• Citations Per Year
Learn More
This paper presents a case study of development of a 6-axis robotic arm controller. The robot is powered by a hydraulic pump. The position of each axis can be derived from its potentiometer voltage. At each and every axis, a servo-valve is employed to control a servo motor. Its relative velocity is related to the servo-valve input. With 2<sup>nd</sup> order(More)
In this paper, a reconfigurable hardware architecture is proposed to perform dual applications i.e fingerprint authentication and fingerprint navigation. The proposed hardware architecture is implemented on FPGA. The first application, fingerprint authentication, is handled by software running over 32-bit Nios soft-core processor hardware platform. It(More)
The femtocell network has currently been considered as one of the most promising networking technologies. Nevertheless, due to dense deployment, interference generated by nearby femto base station (FBS) is expected to significantly degrade the signal to interference plus noise ratio (SINR) of femto users (FUEs). Ineffective resource block combination is one(More)
This paper presents an ASIP design for fingerprint authentication application and its implementation on FPGA. The ASIP architecture is derived from existing embedded processor architecture, ARM. In order to optimize the architecture, some redundant features are removed but other new instructions are introduced. Assembly converter tool is employed to solve(More)
Bio-encryption is a concept that aims to improve the traditional cryptographic security by combining biometrics and cryptography. Fuzzy Vault scheme is a bio-encryption method which is very famous for its ability to handle fuzzy biometric data while at the same time combines them with cryptographic mechanism. Moreover, Fuzzy Vault scheme is claimed as a(More)
  • 1