• Title/Summary/Keyword: firmware

Search Result 238, Processing Time 0.02 seconds

Design and Implementation of Communication Module for Distributed Intelligence Control Using LonWorks (LonWorks를 이용한 분산 지능 제어를 위한 통신 모듈의 설계 및 구현)

  • Choi Jae-Huyk;Lee Tae-Oh
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.8 no.8
    • /
    • pp.1654-1660
    • /
    • 2004
  • In this paper, we describes the design and implementation of LonWorks communication module for distributed intelligent control using LonWorks technology of Echelon. LonWorks communication module can be divided hardware and firmware. First, hardwares is divided into microcontroller attaching sensors and LonWorks components for working together control network and data network. Hardwares are consisted of neuron chip, microcontroller, transceiver, LONCard. Second, operating firmware is realized with neuron C using NodeBulider 3.0 development tool. Produced and implemented LonWorks communication module is pretested using LTM-10A, Gizmo 4 I/O board, parallel I/O Interface. For field test, microcontroller module part is tested by HyperTerminal, communication procedure in data network is certified by transmitting and receiving short message using LonMaker for Windows tool. Herewith, LON technology is based on network communication technique using LonWorks.

A Program Code Compression Method with Very Fast Decoding for Mobile Devices (휴대장치를 위한 고속복원의 프로그램 코드 압축기법)

  • Kim, Yong-Kwan;Wee, Young-Cheul
    • Journal of KIISE:Software and Applications
    • /
    • v.37 no.11
    • /
    • pp.851-858
    • /
    • 2010
  • Most mobile devices use a NAND flash memory as their secondary memory. A compressed code of the firmware is stored in the NAND flash memory of mobile devices in order to reduce the size and the loading time of the firmware from the NAND flash memory to a main memory. In order to use a demand paging properly, a compressed code should be decompressed very quickly. The thesis introduces a new dictionary based compression algorithm for the fast decompression. The introduced compression algorithm uses a different method with the current LZ method by storing the "exclusive or" value of the two instructions when the instruction for compression is not equal to the referenced instruction. Therefore, the thesis introduces a new compression format that minimizes the bit operation in order to improve the speed of decompression. The experimental results show that the decoding time is reduced up to 5 times and the compression ratio is improved up to 4% compared to the zlib. Moreover, the proposed compression method with the fast decoding time leads to 10-20% speed up of booting time compared to the booting time of the uncompressed method.

A Method of Image Display on Cellular Broadcast Service (재난문자 서비스에서의 이미지 표출 방안)

  • Byun, Yoonkwan;Lee, Hyunji;Chang, Sekchin;Choi, Seong Jong;Pyo, Kyungsoo
    • Journal of Broadcast Engineering
    • /
    • v.25 no.3
    • /
    • pp.399-404
    • /
    • 2020
  • The Disaster text service is a text-based service for public alert. But, foreigners who are not familiar with korean can not understand exactly the disaster text messages provided. Using multimedia information such as images is expected to solve this problem. However, the current disaster message service method is not suitable for multimedia information delivery. This study proposes a firmware-based disaster character service method for displaying disaster image in a terminal. A device using this method should store images corresponding to the type of disaster and use special characters to inform the presentation of image in a terminal. This approach can be implemented in the new firmware installed device and it can be work with the existing device.

A Study on the Development of Smart Control Valve (스마트 컨트롤 밸브 개발에 관한 연구)

  • Choi, Young-Gyu
    • The Journal of Korea Institute of Information, Electronics, and Communication Technology
    • /
    • v.12 no.6
    • /
    • pp.582-590
    • /
    • 2019
  • As Korea's low fertility and aging progress, Korea is facing a social change such as an increase of one generation by entering an aging society that has raised 14% of the population. An effective way to prevent a gas fire accident caused by an increase in one generation in an aging society is to install a control valve to forcibly shut off the gas after a set time. In this study, we developed a valve that can be opened and closed by rotating the valve left and right by transmitting power to the worm gear and the helical gear by using a motor by pressing the switch. It is easy to assemble and inspect by developing a dedicated valve that is easy to attach and detach. It was developed to enhance competitiveness by reducing cost by reducing the number of parts and product size. In addition, through endurance test, it was developed to be used for more than 9 years by repeating ON / OFF once every 12 seconds so that it can operate stably for 10,000 times for 34 hours. The instrument and PCB were designed using solid works and Altium Designer tools. Firmware development was developed in IAR Embedded Workbench environment.

A Novel Implementation of Fault-Tolerant Ethernet NIC (Network Interface Card) Using Single MAC (단일 MAC을 이용한 자동 고장 극복 Ethernet NIC (Network Interface Card) 장치 구현)

  • Kim, Se-Mog;Pham, Hoang-Anh;Lee, Dong-Ho;Rhee, Jong Myung
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.37C no.11
    • /
    • pp.1162-1169
    • /
    • 2012
  • One of the important operational requirements for mission critical Ethernet networked system is having the fault tolerant capability. Such capability can be obtained by equipping multiport Network Interface Card (NIC) in each node in the system. Conventional NIC uses two or more Media Access Controls (MACs) and a co-processor for the MAC switching whenever an active port fails. Since firmware is needed for the co-processor, longer fail-over switching and degraded throughput can be generally expected. Furthermore the system upgrading requiring the firmware revision in each tactical node demands high cost. In this paper we propose a novel single MAC based NIC that does not use a co-processor, but just use general discrete building blocks such as MAC chip and switching chip, which results in better performances than conventional method. Experimental results validate our scheme.

Development of a Kit for Realtime transmission of data acquired by Earthquake accelerometers (지진가속도 계측기의 실시간 자료 전송 Kit 개발)

  • Heo, Jeongpil;Kim, Kiseog;Lim, Inseub;Jin, Jocheol
    • Journal of the Society of Disaster Information
    • /
    • v.10 no.2
    • /
    • pp.254-262
    • /
    • 2014
  • KISStool is developed and established by KIGAM, in order to link and share the earthquake data easily with institutes related, this study includes the development of a KISStool program format and protocol supporting Kit. The Kit has functions such as transforming and sending a seismic data. The functions of the kit are implemented in modules, which are running on the realtime basis. The firmware is embedded into the Kit, which transforms the seismic data into the formats, miniSEED and QSCD20. These data are sent to KISStool program. We have confirmed the results of the data transforming, transmissions and storage functions are conducted normally, the speed of transmission shows same level when comparing with a standard system. We expect that the firmware developed in this study will have high usability not only for linking with KISStool program through being embedded into incompatible digitizers, but also for improving performance of older ones.

A Study of Acquisition and Analysis on the Bios Firmware Image File in the Digital Forensics (디지털 포렌식 관점에서 BIOS 펌웨어 이미지 파일 수집 및 분석에 관한 연구)

  • Jeong, Seung Hoon;Lee, Yun Ho;Lee, Sang Jin
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.5 no.12
    • /
    • pp.491-498
    • /
    • 2016
  • Recently leakages of confidential information and internal date have been steadily increasing by using booting technique on portable OS such as Windows PE stored in portable storage devices (USB or CD/DVD etc). This method allows to bypass security software such as USB security or media control solution installed in the target PC, to extract data or insert malicious code by mounting the PC's storage devices after booting up the portable OS. Also this booting method doesn't record a log file such as traces of removable storage devices. Thus it is difficult to identify whether the data are leaked and use trace-back technique. In this paper is to propose method to help facilitate the process of digital forensic investigation or audit of a company by collecting and analyzing BIOS firmware images that record data relating to BIOS settings in flash memory and finding traces of portable storage devices that can be regarded as abnormal events.

The Verification Method for Missing Software Standardization in Weapon System - Focused on Firmware (무기체계 소프트웨어 규격화 누락여부 검증 방안 - 펌웨어 중심으로)

  • Song, Chi-Hoon
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.22 no.3
    • /
    • pp.310-315
    • /
    • 2021
  • In the case of weapon systems used by the military, defense standards are applied for economical and efficient procurement, management, and maintenance. Defense specifications are documents describing procedures and methods for determining whether technical requirements for products and services are consistent and apply to the production of weapon systems, quality assurance, and configuration management. Software is also subject to defense specifications, and is documented and managed in the same way as other defense specifications. Sometimes it happened to be standardized without some(or all) software. In this case, a competitive contract is impossible and it may affect the quality of weapon systems because the manufacturer arbitrarily changes the software without prior approval. So, software standardization is required, but it is very difficult to verify for firmware installed in hardware. This paper proposed a verification method for g software standardization, and we expect it will contribute to the efficient production and quality assurance of weapon systems.

A Taxonomy of Embedded Systems (임베디드 시스템의 분류)

  • So, Sun Sup;Son, Kyung A;Eun, Seongbae
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.24 no.6
    • /
    • pp.818-825
    • /
    • 2020
  • The embedded system can be defined as a special purpose system with a built-in computer, and has a wide variety of applications such as home appliances, office equipment, and weapon systems. A well-defined taxonomy in a specific field is advantageous for learning and education, however, the classification scheme for embedded systems is difficult to find. In this paper, we propose a taxonomy for embedded systems. First, the generalized structure of the embedded system was presented. And, it is divided into two parts: "firmware based" and "embedded OS based". In addition, according to the characteristics of embedded system applications, it is divided into two categories: "non-dependable" application and "dependable" application, which makes 4 planes. We describe the features of each quadrant and show that the classification is well suited by showing examples. Our taxonomy can be used to set teaching and learning methods of embedded systems.

An Implementation of a RFID Reader Firmware for ISO/IEC 18000-6 Type B Specification (ISO/IEC18000-6 Type B 규격에 적합한 리더 펌웨어 개발)

  • Yang, Jing-Gil;Bae, Sung-Woo;Jung, Myung-Sub;Jang, Byung-Jun;Kim, Jun-O;Park, Jun-Seok;Seong, Yeong-Rak;Oh, Ha-Ryoung
    • Proceedings of the IEEK Conference
    • /
    • 2005.11a
    • /
    • pp.1039-1042
    • /
    • 2005
  • Recently, a considerable number of studies have been made on the $RFID^{[1-6]}$ systems. RFID is a technique of identifying an object using radio frequency transmission. The technology can be used to identify, track, sort or detect a wide variety of objects. The RFID system is composed of two main elements: a reader and a tag. Tags can either be active (powered by battery) or passive (powered by the reader field). The passive tags communicate back to the reader with a technique called 'backscatter'. RFID technology can be applied to the supply chain, security, logistics industry and etc. Especially, UHF RFID is worth noticing because of its relatively long identification range and commercial UHF RFID systems are under development. In this paper, we designed and implemented a UHF RFID reader firmware for ISO/IEC 18000-6 Type B specification.

  • PDF