The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
A major issue of present age system on chip (SoC) designing is meeting of stringent time to market deadlines along with the reduction of various challenges faced during design. A significant strategy adopted in tackling such a problem is to procure different components or IPs (intellectual properties) of the SoC from different third party IP vendors (3PIPs). Such a technique targets independent working...
One of the consequence of the scaling down of latest technologies, is that digital circuits are more prone to be affected by faults caused by physical manufacturing defects, environmental perturbations (e.g., radiations, electromagnetic interference), or aging-related phenomena. Understanding the behavior of the whole system in the presence of faults affecting digital circuits is crucial for designing...
Trilateral filtering presents an edge preserving smoothing filter. The predecessor of Trilateral filtering, the bilateral filter is a non-linear filtering technique that can reduce noise from an image while preserving the strong and sharp edges, but it cannot provide desired result when the edges have valley or ridge like features. The Trilateral filter is extended to be a gradient-preserving filter,...
Security has always been the toughest challenge in data communication, at the same time it is the biggest necessity in transmitting confidential data. Sensitive data are often at stake when they are deployed in a network. Embedded system design is a very popular research activity as it has a wide range of applications namely, security and surveillance, personal digital assistant, biomedical systems,...
Scale Invariant Feature Transform (SIFT) algorithm is used to generate image features which is very essential for object recognition, feature detection, image matching etc. This paper proposes an optimized hardware architecture for realizing the SIFT algorithm with reversible logic prototyped using Field Programmable Gate Array (FPGA). The digital hardware logic has been implemented with reversible...
With the entry into the embedded domain, security of SOC architectures has become an arena of importance. However, complexity and cost factors have forced us to outsource the VLSI design phases across the globe. Such sites may not be trusted and threat lies in the introduction of malicious intrusions at any stage of the design flow. Such malicious intrusions, also known as Hardware Trojan Horses (HTH)...
This paper proposes an efficient hardware architecture for the spectral subtraction algorithm applied to speech enhancement. Spectral subtraction algorithm is widely used in audio de-noising applications. The proposed architecture uses a novel approach to estimate environmental noise from speech adaptively. After estimating the noise from the input speech the noise samples are subtracted, making it...
Bilateral filters are widely used in computer vision and digital imaging applications such as denoising, video abstraction, demosaicing, optical-flow estimation etc. to name a few. Its smoothing and edge preserving characteristics suites perfectly for image and video processing applications, yet its high computational complexity makes real-time hardware implementation a challenging task. This paper...
In the world of modern communication systems, several newer techniques have come around to replace the conventional techniques of high speed data communication. As wireless communication protocols developed and user pressure started to increase, it became an absolute necessity to develop multi-user supporting techniques like Orthogonal Frequency Division Multiplexing (OFDM), Multi Carrier Code Division...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.