Atjaunināt sīkdatņu piekrišanu

Advances in Image and Data Processing using VLSI Design, Volume 1: Smart vision systems [Hardback]

Edited by (The LNM Institute of Information Technology (India)), Edited by (The LNM Institute of Information Technology (India)), Edited by , Edited by (The LNM Institute of Information Technology (India))
  • Formāts: Hardback, 282 pages, height x width x depth: 254x178x17 mm, weight: 708 g, With figures in colour and black and white; 150 Illustrations
  • Sērija : IOP Series in Next Generation Computing
  • Izdošanas datums: 27-Dec-2021
  • Izdevniecība: Institute of Physics Publishing
  • ISBN-10: 0750339179
  • ISBN-13: 9780750339179
Citas grāmatas par šo tēmu:
  • Hardback
  • Cena: 158,75 €
  • Grāmatu piegādes laiks ir 3-4 nedēļas, ja grāmata ir uz vietas izdevniecības noliktavā. Ja izdevējam nepieciešams publicēt jaunu tirāžu, grāmatas piegāde var aizkavēties.
  • Daudzums:
  • Ielikt grozā
  • Piegādes laiks - 4-6 nedēļas
  • Pievienot vēlmju sarakstam
  • Formāts: Hardback, 282 pages, height x width x depth: 254x178x17 mm, weight: 708 g, With figures in colour and black and white; 150 Illustrations
  • Sērija : IOP Series in Next Generation Computing
  • Izdošanas datums: 27-Dec-2021
  • Izdevniecība: Institute of Physics Publishing
  • ISBN-10: 0750339179
  • ISBN-13: 9780750339179
Citas grāmatas par šo tēmu:
Preface xvi
Acknowledgments xx
Editors' biographies xxi
List of contributors
xxiv
1 An FPGA implementation of the RSA algorithm using VHDL and a Xilinx system generator for image applications
1(1)
Sandeep Saini
Kusum Lata
Abhishek Sharma
G R Sinha
1.1 Introduction
2(1)
1.2 Literature review
3(4)
1.2.1 Introduction to cryptographic algorithms
3(1)
1.2.2 Types of cryptographic algorithm
3(1)
1.2.3 Important terminology
4(3)
1.2.4 Comparison of different cryptographic algorithms
7(1)
1.2.5 Comparison of the implementations of different cryptographic algorithms
7(1)
1.3 Mathematical formulation
7(5)
1.3.1 Bezout's theorem
8(1)
1.3.2 The Euclidean algorithm
8(1)
1.3.3 The extended Euclidean algorithm
8(1)
1.3.4 Euler's totient function and Euler's theorem
9(1)
1.3.5 Modular exponentiation techniques
10(1)
1.3.6 Chinese remainder theorem
11(1)
1.4 RSA system
12(1)
1.4.1 Key generation
12(1)
1.4.2 Encryption
12(1)
1.4.3 Decryption
12(1)
1.5 System implementation
13(10)
1.5.1 Key generation
13(1)
1.5.2 Encryption
14(5)
1.5.3 Decryption
19(2)
1.5.4 Area and throughput comparison with existing implementations
21(2)
1.6 Implementation results for the SPARTAN-6 (XC6SLX45-CSG324) FPGA board
23(4)
1.6.1 Design of the SPARTAN-6 (XC6SLX45-CSG324) FPGA board
23(2)
1.6.2 Implementation of key security for the AES algorithm using RSA (hybrid cryptosystem)
25(2)
1.7 Conclusions
27
Acknowledgments
27(1)
Bibliography
27
2 Modern ML methods for object detection
1(1)
Abhishek Choubey
Shruti Bhargava Choubey
Anees Banu
Ipseeta Nanda
2.1 Introduction
1(1)
2.2 Machine-learning overview
2(1)
2.3 Computer vision algorithms
3(8)
2.3.1 Image classification
3(1)
2.3.2 Object detection
4(1)
2.3.3 Segmentation of images
5(1)
2.3.4 You Only Look Once (YOLO)
5(3)
2.3.5 Faster region-based convolutional neural networks
8(1)
2.3.6 Support vector machine (SVM)
8(1)
2.3.7 Systolic array architectures
9(1)
2.3.8 Mask R-CNN
10(1)
2.4 Hardware implementation
11(3)
2.5 Conclusions
14
Bibliography and further reading
14
3 Embedded intelligence for tracking facial expressions
1(1)
Kyle Zampell
Ali Ahmadinia
3.1 Introduction
1(2)
3.2 Description of algorithm
3(2)
3.3 Implementation
5(6)
3.3.1 OpenCV with three simple Haar Cascades
5(1)
3.3.2 DLib
6(1)
3.3.3 OpenCV and DLib
7(1)
3.3.4 Mitigating loss of track
8(3)
3.4 Results and evaluation
11(4)
3.5 Conclusions
15
Bibliography
16
4 The roles of delay and power optimization techniques in VLSI design
1(1)
Payal Bansal
Devendra Kumar Somwanshi
Balwinder Singh Dhaliwal
Pallavi Sapkale
4.1 Delay optimization
1(1)
4.2 Area optimization
2(1)
4.3 Variable input delay
2(1)
4.3.1 The concept of the variable input delay technique
2(1)
4.4 System implementation
3(3)
4.4.1 D flip-flop
3(2)
4.4.2 Full adder circuit
5(1)
4.5 Digital Logic Design and Implementation
6(5)
4.5.1 Architectural design of the work
6(5)
4.6 Hardware/software used for experiments
11(1)
4.6.1 Introduction to the ISE design suite
11(1)
4.6.2 Features of the Spartan 3E
12(1)
4.7 Experimental results and analysis
12(3)
4.7.1 Experimental variations
12(1)
4.7.2 Experimental details
13(2)
4.8 Results
15(1)
4.8.1 Simulation results for the full adder
15(1)
4.9 Comparative analysis of results
16(1)
4.10 Comparison of results
17(2)
4.11 Conclusions
19
Bibliography and further reading
20
5 SIVAS: smart interactive virtual assistance system--a voice user interface
1(1)
Abhishek Bharti
Amardeep Kumar
Manonita Verma
Lochana Perera
Menka Yadav
5.1 Introduction
1(3)
5.1.1 Aim
2(1)
5.1.2 Objectives
2(1)
5.1.3 Challenges
2(1)
5.1.4 Use cases
3(1)
5.2 Literature review
4(1)
5.3 Methodology
5(4)
5.3.1 Initialization
5(1)
5.3.2 Input unit
6(1)
5.3.3 Processing unit
7(2)
5.3.4 Retrieval unit
9(1)
5.3.5 Output unit
9(1)
5.4 Functionalities
9(1)
5.4.1 Command mode
9(1)
5.4.2 Cursor mode
10(1)
5.5 Hardware implementation
10(1)
5.5.1 Introduction
10(1)
5.5.2 Required devices
10(1)
5.6 Experimental results
11(1)
5.7 Limitations and future work
12(1)
5.8 Result and conclusions
12
Appendix A
12(1)
Further reading
13
6 A topical survey of computing solutions for plant disease classification using deep learning techniques
1(1)
Aniket Dhole
Mohit Gandhi
Shrishail Kumbhar
Harsh Singhal
Sonal Gore
6.1 Introduction
1(1)
6.2 Related work
2(4)
6.3 Algorithmic survey
6(9)
6.3.1 LeNet-5 [ 17, 18]
10(1)
6.3.2 Convolutional neural network-long short-term network (CNN-LSTM) [ 19]
11(1)
6.3.3 AlexNet [ 20, 21]
12(2)
6.3.4 ResNet[ 22]
14(1)
6.4 Comparative study for performance analysis
15(1)
6.5 Common findings and challenges
16(1)
6.5.1 Common findings
16(1)
6.5.2 Challenges
16(1)
6.6 Hardware implementations
16(1)
6.7 Conclusions
17
Bibliography
17
7 Hardware IP cores for image processing functions Anirban Sengupta and Rahul Chaurasia
1(1)
7.1 Introduction
1(2)
7.2 HLS methodology used to design IP cores for image processing functions
3(8)
7.2.1 Generalization of convolution for image processing functions
3(3)
7.2.2 Application-specific reusable IP cores for image processing functions
6(5)
7.3 Case studies and analysis
11(2)
7.3.1 Gate-count analysis
12(1)
7.3.2 Power analysis
12(1)
7.4 Conclusions
13
Acknowledgements
14(1)
Bibliography
14
8 An efficient underwater image cryptosystem that uses a novel hybrid algorithm
1(1)
Alpana Sharma
Venkatadri Marriboyina
Kamlesh Gupta
8.1 Introduction
1(2)
8.2 Dynamic histogram enhancement technique
3(3)
8.3 Improved secure force algorithm for underwater image transmission
6(2)
8.3.1 Key-generation block
6(1)
8.3.2 Key management block
7(1)
8.3.3 Encryption block
7(1)
8.4 Evaluation parameters used for the hybrid underwater image cryptosystem
8(3)
8.4.1 Peak signal-to-noise ratio and mean squared error
8(1)
8.4.2 Mean absolute error
8(1)
8.4.3 Horizontal and vertical correlations
9(1)
8.4.4 Number of pixels change rate (NPCR) and unified average change intensity (UACI)
9(1)
8.4.5 Encryption and decryption times
10(1)
8.5 Results and discussion
11(2)
8.6 Conclusions
13
Bibliography
14
9 A survey of thresholding in image processing
1(1)
Eshaan Rathi
Abhishek Sharma
9.1 Introduction
1(1)
9.2 Histogram-based methods
2(1)
9.2.1 Balanced-histogram-based thresholding
3(1)
9.3 Clustering-based methods
3(2)
9.3.1 Iterative clustering
3(1)
9.3.2 Clustering thresholding
4(1)
9.3.3 Minimum-error thresholding
4(1)
9.3.4 Fuzzy clustering thresholding
5(1)
9.3.5 E-means clustering thresholding
5(1)
9.4 Entropy-based thresholding
5(1)
9.4.1 Cross-entropy thresholding
6(1)
9.4.2 Fuzzy entropy thresholding
6(1)
9.5 Attribute similarity methods
6(1)
9.6 Local method
7(1)
9.7 Conclusions
7
Bibliography
7
10 Review of quality assessment of fruit and vegetables using NIR spectroscopy
1(1)
R Mariappan
B Lakshmi Sirisha
P S Suhasini
10.1 Introduction
1(1)
10.2 NIR spectroscopy
2(3)
10.2.1 NIR spectrometer
3(1)
10.2.2 Modes of data acquisition in NIR spectroscopy systems
3(2)
10.3 Chemometrics
5(1)
10.3.1 Preprocessing methods
5(1)
10.4 Calibration methods
6(1)
10.4.1 Multiple linear regression (MLR)
6(1)
10.4.2 Principal component regression (PCR)
6(1)
10.4.3 Partial least-squares regression (PLS)
7(1)
10.4.4 Least-squares support vector machine (LS-SVM)
7(1)
10.4.5 Artificial neural network (ANN)
7(1)
10.5 DLP technology in near-infrared (NIR) spectroscopy
7(6)
10.5.1 Proposed fruit and vegetable quality detection system
11(2)
10.6 Fruit and vegetable quality parameters
13(1)
10.6.1 Soluble solid content (SSC)
13(1)
10.6.2 Sugar content
13(1)
10.6.3 Firmness
14(1)
10.6.4 Dry matter
14(1)
10.6.5 Titratable acidity
14(1)
10.6.6 Carotenoid content
14(1)
10.7 Discussion
14(1)
10.8 Conclusions
15
Bibliography and further reading
15
11 Design and implementation of processors for secure image processing applications
1(1)
M Vardhana
Roopashree
Pavanalaxmi
11.1 Introduction
1(1)
11.2 Literature survey
2(1)
11.3 Vedic mathematics
3(2)
11.3.1 Vedic sutras
4(1)
11.3.2 Urdhva tiryagbhyam
4(1)
11.3.3 Paravartya
4(1)
11.4 Proposed system design and architecture
5(4)
11.4.1 Design overview
6(1)
11.4.2 Fundamental building blocks
6(2)
11.4.3 Instruction set architecture
8(1)
11.4.4 Software specification and design flow
8(1)
11.5 Simulation results
9(2)
11.5.1 Integrated circuit design
9(1)
11.5.2 Compiler design
9(2)
11.5.3 Performance analysis
11(1)
11.6 Applications
11(5)
11.7 Results and conclusions
16
Bibliography
19
12 Low-power modified phase-locked loop using AVLS technique for biomedical applications
1(1)
B S Premananda
Maria Bency
Shwetha R Prasanna
G P Shreya
12.1 Introduction
1(2)
12.2 Literature review
3(1)
12.3 Design and implementation of a modified PLL
4(5)
12.3.1 Phase detector
4(2)
12.3.2 Charge pump, loop filter, and current-starved VCO
6(1)
12.3.3 AVLS approach
7(1)
12.3.4 Proposed modified PLL
8(1)
12.4 Results and discussion
9(3)
12.5 Conclusions
12
Bibliography
12
13 Image multiplication with a power-efficient approximate multiplier using a 4:2 compressor
1(1)
Lavanya Maddisetti
Ranjan K Senapati
J V R Ravindra
13.1 Introduction
1(3)
13.2 Existing 4:2 compressor
4(2)
13.3 Proposed work
6(1)
13.4 Results and discussion
7(5)
13.4.1 Simulations of 4:2 compressors and multipliers
7(1)
13.4.2 Error analysis
8(2)
13.4.3 Image multiplication
10(2)
13.5 Conclusions
12
Acknowledgements
12(1)
Appendix A
12(2)
Bibliography
14
14 A comparison of different procedures for hardware-based video shot boundary detection
1(1)
Shrikant Chavate
Ravi Mishra
14.1 Introduction
1(2)
14.2 Literature review
3(4)
14.3 Methodology
7(6)
14.3.1 Comparative discussion of results
8(1)
14.3.2 Hardware implementation
8(5)
14.4 Conclusions
13
Acknowledgements
14(1)
Bibliography
14
15 Hardware--software co-simulation of vehicle license plate detection on the ZedBoard SoC platform
1
Surbhi Chhabra
Sandeep Saini
Kusum Lata
15.1 Introduction
1(4)
15.1.1 Literature survey
3(2)
15.1.2 Contributions and organization
5(1)
15.2 Descriptions of algorithms
5(5)
15.2.1 Edge-based extraction
5(1)
15.2.2 Connected-component-based extraction
6(2)
15.2.3 Histogram-based edge processing
8(2)
15.3 Comparative results
10(2)
15.4 Hardware-software co-simulation of automatic license plate detection on the ZedBoard SoC platform
12(4)
15.4.1 Simulink model
12(1)
15.4.2 System generator model
13(3)
15.5 Results and utilization summary
16(2)
15.5.1 Resource utilization summary
16(2)
15.6 Conclusions and future work
18
Bibliography
18