Exploring a SOT-MRAM based in-memory computing for data processing
In this paper, we propose a Spin-Orbit Torque Magnetic Random-Access Memory (SOT-
MRAM) array design that can simultaneously work as non-volatile memory and implement a …
MRAM) array design that can simultaneously work as non-volatile memory and implement a …
Exploring STT-MRAM based in-memory computing paradigm with application of image edge extraction
In this paper, we propose a novel Spin-Transfer Torque Magnetic Random-Access Memory
(STT-MRAM) array design that could simultaneously work as non-volatile memory and …
(STT-MRAM) array design that could simultaneously work as non-volatile memory and …
An improved cultural algorithm and its application in image matching
X Yan, T Song, Q Wu - Multimedia Tools and Applications, 2017 - Springer
Cultural Algorithm (CA) are a class of computational models derived from observing the
cultural evolution process in nature and is used to solve complex calculations of the new …
cultural evolution process in nature and is used to solve complex calculations of the new …
Live fingerprint detection using magnitude of perceived spatial stimuli and local phase information
Fingerprint recognition systems are widely used for authentication purposes in security
systems. However, fingerprint recognition systems can easily be spoofed by imitations of …
systems. However, fingerprint recognition systems can easily be spoofed by imitations of …
The combined cloud model for edge detection
L Zhao, X Dong, WY Chen, LF Jiang… - Multimedia Tools and …, 2017 - Springer
With the support of modern dam facilities, many dams are equipped with multiple cameras. A
large number of labeled images can be provided by the crack extraction process. But the …
large number of labeled images can be provided by the crack extraction process. But the …
[图书][B] Relationship between effective application of machine learning and malware detection: A quantitative study
KW Enfinger - 2016 - search.proquest.com
The number of malicious files present in the public domain continues to rise at a substantial
rate. Current anti-malware software utilizes a signature-based method to detect the …
rate. Current anti-malware software utilizes a signature-based method to detect the …
Dictionary based approach to edge detection
N Chandra, K Khare - Mathematics in Imaging, 2017 - opg.optica.org
Dictionary based Approach to Edge Detection Page 1 MW2C.2.pdf Imaging and Applied Optics
2017 (3D, AIO, COSI, IS, MATH, pcAOP) © OSA 2016 Dictionary based Approach to Edge …
2017 (3D, AIO, COSI, IS, MATH, pcAOP) © OSA 2016 Dictionary based Approach to Edge …
Improved Edge Refinement Filter with Entropy Feedback Measurement for Retrieving Region of Interest and Blind Image Deconvolution.
AH MOHD SHAPRI… - Advances in Electrical & …, 2020 - search.ebscohost.com
This study proposes an improved edge refinement filter with entropy feedback measurement
for locating an optimal region of interest (ROI) in blurry images. This technique is inspired by …
for locating an optimal region of interest (ROI) in blurry images. This technique is inspired by …