Field programmable gate array applications—A scientometric review

J Ruiz-Rosero, G Ramirez-Gonzalez, R Khanna - Computation, 2019 - mdpi.com
Field Programmable Gate Array (FPGA) is a general purpose programmable logic device
that can be configured by a customer after manufacturing to perform from a simple logic gate …

Context-aware architecture for probabilistic voting-based filtering scheme in sensor networks

SM Nam, TH Cho - IEEE Transactions on Mobile Computing, 2016 - ieeexplore.ieee.org
Wireless sensor networks are widely deployed and implicitly characterized by stringent
energy and computation constraints. Sensor nodes are vulnerable to false positive and false …

A Comprehensive Analysis: Evaluating Security Characteristics of Xbee Devices against Zigbee Protocol

V Gavra, OA Pop, I Dobra - Sensors, 2023 - mdpi.com
In recent times, the security of sensor networks, especially in the field of IoT, has become a
priority. This article focuses on the security features of the Zigbee protocol in Xbee devices …

Discrete event simulation–based energy efficient path determination scheme for probabilistic voting–based filtering scheme in sensor networks

SM Nam, TH Cho - International Journal of Distributed …, 2020 - journals.sagepub.com
In wireless sensor networks, sensors are extremely vulnerable to false positive and false
negative attacks due to their stringent energy and computational constraints. Several en …

[HTML][HTML] A hardware accelerator for IEEE 802.15. 4 Time-Slotted Channel Hopping transceiver

HR Kalatehbali, M Nabi, SB Ko - Microelectronics Journal, 2022 - Elsevier
Abstract Time-Slotted Channel Hopping (TSCH), an operational mode of the IEEE 802.15.
4e standard, imposes a high workload on the embedded processor, mainly due to its precise …

On the choice of the appropriate AES data encryption method for ZigBee nodes

G Ottoy, T Hamelinckx, B Preneel… - Security and …, 2016 - Wiley Online Library
This paper describes the experiments that have been conducted to determine the optimal
implementation method for AES (Advanced Encryption Standard) data encryption in a …

Modeling acoustic localization accuracy for scalable energy consumption in wireless sensor swarms

J Chakraborty, G Ottoy, JP Goemaere… - … and Location Based …, 2014 - ieeexplore.ieee.org
Sensor swarms can be a cost-effectieve and more privacy-friendly alternative for location
based service systems in building automation and health-care. To increase the battery …

[PDF][PDF] Global and local feature-based transformations for fingerprint data protection

T Ahmad - disertasi Ph. D, RMIT University, Melbourne, Australia, 2012 - core.ac.uk
Global and Local Feature-based Transformations for Fingerprint Data Protection Page 1 Global
and Local Feature-based Transformations for Fingerprint Data Protection A thesis submitted in …

AMethod OF IMPROVING ENERGY EFFICIENCY THROUGH GEOFENCING AND FALSE DATA BLOCKING IN CONTEXT-AWARE ARCHITECTURE FOR …

SM Nam, YK Seo - papers.ssrn.com
In wireless sensor networks, sensor nodes have the disadvantage of being vulnerable to
several attacks due to the use of wireless communication and constrained energy …

[PDF][PDF] Master Thesis on the Academic Master of Information and Communication Electronic System

V Rykov, ACC Herraez - academia.edu
This document contains a final master thesis project in which a complete Internet of Things
(IoT) infrastructure is proposed and developed. The infrastructure consists of a lightweight …