Everything in its way to be computerized and most of the objects are coming to be smart in present days. Modern Internet of Thing (IoT) allows these objects to be on the network by using IoT platforms. IoT is a smart information society that consists of smart devices; these devices can communicate with each other without human's intervention. IoT systems require flexible platforms. Through the use of Field Programmable Gate Array (FPGA), IoT devices can interface with the outside world easily with low power consumption, low latency, and best determinism. FPGAs provide System on Chip (SoC) technique due to FPGAs scalability which enables the designer to implement and integrate large number of hardware clocks at single chip. FPGA can be deemed as a special purpose reprogrammable processor since it can process signals at its input pins, manipulate them, and give off signals on the output pins. In this paper, using FPGA for IoT is the limelight.
In nowadays world of rapid evolution of exchanging digital data, data protection is required to protect data from the unauthorized parities. With the widely use of digital images of diverse fields, it is important to conserve the confidentiality of image’s data form any without authorization access. In this paper the problem of secret key exchanging with the communicated parities had been solved by using a random number generator which based on Linear Feedback Shift Register (LFSR). The encryption/decryption is based on Advance Encryption Standard (AES) with the random key generator. Also, in this paper, both grayscale and colored RGB images have been encrypted/decrypted. The functionality of proposed system of this paper, is concerned with three features: First feature, is dealing with the obstetrics of truly random and secure encryption key while the second one deals with encrypting the plain or secret image using AES algorithm and the third concern is the extraction the original image by decrypting the encrypted or cipher one. “Mean Square Error (MSE)”, “Peak Signal to Noise Ratio (PSNR)”, “Normalized Correlation (NK)”, and “Normalized Absolute Error (NAE)” are measured for both (original-encrypted) images and (original-decrypted) image in order to study and analyze the performance of the proposed system according to image quality features.
Gas or liquefied petroleum gas (LPG) is a chemical substance resultant from petroleum and could be dangerous in industrial places or those that deal with this substance. Gas leakage causes many health issues. So, to prevent such catastrophes and in order to maintain a clean air environment, the workspace atmosphere should be frequently monitored and controlled. The proposed monitoring gas leakage detector system is based on Internet of Things (IoT) technology. NodeMCU ESP8266 Wi-Fi is used to be the microcontroller for the whole system. The combustible gas sensor (MQ2) is used in order to detect the presence of methane (CH4) and carbon monoxide gas (CO). MQ2 sensor will detect the concentration of the gas according to the voltage output of the sensor and the ESP8266 will send the data reading from the gas sensor to Blynk IoT platform over an IOS phone; data visualization is done using Thingspeak IoT Platform. Besides, a fan will immediately work upon the leakage occurs along with an alarming buzzer.
This paper presents a new strategy of sticky bomb detection. The detection strategy is based on measuring the magnetic field around the targeted car using compass device. A compass measure the earth gravitation of the car as (x,y,z) coordination , a threshold value of magnetic fields around the targeted car are recorded. If a difference is detected with any (x,y,z) coordination, an alert SMS message is sent to the car's owner. The detection system presented in this paper has been implemented based on Arduino board. The alarm signal is a Short Message Service (SMS) through Global System for Mobile Communication (GSM) module. The proposed method can gives the people of unstable countries a chance to discover whether their cars have been trapped with an IED bomb or their car still safe.
Ad-Hoc networks have an adaptive architecture, temporarily configured to provide communication between wireless devices that provide network nodes. Forwarding packets from the source node to the remote destination node may require intermediate cooperative nodes (relay nodes), which may act selfishly because they are power-constrained. The nodes should exhibit cooperation even when faced with occasional selfish or non-cooperative behaviour from other nodes. Several factors affect the behaviour of nodes; those factors are the number of packets required to redirect, power consumption per node, and power constraints per node. Power constraints per node and grade of generosity. This article is based on a dynamic collaboration strategy, specifically the Generous Tit-for-Tat (GTFT), and it aims to represent an Ad-Hoc network operating with the Generous Tit-for-Tat (GTFT) cooperation strategy, measure statistics for the data, and then analyze these statistics using the Taguchi method. The transfer speed and relay node performance both have an impact on the factors that shape the network conditions and are subject to analysis using the Taguchi Method (TM). The analyzed parameters are node throughput, the amount of relay requested packets produced by a node per number of relays requested packets taken by a node, and the amount of accepted relay requested by a node per amount of relay requested by a node. A Taguchi L9 orthogonal array was used to analyze node behaviour, and the results show that the effect parameters were number of packets, power consumption, power constraint of the node, and grade of generosity. The tested parameters influence node cooperation in the following sequence: number of packets required to redirect (N) (effects on behaviour with a percent of 6.8491), power consumption per node (C) (effects on behaviour with a percent of 0.7467), power constraints per node (P) (effects on behaviour with a percent of 0.6831), and grade of generosity (ε) (effects on behaviour with a percent of 0.4530). Taguchi experiments proved that the grade of generosity (GoG) is not the influencing factor where the highest productivity level is, while the number of packets per second required to redirect also has an impact on node behaviour.