An efficient Multiple Object Detection and tracking framework for automatic counting and video surveillance application Abstract?Automatic visual object counting and video surveillance have important applications for home and business environments, such as security and management of access points. However, in order to obtain a satisfactory performance these technologies need professional and expensive hardware, complex installations…
An Efficient Privacy-Preserving Ranked Keyword Search Method Abstract?Cloud data owners prefer to outsource documents in an encrypted form for the purpose of privacy preserving. Therefore it is essential to develop ef?cient and reliable ciphertext search techniques. One challenge is that the relationship between documents will be normally concealed in the process of encryption, which will…
An Efficient Single and Double Adjacent Error Correcting Parallel Decoder for Extended Golay Code Abstract?Memories that operate in harsh environments, like for example space, suffer a significant number of errors. The error correction codes (ECCs) are routinely used to ensure that those errors do not cause data corruption. However, ECCs introduce overheads both in terms…
An Efficient SVD-Based Method for Image Denoising Abstract? Nonlocal self-similarity of images has attracted considerable interest in the ?eld of image processing and led to several state-of-the-art image denoising algorithms, such as BM3D, LPG-PCA, PLOWand SAIST. In this paper, we propose a computationally simple denoising algorithm by using the nonlocal self-similarity and the low-rank approximation….
An efficient tree-based algorithm for mining sequential patterns with multiple Abstract? Mining frequent sequences is a step in the sequential patterns discovering, and sequential patterns mining is an important area of research in the field of data mining. If we use the traditional algorithms such as Apriori or GSP algorithm to discover the sequential patterns…
An Efficient VLSI Architecture of a Reconfigurable Pulse-Shaping FIR Interpolation Filter for Multistandard DUC Abstract? An Efficient VLSI Architecture of a Reconfigurable Pulse-Shaping FIR Interpolation Filter for Multistandard DUC. A two-step optimization technique for designing a recon?gurable VLSI architecture of an interpolation ?lter for multistandard digital up converter (DUC) to reduce the power and area…
An Embedded Real-Time Finger-Vein Recognition System for Mobile Devices Abstract?The development of consumer electronics, the demand for simple, convenient, and high-security authentication systems for protecting private information stored in mobile devices has steadily increased. In consideration of emerging requirements for information protection, biometrics, which uses human physiological or behavioral features for personal identification, has been…
An Empirical Performance Evaluation of Relational Keyword Search Techniques Abstract? An Empirical Performance Evaluation of Relational Keyword Search Techniques. Extending the keyword search paradigm to relational data has been an active area of research within the database and IR community during the past decade. Many approaches have been proposed, but despite numerous publications, there remains…
An Energy-Balanced Routing Method Based on Forward-Aware Factor for Wireless Sensor Networks Abstract? As an important part of industrial application (IA), the wireless sensor network (WSN) has been an active research area over the past few years. Due to the limited energy and communication ability of sensor nodes, it seems especially important to design a…
An Energy-Ef?cient Mobile-Sink Path Selection Strategy for Wireless Sensor Networks Abstract? Several studies have demonstrated the bene?ts of using a mobile sink to reduce the energy consumption of nodes and to prevent the formation of energy holes in wireless sensor networks (WSNs). However, these bene?ts are dependent on the path taken by the mobile sink,…
An Energy-Ef?cient Mobile-Sink Path Selection Strategy for Wireless Sensor Networks Abstract? Several studies have demonstrated the bene?ts of using a mobile sink to reduce the energy consumption of nodes and to prevent the formation of energy holes in wireless sensor networks (WSNs). However, these bene?ts are dependent on the path taken by the mobile sink,…
An Energy-Efficient L2 Cache Architecture UsingWay Tag Information Under Write-Through Policy Abstract-An Energy-Efficient L2 Cache Architecture UsingWay Tag Information Under Write-Through Policy. Many high-performance microprocessors employ cache write-through policy for performance improvement and at the same time achieving good tolerance to soft errors in on-chip caches. However, write-through policy also incurs large energy overhead due…