Sattar Mirzakuchaki | Iran University of Science & Technology (original) (raw)

Papers by Sattar Mirzakuchaki

Research paper thumbnail of Development of a Robust Carrier Synchronizer for High Dynamic and Low Signal to Noise Ratio Signals in GPS Receivers

Wireless Personal Communications, 2019

In this paper, a robust carrier recovery loop for high dynamic and weak signals in GPS receivers ... more In this paper, a robust carrier recovery loop for high dynamic and weak signals in GPS receivers is proposed. To achieve optimal tracking performance at synchronization loops, different methods are investigated. Since phase jitter sources are identified at the receiver, suitable controller coefficients are calculated and used in carrier and timing recovery loops. This improvement induces higher speed and lower variance of jitter in acquisition and tracking modes, respectively. Furthermore, this simple design can obviate the need of large digital filters or complex circuits such as wavelet de-noising filters in the loop. To extend the linear range of the phase estimator, phase unwrapper unit is used which can improve loop tracking ability and resolve Kalman filter difficulties. To compensate the cycle-slip phenomenon, a novel recursive algorithm is introduced which causes better performance for low CNR signals and high dynamic environments. Simulation results show the effectiveness of the proposed architecture for different Doppler rates and CNRs. Moreover, the results indicate good matching between fixed-point FPGA implementation and floatingpoint simulation.

Research paper thumbnail of Design and analysis of a novel low-power and energy-efficient 18T hybrid full adder

Microelectronics Journal, 2018

A novel full-swing, low-power and energy-aware full adder using hybrid logic scheme is presented ... more A novel full-swing, low-power and energy-aware full adder using hybrid logic scheme is presented in this paper. At first, a new energy-efficient 10T XOR-XNOR cell is designed by modifying inverter and pass transistor based 3T XOR-XNOR gates combined with a feedback loop. The performance of this new cell is compared with some reported ones and then, using this new cell and two other modules, a novel full adder circuit is proposed and evaluated in TSMC 0.18 μm CMOS process technology. Post-layout simulations using Cadence Virtuoso tool showed 33%-74% and 35%-81% improvement in terms of power consumption and power-delay product (PDP), respectively, compared with some well-known counterparts in the literature. Furthermore, high-performance claim of our proposed full adder cell is verified through the process, voltage and temperature (PVT) variations' simulation of the adders. Finally, implementation of different full adders in 4-bit ripple carry adders (RCAs) proved our new design has high performance in the aspects of power dissipation and PDP.

Research paper thumbnail of Design of Multiple Modulated Frequency Lock-In Amplifier for Tapping-Mode Atomic Force Microscopy Systems

IEEE Transactions on Instrumentation and Measurement, 2016

Nonlinear contact between tip and sample in tapping mode atomic force microscopy (AFM) systems in... more Nonlinear contact between tip and sample in tapping mode atomic force microscopy (AFM) systems induces higher harmonics, which may be useful for extraction of some characteristics of the sample. In this paper, a new efficient method for implementing multichannel digital lock-in technique is presented, which is able to measure the amplitude and phase of multiple modulated frequency signals. In order to solve the two most important problems in AFM systems, which are resolution and cost, previous multichannel lock-in amplifier methods are investigated and an improved algorithm for amplitude and phase extraction using fast Fourier transform is developed. In addition, we propose a novel multichannel digital lock-in algorithm including an N-slow digital filter and a multichannel direct digital synthesis block for generating reference signals. We achieve optimal noise reduction using the appropriate decimation filters prior to harmonic extraction. This modification results in a significant hardware reduction in implementation compared with classical designs. Since the precision of the design is sensitive to the sampling frequency, we perform the suitable sampling rate conversion using fractional delay and decimation filters, which enhance the accuracy and noise resiliency of the designed architectures. Experimental results prove the efficiency of the proposed method in multiple modulated frequencies extraction. Also, FPGA implementation results show that the proposed architecture is superior to previous structures, especially in the aspect of area. Index Terms-Decimation filter, fast Fourier transform (FFT) fractional delay, lock-in amplifier (LIA), nonlinear circuits, N-slow, tapping mode atomic force microscopy (AFM), time-division multiplexing. I. INTRODUCTION T RADITIONAL lock-in amplifiers (LIAs) commonly use phase-sensitive detection technique to extract the specific frequency of the signal spectrum in low-level amplitudes. Due to noise rejection ability, LIAs are very accurate measurement systems that can measure low-level signals even in noisy environments. This behavior makes them a very precise amplitude measurement system at specific frequency, because they can greatly improve the signal-to-noise ratio (SNR). In previous works, both analog [1], [2] and digital [3]-[12] LIAs Manuscript

Research paper thumbnail of Design and implementation of high throughput FPGA-based DVB-T system

Computers & Electrical Engineering, 2016

In this paper, an efficient implementation of high throughput Digital Video Broadcasting (DVB) sy... more In this paper, an efficient implementation of high throughput Digital Video Broadcasting (DVB) system based on the Orthogonal Frequency Division Multiplexing (OFDM) modulation for terrestrial links is proposed. The proposed architecture uses an improved optimization methods to obtain high speed system. To verify the efficiency of this system a DVB-T simulator in MATLAB matched with European Telecommunications Standards Institute (ETSI) is used to investigate the hardware design performance. The joint simulation of Xilinx ISE and MATLAB was performed including information framing, channel coding, and modulation. Also, a systematic design procedure based on FPGA for the proposed DVB-T system is presented and the results are reported. Hardware implementation results demonstrate the effectiveness of the proposed system and show that there is a good match between fixed-point implementations and floating-point simulations, while the high-throughput architecture is achieved in hardware implementation using the speed optimization methods in the design.

Research paper thumbnail of Public key cryptography based on semimodules over quotient semirings

International Mathematical Forum, 2007

A generalization of the original Diffie-Hellman key exchange in (Z/pZ) * found a new depth when M... more A generalization of the original Diffie-Hellman key exchange in (Z/pZ) * found a new depth when Miller [10] and Koblitz [7] suggested that such a protocol could be used with the group over an elliptic curve. Maze, Monico and Rosenthal extend such a generalization to the setting of a semigroup action on a finite set, more precisely, linear actions of abelian semirings on semimodules [8]. In this paper, we extend such a generalization to the linear actions of quotient semirings on semimodules. In fact, we show how the action of a quotient semirings on a semimodule gives rise to a generalized Diffie-Hellman and ElGamal protocol. This leads naturally to a cryptographic protocol whose difficulty is based on the hardness of a particular control problem, namely the problem of steering the state of some dynamical system from an intial vector to some final location.

Research paper thumbnail of Reducing FFT Operations for FMCW Radars Range Detection

Due to the increasing demand for small, low-cost, high-resolution radars, frequency-modulated con... more Due to the increasing demand for small, low-cost, high-resolution radars, frequency-modulated continuous wave (FMCW) radars are gaining more and more attraction. One major challenge with the digital signal processing (DSP) employed in FMCW radars is reducing the number of required computations in order to achieve a real-time operation. Most FMCW radars need to continuously perform the Fast Fourier Transform (FFT) to determine the object range, velocity, etc. This computational burden is a major obstacle to the radar real-time operation. In this letter, a computationally efficient FMCW radar is proposed capable of reducing the number of required FFT operations without sacrificing the resolution of the estimated range. With careful selection of parameters, simulations show that the new method can reduce the number of required FFT operations by a factor of about 119 and 183 in two different scenarios when compared to a conventional solution.

Research paper thumbnail of Modelling and analysis of crosstalk induced noise effects in bundle SWCNT interconnects and its impact on signal stability

Journal of Computational Electronics, 2017

In order to analyse crosstalk delay and stability in single wall carbon nanotube bundle (SWCNT) i... more In order to analyse crosstalk delay and stability in single wall carbon nanotube bundle (SWCNT) interconnects, the time and frequency domain response are investigated in this paper. Based on the transmission line model and by using matrix formulation, we perform the Nyquist stability analysis to survey the dependence of the degree of relative stability for coupled SWCNT bundle interconnects. We present an exact transfer function formula for a SWCNT bundle and two coupled SWCNT bundle interconnects. The proposed model can be extended to coupled n bundled SWCNT interconnects. In order to demonstrate the crosstalk effects, we seek to compare the coupled SWCNT bundle interconnects with the SWCNT bundle interconnect. The results show that due to the capacitive and mutual inductive couplings between two SWCNT bundles, the stability of near-end output increases and the created undesirable voltage on the far-end output may reduce the stability and degrade logic. Also, it is observed that stability and switching delay of near

Research paper thumbnail of PUF-based solutions for secure communications in Advanced Metering Infrastructure (AMI)

International Journal of Communication Systems, 2016

In this paper, by considering the constraints of Advanced Metering Infrastructure (AMI) systems, ... more In this paper, by considering the constraints of Advanced Metering Infrastructure (AMI) systems, we propose an authenticated key exchange protocol and an authenticated message broadcasting protocol. The proposed protocols are based on two well-known protocols, Okamoto and Schnorr, and inherit their security features. For providing the security of the system against physical attacks, we utilize the Physical Unclonable Function (PUF) technology in communication parties. Thus, there is no need to store the secrets in the smart meters which can easily be corrupted. We show that the proposed authenticated key exchange protocol meets all the security requirements such as secure key generation, backward and forward secrecy and explicit authentication. Also, it is shown that the authenticated message broadcasting protocol is secure against corrupted smart meters. The proposed schemes are practical and efficient for providing a secure communication between parties. We believe that our proposed protocols are the best fit for an AMI system.

Research paper thumbnail of Reliability Issues of Nanowires in FPNI Technology

Research paper thumbnail of A low power and energy efficient 4:2 precise compressor based on novel 14T hybrid full adders in 10 nm wrap gate CNTFET technology

Microelectronics Journal, 2020

Abstract In the realm of VLSI circuits, addition and multiplication are the most pivotal operator... more Abstract In the realm of VLSI circuits, addition and multiplication are the most pivotal operators in arithmetic units. In this regard, this work aims to propose an energy efficient 4:2 precise compressor utilizing 10 nm wrap gate CNTFET technology. The proposed compressor is constructed from 2 hybrids 14-transistors full adders. The proposed Gate All Around (GAA) CNTFET based full adder employs a hybrid XOR/XNOR logic structure to lower the transistor count and power consumption. After performing rigorous simulations, we have demonstrated that the proposed GAA CNTFET based full adder and 4:2 compressor depict 175.3 nW and 308.5 nW power consumption respectively along with superior propagation delay response (4.4 ps and 10.57 ps respectively) at a 0.5 V nominal supply voltage. Moreover, the proposed designs occupy a lower layout area (0.195 μm2 and 0.43 μm2 for the proposed full adder and 4:2 compressor respectively) compared to the other counterparts. Our results accentuate the application of the proposed GAA CNTFET based 4:2 precise compressor for ultra miniature microprocessing systems.

Research paper thumbnail of On the Design of New Digital Blind Feedforward Timing Recovery Algorithm for Linear Modulations in Digital Communication Receivers

IET Communications, 2016

Synchronisers are a significant part of digital communication receivers since they are used to es... more Synchronisers are a significant part of digital communication receivers since they are used to estimate the received signal timing. Among these synchronisers, non-data-aided (NDA) or blind synchronisers are even more important due to bandwidth efficiency. In this study, a different approach is investigated to derive new feedforward NDA timing estimators based on Newton algorithm. Two novel estimators with four and two samples per symbol are presented and compared with traditional timing estimators, respectively. One of the main advantages of the second proposed estimator is the ability to control the loop gain automatically. This ability improves the convergence speed and robustness of the design. Simulation results show that the presented estimators outperform the conventional estimators over a noisy channel, especially at small excess bandwidth and low signal to noise ratio.

Research paper thumbnail of A Novel Computational Analog Block for Using in Analog Processors

cyberjournals.com

Abstract—In this paper, we propose a computational analogue block which can be used to realize fu... more Abstract—In this paper, we propose a computational analogue block which can be used to realize functions such as squaring, harmonic mean calculation, and vector summing. As presented block can be programmed to realize mentioned functions, it can be efficiently ...

Research paper thumbnail of A Nonlinear Method to Estimate Simultaneous Force Pattern Generated by Hand Fingers; Application in Prosthetic Hand

In this study a method has been introduced to map the features extracted from the recorded electr... more In this study a method has been introduced to map the features extracted from the recorded electromyogram signals from the forearm and the force generated by the fingers. In order to simultaneously record of sEMG signals and the force produced by fingers, 9 requested movements of fingers conducted by 10 healthy people. Estimation was done for 6 degrees of freedom (DoF) and generalized regression neural network (GRNN) was selected for system training. The optimal parameters, including the length of the time windows, the parameters of the neural network, and the characteristics of the sEMG signal were calculated to improve the performance of the estimate. The performance was obtained based on R criterion. The Total value of R for 6 DoF was 92.8±5.2% that obtained by greedy looking system parameters in all the subjects. The result shows that proposed method can be significant in simultaneous myoelectric control.

Research paper thumbnail of A digital watermarking method based on NSCT transform and hybrid evolutionary algorithms with neural networks

SN Applied Sciences, 2020

This study aims to determine the watermark resistance to different attacks as well as the PSNR le... more This study aims to determine the watermark resistance to different attacks as well as the PSNR level, both of which are essential requirements of watermarking. In our research, we came up with an intelligent design based on NSCT-SVD that fulfills these requirements to a great extent and we managed to use different-sized images for watermark instead of using logos on the host images. Yet we were able to improve PSNR levels and resistance to various attacks. In this paper an NSCT-SVD-based smart watermark model is proposed. We first compare the PSO and PSO-GA algorithms for greater stability using larger SFs obtained by the PSO-GA-AI algorithm. The resulting host image is then decomposed by NSCT transform to obtain images below the low frequency range. Stationary Wavelet Transform (SWT) is performed once on these coefficients and the low frequency coefficients are fed to SVD. Afterwards, SWT transform is performed on the watermark image and the transform is once again taken from the HL coefficients and the LL frequencies are given to the SVD conversion. The rest of image process is insertion. This insertion process dramatically increases the visual transparency and PSNR value. The experiment shows that such a model is able to resist the repeated image attacks with better visibility and power. These results are compared before and after using SWT. We have used a PSO-based algorithm for better results on the False Positive rate in the embedding phase.

Research paper thumbnail of Breaking an image encryption technique based on neural chaotic generator

Optik - International Journal for Light and Electron Optics, 2017

This paper presents a cryptanalysis of a recent proposed image encryption technique based on neur... more This paper presents a cryptanalysis of a recent proposed image encryption technique based on neural chaotic generator. In this algorithm, the permutation at the pixel level is used to shuffle the position of image pixels. Moreover, to confuse the relationship between cipher-image and plain-image, a permutation process at bits level of pixels is performed. However, by applying chosen plaintext attack which is described in this paper, we show that the cryptosystem is not robust to resist chosenplaintext attack. As a conclusion, the use of this image cryptosystem is not recommended in secure communications.

Research paper thumbnail of A novel image encryption algorithm based on discrete wavelet transform using two dimensional logistic map

2016 24th Iranian Conference on Electrical Engineering (ICEE), 2016

In this paper a novel image encryption algorithm based on discrete wavelet transform (DWT) is pro... more In this paper a novel image encryption algorithm based on discrete wavelet transform (DWT) is proposed which uses two-dimensional logistic map as Private-Key. The algorithm uses Haar wavelet transform in order to generate image sub-bands which are used in encryption and decryption process and then two-dimensional logistic map is applied to the encrypted image in order to generate chaotic matrix which causes the encrypted image to be more secure. This chaotic matrix can also be used as a private-key in decryption process. The reversible proposed algorithm is evaluated with standard images and statistical techniques. The results show proposed algorithm possesses higher security and performance compared to the previous works.

Research paper thumbnail of Infrared Dim Small Target Detection with High Reliability using Saliency Map Fusion

IET Image Processing, 2016

Detection of dim small targets in infrared (IR) images with high reliability is very important in... more Detection of dim small targets in infrared (IR) images with high reliability is very important in defence systems. In this study, a new method is introduced based on human visual system and saliency maps fusion to detect the small target in IR images with high reliability. By using the static and motion saliency maps fusion, emphasizing the obtained saliencies from one method to another and applying the information and benefits of all maps in the saliency map fusion, this method suppresses the background clutter and noise with high reliability, makes the target more prominent and finally increases the contrast among them. The experiments are carried out on some real-life data of IR images containing the moving target. The obtained results show the efficiency and robustness of the proposed method so that this method improves the target signal to the background noise and clutter and increases the contrast between them and also detects the small target in IR images with low false alarm rates and high reliability.

Research paper thumbnail of A Solution to Remote Detecting of Illegal Electricity Usage Based on Smart Metering

2007 2nd International Workshop on Soft Computing Applications, 2007

Abstract Power line carrier communication presents new area for automatic meter reading, by equip... more Abstract Power line carrier communication presents new area for automatic meter reading, by equipped energy meter with power line system all user connect each other with this communication method, Smart metering uses all potential of this communication channel ...

Research paper thumbnail of Three phase power line balancing based on smart energy meters

IEEE EUROCON 2009, 2009

... Applying intelligent current balancing technique in smart meters enhances grid balancing base... more ... Applying intelligent current balancing technique in smart meters enhances grid balancing based on statistical information of low voltage network that each smart meter gathers periodically. Index Terms: Smart meter, Power line Carrier, Three Phase balancing. ...

Research paper thumbnail of A fast color image encryption algorithm based on coupled two-dimensional piecewise chaotic map

Signal Processing, 2012

This paper presents a new way of image encryption scheme, which consists of two processes; key st... more This paper presents a new way of image encryption scheme, which consists of two processes; key stream generation process and one-round diffusion process. The first part is a pseudo-random key stream generator based on hyper-chaotic systems. The initial conditions for both hyper-chaotic systems are derived using a 256-bit-long external secret key by applying some algebraic transformations to the key. The original key stream is related to the plain-image which increases the level of security and key sensitivity of the proposed algorithm. The second process employs the image data in order to modify the pixel gray-level values and crack the strong correlations between adjacent pixels of an image simultaneously. In this process, the states which are combinations of two hyper-chaotic systems are selected according to image data itself and are used to encrypt the image. This feature will significantly increase plaintext sensitivity. Moreover, in order to reach higher security and higher complexity, the proposed method employs the image size in key stream generation process. It is demonstrated that the number of pixel change rate (NPCR) and the unified average changing intensity (UACI) can satisfy security and performance requirements (NPCR >99.80 %,

Research paper thumbnail of Development of a Robust Carrier Synchronizer for High Dynamic and Low Signal to Noise Ratio Signals in GPS Receivers

Wireless Personal Communications, 2019

In this paper, a robust carrier recovery loop for high dynamic and weak signals in GPS receivers ... more In this paper, a robust carrier recovery loop for high dynamic and weak signals in GPS receivers is proposed. To achieve optimal tracking performance at synchronization loops, different methods are investigated. Since phase jitter sources are identified at the receiver, suitable controller coefficients are calculated and used in carrier and timing recovery loops. This improvement induces higher speed and lower variance of jitter in acquisition and tracking modes, respectively. Furthermore, this simple design can obviate the need of large digital filters or complex circuits such as wavelet de-noising filters in the loop. To extend the linear range of the phase estimator, phase unwrapper unit is used which can improve loop tracking ability and resolve Kalman filter difficulties. To compensate the cycle-slip phenomenon, a novel recursive algorithm is introduced which causes better performance for low CNR signals and high dynamic environments. Simulation results show the effectiveness of the proposed architecture for different Doppler rates and CNRs. Moreover, the results indicate good matching between fixed-point FPGA implementation and floatingpoint simulation.

Research paper thumbnail of Design and analysis of a novel low-power and energy-efficient 18T hybrid full adder

Microelectronics Journal, 2018

A novel full-swing, low-power and energy-aware full adder using hybrid logic scheme is presented ... more A novel full-swing, low-power and energy-aware full adder using hybrid logic scheme is presented in this paper. At first, a new energy-efficient 10T XOR-XNOR cell is designed by modifying inverter and pass transistor based 3T XOR-XNOR gates combined with a feedback loop. The performance of this new cell is compared with some reported ones and then, using this new cell and two other modules, a novel full adder circuit is proposed and evaluated in TSMC 0.18 μm CMOS process technology. Post-layout simulations using Cadence Virtuoso tool showed 33%-74% and 35%-81% improvement in terms of power consumption and power-delay product (PDP), respectively, compared with some well-known counterparts in the literature. Furthermore, high-performance claim of our proposed full adder cell is verified through the process, voltage and temperature (PVT) variations' simulation of the adders. Finally, implementation of different full adders in 4-bit ripple carry adders (RCAs) proved our new design has high performance in the aspects of power dissipation and PDP.

Research paper thumbnail of Design of Multiple Modulated Frequency Lock-In Amplifier for Tapping-Mode Atomic Force Microscopy Systems

IEEE Transactions on Instrumentation and Measurement, 2016

Nonlinear contact between tip and sample in tapping mode atomic force microscopy (AFM) systems in... more Nonlinear contact between tip and sample in tapping mode atomic force microscopy (AFM) systems induces higher harmonics, which may be useful for extraction of some characteristics of the sample. In this paper, a new efficient method for implementing multichannel digital lock-in technique is presented, which is able to measure the amplitude and phase of multiple modulated frequency signals. In order to solve the two most important problems in AFM systems, which are resolution and cost, previous multichannel lock-in amplifier methods are investigated and an improved algorithm for amplitude and phase extraction using fast Fourier transform is developed. In addition, we propose a novel multichannel digital lock-in algorithm including an N-slow digital filter and a multichannel direct digital synthesis block for generating reference signals. We achieve optimal noise reduction using the appropriate decimation filters prior to harmonic extraction. This modification results in a significant hardware reduction in implementation compared with classical designs. Since the precision of the design is sensitive to the sampling frequency, we perform the suitable sampling rate conversion using fractional delay and decimation filters, which enhance the accuracy and noise resiliency of the designed architectures. Experimental results prove the efficiency of the proposed method in multiple modulated frequencies extraction. Also, FPGA implementation results show that the proposed architecture is superior to previous structures, especially in the aspect of area. Index Terms-Decimation filter, fast Fourier transform (FFT) fractional delay, lock-in amplifier (LIA), nonlinear circuits, N-slow, tapping mode atomic force microscopy (AFM), time-division multiplexing. I. INTRODUCTION T RADITIONAL lock-in amplifiers (LIAs) commonly use phase-sensitive detection technique to extract the specific frequency of the signal spectrum in low-level amplitudes. Due to noise rejection ability, LIAs are very accurate measurement systems that can measure low-level signals even in noisy environments. This behavior makes them a very precise amplitude measurement system at specific frequency, because they can greatly improve the signal-to-noise ratio (SNR). In previous works, both analog [1], [2] and digital [3]-[12] LIAs Manuscript

Research paper thumbnail of Design and implementation of high throughput FPGA-based DVB-T system

Computers & Electrical Engineering, 2016

In this paper, an efficient implementation of high throughput Digital Video Broadcasting (DVB) sy... more In this paper, an efficient implementation of high throughput Digital Video Broadcasting (DVB) system based on the Orthogonal Frequency Division Multiplexing (OFDM) modulation for terrestrial links is proposed. The proposed architecture uses an improved optimization methods to obtain high speed system. To verify the efficiency of this system a DVB-T simulator in MATLAB matched with European Telecommunications Standards Institute (ETSI) is used to investigate the hardware design performance. The joint simulation of Xilinx ISE and MATLAB was performed including information framing, channel coding, and modulation. Also, a systematic design procedure based on FPGA for the proposed DVB-T system is presented and the results are reported. Hardware implementation results demonstrate the effectiveness of the proposed system and show that there is a good match between fixed-point implementations and floating-point simulations, while the high-throughput architecture is achieved in hardware implementation using the speed optimization methods in the design.

Research paper thumbnail of Public key cryptography based on semimodules over quotient semirings

International Mathematical Forum, 2007

A generalization of the original Diffie-Hellman key exchange in (Z/pZ) * found a new depth when M... more A generalization of the original Diffie-Hellman key exchange in (Z/pZ) * found a new depth when Miller [10] and Koblitz [7] suggested that such a protocol could be used with the group over an elliptic curve. Maze, Monico and Rosenthal extend such a generalization to the setting of a semigroup action on a finite set, more precisely, linear actions of abelian semirings on semimodules [8]. In this paper, we extend such a generalization to the linear actions of quotient semirings on semimodules. In fact, we show how the action of a quotient semirings on a semimodule gives rise to a generalized Diffie-Hellman and ElGamal protocol. This leads naturally to a cryptographic protocol whose difficulty is based on the hardness of a particular control problem, namely the problem of steering the state of some dynamical system from an intial vector to some final location.

Research paper thumbnail of Reducing FFT Operations for FMCW Radars Range Detection

Due to the increasing demand for small, low-cost, high-resolution radars, frequency-modulated con... more Due to the increasing demand for small, low-cost, high-resolution radars, frequency-modulated continuous wave (FMCW) radars are gaining more and more attraction. One major challenge with the digital signal processing (DSP) employed in FMCW radars is reducing the number of required computations in order to achieve a real-time operation. Most FMCW radars need to continuously perform the Fast Fourier Transform (FFT) to determine the object range, velocity, etc. This computational burden is a major obstacle to the radar real-time operation. In this letter, a computationally efficient FMCW radar is proposed capable of reducing the number of required FFT operations without sacrificing the resolution of the estimated range. With careful selection of parameters, simulations show that the new method can reduce the number of required FFT operations by a factor of about 119 and 183 in two different scenarios when compared to a conventional solution.

Research paper thumbnail of Modelling and analysis of crosstalk induced noise effects in bundle SWCNT interconnects and its impact on signal stability

Journal of Computational Electronics, 2017

In order to analyse crosstalk delay and stability in single wall carbon nanotube bundle (SWCNT) i... more In order to analyse crosstalk delay and stability in single wall carbon nanotube bundle (SWCNT) interconnects, the time and frequency domain response are investigated in this paper. Based on the transmission line model and by using matrix formulation, we perform the Nyquist stability analysis to survey the dependence of the degree of relative stability for coupled SWCNT bundle interconnects. We present an exact transfer function formula for a SWCNT bundle and two coupled SWCNT bundle interconnects. The proposed model can be extended to coupled n bundled SWCNT interconnects. In order to demonstrate the crosstalk effects, we seek to compare the coupled SWCNT bundle interconnects with the SWCNT bundle interconnect. The results show that due to the capacitive and mutual inductive couplings between two SWCNT bundles, the stability of near-end output increases and the created undesirable voltage on the far-end output may reduce the stability and degrade logic. Also, it is observed that stability and switching delay of near

Research paper thumbnail of PUF-based solutions for secure communications in Advanced Metering Infrastructure (AMI)

International Journal of Communication Systems, 2016

In this paper, by considering the constraints of Advanced Metering Infrastructure (AMI) systems, ... more In this paper, by considering the constraints of Advanced Metering Infrastructure (AMI) systems, we propose an authenticated key exchange protocol and an authenticated message broadcasting protocol. The proposed protocols are based on two well-known protocols, Okamoto and Schnorr, and inherit their security features. For providing the security of the system against physical attacks, we utilize the Physical Unclonable Function (PUF) technology in communication parties. Thus, there is no need to store the secrets in the smart meters which can easily be corrupted. We show that the proposed authenticated key exchange protocol meets all the security requirements such as secure key generation, backward and forward secrecy and explicit authentication. Also, it is shown that the authenticated message broadcasting protocol is secure against corrupted smart meters. The proposed schemes are practical and efficient for providing a secure communication between parties. We believe that our proposed protocols are the best fit for an AMI system.

Research paper thumbnail of Reliability Issues of Nanowires in FPNI Technology

Research paper thumbnail of A low power and energy efficient 4:2 precise compressor based on novel 14T hybrid full adders in 10 nm wrap gate CNTFET technology

Microelectronics Journal, 2020

Abstract In the realm of VLSI circuits, addition and multiplication are the most pivotal operator... more Abstract In the realm of VLSI circuits, addition and multiplication are the most pivotal operators in arithmetic units. In this regard, this work aims to propose an energy efficient 4:2 precise compressor utilizing 10 nm wrap gate CNTFET technology. The proposed compressor is constructed from 2 hybrids 14-transistors full adders. The proposed Gate All Around (GAA) CNTFET based full adder employs a hybrid XOR/XNOR logic structure to lower the transistor count and power consumption. After performing rigorous simulations, we have demonstrated that the proposed GAA CNTFET based full adder and 4:2 compressor depict 175.3 nW and 308.5 nW power consumption respectively along with superior propagation delay response (4.4 ps and 10.57 ps respectively) at a 0.5 V nominal supply voltage. Moreover, the proposed designs occupy a lower layout area (0.195 μm2 and 0.43 μm2 for the proposed full adder and 4:2 compressor respectively) compared to the other counterparts. Our results accentuate the application of the proposed GAA CNTFET based 4:2 precise compressor for ultra miniature microprocessing systems.

Research paper thumbnail of On the Design of New Digital Blind Feedforward Timing Recovery Algorithm for Linear Modulations in Digital Communication Receivers

IET Communications, 2016

Synchronisers are a significant part of digital communication receivers since they are used to es... more Synchronisers are a significant part of digital communication receivers since they are used to estimate the received signal timing. Among these synchronisers, non-data-aided (NDA) or blind synchronisers are even more important due to bandwidth efficiency. In this study, a different approach is investigated to derive new feedforward NDA timing estimators based on Newton algorithm. Two novel estimators with four and two samples per symbol are presented and compared with traditional timing estimators, respectively. One of the main advantages of the second proposed estimator is the ability to control the loop gain automatically. This ability improves the convergence speed and robustness of the design. Simulation results show that the presented estimators outperform the conventional estimators over a noisy channel, especially at small excess bandwidth and low signal to noise ratio.

Research paper thumbnail of A Novel Computational Analog Block for Using in Analog Processors

cyberjournals.com

Abstract—In this paper, we propose a computational analogue block which can be used to realize fu... more Abstract—In this paper, we propose a computational analogue block which can be used to realize functions such as squaring, harmonic mean calculation, and vector summing. As presented block can be programmed to realize mentioned functions, it can be efficiently ...

Research paper thumbnail of A Nonlinear Method to Estimate Simultaneous Force Pattern Generated by Hand Fingers; Application in Prosthetic Hand

In this study a method has been introduced to map the features extracted from the recorded electr... more In this study a method has been introduced to map the features extracted from the recorded electromyogram signals from the forearm and the force generated by the fingers. In order to simultaneously record of sEMG signals and the force produced by fingers, 9 requested movements of fingers conducted by 10 healthy people. Estimation was done for 6 degrees of freedom (DoF) and generalized regression neural network (GRNN) was selected for system training. The optimal parameters, including the length of the time windows, the parameters of the neural network, and the characteristics of the sEMG signal were calculated to improve the performance of the estimate. The performance was obtained based on R criterion. The Total value of R for 6 DoF was 92.8±5.2% that obtained by greedy looking system parameters in all the subjects. The result shows that proposed method can be significant in simultaneous myoelectric control.

Research paper thumbnail of A digital watermarking method based on NSCT transform and hybrid evolutionary algorithms with neural networks

SN Applied Sciences, 2020

This study aims to determine the watermark resistance to different attacks as well as the PSNR le... more This study aims to determine the watermark resistance to different attacks as well as the PSNR level, both of which are essential requirements of watermarking. In our research, we came up with an intelligent design based on NSCT-SVD that fulfills these requirements to a great extent and we managed to use different-sized images for watermark instead of using logos on the host images. Yet we were able to improve PSNR levels and resistance to various attacks. In this paper an NSCT-SVD-based smart watermark model is proposed. We first compare the PSO and PSO-GA algorithms for greater stability using larger SFs obtained by the PSO-GA-AI algorithm. The resulting host image is then decomposed by NSCT transform to obtain images below the low frequency range. Stationary Wavelet Transform (SWT) is performed once on these coefficients and the low frequency coefficients are fed to SVD. Afterwards, SWT transform is performed on the watermark image and the transform is once again taken from the HL coefficients and the LL frequencies are given to the SVD conversion. The rest of image process is insertion. This insertion process dramatically increases the visual transparency and PSNR value. The experiment shows that such a model is able to resist the repeated image attacks with better visibility and power. These results are compared before and after using SWT. We have used a PSO-based algorithm for better results on the False Positive rate in the embedding phase.

Research paper thumbnail of Breaking an image encryption technique based on neural chaotic generator

Optik - International Journal for Light and Electron Optics, 2017

This paper presents a cryptanalysis of a recent proposed image encryption technique based on neur... more This paper presents a cryptanalysis of a recent proposed image encryption technique based on neural chaotic generator. In this algorithm, the permutation at the pixel level is used to shuffle the position of image pixels. Moreover, to confuse the relationship between cipher-image and plain-image, a permutation process at bits level of pixels is performed. However, by applying chosen plaintext attack which is described in this paper, we show that the cryptosystem is not robust to resist chosenplaintext attack. As a conclusion, the use of this image cryptosystem is not recommended in secure communications.

Research paper thumbnail of A novel image encryption algorithm based on discrete wavelet transform using two dimensional logistic map

2016 24th Iranian Conference on Electrical Engineering (ICEE), 2016

In this paper a novel image encryption algorithm based on discrete wavelet transform (DWT) is pro... more In this paper a novel image encryption algorithm based on discrete wavelet transform (DWT) is proposed which uses two-dimensional logistic map as Private-Key. The algorithm uses Haar wavelet transform in order to generate image sub-bands which are used in encryption and decryption process and then two-dimensional logistic map is applied to the encrypted image in order to generate chaotic matrix which causes the encrypted image to be more secure. This chaotic matrix can also be used as a private-key in decryption process. The reversible proposed algorithm is evaluated with standard images and statistical techniques. The results show proposed algorithm possesses higher security and performance compared to the previous works.

Research paper thumbnail of Infrared Dim Small Target Detection with High Reliability using Saliency Map Fusion

IET Image Processing, 2016

Detection of dim small targets in infrared (IR) images with high reliability is very important in... more Detection of dim small targets in infrared (IR) images with high reliability is very important in defence systems. In this study, a new method is introduced based on human visual system and saliency maps fusion to detect the small target in IR images with high reliability. By using the static and motion saliency maps fusion, emphasizing the obtained saliencies from one method to another and applying the information and benefits of all maps in the saliency map fusion, this method suppresses the background clutter and noise with high reliability, makes the target more prominent and finally increases the contrast among them. The experiments are carried out on some real-life data of IR images containing the moving target. The obtained results show the efficiency and robustness of the proposed method so that this method improves the target signal to the background noise and clutter and increases the contrast between them and also detects the small target in IR images with low false alarm rates and high reliability.

Research paper thumbnail of A Solution to Remote Detecting of Illegal Electricity Usage Based on Smart Metering

2007 2nd International Workshop on Soft Computing Applications, 2007

Abstract Power line carrier communication presents new area for automatic meter reading, by equip... more Abstract Power line carrier communication presents new area for automatic meter reading, by equipped energy meter with power line system all user connect each other with this communication method, Smart metering uses all potential of this communication channel ...

Research paper thumbnail of Three phase power line balancing based on smart energy meters

IEEE EUROCON 2009, 2009

... Applying intelligent current balancing technique in smart meters enhances grid balancing base... more ... Applying intelligent current balancing technique in smart meters enhances grid balancing based on statistical information of low voltage network that each smart meter gathers periodically. Index Terms: Smart meter, Power line Carrier, Three Phase balancing. ...

Research paper thumbnail of A fast color image encryption algorithm based on coupled two-dimensional piecewise chaotic map

Signal Processing, 2012

This paper presents a new way of image encryption scheme, which consists of two processes; key st... more This paper presents a new way of image encryption scheme, which consists of two processes; key stream generation process and one-round diffusion process. The first part is a pseudo-random key stream generator based on hyper-chaotic systems. The initial conditions for both hyper-chaotic systems are derived using a 256-bit-long external secret key by applying some algebraic transformations to the key. The original key stream is related to the plain-image which increases the level of security and key sensitivity of the proposed algorithm. The second process employs the image data in order to modify the pixel gray-level values and crack the strong correlations between adjacent pixels of an image simultaneously. In this process, the states which are combinations of two hyper-chaotic systems are selected according to image data itself and are used to encrypt the image. This feature will significantly increase plaintext sensitivity. Moreover, in order to reach higher security and higher complexity, the proposed method employs the image size in key stream generation process. It is demonstrated that the number of pixel change rate (NPCR) and the unified average changing intensity (UACI) can satisfy security and performance requirements (NPCR >99.80 %,