scholarly journals Capability Evaluation of Embedded Systems, Cell Phone Case Study

2010 ◽  
Vol 9 (10) ◽  
pp. 41-47
Author(s):  
Hamid Reza Naji ◽  
Hossein Farahmand ◽  
Masoud RashidiNejad
2004 ◽  
Vol 9 (3) ◽  
pp. 193-210
Author(s):  
Juan Antonio Maestro ◽  
Daniel Mozos ◽  
Raquel Dormido ◽  
Pedro Reviriego

Polar Record ◽  
2018 ◽  
Vol 54 (4) ◽  
pp. 255-266 ◽  
Author(s):  
Francis Joy

AbstractOne of the last frontiers of the pre-Christian Sámi religion and cosmology from the seventeenth and eighteenth centuries can be found recorded as embedded systems of knowledge on a range of noaidi-shaman drums kept in museums across Europe. Missionaries and clergymen as well as explorers who sought interest in the magical powers of the Sámi noaidi collected these artefacts during witchcraft trials and persecutions throughout Sápmi, the Sámi homeland areas. Insomuch as the drums being taken away from their owners and shipped from their homelands to other countries, their safeguarding, security and preservation as ancient sources of knowledge in museums is seldom discussed. As a consequence, the investigation presented here is a case study concerning the disappearance of a Sámi noaidi drum sent to a museum in France that has its origins in Swedish Sápmi, which I was informed about in 2017 prior to a visit to Paris for a seminar concerning the Sámi and their culture in Finland. The loss of the drum has only recently become known, and raises a series of important questions concerning responsibilities museums have with regard to the protection of property belonging to the Sámi as well as the repatriation and return of cultural heritage with regard to historical artefacts.


Micromachines ◽  
2021 ◽  
Vol 12 (12) ◽  
pp. 1450
Author(s):  
Xiang Wang ◽  
Zhun Zhang ◽  
Qiang Hao ◽  
Dongdong Xu ◽  
Jiqing Wang ◽  
...  

The hardware security of embedded systems is raising more and more concerns in numerous safety-critical applications, such as in the automotive, aerospace, avionic, and railway systems. Embedded systems are gaining popularity in these safety-sensitive sectors with high performance, low power, and great reliability, which are ideal control platforms for executing instruction operation and data processing. However, modern embedded systems are still exposing many potential hardware vulnerabilities to malicious attacks, including software-level and hardware-level attacks; these can cause program execution failure and confidential data leakage. For this reason, this paper presents a novel embedded system by integrating a hardware-assisted security monitoring unit (SMU), for achieving a reinforced system-on-chip (SoC) on ensuring program execution and data processing security. This architecture design was implemented and evaluated on a Xilinx Virtex-5 FPGA development board. Based on the evaluation of the SMU hardware implementation in terms of performance overhead, security capability, and resource consumption, the experimental results indicate that the SMU does not lead to a significant speed degradation to processor while executing different benchmarks, and its average performance overhead reduces to 2.18% on typical 8-KB I/D-Caches. Security capability evaluation confirms the monitoring effectiveness of SMU against both instruction and data tampering attacks. Meanwhile, the SoC satisfies a good balance between high-security and resource overhead.


Author(s):  
Haoyuan Ying ◽  
Klaus Hofmann ◽  
Thomas Hollstein

Due to the growing demand on high performance and low power in embedded systems, many core architectures are proposed the most suitable solutions. While the design concentration of many core embedded systems is switching from computation-centric to communication-centric, Network-on-Chip (NoC) is one of the best interconnect techniques for such architectures because of the scalability and high communication bandwidth. Formalized and optimized system-level design methods for NoC-based many core embedded systems are desired to improve the system performance and to reduce the power consumption. In order to understand the design optimization methods in depth, a case study of optimizing many core embedded systems based on 3-Dimensional (3D) NoC with irregular vertical link distribution topology through task mapping, core placement, routing, and topology generation is demonstrated in this chapter. Results of cycle-accurate simulation experiments prove the validity and efficiency of the design methods. Specific to the case study configuration, in maximum 60% vertical links can be saved while maintaining the system efficiency in comparison to full vertical link connection 3D NoCs by applying the design optimization methods.


Author(s):  
Lisane Brisolara de Brisolara ◽  
Marcio Eduardo Kreutz ◽  
Luigi Carro

This chapter covers the use of UML as a modeling language for embedded systems design. It introduces the UML language, presenting the history of its definition, its main diagrams and characteristics. Using a case study, we show that using the standard UML with its limitations one is not able to model many important characteristics of embedded systems. For that reason, UML provides extension mechanisms that enable one to extend the language for a given domain, through the definition of profiles covering domain-specific applications. Several profiles have been proposed for the embedded systems domain, and some of those that have been standardized by OMG are presented here. A case study is also used to present MARTE, a new profile specifically proposed for the embedded system domain, enabling designers to model aspects like performance and schedulability. This chapter also presents a discussion about the effort to generate code from UML diagrams and analyses the open issues to the successful use of UML in the whole embedded system design flow.


Sign in / Sign up

Export Citation Format

Share Document