Search results for "Embedded system"
showing 10 items of 291 documents
A Parallel Face Detection System Implemented on FPGA
2007
In this paper, we introduce a methodology for designing a system for face detection and its implementation on FPGA. The chosen face detection method is the well-known convolutional face finder (CFF) algorithm, which consists in a pipeline of convolutions and subsampling operations. Our goal is to define a parallel architecture able to process efficiently this algorithm. We present a dataflow based architecture algorithm adequation (AAA) methodology implemented using the SynDEx software, in order to find the best compromise between the processing power and functionality requirement of each processor element (PE), and the efficiency of algorithm parallelization. We describe a first implementa…
MAClets: Active MAC Protocols over hard-coded devices
2012
We introduce MAClets, software programs uploaded and executed on-demand over wireless cards, and devised to change the card's real-time medium access control operation. MAClets permit seamless reconfiguration of the MAC stack, so as to adapt it to mutated context and spectrum conditions and perform tailored performance optimizations hardly accountable by an once-for-all protocol stack design. Following traditional active networking principles, MAClets can be directly conveyed within data packets and executed on hard-coded devices acting as virtual MAC machines. Indeed, rather than executing a pre-defined protocol, we envision a new architecture for wireless cards based on a protocol interpr…
Smart Monitoring for Semantic Wireless (SCADA/DCS) Systems with Semantic SNMP Protocol.
2015
International audience; n this paper we propose a new implementation of SNMP protocol through (WS) and SOAP protocol, for wireless semantic (SCADA/DCS) systems and (IT-SCADA) platform monitoring. (WS) and SOAP may run on top of secure transport services implemented through protocols like HTTPS combined with industrial protocols as (DNP3, SOAP, ISM BAND, and ZIGBEE).We chose ZIGBBE wireless protocol for implementing our semantic security (IT-SCADA) management platform with semantic SNMP protocol via WS. To detect and infiltrate wireless radio network and semantic attacks, the use of (WS) gateways is needed to include SNMP devices into (WS) based management architecture. The evaluation shows …
Web Monitoring System and Gateway for Serial Communication PLC
2012
Abstract An industrial process requires interacting with the rest of the plant, being able to exchange data with other devices and monitoring systems in order to optimize production, reporting information and providing control capabilities to distant users. Internet, and, especially web browsers are an excellent tool to provide information for remote users, allowing not only monitoring but also controlling the industrial process as an SCADA software or HMI system. The proposed system does not need specific proprietary software and its associated license costs. In this work, a webserver system is implemented under a Freescale microcontroller, acting as a gateway for a simple PLC with single …
Road traffic detection using wireless noise sensors
2012
In this paper we present our experimental result of using wireless noise sensor network (WNSN) to detect road traffic. With the features implemented in our network such as multipoint measuring, synchronization, real-time data availability, and strict compliance of sound level meter (SLM) standard IEC 61672:2003, we assert the possibility of using WNSN to detect road traffic, such as vehicle amount, size, and velocity. This application can be extended and integrated as a part of Intelligent Transportation System (ITS).
Towards a Dual-mode Adaptive MAC Protocol (DMA-MAC) for Feedback-based Networked Control Systems
2014
Abstract Automated control systems play an important part in many industrial domains and the medium used for communication between devices in these systems is in transition from wired to wireless for cost reasons. Control systems have strict requirements on delay, throughput, and reliability, that vary with time during operation. Addressing these requirements requires predictable and robust protocols to be employed, and they must be adaptive to the varying states of the controlled process. In this article, we propose a dual-mode adaptive medium access control protocol that caters for two main operation modes in control systems: the steady mode operation, and the transient mode operation. We…
Simultaneous ranging and self-positioning in unsynchronized wireless acoustic sensor networks
2016
Automatic ranging and self-positioning is a very desirable property in wireless acoustic sensor networks, where nodes have at least one microphone and one loudspeaker. However, due to environmental noise, interference, and multipath effects, audio-based ranging is a challenging task. This paper presents a fast ranging and positioning strategy that makes use of the correlation properties of pseudonoise sequences for estimating simultaneously relative time-of-arrivals from multiple acoustic nodes. To this end, a proper test signal design adapted to the acoustic node transducers is proposed. In addition, a novel self-interference reduction method and a peak matching algorithm are introduced, a…
Enabling Cognitive-Radio Paradigm on Commercial Off-The-Shelf 802.11 Hardware
2013
Cognitive Radio paradigm (CR) has been recognized as key enabler for next generation wireless networking: the pos- sibility to access the limited radio spectrum in an oppor- tunistic manner allows secondary users to boost their trans- mission performance without interfering with existing pri- mary networks. Full testing and experimenting with this paradigm, however, is still a tough task, given either the i) limited capabilities above the PHY layer of cheap SDR so- lutions, or the ii) heavy investment required for setting up multi-node testbeds powered by FPGAs. In this demo we show how we leveraged our Wireless MAC Processor archi- tecture to tackle the two issues at the same time, providi…
Biometric sensors rapid prototyping on field-programmable gate arrays
2015
AbstractBiometric user authentication in large-scale distributed systems involves passive scanners and networked workstations and databases for user data acquisition, processing, and encryption. Unfortunately, traditional biometric authentication systems are prone to several attacks, such as Replay Attacks, Communication Attacks, and Database Attacks. Embedded biometric sensors overcome security limits of conventional software recognition systems, hiding its common attack points. The availability of mature reconfigurable hardware technology, such as field-programmable gate arrays, allows the developers to design and prototype the whole embedded biometric sensors. In this work, two strong an…
NoC based virtualized FPGA as cloud Services
2016
International audience; Web-based applications are increasingly demanding many computationally intensive services. On the other hand, FPGA-based hardware accelerators(HwAcc) provide good performance in accelerating computationally intensive applications. In addition, some FPGAs support a dynamic partial reconfig-uration (DPR) techniques to virtualize and share the FPGA underlying hardware resources in time multiplexing during run-time to save resource and power consumption. Integrating FPGA in a cloud environment is an indispensable way to improve efficiency and provide acceleration services to demanding users. More importantly, in recent years it was proved that FPGA resources deployed in …