Search results for "Embedded"

showing 2 items of 412 documents

Conception en technologie CMOS d'un Système de Vision dédié à l'Imagerie Rapide et aux Traitements d'Images

2008

Our work presented in this thesis focuses on the design, testing and implementation of monolithics CMOS image smart sensors : The principle, performance and limitations. The hardware implementation of a vision smart system is the central link. HISIC is High Speed Image Capture with processing at pixel level. An experimental platform for instrumentation and evaluation of retina operators was conducted during this thesis. After a state of the smart sensors and CMOS retinas, the second part is dedicated to the study and design of the pixel image sensor HISIC. Two circuits were realized in CMOS technology. The first identied a new type of photo-detector, and the second, to create a prototype em…

vision artificielleimagerie rapiderecongurabilityprogrammability[SPI.NANO] Engineering Sciences [physics]/Micro and nanotechnologies/Microelectronicsparallélisme massifspeed imagingSystème embarquéartificial vision.image processing on focal planerecongurabilitéprogrammabilitéstandard CMOS technology[ SPI.NANO ] Engineering Sciences [physics]/Micro and nanotechnologies/Microelectronics[SPI.NANO]Engineering Sciences [physics]/Micro and nanotechnologies/MicroelectronicsEmbedded systemtraitements d'images sur plan focalmassive paralleltechnologie standard CMOS
researchProduct

Ontology and protocol secure for SCADA

2014

In this work, we present a semantic cyber security system and we study its semantic intelligent systems vulnerabilities, focusing on the semantic attacks. For resolving semantic problems we propose a security global solution for the new generation of SCADA systems. The proposed solution aims at protecting critical semantic SCADA processes from the effects of major failures and semantic vulnerabilities in the modern IT-SCADA network. We used a security block in the global network access point, security protocols deployed in different network (OSI) levels and security ontologies deployed in security devices. We used our mixed coordinates (ECC) cryptography solution, this is an encryption tech…

vulnerabilitiessecurity protocolsdata acquisitionencryption technologycyber securityembedded applicationssupervisory controlsemantic attackssemantic security blocksecurity ontology[INFO] Computer Science [cs]SOAP protocollow latencyModbus protocolECC cryptographySCADAcontrol systems[INFO.INFO-CR] Computer Science [cs]/Cryptography and Security [cs.CR]
researchProduct