CN111737380A - Traffic illegal behavior detection method based on embedded terminal - Google Patents

Traffic illegal behavior detection method based on embedded terminal Download PDF

Info

Publication number
CN111737380A
CN111737380A CN202010334067.4A CN202010334067A CN111737380A CN 111737380 A CN111737380 A CN 111737380A CN 202010334067 A CN202010334067 A CN 202010334067A CN 111737380 A CN111737380 A CN 111737380A
Authority
CN
China
Prior art keywords
embedded terminal
detection method
module
behavior detection
information
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202010334067.4A
Other languages
Chinese (zh)
Inventor
张中
桂旺胜
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Hefei Zhanda Intelligent Technology Co ltd
Original Assignee
Hefei Zhanda Intelligent Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Hefei Zhanda Intelligent Technology Co ltd filed Critical Hefei Zhanda Intelligent Technology Co ltd
Priority to CN202010334067.4A priority Critical patent/CN111737380A/en
Publication of CN111737380A publication Critical patent/CN111737380A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/20Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
    • G06F16/29Geographical information databases
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/20Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
    • G06F16/24Querying
    • G06F16/245Query processing
    • G06F16/2458Special types of queries, e.g. statistical queries, fuzzy queries or distributed queries
    • G06F16/2465Query processing support for facilitating data mining operations in structured databases
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q50/00Information and communication technology [ICT] specially adapted for implementation of business processes of specific business sectors, e.g. utilities or tourism
    • G06Q50/10Services
    • G06Q50/26Government or public services

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Databases & Information Systems (AREA)
  • Physics & Mathematics (AREA)
  • Business, Economics & Management (AREA)
  • General Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • Tourism & Hospitality (AREA)
  • Data Mining & Analysis (AREA)
  • Software Systems (AREA)
  • General Health & Medical Sciences (AREA)
  • Probability & Statistics with Applications (AREA)
  • Mathematical Physics (AREA)
  • Development Economics (AREA)
  • Educational Administration (AREA)
  • Fuzzy Systems (AREA)
  • Health & Medical Sciences (AREA)
  • Economics (AREA)
  • Computational Linguistics (AREA)
  • Human Resources & Organizations (AREA)
  • Marketing (AREA)
  • Primary Health Care (AREA)
  • Strategic Management (AREA)
  • General Business, Economics & Management (AREA)
  • Remote Sensing (AREA)
  • Traffic Control Systems (AREA)

Abstract

The invention relates to a traffic violation detection method, in particular to a traffic violation detection method based on an embedded terminal, which comprises the following steps: s1: collecting the driving information of the road vehicle through an information collection system; s2; the driving information of the vehicle is transmitted to the embedded terminal in a remote transmission mode through the information acquisition system; s3: storing the driving information data of the vehicle into a server database through an embedded terminal; s4: and detecting the driving information of the vehicle through a space-time trajectory processing algorithm. According to the traffic illegal behavior detection method based on the embedded terminal, the problem of single similarity measurement in the traditional track algorithm is solved by adopting a density weighting mode, and meanwhile, a track set is automatically divided into proper clusters by utilizing a clustering fusion method, so that the problem that the number of clustered clusters is difficult to determine is solved.

Description

Traffic illegal behavior detection method based on embedded terminal
Technical Field
The invention relates to a traffic illegal behavior detection method, in particular to a traffic illegal behavior detection method based on an embedded terminal.
Background
In recent years, traffic networks are expanding, traffic pressure is increasing, and large-area congestion often occurs particularly during rush hours and rush hours. The vehicle track is analyzed to find out the running rule of the vehicle, which is beneficial to the coordination of transportation by traffic operation departments. With the heavy use of WiFi embedded mobile devices equipped with GPS sensors and storage hardware, a large amount of GPS track data is generated each day, storing the location of the mobile object and a timestamp. How to mine useful value from a large amount of trajectory data is an important issue. In view of this, we propose a traffic violation detection method.
Disclosure of Invention
An object of the present invention is to solve the above-mentioned drawbacks of the prior art by providing a method for detecting illegal traffic behaviors based on an embedded terminal.
The technical scheme adopted by the invention is as follows: the method comprises the following steps:
s1: collecting the driving information of the road vehicle through an information collection system;
s2; the driving information of the vehicle is transmitted to the embedded terminal in a remote transmission mode through the information acquisition system;
s3: storing the driving information data of the vehicle into a server database through an embedded terminal;
s4: and detecting the driving information of the vehicle through a space-time trajectory processing algorithm.
As a preferred technical scheme of the invention: the S4 further includes the steps of:
s4.1: normalizing all trace points in each dimension by z-score to eliminate errors caused by size differences;
s4.2: extracting a series of space-time regions according to the improved density peak value clustering;
s4.3: and clustering and fusing the space-time regions to divide the whole space-time region into a series of hot spot regions.
As a preferred technical scheme of the invention: the improved density peaks in S4.2 are based on the clustering method of density to identify high density regions surrounded by low density.
As a preferred technical scheme of the invention: the density clustering method specifically comprises the following steps:
s4.2.1: calculating the direct distance density between the tracing points through linear factors;
s4.2.2: calculating the distance density between the tracing points through nonlinear factors;
s4.2.3: and the two are weighted and combined.
As a preferred technical scheme of the invention: the calculation formula of S4.2.1 is:
Figure RE-GDA0002649073170000021
as a preferred technical scheme of the invention: the method is as follows.
As a preferred technical scheme of the invention: the calculation formula of S4.2.2 is:
Figure RE-GDA0002649073170000022
as a preferred technical scheme of the invention: the calculation formula of S4.2.3 is:
Figure RE-GDA0002649073170000023
as a preferred technical scheme of the invention: the embedded terminal comprises an acquisition module, a processing module, a keyboard, a display module, a network transmission module, a control module and a power supply module.
As a preferred technical scheme of the invention: the acquisition module is used for acquiring information;
the processing module is used for controlling the work of the whole system, processing and storing the acquired information;
the control module is used for correspondingly controlling each module;
the keyboard and display module is used for displaying related information to prompt field personnel to operate;
the network transmission module is used for information interaction with the data server;
the power supply module is used for supplying power to the whole system.
As a preferred technical scheme of the invention: the information acquisition system and the embedded terminal adopt a TCP/IP network communication protocol for remote transmission.
According to the traffic illegal behavior detection method based on the embedded terminal, the problem of single similarity measurement in the traditional track algorithm is solved by adopting a density weighting mode, and meanwhile, a track set is automatically divided into proper clusters by utilizing a clustering fusion method, so that the problem that the number of clustered clusters is difficult to determine is solved. Compared with the prior art, the dividing effect of the invention is greatly improved. By carrying out cluster analysis on vehicle track data, a track area with space-time similarity is found out, and the track area is further divided into a series of hot spot areas, so that the method has important guiding significance for reasonably distributing police strength and relieving pressure in traffic peak periods.
Detailed Description
It should be noted that, in the present application, features in embodiments and embodiments may be combined with each other without conflict, and technical solutions in the embodiments of the present invention will be clearly and completely described below, and it is obvious that the described embodiments are only a part of the embodiments of the present invention, and not all of the embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
The invention provides a traffic violation behavior detection method based on an embedded terminal, which comprises the following steps:
s1: collecting the driving information of the road vehicle through an information collection system;
s2; the driving information of the vehicle is transmitted to the embedded terminal in a remote transmission mode through the information acquisition system;
s3: storing the driving information data of the vehicle into a server database through an embedded terminal;
s4: and detecting the driving information of the vehicle through a space-time trajectory processing algorithm.
In this embodiment: s4 further includes the steps of:
s4.1: normalizing all trace points in each dimension by z-score to eliminate errors caused by size differences;
s4.2: extracting a series of space-time regions according to the improved density peak value clustering;
s4.3: and clustering and fusing the space-time regions to divide the whole space-time region into a series of hot spot regions.
In this embodiment: the improved density peaks in S4.2 are based on a clustering method of density to identify high density areas surrounded by low density.
In this embodiment: the density clustering method specifically comprises the following steps:
s4.2.1: calculating the direct distance density between the tracing points through linear factors;
s4.2.2: calculating the distance density between the tracing points through nonlinear factors;
s4.2.3: and the two are weighted and combined.
In this embodiment: s4.2.1 is calculated as:
Figure RE-GDA0002649073170000041
in this embodiment: s4.2.2 is calculated as:
Figure RE-GDA0002649073170000042
in this embodiment: s4.2.3 is calculated as:
Figure RE-GDA0002649073170000043
specifically, the two densities are weighted and combined to obtain the density of the point:
ρi=ωρ′i,1+1-ωρ′i,2
herein, omega is 0.5, sigma by defaultiIs defined as:
Figure RE-GDA0002649073170000044
in this embodiment: the embedded terminal comprises an acquisition module, a processing module, a keyboard, a display module, a network transmission module, a control module and a power supply module.
In this embodiment: the acquisition module is used for acquiring information;
the processing module is used for controlling the work of the whole system, processing and storing the acquired information;
the control module is used for correspondingly controlling each module;
the keyboard and display module is used for displaying related information to prompt field personnel to operate;
the network transmission module is used for information interaction with the data server;
the power supply module is used for supplying power to the whole system.
The information acquisition system and the embedded terminal adopt a TCP/IP network communication protocol for remote transmission.
Specifically, the processor module of the embedded terminal selects the ARMCortex-based module which is just recently released by ST companyTMA new generation of embedded STM32 chips with M3 cores. This is a kernel developed specifically for embedded applications. It has a nested vector interrupt controller that reduces the delay between interrupts to 6 CPU cycles, allows independent bit manipulation of a single data bit to be modified in each write operation, allows branch instruction prediction, single cycle multiplication, hardware division, and has an efficient Thumb2 instruction set. These improved techniques provide the Cortex-M3 core with excellent code density, real-time performance and low power consumption performance. All the new functions have the optimal power consumption level at present, and are very suitable for being applied to a terminal control system working for a long time.
The embedded terminal is input by a +12V power supply, 5V and 9V voltages are obtained after voltage stabilization by LM2575 and 78L09, and the 5V voltage is converted into 3.3V after voltage stabilization by SPX1117M3-3.3 voltage, so that the 3.3V, 5V and 9V voltages can well meet the power supply requirements of a kernel, peripheral equipment and an external circuit. The system clock source can adopt an external crystal oscillator, and the internal PLL circuit can adjust the system clock, so that the system running speed is higher. In order to provide superior power monitoring performance, a special MAX811 system monitoring reset chip is selected, the chip can manually control the reset of the system, and can also monitor the system power in real time, once the system power is lower than a system reset threshold value, the MAX811 in the circuit generates a reset pulse signal of 140ms to reset the system.
The W5100 chip selected by the system network module is a multifunctional single chip network interface chip. The embedded system is internally integrated with an 10/100Mbps Ethernet controller, can support automatic response (full duplex/half duplex mode), and is mainly used for embedded systems with high integration, high stability, high performance and low cost. An Internet connection without an operating system can be realized using the W5100. W5100 is compatible with IEEE802.310BASE-T and 802.3u100 BASE-TX. In addition, the W5100 is internally integrated with a full-hardware TCP/IP protocol stack, an Ethernet media transmission layer (MAC) and a physical layer (PHY) which are subjected to market validation for many years. Its hardware TCP/IP protocol can support TCP, UDP, ICMP, IGMP, IPv4, ARP, PPPoE and IGMP. Meanwhile, 4 independent ports (sockets) can be supported for communication, 16 Kbytes of data can be sent in the sockets, data exchange can be rapidly carried out in a receiving buffer area, and the maximum communication rate can reach 25 Mbps. Various MCU can be conveniently connected by using various bus (parallel bus and SPI bus) interface modes provided by W5100. The W5100 device greatly simplifies the design of a hardware circuit, and can enable a microcontroller system to realize the ideal of accessing a single chip to the Internet without the support of an operating system. Generally, only a register and a memory are needed to be arranged, and the Internet connection can be carried out through the W5100 chip.
Alternatively, the memory module may store flash memory M25P64 in the option of ST corporation's 64MB serial code. The data transmission clock frequency of the device is 50MHz, the data reading throughput is 50MB/s, and the simple SPI serial peripheral interface can simplify the design of the system. By using two pieces of M25P64 cascade, 128MB information can be stored, and the requirement of platform information acquisition and storage can be completely met. For the convenience of human viewing, the LCD screen in the system is optional (114.0mm × 64.0mm), and in this embodiment, the STM32F103 and the W5100 may be connected through an SPI interface. The STM32F103 serves as an SPI master device, the W5100 serves as an SPI slave device, and the communication clock is supplied to the W5100 by the STM32F 103.
The driver of the W5100 mainly completes functions such as initialization and port data communication.
The registers of W5100 configured through the SPI interface typically have a fixed command format. According to the SPI protocol, there are only two data lines between the SPI devices. Therefore, an operation Code (OP _ Code) needs to be defined. W5100 uses two opcodes: a read opcode and a write opcode. In addition to these two codes, it will ignore and not respond to other opcodes. In SPI mode, W5100 operates only on the "full 32-bit data stream". This 32-bit data stream includes 1 byte of an opcode, 2 bytes of an address code, and 1 byte of data. The operation code, address and data bytes are transmitted with the Most Significant Bit (MSB) before and the Least Significant Bit (LSB) after. That is, the first bit of the SPI data is the MSB of the opcode field and the last bit is the LSB of the data field.
TCP is a connection-oriented communication that must first establish a connection before data can be communicated using IP addresses and port numbers. TCP has two ways to establish a connection, one is to wait for a connection request in server mode (passive open); the second is to send a connection request to the server via client mode (active open). This example uses TCP client mode. Before establishing a TCP connection, it is generally necessary to initialize the port, including setting the port number, setting W5100 to TCP mode, and writing OPEN commands. The port initialization mainly configures the relevant registers of the port 0, and comprises the following steps: s0_ PORT, S0_ MR, and S0_ CR.
When handling an interrupt of W5100, the Interrupt Register (IR) of W5100 should be accessed first, and the MCU can obtain the source of the interrupt by accessing the IR. Any interrupt source may be masked by a corresponding bit in an interrupt register (IMR) so that if an interrupt source is to be used, the corresponding bit in the IMR for that interrupt source is set, so that an interrupt is generated when the corresponding bit in the IR is set. When an interrupt is generated, the interrupt handler is entered. For each interrupt event, the manner of processing may be defined by the user himself.
If a port 0 interrupt is used. The IM _ IR0 (port 0 interrupt mask bit) in IMR may be set first in the initialization procedure of W5100. In this way, when port 0 interrupt occurs (I in IM _ IR0 and 1 in S0_ INT), the system starts reading the port 0 interrupt register (S0_ IR), and interrupt events such as connection establishment (CON), connection termination (disco), completion of data transmission (SEND _ OK), reception data (RECV), and TIMEOUT (TIMEOUT) are mainly set in the port register of W5100.
When the port generates a receiving interrupt, a receiving function S _ Rx _ process (buffers) can be called to cache the data received by the port into an Rx _ buffer array, and the number of bytes of the received data is returned. When all data is read, the value of the receive memory read pointer register (S0_ RX _ RD) may be added to the read data length, then written to S0_ RX _ RD, and finally written to the command register (S0_ CR) of port 0 with the RECV command to wait for the next receive data. However, it is noted that when calculating the actual physical offset RX _ offset, S _ RX _ SIZE must be guaranteed to be consistent with the SIZE of the receive buffer defined in the initialization code.
When data is transmitted through Socket, data to be transmitted is first buffered in Tx _ buffer. In addition, when data is transmitted, the size of the remaining space of the transmission buffer needs to be checked first, and then the number of bytes of the transmitted data needs to be controlled. The size of the port transmit buffer is determined by the Transmit Memory Space Register (TMSR). In the data transmission process, the size of the residual space is reduced due to the writing of data, and the residual space is automatically increased after the transmission is finished. After the Tx _ buffer data is completely written into the transmit data buffer of the port, the value in the port transfer write pointer register (Sn _ Tx _ WR) may be added to the written data length, written into Sn _ Tx _ WR to indicate the length of the transmit data, and finally the SEND command may be written into the command register (Sn _ CR) to initiate transmission.
It will be evident to those skilled in the art that the invention is not limited to the details of the foregoing illustrative embodiments, and that the present invention may be embodied in other specific forms without departing from the spirit or essential attributes thereof. The present embodiments are therefore to be considered in all respects as illustrative and not restrictive, the scope of the invention being indicated by the appended claims rather than by the foregoing description, and all changes which come within the meaning and range of equivalency of the claims are therefore intended to be embraced therein.
Furthermore, it should be understood that although the present description refers to embodiments, not every embodiment may contain only a single embodiment, and such description is for clarity only, and those skilled in the art should integrate the description, and the embodiments may be combined as appropriate to form other embodiments understood by those skilled in the art.

Claims (10)

1. A traffic illegal behavior detection method based on an embedded terminal is characterized in that: the method comprises the following steps:
s1: collecting the driving information of the road vehicle through an information collection system;
s2; the driving information of the vehicle is transmitted to the embedded terminal in a remote transmission mode through the information acquisition system;
s3: storing the driving information data of the vehicle into a server database through an embedded terminal;
s4: and detecting the driving information of the vehicle through a space-time trajectory processing algorithm.
2. The embedded terminal-based traffic illegal behavior detection method according to claim 1, characterized in that: the S4 further includes the steps of:
s4.1: normalizing all trace points in each dimension by z-score to eliminate errors caused by size differences;
s4.2: extracting a series of space-time regions according to the improved density peak value clustering;
s4.3: and clustering and fusing the space-time regions to divide the whole space-time region into a series of hot spot regions.
3. The embedded terminal-based traffic illegal behavior detection method according to claim 2, characterized in that: the improved density peaks in S4.2 are based on the clustering method of density to identify high density regions surrounded by low density.
4. The embedded terminal-based traffic illegal behavior detection method according to claim 3, characterized in that: the density clustering method specifically comprises the following steps:
s4.2.1: calculating the direct distance density between the tracing points through linear factors;
s4.2.2: calculating the distance density between the tracing points through nonlinear factors;
s4.2.3: and the two are weighted and combined.
5. The embedded terminal-based traffic illegal behavior detection method according to claim 4, characterized in that: the calculation formula of S4.2.1 is:
Figure FDA0002465971260000011
6. the embedded terminal-based traffic illegal behavior detection method according to claim 4, characterized in that: the calculation formula of S4.2.2 is:
Figure FDA0002465971260000012
7. the embedded terminal-based traffic illegal behavior detection method according to claim 4, characterized in that: the calculation formula of S4.2.3 is:
Figure FDA0002465971260000021
8. the embedded terminal-based traffic illegal behavior detection method according to claim 1, characterized in that: the embedded terminal comprises an acquisition module, a processing module, a keyboard, a display module, a network transmission module, a control module and a power supply module.
9. The embedded terminal-based traffic violation detection method according to claim 8, wherein:
the acquisition module is used for acquiring information;
the processing module is used for controlling the work of the whole system, processing and storing the acquired information;
the control module is used for correspondingly controlling each module;
the keyboard and display module is used for displaying related information to prompt field personnel to operate;
the network transmission module is used for information interaction with the data server;
the power supply module is used for supplying power to the whole system.
10. The embedded terminal-based traffic illegal behavior detection method according to claim 1, characterized in that: the information acquisition system and the embedded terminal adopt a TCP/IP network communication protocol for remote transmission.
CN202010334067.4A 2020-04-24 2020-04-24 Traffic illegal behavior detection method based on embedded terminal Pending CN111737380A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202010334067.4A CN111737380A (en) 2020-04-24 2020-04-24 Traffic illegal behavior detection method based on embedded terminal

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202010334067.4A CN111737380A (en) 2020-04-24 2020-04-24 Traffic illegal behavior detection method based on embedded terminal

Publications (1)

Publication Number Publication Date
CN111737380A true CN111737380A (en) 2020-10-02

Family

ID=72646719

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202010334067.4A Pending CN111737380A (en) 2020-04-24 2020-04-24 Traffic illegal behavior detection method based on embedded terminal

Country Status (1)

Country Link
CN (1) CN111737380A (en)

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104657424A (en) * 2015-01-21 2015-05-27 段炼 Clustering method for interest point tracks under multiple temporal and spatial characteristic fusion
CN106383868A (en) * 2016-09-05 2017-02-08 电子科技大学 Road network-based spatio-temporal trajectory clustering method
CN107563450A (en) * 2017-09-14 2018-01-09 深圳大学 The acquisition methods and device of clustering cluster
CN109191770A (en) * 2018-10-12 2019-01-11 上海昶漾测控技术有限公司 Intelligent vehicle-carried monitoring method and its Transmission system
CN110542898A (en) * 2019-06-18 2019-12-06 同济大学 Radar group-based vehicle behavior continuous tracking detection system and method

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104657424A (en) * 2015-01-21 2015-05-27 段炼 Clustering method for interest point tracks under multiple temporal and spatial characteristic fusion
CN106383868A (en) * 2016-09-05 2017-02-08 电子科技大学 Road network-based spatio-temporal trajectory clustering method
CN107563450A (en) * 2017-09-14 2018-01-09 深圳大学 The acquisition methods and device of clustering cluster
CN109191770A (en) * 2018-10-12 2019-01-11 上海昶漾测控技术有限公司 Intelligent vehicle-carried monitoring method and its Transmission system
CN110542898A (en) * 2019-06-18 2019-12-06 同济大学 Radar group-based vehicle behavior continuous tracking detection system and method

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
张立宁: "改进的密度峰值聚类算法研究", 《中国优秀硕士学位论文全文数据库(信息科技辑)》 *

Similar Documents

Publication Publication Date Title
JP6080984B2 (en) Utilize one interconnect protocol enumeration and / or configuration mechanism for different interconnect protocols
KR101565357B1 (en) Systems, methods, and apparatuses for handling timeouts
US6480972B1 (en) Data processing system and method for permitting a server to remotely perform diagnostics on a malfunctioning client computer system
US11775470B2 (en) Transaction layer packet format
US9953001B2 (en) Method, apparatus, and system for plugin mechanism of computer extension bus
US6262719B1 (en) Mouse emulation with a passive pen
US6683605B1 (en) Screen saver disabler
US6209034B1 (en) Remote keyboard macros activated by hot icons
CN112597089A (en) PHY recalibration using a message bus interface
US20190050366A1 (en) Device, event and message parameter association in a multi-drop bus
CN109074341B (en) Interface for reducing pin count
WO2018093519A1 (en) Apparatuses and methods to spawn multiple virtual serial bus hub instances on a same physical serial bus hub
US20160274923A1 (en) An apparatus, method, and system for a fast configuration mechanism
CN105027444B (en) Integrated clock differential buffer
EP3844628B1 (en) Slave-to-slave direct communication
WO2018125504A1 (en) Apparatuses for periodic universal serial bus (usb) transaction scheduling at fractional bus intervals
US11188492B2 (en) Enhanced serial peripheral interface (eSPI) port expander
JPWO2004077306A1 (en) SDIO controller
CN111737380A (en) Traffic illegal behavior detection method based on embedded terminal
US20220113967A1 (en) Accelerator fabric for discrete graphics
CN111898625A (en) Double-camera space-time fusion method based on embedded terminal
CN101718981B (en) Sampler for data of network of distributed control system
US20230089863A1 (en) Executable passing using mailbox registers
US20220121594A1 (en) Soc architecture to reduce memory bandwidth bottlenecks and facilitate power management
Yang et al. Research and implement of Ethernet interface based on embedded system

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20201002

RJ01 Rejection of invention patent application after publication