Results (6)
Search Parameters:
Keyword: CPAFrom Sensors to Data: Model and Architecture of an IoT Public Network
RetePAIoT of Emilia-Romagna region is an IoT Public Network, financed by Emilia-Romagna Region and developed by Lepida Scpa, where citizens, private companies and Public Administrations can integrate free of charge their own sensors of any type and anywhere in the region. The main objective of the project is to provide a facility to implement the…
Read MoreCurved Pyramidal Metamaterial Absorber: From Theory to an Ultra-Broadband Application in the [0.3 – 30] GHz Frequency Band
For its importance nowadays in a wide range of applications such as the anechoic chamber, we introduce a microwave ultra-broadband polarization-independent metamaterial absorber (MA) in the Ultra High Frequency (UHF)/ Super High Frequency (SHF) frequency bands. Through this work, we improved the Relative Absorptive Bandwidth (RAB) of the conventional pyramidal absorber (CPA) by modifying its…
Read MoreDesign of High Output Impedance, Large Voltage Compliance Output Stage of Implantable Hypoglossal Nerve Stimulator (HGNS) for OSA Treatment
Obstructive Sleep Apnea (OSA) is a potentially common sleep disorder manifested in upper airways’ collapse, either partially or completely. If diagnosed late and untreated, it may result in serious complications. The standard golden method, useful for treating OSA, remains the full night Continuous Positive Airway Pressure (CPAP). Yet, due to the ensuing discomfort it incurs…
Read MoreShort CCA-Secure Attribute-Based Encryption
Chosen-ciphertext attacks (CCA) are typical threat on public-key encryption schemes. We show direct chosen-ciphertext security modification in the case of attribute-based encryption (ABE), where an ABE scheme secure against chosen-plaintext attacks (CPA) is converted into an ABE scheme secure against CCA by individual techniques. Our modification works in the setting that the Diffie-Hellman tuple to…
Read MoreA Highly-Secured Arithmetic Hiding cum Look-Up Table (AHLUT) based S-Box for AES-128 Implementation
Side-Channel Attack (SCA) is an effective method in extracting the secret key of cryptographic algorithms by correlating the physical leakage information with the processed data. In this paper, we propose an arithmetic hiding cum Look-up Table (AHLUT) based Substitution-Box (S-Box) in AES-128 cryptographic algorithm implementation to countermeasure against SCA. There are three key features in…
Read MoreAn Application of ANN Model with Bayesian Regularization Learning Algorithm for Computing the Operating Frequency of C-Shaped Patch Antennas
In this paper, an application of artificial neural network (ANN) using bayesian regularization (BR) learning algorithm based on multilayer perceptron (MLP) model is presented for computing the operating frequency of C-shaped patch antennas (CPAs) in UHF band. Firstly, the operating frequencies of 144 CPAs having varied dimensions and electrical parameters were simulated by the XFDTD…
Read More
