cover
Contact Name
-
Contact Email
-
Phone
-
Journal Mail Official
-
Editorial Address
-
Location
Kota yogyakarta,
Daerah istimewa yogyakarta
INDONESIA
International Journal of Reconfigurable and Embedded Systems (IJRES)
ISSN : 20894864     EISSN : 27222608     DOI : -
Core Subject : Economy,
The centre of gravity of the computer industry is now moving from personal computing into embedded computing with the advent of VLSI system level integration and reconfigurable core in system-on-chip (SoC). Reconfigurable and Embedded systems are increasingly becoming a key technological component of all kinds of complex technical systems, ranging from audio-video-equipment, telephones, vehicles, toys, aircraft, medical diagnostics, pacemakers, climate control systems, manufacturing systems, intelligent power systems, security systems, to weapons etc. The aim of IJRES is to provide a vehicle for academics, industrial professionals, educators and policy makers working in the field to contribute and disseminate innovative and important new work on reconfigurable and embedded systems. The scope of the IJRES addresses the state of the art of all aspects of reconfigurable and embedded computing systems with emphasis on algorithms, circuits, systems, models, compilers, architectures, tools, design methodologies, test and applications.
Arjuna Subject : -
Articles 30 Documents
Search results for , issue "Vol 13, No 3: November 2024" : 30 Documents clear
Timing issues on power side-channel leakage of advanced encryption standard circuits designed by high-level synthesis Miura, Yuto; Nishikawa, Hiroki; Kong, Xiangbo; Tomiyama, Hiroyuki
International Journal of Reconfigurable and Embedded Systems (IJRES) Vol 13, No 3: November 2024
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijres.v13.i3.pp616-624

Abstract

In recent years, field programmable gate array (FPGA) have been used in many internet of things (IoT) devices and are equipped with cryptographic circuits to ensure security. However, they are exposed to the risk of cryptographic keys being stolen by side-channel attacks. Countermeasures against side-channel attacks have been developed, but they are becoming more of a threat to IoT devices due to the diversity of attacks. Therefore, it is necessary to understand the basic characteristics of side-channel attacks. Therefore, this study clarifies the relationship between two timing issues, the clock period of the circuit and the power sampling interval, and the amount of side-channel leakage. We design seven advanced encryption standard (AES) circuits with different clock periods and conduct empirical experiments using logic simulations to clarify the correlation between the two timings and the amount of side-channel leakage. T-test is used to evaluate the leakage amount, which is evaluated based on four metrics. From the results, we argue that the clock period and sampling interval do not interfere with each other in the side-channel leakage amount.
Arowana cultivation water quality monitoring and prediction using autoregressive integrated moving average Daru, April Firman; Susanto, Susanto; Adhiwibowo, Whisnumurti
International Journal of Reconfigurable and Embedded Systems (IJRES) Vol 13, No 3: November 2024
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijres.v13.i3.pp665-673

Abstract

Decorative fish is a fish that humans keep for amusement. There are many decorative fish that exist in this world, one of them is known as the Arowana fish (Scleropages Formosus). This fish is known around Asia including in Indonesia. However, to ensure the Arowana is living well is not easy. The water quality inside a farm must follow a strict balance. The pH of the water must not exceed or below 7 pH. Meanwhile, the total dissolved solid (TDS) salt must not exceed 1000 parts per million. If the balance collapsed, the Arowana fish will not grow. Thus, the owner must monitor the water to make sure that the water is ideal. There were many approaches including internet of things (IoT) solutions. However, they have weaknesses with prediction. Because of this reason, this study designed pH and TDS monitoring with autoregressive integrated moving average (ARIMA) as the algorithm. To achieve the solution, this study used experiment methodology as the research fundamental from top to bottom. According to the evaluation, this study found that the accuracy of ARIMA model is 98.12% for pH and 98.86% for TDS. On the contrary, the seasonal autoregressive integrated moving average (SARIMA) model has an accuracy of 98.52% for pH and 99.89% for TDS.
A novel smart irrigation framework with timing allocation using solenoid valves and Arduino microcontroller Ramakrishnaiah, Vijaya Kumar Hemapura; Lakshmappa, Harish; Gururaj, Bharathi; Muniyappa, Ramesha; Siddaramaiah, Pavan Godekere; Bylamurthy, Nagesh Hunnigere
International Journal of Reconfigurable and Embedded Systems (IJRES) Vol 13, No 3: November 2024
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijres.v13.i3.pp758-766

Abstract

Irrigation in agriculture is the most common way of providing water to agricultural land or fields at normal stretches through channels and embedded platforms with the internet of things (IoT), to upgrade rural development. In this paper, the arrangement of the various types of irrigation systems and embedded platforms for agriculture was studied. The embedded platform can be designed in a suitable framework that can assist the irrigation system in growing more water-required crops. In this work, three relay switches, two solenoid valves, and one water pump source were connected to Arduino ESP32. The free version of Sinric Google Cloud was utilized significantly to control three devices namely, two solenoid valves using two relay switches and a water pump source using one relay switch. The experiment was executed in a prototype manner with timing allocation by considering two agricultural fields where water was supplied either in one field at a time and showed more prominent results to save time, replacement of manual valves, man intervention, power, and suitable quantity of water for more water-required crops namely, arecanut and coconut.
Precision medicine in hepatology: harnessing IoT and machine learning for personalized liver disease stage prediction Swain, Satyaprakash; Mohanty, Mihir Narayan; Pattanayak, Binod Kumar
International Journal of Reconfigurable and Embedded Systems (IJRES) Vol 13, No 3: November 2024
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijres.v13.i3.pp724-734

Abstract

In this research, we used a dataset from Siksha ‘O’ Anusandhan (S’O’A) University Medical Laboratory containing 6,780 samples collected manually and through internet of things (IoT) sensor sources from 6,780 patients to perform a thorough investigation into liver disease stage prediction. The dataset was carefully cleaned before being sent to the machine learning pipeline. We utilised a range of machine learning models, such as Naïve Bayes (NB), sequential minimal optimisation (SMO), K-STAR, random forest (RF), and multi-class classification (MCC), using Python to predict the stages of liver disease. The results of our simulations demonstrated how well the SMO model performed in comparison to other models. We then expanded our analysis using different machine learning boosting models with SMO as the base model: adaptive boosting (AdaBoost), gradient boost, extreme gradient boosting (XGBoost), CatBoost, and light gradient boosting model (LightGBM). Surprisingly, gradient boost proved to be the most successful, producing an astounding 96% accuracy. A closer look at the data showed that when AdaBoost was combined with the SMO base model, the accuracy results were 94.10%, XGBoost 90%, CatBoost 92%, and LightGBM 94%. These results highlight the effectiveness of proposed model i.e. gradient boosting in improving the prediction of liver disease stage and provide insightful information for improving clinical decision support systems in the field of medical diagnostics.
Comparative study of password storing using hash function with MD5, SHA1, SHA2, and SHA3 algorithm Natho, Parinya; Somsuphaprungyos, Suwit; Boonmee, Salinun; Boonying, Sangtong
International Journal of Reconfigurable and Embedded Systems (IJRES) Vol 13, No 3: November 2024
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijres.v13.i3.pp502-511

Abstract

The main purpose of passwords is to prevent unauthorized people from accessing the system. The rise in internet users has led to an increase in password hacking, which has resulted in a variety of problems. These issues include opponents stealing a company's or nation's private information and harming the economy or the organization's security. Password hacking is a common tool used by hackers for illegal purposes. Password security against hackers is essential. There are several ways to hack passwords, including traffic interception, social engineering, credential stuffing, and password spraying. In an attempt to prevent hacking, hashing algorithms are therefore mostly employed to hash passwords, making password cracking more difficult. In the suggested work, several hashing techniques, including message digest (MD5), secure hash algorithms (SHA1, SHA2, and SHA3) have been used. They have become vulnerable as a result of being used to store passwords. A rainbow table attack is conceivable. Passwords produced with different hash algorithms can have their hash values attacked with the help of the Hashcat program. It is proven that the SHA3 algorithm can help with more secure password storage when compared to other algorithms.
Reconfigurable data intensive service for low latency cyber-physical systems and IoT communication Gupta, Prince; Sharma, Rajeev; Gupta, Sachi
International Journal of Reconfigurable and Embedded Systems (IJRES) Vol 13, No 3: November 2024
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijres.v13.i3.pp491-501

Abstract

The fourth industrial revolution is realized through the many developments in cyber-physical systems (CPS) made possible by the widespread use of the internet of things (IoT). CPS sensor networks must enable mobile and wireless CPSs with their specific flexibility and heterogeneity needs without compromising quality of service (QoS). The research article focuses on reconfigurable data communication hardware for numerous IoT-supporting infrastructures and performance estimation using delay, power, throughput, and packet delivery ratio (PDR) for different IoT node configurations. Tree topology-based network configuration from cloud data to sensor fog organizers, sensor network directors, and IoT-embedded sensors is supported. Functional simulation is performed in iFoGSim, Xilinx ISE, and Modelsim 10.0 with a maximum of 64 variable nodes programmed for data communication and interplay verification with a minimum delay of 9.1 ns, maximum frequency of 319 MHz, power of 7.5 mW, throughput of 0.280, and maximum PDR=1. The simulation is applicable for fog computing and CPS processed from different alters in specific topologies.
Robust embedded access control system based on face and encrypted QR with RPi4 Hammami, Samir Marwan; Alhammami, Muhammad
International Journal of Reconfigurable and Embedded Systems (IJRES) Vol 13, No 3: November 2024
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijres.v13.i3.pp586-594

Abstract

Facial-based recognition systems are commonly used for building access control, with the accuracy and computing requirements still being improved. On the other hand, QR codes are gaining rising attention as an input interface to many embedded applications. This paper proposes an embedded access control system that customises both previous techniques to be implemented on the CPU of a low-cost Raspberry Pi 4 computer. The achieved system works smoothly with a frame rate of 8.27 FPS, increasing the accessing control's robustness compared to a system based on face recognition only. It also offers the ability to control the access of unknown faces. In tandem with integration, this strengthens security measures, improves user experience, and outperforms conventional access control approaches, creating an attractive offer for many businesses.
Comparing feature usage in IMU-based gesture control for omnidirectional robot via wearable glove Syauqy, Dahnial; Setiawan, Eko; Widasari, Edita Rosana
International Journal of Reconfigurable and Embedded Systems (IJRES) Vol 13, No 3: November 2024
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijres.v13.i3.pp542-551

Abstract

To improve the intuitiveness of maneuver control on omniwheeled mobile robot, many hand gesture-based robot controls have been developed. The focus of this research is to develop a wearable system for data acquisition from inertial measurement unit (IMU) sensors and compare its features to be used as gesture recognition using the random forest algorithm. With the need of resource constrained device for wearable system based on microcontrollers, we compared the use of Euler and quaternion-based orientation data as input features. As additional comparison, dimension reduction was also carried out using the principal component analysis (PCA) method. Hand gestures are recognized using data obtained by the IMU sensor embedded in the wearable glove. This study compared the accuracy and size of library files embedded in microcontrollers in several feature usage scenarios. The test evaluation results of all scenarios show that the use of all features provides a balance between high accuracy but small file sizes, respectively 99% and 9.2 KB. However, the use of other fewer features, such as by only using 3 Euler data, 4 quaternion data, or by using PCA algorithm (PC=3) can also be used since the accuracy is still above 90%, with a relatively larger file size.
Highly selective filtering power divider using substrate integrated waveguide technique for radar applications Patel, Yogeshkumar Bhadreshbhai; Patel, Amrutbhai Narshihbhai
International Journal of Reconfigurable and Embedded Systems (IJRES) Vol 13, No 3: November 2024
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijres.v13.i3.pp643-649

Abstract

This article exhibits a filtering power divider designed with substrate integrated waveguide (SIW) technique, having the power dividing as well as filtering functionalities. In the design band-pass performance is realized by merging SIW structure having high-pass response and complementary split ring resonator (CSRRs) with parallel tank LC resonant response and the dumbbells shape defected ground structure (DGS) with high out of band rejection characteristics. The anticipated structure serves as both a power divider and a filter, it reduces both the cost and the size of the system. Structure is constructed and tested to confirm the design functionality. The measurement result shows the return loss of -25.94 dB with 3-dB fractional bandwidth of 2.85% at 14 GHz.
Improving the performance of IoT devices that use Wi-Fi Razzaq, Ali Ahmed; Rao, Kunjam Nageswara
International Journal of Reconfigurable and Embedded Systems (IJRES) Vol 13, No 3: November 2024
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijres.v13.i3.pp748-757

Abstract

Providing quality service to users of the internet of things (IoT) entails addressing two crucial aspects: one related to security and the other concerning the limited resources of IoT devices. We will face a challenge while using timesensitive applications within a network that utilizes a high-performance Wi-Fi technology with exceeding energy consumption. Due to this research challenge, we propose a new algorithm, IoT-quality of service (QoS), designed to achieve a true balance between enhancing the security aspects of IoT devices and improving network-hardware performance. Thus, the algorithm efficiently manages the limited energy resources by monitoring energy levels, communication quality, and queuing delay at access points. This is accomplished by utilizing a streamlined identity management system capable of achieving authentication and access authorization with reduced loading for IoT devices. The research hypothesis underwent validation through a comparative analysis of its performance against the conventional model of a Wi-Fi-based IoT device. This evaluation was conducted utilizing the NS3 simulator and was based on a predetermined set of parameters influencing the examined performance metrics, including power consumption, throughput, delay, and response time. The findings exposed the superiority of the proposed algorithm.

Page 1 of 3 | Total Record : 30