• Title/Summary/Keyword: embedded software

Search Result 1,314, Processing Time 0.027 seconds

Beam Scheduling and Task Design Method using TaP Algorithm at Multifunction Radar System (다기능 레이다 시스템에서 TaP(Time and Priority) 알고리즘을 이용한 빔 스케줄링 방안 및 Task 설계방법)

  • Cho, In-Cheol;Hyun, Jun-Seok;Yoo, Dong-Gil;Shon, Sung-Hwan;Cho, Won-Min;Song, Jun-Ho
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.21 no.1
    • /
    • pp.61-68
    • /
    • 2021
  • In the past, radars have been classified into fire control radars, detection radars, tracking radars, and image acquisition radars according to the characteristics of the mission. However, multi-function radars perform various tasks within a single system, such as target detection, tracking, identification friend or foe, jammer detection and response. Therefore, efficient resource management is essential to operate multi-function radars with limited resources. In particular, the target threat for tracking the detected target and the method of selecting the tracking cycle based on this is an important issue. If focus on tracking a threat target, Radar can't efficiently manage the targets detected in other areas, and if you focus on detection, tracking performance may decrease. Therefore, effective scheduling is essential. In this paper, we propose the TaP (Time and Priority) algorithm, which is a multi-functional radar scheduling scheme, and a software design method to construct it.

Development of X-Ray Array Detector Signal Processing System (X-Ray 어레이 검출 모듈 신호처리 시스템 개발)

  • Lim, Ik-Chan;Park, Jong-Won;Kim, Young-Kil;Sung, So-Young
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.23 no.10
    • /
    • pp.1298-1304
    • /
    • 2019
  • Since the 9·11 terror attack in 2001, the Maritime Logistics Security System has been strengthened and required X-ray image for every imported cargos from manufacturing countries to United States. For scanning cargos, the container inspection systems use high energy X-rays for examination of contents of a container to check the nuclear, explosive, dangerous and illegal materials. Nowadays, the X-ray cargo scanners are established and used by global technologies for inspection of suspected cargos in the customs agency but these technologies have not been localized and developed sufficiently. In this paper, we propose the X-ray array detector system which is a core component of the container scanning system. For implementation of X-ray array detector, the analog and digital signal processing units are fabricated with integrated hardware, FPGA logics and GUI software for real-time X-ray images. The implemented system is superior in terms of resolution and power consumption compared to the existing products currently used in ports.

Website and Digital Content between Material Property and Intellectual Ownership Rights within the Legal Regulation of Internet

  • Azab, Rania S.
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.2
    • /
    • pp.424-435
    • /
    • 2022
  • When the owners of the intellectual property rights of digital content have lost control over it in the digital environment, there emerged fears that the intellectual property laws, especially copyright law, would not be effective as in the material (Offline ) world. The reason is that the digital environment helps to reproduce copies in high quality and at almost no cost, while copyright law protection has been limited to programs embedded in CDs. According to copyright laws, the owner of the program did not have the right to prevent buyers of the initial physical copy of the program from copying and reselling it to more than one individual without the permission of the original owner. As a result, business owners have invented the idea of licensing digital content and programs instead of selling them. They set out terms that serve their commercial interests regardless of their abuse to intellectual property laws or even the rules of the traditional contract to sell a material property. The abuse has resulted from the way those terms are concluded and the heavy rules that are unfair to consumer rights. Therefore, business owners insisted on dealing with the website and its programs and digital content as material property. Here raises the question of whether the website and its digital content are subject to the protection of copyright law or the rules of the traditional contract or licensing contracts. As the answer to this question affects the protection of consumer rights, is it possible to find a balance between it and the protection of the owners of digital programs' rights.That is what we will discuss in this paper.

Vehicle ECU Design Incorporating LIN/CAN Vehicle Interface with Kalman Filter Function (LIN/CAN 차량용 인터페이스와 칼만 필터 기능을 통합한 차량용 ECU 설계)

  • Jeong, Seonwoo;Kim, Yongbin;Lee, Seongsoo
    • Journal of IKEEE
    • /
    • v.25 no.4
    • /
    • pp.762-765
    • /
    • 2021
  • In this paper, an automotive ECU (electronic control unit) with Kalman filter accelerator is designed and implemented. RISC-V is exploited as a processor core. Accelerator for Kalman filter matrix operation, CAN (controller area network) controller for in-vehicle network, and LIN (local interconnect network) controller are designed and embedded. Kalman filter operation consists of time update process and measurement update process. Current state variable and its error covariance are estimated in time update process. Final values are corrected from input measurement data and Kalman gain in measurement update process. Usually floating-point multiplication is exploited in software implementation, but fixed-point multiplier considering accuracy analysis is exploited in this paper to reduce hardware area. In 28nm silicon fabrication, its operating frequency, area, and gate counts are 100MHz, 0.37mm2, and 760k gates, respectively.

A Survey of Application Layer Protocols of Internet of Things

  • bibi, Nawab;Iqbal, Faiza;Akhtar, Salwa Muhammad;Anwar, Rabia;bibi, Shamshad
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.11
    • /
    • pp.301-311
    • /
    • 2021
  • The technological advancements of the last two decades directed the era of the Internet of Things (IoT). IoT enables billions of devices to connect through the internet and share their information and resources on a global level. These devices can be anything, from smartphones to embedded sensors. The main purpose of IoT is to make devices capable of achieving the desired goal with minimal to no human intervention. Although it hascome as a social and economic blessing, it still brought forward many security risks. This paper focuses on providing a survey of the most commonly used application layer protocols in the IoT domain, namely, Constrained Application Protocol (CoAP), Message Queuing Telemetry Transport (MQTT), Advanced Message Queuing Protocol (AMQP), and Extensible Messaging and Presence Protocol (XMPP). MQTT, AMQP, and XMPP use TCP for device-to-device communication, while CoAP utilizes UDP to achieve this purpose. MQTT and AMQP are based on a publish/subscribe model, CoAP uses the request/reply model for its structuring. In addition to this, the quality of service provision of MQTT, AMQP, and CoAP is not very high, especially when the deliverance of messages is concerned. The selection of protocols for each application is very a tedious task.This survey discusses the architectures, advantages, disadvantages, and applications of each of these protocols. The main contribution of this work is to describe each of the aforementioned application protocols in detail as well as providing their thorough comparative analysis. This survey will be helpful to the developers in selecting the protocol ideal for their system and/or application.

Design of Robot Arm for Service Using Deep Learning and Sensors (딥러닝과 센서를 이용한 서비스용 로봇 팔의 설계)

  • Pak, Myeong Suk;Kim, Kyu Tae;Koo, Mo Se;Ko, Young Jun;Kim, Sang Hoon
    • KIPS Transactions on Software and Data Engineering
    • /
    • v.11 no.5
    • /
    • pp.221-228
    • /
    • 2022
  • With the application of artificial intelligence technology, robots can provide efficient services in real life. Unlike industrial manipulators that do simple repetitive work, this study presented design methods of 6 degree of freedom robot arm and intelligent object search and movement methods for use alone or in collaboration with no place restrictions in the service robot field and verified performance. Using a depth camera and deep learning in the ROS environment of the embedded board included in the robot arm, the robot arm detects objects and moves to the object area through inverse kinematics analysis. In addition, when contacting an object, it was possible to accurately hold and move the object through the analysis of the force sensor value. To verify the performance of the manufactured robot arm, experiments were conducted on accurate positioning of objects through deep learning and image processing, motor control, and object separation, and finally robot arm was tested to separate various cups commonly used in cafes to check whether they actually operate.

2-Stage Detection and Classification Network for Kiosk User Analysis (디스플레이형 자판기 사용자 분석을 위한 이중 단계 검출 및 분류 망)

  • Seo, Ji-Won;Kim, Mi-Kyung
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.26 no.5
    • /
    • pp.668-674
    • /
    • 2022
  • Machine learning techniques using visual data have high usability in fields of industry and service such as scene recognition, fault detection, security and user analysis. Among these, user analysis through the videos from CCTV is one of the practical way of using vision data. Also, many studies about lightweight artificial neural network have been published to increase high usability for mobile and embedded environment so far. In this study, we propose the network combining the object detection and classification for mobile graphic processing unit. This network detects pedestrian and face, classifies age and gender from detected face. Proposed network is constructed based on MobileNet, YOLOv2 and skip connection. Both detection and classification models are trained individually and combined as 2-stage structure. Also, attention mechanism is used to improve detection and classification ability. Nvidia Jetson Nano is used to run and evaluate the proposed system.

The Development of Rule-based AI Engagement Model for Air-to-Air Combat Simulation (공대공 전투 모의를 위한 규칙기반 AI 교전 모델 개발)

  • Minseok, Lee;Jihyun, Oh;Cheonyoung, Kim;Jungho, Bae;Yongduk, Kim;Cheolkyu, Jee
    • Journal of the Korea Institute of Military Science and Technology
    • /
    • v.25 no.6
    • /
    • pp.637-647
    • /
    • 2022
  • Since the concept of Manned-UnManned Teaming(MUM-T) and Unmanned Aircraft System(UAS) can efficiently respond to rapidly changing battle space, many studies are being conducted as key components of the mosaic warfare environment. In this paper, we propose a rule-based AI engagement model based on Basic Fighter Maneuver(BFM) capable of Within-Visual-Range(WVR) air-to-air combat and a simulation environment in which human pilots can participate. In order to develop a rule-based AI engagement model that can pilot a fighter with a 6-DOF dynamics model, tactical manuals and human pilot experience were configured as knowledge specifications and modeled as a behavior tree structure. Based on this, we improved the shortcomings of existing air combat models. The proposed model not only showed a 100 % winning rate in engagement with human pilots, but also visualized decision-making processes such as tactical situations and maneuvering behaviors in real time. We expect that the results of this research will serve as a basis for development of various AI-based engagement models and simulators for human pilot training and embedded software test platform for fighter.

Student Group Division Algorithm based on Multi-view Attribute Heterogeneous Information Network

  • Jia, Xibin;Lu, Zijia;Mi, Qing;An, Zhefeng;Li, Xiaoyong;Hong, Min
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.16 no.12
    • /
    • pp.3836-3854
    • /
    • 2022
  • The student group division is benefit for universities to do the student management based on the group profile. With the widespread use of student smart cards on campus, especially where students living in campus residence halls, students' daily activities on campus are recorded with information such as smart card swiping time and location. Therefore, it is feasible to depict the students with the daily activity data and accordingly group students based on objective measuring from their campus behavior with some regular student attributions collected in the management system. However, it is challenge in feature representation due to diverse forms of the student data. To effectively and comprehensively represent students' behaviors for further student group division, we proposed to adopt activity data from student smart cards and student attributes as input data with taking account of activity and attribution relationship types from different perspective. Specially, we propose a novel student group division method based on a multi-view student attribute heterogeneous information network (MSA-HIN). The network nodes in our proposed MSA-HIN represent students with their multi-dimensional attribute information. Meanwhile, the edges are constructed to characterize student different relationships, such as co-major, co-occurrence, and co-borrowing books. Based on the MSA-HIN, embedded representations of students are learned and a deep graph cluster algorithm is applied to divide students into groups. Comparative experiments have been done on a real-life campus dataset collected from a university. The experimental results demonstrate that our method can effectively reveal the variability of student attributes and relationships and accordingly achieves the best clustering results for group division.

Integrating Resilient Tier N+1 Networks with Distributed Non-Recursive Cloud Model for Cyber-Physical Applications

  • Okafor, Kennedy Chinedu;Longe, Omowunmi Mary
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.16 no.7
    • /
    • pp.2257-2285
    • /
    • 2022
  • Cyber-physical systems (CPS) have been growing exponentially due to improved cloud-datacenter infrastructure-as-a-service (CDIaaS). Incremental expandability (scalability), Quality of Service (QoS) performance, and reliability are currently the automation focus on healthy Tier 4 CDIaaS. However, stable QoS is yet to be fully addressed in Cyber-physical data centers (CP-DCS). Also, balanced agility and flexibility for the application workloads need urgent attention. There is a need for a resilient and fault-tolerance scheme in terms of CPS routing service including Pod cluster reliability analytics that meets QoS requirements. Motivated by these concerns, our contributions are fourfold. First, a Distributed Non-Recursive Cloud Model (DNRCM) is proposed to support cyber-physical workloads for remote lab activities. Second, an efficient QoS stability model with Routh-Hurwitz criteria is established. Third, an evaluation of the CDIaaS DCN topology is validated for handling large-scale, traffic workloads. Network Function Virtualization (NFV) with Floodlight SDN controllers was adopted for the implementation of DNRCM with embedded rule-base in Open vSwitch engines. Fourth, QoS evaluation is carried out experimentally. Considering the non-recursive queuing delays with SDN isolation (logical), a lower queuing delay (19.65%) is observed. Without logical isolation, the average queuing delay is 80.34%. Without logical resource isolation, the fault tolerance yields 33.55%, while with logical isolation, it yields 66.44%. In terms of throughput, DNRCM, recursive BCube, and DCell offered 38.30%, 36.37%, and 25.53% respectively. Similarly, the DNRCM had an improved incremental scalability profile of 40.00%, while BCube and Recursive DCell had 33.33%, and 26.67% respectively. In terms of service availability, the DNRCM offered 52.10% compared with recursive BCube and DCell which yielded 34.72% and 13.18% respectively. The average delays obtained for DNRCM, recursive BCube, and DCell are 32.81%, 33.44%, and 33.75% respectively. Finally, workload utilization for DNRCM, recursive BCube, and DCell yielded 50.28%, 27.93%, and 21.79% respectively.