共查询到20条相似文献,搜索用时 125 毫秒
1.
提出了一种利用Nor Flash的某一或多个扇区作为NVRAM保存DVB设备配置信息的方法,该方法基于Hash算法,并根据Flash的特点提出了一种简易的损耗均衡方法,同时具备了垃圾回收、断电保护等特点,增强了设备稳定性,延长了设备寿命. 相似文献
2.
3.
ActionScript3.0比以前版本具有更快的执行速度和更加强大的应用程序接口,但一些新引入的特性没有相应的资源管理方法,给Flash开发人员带来了令人头疼的垃圾回收问题。为此,分析了ActionScript3.0垃圾回收时采用的两种方法,"引用计数法"和"标记清除法",总结了垃圾回收的主要特点,最后给出了几种回收和节省内存的优化策略。实验结果表明,这些优化策略能有效提高垃圾回收率,改善应用程序的性能,对开发人员具有一定的参考价值。 相似文献
4.
介绍了Java垃圾回收的概念,阐述了垃圾回收器的工作原理,通过剖析GC与finalize方法的工作机制对垃圾回收算法进行了详细的实例讲解,最后总结了Java垃圾回收的一些特点,并结合日常使用中的常见问题,提供了一些解决垃圾收集问题的建议。 相似文献
5.
董萍 《微电子学与计算机》2013,30(2)
文中提出了一种可用于NAND存储器的块寿命均衡算法.此算法使用简易日志系统和垃圾块回收机制,以降低极低的写入速度为代价,成功的对NAND存储器的块寿命实现了均衡管理,因而增强了存储器在嵌入式系统中的使用寿命和文件稳定性.本算法经过基于FAT文件系统的实际测试显示了较好的性能,具有很高的推广与应用价值. 相似文献
6.
讨论了Java关键技术组成,深入介绍了Java虚拟机的体系结构,分析了虚拟机中内存管理的垃圾回收机制。同时,对现有的一些流行垃圾回收算法进行了深入分析和对比以及对某些算法的改进。Java虚拟机中存在多种垃圾回收机制,通过对Java虚拟机中内存管理机制的深入分析,可以使开发者针对不同的内存分配及回收策略选择合适的虚拟机。 相似文献
7.
首先介绍了Java垃圾回收的概念,阐述了垃圾回收器的工作原理,然后通过剖析gc与finalize方法的工作机制对垃圾回收算法进行了详细的实例讲解,总结了Java垃圾回收的一些特点,并结合日常使用中的常见问题,提供了一些解决垃圾收集问题的建议。 相似文献
8.
9.
控制流混淆用于混淆程序的运行流程,从而防止对软件的逆向工程,但通常混淆后的程序在代码量以及执行时间方面都有较大增长.针对不透明谓词难抵挡动态攻击这一弱点,提出了利用"垃圾代码"进行控制流混淆的思路,采用分支垃圾代码和循环垃圾代码算法相结合,并引入了Hash函数以限制代码的插入操作,从而控制代码长度的增长.实验结果表明,该混淆算法能够有效地控制混淆转换带来的性能过载,同时能够有效地防止逆向工程攻击. 相似文献
10.
该项目采用OPEN-CV图像处理技术、树莓派4B开发板及卷积神经网络算法,对实现垃圾智能分类方法进行了研究并设计了一款智能分类垃圾桶。该垃圾桶包含四个子垃圾桶,由四个舵机单独控制,可以实现干垃圾、湿垃圾、有害垃圾和可回收垃圾等四种垃圾的分类回收。采用树莓派摄像头完成四种垃圾图像的采集并保存,在Pycharm中利用卷积神经网络模型训练采集到的垃圾图像,模型训练完成后,将待识别的垃圾图像在训练好的模型中分析、对比、评估、识别出该垃圾的种类并将分类信号传送到树莓派开发板中,同时树莓派开发板驱动舵机旋转,带动对应的子垃圾桶转到投放口下方完成垃圾投放,实现垃圾智能分类。 相似文献
11.
GC(Garbage Collector)是Java的垃圾收集器。讨论了内存泄漏、GC的工作方式、fina-lize、引用对象,最后结合讨论提出了Java编程时的几点建议。 相似文献
12.
13.
An intelligent maximum power extraction algorithm for inverter-based variable speed wind turbine systems 总被引:17,自引:0,他引:17
Quincy Wang Liuchen Chang 《Power Electronics, IEEE Transactions on》2004,19(5):1242-1249
This paper focuses on the development of maximum wind power extraction algorithms for inverter-based variable speed wind power generation systems. A review of existing maximum wind power extraction algorithms is presented in this paper, based on which an intelligent maximum power extraction algorithm is developed by the authors to improve the system performance and to facilitate the control implementation. As an integral part of the max-power extraction algorithm, advanced hill-climb searching method has been developed to take into account the wind turbine inertia. The intelligent memory method with an on-line training process is described in this paper. The developed maximum wind power extraction algorithm has the capability of providing initial power demand based on error driven control, searching for the maximum wind turbine power at variable wind speeds, constructing an intelligent memory, and applying the intelligent memory data to control the inverter for maximum wind power extraction, without the need for either knowledge of wind turbine characteristics or the measurements of mechanical quantities such as wind speed and turbine rotor speed. System simulation results and test results have confirmed the functionality and performance of this method. 相似文献
14.
Unlike the existing electric grid, the smart grid has a variety of functions that enable electric utility suppliers and consumers to perform dual exchanges of real-time information by adding IT technology. Therefore, the systems of smart grid suppliers and those of users are always connected through a network, which means that the systems related to the smart grid could become targets of malicious attackers. The various smart grid systems could have different hardware configuration from those of general systems, but their fundamental operating mechanism is the same as that of the general computer system. When a system is operating, its information and the data used by a program are loaded into the system’s memory. In this paper, we studied the method of physical memory collection and analysis in smart grid embedded systems in order to help investigate crimes related to smart grids. In addition, we verify the method studied in this paper through the collection and analysis of physical memory in the virtual Linux environment using a virtual machine. 相似文献
15.
16.
17.
18.
《Solid-State Circuits, IEEE Journal of》1976,11(5):622-630
This paper describes the characteristics of a block-oriented random-access memory (BORAM) system which uses a custom-designed 2-kbit MNOS memory array for information storage. Delivery of two fully functional memory systems has been a significant achievement in the development of the MNOS memory technology. The organizational concepts and performance characteristics of both the memory system and the MNOS memory array are discussed, including speed, data transfer rate, and retention. 相似文献
19.
为了更好地服务于城市垃圾分类,提高垃圾分类前端收集的工作效率,本文提出了一种基于GINet的智能分类垃圾网络。首先在Kaggle数据集和华为垃圾分类公开数据集的基础上进行了人工标注,并建立了垃圾分类的训练数据集。其次,为了提高模型的泛化能力,扩充训练样本,设计了一种具有针对性的多背景图像增强方法。最后,为了解决垃圾分类数据集中某些同类垃圾之间的尺寸、颜色差异巨大,以VGG-16为主干特征提取网络,构建了一个融合多特征提取与注意力机制的垃圾识别网络(Garbage Identification Net,GINet)。仿真实验表明,该算法在复杂环境下拥有良好的鲁棒性和稳定性,检测准确率可达到94.5%,很好地满足了工业场景下垃圾检测的准确性。 相似文献
20.
Han-Lin Li Chia-Lin Yang Hung-Wei Tseng 《Very Large Scale Integration (VLSI) Systems, IEEE Transactions on》2008,16(8):952-964
The traditional virtual memory system is designed for decades assuming a magnetic disk as the secondary storage. Recently, flash memory becomes a popular storage alternative for many portable devices with the continuing improvements on its capacity, reliability and much lower power consumption than mechanical hard drives. The characteristics of flash memory are quite different from a magnetic disk. Therefore, in this paper, we revisit virtual memory system design considering limitations imposed by flash memory. In particular, we focus on the energy efficient aspect since power is the first-order design consideration for embedded systems. Due to the write-once feature of flash memory, frequent writes incur frequent garbage collection thereby introducing significant energy overhead. Therefore, in this paper, we propose three methods to reduce writes to flash memory. The HotCache scheme adds an SRAM cache to buffer frequent writes. The subpaging technique partitions a page into subunits, and only dirty subpages are written to flash memory. The duplication-aware garbage collection method exploits data redundancy between the main memory and flash memory to reduce writes incurred by garbage collection. We also identify one type of data locality that is inherent in accesses to flash memory in the virtual memory system, intrapage locality. Intrapage locality needs to be carefully maintained for data allocation in flash memory. Destroying intrapage locality causes noticeable increases in energy consumption. Experimental results show that the average energy reduction of combined subpaging, HotCache, and duplication-aware garbage collection techniques is 42.2%. 相似文献