Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (39)
  • Open Access

    ARTICLE

    A Secure Hardware Implementation for Elliptic Curve Digital Signature Algorithm

    Mouna Bedoui1,*, Belgacem Bouallegue1,2, Abdelmoty M. Ahmed2, Belgacem Hamdi1,3, Mohsen Machhout1, Mahmoud1, M. Khattab2

    Computer Systems Science and Engineering, Vol.44, No.3, pp. 2177-2193, 2023, DOI:10.32604/csse.2023.026516

    Abstract Since the end of the 1990s, cryptosystems implemented on smart cards have had to deal with two main categories of attacks: side-channel attacks and fault injection attacks. Countermeasures have been developed and validated against these two types of attacks, taking into account a well-defined attacker model. This work focuses on small vulnerabilities and countermeasures related to the Elliptic Curve Digital Signature Algorithm (ECDSA) algorithm. The work done in this paper focuses on protecting the ECDSA algorithm against fault-injection attacks. More precisely, we are interested in the countermeasures of scalar multiplication in the body of the elliptic curves to protect against… More >

  • Open Access

    ARTICLE

    Implementation of FPGA Based MPPT Techniques for Grid-Connected PV System

    Thamatapu Eswara Rao*, S. Elango

    Intelligent Automation & Soft Computing, Vol.35, No.2, pp. 1783-1798, 2023, DOI:10.32604/iasc.2023.028835

    Abstract Global energy demand is growing rapidly owing to industrial growth and urbanization. Alternative energy sources are driven by limited reserves and rapid depletion of conventional energy sources (e.g., fossil fuels).Solar photovoltaic (PV), as a source of electricity, has grown in popularity over the last few decades because of their clean, noise-free, low-maintenance, and abundant availability of solar energy. There are two types of maximum power point tracking (MPPT) techniques: classical and evolutionary algorithm-based techniques. Precise and less complex perturb and observe (P&O) and incremental conductance (INC) approaches are extensively employed among classical techniques. This study used a field-programmable gate array… More >

  • Open Access

    ARTICLE

    Medical Image Demosaicing Based Design of Newton Gregory Interpolation Algorithm

    E. P. Kannan1,*, S. S. Vinsley2, T. V. Chithra3

    Intelligent Automation & Soft Computing, Vol.34, No.3, pp. 1675-1691, 2022, DOI:10.32604/iasc.2022.022707

    Abstract In this paper, Field-Programmable Gate Array (FPGA) implementation-based image demosaicing is carried out. The Newton Gregory interpolation algorithm is designed based on FPGA frame work. Interpolation is the method of assessing the value of a function for any in-between value of self-regulating variable, whereas the method of computing the value of the function outside the specified range is named extrapolation. The natural images are collected from Kodak image database and medical images are collected from UPOL (University of Phoenix Online) database. The proposed algorithm is executed on using Xilinx ISE (Integrated Synthesis Environment) Design Suite 14.2 and is confirmed on… More >

  • Open Access

    ARTICLE

    FPGA Implementation of Elliptic-Curve Diffie Hellman Protocol

    Sikandar Zulqarnain Khan1,*, Sajjad Shaukat Jamal2, Asher Sajid3, Muhammad Rashid4

    CMC-Computers, Materials & Continua, Vol.73, No.1, pp. 1879-1894, 2022, DOI:10.32604/cmc.2022.028152

    Abstract This paper presents an efficient crypto processor architecture for key agreement using ECDH (Elliptic-curve Diffie Hellman) protocol over . The composition of our key-agreement architecture is expressed in consisting of the following: (i) Elliptic-curve Point Multiplication architecture for public key generation (DESIGN-I) and (ii) integration of DESIGN-I with two additional routing multiplexers and a controller for shared key generation (DESIGN-II). The arithmetic operators used in DESIGN-I and DESIGN-II contain an adder, squarer, a multiplier and inversion. A simple shift and add multiplication method is employed to retain lower hardware resources. Moreover, an essential inversion operation is operated using the Itoh-Tsujii… More >

  • Open Access

    ARTICLE

    FPGA Implementation of 5G NR Primary and Secondary Synchronization

    Aytha Ramesh Kumar1,*, K. Lal Kishore2

    CMC-Computers, Materials & Continua, Vol.73, No.1, pp. 1585-1600, 2022, DOI:10.32604/cmc.2022.021573

    Abstract The 5G communication systems are widely established for high-speed data processing to meet users demands. The 5G New Radio (NR) communications comprise a network of ultra-low latency, high processing speeds, high throughput and rapid synchronization with a time frame of 10 ms. Synchronization between User Equipment (UE) and 5G base station known as gNB is a fundamental procedure in a cellular system and it is performed by a synchronization signal. In 5G NR system, Primary Synchronization Signal (PSS) and Secondary Synchronization Signal (SSS) are used to detect the best serving base station with the help of a cell search procedure.… More >

  • Open Access

    ARTICLE

    Field Programmable Gate Arrays (FPGA) Based Computational Complexity Analysis of Multicarrier Waveforms

    C. Ajitha1,*, T. Jaya2

    Intelligent Automation & Soft Computing, Vol.34, No.2, pp. 1033-1048, 2022, DOI:10.32604/iasc.2022.021984

    Abstract Multicarrier waveforms with enhanced spectral efficiency, low latency, and high throughput are required for 5G wireless networks. The Orthogonal Frequency Division Multiplexing (OFDM) method is well-known in research, but due to its limited spectral efficiency, various alternative waveforms are being considered for 5G systems. In the recent communication world, NOMA (non-orthogonal multiple access) plays a significant part due to its wider transmission of data with less bandwidth allocation. Even if a high data rate can be attained, the transmission problem will arise due to the spread of multiple paths. In order to reduce complexity and area utilization, a novel PL-based… More >

  • Open Access

    ARTICLE

    An FPGA Design for Real-Time Image Denoising

    Ahmed Ben Atitallah*

    Computer Systems Science and Engineering, Vol.43, No.2, pp. 803-816, 2022, DOI:10.32604/csse.2022.024393

    Abstract The increasing use of images in miscellaneous applications such as medical image analysis and visual quality inspection has led to growing interest in image processing. However, images are often contaminated with noise which may corrupt any of the following image processing steps. Therefore, noise filtering is often a necessary preprocessing step for the most image processing applications. Thus, in this paper an optimized field-programmable gate array (FPGA) design is proposed to implement the adaptive vector directional distance filter (AVDDF) in hardware/software (HW/SW) codesign context for removing noise from the images in real-time. For that, the high-level synthesis (HLS) flow is… More >

  • Open Access

    ARTICLE

    Smart Grid Security by Embedding S-Box Advanced Encryption Standard

    Niraj Kumar1,*, Vishnu Mohan Mishra2, Adesh Kumar3

    Intelligent Automation & Soft Computing, Vol.34, No.1, pp. 623-638, 2022, DOI:10.32604/iasc.2022.024804

    Abstract Supervisory control and data acquisition (SCADA) systems continuously monitor the real-time processes in the smart grid. The system software, which is based on a human-machine interface (HMI), makes intelligent decisions to assist the system operator and perform normal grid management activities. The management of SCADA networks and monitoring without proper security is a major concern, as many grids and plant networks still lack necessary monitoring and detection systems, making them vulnerable to attack. SCADA networks exploit physical weaknesses as well as cyber-attacks. Researchers have developed a monitoring system based on a field-programmable gate array (FPGA) and a microcontroller that allows… More >

  • Open Access

    ARTICLE

    A Resource-Efficient Convolutional Neural Network Accelerator Using Fine-Grained Logarithmic Quantization

    Hadee Madadum*, Yasar Becerikli

    Intelligent Automation & Soft Computing, Vol.33, No.2, pp. 681-695, 2022, DOI:10.32604/iasc.2022.023831

    Abstract Convolutional Neural Network (ConNN) implementations on Field Programmable Gate Array (FPGA) are being studied since the computational capabilities of FPGA have been improved recently. Model compression is required to enable ConNN deployment on resource-constrained FPGA devices. Logarithmic quantization is one of the efficient compression methods that can compress a model to very low bit-width without significant deterioration in performance. It is also hardware-friendly by using bitwise operations for multiplication. However, the logarithmic suffers from low resolution at high inputs due to exponential properties. Therefore, we propose a modified logarithmic quantization method with a fine resolution to compress a neural network… More >

  • Open Access

    ARTICLE

    An Efficient HW/SW Design for Text Extraction from Complex Color Image

    Mohamed Amin Ben Atitallah1,2,3,*, Rostom Kachouri2, Ahmed Ben Atitallah4, Hassene Mnif1

    CMC-Computers, Materials & Continua, Vol.71, No.3, pp. 5963-5977, 2022, DOI:10.32604/cmc.2022.024345

    Abstract In the context of constructing an embedded system to help visually impaired people to interpret text, in this paper, an efficient High-level synthesis (HLS) Hardware/Software (HW/SW) design for text extraction using the Gamma Correction Method (GCM) is proposed. Indeed, the GCM is a common method used to extract text from a complex color image and video. The purpose of this work is to study the complexity of the GCM method on Xilinx ZCU102 FPGA board and to propose a HW implementation as Intellectual Property (IP) block of the critical blocks in this method using HLS flow with taking account the… More >

Displaying 11-20 on page 2 of 39. Per Page