Application-specific multiprocessors, computer science, Basic Computer Science

Assignment Help:

Application-Specific Multiprocessors

Although this book details a variety of similar architectures, it specializes in the design of such architectures in the perspective of particular, welldefinedfamilies of programs. We focus on application-specific similar producing instead of applying the ideas in common objective similar techniques because DSP techniques are typically elements of included programs, and the computational features of included programs are generally different from those of general-purpose techniques. General objective similar calculations includes user-programmable computers, which can be quickly designed for a variety of requirements, and can be reconfigured any number of times as the users' needs change. Computation in an included program, however, is usually one-time designed by the designer of that included system (a digital mobile radio stations mobile phone, for example) and is not used to be automated by the end person.

Also, the calculations in included techniques is specialized (the calculations in a mobile radio stations mobile phone includes particular DSP features such as language pressure, route equalization, modulation, etc.), and the developers of included multiprocessor components typically have particular knowledge of the programs that will be developed on the systems that they develop. In comparison, developers of general purpose processing techniques cannot afford to personalize their components too intensely for any particular class of programs.

Thus, only developers of included systems have to be able to perfectly estimate and boost for the specific program subsystems that will be undertaking on the components that they create. However, if only common objective rendering methods are used in the progression of an included program, then the developers of that included program lose this chance.

Furthermore, included programs face very different difficulties com-pared to general purpose calculations. These difficulties include nonrecurring style costs, aggressive time-to-market difficulties, restrictions on the amount and keeping memory, difficulties on power intake, and real-time efficiency requirements. Thus, for an included program, it is critical to apply methods for style and rendering that manipulate the special features of the program in order to boost for the specific set of difficulties that must be fulfilled. These methods are normally based on style strategies that customize the software and components rendering to the particular application.


Related Discussions:- Application-specific multiprocessors, computer science

Explain Debug program in assembly language , To make a program in assemble...

To make a program in assembler two choices exist, the earliest one is to use the TASM or Turbo Assembler, of Borland, and the next one is to use the debugger, generally we use this

Vdu visual display unit output, VDU (Visual Display Unit) output...

VDU (Visual Display Unit) output Make sure that VDUs are of an appropriate type. They can cause severe eyestrain and tension if you do not check: (a) Colour (

Telecommunications network, Telecommunications network: "A telecommuni...

Telecommunications network: "A telecommunications network, at its simplest, may be regarded as comprising a transmission network, an arrangement of transmission paths and swit

Discuss the advantages and disadvantages of printed indexes, QUESTION 1 ...

QUESTION 1 Discuss the advantages and disadvantages of printed indexes. QUESTION 2 (i) The Library of Congress Subject Headings List and the Sears Subject Headings List

The elif Statement, The elif statement permits you to check multiple expres...

The elif statement permits you to check multiple expressions for truth value and execute a block of code the moment one of the conditions estimates to true. similar to the else, th

Login, Login Because the information on a network is sharable, network...

Login Because the information on a network is sharable, networks are very susceptible to unauthorized intruders. In order to prevent unauthorized access to use the services o

Note on hyper text markup language (html) with example, Problem A) The ...

Problem A) The TCP/IP reference model is the network model used in the current Internet architecture. This model is derived from the OSI model and they are relatively same in n

Electronic digital, Design a BCD to excess 3 code converter using minimum n...

Design a BCD to excess 3 code converter using minimum number of NAND gates.

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd