• Title/Summary/Keyword: Embedded-system

Search Result 4,525, Processing Time 0.028 seconds

Embedded Monitoring System using Bit-masking Technique (비트마스킹 기법을 이용한 임베디드 모니터링 시스템)

  • Shin Won;Kim Tae-Wan;Chang Chun-Hyon
    • The KIPS Transactions:PartD
    • /
    • v.13D no.4 s.107
    • /
    • pp.613-618
    • /
    • 2006
  • As the embedded software spreads in various areas, many development tools have been made to minimize the developing time. But these tools cannot be applicable to all the environment because they have been created for the specific platform. As such, this paper proposes an Embedded Monitoring System, which supports the various communication environment and removes the limitation of adaptability to the various platforms. Using the Code Inline technique, this system can perform the monitoring process. However, we should consider the optimization for the monitoring process and monitoring sensors because the technique has the monitoring sensor overhead. As such, this paper proposes an approach for initializing the monitoring process and a bit-masking technique for optimizing the monitoring sensor. The Embedded Monitoring System will be applicable to all the areas using embedded systems.

Design and Implementation of Flash Cryptographic File System Based on YAFFS (YAFFS 기반의 암호화 플래시 파일 시스템의 설계 및 구현)

  • Kim, Seok-Hyun;Cho, Yoo-Kun
    • Convergence Security Journal
    • /
    • v.7 no.4
    • /
    • pp.15-21
    • /
    • 2007
  • As the amount of flash memory being used in embedded device is increased and embedded devices become more important in many computing environments, embedded file system security becomes more important issue. Moreover embedded devices can be easily stolen or lost because of it's high portability. If the lost embedded device has very important information, there's no means to protect it except data encryption. For improving embedded devices' security this paper propose design and implementation of flash cryptographic file system. For this purpose YAFFS is used. By the modified YAFFS cryptographic file system, the security of embedded devices can be improved.

  • PDF

A Taxonomy of Embedded Systems (임베디드 시스템의 분류)

  • So, Sun Sup;Son, Kyung A;Eun, Seongbae
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.24 no.6
    • /
    • pp.818-825
    • /
    • 2020
  • The embedded system can be defined as a special purpose system with a built-in computer, and has a wide variety of applications such as home appliances, office equipment, and weapon systems. A well-defined taxonomy in a specific field is advantageous for learning and education, however, the classification scheme for embedded systems is difficult to find. In this paper, we propose a taxonomy for embedded systems. First, the generalized structure of the embedded system was presented. And, it is divided into two parts: "firmware based" and "embedded OS based". In addition, according to the characteristics of embedded system applications, it is divided into two categories: "non-dependable" application and "dependable" application, which makes 4 planes. We describe the features of each quadrant and show that the classification is well suited by showing examples. Our taxonomy can be used to set teaching and learning methods of embedded systems.

An Embedded System for Sensor Networks (센서 네트워크를 위한 임베디드 시스템)

  • Lee, Jong-Chan;Park, Sang-Joon
    • Convergence Security Journal
    • /
    • v.10 no.2
    • /
    • pp.37-41
    • /
    • 2010
  • The object of this paper is to design a embedded system based on sensor networks. The proposed system can manage the heating by sensing and analyzing the temperature and humidity in apartment house and others. For implementing this system, we devide JAVA API into the platform-independent JAVA part and platform-dependent native part for the implementation of JAVA API to manage the linux based embedded system devices, and focus on the control of the embedded system devices using JAVA API.

A Study on Embedded Operating System Security Technology for Ubiquitous Computing (유비쿼터스 컴퓨팅을 위한 임베디드 운영체제 보안 기술 연구)

  • Park, Jong-Hyuk
    • Journal of Korea Multimedia Society
    • /
    • v.13 no.8
    • /
    • pp.1194-1201
    • /
    • 2010
  • Currently embedded system has been widespreadly used in digital Set-top box, mobile phone, USN, etc and the significance of security has been increased due to be necessarily embedded in these all system. In this paper we propose new integrity verification scheme among the main security requirements in target system based on the korea TTA standard, security reference model for embedded operating system, published in december 2006. Moreover the proposed scheme is more effective than the previous scheme, Jung, et al.[2,6].

Development of an Image Tracking System Using an USB Camera on an Embedded System (USB Camera를 이용한 이미지 트래킹을 위한 Pan/Tilt 제어용 Embedded System 개발)

  • Kim, Hie-Sik;Nam, Chul;Ayurzana, Odgera;Ha, Kwan-Yong
    • Proceedings of the KIEE Conference
    • /
    • 2005.05a
    • /
    • pp.182-184
    • /
    • 2005
  • An embedded system has been applied to many fields including households and industrial sites. The embedded system is implemented fur image tracking in security area. This system supports a fixed IP far the reliable server operation on TCP/IP networks. A real time video image on the is analyzed to detect a certain invader who jumped into the observed area. The digital camera is connected at the USB host port of the target board. The video images from the video camera is continuously analyzed and displayed at the Linux web-server. The moving vector of the invaders on the continuous image frames is calculated and then it sends the calculated pan/tilt movement. That used Block matching algorithm and edge detection algorithm for past speed. And the displacement vector is used at pan/tilt motor control through RS232 serial cable. The experiment result showed tracking performance by the moving part speed of 10 to 150 pixels/sec.

  • PDF

A study on the Reliability System Software based on NHPP(Non-Homogeneous Poisson Process (비-동질 안정 프로세스 기반 임베디드 시스템 소프트웨어의 신뢰성 특성에 관한 연구)

  • 한상섭;백영구;이근석;전현덕;류호중;이기서
    • Proceedings of the KSR Conference
    • /
    • 2001.05a
    • /
    • pp.347-358
    • /
    • 2001
  • In this paper, we apply NHPP model example to s/w process in order to get to know s/w reliability. The test is constructed by a test zig of commercial product loaded real embedded system s/w. It is established to s/w reliability prediction and estimation of real-time embedded system s/w. It is computed the prediction value of cumulative failures, the failure intensity, the reliability and the estimation value of MTTF, Failure Rate. To the more realization of high reliability in the real-time embedded system s/w, if the embedded system s/w is ensured to the test coverage and constructed to stable s/w process & operating system, we can improve the performance and the reliability characteristic of the real-time embedded system s/w.

  • PDF

The implementation of database for high quality Embedded Text-to-speech system (고품질 내장형 음성합성 시스템을 위한 음성합성 DB구현)

  • Kwon, Oh-Il
    • Journal of the Institute of Electronics Engineers of Korea SP
    • /
    • v.42 no.4 s.304
    • /
    • pp.103-110
    • /
    • 2005
  • Speech Database is one of the most important part of Text-to-speech(TTS) system Especially, the embedded TTS system needs more small size of database than that of the server TTS system So, the compression and statistical reduction or database is a very important factor in the embedded TTS system But this compression and statistical reduction of database always rise a loss of quality of the synthesised speech. In this paper, we propose a method of constructing database for high quality embedded TTS system and verify the quality of synthesised speech with MOS(Mean Opinion Score) test.

A Study on Prime Air System for Korea (한국형 Prime Air System : 드론 쿠팡맨)

  • Kim, Wan-Soo;Lee, Jung-Hwan;Shin, Beom-Yong;Kang, Su-Me;Hwang, Kwang-il
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2019.10a
    • /
    • pp.904-906
    • /
    • 2019
  • 해외에서는 드론을 이용한 배달 서비스가 상용화되는 추세이지만, 한국에서는 여러 가지 한계점에 의해 서비스 개발이 침체하여 있는 상황이다. 이 문제를 해결하기 위해 창문에 카메라를 장착하여 드론이 촬영되고 있는 영상을 리눅스 서버에 전송하고, 딥러닝과 이미지 프로세싱을 통해 드론을 검출하고 택배를 받을 수 있는 위치로 조정한다. 조정이 완료되면 창문 개방 후 택배를 받는다.

Reliability analysis of an embedded system with multiple vacations and standby

  • Sharma, Richa;Kaushik, Manju;Kumar, Gireesh
    • International Journal of Reliability and Applications
    • /
    • v.16 no.1
    • /
    • pp.35-53
    • /
    • 2015
  • This investigation deals with reliability and sensitivity analysis of a repairable embedded system with standby wherein repairman takes multiple vacations. The hardware system consists of 'M' operating and 'S' standby components. The repairman can leave for multiple vacations of random length during its idle time. Whenever any operating unit fails, it is immediately replaced by a standby unit if available. Moreover, governing equations of an embedded system are constructed using appropriate birth-death rates. The vacation and repair time of repairman are exponentially distributed. The matrix method is used to find the steady-state probabilities of the number of failed components in the embedded system as well as other performance measures. Reliability indexes are presented. Further, numerical experiments are carried out for various system characteristics to examine the effects of different parameter. Using a special class of neuro-fuzzy systems i.e. Adaptive Network-based Fuzzy Interference Systems (ANFIS), we also approximate various performance measures. Finally, the conclusions and future research directions are provided.