The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Adders are one of the most common unit in digital systems. The speed, power and area occupied by an adder play a vital role in Digital Signal Processing system, Image Processing system, etc. Hence, they play an important role in deciding the time period of the clock, the place and route of various units comprising of the system and total power consumed by the system. In this paper, we propose a new...
From the ancient times, every human being has been trying to improve themselves, either for personal or societal benefits. These benefits define the well-being of individuals. Well-being can be judged by outer and inner factors. The outer factors can be in the form of materials and it can measure by objective factors like GDP (Gross Development Product). The internal components are the feelings of...
Conventional traffic light systems become ineffective when increase in traffic does not take place simultaneously in all directions of a junction. Moreover, their performance further degrades in the case of disruptions like accident or vehicle breakdown, increasing the rate of fuel consumption and air pollution. In this paper, we propose an traffic light system which itself adjusts traffic lights'...
Banknote identification systems, with their wide applications in Automated Teller Machines (ATMs), vending machines and currency recognition aids for the visually impaired, are one of the most widely researched fields today. The present paper proposes a novel technique for recognition of Indian currency banknotes by adopting a modular approach. The proposed work extracts distinct and unique features...
In this paper, we propose the digital detection and decryption of a sudoku puzzle using vision based techniques and subsequent solving of the puzzle in FPGA using brute force. The system can recognize any sudoku puzzle captured from a digital camera and after employing appropriate pre-processing algorithms which include adaptive thresholding, Hough Transform and geometric transformation, the digits...
In accordance with the past trend of technological advancements in hardware implementation of security mechanisms, there is an ongoing decrease in size of cryptographic systems with increase in low power and high throughput constraints. In this paper, we present a novel 8-bit pipelined architecture for Advanced Encryption Standard (AES) which ensures high throughput with low area and power consumption...
As network technology advances, information security issues increase the need for developing low-area and low-power high performance real-time processing of cryptographic algorithms. In this paper, we present a novel 8-bit architecture for Advanced Encryption Standard (AES) encryption which supports keys of 128-bit in length. The proposed architecture consists of a single round of ShiftRows, ByteSubstitution,...
In this paper, we propose the digital detection and decryption of a sudoku puzzle using vision based techniques and subsequent solving of the puzzle using three algorithms-Backtracking, Simulated Annealing and Genetic Algorithm. The proposed method can recognize any sudoku puzzle captured from a digital camera and after employing appropriate pre-processing algorithms which include adaptive thresholding,...
In this paper, we present a new pipelined 8-bit architecture for Advanced Encryption Standard (AES) encryption. The new architecture supports encryption with 128-bit keys with 10 rounds of Byte Substitution, Shift Rows, Mix Columns and Add Round Key operations. We emphasized on optimizing a single round by using an 8-bit architecture instead of 128-bit architecture which resulted into overall optimization...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.