首页 > 最新文献

2011 International Conference on Electronics, Communication and Computing Technologies最新文献

英文 中文
A biometric approach towards recognizing face in various dark illuminations 在各种黑暗光照下识别人脸的生物识别方法
S. Zeenathunisa, A. Jaya, M. Rabbani
Face Recognition is a computerized biometric modality which automatically identifies an individual's face for the purpose of recognition. The ability to recognize human faces can be categorized under two senses, the former is the biometric identification and the later is the visual perception. The biometric identification can be done by obtaining a person's image and matching the same against the set of known images whereas the later is how the system percepts the familiar faces and recognize them. This paper presents such a biometric identification of the frontal static face image subjected in various dark illuminations. Face Recognition Biometric Systems automatically recognize the individuals based on their physiological characteristics. The research on such areas has been conducted for more than thirty years, but still more processes and better techniques for biometric facial extraction and recognition are required. This paper presents a framework on such issue by integrating the preprocessing method, local feature extractor and a recognizer for face recognition. An automatic FRBS has been developed that uses 1) Local Binary Pattern and 2) k — Nearest Neighbor classifier. Experimental results based on the Yale — B database show that the use of LBP and k-NN is able to improve the face recognition performance in various dark illuminations.
人脸识别是一种计算机化的生物识别方式,它可以自动识别个人的面部以达到识别的目的。人脸识别的能力可以分为两种,一种是生物特征识别,另一种是视觉感知。生物特征识别可以通过获取一个人的图像并将其与一组已知图像进行匹配来完成,而后者是系统如何感知熟悉的面孔并识别它们。本文提出了一种针对不同光照条件下的正面静态人脸图像的生物特征识别方法。人脸识别生物识别系统根据人的生理特征自动识别人。这方面的研究已经进行了三十多年,但仍需要更多的过程和更好的技术来进行生物特征面部提取和识别。本文通过将预处理方法、局部特征提取器和人脸识别器相结合,提出了一个人脸识别框架。本文开发了一种基于局部二值模式和k -近邻分类器的自动快速快速分类系统。基于Yale - B数据库的实验结果表明,使用LBP和k-NN能够提高在各种黑暗光照下的人脸识别性能。
{"title":"A biometric approach towards recognizing face in various dark illuminations","authors":"S. Zeenathunisa, A. Jaya, M. Rabbani","doi":"10.1109/ICECCT.2011.6077059","DOIUrl":"https://doi.org/10.1109/ICECCT.2011.6077059","url":null,"abstract":"Face Recognition is a computerized biometric modality which automatically identifies an individual's face for the purpose of recognition. The ability to recognize human faces can be categorized under two senses, the former is the biometric identification and the later is the visual perception. The biometric identification can be done by obtaining a person's image and matching the same against the set of known images whereas the later is how the system percepts the familiar faces and recognize them. This paper presents such a biometric identification of the frontal static face image subjected in various dark illuminations. Face Recognition Biometric Systems automatically recognize the individuals based on their physiological characteristics. The research on such areas has been conducted for more than thirty years, but still more processes and better techniques for biometric facial extraction and recognition are required. This paper presents a framework on such issue by integrating the preprocessing method, local feature extractor and a recognizer for face recognition. An automatic FRBS has been developed that uses 1) Local Binary Pattern and 2) k — Nearest Neighbor classifier. Experimental results based on the Yale — B database show that the use of LBP and k-NN is able to improve the face recognition performance in various dark illuminations.","PeriodicalId":158960,"journal":{"name":"2011 International Conference on Electronics, Communication and Computing Technologies","volume":"87 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-11-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127365877","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Comprehensive analysis of delay in UDSM CMOS circuits UDSM CMOS电路延迟的综合分析
J. Samanta, B. P. De
In this paper, we have developed a simple and accurate delay model for any Ultra Deep Sub-micron (UDSM) CMOS inverter, NAND2 & NOR2 based on nth power law of MOSFET model when the channel length is of the order of less than or equal to 90nm. We have taken all the parameters from BSIM.4.6.1 manual. This work derives analytical expression for the delay model of a CMOS inverter including all sorts of secondary effects such as Body Bias effect, Channel Length Modulation Effect (CLM), Velocity Saturation effect, Drain Induced Barrier Lowering (DIBL), etc which may occur in the Ultra Deep Submicron MOS devices. We also extend our delay model for 2 input CMOS NAND and NOR gate. Our result is better than nth power law and Cadence (UMC90nm) simulation result with respect to both quality and estimation time. Our proposed model gives an average error of only 3.63% with compare to Cadence Simulation result.
在本文中,我们基于MOSFET模型的n次幂定律,在通道长度小于等于90nm的数量级下,建立了一个简单准确的延迟模型,适用于任何超深亚微米(UDSM) CMOS逆变器NAND2和NOR2。我们从BSIM.4.6.1手册中获取了所有参数。本文推导了包含超深亚微米MOS器件中可能出现的体偏置效应、信道长度调制效应(CLM)、速度饱和效应、漏极诱导势垒降低(DIBL)等各种次要效应的CMOS逆变器延迟模型的解析表达式。我们还扩展了2输入CMOS NAND和NOR门的延迟模型。我们的结果在质量和估计时间方面都优于n次幂律和Cadence (UMC90nm)的模拟结果。与Cadence仿真结果相比,该模型的平均误差仅为3.63%。
{"title":"Comprehensive analysis of delay in UDSM CMOS circuits","authors":"J. Samanta, B. P. De","doi":"10.1109/ICECCT.2011.6077064","DOIUrl":"https://doi.org/10.1109/ICECCT.2011.6077064","url":null,"abstract":"In this paper, we have developed a simple and accurate delay model for any Ultra Deep Sub-micron (UDSM) CMOS inverter, NAND2 & NOR2 based on nth power law of MOSFET model when the channel length is of the order of less than or equal to 90nm. We have taken all the parameters from BSIM.4.6.1 manual. This work derives analytical expression for the delay model of a CMOS inverter including all sorts of secondary effects such as Body Bias effect, Channel Length Modulation Effect (CLM), Velocity Saturation effect, Drain Induced Barrier Lowering (DIBL), etc which may occur in the Ultra Deep Submicron MOS devices. We also extend our delay model for 2 input CMOS NAND and NOR gate. Our result is better than nth power law and Cadence (UMC90nm) simulation result with respect to both quality and estimation time. Our proposed model gives an average error of only 3.63% with compare to Cadence Simulation result.","PeriodicalId":158960,"journal":{"name":"2011 International Conference on Electronics, Communication and Computing Technologies","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-11-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116847933","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Developing Application Specific Integrated Circuits(ASIC) for cloud computing 开发用于云计算的专用集成电路(ASIC)
Pannerselvam Velmyl
Cloud computing is the emerging computing technology platform which resolves for a single platform for diversive applications. The paper takes up the issues of security, migration of applications from an internal data centre into cloud, scalability, billing and security. The paper thus points out the hardware incongruence for the cloud computing and presents key concepts for fabrication of VLSI chips. For example, the bills for cloud storage access is based on I/0 count. This metric is inaccurate since the cost of handling the bits varies from disk to disk. This arises due to variance of random access and sequential access used in disk. In sequential access, data is written to or read from one portion of the disk in a continual stream of bits. In random access, the disk head must jump around to different parts of the disk to read or write data. This disparity is immense since, sequential access can achieve a throughput on an average disk of up to 63.5MB/s (megabits per second), whereas random access can only be executed at 1.5MB/s. Techniques for reducing the random access and unnecessary metadata lookups are analyzed. The external threats for cloud from hardware hacking is attended and key alternatives are suggested for networking environment.
云计算是一种新兴的计算技术平台,它解决了多种应用的单一平台问题。本文讨论了安全性、应用程序从内部数据中心迁移到云、可扩展性、计费和安全性等问题。因此,本文指出了云计算的硬件不一致性,并提出了VLSI芯片制造的关键概念。例如,访问云存储的话费按I/0计费。这个度量是不准确的,因为处理比特的成本因磁盘而异。这是由于磁盘中使用的随机访问和顺序访问的差异造成的。在顺序访问中,数据以连续的位流从磁盘的某一部分写入或读取。在随机存取中,磁头必须跳到磁盘的不同部分来读写数据。这种差异是巨大的,因为顺序访问可以在平均磁盘上实现高达63.5MB/s(兆比特每秒)的吞吐量,而随机访问只能以1.5MB/s的速度执行。分析了减少随机访问和不必要的元数据查找的技术。讨论了硬件黑客攻击对云计算的外部威胁,并针对网络环境提出了关键的替代方案。
{"title":"Developing Application Specific Integrated Circuits(ASIC) for cloud computing","authors":"Pannerselvam Velmyl","doi":"10.1109/ICECCT.2011.6077067","DOIUrl":"https://doi.org/10.1109/ICECCT.2011.6077067","url":null,"abstract":"Cloud computing is the emerging computing technology platform which resolves for a single platform for diversive applications. The paper takes up the issues of security, migration of applications from an internal data centre into cloud, scalability, billing and security. The paper thus points out the hardware incongruence for the cloud computing and presents key concepts for fabrication of VLSI chips. For example, the bills for cloud storage access is based on I/0 count. This metric is inaccurate since the cost of handling the bits varies from disk to disk. This arises due to variance of random access and sequential access used in disk. In sequential access, data is written to or read from one portion of the disk in a continual stream of bits. In random access, the disk head must jump around to different parts of the disk to read or write data. This disparity is immense since, sequential access can achieve a throughput on an average disk of up to 63.5MB/s (megabits per second), whereas random access can only be executed at 1.5MB/s. Techniques for reducing the random access and unnecessary metadata lookups are analyzed. The external threats for cloud from hardware hacking is attended and key alternatives are suggested for networking environment.","PeriodicalId":158960,"journal":{"name":"2011 International Conference on Electronics, Communication and Computing Technologies","volume":"115 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-11-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116590004","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Optimized gain EDFA of different lengths with an influence of pump power 在泵浦功率影响下,优化了不同长度的增益EDFA
S. Semmalar, Poonkuzhali, P. Devi
This Paper describes the simulation models of EDFA(Erbium Doped Fiber Amplifier) of different Lengths(10m, 50m and 120m) with optimized Gain and maintained noise figure is obtained using single pumping with the wavelengths 980nm or 1480nm and the results are plotted with an influence of various Pump power. In DWDM networks EDFA'S are an imperative elements and are regarded as a cost effective replacement of classical optoelectronic regenerative repeaters EDFA plays an important role in improvement of performance of optical fiber transmission systems. The proposed model consists of Input source with multiple channels, pumping source with the wavelengths 980nm or 1480nm and Isolator. The Erbium doped fiber amplifier's gain which appears in the signal to noise ratio expression is computed from the simulation. The resulting models accurately represent EDFA optimized gain. Simulation results, EDFA length of 10m and with 980nm pump of power 0.22W gives the gain of 40.17DB and for the same length of EDFA with 980nm pump of power 0.62W gives the optimized gain of 44.3DB and also with 980nm pump of power 1W gives the maximum optimized gain of 46DB and compared the results of Gain and noise figure with the wavelength of 1480nm and also with different lengths. This is applicable in Network reconfiguration and Multi-vendor networks and also addition of new services and wavelengths.
本文描述了在980nm和1480nm波长单次泵浦的情况下,获得了不同长度(10m、50m和120m)的EDFA(掺铒光纤放大器)在优化增益和保持噪声系数下的仿真模型,并绘制了不同泵浦功率对仿真结果的影响图。在DWDM网络中,EDFA是必不可少的元件,被认为是替代传统光电再生中继器的一种经济有效的方法,EDFA对提高光纤传输系统的性能起着重要的作用。该模型由多通道输入源、波长为980nm或1480nm的抽运源和隔离器组成。通过仿真计算得到了在信噪比表达式中出现的掺铒光纤放大器的增益。所得模型准确地表示了EDFA优化后的增益。仿真结果表明,长度为10m的EDFA,功率为0.22W的980nm泵浦的增益为40.17DB,相同长度的EDFA,功率为0.62W的980nm泵浦的优化增益为44.3DB,功率为1W的980nm泵浦的最大优化增益为46DB,并比较了波长为1480nm和不同长度时的增益和噪声系数结果。这适用于网络重构和多厂商网络,也适用于增加新的业务和波长。
{"title":"Optimized gain EDFA of different lengths with an influence of pump power","authors":"S. Semmalar, Poonkuzhali, P. Devi","doi":"10.1109/ICECCT.2011.6077076","DOIUrl":"https://doi.org/10.1109/ICECCT.2011.6077076","url":null,"abstract":"This Paper describes the simulation models of EDFA(Erbium Doped Fiber Amplifier) of different Lengths(10m, 50m and 120m) with optimized Gain and maintained noise figure is obtained using single pumping with the wavelengths 980nm or 1480nm and the results are plotted with an influence of various Pump power. In DWDM networks EDFA'S are an imperative elements and are regarded as a cost effective replacement of classical optoelectronic regenerative repeaters EDFA plays an important role in improvement of performance of optical fiber transmission systems. The proposed model consists of Input source with multiple channels, pumping source with the wavelengths 980nm or 1480nm and Isolator. The Erbium doped fiber amplifier's gain which appears in the signal to noise ratio expression is computed from the simulation. The resulting models accurately represent EDFA optimized gain. Simulation results, EDFA length of 10m and with 980nm pump of power 0.22W gives the gain of 40.17DB and for the same length of EDFA with 980nm pump of power 0.62W gives the optimized gain of 44.3DB and also with 980nm pump of power 1W gives the maximum optimized gain of 46DB and compared the results of Gain and noise figure with the wavelength of 1480nm and also with different lengths. This is applicable in Network reconfiguration and Multi-vendor networks and also addition of new services and wavelengths.","PeriodicalId":158960,"journal":{"name":"2011 International Conference on Electronics, Communication and Computing Technologies","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-11-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130781659","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 17
Denoising of MST radar data using complex wavelets MST雷达数据的复小波去噪
C. Madhu, T. Reddy
This paper discusses the application of complex wavelet transform (CWT) which has significant advantages over real wavelet transform. CWT is a form of discrete wavelet transform, which generates complex coefficients by using a dual tree of wavelet filters to obtain their real and imaginary parts. In this paper we implement Selesnick's idea of dual tree complex wavelet transform where it can be formulated for standard wavelet filters without special filter design. We examine the behavior of 1 dimensional signal and implement the method for the analysis and synthesis of signal in frequency domain. Analysis and synthesis of a signal is performed on a test signal to verify the CWT application on 1D signal. The same is implemented for the MST radar signal. In this paper, CWT with custom thresholding algorithm is proposed for cleaning the spectrum. The proposed algorithm is self-consistent in detecting wind speeds up to a height of 20 km, in contrast to existing methods, which estimates the spectrum manually and failed at higher altitudes.
本文讨论了复小波变换与实小波变换相比具有显著优势的应用。CWT是离散小波变换的一种形式,它利用小波滤波器的对偶树来获取其实部和虚部,从而产生复系数。在本文中,我们实现了Selesnick的对偶树复小波变换思想,该思想可以表述为不需要特殊滤波器设计的标准小波滤波器。我们研究了一维信号的行为,并实现了信号在频域的分析和合成方法。对测试信号进行分析和合成,验证CWT在一维信号上的应用。对于MST雷达信号也是如此。本文提出了一种基于自定义阈值算法的CWT频谱清洗方法。与现有的人工估计频谱的方法相比,该算法在检测20公里高度的风速方面具有自一致性,并且在更高的高度上失败。
{"title":"Denoising of MST radar data using complex wavelets","authors":"C. Madhu, T. Reddy","doi":"10.1109/ICECCT.2011.6077065","DOIUrl":"https://doi.org/10.1109/ICECCT.2011.6077065","url":null,"abstract":"This paper discusses the application of complex wavelet transform (CWT) which has significant advantages over real wavelet transform. CWT is a form of discrete wavelet transform, which generates complex coefficients by using a dual tree of wavelet filters to obtain their real and imaginary parts. In this paper we implement Selesnick's idea of dual tree complex wavelet transform where it can be formulated for standard wavelet filters without special filter design. We examine the behavior of 1 dimensional signal and implement the method for the analysis and synthesis of signal in frequency domain. Analysis and synthesis of a signal is performed on a test signal to verify the CWT application on 1D signal. The same is implemented for the MST radar signal. In this paper, CWT with custom thresholding algorithm is proposed for cleaning the spectrum. The proposed algorithm is self-consistent in detecting wind speeds up to a height of 20 km, in contrast to existing methods, which estimates the spectrum manually and failed at higher altitudes.","PeriodicalId":158960,"journal":{"name":"2011 International Conference on Electronics, Communication and Computing Technologies","volume":"56 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-11-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125862824","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Evaluation of the performance of FSO system using OOK and M-PPM modulation schemes in inter-satellite links with turbo codes 基于turbo码的卫星间链路中使用OOK和M-PPM调制方案的FSO系统性能评估
Naveen Kumar, V. Jain, Subrat Kar
This paper gives a detailed overview of the inter-satellite links used in free space optical (FSO) communication. FSO communication uses laser technology to send and receive data. For the modulation of message signal, OOK and 8-PPM schemes are used. As energy in the inter-satellite link is a major constraint, OOK and M-PPM provide better options than others since they have to remain ON for the transmission of bit ‘1’ only. In this paper, turbo code is used for improving the system performance. Turbo code adds redundancy to the input block code. Therefore, it minimizes the average weight of the code and reduces the data rate. At the same time, it lowers the probability of error. Overall performance of the system improves significantly as evident from the computed results.
本文详细介绍了自由空间光通信中使用的卫星间链路。FSO通信使用激光技术发送和接收数据。对于消息信号的调制,采用了OOK和8ppm方案。由于卫星间链路中的能量是一个主要限制因素,OOK和M-PPM提供了比其他方案更好的选择,因为它们只能在传输1位时保持ON状态。本文采用turbo码来提高系统性能。Turbo码增加了输入块码的冗余。因此,它最小化了代码的平均权重并降低了数据速率。同时,它降低了出错的概率。计算结果表明,系统的整体性能得到了显著提高。
{"title":"Evaluation of the performance of FSO system using OOK and M-PPM modulation schemes in inter-satellite links with turbo codes","authors":"Naveen Kumar, V. Jain, Subrat Kar","doi":"10.1109/ICECCT.2011.6077070","DOIUrl":"https://doi.org/10.1109/ICECCT.2011.6077070","url":null,"abstract":"This paper gives a detailed overview of the inter-satellite links used in free space optical (FSO) communication. FSO communication uses laser technology to send and receive data. For the modulation of message signal, OOK and 8-PPM schemes are used. As energy in the inter-satellite link is a major constraint, OOK and M-PPM provide better options than others since they have to remain ON for the transmission of bit ‘1’ only. In this paper, turbo code is used for improving the system performance. Turbo code adds redundancy to the input block code. Therefore, it minimizes the average weight of the code and reduces the data rate. At the same time, it lowers the probability of error. Overall performance of the system improves significantly as evident from the computed results.","PeriodicalId":158960,"journal":{"name":"2011 International Conference on Electronics, Communication and Computing Technologies","volume":"39 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-11-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125638893","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 13
An approach towards improved cyber security by hardware acceleration of OpenSSL cryptographic functions 通过硬件加速OpenSSL加密功能来提高网络安全性的方法
A. Thiruneelakandan, T. Thirumurugan
Providing improved Information Security to the rapidly developing Cybernet System has become a vital factor in the present technically networked world. The information security concept becomes a more complicated subject when the more sophisticated system requirements and real time computation speed are considered. In order to solve these issues, lots of research and development activities are carried out and cryptography has been a very important part of any communication system in the recent years. Cryptographic algorithms fulfil specific information security requirements such as data integrity, confidentiality and authenticity. This work proposes an FPGA-based VLSI Crypto-System, integrating hardware that accelerates the cryptographic algorithms used in the SSL/TLS protocol. SSL v3 and TLS v1 protocol is deployed in the proposed system powered with a Nios-2 soft-core processor. The cipher functions used in SSL-driven connection are the Scalable Encryption Algorithm (SEA), Message Digest Algorithm (MD5), Secured Hash Algorithm (SHA2). These algorithms are accelerated in the VLSI Crypto-System that is on an Altera Cyclone III FPGA DE2 development board. The experimental results shows that, by hardware acceleration of SEA, MD5 and SHA2 cryptographic algorithms, the VLSI Crypto-System performance has increased in terms of speed, optimized area and enhanced level security for the target Cybernetic application.
为快速发展的赛博网络系统提供更好的信息安全已成为当今技术网络化世界的一个重要因素。当考虑到更加复杂的系统需求和实时计算速度时,信息安全的概念变得更加复杂。为了解决这些问题,人们进行了大量的研究和开发活动,近年来密码学已经成为任何通信系统的重要组成部分。密码算法满足特定的信息安全要求,如数据完整性、保密性和真实性。这项工作提出了一个基于fpga的VLSI加密系统,集成了加速SSL/TLS协议中使用的加密算法的硬件。在采用Nios-2软核处理器的系统中部署SSL v3和TLS v1协议。ssl驱动连接中使用的密码函数有可扩展加密算法(SEA)、消息摘要算法(MD5)、安全哈希算法(SHA2)。这些算法在Altera Cyclone III FPGA DE2开发板上的VLSI加密系统中加速。实验结果表明,通过对SEA、MD5和SHA2加密算法的硬件加速,VLSI加密系统的性能在速度、优化面积和提高级别安全性方面都得到了提高,适合目标控制论应用。
{"title":"An approach towards improved cyber security by hardware acceleration of OpenSSL cryptographic functions","authors":"A. Thiruneelakandan, T. Thirumurugan","doi":"10.1109/ICECCT.2011.6077061","DOIUrl":"https://doi.org/10.1109/ICECCT.2011.6077061","url":null,"abstract":"Providing improved Information Security to the rapidly developing Cybernet System has become a vital factor in the present technically networked world. The information security concept becomes a more complicated subject when the more sophisticated system requirements and real time computation speed are considered. In order to solve these issues, lots of research and development activities are carried out and cryptography has been a very important part of any communication system in the recent years. Cryptographic algorithms fulfil specific information security requirements such as data integrity, confidentiality and authenticity. This work proposes an FPGA-based VLSI Crypto-System, integrating hardware that accelerates the cryptographic algorithms used in the SSL/TLS protocol. SSL v3 and TLS v1 protocol is deployed in the proposed system powered with a Nios-2 soft-core processor. The cipher functions used in SSL-driven connection are the Scalable Encryption Algorithm (SEA), Message Digest Algorithm (MD5), Secured Hash Algorithm (SHA2). These algorithms are accelerated in the VLSI Crypto-System that is on an Altera Cyclone III FPGA DE2 development board. The experimental results shows that, by hardware acceleration of SEA, MD5 and SHA2 cryptographic algorithms, the VLSI Crypto-System performance has increased in terms of speed, optimized area and enhanced level security for the target Cybernetic application.","PeriodicalId":158960,"journal":{"name":"2011 International Conference on Electronics, Communication and Computing Technologies","volume":"103 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-11-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132337861","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
VLSI implementation of sorting network for ACSFD in WSN WSN中ACSFD分拣网络的VLSI实现
K. Baskaran, M. Raghu, R. R. Kumar
A fault-tolerant distributed decision fusion in the presence of sensor faults via Collaborative Sensor Fault Detection (CSFD) was used traditionally. CSFD scheme is proposed in which the results of a homogeneity test are used to identify the faulty nodes within the network such that their quantized messages can be filtered out when estimating the parameter of interest. The scheme can identify the faulty nodes efficiently and improve the performance of the decision fusion significantly. It achieves very good performance at the expense of such extensive computations as exponent and multiplication/division in the detecting process. In many real-time WSN applications, the fusion center might be implemented in an ASIC and included in a stand-alone device. Therefore, a simple and efficient decision fusion scheme requiring lower hardware cost and power consumption is extremely desired. In this paper, we propose the Approximated Collaborative Sensor Fault Detection (ACSFD) scheme and its VLSI architecture. Sorting operation are required in ACSFD to find out four biggest faulty node indexes for subsequent usage for this purpose. we have implemented different sorting algorithm to evaluate the efficiency of the sorting network.
传统上采用基于协同传感器故障检测(CSFD)的容错分布式决策融合方法。提出了CSFD方案,该方案使用同质性测试的结果来识别网络中的故障节点,从而在估计感兴趣参数时可以过滤掉它们的量化消息。该方案能够有效地识别故障节点,显著提高决策融合的性能。该方法在检测过程中不需要进行指数和乘法/除法等大量的计算,从而获得了很好的性能。在许多实时WSN应用中,融合中心可能在ASIC中实现,并包含在独立设备中。因此,迫切需要一种简单、高效、低硬件成本和低功耗的决策融合方案。在本文中,我们提出了近似协同传感器故障检测(ACSFD)方案及其VLSI架构。为此需要在ACSFD中进行排序操作,找出4个最大故障节点索引供后续使用。我们实现了不同的排序算法来评估排序网络的效率。
{"title":"VLSI implementation of sorting network for ACSFD in WSN","authors":"K. Baskaran, M. Raghu, R. R. Kumar","doi":"10.1109/ICECCT.2011.6077081","DOIUrl":"https://doi.org/10.1109/ICECCT.2011.6077081","url":null,"abstract":"A fault-tolerant distributed decision fusion in the presence of sensor faults via Collaborative Sensor Fault Detection (CSFD) was used traditionally. CSFD scheme is proposed in which the results of a homogeneity test are used to identify the faulty nodes within the network such that their quantized messages can be filtered out when estimating the parameter of interest. The scheme can identify the faulty nodes efficiently and improve the performance of the decision fusion significantly. It achieves very good performance at the expense of such extensive computations as exponent and multiplication/division in the detecting process. In many real-time WSN applications, the fusion center might be implemented in an ASIC and included in a stand-alone device. Therefore, a simple and efficient decision fusion scheme requiring lower hardware cost and power consumption is extremely desired. In this paper, we propose the Approximated Collaborative Sensor Fault Detection (ACSFD) scheme and its VLSI architecture. Sorting operation are required in ACSFD to find out four biggest faulty node indexes for subsequent usage for this purpose. we have implemented different sorting algorithm to evaluate the efficiency of the sorting network.","PeriodicalId":158960,"journal":{"name":"2011 International Conference on Electronics, Communication and Computing Technologies","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-11-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114931351","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Performance analysis of labeling technique for coronary arteries in angiogram images 冠状动脉血管造影图像标记技术的性能分析
A. Arulmurugan, G. Murugadass, D. Sharp, P. Kumar
The medical imaging analysis is the process to view and understand the internal structure and function of the physiological system in medical diagnostic and therapeutic applications. Coronary artery angiography is playing a decisive role to determine the presence of cardiac diseases and the consequences for a therapeutic approach. So, the coronary angiography is remained for determining the extent, location and severity of the cardiac diseases. Automatically segmenting the coronary arteries in X-ray angiogram images has been an active area of research over the past several years and is an important task in medical imaging. Here mathematical morphological operations are used for segmenting the arteries. This method was impleme nted for a variety of clinical images. The results indicate the feasibility of achieving robust and consistently accurate image segmentation through this method.
医学影像分析是在医学诊断和治疗应用中观察和了解生理系统内部结构和功能的过程。冠状动脉造影在确定心脏疾病的存在和治疗方法的后果方面起着决定性作用。因此,冠状动脉造影仍然是确定心脏疾病的范围、位置和严重程度的重要手段。在过去的几年里,冠状动脉的自动分割一直是一个活跃的研究领域,也是医学成像中的一项重要任务。这里用数学形态学操作来分割动脉。该方法应用于多种临床图像。结果表明,该方法可以实现鲁棒性和一致性的精确图像分割。
{"title":"Performance analysis of labeling technique for coronary arteries in angiogram images","authors":"A. Arulmurugan, G. Murugadass, D. Sharp, P. Kumar","doi":"10.1109/ICECCT.2011.6077077","DOIUrl":"https://doi.org/10.1109/ICECCT.2011.6077077","url":null,"abstract":"The medical imaging analysis is the process to view and understand the internal structure and function of the physiological system in medical diagnostic and therapeutic applications. Coronary artery angiography is playing a decisive role to determine the presence of cardiac diseases and the consequences for a therapeutic approach. So, the coronary angiography is remained for determining the extent, location and severity of the cardiac diseases. Automatically segmenting the coronary arteries in X-ray angiogram images has been an active area of research over the past several years and is an important task in medical imaging. Here mathematical morphological operations are used for segmenting the arteries. This method was impleme nted for a variety of clinical images. The results indicate the feasibility of achieving robust and consistently accurate image segmentation through this method.","PeriodicalId":158960,"journal":{"name":"2011 International Conference on Electronics, Communication and Computing Technologies","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-11-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127297398","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
EDA based automatic detection of epileptic seizures using wireless system 基于EDA的无线癫痫发作自动检测系统
S. Ganesan, T. Victoire, R. Ganesan
Epilepsy is a neurological disorder which manifest by recurrent involuntary seizures. The seizures dynamics is wide ranging from blinking of the eye to severe muscle contraction. The last category can be life threatening for the person. Currently, the epileptic seizures are impossible to predict, an alternative is to detect the seizure as early as possible and to tell the care giver that a seizure occurred and take action. The current monitoring systems involve audio and video observation which is difficult to analyze in particular during the night. The wireless electronic diagnosing system designed here is exclusively meant for epilepsy patients. The system helps in accurately predicting the occurrence of seizures. In this paper, a new scheme is proposed for detecting epileptic seizures from the skin of epileptic patients. In this paper, a system with wireless electronic diagnosing system that combines Electro dermal activity (EDA), GPS, GSM, and ARM processor is proposed. This paper provides the location of epileptic patients through GPS technology and warning to the caring persons of epileptic patient through GSM technology.
癫痫是一种神经系统疾病,表现为反复的不自主发作。癫痫发作的动态范围很广,从眨眼到严重的肌肉收缩。最后一类可能会威胁到人的生命。目前,癫痫发作是无法预测的,另一种选择是尽早发现癫痫发作,并告诉护理人员癫痫发作并采取行动。目前的监测系统涉及音频和视频观察,难以分析,特别是在夜间。这里设计的无线电子诊断系统是专门为癫痫患者设计的。该系统有助于准确预测癫痫发作的发生。本文提出了一种从癫痫患者皮肤检测癫痫发作的新方案。本文提出了一种结合皮肤电活动(EDA)、GPS、GSM和ARM处理器的无线电子诊断系统。本文通过GPS技术提供癫痫病人的定位,通过GSM技术对癫痫病人的看护人员进行预警。
{"title":"EDA based automatic detection of epileptic seizures using wireless system","authors":"S. Ganesan, T. Victoire, R. Ganesan","doi":"10.1109/ICECCT.2011.6077068","DOIUrl":"https://doi.org/10.1109/ICECCT.2011.6077068","url":null,"abstract":"Epilepsy is a neurological disorder which manifest by recurrent involuntary seizures. The seizures dynamics is wide ranging from blinking of the eye to severe muscle contraction. The last category can be life threatening for the person. Currently, the epileptic seizures are impossible to predict, an alternative is to detect the seizure as early as possible and to tell the care giver that a seizure occurred and take action. The current monitoring systems involve audio and video observation which is difficult to analyze in particular during the night. The wireless electronic diagnosing system designed here is exclusively meant for epilepsy patients. The system helps in accurately predicting the occurrence of seizures. In this paper, a new scheme is proposed for detecting epileptic seizures from the skin of epileptic patients. In this paper, a system with wireless electronic diagnosing system that combines Electro dermal activity (EDA), GPS, GSM, and ARM processor is proposed. This paper provides the location of epileptic patients through GPS technology and warning to the caring persons of epileptic patient through GSM technology.","PeriodicalId":158960,"journal":{"name":"2011 International Conference on Electronics, Communication and Computing Technologies","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-11-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129956750","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
期刊
2011 International Conference on Electronics, Communication and Computing Technologies
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1