Architecture design of a virtualized embedded system
Journal Title: International Journal on Computer Science and Engineering - Year 2013, Vol 5, Issue 1
Abstract
Nowadays, embedded systems have become a major driver of technological developments particularly in the industrial sector. In an embedded system, the hardware and software components are so intertwined that evolution is often a big issue. Thanks to the contributions of virtualization it is possible to design more flexible and scalable embedded systems. In fact, virtualization adds an abstraction layer between the hardware and the software to make it less intimately dependent. In this paper we propose system architecture based on embedded virtualization that will be modeled by the multi-agent systems. In the first part, we will discuss the state of the art with respect to embedded systems, multi-agent systems and the concept of virtualization. In the second part, we explain the issues related to traditional embedded systems and the constraints associated with their architecture. Subsequently, we propose a virtualization based architecture for embedded systems. In the last part we will showcase this architecture through a prototype.
Authors and Affiliations
A. Sbaa , R. El Bejjet , H. Medromi
Quantum Black Holes and pseudotelepathy in biological organisms
Superposed state of quantum registers can be used to describe inflationary universe. One can speak of a quantum superposition of universes during inflation. It has been proposed by Zizzi that a cosmic consciousness event...
AN ARTIFICIAL FISH SWARM OPTIMIZED FUZZY MRI IMAGE SEGMENTATION APPROACH FOR IMPROVING IDENTIFICATION OF BRAIN TUMOUR
In image processing, it is difficult to detect the abnormalities in brain especially in MRI brain images. Also the tumor segmentation from MRI image data is an important; however it is time consuming while carried out by...
A survey on Data Storage and Retrieval in Cloud Computing
This paper presents the survey on data storage and retrieval in cloud computing. In this paper the study on scope and security issues related to data storage and information retrieval in cloud computing is done. Data sto...
Detection of threats in Honeynet using Honeywall
Information is a strategic resource and to protect this kind of confidential and private data against possible attacks, you must take into account some security mechanisms and measures. And as Computer network are subjec...
Weblog Search Engine Based on Quality Criteria
Nowadays, increasing amount of human knowledge is placed in computerized repositories such as the World Wide Web. This gives rise to the problem of how to locate specific pieces of information in these often quite unstru...