به نام خدا
Title: Low Power VLSI Implementation of Adaptive Noise Canceller Based on LeastMean Square Algorithm
Authors: Vakulabharanam Ramakrishna, Tipparti Anil Kumar
Abstract: This paper presents VLSI implementation of adaptive noise canceller based on least mean square algorithm. First, the adaptive parameters are obtained by simulating noise canceller on MATLAB. Simulink model of adaptive noise canceller was developed and the noise is suppressed to a much larger extent in recovering the original signal. The data such as input and output signals, desired signal, step size factor and coefficients of adaptive filter was processed by FPGA. Finally, the functions of field programmable gate array -based system structure for adaptive noise canceller based on LMS algorithm are synthesized, simulated, and implemented on XilinxXC3s200 field programmable gate array using Xilinx ISE tool. The research results show that it is feasible to implement and use adaptive least mean square filter based adaptive noise canceller design which consumed a low power of 0.156W at29.1° C in a single field programmable gate array chip.
Publish Year: 2013
Published in: ISMS - IEEE
Number of Pages: 4
موضوع: طراحی مدارهای VLSI – سخت افزار کامپیوتر
ایران سای – مرجع مقالات علمی فنی مهندسی
حامی دانش بومی ایرانیان
به نام خدا
Title: The Application of Coal Cleaning Detection System based on Embedded Real-time Image Processing
Authors: Qian Mu ,Jixian Dong
Abstract: This paper introduces a high-speed image processing of embedded systems based on FPGA and DSP collaboration used in coal preparation detection technology. The system uses a modular design, including a real-time image acquisition module, DSP image processing module, and peripheral interface module. The image processing required doing the following arithmetic operations, including image smoothing to enhance, edge detection, region segmentation, gray-scale analysis, pattern recognition. After completion of the above algorithm, the system determines the image feature of coal and gangue, particularly their gray scale values and the center of gravity. By analysis of the characteristics of the image, the system identifies the gangue. The image processing is conducive to the follow-up to discharge refuse treatment .
Publish Year: 2013
Published in: ICMTMA - IEEE
Number of Pages: 3
موضوع: پردازش تصویر
ایران سای – مرجع مقالات علمی فنی مهندسی
حامی دانش بومی ایرانیان
به نام خدا
Title: A Secure Authentication Protocol among Mobile Phone and Wireless Sensor Networks
Authors: Ndibanje Bruce, Hoon Jae Lee
Abstract: The interaction between mobile phone and wireless sensor networks has increased these days due to the WSN emergence and its ubiquitous nature. Through cellular network, a user can access gateway of wireless sensor networks and gets the data. This paper proposes a secure authentication protocol where a user is strongly verified before accessing the data. The secure authentication proposed protocol provides many security principles to the users for instance user, mutual authentication, and secure session key establishment. Furthermore, security analysis shows .that the proposed protocol possesses many advantages against popular attacks, and achieves better efficiency at low computation cost.
Publish Year: 2013
Published in: ICACT - IEEE
Number of Pages: 8
موضوع: امنیت شبکه (Network Security) – احراز هویت (Authentication)
ایران سای – مرجع مقالات علمی فنی مهندسی
حامی دانش بومی ایرانیان
به نام خدا
Title: Accelerating E-Commerce Sites in the Cloud
Authors: Wei Hao, James Walden, Chris Trenkamp
Abstract: E-commerce web sites typically have large fluctuations in their IT resource usage, while rapid elasticity is an essential characteristic of cloud computing. These characteristics make the cloud a good fit for hosting e-commerce web sites. Cloud providers deploy their cloud in their data centers. However, cloud providers usually have a limited number of data center locations around the world. Thus, e-commerce web sites in the cloud may be far away from their customers. Long client-perceived response latency may cause e-commerce web sites to lose business. To solve this problem, we propose a virtual proxy solution to reduce the response latency of the e-commerce site in the cloud. In our approach, a virtual proxy platform is designed to cache applications and data of e-commerce sites. A k-means based table partitioning algorithm is designed to select frequently used data from the database in the cloud. We have used an industrial e-commerce benchmark TPC-W to evaluate the performance of our approach. The experimental results show that our approach can significantly reduce the client-perceived response time.
Publish Year: 2013
Published in: CCNC – IEEE
موضوع: تجارت الکترونیک (E-Commerce)
ایران سای – مرجع مقالات علمی فنی مهندسی
حامی دانش بومی ایرانیان
به نام خدا
Title: Secure E-Commerce Protocol for Purchase of e-Goods - Using Smart Card
Authors: Devane, S.; Chatterjee, M.; Phatak, D.
Abstract: The rapid growth of e-commerce for buying and selling electronic goods or intangible goods has necessitated the need for development of a number of e-commerce protocols, which ensure integrity, confidentiality, atomicity and fair exchange. In this paper we propose an e-commerce protocol for performing business over the Internet. The protocol uses a smart card for ensuring mutual authentication, dispute resolution and fair exchange and reduces reliance on a trusted third party. Atomicity is also maintained in the protocol.
Publish Year: 2007
Published by: IAS – IEEE
موضوع: تجارت الکترونیک (Electronic Commerce)
ایران سای – مرجع علمی فنی مهندسی
حامی دانش بومی ایرانیان