The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
In this work, a method to design STIM for sensor network system is proposed. Hardware selects TMS320F28335 as main controller. A common software implementation method is also presented. Electronic spreadsheet and independent interface configuration is the key research points to realize hot-plug function. After testing, system can be used in electric transmission line leakage current and voltage detection...
Internet of Thing (IoT) is growing rapidly with more devices connected to the Internet. One emerging group of these is called wearable devices. The wireless technologies used by wearable devices need to consider the long lasting of battery life. Consequently, Bluetooth Low Energy (BLE) has emerged as the wireless technologies for wearable devices due to its features of low power consumption. In this...
In the past, virtualisation, and with it the move toward the cloud, has had a strong influence on the ICT (Information Communication Technology) sector, and now seems set to revolutionise the telecommunications sector as well. The virtualisation into software artefacts of functions that would usually be deployed as hardware has come to be known as Network Function Virtualisation (NFV), and the European...
Inter-vehicle communication (IVC) is a key component enabling the autonomous driving vehicles. Standardization of IVC is advanced but yet improvements are still introduced. Congestion control is one of the sensitive topics. The IVC European standard ITS-G5 addresses the congestion issue enabled by a geo-networking protocol that exploits at networking level the geographic information. Implementation...
Because of the rapid development of EtherCAT as the standard fieldbus in control and automation and the increasing demands of low cost portable main controllers, we aim to assess the performance of an EtherCAT network in handling real-time demands using open source EtherCAT master protocol on open hardware platforms. In comparison to that of commercial products, the performance of open platforms is...
At the Paul Scherrer Institute (PSI) in Switzerland, cancer patients are treated with protons. Proton therapy at PSI has a long history and started in the 1980s. More than 30 years later, a new gantry has recently been installed in the existing facility. This new machine has been delivered by an industry partner. A big challenge is the integration of the vendor’s safety system into the existing PSI...
Software-defined networking (SDN) is an emerging and disruptive networking paradigm that emerged on campus networks but was soon recognized as having potential applicability in several other application areas, including Internet of Things (IoT) and Industrial IoT. Industrial IoT applications have requirements remarkably distinct from the ones of campus networks, particularly in what concerns timeliness...
Radio Frequency Identification (RFID) security has not been properly handled in numerous applications, such as in public transportation systems. In this paper, a methodology to reverse engineer and detect security flaws is put into practice. Specifically, the communications protocol of an ISO/IEC 14443-B public transportation card used by hundreds of thousands of people in Spain was analyzed. By applying...
This paper presents a summary and analysis deployment of a secure Intelligent Electronic Device (IED) management system at a utility in North America. The utility began their investigation into technologies and methodologies for securing their system for North America Reliability Corporation (NERC) Critical Infrastructure Protection (CIP) standards. This report is intended for anyone considering the...
Several debugging methods are available for FPGA design, including logical simulation and physical debug. We face the challenge to systematize and apply a simple methodology using these methods to develop a communication processing module for a distributed control system with real time constraints. This methodology must follow some restrictions as to be easy to learn, use only available tools and...
This paper proposed a platform for rapid prototyping of high-speed and low-power embedded applications in networking. The concept utilizes the FPGA with the embedded processor to benefit from software flexibility and high performance of hardware processing. In comparison with the NetFPGA-cube, the proposed uG4-150 platform has significantly lower power consumption, cost and size.
Clock synchronization is an important issue in wired and wireless networks as a common time basis is essential for coordinated activities of nodes in distributed systems. Typical applications demanding precise synchronization are Industrial Internet scenarios having real-time constraints, Wireless Sensor Networks (WSNs) where the nodes communicate only for a short period and can sleep the remaining...
The latest IEEE WLAN 802.11ad standard guarantees the multi giga bit throughput which is highest in the Wireless LAN (WLAN) technology. The system designed for such high performance will pose enough design challenges to make them consume low power. This can however be achieved by adopting low power management and control block in the digital part of the System on Chip (SoC) like Medium Access Control...
Compliance or conformance testing is basically a kind of an audit which is performed for the system to check whether all the specified standards are met or not. Implementation of conformance testers for the communication protocols is an important task, which is being solved in the majority of industrial companies that develop the communication equipment. On-board equipment always needs a proper testing...
The common DPU platform for ESA JUICE mission instruments is a hardware and software platform developed by Cobham Gaisler for the scientific instrument payloads of the European Space Agency Jupiter Icy Moons spacecraft. The hardware is based around the GR712RC dual-core LEON3-FT processor with GRSPW2 SpaceWire interfaces. To accompany the JUICE instrument hardware, a flight quality SpaceWire software...
System Verilog Assertions (SVA) is widely used by hardware designers and verification engineers to apply Assertion Based Verification (ABV) methodology on their hardware designs. However, the complexity in understanding different protocol standards in general and JEDEC memory protocol standards in specific imposes numerous difficulties on designers and verification engineers when translating design...
This tutorial presents hardware verification techniques for hyperproperties. The most prominent application of hyperproperties is information flow security: information flow policies characterize the secrecy and integrity of a system by comparing two or more execution traces, for example by comparing the observations made by an external observer on execution traces that result from different values...
A cloud provider provides, on-demand, physical computing resources to clients. It enables clients to improve their computing delivered resources in virtual machines. However, the cloud provider faces major problems impacting its correct operation. One of these problems is that a cloud provider cannot deliver more resources when it has not enough resources during peak hours. Another problem related...
Several network protocols require the ability to dynamically deploy, along a network path, stateful data, nicknamed “breadcrumbs”, used to forward packets on the reverse direction. This is the case of either classical reverse path forwarding schemes, as well as more recent information centric networking approaches. Perhaps surprisingly, this paper shows that such capability is already somewhat at...
The automotive industry is one of the most diversified, complex and important area into research and development software engineering solutions. Multimedia and infotainment systems, from nowadays cars, require more and more software and hardware resources which bring about the adaptation of the existing communication and diagnosis standards. The market wishes are moving towards wireless, affordable...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.