The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
In this paper, we propose a faster and more efficient color image segmentation technique, which is called local window K_means (LWK_means), consisting of three modules: window presetting, local window clustering, windows merging. LWK_means divides the color image into many windows, and then parallelly processes each window using the proposed local window K_means clustering algorithm, which is adaptive...
Security and energy are two main concerns for embedded systems, especially in battery-powered security-critical systems. In this paper, we make efforts to identify energy-related characteristics of common security algorithms for data-sensitive embedded real-time systems. Different to traditional researches, this paper focuses on the influences of size of protected data on energy-related factors. We...
H.264/AVC can achieve much higher compression efficiency, compared with previous video compression standards. However, the lower encoding efficiency is an influential factor for popularization of H.264. In this paper, an improved P_SKIP mode decision algorithm for H.264 encoder is proposed: As observers are less sensitive to boundary parts of video images, a certain degree of information loss for...
Energy and security are hot topics for real-time embedded systems. However, little traditional research consider the two factors together, which leaves a great challenge to guarantee the security of embedded applications running under battery-powered real-time embedded systems. In this paper, we investigate the characteristics of energy consumption for the most popular security algorithms. To precisely...
SIFT algorithm has strong robustness and stability, which can be applied in many bad conditions to achieve high recognition rate. The 128-dimensional feature descriptor has good independence. However, it also contains redundant information, which makes the calculation amount of following matching increase. An improved SIFT algorithm is proposed to solve the disadvantages of large computation and not...
Cooperative coverage by multiple robots with contact sensors is studied in this paper. Multiple robots internal spiral coverage algorithm is presented to overcome the sensing limitation of the robot whose sense range is the radius of the body. The algorithm guarantees complete coverage by repeating covering portion of the environment and setting the GATE grids. The algorithm is also robust in that...
In this paper, we present an approach to map intellectual property (IP) cores onto tree based network-on-chip (NoC) architecture such that the total communication energy is minimized. We first formulate the problem of energy-aware mapping, and then propose a recursive bipartitioning algorithm to solve it. The proposed technique is an efficient divide-and-conquer approach, based on the Kernighan-Lin...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.