The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Security protection is a concern for the Internet of Things (IoT) which performs data exchange autonomously over the internet for remote monitoring, automation and other applications. IoT implementations has raised concerns over its security and various research has been conducted to find an effective solution for this. Thus, this work focus on the analysis of an asymmetric encryption scheme, AA-Beta...
Lightweight cryptography offers energy-efficient cryptographic capabilities on low powered devices such as those commonly found in the Internet of Things (IoT). One such lightweight scheme is the AA-Beta (AAß) asymmetric cryptographic scheme which is based on the Diophantine Equation Hard Problem (DEHP) and whose algorithm consists of only basic arithmetic operations of addition and subtraction for...
Internet of Things (IoT) is an interconnection of physical objects to the Internet which enables data exchange. When things are connected to the internet it becomes an open path for adversaries to unlawfully gain data over the internet leading to unaccountable security issues pertaining to data integrity and privacy. The need to secure the data gathered from sensors is important as this eventually...
Sensor nodes commonly rely on wireless transmission media such as radio frequency (RF) and typically run on top of CoAP and TFTP protocols which do not provide any security mechanisms. One method of securing sensor node communication over RF is to implement a lightweight encryption scheme. In this paper, a RF Simulator developed in our previous publication which simulates lightweight security protocols...
Advances in embedded RF devices and sensor nodes have witnessed major expansion of end user services such as Internet of Things (IoT) and Cloud Computing. These prospective smart embedded and sensor devices normally interconnect to the internet using wireless technology (e.g. radio frequency, Wi-Fi) and run on top of CoAP and TFTP protocols. In this paper, we present a RF Simulator v1.1 which simulates...
Trivial File Transfer Protocol (TFTP) is a client server protocol for transferring files between networked devices. A TFTP client can upload or download files to or from a remote server using the UDP transport protocol. Although it is simple to implement and is largely used in network booting, the TFTP provides no security features and it lacks most of the features of regular File Transfer Protocol...
Computer cluster is a collection of multiple computers connected together so that it can be viewed and perform as a single computer using an interconnected device. Graphical Processing Unit is a specialized hardware used to accelerate the creation of an image by manipulating and altering the memory to help CPU to produce an image. Previously, only CPU is used to perform the task execution in a cluster,...
Data compression technique such as Huffman coding, arithmetic coding, Lempel-Ziv-Welch (LZW) method and others has been playing a vital role in the area of data transmission for reducing time usage during retrieving and transmitting data. However, this technique does not prevent data which contain secret information from being tampered or hacked by malicious attacks even in limited area network environment...
An automated image processing system has the potential to aid ophthalmologist in diagnosing eye diabetic retinopathy (DR) diseases better, by detecting changes in retina features. This paper introduces the development of detection and classification system that provides DR stage classification based on exudates quantification in digital fundus images. The system can help ophthalmologist to perform...
“Internet of Things” (IOT) has become the everyday buzz words in recent years. As part and parcel of the Smart environment where human beings and things interact intelligently, trust and mobility becomes the basic prerequisites. However, to unify trust and mobility, a security protocol must be used for information exchanges among human and things; as well as between things and things (such as between...
This paper presents a database system of the rubber tree leaf diseases which compiled into a Personal Home Page (PHP) script and using Structured Query Language (MySQL). In this work, there are three selected diseases that can be identified using this database system which are Corynespora Leaf Spot, Bird's Eye Spot and Collectrotichum Leaf Disease. Initially, the information of Region of Interest...
This paper presents an application of the Radial Basis Function Neural Network (RBFNN)-based identification of an essential oil extraction using Non-Linear Autoregressive Model with Exogenous Inputs (NARX) model. The dataset consisted of a Pseudo-Random Binary Sequence (PRBS) inputs as the control signal, and outputs depicting temperatures inside the distillation column. One Step Ahead (OSA) model...
This paper describes sum of absolute differences (SAD) algorithm to calculate optical flow function. This algorithm is used for optical flow estimation between two frames of colored photo image. The algorithm is combined with parallel processing, modern general purpose Compute Unified Device Architecture (CUDA) Graphic Processing Unit (GPU) to reduce significantly the time consumption of computation...
Ease of use, cost-effective, faster and effective method to transfer information was the elements that exist in most of mobile phone nowadays. These elements might attain the need to gather information easily and affordably for the mobile phone application on health service. This paper intends to describe the implementation of the MIDlet application on probability of Alzheimer's disease on mobile...
This paper reports on the study of interference effects from 2 types of Ultra Wide Band (UWB) radar signals on an OFDM transmission system by simulation. The UWB signals were: Gaussian monocycle pulse and UWB chirp signal. Average bit error rate (BER) degradation of the victim system was evaluated under in-band interference from the UWB signals in AWGN channel. Simulation results indicated that Gaussian...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.