scholarly journals Design of Embedded Automated Fingerprint Identification System Based on DSP

2011 ◽  
Vol 1 ◽  
pp. 97-101
Author(s):  
Hong Sun

The automated fingerprint identification algorithm has high time and space complexity in the embedded system. How to reduce the complexity is one of the hot research topics. The process of fingerprint identification and choice of algorithm platform are analyzed in the paper. Design of embedded fingerprint identification hardware system based on DSP, including the selection of microprocessor and fingerprint sensor and the communication between them, is introduced in detail. In additional, main software composition and flow are explained. At last, serial peripheral interface communication is simulated.

The need for miniaturization has been the driving force in chip manufacturing. The proliferation of IoT, robotics, consumer electronics and medical instruments pose unprecedented demands on the embedded system design. The area optimization can be achieved either by reducing the size of transistors or by optimizing (reducing) the circuit at the gate level. The first solution has attracted many researchers while the later has not been explored to its full potential. The aim is to design a System on Chip (SoC) to satisfy the dynamic requirements of disruptive technologies while occupying the lesser area. The design and testing of communication interfaces such as Serial Peripheral Interface (SPI), Inter-IC Communication (I2C), Universal Asynchronous Receiver and Transmitter (UART) are very crucial in the area optimization of microcontroller design. Since SPI being an important communication protocol, this work reports the preliminary research carried in the design and verification of it. In this work, Verilog is used for the design and verification of the SPI module. The results show that there is a drastic reduction in the number of Look-Up-Tables (LUTs) and slices required to build the circuit. We conclude that sophisticated optimization techniques of the circuit at the gate level has the potential to reduce the area by half.


2012 ◽  
Author(s):  
Wan Azizun Wan Adnan ◽  
Tze Siang Lim ◽  
Salasiah Hitam

Teknik cetak ibujari merupakan satu daripada teknologi biometrik yang paling boleh diharapkan. Beberapa pendekatan terhadap pemadanan ibujari secara automatik telah dicadangkan dalam saranan. Dalam pengecaman ibujari, pra–prosesan seperti pelicin, binarization dan thinning diperlukan. Kemudian, ciri–ciri cetak ibujari yang terperinci diambil berdasarkan algoritma pengecaman cetak ibujari (seperti dengan menggunakan Fast Fourier Transform (FFT)) mungkin memerlukan teknik–teknik pengkomputeran yang banyak sehingga menjadikannya tidak praktikal. Algoritma berdasarkan wavelet mungkin merupakan kunci untuk membina sistem pengecaman cetak ibujari kos rendah yang boleh dioperasi dalam sistem komputer bermodul kecil. Di sini, satu sistem pengecaman cetak ibujari yang boleh menjalankan pemadanan cetak ibujari berdasarkan kepada ciri–ciri yang diperolehi daripada domain jelmaan wavelet diperkenalkan. Kajian ini adalah berdasarkan kepada perisian MATLAB dan aplikasinya dalam toolbox seperti Wavelet and Image Processing Toolbox. Kata kunci: Biometrik, wavelet, cetaksekuriti, pengecaman cetak ibujari Fingerprint technique is one of the most reliable biometric technologies. In the fingerprint recognition, pre-processing such as smoothing, binarization, and thinning are needed. Then, fingerprint minutia feature is extracted. Some fingerprint identification algorithm (such as using Fast Fourier Transform, (FFT)) may require so much computation as to be impractical. Wavelet based algorithm may be the key to making a low cost fingerprint identification system that would operate on a small computer. We present a fingerprint recognition system that can match the fingerprint images based on features extracted in the wavelet transform domain. This study is implemented based on MATLAB Software and their toolbox applications, such as Wavelet and Image Processing Toolbox. Key words: Biometrics, wavelet, security, fingerprint recognition


2013 ◽  
Vol 734-737 ◽  
pp. 2970-2973
Author(s):  
Shu Qian Chen ◽  
Yang Lie Fu ◽  
Ming Yang Yin

Study on a new type of fingerprint identification algorithm and its application in intelligent home electric control lock problem. The traditional fingerprint recognition algorithms on fingerprint minutiae matching accuracy is low, difficult to accurately extract details, leading to lock malfunction or could not be opened. In order to overcome this problem, improved Point pattern fingerprint recognition matching algorithm, joined the matching weight coefficient on the base of pattern matching algorithm, and gives the hardware structure of fingerprint identification system, the improved algorithm is successfully applied in smart home applications, the example shows that, the improved algorithm can effectively improve the recognition rate , reduce false positives, has a certain practical value.


2013 ◽  
Vol 462-463 ◽  
pp. 935-939
Author(s):  
Kan Hu ◽  
Yuan Lin Lei

With the rapid development of computer technology, embedded system is more and more widely used. The embedded hardware system was designed by taking Samsung ARM7TDMI CPU as the core. And a small uClinux system was embedded into this hardware system. Various kinds of applications in uClinux system can be developed. This thesis introduced one of those applications, which is embedded web server and its protocol-HTTP. In this thesis, the embedded system based on ARM had been developed. Our embedded system has the characters of low cost and high efficiency. It is at large applicated on business forwardly.


2014 ◽  
Vol 494-495 ◽  
pp. 973-978
Author(s):  
Chun Qing Gu ◽  
Zhi Hong Yan ◽  
Qiang Liu ◽  
Yong Lun Song

In this paper, a set of industrial X-ray film digitizing and automatic identification system is established with machine vision equipment. With this system, the industrial film can be digitalized rapidly and in high space resolution reaching to 860 DPI. The machine vision equipment includes linear CCD, light source, lens, aperture and film-moving machine. The controller is a master-slave mode, which includes a PC as the upper computer and an embedded system as the lower computer. The embedded system is composed by ARM and FPGA modules, which can control four axis motors and transmit an external trigger signals to the CCD in real-time. At last, a series of image processing algorithm is also developed in this paper to identify an industrial film that is captured to test coupling alignment of the casing pipes. The testing accuracy is 0.06mm.


2018 ◽  
Vol 34 (1) ◽  
pp. 82-88
Author(s):  
М. М. Pikalkina

In the article the peculiarities of the methodology of project management in knowledge-intensive enterprise. The analysis of the budgeting practices of research topics, presents the results of a study of their budgets. The authors focus on the formation of the expenditure side of budgets, cost planning on various counts. In the article the criteria of selection of the optimal budget.


2021 ◽  
Vol 11 (3) ◽  
pp. 1331
Author(s):  
Mohammad Hossein Same ◽  
Gabriel Gleeton ◽  
Gabriel Gandubert ◽  
Preslav Ivanov ◽  
Rene Jr Landry

By increasing the demand for radio frequency (RF) and access of hackers and spoofers to low price hardware and software defined radios (SDR), radio frequency interference (RFI) became a more frequent and serious problem. In order to increase the security of satellite communication (Satcom) and guarantee the quality of service (QoS) of end users, it is crucial to detect the RFI in the desired bandwidth and protect the receiver with a proper mitigation mechanism. Digital narrowband signals are so sensitive into the interference and because of their special power spectrum shape, it is hard to detect and eliminate the RFI from their bandwidth. Thus, a proper detector requires a high precision and smooth estimation of input signal power spectral density (PSD). By utilizing the presented power spectrum by the simplified Welch method, this article proposes a solid and effective algorithm that can find all necessary interference parameters in the frequency domain while targeting practical implantation for the embedded system with minimum complexity. The proposed detector can detect several multi narrowband interferences and estimate their center frequency, bandwidth, power, start, and end of each interference individually. To remove multiple interferences, a chain of several infinite impulse response (IIR) notch filters with multiplexers is proposed. To minimize damage to the original signal, the bandwidth of each notch is adjusted in a way that maximizes the received signal to noise ratio (SNR) by the receiver. Multiple carrier wave interferences (MCWI) is utilized as a jamming attack to the Digital Video Broadcasting-Satellite-Second Generation (DVB-S2) receiver and performance of a new detector and mitigation system is investigated and validated in both simulation and practical tests. Based on the obtained results, the proposed detector can detect a weak power interference down to −25 dB and track a hopping frequency interference with center frequency variation speed up to 3 kHz. Bit error ratio (BER) performance shows 3 dB improvement by utilizing new adaptive mitigation scenario compared to non-adaptive one. Finally, the protected DVB-S2 can receive the data with SNR close to the normal situation while it is under the attack of the MCWI jammer.


2021 ◽  
Vol 26 (2) ◽  
pp. 179-204
Author(s):  
Massimo Sargiacomo ◽  
Stefania Servalli ◽  
Serena Potito ◽  
Antonio D’Andreamatteo ◽  
Antonio Gitto

This study offers an analysis of published historical research on accounting for natural disasters. Drawing on the insights provided by an examination of 35 accounting/business/economic history and generalist journals, 11 articles have been selected and analysed. The analysis conducted on the scattered literature identified the emerging themes, disasters investigated, periods of time explored and main contributions of published research. The analysis is extended by the examination of some key conferences of interdisciplinary history associations, and of the eventual journals/issues where the papers presented were published. The investigation has also been complemented by a brief selection of books showing historical analyses of diverse disasters, typologies and periods of investigation. The stimuli provided by the study have helped to portray the main features of an open research agenda, highlighting possible future research topics and suggesting ancient and recent disasters’ loci to be investigated worldwide.


Sign in / Sign up

Export Citation Format

Share Document