PESCE

Mandya, India
Mandya, India
SEARCH FILTERS
Time filter
Source Type

Shylashree N.,RVCE | Sridhar V.,PESCE | Patawardhan D.,RNSIT
IEEE Region 10 Annual International Conference, Proceedings/TENCON | Year: 2017

In this work, we propose a very efficient Elliptic curve cryptosystem processor for NIST 256 prime field. The proposed crypto processor includes sub blocks to perform modular arithmetic in the finite field which are addition, subtraction, multiplication and division. The processor also includes separate modules to perform point addition and point doubling that is necessary to perform scalar multiplication which is the fundamental operation cryptography. The point multiplication operation is performed by the processor where in the coordinate system used for the representation is affine coordinate system. The affine coordinates are represented by NIST recommended p256 bit prime field. In ECC the basic operation is scalar multiplication. The time to compute scalar multiplication output is one of the factors that impacts the processor efficiency. The proposed architecture for performing 256 bit scalar multiplication can be implemented with a maximum frequency of 35.785MHz and completes the operation in 4.99ms. The results are implemented on virtex 5 FPGA. © 2016 IEEE.


Punith Kumar M.B.,BGSIT | Puttaswamy P.S.,PESCE
Souvenir of the 2015 IEEE International Advance Computing Conference, IACC 2015 | Year: 2015

A rapid growth and development of life styles as well communicating media in recent years have changed considerably and called as information age. In this information age lot of changes were taken place in all domine like speed, data capacity, and distance of communication due to the development. Also hacking, tracing communicating bodies are also in place. The news channels and cameras are playing the major role in communication. The advancement in the TV news channel enabled by all the recent information occurs in the world available instantaneously as for as possible. This is due to moving line which is associated with a TV news channel but few treats the moving line text as disturbance where the above that watching above video so we plan to detect and extract the moving text from the news video using hybrid technology in association of edge and connected component detection. © 2015 IEEE.


Punith Kumar M.B.,BGSIT | Puttaswamy P.S.,PESCE
2015 International Conference on Emerging Research in Electronics, Computer Science and Technology, ICERECT 2015 | Year: 2015

The interest of the sports analytics has significantly grown higher recently. Manual analysis of the sports videos like extracting required shots and motion tracking of the player is very time consuming. Automatic motion tracking of players is useful for broadcasters and sportsmen's at individual level of player so can improve quality of game and automatic shot detection and extraction useful to extract only required shots from video. The proposed approach used in this project is to extracts selective events in cricket video. Pitch shots i.e., bowling and batting shots are extracted using RGB histogram technique and Replay and Non Replay shots are extracted using score card detection where score card is detection using median filtering background modeling method. Bowler and batsman from the pitch shots are extracted using Kalman filter motion estimation technique. © 2015 IEEE.


Umesh D.R.,Pet Research Center | Ramachandra B.,PESCE
2015 International Conference on Emerging Research in Electronics, Computer Science and Technology, ICERECT 2015 | Year: 2015

Breast cancer is the most well-known type of cancer in women in the developed nations including India. Breast cancer could recur anytime in the breast cancer survivors, however basically it returns in the initial three to five years after the treatment. In this paper we investigate the feasibility of utilizing an association rule mining for a clinical oncology doctor in expectation of breast cancer recurrence on SEER (Surveillance, Epidemiology, and End Results) dataset. © 2015 IEEE.


Shylashree N.,Research Scholar Faculty at RNSIT | Sridhar V.,PESCE
IEEE Region 10 Annual International Conference, Proceedings/TENCON | Year: 2016

In this paper, a high speed crypto-processor architecture for computing point multiplication for the elliptic curves defined over the prime fieldGF(p) is proposed. The proposed architecture uses amultiplierwhich utilizes parallel one's counters for accumulation of binary partial product bit. With the increase inspeed of multiplication, the speed of ECC point doubling and addition also increases. Also, the architecture takes advantage of an efficient projective coordinates system to convert GF(p) inversion needed in elliptic point operations into several multiplication steps. To increase the processor speed, efficient algorithms are used to compute modular multiplication, addition and subtraction, based on the argument that the speed of the Elliptic Curve Crypto-processor depends on how fast these arithmetic operations can be performed. The proposed architecture for computing 192-bit scalar multiplication for ECC can reach maximum frequency of 191 MHz and occupies 615 slices. It completes one 192-bit scalar multiplication in 676μs. © 2015 IEEE.


Srinivas H.K.,P.A. College | Srinivasan K.S.,EIT | Umesh K.N.,PESCE
International Journal of Acoustics and Vibrations | Year: 2010

The vibration analysis of rotating machinery indicates the condition of potential faults such as unbalance, bent shaft, shaft crack, bearing clearance, rotor rub, misalignment, looseness, oil whirl and whip, and other malfunctions. More than one fault can occur in a rotor. This paper describes the application of an artificial neural network (ANN) and wavelet transform (WT) for the prediction of the effect of the combined faults of unbalance and shaft crack on the frequency components of the vibration signature of the rotating machinery. The experimental data of the frequency components and the corresponding root mean square (RMS) velocity (amplitude) data are used as inputs to train the ANN, which consists of a three-layered network. The ANN is trained using an improved multilayer feed forward back propagation Levenberg-Marquardt algorithm. In particular, the overall success rates achieved were 99.78% for unbalance, 99.81% for shaft crack, and 99.45% for the combined faults of unbalance and shaft crack. The wavelet transform approach enables instant to instant observation of different frequency components over the full spectrum. A new technique combining the WT with ANN performs three general tasks: data acquisition, feature extraction, and fault identification. This method is tested successfully for the individual and combined faults of unbalance and shaft crack at a success rate of 99.9%.


Shylashree N.,PESCE | Sridhar V.,PESCE
2015 International Conference on Emerging Research in Electronics, Computer Science and Technology, ICERECT 2015 | Year: 2015

In the era where major portion of transactions take place online, security of the data becomes prime concern. Elliptic Curve Cryptography (ECC) is an approach to public-key cryptography based on Elliptic curves over finite fields. Elliptic curve cryptography is used for secure transmission of data with smaller key length. The underlying operation of ECC is scalar point multiplication. For the ECC to be efficient, the multiplication should be done at high speed. In this work high speed crypto-processor architecture for computing point multiplication for the elliptic curves defined over the binary field is designed. The projective coordinate system is used to increase the efficiency. The proposed architecture for computing 163-bit scalar multiplication for ECC can reach maximum frequency of 45.60 MHz and occupies 101 slices. It completes one 163-bit scalar multiplication in 9.9μs. © 2015 IEEE.


Lalithamma G.A.,SJBIT | Puttaswamy P.S.,PESCE
Lecture Notes in Electrical Engineering | Year: 2014

This paper proposes novel low-power full-adder cell to be used as Shannon adder in the neural network applications. By using the Shannon's theorem, the gate count is reduced, thereby the total chip area gets minimized. Hence, the power also gets reduced to a considerable amount. The designs are implemented using synthesis tool which results in significant reduction in area and power for the modified Shannon-based full-adder cell when compared with multiplexing control input technique (MCIT)-based full-adder cell. © 2014 Springer India.


Gayathri S.,SJCE | Sridhar V.,PESCE
Lecture Notes in Electrical Engineering | Year: 2014

This paper presents FPGA implementation of minutiae extraction and false minutiae elimination for fingerprint image. A biometric system provides automatic identification of an individual based on a unique feature or characteristic possessed by the individual. Despite the widespread use of fingerprints, there is a little statistical theory on the uniqueness of fingerprint minutiae. A critical step in studying the statistics of fingerprint minutiae is to reliably extract minutiae from the fingerprint images. However, fingerprint images are rarely of perfect quality which requires image preprocessing techniques prior to minutiae extraction and false minutiae elimination. This will provide more reliable estimation of minutiae locations. Minutiae extraction and false minutiae elimination processes are implemented as a single block on FPGA. The FPGA configuration is generally specified using a hardware description language (HDL). © 2014 Springer India.


Patent
Pesce | Date: 2014-09-24

A tool for distributing and smoothening finishing material, such as mortar, plaster or other mixtures, on the surface of building walls and internal walls comprises a spatula (11) and a handle (12) connected to said spatula (11). The spatula (11) has a work surface (14) adapted to distribute and smoothen the finishing material and a connection surface (16) for connection with the handle (12), opposite to said work surface (14). The handle (12) has a central holding portion (17) designed to be held by the hand of an operator and connection portions (18, 19) between each end of the central holding portion (17) and said surface (16) for connection with the handle (12). The central holding portion (17) of the handle (12) has at least one section with axis inclined according to an angle () with respect to said work surface (14).

Loading PESCE collaborators
Loading PESCE collaborators