Skip to main content

Posts

Showing posts from 2018

FMEA Types and steps involved

FMEA means Failure Mode and Effects Analysis. There are 3 types of FMEAs.  System FMEA (SFMEA) Design FMEA  (DFMEA) Process FMEA  (PFMEA) SFMEA is for System and used to analyze the failures of the end product in a customer's system. It focuses on the potential failure modes associated with the functions of the end product.  DFMEA begins with the development of information to understand the system, subsystem or component being analyzed and defines their functional requirements and characteristics. It focuses on potential failure modes associated with the function of each system, subsystem or component being analyzed.  PFMEA is used to analyze manufacturing and assembly processes. It focuses on process inputs.  FMEA Processes - Steps Involved  There are 13 steps in creating an FMEA. Please find the attached diagram. Step 2: Define the Function  What is the system, the sub system or process steps supposed to d...

Anatomy of embedded Linux system

Linus Torvalds released 1st version of Linux kernel in 1991.  Much lower used as desktops and mainly used for embedded applications. In embedded systems, Linux has been ported to many architectures including ARM. It’s an open software, and some pros of open source software - reduces software costs, full control of source code, wide usage of components can improve quality, easy to evaluate new software. In the anatomy of embedded Linux system, these 4 items are very important - Tool chain, Boot loader, Kernel and File system. This is the basic diagram- we have 2 main components Host and Target.  Tool chain indicates the tools and software required for developing software on the target platform. Example compiler, Binutils, C library, debugger, kernel headers etc.  If we have to debug kernel headers, serial debugger can be used. If CPU wants to be debugged,  JTAG debugging tool must be used.  Please refer below image.  Binutils is a coll...

Phishing - Introduction

Many of us receive phishing emails from bank saying “Dear Client, we have to login to your account to verify your credentials. When you actually login by using your details, it says “unable to login” or some error message, in background what happens is your credentials has been stolen and this is what email phishing. What is OAuth (Open Authorization)? Hackers are exploiting a cloud protocol called OAuth . It’s not specific to google attack. OAuth or open standard for authorization is a standardized way for internet accounts to link with 3 rd party applications. It is universally adopted by almost all web-based applications and platforms – including consumer as well as enterprise applications such as google Apps, Microsoft office, sales force and many others. OAuth powers the cloud, enabling the API economy, enhancing user experience.   At the same time in the wrong hands OAuth can be a weapon and it’s a night mare for IT security teams. Example, Attacker set...

FMEA: Failure Mode and Effects Analysis

An FMEA is basically a Risk Analysis Tool that helps us, in a structured way, to detect all potential sources of failure in a design and all process steps, against functional requirements, including their effects and their causes.  Product fail to satisfy customer requirements and expectations due to following reasons: Errors in design Product misuse Flaws induced by the manufacturing processes Not understanding customer requirements properly Repeated defects from suppliers Re occurrence of internal failures We need a systematic method of identifying and preventing system, product and process problems before they occur.  We conduct FMEA to improve quality of final product and to reduce total cost. It contributes to improved designs for product, processes resulting in higher reliability, better quality,  increased safety and improved customer satisfaction. If FMEA is applied, number of failures will be detected at a very early stage. It decreases deve...

Introduction to Deep Learning

Deep Learning is a type of machine learning in which a model learns to perform classification tasks directly from images, text or sound. Its usually implemented using a neural network architecture. Here deep refers to the "Number of layers in the network" i.e the more layers, the deeper the network. Traditional neural network contain only 2-3 layers, but in deep network contains hundreds of layers. Deep learning example is  A self-driving vehicle slows down as it approaches a pedestrian network . Deep learning is especially well-suited to identification applications such as face recognition, text translation, voice recognition and advanced driver assistance systems and traffic sign recognition etc. Deep learning is growing faster because it really works.  What is the Difference Between Deep Learning  and Machine Learning? Deep learning is a sub-type of machine learning. For example with machine  learning, you manually extract the relevant features of...

EDGE Essentials in IIoT

EDGE Essentials in IIoT  Architecting an IIoT system begins at the edge where industrial "things" are instrumented with sensors, actuators and edge nodes.  Key attributes:  On board data processing reduces the latency for time critical control decisions.   Synchronized data can be acquired. Edge ready hardware is available. To deploy IoT systems at the edge, below mentioned are the considerations.  Data Acquisition  Data processing Control Communication Security Deployment Data Acquisition:  Data is collected using edge nodes such as sensors, actuators at the machinery. Data can be temperature, pressure, position, vibration, rpm, motor/pump speed etc. When we talk about Data Acquisition, we have to consider sample rate of the data (i.e. at what time/moment need to collect each sample/data), resolution, triggering, signal conditioning and Isolation.  Let me explain each term: Sample rate is number of samples per second ...

Success of HTML5

Success of HTML5 Presentation of User Interface (UI) is developed using HTML and HTML is executed by browser which is a client. This browser has a layout engine which processes HTML and executes the code. Its important to know that HTML is not executed on server side which is a web server. HTML enhances the User Experience on browser. HTML technology can be used in browsers and non-browser systems as well (eBook, Help , E-mail etc). Its a rich internet application technology. Examples of HTML usage online is: Flip-kart snap-deal gaana.com and many more. These sites heavily rely on HTML. Web applications using HTML on client side: Google - search engine Facebook - social media You tube - videos Times of India - news Yahoo - search engine Bing - search engine Apple - for phones Flip kart - Business to Customer (B2C) Offline use of HTML: Mainly in representation of document formats in  help application or system. msdn inte...

Introduction to Modelling and Simulation

What is about Today?    Modeling & simulation is use of the physical, mathematical or logical representation of a system , entity or process and these models  reduces the development time and cost of the system and it optimizes the design.  Simulation is the imitation of the real-world process or system. To simulate something, it requires a model to be developed, and these model represents the key characteristics, behaviors and functions of the selected system or process.Modelling an act of building a model and Simulation is act of using a model. Simulation software is based on the process of modeling a real phenomenon with a set of mathematical formulas.  Advantages: Allows to understand how the system operates in real-time system in virtual environment. Easy to make changes in to the system and their effect on the output. Can determine the system requirements by applying different configurations. Performing bottleneck analysi...

Network Trouble shooting Commands

Network Trouble shooting Commands Hi All, Today i am going to talk about few commands in networking which are very useful for network troubleshooting. Below mentioned are the commands: Ping Trace route IP  config Ping command bounces a small packet off a domain or IP address to test network connectivity, and tells how long the packet took to make the round trip. Its most commonly used command for conducting the most basic network test and to verify that a device can communicate with another device on a network.  Fig 1: Ping command for goolge.com When you " Ping"   google.com it sends some data and gets reply from it. Otherwise it shows like connection times out or host not reachable. If lost is 0%, then network is reachable with out data (Packet) loss. Ipconfig command gives information about your system IP configuration details. Below fig 2 is the example. Fig 2:  Ipconfig command The traceroute command used to show se...

Introduction to Augmented Reality (AR)

Introduction to Augmented Reality (AR) AR is an enhanced version of reality. It’s an integration of digital information with the User's environment in real time. AR is different from Virtual Reality (VR). Virtual Reality creates an artificial environment and Augmented reality  uses the existing environment and overlays new information on top of it. Its  where live direct or indirect views of physical real-world environments are  augmented  with superimposed computer-generated images over a user's view of the real-world, thus enhancing one's current perception of  reality . It’s how you work, play and connect with the world. AR is rapidly growing technology, because it brings the objects to reality. Key Components to Augmented Reality Devices       Sensors and Cameras       Projection       Processing       Reflection Many of the  top augmented reality companies  are se...

Cognitive Radio Technology (CRT) in IoT

Cognitive Radio Technology (CRT) in IoT The vision of IoT represents a future where billions of everyday objects and surrounding environments will be connected and managed through a range of communication networks and cloud-based servers and Cognitive radio technology (CRT) is expected to be indispensable in the era of IoT. Basic cognitive radio cycle with five mutually connected phases is shown in fig 1. The idea of intelligent cognitive radio technology is the current solution of wireless communication and provides energy efficient solutions for IoT.    Advantages of CRT in IoT ·        CRT in which the transmit parameters of the system are not pre-defined and can be adapted freely depending on the current situation, is a good candidate for the IoT. Fig. 1 Cognitive radio technology cycle ·        Through dynamic spectrum access capabilities, cognitive IoT not only improves spectru...

Introduction to Machine Learning – ML

Machine Learning – ML ML is one of the hot buzz word now, let me explain what it is and why it is? In traditional programming, we feed data and program to a computer to get output, but in Machine learning, we feed data and output to a system to generate algorithm or programming for that data to find a pattern. So that we can forecast the results of new set data by applying the pattern which has found on existing data. This is a simple definition to understand ML concept. ML gives computer systems the ability to learn the data, without being programmed explicitly. Day to day growing internet traffic makes human thinking and analysis of data to limited. To do this we need a machine which can analyze the huge data and find a pattern on that data. This is what machine learning does. It is a continuously developing field.  Example: Facial recognition technology allows social media platforms to help users tag and share photos of friends.  Python  if a popular language fo...

Cognitive Radio Technology (CRT)

Cognitive Radio Technology (CRT) What is CRT? CRT is an intelligent radio technology which will detect unused spectrums/channels in the current spectrum range. It’s an exciting and new way of thinking and researching about wireless technologies.  Why CRT is important? Example when you take FM radio spectrum, only some channels such as 93.4MHz or 99.8MHz is used, all other frequency range is unused. These frequency channels can be used for transmission. The unused spectrum is mentioned as “Spectrum Holes”. In this technology transceiver works as a smart/intelligent device which detects what spectrum are in use and what spectrum is not in use. This optimizes the use of available radio-frequency (RF) spectrum . It’s a radio that can change its transmitter parameters based on interaction with the environment in which it operates. If some spectrum is not used, CRT enables to use that spectrum efficiently. There are two main types of cognitive radio, full cognitive ...

Introduction to IoT ecosystem

Basics of IoT IoT (Internet of Things) refers to a network where devices communicate to devices and devices communicate to software applications over the internet . This web-enabled devices/internet enabled devices will usually collect data, send and act upon data from their surrounding environment. •       The IoT network consists of Edge side (sensors, actuators and controllers connected to the internet) and Cloud side. •       The devices on the Edge side can either connect to the internet directly or using an Edge (IoT) gateway . The Edge gateway is used for: •        Providing a connection to the internet for devices that cannot connect to the internet on their own. These devices don’t have feature to connect to the Internet. •        Local functionality/control that must work even without internet availability •       ...

Wireless Technologies in IoT

Wireless Technologies in IoT The explosive growth of the internet over the last decade has increased the research and interest on internet of things (IoT) and led to an increasing demand for high speed, ubiquitous internet access. The IoT is envisioned as “a global network of connected devices having identities and virtual personalities operating in smart spaces and using intelligent interfaces to communicate within social, environmental and user contexts. In broadband there are so many wireless standards and technologies exist which provides a path for IoT. The multiple wireless access technologies include GSM, Bluetooth, Wi-Fi, WiMAX, cellular etc. and they all must be effectively integrated to create a seamless communication platform.   These all have its own merits and demerits. Any wireless technology to be suitable for IoT applications it needs to reduce power consumption, provide high data rate and security.   Managing heterogeneous networking infrastructure especia...