The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
In this paper is presented a High Dynamic Range (HDR) extension technique that applies to an imager without modifying any of its other specifications (as speed, noise floor or pixel scheme). The technique relies on the division of the focal plane into blocks that are able to choose the integration time from a set of eleven exposures, reaching +60db extension compared to a standard CMOS imager. The...
The description of a way of contactless measurement of the module and a component of a vector of vibromovement of a point is given in a range microwave oven antenna mirror surface by the automatic analysis of geometrical parameters of a trace of vibration degradation of a round tag which center coincides with this point.
The paper suggests a twelve-angle pixel model for anti-aliasing purposes. Additional evaluation functions had been used to identify the intensity of pixel color. The functions can be calculated independently. For the realization of anti-aliasing on hardware a structure of a device is suggested.
A new approach blends a new camera architecture based on a digital micro-mirror device with the new mathematical theory and algorithms of compressive sampling. The “single-pixel” compressive digital camera functions by the method of focussing the desired image onto a digital micro-mirror device (DMD) consisting of an array of N tiny mirrors. Camera architecture employs a digital micromirror array...
Compression mechanisms for image search redundancies in the image data. This redundancy may occur in neighboring pixel values or the pixels found anywhere in the image. Moreover the redundancies may be at pixel level or at block level. There are a number of image compression mechanisms available. The paper compares some of these image compression mechanisms along with some compression parameters and...
White LED offers advantageous properties such as high brightness, low power consumption and long lifetime. While the use of white LEDs for communication has been proposed, but it is very difficult to install many such “visible light communication” solutions in public places because of high cost of the specialized components required to assemble these solutions. This paper demonstrates an end to end...
Template matching is widely used in image processing. In symmetric normalization both the compared vectors are normalized in same way, and in filter design, only the template is modified and then is correlated with the reference image. The above mention is a problem from, to overcome this we moved to asymmetric correlation. Noise reduction in image using asymmetric correlation by template matching,...
The digital image data transmission and storage in today's cyberspace has increase with privacy and security concerns. Digital media collected from different sources such as surveillance systems, forensic databases, medical images are very sensitive hence security concerns regarding the safe transmission and authentication of such digital data across secured and unsecured communication channels needs...
With the advent of numerous remote sensing sensors available for the researcher, the fusion of digital image data has become a imperative tool for classifying remote sensing image and evaluation too. Remote sensing image fusion not only improves the spatial resolution of the original multispectral image, but also improves the spectral quality of merged product. Quantitative and qualitative digital...
This paper presents a method for depth measurement based on Speeded Up Robust Features (SURF) and pixel number variation of CCD Images. A single camera is used to capture two images in different photographing distances, where features in the images are extracted and matched by SURF. To remove false matching points, an Identifying point correspondences by Correspondence Function (ICF) method is adopted...
Usage of multi-step segmentation for near-duplicate image recognition is investigated. The search pattern based on the rank distributions of the brightness clusters cardinality is suggested. Experimental results on the near-duplicate image recognition based on the application of the suggested search pattern are given. It is shown that the use of a multi-step segmentation and rank distributions of...
This paper presents an agile radiating matrix antenna which is formed by an association of several and identical special radiating elements called ‘pixels’. Those pixels have special properties concerning its radiating apertures. The matrix antenna working principle is based on the equivalent radiating surface approach and not on the classical array approach. The aim of this paper is to show the matrix...
A single loop low tracking jitter pixel clock generator is demonstrated in 28nm CMOS process. The proposed architecture only consists of a conventional single loop wide bandwidth fractional-N PLL and two synchronization skills which suppress the tracking jitter and bring out the delay control function like a DLL. When a 250MHz pixel clock is generated and synchronized with a 10kHz HSYNC, the measured...
This paper presents a method for depth measurement based on Speeded Up Robust Features (SURF) and pixel number variation of CCD Images. A single camera is used to capture two images in different photographing distances, where features in the images are extracted and matched by SURF. To remove false matching points, an Identifying point correspondences by Correspondence Function (ICF) method is adopted...
In this paper, we studied Solar Photovoltaic (SPV) array output power as a function of dynamic illumination intensity pattern. A fine resolution pixel level analysis of 2D dynamic illumination intensity pattern is mapped to the module architecture. Images taken by high resolution cameras at regular intervals will help track the iso-insolation contours by mapping pixel pattern and estimate the illumination...
This paper demonstrates an advanced 1.1um pixel backside illuminated CMOS image sensor with a 3D stacked architecture. The carrier wafer in conventional BSI is replaced by ASIC wafer, which contains a part of periphery circuit and is connected to the sensor wafer through bonding technology. With proper layout design and process improvement, the impact of 3D connection (Through Via, TV) on the sensor...
According to convenience and accuracy problem of clinical wound area measurement method, the wound area measurement software is designed based on the Android. The wound image is photographed by the Android device and is cut out and converted to the grayscale image and the binary image. The invalid area is eliminated and the valid area is extracted. The pixels of wound area are counted. According to...
Steganography is the science of hiding secret information in another unsuspicious data. Generally, a steganographic secret message could be a widely useful multimedia: as a picture, an audio file, a video file or a message in clear text - the covertext. The most recent steganography techniques tend to hide a secret message in digital images. We propose and analyze experimentally a blind steganography...
An important development in digital X-ray imaging systems is a pulse amplitude measurement in each pixel in real-time. A single readout pixel usually has the dimensions of 100 µm × 100 µm or lower, and as it has to accommodate the analog front-end amplifier and digital back-end readout logic, the area available for an ADC is extremely low. Thus, in the design of the ADC the most emphasis has to be...
Cryptography is basically securing the data during the communication between different systems. To provide the security of data during communication in cryptography we together require the Algorithm and Key. The confidentiality and integrity of the data during communication depends partially on algorithm and partially on key. Due to human memorizability the size of key in cryptography is limited....
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.