Volume-1 (National Conference on Mechatronics, Computing & Signal Processing(MCSP 2016))
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | FPGA implementation of Angle Generator for CORDIC Based High pass FIR Filter Design |
Country | : | India |
Authors | : | Nutan Das || Swarnaprabha Jena || Siba Kumar Panda |
Abstract: The design of high speed VLSI architecture introduced a large number of algorithmes for real-time Digital Signal Processing(DSP) and in the VLSI Technology, the realizations of this DSP algorithmes have been directed in many of the computations in Signal Processing and wireless communication appilications such as trigonometic and complex functions. This paper proposed a hardware efficient CORDIC based parallel architechture for the calculation of cosine and sine functions and High Pass FIR (Finite Impulse Response )Filter design using Very High Speed Integrated Circuit Hardware Description Language (VHDL).............
Keywords -CORDIC, FPGA, FIR FILTER, SIGNAL PROCESSING, VLSI SIGNAL PROCESSING, VHDL
[2]. J.S. Walther,"A unified algorithm for elementary functions", in AFIPS Spring Joint Computer Conference, May 1971, PP.379-385.
[3]. Y.H. Hu., "CORDIC-based VLSI architectures for digital signal processing", IEEE Signal Process.Mag.9(3) 1992,PP.16-35.
[4]. P.K. Meher, J. Valls, T.B.Juan, K. Sridharan and K.Maharatna, "50 Years of CORDIC: Algorithms, Architectures, and Appilications" IEEE Transactions on circuits and systems irregular papers, vol. 56, no.10, PP.9, Sept.2009.
[5]. F. Koscsis and J. Bohme, "Fast algorithms and parallel structures for form factor evaluation", The Visual Computer, no.8,PP.205-216,1992.
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | Study and Analysis of a Hybrid Model for Fingerprint Based Gender Identification |
Country | : | India |
Authors | : | Punam Pati || Sunita Dalai || Rupanita Das |
Abstract: In today's time fingerprint plays a very important role, whether it is to link the suspect in a crime scene or to find an unknown person. Fingerprints are one of the most mature biometric technologies use generally for Military code Transaction, Some secret operations at National Security system .The widespread development of Automated fingerprint identification system (AFIS) in Law enforcement and Border control applications are done by various methods like (Face, Iris, palm ,gait ,Voice ,Fingerprints , and Footprints) recognition .The main objective of this paper is to find a link between gender of a person and his/her fingerprint............
Keywords-Biometrics, Gender classification, Fingerprint, SVD, PCA, DWT, AFIS, K- nearest neighbor
[2]. Ms.Ritu Kaur,Mrs .Susmita Ghosh Mazumdar and Mr.Devan and Bhonsle" A study on Various Methods of Gender Identification Based On Fingerprints. International Journal of Emerging Technology and Advanced Engineering ISSN 2250-2459, Volume 2, Issue 4, pp 532-536, April 2012.
[3]. Zain S.Barham,and Dr.Allam Mousa, Fingerprint recognition using MATLAB.
[4]. D. Maltoni, D. Maio, A. K. Jain, and S. Prabhakar,"Handbook of Fingerprint Recognition", first ed., Springer, New York, 2003.
[5]. W. Babler, "Embryologic development of epidermal ridgesand their configurations," In: Plato CC, Garruto RM, Schaumann BA, editors.; Dermatoglyphics: Science inTransition
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | DWT based Image Watermarking for Information Security |
Country | : | India |
Authors | : | Subhashree Khatua || Debaraj Rana |
Abstract: The growth of the Internet along with the increasing availability of multimedia applications has spawned a number of copyright issues. One of the areas that this growth has fueled is that of digital watermarking. Digital watermarking is the general technique of embedding a blob of information in the original file, such that an altered file is obtained. The blob of information, thus included, serves one of different uses, such as, identifying piracy, sensing tampering, or reassuring integrity........
Keywords- Watermark, Arnold Transform, DWT, Security
[1] Su, Q., Niu, Y., Wang, Q., & Sheng, G. (2013). A blind color image watermarking based on DC component in the spatial domain. Optik-International Journal for Light and Electron Optics, 124(23), 6255-6260.
[2] H. Luo, F. Yu, Z.L. Huang, Z.M. Lu, Blind image watermarking based ondiscrete fractional random transform and subsampling, Optik 122 (2011)311–316.
[3] D.C. Lou, H.K. Tso, J.L. Liu, A copyright protection scheme for digital imagesusing visual cryptography technique, Comput. Stand. Interfaces 29 (2007)125–131.
[4] E. Vahedi, R.A. Zoroofi, M. Shiva, Toward a new wavelet-based watermarkingapproach for color images using bio-inspired optimization principles, Digit.Signal Process. 22 (2012) 153–162.
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | Analysis of Adaptive Beam forming Algorithms using LMS and RLS Scheme |
Country | : | India |
Authors | : | Subrina Biswal || Deepak Kumar Barik |
Abstract: Adaptive phased antennas, known as sensible ANTENNAS attract most attention with the rise of wireless communications implementation. The smart antennas will modification their form of transmission inserting nulls in the direction of interference, and steer their main lobe to the direction of interest. Mobile radio network with cellular structure demand high spectral potency for minimizing vary of connections in Associate in Nursing extremely given data live. one in all the promising technologies is that the employment of "Smart Antenna". a wise associate degreetenna is really combination of Associate in Nursing array of individual antenna elements and dedicated signal method rule.........
Index Terms—Angle-of-arrival (AOA), AF(Array Factor), LMS(Least-Mean-Square), RLS(Recursive Least Square), MSE(Mean Square Error)
[1]. Das, S. (2008, November). Smart antenna design for wireless communication using adaptive beam-forming approach. In TENCON 2008-2008 IEEE Region 10 Conference (pp. 1-5). IEEE.
[2]. Van Veen, B. D., & Buckley, K. M. (1988). Beamforming: A versatile approach to spatial filtering. IEEE assp magazine, 5(2), 4-24.
[3]. Vorobyov, S., Gershman, A. B., & Luo, Z. Q. (2003). Robust adaptive beamforming using worst-case performance optimization: A solution to the signal mismatch problem. Signal Processing, IEEE Transactions on, 51(2), 313-324.
[4]. Godara, L. C. (1997). Application of antenna arrays to mobile communications. II. Beam-forming and direction-of-arrival considerations.Proceedings of the IEEE, 85(8), 1195-1245.
[5]. Tian, Z., Bell, K. L., & Van Trees, H. L. (2001). A recursive least squares implementation for LCMP beamforming under quadratic constraint. Signal Processing, IEEE Transactions on, 49(6), 1138-1145
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | Odia Offline Character Recognition using DWT Features |
Country | : | India |
Authors | : | Bhabani Dash || Shibashis Pradhan || Debaraj Rana |
Abstract: Optical character recognition (OCR) is the mechanical or electronic translation of images of handwritten or typewritten text (usually captured by a scanner) into machine-editable text. Many recognition techniques have been proposed so far for different languages. In this paper we have proposed a nobel method to recognize Odiya character which is the dominant language in the state of Odisha. The proposed method consists of three steps: The first two steps refer to creating a database for training using a set of documents, while the third one refers to recognition of new document images.........
Keywords - DWT , Enhancement, character Recognition
[1] Kim, K., et al., "Automatic Cell Classification in Human's Peripheral Blood Images Based on Morphological Image Processing, in Advances in Artificial IntelligenceSpringer Berlin Heidelberg. p. 225-236.
[2] Venkatalakshmi, B. and K. Thilagavathi. Automatic red blood cell counting using Hough transform., 2013 IEEE Conference on Information & Communication Technologies (ICT). 2013.
[3] Yazan Met.al ," Automatic Detection and Quantification of WBCs and RBCs Using Iterative Structured Circle Detection Algorithm" Computational and Mathematical Methods in Medicine, Hindawi Publishing Corporation.
[4] Habibzadeh, M., A. Krzyżak, and T. Fevens, "Comparative study of shape, intensity and texture features and support vector machine for white blood cell classification". Journal of Theoretical and Applied Computer Science, 2013. 7(1): p. 20-35
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | Revision of Various Square-Root algorithms for efficient VLSI Signal processing applications |
Country | : | India |
Authors | : | Arpita Jena || Siba Kumar Panda |
Abstract: With initiation of VLSI signal processing concept, Very large scale integration technique becomes more powerful in the field of signal processing. Now a day, many of the researchers are now trying to integrate the VLSI technique with the signal processing theory. Hence analyzing device, designing and manipulating the performance from circuit & system level perspectives becoming a vital task and challenging too. The study of various diverse algorithms that are used for square root circuit design is the central focus of this paper.....
Keywords: FPGA, Newton method, NR algorithm, Rough estimation, Restoring, Square root algorithms, VLSI Signal Processing, VHDL.
[1]. B R Ambedkar, S S Bedi, A new factorization method to factorize to RSA public key encryption, IJCSI International Journal of Computer Science Issues, Vol. 8, Issue 6, No 1, November 2011
[2]. Taek –Jen Kwon, Jeff Sondeen, Jeff Draper, Floating point division and square root using a Taylor-Series expansion algorithm, IEEE conference,2007
[3]. Nicholas J.Higham, Newton' method for the Matrix Square Root, Mathematics of computation, April 1986
[4]. Tole Sutikno, An efficient implementation of non-restoring square root algorithm in gate level, International association of computer science and information technology,2011
[5]. Olga Kosheleva, Babylonian method of computing and square root : Justification based on fuzzy techniques and on computational complexity, IEEE conference ,2009
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | Design and Simulation of Convolution Using Booth Encoded Wallace Tree Multiplier |
Country | : | India |
Authors | : | Jyoti Prakash Mohanty || Ritisnigdha Das || Siba Kumar Panda |
Abstract: Convolution is one of the most used process in signal processing. In simple sense it is nothing but just flip then multiply and add. So the prime block in convolution is multiplication. Multiplication process is often used in digital signal processing systems, microprocessors designs, communication systems, and other application specific integrated circuits. Multipliers are complex units and play an important role in deciding the overall area, speed and power consumption of digital designs.........
Keywords - Booth encoder, MUX, SIPO, Wallace tree multiplier
[1]. Madhuraj,"FPGA Implementation of Convolution using Wallace Tree Multiplier", IJERT Vol. 3 Issue 6, June -2014
[2]. G.Ramanjaneya,"An Efficient Method for Implementation of Convolution"IAAST; Vol 4 Issue 2, June-2013
[3]. P. S. Tulasiram," Implementation of Modified Booth Recoded Wallace Tree Multiplier for fast Arithmetic Circuits", IJACSSE ,Volume 4, Issue 10, October-2014
[4]. Soniya," A Review of Different Type of Multipliers and Multiplier-Accumulator Unit", IJETTES Vol 2, Issue 4, August-2013
[5]. Arati Sahu,Siba Ku.Panda,Swarnaprabha Jena "HDL Implementation and Performance Comparison of an Optimized High Speed Multiplier", IOSR Journal of VLSI and Signal Processing (IOSR-JVSP),Volume 5, Issue 2, Ver. I (Mar - April. 2015), PP 10-19.
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | Designing of Sensing Element for Bolometer Working at Room Temperature |
Country | : | India |
Authors | : | Debalina Panda || Subrat Kumar Pradhan |
Abstract: Bolometer is a highly sensitive thermal detector used for detection of heat or electromagnetic radiation. It has vast applications extending their range to the field of military, medical, astronomy, particle physics and in day-to-day use thus devising it as a significant part of our society. The basic operation principle is that it measures the incident radiation power through absorption resulting a specific change in a measurable quantity.........
[1.] AntoniRogalski, "Infrared detectors", 2nd edition, CRC Press, 2011, ISBN:978-1-4200-7671-4
[2.] AntoniRogalski, "History of infrared detectors", Opto-Electronics review Springer 20(3), pp279-308, DOI: 10.2478/s11772-012-0037-7, 2012
[3.] UC Sharma, U.B. Desai, "Infrared detectors", Electronics systems group, EE department, IIT Bombay, Oct 2004
[4.] Carlo Corsi, "Infrared: A key technology for security systems ", Hindawi Publishing Corporation, Advances in Optical Technologies, volume 2012, Article ID 838752, DOI: 10.1155/2012/838752
[5.] AntoniRogalski, "Infrared detectors for the future", Optical and acoustical methods in science and technology, pp 389-406, vol.116, 2009
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | Performance analysis of Optimal Orthogonal Spreading Codes for wireless CDMA system |
Country | : | India |
Authors | : | Biswasini Sahu || Shibashis Pradhan || Dabaraj Rana |
Abstract: Spreading codes plays a vital role in wireless communication system .It is used in code division multiple access system (CDMA) to serve more number of users with different spreading codes like orthogonal and non orthogonal spreading codes. Here our objective is to found a proposed algorithm for generation of "New orthogonal spreading code" which provides a large no of spreading codes by simultaneously reducing the effect of multiple access interference (MAI) and intersymbol interference (ISI) by maintaining.........
Keywords - AWGN, CDMA, BER, ISI, MAI
[1] Dixon R.C. Spread spectrum systems, John Wiley & Sons, Inc.; New York. (1976).
[2] AJ. Viterbi. CDMA Principles of Spread Spectrum Communication, Addison-Wesley, (1995).
[3] Deepak Kedia, Dr. Manoj Duhan , Prof. S.L. Maskara, "Evaluation of Correlation Properties of Orthogonal Spreading Codes for CDMA Wireless Mobile Communication", 978-1-4244-4791-6/10/$25.00, 2010 IEEE.
[4] Amayreh, A. I., & Farraj, A. K. (2007). Minimum autocorrelation spreading codes. Wireless Personal Communications, 40(1), 107–115.
[5] Farraj, A. K., & Amayreh, A. I. (2009). Minimum cross correlation spreading codes. Wireless Personal Communications Journal, 48(3), 385–394.
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | Natural Facial Expression Recognition Using HMM and KNN |
Country | : | India |
Authors | : | Alpesh Kumar Dauda || Dr. Nilamani Bhoi |
Abstract: Face recognition has the most relevance in real life issues of security, criminal investigation, and verification intention. Thus it has a broad range of applications. Three issues in the field of face recognition are: illumination variation, pose variation and more importantly expression variation which is the main focus of this paper. Human-Computer Interaction is an emerging field of Computer Science where, Computer Vision, especially facial expression recognition occupies an essential role. There are so many approaches to resolve this problem; among them HMM is a considerable one.........
Keywords - Hidden Markov model; KNN; Active Appearance model
[1]. P. Ekman and W.V. Friesen, Facial Action Coding System: Investigator's Guide, Palo Alto, CA: Consulting Psychologist Press, 1978.
[2]. K. Mase, "Recognition of facial expression from optical flow," IEICE Transactions, vol. E74, pp. 3474-3483, October 1991.
[3]. T. Otsuka and J. Ohya, "Recognizing multiple persons facial expressions using HMM based on automatic extraction of significant frames from image sequences,'' in Proc. Int. Conf. on Image Processing (ICIP-97), (Santa Barbara, CA, USA), pp. 546-549, Oct. 26-29, 1997.
[4]. Y. Yacoob and L. Davis, "Recognizing human facial expressions from long image sequences using optical flow," IEEE Transactions on Pattern Analysis and Machine Intelligence, vol. 18, pp. 636-642, June 1996