Results (5)
Search Parameters:
Keyword: CEMAIn Body Antenna for Monitoring and Controlling Pacemaker
This paper is an extension of work originally presented in 2019 International Conference on Automation, Computational and Technology Management (ICACTM). A micro-strip patch in-body designed antenna is constructed on pacemaker to monitor and control the pacemaker wirelessly. The antenna is intended for ISM (Industrial, Scientific, and Medical) band (2.4 GHz to 2.48 GHz). A perfect…
Read MoreMulti-Objective Path Optimization of a Satellite for Multiple Active Space Debris Removal Based on a Method for the Travelling Serviceman Problem
Space debris removal is currently a critical issue for space development. It has been reported that five pieces of debris should be removed each year to avoid further increase in the amount of debris in orbit. One approach for the removal of multiple pieces of debris is to launch multiple satellites that can each remove…
Read MoreExposure to Optical Radiation and Electromagnetic Fields at the Workplace: Criteria for Occupational Health Surveillance According to Current European Legislation
A very large number of workers is occupationally exposed to Optical Radiation (OR) worldwide, while indeed nowadays an exposure to Electromagnetic fields (EMF) can occur in almost all workplaces. OR origin can be natural, including the most relevant source, i.e. the sun, or artificial, that can be further classified in incoherent and coherent, i.e. the…
Read MoreThe impact of Big Data on the Android Mobile Platform for Natural Disaster Situations
This application developing for the project OCEMA comes as result of architecture building in Android, then the development of a professional modeling in Talend Open Studio for Big Data, which enabled the integration of data from many data sources. One of its uses is the quick identification of people found in areas affected by natural…
Read MoreA Highly-Secured Arithmetic Hiding cum Look-Up Table (AHLUT) based S-Box for AES-128 Implementation
Side-Channel Attack (SCA) is an effective method in extracting the secret key of cryptographic algorithms by correlating the physical leakage information with the processed data. In this paper, we propose an arithmetic hiding cum Look-up Table (AHLUT) based Substitution-Box (S-Box) in AES-128 cryptographic algorithm implementation to countermeasure against SCA. There are three key features in…
Read More
