Academic literature on the topic 'Intel Hex file format'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Intel Hex file format.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Intel Hex file format"

1

Pradip, Ram Selokar, and T. Karule P. "Security Enhancement in Networked Embedded System." International Journal of Electrical and Computer Engineering (IJECE) 7, no. 4 (2017): 1867–73. https://doi.org/10.11591/ijece.v7i4.pp1867-1873.

Full text
Abstract:
In the developed system ARM9 is a master and Two ARM7s are slaves. The peripherals are being controlled by two ARM7 boards. The Peripherals are connected to the ARM7 through Complex Programmable Logic Device (CPLD). The CPLD is in turn connected to the ARM7 using Serial Peripheral Interface (SPI). The ARM7 boards collect the information from the peripherals and send it to the ARM9 board. The communication between ARM7 and ARM9 is via UART (Universal Asynchronous Receiver Transmitter) over CAN (Controller Area Network). The ARM9 board has got the software intelligence. The ARM9 behaves as a master and two ARM7 boards behave as slaves. Being master ARM9 passes tokens to ARM7 which in turn returns (Acknowledges) the token. The ARM9 is further connected to Proxy via Ethernet. The proxy is further connected to the service platform (server) via Ethernet. So subsequently any decisions at any stage can be changed at server level. Further these commands can be passed on to ARM9 which in turn controls the peripherals through ARM7. (a) The system which we have developed consists of ARM9 as a master, Two ARM7 as Slaves. The communication between ARM9-ARM7 is via UART over a CAN, (b) Each ARM7 further communicates serially (RS232) with the two 8051 Microcontroller nodes, (c)Thus a networked Embedded System is developed wherein the serial data is brought over Ethernet. The ARM7 board, which is directly linked with the peripherals, can be modified of its functionality as and when required. The functionality of ARM7 can be modified by upgrading its firmware. To upgrade the firmware same communication link has been used. ARM7 receives the new firmware via same ARM9-ARM7 communication link. The Flash Write operation is performed using the source code to write the new firmware. Bootloader application for the ARM7 has been developed. The signature has been incorporated to assure authenticity of the new Firmware. Intel Hex File Format is used to parse the hex file.
APA, Harvard, Vancouver, ISO, and other styles
2

Selokar, Pradip Ram, and P. T. Karule. "Security Enhancement in Networked Embedded System." International Journal of Electrical and Computer Engineering (IJECE) 7, no. 4 (2017): 1867. http://dx.doi.org/10.11591/ijece.v7i4.pp1867-1873.

Full text
Abstract:
<span>In the developed system ARM9 is a master and Two ARM7s are slaves. The peripherals are being controlled by two ARM7 boards. The Peripherals are connected to the ARM7 through Complex Programmable Logic Device (CPLD). The CPLD is in turn connected to the ARM7 using Serial Peripheral Interface (SPI). The ARM7 boards collect the information from the peripherals and send it to the ARM9 board. The communication between ARM7 and ARM9 is via UART (Universal Asynchronous Receiver Transmitter) over CAN (Controller Area Network). The ARM9 board has got the software intelligence. The ARM9 behaves as a master and two ARM7 boards behave as slaves. Being master ARM9 passes tokens to ARM7 which in turn returns (Acknowledges) the token. The ARM9 is further connected to Proxy via Ethernet. The proxy is further connected to the service platform (server) via Ethernet. So subsequently any decisions at any stage can be changed at server level. Further these commands can be passed on to ARM9 which in turn controls the peripherals through ARM7. (a) The system which we have developed consists of ARM9 as a master, Two ARM7 as Slaves. The communication between ARM9-ARM7 is via UART over a CAN, <br /> (b) Each ARM7 further communicates serially (RS232) with the two 8051 Microcontroller nodes, (c)Thus a networked Embedded System is developed wherein the serial data is brought over Ethernet. The ARM7 board, which is directly linked with the peripherals, can be modified of its functionality as and when required. The functionality of ARM7 can be modified by upgrading its firmware. To upgrade the firmware same communication link has been used. ARM7 receives the new firmware via same ARM9-ARM7 communication link. The Flash Write operation is performed using the source code to write the new firmware. Bootloader application for the ARM7 has been developed. The signature has been incorporated to assure authenticity of the new Firmware. Intel Hex File Format is used to parse the hex file.</span>
APA, Harvard, Vancouver, ISO, and other styles
3

Maria, Pututson, and Elva Susianti. "Implementasi Algoritma Bubble Sort Untuk Ekstraksi Kode Biner Pada Intel Hex File." Jurnal Fokus Elektroda : Energi Listrik, Telekomunikasi, Komputer, Elektronika dan Kendali) 8, no. 4 (2023): 226–33. https://doi.org/10.33772/jfe.v8i4.125.

Full text
Abstract:
The .hex file generated by the small device c compiler (sdcc) consists of unsorted offset addresses yielding the binary code will be misplaced when extracted and applied to an eprom programmer or chip programmer on non-commercially product. This study aims to implement a bubble sort algorithm to sort rows in a .hex file generated by sdcc based on its address offsets. The work is carried by writing and developing an application program using the Delphi compiler and the Pascal language program. Sorting procedure started by copying the contents of the source .hex file to the ram memory through finally making a copy of the source file to yield the target .hex file. The test takes 2 (two) .hex files as input and creates a target .hex file as the output of the program. Results show that the contents of the created target .hex file have been descendingly arranged according to the offset address. Binary code arrangement is crucial since the misplaced data during the burning or loading process on the microprocessor or microcontroller could cause failure in program execution.
APA, Harvard, Vancouver, ISO, and other styles
4

Ahmed, Afzal, Mohammad Tariq Iqbal, and Mohsin Jamil. "Comparative Analysis of Power Consumption and Resource Utilization in Open-Source and Proprietary Media Players while using Raw Videos." European Journal of Information Technologies and Computer Science 4, no. 5 (2024): 11–17. http://dx.doi.org/10.24018/compute.2024.4.5.140.

Full text
Abstract:
This study evaluates and compares the power consumption and resource utilization of open-source and proprietary media players during the playback of a large raw video file. Using real-time monitoring tools like HWiNFO, key metrics such as GPU power consumption, CPU power consumption, memory usage, and CPU usage percentage were collected and analyzed. The experiment was conducted on a system powered by a 12th Gen Intel(R) Core(TM) i7-12700H processor, and the media players were tested with a 2-minute, 14-second raw video file in .MOV format. A statistical analysis using t-tests was performed to assess the significance of the differences between the two categories. The results indicated that open-source media players generally exhibit lower GPU and CPU power consumption, with a potential for saving energy. Long-term power consumption analysis further demonstrated that users could achieve significant energy savings by opting for open-source media players, making them more suitable for energy-conscious environments. These findings highlight the trade-offs between power efficiency and performance while playing raw videos.
APA, Harvard, Vancouver, ISO, and other styles
5

Neves, Bernardino Pinto, António Valente, and Victor D. N. Santos. "Efficient Runtime Firmware Update Mechanism for LoRaWAN Class A Devices." Eng 5, no. 4 (2024): 2610–32. http://dx.doi.org/10.3390/eng5040137.

Full text
Abstract:
This paper presents an efficient and secure method for updating firmware in IoT devices using LoRaWAN network resources and communication protocols. The proposed method involves dividing the firmware into fragments, storing them in the application server’s database, and transmitting them to remote IoT devices via downlink messages, without necessitating any changes to the device’s class. This approach can be replicated across any IoT LoRaWAN device, offering a robust and scalable solution for large-scale firmware updates while ensuring data security and integrity. The proposed method significantly reduces the downtime of IoT devices and enhances the energy efficiency of the update process. The method was validated by updating a block in the program memory, associated to a specific functionality of the IoT end device. The associated Intel Hex file was segmented into 17 LoRaWAN downlink frames with an average size of 46 bytes. Upon receiving the complete firmware update, the microcontroller employs self-programming techniques that restrict the update process to specific rows of the program memory, avoiding interruptions or reboots. The update process was successfully completed in 51.33 ms, resulting in a downtime of 16.88 ms. This method demonstrates improved energy efficiency compared to existing solutions while preserving the communication network’s capacity, making it an adequate solution for remote devices in LoRaWAN networks.
APA, Harvard, Vancouver, ISO, and other styles
6

Bare, Yohanes, Lilin Indahsari, Dewi Sari, and Theopilus Watuguly. "In silico study: Potential prediction of Curcuma longa and Cymbopogon citratus essential oil as Lipoxygenase inhibitor." JSMARTech 2, no. 2 (2021): 075–80. http://dx.doi.org/10.21776/ub.jsmartech.2021.002.02.75.

Full text
Abstract:
Abstract: Inflammation is the human body response by the injure as a results the inflammation will release LOX. To curve the conditions we use the bioactive from the nature are essential oil from Curcuma longa and Cymbopogon citratus because has a potential has pharmacologist activity. The purpose of this research to investigate the role essential oil from Curcuma longa and Cymbopogon citratus through LOX gene. Several chemical substances, including 3,7-dimethyl-1,3,6-octatriene, camphor, eugenol, curzerene and isoborneol were retrivied from PubChem database. The PyRx 0.8 was used to minimize and convert the sdf file to pdb format file of ligands. Those compounds were predicted their interaction using STITCH online server. Ligands and protein were docked by HEX Cuda 8.0.0 program, 3D and 2D views were evaluated using Discovery studio ver.19.0.0 and LigPlot+ ver 2.2, respectively. We found fourteen amino acid residues from LOX which bound the chemical compounds. Those interaction was supported by hydrogen bond with variety energy binding. To sum up, the essential oil from Curcuma longa and Cymbopogon citratus has a potential function as inhibitor LOX by inhibiting fourteen active side of the LOX gene.
APA, Harvard, Vancouver, ISO, and other styles
7

Boyarov, A. G., and I. S. Siparov. "Forensic Investigation of MP3 Audio Recordings." Theory and Practice of Forensic Science 14, no. 4 (2020): 125–36. http://dx.doi.org/10.30764//1819-2785-2019-14-4-125-136.

Full text
Abstract:
Special aspects of MP3-recordings technical investigation are addressed. The following features of formation and research of MP3 phonograms are explained: traces of MP3 coding in time and spectral domain, special aspects of MP3-files structure analysis, detection methods of re-coding of MP3-recordings, methods of group identification of MP3-recorders and MP3-codecs.MP3 coding leaves certain traces of its usage. Due to the psychoacoustic model inaudible spectral components are deleted from the signal spectrum. Traces of psychoacoustic codecs usage are also clearly seen via dynamic spectrogram as rectangular areas of zero spectral amplitude. The methods discussed in this paper enable the investigating expert to detect the exact position of the MP3 frame in the signal by its properties even without any information from the file header. This method reveals the coding itself, multiple coding and also audio editing by the investigation of the periodicity of the extracted frames’ positions.MP3 file format specifies the structure of the frame header providing a perfect instrument to detect any periodicity of any peculiarities of MP3 frames. The tool based on this approach reveals MP3 frames disorder caused by editing in the “digital” domain – manual deletion of audio information using HEX editor.
APA, Harvard, Vancouver, ISO, and other styles
8

Bogdan Barchuk and Kyrylo Volkov. "Antivirus evasion techniques in modern malware." World Journal of Advanced Research and Reviews 26, no. 2 (2025): 3154–66. https://doi.org/10.30574/wjarr.2025.26.2.1966.

Full text
Abstract:
Cybercriminals use new antivirus evasion techniques in their malware to continue operating in a system despite security programs. It explores how the newest malware uses obfuscation, packing, anti-debugging, and tampering with system security to bypass modern protection solutions at endpoints. The research points out that, attackers find ways to take advantage of weaknesses in antivirus heuristics, signature databases, and models that analyze behaviors. Hackers give additional focus to modifying programs, editing data in the hex format, dodging debuggers, and using file-loading tools. The research group also studied how measures like Windows’ SmartScreen and SafeSEH prevent bad software from being started. Detection by today’s antivirus solutions has improved, but it turns out that most evasion techniques can still work because they are flexible and mutable. As a result, organizations must always work on new methods of preventing attacks and stay informed about any threats that may arise.
APA, Harvard, Vancouver, ISO, and other styles
9

Suhaili, Shamsiah, Joyce Shing Yii Huong, Asrani Lit, et al. "Development of Digital Image Processing Algorithms via FPGA Implementation." Semarak International Journal of Electronic System Engineering 3, no. 1 (2024): 28–45. http://dx.doi.org/10.37934/sijese.3.1.2845.

Full text
Abstract:
Real-time image processing is one of the fundamental elements in achieving IR 4.0. The rapid development of digital image processing techniques has enabled various applications in fields such as healthcare, transportation, and manufacturing. People are seeking higher-performance image processing as traditional image processing is no longer fulfilling the demands. FPGA-based digital image processing has become one of the choices for the public due to its parallel pipelining, which enables shorter processing time and better performance. Several digital image processing algorithms have been developed in this project, which are gray level transformation, brightness manipulation, contrast adjustment, thresholding, and inversion. They are the most popular algorithms used in digital image processing. Microsoft Paint is used to convert the format of the color input image to bitmap format, followed by MATLAB to convert it into a hexadecimal file to be read and written in FPGA. Platforms such as ModelSim Altera and Intel Quartus II are used to write Verilog HDL for digital image processing algorithms. As a result, five hexadecimal files are obtained from the simulation. The output hexadecimal files are further processed in MATLAB to generate respective images.
APA, Harvard, Vancouver, ISO, and other styles
10

Suhaili, Shamsiah, Joyce Shing Yii Huong, Asrani Lit, et al. "Development of Digital Image Processing Algorithms via FPGA Implementation." Semarak International Journal of Electronic System Engineering 3, no. 1 (2024): 28–45. https://doi.org/10.37934/sijese.3.1.2845a.

Full text
Abstract:
Real-time image processing is one of the fundamental elements in achieving IR 4.0. The rapid development of digital image processing techniques has enabled various applications in fields such as healthcare, transportation, and manufacturing. People are seeking higher-performance image processing as traditional image processing is no longer fulfilling the demands. FPGA-based digital image processing has become one of the choices for the public due to its parallel pipelining, which enables shorter processing time and better performance. Several digital image processing algorithms have been developed in this project, which are gray level transformation, brightness manipulation, contrast adjustment, thresholding, and inversion. They are the most popular algorithms used in digital image processing. Microsoft Paint is used to convert the format of the color input image to bitmap format, followed by MATLAB to convert it into a hexadecimal file to be read and written in FPGA. Platforms such as ModelSim Altera and Intel Quartus II are used to write Verilog HDL for digital image processing algorithms. As a result, five hexadecimal files are obtained from the simulation. The output hexadecimal files are further processed in MATLAB to generate respective images.
APA, Harvard, Vancouver, ISO, and other styles
More sources

Books on the topic "Intel Hex file format"

1

Girdwood, Megan. Modernism and the Choreographic Imagination. Edinburgh University Press, 2021. http://dx.doi.org/10.3366/edinburgh/9781474481625.001.0001.

Full text
Abstract:
Ranging from the late nineteenth to the mid-twentieth century, this book examines literary and choreographic representations of the figure of Salome, the biblical woman who danced for the head of St John the Baptist. The age of modernism witnessed an extraordinary cross-fertilisation of the arts of literature and dance, grounded in a shared appetite for formal experimentation and inter-related ideas about the representational capacities of the performing body. Following her conspicuous revival in the nineteenth-century French Symbolist movement, Salome became a focal point for these recurring interplays between text and performance, inspiring an unprecedented corpus of plays, fictions, paintings, dance performances, and silent films devoted to her ‘dance of the seven veils’. This book considers how Salome’s dancing body, across its numerous modernist iterations, framed critical questions about inter-arts collaboration, influence, aesthetic autonomy, and the porousness of different disciplines, thereby unsettling more traditional views of aesthetic hierarchies and related assumptions about female creative agency. Following salient versions of Salome from fin-de-siècle music halls and avant-garde theatres to the projects of the Ballets Russes, female film pioneers, and modernist playwrights, this book considers canonical authors such as Oscar Wilde, W. B. Yeats, and Samuel Beckett, as well as lesser-known but crucially influential performers, from the modern dancers Loïe Fuller and Maud Allan, to Ida Rubinstein, Alla Nazimova, and Ninette de Valois.
APA, Harvard, Vancouver, ISO, and other styles
2

Luc, Heres, ed. Time in GIS: Issues in spatio-temporal modelling. Nederlandse Commissie voor Geodesie, 2000. http://dx.doi.org/10.54419/v5m55p.

Full text
Abstract:
Most Geographic Information Systems started as a substitute for loose paper maps. These paper maps did not have a built-in time dimension and could only represent history indirectly as a sequence of physically separate images. This was in fact imitated by these first generation systems. The time dimension could only be represented by means of separate files. A minority of Geographic Information Systems however, started their life as a substitute for ordered lists and tables with a link to paper maps. In these lists, the inclusion of a time com-ponent in the form of a data field was quite usual. This method too was copied by the systems that replaced these paper tables. The current trend in the development of Geographic Information Systems is towards the inte-gration of the classical map-oriented concepts with the table-oriented concepts. This often leads to the explicit embedding of the time component in the GIS environment. The Subcommission Geo-Information Models of the Netherlands Geodetic Commission has organized a workshop to discuss the theory and practice of time and history in GIS on 18 May 2000. This publication contains 6 articles prepared for the workshop. The first paper, written by Donna Peuquet, gives a bird’s-eye view of the current state of the art in spatio-temporal database technology and methodology. She is a well-known expert in the field of spatio-temporal information systems and the author of many articles in this field. The second article is written by Monica Wachowicz. She describes what you can do with a GIS once it contains a historical dimension and how you can detect changes in geographic phenomena. Furthermore, her article suggests how geographic visualisation and knowledge discovery techniques can be integrated in a spatio-temporal database. How to record the time dimension in a database is one thing, how to show this dimension to users is another one. In his contribution, Menno-Jan Kraak first tells about the techniques, which were used in the age of paper maps and the limitations these methods had. He goes on to explain what kind of cartographic techniques have been developed since the mass introduc-tion of the computer. Finally he describes the powerful animation methods which currently exist and can be used on CD-ROM and Internet applications. Peter van Oosterom describes how the time dimension is represented in the information sys-tems of the Cadastre and how this is used to publish updates. The Cadastre has a very long tradition in incorporating the time component, which has always been an inherent component of the cadastral registration. In former times this was translated in very precise procedures about how to update the paper maps and registers. Today it is translated in spatio-temporal database design. The article of Luc Heres tells about the time component in the National Road Database, origi-nally designed for traffic accident registration. This is one of the systems with ''table'' roots and with quite a long tradition in handling the time dimension. He elucidates first the core objects in the conceptual model and how time is added. Next, how this model is translated in a logical design and finally how this is technically implemented. Geologists and geophysicians also have a respectable tradition in handling the time dimension in the data they collect. This is illustrated in the last paper, which is written by Ipo Ritsema. He outlines how time is handled in geological and geophysical databases maintained by TNO. By means of some practical cases he illustrates which problems can be encountered and how these can be solved.
APA, Harvard, Vancouver, ISO, and other styles

Book chapters on the topic "Intel Hex file format"

1

"8-Bit Intel Hex File Format." In AVR RISC Microcontroller Handbook. Elsevier, 1998. https://doi.org/10.1016/b978-0-08-049973-4.50015-5.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "Intel Hex file format"

1

Mostafa, Golam, and Yeasin Abedin. "Development of a graphical user interface using Windows 7-C# to download Intel-Hex formatted file into the flash of 89S52 microcontroller." In 2013 International Conference on Advances in Electrical Engineering (ICAEE). IEEE, 2013. http://dx.doi.org/10.1109/icaee.2013.6750321.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

MOHANTY, AMIYA RANJAN, and RANJAN SASTI CHARAN PAL. "A CYBER-PHYSICAL SYSTEM BASED REAL-TIME FAULT DIAGNOSIS OF INDUCTION MOTORS." In Structural Health Monitoring 2021. Destech Publications, Inc., 2022. http://dx.doi.org/10.12783/shm2021/36275.

Full text
Abstract:
Induction motors are one of the major electrical prime movers in industrial sectors. Since these motors are operated continuously, they are subjected to wear and tear which lead to faults at a later stage in its life. These faults which arise can be classified into 5 major categories i.e., broken rotor bars, stator winding faults, air-gap eccentricity, bearing faults, and torque fluctuations. A failure in induction motors leads to machine downtime, increased maintenance costs, and puts the lives of the plant personnel at risk, thus leading to undesirable consequences. Hence, uninterrupted operation of the machine is the need of the hour for which real-time condition-based monitoring of induction motors needs to be implemented. Industries are making an attempt to tap into the technology that involves around cyber-physical systems (CPS) and access real-time information regarding the motor health condition. The present article explores the CPS structure for real-time fault identification so that appropriate action can be taken by plant personnel. The CPS technology is a modular framework, which consists of a current sensor that transmits data to a remote minicomputer (e.g., Intel NUC kit) or a microcontroller (e.g., Raspberry Pi) by processing it through a data acquisition (DAQ) system across a wireless network. Since the range of defect frequencies for fault diagnosis in these induction motors is 5 kHz, Nyquist sampling frequency (𝐹𝑠) for data acquisition should at least be 10 kHz. It is to be noted that a microcontroller can be of low cost; however, maintaining 𝐹𝑠 more than 500 Hz tends to cause random jitters at the core of the operating system (OS). As a result, the signal-to-noise ratio (SNR) is compromised in microcontrollers leading to incorrect post-processing of the current time-stamp data for motor fault diagnosis. Hence, in the present article, a minicomputer is used for data acquisition of current time data at 𝐹𝑠 of 10 kHz and infer the motor health status by investigating the current spectrum. The information of motor health condition is stored in comma-separated values (CSV) file, which is further transferred over Google Cloud Storage (GCS) via hypertext transfer protocol (HTTP) with transport-layer security (TLS) encryption. HTTP converts the CSV data file into binary format and maintains the record of meta-data of the files. Meta-data essentially keeps track of when the file was created in the remote minicomputer. Additionally, in order to ensure a high data transfer rate at a given instant of time, the HTTP file transfer protocol divides the actual data into small chunks that are subjected to parallel composite uploads. When the data is collected in the computer at the receiver’s end i.e., the plant personnel in the present case, the data is recreated back to the original CSV file. As a result, the concerned plant personnel has complete information about the specific motor which has started failing and prevents any major breakdown of the machine. Thus, the fault detection of the motors at the incipient stage through CPS technology helps in developing an effective process that aids in the smooth functioning of the machines.
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography