The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Performance of Signal Processing Algorithms implemented in hardware depend on efficiency of datapath, memory speed, and address computation. Pattern of data access in signal processing applications is complex and it is desirable to execute the innermost loop of a kernel every clock. This demands generation of typically three addresses per clock: two addresses for data sample/coefficient and one for...
Accurate cell nucleus segmentation is necessary for automated cytological image analysis. Thresholding is a crucial step in segmentation. The accuracy of segmentation depends on the accuracy of thresholding. In this paper we propose a new method for thresholding of photomicrographs of diversly stained cytology smears. To account for the different stains, we use different color spaces. A new local...
An accurate segmentation is critical, especially when the low grade gliomas morphological changes remain subtle, resembles peritumeral tissue characteristics. This quantitative measurement depends on the accuracy of the segmentation method used. The undesired partial volume effect, which lies on a boundary between a highly infiltrating low grade gliomas and peritumeral vasogenic edema, makes unerring...
A blotch is one among several artifacts that can degrade old movies which had been stored in films. Blotches are seen as randomly occurring black or white spots which are disturbing to the viewer. A novel approach to blotch removal for old movie restoration is presented in this paper. This method combines the merits of image representation using Legendre moments, warped distance interpolation and...
Security has become an inseparable issue even in the field of space technology. Visual Cryptography is the study of mathematical techniques related aspects of Information Security which allows Visual information to be encrypted in such a way that their decryption can be performed by the human visual system, without any complex cryptographic algorithms. This technique represents the secret image by...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.