Papers by Anmol Suryavanshi
International Journal on Recent and Innovation Trends in Computing and Communication, Oct 6, 2023
The demand for Contiguous Memory Allocation (CMA) has witnessed significant growth in both low-en... more The demand for Contiguous Memory Allocation (CMA) has witnessed significant growth in both low-end and high-end devices in recent years. However, the existing practices for utilizing CMA prove insufficient, particularly when catering to the needs of low-end (32bit) devices. CMA, a Linux program used for memory reservation and allocation, faces limitations in its current implementations. Presently, techniques such as Scatter-Gather Direct Memory Access (DMA), Input Output Memory Management Unit (IOMMU), and Memory Reservation are commonly employed for contiguous memory allocation. Unfortunately, these methods are financially impractical for low-end devices and struggle to efficiently allocate substantial memory chunks, leading to latency concerns. In this paper, we introduce an improved CMA approach that intelligently allocates virtual memory for data mapping as needed. Alternatively, it directly allocates and deallocates physical memory without the necessity of virtual memory mapping, employing the DMA_KERNEL_NO_MAPPING attribute within the DMA Application Programming Interface (API). By adopting this method, latency is reduced, and the facilitation of larger memory allocations is promoted, addressing the limitations of the current techniques.
International journal of performability engineering, Dec 31, 2022
The ICMA (Improved Contiguous Memory Allocation) approach represents a transformative rethinking ... more The ICMA (Improved Contiguous Memory Allocation) approach represents a transformative rethinking of the traditional Contiguous Memory Allocation (CMA) method, aiming to optimize memory utilization, diminish allocation errors, reduce system overhead, and alleviate latency issues. It introduces a novel virtual memory remapping strategy that challenges conventional assumptions. ICMA adopts a deferred mapping approach, reserving mapping until explicitly required, necessitating a dedicated device driver for its operation. This research critically assesses ICMA's practical implications within the Linux Kernel, primarily focusing on memory allocation, overall system performance, and efficiency enhancements. The technical implementation details presented in this study underscore its effectiveness in addressing memory allocation failures and latency bottlenecks. Empirical testing on a Raspberry Pi 3 highlights the real-world applicability of ICMA. These findings contribute valuable insights into the potential benefits and challenges associated with ICMA, providing essential guidance for devising memory management strategies to significantly enhance system efficiency and performance.
nternational Journal on Recent and Innovation Trends in Computing and Communication, 2023
The demand for Contiguous Memory Allocation (CMA) has witnessed significant growth in both low-en... more The demand for Contiguous Memory Allocation (CMA) has witnessed significant growth in both low-end and high-end devices in recent years. However, the existing practices for utilizing CMA prove insufficient, particularly when catering to the needs of low-end (32bit) devices. CMA, a Linux program used for memory reservation and allocation, faces limitations in its current implementations. Presently, techniques such as Scatter-Gather Direct Memory Access (DMA), Input Output Memory Management Unit (IOMMU), and Memory Reservation are commonly employed for contiguous memory allocation. Unfortunately, these methods are financially impractical for low-end devices and struggle to efficiently allocate substantial memory chunks, leading to latency concerns. In this paper, we introduce an improved CMA approach that intelligently allocates virtual memory for data mapping as needed. Alternatively, it directly allocates and deallocates physical memory without the necessity of virtual memory mapping, employing the DMA_KERNEL_NO_MAPPING attribute within the DMA Application Programming Interface (API). By adopting this method, latency is reduced, and the facilitation of larger memory allocations is promoted, addressing the limitations of the current techniques.
International Journal on Recent and Innovation Trends in Computing and Communication, 2023
The ICMA (Improved Contiguous Memory Allocation) approach represents a transformative rethinking ... more The ICMA (Improved Contiguous Memory Allocation) approach represents a transformative rethinking of the traditional Contiguous Memory Allocation (CMA) method, aiming to optimize memory utilization, diminish allocation errors, reduce system overhead, and alleviate latency issues. It introduces a novel virtual memory remapping strategy that challenges conventional assumptions. ICMA adopts a deferred mapping approach, reserving mapping until explicitly required, necessitating a dedicated device driver for its operation. This research critically assesses ICMA's practical implications within the Linux Kernel, primarily focusing on memory allocation, overall system performance, and efficiency enhancements. The technical implementation details presented in this study underscore its effectiveness in addressing memory allocation failures and latency bottlenecks. Empirical testing on a Raspberry Pi 3 highlights the real-world applicability of ICMA. These findings contribute valuable insights into the potential benefits and challenges associated with ICMA, providing essential guidance for devising memory management strategies to significantly enhance system efficiency and performance.
International Journal of Performability Engineering, 2023
The ICMA (Improved Contiguous Memory Allocation) approach represents a transformative rethinking ... more The ICMA (Improved Contiguous Memory Allocation) approach represents a transformative rethinking of the traditional Contiguous Memory Allocation (CMA) method, aiming to optimize memory utilization, diminish allocation errors, reduce system overhead, and alleviate latency issues. It introduces a novel virtual memory remapping strategy that challenges conventional assumptions. ICMA adopts a deferred mapping approach, reserving mapping until explicitly required, necessitating a dedicated device driver for its operation. This research critically assesses ICMA's practical implications within the Linux Kernel, primarily focusing on memory allocation, overall system performance, and efficiency enhancements. The technical implementation details presented in this study underscore its effectiveness in addressing memory allocation failures and latency bottlenecks. Empirical testing on a Raspberry Pi 3 highlights the real-world applicability of ICMA. These findings contribute valuable insights into the potential benefits and challenges associated with ICMA, providing essential guidance for devising memory management strategies to significantly enhance system efficiency and performance.
International Journal on Recent and Innovation Trends in Computing and Communication, 2023
The demand for Contiguous Memory Allocation (CMA) has witnessed significant growth in both low-en... more The demand for Contiguous Memory Allocation (CMA) has witnessed significant growth in both low-end and high-end devices in recent years. However, the existing practices for utilizing CMA prove insufficient, particularly when catering to the needs of low-end (32bit) devices. CMA, a Linux program used for memory reservation and allocation, faces limitations in its current implementations. Presently, techniques such as Scatter-Gather Direct Memory Access (DMA), Input Output Memory Management Unit (IOMMU), and Memory Reservation are commonly employed for contiguous memory allocation. Unfortunately, these methods are financially impractical for low-end devices and struggle to efficiently allocate substantial memory chunks, leading to latency concerns. In this paper, we introduce an improved CMA approach that intelligently allocates virtual memory for data mapping as needed. Alternatively, it directly allocates and deallocates physical memory without the necessity of virtual memory mapping, employing the DMA_KERNEL_NO_MAPPING attribute within the DMA Application Programming Interface (API). By adopting this method, latency is reduced, and the facilitation of larger memory allocations is promoted, addressing the limitations of the current techniques.
The demand for Contiguous Memory Allocation (CMA) has witnessed significant growth in both low-en... more The demand for Contiguous Memory Allocation (CMA) has witnessed significant growth in both low-end and high-end devices in recent years. However, the existing practices for utilizing CMA prove insufficient, particularly when catering to the needs of low-end (32bit) devices. CMA, a Linux program used for memory reservation and allocation, faces limitations in its current implementations. Presently, techniques such as Scatter-Gather Direct Memory Access (DMA), Input Output Memory Management Unit (IOMMU), and Memory Reservation are commonly employed for contiguous memory allocation. Unfortunately, these methods are financially impractical for low-end devices and struggle to efficiently allocate substantial memory chunks, leading to latency concerns. In this paper, we introduce an improved CMA approach that intelligently allocates virtual memory for data mapping as needed. Alternatively, it directly allocates and deallocates physical memory without the necessity of virtual memory mapping, employing the DMA_KERNEL_NO_MAPPING attribute within the DMA Application Programming Interface (API). By adopting this method, latency is reduced, and the facilitation of larger memory allocations is promoted, addressing the limitations of the current techniques.
Received Mar 5, 2021 Revised Aug 6, 2021 Accepted Aug 11, 2021 Machine learning involves the task... more Received Mar 5, 2021 Revised Aug 6, 2021 Accepted Aug 11, 2021 Machine learning involves the task of training systems to be able to make decisions without being explicitly programmed. Important among machine learning tasks is classification involving the process of training machines to make predictions from predefined labels. Classification is broadly categorized into three distinct groups: single-label (SL), multi-class, and multi-label (ML) classification. This research work presents an application of a multi-label classification (MLC) technique in automating Quranic verses labeling. MLC has been gaining attention in recent years. This is due to the increasing amount of works based on real-world classification problems of multi-label data. In traditional classification problems, patterns are associated with a single-label from a set of disjoint labels. However, in MLC, an instance of data is associated with a set of labels. In this paper, three standard MLC methods: binary relevan...
International journal of advanced research in electrical, electronics and instrumentation engineering, 2014
2 ABSTRACT: MANET is collection of mobile nodes that form a network independently of any centrali... more 2 ABSTRACT: MANET is collection of mobile nodes that form a network independently of any centralized administration. Since those mobile devices are battery operation based and extending the battery lifetime has become an main aim. Generally all the researchers have recently started to consider power-aware development of efficient protocols for MANETs. When each mobile node in a MANETs performs the routing function for effective establishment of communication among different mobile nodes the "Death" of even an any of the nodes due to power exhaustion might cause disconnect of services in the entire MANETs. So, mobile nodes in MANETs are battery based. Thus, they affect from limited energy level problems. When the nodes in the network are moving if a node moves out of a radio range of the other node then link between them is broken. Mainly due to this environment there are two major conditions of a link break that is Node dead due to energy collapse and Node going out of the...
energy efficient routing scheme deals with efficient utilization of energy resources. by controll... more energy efficient routing scheme deals with efficient utilization of energy resources. by controlling the early depletion of the battery, adjust the power to decide the proper power level of a node and incorporate the low power strategies into the protocols used in various layers of protocol stack. ad hoc wireless networks are power constrained since nodes operate with limited battery energy. if some nodes die early due to lack of energy, they cannot communicate with each other. therefore, inordinate consumption of nodes' energy should be prevented. in fact, nodes residual energy utilization after threshold should be increase the energy utilization of networks. here we proposed a new energy utilization scheme in manet. in this scheme we set a threshold value for energy consumption by mobile nodes in our network. if the energy level of any node/s in the network reaches to threshold level that are participated in communication means it will be active in the network. but here we app...
Indonesian Journal of Electrical Engineering and Computer Science
The demand of contiguous memory allocation has been expanded in day-to-day life in all the device... more The demand of contiguous memory allocation has been expanded in day-to-day life in all the devices. It is achieved in existing systems by using various reservation techniques. There are various other methods to achieve the goal of contiguous memory allocation in linux kernel such as, input output memory management units (IOMMU’s), scatter/gather direct memory access (DMA) and reserved static memory at boot time. But these solutions have its own drawbacks such as, IOMMU requires hardware. However, the configuration of additional hardware's increases the cost. The power consumption of the system and the reserved static memory in the system goes waste when not in used for specific purpose. It is very difficult to access contiguous memory in low-end devices that are unable to provide real contiguous memory. There is one existing method called contiguous memory allocator (CMA), which provides dynamic contiguous memory. It overcomes most of the problems but CMA itself has some drawbac...
International Journal of Advanced Research in Electrical, Electronics and Instrumentation Engineering, 2014
MANET is collection of mobile nodes that form a network independently of any centralized administ... more MANET is collection of mobile nodes that form a network independently of any centralized administration. Since those mobile devices are battery operation based and extending the battery lifetime has become an main aim. Generally all the researchers have recently started to consider power-aware development of efficient protocols for MANETs. When each mobile node in a MANETs performs the routing function for effective establishment of communication among different mobile nodes the "Death" of even an any of the nodes due to power
Indonesian Journal of Electrical Engineering and Computer Science, 2022
The demand of contiguous memory allocation has been expanded in day-today life in all the devices... more The demand of contiguous memory allocation has been expanded in day-today life in all the devices. It is achieved in existing systems by using various reservation techniques. There are various other methods to achieve the goal of contiguous memory allocation in linux kernel such as, input output memory management units (IOMMU's), scatter/gather direct memory access (DMA) and reserved static memory at boot time. But these solutions have its own drawbacks such as, IOMMU requires hardware. However, the configuration of additional hardware's increases the cost. The power consumption of the system and the reserved static memory in the system goes waste when not in used for specific purpose. It is very difficult to access contiguous memory in low-end devices that are unable to provide real contiguous memory. There is one existing method called contiguous memory allocator (CMA), which provides dynamic contiguous memory. It overcomes most of the problems but CMA itself has some drawbacks, which do not provide the guarantee of failure in future of contiguous memory. The motivation behind this study is to review existing contiguous memory allocation (CMA) method by identifying and removing its drawbacks.
Uploads
Papers by Anmol Suryavanshi