49 research outputs found

    La synthèse de haut niveau d'un modem digital intelligent

    Get PDF
    Le papier discute l'intégration des applications complexes dans des circuits à partir des spécifications de haut niveau. Il s'agit de la conception d'un MODEM digital intelligent utilisant la synthèse de haut niveau. Le flot de conception adopté permet, à partir des spécifications de haut niveau indépendantes de la technologie, l'étude de plusieurs alternatives de réalisations, le choix rapide des solutions, la réduction des erreurs pendant les premières phases de la conception et de la réutilisation des modules déjà synthétisés ou existants. Le temps de conception est réduit par l'automatisation des différentes phases de conception en utilisant le même langage de description (VHDL) à tous les niveaux

    Combining Haar Wavelet and Karhunen Loeve Transforms for Medical Images Watermarking

    No full text
    International audienceThis paper presents a novel watermarking method, applied to the medical imaging domain, used to embed the patient's data into the corresponding image or set of images used for the diagnosis. The main objective behind the proposed technique is to perform the watermarking of the medical images in such a way that the three main attributes of the hidden information (i.e. imperceptibility, robustness, and integration rate) can be jointly ameliorated as much as possible. These attributes determine the effectiveness of the watermark, resistance to external attacks and increase the integration rate. In order to improve the robustness, a combination of the characteristics of Discrete Wavelet and Karhunen Loeve Transforms is proposed. The Karhunen Loeve Transform is applied on the sub-blocks (sized 8x8) of the different wavelet coefficients (in the HL2, LH2 and HH2 subbands). In this manner, the watermark will be adapted according to the energy values of each of the Karhunen Loeve components, with the aim of ensuring a better watermark extraction under various types of attacks. For the correct identification of inserted data, the use of an Errors Correcting Code (ECC) mechanism is required for the check and, if possible, the correction of errors introduced into the inserted data. Concerning the enhancement of the imperceptibility factor, the main goal is to determine the optimal value of the visibility factor, which depends on several parameters of the DWT and the KLT transforms. As a first step, a Fuzzy Inference System (FIS) has been set up and then applied to determine an initial visibility factor value. Several features extracted from the Co-Occurrence matrix are used as an input to the FIS and used to determine an initial visibility factor for each block; these values are subsequently re-weighted in function of the eigenvalues extracted from each sub-block. Regarding the integration rate, the previous works insert one bit per coefficient. In our proposal, the integration of the data to be hidden is 3 bits per coefficient so that we increase the integration rate by a factor of magnitude 3

    Future Internet of Things: Connecting the Unconnected World and Things Based on 5/6G Networks and Embedded Technologies

    Get PDF
    Undeniably, the Internet of Things (IoT) ecosystem keeps on advancing at a fast speed, far above all predictions for growth and ubiquity. From sensor to cloud, this massive network continues to break technical limits in a variety of ways, and wireless sensor nodes are likely to become more prevalent as the number of Internet of Things devices increases into the trillions to connect the world and unconnected objects. However, their future in the IoT ecosystem remains uncertain, as various difficulties as with device connectivity, edge artificial intelligence (AI), security and privacy concerns, increased energy demands, the right technologies to use, and continue to attract opposite forces. This chapter provides a brief, forward-looking overview of recent trends, difficulties, and cutting-edge solutions for low-end IoT devices that use reconfigurable computing technologies like FPGA SoC and next-generation 5/6G networks. Tomorrow’s IoT devices will play a critical role. At the end of this chapter, an edge FPGA SoC computing-based IoT application is proposed, to be a novel edge computing for IoT solution with low power consumption and accelerated processing capability in data exchange

    Network Slicing for Industrial IoT and Industrial Wireless Sensor Network: Deep Federated Learning Approach and Its Implementation Challenges

    Get PDF
    5G networks are envisioned to support heterogeneous Industrial IoT (IIoT) and Industrial Wireless Sensor Network (IWSN) applications with a multitude Quality of Service (QoS) requirements. Network slicing is being recognized as a beacon technology that enables multi-service IIoT networks. Motivated by the growing computational capacity of the IIoT and the challenges of meeting QoS, federated reinforcement learning (RL) has become a propitious technique that gives out data collection and computation tasks to distributed network agents. This chapter discuss the new federated learning paradigm and then proposes a Deep Federated RL (DFRL) scheme to provide a federated network resource management for future IIoT networks. Toward this goal, the DFRL learns from Multi-Agent local models and provides them the ability to find optimal action decisions on LoRa parameters that satisfy QoS to IIoT virtual slice. Simulation results prove the effectiveness of the proposed framework compared to the early tools

    [Accepted Article Manuscript Version (Postprint)] Track Me to Track Us: Leveraging Short Range Wireless Technologies for Enabling Energy Efficient WI-Fi-Based Localization

    No full text
    Given the success of outdoor tracking via GPS and the rise of real-time context-aware services, users will soon rely on applications that require higher granularity indoor localization. This need is further manifested in countries like Qatar, where various social and business activities occur indoors. Wi-Fi-based indoor localization is one of the most researched techniques due to its ubiquitous deployment and acceptable accuracy for a wide range of applications. However, we do not witness such techniques widely deployed mainly due to their high demand on energy, which is a precious commodity in mobile devices. We propose an energy-efficient indoor localization system that leverages peoples\u27 typical group mobility patterns and short-range wireless technologies available on their devices. Our system architecture, shown in the figure, is designed to be easily integrated with existing Wi-Fi localization engines. We first utilize low-energy wireless technologies, such as Bluetooth, to detect and cluster individuals moving together. Our system then assigns a group representative to act as a designated cluster head that would be constantly tracked. The location of other group members can be inferred so long as they remain within proximity of the cluster heads. Afterwards, cluster heads continue to send the periodic received signal strength indicator (RSSI) updates, while the remaining members turn off their Wi-Fi interface relying on the cluster head to be localized. Our system is responsible for dynamically handling the merger or splitting of clusters as a result of mobility. We implement a prototype of the system, and evaluate it at scale using the QualNet simulator. Our results show that we can achieve up to 55% energy reduction with a relatively small degradation in localization accuracy averaging 2 meters. This accuracy reduction is non-impactful given the typical applications expected to leverage our system

    Efficient Encryption System for Numerical Image Safe Transmission

    No full text
    In this paper, we propose an efficient cryptosystem for digital image encryption and authentication. The cryptosystem is a hybrid scheme that uses symmetric and asymmetric approaches. The first one is used to encrypt the host image by utilizing a chaos-based key generator. The second one is used to encrypt the initial secret key and the owner’s signature that permit authentication. The algorithm is evaluated and validated by its application on several types of standard images and tools such as the statistical analysis, the key, and the performance analysis. The results indicate that the proposed cryptosystem provides high performance and enhanced security. The NIST 800-22 is used for testing the pseudorandom numbers generation (PRNG). The obtained simulation results are better than those cited in the recent works in terms of execution time and security level and low computational complexity
    corecore