The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
The paper presents the natural extension DTC principle of three level diode clamped voltage inverter fed induction motor. This technique is based on a simple algorithm using look-up table for a three-level inverter established from a standard two-level inverter. The control algorithm is implemented using Field Programmable Gate Arrays (FPGA) with VHDL coding.
In this paper we introduce a jigsaw-puzzle model to instill an entrepreneurial mindset in students. We then use our model to craft and add innovative lab assignments to “Digital Systems”, which is a core course taken by Electrical Engineering, Computer Engineering and Computer Science students worldwide. In each lab assignment, students are provided with some components or puzzle pieces as well as...
The problem of scalable and optimal behavior-style description of the binary encoder implementation into FPGA was examined. The structural synthesis technique of the binary encoder with input requests filtration and error detection circuits, which allow improving FPGA resource utilization in comparison with typical description, was proposed. The results of research and development, which have presented...
BER (bit error rate) measurement is an important criterion to analyze digital communication systems. In literature this measurement generally performed through simulation programs like Matlab/Simulink. It is considered that the simulation programs may not represent a real communication system and also they are quite time consuming and expensive. However, modeling communication systems with parallel...
QR codes, intended for maximum accessibility are widely in use these days and can be scanned readily by mobile phones. Their ease of accessibility makes them vulnerable to attacks and tampering. Certain scenarios require a QR code to be accessed by a group of users only. This is done by making the QR code cryptographically secure with the help of a password (key) for encryption and decryption. Symmetric...
This article, describes the implementation of QPSK modulator and FPGA programming aspects for carrier frequency control for data transmission units in space applications. The module occupies lesser area for integration, operates on lower power and supports higher data rates than conventional modulator units of Indian Space Research Organization (ISRO). The scope of a miniature and low power modulator...
According to the wide developments in the area of communications, there is a demand for secure system for data transmissions. In this paper, a Hash system SHA-1 and SHA-2 Processor is designed using Xilinx Spartan-3AN. The implementation of the processor is done by using Multithreading MIPS (Microprocessor without Interlocked Pipelines) single cycle by choosing a certain number of instructions that...
Noise detection and its removal is very important in digital image processing. In this paper an Adaptive Decision based filtering method is proposed for removing impulse noise mainly salt & pepper noise. The proposed algorithm first detect the noisy pixel, then filtering is done using decision based algorithm. The filter works very well on removing fixed valued impulse noise. With little increase...
In Cooley-Tukey algorithm the Radix-2 decimation-in-time Fast Fourier Transform is the easiest form. The Fast Fourier Transform is the mostly used in digital signal processing algorithms. Discrete Fourier Transform (DFT) is computing by the FFT. DFT is used to convert a time domain signal into its frequency spectrum domain. FFT algorithm use many applications for example, OFDM, Noise reduction, Digital...
MTCAM (Memristor Ternary Content Addressable Memory) is a special purpose storage medium in which data could be retrieved based on the stored content. Using Memristors as the main storage element provides the potential of achieving higher density and more efficient solutions than conventional methods. A key missing item in the validation of such approaches is the wide spread availability of hardware...
Artificial Neural Networks (ANNs) have gained a considerable interest in clustering, pattern recognition, function approximation and many others applications, due to its parallel capability of processing the data. Moreover, ANNs can also be used to accelerate parts out of an algorithm which the data can be approximated using NPUs (Neural Processing Units). FPGAs are intrinsically parallel making these...
An AES is the most popular security algorithm and it is required to improve the performance of AES with increasing the demand of internet security. AES is a symmetric key algorithm in which only one key is requires for encryption and decryption process, key must be same. The AES implementation is possible for software and hardware but hardware implementation has better speed in comparison to software...
The discrete Hartley transform finds numerous applications in signal and image processing. An efficient Field Programmable Gate Array implementation for the 64-point Two-Band Fast Discrete Hartley Transform is proposed in this communication. The architecture requires 57 clock cycles to compute the 64-point Two-Band Fast Discrete Hartley Transform and reaches a rate of up to 103.82 million samples...
The digital control of Electronic Power Conditioners (EPC) for the space applications is promising. Use of an FPGA for digital control could make improved controllability or flexibility of spacecraft systems from earth station. A high speed ADC, a digital PID controller, a digital PWM generator etc. are the essential components required for implementing digital control in EPCs. This paper unveils...
The FPGA represents a valid solution for the design of control systems for inverters adopted in the field of PV systems because of their high flexibility of use. This paper presents an experimental analysis of the MC SPWM techniques for a three-phase, five-level, cascaded H-Bridge inverter with FPGA controller-based. Several control algorithms are implemented by means of the VHDL programming language...
Digital Steganography is the art of science that involves secret information within the associated acceptable multimedia system carrier, e.g., image, audio, and video files. If the secret information is visible, the aim of the attack is obvious, therefore, the goal is to hide the existence of the embedded information. This paper discusses economical implementation of a low-complexity steganography...
Operation scheduling is a fundamental problem in mapping an application to electronic devices. In scenarios where these schedules are made on Data Flow Graph (DFG), it is necessary to convert the result to Hardware Description Language (HDL) code. We present a detailed approach for generate VHDL code described in a Data Flow Graph (DFG). We generate VHDL code corresponding to Moore Finite State Machine...
Algorithms for data encryption are one of the most important parts of modern communication systems. In this paper the results of hardware implementation of AES256 and TDES algorithms are presented. AES256 and TDES are implemented as an IP core with AXI interface because of constant growth of data transfer requirements in modern embedded systems, in order to improve their capability. Beside details...
We introduce a Producer-Customer model and use it to add an innovative portion to the “Digital Systems” course materials. In this work, we have developed and tested ten Intellectual Property (IP) cores, real products, which are either defective or improvable. A defective product does not function as it should. An improvable product works in accordance with its specification; however, it has potential...
This paper presents the flexibility of technology FPGA in the implementation of automatic control systems. A digital structure at level hardware of a regulator of PI action was designed and built by the VHDL standard. Also, a Java graphical interface was developed for monitoring and control. Experiments were performed on a mechanism for position control consisting of DC motors with encoder, checking...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.