CINXE.COM
Search results for: embedded Linux system
<!DOCTYPE html> <html lang="en" dir="ltr"> <head> <!-- Google tag (gtag.js) --> <script async src="https://www.googletagmanager.com/gtag/js?id=G-P63WKM1TM1"></script> <script> window.dataLayer = window.dataLayer || []; function gtag(){dataLayer.push(arguments);} gtag('js', new Date()); gtag('config', 'G-P63WKM1TM1'); </script> <!-- Yandex.Metrika counter --> <script type="text/javascript" > (function(m,e,t,r,i,k,a){m[i]=m[i]||function(){(m[i].a=m[i].a||[]).push(arguments)}; m[i].l=1*new Date(); for (var j = 0; j < document.scripts.length; j++) {if (document.scripts[j].src === r) { return; }} k=e.createElement(t),a=e.getElementsByTagName(t)[0],k.async=1,k.src=r,a.parentNode.insertBefore(k,a)}) (window, document, "script", "https://mc.yandex.ru/metrika/tag.js", "ym"); ym(55165297, "init", { clickmap:false, trackLinks:true, accurateTrackBounce:true, webvisor:false }); </script> <noscript><div><img src="https://mc.yandex.ru/watch/55165297" style="position:absolute; left:-9999px;" alt="" /></div></noscript> <!-- /Yandex.Metrika counter --> <!-- Matomo --> <!-- End Matomo Code --> <title>Search results for: embedded Linux system</title> <meta name="description" content="Search results for: embedded Linux system"> <meta name="keywords" content="embedded Linux system"> <meta name="viewport" content="width=device-width, initial-scale=1, minimum-scale=1, maximum-scale=1, user-scalable=no"> <meta charset="utf-8"> <link href="https://cdn.waset.org/favicon.ico" type="image/x-icon" rel="shortcut icon"> <link href="https://cdn.waset.org/static/plugins/bootstrap-4.2.1/css/bootstrap.min.css" rel="stylesheet"> <link href="https://cdn.waset.org/static/plugins/fontawesome/css/all.min.css" rel="stylesheet"> <link href="https://cdn.waset.org/static/css/site.css?v=150220211555" rel="stylesheet"> </head> <body> <header> <div class="container"> <nav class="navbar navbar-expand-lg navbar-light"> <a class="navbar-brand" href="https://waset.org"> <img src="https://cdn.waset.org/static/images/wasetc.png" alt="Open Science Research Excellence" title="Open Science Research Excellence" /> </a> <button class="d-block d-lg-none navbar-toggler ml-auto" type="button" data-toggle="collapse" data-target="#navbarMenu" aria-controls="navbarMenu" aria-expanded="false" aria-label="Toggle navigation"> <span class="navbar-toggler-icon"></span> </button> <div class="w-100"> <div class="d-none d-lg-flex flex-row-reverse"> <form method="get" action="https://waset.org/search" class="form-inline my-2 my-lg-0"> <input class="form-control mr-sm-2" type="search" placeholder="Search Conferences" value="embedded Linux system" name="q" aria-label="Search"> <button class="btn btn-light my-2 my-sm-0" type="submit"><i class="fas fa-search"></i></button> </form> </div> <div class="collapse navbar-collapse mt-1" id="navbarMenu"> <ul class="navbar-nav ml-auto align-items-center" id="mainNavMenu"> <li class="nav-item"> <a class="nav-link" href="https://waset.org/conferences" title="Conferences in 2024/2025/2026">Conferences</a> </li> <li class="nav-item"> <a class="nav-link" href="https://waset.org/disciplines" title="Disciplines">Disciplines</a> </li> <li class="nav-item"> <a class="nav-link" href="https://waset.org/committees" rel="nofollow">Committees</a> </li> <li class="nav-item dropdown"> <a class="nav-link dropdown-toggle" href="#" id="navbarDropdownPublications" role="button" data-toggle="dropdown" aria-haspopup="true" aria-expanded="false"> Publications </a> <div class="dropdown-menu" aria-labelledby="navbarDropdownPublications"> <a class="dropdown-item" href="https://publications.waset.org/abstracts">Abstracts</a> <a class="dropdown-item" href="https://publications.waset.org">Periodicals</a> <a class="dropdown-item" href="https://publications.waset.org/archive">Archive</a> </div> </li> <li class="nav-item"> <a class="nav-link" href="https://waset.org/page/support" title="Support">Support</a> </li> </ul> </div> </div> </nav> </div> </header> <main> <div class="container mt-4"> <div class="row"> <div class="col-md-9 mx-auto"> <form method="get" action="https://publications.waset.org/abstracts/search"> <div id="custom-search-input"> <div class="input-group"> <i class="fas fa-search"></i> <input type="text" class="search-query" name="q" placeholder="Author, Title, Abstract, Keywords" value="embedded Linux system"> <input type="submit" class="btn_search" value="Search"> </div> </div> </form> </div> </div> <div class="row mt-3"> <div class="col-sm-3"> <div class="card"> <div class="card-body"><strong>Commenced</strong> in January 2007</div> </div> </div> <div class="col-sm-3"> <div class="card"> <div class="card-body"><strong>Frequency:</strong> Monthly</div> </div> </div> <div class="col-sm-3"> <div class="card"> <div class="card-body"><strong>Edition:</strong> International</div> </div> </div> <div class="col-sm-3"> <div class="card"> <div class="card-body"><strong>Paper Count:</strong> 18304</div> </div> </div> </div> <h1 class="mt-3 mb-3 text-center" style="font-size:1.6rem;">Search results for: embedded Linux system</h1> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">18304</span> An Intelligent Nondestructive Testing System of Ultrasonic Infrared Thermal Imaging Based on Embedded Linux</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Hao%20Mi">Hao Mi</a>, <a href="https://publications.waset.org/abstracts/search?q=Ming%20Yang"> Ming Yang</a>, <a href="https://publications.waset.org/abstracts/search?q=Tian-yue%20Yang"> Tian-yue Yang</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Ultrasonic infrared nondestructive testing is a kind of testing method with high speed, accuracy and localization. However, there are still some problems, such as the detection requires manual real-time field judgment, the methods of result storage and viewing are still primitive. An intelligent non-destructive detection system based on embedded linux is put forward in this paper. The hardware part of the detection system is based on the ARM (Advanced Reduced Instruction Set Computer Machine) core and an embedded linux system is built to realize image processing and defect detection of thermal images. The CLAHE algorithm and the Butterworth filter are used to process the thermal image, and then the boa server and CGI (Common Gateway Interface) technology are used to transmit the test results to the display terminal through the network for real-time monitoring and remote monitoring. The system also liberates labor and eliminates the obstacle of manual judgment. According to the experiment result, the system provides a convenient and quick solution for industrial non-destructive testing. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=remote%20monitoring" title="remote monitoring">remote monitoring</a>, <a href="https://publications.waset.org/abstracts/search?q=non-destructive%20testing" title=" non-destructive testing"> non-destructive testing</a>, <a href="https://publications.waset.org/abstracts/search?q=embedded%20Linux%20system" title=" embedded Linux system"> embedded Linux system</a>, <a href="https://publications.waset.org/abstracts/search?q=image%20processing" title=" image processing"> image processing</a> </p> <a href="https://publications.waset.org/abstracts/101979/an-intelligent-nondestructive-testing-system-of-ultrasonic-infrared-thermal-imaging-based-on-embedded-linux" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/101979.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">224</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">18303</span> Linux Security Management: Research and Discussion on Problems Caused by Different Aspects</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Ma%20Yuzhe">Ma Yuzhe</a>, <a href="https://publications.waset.org/abstracts/search?q=Burra%20Venkata%20Durga%20Kumar"> Burra Venkata Durga Kumar</a> </p> <p class="card-text"><strong>Abstract:</strong></p> The computer is a great invention. As people use computers more and more frequently, the demand for PCs is growing, and the performance of computer hardware is also rising to face more complex processing and operation. However, the operating system, which provides the soul for computers, has stopped developing at a stage. In the face of the high price of UNIX (Uniplexed Information and Computering System), batch after batch of personal computer owners can only give up. Disk Operating System is too simple and difficult to bring innovation into play, which is not a good choice. And MacOS is a special operating system for Apple computers, and it can not be widely used on personal computers. In this environment, Linux, based on the UNIX system, was born. Linux combines the advantages of the operating system and is composed of many microkernels, which is relatively powerful in the core architecture. Linux system supports all Internet protocols, so it has very good network functions. Linux supports multiple users. Each user has no influence on their own files. Linux can also multitask and run different programs independently at the same time. Linux is a completely open source operating system. Users can obtain and modify the source code for free. Because of these advantages of Linux, it has also attracted a large number of users and programmers. The Linux system is also constantly upgraded and improved. It has also issued many different versions, which are suitable for community use and commercial use. Linux system has good security because it relies on a file partition system. However, due to the constant updating of vulnerabilities and hazards, the using security of the operating system also needs to be paid more attention to. This article will focus on the analysis and discussion of Linux security issues. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=Linux" title="Linux">Linux</a>, <a href="https://publications.waset.org/abstracts/search?q=operating%20system" title=" operating system"> operating system</a>, <a href="https://publications.waset.org/abstracts/search?q=system%20management" title=" system management"> system management</a>, <a href="https://publications.waset.org/abstracts/search?q=security" title=" security"> security</a> </p> <a href="https://publications.waset.org/abstracts/152889/linux-security-management-research-and-discussion-on-problems-caused-by-different-aspects" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/152889.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">108</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">18302</span> Bypassing Docker Transport Layer Security Using Remote Code Execution</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Michael%20J.%20Hahn">Michael J. Hahn</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Docker is a powerful tool used by many companies such as PayPal, MetLife, Expedia, Visa, and many others. Docker works by bundling multiple applications, binaries, and libraries together on top of an operating system image called a container. The container runs on a Docker engine that in turn runs on top of a standard operating system. This centralization saves a lot of system resources. In this paper, we will be demonstrating how to bypass Transport Layer Security and execute remote code within Docker containers built on a base image of Alpine Linux version 3.7.0 through the use of .apk files due to flaws in the Alpine Linux package management program. This exploit renders any applications built using Docker with a base image of Alpine Linux vulnerable to unwanted outside forces. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=cloud" title="cloud">cloud</a>, <a href="https://publications.waset.org/abstracts/search?q=cryptography" title=" cryptography"> cryptography</a>, <a href="https://publications.waset.org/abstracts/search?q=Docker" title=" Docker"> Docker</a>, <a href="https://publications.waset.org/abstracts/search?q=Linux" title=" Linux"> Linux</a>, <a href="https://publications.waset.org/abstracts/search?q=security" title=" security"> security</a> </p> <a href="https://publications.waset.org/abstracts/103868/bypassing-docker-transport-layer-security-using-remote-code-execution" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/103868.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">198</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">18301</span> Development of Configuration Software of Space Environment Simulator Control System Based on Linux </h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Zhan%20Haiyang">Zhan Haiyang</a>, <a href="https://publications.waset.org/abstracts/search?q=Zhang%20Lei"> Zhang Lei</a>, <a href="https://publications.waset.org/abstracts/search?q=Ning%20Juan"> Ning Juan</a> </p> <p class="card-text"><strong>Abstract:</strong></p> This paper presents a configuration software solution in Linux, which is used for the control of space environment simulator. After introducing the structure and basic principle, it is said that the developing of QT software frame and the dynamic data exchanging between PLC and computer. The OPC driver in Linux is also developed. This driver realizes many-to-many communication between hardware devices and SCADA software. Moreover, an algorithm named “Scan PRI” is put forward. This algorithm is much more optimizable and efficient compared with "Scan in sequence" in Windows. This software has been used in practical project. It has a good control effect and can achieve the expected goal. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=Linux%20OS" title="Linux OS">Linux OS</a>, <a href="https://publications.waset.org/abstracts/search?q=configuration%20software" title=" configuration software"> configuration software</a>, <a href="https://publications.waset.org/abstracts/search?q=OPC%20Server%20driver" title=" OPC Server driver"> OPC Server driver</a>, <a href="https://publications.waset.org/abstracts/search?q=MYSQL%20database" title=" MYSQL database"> MYSQL database</a> </p> <a href="https://publications.waset.org/abstracts/54104/development-of-configuration-software-of-space-environment-simulator-control-system-based-on-linux" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/54104.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">288</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">18300</span> TACTICAL: Ram Image Retrieval in Linux Using Protected Mode Architecture’s Paging Technique</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Sedat%20Aktas">Sedat Aktas</a>, <a href="https://publications.waset.org/abstracts/search?q=Egemen%20Ulusoy"> Egemen Ulusoy</a>, <a href="https://publications.waset.org/abstracts/search?q=Remzi%20Yildirim"> Remzi Yildirim</a> </p> <p class="card-text"><strong>Abstract:</strong></p> This article explains how to get a ram image from a computer with a Linux operating system and what steps should be followed while getting it. What we mean by taking a ram image is the process of dumping the physical memory instantly and writing it to a file. This process can be likened to taking a picture of everything in the computer’s memory at that moment. This process is very important for tools that analyze ram images. Volatility can be given as an example because before these tools can analyze ram, images must be taken. These tools are used extensively in the forensic world. Forensic, on the other hand, is a set of processes for digitally examining the information on any computer or server on behalf of official authorities. In this article, the protected mode architecture in the Linux operating system is examined, and the way to save the image sample of the kernel driver and system memory to disk is followed. Tables and access methods to be used in the operating system are examined based on the basic architecture of the operating system, and the most appropriate methods and application methods are transferred to the article. Since there is no article directly related to this study on Linux in the literature, it is aimed to contribute to the literature with this study on obtaining ram images. LIME can be mentioned as a similar tool, but there is no explanation about the memory dumping method of this tool. Considering the frequency of use of these tools, the contribution of the study in the field of forensic medicine has been the main motivation of the study due to the intense studies on ram image in the field of forensics. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=linux" title="linux">linux</a>, <a href="https://publications.waset.org/abstracts/search?q=paging" title=" paging"> paging</a>, <a href="https://publications.waset.org/abstracts/search?q=addressing" title=" addressing"> addressing</a>, <a href="https://publications.waset.org/abstracts/search?q=ram-image" title=" ram-image"> ram-image</a>, <a href="https://publications.waset.org/abstracts/search?q=memory%20dumping" title=" memory dumping"> memory dumping</a>, <a href="https://publications.waset.org/abstracts/search?q=kernel%20modules" title=" kernel modules"> kernel modules</a>, <a href="https://publications.waset.org/abstracts/search?q=forensic" title=" forensic"> forensic</a> </p> <a href="https://publications.waset.org/abstracts/153801/tactical-ram-image-retrieval-in-linux-using-protected-mode-architectures-paging-technique" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/153801.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">117</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">18299</span> Stochastic Analysis of Linux Operating System through Copula Distribution</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Vijay%20Vir%20Singh">Vijay Vir Singh</a> </p> <p class="card-text"><strong>Abstract:</strong></p> This work is focused studying the Linux operating system connected in a LAN (local area network). The STAR topology (to be called subsystem-1) and BUS topology (to be called subsystem-2) are taken into account, which are placed at two different locations and connected to a server through a hub. In the both topologies BUS topology and STAR topology, we have assumed n clients. The system has two types of failures i.e. partial failure and complete failure. Further, the partial failure has been categorized as minor and major partial failure. It is assumed that the minor partial failure degrades the sub-systems and the major partial failure make the subsystem break down mode. The system may completely fail due to failure of server hacking and blocking etc. The system is studied using supplementary variable technique and Laplace transform by using different types of failure and two types of repair. The various measures of reliability for example, availability of system, reliability of system, MTTF, profit function for different parametric values have been discussed. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=star%20topology" title="star topology">star topology</a>, <a href="https://publications.waset.org/abstracts/search?q=bus%20topology" title=" bus topology"> bus topology</a>, <a href="https://publications.waset.org/abstracts/search?q=blocking" title=" blocking"> blocking</a>, <a href="https://publications.waset.org/abstracts/search?q=hacking" title=" hacking"> hacking</a>, <a href="https://publications.waset.org/abstracts/search?q=Linux%20operating%20system" title=" Linux operating system"> Linux operating system</a>, <a href="https://publications.waset.org/abstracts/search?q=Gumbel-Hougaard%20family%20copula" title=" Gumbel-Hougaard family copula"> Gumbel-Hougaard family copula</a>, <a href="https://publications.waset.org/abstracts/search?q=supplementary%20variable" title=" supplementary variable"> supplementary variable</a> </p> <a href="https://publications.waset.org/abstracts/48060/stochastic-analysis-of-linux-operating-system-through-copula-distribution" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/48060.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">370</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">18298</span> A Formal Verification Approach for Linux Kernel Designing</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Zi%20Wang">Zi Wang</a>, <a href="https://publications.waset.org/abstracts/search?q=Xinlei%20He"> Xinlei He</a>, <a href="https://publications.waset.org/abstracts/search?q=Jianghua%20Lv"> Jianghua Lv</a>, <a href="https://publications.waset.org/abstracts/search?q=Yuqing%20Lan"> Yuqing Lan</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Kernel though widely used, is complicated. Errors caused by some bugs are often costly. Statically, more than half of the mistakes occur in the design phase. Thus, we introduce a modeling method, KMVM (Linux Kernel Modeling and verification Method), based on type theory for proper designation and correct exploitation of the Kernel. In the model, the Kernel is separated into six levels: subsystem, dentry, file, struct, func, and base. Each level is treated as a type. The types are specified in the structure and relationship. At the same time, we use a demanding path to express the function to be implemented. The correctness of the design is verified by recursively checking the type relationship and type existence. The method has been applied to verify the OPEN business of VFS (virtual file system) in Linux Kernel. Also, we have designed and developed a set of security communication mechanisms in the Kernel with verification. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=formal%20approach" title="formal approach">formal approach</a>, <a href="https://publications.waset.org/abstracts/search?q=type%20theory" title=" type theory"> type theory</a>, <a href="https://publications.waset.org/abstracts/search?q=Linux%20Kernel" title=" Linux Kernel"> Linux Kernel</a>, <a href="https://publications.waset.org/abstracts/search?q=software%20program" title=" software program"> software program</a> </p> <a href="https://publications.waset.org/abstracts/155062/a-formal-verification-approach-for-linux-kernel-designing" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/155062.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">137</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">18297</span> Performance Analysis of LINUX Operating System Connected in LAN Using Gumbel-Hougaard Family Copula Distribution</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=V.%20V.%20Singh">V. V. Singh</a> </p> <p class="card-text"><strong>Abstract:</strong></p> In this paper we have focused on the study of a Linux operating system connected in a LAN (local area network). We have considered two different topologies STAR topology (subsystem-1) and BUS topology (subsystem-2) which are placed at two different places and connected to a server through a hub. In both topologies BUS topology and STAR topology, we have assumed 'n' clients. The system has two types of failure partial failure and complete failure. Further the partial failure has been categorized as minor partial failure and major partial failure. It is assumed that minor partial failure degrades the subsystem and the major partial failure brings the subsystem to break down mode. The system can completely failed due to failure of server hacking and blocking etc. The system is studied by supplementary variable technique and Laplace transform by taking different types of failure and two types of repairs. The various measures of reliability like availability of system, MTTF, profit function for different parametric values has been discussed. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=star%20topology" title="star topology">star topology</a>, <a href="https://publications.waset.org/abstracts/search?q=bus%20topology" title=" bus topology"> bus topology</a>, <a href="https://publications.waset.org/abstracts/search?q=hacking" title=" hacking"> hacking</a>, <a href="https://publications.waset.org/abstracts/search?q=blocking" title=" blocking"> blocking</a>, <a href="https://publications.waset.org/abstracts/search?q=linux%20operating%20system" title=" linux operating system"> linux operating system</a>, <a href="https://publications.waset.org/abstracts/search?q=Gumbel-Hougaard%20family%20copula" title=" Gumbel-Hougaard family copula"> Gumbel-Hougaard family copula</a>, <a href="https://publications.waset.org/abstracts/search?q=supplementary%20variable" title=" supplementary variable "> supplementary variable </a> </p> <a href="https://publications.waset.org/abstracts/33606/performance-analysis-of-linux-operating-system-connected-in-lan-using-gumbel-hougaard-family-copula-distribution" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/33606.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">577</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">18296</span> UNIX Source Code Leak: Evaluation and Feasible Solutions</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Gu%20Dongxing">Gu Dongxing</a>, <a href="https://publications.waset.org/abstracts/search?q=Li%20Yuxuan"> Li Yuxuan</a>, <a href="https://publications.waset.org/abstracts/search?q=Nong%20Tengxiao"> Nong Tengxiao</a>, <a href="https://publications.waset.org/abstracts/search?q=Burra%20Venkata%20Durga%20Kumar"> Burra Venkata Durga Kumar</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Since computers are widely used in business models, more and more companies choose to store important information in computers to improve productivity. However, this information can be compromised in many cases, such as when it is stored locally on the company's computers or when it is transferred between servers and clients. Of these important information leaks, source code leaks are probably the most costly. Because the source code often represents the core technology of the company, especially for the Internet companies, source code leakage may even lead to the company's core products lose market competitiveness, and then lead to the bankruptcy of the company. In recent years, such as Microsoft, AMD and other large companies have occurred source code leakage events, suffered a huge loss. This reveals to us the importance and necessity of preventing source code leakage. This paper aims to find ways to prevent source code leakage based on the direction of operating system, and based on the fact that most companies use Linux or Linux-like system to realize the interconnection between server and client, to discuss how to reduce the possibility of source code leakage during data transmission. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=data%20transmission" title="data transmission">data transmission</a>, <a href="https://publications.waset.org/abstracts/search?q=Linux" title=" Linux"> Linux</a>, <a href="https://publications.waset.org/abstracts/search?q=source%20code" title=" source code"> source code</a>, <a href="https://publications.waset.org/abstracts/search?q=operating%20system" title=" operating system"> operating system</a> </p> <a href="https://publications.waset.org/abstracts/153161/unix-source-code-leak-evaluation-and-feasible-solutions" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/153161.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">270</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">18295</span> Restructuring of Embedded System Design Course: Making It Industry Compliant</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Geetishree%20Mishra">Geetishree Mishra</a>, <a href="https://publications.waset.org/abstracts/search?q=S.%20Akhila"> S. Akhila</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Embedded System Design, the most challenging course of electronics engineering has always been appreciated and well acclaimed by the students of electronics and its related branches of engineering. Embedded system, being a product of multiple application domains, necessitates skilled man power to be well designed and tested in every important aspect of both hardware and software. In the current industrial scenario, the requirements are even more rigorous and highly demanding and needs to be to be on par with the advanced technologies. Fresh engineers are expected to be thoroughly groomed by the academic system and the teaching community. Graduates with the ability to understand both complex technological processes and technical skills are increasingly sought after in today's embedded industry. So, the need of the day is to restructure the under-graduate course- both theory and lab practice along with the teaching methodologies to meet the industrial requirements. This paper focuses on the importance of such a need in the present education system. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=embedded%20system%20design" title="embedded system design">embedded system design</a>, <a href="https://publications.waset.org/abstracts/search?q=industry%20requirement" title=" industry requirement"> industry requirement</a>, <a href="https://publications.waset.org/abstracts/search?q=syllabus%20restructuring" title=" syllabus restructuring"> syllabus restructuring</a>, <a href="https://publications.waset.org/abstracts/search?q=project-based%20learning" title=" project-based learning"> project-based learning</a>, <a href="https://publications.waset.org/abstracts/search?q=teaching%20methodology" title=" teaching methodology"> teaching methodology</a> </p> <a href="https://publications.waset.org/abstracts/20533/restructuring-of-embedded-system-design-course-making-it-industry-compliant" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/20533.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">662</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">18294</span> Hardware Error Analysis and Severity Characterization in Linux-Based Server Systems</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Nikolaos%20Georgoulopoulos">Nikolaos Georgoulopoulos</a>, <a href="https://publications.waset.org/abstracts/search?q=Alkis%20Hatzopoulos"> Alkis Hatzopoulos</a>, <a href="https://publications.waset.org/abstracts/search?q=Konstantinos%20Karamitsios"> Konstantinos Karamitsios</a>, <a href="https://publications.waset.org/abstracts/search?q=Konstantinos%20Kotrotsios"> Konstantinos Kotrotsios</a>, <a href="https://publications.waset.org/abstracts/search?q=Alexandros%20I.%20Metsai"> Alexandros I. Metsai</a> </p> <p class="card-text"><strong>Abstract:</strong></p> In modern server systems, business critical applications run in different types of infrastructure, such as cloud systems, physical machines and virtualization. Often, due to high load and over time, various hardware faults occur in servers that translate to errors, resulting to malfunction or even server breakdown. CPU, RAM and hard drive (HDD) are the hardware parts that concern server administrators the most regarding errors. In this work, selected RAM, HDD and CPU errors, that have been observed or can be simulated in kernel ring buffer log files from two groups of Linux servers, are investigated. Moreover, a severity characterization is given for each error type. Better understanding of such errors can lead to more efficient analysis of kernel logs that are usually exploited for fault diagnosis and prediction. In addition, this work summarizes ways of simulating hardware errors in RAM and HDD, in order to test the error detection and correction mechanisms of a Linux server. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=hardware%20errors" title="hardware errors">hardware errors</a>, <a href="https://publications.waset.org/abstracts/search?q=Kernel%20logs" title=" Kernel logs"> Kernel logs</a>, <a href="https://publications.waset.org/abstracts/search?q=Linux%20servers" title=" Linux servers"> Linux servers</a>, <a href="https://publications.waset.org/abstracts/search?q=RAM" title=" RAM"> RAM</a>, <a href="https://publications.waset.org/abstracts/search?q=hard%20disk" title=" hard disk"> hard disk</a>, <a href="https://publications.waset.org/abstracts/search?q=CPU" title=" CPU"> CPU</a> </p> <a href="https://publications.waset.org/abstracts/140496/hardware-error-analysis-and-severity-characterization-in-linux-based-server-systems" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/140496.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">154</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">18293</span> Design and Implementation of Embedded FM Transmission Control SW for Low Power Battery System</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Young-Su%20Ryu">Young-Su Ryu</a>, <a href="https://publications.waset.org/abstracts/search?q=Kyung-Won%20Park"> Kyung-Won Park</a>, <a href="https://publications.waset.org/abstracts/search?q=Jae-Hoon%20Song"> Jae-Hoon Song</a>, <a href="https://publications.waset.org/abstracts/search?q=Ki-Won%20Kwon"> Ki-Won Kwon</a> </p> <p class="card-text"><strong>Abstract:</strong></p> In this paper, an embedded frequency modulation (FM) transmission control software (SW) for a low power battery system is designed and implemented. The simultaneous translation systems for various languages are needed as so many international conferences and festivals are held in world wide. Especially in portable transmitting and receiving systems, the ability of long operation life is used for a measure of value. This paper proposes an embedded FM transmission control SW for low power battery system and shows the results of the SW implemented on a portable FM transmission system. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=FM%20transmission" title="FM transmission">FM transmission</a>, <a href="https://publications.waset.org/abstracts/search?q=simultaneous%20translation%20system" title=" simultaneous translation system"> simultaneous translation system</a>, <a href="https://publications.waset.org/abstracts/search?q=portable%20transmitting%20and%20receiving%20systems" title=" portable transmitting and receiving systems"> portable transmitting and receiving systems</a>, <a href="https://publications.waset.org/abstracts/search?q=low%20power%20embedded%20control%20SW" title=" low power embedded control SW"> low power embedded control SW</a> </p> <a href="https://publications.waset.org/abstracts/67493/design-and-implementation-of-embedded-fm-transmission-control-sw-for-low-power-battery-system" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/67493.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">442</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">18292</span> Exploiting SLMail Server with a Developed Buffer Overflow with Kali Linux</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Senesh%20Wijayarathne">Senesh Wijayarathne</a> </p> <p class="card-text"><strong>Abstract:</strong></p> This study focuses on how someone could develop a Buffer Overflow and could use that to exploit the SLMail Server. This study uses a Kali Linux V2018.4 Virtual Machine and Windows 7 - Internet Explorer V8 Virtual Machine (IPv4 Address - 192.168.56.107). This study starts by sending continued bytes to the SLMail Server to find the crashing point range and creating a unique pattern of the length of the crashing point range to control the Extended Instruction Pointer (EIP). Then by sending all characters to SLMail Server, we could observe and find which characters are not rendered properly by the software, also known as Bad Characters. By finding the ‘Jump to the ESP register (JMP ESP) and with the help of ‘Mona Modules’, we could use msfvenom to create a non-stage windows reverse shell payload. By including all the details gathered previously on one script, we could get a system-level reverse shell of the Windows 7 PC. The end of this paper will discuss how to mitigate this vulnerability. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=slmail%20server" title="slmail server">slmail server</a>, <a href="https://publications.waset.org/abstracts/search?q=extended%20instruction%20pointer" title=" extended instruction pointer"> extended instruction pointer</a>, <a href="https://publications.waset.org/abstracts/search?q=jump%20to%20the%20esp%20register" title=" jump to the esp register"> jump to the esp register</a>, <a href="https://publications.waset.org/abstracts/search?q=bad%20characters" title=" bad characters"> bad characters</a>, <a href="https://publications.waset.org/abstracts/search?q=virtual%20machine" title=" virtual machine"> virtual machine</a>, <a href="https://publications.waset.org/abstracts/search?q=windows%207" title=" windows 7"> windows 7</a>, <a href="https://publications.waset.org/abstracts/search?q=kali%20Linux" title=" kali Linux"> kali Linux</a>, <a href="https://publications.waset.org/abstracts/search?q=buffer%20overflow" title=" buffer overflow"> buffer overflow</a>, <a href="https://publications.waset.org/abstracts/search?q=Seattle%20lab" title=" Seattle lab"> Seattle lab</a>, <a href="https://publications.waset.org/abstracts/search?q=vulnerability" title=" vulnerability"> vulnerability</a> </p> <a href="https://publications.waset.org/abstracts/150375/exploiting-slmail-server-with-a-developed-buffer-overflow-with-kali-linux" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/150375.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">165</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">18291</span> Embedded Acoustic Signal Processing System Using OpenMP Architecture</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Abdelkader%20Elhanaoui">Abdelkader Elhanaoui</a>, <a href="https://publications.waset.org/abstracts/search?q=Mhamed%20Hadji"> Mhamed Hadji</a>, <a href="https://publications.waset.org/abstracts/search?q=Rachid%20Skouri"> Rachid Skouri</a>, <a href="https://publications.waset.org/abstracts/search?q=Said%20Agounad"> Said Agounad</a> </p> <p class="card-text"><strong>Abstract:</strong></p> In this paper, altera de1-SoC FPGA board technology is utilized as a distinguished tool for nondestructive characterization of an aluminum circular cylindrical shell of radius ratio b/a (a: outer radius; b: inner radius). The acoustic backscattered signal processing system has been developed using OpenMP architecture. The design is built in three blocks; it is implemented per functional block, in a heterogeneous Intel-Altera system running under Linux. The useful data to determine the performances of SoC FPGA is computed by the analytical method. The exploitation of SoC FPGA has lead to obtain the backscattering form function and resonance spectra. A0 and S0 modes of propagation in the tube are shown. The findings are then compared to those achieved from the Matlab simulation of analytical method. A good agreement has, therefore, been noted. Moreover, the detailed SoC FPGA-based system has shown that acoustic spectra are performed at up to 5 times faster than the Matlab implementation using almost the same data. This FPGA-based system implementation of processing algorithms is realized with a coefficient of correlation R and absolute error respectively about 0.962 and 5 10⁻⁵. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=OpenMP" title="OpenMP">OpenMP</a>, <a href="https://publications.waset.org/abstracts/search?q=signal%20processing%20system" title=" signal processing system"> signal processing system</a>, <a href="https://publications.waset.org/abstracts/search?q=acoustic%20backscattering" title=" acoustic backscattering"> acoustic backscattering</a>, <a href="https://publications.waset.org/abstracts/search?q=nondestructive%20characterization" title=" nondestructive characterization"> nondestructive characterization</a>, <a href="https://publications.waset.org/abstracts/search?q=thin%20tubes" title=" thin tubes"> thin tubes</a> </p> <a href="https://publications.waset.org/abstracts/162330/embedded-acoustic-signal-processing-system-using-openmp-architecture" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/162330.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">92</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">18290</span> System for Electromyography Signal Emulation Through the Use of Embedded Systems</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Valentina%20Narvaez%20Gaitan">Valentina Narvaez Gaitan</a>, <a href="https://publications.waset.org/abstracts/search?q=Laura%20Valentina%20Rodriguez%20Leguizamon"> Laura Valentina Rodriguez Leguizamon</a>, <a href="https://publications.waset.org/abstracts/search?q=Ruben%20Dario%20Hernandez%20B."> Ruben Dario Hernandez B.</a> </p> <p class="card-text"><strong>Abstract:</strong></p> This work describes a physiological signal emulation system that uses electromyography (EMG) signals obtained from muscle sensors in the first instance. These signals are used to extract their characteristics to model and emulate specific arm movements. The main objective of this effort is to develop a new biomedical software system capable of generating physiological signals through the use of embedded systems by establishing the characteristics of the acquired signals. The acquisition system used was Biosignals, which contains two EMG electrodes used to acquire signals from the forearm muscles placed on the extensor and flexor muscles. Processing algorithms were implemented to classify the signals generated by the arm muscles when performing specific movements such as wrist flexion extension, palmar grip, and wrist pronation-supination. Matlab software was used to condition and preprocess the signals for subsequent classification. Subsequently, the mathematical modeling of each signal is performed to be generated by the embedded system, with a validation of the accuracy of the obtained signal using the percentage of cross-correlation, obtaining a precision of 96%. The equations are then discretized to be emulated in the embedded system, obtaining a system capable of generating physiological signals according to the characteristics of medical analysis. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=classification" title="classification">classification</a>, <a href="https://publications.waset.org/abstracts/search?q=electromyography" title=" electromyography"> electromyography</a>, <a href="https://publications.waset.org/abstracts/search?q=embedded%20system" title=" embedded system"> embedded system</a>, <a href="https://publications.waset.org/abstracts/search?q=emulation" title=" emulation"> emulation</a>, <a href="https://publications.waset.org/abstracts/search?q=physiological%20signals" title=" physiological signals"> physiological signals</a> </p> <a href="https://publications.waset.org/abstracts/165468/system-for-electromyography-signal-emulation-through-the-use-of-embedded-systems" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/165468.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">111</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">18289</span> Recognition of Cursive Arabic Handwritten Text Using Embedded Training Based on Hidden Markov Models (HMMs)</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Rabi%20Mouhcine">Rabi Mouhcine</a>, <a href="https://publications.waset.org/abstracts/search?q=Amrouch%20Mustapha"> Amrouch Mustapha</a>, <a href="https://publications.waset.org/abstracts/search?q=Mahani%20Zouhir"> Mahani Zouhir</a>, <a href="https://publications.waset.org/abstracts/search?q=Mammass%20Driss"> Mammass Driss</a> </p> <p class="card-text"><strong>Abstract:</strong></p> In this paper, we present a system for offline recognition cursive Arabic handwritten text based on Hidden Markov Models (HMMs). The system is analytical without explicit segmentation used embedded training to perform and enhance the character models. Extraction features preceded by baseline estimation are statistical and geometric to integrate both the peculiarities of the text and the pixel distribution characteristics in the word image. These features are modelled using hidden Markov models and trained by embedded training. The experiments on images of the benchmark IFN/ENIT database show that the proposed system improves recognition. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=recognition" title="recognition">recognition</a>, <a href="https://publications.waset.org/abstracts/search?q=handwriting" title=" handwriting"> handwriting</a>, <a href="https://publications.waset.org/abstracts/search?q=Arabic%20text" title=" Arabic text"> Arabic text</a>, <a href="https://publications.waset.org/abstracts/search?q=HMMs" title=" HMMs"> HMMs</a>, <a href="https://publications.waset.org/abstracts/search?q=embedded%20training" title=" embedded training"> embedded training</a> </p> <a href="https://publications.waset.org/abstracts/54405/recognition-of-cursive-arabic-handwritten-text-using-embedded-training-based-on-hidden-markov-models-hmms" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/54405.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">354</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">18288</span> Engineering the Human Mind: Social Engineering Attack Using Kali Linux</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Joy%20Winston%20James">Joy Winston James</a>, <a href="https://publications.waset.org/abstracts/search?q=Abdul%20Kadher%20Jilani"> Abdul Kadher Jilani</a> </p> <p class="card-text"><strong>Abstract:</strong></p> This review article provides a comprehensive overview of social engineering attacks, specifically those executed through the Kali Linux operating system. It aims to present an in-depth analysis of the background and importance of social engineering in cybersecurity, the tools, and techniques used in these attacks, real-world case studies that demonstrate their effectiveness, and ethical considerations that need to be taken into account while using them. The article highlights the Kali Linux tools that are commonly used in social engineering attacks, including SET, Metasploit, and BeEF, and discusses techniques such as phishing, pretexting, and baiting that are crucial in conducting successful social engineering attacks. It further explores real-world case studies that demonstrate the effectiveness of these techniques, emphasizing the importance of implementing effective countermeasures to reduce the risk of successful social engineering attacks. Moreover, the article sheds light on ethical considerations that need to be taken into account while using social engineering tools, emphasizing the importance of using them ethically and legally. Finally, the article provides potential countermeasures such as two-factor authentication, strong password policies, and regular security audits to help individuals and organizations better protect themselves against this growing threat. By understanding the tools and techniques used in social engineering attacks and implementing appropriate countermeasures, individuals and organizations can minimize the risk of successful social engineering attacks and improve their cybersecurity posture. To illustrate the effectiveness of social engineering attacks, we present real-world case studies that demonstrate how easily individuals and organizations can fall prey to these attacks. We also discuss ethical considerations that must be taken into account while using social engineering tools, emphasizing the need for responsible and legal use of these tools. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=pen%20testing" title="pen testing">pen testing</a>, <a href="https://publications.waset.org/abstracts/search?q=hacking" title=" hacking"> hacking</a>, <a href="https://publications.waset.org/abstracts/search?q=Kali%20Linux" title=" Kali Linux"> Kali Linux</a>, <a href="https://publications.waset.org/abstracts/search?q=social%20engineering" title=" social engineering"> social engineering</a> </p> <a href="https://publications.waset.org/abstracts/166413/engineering-the-human-mind-social-engineering-attack-using-kali-linux" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/166413.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">98</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">18287</span> A Study on Design for Parallel Test Based on Embedded System</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Zheng%20Sun">Zheng Sun</a>, <a href="https://publications.waset.org/abstracts/search?q=Weiwei%20Cui"> Weiwei Cui</a>, <a href="https://publications.waset.org/abstracts/search?q=Xiaodong%20Ma"> Xiaodong Ma</a>, <a href="https://publications.waset.org/abstracts/search?q=Hongxin%20Jin"> Hongxin Jin</a>, <a href="https://publications.waset.org/abstracts/search?q=Dongpao%20Hong"> Dongpao Hong</a>, <a href="https://publications.waset.org/abstracts/search?q=Jinsong%20Yang"> Jinsong Yang</a>, <a href="https://publications.waset.org/abstracts/search?q=Jingyi%20Sun"> Jingyi Sun</a> </p> <p class="card-text"><strong>Abstract:</strong></p> With the improvement of the performance and complexity of modern equipment, automatic test system (ATS) becomes widely used for condition monitoring and fault diagnosis. However, the conventional ATS mainly works in a serial mode, and lacks the ability of testing several equipments at the same time. That leads to low test efficiency and ATS redundancy. Especially for a large majority of equipment under test, the conventional ATS cannot meet the requirement of efficient testing. To reduce the support resource and increase test efficiency, we propose a method of design for the parallel test based on the embedded system in this paper. Firstly, we put forward the general framework of the parallel test system, and the system contains a central management system (CMS) and several distributed test subsystems (DTS). Then we give a detailed design of the system. For the hardware of the system, we use embedded architecture to design DTS. For the software of the system, we use test program set to improve the test adaption. By deploying the parallel test system, the time to test five devices is now equal to the time to test one device in the past. Compared with the conventional test system, the proposed test system reduces the size and improves testing efficiency. This is of great significance for equipment to be put into operation swiftly. Finally, we take an industrial control system as an example to verify the effectiveness of the proposed method. The result shows that the method is reasonable, and the efficiency is improved up to 500%. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=parallel%20test" title="parallel test">parallel test</a>, <a href="https://publications.waset.org/abstracts/search?q=embedded%20system" title=" embedded system"> embedded system</a>, <a href="https://publications.waset.org/abstracts/search?q=automatic%20test%20system" title=" automatic test system"> automatic test system</a>, <a href="https://publications.waset.org/abstracts/search?q=automatic%20test%20system%20%28ATS%29" title=" automatic test system (ATS)"> automatic test system (ATS)</a>, <a href="https://publications.waset.org/abstracts/search?q=central%20management%20system" title=" central management system"> central management system</a>, <a href="https://publications.waset.org/abstracts/search?q=central%20management%20system%20%28CMS%29" title=" central management system (CMS)"> central management system (CMS)</a>, <a href="https://publications.waset.org/abstracts/search?q=distributed%20test%20subsystems" title=" distributed test subsystems"> distributed test subsystems</a>, <a href="https://publications.waset.org/abstracts/search?q=distributed%20test%20subsystems%20%28DTS%29" title=" distributed test subsystems (DTS)"> distributed test subsystems (DTS)</a> </p> <a href="https://publications.waset.org/abstracts/99560/a-study-on-design-for-parallel-test-based-on-embedded-system" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/99560.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">305</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">18286</span> A Wireless Feedback Control System as a Base of Bio-Inspired Structure System to Mitigate Vibration in Structures</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Gwanghee%20Heo">Gwanghee Heo</a>, <a href="https://publications.waset.org/abstracts/search?q=Geonhyeok%20Bang"> Geonhyeok Bang</a>, <a href="https://publications.waset.org/abstracts/search?q=Chunggil%20Kim"> Chunggil Kim</a>, <a href="https://publications.waset.org/abstracts/search?q=Chinok%20Lee"> Chinok Lee</a> </p> <p class="card-text"><strong>Abstract:</strong></p> This paper attempts to develop a wireless feedback control system as a primary step eventually toward a bio-inspired structure system where inanimate structure behaves like a life form autonomously. It is a standalone wireless control system which is supposed to measure externally caused structural responses, analyze structural state from acquired data, and take its own action on the basis of the analysis with an embedded logic. For an experimental examination of its effectiveness, we applied it on a model of two-span bridge and performed a wireless control test. Experimental tests have been conducted for comparison on both the wireless and the wired system under the conditions of Un-control, Passive-off, Passive-on, and Lyapunov control algorithm. By proving the congruence of the test result of the wireless feedback control system with the wired control system, its control performance was proven to be effective. Besides, it was found to be economical in energy consumption and also autonomous by means of a command algorithm embedded into it, which proves its basic capacity as a bio-inspired system. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=structural%20vibration%20control" title="structural vibration control">structural vibration control</a>, <a href="https://publications.waset.org/abstracts/search?q=wireless%20system" title=" wireless system"> wireless system</a>, <a href="https://publications.waset.org/abstracts/search?q=MR%20damper" title=" MR damper"> MR damper</a>, <a href="https://publications.waset.org/abstracts/search?q=feedback%20control" title=" feedback control"> feedback control</a>, <a href="https://publications.waset.org/abstracts/search?q=embedded%20system" title=" embedded system"> embedded system</a> </p> <a href="https://publications.waset.org/abstracts/93059/a-wireless-feedback-control-system-as-a-base-of-bio-inspired-structure-system-to-mitigate-vibration-in-structures" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/93059.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">211</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">18285</span> Interval Type-2 Fuzzy Vibration Control of an ERF Embedded Smart Structure</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Chih-Jer%20Lin">Chih-Jer Lin</a>, <a href="https://publications.waset.org/abstracts/search?q=Chun-Ying%20Lee"> Chun-Ying Lee</a>, <a href="https://publications.waset.org/abstracts/search?q=Ying%20Liu"> Ying Liu</a>, <a href="https://publications.waset.org/abstracts/search?q=Chiang-Ho%20Cheng"> Chiang-Ho Cheng</a> </p> <p class="card-text"><strong>Abstract:</strong></p> The main objective of this article is to present the semi-active vibration control using an electro-rheological fluid embedded sandwich structure for a cantilever beam. ER fluid is a smart material, which cause the suspended particles polarize and connect each other to form chain. The stiffness and damping coefficients of the ER fluid can be changed in 10 micro seconds; therefore, ERF is suitable to become the material embedded in the tunable vibration absorber to become a smart absorber. For the ERF smart material embedded structure, the fuzzy control law depends on the experimental expert database and the proposed self-tuning strategy. The electric field is controlled by a CRIO embedded system to implement the real application. This study investigates the different performances using the Type-1 fuzzy and interval Type-2 fuzzy controllers. The Interval type-2 fuzzy control is used to improve the modeling uncertainties for this ERF embedded shock absorber. The self-tuning vibration controllers using Type-1 and Interval Type-2 fuzzy law are implemented to the shock absorber system. Based on the resulting performance, Internal Type-2 fuzzy is better than the traditional Type-1 fuzzy control for this vibration control system. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=electro-rheological%20fluid" title="electro-rheological fluid">electro-rheological fluid</a>, <a href="https://publications.waset.org/abstracts/search?q=semi-active%20vibration%20control" title=" semi-active vibration control"> semi-active vibration control</a>, <a href="https://publications.waset.org/abstracts/search?q=shock%20absorber" title=" shock absorber"> shock absorber</a>, <a href="https://publications.waset.org/abstracts/search?q=type%202%20fuzzy%20control" title=" type 2 fuzzy control "> type 2 fuzzy control </a> </p> <a href="https://publications.waset.org/abstracts/7630/interval-type-2-fuzzy-vibration-control-of-an-erf-embedded-smart-structure" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/7630.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">447</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">18284</span> Towards a Framework for Embedded Weight Comparison Algorithm with Business Intelligence in the Plantation Domain</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=M.%20Pushparani">M. Pushparani</a>, <a href="https://publications.waset.org/abstracts/search?q=A.%20Sagaya"> A. Sagaya</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Embedded systems have emerged as important elements in various domains with extensive applications in automotive, commercial, consumer, healthcare and transportation markets, as there is emphasis on intelligent devices. On the other hand, Business Intelligence (BI) has also been extensively used in a range of applications, especially in the agriculture domain which is the area of this research. The aim of this research is to create a framework for Embedded Weight Comparison Algorithm with Business Intelligence (EWCA-BI). The weight comparison algorithm will be embedded within the plantation management system and the weighbridge system. This algorithm will be used to estimate the weight at the site and will be compared with the actual weight at the plantation. The algorithm will be used to build the necessary alerts when there is a discrepancy in the weight, thus enabling better decision making. In the current practice, data are collected from various locations in various forms. It is a challenge to consolidate data to obtain timely and accurate information for effective decision making. Adding to this, the unstable network connection leads to difficulty in getting timely accurate information. To overcome the challenges embedding is done on a portable device that will have the embedded weight comparison algorithm to also assist in data capture and synchronize data at various locations overcoming the network short comings at collection points. The EWCA-BI will provide real-time information at any given point of time, thus enabling non-latent BI reports that will provide crucial information to enable efficient operational decision making. This research has a high potential in bringing embedded system into the agriculture industry. EWCA-BI will provide BI reports with accurate information with uncompromised data using an embedded system and provide alerts, therefore, enabling effective operation management decision-making at the site. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=embedded%20business%20intelligence" title="embedded business intelligence">embedded business intelligence</a>, <a href="https://publications.waset.org/abstracts/search?q=weight%20comparison%20algorithm" title=" weight comparison algorithm"> weight comparison algorithm</a>, <a href="https://publications.waset.org/abstracts/search?q=oil%20palm%20plantation" title=" oil palm plantation"> oil palm plantation</a>, <a href="https://publications.waset.org/abstracts/search?q=embedded%20systems" title=" embedded systems"> embedded systems</a> </p> <a href="https://publications.waset.org/abstracts/53115/towards-a-framework-for-embedded-weight-comparison-algorithm-with-business-intelligence-in-the-plantation-domain" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/53115.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">285</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">18283</span> The Design of Intelligent Classroom Management System with Raspberry PI</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Sathapath%20Kilaso">Sathapath Kilaso</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Attendance checking in the classroom for student is object to record the student’s attendance in order to support the learning activities in the classroom. Despite the teaching trend in the 21st century is the student-center learning and the lecturer duty is to mentor and give an advice, the classroom learning is still important in order to let the student interact with the classmate and the lecturer or for a specific subject which the in-class learning is needed. The development of the system prototype by applied the microcontroller technology and embedded system with the “internet of thing” trend and the web socket technique will allow the lecturer to be alerted immediately whenever the data is updated. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=arduino" title="arduino">arduino</a>, <a href="https://publications.waset.org/abstracts/search?q=embedded%20system" title=" embedded system"> embedded system</a>, <a href="https://publications.waset.org/abstracts/search?q=classroom" title=" classroom"> classroom</a>, <a href="https://publications.waset.org/abstracts/search?q=raspberry%20PI" title=" raspberry PI "> raspberry PI </a> </p> <a href="https://publications.waset.org/abstracts/27506/the-design-of-intelligent-classroom-management-system-with-raspberry-pi" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/27506.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">374</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">18282</span> Supporting Embedded Medical Software Development with MDevSPICE® and Agile Practices</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Surafel%20Demissie">Surafel Demissie</a>, <a href="https://publications.waset.org/abstracts/search?q=Frank%20Keenan"> Frank Keenan</a>, <a href="https://publications.waset.org/abstracts/search?q=Fergal%20McCaffery"> Fergal McCaffery</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Emerging medical devices are highly relying on embedded software that runs on the specific platform in real time. The development of embedded software is different from ordinary software development due to the hardware-software dependency. MDevSPICE<sup>®</sup> has been developed to provide guidance to support such development. To increase the flexibility of this framework agile practices have been introduced. This paper outlines the challenges for embedded medical device software development and the structure of MDevSPICE<sup>® </sup>and suggests a suitable combination of agile practices that will help to add flexibility and address corresponding challenges of embedded medical device software development. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=agile%20practices" title="agile practices">agile practices</a>, <a href="https://publications.waset.org/abstracts/search?q=challenges" title=" challenges"> challenges</a>, <a href="https://publications.waset.org/abstracts/search?q=embedded%20software" title=" embedded software"> embedded software</a>, <a href="https://publications.waset.org/abstracts/search?q=MDevSPICE%C2%AE" title=" MDevSPICE®"> MDevSPICE®</a>, <a href="https://publications.waset.org/abstracts/search?q=medical%20device" title=" medical device"> medical device</a> </p> <a href="https://publications.waset.org/abstracts/61039/supporting-embedded-medical-software-development-with-mdevspice-and-agile-practices" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/61039.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">264</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">18281</span> Emotion Detection in a General Human-Robot Interaction System Optimized for Embedded Platforms</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Julio%20Vega">Julio Vega</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Expression recognition is a field of Artificial Intelligence whose main objectives are to recognize basic forms of affective expression that appear on people’s faces and contributing to behavioral studies. In this work, a ROS node has been developed that, based on Deep Learning techniques, is capable of detecting the facial expressions of the people that appear in the image. These algorithms were optimized so that they can be executed in real time on an embedded platform. The experiments were carried out in a PC with a USB camera and in a Raspberry Pi 4 with a PiCamera. The final results shows a plausible system, which is capable to work in real time even in an embedded platform. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=python" title="python">python</a>, <a href="https://publications.waset.org/abstracts/search?q=low-cost" title=" low-cost"> low-cost</a>, <a href="https://publications.waset.org/abstracts/search?q=raspberry%20pi" title=" raspberry pi"> raspberry pi</a>, <a href="https://publications.waset.org/abstracts/search?q=emotion%20detection" title=" emotion detection"> emotion detection</a>, <a href="https://publications.waset.org/abstracts/search?q=human-robot%20interaction" title=" human-robot interaction"> human-robot interaction</a>, <a href="https://publications.waset.org/abstracts/search?q=ROS%20node" title=" ROS node"> ROS node</a> </p> <a href="https://publications.waset.org/abstracts/151311/emotion-detection-in-a-general-human-robot-interaction-system-optimized-for-embedded-platforms" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/151311.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">129</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">18280</span> Embedded Digital Image System </h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Dawei%20Li">Dawei Li</a>, <a href="https://publications.waset.org/abstracts/search?q=Cheng%20Liu"> Cheng Liu</a>, <a href="https://publications.waset.org/abstracts/search?q=Yiteng%20Liu"> Yiteng Liu</a> </p> <p class="card-text"><strong>Abstract:</strong></p> This paper introduces an embedded digital image system for Chinese space environment vertical exploration sounding rocket. In order to record the flight status of the sounding rocket as well as the payloads, an onboard embedded image processing system based on ADV212, a JPEG2000 compression chip, is designed in this paper. Since the sounding rocket is not designed to be recovered, all image data should be transmitted to the ground station before the re-entry while the downlink band used for the image transmission is only about 600 kbps. Under the same condition of compression ratio compared with other algorithm, JPEG2000 standard algorithm can achieve better image quality. So JPEG2000 image compression is applied under this condition with a limited downlink data band. This embedded image system supports lossless to 200:1 real time compression, with two cameras to monitor nose ejection and motor separation, and two cameras to monitor boom deployment. The encoder, ADV7182, receives PAL signal from the camera, then output the ITU-R BT.656 signal to ADV212. ADV7182 switches between four input video channels as the program sequence. Two SRAMs are used for Ping-pong operation and one 512 Mb SDRAM for buffering high frame-rate images. The whole image system has the characteristics of low power dissipation, low cost, small size and high reliability, which is rather suitable for this sounding rocket application. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=ADV212" title="ADV212">ADV212</a>, <a href="https://publications.waset.org/abstracts/search?q=image%20system" title=" image system"> image system</a>, <a href="https://publications.waset.org/abstracts/search?q=JPEG2000" title=" JPEG2000"> JPEG2000</a>, <a href="https://publications.waset.org/abstracts/search?q=sounding%20rocket" title=" sounding rocket"> sounding rocket</a> </p> <a href="https://publications.waset.org/abstracts/37615/embedded-digital-image-system" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/37615.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">421</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">18279</span> Discussing Embedded versus Central Machine Learning in Wireless Sensor Networks </h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Anne-Lena%20Kampen">Anne-Lena Kampen</a>, <a href="https://publications.waset.org/abstracts/search?q=%C3%98ivind%20Kure"> Øivind Kure</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Machine learning (ML) can be implemented in Wireless Sensor Networks (WSNs) as a central solution or distributed solution where the ML is embedded in the nodes. Embedding improves privacy and may reduce prediction delay. In addition, the number of transmissions is reduced. However, quality factors such as prediction accuracy, fault detection efficiency and coordinated control of the overall system suffer. Here, we discuss and highlight the trade-offs that should be considered when choosing between embedding and centralized ML, especially for multihop networks. In addition, we present estimations that demonstrate the energy trade-offs between embedded and centralized ML. Although the total network energy consumption is lower with central prediction, it makes the network more prone for partitioning due to the high forwarding load on the one-hop nodes. Moreover, the continuous improvements in the number of operations per joule for embedded devices will move the energy balance toward embedded prediction. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=central%20machine%20learning" title="central machine learning">central machine learning</a>, <a href="https://publications.waset.org/abstracts/search?q=embedded%20machine%20learning" title=" embedded machine learning"> embedded machine learning</a>, <a href="https://publications.waset.org/abstracts/search?q=energy%20consumption" title=" energy consumption"> energy consumption</a>, <a href="https://publications.waset.org/abstracts/search?q=local%20machine%20learning" title=" local machine learning"> local machine learning</a>, <a href="https://publications.waset.org/abstracts/search?q=wireless%20sensor%20networks" title=" wireless sensor networks"> wireless sensor networks</a>, <a href="https://publications.waset.org/abstracts/search?q=WSN" title=" WSN"> WSN</a> </p> <a href="https://publications.waset.org/abstracts/127522/discussing-embedded-versus-central-machine-learning-in-wireless-sensor-networks" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/127522.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">153</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">18278</span> Low-Cost Embedded Biometric System Based on Fingervein Modality</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Randa%20Boukhris">Randa Boukhris</a>, <a href="https://publications.waset.org/abstracts/search?q=Alima%20Damak"> Alima Damak</a>, <a href="https://publications.waset.org/abstracts/search?q=Dorra%20Sellami"> Dorra Sellami</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Fingervein biometric authentication is one of the most popular and accurate technologies. However, low cost embedded solution is still an open problem. In this paper, a real-time implementation of fingervein recognition process embedded in Raspberry-Pi has been proposed. The use of Raspberry-Pi reduces overall system cost and size while allowing an easy user interface. Implementation of a target technology has guided to opt some specific parallel and simple processing algorithms. In the proposed system, we use four structural directional kernel elements for filtering finger vein images. Then, a Top-Hat and Bottom-Hat kernel filters are used to enhance the visibility and the appearance of venous images. For feature extraction step, a simple Local Directional Code (LDC) descriptor is applied. The proposed system presents an Error Equal Rate (EER) and Identification Rate (IR), respectively, equal to 0.02 and 98%. Furthermore, experimental results show that real-time operations have good performance. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=biometric" title="biometric">biometric</a>, <a href="https://publications.waset.org/abstracts/search?q=Bottom-Hat" title=" Bottom-Hat"> Bottom-Hat</a>, <a href="https://publications.waset.org/abstracts/search?q=Fingervein" title=" Fingervein"> Fingervein</a>, <a href="https://publications.waset.org/abstracts/search?q=LDC" title=" LDC"> LDC</a>, <a href="https://publications.waset.org/abstracts/search?q=Rasberry-Pi" title=" Rasberry-Pi"> Rasberry-Pi</a>, <a href="https://publications.waset.org/abstracts/search?q=ROI" title=" ROI"> ROI</a>, <a href="https://publications.waset.org/abstracts/search?q=Top-Hat" title=" Top-Hat"> Top-Hat</a> </p> <a href="https://publications.waset.org/abstracts/86829/low-cost-embedded-biometric-system-based-on-fingervein-modality" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/86829.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">205</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">18277</span> Effective Nutrition Label Use on Smartphones</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Vladimir%20Kulyukin">Vladimir Kulyukin</a>, <a href="https://publications.waset.org/abstracts/search?q=Tanwir%20Zaman"> Tanwir Zaman</a>, <a href="https://publications.waset.org/abstracts/search?q=Sarat%20Kiran%20Andhavarapu"> Sarat Kiran Andhavarapu</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Research on nutrition label use identifies four factors that impede comprehension and retention of nutrition information by consumers: label’s location on the package, presentation of information within the label, label’s surface size, and surrounding visual clutter. In this paper, a system is presented that makes nutrition label use more effective for nutrition information comprehension and retention. The system’s front end is a smartphone application. The system’s back end is a four node Linux cluster for image recognition and data storage. Image frames captured on the smartphone are sent to the back end for skewed or aligned barcode recognition. When barcodes are recognized, corresponding nutrition labels are retrieved from a cloud database and presented to the user on the smartphone’s touchscreen. Each displayed nutrition label is positioned centrally on the touchscreen with no surrounding visual clutter. Wikipedia links to important nutrition terms are embedded to improve comprehension and retention of nutrition information. Standard touch gestures (e.g., zoom in/out) available on mainstream smartphones are used to manipulate the label’s surface size. The nutrition label database currently includes 200,000 nutrition labels compiled from public web sites by a custom crawler. Stress test experiments with the node cluster are presented. Implications for proactive nutrition management and food policy are discussed. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=mobile%20computing" title="mobile computing">mobile computing</a>, <a href="https://publications.waset.org/abstracts/search?q=cloud%20computing" title=" cloud computing"> cloud computing</a>, <a href="https://publications.waset.org/abstracts/search?q=nutrition%20label%20use" title=" nutrition label use"> nutrition label use</a>, <a href="https://publications.waset.org/abstracts/search?q=nutrition%20management" title=" nutrition management"> nutrition management</a>, <a href="https://publications.waset.org/abstracts/search?q=barcode%20scanning" title=" barcode scanning "> barcode scanning </a> </p> <a href="https://publications.waset.org/abstracts/6102/effective-nutrition-label-use-on-smartphones" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/6102.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">373</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">18276</span> Development of AUTOSAR Software Components of MDPS System</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Jae-Woo%20Kim">Jae-Woo Kim</a>, <a href="https://publications.waset.org/abstracts/search?q=Kyung-Joong%20Lee"> Kyung-Joong Lee</a>, <a href="https://publications.waset.org/abstracts/search?q=Hyun-Sik%20Ahn"> Hyun-Sik Ahn</a> </p> <p class="card-text"><strong>Abstract:</strong></p> This paper describes the development of a Motor-Driven Power Steering (MDPS) system using Automotive Open System Architecture (AUTOSAR) methodology. The MDPS system is a new power steering technology for vehicles and it can enhance driver’s convenience and fuel efficiency. AUTOSAR defines common standards for the implementation of embedded automotive software. Some aspects of safety and timing requirements are analyzed. Through the AUTOSAR methodology, the embedded software becomes more flexible, reusable and maintainable than ever. Hence, we first design software components (SW-C) for MDPS control based on AUTOSAR and implement SW-Cs for MDPS control using authoring tool following AUTOSAR standards. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=AUTOSAR" title="AUTOSAR">AUTOSAR</a>, <a href="https://publications.waset.org/abstracts/search?q=MDPS" title=" MDPS"> MDPS</a>, <a href="https://publications.waset.org/abstracts/search?q=simulink" title=" simulink"> simulink</a>, <a href="https://publications.waset.org/abstracts/search?q=software%20component" title=" software component"> software component</a> </p> <a href="https://publications.waset.org/abstracts/33517/development-of-autosar-software-components-of-mdps-system" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/33517.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">350</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">18275</span> Experiences of Timing Analysis of Parallel Embedded Software</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Muhammad%20Waqar%20Aziz">Muhammad Waqar Aziz</a>, <a href="https://publications.waset.org/abstracts/search?q=Syed%20Abdul%20Baqi%20Shah"> Syed Abdul Baqi Shah</a> </p> <p class="card-text"><strong>Abstract:</strong></p> The execution time analysis is fundamental to the successful design and execution of real-time embedded software. In such analysis, the Worst-Case Execution Time (WCET) of a program is a key measure, on the basis of which system tasks are scheduled. The WCET analysis of embedded software is also needed for system understanding and to guarantee its behavior. WCET analysis can be performed statically (without executing the program) or dynamically (through measurement). Traditionally, research on the WCET analysis assumes sequential code running on single-core platforms. However, as computation is steadily moving towards using a combination of parallel programs and multi-core hardware, new challenges in WCET analysis need to be addressed. In this article, we report our experiences of performing the WCET analysis of Parallel Embedded Software (PES) running on multi-core platform. The primary purpose was to investigate how WCET estimates of PES can be computed statically, and how they can be derived dynamically. Our experiences, as reported in this article, include the challenges we faced, possible suggestions to these challenges and the workarounds that were developed. This article also provides observations on the benefits and drawbacks of deriving the WCET estimates using the said methods and provides useful recommendations for further research in this area. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=embedded%20software" title="embedded software">embedded software</a>, <a href="https://publications.waset.org/abstracts/search?q=worst-case%20execution-time%20analysis" title=" worst-case execution-time analysis"> worst-case execution-time analysis</a>, <a href="https://publications.waset.org/abstracts/search?q=static%20flow%20analysis" title=" static flow analysis"> static flow analysis</a>, <a href="https://publications.waset.org/abstracts/search?q=measurement-based%20analysis" title=" measurement-based analysis"> measurement-based analysis</a>, <a href="https://publications.waset.org/abstracts/search?q=parallel%20computing" title=" parallel computing"> parallel computing</a> </p> <a href="https://publications.waset.org/abstracts/45004/experiences-of-timing-analysis-of-parallel-embedded-software" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/45004.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">324</span> </span> </div> </div> <ul class="pagination"> <li class="page-item disabled"><span class="page-link">‹</span></li> <li class="page-item active"><span class="page-link">1</span></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=embedded%20Linux%20system&page=2">2</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=embedded%20Linux%20system&page=3">3</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=embedded%20Linux%20system&page=4">4</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=embedded%20Linux%20system&page=5">5</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=embedded%20Linux%20system&page=6">6</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=embedded%20Linux%20system&page=7">7</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=embedded%20Linux%20system&page=8">8</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=embedded%20Linux%20system&page=9">9</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=embedded%20Linux%20system&page=10">10</a></li> <li class="page-item disabled"><span class="page-link">...</span></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=embedded%20Linux%20system&page=610">610</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=embedded%20Linux%20system&page=611">611</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=embedded%20Linux%20system&page=2" rel="next">›</a></li> </ul> </div> </main> <footer> <div id="infolinks" class="pt-3 pb-2"> <div class="container"> <div style="background-color:#f5f5f5;" class="p-3"> <div class="row"> <div class="col-md-2"> <ul class="list-unstyled"> About <li><a href="https://waset.org/page/support">About Us</a></li> <li><a href="https://waset.org/page/support#legal-information">Legal</a></li> <li><a target="_blank" rel="nofollow" href="https://publications.waset.org/static/files/WASET-16th-foundational-anniversary.pdf">WASET celebrates its 16th foundational anniversary</a></li> </ul> </div> <div class="col-md-2"> <ul class="list-unstyled"> Account <li><a href="https://waset.org/profile">My Account</a></li> </ul> </div> <div class="col-md-2"> <ul class="list-unstyled"> Explore <li><a href="https://waset.org/disciplines">Disciplines</a></li> <li><a href="https://waset.org/conferences">Conferences</a></li> <li><a href="https://waset.org/conference-programs">Conference Program</a></li> <li><a href="https://waset.org/committees">Committees</a></li> <li><a href="https://publications.waset.org">Publications</a></li> </ul> </div> <div class="col-md-2"> <ul class="list-unstyled"> Research <li><a href="https://publications.waset.org/abstracts">Abstracts</a></li> <li><a href="https://publications.waset.org">Periodicals</a></li> <li><a href="https://publications.waset.org/archive">Archive</a></li> </ul> </div> <div class="col-md-2"> <ul class="list-unstyled"> Open Science <li><a target="_blank" rel="nofollow" href="https://publications.waset.org/static/files/Open-Science-Philosophy.pdf">Open Science Philosophy</a></li> <li><a target="_blank" rel="nofollow" href="https://publications.waset.org/static/files/Open-Science-Award.pdf">Open Science Award</a></li> <li><a target="_blank" rel="nofollow" href="https://publications.waset.org/static/files/Open-Society-Open-Science-and-Open-Innovation.pdf">Open Innovation</a></li> <li><a target="_blank" rel="nofollow" href="https://publications.waset.org/static/files/Postdoctoral-Fellowship-Award.pdf">Postdoctoral Fellowship Award</a></li> <li><a target="_blank" rel="nofollow" href="https://publications.waset.org/static/files/Scholarly-Research-Review.pdf">Scholarly Research Review</a></li> </ul> </div> <div class="col-md-2"> <ul class="list-unstyled"> Support <li><a href="https://waset.org/page/support">Support</a></li> <li><a href="https://waset.org/profile/messages/create">Contact Us</a></li> <li><a href="https://waset.org/profile/messages/create">Report Abuse</a></li> </ul> </div> </div> </div> </div> </div> <div class="container text-center"> <hr style="margin-top:0;margin-bottom:.3rem;"> <a href="https://creativecommons.org/licenses/by/4.0/" target="_blank" class="text-muted small">Creative Commons Attribution 4.0 International License</a> <div id="copy" class="mt-2">© 2024 World Academy of Science, Engineering and Technology</div> </div> </footer> <a href="javascript:" id="return-to-top"><i class="fas fa-arrow-up"></i></a> <div class="modal" id="modal-template"> <div class="modal-dialog"> <div class="modal-content"> <div class="row m-0 mt-1"> <div class="col-md-12"> <button type="button" class="close" data-dismiss="modal" aria-label="Close"><span aria-hidden="true">×</span></button> </div> </div> <div class="modal-body"></div> </div> </div> </div> <script src="https://cdn.waset.org/static/plugins/jquery-3.3.1.min.js"></script> <script src="https://cdn.waset.org/static/plugins/bootstrap-4.2.1/js/bootstrap.bundle.min.js"></script> <script src="https://cdn.waset.org/static/js/site.js?v=150220211556"></script> <script> jQuery(document).ready(function() { /*jQuery.get("https://publications.waset.org/xhr/user-menu", function (response) { jQuery('#mainNavMenu').append(response); });*/ jQuery.get({ url: "https://publications.waset.org/xhr/user-menu", cache: false }).then(function(response){ jQuery('#mainNavMenu').append(response); }); }); </script> </body> </html>