Embedded System Design

 

Tactical 3D Digital Holographic Technology

Tactical 3D Digital Holographic TechnologyTactical digital holograms (TDH) are large-scale 3D static imagery presentations that resemble large sheets of x-ray film and allow 3D visualization of any object. Tactical digital holograms (TDH) are produced by Light Detection and Ranging (LIDAR) Buckeye data and the images are full parallax, meaning no special viewing equipment such as 3D glasses are needed.

Read more >>> Tactical 3D Digital Holographic Technology

Real-time Transport Protocol (RTP) is an application level protocol that is intended for delivery of delay sensitive content, such as audio and video, trough different networks (mainly for delivering audio and video over IP networks). RTP is used extensively in communication and entertainment systems that involve streaming multimedia, such as telephony, video teleconference applications and […]

Read more >>> Real-Time Transport Protocol (RTP) for Audio-Video over IP Network

Video over IP systems are part of Video Communication and Networking. Video over IP systems use video codecs to reduce the video size and then transmits the video over Internet Protocol (IP) network using Real-Time Transport Protocol (RTP) to somebody who is looking for this video. Various forms of Video over IP technology are: Video […]

Read more >>> Video over IP – Video Communication and Networking

Microchip Technology Inc., a leading provider of microcontroller, analog and Flash-IP solutions, introduced the mTouch AR1100 Analog Resistive USB Touch-Screen Controller. Building upon the AR1000 Analog Resistive Touch-Screen Controller series, the AR1100 controller is a high-performance, USB plug-and-play device that offers advanced calibration capabilities as a USB mouse or single-input digitizer. The new controller is […]

Read more >>> Analog Resistive USB Touch-Screen Controller

Counterfeiting and cloning of devices, piracy of content, software and data, reverse engineering of software and attacks on devices and communication systems lead to yearly losses of billions of dollars. Brand damage is often an important additional effect with a huge long-term economic impact. In some situations even the safety of our society is in […]

Read more >>> Hardware Intrinsic Security (HIS) for Unclonable Hardware and Software

Zytronic offers optical filters that are used to enhance the readability of all types of electronic displays by controlling light transmission, reflection and absorption. The filters can also provide protection of the display from abrasion and damage from impact thereby extending the life of the display. Both monolithic and multi-layer composites in glass or polycarbonate […]

Read more >>> Optical Filters for Anti-Glare Screen Displays of Light Reflection Controller

Zytronic offers innovative Capacitive Touch Sensors using patented Projected Capacitive Technology (PCT). Taking advantage of the ultra large form factor capability of PCT, it is possible to design large size outdoor LCD Touchscreen Display System. With an all-glass front, PCT can be readily sealed and is already proven in outdoor applications to house the touch […]

Read more >>> Capacitive Touch Sensors for Outdoor LCD Touchscreen Display System

Rohm’s new BU21023 / BU21024 series of high-speed, high noise immunity, low-voltage resistive touchscreen controllers is now available from ROHM Semiconductor. These new multi-touchscreen controllers are the industry’s first to enable multi-touch (two-point) operation and intuitive gesture control, including pinching, spreading and rotating – previously possible only with more expensive capacitive touchscreen display systems. These […]

Read more >>> Multi-Touch Controller for Resistive Touchscreen Displays

ARM processor technology is being used in development of Panasonic UniPhier SoCs for Internet Connected Digital TV Applications. New UniPhier MN2WS0220 System on Chip (SoC) includes a Dual-core ARM Cortex-A9 MPCore processors, ARM CoreLink NIC-301 Network Interconnect and the ARM Cortex-A9 Processor Optimization Pack (POP) for Low Power (LP) process. UniPhier System on Chips (SoC) […]

Read more >>> ARM Processor SOC for Internet Connected Digital TV

Optical Character Recognition (OCR) is the mechanical or electronic translation of scanned images of handwritten, typewritten or printed text into machine-encoded text at electronic speed by simply scanning the form. OCR is a field of research in pattern recognition, artificial intelligence and computer vision. More recently, the term Intelligent Character Recognition (ICR) has been used […]

Read more >>> Optical Character Recognition (OCR) System

Cryptanalysis is the study of methods for obtaining the meaning of encrypted information, without access to the secret information that is normally required to do so. Typically, this involves knowing how the system works and finding a secret key. In non-technical language, this is the practice of codebreaking or cracking the code, although these phrases […]

Read more >>> Cryptanalysis – Data Security Attacks & Analysis

Wired equivalent privacy (WEP) is a broken security algorithm for IEEE 802.11 wireless networks. WEP is widely used and is often the first security choice presented to users by router configuration tools. Wired Equivalent privacy uses the stream cipher RC4 for confidentiality and CRC-32 checksum for integrity. Standard 64-bit WEP uses a 40-bit key, which […]

Read more >>> Wired Equivalent Privacy (WEP) – Wireless Network Security Algorithm

Steganography is the art and science of writing hidden messages in such a way that no one, apart from sender and intended recipient, suspects the existence of the message, a form of security through obscurity. The Greek word Steganography means concealed writing. In Steganography, messages do not attract attention to themselves as in cryptography. Steganography […]

Read more >>> Steganography – Text/Image/Video/Audio Information Hiding & Cryptography

ARIA is a general-purpose block cipher algorithm developed by Korean cryptographers in 2003.ARIA is an iterated block cipher with 128-, 192- and 256-bit keys and encrypts 12-bit blocks in 12, 14 and 16 rounds depending on key size. ARIA is secure and suitable for most software and hardware implementations on 32-bit and 8-bit processors. The […]

Read more >>> ARIA Algorithm for Encryption & Decryption – Cryptography & Data Security

ABC algorithm, also called Artificial Bee Colony Algorithm was proposed by Karaboga in 2005. Artificial Bee Colony Algorithm is an optimization algorithm based on intelligent foraging behavior of honey bee swarm. ABC is used in computer science and operational research. ABC is used in neural networking. Artificial Bee Colony Algorithm works against numerical optimization problems. […]

Read more >>> ABC Algorithm for Encryption & Decryption – Cryptography & Data Security

Cryptography consists of Block Ciphers. One of such block cipher algorithm is the 3-Way Algorithm. It was designed by Joan Daemen and has a key and block size of 96 bits. 3-way algorithm is an iterated block cipher that repeats some relatively simple operations a specified number of times. A related key attack on 3-way […]

Read more >>> 3-Way Algorithm for Encryption & Decryption – Cryptography & Data Security

Maxim Integrated Products introduced the MAX98089, a highly integrated stereo audio codec that improves audio performance and prevents speaker damage. An easy-to-use graphical user interface (GUI) significantly eases the design in of the product. The MAX98089 is a full-featured audio codec whose high performance and low power consumption make it ideal for portable applications such […]

Read more >>> Audio Codec with I2S & PCM Digital Audio Interface

PointChips developed SD/MMC Memory Card Reader Controller PP6580, a high speed USB2.0 device that implements the host function for SD card and the analog switch for accessing external other SD card. When the SD card data is to be transferred from PC via USB cable, PP6580 can transfer the SD data with high speed rate. […]

Read more >>> SD/MMC Memory Card Reader Controller – USB SD/MMC Host Controller

Message Authentication Code (MAC) is one of the Cryptographic Hash Function and is a short piece of information used to authenticate a message. Message Authentication Codes are also called as authentication tags or Checksum. MAC is verified by an intended recipient. A Message Authentication algorithm accepts secret key as its input and an arbitrary length […]

Read more >>> Message Authentication Codes (MAC) – Cryptography & Data Security

Cryptographic Hash function is a complex encryption algorithm used in cryptography and it refers to a shortened version of full-scale encryption. A Cryptographic hash function is a deterministic procedure that takes an arbitrary block of data and returns a fixed-size bit string, the hash value, such that an accidental or intentional change to the data […]

Read more >>> Cryptographic Hash Functions – Data Encryption Algorithms

Showing results 21 - 40 of 136 for the category: Embedded System Design.