The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
In this work, a novel method Reduced CORDIC Based Logarithm Converter (RCBLC) is introduced for computing the specific-based logarithm of the binary values, and then the hardware architecture of RCBLC based on FPGA is analyzed in detail. Hardware architecture of RCBLC is implemented such that it enables logarithm conversion with both high output bit-sensitivity and low resource utilization. In addition...
Various intelligent systems are needed for cyber-physical systems. Such intelligent systems need to learn from the human intelligence about concept abstraction and analogical thinking in order to resolve complex issues using past experiences. The algorithms for abstraction and analogies are based on quick memory recall with clever information coding and processing. The quick and accurate memory recall...
In this study, high-resolution detection was aimed with an approach based on the simultaneous consideration of spatial and spectral relationships in the detection of mitotic cells in digital multispectral histopathologic images. Thanks to these studies in computer-aided diagnosis (CAD), the detection of mitotic cells which are normally difficult to examine and detect by microscopes can be performed...
This paper considers the problem of detecting changes in utility maximizing behaviour of agents in online social media. Such changes in utility maximizing behaviour in online social media occur due to the effect of marketing, advertising, or changes in ground truth. In contrast to traditional signal processing techniques, our approach is data-centric. We use the framework of revealed preference to...
In this paper we report our efforts to streamline the curriculum of a lecture-based course on signals and systems with exercises using the Matlab computing environment. We use a computer framework to generate individualized variations of problems, which are assigned to teams of students as well as to individual students. Feedback from students revealed that the new components were helpful for better...
Approximate computing is gaining more and more attention as potential solution to the problem of increasing energy demand in computing. Several recent works focus on the application of deterministic approximate computing to arithmetic computations. Circuits for addition and multiplication are simplified, trading exactness for energy and/or speed. Recent approximation techniques for adders focus on...
A signal processing method to eliminate grating lobes in case of array antenna is proposed in this paper. The proposed method of eliminating the grating lobes can be used in the cases where each antenna element information/data is available. By using the proposed method, relation between λ and baseline separation between the two antenna elements need not be less than or equal to λ/2. The proposed...
In the process of communication the information gets corrupted. Therefore, the signals received by the receiver which is different than the actual information signal. This paper stated that how receiver detect the errors in received signals and how does receiver rectify that error by using hamming code method. We have illustrated with the help of examples that how receiver identified which bit is...
Electroencephalography (EEG) is an emerging held of digital signal processing. EEG is electrical signals which are recorded by the sensors attached on the human scalp to detect human's brain activities along the scalp. EEG signal processing has been a technically challenging problem for researchers due to its extremely noisy nature compared to other different kinds of digital data such as voice or...
This study reports on the implementation of low-cost microphone calibration procedures to ensure that volume levels of digital audio recordings are of similar intensity (loudness) to the actual speech utterances that they represent. In the context of this investigation, these utterances are produced by patients as they attempt the various articulation exercises of the Computerised Frenchay Dysarthria...
The article shows the design and implementation of a gesture control system, which determines the gesture from the movement of the hands. The presented gesture controller system can be built relatively easy from cheap components, so it is ideal development goal in case of a students' project also in the field of project based learning. The movement detected with distance measurement sensors, and the...
For Communication of Secret information from one place to another place for different application Cryptography and Steganography are the techniques used most commonly. Usually in cryptography the content of secret message is scrambled while in steganography the secret message is embedded into the cover medium. In this paper a high secured model has been developed by combining cryptographic and Steganographic...
Moore's Law is slowing down but the transistor density is expected to increase by ∼50 in the next 30 years while the power consumed by each transistors will decrease by ∼75. Potential further continuation of Moore's Law via: 1. Spintronics — which could revolutionize computer architecture away from von Neumann model, 2. Memristors — which potentially allows one to do what human brain does in a shoe...
Many computer role-playing games that mime a science fiction or fantastic world have a static world map or the map changes under some scripted assumptions that hardly reproduce the dynamic of a play. In this paper I propose a novel algorithm that enables real time terrain calculation even on a very large world map. An algorithm uses approach based on attraction force calculation and uses gradient...
The embedded high-speed and real-time signal processing systems are used widely in communication, navigation, sensing, measurement and control, etc. However, a high-bandwidth and high-flexibility remote communication interface is important when it comes to scenarios such as the mass data exchange between industrial computers and embedded systems. The 10Gigabit Ethernet (10GE) has been widely used...
Neuromodulation systems based on electrical stimulation can be used to investigate, probe, and potentially treat a range of neurological disorders. The effects of ongoing neural state and dynamics on stimulation response, and of stimulation parameters on neural state, have broad implications for the development of closed-loop neuro-modulation approaches. We describe the development of a modular, low-latency...
Software-defined radio (SDR) is used in several areas, such as the verification and implementation of radio prototypes. The SDR environment is generally configured with an analog-to-digital converter (ADC) and a personal computer (PC). However, since ADCs and PCs are fixed configurations, reconfigurations are needed in order to respond to different data sources and computing environments when the...
Airborne ultrasonic images are difficult to obtain, because of the high absorption and attenuation by air. The airborne ultrasonic images are generated by a biomimetic sonar head. For each ultrasonic frequency, a pair of two images is generated, from the left and right sides. A single image has poor information content when ordinary ultrasonic transducers are used. The objective of the paper is to...
Electromagnetic radiation signals from computer displays can be a computer security risk if the radiation signal is intercepted and reconstructed. In addition to the information displayed by the computer, electromagnetic radiation leaks the information of the computer itself which is more important for some attackers, protectors and security inspection workers. In this paper, we demonstrate that electromagnetic...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.