To see the other types of publications on this topic, follow the link: Firmware and software.

Journal articles on the topic 'Firmware and software'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 journal articles for your research on the topic 'Firmware and software.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

Yang, Le Kang, Di Chen, Ju Mei, and Liang Xue. "Research on Malicious Behavior of Firmware Based on Hardware Resources Access Control." Applied Mechanics and Materials 340 (July 2013): 737–43. http://dx.doi.org/10.4028/www.scientific.net/amm.340.737.

Full text
Abstract:
As same as the traditional application and system software, firmware also faced the risk of malicious code like hobbyhorse, back door, logical bomb and so on. Firmware exhibited strong cohesion and hardware relativity, which make the malicious action in firmware to be different from that in the traditional software. This paper analyzed the specificities of firmware and the malicious behaviour about it, then expatiate the essence of the malicious behaviour of the firmware, and presented a firmware formal definition and detecting method which was based on the hardware resources access control policy. Experimental results proved that the method was effective to detect the malicious firmware.
APA, Harvard, Vancouver, ISO, and other styles
2

Weisi Lin. "On fast firmware/software-based video coding." IEEE Transactions on Consumer Electronics 48, no. 2 (May 2002): 209–19. http://dx.doi.org/10.1109/tce.2002.1010124.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

ZHANG, TIELING, MIN XIE, LOON CHING TANG, and SZU HUI NG. "RELIABILITY AND MODELING OF SYSTEMS INTEGRATED WITH FIRMWARE AND HARDWARE." International Journal of Reliability, Quality and Safety Engineering 12, no. 03 (June 2005): 227–39. http://dx.doi.org/10.1142/s021853930500180x.

Full text
Abstract:
Firmware is embedded software in hardware devices and they play important role for many critical systems' function. Firmware failure rate in operation should be quite lower than the application software which is operating on it. Most of the study on software reliability deals with systems during development, and it is also important to study the integrated system during operation. Complex systems usually have a bathtub-shaped failure rate over the lifecycle of the product. This paper discusses the parametric analysis of model given by Haupt and Schäbe (1992), exponentiated Weibull distribution and models generated from Pareto and Weibull distribution, as well as their possible application to modeling firmware system failure. In addition, the Safety Integrity Levels (SIL) stipulated in IEC 61508 are taken into account in the modeling since the safety-critical systems in general are firmware-dominated.
APA, Harvard, Vancouver, ISO, and other styles
4

Iuganson, Andrei, and Danil Zakoldaev. "Approach to assessment of firmware security under fuzzy input data." Vestnik of Astrakhan State Technical University. Series: Management, computer science and informatics 2020, no. 1 (January 27, 2020): 50–56. http://dx.doi.org/10.24143/2072-9502-2020-1-50-56.

Full text
Abstract:
The article highlights the issues of security and software security, which turn to be secondary in the design and development of software tools in order to please the speedy launch of the software product on the market. Due to the fact that the cost of eliminating security defects is higher in the late stages of design, the scientific problem of assessing software security under high uncertainty has been considered. The functional requirements for security of the firmware are given. A new approach is proposed for assessing the firmware security. The subject of research is a firmware designed to control various devices and microcontrollers. Based on GOST R 56939-2016 “Information security. Secure software development. General requirements” there have been developed the security requirements (qualitative and quantitative) for the embedded software, the assessment of which allows determining the level of security of the firmware as a whole. The fuzzy logic apparatus was used to optimize the assessment process in conditions of possible uncertainty, inconsistency, incompleteness and qualitative nature of the input data. The proposed method will help minimize the economic risks at the stages of operation and maintenance of embedded systems.
APA, Harvard, Vancouver, ISO, and other styles
5

Dasgupta, S., P. A. Wilsey, and J. Heinanen. "Axiomatic Specifications in Firmware Development Systems." IEEE Software 3, no. 4 (July 1986): 49–58. http://dx.doi.org/10.1109/ms.1986.234068.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Pott, Claudius, Philipp Jungklass, David Jacek Csejka, Thomas Eisenbarth, and Marco Siebert. "Firmware Security Module." Journal of Hardware and Systems Security 5, no. 2 (April 30, 2021): 103–13. http://dx.doi.org/10.1007/s41635-021-00114-4.

Full text
Abstract:
AbstractNew services such as autonomous driving, the connectivity of the traffic infrastructure and the tight coupling of user operated smart devices with the vehicle have significantly increased the demand for cryptographic protection in the automobile. To provide a secure environment for the calculation and verification of cryptographic material, automotive microcontrollers now frequently integrate Hardware Security Modules (HSM), special well-protected co-processors, which are protected against manipulation and external access. HSMs use special hardware accelerators to provide the required cryptographic services. While these accelerators provide good performance, they limit flexibility and updatability. In addition, as more services require cryptographic protection, the amount of key material that needs to be managed by the HSM also increases, turning the limited protected memory of the HSM into a bottleneck. This paper presents a framework that uses the safety mechanisms of a microcontroller to achieve both HSM-equivalent security through software solutions, while providing an equivalent level of functionality. Furthermore, the proposed framework provides crypto-agility, as the security stack can be updated if desired. In order to verify the functionality, the presented framework is implemented and evaluated on an Infineon AURIX TC399 and compared with the integrated HSM.
APA, Harvard, Vancouver, ISO, and other styles
7

Eckert, Brad. "Firmware factory & forth." ACM SIGPLAN Notices 34, no. 12 (December 1999): 30–33. http://dx.doi.org/10.1145/344283.344290.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Witanto, Elizabeth Nathania, Yustus Eko Oktian, Sang-Gon Lee, and Jin-Heung Lee. "A Blockchain-Based OCF Firmware Update for IoT Devices." Applied Sciences 10, no. 19 (September 26, 2020): 6744. http://dx.doi.org/10.3390/app10196744.

Full text
Abstract:
As the usage growth rate of Internet of Things (IoT) devices is increasing, various issues related to these devices need attention. One of them is the distribution of the IoT firmware update. The IoT devices’ software development does not end when the manufacturer sells the devices to the market. It still needs to be kept updated to prevent cyber-attacks. The commonly used firmware update process, over-the-air (OTA), mostly happens in a centralized way, in which the IoT devices directly download the firmware update from the manufacturer’s server. This central architecture makes the manufacturer’s server vulnerable to single-point-of-failure and latency issues that can delay critical patches from being applied to vulnerable devices. The Open Connectivity Foundation (OCF) is one organization contributing to providing interoperability services for IoT devices. In one of their subject areas, they provide a firmware update protocol for IoT devices. However, their firmware update process does not ensure the integrity and security of the patches. In this paper, we propose a blockchain-based OCF firmware update for IoT devices. Specifically, we introduce two types of firmware update protocol, direct and peer-to-peer updates, integrated into OCF firmware update specifications. In the direct scenario, the device, through the IoT gateway, can download the new firmware update from the manufacturer’s server. Meanwhile, in the peer-to-peer scheme, the device can query the update from the nearby gateways. We implemented our protocol using Raspberry Pi hardware and Ethereum-based blockchain with the smart contracts to record metadata of the manufacturer’s firmware updates. We evaluated the proposed system’s performance by measuring the average throughput, the latency, and the firmware update distribution’s duration. The analysis results indicate that our proposal can deliver firmware updates in a reasonable duration, with the peer-to-peer version having a faster completion time than the direct one.
APA, Harvard, Vancouver, ISO, and other styles
9

Ghanathe, N. P., A. Madorsky, H. Lam, D. E. Acosta, A. D. George, M. R. Carver, Y. Xia, A. Jyothishwara, and M. Hansen. "Software and firmware co-development using high-level synthesis." Journal of Instrumentation 12, no. 01 (January 27, 2017): C01083. http://dx.doi.org/10.1088/1748-0221/12/01/c01083.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Abu-Nimeh, Faisal T., Jennifer Ito, William W. Moses, Qiyu Peng, and Woon-Seng Choong. "Architecture and Implementation of OpenPET Firmware and Embedded Software." IEEE Transactions on Nuclear Science 63, no. 2 (April 2016): 620–29. http://dx.doi.org/10.1109/tns.2015.2499600.

Full text
APA, Harvard, Vancouver, ISO, and other styles
11

Mange, D. "Teaching firmware as a bridge between hardware and software." IEEE Transactions on Education 36, no. 1 (1993): 152–57. http://dx.doi.org/10.1109/13.204836.

Full text
APA, Harvard, Vancouver, ISO, and other styles
12

Damm, W., G. Doehmen, K. Merkel, and M. Sichelschmidt. "The AADL/S* Approach to Firmware Design Verification." IEEE Software 3, no. 4 (July 1986): 27–37. http://dx.doi.org/10.1109/ms.1986.233752.

Full text
APA, Harvard, Vancouver, ISO, and other styles
13

Qasem, Abdullah, Paria Shirani, Mourad Debbabi, Lingyu Wang, Bernard Lebel, and Basile L. Agba. "Automatic Vulnerability Detection in Embedded Devices and Firmware." ACM Computing Surveys 54, no. 2 (April 2021): 1–42. http://dx.doi.org/10.1145/3432893.

Full text
Abstract:
In the era of the internet of things (IoT), software-enabled inter-connected devices are of paramount importance. The embedded systems are very frequently used in both security and privacy-sensitive applications. However, the underlying software (a.k.a. firmware) very often suffers from a wide range of security vulnerabilities, mainly due to their outdated systems or reusing existing vulnerable libraries; which is evident by the surprising rise in the number of attacks against embedded systems. Therefore, to protect those embedded systems, detecting the presence of vulnerabilities in the large pool of embedded devices and their firmware plays a vital role. To this end, there exist several approaches to identify and trigger potential vulnerabilities within deployed embedded systems firmware. In this survey, we provide a comprehensive review of the state-of-the-art proposals, which detect vulnerabilities in embedded systems and firmware images by employing various analysis techniques, including static analysis, dynamic analysis, symbolic execution, and hybrid approaches. Furthermore, we perform both quantitative and qualitative comparisons among the surveyed approaches. Moreover, we devise taxonomies based on the applications of those approaches, the features used in the literature, and the type of the analysis. Finally, we identify the unresolved challenges and discuss possible future directions in this field of research.
APA, Harvard, Vancouver, ISO, and other styles
14

Zhang, Hao Ming, Lian Soon Peh, and Ying Hai Wang. "Motion Control Software for Micromouse Based on LM629." Advanced Materials Research 971-973 (June 2014): 1247–50. http://dx.doi.org/10.4028/www.scientific.net/amr.971-973.1247.

Full text
Abstract:
Frequent start and stop in complex unstable environment causes micromouse based on single MCU cannot work properly, especially in fast speed; A new micromouse based on LM629 is explained and demonstrated how to design, especially for its motion control firmware. Experiment results show that the micromouse prototype based on LM629 can be very good to meet the fast micromouse requirements.
APA, Harvard, Vancouver, ISO, and other styles
15

Jain, Abhishek, and Richa Gupta. "Unified and Modular Modeling and Functional Verification Framework of Real-Time Image Signal Processors." VLSI Design 2016 (September 26, 2016): 1–14. http://dx.doi.org/10.1155/2016/7283471.

Full text
Abstract:
In VLSI industry, image signal processing algorithms are developed and evaluated using software models before implementation of RTL and firmware. After the finalization of the algorithm, software models are used as a golden reference model for the image signal processor (ISP) RTL and firmware development. In this paper, we are describing the unified and modular modeling framework of image signal processing algorithms used for different applications such as ISP algorithms development, reference for hardware (HW) implementation, reference for firmware (FW) implementation, and bit-true certification. The universal verification methodology- (UVM-) based functional verification framework of image signal processors using software reference models is described. Further, IP-XACT based tools for automatic generation of functional verification environment files and model map files are described. The proposed framework is developed both with host interface and with core using virtual register interface (VRI) approach. This modeling and functional verification framework is used in real-time image signal processing applications including cellphone, smart cameras, and image compression. The main motivation behind this work is to propose the best efficient, reusable, and automated framework for modeling and verification of image signal processor (ISP) designs. The proposed framework shows better results and significant improvement is observed in product verification time, verification cost, and quality of the designs.
APA, Harvard, Vancouver, ISO, and other styles
16

Rakhmanov, S. R. "Some peculiarities of the process of the pipe purse firmware on the firmware." Metallurgicheskaya i gornorudnaya promyshlennost, no. 1 (2019): 31–39. http://dx.doi.org/10.33101/s001-1700087840.

Full text
Abstract:
Purpose. Conducting research aimed at choosing the rational modes of flashing the tubular billet by stabilizing the dynamic characteristics of the drive power line of heavy-duty piercing mills TPA. Methodology. The dynamics of the power line of the piercing mill of the pipe-rolling unit (TPA) are considered, taking into account the peculiarities of the behavior of the spindle hinges and the mechanism for setting the work rolls. Findings. The differential equation of motion of the line of the main drive of the piercing mill is composed and its numerical solution is given. An adapted three-mass dynamic model of the system is considered and a solution is obtained using the software Solid Works IT Simulation X. The basic conditions for the occurrence of unstable dynamic phenomena in the fieldline and the installation mechanism of the piercing mill rolls are formulated. It is shown that the unstable dynamics of the system are one of the main reasons for the discrepancy between the results of well-known theoretical, experimental studies and pipe thickness measurement at TPA 350 piercing mills. Originality. The main causes of the emergence of parametric oscillations in the drive of the working stand of the piercing mill, the installation mechanism of the work rolls in connection with the mechanism of formation of the thin-wall thickness of pipes are established. The areas of stability of the system’s functioning are determined depending on the operating modes and the angle of feed of the work rolls, taking into account the spatial position of the elements of the spindle device. The necessary and sufficient stability conditions for the joint stable functioning of the power line elements of the piercing mill are formed. Practical value. To stabilize the processes for flashing the tubular billet, a scheme has been proposed for upgrading the spindles of the main drive and the mechanism for installing the work rolls of the piercing mill No. 1 of TPA 350. The results are applicable to similar helical rolling mills. Keywords: firmware, billet, mill, pipe, uneven stroke, varying thickness, dynamics, drive, roll, oscillations, spindle, Cardan, hinge, moment of inertia, rigidity, drum, installation mechanism, stability.
APA, Harvard, Vancouver, ISO, and other styles
17

Aiello, Sebastiano, Annarita Margiotta, Antonio Marinelli, Christos Markou, Gregory Martignac, Lilian Martin, Juan A. Martínez-Mora, et al. "KM3NeT front-end and readout electronics system: hardware, firmware, and software." Journal of Astronomical Telescopes, Instruments, and Systems 5, no. 04 (December 23, 2019): 1. http://dx.doi.org/10.1117/1.jatis.5.4.046001.

Full text
APA, Harvard, Vancouver, ISO, and other styles
18

Wu, Jun Sheng, Fu Zhou Shang, He Sun, Tian Qin, and Qing Li. "Design of Data Transmission System Based on FPGA and USB 2.0." Applied Mechanics and Materials 321-324 (June 2013): 417–22. http://dx.doi.org/10.4028/www.scientific.net/amm.321-324.417.

Full text
Abstract:
In this paper, a high-speed data transmission system based on FPGA (Field Programmable Gate Array) and USB 2.0 (Universal Serial Bus) technology is designed. Firstly, we introduce the hardware of the data transmission system, which includes data acquisition circuit, transmission circuit and power conversion circuit, etc. Secondly, the corresponding software design including USB firmware program, USB driver and firmware modification are described in detail. Finally, the corresponding experiment has been carried out, which show that the developed system will help to achieve the data transmission system with the characteristics of high-speed, integration and low power consumption, etc.
APA, Harvard, Vancouver, ISO, and other styles
19

McInnes, Allan I. "Modeling and Analysis of TinyOS Sensor Node Firmware." ACM Transactions on Embedded Computing Systems 12, no. 1 (January 2013): 1–23. http://dx.doi.org/10.1145/2406336.2406341.

Full text
APA, Harvard, Vancouver, ISO, and other styles
20

Wang, Yisen, Ruimin Wang, Jing Jing, and Huanwei Wang. "Implementing a high-efficiency similarity analysis approach for firmware code." PLOS ONE 16, no. 1 (January 12, 2021): e0245098. http://dx.doi.org/10.1371/journal.pone.0245098.

Full text
Abstract:
The rapid expansion of the open-source community has shortened the software development cycle, but the spread of vulnerabilities has been accelerated, especially in the field of the Internet of Things. In recent years, the frequency of attacks against connected devices is increasing exponentially; thus, the vulnerabilities are more serious in nature. The state-of-the-art firmware security inspection technologies, such as methods based on machine learning and graph theory, find similar applications depending on the known vulnerabilities but cannot do anything without detailed information about the vulnerabilities. Moreover, model training, which is necessary for the machine learning technologies, requires a significant amount of time and data, resulting in low efficiency and poor extensibility. Aiming at the above shortcomings, a high-efficiency similarity analysis approach for firmware code is proposed in this study. First, the function control flow features and data flow features are extracted from the functions of the firmware and of the vulnerabilities, and the features are used to calculate the SimHash of the functions. The mass storage and fast query capabilities of the SimHash are implemented by the pigeonhole principle. Second, the similarity function pairs are analyzed in detail within and among the basic blocks. Within the basic blocks, the symbolic execution is used to generate the basic block semantic information, and the constraint solver is used to determine the semantic equivalence. Among the basic blocks, the local control flow graphs are analyzed to obtain their similarity. Then, we implemented a prototype and present the evaluation. The evaluation results demonstrate that the proposed approach can implement large-scale firmware function similarity analysis. It can also get the location of the real-world firmware patch without vulnerability function information. Finally, we compare our method with existing methods. The comparison results demonstrate that our method is more efficient and accurate than the Gemini and StagedMethod. More than 90% of the firmware functions can be indexed within 0.1 s, while the search time of 100,000 firmware functions is less than 2 s.
APA, Harvard, Vancouver, ISO, and other styles
21

Mudarakola, Lakshmi Prasad, and J. K. R. Sastry. "A Neural Network Based Strategy (NNBS) for Automated Construction of Test Cases for Testing an Embedded System using Combinatorial Techniques." International Journal of Engineering & Technology 7, no. 1.3 (December 31, 2017): 74. http://dx.doi.org/10.14419/ijet.v7i1.3.9271.

Full text
Abstract:
Testing an embedded system is required to locate bugs in software, diminish risk, development, repairs costs and to improve performance for both users and the company. Embedded software testing tools are useful for catching defects during unit, integration and system testing. Embedded systems in many cases must be optimized by engaging crucial areas of the embedded systems considering all factors of the input domain. The most important concern is to build a place of test cases depend on design of the requirements that can recognize more number of faults at a least rate and point in time in the major sections of an embedded system. This paper proposes a Neural Network Based strategy (NNBS) to generate optimized test cases based on the considerations of the system. A tool called NNTCG (Neural Network Test Case Generator) has been build up based on the method proposed in this paper. Test cases are generated for testing an embedded system using NNTCG and the same are used to determine the expected output through the neural network and the output generated from the actual firmware. The faulty paths within the firmware are determined when the output generated by the neural network is not same as the output generated by the firmware.
APA, Harvard, Vancouver, ISO, and other styles
22

Dasgupta, S., and R. A. Mueller. "Guest Editors' Introduction Firmware Engineering: The Interaction of Microprogramming and Software Technology." IEEE Software 3, no. 4 (July 1986): 4–5. http://dx.doi.org/10.1109/ms.1986.233747.

Full text
APA, Harvard, Vancouver, ISO, and other styles
23

Dong, Zhijiang, Yujian Fu, and Yue Fu. "Runtime Verification on Robotics Systems." International Journal of Robotics Applications and Technologies 3, no. 1 (January 2015): 23–40. http://dx.doi.org/10.4018/ijrat.2015010102.

Full text
Abstract:
Runtime verification is a technique for generating monitors from formal specification of expected behaviors for the underlying system. It can be applied to automatically evaluate system execution, either on-line or off-line, analyzing extracted execution traces; or it can be used online during operation, potentially steering the application back to a safety region if a property is violated. As a so-called light-weighted formal method, runtime verification bridges the gap between system design and implementation and shorten the distance of software quality assurance between the software testing and model checking and theorem proving. Runtime verification is considered as a highly scalable and automatic technique. Most of current runtime verification research are endeavored on the program context, in other words, on the program side and falls in the implementation level. These applications limited the benefits of runtime verification that bridges the gap among types of applications. With the proliferation of embedded systems and mobile device, dynamically verifying the firmware and mobile apps becomes a new emerging area. Due to the characteristics of runtime verification technique and limitations of the robotics systems, so far, very few research and project are located in the runtime verification on the firmware of embedded systems, which appear in most of robotics systems. Robotics systems are programmed on the firmware and only observed on device. In this paper, the authors first discussed the current runtime verifications on the embedded systems with limitations. After that, a layered runtime verification framework will be presented for the firmware verification. The case study is applied on the commonly recognized educational toolkit – LEGO Mindstorm robotics systems.
APA, Harvard, Vancouver, ISO, and other styles
24

ZhenLong Du, XiaoLi Li, YanWen Guo, and Kangkang Shen. "Ensemble of Trusted Firmware Services based on TPM." International Journal of Digital Content Technology and its Applications 5, no. 3 (March 31, 2011): 175–84. http://dx.doi.org/10.4156/jdcta.vol5.issue3.17.

Full text
APA, Harvard, Vancouver, ISO, and other styles
25

Rushinek, Avi, and Sara F. Rushinek. "Performance monitoring tools for computer systems: Hardware, software, firmware and hybrid controls." Computers & Industrial Engineering 9, no. 4 (January 1985): 419–25. http://dx.doi.org/10.1016/0360-8352(85)90029-4.

Full text
APA, Harvard, Vancouver, ISO, and other styles
26

Taufik, Muhammad, Wahyudi Hasbi, and Abdul Karim. "IN-ORBIT IMPLEMENTATION OF ERROR PATCHING METHODS FOR LAPAN-A3/IPB OBDH FIRMWARE SYSTEM." Jurnal Teknologi Dirgantara 17, no. 1 (June 21, 2019): 11. http://dx.doi.org/10.30536/j.jtd.2019.v17.a3012.

Full text
Abstract:
ABSTRACTOBDH (On-board data handling) is a satellite subsystem that receives, processes, decides and executes commands from and to satellites. OBDH is built on two systems namely hardware and software integrated system (firmware system). In terms of hardware, OBDH uses a processor with 32bit RISC architecture, 128/256 Kbyte internal memory and a firmware system that is built using primitive programming. This programming uses the super loop architecture program and interrupt to manage the system to function properly. Problems occur when an error occurs in one of the functions in the interrupt routine resulting in failure of interpretation of commands or data from satellite sensors. This paper describes the implementation of the error patching methods on the LAPAN-A3/IPB Satellite OBDH firmware system in order to keep the system working well. Initial verification through testing on the ground have been successfully performed using engineering model of OBDH and hardware in the loop simulators (HWIL) module. Based on the test results, implementation on satellite has also been successfully done.ABSTRAKOBDH (On-board data handling) merupakan salah satu subsistem satelit yang berfungsi menerima, mengolah, mengambil keputusan dan mengeksekusi perintah dari dan ke satelit. OBDH dibangun berdasarkan dua buah sistem yaitu sistem perangkat keras dan perangkat lunak yang terintegrasi (sistem firmware). Dari sisi perangkat keras, OBDH menggunakan prosesor dengan arsitektur 32bit RISC, 128/256 Kbyte memori internal, dan sistem firmware yang dibangun menggunakan pemrograman primitif. Pemrograman ini menggunakan arsitektur program super loop dan interrupt untuk mengelola sistem agar dapat berfungsi dengan baik. Permasalahan terjadi ketika terjadi kesalahan pada salah satu fungsi pada rutin interrupt sehingga mengakibatkan kegagalan interpretasi perintah atau data dari sensor satelit. Paper ini menjelaskan mengenai implementasi metode penambalan kesalahan pada sistem firmware OBDH satelit LAPAN-A3/IPB yang bertujuan untuk menjaga agar sistem tetap bekerja dengan baik. Verifikasi awal melalui pengujian telah berhasil dilakukan mengunakan engineering model OBDH dan modul hardware in the loop simulators (HWIL). Berdasarkan hasil pengujian, implementasi pada satelit juga telah sukses dilakukan.
APA, Harvard, Vancouver, ISO, and other styles
27

Myasishchev, A. A., S. V. Lienkov, A. G. Zinchyk, I. V. Pampukha, and L. O. Riaba. "DESIGN OF MULTIFUNCTIONAL UAV OF ROTOR TYPE ON THE BASE OF FIRMWARE ARDUPILOT." Collection of scientific works of the Military Institute of Kyiv National Taras Shevchenko University, no. 70 (2021): 49–59. http://dx.doi.org/10.17721/2519-481x/2021/70-05.

Full text
Abstract:
In this work, a multifunctional rotor-type UAV (hexacopter) was designed based on the Arducopter ver.4.0.7 firmware for FMUv3 devices. Experimental tuning of the firmware parameters for a given UAV geometry, its weight, propeller group, flight stability in a gusty wind for navigation modes has been performed. It is shown that this flight controller can use all the documented features of the Ardupilot firmware, unlike the Pixhawk1 1M. Experimentally, on the basis of numerous flights, it was revealed that firmware using a mathematical apparatus based on the extended Kalman filter (Arducopter 4.0.7) gives better flight results in navigation modes than firmware based on the use of a complimentary filter (INAV, Betaflight - rescue mode). The possibility of controlling additional equipment using a flight controller is shown using the example of dropping a load at a given point of the trajectory. The results of telemetry were obtained during the automatic flight of the hexacopter along a given trajectory based on the installed sensors. It is shown how, using the ground station software, it is possible to obtain two-dimensional and three-dimensional graphical representations of telemetry data for analyzing the flight of a copter with its subsequent fine tuning. The possibility of constructing and constructing a three-dimensional trajectory of the UAV flight according to telemetry data using the Google Earth program has been studied. Considered the fine tuning of UAV flight modes using the Ardupilot firmware parameters. The parameters are identified that are basic for ensuring maximum flight stability in abruptly changing conditions, for example, during sudden braking, maneuvers, gusty wind. The range of variation of these parameters and their values have been determined experimentally. The parameters of the PID controller were tuned to ensure a smooth and stable flight in navigation modes. In work with the use of a servo drive, a load dropping device has been designed, which can be triggered automatically when flying along a trajectory, and when commanding from the control panel when approaching a given point, which is visually viewed using the Mission Planner.
APA, Harvard, Vancouver, ISO, and other styles
28

Sazykin, Z. А., M. V. Bubnov, and V. D. Sazykina. "INTEGRATION OF EMBEDDED SOFTWARE DEVELOPMENT TECHNOLOGIES." Issues of radio electronics, no. 12 (December 20, 2018): 112–16. http://dx.doi.org/10.21778/2218-5453-2018-12-112-116.

Full text
Abstract:
The article deals with the problems of the development of embedded software in organizations of the military-industrial complex. The necessity of using modern technologies in the process of creating software is stated. The aspects are considered and the model of the firmware development process is defined. According to the goals and objectives set, the analysis of the main stages, which are part of the software development process, was made. Based on the stages, the areas of software development technologies are highlighted, such as project management, version control, continuous integration, virtualization, as well as centralized and distributed access to files. An analysis of each such area made it possible to identify relevant solutions. All solutions are implemented on the basis of the structural unit of the enterprise. The functional necessity of these solutions in the overall system is substantiated.
APA, Harvard, Vancouver, ISO, and other styles
29

Dong, Jian Jun, and Tan Sheng Zhou. "Design of Multi-Signal Testing System Based on ARM & FPGA." Applied Mechanics and Materials 182-183 (June 2012): 1215–19. http://dx.doi.org/10.4028/www.scientific.net/amm.182-183.1215.

Full text
Abstract:
This paper presents a multi-signal testing system based on ARM & FPGA, Paper discussed system structure design, including hardware and software design. The hardware uses FPGA to expand ports and USB2.0 interface chip CY7C68013 for signals data transmission; software including system firmware, driver, user applications the three-parts design. The design of the system meet requirements, its high performance, low cost and can be widely used in signal analysis, monitoring and other fields.
APA, Harvard, Vancouver, ISO, and other styles
30

Frazier, Robert, Greg Iles, Dave Newbold, and Andrew Rose. "Software and firmware for controlling CMS trigger and readout hardware via gigabit Ethernet." Physics Procedia 37 (2012): 1892–99. http://dx.doi.org/10.1016/j.phpro.2012.02.516.

Full text
APA, Harvard, Vancouver, ISO, and other styles
31

Watson, Jeff, Maithil Pachchigar, Ross Bannatyne, Clay Merritt, Christopher Conrad, Glenn Smollinger, and Earle Drack. "Performance Test Results of a Precision Data Acquisition and Control Platform for 200°C+ High Temperature Environments." Additional Conferences (Device Packaging, HiTEC, HiTEN, and CICMT) 2018, HiTEC (May 1, 2018): 000103–11. http://dx.doi.org/10.4071/2380-4491-2018-hiten-000103.

Full text
Abstract:
Abstract In recent years there has been an increasing selection of commercially available electronic components specified for very high temperature (200C+) operation, driven by the needs of harsh-environment applications such as oil and gas exploration/production, aerospace, heavy industrial, and automotive. However, there remains a significant technical challenge to integrate these components into reliable, high performance systems. We previously presented a complete reference design of a precision multichannel sensor data acquisition and control system rated to 200C, including characterized hardware, firmware, and software. The design is based around low power 16 bit SAR ADCs and an ARM® Cortex®-M0 processor and is optimized for high resolution and high throughput measurements while maintaining low power and a small footprint. In this paper we present the test results of this system over temperature. The reference platform is available off the shelf, including hardware design files, processor firmware source code, and PC software for data logging and display, providing engineers a rapid development tool for prototyping and a faster path to production for complex harsh-environment applications.
APA, Harvard, Vancouver, ISO, and other styles
32

Maier, Petra R., Veit B. Kleeberger, Daniel Mueller-Gritschneder, and Ulf Schlichtmann. "Fault Injection for Test-Driven Development of Robust SoC Firmware." ACM Transactions on Embedded Computing Systems 17, no. 1 (January 12, 2018): 1–26. http://dx.doi.org/10.1145/3092943.

Full text
APA, Harvard, Vancouver, ISO, and other styles
33

Slinkin, D. A. "USING THE FREE PASCAL PROGRAMMING LANGUAGE AND THE RUBIROBOTLIB SOFTWARE LIBRARY TO CONTROL ROBOTS ON THE LEGO MINDSTORMS EV3 PLATFORM." Informatics in school, no. 7 (November 17, 2018): 8–12. http://dx.doi.org/10.32517/2221-1993-2018-17-7-8-12.

Full text
Abstract:
The article examines the LEGO MINDSTORMS EV3 robotic platform, the advantages and disadvantages of LEGO MINDSTORMS Education EV3 development environment, the possibilities of programming a robot using alternative programming languages and thirdparty firmware. Particular attention is paid to the RubiRobot authoring project and the RubiRobotLib software library which allows developing programs for LEGO MINDSTORMS EV3 on the Free Pascal programming language.
APA, Harvard, Vancouver, ISO, and other styles
34

Selokar, Pradip Ram, and P. T. Karule. "Security Enhancement in Networked Embedded System." International Journal of Electrical and Computer Engineering (IJECE) 7, no. 4 (August 1, 2017): 1867. http://dx.doi.org/10.11591/ijece.v7i4.pp1867-1873.

Full text
Abstract:
<span>In the developed system ARM9 is a master and Two ARM7s are slaves. The peripherals are being controlled by two ARM7 boards. The Peripherals are connected to the ARM7 through Complex Programmable Logic Device (CPLD). The CPLD is in turn connected to the ARM7 using Serial Peripheral Interface (SPI). The ARM7 boards collect the information from the peripherals and send it to the ARM9 board. The communication between ARM7 and ARM9 is via UART (Universal Asynchronous Receiver Transmitter) over CAN (Controller Area Network). The ARM9 board has got the software intelligence. The ARM9 behaves as a master and two ARM7 boards behave as slaves. Being master ARM9 passes tokens to ARM7 which in turn returns (Acknowledges) the token. The ARM9 is further connected to Proxy via Ethernet. The proxy is further connected to the service platform (server) via Ethernet. So subsequently any decisions at any stage can be changed at server level. Further these commands can be passed on to ARM9 which in turn controls the peripherals through ARM7. (a) The system which we have developed consists of ARM9 as a master, Two ARM7 as Slaves. The communication between ARM9-ARM7 is via UART over a CAN, <br /> (b) Each ARM7 further communicates serially (RS232) with the two 8051 Microcontroller nodes, (c)Thus a networked Embedded System is developed wherein the serial data is brought over Ethernet. The ARM7 board, which is directly linked with the peripherals, can be modified of its functionality as and when required. The functionality of ARM7 can be modified by upgrading its firmware. To upgrade the firmware same communication link has been used. ARM7 receives the new firmware via same ARM9-ARM7 communication link. The Flash Write operation is performed using the source code to write the new firmware. Bootloader application for the ARM7 has been developed. The signature has been incorporated to assure authenticity of the new Firmware. Intel Hex File Format is used to parse the hex file.</span>
APA, Harvard, Vancouver, ISO, and other styles
35

Vizitiu, Cristian, Călin Bîră, Adrian Dinculescu, Alexandru Nistorescu, and Mihaela Marin. "Exhaustive Description of the System Architecture and Prototype Implementation of an IoT-Based eHealth Biometric Monitoring System for Elders in Independent Living." Sensors 21, no. 5 (March 6, 2021): 1837. http://dx.doi.org/10.3390/s21051837.

Full text
Abstract:
In this paper, we present an exhaustive description of an extensible e-Health Internet-connected embedded system, which allows the measurement of three biometric parameters: pulse rate, oxygen saturation and temperature, via several wired and wireless sensors residing to the realm of Noncommunicable Diseases (NCDs) and cognitive assessment through Choice Reaction Time (CRT) analysis. The hardware used is based on ATMEGA AVR + MySignals Hardware printed circuit board (Hardware PCB), but with multiple upgrades (including porting from ATMEGA328P to ATMEGA2560). Multiple software improvements were made (by writing high-level device drivers, text-mode and graphic-mode display driver) for increasing functionality, portability, speed, and latency. A top-level embedded application was developed and benchmarked. A custom wireless AT command firmware was developed, based on ESP8266 firmware to allow AP-mode configuration and single-command JavaScript Object Notation (JSON) data-packet pushing towards the cloud platform. All software is available in a git repository, including the measurement results. The proposed eHealth system provides with specific NCDs and cognitive views fostering the potential to exploit correlations between physiological and cognitive data and to generate predictive analysis in the field of eldercare.
APA, Harvard, Vancouver, ISO, and other styles
36

Albisser, A. Michael, Rodolfo Alejandro, Marianne Sperlich, and Camillo Ricordi. "Closing the Circle of Care with New Firmware for Diabetes: MyDiaBase+RxChecker." Journal of Diabetes Science and Technology 3, no. 3 (May 2009): 619–23. http://dx.doi.org/10.1177/193229680900300328.

Full text
Abstract:
Background: Satisfactory glycemic control, meeting American Diabetes Association recommendations, is difficult to achieve. Technologically, this is most likely because the circle of care is incomplete. Many have suggested that the introduction of information technology may remedy the situation. However, previous attempts have not succeeded. Recognizing this, we evolved firmware that supports and links both the patient at home and their care providers in the clinic. Firmware Design and Methods: The device includes software and a database, all contained in a standard USB flash drive. At home, patients use the database portion of the device (MyDiaBase). It fully complements their diabetes education while capturing pertinent self-management information by tracking self-monitored blood glucose data, body weight, medication dosing, physical activity, diet, lifestyle, and stress. In the clinic, providers use the RxChecker program to perform prescription checks that are based on their patients' outcomes data, thereby effectively closing the circle of care.
APA, Harvard, Vancouver, ISO, and other styles
37

Gao, Jian, Yiwen Xu, Yu Jiang, Zhe Liu, Wanli Chang, Xun Jiao, and Jiaguang Sun. "EM-Fuzz: Augmented Firmware Fuzzing via Memory Checking." IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems 39, no. 11 (November 2020): 3420–32. http://dx.doi.org/10.1109/tcad.2020.3013046.

Full text
APA, Harvard, Vancouver, ISO, and other styles
38

Costa, Filippo, Sylvain Chapeland, Konstantinos Alexopoulos, and Ulric Fuchs. "Assessment of the ALICE O2 readout servers." EPJ Web of Conferences 245 (2020): 01013. http://dx.doi.org/10.1051/epjconf/202024501013.

Full text
Abstract:
The ALICE experiment at CERN LHC (Large Hadron Collider) is undertaking a major upgrade during LHC Long Shutdown 2 in 2019-2020. The raw data input from the detector will then increase a hundredfold, up to 3.4 TB/s. In order to cope with such a large throughput, a new Online-Offline com-9 puting system, called O2, will be deployed. The FLP servers (First Layer Pro-10 cessor) are the readout nodes hosting the CRU (Common Readout Unit) cards in charge of transferring the data from the detector links to the computer mem-12 ory. The data then flow through a chain of software components until they are shipped over network to the processing nodes. In order to select a suitable plat-14 form for the FLP (First Level Processor), it is essential that the hardware and the software are tested together. Each candidate server is therefore equipped with multiple readout cards (CRU), one InfiniBand 100G Host Channel Adapter, and the O2 readout software suite. A series of tests are then run to ensure the readout system is stable and fulfils the data throughput requirement of 42Gbps (highest data rate in output of the FLP equipped with three CRUs). This paper presents the software and firmware features developed to evaluate and validate different candidates for the FLP servers. In particular we describe the data flow from the CRU firmware generating data, up to the network card where the buffers are sent over the network using RDMA. We also discuss the testing procedure and the results collected on different servers.
APA, Harvard, Vancouver, ISO, and other styles
39

Kim, Hyunji, Jaehoon Park, Hyeokdong Kwon, Kyoungbae Jang, and Hwajeong Seo. "Convolutional Neural Network-Based Cryptography Ransomware Detection for Low-End Embedded Processors." Mathematics 9, no. 7 (March 24, 2021): 705. http://dx.doi.org/10.3390/math9070705.

Full text
Abstract:
A crypto-ransomware has the process to encrypt victim’s files. Afterward, the crypto-ransomware requests a ransom for the password of encrypted files to victims. In this paper, we present a novel approach to prevent crypto-ransomware by detecting block cipher algorithms for Internet of Things (IoT) platforms. We extract the sequence and frequency characteristics from the opcode of binary files for the 8-bit Alf and Vegard’s RISC (AVR) processor microcontroller. In other words, the late fusion method is used to extract two features from one source data, learn through each network, and integrate them. We classify the crypto-ransomware virus or harmless software through the proposed method. The general software from AVR packages and block cipher implementations written in C language from lightweight block cipher library (i.e., Fair Evaluation of Lightweight Cryptographic Systems (FELICS)) are trained through the deep learning network and evaluated. The general software and block cipher algorithms are successfully classified by training functions in binary files. Furthermore, we detect binary codes that encrypt a file using block ciphers. The detection rate is evaluated in terms of F-measure, which is the harmonic mean of precision and recall. The proposed method not only achieved 97% detection success rate for crypto-ransomware but also achieved 80% success rate in classification for each lightweight cryptographic algorithm and benign firmware. In addition, the success rate in classification for Substitution-Permutation-Network (SPN) structure, Addition-Rotation-eXclusive-or structures (ARX) structure, and benign firmware is 95%.
APA, Harvard, Vancouver, ISO, and other styles
40

Rapinski, Jacek, Slawomir Cellmer, and Zofia Rzepecka. "Modified GPS/Pseudolite Navigation Message." Journal of Navigation 65, no. 4 (March 23, 2012): 711–16. http://dx.doi.org/10.1017/s0373463312000124.

Full text
Abstract:
One of the issues regarding integrated GPS/pseudolite measurements is how to deliver a pseudolite's position to a receiver or to post-processing software and how to manage it. This paper presents a proposed solution to this problem. The standard navigation message is modified in such way that without changing receivers (or post-processing software), the calculated position of a transmitter is fixed at a pseudolite's known position. The formulae for modification of standard Ephemeris Data are also derived. This algorithm can be implemented in a transmitter's firmware or a navigation data file can be modified for post-processing.
APA, Harvard, Vancouver, ISO, and other styles
41

Chen, Huai Yi, and Chih Hsuan Tsuei. "Color Temperature, Hues and Brightness Tuning Method for Images in Digital Cameras." Advanced Materials Research 1006-1007 (August 2014): 1026–30. http://dx.doi.org/10.4028/www.scientific.net/amr.1006-1007.1026.

Full text
Abstract:
A method by shifting chromaticity coordinates to immediately adjust the color temperature, hues and brightness of white-balance processed pictures in a digital camera was proposed. This method could be embedded into the firmware of an image processor to improve shortcomings of any white-balance algorithm. In addition, the picture took by a digital camera can be processed directly in the digital camera to obtain the desired color temperature, hues and brightness with no aids of image software.
APA, Harvard, Vancouver, ISO, and other styles
42

Nguyen, Quang Anh, Emmanuel Grolleau, and Hieu Khanh Ngo. "Results and comparision between different control algorithms for a quadrotor using ArduPilot framework." Science and Technology Development Journal 18, no. 4 (December 30, 2015): 170–78. http://dx.doi.org/10.32508/stdj.v18i4.1003.

Full text
Abstract:
Determining the most suitable control algorithm for a system is not an easy task. In theory, each controller has its own advantages and disadvantages comparing to the others. However, in the real world, the behavior of the controller also depends on many other factors such as the calculating ability of the control board, the accuracy of the sensors, the way the hardware communicate with the others, etc. In order to find the pros and cons of each control algorithm in the real world, each of them has to be tested and then comparing their results. This article presents a simple way to test the behavior of various control algorithms, with the quadrotor as the control target and ArduPilot is the framework to create the firmware carrying multi controllers. At the end of this article, the results of 3 control algorithms: Original PID of ArduPilot, new developed PID and Integral Backstepping will be presented and compared. These data is created by using Software In The Loop simulation (SITL), a tool provided by ArduPilot to test the new developed firmware.
APA, Harvard, Vancouver, ISO, and other styles
43

Dvořáček, Filip. "LABORATORY TESTING OF LEICA AT401 LASER TRACKER." Acta Polytechnica 56, no. 2 (April 30, 2016): 88. http://dx.doi.org/10.14311/ap.2016.56.0088.

Full text
Abstract:
<p>This paper describes laboratory tests on a Leica AT401laser tracker. As the newer Leica AT402 model also uses the same firmware package, most of the results should also be valid for this device. First, we present the instrument’s firmware errors and the software used for testing. The ASME B89.4.19-2006 standard for testing laser trackers is briefly presented. The warm-up effect of the instrument is inspected with respect to both angle measurement and distance measurement. The absolute distance meter (ADM) is compared with a laboratory interferometer on a 30-meter long rail and also on a bench with automated movement of the carriage of the reflector. A time series of measurements for determining the additive constant is evaluated. A simple test of the stability of the distance measurement in field conditions is introduced. Most of the tests were carried out at the Research Institute of Geodesy, Topography and Cartography (RIGTC) and at the Faculty of Civil Engineering (FCE) of the Czech Technical University in Prague (CTU).</p>
APA, Harvard, Vancouver, ISO, and other styles
44

Kim, Junghyun, Kyuman Lee, and Sanghyun Choi. "Machine Learning-Based Code Auto-Completion Implementation for Firmware Developers." Applied Sciences 10, no. 23 (November 28, 2020): 8520. http://dx.doi.org/10.3390/app10238520.

Full text
Abstract:
With the advent of artificial intelligence, the research paradigm in natural language processing has been transitioned from statistical methods to machine learning-based approaches. One application is to develop a deep learning-based language model that helps software engineers write code faster. Although there have already been many attempts to develop code auto-completion functionality from different research groups, a need to establish an in-house code has been identified for the following reasons: (1) a security-sensitive company (e.g., Samsung Electronics) may not want to utilize commercial tools given that there is a risk of leaked source codes and (2) commercial tools may not be applicable to the specific domain (e.g., SSD firmware development) especially if one needs to predict unique code patterns and style. This research proposes a hybrid approach that harnesses the synergy between machine learning techniques and advanced design methods aiming to develop a code auto-completion framework that helps firmware developers write code in a more efficient manner. The sensitivity analysis results show that the deterministic design results in reducing prediction accuracy as it generates output in some unexpected ways, while the probabilistic design provides a list of reasonable next code elements in which one could select it manually to increase prediction accuracy.
APA, Harvard, Vancouver, ISO, and other styles
45

Laney, Samuel R. "A General-Purpose Microcontroller-Based Framework for Integrating Oceanographic Sensors, Instruments, and Peripherals." Journal of Atmospheric and Oceanic Technology 34, no. 2 (February 2017): 415–27. http://dx.doi.org/10.1175/jtech-d-16-0069.1.

Full text
Abstract:
AbstractSensors and instruments for basic oceanographic properties are becoming increasingly sophisticated, which both simplifies and complicates their use in field studies. This increased sophistication disproportionately affects smaller-scale observational efforts that are less likely to be well supported technically but which need to integrate instruments, sensors, and commonly needed peripheral devices in ways not envisioned by their manufacturers. A general-purpose hardware and software framework was developed around a widely used family of low-power microcontrollers to lessen the technical expertise and customization required to integrate sensors, instruments, and peripherals, and thus simplify such integration scenarios. Both the hardware and associated firmware development tools provide a range of features often required in such scenarios: serial data interfaces, analog inputs and outputs, logic lines and power-switching capability, nonvolatile storage of data and parameters for sampling or configuration, and serial communication interfaces to supervisory or telemetry systems. The microcontroller and additional components needed to implement this integration framework are small enough to encapsulate in standard cable splices, creating a small form factor “smart cable” that can be readily wired and programmed for a range of integration needs. An application programming library developed for this hardware provides skeleton code for functions commonly desired when integrating sensors, instruments, and peripherals. This minimizes the firmware programming expertise needed to apply this framework in many integration scenarios and thus streamlines the development of firmware for different field applications. Envisioned applications are in field programs where significant technical instrumentation expertise is unavailable or not cost effective.
APA, Harvard, Vancouver, ISO, and other styles
46

Kiełbik, Rafał, Kamil Rudnicki, Zbigniew Mudza, and Jarosław Jung. "Methodology of Firmware Development for ARUZ—An FPGA-Based HPC System." Electronics 9, no. 9 (September 10, 2020): 1482. http://dx.doi.org/10.3390/electronics9091482.

Full text
Abstract:
ARUZ is a large scale, massively parallel, FPGA-based reconfigurable computational system dedicated primarily to molecular analysis. This paper presents a methodology for ARUZ firmware development that simplifies the process, offers low-level optimization, and facilitates verification. According to this methodology, firstly an expanded, generic, all-in-one VHDL description of variable Processing Elements (PEs) is developed manually. GCC preprocessing is then used to extract only the desired target functionality. A dedicated software instantiates and connects PEs in form of a scalable network, divides it into subsets for chips and generates its HDL description. As a result, individual HDL-coded specification, optimized for certain analysis, is provided for the synthesis tool. Code reuse and automated generation of up to 81% of the code economizes the workload. Using well-optimized VHDL for core description rather than High Level Synthesis eliminates unnecessary overhead. The PE network can be scaled inversely proportional to PEs complexity, in order to efficiently utilize available resources. Moreover, downscaling the problem makes verification during HDL simulations and testing the prototype systems easier.
APA, Harvard, Vancouver, ISO, and other styles
47

Monita, Vivi, Indrarini Dyah Irawati, and Rohmat Tulloh. "Comparison of routing protocol performance on multimedia services on software defined network." Bulletin of Electrical Engineering and Informatics 9, no. 4 (August 1, 2020): 1612–19. http://dx.doi.org/10.11591/eei.v9i4.2389.

Full text
Abstract:
Software defined network (SDN) is a new paradigm in network engineering, where control plane and data plane are separated. Data plane is carried out on each node, while a control plane is centrally located. In conventional networks, the planes are implemented in the firmware of the router. In this paper, we implemented multimedia services on SDN using exterior and interior routing protocols, such as open shortest path first (OSPF), border gateway protocol (BGP) and routing information protocol (RIP), measured the quality of service (QoS), and analyze the measurement results. The test results showed that the greater the background traffic provided, the smaller the throughput. Traffic on the network will be congested, so the available bandwidth is also increasingly used up so that the number of bits sent every second decrease. Mean opinion score (MOS) test results are 4 showing good categories based on ITU-T standards.
APA, Harvard, Vancouver, ISO, and other styles
48

Mo, Guo Min, Ya Hong Guo, and Jun An Zhang. "The Design of High-Speed Data-Collection System Based on EZ-USB FX2." Applied Mechanics and Materials 373-375 (August 2013): 1599–602. http://dx.doi.org/10.4028/www.scientific.net/amm.373-375.1599.

Full text
Abstract:
A high-speed data collection and transfer system is designed in this paper. The hardware system is based on EZ-USB FX2 and high speed A/D sampling model based on MAX1198. The frame of hardware is discussed in details. Finally, the solution of software and the firmware flow are provided. The designed system has many advantages such as high-speed, plug and play, easiness to use and expand. It can be used for reference in universal research of real-time and high-speed data transfer system.
APA, Harvard, Vancouver, ISO, and other styles
49

Freed, Roy N. "Third Party Protection of Software and Firmware John J. Borking Elsevier Science Publishers BV Amsterdam, 1985." International Review of Law, Computers & Technology 3, no. 1 (January 1987): 223–29. http://dx.doi.org/10.1080/13600869.1987.9966269.

Full text
APA, Harvard, Vancouver, ISO, and other styles
50

ZHU, Ruijin, Yu-an TAN, Quanxin ZHANG, Fei WU, Jun ZHENG, and Yuan XUE. "Determining Image Base of Firmware Files for ARM Devices." IEICE Transactions on Information and Systems E99.D, no. 2 (2016): 351–59. http://dx.doi.org/10.1587/transinf.2015edp7217.

Full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography