[PDF][PDF] FPGA-Based Multi-Core MIPS Processor Design

SM Al-sudany, AS Al-Araji, BM Saeed - IRAQI JOURNAL OF COMPUTERS …, 2021 - iasj.net
This research presents a study for multicore Reduced Instruction Set Computer (RISC)
processor implemented on the Field Programmable Gate Array (FPGA). The Microprocessor …

[PDF][PDF] Securing files using AES algorithm

A Rayarapu, A Saxena, NV Krishna… - Int. J. Comput. Sci. Inf …, 2013 - academia.edu
Nowadays information systems play a vital role for organizations and individuals, in which
the security is given the high priority. Often, solutions are developed for very similar …

Biometric based Network Security Using MIPS Cryptography Processor

KP Singh - Cryptology ePrint Archive, 2016 - eprint.iacr.org
The empowerment in network on chip (NOC) and System on chip (SOC) in Microelectronics
and Sensors have developed the various wireless communication Network technologies. In …

Design of high speed power efficient wallace tree adders

S Sharma, P Thakur - Available at SSRN 2777887, 2016 - papers.ssrn.com
In this paper FIFB, FIEB and FISB Carry Save Adders and Wallace Tree Adders are
designed, encoded in Verilog and simulated using Cadence Software. The 180 nm CMOS …

Design of Biometric Fingerprint Image Enhancement Algorithm by Using Iterative Fast Fourier Transform

S Dod - Available at SSRN 2771013, 2016 - papers.ssrn.com
Among all the minutia based fingerprint identification system, the performance depends on
the quality of input fingerprint images. In this paper, we have designed and implemented an …

Design and implementation of cryptography based attitude and heading reference system with Extended Kalman Filter

KP Singh, V Kumar, S Singhai… - 2016 5th International …, 2016 - ieeexplore.ieee.org
This paper describes the design and implementation of efficient MEMS based Attitude and
Heading Reference System (AHRS) along with an innovative three-axis rotating platform …

Crypto Fuzzy Logic Based Audio Surveillance System

S Sharma, A Kumar, R Jain - Available at SSRN 2783603, 2016 - papers.ssrn.com
For security reasons, need and importance of speech recognition is increasing. The
technique for the detection of particular speech from a statement using fuzzy logic for the …

[引用][C] Design and implementation of new lightweight encryption technique

M Sangeetha, M Jagadeeswari - International Journal of Innovative Research in …, 2016

[引用][C] Cloud data security enhancing using elliptical curve cryptography

NN Chintawar, SJ Gajares, SV Fatak - Digital Communications and Networking …, 2016

[引用][C] A Cryptography Inclusive Effective Handoff Model for Optimizing Handoff in WPAN

D Kumar, R Malhotra - 2015