Loading [MathJax]/extensions/MathMenu.js

Showing 1-25 of 136 results

Filter Results

Show

Results

Countries are collaborating to make agriculture more efficient by combining new technologies to improve its procedures. Improving irrigation efficiency in agriculture is thus critical for the survival of sustainable agricultural production. Smart irrigation methods can enhance irrigation efficiency, especially with the introduction of wireless communication systems, monitoring devices, and enhance...Show More
This paper proposes a scalable and efficient firmware-over-the-air (FOTA) updating architecture that reliably enables the simultaneous remote mass deployment of new firmware versions on Industry 4.0 machines. The architecture comprises remotely interconnected software and hardware sys-tems for providing firmware mass deployment employing Wi-Fi and LoRa technologies. A custom bootloader for Microch...Show More
Efficient industrial manual assembly lines provide high-quality products. Reliable portable assistive tools help workers finish manufacturing tasks efficiently. The Microchip AVR family of 8-bit microcontrollers is widely used in electronic products, which includes the AT, ATtiny, ATmega, and ATxmega subfamilies. This paper proposes a design of a reliable rechargeable Microchip AVR In-Circuit Seri...Show More
Deep learning has become increasingly important in various fields, such as robotics, image processing, and speech recognition. However, the high computational requirements of deep learning models make it challenging to deploy them on edge & embedded devices with constrained power and area budgets. This paper proposes a novel low-power technique for implementing deep learning models on edge devices...Show More
Multimedia applications use image encryption algorithms extensively to safeguard and authenticate digital images. This paper presents an RGB image encryption method, which uses Chaos, DNA, pixel sum, and modified Arnold transform. The suggested algorithm is validated to be robust and resistant to visual, statistical, differential, and brute-force attacks. Additionally, the resulting encrypted imag...Show More
The agricultural industry's use of non-invasive bioimpedance monitoring methods is expanding quickly. These measured impedance fluctuations reflect imperceptible biophysical and biochemical changes in living and non-living tissues. Bioimpedance circuit modeling is a valuable method for fitting the measured impedance in biology and medicine. A study on two samples of Aloe Vera leaves is conducted t...Show More
This work explicitly states the design flows of the fractional-order analog filters used by researchers throughout the literature. Two main flows are studied: the FPAA implementation and the circuit realization. Partial-fraction expansion representation is used to prepare the approximated fractional-order response for implementation on FPAA. The generalization of the second-order active RC analog ...Show More
This paper proposes a reliable wireless configuration bits programmer for remotely resetting incorrectly-written Microchip AVR microcontrollers’ Fuses and Lock Bits. The incorrect configuration bits programming leads critically to a micro-controller malfunction which requires correct reprogramming. The proposed programmer utilizes Wi-Fi for enabling the remote configuration bits programming via a ...Show More
K Nearest Neighbors (KNN) algorithm is a straight-forward yet powerful Machine Learning (ML) tool widely used in classification, clustering, and regression applications. In this work, KNN is applied, with three distance metrics, to classify different datasets, experimentally testing each distance metric effect on the classification performance. A static K is applied for the whole dataset optimally...Show More
Image security becomes important topic because of increasing image usage in communication besides assures information security which is unseen in these images such as military and medical images. Blowfish is a superb symmetric cryptography that ensures a high degree of resistance to attacks. The proposed system modifies Blowfish algorithm by substituting the function in blowfish round with light w...Show More
Air quality assessment has been discussed for urban environments with a high degree of industrialization, as they are infested with hazardous chemicals and airborne pollutants. The assessment is carried out by monitoring stations, that basically support limited areas while leaving large geographical areas uncovered. The expansion in the agriculture sector directed us towards air quality assessment...Show More
Recently, Microchip Technology has introduced a new interface for external programming and on-chip debugging of tinyAVR, megaAVR, and AVR-Dx families of microcontrollers, which is called; Unified Programming and Debug Interface (UPDI). It is a successor to the Programming and Debug Interface (PDI), which physically depends on two wires and exists on all microcontrollers of the AVR XMEGA family. UP...Show More
This paper proposes a novel over-the-air firmware updating model suitable for integration with Industry 4.0 factories. The model includes a state-of-the-art design of a wireless programmer device that remotely receives new firmware versions and then updates a connected machine. The employed programming protocols are high voltage parallel and serial programming. They support all programming functio...Show More
This paper proposes a reliable and efficient OTA firmware updating architecture, which utilizes LoRa technology for remotely distributing new firmware updates for agricultural IoT applications. The architecture is composed of ubiquitously connected hardware and software systems for completing the OTA firmware updating procedure. The software system is a developed desktop application that enables A...Show More
The full-wave rectifier is an essential step for extracting energy from a piezoelectric source. Yet, the inherent capacitance of the piezoelement significantly is considered a limitation of the efficiency of extraction. To address this issue, the bias-flip rectifier can be used. However, this rectifier needs large inductor and precise tuning. The large inductor increases the overall volume of the ...Show More
Wearable devices have limitations in their power consumption. Due to that, the implementation of wearable devices circuits requires reducing the power consumption as much as possible. Most wearable device circuits require amplifiers to enlarge the input signals, especially from sensors modules. A survey is done to settle on the most appropriate PGAs for ECG applications. A low power consumption pr...Show More
This paper proposes a safe and effective method to generate the subkeys that are used in the Advanced Encryption Standard (AES) algorithm for data encryption applications. The suggested method relies upon the Pseudo-Random Number Generator (PRNG) that is created from the improved Lorenz chaotic system. The output of PRNG is exploited as a key schedule for generating AES subkeys where the output is...Show More
This paper proposes a reliable and scalable architecture for firmware-over-the-air updates, which provides remote cloud real-time distribution of new firmware versions on industrial machines in an efficient simultaneous manner. The architecture comprises remotely interconnected software and hardware systems for handling the procedures of firmware distribution over a wireless network. The main cont...Show More
This paper presents a comparative study of different human skin impedance models using meta-heuristic optimization Flower Pollination Algorithm (FPA). Four different models: Montague, Tregear, Lykken, and modified Montague skin models were used. There are two categories of electrical modelling; the RC-based model and the CPE-based model. The RC-based model focuses on skin stratification, while the...Show More
Flexible electrodes are developed using a novel conductive ink with various ratios of graphene nanoflakes decorated with copper nanospheres as a conductive filler. These electrodes represent potential candidates for energy storage devices and solid-state batteries. The electrodes are studied by AC measurements in the range of (0.1 Hz-500 kHz). Electrical impedance measurement data have been utiliz...Show More
This paper presents a 3 in 1 standalone FPGA system which can perform color image blur detection in parallel with compression and encryption. Both blur detection and compression are based on the 3-level Haar wavelet transform, which is used as a common building block to save the resources. The compression is based on performing the hard thresholding scheme followed by the Run Length Encoding (RLE)...Show More
Bio-impedance circuit modeling is a popular and effective non-invasive technique used in medicine and biology to fit the measured spectral impedance data of living or non-living tissues. The variations in impedance magnitude and/or phase at different frequencies reflect implicit biophysical and biochemical changes. Bio-impedance is also used for sensing environmental changes and its use in the agr...Show More
This paper presents a practical emulator of a generalised fractional-order model for gene regulation process, in an analog platform. The presented emulator is based on the second-generation current conveyor (CCII) and implemented using AD844 chips. The emulator realises a proposed generalised mathematical model for gene expression. The model sums up three different single models; the constitutive ...Show More
An ATMEL AVR ICSP programmer is considered an important device for who uses ATMEL AVR microcontrollers. Legacy programmer devices require wired connection to a PC via USB cable. This technique forces a user to place the target microcontroller close enough to a PC. Modernized systems and applications require wireless communications via many technologies, such as Wi-Fi and ZigBee. Systems that are i...Show More
Different generalized filters topologies are proposed in the fractional-order domain. Three voltage-mode topologies and one current-mode topology are used to realize several types of fractional-order filters by applying different admittances combinations. The proposed topologies are designed using a single second-generation current conveyor (CCII-) and two fractional-order capacitors, which add mo...Show More