Kevin Kornegay - Academia.edu (original) (raw)
Papers by Kevin Kornegay
IEEE security & privacy, 2024
2021 10th International Conference on Information and Automation for Sustainability (ICIAfS), 2021
1997 55th Annual Device Research Conference Digest
Summary form only given. CMOS is a very attractive technology for digital circuits because it off... more Summary form only given. CMOS is a very attractive technology for digital circuits because it offers full rail-to-rail output swings and greater noise margins than NMOS circuits. CMOS also provides active loads for linear circuits. Implementation of CMOS in silicon carbide (SiC) devices is expected to provide reliable circuits for high temperature operation. However, previous implementations of CMOS in SiC resulted in very high PMOS threshold voltages. This requires a high supply voltage, which is not desirable for high temperature operations. In this paper, we present the first CMOS digital IC in 6H-SiC to operate with a single 5 V power supply.
2005 IEEE International Symposium on Circuits and Systems
AbstractA low noise amplifier (LNA) in 0.13µm CMOS for ultra-wideband (UWB) front-ends is presen... more AbstractA low noise amplifier (LNA) in 0.13µm CMOS for ultra-wideband (UWB) front-ends is presented. The LNA has a peak gain of 11.3 dB and a 3.0 10.7 GHz 3 dB bandwidth. Its broadband matching is better than -10 dB for S11 and -15 dB for S22. Its lowest noise ...
2010 IEEE Radio Frequency Integrated Circuits Symposium, 2010
Page 1. Fig. 1. Diagram of PCT-based PAs (a) conventional structure and (b) proposed structure. A... more Page 1. Fig. 1. Diagram of PCT-based PAs (a) conventional structure and (b) proposed structure. A Discrete Resizing and Concurrent Power Combining Structure for Linear CMOS Power Amplifier Jihwan Kim1, Hyungwook ...
2008 IEEE Radio Frequency Integrated Circuits Symposium, 2008
Page 1. A 91 GHz Receiver Front-End in Silicon-Germanium Technology Jihwan Kim1, Javier Alvarado ... more Page 1. A 91 GHz Receiver Front-End in Silicon-Germanium Technology Jihwan Kim1, Javier Alvarado Jr.1,2, and Kevin T. Kornegay1 1Georgia Electronic Design Center, Georgia Institute of Technology Atlanta, GA, 30308 USA ...
IEE Proceedings - Circuits, Devices and Systems, 1997
Six IOGHz MOS VCOs were designed and fabricated in the IBM 6RF 0.25um CMOS process. Their oscilla... more Six IOGHz MOS VCOs were designed and fabricated in the IBM 6RF 0.25um CMOS process. Their oscillation frequency, output amplitude and phase noise performance are measured and compared, and the results confirm that replacing shielded-ground inductors with high-resistvity substrate inductors improves phase noise performance. Capacitive source degeneration has also been identified as a performance limiting mechanism in MOS based VCOs rather than performance enhancing as in BJT based VCOs.
2023 IEEE 13th Annual Computing and Communication Workshop and Conference (CCWC)
IEEE Access
Massive MIMO and mmWave communication are the technologies for achieving 5G design goals. Fortuna... more Massive MIMO and mmWave communication are the technologies for achieving 5G design goals. Fortunately, these two technologies share a symbiotic integration. As a result, amalgamating mmWave communications with massive MIMO forms,mmWave-massive MIMO,'' which significantly improves spectral and energy efficiency. It also achieves high multiplexing gains and increases mobile network capacity. However, massive MIMO, mmWave communications, and mmWave-massive MIMO systems have been studied independently. Consequently, this article explores the ideas, performances, comparisons, and discussions of these three 5G technologies jointly, considering their precoding and beamforming methods. On the other hand, the complexity of these technologies increases when a large number of antennas and radio frequencies (RFs) are used. Thus, several investigations are going on to search for the appropriate precoding and beamforming strategies with low cost, power, and complexity. Therefore, massive MIMO linear precoding techniques such as zero-forcing, maximum ratio transmission, regularized zero-forcing, truncated polynomial expansion and phased zero forcing are addressed in this work. In addition, the most common non-linear precoding schemes: dirty-paper coding, Tomlinson-Harashima, and vector perturbation, are presented. Furthermore, a detailed discussion of the beamforming techniques called analog, digital, and hybrid analog-digital beamforming schemes is included. We also examine the potential of hybrid analog-digital beamforming with its fully-connected and sub-connected architecture approaches in making mmWave massive MIMO a reality. We evaluate their performance with the parameters: bit error rate, signal to noise ratio, complexity, spectral efficiency, and energy efficiency. According to the analytical and simulation results, the partially-connected hybrid analog/digital beamforming architecture offers better all-over performance for mmWave-Massive MIMO communications by compromising: power consumption, cost, complexity, and performance. Finally, the potential future directions in mmWave-massive MIMO precoding and beamforming challenges are addressed.
Sensors, 2022
An increase in the number of transmit antennas (M) poses an equivalent rise in the number of Radi... more An increase in the number of transmit antennas (M) poses an equivalent rise in the number of Radio Frequency (RF) chains associated with each antenna element, particularly in digital beamforming. The chain exhibits a substantial amount of power consumption accordingly. Hence, to alleviate such problems, one of the potential solutions is to reduce the number of RFs or to minimize their power consumption. In this paper, low-resolution Digital to Analogue Conversion (DAC) and transmit antenna selection at the downlink are evaluated to favour reducing the total power consumption and achieving energy efficiency in mMIMO with reasonable complexity. Antenna selection and low-resolution DAC techniques are proposed to leverage massive MIMO systems in free space and Close In (CI) path-loss models. The simulation results show that the power consumption decreases with antenna selection and low-resolution DAC. Then, the system achieves more energy efficiency than without low-resolution of DAC an...
2021 55th Annual Conference on Information Sciences and Systems (CISS), 2021
This paper proposes a novel energy efficient beamforming and DOA estimation scheme called RLS-MUS... more This paper proposes a novel energy efficient beamforming and DOA estimation scheme called RLS-MUSIC algorithm. First, we study different adaptive beamforming algorithms and receive signal Degree-of-Arrival (DOA) estimation techniques for wireless communication network application in reference to their effect on energy efficiency. Taking linear array smart antenna elements geometry, which is mostly used antenna array geometry, Recursive Least Square (RLS) adaptive beam-forming algorithm and Multiple Signal Classification (MUSIC) DOA estimation technique are identified as the reference input methods to model the new energy efficient scheme. Using an energy model, which is as a function of beam-width, signal transmission strength (range), and signal-to-noise-interference ratio (SNIR), we evaluate the total amount of energy spent during beam-formation. Finally, the energy gain due to RLS-MUSIC scheme is compared with that of RLS alone. The results show that the RLS-MUSIC scheme based access-points/base-station antenna systems consume less energy during beam formation and they generate beams with narrower beam-width, lower side lobe level and better deep null.
2017 IEEE 15th Intl Conf on Dependable, Autonomic and Secure Computing, 15th Intl Conf on Pervasive Intelligence and Computing, 3rd Intl Conf on Big Data Intelligence and Computing and Cyber Science and Technology Congress(DASC/PiCom/DataCom/CyberSciTech), 2017
In this paper, physical layer security-secrecy capacity– is investigated with respect to energy e... more In this paper, physical layer security-secrecy capacity– is investigated with respect to energy efficient antenna beam forming mechanism. Energy consumption per RLS beam formation algorithm is studied and compared against the combination of RLS-Kaiser windowing function using a new energy model in the smart antenna system. The investigation is carried out on linear array geometry with element spacing of 0.5λ. The result shows that; RLS-Kaiser combination consumes less energy per beam formation than the RLS algorithm. In addition to that, we have shown the amount of energy saved by using RLS-Kaiser combination. Finally, we have shown the advantage of using RLS-Kaiser combination during beam formation. This combination helps in achieving both spectral efficiency and energy efficiency at the same time by avoiding interference because of side lobe and saving the energy that would be wasted at a side lobe respectively. On the other hand, physical layer security can be achieved by saving ...
2020 IEEE Applied Imagery Pattern Recognition Workshop (AIPR), 2020
The Internet of Things (IoT) is growing with the advancement of technology. Many vendors are crea... more The Internet of Things (IoT) is growing with the advancement of technology. Many vendors are creating IoT devices to leverage the quality of life of consumers. These devices include smart grids, smart homes, smart health care systems, smart transportation, and many other applications. IoT devices interact with the environment and each other using sensors and actuators. However, the widespread proliferation of IoT devices poses many cybersecurity threats. The IoT devices’ interconnection opens the door to attackers who try to gain unauthorized access to these devices. For many IT networks, establishing trust and security during the device operation is challenging. Further, devices also may leak vital information, which is a significant concern in cybersecurity. Prior research has shown that security breaches have increased by 67% over the past five years, and 95% of HTTPs servers are vulnerable to Man-in-the-middle (MIM) attacks. This paper examines attack datasets from the Hacking and Countermeasure Research Lab (HCRL) collected from real-life IoT devices that include smart cameras, laptops, and smartphones [1]. We present a model using Random Forest, Logistic Regression, and Decision Tree. Results indicate that the overall detection accuracy is 98-100%, which is more promising than traditional Intrusion Detection Systems (IDS).
2021 IEEE SmartWorld, Ubiquitous Intelligence & Computing, Advanced & Trusted Computing, Scalable Computing & Communications, Internet of People and Smart City Innovation (SmartWorld/SCALCOM/UIC/ATC/IOP/SCI), 2021
Internet of Things (IoT) has infiltrated the digital realm, and critical efforts are being made t... more Internet of Things (IoT) has infiltrated the digital realm, and critical efforts are being made to create robust security for these technologies. However, with increasingly sophisticated attacks, it is essential to understand IoT device security in depth. We orchestrated Denial of Service (DoS) attacks for four different IoT devices through network flooding to understand the device vulnerabilities from the network level. We conducted our experiment in the lab environment using other IoT devices, including the Amazon Echo, a smart light-bulb, a smart camera, and a smart garage door opener. We used Raspberry Pi as the main target to access other network devices with different protocols to conduct the DoS attack. We generated the DoS attack using Kali Linux installed in a virtual environment. This experiment demonstrated that hackers might exploit sensor vulnerabilities to gain unauthorized network access and use user data through various IoT devices. We proposed an effective Intrusion Detection technique using a combination of machine learning classifiers and deep learning. The machine learning models include logistic regression, decision tree, random forest, and support vector machine to detect and mitigate the attack. The outcomes show the algorithm which presents the highest degree of attack detection accuracy. Our findings also show that DoS attacks continue to be a significant concern even with improved technologies and security protocols. Finally, we provide design implications to address such critical security flaws.
2021 8th International Conference on Future Internet of Things and Cloud (FiCloud), 2021
Technology is evolving exponentially, and researchers are seeking solutions to answer questions r... more Technology is evolving exponentially, and researchers are seeking solutions to answer questions related to the benefits of using advanced IoT cloud computing platforms. There is a tremendous amount of research activity regarding cyberattacks on Internet of Things (IoT) devices. IoT ecosystems consist of physical objects or devices that interact with the environment, extract data, and communicate with a higher authority such as a cloud. Many IoT users are unaware of the underlying platforms that facilitate data collection. These platforms are also known as middleware, sit between the connectivity and application layers. There are more than 1000 IoT platforms on the market today, where many are open-source or commercial and provide services that include a device, data, and connection management. This paper presents a comparative analysis of some commercial and open-source IoT platforms such as Arm Pelion, Microsoft Azure cloud, ThingWorx, FIWARE, and ThingSpeak. We compare system architecture, management schemes, protocols, interoperability, and security. We used experimentation with real-world Internet of Things devices for the comparative study. We proposed a novel design architecture of a fully secure testbed that integrates critical components of an IoT platform. Hopefully, this study will motivate manufacturers to provide a better quality of service to help customers select the best IoT platform for their needs.
2021 IEEE 11th Annual Computing and Communication Workshop and Conference (CCWC), 2021
Smart antenna consist of multiple antenna elements at the transmitting and/or receiving side of t... more Smart antenna consist of multiple antenna elements at the transmitting and/or receiving side of the communication link, whose signals are processed adaptively in order to exploit the spatial dimension of the wireless channel. Depending on the signal process at the transmitter, receiver, or both ends of the communication link, the smart antenna technique can increase the capacity of the wireless network by improving link quality using impairments mitigation mechanisms. This work investigates different smart antenna beamforming algorithms considering energy efficiency using adaptive antenna techniques with a uniform linear array geometry. The schemes used for investigation are half power beam width, side lobe level, array spacing and variable node distance (range). The results demonstrate that Constant module (CMA) algorithm makes antenna arrays more energy efficient while it has high mean square error. On the other hand, Recursive Least Square (RLS) is recommended for next-generation wireless networks because it provides significant energy efficiency while keeping mean square error minimum than the rest of the algorithms.
The continued lithographic scaling of silicon devices together with the exponential increases in ... more The continued lithographic scaling of silicon devices together with the exponential increases in clock speed and integration density have produced phenomenal gains for the industry, but have led to emerging problems with clock skew, power consumption, and inductive power supply noise. In an attempt to create systems better able to adapt to these conditions while ensuring a robust range of design choices, two different implementation methodologies were developed. The first of these is the Improved Latency Globally Asynchronous Locally Synchronous (IL-GALS) methodology, which aims to improve the performance of typical GALS implementations by removing the need for either pauseable clocks or non-zero pipeline slack by paralleling the detection of a failure condition with the actual computation. This changes the problem of synchronization from one with some minimum forward latency for resolution to one where the latency penalty instead comes as a pipeline stall, much as is the case with ...
IEEE security & privacy, 2024
2021 10th International Conference on Information and Automation for Sustainability (ICIAfS), 2021
1997 55th Annual Device Research Conference Digest
Summary form only given. CMOS is a very attractive technology for digital circuits because it off... more Summary form only given. CMOS is a very attractive technology for digital circuits because it offers full rail-to-rail output swings and greater noise margins than NMOS circuits. CMOS also provides active loads for linear circuits. Implementation of CMOS in silicon carbide (SiC) devices is expected to provide reliable circuits for high temperature operation. However, previous implementations of CMOS in SiC resulted in very high PMOS threshold voltages. This requires a high supply voltage, which is not desirable for high temperature operations. In this paper, we present the first CMOS digital IC in 6H-SiC to operate with a single 5 V power supply.
2005 IEEE International Symposium on Circuits and Systems
AbstractA low noise amplifier (LNA) in 0.13µm CMOS for ultra-wideband (UWB) front-ends is presen... more AbstractA low noise amplifier (LNA) in 0.13µm CMOS for ultra-wideband (UWB) front-ends is presented. The LNA has a peak gain of 11.3 dB and a 3.0 10.7 GHz 3 dB bandwidth. Its broadband matching is better than -10 dB for S11 and -15 dB for S22. Its lowest noise ...
2010 IEEE Radio Frequency Integrated Circuits Symposium, 2010
Page 1. Fig. 1. Diagram of PCT-based PAs (a) conventional structure and (b) proposed structure. A... more Page 1. Fig. 1. Diagram of PCT-based PAs (a) conventional structure and (b) proposed structure. A Discrete Resizing and Concurrent Power Combining Structure for Linear CMOS Power Amplifier Jihwan Kim1, Hyungwook ...
2008 IEEE Radio Frequency Integrated Circuits Symposium, 2008
Page 1. A 91 GHz Receiver Front-End in Silicon-Germanium Technology Jihwan Kim1, Javier Alvarado ... more Page 1. A 91 GHz Receiver Front-End in Silicon-Germanium Technology Jihwan Kim1, Javier Alvarado Jr.1,2, and Kevin T. Kornegay1 1Georgia Electronic Design Center, Georgia Institute of Technology Atlanta, GA, 30308 USA ...
IEE Proceedings - Circuits, Devices and Systems, 1997
Six IOGHz MOS VCOs were designed and fabricated in the IBM 6RF 0.25um CMOS process. Their oscilla... more Six IOGHz MOS VCOs were designed and fabricated in the IBM 6RF 0.25um CMOS process. Their oscillation frequency, output amplitude and phase noise performance are measured and compared, and the results confirm that replacing shielded-ground inductors with high-resistvity substrate inductors improves phase noise performance. Capacitive source degeneration has also been identified as a performance limiting mechanism in MOS based VCOs rather than performance enhancing as in BJT based VCOs.
2023 IEEE 13th Annual Computing and Communication Workshop and Conference (CCWC)
IEEE Access
Massive MIMO and mmWave communication are the technologies for achieving 5G design goals. Fortuna... more Massive MIMO and mmWave communication are the technologies for achieving 5G design goals. Fortunately, these two technologies share a symbiotic integration. As a result, amalgamating mmWave communications with massive MIMO forms,mmWave-massive MIMO,'' which significantly improves spectral and energy efficiency. It also achieves high multiplexing gains and increases mobile network capacity. However, massive MIMO, mmWave communications, and mmWave-massive MIMO systems have been studied independently. Consequently, this article explores the ideas, performances, comparisons, and discussions of these three 5G technologies jointly, considering their precoding and beamforming methods. On the other hand, the complexity of these technologies increases when a large number of antennas and radio frequencies (RFs) are used. Thus, several investigations are going on to search for the appropriate precoding and beamforming strategies with low cost, power, and complexity. Therefore, massive MIMO linear precoding techniques such as zero-forcing, maximum ratio transmission, regularized zero-forcing, truncated polynomial expansion and phased zero forcing are addressed in this work. In addition, the most common non-linear precoding schemes: dirty-paper coding, Tomlinson-Harashima, and vector perturbation, are presented. Furthermore, a detailed discussion of the beamforming techniques called analog, digital, and hybrid analog-digital beamforming schemes is included. We also examine the potential of hybrid analog-digital beamforming with its fully-connected and sub-connected architecture approaches in making mmWave massive MIMO a reality. We evaluate their performance with the parameters: bit error rate, signal to noise ratio, complexity, spectral efficiency, and energy efficiency. According to the analytical and simulation results, the partially-connected hybrid analog/digital beamforming architecture offers better all-over performance for mmWave-Massive MIMO communications by compromising: power consumption, cost, complexity, and performance. Finally, the potential future directions in mmWave-massive MIMO precoding and beamforming challenges are addressed.
Sensors, 2022
An increase in the number of transmit antennas (M) poses an equivalent rise in the number of Radi... more An increase in the number of transmit antennas (M) poses an equivalent rise in the number of Radio Frequency (RF) chains associated with each antenna element, particularly in digital beamforming. The chain exhibits a substantial amount of power consumption accordingly. Hence, to alleviate such problems, one of the potential solutions is to reduce the number of RFs or to minimize their power consumption. In this paper, low-resolution Digital to Analogue Conversion (DAC) and transmit antenna selection at the downlink are evaluated to favour reducing the total power consumption and achieving energy efficiency in mMIMO with reasonable complexity. Antenna selection and low-resolution DAC techniques are proposed to leverage massive MIMO systems in free space and Close In (CI) path-loss models. The simulation results show that the power consumption decreases with antenna selection and low-resolution DAC. Then, the system achieves more energy efficiency than without low-resolution of DAC an...
2021 55th Annual Conference on Information Sciences and Systems (CISS), 2021
This paper proposes a novel energy efficient beamforming and DOA estimation scheme called RLS-MUS... more This paper proposes a novel energy efficient beamforming and DOA estimation scheme called RLS-MUSIC algorithm. First, we study different adaptive beamforming algorithms and receive signal Degree-of-Arrival (DOA) estimation techniques for wireless communication network application in reference to their effect on energy efficiency. Taking linear array smart antenna elements geometry, which is mostly used antenna array geometry, Recursive Least Square (RLS) adaptive beam-forming algorithm and Multiple Signal Classification (MUSIC) DOA estimation technique are identified as the reference input methods to model the new energy efficient scheme. Using an energy model, which is as a function of beam-width, signal transmission strength (range), and signal-to-noise-interference ratio (SNIR), we evaluate the total amount of energy spent during beam-formation. Finally, the energy gain due to RLS-MUSIC scheme is compared with that of RLS alone. The results show that the RLS-MUSIC scheme based access-points/base-station antenna systems consume less energy during beam formation and they generate beams with narrower beam-width, lower side lobe level and better deep null.
2017 IEEE 15th Intl Conf on Dependable, Autonomic and Secure Computing, 15th Intl Conf on Pervasive Intelligence and Computing, 3rd Intl Conf on Big Data Intelligence and Computing and Cyber Science and Technology Congress(DASC/PiCom/DataCom/CyberSciTech), 2017
In this paper, physical layer security-secrecy capacity– is investigated with respect to energy e... more In this paper, physical layer security-secrecy capacity– is investigated with respect to energy efficient antenna beam forming mechanism. Energy consumption per RLS beam formation algorithm is studied and compared against the combination of RLS-Kaiser windowing function using a new energy model in the smart antenna system. The investigation is carried out on linear array geometry with element spacing of 0.5λ. The result shows that; RLS-Kaiser combination consumes less energy per beam formation than the RLS algorithm. In addition to that, we have shown the amount of energy saved by using RLS-Kaiser combination. Finally, we have shown the advantage of using RLS-Kaiser combination during beam formation. This combination helps in achieving both spectral efficiency and energy efficiency at the same time by avoiding interference because of side lobe and saving the energy that would be wasted at a side lobe respectively. On the other hand, physical layer security can be achieved by saving ...
2020 IEEE Applied Imagery Pattern Recognition Workshop (AIPR), 2020
The Internet of Things (IoT) is growing with the advancement of technology. Many vendors are crea... more The Internet of Things (IoT) is growing with the advancement of technology. Many vendors are creating IoT devices to leverage the quality of life of consumers. These devices include smart grids, smart homes, smart health care systems, smart transportation, and many other applications. IoT devices interact with the environment and each other using sensors and actuators. However, the widespread proliferation of IoT devices poses many cybersecurity threats. The IoT devices’ interconnection opens the door to attackers who try to gain unauthorized access to these devices. For many IT networks, establishing trust and security during the device operation is challenging. Further, devices also may leak vital information, which is a significant concern in cybersecurity. Prior research has shown that security breaches have increased by 67% over the past five years, and 95% of HTTPs servers are vulnerable to Man-in-the-middle (MIM) attacks. This paper examines attack datasets from the Hacking and Countermeasure Research Lab (HCRL) collected from real-life IoT devices that include smart cameras, laptops, and smartphones [1]. We present a model using Random Forest, Logistic Regression, and Decision Tree. Results indicate that the overall detection accuracy is 98-100%, which is more promising than traditional Intrusion Detection Systems (IDS).
2021 IEEE SmartWorld, Ubiquitous Intelligence & Computing, Advanced & Trusted Computing, Scalable Computing & Communications, Internet of People and Smart City Innovation (SmartWorld/SCALCOM/UIC/ATC/IOP/SCI), 2021
Internet of Things (IoT) has infiltrated the digital realm, and critical efforts are being made t... more Internet of Things (IoT) has infiltrated the digital realm, and critical efforts are being made to create robust security for these technologies. However, with increasingly sophisticated attacks, it is essential to understand IoT device security in depth. We orchestrated Denial of Service (DoS) attacks for four different IoT devices through network flooding to understand the device vulnerabilities from the network level. We conducted our experiment in the lab environment using other IoT devices, including the Amazon Echo, a smart light-bulb, a smart camera, and a smart garage door opener. We used Raspberry Pi as the main target to access other network devices with different protocols to conduct the DoS attack. We generated the DoS attack using Kali Linux installed in a virtual environment. This experiment demonstrated that hackers might exploit sensor vulnerabilities to gain unauthorized network access and use user data through various IoT devices. We proposed an effective Intrusion Detection technique using a combination of machine learning classifiers and deep learning. The machine learning models include logistic regression, decision tree, random forest, and support vector machine to detect and mitigate the attack. The outcomes show the algorithm which presents the highest degree of attack detection accuracy. Our findings also show that DoS attacks continue to be a significant concern even with improved technologies and security protocols. Finally, we provide design implications to address such critical security flaws.
2021 8th International Conference on Future Internet of Things and Cloud (FiCloud), 2021
Technology is evolving exponentially, and researchers are seeking solutions to answer questions r... more Technology is evolving exponentially, and researchers are seeking solutions to answer questions related to the benefits of using advanced IoT cloud computing platforms. There is a tremendous amount of research activity regarding cyberattacks on Internet of Things (IoT) devices. IoT ecosystems consist of physical objects or devices that interact with the environment, extract data, and communicate with a higher authority such as a cloud. Many IoT users are unaware of the underlying platforms that facilitate data collection. These platforms are also known as middleware, sit between the connectivity and application layers. There are more than 1000 IoT platforms on the market today, where many are open-source or commercial and provide services that include a device, data, and connection management. This paper presents a comparative analysis of some commercial and open-source IoT platforms such as Arm Pelion, Microsoft Azure cloud, ThingWorx, FIWARE, and ThingSpeak. We compare system architecture, management schemes, protocols, interoperability, and security. We used experimentation with real-world Internet of Things devices for the comparative study. We proposed a novel design architecture of a fully secure testbed that integrates critical components of an IoT platform. Hopefully, this study will motivate manufacturers to provide a better quality of service to help customers select the best IoT platform for their needs.
2021 IEEE 11th Annual Computing and Communication Workshop and Conference (CCWC), 2021
Smart antenna consist of multiple antenna elements at the transmitting and/or receiving side of t... more Smart antenna consist of multiple antenna elements at the transmitting and/or receiving side of the communication link, whose signals are processed adaptively in order to exploit the spatial dimension of the wireless channel. Depending on the signal process at the transmitter, receiver, or both ends of the communication link, the smart antenna technique can increase the capacity of the wireless network by improving link quality using impairments mitigation mechanisms. This work investigates different smart antenna beamforming algorithms considering energy efficiency using adaptive antenna techniques with a uniform linear array geometry. The schemes used for investigation are half power beam width, side lobe level, array spacing and variable node distance (range). The results demonstrate that Constant module (CMA) algorithm makes antenna arrays more energy efficient while it has high mean square error. On the other hand, Recursive Least Square (RLS) is recommended for next-generation wireless networks because it provides significant energy efficiency while keeping mean square error minimum than the rest of the algorithms.
The continued lithographic scaling of silicon devices together with the exponential increases in ... more The continued lithographic scaling of silicon devices together with the exponential increases in clock speed and integration density have produced phenomenal gains for the industry, but have led to emerging problems with clock skew, power consumption, and inductive power supply noise. In an attempt to create systems better able to adapt to these conditions while ensuring a robust range of design choices, two different implementation methodologies were developed. The first of these is the Improved Latency Globally Asynchronous Locally Synchronous (IL-GALS) methodology, which aims to improve the performance of typical GALS implementations by removing the need for either pauseable clocks or non-zero pipeline slack by paralleling the detection of a failure condition with the actual computation. This changes the problem of synchronization from one with some minimum forward latency for resolution to one where the latency penalty instead comes as a pipeline stall, much as is the case with ...