TITLE

Embedded algorithm targets security

AUTHOR(S)
Wilson, Andrew
PUB. DATE
August 2003
SOURCE
Vision Systems Design;Aug2003, Vol. 8 Issue 8, p10
SOURCE TYPE
Periodical
DOC. TYPE
Article
ABSTRACT
Deals with the contrast enhancement technique called histogram equalization. Functions of the contrast enhancement technique; Benefits of using the local-adaptive-contrast-equalization software on performing the histogram equalization technique; Implementation of the hardware version of the algorithm at The Netherlands Organization for Applied Scientific Research.
ACCESSION #
10616131

 

Related Articles

  • A method for software-related safety-critical scenarios identification. Mengxia Jiang; Guohua Jiang // Applied Mechanics & Materials;2014, Issue 599-601, p1328 

    Softwares is becoming increasingly important causes for failures of safety programmable electronic (PE) systems, PRA and CSRM both take it as an important risk contributor and respectively access risk of systems and software in system level. However they partly identify software-related risk...

  • IMPLEMENTATION OF PROGRESSIVE BLOCK CODER FOR IMAGE COMPRESSION SYSTEM USING QUAD-TREE PARTITIONING APPROACH. Ladhi, Deepali; Khandelwal, Richa // International Journal of Information Technology Convergence & Se;Feb2012, Vol. 2 Issue 1, p25 

    This paper work describes the implementation of Discrete Wavelet Transform based progressive block coder using only quad-tree partitioning approach. The motivation behind this work is from SPECK (Set Partitioning Embedded bloCK) algorithm. It uses set partitioning and significance testing on...

  • Contour Based Face Recognition Process. Md. Hasan Tareque; Bashar, Golam Dastoger; Saria Islam; Hasan, A. S. M. Mahmudul // International Journal of Computer Science Engineering & Technolo;Jul2013, Vol. 3 Issue 7, p244 

    This paper describes a method for building "Contour Based Face Recognition Process" system so that it gives a user friendly environment to recognize face or image. We made an effort to emphasize all the relevant and crucial parts of face detecting algorithm. In this paper a contour matching...

  • A New Three-Dimensional Terrain Model Generation and Real Time Rendering Algorithm. Yang Bin // International Journal of Digital Content Technology & its Applic;Feb2013, Vol. 7 Issue 4, p964 

    In order to make full use of the topographic map with DWG format and construct 3D terrain model, a new 3D terrain model generation algorithm based on conversion technology is put forward. Firstly, by processing the topographic map with DWG format, we can get the standardized data which can be...

  • An I/O Efficient Approach for Detecting All Accepting Cycles. Wu, Lijun; Su, Kaile; Cai, Shaowei; Zhang, Xiaosong; Zhang, Chenyi; Wang, Shupeng // IEEE Transactions on Software Engineering;Aug2015, Vol. 41 Issue 8, p730 

    Existing algorithms for I/O Linear Temporal Logic (LTL) model checking usually output a single counterexample for a system which violates the property. However, in real-world applications, such as diagnosis and debugging in software and hardware system designs, people often need to have a set of...

  • 2015 R&D Industry Guide. Hock, Lindsay // R&D Magazine;2014 Supplement, p5 

    An introduction is presented in which the editors present their annual researh and development industry guide directory for 2015 which includes analytical tools equipment, computer hardware and software, and laboratory equipment and accessories providers.

  • Zigging and Zagging Into the future. Smith, Brad // Wireless Week;6/15/2003, Vol. 9 Issue 13, p28 

    Focuses on the ZigBee technology. Member countries of ZigBee Alliance; Information on Motorola's ZigBee computer hardware and software; Way ZigBee could make our lives easier.

  • California Dreaming. Hice, Randy C. // Scientific Computing;Nov2006, Vol. 23 Issue 12, p12 

    The author offers observation on the Association for Laboratory Automation (ALA) conference in 2007. ALA was founded in 1996 and usually attracts 5,000 or so attendees, primarily a cross section of scientists, engineers, lab management and such. He was hoping to find a good balance of software...

  • New ISA Institute Answers Compliance Needs.  // InTech;Nov2006, Vol. 53 Issue 11, p72 

    The article focuses on the Automation Standards Compliance Institute. The Institute's charter contains a wide range of standards compliance assessments, including software or hardware products, implementation methods, solutions, companies,and individuals. According to Chairman Wayne Manges, it...

Share

Read the Article

Courtesy of THE LIBRARY OF VIRGINIA

Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics