Bandwidth part (BWP) and discontinuous reception (DRX) are critical designs to help devices save power. Unlike DRX, a time-domain power-saving mechanism, the BWP is a frequency-domain mechanism newly proposed in the 3...
详细信息
A Robust Automatic Speech Recognition (ASR) system is proposed through a hybrid combination of Perceptual Wavelet Packet features, Deep Neural Network-Hidden Markov Model (DNN-HMM) acoustic models, and n-gram language...
详细信息
Solar radiation plays a critical role in the carbon sequestration processes of terrestrial ecosystems, making it a key factor in environmental sustainability among various renewable energy sources. This study integrat...
详细信息
Reconfigurable computing fabrics include FPGAs and CGRAs. FPGAs offer flexible bit-level reconfigurability and can map almost any program via high-level synthesis (HLS) compilers, but they incur high area and speed ov...
详细信息
The expanding and ubiquitous availability of the Internet of Things(IoT)have changed everyone’s life easier and more *** time it also offers a number of issues,such as effectiveness,security,and excessive power consu...
详细信息
The expanding and ubiquitous availability of the Internet of Things(IoT)have changed everyone’s life easier and more *** time it also offers a number of issues,such as effectiveness,security,and excessive power consumption,which constitute a danger to intelligent IoT-based *** managing is primarily used for transmitting and multi-pathing communications that are secured with a general group key and it can only be decrypted by an authorized group member.A centralized trustworthy system,which is in charge of key distribution and upgrades,is used to maintain group *** provide longitudinal access controls,Software Defined Network(SDN)based security controllers are employed for group administration *** service providers provide a variety of security *** are just a few software security answers *** the proposed system,a hybrid protocols were used in SDN and it embeds edge system to improve the security in the group ***-based algorithms compared with Group Key Establishment(GKE)and Multivariate public key cryptosystem with Broadcast Encryption in the proposed *** all factors are considered,Broadcast Encryption(BE)appears to become the most logical solution to the *** enables an initiator to send encrypted messages to a large set of recipients in a efficient and productive way,meanwhile assuring that the data can only be decrypted by defining *** proposed method improves the security,efficiency of the system and reduces the power consumption and minimizes the cost.
In this paper, the harnessing QCA for High-Performance, Low-Power Arithmetic Circuits w.r.t. the focusing on Multipliers and Square Circuits is presented. The background in relation to this work is presented next. Qua...
详细信息
Recently, several Delta-Sigma modulators (DSMs) with ultra-high quadrature-amplitude-modulation (QAM) order larger than one million, e.g., 1048576 and 4194304 QAM are reported. As different DSM works were implemented ...
详细信息
Double data rate (DDR) memory interface is used in an increasing number of electronic products to increase the efficiency of memory access. Factors such as signal propagation delay, reflection, and crosstalk need to b...
详细信息
Background: The concept of pill reminders has been discussed and developed throughout the decade. It varies from cascaded plastic pill boxes to complicated robust dispensers. This proposed smart pill reminding system ...
详细信息
Background: The concept of pill reminders has been discussed and developed throughout the decade. It varies from cascaded plastic pill boxes to complicated robust dispensers. This proposed smart pill reminding system based on IoT is being designed by considering ease-to-use and cost-effectiveness. Method: A smart pill reminding system is a system that will alert the patient to take their respective pill at the desired time. It will also track the motion of the patient’s hand while taking the pill and will also display the pill count on an LCD Screen. In case a patient forgets/ignores the reminder provided by the system, the system will automatically display the status on the application that will be installed in the relative/caretaker’s phone and through an email on the patient's relative/caretaker’s email address to take subsequent action. The system will monitor the real-time using an RTC module, and as and when the current time matches the medicines time, it will activate its mechanism, and the patient will have a buffer time to take their medicine. In case a patient does take the medicine in the buffer time provided by the system, then one mechanism of the system will be activated. In another case, if a patient does not take the medicine in the stipulated time, further actions will be initiated by the system to benefit the patient. Results: It was tested and found that out of ten times, the system worked accurately nine times, with calculated accuracy as high as 90%. Initially, the Blynk application will display "Welcome Patient" and "You will be updated". Once the RTC matches the scheduled time to take medicine, the buzzer starts buzzing. If the IR sensor detects the movement of the user’s hand, the LCD will update the pill count, and the pill count is reduced by one. The LCD will also display the message "Medicine Taken". If the IR sensor does not detect the movement of the user’s hand, the LCD will display the same pill count. The LCD will also display the me
In recent years, Internet of Things (IoT) technology is employed in diverse areas especially in healthcare, where sensors and IoT assisted medical devices transfer data without any human intervention towards the healt...
详细信息
In recent years, Internet of Things (IoT) technology is employed in diverse areas especially in healthcare, where sensors and IoT assisted medical devices transfer data without any human intervention towards the healthcare experts to provide the proper treatments if required. Internet of Things (IoT) refers to connecting various devices through the internet. IoT allows people to distantly control and management of things people use through internet infrastructure. In healthcare applications, many tiny devices are utilized for healthcare data collection and transmission. After the advent of IoT in homes, health care, companies, private corporations, privacy and security of data are major concern. This issue poses a challenge to the proliferation of IoT as reports of hackers stealing user’s information have intensified. Therefore, there is a necessity for efficient and reliable data aggregation while preserving the data integrity and privacy of the patients. To overcome this problem a new methodology Water Wheel Archimedes Optimization Algorithm + Resilient consensus algorithm_ Bidirectional Long Short Term Memory (WWAOA + Resilient consensus_BiLSTM) is proposed to detect malicious node and packet in IoT. In beginning, Internet of Things (IoT) simulation is executed and after that, Cluster head (CH) selection is done using Waterwheel Archimedes Optimization Algorithm (WWAOA) that is the amalgamation of Waterwheel Plant Algorithm (WWPA) and Archimedes Optimization Algorithm (AOA) by considering fitness parameters including distance, energy, link quality, various trust factors and delay. Thereafter, secure routing is done utilizing same method WWAOA with same fitness functions. At last, data aggregation is carried out employing Bidirectional Long Short Term Memory (BiLSTM), where resilient consensus algorithm is used with adaptive weightage based on malicious nodes and packet profile. Before beginning the data aggregation process, the trust level of nodes will be checke
暂无评论