Results (185)
Search Parameters:
Keyword: MetricA Secure Automated Elevator Management System and Pressure Sensor based Floor Estimation for Indoor Mobile Robot Transportation
In this paper, a secure elevator handling system is presented to enable a flexible movement of wheeled mobile robots among laboratories distributed in different floors. The automated handling system consists mainly of an ADAM module which has the ability to call the elevator to the robot’s current floor and to request the destination floor. The…
Read MoreA Secure Communication Framework for ECUs
Electronic Control Units (ECUs) generate diagnostic and telemetric data that is communicated over the internal vehicular network. ECUs are resource constraint devices and have limited resources to devote for data security. In recent times, threats against vehicular networks have emerged that require attention of the research community. In this paper, we demonstrate data security threats…
Read MoreStructural Optimization of Wavy FinFET for Leakage Reduction and Performance Enhancement
Wavy FinFET is a hybrid device that integrates FinFET and Ultrathin Body FET technologies on SOI platform to provide high density and drivability without causing area penalty. The problem associated with this device is higher leakage and lower threshold voltage. This problem can be solved by structural modification of the device. This work analyses the…
Read MoreThree-Pass Protocol Implementation in Vigenere Cipher Classic Cryptography Algorithm with Keystream Generator Modification
Vigenere Cipher is one of the classic cryptographic algorithms and included into symmetric key cryptography algorithm, where to encryption and decryption process use the same key. Vigenere Cipher has the disadvantage that if key length is not equal to the length of the plaintext, then the key will be repeated until equal to the plaintext…
Read MoreAn Encryption Key for Secure Authentication: The Dynamic Solution
In modern day technology, the Information Society is at risk. Passwords are a multi-user computer systems usual first line of defence against intrusion. A password may be textual with any combination of alphanumeric characters or biometric or 3-D. But no authentication protocol is fully secured against todays hackers as all of them are Static in…
Read MoreTravelling Wave Solutions of Coupled Burger’s Equations of Time-Space Fractional Order by Novel (Gʹ/G)-Expansion Method
In this paper, Novel (Gʹ/G)-expansion method is used to find new generalized exact travelling wave solutions of fractional order coupled Burger’s equations in terms of trigonometric functions, rational functions and hyperbolic functions with arbitrary parameters. For the conversion of the partial differential equation to the ordinary differential equation, complex transformation method is used. Novel (Gʹ/G)-expansion…
Read MoreApplications of Case Based Organizational Memory Supported by the PAbMM Architecture
In the aim to manage and retrieve the organizational knowledge, in the last years numerous proposals of models and tools for knowledge management and knowledge representation have arisen. However, most of them store knowledge in a non-structured or semi-structured way, hindering the semantic and automatic processing of this knowledge. In this paper we present a…
Read MoreEfficient Resource Management for Uplink Scheduling in IEEE 802.16e Standard
The IEEE 802.16e standard, known as mobile Worldwide Interoperability for Microwave Access (WiMAX) becomes the most demanding broadband wireless access (BWA) technology recently. Its main advantage is rapid delivery of services in remote areas due to the cost efficiency factor. The base station (BS) supports data rate up to 70 Mbps, mobile stations with 5–15…
Read MorePower-Energy Simulation for Multi-Core Processors in Bench-marking
At Microarchitectural level, multi-core processor, as a complex System on Chip, has sophisticated on-chip components including cores, shared caches, interconnects and system controllers such as memory and ethernet controllers. At technological level, architects should consider the device types forecast in the International Technology Roadmap for Semiconductors (ITRS). Energy simulation enables architects to study two important…
Read MoreFrame Filtering and Skipping for Point Cloud Data Video Transmission
Sensors for collecting 3D spatial data from the real world are becoming more important. They are a prime research area topic and have applications in consumer markets, such as medical, entertainment, and robotics. However, a primary concern with collecting this data is the vast amount of information being generated, and thus, needing to be processed…
Read More
