IoT based biometrics implementation on Raspberry Pi

D Shah - Procedia Computer Science, 2016 - Elsevier
Developments in the field of Information Technology also make Information Security a
devoted part of it. In order to deal with security, Authentication plays an imperative role. In …

Design and implementation of a multiband digital filter using FPGA to extract the ECG signal in the presence of different interference signals

K Aboutabikh, N Aboukerdah - Computers in biology and medicine, 2015 - Elsevier
In this paper, we propose a practical way to synthesize and filter an ECG signal in the
presence of four types of interference signals:(1) those arising from power networks with a …

[PDF][PDF] Design of pseudo random number generator using linear feedback shift register

S Hassan, MU Bokhari - Int J Eng Adv Technol, 2019 - academia.edu
Nowadays security has become a great concern in the field of computer science and
information technology. In order to protect data from unintended users and to achieve a …

Hardware software co-simulation of obfuscated 128-bit AES algorithm for image processing applications

S Chhabra, K Lata - 2018 IEEE International Symposium on …, 2018 - ieeexplore.ieee.org
With the rapid advancement of communication technology, secure data transfer has become
the primary concern for every communication system. Advanced Encryption Standard (AES) …

Towards the enhancement of AES IP security using hardware obfuscation technique: A practical approach for secure data transmission in IoT

S Chhabra, K Lata - Security and Privacy, 2022 - Wiley Online Library
The global market of developing Internet of Things (IoT) devices increases rapidly with
improved design goals like cost, energy efficiency, and performance. Unfortunately, the …

Design and analysis of logic encryption based 128-bit aes algorithm: A case study

S Chhabra, K Lata - 2018 15th IEEE India Council International …, 2018 - ieeexplore.ieee.org
In today's world, globalization of semiconductor industry leads to piracy and overbuilding of
integrated circuits (ICs) and making it accessible for untrustworthy elements to insert …

[PDF][PDF] Design of a probabilistic based software tool for evaluating controllability, observability and testability models of digital systems

A Ahmad, MAK Rizvi, A Al-Lawati, D Al-Abri… - Indian Journal of …, 2014 - Citeseer
This paper presents a probabilistic based software tool for estimation of digital systems'
testability. The tool allows fast computation to estimate testability in linear time complexity …

[PDF][PDF] Design of 8 bit 16 bit and 32 bit LFSR for PN Sequence Generation using VHDL

S Goankar - Int. J. of Technical Research and Applications, 2015 - scholar.archive.org
LFSR (Linear Feedback Shift Register) is commonly employed in various cryptography
applications to generate pseudo-random numbers. The overall number of random state …

Reliable and fault tolerant systems on chip through design for testability

A Ahmad - 2019 Amity International Conference on Artificial …, 2019 - ieeexplore.ieee.org
Today's fast growing electrical and electronics industry manufacture products that are used
everywhere ranging from aerospace products, medical equipment, household appliances …

Challenges for test and fault-tolerance due to convergence of electronics, semiconductor systems and computing

A Ahmad - … on Infocom Technologies and Unmanned Systems …, 2017 - ieeexplore.ieee.org
Convergence of electronics, semiconductor systems and computing are rapidly transforming
society at much faster pace than incorporation fault-tolerance and test methodologies in the …