Search Results - "Nigussie, Ethiopia"

Refine Results
  1. 1

    Autonomous Corrosion Assessment of Reinforced Concrete Structures: Feasibility Study by Taffese, Woubishet Zewdu, Nigussie, Ethiopia

    Published in Sensors (Basel, Switzerland) (29-11-2020)
    “…In this work, technological feasibility of autonomous corrosion assessment of reinforced concrete structures is studied. Corrosion of reinforcement bars…”
    Get full text
    Journal Article
  2. 2

    Self-Aware Cybersecurity Architecture for Autonomous Vehicles: Security through System-Level Accountability by Adu-Kyere, Akwasi, Nigussie, Ethiopia, Isoaho, Jouni

    Published in Sensors (Basel, Switzerland) (30-10-2023)
    “…The inherent dynamism of recent technological advancements in intelligent vehicles has seen multitudes of noteworthy security concerns regarding interactions…”
    Get full text
    Journal Article
  3. 3

    Quantum Key Distribution: Modeling and Simulation through BB84 Protocol Using Python3 by Adu-Kyere, Akwasi, Nigussie, Ethiopia, Isoaho, Jouni

    Published in Sensors (Basel, Switzerland) (21-08-2022)
    “…Autonomous “Things” is becoming the future trend as the role, and responsibility of IoT keep diversifying. Its applicability and deployment need to re-stand…”
    Get full text
    Journal Article
  4. 4

    Low-Latency Approach for Secure ECG Feature Based Cryptographic Key Generation by Rahimi Moosavi, Sanaz, Nigussie, Ethiopia, Levorato, Marco, Virtanen, Seppo, Isoaho, Jouni

    Published in IEEE access (01-01-2018)
    “…We propose a low-latency approach for generating secure electrocardiogram (ECG) feature-based cryptographic keys. This is done by taking advantage of the…”
    Get full text
    Journal Article
  5. 5
  6. 6
  7. 7

    End-to-end security scheme for mobility enabled healthcare Internet of Things by Moosavi, Sanaz Rahimi, Gia, Tuan Nguyen, Nigussie, Ethiopia, Rahmani, Amir M., Virtanen, Seppo, Tenhunen, Hannu, Isoaho, Jouni

    Published in Future generation computer systems (01-11-2016)
    “…We propose an end-to-end security scheme for mobility enabled healthcare Internet of Things (IoT). The proposed scheme consists of (i) a secure and efficient…”
    Get full text
    Journal Article
  8. 8

    Current Mode On-Chip Interconnect using Level-Encoded Two-Phase Dual-Rail Encoding by Nigussie, Ethiopia, Plosila, Juha, Isoaho, Jouni

    “…we present delay variations insensitive long on-chip interconnect implementation based on current mode signaling and Level-Encoded two-phase Dual-Rail (LEDR)…”
    Get full text
    Conference Proceeding
  9. 9

    CoDRA: Context-based dynamically reconfigurable access control system for android by Kumar Thanigaivelan, Nanda, Nigussie, Ethiopia, Hakkala, Antti, Virtanen, Seppo, Isoaho, Jouni

    “…We present, CoDRA, an access control system for Android that offers context-based dynamically configurable restrictions, fine-granular policy and ability to…”
    Get full text
    Journal Article
  10. 10

    Hybrid Internal Anomaly Detection System for IoT: Reactive Nodes with Cross-Layer Operation by Isoaho, Jouni, Virtanen, Seppo, Nigussie, Ethiopia, Thanigaivelan, Nanda Kumar

    Published in Security and communication networks (01-01-2018)
    “…We present a hybrid internal anomaly detection system that shares detection tasks between router and nodes. It allows nodes to react instinctively against the…”
    Get full text
    Journal Article
  11. 11

    Modeling of Energy Dissipation in RLC Current-Mode Signaling by Tuuna, S., Nigussie, E., Isoaho, J., Tenhunen, H.

    “…In this paper, energy dissipation in resistance-inductance-capacitance (RLC) current-mode signaling is modeled. The energy dissipation is derived separately…”
    Get full text
    Journal Article
  12. 12

    Internet of Concrete for Optimal Curing by Taffese, Woubishet Zewdu, Nigussie, Ethiopia

    “…Improper curing is one of the causes that has reduced the lifespan of several concrete structures and necessitated extensive costly repairs. The manual water…”
    Get full text
    Conference Proceeding
  13. 13

    Interconnection alternatives for hierarchical monitoring communication in parallel SoCs by Guang, Liang, Nigussie, Ethiopia, Isoaho, Jouni, Rantala, Pekka, Tenhunen, Hannu

    Published in Microprocessors and microsystems (01-08-2010)
    “…Interconnection architectures for hierarchical monitoring communication in parallel System-on-Chip (SoC) platforms are explored. Hierarchical agent monitoring…”
    Get full text
    Journal Article
  14. 14

    Semi-Serial On-Chip Link Implementation for Energy Efficiency and High Throughput by Nigussie, E., Tuuna, S., Plosila, J., Isoaho, J., Tenhunen, H.

    “…A high-throughput and low-energy semi-serial on-chip communication link based on novel design techniques and circuit solutions is presented. This self-timed…”
    Get full text
    Journal Article
  15. 15

    Partial Virtual Channel Sharing: A Generic Methodology to Enhance Resource Management and Fault Tolerance in Networks-on-Chip by Latif, Khalid, Rahmani, Amir-Mohammad, Nigussie, Ethiopia, Seceleanu, Tiberiu, Radetzki, Martin, Tenhunen, Hannu

    Published in Journal of electronic testing (01-06-2013)
    “…We present a novel Partial Virtual channel Sharing (PVS) NoC architecture which reduces the impact of faults on performance and also tolerates faults within…”
    Get full text
    Journal Article
  16. 16

    GNSS-Independent Navigation of UAV through Utilization of Sensor Fusion and Intelligence System by Meheretu, Simegnew Eshetu, Hailesilassie, Serkalem Yikeber, Nigussie, Ethiopia

    “…Unmanned Aerial Vehicles (UAVs) have gained a lot of attention due to their applications in various sectors. Most of fully autonomous UAVs navigation system is…”
    Get full text
    Conference Proceeding
  17. 17

    Distributed internal anomaly detection system for Internet-of-Things by Thanigaivelan, Nanda Kumar, Nigussie, Ethiopia, Kanth, Rajeev Kumar, Virtanen, Seppo, Isoaho, Jouni

    “…We present overview of a distributed internal anomaly detection system for Internet-of-things. In the detection system, each node monitors its neighbors and if…”
    Get full text
    Conference Proceeding Journal Article
  18. 18

    Key Management through Delegation for LoRaWAN based Healthcare Monitoring Systems by Donmez, Tahsin C. M., Nigussie, Ethiopia

    “…We present a key management scheme, Assisted Mode, for improving security of LoRaWAN. LoRaWAN stores lifetime root keys in end-devices which are susceptible to…”
    Get full text
    Conference Proceeding
  19. 19

    Cryptographic key generation using ECG signal by Moosavi, Sanaz Rahimi, Nigussie, Ethiopia, Virtanen, Seppo, Isoaho, Jouni

    “…In this paper, two different electrocardiogram (ECG) based cryptographic key generation approaches are proposed. The aim is to enhance the security of body…”
    Get full text
    Conference Proceeding
  20. 20

    Equalizing Energy Distribution in Sensor Nodes through Optimization of RPL by Nurmio, Juuso, Nigussie, Ethiopia, Poellabauer, Christian

    “…We present a nodes' remaining energy-aware objective function in order to equalize the energy distribution among the nodes with the ultimate goal of extending…”
    Get full text
    Conference Proceeding