Innovations in Biomedical Engineering: Advancing Healthcare Devices on Recent Technology
Flood Detection and Monitoring using Arduino Based Sensor Technology
Automatic Lower Limb Rehabilitation Device
Heart Rate Variability-Based Detection of Driver Drowsiness and its Validation using EEG
IoT-Enabled Smart Shoes for the Blind
Biosensors for Early Diagnosis and Automated Drug Delivery in Pancreatic Cancer
Verilog Based UART System Design
IoT based Smart Agriculture Monitoring Framework with Automation
Intel ® Processor Architectural and Integrated Development Environment Exploration
An Integrated Model of Digital Fuel Indicator and GPS Tracking System for Vehicles
Designing of an Embedded system for Wireless Sensor Network for Hazardous Gas leakage control for industrial Application
Hardware Implementation of Artificial Neural Networks
Fault Analysis on Grid Connected MPPT BasedPhotovoltaic System
High Efficiency Hybrid Intelligent Street Lighting Using A Zigbee Network And Sensors
Design of Dual-Band Bandpass Filter Using Interdigital Embedded Open Loop Triangular Resonator Loaded with Stubs
License Plate Localization Using Novel Recursive Algorithm And Pixel Count Method
Low-Power Wide Area Networks (LPWAN) have gained considerable importance with the usage and sustainable development of the Internet of Things (IoT). LPWANs have advantages; however, they have many limitations, including limited bandwidth, restricted payload size, and low power devices. Due to these limitations, LPWAN networks confront many challenges, like encrypting the data with the cypher chaining mode or implementing complex algorithms. Here, the cypher chaining mode cannot identify the next message if any packet has been lost because of the device's limited payload size and low memory. So, currently available algorithms cannot be used for LPWAN networks. Key is very important in cryptography; if an attacker compromises a secret key, it leads to a breach of the whole data. The best possible solution to prevent this breach is to frequently change the secret key. Here, we propose a novel algorithm to change the key for every message by synchronizing the sender's IoT device key. This system also proposes a Session Key Identifier Block (SKIB), implementing a session key for every message without any sequence number. The SKIB module identifies the session keys with the hash function and a shared secret key. The proposed work also compared the previous methods with experimental results.
Humans' dependence on electricity is rising with each passing day. The challenge of global warming can be mitigated by using clean energy sources like electricity instead of burning fossil fuels. In order to meet this increased demand, there is a strong need for an effective electricity management system. The use of smart meters for recording electricity consumption data is vital to the idea of a "smart city." Some of the challenges faced in detailing electricity consumption data include saving large amounts of data, deletion, manipulation, and adjustment of data. Blockchain is a promising technology which can address these issues of data integrity and confidentiality using cryptographic algorithms.
Based on a technology that separates power conversion and energy storage, fuel cell energy storage enables each function to be separately tuned for performance, cost, or other key variables. This capacity to tune every component of an energy storage system might provide considerable advantages for many uses. Here, different fuel cell-based energy storage systems are discovered that use hydrogen as the energy storage medium. Electrolyzes are fully regenerative fuel cell systems that are relevant for Polymer Electrolyte Membrane (PEM) fuel cells. The technological and product development status of these systems and the state of various hydrogen storage technology choices will be discussed.
One of the greatest things to have occured recently to the industry is the use of IoT in healthcare. IoT meets new requirements with its own set of advantages, including enabling real-time monitoring, offering more developed and efficient methods to collect patient data, and tracking patients' and staff members' actions. IoT plays a vital role in healthcare. The healthcare sector is now fully digital thanks to the internet of medical things, smart devices, information systems, and cloud services. The Industry 4.0 version of healthcare is named Healthcare Industry 4.0, or Health 4.0 in short. Health 4.0 is based on new technologies to deliver enhanced and value-added healthcare services to the patients. Our lives have become significantly more pleasant as a result of the advancements made in digital healthcare services, which have made treatment more accessible and simple. Now a days the healthcare sector is mostly dependent on IoT and most healthcare sectors are moving towards IoT.
The Internet of Things (IoT) is the interconnection of computing devices embedded in everyday objects, enabling them to send and receive data over the Internet. IoT is an advanced, futuristic, and disruptive technology. IoT describes a network of physical objects or "things" that are embedded with sensors, software, and other technologies to connect and exchange data with other devices and systems over the Internet. It reduces computation costs through improved process efficiency, asset utilization, and productivity for any organization. The growth and convergence of data, processes, and things on the Internet would make such connections more relevant and important, creating more opportunities for people, businesses, and industries. This article only deals with the security of the IoT and some smart applications. Nowadays many of the devices are linked to smart technologies like IoT or AI. The two closest examples of IoT are the watch in our hand and the mobile phone. One of the goals of smart environments is to improve the quality of human life in terms of comfort and efficiency. The IoT paradigm has already evolved into a technology for building smart environments. Security and privacy are considered as key issues in any real-world smart environment aging based on the IoT model. Security vulnerabilities in IoT-based systems create security threats that affect smart environment applications.