Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Skip to main content
Advanced and complexes embedded systems as multicore and multiprocessor systems are becoming common and this has stimulated the development of critical applications for them. UAVs (Unmanned Aerial Vehicles) constitute a typical... more
Advanced and complexes embedded systems as multicore and multiprocessor systems are becoming common and this has stimulated the development of critical applications for them. UAVs (Unmanned Aerial Vehicles) constitute a typical application of a complex critical embedded system. This paper proposes a new form of segregating the UAV mission from the vehicle itself. In order to separate the mission of the plane is proposed MOSA -- Mission Oriented Sensors Array, an array of sensors oriented to missions that is plugged into the aircraft so as to leave it totally independent of the payload. The techniques proposed in this paper not only aim to facilitate the development of applications but also allow different tasks to be performed simply switching these sensors and their association with the aircraft.
Abstract Service-Oriented Architecture (SOA) are having a widespread use in enterprise computing applications, being Web services the most common implementation. The use of SOA has also been proposed for embedded systems, although very... more
Abstract Service-Oriented Architecture (SOA) are having a widespread use in enterprise computing applications, being Web services the most common implementation. The use of SOA has also been proposed for embedded systems, although very little could be found in ...
Transporting information often requires environments which guarantee its security against unauthorized access. Several systems and cryptographic techniques require computing resources (memory and processing capabilities) that prevent... more
Transporting information often requires environments which guarantee its security against unauthorized access. Several systems and cryptographic techniques require computing resources (memory and processing capabilities) that prevent those from being used in some portable devices. Thus, one option is to use symetric encryption instead of asymmetric encryption to encipher information. Consequently, resources can be saved although the Key Exchange Problem must be dealt with. This paper presents a technique based on Diffie-Hellman Key Agreement, which can be added to the cryptographic system TrueCrypt, and does not require too much processing capability.
Research Interests:
Civilian unmanned aerial vehicles (UAVs) usually have modest sizes and also physical limitations that restrict their use. Using more than one aircraft can bring more efficiency and better results to missions. In order to coordinate the... more
Civilian unmanned aerial vehicles (UAVs) usually have modest sizes and also physical limitations that restrict their use. Using more than one aircraft can bring more efficiency and better results to missions. In order to coordinate the mission execution by a team, a flying ad hoc network (FANET) is set up and UAVs can exchange information through broadcast messages. This ad hoc communication among aircraft has new challenges that need investigation, such as the Broadcast Storm Problem (BSP). In this paper we present an evaluation of solutions, commonly used to mitigate BSP in other types of mobile ad hoc networks (MANETs), and apply them to FANET scenarios. We have adapted three algorithms to three different scenarios and applied those algorithms to an embedded platform called Gumstix Overo. Results presented here show algorithms performance concerning network coverage and avoidance of redundant broadcasts in three distinct topologies, also showing techniques adaptation needed for each scenario.