The document discusses the characteristics and quality attributes of embedded systems. It begins by defining embedded systems and noting they are application specific, reactive and operate in real-time, harsh environments, are distributed, and have concerns over size, weight and power. Quality attributes are then categorized into operational and non-operational. Operational attributes include response, throughput, reliability, maintainability, security and safety. Non-operational attributes include testability, evolvability, portability, time to market, and cost. Specific examples are provided to illustrate each attribute.
Chapter 3 Charateristics and Quality Attributes of Embedded SystemMoe Moe Myint
This document discusses the characteristics and quality attributes of embedded systems. It begins with learning objectives about understanding the characteristics of embedded systems and important quality metrics. It then describes key characteristics like being application specific, reactive and real-time in nature, operating in harsh environments, being distributed, requiring small size and weight, and having power concerns. Finally, it outlines important quality attributes for embedded systems during operational and non-operational modes, including response, throughput, reliability, maintainability, security, and safety.
shibu KV_ intro slides on embedded systems.pdflekha349785
This document provides an introduction to embedded systems for a course at Mandalay Technological University. It covers the definition of embedded systems, their differences from general computing systems, a brief history and classifications. Major application areas are discussed including consumer electronics, automotive, telecom, and healthcare. Embedded systems serve purposes like data collection, communication, processing, monitoring, control and user interfaces. An example of a smart running shoe is also provided. The document outlines chapter topics for the course and learning objectives which include understanding embedded system fundamentals and implementing systems with firmware and hardware components.
Ch 1 introduction to Embedded Systems (AY:2018-2019--> First Semester)Moe Moe Myint
This document provides an introduction to embedded systems for a course at Mandalay Technological University. It includes chapters on what embedded systems are, their typical applications and domains, characteristics, designing systems with microcontrollers, hardware and software co-design, real-time operating systems, and product development processes. The document outlines learning objectives for understanding fundamentals of embedded systems and being able to recognize, comprehend, implement, practice, develop familiarity with tools, and perform lab work related to embedded systems. It also provides an overview of key topics in each chapter and keywords to note related to embedded systems.
The document discusses characteristics and quality attributes of embedded systems. It describes key characteristics like being application specific, reactive and real-time, operating in harsh environments, being distributed, and having concerns for size, weight and power. It then outlines important operational quality attributes like response, throughput, reliability, maintainability and safety. Non-operational quality attributes discussed include testability, evolvability, portability and time to prototype and market.
Training report on Embedded Systems and MATLABAswin Sreeraj
An embedded system is a computer system with a dedicated function within a larger mechanical or electrical system, often with real-time computing constraints. It is embedded as part of a complete device often including hardware and mechanical parts. Embedded systems control many devices in common use today.
MATLAB (matrix laboratory) is a multi-paradigm numerical computing environment and fourth-generation programming language.
A piece of computer hardware and software that is designed to achieve a specific goal, either independently or as part of a larger system, is referred to as embedded system programming.
In this presentation, Raj introduces Automation and associated trends. Raj's interest area lies in automation processes that enable smart technology. He wants to make such technology affordable.
Chapter 3 Charateristics and Quality Attributes of Embedded SystemMoe Moe Myint
This document discusses the characteristics and quality attributes of embedded systems. It begins with learning objectives about understanding the characteristics of embedded systems and important quality metrics. It then describes key characteristics like being application specific, reactive and real-time in nature, operating in harsh environments, being distributed, requiring small size and weight, and having power concerns. Finally, it outlines important quality attributes for embedded systems during operational and non-operational modes, including response, throughput, reliability, maintainability, security, and safety.
shibu KV_ intro slides on embedded systems.pdflekha349785
This document provides an introduction to embedded systems for a course at Mandalay Technological University. It covers the definition of embedded systems, their differences from general computing systems, a brief history and classifications. Major application areas are discussed including consumer electronics, automotive, telecom, and healthcare. Embedded systems serve purposes like data collection, communication, processing, monitoring, control and user interfaces. An example of a smart running shoe is also provided. The document outlines chapter topics for the course and learning objectives which include understanding embedded system fundamentals and implementing systems with firmware and hardware components.
Ch 1 introduction to Embedded Systems (AY:2018-2019--> First Semester)Moe Moe Myint
This document provides an introduction to embedded systems for a course at Mandalay Technological University. It includes chapters on what embedded systems are, their typical applications and domains, characteristics, designing systems with microcontrollers, hardware and software co-design, real-time operating systems, and product development processes. The document outlines learning objectives for understanding fundamentals of embedded systems and being able to recognize, comprehend, implement, practice, develop familiarity with tools, and perform lab work related to embedded systems. It also provides an overview of key topics in each chapter and keywords to note related to embedded systems.
The document discusses characteristics and quality attributes of embedded systems. It describes key characteristics like being application specific, reactive and real-time, operating in harsh environments, being distributed, and having concerns for size, weight and power. It then outlines important operational quality attributes like response, throughput, reliability, maintainability and safety. Non-operational quality attributes discussed include testability, evolvability, portability and time to prototype and market.
Training report on Embedded Systems and MATLABAswin Sreeraj
An embedded system is a computer system with a dedicated function within a larger mechanical or electrical system, often with real-time computing constraints. It is embedded as part of a complete device often including hardware and mechanical parts. Embedded systems control many devices in common use today.
MATLAB (matrix laboratory) is a multi-paradigm numerical computing environment and fourth-generation programming language.
A piece of computer hardware and software that is designed to achieve a specific goal, either independently or as part of a larger system, is referred to as embedded system programming.
In this presentation, Raj introduces Automation and associated trends. Raj's interest area lies in automation processes that enable smart technology. He wants to make such technology affordable.
This document provides details about a project to create an environment and power monitoring panel using an ARM microcontroller board. It includes an introduction describing the importance of automation and sensor monitoring in industrial systems. It then provides details on the hardware and software used, including a Texas Instruments LM3S9D92 microcontroller board, sensors, and a graphical user interface design. The project aims to remotely monitor and display parameters from an industrial cabinet to improve maintenance and optimization.
SIMPLIFIED CBA CONCEPT AND EXPRESS CHOICE METHOD FOR INTEGRATED NETWORK MANAG...IJCNCJournal
This document proposes a simplified method for evaluating and selecting a network management system (NMS) for integration into an existing computer network. The method evaluates NMS options based on 3 criteria: 1) the level of integration risk, 2) the expected increase in network maintenance effectiveness, and 3) the level of management tasks completed by the system. Each criterion is evaluated on a standardized scale of 0 to 2. The scores are combined to calculate an overall value for each NMS, with the highest scoring option selected for integration. The method aims to provide a rapid evaluation that does not require extensive expertise, resources or time.
Evaluation of Factors Affecting the Adoption of Smart Buildings Using the Tec...Eswar Publications
Objective: This study aimed to find a solution to the acceptance of smart buildings in Iran using the technology
acceptance model (TAM). The main research question is the significance of this model relationships, as well as the
anticipated adoption of smart buildings in Iran using variables included in the model.
Methods: This descriptive study, is based on survey data collection methods and the way of analyzing data is correlational and casual study. Measurement tool was designed based on the standardized questionnaire presented by Davis. The reliability coefficient was 0.88. Statistical population is unlimited and included citizens of Iran in 1395. The sample consisted of 388 individuals. Given the infinity of society and Cochran formula, 384 individual is sufficient for
this research. This study is a random sampling one that was done in the period of 30 days.
Findings and conclusions: The results revealed that all relationships in the model are significant. And among the
variables of the model, perceived usefulness, the attitude toward using, and features of smart buildings had the most
intense relationship in acceptance this technology. Using regression equations, each of the dependent variables in the
model, is predictable by the independent variables.
Innovation of research: The intensity of relationship between variables in technology acceptance model and impact of each variable in explaining the criterion factor was analyzed.
Research limitations: Many people tend not to complete the questionnaire and some ones answer questions unrealistic. Despite all the explanations to justify the respondents, still there are possible directions in responses.
Practical consequences: Using regression equations obtained in this study, we can predict the criterion variables in the
model of technology adoption.
A Study Of Real-Time Embedded Software Systems And Real-Time Operating SystemsRick Vogel
This document summarizes a seminar report on real-time embedded software systems and real-time operating systems. It discusses what embedded systems and real-time systems are, and describes some of the key components and requirements of real-time operating systems including multi-tasking, memory management, task scheduling, and case studies of several popular RTOSs. The report aims to provide an overview of the technologies behind embedded systems design and survey available real-time operating systems.
Characteristics and Quality Attributes of Embedded Systemanand hd
The document discusses the characteristics and quality attributes of embedded systems. It describes key characteristics of embedded systems such as being application specific, reactive and real-time in response, operating in harsh environments, being distributed, and having concerns for small size, weight and power. It then outlines important quality attributes for embedded systems including operational attributes like response, throughput, reliability, maintainability, security and safety as well as non-operational attributes.
Introduction to Embedded System Architecture and Design.docx.pdfArshak28
Embedded system architecture and design refers to the process of developing hardware and software components that are specifically designed to perform dedicated functions within a larger system. The architecture of an embedded system includes the selection and integration of microprocessors, microcontrollers, memory, and various peripherals to meet specific requirements. Embedded system design involves the creation of software algorithms and coding methodologies that enable the system to perform its intended tasks efficiently and reliably. This field encompasses various disciplines, including electronics, computer architecture, and software engineering, and plays a vital role in the development of a wide range of devices, from smartphones and appliances to automotive systems and industrial equipment.
For more visit : https://iies.in/
It's about software engineering diversity. To build a software at first we fixed our requirements and according to our requirements we have to choose perfect software design and implementation techniques. For different software we have to select different kinds of techniques.
This document outlines requirements for an employee management system for a defense engineering college. The current manual system lacks organization and remote access. The new system aims to address these issues by providing an online database to track employee attendance, tasks, and availability. It will allow managers to allocate work remotely. The document discusses collecting user needs, the problem domain, existing solutions, and proposes building a web-based application with a database backend to provide a centralized, accessible system. UML modeling will help design and test the new system.
Introduction to Embedded System I: Chapter 2 (5th portion)Moe Moe Myint
The document provides an introduction to embedded systems, outlining key components and concepts. It discusses the core of embedded systems including processors, programmable logic devices, and memory. Sensors, actuators, and communication interfaces are also reviewed. Embedded firmware, other system components like reset circuits and watchdogs, and printed circuit boards are examined. The objectives are to learn about the building blocks of embedded systems and factors in selecting components.
This document provides an introduction to embedded systems. It defines an embedded system as an electronic and/or electro-mechanical system designed to perform a specific function. The document outlines the major components of an embedded system and compares embedded systems to general purpose computing systems. It also discusses the history of embedded systems, common applications, and purposes of embedded systems such as data collection, processing, communication, monitoring and control. Examples provided include traffic lights, hearing aids, Bluetooth devices, and intruder alarms.
An Efficient and Optimal Systems For Medical & Industries With Concept of IOTIJERA Editor
Its quit interesting to starts with some philosophical manner rather than the aim of paper, that is, human kind
likes more and more simplified life in their daily activities. The people like, simplification in cooking, travel,
education, fashion design, dressing, information availability about certain things, communication from one place
to another and so on. That means, the people like intelligent automated life. In contrast artificial things can
interact with the human kind and solves their desires. For example, someone may have lost something,
somewhere, but they forget where they lost. The difficulty here is, how find the thing, someone may give the
solutions RFID technology but it works in certain range. So from the discussions, we need, the autonomous
mechanism, that can trace out the locality or information regarding to what we lost? In simple manner, we need
a common platform to integrate entire world of thing. For a little while, the common platform is internet and
hence we labeled Internet of Things(IoT). That’s what, the paper is going to deal. So the principal objective is to
monitoring the thing of parameters from anywhere in the world. The paper is not aimed to integrate entire world
of things right now but dedicated to two fields, medical & small, medium enterprises. In medical field, monitor
the patient through camera interface and patient’s moments using WSN interface. And in case of SM Enterprises
monitors, temperature, water level, machine motion detection using WSN and visual through Camera Interface.
The paper is built with high speed and low cost Raspberry-Pi Controller
This document discusses characteristics and quality attributes of embedded systems. It describes key characteristics like being application specific, reactive and real-time, operating in harsh environments, being distributed, and having concerns for size, weight and power. It also outlines important quality attributes for embedded systems like response time, throughput, reliability and maintainability. The document provides examples and definitions for each characteristic and attribute.
This document provides a summary of a research paper on analyzing availability in service-based smart systems using the Internet of Things (IoT). It begins with an introduction on the motivation to automate open-ended systems and make them smarter. It then reviews literature on challenges with downtime in conventional systems and opportunities with IoT systems. Several design parameters for IoT systems are identified like sensor networks, analysis systems, reliability and availability. Case studies on inventory management and smart cars vs conventional cars are presented. The conclusion covers modeling availability in smart systems vs conventional systems and future research opportunities.
Industry 4.0 or the fourth industrial revolution, which has been introduced by German government in 2012 [1], which is depends on the integration of different categories of electrical and electronic devices, from personal computers, smartphones, smartwatches, machinery robotics and enterprise resource planning systems, which can be integrated together and communicated with others to analyse the optimal criteria of potential solutions for improving productivity via internet [2]. however, the requirements of the new technology will force the old technology to retired. which will will force the big companies to change the specification of the industrial components to keep up with the latest processors. Ultimately, the goal of Industry 4.0 is to produce smarter and resource-efficient factories which are more productive and competitive says Mika Lomax [3]. Which mean that the Devices are getting smarter. "Not only does the IIoT enable real-time monitoring on smartphones and via emails, but, in plants, everyone has LCDs (liquid-crystal displays), TV screens and marquees showing the production staff useful information," says Kumar. "The technology in the modern HMI, including drivers and connectivity, is moving to message displays and marquees. This will enable programming and monitoring in these smart displays. Technology is pushing PLC and HMI functionality to text displays and it will all be connected to the IIoT."[4] The characteristics of high-technology industries include steady order quantities, standardized product features and high product value [3].
This document discusses various applications of computers across different domains:
1. Office automation applications include using computers for routine clerical tasks in organizations through word processing, spreadsheets, databases, email and accessing files over networks.
2. Management applications use computers for tasks like stock control, accounting, marketing and sales analysis to provide timely, accurate information for decision making.
3. Scientific, engineering and research applications employ computers for complex calculations, simulations, modeling, data analysis and knowledge discovery across various domains like science, engineering, medicine and other research areas. Standard application packages are available for common tasks to improve efficiency.
A REVIEW ON DATA SECURITY IN DISTRIBUTED SYSTEMSara Alvarez
This document summarizes a research paper on data security in distributed systems. It begins by defining distributed systems and client/server systems. It then discusses some of the general problems with data security management in these systems, such as unsecure login processes and users not changing passwords regularly. Finally, it proposes a model for an access security system for distributed systems that includes an access security server with communication, session, and application layers to manage authentication, authorization, and access controls for users and systems.
This document summarizes a research paper on data security in distributed systems. It begins by defining distributed systems and client/server systems. It then discusses some of the general problems with data security management in these systems, such as unsecure login processes and users not changing passwords regularly. Finally, it proposes a model for an access security system for distributed systems that includes an access security server with communication, session, and application layers to manage authentication, authorization, and access controls for users and systems.
Containerization technologies allow enterprises to securely manage and separate enterprise data and applications from personal data and applications on mobile devices. Containers use policies to control authentication, network permissions, data storage, and application features. There are various types of container technologies including application-neutral containers that add policies outside app logic and application-specific containers that build policies into app logic. Enterprises should evaluate their needs and select container technologies and providers that meet required security levels and support needed mobile platforms and apps. The container market is still emerging with no clear technology leader yet.
Distribution Automation - Emerging Trends and Challenges Providing an overview of challenges, further providing a detail by introducing IEC 61850 standard and finally concluding by discussing the need of a maker approach or workshops thus enabling better skills and development at institutions.
ACEP Magazine edition 4th launched on 05.06.2024Rahul
This document provides information about the third edition of the magazine "Sthapatya" published by the Association of Civil Engineers (Practicing) Aurangabad. It includes messages from current and past presidents of ACEP, memories and photos from past ACEP events, information on life time achievement awards given by ACEP, and a technical article on concrete maintenance, repairs and strengthening. The document highlights activities of ACEP and provides a technical educational article for members.
This document provides details about a project to create an environment and power monitoring panel using an ARM microcontroller board. It includes an introduction describing the importance of automation and sensor monitoring in industrial systems. It then provides details on the hardware and software used, including a Texas Instruments LM3S9D92 microcontroller board, sensors, and a graphical user interface design. The project aims to remotely monitor and display parameters from an industrial cabinet to improve maintenance and optimization.
SIMPLIFIED CBA CONCEPT AND EXPRESS CHOICE METHOD FOR INTEGRATED NETWORK MANAG...IJCNCJournal
This document proposes a simplified method for evaluating and selecting a network management system (NMS) for integration into an existing computer network. The method evaluates NMS options based on 3 criteria: 1) the level of integration risk, 2) the expected increase in network maintenance effectiveness, and 3) the level of management tasks completed by the system. Each criterion is evaluated on a standardized scale of 0 to 2. The scores are combined to calculate an overall value for each NMS, with the highest scoring option selected for integration. The method aims to provide a rapid evaluation that does not require extensive expertise, resources or time.
Evaluation of Factors Affecting the Adoption of Smart Buildings Using the Tec...Eswar Publications
Objective: This study aimed to find a solution to the acceptance of smart buildings in Iran using the technology
acceptance model (TAM). The main research question is the significance of this model relationships, as well as the
anticipated adoption of smart buildings in Iran using variables included in the model.
Methods: This descriptive study, is based on survey data collection methods and the way of analyzing data is correlational and casual study. Measurement tool was designed based on the standardized questionnaire presented by Davis. The reliability coefficient was 0.88. Statistical population is unlimited and included citizens of Iran in 1395. The sample consisted of 388 individuals. Given the infinity of society and Cochran formula, 384 individual is sufficient for
this research. This study is a random sampling one that was done in the period of 30 days.
Findings and conclusions: The results revealed that all relationships in the model are significant. And among the
variables of the model, perceived usefulness, the attitude toward using, and features of smart buildings had the most
intense relationship in acceptance this technology. Using regression equations, each of the dependent variables in the
model, is predictable by the independent variables.
Innovation of research: The intensity of relationship between variables in technology acceptance model and impact of each variable in explaining the criterion factor was analyzed.
Research limitations: Many people tend not to complete the questionnaire and some ones answer questions unrealistic. Despite all the explanations to justify the respondents, still there are possible directions in responses.
Practical consequences: Using regression equations obtained in this study, we can predict the criterion variables in the
model of technology adoption.
A Study Of Real-Time Embedded Software Systems And Real-Time Operating SystemsRick Vogel
This document summarizes a seminar report on real-time embedded software systems and real-time operating systems. It discusses what embedded systems and real-time systems are, and describes some of the key components and requirements of real-time operating systems including multi-tasking, memory management, task scheduling, and case studies of several popular RTOSs. The report aims to provide an overview of the technologies behind embedded systems design and survey available real-time operating systems.
Characteristics and Quality Attributes of Embedded Systemanand hd
The document discusses the characteristics and quality attributes of embedded systems. It describes key characteristics of embedded systems such as being application specific, reactive and real-time in response, operating in harsh environments, being distributed, and having concerns for small size, weight and power. It then outlines important quality attributes for embedded systems including operational attributes like response, throughput, reliability, maintainability, security and safety as well as non-operational attributes.
Introduction to Embedded System Architecture and Design.docx.pdfArshak28
Embedded system architecture and design refers to the process of developing hardware and software components that are specifically designed to perform dedicated functions within a larger system. The architecture of an embedded system includes the selection and integration of microprocessors, microcontrollers, memory, and various peripherals to meet specific requirements. Embedded system design involves the creation of software algorithms and coding methodologies that enable the system to perform its intended tasks efficiently and reliably. This field encompasses various disciplines, including electronics, computer architecture, and software engineering, and plays a vital role in the development of a wide range of devices, from smartphones and appliances to automotive systems and industrial equipment.
For more visit : https://iies.in/
It's about software engineering diversity. To build a software at first we fixed our requirements and according to our requirements we have to choose perfect software design and implementation techniques. For different software we have to select different kinds of techniques.
This document outlines requirements for an employee management system for a defense engineering college. The current manual system lacks organization and remote access. The new system aims to address these issues by providing an online database to track employee attendance, tasks, and availability. It will allow managers to allocate work remotely. The document discusses collecting user needs, the problem domain, existing solutions, and proposes building a web-based application with a database backend to provide a centralized, accessible system. UML modeling will help design and test the new system.
Introduction to Embedded System I: Chapter 2 (5th portion)Moe Moe Myint
The document provides an introduction to embedded systems, outlining key components and concepts. It discusses the core of embedded systems including processors, programmable logic devices, and memory. Sensors, actuators, and communication interfaces are also reviewed. Embedded firmware, other system components like reset circuits and watchdogs, and printed circuit boards are examined. The objectives are to learn about the building blocks of embedded systems and factors in selecting components.
This document provides an introduction to embedded systems. It defines an embedded system as an electronic and/or electro-mechanical system designed to perform a specific function. The document outlines the major components of an embedded system and compares embedded systems to general purpose computing systems. It also discusses the history of embedded systems, common applications, and purposes of embedded systems such as data collection, processing, communication, monitoring and control. Examples provided include traffic lights, hearing aids, Bluetooth devices, and intruder alarms.
An Efficient and Optimal Systems For Medical & Industries With Concept of IOTIJERA Editor
Its quit interesting to starts with some philosophical manner rather than the aim of paper, that is, human kind
likes more and more simplified life in their daily activities. The people like, simplification in cooking, travel,
education, fashion design, dressing, information availability about certain things, communication from one place
to another and so on. That means, the people like intelligent automated life. In contrast artificial things can
interact with the human kind and solves their desires. For example, someone may have lost something,
somewhere, but they forget where they lost. The difficulty here is, how find the thing, someone may give the
solutions RFID technology but it works in certain range. So from the discussions, we need, the autonomous
mechanism, that can trace out the locality or information regarding to what we lost? In simple manner, we need
a common platform to integrate entire world of thing. For a little while, the common platform is internet and
hence we labeled Internet of Things(IoT). That’s what, the paper is going to deal. So the principal objective is to
monitoring the thing of parameters from anywhere in the world. The paper is not aimed to integrate entire world
of things right now but dedicated to two fields, medical & small, medium enterprises. In medical field, monitor
the patient through camera interface and patient’s moments using WSN interface. And in case of SM Enterprises
monitors, temperature, water level, machine motion detection using WSN and visual through Camera Interface.
The paper is built with high speed and low cost Raspberry-Pi Controller
This document discusses characteristics and quality attributes of embedded systems. It describes key characteristics like being application specific, reactive and real-time, operating in harsh environments, being distributed, and having concerns for size, weight and power. It also outlines important quality attributes for embedded systems like response time, throughput, reliability and maintainability. The document provides examples and definitions for each characteristic and attribute.
This document provides a summary of a research paper on analyzing availability in service-based smart systems using the Internet of Things (IoT). It begins with an introduction on the motivation to automate open-ended systems and make them smarter. It then reviews literature on challenges with downtime in conventional systems and opportunities with IoT systems. Several design parameters for IoT systems are identified like sensor networks, analysis systems, reliability and availability. Case studies on inventory management and smart cars vs conventional cars are presented. The conclusion covers modeling availability in smart systems vs conventional systems and future research opportunities.
Industry 4.0 or the fourth industrial revolution, which has been introduced by German government in 2012 [1], which is depends on the integration of different categories of electrical and electronic devices, from personal computers, smartphones, smartwatches, machinery robotics and enterprise resource planning systems, which can be integrated together and communicated with others to analyse the optimal criteria of potential solutions for improving productivity via internet [2]. however, the requirements of the new technology will force the old technology to retired. which will will force the big companies to change the specification of the industrial components to keep up with the latest processors. Ultimately, the goal of Industry 4.0 is to produce smarter and resource-efficient factories which are more productive and competitive says Mika Lomax [3]. Which mean that the Devices are getting smarter. "Not only does the IIoT enable real-time monitoring on smartphones and via emails, but, in plants, everyone has LCDs (liquid-crystal displays), TV screens and marquees showing the production staff useful information," says Kumar. "The technology in the modern HMI, including drivers and connectivity, is moving to message displays and marquees. This will enable programming and monitoring in these smart displays. Technology is pushing PLC and HMI functionality to text displays and it will all be connected to the IIoT."[4] The characteristics of high-technology industries include steady order quantities, standardized product features and high product value [3].
This document discusses various applications of computers across different domains:
1. Office automation applications include using computers for routine clerical tasks in organizations through word processing, spreadsheets, databases, email and accessing files over networks.
2. Management applications use computers for tasks like stock control, accounting, marketing and sales analysis to provide timely, accurate information for decision making.
3. Scientific, engineering and research applications employ computers for complex calculations, simulations, modeling, data analysis and knowledge discovery across various domains like science, engineering, medicine and other research areas. Standard application packages are available for common tasks to improve efficiency.
A REVIEW ON DATA SECURITY IN DISTRIBUTED SYSTEMSara Alvarez
This document summarizes a research paper on data security in distributed systems. It begins by defining distributed systems and client/server systems. It then discusses some of the general problems with data security management in these systems, such as unsecure login processes and users not changing passwords regularly. Finally, it proposes a model for an access security system for distributed systems that includes an access security server with communication, session, and application layers to manage authentication, authorization, and access controls for users and systems.
This document summarizes a research paper on data security in distributed systems. It begins by defining distributed systems and client/server systems. It then discusses some of the general problems with data security management in these systems, such as unsecure login processes and users not changing passwords regularly. Finally, it proposes a model for an access security system for distributed systems that includes an access security server with communication, session, and application layers to manage authentication, authorization, and access controls for users and systems.
Containerization technologies allow enterprises to securely manage and separate enterprise data and applications from personal data and applications on mobile devices. Containers use policies to control authentication, network permissions, data storage, and application features. There are various types of container technologies including application-neutral containers that add policies outside app logic and application-specific containers that build policies into app logic. Enterprises should evaluate their needs and select container technologies and providers that meet required security levels and support needed mobile platforms and apps. The container market is still emerging with no clear technology leader yet.
Distribution Automation - Emerging Trends and Challenges Providing an overview of challenges, further providing a detail by introducing IEC 61850 standard and finally concluding by discussing the need of a maker approach or workshops thus enabling better skills and development at institutions.
ACEP Magazine edition 4th launched on 05.06.2024Rahul
This document provides information about the third edition of the magazine "Sthapatya" published by the Association of Civil Engineers (Practicing) Aurangabad. It includes messages from current and past presidents of ACEP, memories and photos from past ACEP events, information on life time achievement awards given by ACEP, and a technical article on concrete maintenance, repairs and strengthening. The document highlights activities of ACEP and provides a technical educational article for members.
DEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODELgerogepatton
As digital technology becomes more deeply embedded in power systems, protecting the communication
networks of Smart Grids (SG) has emerged as a critical concern. Distributed Network Protocol 3 (DNP3)
represents a multi-tiered application layer protocol extensively utilized in Supervisory Control and Data
Acquisition (SCADA)-based smart grids to facilitate real-time data gathering and control functionalities.
Robust Intrusion Detection Systems (IDS) are necessary for early threat detection and mitigation because
of the interconnection of these networks, which makes them vulnerable to a variety of cyberattacks. To
solve this issue, this paper develops a hybrid Deep Learning (DL) model specifically designed for intrusion
detection in smart grids. The proposed approach is a combination of the Convolutional Neural Network
(CNN) and the Long-Short-Term Memory algorithms (LSTM). We employed a recent intrusion detection
dataset (DNP3), which focuses on unauthorized commands and Denial of Service (DoS) cyberattacks, to
train and test our model. The results of our experiments show that our CNN-LSTM method is much better
at finding smart grid intrusions than other deep learning algorithms used for classification. In addition,
our proposed approach improves accuracy, precision, recall, and F1 score, achieving a high detection
accuracy rate of 99.50%.
Electric vehicle and photovoltaic advanced roles in enhancing the financial p...IJECEIAES
Climate change's impact on the planet forced the United Nations and governments to promote green energies and electric transportation. The deployments of photovoltaic (PV) and electric vehicle (EV) systems gained stronger momentum due to their numerous advantages over fossil fuel types. The advantages go beyond sustainability to reach financial support and stability. The work in this paper introduces the hybrid system between PV and EV to support industrial and commercial plants. This paper covers the theoretical framework of the proposed hybrid system including the required equation to complete the cost analysis when PV and EV are present. In addition, the proposed design diagram which sets the priorities and requirements of the system is presented. The proposed approach allows setup to advance their power stability, especially during power outages. The presented information supports researchers and plant owners to complete the necessary analysis while promoting the deployment of clean energy. The result of a case study that represents a dairy milk farmer supports the theoretical works and highlights its advanced benefits to existing plants. The short return on investment of the proposed approach supports the paper's novelty approach for the sustainable electrical system. In addition, the proposed system allows for an isolated power setup without the need for a transmission line which enhances the safety of the electrical network
Introduction- e - waste – definition - sources of e-waste– hazardous substances in e-waste - effects of e-waste on environment and human health- need for e-waste management– e-waste handling rules - waste minimization techniques for managing e-waste – recycling of e-waste - disposal treatment methods of e- waste – mechanism of extraction of precious metal from leaching solution-global Scenario of E-waste – E-waste in India- case studies.
CHINA’S GEO-ECONOMIC OUTREACH IN CENTRAL ASIAN COUNTRIES AND FUTURE PROSPECTjpsjournal1
The rivalry between prominent international actors for dominance over Central Asia's hydrocarbon
reserves and the ancient silk trade route, along with China's diplomatic endeavours in the area, has been
referred to as the "New Great Game." This research centres on the power struggle, considering
geopolitical, geostrategic, and geoeconomic variables. Topics including trade, political hegemony, oil
politics, and conventional and nontraditional security are all explored and explained by the researcher.
Using Mackinder's Heartland, Spykman Rimland, and Hegemonic Stability theories, examines China's role
in Central Asia. This study adheres to the empirical epistemological method and has taken care of
objectivity. This study analyze primary and secondary research documents critically to elaborate role of
china’s geo economic outreach in central Asian countries and its future prospect. China is thriving in trade,
pipeline politics, and winning states, according to this study, thanks to important instruments like the
Shanghai Cooperation Organisation and the Belt and Road Economic Initiative. According to this study,
China is seeing significant success in commerce, pipeline politics, and gaining influence on other
governments. This success may be attributed to the effective utilisation of key tools such as the Shanghai
Cooperation Organisation and the Belt and Road Economic Initiative.
The CBC machine is a common diagnostic tool used by doctors to measure a patient's red blood cell count, white blood cell count and platelet count. The machine uses a small sample of the patient's blood, which is then placed into special tubes and analyzed. The results of the analysis are then displayed on a screen for the doctor to review. The CBC machine is an important tool for diagnosing various conditions, such as anemia, infection and leukemia. It can also help to monitor a patient's response to treatment.
Understanding Inductive Bias in Machine LearningSUTEJAS
This presentation explores the concept of inductive bias in machine learning. It explains how algorithms come with built-in assumptions and preferences that guide the learning process. You'll learn about the different types of inductive bias and how they can impact the performance and generalizability of machine learning models.
The presentation also covers the positive and negative aspects of inductive bias, along with strategies for mitigating potential drawbacks. We'll explore examples of how bias manifests in algorithms like neural networks and decision trees.
By understanding inductive bias, you can gain valuable insights into how machine learning models work and make informed decisions when building and deploying them.
Use PyCharm for remote debugging of WSL on a Windo cf5c162d672e4e58b4dde5d797...shadow0702a
This document serves as a comprehensive step-by-step guide on how to effectively use PyCharm for remote debugging of the Windows Subsystem for Linux (WSL) on a local Windows machine. It meticulously outlines several critical steps in the process, starting with the crucial task of enabling permissions, followed by the installation and configuration of WSL.
The guide then proceeds to explain how to set up the SSH service within the WSL environment, an integral part of the process. Alongside this, it also provides detailed instructions on how to modify the inbound rules of the Windows firewall to facilitate the process, ensuring that there are no connectivity issues that could potentially hinder the debugging process.
The document further emphasizes on the importance of checking the connection between the Windows and WSL environments, providing instructions on how to ensure that the connection is optimal and ready for remote debugging.
It also offers an in-depth guide on how to configure the WSL interpreter and files within the PyCharm environment. This is essential for ensuring that the debugging process is set up correctly and that the program can be run effectively within the WSL terminal.
Additionally, the document provides guidance on how to set up breakpoints for debugging, a fundamental aspect of the debugging process which allows the developer to stop the execution of their code at certain points and inspect their program at those stages.
Finally, the document concludes by providing a link to a reference blog. This blog offers additional information and guidance on configuring the remote Python interpreter in PyCharm, providing the reader with a well-rounded understanding of the process.
Comparative analysis between traditional aquaponics and reconstructed aquapon...bijceesjournal
The aquaponic system of planting is a method that does not require soil usage. It is a method that only needs water, fish, lava rocks (a substitute for soil), and plants. Aquaponic systems are sustainable and environmentally friendly. Its use not only helps to plant in small spaces but also helps reduce artificial chemical use and minimizes excess water use, as aquaponics consumes 90% less water than soil-based gardening. The study applied a descriptive and experimental design to assess and compare conventional and reconstructed aquaponic methods for reproducing tomatoes. The researchers created an observation checklist to determine the significant factors of the study. The study aims to determine the significant difference between traditional aquaponics and reconstructed aquaponics systems propagating tomatoes in terms of height, weight, girth, and number of fruits. The reconstructed aquaponics system’s higher growth yield results in a much more nourished crop than the traditional aquaponics system. It is superior in its number of fruits, height, weight, and girth measurement. Moreover, the reconstructed aquaponics system is proven to eliminate all the hindrances present in the traditional aquaponics system, which are overcrowding of fish, algae growth, pest problems, contaminated water, and dead fish.
Manufacturing Process of molasses based distillery ppt.pptx
ES Part-1.pdf
1. EMBEDDED SYSTEM
(2nd Edition)
SHIBU K V
Dr Moe Moe Myint
Department of Computer Engineering & Information Technology
Mandalay Technological University
www.slideshare.net/MoeMoeMyint
moemoemyint@moemyanmar.ml
moe2myint.mdy@gmail.com
drmoemoemyint.blogspot.com
Introduction to
IT-51061
2. Introduction
The characteristics of embedded system are different from
those of a general purpose computer and so are its Quality
metrics.
This chapter gives a brief introduction on the
characteristics of an embedded system and the attributes
that are associated with its quality.
4
Mandalay Technological University
Department of Computer Engineering and Information Technology
Lecture Slides for Textbook Introduction to Embedded Systems, Moe Moe Myint, 2017-2018
3. 3.1 Characteristics of an Embedded System
Unlike general purpose computing systems, embedded systems possess
certain specific characteristics and these characteristics are unique to each
embedded system.
Some of the important characteristics of an embedded system are:
1. Application and domain specific
2. Reactive and Real Time
3. Operates in harsh environments
4. Distributed
5. Small size and weight
6. Power concerns
5
Mandalay Technological University
Department of Computer Engineering and Information Technology
Lecture Slides for Textbook Introduction to Embedded Systems, Moe Moe Myint, 2017-2018
4. 1. Application and Domain Specific
An embedded system is designed for a specific purpose only.
It will not do any other task.
Ex. Air conditioner’s embedded control unit, it cannot replace microwave
oven…
Ex. A washing machine can only wash, it cannot cook..
Because the embedded control units of microwave oven and air conditioner
are specifically designed to perform certain specific tasks.
Certain embedded systems are specific to a domain: ex. A hearing aid is an
application that belongs to the domain of signal processing and telecom with
another control unit designed to serve another domain like consumer
electronics.
6
Mandalay Technological University
Department of Computer Engineering and Information Technology
Lecture Slides for Textbook Introduction to Embedded Systems, Moe Moe Myint, 2017-2018
5. 2. Reactive and Real Time
Certain embedded systems are designed to react to the events that occur in
the nearby environment. These events also occur real-time.
Ex. Flight control systems, Antilock Brake Systems (ABS), etc. are examples
of Real Time systems
Ex. An air conditioner adjusts its mechanical parts as soon as it gets a signal
from its sensors to increase or decrease the temperature when the user
operates it using a remote control.
An embedded system uses Sensors to take inputs and has actuators to bring
out the required functionality.
7
Mandalay Technological University
Department of Computer Engineering and Information Technology
Lecture Slides for Textbook Introduction to Embedded Systems, Moe Moe Myint, 2017-2018
6. 3. Operation in Harsh Environment
Certain embedded systems are designed to operate in harsh
environments like a dusty one or a high temperature zone or an area
subject to vibrations and shock or very high temperature of the deserts
or very low temperature of the mountains or extreme rains.
These embedded systems have to be capable of sustaining the
environmental conditions it is designed to operate in.
8
Mandalay Technological University
Department of Computer Engineering and Information Technology
Lecture Slides for Textbook Introduction to Embedded Systems, Moe Moe Myint, 2017-2018
7. 4. Distributed
The term distributed means that embedded systems may be a part of a
larger system.
These components are independent of each other but have to work
together for the larger system to function properly.
Ex. An automatic vending machine is a typical example for this. The
vending machine contains a card reader (for pre-paid vending
systems), a vending unit, etc. Each of them are independent
embedded units but they work together to perform the overall
vending function.
Ex. Automatic Teller Machine (ATM) contains a card reader
embedded unit, responsible for reading and validating the user’s ATM
card, transaction unit for performing transactions, a currency
counter for dispatching/vending currency to the authorized person and
a printer unit for printing the transaction details.
This can visualize these as independent embedded systems. But they
work together to achieve a common goal.
9
Mandalay Technological University
Department of Computer Engineering and Information Technology
Lecture Slides for Textbook Introduction to Embedded Systems, Moe Moe Myint, 2017-2018
8. 5. Small Size and Weight
An embedded system that is compact in size and has light weight will
be desirable or more popular than one that is bulky and heavy.
Ex. Currently available cell phones. The cell phones that have the
maximum features are popular but also their size and weight is an
important characteristic.
10
Mandalay Technological University
Department of Computer Engineering and Information Technology
Lecture Slides for Textbook Introduction to Embedded Systems, Moe Moe Myint, 2017-2018
9. 6. Power Concerns
It is desirable that the power utilization and heat dissipation of any
embedded system be low.
If more heat is dissipated then additional units like heat sinks or
cooling fans need to be added to the circuit.
Ex. The production of high amount of heat demands cooling
requirements like cooling fans which in turn occupies additional
space and make the system bulky. Nowadays ultra low power
components are available in the market.
Select the design according to the low power components like low
dropout regulators, and controllers/processors with power saving
modes.
Also power management is a critical constraint in battery operated
application.
The more the power consumption the less is the battery life.
11
Mandalay Technological University
Department of Computer Engineering and Information Technology
Lecture Slides for Textbook Introduction to Embedded Systems, Moe Moe Myint, 2017-2018
10. 3.2 Quality Attributes of Embedded Systems
Quality attributes are the non-functional requirements that need to be
documented properly in any system design.
If the quality attributes are more concrete and measurable, it will give a
positive impact on the system development process and the end
product.
The various quality attributes that needs to be addressed in any
embedded system development are broadly classified into two, namely
i. Operational Quality Attributes
ii. Non-Operational Quality Attributes
12
Mandalay Technological University
Department of Computer Engineering and Information Technology
Lecture Slides for Textbook Introduction to Embedded Systems, Moe Moe Myint, 2017-2018
11. 1. Operational Quality Attributes
The operational quality attributes represent the relevant quality
attributes related to the embedded system when it is in the operational
mode or ‘online’ mode. The important quality attributes coming under
this category are listed below:
i. Response
ii. Throughput
iii. Reliability
iv. Maintainability
v. Security
vi. Safety
13
Mandalay Technological University
Department of Computer Engineering and Information Technology
Lecture Slides for Textbook Introduction to Embedded Systems, Moe Moe Myint, 2017-2018
12. Reading Assignment
14
Mandalay Technological University
Department of Computer Engineering and Information Technology
Lecture Slides for Textbook Introduction to Embedded Systems, Moe Moe Myint, 2017-2018
13. i. Response
Response is a measure of quickness of the system.
It gives you an idea about how fast your system is tracking the input
variables.
Most of the embedded system demand fast response which should be
real-time.
Ex. An embedded system deployed in flight control application
should respond in a Real Time manner.
Any response delay in the system will create potential damages to
the safety of the flight as well as the passengers.
It is not necessary that all embedded systems should be Real Time in
response.
For example, the response time requirement for an electronic toy is
not at all time-critical.
15
Mandalay Technological University
Department of Computer Engineering and Information Technology
Lecture Slides for Textbook Introduction to Embedded Systems, Moe Moe Myint, 2017-2018
14. ii. Throughput
Throughput deals with the efficiency of system.
It can be defined as rate of production or process of a defined
process over a stated period of time.
The rates can be expressed in terms of units of products, batches
produced, or any other meaningful measurements.
In case of card reader like the ones used in buses, throughput
means how much transactions the Reader can perform in a minute
or hour or day.
Throughput is generally measured in terms of ‘Benchmark’. A
‘Benchmark’ is a reference point by which something can be
measured.
Benchmark can be a set of performance criteria that a product is
expected to meet or a standard product that can be used for
comparing other products of the same product line.
16
Mandalay Technological University
Department of Computer Engineering and Information Technology
Lecture Slides for Textbook Introduction to Embedded Systems, Moe Moe Myint, 2017-2018
15. iii. Reliability
Reliability is a measure of how much percentage you rely upon the
proper functioning of the system or what is the % susceptibility of the
system to failure.
Mean Time Between Failures (MTBF) and Mean Time To Repair
(MTTR) are the terms used in defining system reliability.
MTBF gives the frequency of failures in hours/weeks/months.
MTTR specifies how long the system is allowed to be out of order
following a failure.
For an embedded system with critical application need, it should be of
the order of minutes.
17
Mandalay Technological University
Department of Computer Engineering and Information Technology
Lecture Slides for Textbook Introduction to Embedded Systems, Moe Moe Myint, 2017-2018
16. iv. Maintainability
Maintainability deals with support and maintenance to the end user or client in case of technical
issues and product failures or on the basis of a routine system checkup.
Reliability and maintainability are considered as two complementary disciplines. A more reliable
system means a system with less corrective maintainability requirements and vice versa.
Maintainability can be classified into two types:
1. Scheduled or Periodic Maintenance (Preventive Maintenance)
An inkjet printer uses ink cartridges, which are consumable components and as per the printer
manufacturer the end use should replace the cartridge after each ‘n’ number of printouts to get
quality prints.
2. Maintenance to Unexpected Failures (Corrective Maintenance)
If the paper feeding part of the printer fails the printer fails to print and it requires immediate
repairs to rectify this problem.
Hence it is obvious that maintainability is simply an indication of the availability of the product
for use. In any embedded system design, the ideal value for availability is expressed as
𝑨𝒊 = 𝑴𝑻𝑩𝑭/(𝑴𝑻𝑩𝑭 + 𝑴𝑻𝑻𝑹)
Where Ai=Availability in the ideal condition, MTBF=Mean Time Between Failures, and MTTR=
Mean Time To Repair
18
Mandalay Technological University
Department of Computer Engineering and Information Technology
Lecture Slides for Textbook Introduction to Embedded Systems, Moe Moe Myint, 2017-2018
17. v. Security
‘Confidentially’, ‘Integrity’, and ‘Availability’ are three major measures of
information security.
‘Confidentially’ deals with the protection of data and application from
unauthorized disclosure.
‘Integrity’ deals with the protection of data and application from
unauthorized modification.
‘Availability’ deals with protection of data and application from unauthorized
users.
Certain embedded systems have to make sure they conform to the security
measures.
Ex. An electronic safety Deposit Locker can be used only with a pin number
like a password.
19
Mandalay Technological University
Department of Computer Engineering and Information Technology
Lecture Slides for Textbook Introduction to Embedded Systems, Moe Moe Myint, 2017-2018
18. vi. Safety
Safety deals with the possible damages that can happen to the operators,
public and the environment due to the breakdown of an embedded system or
due to the emission of radioactive or hazardous materials from the
embedded products.
The breakdown of an embedded system may occur due to a hardware failure
or a firmware failure.
Safety analysis is a must in product engineering to evaluate the anticipated
damages and determine the best course of action to bring down the
consequences of the damages to an acceptable level.
20
Mandalay Technological University
Department of Computer Engineering and Information Technology
Lecture Slides for Textbook Introduction to Embedded Systems, Moe Moe Myint, 2017-2018
19. 2. Non Operational Attributes
The quality attributes that needs to be addressed for the product ‘not’ on the
basic of operational aspects are grouped under this category. The important
quality attributes coming under this category are listed below:
i. Testability & Debug-ability
ii. Evolvability
iii. Portability
iv. Time to prototype and market
v. Per unit and total cost
21
Mandalay Technological University
Department of Computer Engineering and Information Technology
Lecture Slides for Textbook Introduction to Embedded Systems, Moe Moe Myint, 2017-2018
20. i. Testability & Debug-ability
Testability deals with how easily one can test his/her design, application and by
which means he/she can test it.
For an embedded product, testability is applicable to both the embedded
hardware and firmware.
Debug-ability is a means of debugging the product as such for figuring out the
probable sources that create unexpected behavior in the total system.
Debug-ability has two aspects in the embedded system development context,
namely, hardware level debugging and firmware level debugging.
Hardware debugging is used for figuring out the issues created by hardware
problems whereas firmware debugging is employed to figure out the probable
errors that appear as a result of flaws in the firmware.
22
Mandalay Technological University
Department of Computer Engineering and Information Technology
Lecture Slides for Textbook Introduction to Embedded Systems, Moe Moe Myint, 2017-2018
21. ii. Evolvability
Evolvability is a term which is closely related to Biology.
Evolvability is referred as the non-heritable variation.
For an embedded system, the quality attribute ‘Evolvability’ refers to
the ease with which the embedded product (including firmware and
hardware) can be modified to take advantage of new firmware or
hardware technologies.
23
Mandalay Technological University
Department of Computer Engineering and Information Technology
Lecture Slides for Textbook Introduction to Embedded Systems, Moe Moe Myint, 2017-2018
22. iii. Portability
Portability is a measure of ‘system independence’.
An embedded product can be called portable if it is capable of
functioning in various environments, target processors/controllers and
embedded operating systems.
A standard embedded product should always be flexible and portable.
24
Mandalay Technological University
Department of Computer Engineering and Information Technology
Lecture Slides for Textbook Introduction to Embedded Systems, Moe Moe Myint, 2017-2018
23. iv. Time-to-Prototype and Market
Time-to-market is the time elapsed between the conceptualization of a
product and the time at which the product is ready for selling (for
commercial product) or use (for non-commercial products).
The commercial embedded product market is highly competitive
and time to market the product is a critical factor in the success of a
commercial embedded product.
Product prototyping helps a lot in reducing time-to-market.
25
Mandalay Technological University
Department of Computer Engineering and Information Technology
Lecture Slides for Textbook Introduction to Embedded Systems, Moe Moe Myint, 2017-2018
24. v. Per Unit Cost and Revenue
Cost is a factor which is closely monitored by both end user (those
who buy the product) and product manufacturer (those who build the
product).
Cost is a highly sensitive factor for commercial products.
Proper market study and cost benefit analysis should be carried out
before taking decision on the per unit cost of the embedded product.
When the product is introduced in the market, for the initial period
the sales and revenue will be low.
There won’t be much competition when the product sales and
revenue increase.
During the maturing phase, the growth will be steady and revenue
reaches highest point and at retirement time there will be a drop in
sales volume.
26
Mandalay Technological University
Department of Computer Engineering and Information Technology
Lecture Slides for Textbook Introduction to Embedded Systems, Moe Moe Myint, 2017-2018
25. Cont’d
27
Mandalay Technological University
Department of Computer Engineering and Information Technology
Lecture Slides for Textbook Introduction to Embedded Systems, Moe Moe Myint, 2017-2018
Product life cycle (PLC) curve
26. Objective Questions
28
Mandalay Technological University
Department of Computer Engineering and Information Technology
1. Embedded systems are application and domain specific. State True or
False
(a) True (b) False
2. Which of the following is true about Embedded Systems?
(a) Reactive and Real Time (b) Distributed
(c) Operates in harsh environment (d) All of these
(e) None of these
3. Which of the following is a distributed embedded system?
(a) Cell phone (b) Notebook Computer (c) SCADA system
(d) All of these (e) None of these
4. Quality attributes of an embedded system are
(a) Functional requirements (b) Non-functional requirements
(c) Both (d) None of these
5. Response is a measure of
(a) Quickness of the system
(b) How fast the system tracks changes in Input
(c) Both (d) None of these
Lecture Slides for Textbook Introduction to Embedded Systems, Moe Moe Myint, 2017-2018
27. Cont’d
29
Mandalay Technological University
Department of Computer Engineering and Information Technology
6. Throughput of an embedded system is a measure of
(a) The efficiency of the system
(b) The output over a stated period of time
(c) Both (d) None of these
7. Benchmark is
(a) A reference point (b) A set of performance criteria
(c) (a) or (b) (d) None of these
8. Mean Time Between Failures (MTBF) and Mean Time To Repair (MTTR) defines
the reliability of an embedded system. State True or False
(a) True (b) False
9. MTBF gives the frequency of failures of an embedded system. State True or False
(a) True (b) False
10. Which of the following is true about the quality attribute ‘maintainability’?
(a) The corrective maintainability requirement for a highly reliable embedded
system is very less
(b) Availability of an embedded system is directly related to the
maintainability of the system
(c) Both of these
(d) None of these
Lecture Slides for Textbook Introduction to Embedded Systems, Moe Moe Myint, 2017-2018
28. Cont’d
30
Mandalay Technological University
Department of Computer Engineering and Information Technology
11. The Mean Time Between Failure (MTBF) for an embedded product is very high.
This means:
(a) The product is highly reliable
(b) The availability of the product is very high
(c) The preventive maintenance requirement for the product is very less
(d) All of these
(e) None of these
12. The Mean Time Between Failure (MTBF) of an embedded product is 4 months and
the Mean Time To Repair (MTTR) of the product is 2 weeks. What is the
availability of the product?
(a) 100% (b) 50% (c) 89% (d) 10%
13. Which of the following are the three measures of information security in
embedded systems?
(a) Confidentiality, secrecy, integrity (b) Confidentiality, integrity, availability
(c) Confidentiality, transparency, availability
(d) Integrity, transparency, availability
Lecture Slides for Textbook Introduction to Embedded Systems, Moe Moe Myint, 2017-2018
29. Review Questions
31
Mandalay Technological University
Department of Computer Engineering and Information Technology
1. Explain the different characteristics of embedded systems in detail.
Lecture Slides for Textbook Introduction to Embedded Systems, Moe Moe Myint, 2017-2018
30. 1.1 What is an Embedded System?
An ES is an electronic/electro-mechanical
system designed to perform a specific
function
And a combination of both hardware and
firmware (software)
Every ES is Unique and hardware as well as
the firmware is highly specialized to the
application domain
ES are becoming an inevitable part of any
product or equipment in all fields including
household appliances, telecommunications,
medical equipment, industrial control,
consumer products, etc.
6
CPU
mem
input
output analog
analog
embedded
System
Mandalay Technological University
Department of Computer Engineering and Information Technology
31. 1.2 Comparison of ES & General Purpose Computing System
7
Criteria General Purpose Computer Embedded System
Contents A system which is a combination
of a generic hardware and a
General Purpose Operating System
for executing a variety of
applications.
A system which is a combination of
special purpose hardware and
embedded OS/firmware for executing a
specific set of applications
OS It contains a general purpose
operating system (GPOS).
It may or not contain an operating
system for functioning.
Alterations Applications are alterable by the
user.
Applications are not-alterable by the
user.
Key factor Performance is key factor. Application specific requirements are
key factors.
Power
Consumption
More Less
Response Time Not critical Critical for some applications
Execution Need not be deterministic Deterministic for certain types of ES
like ‘Hard Real Time’ systems.
Mandalay Technological University
Department of Computer Engineering and Information Technology
33. 1.5 Major Application Areas of ES
The application areas and the products in the embedded
domain are countless.
1. Consumer electronics: Camcorders, cameras, etc.
2. Household appliances: Television, DVD players, washing machine,
fridge, microwave oven, etc.
3. Home automation and security systems: Air conditioners, sprinklers,
intruder detection alarms, closed circuit television cameras, fire
alarms, etc.
4. Automotive industry: Anti-lock breaking systems (ABS), engine
control, ignition systems, automatic navigation systems, etc.
5. Telecom: Cellular telephones, telephone switches, handset
multimedia applications, etc.
9
Mandalay Technological University
Department of Computer Engineering and Information Technology
34. Cont’d
10
6. Computer peripherals: Printers, scanners, fax machines, etc.
7. Computer Networking systems: Network routers, switches, hubs,
firewalls, etc.
8. Healthcare: Different kinds of scanners, EEG, ECG machines etc.
9. Measurement & Instrumentation: Digital multi meters, digital CROs,
logic analyzers PLC systems, etc.
10. Banking & Retail: Automatic teller machines (ATM) and currency
counters, point of sales (POS).
11. Card Readers: Barcode, smart card readers, hand held devices, etc.
Mandalay Technological University
Department of Computer Engineering and Information Technology
35. 11
Logic analyzers PLC systems
Point of Sales (POS)
Hand Held Devices
Back
Mandalay Technological University
Department of Computer Engineering and Information Technology
36. 1.6 Purpose of ES
Each embedded system is designed to serve the purpose of any one or a
combination of the following tasks:
1. Data collection/Storage/Representation
2. Data Communication
3. Data (signal) processing
4. Monitoring
5. Control
6. Application specific user interface
12
Mandalay Technological University
Department of Computer Engineering and Information Technology
37. Cont’d
1. Data Collection/Storage/Representation
Embedded systems designed for the purpose of data collection performs
acquisition of data from the external world.
Data collection is usually done for storage, analysis, manipulation and
transmission.
Data can be either analog (continuous) or digital (discrete).
Embedded systems with analog data capturing techniques collect data
directly in the form of analog signal whereas embedded systems with
digital data collection mechanism converts the analog signal to the digital
signal using analog to digital (A/D) converters and then collects the
binary equivalent of the analog data.
If the data is digital, it can be directly captured without any additional
interface by digital embedded systems.
A digital camera is a typical example of an embedded system with data
collection/storage/representation of data.
Images are captured and the captured image may be stored within the
memory of the camera. The captured image can also be presented to the
user through a graphic LCD unit.
13
Mandalay Technological University
Department of Computer Engineering and Information Technology
38. Cont’d
2. Data Communication
Embedded data communication systems are deployed in
applications from complex satellite communication systems to
simple home networking systems.
The transmission is achieved either by a wire-line medium or by a
wire-less medium.
Data can either be transmitted by analog means or by digital means.
14
Mandalay Technological University
Department of Computer Engineering and Information Technology
39. The data collecting embedded terminal itself can incorporate data
communication units like Wireless modules (Bluetooth, ZigBee, Wi-
Fi, EDGE, GPRS, etc.) or wire-line modules (RS-232C, USB, TCP/IP,
PS2,etc).
Network hubs, routers, switches, etc. are typical examples of
dedicated data transmission embedded systems.
15
Cont’d
Mandalay Technological University
Department of Computer Engineering and Information Technology
40. Cont’d
3. Data (Signal) Processing
Embedded systems with
signal processing functionalities are employed in applications demanding
signal processing like speech coding, synthesis, audio video codec,
transmission applications, etc.
A digital hearing aid is a typical example of an embedded system
employing data processing.
Digital hearing aid improves the hearing capacity of hearing
impaired persons.
16
Mandalay Technological University
Department of Computer Engineering and Information Technology
41. Cont’d
4. Monitoring
Almost all embedded products coming under the medical domain
are with monitoring functions only.
Electro cardiogram machine (ECG) is intended to do the monitoring
of the heartbeat of a patient but it cannot impose control over the
heartbeat.
Other examples with monitoring function are digital CRO, digital
multimeters, and logic analyzers.
17
Mandalay Technological University
Department of Computer Engineering and Information Technology
42. Cont’d
5. Control
A system with control functionality contains both sensors and
actuators.
Sensors are connected to the input port for capturing the changes in
environmental variable or measuring variable.
The actuators connected to the output port are controlled according
to the changes in the input variable.
Air conditioner system used in our home to control the room
temperature to a specified limit is a typical example for ES for
CONTROL purpose.
18
Mandalay Technological University
Department of Computer Engineering and Information Technology
43. Cont’d
6. Applications specific user interface
Buttons, switches, keypad, lights, speakers, display units, etc. are
application-specific user interfaces.
Mobile phone is an example of application specific user interface.
In mobile phone the user interface is provided through the keypad,
graphic LCD module, system speaker, vibration alert, etc.
19
Mandalay Technological University
Department of Computer Engineering and Information Technology
44. Understanding Test Questions I
1. Embedded systems are
(a) General purpose (b) Special purpose
2. Embedded system is
(a) An electronic system (b) A pure mechanical system
(c ) An electro-mechanical system (d) (a) or ( c )
3. Which of the following is not true about embedded systems?
(a) Built around specialized hardware
(b) Always contain an operating system
(c ) Execution behavior may be deterministic
(d) All of these
(e) None of these
20
Mandalay Technological University
Department of Computer Engineering and Information Technology
45. Cont’d
4. Which of the following is (are) an intended purpose(s) of
embedded systems?
(a) Data collection (b) Data processing (c ) Data communication
(d) All of these (e) None of these
5. Which of the following is an (are) example(s) of embedded system
for data communication?
(a) USB Mass storage device (b) Network router
(c ) Digital camera (d) Music player
(e) All of these (f) None of these
6. A digital multi meter is an example of an embedded system for
(a) Data communication (b) Monitoring
(c) Control (d) All of these
(e) None of these
21
Mandalay Technological University
Department of Computer Engineering and Information Technology
46. Review Questions I
1. What is an embedded system? Explain the different
applications of embedded systems.
2. Explain the various purposes of embedded systems in
detail with illustrative examples.
22
Mandalay Technological University
Department of Computer Engineering and Information Technology