首页 > 最新文献

2013 Fourth International Conference on Computing, Communications and Networking Technologies (ICCCNT)最新文献

英文 中文
Design and implementation of an automatic beverages vending machine and its performance evaluation using Xilinx ISE and Cadence 使用赛灵思ISE和Cadence的自动饮料自动售货机的设计与实现及其性能评估
V. Krishna, A. Monisha, S. Sadulla, J. Prathiba
This paper describes the design and implementation of an automatic beverages vending machine using FSM as this technique has more advantages compared to previous ones used in vending machine design. The whole design is functionally verified using Xilinx ISE simulator 13.1 and the generated bit stream file has implemented in Virtex 5 XC5VLX50T FPGA board and its physical design has performed using Cadence Encounter and evaluated its optimized parameters.
本文介绍了一种基于FSM的自动贩卖机的设计与实现,该技术相对于以往的自动贩卖机设计具有更多的优势。使用Xilinx ISE模拟器13.1对整个设计进行了功能验证,并在Virtex 5 XC5VLX50T FPGA板上实现了生成的位流文件,并使用Cadence Encounter进行了物理设计,并对其优化参数进行了评估。
{"title":"Design and implementation of an automatic beverages vending machine and its performance evaluation using Xilinx ISE and Cadence","authors":"V. Krishna, A. Monisha, S. Sadulla, J. Prathiba","doi":"10.1109/ICCCNT.2013.6726639","DOIUrl":"https://doi.org/10.1109/ICCCNT.2013.6726639","url":null,"abstract":"This paper describes the design and implementation of an automatic beverages vending machine using FSM as this technique has more advantages compared to previous ones used in vending machine design. The whole design is functionally verified using Xilinx ISE simulator 13.1 and the generated bit stream file has implemented in Virtex 5 XC5VLX50T FPGA board and its physical design has performed using Cadence Encounter and evaluated its optimized parameters.","PeriodicalId":6330,"journal":{"name":"2013 Fourth International Conference on Computing, Communications and Networking Technologies (ICCCNT)","volume":"1 1","pages":"1-6"},"PeriodicalIF":0.0,"publicationDate":"2013-07-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"90261617","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 16
OFDM transceiver design using C OFDM收发器设计使用C
Indira Bahaddur, C. L. Triveni, P. Srikanth
The aim of this paper is to design a baseband orthogonal frequency division multiplexing (OFDM) [1]–[2] transceiver including 8 point Fast Fourier Transform (FFT), 8 point Inverse Fast Fourier Transform (IFFT) [3] core processor, DPSK modulator[4], demodulator serial to parallel and parallel to serial converter blocks in C language. The main challenge is to derive the algorithm for Fast Fourier Transform (FFT) and Inverse Fast Fourier Transform (IFFT). There are many algorithms available that can implement FFT and IFFT.
本文的目的是用C语言设计一个基带正交频分复用(OFDM)[1] -[2]收发器,包括8点快速傅里叶变换(FFT)、8点反快速傅里叶变换(IFFT)[3]核心处理器、DPSK调制器[4]、解调器串并转和并转串行模块。主要的挑战是推导快速傅立叶变换(FFT)和反快速傅立叶变换(IFFT)的算法。有许多可用的算法可以实现FFT和IFFT。
{"title":"OFDM transceiver design using C","authors":"Indira Bahaddur, C. L. Triveni, P. Srikanth","doi":"10.1109/ICCCNT.2013.6726661","DOIUrl":"https://doi.org/10.1109/ICCCNT.2013.6726661","url":null,"abstract":"The aim of this paper is to design a baseband orthogonal frequency division multiplexing (OFDM) [1]–[2] transceiver including 8 point Fast Fourier Transform (FFT), 8 point Inverse Fast Fourier Transform (IFFT) [3] core processor, DPSK modulator[4], demodulator serial to parallel and parallel to serial converter blocks in C language. The main challenge is to derive the algorithm for Fast Fourier Transform (FFT) and Inverse Fast Fourier Transform (IFFT). There are many algorithms available that can implement FFT and IFFT.","PeriodicalId":6330,"journal":{"name":"2013 Fourth International Conference on Computing, Communications and Networking Technologies (ICCCNT)","volume":"66 1","pages":"1-4"},"PeriodicalIF":0.0,"publicationDate":"2013-07-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"72867900","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Energy efficient LEACH by enhancing the data update procedure of cluster head 通过改进簇头数据更新过程实现高效的LEACH
P. Rajan, V. Geetha
There are several modification has been happened in LEACH protocol. Most of modifications are in cluster organization. This paper studies modified LEACH protocol using data update procedure of cluster head. In LEACH protocol frequency of sending data to the base station by smaller cluster is higher than bigger cluster due to that energy dissipation in smaller cluster is more than bigger cluster. This paper studies modified LEACH protocol in which frequency of sending data to the base station by each cluster is same. Simulation has been done in NS2 and simulation result shows that modified LEACH protocol is more energy efficient than LEACH protocol.
LEACH协议发生了几处修改。大多数修改是在集群组织中进行的。本文研究了基于簇头数据更新过程的改进LEACH协议。在LEACH协议中,小集群向基站发送数据的频率高于大集群,这是由于小集群的能量耗散大于大集群。本文研究了各集群向基站发送数据的频率相同的改进LEACH协议。在NS2中进行了仿真,仿真结果表明,改进后的LEACH协议比LEACH协议更节能。
{"title":"Energy efficient LEACH by enhancing the data update procedure of cluster head","authors":"P. Rajan, V. Geetha","doi":"10.1109/ICCCNT.2013.6726767","DOIUrl":"https://doi.org/10.1109/ICCCNT.2013.6726767","url":null,"abstract":"There are several modification has been happened in LEACH protocol. Most of modifications are in cluster organization. This paper studies modified LEACH protocol using data update procedure of cluster head. In LEACH protocol frequency of sending data to the base station by smaller cluster is higher than bigger cluster due to that energy dissipation in smaller cluster is more than bigger cluster. This paper studies modified LEACH protocol in which frequency of sending data to the base station by each cluster is same. Simulation has been done in NS2 and simulation result shows that modified LEACH protocol is more energy efficient than LEACH protocol.","PeriodicalId":6330,"journal":{"name":"2013 Fourth International Conference on Computing, Communications and Networking Technologies (ICCCNT)","volume":"6 1","pages":"1-3"},"PeriodicalIF":0.0,"publicationDate":"2013-07-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"75164266","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
User-centric trust based identity as a service for federated cloud environment 以用户为中心的基于信任的身份即服务,用于联邦云环境
E. Samlinson, M. Usha
Cloud computing is the promising model of delivering IT resources on demand. Identity and Access Management (IAM) stands as the hurdle for enterprises to adopt to cloud. This paper discusses IAM component of Security as a Service (SecaaS) in the context of cloud computing with a Trust Agent. We have proposed user-centric trust agent identity service which is aimed to create trust among the Cloud Service Providers (CSPs) in the federated environment. Relevant standards such as SAML, SPML, XACML, and OAuth are discussed to enable trusted and secure access to cloud services.
云计算是一种很有前途的按需交付IT资源的模式。身份和访问管理(IAM)是企业采用云计算的障碍。本文讨论了基于信任代理的云计算环境下安全即服务(SecaaS)的IAM组件。我们提出了以用户为中心的信任代理身份服务,其目的是在联邦环境中创建云服务提供商之间的信任。讨论了SAML、SPML、XACML和OAuth等相关标准,以支持对云服务的可信和安全访问。
{"title":"User-centric trust based identity as a service for federated cloud environment","authors":"E. Samlinson, M. Usha","doi":"10.1109/ICCCNT.2013.6726636","DOIUrl":"https://doi.org/10.1109/ICCCNT.2013.6726636","url":null,"abstract":"Cloud computing is the promising model of delivering IT resources on demand. Identity and Access Management (IAM) stands as the hurdle for enterprises to adopt to cloud. This paper discusses IAM component of Security as a Service (SecaaS) in the context of cloud computing with a Trust Agent. We have proposed user-centric trust agent identity service which is aimed to create trust among the Cloud Service Providers (CSPs) in the federated environment. Relevant standards such as SAML, SPML, XACML, and OAuth are discussed to enable trusted and secure access to cloud services.","PeriodicalId":6330,"journal":{"name":"2013 Fourth International Conference on Computing, Communications and Networking Technologies (ICCCNT)","volume":"6 1","pages":"1-5"},"PeriodicalIF":0.0,"publicationDate":"2013-07-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"74254086","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
Real-time implementation and performance analysis of state estimation based model predictive controller for CSTR plant 基于状态估计的CSTR装置模型预测控制器的实时实现及性能分析
M. Geetha, R. Naveen, J. Jerome, V. Kumar
Model Predictive Control (MPC) schemes are now widely used in process industries for the control of key unit operations. Linear model predictive control schemes which make use of linear dynamic model for prediction, limit their applicability to systems which exhibit mildly nonlinear dynamics. In this paper, a state estimation based model predictive controller for nonlinear system has been proposed. The model predictive controller is designed by considering a state space model and an extended Kalman filter to predict the future behavior of the system. The efficacy of the proposed MPC scheme has been demonstrated by conducting simulation studies on the level process of a Continuously Stirred Tank Reactor (CSTR) - a MIMO system, and the real time implementation has been done in the CSTR plant to illustrate the online optimization constraint and also the advantage of MPC over conventional controller by comparison of servo-regulatory responses through ISE values.
模型预测控制(MPC)方案目前广泛应用于过程工业中关键单元操作的控制。利用线性动态模型进行预测的线性模型预测控制方案,限制了其对表现为轻度非线性动力学的系统的适用性。本文提出了一种基于状态估计的非线性系统模型预测控制器。模型预测控制器采用状态空间模型和扩展卡尔曼滤波器来预测系统的未来行为。通过对连续搅拌槽式反应器(CSTR) -一个MIMO系统的液位过程进行仿真研究,证明了MPC方案的有效性,并在CSTR装置中进行了实时实施,通过ISE值的伺服调节响应比较,说明了在线优化约束和MPC优于传统控制器的优势。
{"title":"Real-time implementation and performance analysis of state estimation based model predictive controller for CSTR plant","authors":"M. Geetha, R. Naveen, J. Jerome, V. Kumar","doi":"10.1109/ICCCNT.2013.6726731","DOIUrl":"https://doi.org/10.1109/ICCCNT.2013.6726731","url":null,"abstract":"Model Predictive Control (MPC) schemes are now widely used in process industries for the control of key unit operations. Linear model predictive control schemes which make use of linear dynamic model for prediction, limit their applicability to systems which exhibit mildly nonlinear dynamics. In this paper, a state estimation based model predictive controller for nonlinear system has been proposed. The model predictive controller is designed by considering a state space model and an extended Kalman filter to predict the future behavior of the system. The efficacy of the proposed MPC scheme has been demonstrated by conducting simulation studies on the level process of a Continuously Stirred Tank Reactor (CSTR) - a MIMO system, and the real time implementation has been done in the CSTR plant to illustrate the online optimization constraint and also the advantage of MPC over conventional controller by comparison of servo-regulatory responses through ISE values.","PeriodicalId":6330,"journal":{"name":"2013 Fourth International Conference on Computing, Communications and Networking Technologies (ICCCNT)","volume":"5 1","pages":"1-6"},"PeriodicalIF":0.0,"publicationDate":"2013-07-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"74204586","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Design of free space optical communication link with Mach-Zehnder optical modulator for long distance 自由空间长距离马赫-曾德尔光调制器光通信链路的设计
Nitin Garg, Sanjeev Kumar
Free Space Optical Communication become more and more popular due to its advantage over Radio Frequency Communication. In this paper BER and Q-factor is observed at different parameters. It is observed that BER is increased with increase in distance and Q-factor is decreased with increase in distance. BER and Q-factor is also affected by Bit Rate and Divergence. If Bit rate and Divergence is increase BER will increased and Q-factor is decreased. It is observed that with Mach-Zehnder optical modulator we get a BER of 10-20 at a distance of 1.8 km with bit rate 2.5 Gbps and Q-factor 30 is achieved at a distance of 1.6 km with 2.5 Gbps bit rate.
自由空间光通信由于其相对于射频通信的优势而越来越受到人们的欢迎。本文对不同参数下的误码率和q因子进行了观测。BER随距离的增加而增加,q因子随距离的增加而减小。误码率和q因子也受比特率和散度的影响。当比特率和散度增大时,误码率增大,q因子减小。使用马赫-曾德光调制器,在1.8 km距离和2.5 Gbps比特率下的误码率为10-20,在1.6 km距离和2.5 Gbps比特率下的q因子为30。
{"title":"Design of free space optical communication link with Mach-Zehnder optical modulator for long distance","authors":"Nitin Garg, Sanjeev Kumar","doi":"10.1109/ICCCNT.2013.6726688","DOIUrl":"https://doi.org/10.1109/ICCCNT.2013.6726688","url":null,"abstract":"Free Space Optical Communication become more and more popular due to its advantage over Radio Frequency Communication. In this paper BER and Q-factor is observed at different parameters. It is observed that BER is increased with increase in distance and Q-factor is decreased with increase in distance. BER and Q-factor is also affected by Bit Rate and Divergence. If Bit rate and Divergence is increase BER will increased and Q-factor is decreased. It is observed that with Mach-Zehnder optical modulator we get a BER of 10-20 at a distance of 1.8 km with bit rate 2.5 Gbps and Q-factor 30 is achieved at a distance of 1.6 km with 2.5 Gbps bit rate.","PeriodicalId":6330,"journal":{"name":"2013 Fourth International Conference on Computing, Communications and Networking Technologies (ICCCNT)","volume":"7 1","pages":"1-5"},"PeriodicalIF":0.0,"publicationDate":"2013-07-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"77685428","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Implementation of voice based wheelchair for differently abled 实现基于语音的轮椅为不同的残疾
M. B. Kumaran, A. Renold
The main objective of this work is to process the voice signal and is implemented to control a wheelchair by the voice signal which is processed earlier. The adopted model is to combine PIC microcontroller and VRbot module with voice recognition system for identifying individual words and is speaker dependent. The command given by the user is taken into VRbot module by microphone which is built within speech recognition module. Once voice command is recognized, the signal is transferred to the controller where stepper motor module is connected. PIC microcontroller capture appropriate signals from speech recognition module and wait for the Ultrasonic Sensor, which is doing the process of obstacle detection in its path. Whenever the conditions, signal to move from VRbot and no obstacle detection from Ultrasonic Sensor is received, the motion of wheelchair is performed.
本工作的主要目的是对语音信号进行处理,并通过处理后的语音信号实现对轮椅的控制。所采用的模型是将PIC单片机和VRbot模块与语音识别系统相结合,对单个单词进行识别,并且依赖于说话人。用户发出的指令通过内置在语音识别模块内的麦克风传入VRbot模块。识别语音指令后,信号传输到连接步进电机模块的控制器。PIC微控制器从语音识别模块捕获适当的信号,等待超声波传感器在其路径上进行障碍物检测。当VRbot发出移动信号,超声波传感器没有检测到障碍物时,轮椅就开始移动。
{"title":"Implementation of voice based wheelchair for differently abled","authors":"M. B. Kumaran, A. Renold","doi":"10.1109/ICCCNT.2013.6726647","DOIUrl":"https://doi.org/10.1109/ICCCNT.2013.6726647","url":null,"abstract":"The main objective of this work is to process the voice signal and is implemented to control a wheelchair by the voice signal which is processed earlier. The adopted model is to combine PIC microcontroller and VRbot module with voice recognition system for identifying individual words and is speaker dependent. The command given by the user is taken into VRbot module by microphone which is built within speech recognition module. Once voice command is recognized, the signal is transferred to the controller where stepper motor module is connected. PIC microcontroller capture appropriate signals from speech recognition module and wait for the Ultrasonic Sensor, which is doing the process of obstacle detection in its path. Whenever the conditions, signal to move from VRbot and no obstacle detection from Ultrasonic Sensor is received, the motion of wheelchair is performed.","PeriodicalId":6330,"journal":{"name":"2013 Fourth International Conference on Computing, Communications and Networking Technologies (ICCCNT)","volume":"74 1","pages":"1-6"},"PeriodicalIF":0.0,"publicationDate":"2013-07-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"76665225","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
Performace and energy efficient Greedy forwarding method for sensor networks 传感器网络的性能和节能贪婪转发方法
Shradha P. Dugam, S. Pingat
The area of study and work presented in this paper is on a method of routing in sensor networks that is a part of Geographic Routing protocol known as Greedy Forwarding. This is an much more efficient version of methods that are applicable in GR. This works on the principle of progressing in the process of forwarding by selecting a peer that is nearer to the final node where the packets are destined. But with the benefits of reducing the total distance between two end points this method incurs limitations regarding collection of proper network topology information thus creating voids while sending packets. To avoid this an improvised version of previous works is presented over here that highlights mainly of increasing performance as well as energy efficiency of GF method in GR. A more enhanced method that will collect more accurate topological information and support the forwarding process with energy saving to increase networks lifetime is presented. Here the discussion about the work done by previous methods will be shown along with we introduce to you a newer version. The basic aim is to consider maximum energy paths and nodes with maximum energy remains.
本文提出的研究和工作领域是传感器网络中的路由方法,该方法是地理路由协议的一部分,称为贪婪转发。这是适用于GR的方法的一个更有效的版本。它的工作原理是在转发过程中,通过选择一个更接近数据包目的地的对等体来推进。但是,由于减少了两个端点之间的总距离,这种方法在收集适当的网络拓扑信息方面产生了限制,因此在发送数据包时产生了空白。为了避免这种情况,本文介绍了先前工作的临时版本,主要强调了GR中GF方法的性能和能效的提高。提出了一种更增强的方法,该方法将收集更准确的拓扑信息,并支持节能的转发过程,以增加网络生命周期。在这里,我们将讨论以前的方法所完成的工作,并向您介绍一个更新的版本。基本目标是考虑最大能量路径和剩余能量最大的节点。
{"title":"Performace and energy efficient Greedy forwarding method for sensor networks","authors":"Shradha P. Dugam, S. Pingat","doi":"10.1109/ICCCNT.2013.6726624","DOIUrl":"https://doi.org/10.1109/ICCCNT.2013.6726624","url":null,"abstract":"The area of study and work presented in this paper is on a method of routing in sensor networks that is a part of Geographic Routing protocol known as Greedy Forwarding. This is an much more efficient version of methods that are applicable in GR. This works on the principle of progressing in the process of forwarding by selecting a peer that is nearer to the final node where the packets are destined. But with the benefits of reducing the total distance between two end points this method incurs limitations regarding collection of proper network topology information thus creating voids while sending packets. To avoid this an improvised version of previous works is presented over here that highlights mainly of increasing performance as well as energy efficiency of GF method in GR. A more enhanced method that will collect more accurate topological information and support the forwarding process with energy saving to increase networks lifetime is presented. Here the discussion about the work done by previous methods will be shown along with we introduce to you a newer version. The basic aim is to consider maximum energy paths and nodes with maximum energy remains.","PeriodicalId":6330,"journal":{"name":"2013 Fourth International Conference on Computing, Communications and Networking Technologies (ICCCNT)","volume":"38 1","pages":"1-7"},"PeriodicalIF":0.0,"publicationDate":"2013-07-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"78123147","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Hardware software co-simulation of dual image encryption using Latin square image 拉丁方图像双图像加密的软硬件联合仿真
S. Kumar, H. Kumar, H. Panduranga
Hardware Software co-simulation of a multiple image encryption technique has been described in the present study. Proposed multiple image encryption technique is based on Latin Square Image Cipher (LSIC). First, a carrier image based on Latin Square is generated by using 256 bits length key. XOR operation is applied between an input image and Latin Square Image to generate an encrypted image. Then XOR operation is applied between encrypted image and second input image to encrypt second image. This process is continues till nth input image. The proposed multiple image encryption technique is implemented Xilinx System Generator (XSG). This encryption technique is modeled using Simulink and XSG Block set and synthesized onto Virtex 2 pro FPGA device. Proposed technique is validated using hardware software co-simulation method.
本研究描述了一种多图像加密技术的软硬件联合仿真。提出了一种基于拉丁平方图像密码(LSIC)的多图像加密技术。首先,采用256位密钥生成基于拉丁平方的载波图像;在输入图像和拉丁方图像之间进行异或运算,生成加密图像。然后在加密后的图像与第二张输入图像之间进行异或运算,对第二张图像进行加密。这个过程一直持续到第n张输入图像。提出的多图像加密技术由Xilinx System Generator (XSG)实现。利用Simulink和XSG Block对该加密技术进行建模,并将其合成到Virtex 2 pro FPGA器件上。采用软硬件联合仿真的方法对该技术进行了验证。
{"title":"Hardware software co-simulation of dual image encryption using Latin square image","authors":"S. Kumar, H. Kumar, H. Panduranga","doi":"10.1109/ICCCNT.2013.6726681","DOIUrl":"https://doi.org/10.1109/ICCCNT.2013.6726681","url":null,"abstract":"Hardware Software co-simulation of a multiple image encryption technique has been described in the present study. Proposed multiple image encryption technique is based on Latin Square Image Cipher (LSIC). First, a carrier image based on Latin Square is generated by using 256 bits length key. XOR operation is applied between an input image and Latin Square Image to generate an encrypted image. Then XOR operation is applied between encrypted image and second input image to encrypt second image. This process is continues till nth input image. The proposed multiple image encryption technique is implemented Xilinx System Generator (XSG). This encryption technique is modeled using Simulink and XSG Block set and synthesized onto Virtex 2 pro FPGA device. Proposed technique is validated using hardware software co-simulation method.","PeriodicalId":6330,"journal":{"name":"2013 Fourth International Conference on Computing, Communications and Networking Technologies (ICCCNT)","volume":"69 1","pages":"1-5"},"PeriodicalIF":0.0,"publicationDate":"2013-07-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"77885580","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 17
Tumour detection in brain MRI using improved segmentation algorithm 基于改进分割算法的脑MRI肿瘤检测
E. Kumar, V. M. Kumar, M. Sumithra
In the present days, for the human body anatomical study and for the treatment planning medical science very much depend on the medical imaging technology and medical images. Specifically for the human brain, MRI widely prefers and using for the imaging. But by nature medical images are complex and noisy. This leads to the necessity of processes that reduces difficulties in analysis and improves quality of output. This paper discuss about an improved segmentation algorithm for different defects detection in brain MRI (Tumour) and have compared the performance of this method with conventional method.
目前,医学成像技术和医学图像在很大程度上依赖于人体解剖研究和治疗计划。特别是对人类大脑的成像,MRI被广泛使用。但本质上医学图像是复杂和嘈杂的。这导致了减少分析困难和提高输出质量的过程的必要性。本文讨论了一种针对脑MRI(肿瘤)中不同缺陷检测的改进分割算法,并与传统方法进行了性能比较。
{"title":"Tumour detection in brain MRI using improved segmentation algorithm","authors":"E. Kumar, V. M. Kumar, M. Sumithra","doi":"10.1109/ICCCNT.2013.6726575","DOIUrl":"https://doi.org/10.1109/ICCCNT.2013.6726575","url":null,"abstract":"In the present days, for the human body anatomical study and for the treatment planning medical science very much depend on the medical imaging technology and medical images. Specifically for the human brain, MRI widely prefers and using for the imaging. But by nature medical images are complex and noisy. This leads to the necessity of processes that reduces difficulties in analysis and improves quality of output. This paper discuss about an improved segmentation algorithm for different defects detection in brain MRI (Tumour) and have compared the performance of this method with conventional method.","PeriodicalId":6330,"journal":{"name":"2013 Fourth International Conference on Computing, Communications and Networking Technologies (ICCCNT)","volume":"43 1","pages":"1-7"},"PeriodicalIF":0.0,"publicationDate":"2013-07-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"75898748","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
期刊
2013 Fourth International Conference on Computing, Communications and Networking Technologies (ICCCNT)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1