Performance Analysis of Real-Time Operating System (RTOS) on Information Models

Adegbenjo Aderonke A. Y. *, Adekunle Y. A.**
*,** Department of Computer Science & Information Technology, Babcock University, Ilishan-Remo, Ogun State, Nigeria.
Periodicity:June - August'2020
DOI : https://doi.org/10.26634/jcom.8.2.17792

Abstract

The design of the real-time operating system (RTOS) is quite critical, particularly if any unique systems choose to use it. Since they are capable of facilitating the application of multiple requirements, including clustering, cohesion, and substitute programs. Many publications were reviewed in this paper to track the efficiency of the RTOS Various restrictions as it is exposed to. The research concentrates on a play analysis of RTOS Models for research on different computer devices and operating systems. The magazines We also gathered it for a rigorous analysis leading to the setup. Many variables that impact device features. Statistics and findings are equally relevant to Encourage the implementation of a more oriented RTOS strategy. During this phase The software classifies clustering and performance for all applications as the highest RTOS standards, This was viewed as the least significant by alternative programs. Thus, the preference of parameters is a major problem to contend with.

Keywords

Operating System (OS), Play Model, Real-Time, RTOS, Performance; Criteria for RTOS.

How to Cite this Article?

Aderonke, A. Y. A., and Adekunle, Y. A. (2020). Performance Analysis of Real-Time Operating System (RTOS) on Information Models. i-manager's Journal on Computer Science, 8(2), 24-31. https://doi.org/10.26634/jcom.8.2.17792

References

[1]. Chang, P. C., & Lin, Y. K. (2013). Evaluation of reliability of many separate manufacturing lines dependent on graphics. System Engineering, 22(1), 85-36.
[2]. Capozzo, L., Attolico, G., & Cicirelli, G. (1999, October). Building low cost vehicles for simple reactive behaviors. In IEEE SMC'99 Conference Proceedings. 1999 IEEE International Conference on Systems, Man, and Cybernetics (Cat. No. 99CH37028) (Vol. 6, pp. 675-680). IEEE. https://doi.org/10.1109/ICSMC.1999.816632
[3]. Dalton, C., & Choo, T. H. (2001). An operating system approach to securing e-services. Communications of the ACM, 44(2), 58-64. https://doi.org/10.1145/359205.359228
[4]. DoD. (1985). Trusted Computer System Evaluation Criteria. Department of Defense Standard, Department of Defense, USA. Retrieved https://csrc.nist.gov/csrc/media/ publications/conference-paper/1998/10/08/proceedings-of-the-21 -nissc-1998/documents/early-cs-papers/dod 85.pdf
[5]. Hämäläinen, P., Mäki-Patola, T., Pulkki, V., & Airas, M. (2004, October). Musical computer games played by singing. In Proceedings 7th International Conference on Digital Audio Effects, DAFX 04, Naples, Italy. (pp. 367- 371).
[6]. Huber, M., Rabin, B., Docan, C., Burdea, G., Nwosu, M. E., Abdelbaky, M., & Golomb, M. R. (2008, August). PlayStation 3-based tele-rehabilitation for children with hemiplegia. In 2008, Virtual Rehabilitation (pp. 105-112). IEEE. https://doi.org/10.1109/ICVR.2008.4625145
[7]. Sharad, S. (2019). Introduction of LEGO MINDSTORMS NXT: Microelectronic systems education for students in integrated designs and sophomore engineering. International IEEE Conference (pp. 119-120).
[8]. Smalley, S., Loscocco, P., Hibler, M., Andersen, D., Lepreau, J., Stephen, R. S., & Spencer, R. (1998). The Flask Security Architecture: System support for diverse security policies. In Proceedings of The Eighth USENIX Security Symposium, 123-139.
[9]. Swift, M. M., Bershad, B. N., & Levy, H. M. (2003, October). Improving the reliability of commodity operating systems. In Proceedings of the nineteenth ACM symposium on Operating systems principles (pp. 207-222). https://doi. org/10.1145/945445.945466
[10]. Tushman, M. L., Newman, W. H., & Romanelli, E. (1986). Convergence and upheaval: Managing the unsteady pace of organizational evolution. California Management Review, 29(1), 29-44. https://doi.org/10.2307%2F41165225
[11]. Zhu, M. Y., Luo, L., & Xiong, G. Z. (2001). A provably correct operating system: δ-core ACM SIGOPS Operating Systems Review, 35(1), 17-33. https://doi.org/10.1145/3714 55.371458
If you have access to this article please login to view the article or kindly login to purchase the article

Purchase Instant Access

Single Article

North Americas,UK,
Middle East,Europe
India Rest of world
USD EUR INR USD-ROW
Pdf 35 35 200 20
Online 35 35 200 15
Pdf & Online 35 35 400 25

Options for accessing this content:
  • If you would like institutional access to this content, please recommend the title to your librarian.
    Library Recommendation Form
  • If you already have i-manager's user account: Login above and proceed to purchase the article.
  • New Users: Please register, then proceed to purchase the article.