2021 ◽  
Vol 7 (3) ◽  
Author(s):  
S.G. Bobkov

The problems of creating of high-performance embedded computing systems based on microprocessors KOMDIV is considered. Processor performance is dependent upon three characteristics: clock cycle, clock cycles per instruction, and instruction count. These characteristics for microprocessors KOMDIV are optimized using parameter performance/power consumption and requirements of embedded systems.


2013 ◽  
pp. 50-64
Author(s):  
Osman Hasan ◽  
Sofiène Tahar

The accurate reliability assessment of embedded systems has become a concern of overwhelming importance with their increasingly ubiquitous usage in safety-critical domains like transportation, medicine, and nuclear power plants. Traditional reliability analysis approaches of testing and simulation cannot guarantee accurate result and thus there is a growing trend towards developing precise mathematical models of embedded systems and to use formal verification methods to assess their reliability. This chapter is mainly focused towards this emerging trend as it presents a formal approach for the reliability assessment of embedded computing systems using a higher-order-logic theorem prover (HOL). Besides providing the formal probability theory based fundamentals of this recently proposed technique, the chapter outlines a generic reliability analysis methodology for embedded systems as well. For illustration purposes, two case studies have been considered, i.e., analyzing the reparability conditions for a reconfigurable memory array in the presence of stuck-at and coupling faults and assessing the reliability of combinational logic based digital circuits.


2013 ◽  
pp. 402-419 ◽  
Author(s):  
Elisavet Konstantinou ◽  
Panayotis E. Nastou ◽  
Yannis C. Stamatiou ◽  
Christos Zaroliagis

Embedded computing devices dominate our everyday activities, from cell phones to wireless sensors that collect and process data for various applications. Although desktop and high-end server security seems to be under control by the use of current security technology, securing the low-end embedded computing systems is a difficult long-term problem. This is mainly due to the fact that the embedded systems are constrained by their operational environment and the limited resources they are equipped with. Recent research activities focus on the deployment of lightweight cryptographic algorithms and security protocols that are well suited to the limited resources of low-end embedded systems. Elliptic Curve Cryptography (ECC) offers an interesting alternative to the classical public key cryptography for embedded systems (e.g., RSA and ElGamal), since it uses smaller key sizes for achieving the same security level, thus making ECC an attractive and efficient alternative for deployment in embedded systems. In this chapter, the processing requirements and architectures for secure network access, communication functions, storage, and high availability of embedded devices are discussed. In addition, ECC-based state-of-the-art lightweight cryptographic primitives for the deployment of security protocols in embedded systems that fulfill the requirements are presented.


2010 ◽  
Vol 164 ◽  
pp. 227-232 ◽  
Author(s):  
Egidijus Kazanavicius ◽  
Vygintas Kazanavicius ◽  
Laura Ostaseviciute

Embedded computing systems still remain one of the underlying priorities in worldwide research communities. This paper presents an agent-based approach for embedded real-time systems design based on a reusable framework. The essence of our work lies on smart environment domain. Jade - a Java-based middleware is selected as a platform, facilitating the development of multi-agent embedded systems framework. Generic system architecture, framework prototype implementation and, subsequently, smart refrigerator control application are demonstrated, reasoning that the proposed method is effective in dealing with challenges raised by issues in contemporary embedded system development.


2021 ◽  
Author(s):  
Thomas Preußer ◽  
Smitha Gautham ◽  
Abhi Rajagopala ◽  
Carl Elks ◽  
Alexander Weiss

Decades of advances in computer architecture, software-intensive applications and system integration have created significant challenges for embedded systems designers and test engineers. Intrusive software instrumentation and breakpoint-based debugging are often viewed as the primary options for observing operational system internals. This narrow sight creates complicated test flows and convoluted debugging procedures. Modern embedded computing systems offer Embedded Trace as the technological answer to the encountered observability conundrum. Although an integral part of virtually all modern processors, it is frequently overlooked. Its technical foundations are little known to application engineers, test engineers, and project managers. This article explains Embedded Trace as an essential technology in the testing and debugging toolbox. It highlights its capabilities, limitations and opportunities.


2021 ◽  
Author(s):  
Thomas Preußer ◽  
Smitha Gautham ◽  
Abhi Rajagopala ◽  
Carl Elks ◽  
Alexander Weiss

Decades of advances in computer architecture, software-intensive applications and system integration have created significant challenges for embedded systems designers and test engineers. Intrusive software instrumentation and breakpoint-based debugging are often viewed as the primary options for observing operational system internals. This narrow sight creates complicated test flows and convoluted debugging procedures. Modern embedded computing systems offer Embedded Trace as the technological answer to the encountered observability conundrum. Although an integral part of virtually all modern processors, it is frequently overlooked. Its technical foundations are little known to application engineers, test engineers, and project managers. This article explains Embedded Trace as an essential technology in the testing and debugging toolbox. It highlights its capabilities, limitations and opportunities.


2012 ◽  
Vol 1 (5) ◽  
pp. 115-117
Author(s):  
Jahnavi KRM Jahnavi KRM ◽  
◽  
Raghavendra Rao K ◽  
Padma Suvarna R

2019 ◽  
Vol 139 (7) ◽  
pp. 802-811
Author(s):  
Kenta Fujimoto ◽  
Shingo Oidate ◽  
Yuhei Yabuta ◽  
Atsuyuki Takahashi ◽  
Takuya Yamasaki ◽  
...  

Sign in / Sign up

Export Citation Format

Share Document