Results 21 to 30 of about 10,420 (190)

Optimization Based Self-localization for IoT Wireless Sensor Networks [PDF]

open access: yes, 2018
In this paper we propose an embedded optimization framework for the simultaneous self-localization of all sensors in wireless sensor networks making use of range measurements from ultra-wideband (UWB) signals.
Beuchat, Paul   +3 more
core   +1 more source

Fixslicing AES-like Ciphers

open access: yesTransactions on Cryptographic Hardware and Embedded Systems, 2020
The fixslicing implementation strategy was originally introduced as a new representation for the hardware-oriented GIFT block cipher to achieve very efficient software constant-time implementations.
Alexandre Adomnicai, Thomas Peyrin
doaj   +3 more sources

Verified NTT Multiplications for NISTPQC KEM Lattice Finalists: Kyber, SABER, and NTRU

open access: yesTransactions on Cryptographic Hardware and Embedded Systems, 2022
Postquantum cryptography requires a different set of arithmetic routines from traditional public-key cryptography such as elliptic curves. In particular, in each of the lattice-based NISTPQC Key Establishment finalists, every state-ofthe-art optimized ...
Vincent Hwang   +6 more
doaj   +3 more sources

Efficient Implementations of Four-Dimensional GLV-GLS Scalar Multiplication on 8-Bit, 16-Bit, and 32-Bit Microcontrollers

open access: yesApplied Sciences, 2018
In this paper, we present the first constant-time implementations of four-dimensional Gallant–Lambert–Vanstone and Galbraith–Lin–Scott (GLV-GLS) scalar multiplication using curve Ted 127 - glv 4 on 8-bit AVR, 16-bit ...
Jihoon Kwon   +2 more
doaj   +1 more source

Arm cortex M4 microprocessors based ± 100 kVAR energy quality regulator for reactive power/neutral current compensation, load balancing and harmonic mitigation

open access: yesEngineering Science and Technology, an International Journal, 2022
In this work, the design and implementation of a three-phase ± 100 kVAR energy quality regulator (EQR) which is capable of providing reactive power/neutral current compensation, load balancing as well as low order current harmonic mitigation is presented.
Ahmet Eren, Ahmet Mete Vural
doaj   +1 more source

Controle Automático de Volume em Tempo Real Utilizando Inferência Fuzzy em um Sistema Embarcado

open access: yesTrends in Computational and Applied Mathematics, 2021
Controle Automático de Volume (CAV) é uma tecnologia que ajusta automaticamente a intensidade sonora de um sinal na presença de ruído. Diferentes técnicas para realizar o CAV foram relatadas na literatura, contudo poucos estudos utilizam algoritmos de ...
A. T. Escottá, W. Beccaro
doaj   +1 more source

A Wireless Cortical Surface Implant for Diagnosing and Alleviating Parkinson's Disease Symptoms in Freely Moving Animals. [PDF]

open access: yesAdv Healthc Mater
A wireless cortical surface implant employing graphene electrode arrays diagnoses and alleviates Parkinson's disease symptoms in freely moving animals. The device continuously monitors cortical activity and delivers targeted stimulation, restoring beta–gamma and delta oscillations.
Shin H   +15 more
europepmc   +2 more sources

Scan matching by cross-correlation and differential evolution [PDF]

open access: yes, 2019
Scan matching is an important task, solved in the context of many high-level problems including pose estimation, indoor localization, simultaneous localization and mapping and others.
Konečný, Jaromír   +3 more
core   +1 more source

TASKers: A Whole-System Generator for Benchmarking Real-Time-System Analyses [PDF]

open access: yes, 2018
Implementation-based benchmarking of timing and schedulability analyses requires system code that can be executed on real hardware and has defined properties, for example, known worst-case execution times (WCETs) of tasks.
Distler, Tobias   +2 more
core   +1 more source

Cubicle: A family of space‐hard ciphers for IoT

open access: yesIET Information Security, 2023
As IoT has increasingly evolved in recent years, it has become more important to ensure security on IoT devices. Many of such devices are under the threat of attacks in the beyond black‐box model.
Rentaro Shiba   +3 more
doaj   +1 more source

Home - About - Disclaimer - Privacy