-
EMBEDDED SYSTEMS 14
-
Touch Sense
- Tens- Tiny Electronic Shock Machine for Patient Transcutaneous Electrical Nerve stimulator
- Keypad Based Aid for as a Bodily Impairment or a Devastating Disease People
- Dumb people can produce pre recorded voice like
- Need a Doctor for Emergency
- Need Food And Water.
- Welcome the persons.
- Wireless Touchpad Remote Control for Industrial Device Control
Abstract
• Transcutaneous electrical nerve stimulation (TENS) is a therapy that uses low-voltage electrical current for pain relief.
• TENS with a small,battery-powered machine about the size of a pocket radio.
• Usually, you connect two electrodes(wires that conduct electrical current) from the machine to your skin.
• The electrodes are often placed on the area of pain or at a pressure point,creating a circuit of electrical impulses that travels along nerve fibers.
• When the current is delivered, some people experience less pain.
• This may be because the electricity from the electrodes stimulates the nerves in an affected area and sends signals to the brain that block or "scramble" normal pain signals.
• Another theory is that theelectrical stimulation of the nerves may help the body to produce natural painkillers called endorphins, which may block the perception of pain.
• TENS machine for different wavelength frequencies, such as a steady flow of electrical current or a burst of electrical current, and for intensity of electrical current. Your physical therapist, acupuncturist, or doctor usually determines these settings.
• People use TENS to relieve pain for several different types of illnesses and conditions.
• They use it most often to treat muscle, joint, or bone problems that occur with illnesses such as osteoarthritis or fibromyalgia, or for conditions such as low back pain, neck pain,tendinitis, or bursitis.
• People have also used TENS to treat sudden (acute) pain, such as labor pain, and long-lasting (chronic) pain, such as cancer pain.
• TENS allow the user to select high-frequency stimulation (60 - 200Hz) or low-frequency stimulation (<10 Hz).
Abstract
• This project is targeted at people who are restricted from moving from a confined placed and people who are dumb.
• For example people who are partially paralyzed or cannot walk and are restricted to a bed and also who are unable to speak.
• In this project a system is built which will enable them to control the most frequently required things which could be devices like the lighting in the room or other electrical devices and also a voice processor is used in which programmed voice response can be stored.
• The responses from the fingers of the person can be used to play any of these pre programmed voice response.
• And also those who are not having finger also can use touch sense.
• Thus a dumb person can also produce a voice response using the system. It could also be the control of a wheel chair using just a few fingers.
• And the most handicap persons doesn’t have finger, they can also used to move the electronic wheel chair.
• When the finger is tapped on a surface the motion of the finger is detected and the same is used as trigger signal to turn an electrical device ON or OFF.
• The same trigger signal can be used for controlling a wheel chair’s movement. A microcontroller unit and a drive circuit are used for controlling the devices.
• Multiple fingers can be used for much such distinct response from which many devices can be controlled.
Abstract
• In embedded system is a special-purpose computer system designed to perform a dedicated function.
• Embedded system is fast growing technology in various fields like industrial automation, home appliances, automobiles, aeronautics etc.
• Now more than ever, embedded systems designers are recognizing the value of wireless.
• From home light switches and entertainment systems to industrial controls to remote monitoring and communications, wireless is permeating an increasing variety of applications that might once have been thought of as either standalone or otherwise happily tethered to a wire of some sort. -
Bio Medical
- Transabdominal Fetal Heart Rate Detection Using NIR Photopleythysmography - Instrumentation and Clinical Results
- A Neuro-Sliding-Mode Control with Adaptive Modeling of Uncertainty for Control of Movement in Paralyzed Limbs Using Functional Electrical Stimulation
- Bluestetho – Wireless Stethoscope Using Bluetooth
Abstract
• An embedded system is a special-purpose computer system designed to perform a dedicated function.
• Unlike a general-purpose computer, such as a personal computer, an embedded system performs one or a few pre-defined tasks, usually with very specific requirements. Since the system is dedicated to specific tasks, design engineers can optimize it, reducing the size and cost of the product.
• Embedded system is fast growing technology in various fields like industrial automation, home appliances, automobiles, aeronautics etc.
• An embedded system comprises of both hardware and software.
• Embedded technology uses PC or a controller to do the specified task and the programming is done using assembly language programming or embedded C.
Abstract
• An embedded system is a special-purpose computer system designed to perform a dedicated function.
• Unlike a general-purpose computer, such as a personal computer, an embedded system performs one or a few pre-defined tasks, usually with very specific requirements.
• Since the system is dedicated to specific tasks, design engineers can optimize it, reducing the size and cost of the product.
• Embedded system is fast growing technology in various fields like industrial automation, home appliances, automobiles, aeronautics etc.
• An embedded system comprises of both hardware and software.
• Embedded technology uses PC or a controller to do the specified task and the programming is done using assembly language programming or embedded C.Abstract
• The wireless environment introduced by Bluetooth technology can be used to increase the productivity in a medical environment by providing the means to an effortless transfer and storage of those data.
• With the following proposed implementation a doctor will be able to move freely in the clinic examining his patients using a Bluetooth-enhanced stethoscope, which can automatically send the captured sounds to a central workstation for further processing.
• The need for carrying along different kinds of recording and transmitting devices is alleviated through the use of the proposed BlueStetho.
• Moreover, in a critical or emergency room situation the doctor can focus on treating the patient rather than being concerned with the recording of important but not appropriate at that time biomedical data.
• This project focuses on the development of a Bluetooth enabled stethoscope, which provides the ability to transmit and store biomedical data in the least annoying way for both the patient and the doctor.
-
Electronics
- Intelligent Tollgate Management Using RFID
- Automatic Random Password Generator In Secured ATM System using GSM
- Prepaid EB Bill Management System And Fraud Alert Method In Energy Meter
Abstract
• The Embedded Technology is now in its prime and the wealth of knowledge available is mind-blowing.
• Embedded technology plays a major role in integrating the various functions associated with it.
• This needs to tie up the various sources of the department in a closed loop system.
• This proposal greatly reduces the manpower, saves time and operates efficiently without human interference.
• This project puts forth the first step in achieving the desired target. With the advent in technology, the existing systems are developed to have in built intelligence.Abstract
• The Embedded Technology is now in its prime and the wealth of knowledge available is mind-blowing. Embedded technology plays a major role in integrating the various functions associated with it. • This needs to tie up the various sources of the department in a closed loop system. • This proposal greatly reduces the manpower, saves time and operates efficiently without human interference. • :This project puts forth the first step in achieving the desired target. With the advent in technology, the existing systems are developed to have in built intelligence.Abstract
• The Embedded Technology is now in its prime and the wealth of knowledge available is mind-blowing.
• Embedded technology plays a major role in integrating the various functions associated with it.
• This needs to tie up the various sources of the Department in a closed loop system.
• This proposal greatly reduces the manpower, saves time and operates efficiently without human interference.
• This project puts forth the first step in achieving the desired target. With the advent in technology, the existing systems are developed to have in built intelligence.
• Ours being a developing country the power consumption is increasing on large scale to meet the growing demands. • Power generation is widely based on the non-renewable sources, and these sources being depleting some means have to be found for power saving.
-
Electrical
- Dc Motor Speed Scrutinizing and Controlling Using Thyristor
- Transmission Line Multiple Faults Detection and Indication to Electricity Board
- Exploitation of Pulse Width Modulation for DC Motor Speed Control
Abstract
• The Embedded Technology is now in its prime and the wealth of knowledge available is mind-blowing. • Embedded technology plays a major role in integrating the various functions associated with it.
• This needs to tie up the various sources of the Department in a closed loop system.
• This proposal greatly reduces the manpower, saves time and operates efficiently without human interference.
• This project puts forth the first step in achieving the desired target.
• With the advent in technology, the existing systems are developed to have in built intelligence.
Abstract
• The Embedded Technology is now in its prime and the wealth of knowledge available is mind-blowing.
• Embedded technology plays a major role in integrating the various functions associated with it.
• This needs to tie up the various sources of the Department in a closed loop system.
• This proposal greatly reduces the manpower, saves time and operates efficiently without human interference.
• This project puts forth the first step in achieving the desired target. With the advent in technology, the existing systems are developed to have in built intelligence.
Abstract
• A PWM circuit works by making a square wave with a variable on-to-off ratio, the average on time may be varied from 0 to 100 percent.
• In this manner, a variable amount of power is transferred to the load.
• The main advantage of a PWM circuit over a resistive power controller is the efficiency, at a 50% level, the PWM will use about 50% of full power, almost all of which is transferred to the load, a resistive controller at 50% load power would consume about 71% of full power, 50% of the power goes to the load and the other 21% is wasted heating the series resistor.
• Load efficiency is almost always a critical factor in solar powered and other alternative energy systems. One additional advantage of pulse width modulation is that the pulses reach the full supply voltage and will produce more torque in a motor by being able to overcome the internal motor resistances more easily.
• Finally, in a PWM circuit, common small potentiometers may be used to control a wide variety of loads whereas large and expensive high power variable resistors are needed for resistive controllers.
• The project consists of a 4 x 2 keypad. This consist a total of 8 keys. The keys are connected to the Port 1 of Atmel at89c51 microcontroller.
• The microcontroller is programmed to scan for the key press, if it detects the key press. It automatically generates the pwm signals at a duty cycle, which is defined with respect to the key that was pressed.
• For example pressing the first key informs microcontroller to generate a pwm signal with duty cycle of 100% off.
• And pressing the second key will generate the pwm signal of 15 % ON time. And thus the seven keys makes motor to run with different level of duty cycle.
• The generated pwm signals are taken from P2.0th pin of the microcontroller.
• The output is fed to the Opt coupler which has an inbuilt DIAC. The output of the opt coupler is fed to the gate pin of TRIAC.
• The triac drives the DC motor with respect to the triggering pulses that is obtained from the microcontroller.
-
Communication
- A Wireless Design of Low-Cost Irrigation System Using ZigBee Technology
- Research of Intelligent Home Security Surveillance System Based on ZigBee
- The Development of Road Lighting Intelligent Control System Based on Wireless Network Control
Abstract
• The Embedded Technology is now in its prime and the wealth of knowledge available is mind-blowing.
• Embedded technology plays a major role in integrating the various functions associated with it.
• This needs to tie up the various sources of the Department in a closed loop system.
• This proposal greatly reduces the manpower, saves time and operates efficiently without human interference.
• This project puts forth the first step in achieving the desired target.
• With the advent in technology, the existing systems are developed to have in built intelligence.
Abstract
• The Embedded Technology is now in its prime and the wealth of knowledge available is mind-blowing.
• Embedded technology plays a major role in integrating the various functions associated with it.
• This needs to tie up the various sources of the Department in a closed loop system.
• This proposal greatly reduces the manpower, saves time and operates efficiently without human interference.
• This project puts forth the first step in achieving the desired target.
• With the advent in technology, the existing systems are developed to have in built intelligence.
Abstract
• The Embedded Technology is now in its prime and the wealth of knowledge available is mind-blowing.
• Embedded technology plays a major role in integrating the various functions associated with it.
• This needs to tie up the various sources of the Department in a closed loop system.
• This proposal greatly reduces the manpower, saves time and operates efficiently without human interference.
• This project puts forth the first step in achieving the desired target.
• With the advent in technology, the existing systems are developed to have in built intelligence. -
GSM - GPS
- GSM-Based Wireless Home Appliances Monitoring & Control System
- GSM-Based Distribution Transformer Monitoring System
Abstract
• Home automation has been an important issue throughout the last two decades.
• Many solutions have been reported and implemented. A power line communication network infrastructure for smart home was reported by Lin and his team.
• The team used the existing electrical wiring and outlets as the medium for data communication within the home where no new wires are needed and many access points are available around the house.
• Other systems used conventional phone line for monitoring and controlling home appliances [2, 31. Most recently, Internet and wireless communications have been utilized in home automations [4-61.
• With the recent development in mobile computing devices and mobile networks, new and better solutions can be developed to make home automation more convenient and accessible on the basic of 24/7 from anywhere at any time.
• This paper presents one of the emerging applications of the GSM technology. We present the‘design of a stand-alone embedded system that can monitor and control home appliances locally using built-in input and output peripherals.
• Remotely, the system allows the homeowner to monitor and control his house appliances via his mobile phone set by sending commands in the form of SMS messages and receiving the appliances status as well.
Abstract
• This paper presents design and implementation of a mobile embedded system to monitor and record key operation indictors of a distribution transformer like load currents, transformer oil and ambient temperatures.
• The proposed on-line monitoring system integrates a Global Service Mobile (GSM) Modem, with stand alone single chip microcontroller and sensor packages.
• It is installed at the distribution transformer site and the above mentioned parameters are recorded using the built-in 8-channel analog to digital converter (ADC) of the embedded system.
• The acquired parameters are processed and recorded in the system memory.
• If there is any abnormality or an emergency situation the system sends SMS (Short Message Service) messages to designated mobile telephones containing information about the abnormality according to some predefined instructions and policies that are stored on the embedded system EEPROM.
• Also, it sends SMS to a central database via the GSM modem for further processing.
• This mobile system will help the utilities to optimally utilize transformers and identify problems before any catastrophic failure.
-
Biometric Sensor
- Fingerprint Prediction Enabled Passport Authentication System Using Embedded System
- Involuntary, Biometric Door Access Control and Attendance Maintenance System
- Bio Metric Recognition System Based Digital Voting Machine
Abstract
• “FINGERPRINT PREDICTION ENABLED PASSPORT AUTHENTICATION SYSTEM” here we using biometric sensor.
• It is directly connected to personal computer, already we stored in our image value in computer data base for person name and address and work detailes and stored in computer, once we show the finger means current and old values for finger image, if image value correct means authentication persons. • If not access means send it to arm processor it will switch on alarm will drive the buzzer and display in LCD.
Abstract
• Involuntary, Biometric Door Access Control and Attendance Maintenance System will manage the security system of any office, industry and any secured place.
• Here we are using scanner for taking finger print and the scanner is connected with the PC.
• Fingerprint is checked by the PC to find there is any match, if it matches with already saved fingerprints.
• PC will send some signal to serial port that will received by microcontroller which will drive the motor to open the door and at the same time it will maintain the attendance for future reference.
Abstract
• “Secured digital voting machine using finger print recognition” is very useful to recognize the authenticated person.
• In personal computer citizen finger print, name and other datas are maintained.
• In our project finger print scanner is connected to PC via USB port. Person finger print is captured and given to PC where new finger print is compared with authenticated finger prints;
• If it matches it will give some binary value to parallel port which is given to microcontroller. Controller accepts the data and displays the authentication and will also be ready to accept the voting.
• If any unauthenticated person comes for voting, PC will give some other binary value to controller, which displays unauthentication of the person along with the alarm.
-
RFID / Smart Cards
- Providing Group Tour Guide by RFIDs and Wireless Sensor Networks
- Robust and Efficient Password-Authenticated Key Agreement using Smart Cards for Campus Management
- Assessing the Feasibility of Using RFID Technology in Airports
Abstract
• This paper proposes a new application framework for group tour guiding services based on RFIDs and wireless sensor networks.
• We consider a sensing field mixed with multiple independent tourist groups, each with a leader and several members.
• Members of a group will follow the moving path of their leader, but may occasionally roam around randomly on their own interests.
• Sensor nodes have to track leaders’ locations and maintain guiding paths from members to leaders.
• A member may inquire where his/her leader is, and a leader may “recall” his/her members.
• We propose a feasible solution to such an application by using existing technologies and off-the-shelf components.
• A group guiding protocol is presented. The design enables reliable group guiding at low cost and low traffic load.
• Our prototyping system is reported and system performance is discussed.
Abstract
• Robust And Efficient Password-Authenticated Key Agreement Using Smartcard For campus Management”, provides the secured communication network.
• In various network environments, if a user wishes to use or control a remote server, the user first needs to pass the authentication scheme of the server.
• To provide a secure authentication system, password-based methods are often used in many remote login servers.
• In our project the finger print is used as a password. If the user wish to use the server, the finger print of the concerned user is passed to the local pc via microcontroller.
• Then the server from the remote area matches with the already stored code.
• If the user key is matched means the server send the smartcard to the user to access and control the server.
Abstract
• RFID is a promising technology which is expected to become ubiquitous in the coming years;assisting organizations in solving problems related to security, identification and asset tracking
• In this paper, we describe the design and implementation of a prototype system for baggage handling in airports.
• The proposed system enhances the management and tracking of passengers’ luggage while as a side effect improving airport security.
• It accomplishes this by integrating RFID technology together with networking and database technologies.
-
Networking Protocol
- Providing Group Tour Guide by RFIDs and Wireless Sensor Networks
- Providing Group Tour Guide by RFIDs and Wireless Sensor Networks
- Providing Group Tour Guide by RFIDs and Wireless Sensor Networks
Abstract
•Abstract
•Abstract
• -
Automotive Protocol
- Providing Group Tour Guide by RFIDs and Wireless Sensor Networks
- Providing Group Tour Guide by RFIDs and Wireless Sensor Networks
- Providing Group Tour Guide by RFIDs and Wireless Sensor Networks
Abstract
•Abstract
•Abstract
•
-
-
Robotics
- Robotic Arm with four Degrees of Freedom
- Automatic 360º Pick and Place Robot Controlled By PC
- Automatic Voice Announcement Based Robot Fire Analysis System
Abstract
• In our project “Robotic ARM with four degrees of freedom” we are going to design a high performance material handling robot.
• Here we are using sensor to identify the object in its path, if it identifies any object it will give signal to microcontroller which will alarm the buzzer to indicate the object.
• The robot picks that object and puts it in some other place.
• We are using stepper motors to control the movement of the robot.
• Here a dc motor is placed in the robot that will use to pick the object or material.
Abstract
• In our project “Automatic 360º Pick and Place robot controlled by PC” we are going to design a high performance material handling robot.
• Here we are using sensor to identify the object in its path, if it identifies any object it will give signal to microcontroller which will alarm the buzzer to indicate the object.
• The robot picks that object and puts it in some other place.
• We are using stepper motors to control the movement of the robot.
• Here a dc motor is placed in the robot that will use to pick the object or material.
Abstract
• This project is to design and develop an intelligence robot to detect fire accidents with voice announcement by using an 8 bit microcontroller.
• In our project the robot is designed to move automatically.
• The robot acts according to the command given by the program.
• It will move all the direction like forward, reverse, right and left.
• The object sensor is used to sense the object in front of robot mechanism.
• The fire sensing unit is available in robot mechanism. If fire is detected, robot will switch ON the Alarm Unit as well as voice play back unit.
• The software for the microcontroller is written using embedded C.
• The compiler used for hex code generation is keil Cx51 compiler.
-
Wireless
- Ivrs System Based Mobile Controlling Robot
- Multi Device Status Monitoring & Control System Using PC
- PC Based 4-Axis Stepper Motor Control in Industries Application
Abstract
• The main aim of our project is to control the movements of robot and by using mobile phone.
• Here we use the GSM technology for controlling the Robot movements.
• The input from the communicating mobile is converted into an digital signal in the receiving end by the DTMF module .
• This digital signal is fed to the microcontroller.
• The microcontroller controls the robot accordingly. The corresponding IVRS signal is also produced.
• This IVRS signal when sent back to the communicating mobile provides audio and direction information to the user.
Abstract
• The multi – device controlled system gives ON and OFF control of the appliances in home with PC as the input.
• This project consists of PC, serial port, ATMEL microcontroller, driver unit, and relay.
• More than one load can be controlled. The ON or OFF condition to be maintained in the load is given as PC input through the system.
• The communication between the PC and the microcontroller is via the serial port.
• The input to the microcontroller is given as digital values.
• There is a 16x2 LCD display which shows the current status of the load.
Abstract
• This is a computer era. Manpower is reduced by machine power. The human controlling methods are automated using computers and controllers.
• Pc-based programs control the 4-winding stepper motor.
• This circuit together with its software can be used for control of CNC machines and robots, which are increasingly being used in the industry.
• Through the software program one can create a sequence file for automatic execution, interactively.
• It also possible to edit the program file and change the parameters as desired.
• It is also possible to use different ratings for different control.
• The control is exercised thorough a pc with its vastly developed resources rather than a microprocessor kit.
• It makes the use of the parallel printer port and thus avoids additional address decoding and data input/output interface circuitry.
• The project designed is also can be used in robotics.
• Hence the name pc based 4-axis control was selected, since you can control four individual stepper motors, which, in turn, controls four axes. -
Automation
- PLC Based Dual Parameter Monitoring & Control System for Gas Cylinder Storage Room
- PLC Based Micro Fire Station For Industries
- PLC Based Multi Critical Parameter Monitoring and Tripping System for Industries
Abstract
• It is a very useful system for houses and industries. In this system, gas leakage is detected using LP gas sensor.
• If gas leakage is occurred in the sensor zone, the relay based tripping system trip the EB power in order to protect valuable things from gas accident.
• Power door system provides good ventilation by opening the window.
• The buzzer based sound alert system, produce sound alert to create alertness for neighbor.
• In same way the atmospheric temperature is also monitored using temperature sensor.
• To carry on the automation process PLC based technique is used here.
• By using OMRAN make six inputs and four out ZEN module, total process are done. The fire preventing automation is done using PLC.Abstract
• In this system fire accident is detected using fire sensor LM35 based circuit.
• If the fire is detected, first of all EB power is disconnected using relay tripper.
• Then water flashing system flash the water to quench the fire.
• To create alertness, buzzer based sound system produce sound.
• The motorized robo arms exactly detect the location and flash the water towards accident zone.
• This feature increases the fire quenching rate.
• To carry on the automation process PLC based technique is used here.
• By using OMRAN make six inputs and four out ZEN module, total process are done. The fire preventing automation is done using PLC.Abstract
• In micro protection of electrical machine, electrical parameters voltages, current and casing temperature are sensed by using P.T, C.T and temperature sensor based circuits respectively.
• The voltage level is monitored and compared with help of potential transformer, rectifier and comparator based circuit arrangement.
• The current level is also monitored using current transformer and precision rectifier based circuit.
• The casing temperature is monitored using temperature sensor.
• These three parameters are compared with IC LM324 based comparator circuit and feed to input block of PLC.
• The PLC gives the information about nature of fault by triggering voice recorder IC APR9600 and protects the machine by tripping the protective relay.
• To carry on the automation process PLC based technique is used here. By using OMRAN make six inputs and four out ZEN module, total process are done. The machine protection automation is done using PLC.

-
Wireless
- Tens- Tiny Electronic Shock Machine for Patient Transcutaneous Electrical Nerve stimulator
- Tens- Tiny Electronic Shock Machine for Patient Transcutaneous Electrical Nerve stimulator
- Tens- Tiny Electronic Shock Machine for Patient Transcutaneous Electrical Nerve stimulator
Abstract
•Abstract
•Abstract
• -
Communication
- A VLSI Architecture and the FPGA Prototype for MPEG-2 Audio/Video Decoding
- Design and Implementation of an OFDM System for Vehicular Communications with FPGA Technologies
- Using Quantum Cryptography for Securing Wireless LAN Networks
Abstract
• As a part of the recent digital lifestyle movement, demand for mobile digital video continually increases. While ISO/IEC 13818 (as approved by the Motion Picture Experts Group (MPEG) in November 1994, also known as MPEG-2 [8]) was originally developed for digital television, its popularity and effectiveness as a storage/transmission format and abundance of content have made it attractive for use in personal video playback devices.
• In such mobile devices, energy-efficiency becomes important to battery life, thus motivating the development of an energy-efficient audio/video decoder based on the MPEG-2 specification.
• This paper details our experience of developing an MPEG-2 audio/video decoder which operates at main level/main profile, 720 X 480 4:2:0 at 29.97 frames per second, with audio at 16 bits, 48 000 samples per second.
• The design has been developed with a focus on energy- efficiency.
Abstract
• This paper presents design and implementation results of an Orthogonal Frequency Division Multiplexing (OFDM) system customized for vehicular ad-hoc networks, based on the IEEE 802.11p standard specifications.
• The 802.11p is based on the widely spread IEEE 802.11a and intends to support both public safety and licensed private operations over communication channels.
• OFDM achieves very efficient use of the allocated bandwidth and the main advantage is its robustness to frequency selectivity in wireless environment, like in the case of vehicular communications.
• The OFDM transceiver implementation presented in this paper is based on FPGA technology and the VHDL hardware description language.
• The hardware modules designed include QPSK modulator-demodulator, serial to parallel converter, FFT, IFFT.
• The use of reconfigurable FPGA devices and VHDL descriptions allowed a large number of tests to be carried out for each module, in order to obtain optimum results.
• The final implementation consists of two identical Xilinx Virtex-4 FPGA development boards (one for the receiver and one for the transmitter), offering among others dual channel high performance ADCs and DACs, required for operation in the licensed ITS band of 5.9 GHz.Abstract
• Quantum cryptography is an emerging technology in which two parties may simultaneously generate shared, secret cryptographic key material using the transmission of quantum states of light.
• Key distribution is the problem of classical cryptography algorithm, and tends to provide safe channel to transport key.
• Quantum cryptography could distribute key in quantum channel. Eavesdropper cannot access to key on quantum channel.
• If Eve attack on quantum channel QBER increases and she is detected.
• While the application of quantum cryptography in fiber network has significant advances, research on the application of quantum cryptography in mobile networks is still premature.
• In this paper, we analyze the interests of using quantum technique for the distribution of encryption keys in 802.11 wireless networks.
• We also propose a scheme for the combination of quantum cryptography and 802.11i security mechanisms for the establishment of the PTK (Pair-wise Transient Key). -
Image Processing
- Tens- Tiny Electronic Shock Machine for Patient Transcutaneous Electrical Nerve stimulator
- Tens- Tiny Electronic Shock Machine for Patient Transcutaneous Electrical Nerve stimulator
- Tens- Tiny Electronic Shock Machine for Patient Transcutaneous Electrical Nerve stimulator
Abstract
•Abstract
•Abstract
• -
Core VLSI
- A Compact FPGA-Based Architecture for Elliptic Curve Cryptography Over Prime Fields
- A New Compact SD2 Positive Integer Triangular Array Division Circuit
- Definition of novel compact architecture for a non-restoring divisor based on the SD2 representation for the partial remainder;
- Triangular hardware implementation of a divider that meets time performance while reducing area requirements.
- Building an AMBA AHB Compliant Memory Controller
Abstract
• This paper proposes an FPGA-based application-specific elliptic curve processor over a prime field.
• This research targets applications for which compactness is more important than speed. To obtain a small data path, the FPGA’s dedicated multipliers and carry-chain logic are used and no parallelism is introduced.
• A small control unit is obtained by following a microcode approach, in which the instructions are stored in the FPGA’s Block RAM.
• The use of algorithms that prevent Simple Power Analysis (SPA) attacks creates an extra cost in latency.
• Nevertheless, the created processor is flexible in the sense that it can handle all finite field operations over 256-bit prime fields and all elliptic curves of a specified form.
• The comparison with other implementations on the same generation of FPGAs learns that our design occupies the smallest area.
Abstract
• DIVISION is the most complex of the four basic arithmetic operations and, consequently, the most time-consuming.
• In very large scale integration (VLSI), implementation is generally slower and more area consuming than those of the other three basic arithmetic operations.
• Even considering this complexity in current complex digital systems, achieving an efficient hardware unit becomes essential.
• The arithmetic division operation can be seen as a sequence of subtractions and comparisons.
• Because these two operations have carry-chains in opposite directions, it is not possible to provide the respective carries simultaneously.
• Therefore, it is generally not possible to start a comparison before the corresponding subtraction has been computed.
• According to this scenario, the division is regarded as a slow operation, characterized by a delay of O(n²).Radix-2 digit-recurrence (or subtract-and-shift) algorithms, both restoring and non-restoring, are widely used to perform integer division.
• Our paper will focus on the definition of a novel non-restoring division unit that exhibits all the advantages of the radix-2 signed-digit (SD2) representation of the partial remainders, but involves a triangular architecture that leads to a saving in the required area.
• The main novel contributions for this work are:Abstract
• Microprocessor performance has improved rapidly these years. In contrast, memory latencies and bandwidths have improved little.
• The result is that the memory access time has been a bottleneck which limits the system performance.
• Memory controller (MC) is designed and built to attacking this problem.
• The memory controller is the part of the system that, well, controls the memory.The memory controller is normally integrated into the system chipset.
• This paper shows how to build an Advanced Microcontroller Bus Architecture (AMBA) compliant MC as an Advanced High-performance Bus (AHB) slave.
• The MC is designed for system memory control with the main memory consisting of SRAM and ROM.
• Additionally, the problems met in the design process are discussed and the solutions are given in the paper.
• This paper describes how to build the AHB-MC. And combining the problem met in the process of designing, the corresponding solutions are presented.
• Finally, the simulation results are presented -
Low Power VLSI
- An Energy Efficient Secure Logic to Provide Resistance Against DPA Attacks
- Delay Based Dual Rail-Precharge Logic
Abstract
• Secure communication is very important in the present world. Although the power minimization has become a primary concern, it is not the most important design factor in many cases. For example, security is the main goal when designing cryptographic hardware.
• In one hand, cryptographic hardware is threatened strongly by several side channel attack (SCA) scenarios and especially differential power analysis (DPA) attacks. On the other hand, cryptographic VLSI systems are energy consuming.
• This makes them limited and inefficient for power critical applications, particularly in portable battery operated systems.
• Several techniques have been devised at cell level to make cryptographic VLSI systems resistant against these attacks.
• Therefore, devising a technique to attain both low energy consumption and DPA resistance seems to be very appealing and necessary.
• This work, proposes a new logic style which is resistant to DPA attacks as well as energy efficient, to provide security to devices like smart cards.
• The main drawback in the existing secure logic styles was the high power consumption which is reduced significantly by using adiabatic approach. Dual-rail logic is used to maintain security and adiabatic logic is combined with it to reduce the power consumption.
• These ideas are implemented using Tspice tool, a significant improvement in power consumption and resistance against DPA attacks are observed when compared to the existing logic styles.
Abstract
• Secure communication is very important in the present world. Although the power minimization has become a primary concern, it is not t the most important design factor in many cases.
• For example, security is the main goal when designing cryptographic hardware. In one hand, cryptographic hardware is threatened strongly by several side channel attack (SCA) scenarios and especially differential power analysis (DPA) attacks.
• On the other hand, cryptographic VLSI systems are energy consuming.
• This makes them limited and inefficient for power critical applications, particularly in portable battery operated systems.
• Several techniques have been devised at cell level to make cryptographic VLSI systems resistant against these attacks.
• Therefore, devising a technique to attain both low energy consumption and low area seems to be very appealing and necessary.
• This work, proposes a new dual-rail precharge logic style whose power consumption is insensitive to unbalanced load conditions thus allowing adopting a semi-custom design flow without any constraints on the routing of complementary wires.
• The main drawback in the existing secure logic styles were additional area this will be reduced in DDPL by using two control signals.
• These ideas are implemented using Tspice tool, a significant improvement in energy consumption upto 50 times and an area reduction up to 60% attacks are observed when compared to the existing logic styles.

-
Digital Image Processing
- Segmentation of SAR Using Improved Watershed Algorithm
- Biomedical Image Retrieval Using SVM Classification and Relevance Feedback
- Scalable Face Image Retrieval with Identity-Based Quantization and Multireference Reranking
Abstract
• Synthetic-aperture radar (SAR) is a form of radar whose defining characteristic is its use of relative motion between an antenna and its target region to provide distinctive long-term coherent-signal variations.
• The mean-shift (MS) algorithm is applied for reducing speckle noise and segmenting synthetic aperture radar (SAR) images.
• Two coastal images acquired by Envisat’s advanced SAR (ASAR).
• A speckle ltered image where textures and edges are preserved, or a segmented image, where land and sea are distinguished, as a previous stage for obtaining a land mask and detecting the coastal line.
• In all cases, Gaussian kernels are used. The use of a combined spatial range processing and the corresponding bandwidths makes the MS suit-able for the two proposed problems.
Abstract
• Effectively and efficiently searching in large image collections poses significant technical challenges as the characteristics of the medical images differ significantly from other general purpose images.
• A classification-driven biomedical image retrieval framework based on image filtering and similarity fusion by employing supervised learning techniques is presented.
• A support vector machine (SVM) is a concept in computer science for a set of related supervised learning methods that analyze data and recognize patterns, used for classification and regression analysis.
• In this framework, the probabilistic outputs of a multiclass support vector machine (SVM) classifier as category prediction of query and database images are exploited at first to filter out irrelevant images, thereby reducing the search space for similarity matching.
• Images are classified at a global level according to their modalities based on different low-level, concept, and key point-based features.
• It is difficult to find a unique feature to compare images effectively for all types of queries.
• Hence, a query-specific adaptive linear combination of similarity matching approach is proposed by relying on the image classification and feedback information from users.
• Based on the prediction of a query image category, individual precomputed weights of different features are adjusted online
• The prediction of the classifier may be inaccurate in some cases and a user might have a different semantic interpretation about retrieved images.
• Hence, the weights are finally determined by considering both precision and rank order information of each individual feature representation by considering top retrieved relevant images as judged by the users.
• As a result, the system can adapt itself to individual searches to produce query-specific results.
• Experiment is performed in a diverse collection of 5000 biomedical images of different modalities, body parts, and orientations.
• It demonstrates the efficiency (about half computation time compared to search on entire collection) and effectiveness (about 10%–15% improvement in precision at each recall level) of the retrieval approach.Abstract
• To the best of our knowledge, little work aims at web-scale face image retrieval.
• Our aim is to build a scalable face image retrieval system. For this purpose, we develop a new scalable face representation using both local and global features.
• First, we locate component-based local features that not only encode geometric constraints, but are also more robust to pose and expression variations.
• Second, we present a novel identity based quantization scheme to quantize local features into discriminative visual words, allowing us to index face images, a critical step to achieve scalability.
• We then use a new multireference distance to rerank the candidate images using the Hamming signature.
• On a one millon face database, we show that our local features and global Hamming signatures are complementary—the inverted index based on local features provides candidate images with good recall, while the multireference reranking with global Hamming signature leads to good precision.
• As a result, our system is not only scalable but also outperforms the linear scan retrieval system using the state-of-the-art face recognition feature in term of the quality.
-
Bio Medical Imaging
- Automated and Interactive Lesion Detection and Segmentation in Uterine Cervix Images
- Discrete Wavelet Transform
- Markov Random Field
- Conditional Random Field
- Lung Cancer Detection By Using Artificial Neural Network and Fuzzy Clustering Methods
- The Research and Exploration of Soft X-Ray Microscopy on the Image Identification System of Squamocellular Cancer of Esophagus
Abstract
• This paper presents a procedure for automatic extraction and segmentation of a class-speci?c object (or region) by learning class speci?c boundaries.
• We describe and evaluate the method with a speci?c focus on the detection of lesion regions in uterine cervix images.
• Our proposed framework departs from previous methods in that we include domain-speci?c diagnostic features in a probabilistic manner using conditional random ?elds.
• The watershed segmentation map of the input image is modeled using a Markov random ?eld (MRF) in which watershed regions correspond to binary random variables indicating whether the region is part of the lesion tissue or not.
• The local pairwise factors on the arcs of the watershed map indicate whether the arc is part of the object boundary.
• The factors are based on supervised learning of a visual word distribution.
• The final lesion region segmentation is obtained using a loopy belief propagation applied to the watershed arc level MRF.
• Experimental results on real data show state of the art segmentation results on this very challenging task that, if necessary, can be interactively enhanced.
Abstract
• The early detection of the lung cancer is a challenging problem, due to the structure of the cancer cells.
• This paper presents two segmentation methods, EM segmentation and a Fuzzy C-Mean (FCM) clustering algorithm, for segmenting lung cancer images to detect the lung cancer in its early stages.
• The manual analysis of the samples is time consuming, inaccurate and requires intensive trained person to avoid diagnostic errors.
• The segmentation results will be used as a base for a Computer Aided Diagnosis (CAD) system for early detection of lung cancer which will improves the chances of survival for the patient.
• The two methods are designed to classify the image of N pixels among M classes.
• In this study, we used 1000 sputum color images to test both methods, and EM has shown a better classification result than FCM, the HNN succeeded in extracting the nuclei and cytoplasm regions.
• Finally we implemented Modified Gradient Based Region Growing Segmentation for further improvement in segmented output for diagnosis results
Abstract
• Nowadays, soft X-Ray microscopy technology is one of the hottest methods that researches and observes the biological samples of natural state, whose resolution is higher than the imaging drawing of optical microscope and near to the imaging drawing of electron microscope.
• The technology is simple for the preparation of biological sample, which needs only ultramicrocut.
• And the working procedure of traditional pathology check, such as freezing, sealing wax, dehydration and dyeing, etc. isn’t needed.
• A kind of image recognition system is selected in the paper, which identifies and researches the tissue morphological characteristics of ultra structure imaging drawing of squamocellular cancer of esophagus obtained by soft X-Ray microscopy.
• The system mainly consists of components of image preprocessing, image identification, cellular feature extraction and cellular feature recognition, etc.
• Image preprocessing includes grayscale transformation, histogram adjustment, etc.
• Image identification includes identification based on the threshold, image processing based on the structure morphology of cell tissue, and edge detection, etc.
• In cellular feature extraction, the method of extracting area connected is used.
• And in cellular feature recognition, the judgment of area ratio of nucleus and cytoplasm is adopted.
• According to the morphology characteristics of tissue ultrastructure of squamocellular cancer of esophagus, a kind of cancer identification method based on the area threshold is employed emphatically in the paper, aiming at distinguishing the normal cell and cancer cell successfully.
• The technology application on the aspects of clinical diagnosis and differentiate diagnosis of the image recognition system in the paper still needs to be researched further.
-
Bio Metrics
- Secure and Robust Iris Recognition using Random Projections and Sparse Representations
- Ability to handle unconstrained acquisition,
- Robust and accurate matching
- Privacy enhancement without compromising security.
- Super Resolution Method for Face Recognition Using Non-Linear Mapping in Coherent Features
- Face Recognition Using Neuro-Fuzzy Method
Abstract
• Non-contact biometrics such as face and iris have additional benefits over contact based biometrics such as fingerprint and hand geometry.
• However, three important challenges need to be addressed in a non-contact biometrics-based authentication system:
• In this paper, we propose a unified framework based on random projections and sparse representations, that can simultaneously address all the three issues mentioned above.
• Our proposed quality measure can handle segmentation errors and a wide variety of possible artifacts during iris acquisition.
• In this approach it can be easily extended to handle alignment variations and recognition from iris videos, resulting in a robust and accurate system.
Abstract
• Low-resolution (LR) of face images signi?cantly decreases the performance of face recognition.
• To address this problem, we present a super-resolution method that uses non-linear mappings to infer coherent features that favor higher recognition of the nearest neighbor (NN) classi?ers for recognition of single LR face image.
• Canonical correlation analysis is applied to establish the coherent subspaces between the principal component analysis (PCA) based features of high-resolution (HR) and LR face images.
• Then, a nonlinear mapping between HR/LR features can be built by radial basis functions (RBFs) with lower regression errors in the coherent feature space than in the PCA feature space.
• Thus, we can compute super-resolved coherent features corresponding to an input LR image according to the trained RBF model ef?ciently and accurately.
• And, face identity can be obtained by feeding these super-resolved features to a simple NN classier.
•Abstract
• A facial recognition system is a computer application for automatically identifying or verifying a person from a digital image or a video frame from a video source.
• One of the ways to do this is by comparing selected facial features from the image and a facial database.
• It is typically used in security systems and can be compared to other biometric techniques such as fingerprint or iris recognition systems.
• Every face has approximately 80 nodal points like (Distance between the eyes, Width of the nose etc).
• The basic face recognition system capture the sample, extract feature, compare template and perform matching.
• In this paper two methods of face recognition are compared- neural networks and neuro fuzzy method.
• For this curvelet transform is used for feature extraction.
• Feature vector is formed by extracting statistical quantities of curve coefficients.
• From the statistical results it is concluded that neuro fuzzy method is the better technique for face recognition as compared with neural networks -
Digital Signal Processing
-
Audio Processing
-
Communication Systems
-
Wireless Sensor Networks
-
Power Electronics


