Loading [MathJax]/extensions/MathZoom.js
IEEE Xplore Search Results

Showing 1-25 of 58,676 resultsfor

Filter Results

Show

Results

This paper presents an algorithm to generate autoregressive random binary processes with predefined mean and predefined all-pole power spectrum, subject to specific constraints on the parameters of the all-pole spectrum. The process is generated recursively using a linear combination of the previously generated values to bias the generation of the next value. It is shown that an all-zero filter wh...Show More
Digital image processing is mainly focused on ever expanding and dynamic area with applications reaching out into our day today life such as medicine, security purpose, space exploration, surveillance, identification & authentication, automatic industry inspection etc. Applications such as these involve different operations like image enhancement, object detection and Noise removing. Implementing ...Show More
Names and letter symbols for prefixes that denote multiplication of a unit by the binary multiplier 2 10n, where n = 1, 2, 3, 4, 5, 6, 7, or 8 are defined. Although the prefixes may be used with all units in all fields where multiplication by a binary multiplier is found to be appropriate, their primary use is in the field of information technology.Show More
In the field of image processing, binary images and grayscale images play a vital role in the application of object recognition, tracking, document analysis and authentication and machine intelligence. This paper proposes a reconfigurable processing module for image processor, in which the image processing functions and algorithms can be implemented, instead of using separate application specific ...Show More
The application of RFID system based on multi tag recognition is more and more extensive, and the problem of multi tag collision restricts the development of RFID system application. This paper improves the binary search algorithm, reduces the number of iterations in the original algorithm, and improves the processing speed.Show More
Binary image processing is a powerful tool in many image and video applications. A reconfigurable processor is presented for binary image processing in this paper. The processor's architecture is a combination of a reconfigurable binary processing module, input and output image control units, and peripheral circuits. The reconfigurable binary processing module, which consists of mixed-grained reco...Show More
With the development of open source projects, a large number of open source codes will be reused in binary software, and bugs in source codes will also be introduced into binary codes. In order to detect the reused open source codes in binary codes, it is sometimes necessary to compare and analyze the similarity between source codes and binary codes. One of the main challenge is that the compilati...Show More
A significant increase in the information processing abilities of CNN's demands powerful information processing at the cell level. In this paper, the defining formula, the main properties, and several applications of a novel coupling cell are presented. Since it is able to implement any Boolean function, its functionality expands on those of digital RAMs by adding new capabilities such as learning...Show More
In this letter, a new decoder based on a bit-embedding technique for non-binary low-density parity-check (LDPC) codes over Galois fields of characteristic two ($\mathbb {F}_{2^{q}}$) is presented. The main content of this work is summarized in the following: first, we derive the equivalent binary codeword and binary parity-check matrix for non-binary LDPC codes in $\mathbb {F}_{2^{q}}$; second, a ...Show More
Recently, multicore processors are usual in various computer systems. Thread level parallel processing is required to efficiently utilize the performance of multicore processors. To realize the automatic parallel processing that does not require program source codes, we develop a system that can parallelize sequential program binary code to the parallelized one by using dynamic binary translation ...Show More
Biometric modalities have been explored in recent times with great scope of use. This is due to the various challenges encountered with the failure to identify individuals and their departmental changes that they may exhibit. In-order to counter and account for such changes, the biometric modalities are usually registered and compared to their respective matches in the database. There have been va...Show More
Cellular nonlinear networks (CNNs) constitute a very powerful paradigm for single instruction/multiple data computers with fine granularity. Analog and mixed-signal implementations have proven to be suitable for applications in high-speed image processing, robot control, medical signal processing, and many more. Especially digital emulations on field-programmable gate arrays (FPGAs) allow the deve...Show More
Evaluation, testing, and performance analysis of modulation, coding, multiple access, diversity methods and other countermeasure techniques over stochastic communication channels requires as accurate channel model as possible leading to immense complexity of such models. However, even have a very accurate method the ldquoperfect simulationrdquo of the channel would remain impossible because of the...Show More
Recently, multicore processors are very common existence. Thread-level parallel processing is inevitable to fully utilize the performance of multicore processors. In order to full utilization of high performance of multicore processors without reference of source program codes, we are now developing a software system for automated parallel processing that can parallelize directly program binary co...Show More
The theoretical and experimental background of the novel acoustooptic binary coding realization based on the space-time integration principle is proposed. The possible applications of acoustooptic space-time integration such as ultrafast high-resolution digital-analog conversion is shown. Further advantages of acoustooptic binary coding in the sense of integrated computational media creation are h...Show More
Cross-platform binary code similarity detection aims at detecting whether two or more pieces of binary code are similar or not. Existing approaches that combine control flow graphs (CFGs)-based function representation and graph convolutional network (GCN)-based similarity analysis are the best-performing ones. Due to a large amount of convolutional computation and the loss of structural informatio...Show More
Optimal stack filtering under the mean absolute error (MAE) criterion is studied. It is first shown that this problem is equivalent to the classical a priori Bayes minimum-cost decision. Generally, a linear program (LP) with O(b2/sup b/) variables and constraints (b is the window width) is required for finding the best filter. Instead, the authors develop a suboptimal routine which renders the use...Show More
As the measurements received from RTUs to the Control Center are transmitted via a transmission medium e.g. telephone, fibre optics, wireless medium, it is not possible that the data transmitted is 100% error free always. Other reasons for receiving bad measurements at control centers may be due to wrong reading of the meter. There can be a number of reasons for measurement’s value to be recorded ...Show More
With the explosive growth of Internet of Things (IoT) devices, software engineers often reuse third-party code. If the security vulnerability is in the reused code, all downstream IoT components reusing this code will introduce the same vulnerability. To address this problem, we propose a binary code similarity detection method based on feature fusion. We construct features for instruction sequenc...Show More
The method of carrier acquisition which we have used in this paper is a modified form of binary search algorithm. This modified search algorithm is a hybrid of two search algorithms which are "Binary search tree" and "Modified search tree". Firstly the modulated signal is received by the receiver where it is analyzed to acquire carrier. The receiver consists of two sections. One section uses the b...Show More
Binary analysis has become essential for software inspection and security assessment. As the number of software-driven devices grows, research is shifting towards autonomous solutions using deep learning models. In this context, a hot topic is the binary similarity problem, which involves determining whether two assembly functions originate from the same source code. However, it is unclear how dee...Show More
Computer vision imply several morphological and mathematical process. Image compression requires methods which involves algorithms and image processing techniques. AHBE system (Algorithm of Huffman combined with Bit Extraction method) provides a novel method to image compression when high quantity of light is present. Preprocessing images is useful in robotics applications to avoid noised data pro...Show More
Spectral signature coding (SSC) is generally performed by encoding spectral values of a signature across its spectral coverage followed by the Hamming distance to measure signature similarity. The effectiveness of such an SSC largely relies on how well the Hamming distance can capture spectral variations that characterize a signature. Unfortunately, in most cases, this Hamming-distance-based SSC d...Show More
Many classical image processing tasks can be realized as evaluations of a Boolean function over subsets of an image. For instance, the simplicity test used in 3D thinning requires examining the 26 neighbors of each voxel and computing a single Boolean function of these inputs. In this article, we show how binary decision diagrams can be used to produce automatically very efficient and compact code...Show More
Grover's Adaptative Search (GAS) algorithm combined with the High Order Binary Optimization (HOBO) oracle proposal is currently the Fault Tolerant Quantum Computer (FTQC)'s main algorithm to solve binary optimization problems. In this paper, we propose a new way to obtain the Grover's oracle needed which is costless in terms of gates and ancilla qubits. This oracle proposal also has zero additiona...Show More