cover
Contact Name
-
Contact Email
-
Phone
-
Journal Mail Official
-
Editorial Address
-
Location
Kota yogyakarta,
Daerah istimewa yogyakarta
INDONESIA
International Journal of Reconfigurable and Embedded Systems (IJRES)
ISSN : 20894864     EISSN : 27222608     DOI : -
Core Subject : Economy,
The centre of gravity of the computer industry is now moving from personal computing into embedded computing with the advent of VLSI system level integration and reconfigurable core in system-on-chip (SoC). Reconfigurable and Embedded systems are increasingly becoming a key technological component of all kinds of complex technical systems, ranging from audio-video-equipment, telephones, vehicles, toys, aircraft, medical diagnostics, pacemakers, climate control systems, manufacturing systems, intelligent power systems, security systems, to weapons etc. The aim of IJRES is to provide a vehicle for academics, industrial professionals, educators and policy makers working in the field to contribute and disseminate innovative and important new work on reconfigurable and embedded systems. The scope of the IJRES addresses the state of the art of all aspects of reconfigurable and embedded computing systems with emphasis on algorithms, circuits, systems, models, compilers, architectures, tools, design methodologies, test and applications.
Arjuna Subject : -
Articles 28 Documents
Search results for , issue "Vol 13, No 2: July 2024" : 28 Documents clear
Dual step hybrid routing protocol for network lifetime enhancement in WSN-IoT environment Yankanaik, Kalpavi C.; Munivenkatappa, Sujatha B.
International Journal of Reconfigurable and Embedded Systems (IJRES) Vol 13, No 2: July 2024
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijres.v13.i2.pp323-331

Abstract

Recent development in internet of things (IoT) has been generating huge data due to the large number of nodes deployed and utilized for different applications. In addition, these applications utilize big data and require a more efficient mechanism for data sensing and data transmission. This research work proposes dual step hybrid routing (DSHR) protocol for efficient cluster-based routing. It comprises a two-phase algorithm, which aims at finding the optimal path considering clustering. It further comprises several processes such as cluster head selection, optimal path construction, integrating of nodes to cluster head and sensing range optimization. DSHR is evaluated considering the network lifetime; thereafter model is compared with the existing low energy adaptive clustering hierarchy (LEACH) protocol to prove the efficiency.
An exhaustive review of the stream ciphers and their performance analysis Ananth, Raghavendra; Ramaiah, Narayana Swamy
International Journal of Reconfigurable and Embedded Systems (IJRES) Vol 13, No 2: July 2024
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijres.v13.i2.pp360-371

Abstract

The number of internet of things (IoT) applications has increased, which has increased the demand for low-resource gadgets. The data produced by these devices must be protected to guarantee security. The devices operate in conditions with limited space, computational power, memory, and energy. High-security standards are difficult to achieve with limited resources. The detailed analysis of various stream ciphers and their performance metrics is reviewed in this manuscript. The functionality of the stream ciphers is categorized and thoroughly discussed based on both the hardware and software viewpoints. The security attacks and their countermeasure methods using stream ciphers are discussed. The performance metrics of most hardware-based stream ciphers, including the ECRYPT stream cipher project (eSTREAM) ciphers, are discussed. Each hardware stream cipher design highlights the hardware constraints such as chip area, frequency, throughput, and hardware efficiency. The work also highlights the various applications using these stream ciphers. The current trends using these stream ciphers are discussed with futuristic goals.
Continuous hand gesture segmentation and acknowledgement of hand gesture path for innovative effort interfaces Richhariya, Prashant; Chauhan, Piyush; Kane, Lalit; Dewangan, Bhupesh Kumar
International Journal of Reconfigurable and Embedded Systems (IJRES) Vol 13, No 2: July 2024
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijres.v13.i2.pp286-295

Abstract

Human-computer interaction (HCI) has revolutionized the way we interact with computers, making it more intuitive and user-friendly. It is a dynamic field that has found it is applications in various industries, including multimedia and gaming, where hand gestures are at the forefront. The advent of ubiquitous computing has further heightened the interest in using hand gestures as input. However, recognizing continuous hand gestures presents a set of challenges, primarily stemming from the variable duration of gestures and the lack of clear starting and ending points. Our main objective is to propose a solution: the framework for “continuous palm motion analysis and retrieval” based on “Spatial-temporal and path knowledge”. Framework harnesses the power of cognitive deep learning networks (DLN), offering a significant advancement in the continuous hand gesture recognition domain. we conducted rigorous experiments using a diverse video dataset capturing hand gestures for boasting an impressive F-score of up to 0.99. The potential of our framework to significantly enhance the accuracy and reliability of hand gesture recognition in real-world applications.
Video saliency detection using modified high efficiency video coding and background modelling Narasimha, Sharada P.; Lingareddy, Sanjeev C.
International Journal of Reconfigurable and Embedded Systems (IJRES) Vol 13, No 2: July 2024
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijres.v13.i2.pp431-440

Abstract

Video saliency has a profound effect on our lives with its compression efficiency and precision. There have been several types of research done on image saliency but not on video saliency. This paper proposes a modified high efficiency video coding (HEVC) algorithm with background modelling and the implication of classification into coding blocks. This solution first employs the G-picture in the fourth frame as a long-term reference and then it is quantized based on the algorithm that segregates using the background features of the image. Then coding blocks are introduced to decrease the complexity of the HEVC code, reduce time consumption and overall speed up the process of saliency. The solution is experimented upon with the dynamic human fixation 1K (DHF1K) dataset and compared with several other state-of-the-art saliency methods to showcase the reliability and efficiency of the proposed solution.
Kernel rootkit prevention model using multiclass Srinivasan, Suresh Kumar; Thalavaipillai, Sudalaimuthu
International Journal of Reconfigurable and Embedded Systems (IJRES) Vol 13, No 2: July 2024
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijres.v13.i2.pp395-402

Abstract

Malicious individuals can access a computer network or application thanks to a series of programmes known as rootkit malware. These kernel rootkits use covert methods to conceal the kernel components, various control frameworks, and system activities, making identifying or prohibiting their presence in the target machine challenging. The bulk of rootkit detection and prevention techniques used today are particular to a system and dependent on recognized sources, making them ineffective for growing, evolving, concealed, or unnamed rootkits. This study proposes using the kernel rootkit prevention model using multiclass (KRPMM) system to identify hash values and detect/prevent such rootkits. The file downloaded by the client, who is availing of the service, is not permitted into the node used by the client in the cloud. But, it is redirected to the node wherein the file that has been downloaded and has entered the node anew is examined by a program which is specially coded to test the presence of rootkit in the file by some mechanisms and then comes to a conclusion of either the file being malicious or the file being clean and is free of rootkits. KRPMM tested only 64 rootkits.
Channel access mechanism for maximizing throughput with fairness in wireless sensor networks Tauseef, Shaik Humera; Fatima, Ruksar; Khanam, Rohina
International Journal of Reconfigurable and Embedded Systems (IJRES) Vol 13, No 2: July 2024
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijres.v13.i2.pp352-359

Abstract

The spectrum scarcity problem of wireless sensor networks (WSNs) is improved through amalgamation of cognitive radio networks (CRNs) into WSNs. However, spectrum allocation to secondary users (SUs) is challenging in cognitive radio wireless sensor networks (CR-WSNs) as channel is already crowded and at same time should not induce interference to primary users (PUs). In designing efficient spectrum access model for CR-WSNs recent work have adopted machine-learning game theory (GT) and statistical model. However, the major limitation of existing spectrum access model they fail to assure access fairness with maximal throughput with minimal collision. This work presents a maximizing channel access fairness model to handle the research challenges. To boost CR-WSN performance, the throughput maximization using channel access fairness (TMCAF) employs shared and non-shared channel access designs. Experiment outcome shows throughput is improved and collision in network is reduced in comparison with state-of-art channel access models.
Earthquake detection in mountainous homes using the internet of things connected to photovoltaic energy supply Satria, Habib; Dayana, Indri; Syah, Rahmad B. Y.; Noviandri, Dian; Zuhanda, Muhammad Khahfi; Syafii, Syafii; Salam, Rudi
International Journal of Reconfigurable and Embedded Systems (IJRES) Vol 13, No 2: July 2024
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijres.v13.i2.pp315-322

Abstract

The North Sumatra region is an area with the potential for earthquakes originating from volcanic and oceanic eruptions which have resulted in many fatalities. Therefore, through the application of automatic monitoring and control system technology connected to the internet of things (IoTs), it is the right solution to provide efforts to increase security for residents of the house to always be vigilant. The security enhancement method referred to in this study is a home security system protection system by anticipating earthquakes. The advantage of this tool is that it applies a notification security system method with a sensitivity sensor which is automatically sent via email and sonor buzzer which also acts as sound vibrations due to an earthquake. The test results show that when a vibration occurs, the system will send a short email message to the user's smartphone so that the user will receive an email in the form of a warning message that the state of the house has an earthquake and the light-emitting diode (LED) interrupts and the buzzer is also on so that the alarm sounds which has been integrated into IoT. Then an integrated security monitoring system using the web can be monitored in real time.
Internet of thing based health monitoring system using wearable sensors networks Mirza, Mohsina; Periyasamy, Valarmathi; Ramesh, Mekala; Mariappan, Sathya; Rajagopal, Sudarmani; Suriyan, Kannadhasan; Venusamy, Kanagaraj
International Journal of Reconfigurable and Embedded Systems (IJRES) Vol 13, No 2: July 2024
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijres.v13.i2.pp424-430

Abstract

Maintaining mental and physical health is becoming increasingly important for maintaining independent living, particularly as the population of people suffering from chronic illnesses like diabetes, heart disease, obesity, and other conditions rises and the average age of many societies keeps rising. Using sensors, monitoring health remotely, and ultimately recognising daily activities have all been proposed as potential strategies. In this work, fatigue threshold and environmental bounds are assessed and provided via an external interface to a microcontroller unit (MCU) in addition to the required restrictions. Rerouting the required boundaries into the long range (LoRa) and Bluetooth module, the MCU is responsible for editing and analysing the raw data to remove the oxygen immersion, pulse, and temperature data. These important restrictions are sent to many terminals, such as PCs and mobile devices, using the remote Bluetooth and LoRa module. For data storage and retrieval, any IoT platform may be used. With caution, the patient is discharged home after the medical experts have carefully evaluated the diseases in light of the new features. To telemonitor patients with heart conditions, the test results show that the framework is efficient and dependable for collecting, sending, and presenting electrocardiogram (ECG) data constantly.

Page 3 of 3 | Total Record : 28