The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
There is a huge discrepancy between off-the-shelf (COTS) hardware architectures and requirements for embedded industrial applications. Industrial systems are getting more complex by the day, and an interaction of highly diverse components within these systems is unavoidable. An implementation of such systems on COTS hardware is challenging. Platforms based on single-core CPUs is becoming limited,...
Section 2. Information and communication technologies. IEEE-paper. The automatic synthesis method of the timeparametrized (timing) parallel programs for the multiprocessing computers is suggested. The synthesis method support architecture and configuration of the computers with true shared and distributed memory as well as the users demands and limitations (time of task solution or numbers of processors...
This paper analyzed the application of embedded computer system in the field of electronic measurement instrument. The general work principle of an instrument was firstly introduced. The characteristics of common embedded computer system were briefly discussed. The emphasis was put on the considerations for the platform design of typical electronic measurement instrument. According to the new intelligent...
ARM embedded system can achieve a higher degree of integration, it has the advantages of small volume and low power consumption, which has gradually become one of the important products of information industry. In this paper, we introduce the overall design scheme of ARM and software. We provide an efficient solution to meet the request of even text materials when using camera. To turn on the camera...
Article describes the architecture design of user authentication system. The key features of architecture is resistance to changes in architectural and infrastructural scopes. That allows to control the functionality of the system and gives possibility to change it without special knowledge and the additional costs, to implement better support for devices from different manufactures. In addition,...
Process of development complex electronic control units (ECUs) is usually complex and requires several iterations (releases). After each iteration, it is necessary to perform detailed testing and verification of all components in a testing environment that is as similar as possible to the real system. For this kind of testing it is recommended to use the automated testing environment that generates...
The rapid serial visual presentation (RSVP) paradigm is a method that can be used to extend the P300 based brain computer interface (BCI) approach to enable high throughput target image recognition applications. The method requires high temporal resolution and hence, generating reliable and accurate stimulus triggers is critical for high performance execution. The traditional RSVP paradigm is normally...
This paper presents the design, development and analysis of a game for computer literacy. Specifically, the game addresses educational objectives included in the curriculum of non-technological careers, such as the identification and analysis of concepts related to basic hardware components of a computer. These objectives are joined with those of a video game, i.e., live an attractive, motivating...
Real-time systems play a major role in the realm of industrial automation. It is predicted for the number of smart interconnected devices that participate in such systems to grow significantly in the future. This development is also referred to as Industrial Internet of Things (IIoT) or Industry 4.0. The high number of devices results in highly distributed applications. Therefore, it is no longer...
Hardware attack is becoming an important scenario in the system design. Pupils who study design of electronic and computer systems must know this scenario and possible solutions against this kind of attacks. This work is a set of exercises to know some vulnerabilities in electronic and computer systems depending on the behavioral implementation. Two cases of study will be considered: timing analysis...
Embedded systems for wearable robotics are ideally low-cost, lightweight, miniature, reliable and safe. They have high peak output and negligible standby power, are simple to use and program, can support high-performance real-time control loops and accept additional degrees of freedom, input and output devices. However, practical solutions cannot accommodate all of these criteria and compromises are...
In a search and rescue scenario, an expeditious response is critical since the radius of the search area increases by roughly 3 km per hour while the life expectancy of the lost individual decreases. To find the object of the search as quickly as possible, the incident commander creates an overlay probability map identifying high priority search areas and develops a search plan that allocates search...
To accelerate research and development of the autonomous capabilities of micro aerial vehicles we have developed flight control framework, ROSflight, as a research tool. ROSflight makes development of autopilot code easier and more efficient by minimizing the use of embedded systems, incorporating the Robot Operating System and using off-the-shelf and open-source hardware and software. Motivation...
Currently informatics resources are facing major security challenges carried out by hackers or computer criminals, which are increasing in number and improving their methods of attacking computer systems. For this reason, Equipment Computer Incident Response Teams (CSIRT) has been created to respond to several attacks in accidents or security breaches in the information resources of organizations...
A problem of porting of parallel applications from one reconfigurable computer system to another is considered in the paper. The reconfigurable computer systems can have different soft-architectures and different configurations, which are used for implementation of the application. A new method of porting of parallel applications, which allows estimation of possibility of porting from an initial soft-architecture...
Serial number is a unique number given to a product which can be used for product identification and inventory management. Information about the product may be its manufacturing date, expiry date, place of manufacture and so on. Some companies use serial numbers to keep track on the number of products which a retailer is authorized to sell. Thus serial number identification becomes an important part...
With enterprises collecting feedback down to every possible detail, data repositories are being over flooded with information. In-order to access valuable information, these data should be processed using sophisticated statistical analysis. Traditional analytical tools, existing statistical software and data management systems find it challenging to perform deep analysis upon large data libraries...
The efficiency of a System — On — Chip (SoC) depends upon the arrangement of different components on the chip. In order to get full operational capability, the communication between these components must incur less cost: latency and delay. Traditionally these components are connected via shared bus, which becomes a bottleneck. To overcome this bottleneck a new era has begun called the Network — on...
Signed digit representation is vital for implementation of fast arithmetic algorithm and efficient hardware realization. Redundant binary (RB) number representation is the most widely used technique for representation of signed digit number. Again RB representation has ability to provide carry propagation free addition. In this paper we have presented an efficient modified redundant binary (MRB) adder...
The dedicated short-range communication (DSRC) plays important role in modern intelligent transportation system. The DSRC standards generally adopt FM0 and Manchester encoding technique to reach dc balance and enhance the signal reliability. Same properties are possessed by Miller and inverted Manchester encoding. Therefore, this two techniques can be added in existing FM0/Manchester encoding module...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.