Search
Now showing items 1-10 of 37
On Optimal Replacement of Nonuniform Cache Objects
This paper studies a generalized version of the well-known page replacement problem. It assumes that page sizes and page fault penalties are nonuniform. This problem arises in distributed information systems, in particular ...
Improving Object Cache Performance through Selective Placement
Distributed systems greatly benefit from caching. Caching data objects of
variable size and cost poses interesting questions that have
been researched for the past ten years. As a result, a few good algorithms ...
A Lightweight Security Protocol for Ultra-Low Power VLSI Implementation for Wireless Implantable Medical Devices
The newest generation of Implantable Medical Devices (IMDs) employ wireless communication with a nearby base station in order to provide better treatment and monitoring of the patients. However, a wireless connection opens ...
Power Estimation of Pipeline FFT Processors
Pipeline FFT processors are used in mobile communication systems and in
particular in OFDM-based systems. This paper presents a method for power analysis of
pipeline FFT processors. This method applies to ...
Delay Analysis of Pipeline FFT Processors
Pipeline FFT processors are used in mobile communication systems and in particular in OFDM-based systems. This paper presents a method for delay analysis of pipeline FFT processors. This method applies to various architectures ...
Low-Power Adder Design for Nano-Scale CMOS
A fast low-power 1-bit full adder circuit suitable for nano-scale CMOS
implementation is presented. Out of the three modules in a common full-adder circuit, we
have replaced one with a new design, and optimized ...
Fast Watermarking Based on QR Decomposition in Wavelet Domain
A novel blind watermarking technique based on QR decomposition in still images is proposed. The method is implemented in wavelet domain and its robustness has been evaluated against some image processing attacks and the ...
A Data Hiding Capacity Estimation Technique for Biometric Images
In this paper an estimation
technique for the data hiding capacity in
biometric images is presented. We consider the
QSWT algorithm for data hiding in biometric
images and investigate the effect ...
تایید هویت بیومتریکی بر مبنای روشهای آب نشان با استفاده از تبدیل موجک گسسته
در این مقاله الگوریتم مقاومی برای آب نشا ن گذاری در تصویر اثر انگشت به منظور بهبود عملکرد سیستمهای تایید هویت
برای پنهان سازی داده ها استفاده شده QSWT بیومتریکی ارائه شده است . در این الگوریتم از تبدیل موجک گسسته 3 ...
Template Protection and Performance Improvement of Biometric Authentication Systems Using Watermarking
A new technique for performance improvement of fingerprint-based user authentication systems is proposed. This technique uses fragile watermarking to hide the extracted feature vector of the fingerprint image in the stored ...