• 中国精品科技期刊
  • CCF推荐A类中文期刊
  • 计算领域高质量科技期刊T1类
Advanced Search
Ge Yongqi, Dong Yunwei, Gu Bin. Preemption Threshold Scheduling for Energy Harvesting Based Cyber-Physical Systems[J]. Journal of Computer Research and Development, 2015, 52(12): 2695-2706. DOI: 10.7544/issn1000-1239.2015.20150745
Citation: Ge Yongqi, Dong Yunwei, Gu Bin. Preemption Threshold Scheduling for Energy Harvesting Based Cyber-Physical Systems[J]. Journal of Computer Research and Development, 2015, 52(12): 2695-2706. DOI: 10.7544/issn1000-1239.2015.20150745

Preemption Threshold Scheduling for Energy Harvesting Based Cyber-Physical Systems

More Information
  • Published Date: November 30, 2015
  • In energy harvesting based cyber-physical systems (EHCPS), energy management architecture is different from traditional battery powered embedded systems. The task scheduling of EHCPS should take account of the output power of energy harvesting unit, the energy level of battery and the energy consumption of computing tasks. A real-time task may meet time constraint only if its energy constraint is satisfied. Against this background, the schedulability analysis of conventional preemption threshold scheduling doesn’t consider the tasks energy consumption, thus the preemption threshold assignment algorithm is not suitable for EHCPS. An energy related preemption threshold scheduling (ERPT) for EHCPS is proposed in this paper. It integrates tasks energy consumption and energy supply ability into schedulability analysis, and the preemption threshold assignment algorithms are also presented. ERPT presents a solution for applying preemption threshold scheduling in EHCPS. The proposed scheduling strategy is validated compared with other two existing classical algorithms. The experimental results show that the proposed scheduling can reduce the tasks preemption effectively.
  • Related Articles

    [1]Wang Chuang, Ding Yan, Huang Chenlin, Song Liantao. Bitsliced Optimization of SM4 Algorithm with the SIMD Instruction Set[J]. Journal of Computer Research and Development, 2024, 61(8): 2097-2109. DOI: 10.7544/issn1000-1239.202220531
    [2]Hao Zeyu, Dai Tianao, Huang Yicheng, Duan Cenlin, Dong Jin, Wu Shiyong, Zhang Bo, Wang Xueyan, Jia Xiaotao, Yang Jianlei. Efficient Design and Implementation of SM4 Algorithm with CBC Mode[J]. Journal of Computer Research and Development, 2024, 61(6): 1450-1457. DOI: 10.7544/issn1000-1239.202331007
    [3]Pan Yinxue, Wang Gaoli, Ni Jianqiang. Finding Differential Characteristics of SM4 Algorithm Based on MILP[J]. Journal of Computer Research and Development, 2022, 59(10): 2299-2308. DOI: 10.7544/issn1000-1239.20220486
    [4]Fan Lingyan, Zhou Meng, Luo Jianjun, Liu Hailuan. IC Design with Multiple Engines Running CBC Mode SM4 Algorithm[J]. Journal of Computer Research and Development, 2018, 55(6): 1247-1253. DOI: 10.7544/issn1000-1239.2018.20170144
    [5]Zhang Heng, Zhang Libo, WuYanjun. Large-Scale Graph Processing on Multi-GPU Platforms[J]. Journal of Computer Research and Development, 2018, 55(2): 273-288. DOI: 10.7544/issn1000-1239.2018.20170697
    [6]Han Xiaowei, Wu Liji, Wang Beibei, Wang An. Atomic Algorithm Against Simple Power Attack of SM2[J]. Journal of Computer Research and Development, 2016, 53(8): 1850-1856. DOI: 10.7544/issn1000-1239.2016.20150052
    [7]Tong Yuanman, Wang Zhiying, Dai Kui, and Lu Hongyi. Quantitative Evaluation of the Cryptographic Block’s Resistibility to Power Analysis Attack at Different Design Level[J]. Journal of Computer Research and Development, 2009, 46(6): 940-947.
    [8]Zhao Jia, Zeng Xiaoyang, Han Jun, Wang Jing, and Chen Jun. VLSI Implementation of an AES Algorithm Resistant to Differential Power Analysis Attack[J]. Journal of Computer Research and Development, 2007, 44(3).
    [9]Wu Zhenqiang, Ma Jianfeng. A Joint-Entropy-Based Anonymity Metrics Model with Multi-Property[J]. Journal of Computer Research and Development, 2006, 43(7): 1240-1245.
    [10]Yi Yeqing, Lin Yaping, Lin Mu, Li Xiaolong, Wang Lei. Blind Source Separation Based on Genetic Algorithm[J]. Journal of Computer Research and Development, 2006, 43(2): 244-252.

Catalog

    Article views (1195) PDF downloads (657) Cited by()

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return