engineering outreach and introductory courses are essential for motivating and training the next generation of capable engineers. Accessibility and portability of the infrastructure for a STEM course is critical for s...
详细信息
Electrocardiogram (ECG) signals are the most common tool to evaluate the heart’s function in cardiovascular diagnosis. Irregular heartbeats (arrhythmia) found in the ECG play an essential role in diagnosing cardiovas...
详细信息
The number of Distributed Green Cloud Datacenters (DGCDs) is globally increasing. Such DGCDs deploy different types of renewable sources to generate clean energy and save money. They are located in different regions d...
详细信息
Machine-to-machine (M2M) communication networks consist of resource-constrained autonomous devices, also known as autonomous Internet of things (IoTs) or machine-type communication devices (MTCDs) which act as a backb...
详细信息
Machine-to-machine (M2M) communication networks consist of resource-constrained autonomous devices, also known as autonomous Internet of things (IoTs) or machine-type communication devices (MTCDs) which act as a backbone for Industrial IoT, smart cities, and other autonomous systems. Due to the limited computing and memory capacity, these devices cannot maintain strong security if conventional security methods are applied such as heavy encryption. This article proposed a novel lightweight mutual authentication scheme including elliptic curve cryptography (ECC) driven end-to-end encryption through curve25519 such as (i): efficient end-to-end encrypted communication with pre-calculation strategy using curve25519;and (ii): elliptic curve Diffie-Hellman (ECDH) based mutual authentication technique through a novel lightweight hash function. The proposed scheme attempts to efficiently counter all known perception layer security threats. Moreover, the pre-calculated key generation strategy resulted in cost-effective encryption with 192-bit curve security. It showed comparative efficiency in key strength, and curve strength compared with similar authentication schemes in terms of computational and memory cost, communication performance and encryption robustness.
The global automotive industry is in the phase where Internal Combustion vehicles are in decline and witnessing a shift towards sustainable development. The major parameter of a successful EV is an efficient battery p...
详细信息
This research allows the secure surveillance approach for the Internet of Things (IoT) methodology to be developed by integrating wireless signalling and image encryption strategy. Since the Cloud Service Telco (CST) ...
详细信息
In this paper, SRM, DC-VRM, and VRM with same pole-slot combinations of 8 poles/12 slots and 10 poles/12 slots are designed, the mechanism of generating torque in the energization by the sinusoidal current with and wi...
详细信息
Recently, several Delta-Sigma modulators (DSMs) with ultra-high quadrature-amplitude-modulation (QAM) order larger than one million, e.g., 1048576 and 4194304 QAM are reported. As different DSM works were implemented ...
详细信息
This article presents an initial solution based selective harmonic elimination (SHE) method for multilevel inverter (MLI) that aims to solve SHE problem with high accuracy while significantly reducing the number of it...
详细信息
Emotions are a vital semantic part of human correspondence. Emotions are significant for human correspondence as well as basic for human–computer cooperation. Viable correspondence between people is possibly achieved...
详细信息
暂无评论