embedded processors
Recently Published Documents


TOTAL DOCUMENTS

554
(FIVE YEARS 41)

H-INDEX

26
(FIVE YEARS 2)

2022 ◽  
Vol 12 (1) ◽  
pp. 4
Author(s):  
Erez Manor ◽  
Avrech Ben-David ◽  
Shlomo Greenberg

The use of RISC-based embedded processors aimed at low cost and low power is becoming an increasingly popular ecosystem for both hardware and software development. High-performance yet low-power embedded processors may be attained via the use of hardware acceleration and Instruction Set Architecture (ISA) extension. Recent publications of AI have demonstrated the use of Coordinate Rotation Digital Computer (CORDIC) as a dedicated low-power solution for solving nonlinear equations applied to Neural Networks (NN). This paper proposes ISA extension to support floating-point CORDIC, providing efficient hardware acceleration for mathematical functions. A new DMA-based ISA extension approach integrated with a pipeline CORDIC accelerator is proposed. The CORDIC ISA extension is directly interfaced with a standard processor data path, allowing efficient implementation of new trigonometric ALU-based custom instructions. The proposed DMA-based CORDIC accelerator can also be used to perform repeated array calculations, offering a significant speedup over software implementations. The proposed accelerator is evaluated on Intel Cyclone-IV FPGA as an extension to Nios processor. Experimental results show a significant speedup of over three orders of magnitude compared with software implementation, while applied to trigonometric arrays, and outperforms the existing commercial CORDIC hardware accelerator.


2021 ◽  
Vol 11 (1) ◽  
Author(s):  
Jun-Young Park ◽  
Yonggu Lee ◽  
Ran Heo ◽  
Hyun-Kyung Park ◽  
Seok-Hyun Cho ◽  
...  

AbstractRecently, noncontact vital sign monitors have attracted attention because of issues related to the transmission of contagious diseases. We developed a real-time vital sign monitor using impulse-radio ultrawideband (IR-UWB) radar with embedded processors and software; we then evaluated its accuracy in measuring heart rate (HR) and respiratory rate (RR) and investigated the factors affecting the accuracy of the radar-based measurements. In 50 patients visiting a cardiology clinic, HR and RR were measured using IR-UWB radar simultaneously with electrocardiography and capnometry. All patients underwent HR and RR measurements in 2 postures—supine and sitting—for 2 min each. There was a high agreement between the RR measured using radar and capnometry (concordance correlation coefficient [CCC] 0.925 [0.919–0.926]; upper and lower limits of agreement [LOA], − 2.21 and 3.90 breaths/min). The HR measured using radar was also in close agreement with the value measured using electrocardiography (CCC 0.749 [0.738–0.760]; upper and lower LOA, − 12.78 and 15.04 beats/min). Linear mixed effect models showed that the sitting position and an HR < 70 bpm were associated with an increase in the absolute biases of the HR, whereas the sitting position and an RR < 18 breaths/min were associated with an increase in the absolute biases of the RR. The IR-UWB radar sensor with embedded processors and software can measure the RR and HR in real time with high precision. The sitting position and a low RR or HR were associated with the accuracy of RR and HR measurement, respectively, using IR-UWB radar.


2021 ◽  
Author(s):  
Mohammad Hasan Ahmadilivani ◽  
Mohammad Moeini Jahromi ◽  
Mostafa E. Salehi ◽  
Mona Kargar

<p>The reliability of embedded processors is one of the major concerns in safety-critical applications. Reliability is particularly expressed within the cache memories which are the largest part of new system on chips. Cache memories are the most vulnerable parts of the embedded systems and can affect the reliability drastically especially in deep transistor scaling. Therefore, evaluating the cache vulnerability is crucial in the design of a reliable system especially for safety-critical applications. It has been shown that using the same cache sizes for different programs leads to incompatible vulnerability patterns in them. According to the literature, most of the related researches, have exploited identical cache sizes for different programs in their reliability evaluations, while the cache reliability strictly depends on the cache size and program behavior. Traditional attempts for finding an appropriate cache size for different programs would need a huge design space exploration. In this work, we have introduced a criterion for determining the Effective Cache Size (ECS) for embedded processors which considers the inherent programs’ reliability and performance properties. According to the results, using the ECS for the representative benchmark applications, the reliability would be increased 43x on average with acceptable performance degradations (21% on average).</p>


2021 ◽  
Author(s):  
Mohammad Hasan Ahmadilivani ◽  
Mohammad Moeini Jahromi ◽  
Mostafa E. Salehi ◽  
Mona Kargar

<p>The reliability of embedded processors is one of the major concerns in safety-critical applications. Reliability is particularly expressed within the cache memories which are the largest part of new system on chips. Cache memories are the most vulnerable parts of the embedded systems and can affect the reliability drastically especially in deep transistor scaling. Therefore, evaluating the cache vulnerability is crucial in the design of a reliable system especially for safety-critical applications. It has been shown that using the same cache sizes for different programs leads to incompatible vulnerability patterns in them. According to the literature, most of the related researches, have exploited identical cache sizes for different programs in their reliability evaluations, while the cache reliability strictly depends on the cache size and program behavior. Traditional attempts for finding an appropriate cache size for different programs would need a huge design space exploration. In this work, we have introduced a criterion for determining the Effective Cache Size (ECS) for embedded processors which considers the inherent programs’ reliability and performance properties. According to the results, using the ECS for the representative benchmark applications, the reliability would be increased 43x on average with acceptable performance degradations (21% on average).</p>


2021 ◽  
Author(s):  
Mohammad Hasan Ahmadilivani ◽  
Mohammad Moeini Jahromi ◽  
Mostafa E. Salehi ◽  
Mona Kargar

Reliability of embedded processors is one of the major concerns in safety-critical applications. Reliability is particularly expressed within the cache memories which are the largest part of new system on chips. Cache memories are the most vulnerable parts of the embedded systems and can affect the reliability drastically especially in deep transistor scaling. Therefore, evaluating the cache vulnerability is crucial in design of a reliable system especially for safety-critical applications.<br>It has been shown that using the same cache sizes for different applications leads to incompatible vulnerability patterns in applications. According to the literature, most of the related researches, have exploited identical cache sizes for different programs in their reliability evaluations, while the cache reliability strictly depends on the cache size and program behavior. Traditional attempts for finding an appropriate cache size for<br>different programs would need a huge design space exploration.<br>In this work, we have introduced a criterion for determining the Effective Cache Size (ECS) for embedded processors which considers the inherent programs’ reliability and performance properties. According to the results, using the ECS for the representative benchmark applications, the reliability would be increased 43x on average with acceptable performance degradations (21% on average). <br>


2021 ◽  
Author(s):  
Mohammad Hasan Ahmadilivani ◽  
Mohammad Moeini Jahromi ◽  
Mostafa E. Salehi ◽  
Mona Kargar

Reliability of embedded processors is one of the major concerns in safety-critical applications. Reliability is particularly expressed within the cache memories which are the largest part of new system on chips. Cache memories are the most vulnerable parts of the embedded systems and can affect the reliability drastically especially in deep transistor scaling. Therefore, evaluating the cache vulnerability is crucial in design of a reliable system especially for safety-critical applications.<br>It has been shown that using the same cache sizes for different applications leads to incompatible vulnerability patterns in applications. According to the literature, most of the related researches, have exploited identical cache sizes for different programs in their reliability evaluations, while the cache reliability strictly depends on the cache size and program behavior. Traditional attempts for finding an appropriate cache size for<br>different programs would need a huge design space exploration.<br>In this work, we have introduced a criterion for determining the Effective Cache Size (ECS) for embedded processors which considers the inherent programs’ reliability and performance properties. According to the results, using the ECS for the representative benchmark applications, the reliability would be increased 43x on average with acceptable performance degradations (21% on average). <br>


Author(s):  
Jonah P. Sengupta ◽  
Martin Villemur ◽  
Daniel R. Mendat ◽  
Gaspar Tognetti ◽  
Andreas G. Andreou

Author(s):  
Dae-Hwan Kim

Thumb-2 is the most recent instruction set architecture for ARM processors which are one of the most widely used embedded processors. In this paper, two extensions are proposed to improve the performance of the Thumb-2 instruction set architecture, which are addressing mode extensions and sign/zero extensions combined with data processing instructions. To speed up access to an element of an aggregated data, the proposed approach first introduces three new addressing modes for load and store instructions. They are register-plus-immediate offset addressing mode, negative register offset addressing mode, and post-increment register offset addressing mode. Register-plus-immediate offset addressing mode permits two offsets and negative register offset allows offset to be a negative value of a register content. Post-increment register offset mode automatically modifies the offset address after the memory operation. The second is the sign/zero extension combined with a data processing instruction which allows the result of a data processing operation to be sign/zero extended to accelerate a type conversion. Several least frequently used instructions are reduced to provide the encoding space for the new extensions. Experiments show that the proposed approach improves performance by an average of 8.6% when compared to the Thumb-2 instruction set architecture.


Sign in / Sign up

Export Citation Format

Share Document