Architecture design of a virtualized embedded system
Journal Title: International Journal on Computer Science and Engineering - Year 2013, Vol 5, Issue 1
Abstract
Nowadays, embedded systems have become a major driver of technological developments particularly in the industrial sector. In an embedded system, the hardware and software components are so intertwined that evolution is often a big issue. Thanks to the contributions of virtualization it is possible to design more flexible and scalable embedded systems. In fact, virtualization adds an abstraction layer between the hardware and the software to make it less intimately dependent. In this paper we propose system architecture based on embedded virtualization that will be modeled by the multi-agent systems. In the first part, we will discuss the state of the art with respect to embedded systems, multi-agent systems and the concept of virtualization. In the second part, we explain the issues related to traditional embedded systems and the constraints associated with their architecture. Subsequently, we propose a virtualization based architecture for embedded systems. In the last part we will showcase this architecture through a prototype.
Authors and Affiliations
A. Sbaa , R. El Bejjet , H. Medromi
ENERGY CONSERVATION IN CLOUD ENVIRONMENTS USING ALTERNATIVE EMAIL-ID APPROACH
(100%)Cloud computing is a new Model for deliver and accessing the services over the Internet. So cloud provider responsibility to verify the user or client is Authorized or not.For this purpose cloud provider shall prov...
AN ANDROID APPLICATION FOR ATM WITH A SECURED PIN-ENTRY METHODS
One of the most commonly occurringproblems in the recent years are the ATM (Automatic teller machine) frauds. People lose their money due to lack of awareness. The major reason for such kind of actions is the attacks mad...
An Analysis of Irregularities in Devanagari Script Writing – A Machine Recognition Perspective
Abstract— This paper deals with the theoretical analysis of Devanagari script according to machine recognition perspective. An individual having good knowledge of the script of a language can easily read some words writt...
Analyzing the Critical Issues of Mobile Users in Cloud Computing
Cloud computing has recently emerged as a new paradigm for hosting and delivering services over the Internet. Mobile Cloud Computing is widely accepted as a concept that can significantly improve the user experience when...
SSL-MAP: A More Secure Gossamer-based Mutual Authentication Protocol for Passive RFID Tags
Abstract— RFID systems that employ passive RFID tags, are run using lightweight protocols. The Gossamer protocol is a case in point. However, it is found that the Gossamer protocol uses rather simple operations, in order...