Search results for "Computer hardware"

showing 10 items of 378 documents

An efficient hardware implementation of MQ decoder of the JPEG2000

2014

Abstract JPEG2000 is an international standard for still images intended to overcome the shortcomings of the existing JPEG standard. Compared to JPEG image compression techniques, JPEG2000 standard has not only better not only has better compression ratios, but it also offers some exciting features. As it’s hard to meet the real-time requirement of image compression systems by software, it is necessary to implement compression system by hardware. The MQ decoder of the JPEG2000 standard is an important bottleneck for real-time applications. In order to meet the real-time requirement we propose in this paper a novel architecture for a MQ decoder with high throughput which is comparable to tha…

Computer Networks and Communicationsbusiness.industryComputer sciencecomputer.file_formatFrame rateJPEGArtificial IntelligenceHardware and ArchitectureEmbedded systemJPEG 2000StratixOverhead (computing)businessField-programmable gate arraycomputerThroughput (business)SoftwareComputer hardwareImage compressionMicroprocessors and Microsystems
researchProduct

Dual-model approach for safety-critical embedded systems

2020

Abstract The paper presents the design of digital controllers based on two models: the Petri net model, and the UML state machine. These two approaches differ in many aspects of design flow, such as conceptual modelling, and analysis and synthesis. Each of these approaches can be used individually to design an efficient logic controller, and such solutions are well-known, but their interoperability can contribute to a much better understanding of logic controller design and validation. This is especially important in the case of safety- or life-critical embedded systems, and apart from this, a dual-model controller design can make up redundant system increasing its reliability.

Computer Networks and Communicationsbusiness.industryDual modelComputer scienceReliability (computer networking)020208 electrical & electronic engineeringInteroperabilityDesign flow02 engineering and technologyPetri net020202 computer hardware & architectureUML state machineArtificial IntelligenceHardware and ArchitectureControl theoryEmbedded system0202 electrical engineering electronic engineering information engineeringbusinessSoftwareMicroprocessors and Microsystems
researchProduct

Efficient information gathering from large wireless sensor networks

2018

Abstract Considering large WSNs and comparing data aggregation approaches in terms of scalability, robustness, completeness, and time/energy effectiveness, recent research has asserted the superiority of serial structure-free approaches over serial structure-based ones, and over both parallel structure-free and parallel structure-based techniques. But, in spite of the fact that serial structure-free approaches excel in large and medium-scale networks, their underlying path-construction algorithms are not optimal and can be improved by reducing the involved communications and further shortening the visiting path. To respond to this need, this paper presents Geometric Serial Search (GSS); a n…

Computer Networks and Communicationsbusiness.industryNetwork packetComputer science020206 networking & telecommunications02 engineering and technology020202 computer hardware & architectureRobustness (computer science)Scalability0202 electrical engineering electronic engineering information engineeringWirelessbusinessWireless sensor networkComputer networkComputer Communications
researchProduct

Restoration of Videos Degraded by Local Isoplanatism Effects in the Near-Infrared Domain

2008

When observing a scene horizontally at a long distance in the near-infrared domain, degradations due to atmospheric turbulence often occur. In our previous work, we presented two hybrid methods to restore videos degraded by such local perturbations. These restoration algorithms take advantages of a space-time Wiener filter and a space-time regularization by the Laplacian operator. Wiener and Laplacian regularization results are mixed differently depending on the distance between the current pixel and the nearest edge point. It was shown that a gradation between Wiener and Laplacian areas improves results quality, so that only the algorithm using a gradation will be used in this article. In …

Computer engineering. Computer hardwareComputer scienceComputingMethodologies_IMAGEPROCESSINGANDCOMPUTERVISIONRegularization (mathematics)Image (mathematics)Local degradationAdaptive restorationTK7885-7895symbols.namesakeSegmentationComputer visionPixelbusiness.industryWiener filterAtmospheric turbulenceImage and Video ProcessingVideo SurveillanceQA75.5-76.95Video processingElectronic computers. Computer sciencesymbolsGradationComputer Vision and Pattern RecognitionArtificial intelligenceAutomatic segmentationbusinessLaplace operatorSoftwareELCVIA: electronic letters on computer vision and image analysis
researchProduct

Extension of luminance component based demosaicking algorithm to 4- and 5-band multispectral images

2021

Abstract Multispectral imaging systems are currently expanding with a variety of multispectral demosaicking algorithms. But these algorithms have limitations due to the remarkable presence of artifacts in the reconstructed image. In this paper, we propose a powerful multispectral image demosaicking method that focuses on the G band and luminance component. We've first identified a relevant 4-and 5-band multispectral filter array (MSFA) with the dominant G band and then proposed an algorithm that consistently estimates the missing G values and other missing components using a convolution operator and a weighted bilinear interpolation algorithm based on the luminance component. Using the cons…

Computer engineering. Computer hardwareDemosaicingDemosaicking algorithmComputer scienceMultispectral imageBilinear interpolationQA75.5-76.95General MedicineExtension (predicate logic)Filter (signal processing)Multispectral filter arrayLuminanceConvolutionTK7885-7895G bandElectronic computers. Computer scienceComponent (UML)Weighted bilinear interpolationLuminance componentAlgorithmArray
researchProduct

Non-Model Based Method for an Automation of 3D Acquisition and Post-Processing

2008

Most of the automation for 3D acquisition concerns objects with simple shape, like mechanical parts. For cultural heritage artefacts, the process is more complex, and it doesn't exist general solution nowadays. This paper presents a method to generate a complete 3D model of cultural heritage artefacts. In a first step, MVC is used to solve the view planning problem. Then, holes remaining in 3D model are detected, and their features are calculated to finish acquisition. Different post-processing are applied on each view to increase quality of the 3D model. This procedure has been tested with simulated scanner, before being implemented on a motion system with five degrees of freedom.

Computer engineering. Computer hardwareEngineering drawingScannerScanners automationComputer sciencemedia_common.quotation_subjectBéns del patrimoni culturalDegrees of freedom (mechanics)TK7885-7895Adquisició de 3DSimple (abstract algebra)view planningAutomatització de ScannersView planningQuality (business)scanners automationmedia_commonbusiness.industryAutomatización de ScannersProcess (computing)Adquisición de 3Dcultural heritage artefactsQA75.5-76.95Bienes del patrimonio culturalPlanificación de VistaAutomationCultural heritageElectronic computers. Computer scienceCultural heritage artefactsComputer Vision and Pattern RecognitionPlanificació de Vistabusiness3D acquisitionSoftwareMotion systemELCVIA Electronic Letters on Computer Vision and Image Analysis
researchProduct

HTLS Conductors: A Way to Optimize RES Generation and to Improve the Competitiveness of the Electrical Market—A Case Study in Sicily

2018

Stringent environmental constraints make more difficult to identify new energy corridors and build new power lines. The increase in the generation of electricity from renewable energy sources (RESs) makes the operation of electrical systems increasingly difficult in some areas. The transmission system operators (TSOs), in Italy Terna, are forced to exploit the existing overhead transmission lines, increasing the possibility of dispatching energy, in particular RES, optimizing the transmission capacity. Therefore, after a brief presentation of the Sicilian electricity system and a brief description of high-temperature low-sag (HTLS) conductors, a case study is presented. It is shown how it i…

Computer engineering. Computer hardwareGeneral Computer ScienceExploitArticle SubjectComputer sciencebusiness.industry020209 energyOverhead (engineering)02 engineering and technologyReliability engineeringRenewable energyThermal resistant conductor HTLS conductor Electrical marketSettore ING-IND/33 - Sistemi Elettrici Per L'EnergiaTK7885-7895Electric power transmissionElectricity generationTransmission (telecommunications)Signal Processing0202 electrical engineering electronic engineering information engineeringElectricityElectrical and Electronic EngineeringResilience (network)businessJournal of Electrical and Computer Engineering
researchProduct

Hypervisor-assisted dynamic malware analysis

2021

AbstractMalware analysis is a task of utmost importance in cyber-security. Two approaches exist for malware analysis: static and dynamic. Modern malware uses an abundance of techniques to evade both dynamic and static analysis tools. Current dynamic analysis solutions either make modifications to the running malware or use a higher privilege component that does the actual analysis. The former can be easily detected by sophisticated malware while the latter often induces a significant performance overhead. We propose a method that performs malware analysis within the context of the OS itself. Furthermore, the analysis component is camouflaged by a hypervisor, which makes it completely transp…

Computer engineering. Computer hardwareSoftware_OPERATINGSYSTEMSvirtualisointiComputer Networks and CommunicationsComputer scienceContext (language use)Static program analysiscomputer.software_genreTK7885-7895Artificial IntelligenceComponent (UML)Overhead (computing)tietoturvaMalware analysiskyberturvallisuusbusiness.industryHypervisorQA75.5-76.95haittaohjelmatComputingMilieux_MANAGEMENTOFCOMPUTINGANDINFORMATIONSYSTEMSTask (computing)Electronic computers. Computer scienceEmbedded systemMalwarebusinesscomputerSoftwareInformation SystemsCybersecurity
researchProduct

Detection of developmental dyslexia with machine learning using eye movement data

2021

Dyslexia is a common neurocognitive learning disorder that can seriously hinder individuals’ aspirations if not detected and treated early. Instead of costly diagnostic assessment made by experts, in the near future dyslexia might be identified with ease by automated analysis of eye movements during reading provided by embedded eye tracking technology. However, the diagnostic machine learning methods need to be optimized first. Previous studies with machine learning have been quite successful in identifying dyslexic readers, however, using contrasting groups with large performance differences between diagnosed and good readers. A practical challenge is to identify also individuals with bord…

Computer engineering. Computer hardwareSupport Vector MachineComputer sciencemedia_common.quotation_subject02 engineering and technologyMachine learningcomputer.software_genre050105 experimental psychologyDyslexiaTK7885-7895FluencysilmänliikkeetoppimisvaikeudetReading (process)dyslexia0202 electrical engineering electronic engineering information engineeringmedicinedysleksia0501 psychology and cognitive sciencessupport vector machinemedia_commonRandom ForestRecallbusiness.industry05 social sciencesDyslexiaEye movementGeneral MedicineQA75.5-76.95diagnostiikkamedicine.diseaseRandom forestkoneoppiminenElectronic computers. Computer scienceLearning disabilityEye tracking020201 artificial intelligence & image processingArtificial intelligencemedicine.symptombusinesscomputerrandom forestArray
researchProduct

Complex networks : application for texture characterization and classification

2008

This article describes a new method and approch of texture characterization. Using complex network representation of an image, classical and derived (hierarchical) measurements, we presente how to have good performance in texture classification. Image is represented by a complex networks : one pixel as a node. Node degree and clustering coefficient, using with traditionnal and extended hierarchical measurements, are used to characterize ”organisation” of textures.

Computer engineering. Computer hardwareTexture compressionComputer scienceComputingMethodologies_IMAGEPROCESSINGANDCOMPUTERVISIONComplex networksImage processingTexture (geology)TK7885-7895Image textureImage processingAnàlisi de texturaProcesamiento de imágenestexture analysisClustering coefficientAnálisis de texturaRedes complejasPixelbusiness.industryNode (networking)Pattern recognitionProcessament d'imatgescomplex networksQA75.5-76.95Xarxes complexesComplex networkTexture analysisElectronic computers. Computer scienceComputer Science::Computer Vision and Pattern RecognitionComputer Vision and Pattern RecognitionArtificial intelligencebusinessSoftwareELCVIA: electronic letters on computer vision and image analysis
researchProduct