首页 > 最新文献

2014 International Conference on Communication and Network Technologies最新文献

英文 中文
FPGA implementation of fast and area efficient CORDIC algorithm FPGA实现快速高效的CORDIC算法
Pub Date : 2014-12-01 DOI: 10.1109/CNT.2014.7062760
M. Chinnathambi, N. Bharanidharan, S. Rajaram
This paper presents the fast and area efficient CORDIC (Coordinate Rotation DIgital Computer)algorithm for sine and cosine wave generation. The concepts of pipelining and multiplexer based CORDIC algorithm is used todecrease the critical path delay and reducing the area respectively. A six stage CORDIC is implemented by two schemes followed by four methods, unrolled CORDIC and multiplexer based CORDIC with and without pipelining. The pipelining is included in four stages(excluding first and last stage). An 8-bit CORDIC algorithm for generating sine wave and cosine wave is designed, implementedand compared by all four methods on Xilinx Spartan3E (XC3S250E).
提出了一种快速、面积高效的正弦余弦波生成算法(CORDIC)。采用了流水线和基于多路复用器的CORDIC算法,分别减小了关键路径的时延和面积。一个六阶段的CORDIC由两种方案和四种方法实现,即展开CORDIC和基于多路复用器的CORDIC,有和没有流水线。流水线分为四个阶段(不包括第一阶段和最后阶段)。设计了一种用于生成正弦波和余弦波的8位CORDIC算法,并在Xilinx Spartan3E (XC3S250E)上进行了实现和比较。
{"title":"FPGA implementation of fast and area efficient CORDIC algorithm","authors":"M. Chinnathambi, N. Bharanidharan, S. Rajaram","doi":"10.1109/CNT.2014.7062760","DOIUrl":"https://doi.org/10.1109/CNT.2014.7062760","url":null,"abstract":"This paper presents the fast and area efficient CORDIC (Coordinate Rotation DIgital Computer)algorithm for sine and cosine wave generation. The concepts of pipelining and multiplexer based CORDIC algorithm is used todecrease the critical path delay and reducing the area respectively. A six stage CORDIC is implemented by two schemes followed by four methods, unrolled CORDIC and multiplexer based CORDIC with and without pipelining. The pipelining is included in four stages(excluding first and last stage). An 8-bit CORDIC algorithm for generating sine wave and cosine wave is designed, implementedand compared by all four methods on Xilinx Spartan3E (XC3S250E).","PeriodicalId":347883,"journal":{"name":"2014 International Conference on Communication and Network Technologies","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128255653","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 20
Welding defects extraction for radiographic images using C-means segmentation method 基于c均值分割的射线图像焊接缺陷提取
Pub Date : 2014-12-01 DOI: 10.1109/CNT.2014.7062729
M. Sundaram, J. Jose, G. Jaffino
In Recent years increasing attention is paid to welding defects monitoring in industries. An automatic system to extract and classify the welding defects in radiographic images is a main challenge in industries, because of the miniature welded region. In this paper an automatic method is proposed to extract the various welding defects in radiographic weld images. In the first stage the input radiographic image is pre-processed to enhance the quality of the image. In the second stage the welding region is extracted by using c-means segmentation method. After segmentation different features of the welded region are calculated and the 3-D contour plots are plotted.
近年来,焊接缺陷监测越来越受到工业领域的重视。由于焊接区域的微型化,射线图像中焊接缺陷的自动提取和分类系统是工业上的一个主要挑战。本文提出了一种自动提取射线照相焊缝图像中各种焊接缺陷的方法。在第一阶段,对输入的射线照相图像进行预处理以提高图像的质量。第二阶段采用c均值分割法提取焊接区域。分割后计算焊接区域的不同特征,绘制三维轮廓图。
{"title":"Welding defects extraction for radiographic images using C-means segmentation method","authors":"M. Sundaram, J. Jose, G. Jaffino","doi":"10.1109/CNT.2014.7062729","DOIUrl":"https://doi.org/10.1109/CNT.2014.7062729","url":null,"abstract":"In Recent years increasing attention is paid to welding defects monitoring in industries. An automatic system to extract and classify the welding defects in radiographic images is a main challenge in industries, because of the miniature welded region. In this paper an automatic method is proposed to extract the various welding defects in radiographic weld images. In the first stage the input radiographic image is pre-processed to enhance the quality of the image. In the second stage the welding region is extracted by using c-means segmentation method. After segmentation different features of the welded region are calculated and the 3-D contour plots are plotted.","PeriodicalId":347883,"journal":{"name":"2014 International Conference on Communication and Network Technologies","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127358562","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
Localization in wireless sensor network based on mobile anchor and chord selection 基于移动锚和弦选择的无线传感器网络定位
Pub Date : 2014-12-01 DOI: 10.1109/CNT.2014.7062738
G. Karthiga, C. Preethi, R. Devi
Accurate and low-cost sensor localization is a critical requirement for the deployment of wireless sensor networks in a wide variety of applications. Many applications require the sensor nodes to know their locations with a high degree of precision. Various localization methods based on mobile anchor nodes have been proposed for assisting the sensor nodes to determine their locations. However, none of these methods attempt to optimize the trajectory of the mobile anchor node. Accordingly, this project presents a path planning scheme, which ensures that the trajectory of the mobile anchor node minimizes the localization error and guarantees that all of the sensor nodes can determine their locations. The obstacle-resistant trajectory is also proposed to handle the obstacles in the sensing field. Later this path planning algorithm is adjusted so that it suits most of the effective localization algorithms. The performance of the proposed scheme is to be evaluated through a series of simulations with the ns-2 network simulator.
准确和低成本的传感器定位是在各种应用中部署无线传感器网络的关键要求。许多应用要求传感器节点以高精度了解其位置。人们提出了各种基于移动锚节点的定位方法,以帮助传感器节点确定其位置。然而,这些方法都没有尝试优化移动锚节点的轨迹。因此,本课题提出了一种路径规划方案,该方案保证移动锚节点的轨迹使定位误差最小化,并保证所有传感器节点都能确定自己的位置。在传感领域中,为了处理障碍物,还提出了抗障轨迹。随后对该路径规划算法进行了调整,使其适用于大多数有效的定位算法。通过ns-2网络模拟器的一系列仿真来评估所提出方案的性能。
{"title":"Localization in wireless sensor network based on mobile anchor and chord selection","authors":"G. Karthiga, C. Preethi, R. Devi","doi":"10.1109/CNT.2014.7062738","DOIUrl":"https://doi.org/10.1109/CNT.2014.7062738","url":null,"abstract":"Accurate and low-cost sensor localization is a critical requirement for the deployment of wireless sensor networks in a wide variety of applications. Many applications require the sensor nodes to know their locations with a high degree of precision. Various localization methods based on mobile anchor nodes have been proposed for assisting the sensor nodes to determine their locations. However, none of these methods attempt to optimize the trajectory of the mobile anchor node. Accordingly, this project presents a path planning scheme, which ensures that the trajectory of the mobile anchor node minimizes the localization error and guarantees that all of the sensor nodes can determine their locations. The obstacle-resistant trajectory is also proposed to handle the obstacles in the sensing field. Later this path planning algorithm is adjusted so that it suits most of the effective localization algorithms. The performance of the proposed scheme is to be evaluated through a series of simulations with the ns-2 network simulator.","PeriodicalId":347883,"journal":{"name":"2014 International Conference on Communication and Network Technologies","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134417371","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Multitenant SaaS model of cloud computing: Issues and solutions 云计算的多租户SaaS模型:问题和解决方案
Pub Date : 2014-12-01 DOI: 10.1109/CNT.2014.7062719
M. Saraswathi, T. Bhuvaneswari
Today's businesses can attain applications on demand using cloud computing. Multi-tenancy is a significant feature of cloud computing in which a single application is shared among multiple tenants. Multi-tenancy offers variety of advantages including cost savings, resource utilization, version control and more. Currently more applications are moved from organization's internal infrastructure to data centers using shared infrastructure that provide Software as a Service (SaaS) to large number of organizations. This paper is devoted to discussing different options for implementing multitenancy such as An Efficient Schema Shared Approach for Cloud Based Multitenant Database with Authentication & Authorization Framework and A Non-Intrusive Multi-Tenant Database For Large Scale Applications. Finally analyze the two solution with various factors.
今天的企业可以使用云计算实现按需应用程序。多租户是云计算的一个重要特性,其中单个应用程序在多个租户之间共享。多租户提供了各种优势,包括成本节约、资源利用、版本控制等。目前,越来越多的应用程序通过向大量组织提供软件即服务(SaaS)的共享基础设施从组织的内部基础设施转移到数据中心。本文致力于讨论实现多租户的不同选择,例如基于云的多租户数据库的高效模式共享方法与身份验证和授权框架以及用于大规模应用程序的非侵入式多租户数据库。最后结合各种因素分析了两种解决方案。
{"title":"Multitenant SaaS model of cloud computing: Issues and solutions","authors":"M. Saraswathi, T. Bhuvaneswari","doi":"10.1109/CNT.2014.7062719","DOIUrl":"https://doi.org/10.1109/CNT.2014.7062719","url":null,"abstract":"Today's businesses can attain applications on demand using cloud computing. Multi-tenancy is a significant feature of cloud computing in which a single application is shared among multiple tenants. Multi-tenancy offers variety of advantages including cost savings, resource utilization, version control and more. Currently more applications are moved from organization's internal infrastructure to data centers using shared infrastructure that provide Software as a Service (SaaS) to large number of organizations. This paper is devoted to discussing different options for implementing multitenancy such as An Efficient Schema Shared Approach for Cloud Based Multitenant Database with Authentication & Authorization Framework and A Non-Intrusive Multi-Tenant Database For Large Scale Applications. Finally analyze the two solution with various factors.","PeriodicalId":347883,"journal":{"name":"2014 International Conference on Communication and Network Technologies","volume":"280 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132907706","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Design and development of microstrip trisection filter for DTH applications 应用于下潜点的微带三分滤波器的设计与开发
Pub Date : 2014-12-01 DOI: 10.1109/CNT.2014.7062714
R. Kaushik, M. Ganesh Madhan, K. Jagadeeshvelan
A Microstrip structure for IF signal filtering for Direct to Home (DTH) application is reported in this paper. The filter design hinges on cascaded cross coupled trisection open loop resonators. The filter is designed and simulated using ADS tool. The filter provides a bandwidth of 240 MHz, with a center frequency of 1.32 GHz. The novelty of this paper lies in its improved Fractional Bandwidth (FBW) and in the context of application of the filter, wherein a simple and compact design is adapted for DTH application. The response of the fabricated filter is found to agree with the simulation.
本文报道了一种用于直接到户中频信号滤波的微带结构。滤波器的设计取决于级联交叉耦合三截面开环谐振器。利用ADS工具对该滤波器进行了设计和仿真。该滤波器的带宽为240mhz,中心频率为1.32 GHz。本文的新颖之处在于其改进了分数带宽(FBW),并且在滤波器的应用背景下,其中简单紧凑的设计适用于DTH应用。所制备滤波器的响应与仿真结果吻合较好。
{"title":"Design and development of microstrip trisection filter for DTH applications","authors":"R. Kaushik, M. Ganesh Madhan, K. Jagadeeshvelan","doi":"10.1109/CNT.2014.7062714","DOIUrl":"https://doi.org/10.1109/CNT.2014.7062714","url":null,"abstract":"A Microstrip structure for IF signal filtering for Direct to Home (DTH) application is reported in this paper. The filter design hinges on cascaded cross coupled trisection open loop resonators. The filter is designed and simulated using ADS tool. The filter provides a bandwidth of 240 MHz, with a center frequency of 1.32 GHz. The novelty of this paper lies in its improved Fractional Bandwidth (FBW) and in the context of application of the filter, wherein a simple and compact design is adapted for DTH application. The response of the fabricated filter is found to agree with the simulation.","PeriodicalId":347883,"journal":{"name":"2014 International Conference on Communication and Network Technologies","volume":"5 3","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133042863","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Knowledge extracting system for non-expert miners 面向非专业矿工的知识提取系统
Pub Date : 2014-12-01 DOI: 10.1109/CNT.2014.7062745
P. Ramya, S. Mohanavalli, S. Sasirekha
Argo is a global array of 3,000 free-drifting profiling floats that will measure the temperature, pressure and salinity of the upper 2000 m of the ocean. This will allow continuous monitoring of the climate state of the ocean, with all data being relayed and made publicly available within hours after collection. Conceptually, Argo builds on the existing upper-ocean thermal networks, extending their spatial and temporal coverage, depth range and accuracy, and enhancing them through addition of salinity and velocity measurements. Also the float reads its latitude and longitude values. All these information in combination called as dataset and processed with some pre-processing and mining strategies. Pre-processing technique allows to extract the features that are required to define the ocean behaviour. Mining defines the similar patterns present in the dataset. Extracted pattern describes the behaviour of saline water by giving the tsunami alerts and PFZ's.
Argo是一个由3000个自由漂流剖面浮标组成的全球阵列,将测量海洋2000米以上的温度、压力和盐度。这将允许对海洋气候状况进行持续监测,所有数据在收集后数小时内被转发并公开。从概念上讲,Argo建立在现有的上层海洋热网络的基础上,扩展了它们的空间和时间覆盖范围、深度范围和精度,并通过增加盐度和速度测量来增强它们。此外,浮动读取其纬度和经度值。所有这些信息组合在一起称为数据集,并通过一些预处理和挖掘策略进行处理。预处理技术允许提取定义海洋行为所需的特征。挖掘定义数据集中出现的类似模式。提取的模式通过给出海啸警报和PFZ来描述咸水的行为。
{"title":"Knowledge extracting system for non-expert miners","authors":"P. Ramya, S. Mohanavalli, S. Sasirekha","doi":"10.1109/CNT.2014.7062745","DOIUrl":"https://doi.org/10.1109/CNT.2014.7062745","url":null,"abstract":"Argo is a global array of 3,000 free-drifting profiling floats that will measure the temperature, pressure and salinity of the upper 2000 m of the ocean. This will allow continuous monitoring of the climate state of the ocean, with all data being relayed and made publicly available within hours after collection. Conceptually, Argo builds on the existing upper-ocean thermal networks, extending their spatial and temporal coverage, depth range and accuracy, and enhancing them through addition of salinity and velocity measurements. Also the float reads its latitude and longitude values. All these information in combination called as dataset and processed with some pre-processing and mining strategies. Pre-processing technique allows to extract the features that are required to define the ocean behaviour. Mining defines the similar patterns present in the dataset. Extracted pattern describes the behaviour of saline water by giving the tsunami alerts and PFZ's.","PeriodicalId":347883,"journal":{"name":"2014 International Conference on Communication and Network Technologies","volume":"15 3","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114035794","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Reversible data hiding by reserving room 通过预留房间隐藏可逆数据
Pub Date : 2014-12-01 DOI: 10.1109/CNT.2014.7062733
S. Arivazhagan, W. Jebarani, C. Karthika
Reversible data hiding by reserving room becomes more prominent, since the original cover is restored without any loss after the hidden data is extracted. Encryption is performed to provide the confidentiality for the image content. In this project,space for embedding data is reserved with pairwise prediction error expansion(PEE) and histogram shift before encryption has been performed, so that data hider can reversibly embed data into encrypted image easily. Image redundancy isbetter exploited in prediction error expansion which leads to superior performance. But in current PEE based method, correlation within prediction error is not better exploited. Hence to better exploit the correlation among prediction errors, two prediction errors are jointly considered. Then the embedding is based on the prediction error pair and its 2D prediction-error histogram, which leads to improved performance. Secret data extraction and image restoration in this method is free of any errors. By this method, high PSNR is achieved than any other method in reversible data hiding.
预留空间的可逆数据隐藏更加突出,因为在提取隐藏数据后,恢复了原来的覆盖,没有任何损失。执行加密以提供图像内容的机密性。在本方案中,在加密之前通过对预测误差扩展(PEE)和直方图移位保留了嵌入数据的空间,使得数据隐藏器可以轻松地将数据可逆地嵌入到加密图像中。图像冗余在预测误差扩展中得到了更好的利用,从而提高了算法的性能。但目前基于PEE的方法没有很好地利用预测误差内的相关性。因此,为了更好地利用预测误差之间的相关性,将两种预测误差联合考虑。然后基于预测误差对及其二维预测误差直方图进行嵌入,从而提高了性能。该方法对秘密数据的提取和图像的恢复没有任何误差。该方法在可逆数据隐藏中具有较高的信噪比。
{"title":"Reversible data hiding by reserving room","authors":"S. Arivazhagan, W. Jebarani, C. Karthika","doi":"10.1109/CNT.2014.7062733","DOIUrl":"https://doi.org/10.1109/CNT.2014.7062733","url":null,"abstract":"Reversible data hiding by reserving room becomes more prominent, since the original cover is restored without any loss after the hidden data is extracted. Encryption is performed to provide the confidentiality for the image content. In this project,space for embedding data is reserved with pairwise prediction error expansion(PEE) and histogram shift before encryption has been performed, so that data hider can reversibly embed data into encrypted image easily. Image redundancy isbetter exploited in prediction error expansion which leads to superior performance. But in current PEE based method, correlation within prediction error is not better exploited. Hence to better exploit the correlation among prediction errors, two prediction errors are jointly considered. Then the embedding is based on the prediction error pair and its 2D prediction-error histogram, which leads to improved performance. Secret data extraction and image restoration in this method is free of any errors. By this method, high PSNR is achieved than any other method in reversible data hiding.","PeriodicalId":347883,"journal":{"name":"2014 International Conference on Communication and Network Technologies","volume":"344 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124248889","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Robust real time face detection automatically from video sequence based on Haar features 基于Haar特征的视频序列鲁棒实时人脸自动检测
Pub Date : 2014-12-01 DOI: 10.1109/CNT.2014.7062769
P. Ithaya Rani, K. Muneeswaran
The automatic human face detection from sequences of video plays vital role in intelligent human computer interaction systems for video surveillance, face recognition, emotion recognition and face database management. This paper proposes an automatic and robust method to detect human faces from the background that is capable of processing images rapidly while achieving high detection rates from video sequences. Highlight of the face detection system is to identify and locate all faces regardless of their position, scale, orientation, lighting conditions, expressions etc. The field of work is the incorporation of a normalization technique based on local histograms to alleviate a common problem in conventional face detection methods such as: inconsistent performance due to sensitivity to variation illuminations such as local shadowing, noise and occlusion. Next the Haar-like rectangle features can be computed very rapidly using the integral image that is most suitable for face/non face classification. In the final step, the face region is detected through a cascade of classifier consisting of detectors with Adaboost algorithm. Experimental result is showing promising results by conducting the experiments on video sequence as against the existing work on images.
从视频序列中自动检测人脸在视频监控、人脸识别、情感识别和人脸数据库管理等智能人机交互系统中具有重要作用。本文提出了一种自动、鲁棒的人脸背景检测方法,该方法能够在快速处理图像的同时实现对视频序列的高检测率。人脸检测系统的亮点在于无论人脸的位置、尺度、方位、光照条件、表情等如何,都能对所有人脸进行识别和定位。该领域的工作是结合一种基于局部直方图的归一化技术,以缓解传统人脸检测方法中的一个常见问题,如:由于对局部阴影、噪声和遮挡等变化照明的敏感性而导致性能不一致。其次,利用最适合人脸/非人脸分类的积分图像,可以非常快速地计算出类哈尔矩形特征。最后一步,通过Adaboost算法的检测器组成的级联分类器检测人脸区域。通过对视频序列的实验,对比已有的对图像的实验,得到了令人满意的结果。
{"title":"Robust real time face detection automatically from video sequence based on Haar features","authors":"P. Ithaya Rani, K. Muneeswaran","doi":"10.1109/CNT.2014.7062769","DOIUrl":"https://doi.org/10.1109/CNT.2014.7062769","url":null,"abstract":"The automatic human face detection from sequences of video plays vital role in intelligent human computer interaction systems for video surveillance, face recognition, emotion recognition and face database management. This paper proposes an automatic and robust method to detect human faces from the background that is capable of processing images rapidly while achieving high detection rates from video sequences. Highlight of the face detection system is to identify and locate all faces regardless of their position, scale, orientation, lighting conditions, expressions etc. The field of work is the incorporation of a normalization technique based on local histograms to alleviate a common problem in conventional face detection methods such as: inconsistent performance due to sensitivity to variation illuminations such as local shadowing, noise and occlusion. Next the Haar-like rectangle features can be computed very rapidly using the integral image that is most suitable for face/non face classification. In the final step, the face region is detected through a cascade of classifier consisting of detectors with Adaboost algorithm. Experimental result is showing promising results by conducting the experiments on video sequence as against the existing work on images.","PeriodicalId":347883,"journal":{"name":"2014 International Conference on Communication and Network Technologies","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127453174","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
Implementation of pipelined hardware architecture for AES algorithm using FPGA 用FPGA实现AES算法的流水线硬件架构
Pub Date : 2014-12-01 DOI: 10.1109/CNT.2014.7062766
J. Senthil Kumar, C. Mahalakshmi
The Advanced Encryption Standard is the recent data security standard referred to as Federal Information Processing Standard 197 (FIPS 197) acquired worldwide by several private and public sectors for protective needs of data storage and secure data application from mobile consumer products to high end user. Most of the AES implementation for reconfigurable devices, however based on the configurable logic such as flip-flops and lookup tables. In this paper AES implementation focuas on embedded function inside of Xilinx devices such as large dual ported BRAM and DSP blocks with the goal of minimizing the use of register and lookup tables that those may be used for other functions. The paper presents a hardware implementation of AES algorithm on FPGA. The proposed model of AES algorithm was implemented in FPGA using Virtex 5 kit and Xilinx ISE development suite.
高级加密标准是最近的数据安全标准,被称为联邦信息处理标准197 (FIPS 197),由全球几家私营和公共部门获得,用于从移动消费产品到高端用户的数据存储和安全数据应用的保护需求。然而,大多数AES实现都是基于可配置逻辑(如触发器和查找表)的可重构设备。在本文中,AES实现的重点是Xilinx设备内部的嵌入式功能,如大型双端口BRAM和DSP块,其目标是最大限度地减少寄存器和查找表的使用,这些可能用于其他功能。本文给出了AES算法在FPGA上的硬件实现。采用Virtex 5套件和Xilinx ISE开发套件,在FPGA上实现了AES算法模型。
{"title":"Implementation of pipelined hardware architecture for AES algorithm using FPGA","authors":"J. Senthil Kumar, C. Mahalakshmi","doi":"10.1109/CNT.2014.7062766","DOIUrl":"https://doi.org/10.1109/CNT.2014.7062766","url":null,"abstract":"The Advanced Encryption Standard is the recent data security standard referred to as Federal Information Processing Standard 197 (FIPS 197) acquired worldwide by several private and public sectors for protective needs of data storage and secure data application from mobile consumer products to high end user. Most of the AES implementation for reconfigurable devices, however based on the configurable logic such as flip-flops and lookup tables. In this paper AES implementation focuas on embedded function inside of Xilinx devices such as large dual ported BRAM and DSP blocks with the goal of minimizing the use of register and lookup tables that those may be used for other functions. The paper presents a hardware implementation of AES algorithm on FPGA. The proposed model of AES algorithm was implemented in FPGA using Virtex 5 kit and Xilinx ISE development suite.","PeriodicalId":347883,"journal":{"name":"2014 International Conference on Communication and Network Technologies","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131316162","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Secured transmission in cooperative groups using Group Key Management Protocol 使用组密钥管理协议在合作组中安全传输
Pub Date : 2014-12-01 DOI: 10.1109/CNT.2014.7062741
L. S. Mutneja, A. P. Bhagat
The biggest issue in dealing with the remote cooperative group is efficient and secured broadcast. There is unavailability of a fully trusted key generator center. The Secure key distribution implementation GKMP (Group Key Management Protocol) is an efficient solution to all these issues. It creates keys for groups, distributes to the key members, ensures rule based access and allows hierarchical control of group actions. This paper gives an overview of different approaches for secured transmission in cooperative groups. This paper also presents the group key management protocol for secure transmission in cooperative groups.
在处理远程协作组时,最大的问题是如何高效、安全地广播。没有完全可信的密钥生成器中心。安全密钥分发实现GKMP(组密钥管理协议)是解决这些问题的有效方法。它为组创建密钥,分发给密钥成员,确保基于规则的访问,并允许对组操作进行分层控制。本文概述了合作群体中安全传输的不同方法。本文还提出了用于合作组安全传输的组密钥管理协议。
{"title":"Secured transmission in cooperative groups using Group Key Management Protocol","authors":"L. S. Mutneja, A. P. Bhagat","doi":"10.1109/CNT.2014.7062741","DOIUrl":"https://doi.org/10.1109/CNT.2014.7062741","url":null,"abstract":"The biggest issue in dealing with the remote cooperative group is efficient and secured broadcast. There is unavailability of a fully trusted key generator center. The Secure key distribution implementation GKMP (Group Key Management Protocol) is an efficient solution to all these issues. It creates keys for groups, distributes to the key members, ensures rule based access and allows hierarchical control of group actions. This paper gives an overview of different approaches for secured transmission in cooperative groups. This paper also presents the group key management protocol for secure transmission in cooperative groups.","PeriodicalId":347883,"journal":{"name":"2014 International Conference on Communication and Network Technologies","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131470060","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
2014 International Conference on Communication and Network Technologies
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1