image de-noising is an essential field in imageprocessing, encompassing a wide range of applications. This is pre-processing task in which unwanted noise signals are removed using different techniques. Noise are unwa...
详细信息
Approximate circuits play a vital role in enhancing efficiency and optimizing resource use in modern computing systems. Their benefits are particularly notable in fields that tolerate minor inaccuracies, such as image...
详细信息
Approximate circuits play a vital role in enhancing efficiency and optimizing resource use in modern computing systems. Their benefits are particularly notable in fields that tolerate minor inaccuracies, such as imageprocessing, signalprocessing, and data mining, where a slight reduction in precision can lead to substantial savings in power and space requirements. This study explores an innovative design for an approximate full subtractor based on the principle of pruning, meticulously implemented using universal two-input NOR gates, valued for their cost efficiency, low power consumption, and compact design. Existing approximate subtractors have been designed using non-universal basic gates such as XOR, XNOR, NOT, and AND gates. In contrast, the proposed approach utilizes only the universal NOR gate, leading to improved circuit efficiency in terms of area, delay, and power consumption. Additionally, this work evaluates performance metrics of approximate circuits, demonstrating their effectiveness in various imageprocessingapplications involving full subtractors.
Securing data during transmission is critical to prevent unauthorized access, interception, or modification of the data. Data can be communicated securely while maintaining its confidentiality, integrity, and availabi...
详细信息
Securing data during transmission is critical to prevent unauthorized access, interception, or modification of the data. Data can be communicated securely while maintaining its confidentiality, integrity, and availability by using cryptographic algorithms and measures. In the proposed work, a hybrid data compression algorithm is proposed to increase the amount of input data that is encrypted using the Advanced Encryption Standard (AES) cryptography method to boost security level, and it can be utilized to carry out the lossy compacting Steganography method. By reducing the quantity of data transmitted, this technique can enable speedy transmission over a sluggish internet connection or use less space on different storage devices. The cover image is compressed using Discrete wavelet Transform (DWT), which reduces the cover image's dimensions by lossyly compressing the image. The ordinary text is converted to hexadecimal format from text. The encrypted data will then be inserted into the compressed cover picture using the least significant bit (LSB) with imagevector array (IvA). Bits per pixel (BPP), Mean Squared Error (MSE), Peak signal to Noise Ratio (PSNR), and Structural Similarity Index (SSIM) were some of the metrics we used to evaluate the proposed technique.
Depression is a mental disorder that might cause self-harm and suicidal thoughts if the level of depression reaches the refractory or recurrent depressive disorder stage. Depression can be categorized into four differ...
详细信息
Depression is a mental disorder that might cause self-harm and suicidal thoughts if the level of depression reaches the refractory or recurrent depressive disorder stage. Depression can be categorized into four different levels that are defined based on a psychometric called Beck Depression Inventory (BDI): minimal, mild, moderate, and severe. Depression level is important to narrow down the selection of depression therapy. There are several ways to treat depression and among them medications, Electroconvulsive therapy (ECT), repetitive Transcranial Magnetic Stimulation (rTMS), a combination of medication and rTMS. In the minimal depression level, an antidepressant medication is the best option such as, tricyclic antidepressants (TCAs), monoamineoxidase inhibitor (MAOI), and Selective serotonin reuptake inhibitors (SSRIs). This study introduces a deep learning (DL) architecture trained on time frequency images derived from EEG signals to predict the patient's respondent status to SSRI antidepressant. We introduce an efficient framework that integrate image technique with stat-of-the-art DL models. various time-frequency methods, including wavelet synchrosqueezed transform (WSST), Continuous wavelet transform (CWT), and Discrete wavelet transform (DWT), are explored to convert EEG signals into time-frequency images. Among these methods, WSST demonstrates superior performance in extracting relevant information encoded within EEG signals, outperforming CWT and DWT. Time-frequency images generated using WSST contribute to the achievement of an accuracy level of 98.89% when fed into a proposed lightweight custom CNN architecture. The results show that WSST is powerful in capturing crucial signal features in detecting the outcome of depression therapy. Our proposed architecture is simple and computationally efficient, despite its simple design, outperforms more complex architectures such as, EfficientNetv2L, ResNet152v2, Xception, DenseNet201, and MobileNetv2. The propose
Recent developments in IoT (Internet of Things) and its importance are significantly accepted in different applications of medical research, automobile sector, robotics, national security, and real-life usage. Securin...
详细信息
Recent developments in IoT (Internet of Things) and its importance are significantly accepted in different applications of medical research, automobile sector, robotics, national security, and real-life usage. Securing the interface between IoT and the real-world is one of the challenging tasks for every researcher. This paper presents a watermarking scheme to protect the image database used in the presentation layer of IoT applications. The host image is decomposed using the Lifting wavelet transform (LWT) and fixed-size blocks of low-frequency components are obtained. Procedurally selected blocks of frequency components called a significant set of blocks (SSB) are used to quantize the watermark bits into it. Considering each block similar to the node of wireless networks an algorithm for block selection is proposed. Watermark extraction from an attacked watermarked image is performed using an adaptive thresholding approach. Key-based randomization at various levels provides the security feature to the proposed scheme. The LWT is used to make the algorithm more robust and computationally fast. However, randomly selected root based SSB generation leads the scheme more secure from an external intruder. The scheme performs significantly well under various signalprocessing operations;and outperforms in comparison with other existing schemes.
One of the most important and active areas of imageprocessing research is visible and thermal-light image fusion. Moreover, real-time visible and thermal-light image fusion has been utilized in multiple kinds of appl...
详细信息
wavelet neural networks are a unique combination of wavelet analysis and neural network architectures, thus providing the benefits of advanced signalprocessing. Unlike traditional methods, WNNs offer a multi-resoluti...
详细信息
This article explores the challenges and applications of the octonion Fourier transform, with a focus on wavelet analysis. We extend the Moritoh wavelet transform to the octonionic Besov spaces, the weighted octonioni...
详细信息
This article explores the challenges and applications of the octonion Fourier transform, with a focus on wavelet analysis. We extend the Moritoh wavelet transform to the octonionic Besov spaces, the weighted octonionic Besov spaces, the octonionic BMO spaces, and the octonionic weighted BMO spaces. The derived bounds for the octonionic Moritoh wavelet transform in these spaces contribute to a deeper understanding of its behavior. Our findings pave the way for future research in signalprocessing, image analysis, and the intersection of octonion wavelet analysis with other mathematical theories.
Quality assessment is a key problem to be resolved in imageprocessing. Few research works have been designed to analyze the quality of images using different techniques. However, the accuracy involved during the proc...
详细信息
This paper presents a novel approach to recursive approximate multipliers (RRAM) tailored for digital imageprocessing tasks in vLSI circuits focusing on enhancing power efficiency and error control. Two multipliers i...
详细信息
This paper presents a novel approach to recursive approximate multipliers (RRAM) tailored for digital imageprocessing tasks in vLSI circuits focusing on enhancing power efficiency and error control. Two multipliers i.e., RRAM-I and RRAM-II have been reported here and also been applied in imageprocessingapplications like smoothing and edge detection. These multipliers offer a significant improvements in image quality, as evidenced by enhanced peak signal-to-noise ratio (PSNR) and structural similarity index (SSIM). RRAM-I demonstrates a remarkable 62.60% reduction in energy usage compared to traditional models, while RRAM-II further improves, achieving a 63.78% reduction in energy consumption. Additionally, for 16-bit multipliers, RRAM-I and RRAM-II offer a substantial performance gains over existing models. By focusing on power efficiency and accuracy, our designs are positioned as the best choices for practical use in IoT devices, mobile devices, and embedded systems, offering superior performance and adaptability in various imageprocessingapplications.
暂无评论