Learn More
Real-time and embedded applications normally have constraints both with respect to timeliness and freshness of data they use. At the same time it is important that the resources are utilized as efficient as possible, e.g., for CPU resources unnecessary calculations should be lowered as much as possible. This is especially true for vehicle control systems,(More)
The amount of data handled by real-time and embedded applications is increasing. Also, applications normally have constraints with respect to freshness and timeliness of the data they use, i.e., results must be produced within a dead-line using accurate data. This calls for data-centric approaches when designing embedded systems, where data and its(More)
In this article, a novel on-line path planning algorithm for an articulated vehicle, moving in a partially known and sensory based reconstructed environment, and relying on Model Predictive Control will be presented. The proposed algorithm belongs to the family of bug like path planning algorithms and has the capability to take under consideration the real(More)
In this paper we consider data freshness and overload handling in embedded systems. The requirements on data management and overload handling are derived from an engine control software. Data items need to be up-to-date, and to achieve this data dependencies must be considered, i.e., updating a data item requires other data items are up-to-date. We also(More)
implemented in this paper is called data synchronization. Also, multi-rate operations that are compared with conventional Kalman filtering has fix error covariance matrix. Therefore, when GPS outage occurred we have improper treat by kalman filter. In this paper we present an Adaptive method instead of conventional methods. It is shown that proposed method(More)
Real-time databases handle reading and writing of data with time constraints on transactions. Normally, data items in a real-time system have freshness requirements which need to be guaranteed, and for many transactions it is important that accessed data items origin from the same system state, which can be ensured by letting the transactions read a(More)