Open Access. Powered by Scholars. Published by Universities.®
- Keyword
- Publication
- Publication Type
Articles 1 - 3 of 3
Full-Text Articles in Computer Engineering
Nanopower Analog Frontends For Cyber-Physical Systems, Kenji Aono
Nanopower Analog Frontends For Cyber-Physical Systems, Kenji Aono
McKelvey School of Engineering Theses & Dissertations
In a world that is increasingly dominated by advances made in digital systems, this work will explore the exploiting of naturally occurring physical phenomena to pave the way towards a self-powered sensor for Cyber-Physical Systems (CPS). In general, a sensor frontend can be broken up into a handful of basic stages: transduction, filtering, energy conversion, measurement, and interfacing. One analog artifact that was investigated for filtering was the physical phenomenon of hysteresis induced in current-mode biquads driven near or at their saturation limit. Known as jump resonance, this analog construct facilitates a higher quality factor to be brought about without …
Self-Powered Time-Keeping And Time-Of-Occurrence Sensing, Liang Zhou
Self-Powered Time-Keeping And Time-Of-Occurrence Sensing, Liang Zhou
McKelvey School of Engineering Theses & Dissertations
Self-powered and passive Internet-of-Things (IoT) devices (e.g. RFID tags, financial assets, wireless sensors and surface-mount devices) have been widely deployed in our everyday and industrial applications. While diverse functionalities have been implemented in passive systems, the lack of a reference clock limits the design space of such devices used for applications such as time-stamping sensing, recording and dynamic authentication. Self-powered time-keeping in passive systems has been challenging because they do not have access to continuous power sources. While energy transducers can harvest power from ambient environment, the intermittent power cannot support continuous operation for reference clocks. The thesis of this …
Security Services Using Blockchains: A State Of The Art Survey, Maeda Zolanvari, Aiman Erbad, Raj Jain, Mohammed Samaka
Security Services Using Blockchains: A State Of The Art Survey, Maeda Zolanvari, Aiman Erbad, Raj Jain, Mohammed Samaka
All Computer Science and Engineering Research
This article surveys blockchain-based approaches for several security services. These services include authentication, confidentiality, privacy and access control list (ACL), data and resource provenance, and integrity assurance. All these services are critical for the current distributed applications, especially due to the large amount of data being processed over the networks and the use of cloud computing. Authentication ensures that the user is who he/she claims to be. Confidentiality guarantees that data cannot be read by unauthorized users. Privacy provides the users the ability to control who can access their data. Provenance allows an efficient tracking of the data and resources …