The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Formal verification has become very useful and popular in last decade in area of embedded systems design and in analysis of critical systems. It can reveal common errors like deadlocks, starvation, check system invariants, but also verify more complex properties defined by LTL formulas whose writing may be very error prone for non expert users. To reduce the time-to-market for embedded systems and...
This paper focuses on the systematic design and development of an optimized embedded system platform from ground up to handle special real-time requirements of control applications. An embedded system is usually embedded as a part of a complete device including hardware and mechanical parts, and both the hardware system and the software system are tailored and optimized to realize specific functions...
A contourn descriptor generator algorithm implemented in embedded system of new generation to obtain shape characterization of manufactured rigid objects is presented in the paper. Acquisition and processing stages to obtain information about the shape of rigid object by way of a descriptor vector are shown in order to be implemented in a single hardware piece processor embedded system to obtain parallel...
The need for convergence between technology and shipbuilding processes is identified in the Brazilian shipbuilding industry so that it has a greater competitiveness against the shipyards belonging to the Tiger Cub Economies. In this perspective, wireless sensor networks and identification technologies have gained space regarding industrial solutions. This paper proposes an Internet of Things (IoT)...
Like all systems, multi-agent systems need to be verified during the design cycle. But the test of multi-agent systems is more diffi-cult than the test of classic software. Indeed, it implies to test more than agent functionalities: individual agent behavior, inter-action between agents and global system need to be tested. Sever-al testing methods compensate these difficulties, but do not cover all...
The report, Curriculum Guidelines for Undergraduate Degree Programs in Computer Engineering (CE2016), developed by the Association for Computing Machinery and the IEEE Computer Society, was released in December of 2016. This is one volume of a series of reports covering curricula for a variety of computing fields; it is a significant update of the previous version, CE2004. This paper discusses significant...
Recent technological advances allowed the word to construct several wearable products that can capture and process the human body bio-signals. The PPG signal becomes one of the most contenders in heart rate monitoring due to their prominent features, flexibility, effectiveness and low costs. This paper present a novel System of PPG Heart rate calculation based on FPGA, using the Pan and Tompkins as...
Self-healing ability is recognized as an important contributor in building embedded systems that require a high level of robustness and reliability, especially if they operate in an unpredictable environment or hard to reach places where any repair is difficult. This paper presents a systematical comparison of the state of the art biologically inspired approaches to self-healing in embedded systems...
This paper presents tools the author uses to enhance student motivation in a microcontroller-based embedded systems course. The course is offered as part of a requirement in a computer engineering degree program. In the traditional lecture-based teaching and learning process, information typically flows in one direction with very little active involvement by the students. There are a number of techniques...
This paper considers architecture and functionality of the embedded data acquisition system for automated beehive monitoring. A description of constructed sensor subsystems is given. Proposed solution acquires hive temperature, humidity and weight referring this data to the mobile application via wireless network. The system also performs an analysis of collected bee noises with artificial neural...
Today, both the rapid improvement of process technology and the arrival of new embedded systems with highperformance requirements, have led to making the current trend in processors manufacturing shift from single-core processors to multi-core processors. This trend has raised several challenges for reliability in safety-critical systems that operate in high-risk environments, making them more vulnerable...
When Agile development meets critical embedded systems, verification, validation and accreditation activities are impacted. Challenges such as tests increase or accreditation documents production have to be managed in terms of time and resources. In this paper, we highlight these challenges and present a continuous integration ecosystem that aims to tackle these issues. We report on how this approach...
Virtualization technology is well established in the server and desktop spaces, and has been spreading across embedded system market. This technology allows for the coexistence and execution of multiples operating systems on top of the same hardware platform, with proven technological and economic benefits. Hardware extensions for easing virtualization have been added into several commercial off-the-shelf...
Model-Based Testing rises hopes of project teams of meeting both eager time and budget constraints as well as achieving better system quality by thorough testing. However, toolchain and method impose a certain skill set on the project engineer. This paper presents a possible way forward and introduces the constraints to the system architecture.
The paper presents the system architecture, development and prototype implementation of a new integrated system for simulation of automated industrial processes using advanced technologies, in accordance with CPS/Industry 4.0 principles. The need to develop such a system is underscored by the interest of the educational stakeholders: students, faculty members, high-level industry partners, for an...
We proposes the development of a cyber-secure, Internet of Things (IoT), supply chain risk management architecture. The proposed architecture is designed to reduce vulnerabilities of malicious supply chain risks by applying machine learning (ML), cryptographic hardware monitoring (CHM), and distributed system coordination (DSC) techniques to mitigate the consequences of unforeseen (including general...
This paper gives a brief introduction to the use of Model-Based Design and the CONSENS modeling method in Embedded Hardware Design and illustrates the benefits.
The paper is devoted to the issues of design of secure cyber-physical systems based on embedded devices. It aims to develop a generalized approach to the design of secure systems based on embedded devices. Current approaches to design secure software and embedded devices are analyzed. The design lifecycle for secure embedded devices system is proposed. Advantages and disadvantages of the approach...
The toolflow presented in this demo was created to generate CGRA overlay architectures from either algorithm definitions (mainly for evaluation) or from a simple definition format. The output of the toolchain is always the complete definition of the hardware in VHDL and supplemental files providing information regarding the configuration and the interfaces of the created hardware. In the demo, we...
Code injection attacks are an undeniable threat in today's cyberworld. Instruction Set Randomization (ISR) was initially proposed in 2003. This technique was designed to protect systems against code injection attacks by creating an unique instruction set for each machine, thanks to randomization. It is a promising technique in the growing embedded system and Internet of Things (IoT) devices ecosystem,...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.