based deque in place of the non-priority deque of work -stealing. Work stealing will increase the speedup of Parallel applications without affecting the schedulability of the other jobs scheduled by EDF-HSB.

Research paper thumbnail of Performance Evaluation of Embedded System Using Scheduling Algorithms

The main aim is to share or allocate the processor time to all the tasks using scheduling algorit... more The main aim is to share or allocate the processor time to all the tasks using scheduling algorithm in a system. The List and McNaughton's scheduling algorithms, minimize the maximum completion time of all tasks (Cmax). An ordered list of processes will be made and assign priorities to them by using List scheduling algorithm. McNaughton's scheduling algorithm only for independent tasks has to be scheduled on identical processors for the sake of schedule length minimization. Hu's algorithm is planned to schedule the tasks with in-tree precedence constraints, consider unit length tasks. In Hu's algorithm all processors should be of same type. These scheduling algorithms mainly for enhance the performance levels of the system by reducing the time delay. Thus, preferably use these algorithms in the areas of manufacturing & production, Transportation & distribution and Informationprocessing. List, and McNaughton's scheduling algorithms are used to reduce the difficulty in allocating the tasks to the processors. TORSCHE scheduling toolbox for MATLAB is used to schedule the tasks on processors. User can solve, scheduling problems with the help of MATLAB routines and functions by considering appropriate configurations like resources, task parameters and optimization criterion.

Research paper thumbnail of National Conference On Emerging Trends in Information, Digital & Embedded Systems (NC'e-TIDES -15) Organized by MSP 430 Based Wireless Power Theft Monitoring System by Using Energy Meter

In normal way power theft is by shorting the input and the output terminals or by placing a magne... more In normal way power theft is by shorting the input and the output terminals or by placing a magnet on the wheel in case of old meters. So by sensing current flow through the energy and line feedback, another common form is by inverting the meter and bypassing the meter. These can be prevented by using a circuit breaker. In this system, a micro controller is interfaced with an energy metering circuit, GSM communication, current sensing circuit & a contactor to make or break power line, with all energy meters. In normal condition, micro controller reads energy pulses and current signals. If current is drawing and energy pulses are normal, then no power theft is being done and the output is connected. If current is drawing and energy pulses are not coming, then it indicates that power theft. So microcontroller trips the output using relay driver. This information is sent to substation using wireless GSM communication in the form of alerting SMS messages. In the substation, it receives the information in the form of SMS messages we can know that power theft occurred.

Research paper thumbnail of Aevm