Inertial Sensors in the Stabilization System of the Balancing Vehicle [PDF]
The article presents the possibilities of using popular MEMS inertial sensors in the object tilt angle estimation system and in the system for stabilizing the vertical position of the balancing robot.
Stanisław Chudzik
doaj +1 more source
TASKers: A Whole-System Generator for Benchmarking Real-Time-System Analyses [PDF]
Implementation-based benchmarking of timing and schedulability analyses requires system code that can be executed on real hardware and has defined properties, for example, known worst-case execution times (WCETs) of tasks.
Distler, Tobias +2 more
core +1 more source
Polynomial Multiplication in NTRU Prime
This paper proposes two different methods to perform NTT-based polynomial multiplication in polynomial rings that do not naturally support such a multiplication. We demonstrate these methods on the NTRU Prime key-encapsulation mechanism (KEM) proposed by
Erdem Alkim +10 more
doaj +3 more sources
A PUF-and biometric-based lightweight hardware solution to increase security at sensor nodes [PDF]
Security is essential in sensor nodes which acquire and transmit sensitive data. However, the constraints of processing, memory and power consumption are very high in these nodes. Cryptographic algorithms based on symmetric key are very suitable for them.
Arcenegui, Javier +3 more
core +1 more source
Optimization Based Self-localization for IoT Wireless Sensor Networks [PDF]
In this paper we propose an embedded optimization framework for the simultaneous self-localization of all sensors in wireless sensor networks making use of range measurements from ultra-wideband (UWB) signals.
Beuchat, Paul +3 more
core +1 more source
Characterising and Comparing the Energy Consumption of Side Channel Attack Countermeasures and Lightweight Cryptography on Embedded Devices [PDF]
This paper uses an Instruction Set Architecture(ISA) based statistical energy model of an ARM Cortex-M4microprocessor to evaluate the energy consumption of an implementation of AES with different side channel attack (SCA) countermeasures and an ...
Eder, Kerstin I +2 more
core +2 more sources
Formal Analysis of FreeRTOS Scheduler on ARM Cortex-M4 Cores
Chen-Kai Lin, Bow-Yaw Wang
semanticscholar +2 more sources
A wearable fetal movement detection system for pregnant women
A wearable device-based fetal movement detection system for pregnant women is proposed to resolve the problems of low accuracy of fetal movement detection by fetal heart monitor, difficulties of fetal movement monitoring by pregnant women in person, and ...
Manping Qin +4 more
doaj +1 more source
Analysis and Comparison of Table-based Arithmetic to Boolean Masking
Masking is a popular technique to protect cryptographic implementations against side-channel attacks and comes in several variants including Boolean and arithmetic masking.
Michiel Van Beirendonck +2 more
doaj +1 more source
Performance Evaluation of Neural Networks for Animal Behaviors Classification: Horse Gaits Case Study [PDF]
The study and monitoring of wildlife has always been a subject of great interest. Studying the behavior of wildlife animals is a very complex task due to the difficulties to track them and classify their behaviors through the collected sensory ...
Cerezuela Escudero, Elena +6 more
core +1 more source

