Design of On-line Interactive Data Acquisition and Control System for Embedded Applications
Journal Title: International Journal of Research in Computer and Communication Technology - Year 2012, Vol 1, Issue 6
Abstract
In various Internet applications based on the client/server architecture, it is better to use embedded WEB server other than PC server for decreasing volume, cost and power consumption. The paper introduces the design of the WEB server based on the ARM9 processor and analyzes hardware configuration and software implementation with the growing popularity of Internet. Through the Ethernet we could acquire the different real-time information, and based on the information, we could draft corresponding options and we can also implement Control through Internet. It allows the user to interface real time applications like, Industrial automations and data acquisition etc,. Data acquisition plays an important role in real-time controls and online supervisions. In this paper we will be using S3C2440 32 bit ARM Processor with Linux porting. For this purpose we will be using Friendly ARM board which is having an inbuilt DM9000 Ethernet controller. In this Paper we are implementing a WEB server. Finally the application is developed and ported into an ARM9 processor using embedded 'C' language. Web pages are written by Hyper text markup language (HTML); this system is used for real time applications, Mission critical applications.
Authors and Affiliations
Kyasa Shobha Rani, B Brahma Reddy
Designing & Implementing an ARM 7 Based System for Critically Injured People by Using Electromyograph
This paper presents a system which can be used to study the movements human lower limb. It can detect muscle injury after accident. For orthopedic physical therapy it is very important to recognize the tear of a musc...
VLSI Implementation and Design of Digital Modulation Using Xilinx
In this Paper, Digital Modulators is designed and Implemented using XILINX ISE Tool based on Very Large Scale Integration (VLSI). This is majorly to implement and obtain digitalize signals in softwaredefined radio (SD...
Integrity And Confidentiality for Network Security
We compute the liability metric as a function of the steering and the cryptographic protocols used to secure the complex passage. We formulate the minimum cost node capture attack problem as a nonlinear integer progra...
Filtered Wall: An Automated System to Filter Unwanted Messages from OSN User Profiles
In recent years, Online Social Networks (OSNs) have become an important part of daily life. Users build explicit networks to represent their social relationships. Users can upload and share information related to the...
Seclusiveness Jamming Attacks Using Packet Hiding Method
We explains the problem of selective jamming attacks in wireless networks. The adversary is active only for a short period of time in this particular attack, it selectively targets the messages of high priority with...