Learn More
Mobility management, integration and interworking of existing wireless systems are important factors to obtain seamless roaming and services continuity in Next Generation Wireless Systems (NGWS).So it is important to have a handoff scheme that takes into account the heterogeneity of the network. In this work we propose a handoff scheme which takes handoff(More)
This paper presents a forecasting model designed using WSNs(Wireless Sensor Networks) to predict flood in rivers using simple and fast calculations to provide real-time results and save the lives of people who may be affected by the flood. Our prediction model uses multiple variable robust linear regression which is easy to understand and simple and cost(More)
This paper introduces an optimal deployment algorithm of sensors in a given region to provide desired coverage and connectivity for a wireless sensor network. Our paper utilizes two separate procedures for covering different regions of a symmetrical rectangular area. The proposed method divides the given area of interest into two distinct sub-regions termed(More)
Wireless sensor networks are highly susceptible to security attacks due to its open and infrastructure less configuration, autonomous operation, limited battery power and computational capability. As a result, secure routing of information by the sensor nodes has become an increasingly important topic of research interest in the recent years. In this paper,(More)
Wireless Sensor Network (WSN) consists of autonomous sensors distributed to monitor different environmental or physical phenomena and communicate the gathered data efficiently. Ensuring coverage and connectivity with minimum redundancy is important for WSNs. To ensure coverage and connectivity we assume that the sensors are deployed randomly within the(More)
Algorithm-to-hardware High-Level Synthesis (HLS) tools are becoming increasingly practical, particularly the domain specific approaches to HLS. Storage allocation is an important step in HLS where variables are mapped to onchip storage structures (OSS). HLS flows almost exclusively do this allocation to random access OSS whereas custom designers often pick(More)
— With the advancement of technology in the last few decades, leading to the widespread availability of miniaturized sensors and internet-connected things (IoT), security of electronic devices has become a top priority. Side-channel attack (SCA) is one of the prominent methods to break the security of an encryption system by exploiting the information(More)
Connected smart wearable devices are becoming increasingly popular with the advent of cheap, miniaturized, ultra-low-power computing and communication. Human Body Communication (HBC) is emerging as an alternative to Wireless Body Area Network (WBAN) for communication among these devices, as it provides higher energy-efficiency and security. One of the(More)
Rapid miniaturization and cost reduction of computing, along with the availability of wearable and implantable physiological sensors have led to the growth of human Body Area Network (BAN) formed by a network of such sensors and computing devices. One promising application of such a network is wearable health monitoring where the collected data from the(More)
  • 1