

{"id":4,"date":"2011-12-08T11:55:34","date_gmt":"2011-12-08T11:55:34","guid":{"rendered":"http:\/\/project.inria.fr\/template1\/?page_id=4"},"modified":"2019-06-03T15:58:45","modified_gmt":"2019-06-03T13:58:45","slug":"home","status":"publish","type":"page","link":"https:\/\/project.inria.fr\/interferenceanalysis\/","title":{"rendered":"ATIPPIC use case"},"content":{"rendered":"<p><\/p>\n<h2>Simulation analysis results<\/h2>\n<p><a href=\"https:\/\/project.inria.fr\/interferenceanalysis\/files\/2019\/03\/useCase.png\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-66\" src=\"https:\/\/project.inria.fr\/interferenceanalysis\/files\/2019\/03\/useCase-300x222.png\" alt=\"\" width=\"635\" height=\"470\" srcset=\"https:\/\/project.inria.fr\/interferenceanalysis\/files\/2019\/03\/useCase-300x222.png 300w, https:\/\/project.inria.fr\/interferenceanalysis\/files\/2019\/03\/useCase-768x569.png 768w, https:\/\/project.inria.fr\/interferenceanalysis\/files\/2019\/03\/useCase-1024x759.png 1024w, https:\/\/project.inria.fr\/interferenceanalysis\/files\/2019\/03\/useCase-150x111.png 150w\" sizes=\"auto, (max-width: 635px) 100vw, 635px\" \/><\/a><\/p>\n<p>In the following, we show the results of 2 different strategies of image compression. In the first screenshot, we present the results in terms of bus load and interference percentage of a configuration where compression algorithm is configured to execute on an input of 2 images at each run. And the second screenshot shows the same kind of results for a configuration where the compression task is executed on a group of 4 images. As the first strategy consumes less data, the schedule is twice faster then the second strategy. However the overall consumed and generated data is the same, considering the slowest frequency.<\/p>\n<p style=\"text-align: center;\"><a href=\"https:\/\/project.inria.fr\/interferenceanalysis\/files\/2019\/03\/results_2img.png\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-72\" src=\"https:\/\/project.inria.fr\/interferenceanalysis\/files\/2019\/03\/results_2img-300x167.png\" alt=\"\" width=\"750\" height=\"417\" srcset=\"https:\/\/project.inria.fr\/interferenceanalysis\/files\/2019\/03\/results_2img-300x167.png 300w, https:\/\/project.inria.fr\/interferenceanalysis\/files\/2019\/03\/results_2img-768x427.png 768w, https:\/\/project.inria.fr\/interferenceanalysis\/files\/2019\/03\/results_2img-1024x569.png 1024w, https:\/\/project.inria.fr\/interferenceanalysis\/files\/2019\/03\/results_2img-150x83.png 150w, https:\/\/project.inria.fr\/interferenceanalysis\/files\/2019\/03\/results_2img.png 1651w\" sizes=\"auto, (max-width: 750px) 100vw, 750px\" \/><\/a><\/p>\n<p style=\"text-align: center;\">2 images compression strategy<\/p>\n<p style=\"text-align: center;\"><a href=\"https:\/\/project.inria.fr\/interferenceanalysis\/files\/2019\/03\/results-4img.png\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-73\" src=\"https:\/\/project.inria.fr\/interferenceanalysis\/files\/2019\/03\/results-4img-300x166.png\" alt=\"\" width=\"752\" height=\"416\" srcset=\"https:\/\/project.inria.fr\/interferenceanalysis\/files\/2019\/03\/results-4img-300x166.png 300w, https:\/\/project.inria.fr\/interferenceanalysis\/files\/2019\/03\/results-4img-768x424.png 768w, https:\/\/project.inria.fr\/interferenceanalysis\/files\/2019\/03\/results-4img-1024x565.png 1024w, https:\/\/project.inria.fr\/interferenceanalysis\/files\/2019\/03\/results-4img-150x83.png 150w, https:\/\/project.inria.fr\/interferenceanalysis\/files\/2019\/03\/results-4img.png 1631w\" sizes=\"auto, (max-width: 752px) 100vw, 752px\" \/><\/a><\/p>\n<p style=\"text-align: center;\">4 images compression strategy<\/p>\n<p>As the overall exchanged data in the model is the same for the 2 configurations, bus load isn&#8217;t affected by using one strategy over another. The difference between is observed on the interference rate where the first strategy generates less interference than\u00a0 the second one.<\/p>\n<h2>Design space exploration<\/h2>\n<p style=\"text-align: center;\"><a href=\"https:\/\/project.inria.fr\/interferenceanalysis\/files\/2019\/06\/jupyterExploration.png\"><img loading=\"lazy\" decoding=\"async\" class=\" wp-image-83 aligncenter\" src=\"https:\/\/project.inria.fr\/interferenceanalysis\/files\/2019\/06\/jupyterExploration-300x243.png\" alt=\"\" width=\"583\" height=\"472\" srcset=\"https:\/\/project.inria.fr\/interferenceanalysis\/files\/2019\/06\/jupyterExploration-300x243.png 300w, https:\/\/project.inria.fr\/interferenceanalysis\/files\/2019\/06\/jupyterExploration-768x622.png 768w, https:\/\/project.inria.fr\/interferenceanalysis\/files\/2019\/06\/jupyterExploration-1024x830.png 1024w, https:\/\/project.inria.fr\/interferenceanalysis\/files\/2019\/06\/jupyterExploration-150x122.png 150w, https:\/\/project.inria.fr\/interferenceanalysis\/files\/2019\/06\/jupyterExploration.png 1361w\" sizes=\"auto, (max-width: 583px) 100vw, 583px\" \/><\/a>Simple Interface for Exploration of the Simulation Results<\/p>\n<h2>Operational analysis results<\/h2>\n<p>Results of operational analysis show the worst case for the two precedent scenarios. The analysis doesn&#8217;t take into account the schedule information such as execution frequency and offsets, it only consider communication time and possible overlap.<\/p>\n<p><a href=\"https:\/\/project.inria.fr\/interferenceanalysis\/files\/2019\/04\/PAB-Physical-System.png\"><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-79 aligncenter\" src=\"https:\/\/project.inria.fr\/interferenceanalysis\/files\/2019\/04\/PAB-Physical-System-300x222.png\" alt=\"\" width=\"635\" height=\"470\" srcset=\"https:\/\/project.inria.fr\/interferenceanalysis\/files\/2019\/04\/PAB-Physical-System-300x222.png 300w, https:\/\/project.inria.fr\/interferenceanalysis\/files\/2019\/04\/PAB-Physical-System-768x568.png 768w, https:\/\/project.inria.fr\/interferenceanalysis\/files\/2019\/04\/PAB-Physical-System-1024x758.png 1024w, https:\/\/project.inria.fr\/interferenceanalysis\/files\/2019\/04\/PAB-Physical-System-150x111.png 150w\" sizes=\"auto, (max-width: 635px) 100vw, 635px\" \/><\/a><\/p>\n<p style=\"text-align: center;\">operational analysis results of 2 images compression strategy<\/p>\n<p><a href=\"https:\/\/project.inria.fr\/interferenceanalysis\/files\/2019\/04\/PAB-Physical-System2.png\"><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-80 aligncenter\" src=\"https:\/\/project.inria.fr\/interferenceanalysis\/files\/2019\/04\/PAB-Physical-System2-300x222.png\" alt=\"\" width=\"635\" height=\"470\" srcset=\"https:\/\/project.inria.fr\/interferenceanalysis\/files\/2019\/04\/PAB-Physical-System2-300x222.png 300w, https:\/\/project.inria.fr\/interferenceanalysis\/files\/2019\/04\/PAB-Physical-System2-768x568.png 768w, https:\/\/project.inria.fr\/interferenceanalysis\/files\/2019\/04\/PAB-Physical-System2-1024x758.png 1024w, https:\/\/project.inria.fr\/interferenceanalysis\/files\/2019\/04\/PAB-Physical-System2-150x111.png 150w\" sizes=\"auto, (max-width: 635px) 100vw, 635px\" \/><\/a><\/p>\n<p style=\"text-align: center;\">operational analysis results of 4 images compression strategy<\/p>\n<p><\/p>","protected":false},"excerpt":{"rendered":"<p>Simulation analysis results In the following, we show the results of 2 different strategies of image compression. In the first screenshot, we present the results in terms of bus load and interference percentage of a configuration where compression algorithm is configured to execute on an input of 2 images at\u2026<\/p>\n<p> <a class=\"continue-reading-link\" href=\"https:\/\/project.inria.fr\/interferenceanalysis\/\"><span>Continue reading<\/span><i class=\"crycon-right-dir\"><\/i><\/a> <\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"open","template":"","meta":{"footnotes":""},"class_list":["post-4","page","type-page","status-publish","hentry"],"_links":{"self":[{"href":"https:\/\/project.inria.fr\/interferenceanalysis\/wp-json\/wp\/v2\/pages\/4","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/project.inria.fr\/interferenceanalysis\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/project.inria.fr\/interferenceanalysis\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/project.inria.fr\/interferenceanalysis\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/project.inria.fr\/interferenceanalysis\/wp-json\/wp\/v2\/comments?post=4"}],"version-history":[{"count":20,"href":"https:\/\/project.inria.fr\/interferenceanalysis\/wp-json\/wp\/v2\/pages\/4\/revisions"}],"predecessor-version":[{"id":86,"href":"https:\/\/project.inria.fr\/interferenceanalysis\/wp-json\/wp\/v2\/pages\/4\/revisions\/86"}],"wp:attachment":[{"href":"https:\/\/project.inria.fr\/interferenceanalysis\/wp-json\/wp\/v2\/media?parent=4"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}