2020
DOI: 10.1109/jiot.2019.2951405
|View full text |Cite
|
Sign up to set email alerts
|

Secure Brain-to-Brain Communication With Edge Computing for Assisting Post-Stroke Paralyzed Patients

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
9
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
6
2

Relationship

2
6

Authors

Journals

citations
Cited by 24 publications
(10 citation statements)
references
References 23 publications
0
9
0
Order By: Relevance
“…Improvements and standardizations in the realm of defining these systems is also an important step, as the definitions provided in the literature are inconsistent. Studies focus too much on their application for transmitting motor information, as in Mashat et al (2017), overly specify attributes such as wireless transmission, as in Rajesh et al (2020), or only specify the inclusion of a BCI and CBI portion and very little else, as in Rao et al (2014) and Li and Zhang (2016). More cohesion in the field as to what type of B2BI is being presented would allow for quicker communication of applications for these devices.…”
Section: Discussion B2bi Systemsmentioning
confidence: 99%
See 2 more Smart Citations
“…Improvements and standardizations in the realm of defining these systems is also an important step, as the definitions provided in the literature are inconsistent. Studies focus too much on their application for transmitting motor information, as in Mashat et al (2017), overly specify attributes such as wireless transmission, as in Rajesh et al (2020), or only specify the inclusion of a BCI and CBI portion and very little else, as in Rao et al (2014) and Li and Zhang (2016). More cohesion in the field as to what type of B2BI is being presented would allow for quicker communication of applications for these devices.…”
Section: Discussion B2bi Systemsmentioning
confidence: 99%
“…Of the studies that employed EEG, either motor imagery (MI) or steady state visually evoked potentials (SSVEP) were measured by the BCI. MI EEG was used as a simple method of generating a binary signal, based on event related desynchronization (ERD) between the left and right hemispheres during right and left hand/feet movements, in Grau et al (2014), Rao et al (2014), and Rajesh et al (2020). MI EEG also functioned as a direct translation, where the imagined movement of a hand corresponded to a similar action on the receiving end (right hand movement begets right turn, etc.)…”
Section: Bci Methodologymentioning
confidence: 99%
See 1 more Smart Citation
“…If the measured tilt passes a particular threshold, a similar emergency message will be given to the caregiver via a wireless transmitter. The secure communication is ensured between paralyzed persons and caregivers using a double encrypted NTSA algorithm [26]. The material used for the development is carbon fiber, so that it can easily replicate various body movements with ease.…”
Section: Proposed System a System Architecturementioning
confidence: 99%
“…These protocols have an essential role in energy conservation as they control the main sources of energy wastage, i.e., packet collision, overhearing, control packet overhead, and idle listening. MAC protocols are classified as either schedule-based [13], [14], [15] or contention-based [16], [17], [18]. In the case of contention-based protocols, e.g., Carrier Sense Multiple Access/Collision Avoidance (CSMA/CA), the devices compete with each other to access the transmission channels for data communication.…”
Section: Introductionmentioning
confidence: 99%