Embedded Systems Articles
-
How to reuse your IIoT technology investments - now (Apr. 11, 2018)
While we can all relate to wearables for sport and fitness, smart homes, and even “Siri” and her many step sisters, the real surprise is how the Industrial IoT (IIoT) is quietly gaining significant momentum among businesses and industries throughout the world.
-
Aircraft Jet Engine Failure Analytics Using Google Cloud Platform Based Deep Learning (Apr. 09, 2018)
This white paper presents an aircraft jet engine sensor fault diagnostics and prediction implementation using Google cloud platform. The use cases covered are effectively implemented to demonstrate the GCP capability to implement such a prognostic system.
-
Managing energy consumption in wireless IoT devices (Apr. 04, 2018)
Battery life is one of the last thing on the minds of developers rushing to complete their designs but there are a number of things they can do...
-
Tackling IoT system interoperability (Mar. 05, 2018)
IoT application development has already evolved largely into an integration problem. Developers can find all manner of IoT hardware devices that provide a growing number of near drop-in solutions for populating an IoT system's layers of terminal sensor nodes and edge computing devices.
-
Machines can see, hear and analyze thanks to embedded neural networks (Feb. 27, 2018)
The potential applications around artificial intelligence (AI) continue to grow on a daily basis. As the power of different neural network (NN) architectures are tested, tuned and refined to tackle different problems, diverse methods of optimally analyzing data using AI are found.
-
IoT security: hardware vs software (Jan. 22, 2018)
We are now in the business of connecting everything to everything. And with this, the Internet of Things (IoT) is born. Once this total connectivity is accomplished, the collective effort this brings lets us start the next string of new and exciting systems. This results in massive amounts of data that must be trusted and processed.
-
Achieving MPU security (Jan. 17, 2018)
Encryption, authentication, and other security methods work fine to protect data and program updates passing through the Internet. That is, unless one end can easily be hacked to steal secret keys and possibly implant malware for future activation. Then, unbeknownst to the system operators, confidential information is being stolen daily and possible major service disruptions lie ahead.
-
Wind Turbine Fault Detection Using Machine Learning And Neural Networks (Dec. 18, 2017)
Offshore wind turbines in farm locations are hard to reach and may pose problems in maintenance cycles, the cost of repair, and repair procedures. The smart solution is to utilize remote monitoring and diagnostics based on the sensor data.
-
Authentication Flash: Closing the Security Gap Left by Conventional NOR Flash ICs (Sep. 18, 2017)
In response to demand from security-conscious OEMs, the manufacturers of modern microcontrollers and systems-on-chip (SoCs) commonly equip their products with a broad range of security capabilities: standard, off-the-shelf 32-bit MCUs for mainstream, non-financial applications will today often feature a hardware cryptographic accelerator, a random number generator (RNG) and secure memory locations.
-
Designing for safety and security in a connected system (Sep. 07, 2017)
Good embedded software has always been designed for both safety and security. However, connectivity has introduced intolerable levels of security vulnerability in safety-critical applications such as medical, autonomous vehicles, and Internet of Things (IoT) devices.
-
Optimizing flash memory selection for automotive & other uses (Aug. 21, 2017)
Over the past few years, there has been an increasing demand for NOR Flash memory for use in automotive applications. Initial uses included applications such as infotainment and engine control. However, as advancements in automotive computerization continue to progress, NOR Flash memory is seeing use in a wider range of various automotive applications.
-
The whys and hows of secure boot (Aug. 14, 2017)
With the proliferation of Internet of Things (IoT) devices, which now span just about every walk of life, from smart cities to wireless jewellery, the need to prioritize security in IoT-style embedded systems has never been greater. The secure boot process is a vital first step in securing any embedded system, a necessary part of your application’s anti-malware fortress. Let’s take a look at the pros and cons, with a focus on one of the most popular processors in electronics – the i.MX6.
-
Introducing ARM Cortex-M23 and Cortex-M33 Processors with TrustZone for ARMv8-M (Apr. 10, 2017)
The Cortex-M23 and Cortex-M33 processors are the newest members of the highly popular Cortex-M product family. As such, the two processors maintain the expected characteristics of the embbeded profile such as real-time deterministic interrupt response, low power, low area, ease of development, and 32-bit performance. The security foundation is introduced via the addition of TrustZone® technology. The two processors, with such a vibrant ecosystem, will open the door for opportunities across many diverse market segments.
-
Easing the Development of Functionally Safe Controllers (Apr. 03, 2017)
This paper identifies the need for increased adoption of functional safety and describes how processors can help address the high level of criticality more simply. It details how the provision of fault detection and control features for random errors can be offered together with protection against systematic software errors, while meeting the demanding high-performance and deterministic execution.
-
The Functional Safety Imperative in Automotive Design (Mar. 20, 2017)
Functional safety is about ensuring that products operate safely and do so even when they go wrong. Here’s why you can’t choose to ignore it.
-
Optimizing compilers for ADAS applications (Mar. 07, 2017)
All major OEMs and software suppliers of the automotive industry are committed to advanced driver assistance systems (ADAS). A close look, though, raises questions on the demands ADAS applications place on compilers and toolsets. There are differences between traditional automotive applications and ADAS, and current compliers need some adaptations to better address ADAS needs.
-
Applying DevOps to IoT solution development (Mar. 07, 2017)
In order to weather the big changes of IoT transformation in near future, IoT application developers and product companies must understand that faster time-to-market is very critical to success in the IoT marketplace. To achieve that, you must allow IoT development platforms to do most of the heavy lifting.
-
Upgrading 8- and 16-bit MCU designs: Development ecosystem (Feb. 28, 2017)
In this article, we’ll cover how modern software tools, hardware development ecosystems, and ready-made firmware stacks with code examples ease system design and development of 32-bit systems.
-
Designing a low-cost, low-power multicore ARM-based AV player (Feb. 20, 2017)
This article describes the use of a low-cost, low-density Zynq FPGA in creating a computational platform for implementing infotainment systems for passenger vehicles, such as cars, buses, trains, airplanes and ships. Other applications for this kind of platform include digital signage and information displays in private and public venues such as hotels, hospitals, gas pumps, or kiosks as well as digital picture frames for consumer markets.
-
Debugging hard faults in ARM Cortex-M0 based SoCs (Feb. 09, 2017)
Programmable system-on-chip (PSoC) architectures integrate a wide range of capabilities, including MCU cores like the Cortex-M0, programmable analog blocks (PAB), programmable digital blocks (PDB), programmable interconnect and routing, a wide range of interfaces and peripherals, and advanced capabilities such as capacitive touch sensing. These architectures over many advantages over traditional microcontrollers and can substantially reduce design time and system bill of materials (BOM) cost.
-
5G: Can You Hear Me Now? (Feb. 08, 2017)
The first 5G silicon has been announced. 5G network field trials are underway. The next generation of wireless everything is just about ready. Maybe.
-
Managing the complexity of embedded software development through design automation tools (Jan. 31, 2017)
The diversity of embedded systems means no single sector dominates the industry; end applications vary widely and even the largest — automotive — represents less than 20% according to some analysts.
-
Exploring a Parallel Universe - It's Coming to a Design Near You (Jan. 27, 2017)
Moore’s law has finally started to taper off but demand for performance has not. In response, the industry seems to have committed itself to a path of multicore processors and their bigger, bulkier cousins on steroids: the heterogeneous multicore systems. This path could profoundly change the landscape for software developers, but there has been little discussion of what–if anything–software or system programmers should do about it. This is scary!
-
Building low power into the system at the device driver leve (Jan. 19, 2017)
In today’s products, power is everything. In terms of performance, products are expected to do more in less space and in the case of most devices they need to operate in a smaller power envelope than their predecessors.
-
Can we trust the cloud for video analytics? (Jan. 09, 2017)
The cloud is a useful and powerful resource for storing and processing data, but -- as video cameras become more ubiquitous and more intelligent -- the question of whether video analytics should be performed locally or remotely must be addressed.
-
Understanding the Technology behind Traffic Sign Recognition (TSR) Systems (Jan. 03, 2017)
A visual-based traffic sign recognition system can be implemented on the automobile with an aim of detecting and recognizing all emerging traffic signs. The same would be displayed to the driver with alarm-triggering features if the driver refuses to follow the traffic signs.
-
Protocols For The Wide-Area IoT (Nov. 28, 2016)
The internet of things (IoT) will rely on the ability to place sensors anywhere they are needed. The sensors could be embedded in bridges, scattered across the fields of farms or monitoring traffic from streetlights.
-
Selecting the right hardware configuration for the signal processing platform (Nov. 22, 2016)
This article presents the system level modelling and simulation methodology to architect a signal processing platform for software-defined radios or high-speed communication modems early in the design flow.
-
Tasks and scheduling (Nov. 21, 2016)
We have already considered the multi-tasking concept – multiple quasi-independent programs apparently running at the same time, under the control of an operating system. Before we look at tasks in more detail, we need to straighten out some more terminology.
-
Which IoT protocol should you use for your design? (Nov. 07, 2016)
One thing is for certain when it comes to designing an IoT (Internet of Things) device; it won't be standalone. Unlike the way most traditional embedded devices have been developed in the past, such as the old-style digital thermostat I have in my hallway, IoT devices will always feature some form of communication