Search Results - "Nigussie, Ethiopia"
-
1
Autonomous Corrosion Assessment of Reinforced Concrete Structures: Feasibility Study
Published in Sensors (Basel, Switzerland) (29-11-2020)“…In this work, technological feasibility of autonomous corrosion assessment of reinforced concrete structures is studied. Corrosion of reinforcement bars…”
Get full text
Journal Article -
2
Self-Aware Cybersecurity Architecture for Autonomous Vehicles: Security through System-Level Accountability
Published in Sensors (Basel, Switzerland) (30-10-2023)“…The inherent dynamism of recent technological advancements in intelligent vehicles has seen multitudes of noteworthy security concerns regarding interactions…”
Get full text
Journal Article -
3
Quantum Key Distribution: Modeling and Simulation through BB84 Protocol Using Python3
Published in Sensors (Basel, Switzerland) (21-08-2022)“…Autonomous “Things” is becoming the future trend as the role, and responsibility of IoT keep diversifying. Its applicability and deployment need to re-stand…”
Get full text
Journal Article -
4
Low-Latency Approach for Secure ECG Feature Based Cryptographic Key Generation
Published in IEEE access (01-01-2018)“…We propose a low-latency approach for generating secure electrocardiogram (ECG) feature-based cryptographic keys. This is done by taking advantage of the…”
Get full text
Journal Article -
5
Development and Experimental Validation of High Performance Embedded Intelligence and Fail-Operational Urban Surround Perception Solutions of the PRYSTINE Project
Published in Applied sciences (01-01-2022)“…Automated Driving Systems (ADSs) commend a substantial reduction of human-caused road accidents while simultaneously lowering emissions, mitigating congestion,…”
Get full text
Journal Article -
6
Automated concrete curing and assessment of strength and durability using IoT system
Published in Materials today : proceedings (01-07-2023)Get full text
Journal Article -
7
End-to-end security scheme for mobility enabled healthcare Internet of Things
Published in Future generation computer systems (01-11-2016)“…We propose an end-to-end security scheme for mobility enabled healthcare Internet of Things (IoT). The proposed scheme consists of (i) a secure and efficient…”
Get full text
Journal Article -
8
Current Mode On-Chip Interconnect using Level-Encoded Two-Phase Dual-Rail Encoding
Published in 2007 IEEE International Symposium on Circuits and Systems (ISCAS) (01-05-2007)“…we present delay variations insensitive long on-chip interconnect implementation based on current mode signaling and Level-Encoded two-phase Dual-Rail (LEDR)…”
Get full text
Conference Proceeding -
9
CoDRA: Context-based dynamically reconfigurable access control system for android
Published in Journal of network and computer applications (01-01-2018)“…We present, CoDRA, an access control system for Android that offers context-based dynamically configurable restrictions, fine-granular policy and ability to…”
Get full text
Journal Article -
10
Hybrid Internal Anomaly Detection System for IoT: Reactive Nodes with Cross-Layer Operation
Published in Security and communication networks (01-01-2018)“…We present a hybrid internal anomaly detection system that shares detection tasks between router and nodes. It allows nodes to react instinctively against the…”
Get full text
Journal Article -
11
Modeling of Energy Dissipation in RLC Current-Mode Signaling
Published in IEEE transactions on very large scale integration (VLSI) systems (01-06-2012)“…In this paper, energy dissipation in resistance-inductance-capacitance (RLC) current-mode signaling is modeled. The energy dissipation is derived separately…”
Get full text
Journal Article -
12
Internet of Concrete for Optimal Curing
Published in 2022 International Conference on Information and Communication Technology for Development for Africa (ICT4DA) (28-11-2022)“…Improper curing is one of the causes that has reduced the lifespan of several concrete structures and necessitated extensive costly repairs. The manual water…”
Get full text
Conference Proceeding -
13
Interconnection alternatives for hierarchical monitoring communication in parallel SoCs
Published in Microprocessors and microsystems (01-08-2010)“…Interconnection architectures for hierarchical monitoring communication in parallel System-on-Chip (SoC) platforms are explored. Hierarchical agent monitoring…”
Get full text
Journal Article -
14
Semi-Serial On-Chip Link Implementation for Energy Efficiency and High Throughput
Published in IEEE transactions on very large scale integration (VLSI) systems (01-12-2012)“…A high-throughput and low-energy semi-serial on-chip communication link based on novel design techniques and circuit solutions is presented. This self-timed…”
Get full text
Journal Article -
15
Partial Virtual Channel Sharing: A Generic Methodology to Enhance Resource Management and Fault Tolerance in Networks-on-Chip
Published in Journal of electronic testing (01-06-2013)“…We present a novel Partial Virtual channel Sharing (PVS) NoC architecture which reduces the impact of faults on performance and also tolerates faults within…”
Get full text
Journal Article -
16
GNSS-Independent Navigation of UAV through Utilization of Sensor Fusion and Intelligence System
Published in 2022 International Conference on Information and Communication Technology for Development for Africa (ICT4DA) (28-11-2022)“…Unmanned Aerial Vehicles (UAVs) have gained a lot of attention due to their applications in various sectors. Most of fully autonomous UAVs navigation system is…”
Get full text
Conference Proceeding -
17
Distributed internal anomaly detection system for Internet-of-Things
Published in 2016 13th IEEE Annual Consumer Communications & Networking Conference (CCNC) (01-01-2016)“…We present overview of a distributed internal anomaly detection system for Internet-of-things. In the detection system, each node monitors its neighbors and if…”
Get full text
Conference Proceeding Journal Article -
18
Key Management through Delegation for LoRaWAN based Healthcare Monitoring Systems
Published in 2019 13th International Symposium on Medical Information and Communication Technology (ISMICT) (01-05-2019)“…We present a key management scheme, Assisted Mode, for improving security of LoRaWAN. LoRaWAN stores lifetime root keys in end-devices which are susceptible to…”
Get full text
Conference Proceeding -
19
Cryptographic key generation using ECG signal
Published in 2017 14th IEEE Annual Consumer Communications & Networking Conference (CCNC) (01-01-2017)“…In this paper, two different electrocardiogram (ECG) based cryptographic key generation approaches are proposed. The aim is to enhance the security of body…”
Get full text
Conference Proceeding -
20
Equalizing Energy Distribution in Sensor Nodes through Optimization of RPL
Published in 2015 IEEE International Conference on Computer and Information Technology; Ubiquitous Computing and Communications; Dependable, Autonomic and Secure Computing; Pervasive Intelligence and Computing (01-10-2015)“…We present a nodes' remaining energy-aware objective function in order to equalize the energy distribution among the nodes with the ultimate goal of extending…”
Get full text
Conference Proceeding