Search results for "embedded systems"
showing 10 items of 69 documents
An Electronic Emulator of Combined Photovoltaic and Solar Thermal Systems
2010
An emulator of combined Photovoltaic and Solar Thermal (CPS) systems is presented. In order to carry out early testing on the design of such systems, a - microcontrolled based - hardware board has been designed, implemented and tested. This emulator is able run several typical daily solar irradiation patterns as a function of the seasons and a complete solar thermal and photovoltaic model that depends on a very flexible set of parameters characterizing the real CPS behaviour. By properly varying these parameters many different CPS models can easily be created and tailored to the energy performance needed for a predefined target application. Beside these functionalities, the CPS emulator is …
A Novel Architecture for Inter-FPGA Traffic Collision Management
2014
International audience; —with the increasing complexity of various communi-cations and applications, Network-On-Chip (NoC) is one of the most efficient communication structures. Multi-FPGA platforms are considered as the most appropriate experimental solutions to emulate a large size of MPSoCs (Multi-Processor System-on-Chip) based on a NoC. The deployment of the NoC into several FPGAs requires the use of inter-FPGA communication links. The number and performance of external links restrict the bandwidth of communication. Currently, the number of inter-FPGA signals is considered as a substantial problem in NoC implemented on Multi-FPGA architectures. In this paper, we propose the integration…
Engineering requirements for avionics of unmanned aerial system
Within the framework of the European Project WInSiC4AP, the Unmanned Aerial Vehicle (UAV) use case plays an important role in defining some of the specific constraints that on-board electronics systems must obey. Then it’s relevant to have clear view of the UAVs classification and their main characteristics especially with the focus of an Electrical UAV. Main component of the power supply are batteries, whose requirements must fulfil the tight design constraint such as lightweight, safety, pressure and temperature tolerance, cost effectiveness and cycle life. A quick look to available chemistry technology as well as market overview has been described. Regarding the power sub-system, the key…
An embedded iris recognizer for portable and mobile devices
2010
Software-intensive systems play an increasingly dominant role in our lives and daily activities. Several applications, in which a timely response to user and environment stimulus is essential, require real-time software intensive systems. Computation-intensive applications, such as video compression, control systems, security systems, result in significant growth for processor workload. To address the above issues, one possible solution is to design embedded specialized components. At the same time, the integration of new features in portable and mobile devices is rapidly increasing. Several services and applications require robust user authentication for access to services, data, and resou…
Modeling and Verification of Symbolic Distributed Applications Through an Intelligent Monitoring Agent
2022
Wireless Sensor Networks (WSNs) represent a key component in emerging distributed computing paradigms such as IoT, Ambient Intelligence, and Smart Cities. In these contexts, the difficulty of testing, verifying, and monitoring applications in their intended scenarios ranges from challenging to impractical. Current simulators can only be used to investigate correctness at source code level and with limited accuracy. This paper proposes a system and a methodology to model and verify symbolic distributed applications running on WSNs. The approach allows to complement the distributed application code at a high level of abstraction in order to test and reprogram it, directly, on deployed network…
A Multimodal Technique for an Embedded Fingerprint Recognizer in Mobile Payment Systems
2009
The development and the diffusion of distributed systems, directly connected to recent communication technologies, move people towards the era of mobile and ubiquitous systems. Distributed systems make merchant-customer relationships closer and more flexible, using reliable e-commerce technologies. These systems and environments need many distributed access points, for the creation and management of secure identities and for the secure recognition of users. Traditionally, these access points can be made possible by a software system with a main central server. This work proposes the study and implementation of a multimodal technique, based on biometric information, for identity management a…
Real-Time Object Detection in Embedded Video Surveillance Systems
2008
In this paper we report a new method to detect both moving objects and new stationary objects in video sequences. On the basis of temporal consideration we classify pixels into three classes: background, midground and foreground to distinguish between long-term, medium-term and short-term changes. The algorithm has been implemented on a hardware platform with limited resources and it could be used in a wider system like a wireless sensor networks. Particular care has been put in realizing the algorithm so that the limited available resources are used in an efficient way. Experiments have been conducted on publicly available datasets and performance measures are reported.
An affordable contactless security system access for restricted area
2016
International audience; We present in this paper a security system based on identity verification process and a low-cost smart camera , intended to avoid unauthorized access to restricted area. The Le2i laboratory has a longstanding experience in smart cameras implementation and design [1], for example in the case of real-time classical face detection [2] or human fall detection [3]. The principle of the system, fully thought and designed in our laboratory, is as follows: the allowed user presents a RFID card to the reader based on Odalid system [4]. The card ID, time and date of authorized access are checked using connection to an online server. In the same time, multi-modality identity ve…
Development of a High Irradiance LED Configuration for Small Field of View Motion Estimation of Fertilizer Particles
2015
International audience; Better characterization of the fertilizer spreading process, especially the fertilizer pattern distribution on the ground, requires an accurate measurement of individual particle properties and dynamics. Both 2D and 3D high speed imaging techniques have been developed for this purpose. To maximize the accuracy of the predictions, a specific illumination level is required. This paper describes the development of a high irradiance LED system for high speed motion estimation of fertilizer particles. A spectral sensitivity factor was used to select the optimal LED in relation to the used camera from a range of commercially available high power LEDs. A multiple objective …
Smart Monitoring for Semantic Wireless (SCADA/DCS) Systems with Semantic SNMP Protocol.
2015
International audience; n this paper we propose a new implementation of SNMP protocol through (WS) and SOAP protocol, for wireless semantic (SCADA/DCS) systems and (IT-SCADA) platform monitoring. (WS) and SOAP may run on top of secure transport services implemented through protocols like HTTPS combined with industrial protocols as (DNP3, SOAP, ISM BAND, and ZIGBEE).We chose ZIGBBE wireless protocol for implementing our semantic security (IT-SCADA) management platform with semantic SNMP protocol via WS. To detect and infiltrate wireless radio network and semantic attacks, the use of (WS) gateways is needed to include SNMP devices into (WS) based management architecture. The evaluation shows …