DD
MM
YYYY

PAGES

DD
MM
YYYY

spot_img

PAGES

Home Blog Page 7807

Sensors – Integration with Embedded Systems and Applications (part 1)

10

According to Lao Tse quoted – To experience without abstraction is to sense the world, to experience with abstraction is to know the world. He further stated that, the two experiences are differentiable; their development distinct but their effect is the same.

 

However, this piece will address sensor in embedded system and how it is integrated to perform computational work otherwise known as digitisation as well as applications in our society today. What is sensor? Sensor is a device capable of detecting physical object within our environment by producing an output into a readable form by other instruments.

 

Sensor and Embedded System Integration

Hardly can design engineers present sensor device without considerable analysis and design with embedded systems, unlike in primitive days of its use. In modern technical analysis and integration, today sensor design engineers are commonly referred to as Embedded Design Engineer or Analogue Design Engineer – this group of expertise are very scarce to get, though.

 

Sensor is an analogue device that can be integrated to microcontroller by a method commonly used by design engineers called analogue digital conversion (ADC). Sensor circuitry board equipped with an embedded components:

a)      Central processing unit; in embedded system, small device with a chip is known as microcontroller, processes with computational power

 

b)      Small memory – Random Access Memory (RAM) or Electrically Erasable Programmable Read Only Memory (EEPROM).

 

c)      Communication device ( radio transmitter and receiver commonly concatenated as transceiver)

 

d)      Programming interface.

 

Listed components A to D above integrated to a single device called Sensor Node. Sensor node is small intelligent and miniaturise device capable of performing sensing, computation and processing. Thousands of sensor nodes could be networked together for different applications, such as monitoring of an environment, weather stations and monitoring of animals movement in a farm.  Let me pin-point this, sensor nodes are often networked together wirelessly – i will not delve into this but in my subsequent article (Part 2).

 

Sensor Applications

 

Sensors can be applied according to their types. Though, electronics components could be difficult to select and interfacing. Nevertheless, I will briefly address the following sensors:

 

A   Temperature Sensor

B   Light Sensor

C   Pressure Sensor

 

 

A  Temperature Sensor

 

Temperature sensor has wide range of applications; the common ones are an environment monitor or weather station. It could also be used to sense temperature inside rooms and to control the appropriate heating or cooling systems. This type of sensor is quite often design with datalogger as well as temperature recorder.

 

Temperature sensor designed with datalogger with temperature recorder; is used in shipment of farm produce to different destinations or locations around the world   – e.g. shipment of fruits, vegetables leaves, frozen foods and flowers to ensure that they get to market in their best condition.  In addition, it is use to carry important hospital products such as shipment of blood products and pathology sample, in ensuring that the critical substances are not exposed to adverse temperature.

 

B light Sensor

 

Light sensor is commonly use for monitoring natural light levels, and employ its output to control artificial –lighting systems.  This could be further enhanced to use for security detector, how? Combination of this sensor with a straight light source such as LED, continuous sensor seeing the LED makes everything normal and OK. However, whenever the light is interrupted this indicates that something or person has just passed between the directional light source (LED) and Sensor.

 

C   Pressure Sensor

 

Pressure sensors are mostly use in measuring air pressure for weather monitoring and prediction by meteorologists. It can also be used in automobile – to measure manifold pressure in cars. Pressure sensor is use in measuring water level in washing machines, and in biomedical applications such as measuring blood pressure.

 

Conclusively, embedded design engineer or analogue design engineer intends to perform tasks or roles in sensor applications, students and graduates – computer engineering/science, electrical electronics engineering and physics/physics with electronics or whoever is aspiring to become a modern engineer and/or industrial engineers who wish to ground well their knowledge in building sensors and integration with microcontroller and applications to real world activities.

 

Please fill free to contact PAWAAK Technologies Ltd   www.pawaak.com for components selection and development support assistance.

 

To get learned more about programming sensor nodes and wireless sensor networks. We are ready to get you real time response to your literal requests and/ or services request within a reasonable and an appreciative time-frame.

 

 

 

 

 

Services provide are in two folds for universities, students, graduates and industries as well as corporate entities:

 

1) Training Consultancy

 

  1. PAWAAK Technologies is willing to provide raw analysis i. e. A well fabricated technical analysis for designing of Temperature sensor or Light sensor with low cost optimum performance microcontroller such as PIC based Data logger.
  2. In –house or Industrial laboratory designing and implementation/testing.
  3. We could also provide an application design and download. Traditionally, embedded C programming language on Linux platform.

 

2) Components Supply

 

PAWAAK Technologies could also provide supply service of electronic/electrical components for industrial design engineers or universities who in the nearest future intend to develop sensors applications.

 

Olawale Shakir Bakare

MSc Embedded Computer Systems Engineering UK, Sigbed Member US.

‘Wale Bakare also writes for EBN the premier online community for global supply chain professionals, EBN part of United Business Media Inc, USA.  Mr. Bakare also moderates for blogs with Internet Evolution Group – group that shares ideas and thoughts on internet technology and its developments. Internet Evolution is also a US based organisation, part of UBM Inc USA. And he belongs to member of Google group for Software Testing (QC) & Software Quality Assurance Group – software/embedded products testing technicians.

 

Co – Founder/CTO PAWAAK Technologies Ltd

Website: www.pawaak.com Phones: +447901236822  Email addresses:  | olawalebakare@pawaak.com |

Tweeter: @Bwale1 Skype VOIP: wales.george

When Is RHoK Coming To Nigeria? Random Hack of Kindness We Need Answers

0

We have a question today: when will RHoK arrive in Nigeria? If it has, please send us a link. We are not aware that this important institution has organized any program in Nigeria. Yet, it has done three in Kenya. What is happening people?

 

Random Hacks of Kindness is a community of innovation focused on developing practical open source solutions to disaster risk management and climate change adaptation challenges. Random Hacks of Kindness was founded in 2009 in partnership between Google, Microsoft, Yahoo!, NASA and the World Bank.

 

How it Works

RHoK works by bringing together experts in development and volunteers with a broad set of skills in software development and design. The goal is to produce practical open source solutions to development problems. Events give the community an opportunity to sprint on projects, but the community continues to collaborate around the year.

Bushfire Running on Ushahidi Manages Crowd Based Data During Fire

0

Bushfire Connect is an online bushfire crisis service based on Ushahidi. It displays and manages real time emergency information submitted by local community members and emergency agencies. The goal is to establish a reliable, dynamic and timely resource for people in fire threatened or damaged areas to enhance and extend the utility of official data sources.

 

Bushfire Connect uses Ushahidi to aggregate information from multiple sources: official and social, about events and incidents such as community meetings, fires, and road closures, in a way that empowers anyone to contribute local knowledge and make informed decisions.

 

Bushfire Connect overcomes the limitations with the current, official fire alert services by improving timeliness and relevance of data by empowering tens of thousands of people to contribute a human intelligence stream of content including text, images and video.

The system is a central repository collecting crowd-sourced incident data and layering it with information from official sources.

 

How Secure Is Your Software Design?

1

Software security is a serious issue in this present age, and must be taken seriously by programmers, but the question is now seriously do we take it especially in our part of the world, where we are gradually making a name for ourselves in software design. Google is just getting to recognize and identify with our IT industry which is growing rapidly. If we don’t want to die out before we ever get on our feet, then we must start well and start strong, and software security is one of those issues that must be taken seriously, especially in web-designing and web based programming, where  you software can be accessed by anyone from anywhere.

 

To help in this area, the Common Weaknesses Enumeration (CWE), a programmers community developed collection of software weaknesses is an awesome place to start. Their documentations are open source and prepared by the experts in the industry. CWE is sponsored by the Cyber security division of the  U.S. Department of Homeland Security

 

They cover software weaknesses by category, platform (JAVA, C, WEB) and others, which are updated regularly. The documentation lists errors, how they can be capitalized upon by hackers to jeopardize the integrity of the software, and most importantly steps to take to avoid them.

 

The latest version of the document released on 1st June 2011 can be found here. Some of the errors listed in the document are highlighted bellow

CWE-5: J2EE Misconfiguration: Data Transmission Without Encryption

Summary

Information sent over a network can be compromised while in transit. An attacker may be able to

read/modify the contents if the data are sent in plaintext or are weakly encrypted.

Potential Mitigations

The application configuration should ensure that SSL or an encryption mechanism of equivalent

strength and vetted reputation is used for all access-controlled pages.

 

 

CWE-6: J2EE Misconfiguration: Insufficient Session-ID Length:

Summary

The J2EE application is configured to use an insufficient session ID length.

Extended Description

If an attacker can guess or steal a session ID, then he/she may be able to take over the user’s

session (called session hijacking). The number of possible session IDs increases with increased

session ID length, making it more difficult to guess or steal a session ID.

Potential Mitigations

Session identifiers should be at least 128 bits long to prevent brute-force session guessing. A

shorter session identifier leaves the application open to brute-force session guessing attacks.

 

CWE-7: J2EE Misconfiguration: Missing Custom Error Page

Summary

The default error page of a web application should not display sensitive information about the

software system.

Extended Description

A Web application must define a default error page for 4xx errors (e.g. 404), 5xx (e.g. 500) errors

and catch java.lang.Throwable exceptions to prevent attackers from mining information from the

application container’s built-in error response.

Potential Mitigations

Handle exceptions appropriately in source code.

Always define appropriate error pages.

Do not attempt to process an error or attempt to mask it.

Verify return values are correct and do not supply sensitive information about the system.

 

Other issues include:

CWE-18: Source Code

CWE-20: Improper Input Validation

CWE-21: Patname Traversal and Equivalence Errors

Total of 863 issues

 

The document also contains a Dictonary of issues based on platform (CWE-2000)

 

Another helpful document on the website is a list of the top 25 software errors, which I think is a good place to start.

 

To all programmers in the house, let’s strive for excellent and secure software design.

 

Existing Microcontrollers in The Global Market

0

 

First what is a microcontroller? It is is a small computer on a single integrated circuit containing a processor core, memory, and programmable input/output peripherals. Program memory in the form of NOR flash or OTP ROM is also often included on chip, as well as a typically small amount of RAM. Microcontrollers are designed for embedded applications, in contrast to the microprocessors used in personal computers or other general purpose applications.(Wikipedia)

 

Today, we have more than 30 microcontroller manufacturers with many microcontroller products in the world today. They are listed below:

AMCC

PowerPC 403

PowerPC 405

PowerPC 440

 

Altera

Nios II 32-bit configurable soft microprocessor

Nios 16-bit configurable soft processor

 

Analog Devices

ADSP-21xx digital signal processor

MicroConverter series – ARM7 and 8052 cores

 

Atmel

AT89 series

AT90, ATtiny, ATmega, ATxmega series

AT91SAM (ARM architecture)

AVR32 (32-bit AVR architecture)

MARC4

 

Charmed Labs

Qwerk

XPort

 

Cypress Semiconductor

CY8C2xxxx

CY8C3xxxx

CY8C5xxxx

 

Dallas Semiconductor

8051 Series

MAXQ series

Secure Micros series

 

ELAN Microelectronics Corp.

EM78PXXX Low Pin-Count series

EM78PXXXN GPIO series

EM78PXXXN ADC Type MCU series

 

Energy Micro AS

Standard microcontrollers

Application specific microcontrollers

Custom microcontrollers

 

EPSON Semiconductor

4-bit Microcomputers S1C60/62/63 family

8-bit Microcomputers S1C88 family

16-bit Microcomputers S1C17 family

32-bit Microcomputers S1C33 family

 

Freescale Semiconductor

8-bit

68HC05 (CPU05)

68HC08 (CPU08)

68HC11 (CPU11)

16-bit

68HC12 (CPU12)

68HC16 (CPU16)

Freescale DSP56800 (DSPcontroller)

32-bit

Freescale 683XX

M·CORE

MPC500

MPC 860 (PowerQUICC)

MPC 8240/8250 (PowerQUICC II)

MPC 8540/8555/8560 (PowerQUICC III)

 

Fujitsu

F²MC Family (8/16-bit)

FR Family (32-bit)

FR-V Family (32-bit RISC)

 

Holtek

HT48FXX Flash I/O type series

HT48RXX I/O type series

HT46RXX A/D type series

HT49RXX LCD type series

HT82XX Computer Peripheral series

HT95XX Telecom Peripheral series

HT86XX Voice series

 

Infineon

8-bit

XC800 family

16-bit

XE166 family

C166 family

C167 family

32-bit

TRICORE family

 

Intel

8-bit

MCS-48

MCS-51

8xC251

16-bit

MCS-96 (8096 family – also incl. 8061)

Intel MCS-296

 

Lattice Semiconductor

Mico8 8-bit

Mico32 32-bit

 

Microchip Technology

8-bit PICmicro

PIC10 and PIC12

PIC16 series

PICAXE

PIC18 series

PIC24

32-bit

PIC32MX series

 

National Semiconductor

COP400

COP8

CR16

SC/MP

 

NEC

17K

V25

75X

78K

V850

 

Parallax

SX

SX-18, 20, 28, 48 and 52 versions with speed up to 75 MHz (75 MIPS)

Propeller

 

NXP Semiconductors

8-bit

80C51

16-bit

XA

32-bit

ARM7

LPC2000

ARM9

LPC3000

ARM Cortex-M4

LPC4300

ARM Cortex-M3

LPC1700/LPC1300/LPC1800

ARM Cortex-M0

LPC1100/LPC1200

 

Rabbit Semiconductor

Rabbit 2000

Rabbit 3000

Rabbit 4000

 

Renesas Electronics

4-bit

720

8-bit

78K

SLP

740

16-bit

M16C

H8

R8C

32-bit

SuperH

V850

RX

 

SiLabs

C8051F300

C8051F120

 

Silicon Motion

SM2XX family

SM321

SM323

SM323E

SM324

SM330

SM501

SM712

SM722

SM340

SM350

SM370

 

Sony

SPC900 Series

SPC970 Series

SR11 Series

 

STMicroelectronics

ST6 (8-bit)

ST7 (8-bit)

STM8 (8-bit)

?PSD (8-bit)

ST10 (16-bit)

STM32 (ARM Cortex M3, 32-bit)

STR7 (ARM7TDMI, 32-bit)

STR9 (ARM966E-S, 32-bit)

 

Texas Instruments

TMS370 (8-bit)

MSP430 (16-bit)

TMS320F28xx (32-bit)

C2000 (32-bit, Real-time control)

Stellaris (32-bit, ARM Cortex-M3)

TMS570 (32-bit RISC, ARM Cortex-R4)

 

Toshiba

TLCS-47 (4-bit)

TLCS-870 (8-bit)

TLCS-900 (16 and 32-bit CISC)

TX19A (32-bit RISC)

 

Ubicom

IP2022

IP3022

 

Xemics

XE8000 8-bit

 

Xilinx

Microblaze 32-bit

Picoblaze 8-bit

 

XMOS

XCore XS1 32-bit

 

ZiLOG

Zilog Z8 – 8-bit

Zilog Z180

Zilog eZ8

Zilog eZ80

Zilog Z16