SlideShare a Scribd company logo
1 of 17
Download to read offline
International JournalElectronics and Communication Engineering & Technology (IJECET),
  International Journal of of Electronics and Communication
  ISSN 0976 – & Technology (IJECET)
ISSN 0976 – 6464(Print), ISSN 0976 – 6472(Online)
                                                                         IJECET
Engineering 6464(Print), ISSN 0976 – 6472(Online) Volume 1, Number 1, Sep - Oct (2010), © IAEME

Volume 1, Number 1, Sep - Oct (2010), pp. 01-17                         ©IAEME
© IAEME, http://www.iaeme.com/ijecet.html

   PARALLEL ALGORITHM FOR COMPUTING EDT WITH
                              NEW ARCHITECTURE
                                       Er. Kirti Rawal
                                   Lecturer, RIEIT,Railmajra
                            Punjab, E-Mail: erkirti.rawal@gmail.com

                                             Er. Sonia
                                         Lecturer, BBSBEC
                                          Fatehgarh Sahib

                                   Er. Rajeev Kumar Patial
                                       Sr.Lecturer, LPU
                                           Phagwara

                                    Mahesh Mudavath
                                 Lecturer, RIEIT, Railmajra
                       Punjab, E-Mail: mahesh_chauhan22@yahoo.com

  ABSTRACT
          A distance transformation converts a binary image consisting of foreground and
  background pixels into one in where each pixel has a value equal to its nearest
  background pixel (alternatively, distances could be the to the nearest foreground pixel).
  This paper provides an area-efficient hardware solution to the computation of EDT on a
  binary image. A Parallel algorithm for computing EDT of an n×n image is presented.
  Pipelined 2D array architecture for hardware implementation is designed. The
  architecture has a regular structure with locally connected identical processing elements.
  Further, pipelining reduces hardware resources. Such array architecture is easily scalable
  to handle images of different sizes.
  Keywords – Distance Transforms, Euclidean Distance Transform, Parallel Algorithm,
  Pipelined Architecture.




                                                 1
International Journal of Electronics and Communication Engineering & Technology (IJECET),
ISSN 0976 – 6464(Print), ISSN 0976 – 6472(Online) Volume 1, Number 1, Sep - Oct (2010), © IAEME


1. INTRODUCTION
        A distance transform, also known as distance map or distance field, is a
representation of a digital image. Applications of distance transform are numerous. These
include shape analysis of objects [2], machine vision [3] and image matching [4].




                             Figure 1 distance transformation
Three different distance metrics are commonly used which are following [1]:
    •   Manhattan distance
    •   Chessboard distance
    •   Euclidean distance
A. Manhattan Distance Transform
        The Distance between two points measured along axes at right angles. In a plane
with p1 at (x1, y1) and p2 at (x2, y2), it is |x1 - x2| + |y1 - y2|. Manhattan distance is often
used in integrated circuits where wires only run parallel to the x or y axis Manhattan
distance is often used in integrated circuits where wires only run parallel to the x or y
axis. Also known as rectilinear distance, Minkowski's L1 distance, taxi cab metric, or city
block distance. The formula for this distance between a point x= (x1, x2, etc.) and a point
                                 n
y= (y1, y2, etc.) is       d = ∑ xi − yi
                                i =1




                         Figure 2 Manhattan distance transformation


                                                2
International Journal of Electronics and Communication Engineering & Technology (IJECET),
ISSN 0976 – 6464(Print), ISSN 0976 – 6472(Online) Volume 1, Number 1, Sep - Oct (2010), © IAEME


B. Chessboard Distance Transform
        The Chessboard distance between two spaces on a chess board is the minimum
number of moves a king requires to move between them. Below are the Chessboard
distances of each square from the square f6. Chessboard Distance is also called
maximum value distance or Chebyshev distance. Mathematically it can be written as
DChebyshev(p, q) = maxi(| pi − qi |).The city block distance, chessboard distance or the
combination of those two are used for the benefit of their simplified architectures and
integer computations[5-7].




                       Figure 3 Chessboard Distance Transformations
C. Euclidean Distance Transform
        Euclidean Distance Transformation (EDT) is used to convert a digital binary
image consisting of object (foreground) and non object (background) pixels into another
image where each pixel has a value of the minimum Euclidean distance from non object
pixels. Considerable research has been done on development of algorithms for
computation of the EDT. Several sequential [8-11] and parallel [12-16] algorithms are
available. Some work on parallel algorithms targeted to general-purpose processors is
also known [17, 18]. Out of these three distance transforms EDT find widespread use.
2. PARALLEL ALGORITHM
        In this paper, a parallel algorithm is presented. The salient feature of this
algorithm is that the computation of EDT involves only integer arithmetic operations
within a small neighbourhood of each pixel and hence it is suitable for mapping onto high



                                                3
International Journal of Electronics and Communication Engineering & Technology (IJECET),
ISSN 0976 – 6464(Print), ISSN 0976 – 6472(Online) Volume 1, Number 1, Sep - Oct (2010), © IAEME



speed array architecture. The Euclidean distance is given by dp = ∆r 2 + ∆c 2 [19]. ( r,

 c) of background pixels are initialized to (0, 0) and those of foreground pixels are
computed iteratively starting from the pixels nearby background and moving towards the
far away pixels. That is, dp lies within (k - 0.5, k + 0.5] i.e. for k =1 its value lies between
0.5 to 1.5.Hence dp is not integer because from 0.5 to 1.5 there are some floating point
numbers i.e. 0.7, 0.9 etc. So we take d2p whose values lies within ( k2 - k, k2 + k) since
d2p is an integer. However, d2p is quite large in magnitude and it requires a large storage
space in hardware.
        For K=1, value lies within k2-k to k2+k = (12 -1) to (12 +1) = 0 to 2. Thus range
of d2p is from 0 to 2. For K=2, value lies within k2-k to k2+k = (22 -2) to (22 +2) = 2 to
6. So we take ∂(p) which is less than d2p is given by ∂(p) = k2+k - d2p. Here d2p is
derived first and then substituted to find ∂(p). A new integer quantity ∂(p) which is much
smaller than d2(p) is defined as (k2 + k) - d2p. d2p can be derived using the already
computed ( r, c) of eight neighbors pi, i = 1–8, surrounding p. It is given by [min ri2 +
 ci2] where ri = (pi) if pi is in the same row of p. Otherwise,            ri = r(pi) + 1. The
increment by 1 is due to p being displaced from pi by one row. Similarly, ci is given in
terms of c(pi).
3. STEPS OF PARALLEL ALGORITHM
        There are three steps of parallel algorithm which are used to compute Euclidean
distance transform.
Step 1: Compute ri, ci and ∂i , i = 1 to 8.




      Figure 4 Euclidean distance from reference value to the same column (above)


                                                4
International Journal of Electronics and Communication Engineering & Technology (IJECET),
ISSN 0976 – 6464(Print), ISSN 0976 – 6472(Online) Volume 1, Number 1, Sep - Oct (2010), © IAEME



Euclidean Distance dp=      ∆r 2 + ∆c 2
d2 p =   r2 + c2
d2 p = 12 + 02 = 1
∂(p) = k2+k - d2p = 12+1 – 1 = 1
In this way all values of Euclidean distance for k = 1 are computed.




                         Figure 5 Euclidean distance values for k=1




   Figure 6 Euclidean distance from Reference value to the different row (Above) and
                                different column (L.H.S)
Euclidean Distance dp=      ∆r 2 + ∆c 2
d2p = r2 + c2
d2p = 22 + 12 = 5
∂ (p) = k2+k - d2p = 22+2 – 5 = 1
In this way all values of Euclidean distance for k = 2 are computed.




                                                5
International Journal of Electronics and Communication Engineering & Technology (IJECET),
ISSN 0976 – 6464(Print), ISSN 0976 – 6472(Online) Volume 1, Number 1, Sep - Oct (2010), © IAEME




                          Figure 7 Euclidean distance values for k=2




         Figure 8 Euclidean distance values from reference value to corner side (above)
Euclidean Distance dp=       ∆r 2 + ∆c 2
d2 p =     r2 + c2
d2 p = 22 + 22 = 8
∂(p) = k2+k - d2p = 32+3 – 8 = 4
In this way all values of Euclidean distance for k = 3 are computed.




                                                6
International Journal of Electronics and Communication Engineering & Technology (IJECET),
ISSN 0976 – 6464(Print), ISSN 0976 – 6472(Online) Volume 1, Number 1, Sep - Oct (2010), © IAEME




                        Figure 9 Euclidean distance values for k = 3
Step 2: To find Maximum values
        Consider ∂i values corresponding to neighbors pi whose done (pi) = 1. Find the
maximum, say ∂m.
        In step 2 , d2(p) can be rewritten as min[d2(pi) + Ri + Ci] where Ri = 0 if pi is
in the same row of p. Otherwise, Ri = 2 r(pi) + 1. ∂ (p) is now derived as follows.
        ∂(p) = k2+k - d2p
              = max [ k2+k - d2 pi - Ri - Ci]
             = max [∂ pi - Ri - Ci] = max [∂i ]
        Consider iteration k = 2. ∂ of those twelve pixels whose ( r,             c) have been
computed at k =1 are incremented by 2k (i.e. 4).




 Figure 10 Maximum value of Euclidean distance from reference value to different row
                          and different column (L.H.S)



                                                7
International Journal of Electronics and Communication Engineering & Technology (IJECET),
ISSN 0976 – 6464(Print), ISSN 0976 – 6472(Online) Volume 1, Number 1, Sep - Oct (2010), © IAEME


             = 5 - 3 – 3 = -1
Where Ri = 2 rpi + 1 and              Ci = 2 cpi + 1
            = 2× 1+1 = 3                = 2× 1+1 = 3
Step 3: To find overlapped delta values, If done(p) = 0 and ∂m ≥ 0, then
 r(p)= rm, c(p)= cm, ∂ (p) =∂m and done(p) =1. If done(p) = 1, then
∂(p) = ∂(p) + 2k.
        To keep track of pixels whose ( r,          c) have been computed, a flag done is
assigned to each pixel, whose value is set to 1 when the transform values of pixels are
computed at any iteration.
        Overlapped values for k=1 are computed as follows If previous value of ∂(p) is 0
(for k=0), then value for k=1 are computed by using the formula
         ∂(p) = ∂(p) + 2k.
              = 0 + 2×1 = 2




                           Figure 11 Overlapped value in k = 1
        Similarly overlapped values for k=2 are computed as follows If previous value of
∂(p) is 2 (for k=1), then value for k=2 are computed by using the formula
max (∂i ) = max (∂pi ) - Ri - Ci
       ∂(p) = ∂(p) + 2k.
            = 2 + 2×2 = 6




                                                8
International Journal of Electronics and Communication Engineering & Technology (IJECET),
ISSN 0976 – 6464(Print), ISSN 0976 – 6472(Online) Volume 1, Number 1, Sep - Oct (2010), © IAEME




                          Figure 12 Overlapped value in k = 2
Similarly overlapped values for k=3 are also computed by using the formula.
                  ∂(p) = ∂(p) + 2k.
                       = 6 + 2×3 = 12
In this way all the overlapped values of delta are computed.
4. PIPELINED ARCHITECTURE FOR COMPUTING EDT
        The computation of ∂i, Ri and Ci are computed first based on the position of
neighbors pi. Ri (or Ci) takes either 0 or 2 r(pi) + 1 (or 2 c(pi) + 1). Therefore, the
computation of ri and ci requires incrementers while the computation of ∂i requires
adders and subtractors [32]. Pipelined Architecture for computing EDT is as shown in
figure 13
Squaring Circuit for r and c:
        Squaring circuit is used to square the inputs of r and c in order to get the output
rsq and csq. The maximum value of r and c is 2 so only two bits are required to represent
0,1and 2. The maximum value of rsq and csq is 4 so four bits are used to represent 0,1and
4.
Squaring Circuit for k:
        Squaring circuit is used to square the inputs of k in order to get the output ksq.
The maximum value of k is 3 so only two bits are required to represent 0, 1, 2 and 3. The
maximum value of ksq is 9 so four bits are used to represent 0, 1, 4 and 9.




                                                9
International Journal of Electronics and Communication Engineering & Technology (IJECET),
ISSN 0976 – 6464(Print), ISSN 0976 – 6472(Online) Volume 1, Number 1, Sep - Oct (2010), © IAEME


Full Adder for k and ksq:
        Here 4bit full adder is used to add the values of k and ksq in order to get the
output tot. The maximum value of k is 3 and ksq is 9 so four bits are required to represent
ksq. The maximum value of tot is 12 so four bits are used to represent tot values. In this
case there is no carry input i.e. cin1 and no carry output i.e. cout1 so both will remain
zero.
Subtractor for dp and total:
        Here subtractor is used to subtract the values of dp and tot in order to get the
output del_p. The maximum value of dp is 8 and tot is 12 so four bits are required to
represent dp and tot values. Del_p (delta) comes at the output through wire del_p_1.
Pipelined Register1:
        Pipelined register1 is used to store all the r, c and delta values which are
calculated in stage 1.The inputs of pipelined register1 is r1_0 to r1_29, c1_0 to c1_29 and
del1_p0 to del1_p29 and output of pipelined register 1 is r0 to r29, c0 to c29 and del_p0
to del_p29.The main advantage of using pipelined register1 is the moment at which value
is stored at the input, it comes at the output of pipelined register instantly. It does not wait
to fill all the values in the register. These r and c values are those values which we are
applying at the input of stage 1 and delta values are coming from the output of subtractor.
With the help of wire we are using r and c values at the input of pipelined register1. So
that EDT is computed only for those r and c values rather than any other value.
Counter:
        Five bit counter is used to give output of subtractor i.e. delta values to input of
pipelined register1.The inputs of five bit counter is clk_1 and clear having 1bit each. The
output of counter is q_1 (5bit). Now q_1 is assigned to address of pipelined register1 so
that when the output of counter is incremented then address is also incremented by filling
delta values (del_p_1) one by one. When output of counter reach at 29th value, at that
time pipelined register is completely filled. By giving next clk_1 again output of counter
and address comes at zero position.




                                               10
International Journal of Electronics and Communication Engineering & Technology (IJECET),
ISSN 0976 – 6464(Print), ISSN 0976 – 6472(Online) Volume 1, Number 1, Sep - Oct (2010), © IAEME




                    Figure 13 Pipelined Architecture for computing EDT


                                               11
International Journal of Electronics and Communication Engineering & Technology (IJECET),
ISSN 0976 – 6464(Print), ISSN 0976 – 6472(Online) Volume 1, Number 1, Sep - Oct (2010), © IAEME


In this way all values of delta i.e. EDT are computed with this new architecture.
        The pipelined architecture consists of various blocks such as squaring circuit, full
adder, full subtractor, pipelined registers, comparators and multiplexers. Out of these
blocks, output of each block has to be computed individually
5.      SIMULATION RESULTS
        In order to obtain results Verilog language has been used. Verilog Hardware
Description Language (HDL) is used for computing EDT, which can describe hardware
requirements of the architecture not only at the gate level, register level but at the
algorithmic level [20].      Verilog HDL is one of the two most common Hardware
Description Languages (HDL) used by integrated circuit (IC) designers [21]. For writing
the code Xilinx is used and for simulation or to see the output waveforms Modelsim has
been used.
        Figure 14, 15, 16 explains how the r_t, c_t, k_t, q_5_t, k_new_t, c_in1_t, cin1_t,
clk_1_t, clear_1_t, and flag_t inputs are applied to produce output output_data. Here we
consider 30 cases, in which different values of r_t and c_t are applied in order to produce
different values of delta. Carry inputs are always zero and clk_t and flag_t is always 1.
The value of k_t varies from 1 to 3. Here we take k_t = 01, q_5_t and
k_new_t=11.Giving all these inputs we get complete delta values for 30 inputs i.e.
output_data.




             Figure 14 Waveform of Calculation of overlapped delta operation


                                               12
International Journal of Electronics and Communication Engineering & Technology (IJECET),
ISSN 0976 – 6464(Print), ISSN 0976 – 6472(Online) Volume 1, Number 1, Sep - Oct (2010), © IAEME




             Figure 15 Waveform of Calculation of overlapped delta operation




             Figure 16 Waveform of Calculation of overlapped delta operation



                                               13
International Journal of Electronics and Communication Engineering & Technology (IJECET),
ISSN 0976 – 6464(Print), ISSN 0976 – 6472(Online) Volume 1, Number 1, Sep - Oct (2010), © IAEME


6. CONCLUSIONS
        A distance transformation converts a binary image consisting of foreground and
background pixels into one in where each pixel has a value equal to its nearest
background pixel (alternatively, distances could be the to the nearest foreground pixel).
The types of transforms used generally are city block distance transform, chessboard
distance transform and Euclidean distance transform. Of these EDT find widespread use
in view of the natural metric employed.
        The pipelined architecture is presented in this dissertation proved to be applicable
for computation of Euclidean distance transform. It comprises two dimensional arrays of
locally interconnected processing elements where each element is a sequential logic and
all elements are operated synchronously. This architecture is designed in such a way that
it works on the steps of parallel algorithm. The algorithm involves only integer arithmetic
operations. The architecture is fully digital and it is easily scalable for an image of any
n×n size.
7. FUTURE SCOPE
        Proposed methodology can be used as an important tool in image analysis.
Keeping in view the importance of image processing, it is required that the architecture
should be robust, accurate as well as faster in order to handle images of different sizes.
So, there is always perpetual need for improvements.
1.    The ideas presented for the case of 4 pixels per processing element readily extend to
      the case of more than 4 pixels per processing element (such as 9,16 and so on).
2.    The given architecture can be further modified to handle 3D images.
3.    The work can be carried out to make it more robust.
4.    The given architecture can be implemented on FPGA device.
5.    The given source code is optimized to get synthesizable results.




                                               14
International Journal of Electronics and Communication Engineering & Technology (IJECET),
ISSN 0976 – 6464(Print), ISSN 0976 – 6472(Online) Volume 1, Number 1, Sep - Oct (2010), © IAEME


8.    REFERENCES
[1]   C. Tony Huang and O. Robert Mitchell (1991), “Rapid Euclidean distance
      transform using grayscale morphology decomposition”, IEEE Computer Society
      Conference on Pattern Analysis and Machine Intelligence ,1991,vol.14, pp. 695-
      697.

[2]   P. Danielsson (1978), “A new shape factor”, Computer Graphics and Image
      Processing 1978, vol.2, pp. 292–299.
[3]   D.Paglieroni (1992), “Distance transforms: properties and machine vision
      applications”, CVGIP: Graphical Models and Image Processing, vol.54, 1992, pp.
      56–74.
[4]   D.P. Huttenlocher, G.A. Klanderman, W.J. Rucklidge (1993), “Comparing images
      using the Hausdorff distance”, IEEE Transactions on Pattern Analysis and Machine
      Intelligence, vol. 15 ,1993, pp. 850–863.
[5]   P. A. Maragos and R. W. Schafer, “Morphological skeleton representation and
      coding of binary images,” IEEE Trans. Acoustic Speech, Signal Processing, vol.
      ASSP-34, no.5, 1986, pp. 1228-1244.
[6]   S. R. Stemberg, “Grayscale morphology,” Computer Vision Graphics and Image
      Processing, vol. 35, 1986, pp. 333-355.
[7]   J. Toriwaki and S. Yokoi. “Distance transformations and skeletons of digitized
      pictures with applications,” in Progress in Pattern Recognition, 1981, pp. 187-264.
[8]   H. Breu, J. Gil, D. Kirkpatrick, M. Werman (1995), “Linear time Euclidean
      distance transform algorithms”, IEEE Transactions on Pattern Analysis and
      Machine Intelligence, vol.17 ,1995, pp. 529 533.
[9]   S. Pavel, S.G. Akl (1995), “Efficient algorithms for the Euclidean distance
      transform”, Parallel Processing Letters, vol.5, 1995, pp. 205–212.
[10] Hinnik Eggers (1998), “Two fast Euclidean distance transformations in z2 based on
      sufficient propagation”, Computer Vision and Image Understanding vol.69, 1998,
      pp. 106–116.
[11] J. Maurer, R. Calvin, R. Qi, V. Raghavan (2003), “A linear time algorithm for
      computing exact Euclidean distance transforms of binary images in arbitrary


                                               15
International Journal of Electronics and Communication Engineering & Technology (IJECET),
ISSN 0976 – 6464(Print), ISSN 0976 – 6472(Online) Volume 1, Number 1, Sep - Oct (2010), © IAEME


      dimensions”, IEEE Transactions on Pattern Analysis and Machine Intelligence,
      vol.25, 2003, pp. 265–270.
[12] Hugo Embrechts, Dirk Roose (1996), “Parallel Euclidean distance transformation
      algorithm”, Computer Vision and Image Understanding vol.63, 1996, pp. 15–26.
[13] Hinnik Eggers (1996), “Parallel Euclidean distance transformations in zng”,
      Parallel Recognition Letters, vol. 17, 1996, pp. 751–757.
[14] T. Hirata, “A unified linear-time algorithm for computing distance maps”(1996),
      Information Processing Letters, vol.58, 1996, pp. 129–133.
[15] N. Sudha, S. Nandi, K. Sridharan (1998), “Efficient computation of Euclidean
      distance transform for applications in image processing”, Proceedings of IEEE
      TENCON vol.2,1998, pp. 49–52.
[16] Yu-Hua Lee, Shi-Jinn Horng, Jennifer Seitzer (2003), “Parallel computation of the
      Euclidean distance transform on a three-dimensional image array”, IEEE
      Transactions on Parallel and Distributed Systems, vol. 14,2003, pp. 203–212.
[17] L. Chen, H.Y.H. Chuang (1995), “An efficient algorithm for complete Euclidean
      distance transform on mesh-connected SIMD”, Parallel Computing, vol. 21, 1995,
      pp. 841–852.
[18] Y. Pan, M. Hamdi, K. Li (2000), “Euclidean distance transform for binary images
      on reconfigurable mesh-connected computers”, IEEE Transactions on Systems,
      Man Cybernetics, vol. 30 ,2000, pp. 240–244.
[19] N. Sudha (2005), “A pipelined array architecture for Euclidean distance
      transformation and its FPGA implementation”, Microprocessors and Microsystems,
      vol. 29, 2005, pp. 405–410.

[20] J. Bhaskar (1998), “Verilog HDL Synthesis a Practical Primer”, second edition,
      1998, pp.1-230.
[21] Peter M. Nyasulu (2001), “Introduction to Verilog”, third edition, 2001, pp.1-30.




                                               16
International Journal of Electronics and Communication Engineering & Technology (IJECET),
ISSN 0976 – 6464(Print), ISSN 0976 – 6472(Online) Volume 1, Number 1, Sep - Oct (2010), © IAEME


BIO DATA OF AUTHOR’S




                 Ms. Kirti Rawal is working as an Lecturer in the Electronics and
Communications Engineering Department, R.I.E.I.T, Railmajra (Punjab). She earned her
M.Tech (ECE) Degree from BBSBEC Fatehgarh Sahib (Punjab) in 2010 and B.Tech
(ECE) Degree from IITT Pojewal (Nawanshahr). She has published 2 research papers in
International Conferences and national Conferences. She is a Life Membership of the
“Indian Society for Technical Education (ISTE)”.




                  Mr. Mahesh Mudavath is working as an Lecturer in the Electronics and
Communications Engineering Department, R.I.E.I.T, Railmajra (Punjab). He earned his
M.Tech (VLSI Design) Degree from C-DAC, Mohali (Punjab) in 2009 and B.Tech
(ECE) Degree from JNTU, Hyderabad (Andhra Pradesh). He has published 6 research
papers in International Journals and International Conferences. He is a Life Membership
of the “Indian Society for Technical Education (ISTE)”.




                                               17

More Related Content

What's hot

International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)ijceronline
 
ANALYSIS OF INTEREST POINTS OF CURVELET COEFFICIENTS CONTRIBUTIONS OF MICROS...
ANALYSIS OF INTEREST POINTS OF CURVELET  COEFFICIENTS CONTRIBUTIONS OF MICROS...ANALYSIS OF INTEREST POINTS OF CURVELET  COEFFICIENTS CONTRIBUTIONS OF MICROS...
ANALYSIS OF INTEREST POINTS OF CURVELET COEFFICIENTS CONTRIBUTIONS OF MICROS...sipij
 
Algorithm Finding Maximum Concurrent Multicommodity Linear Flow with Limited ...
Algorithm Finding Maximum Concurrent Multicommodity Linear Flow with Limited ...Algorithm Finding Maximum Concurrent Multicommodity Linear Flow with Limited ...
Algorithm Finding Maximum Concurrent Multicommodity Linear Flow with Limited ...IJCNCJournal
 
Social Network Analysis
Social Network AnalysisSocial Network Analysis
Social Network Analysisrik0
 
Image Retrieval with Fisher Vectors of Binary Features (MIRU'14)
Image Retrieval with Fisher Vectors of Binary Features (MIRU'14)Image Retrieval with Fisher Vectors of Binary Features (MIRU'14)
Image Retrieval with Fisher Vectors of Binary Features (MIRU'14)Yusuke Uchida
 
Robust Image Denoising in RKHS via Orthogonal Matching Pursuit
Robust Image Denoising in RKHS via Orthogonal Matching PursuitRobust Image Denoising in RKHS via Orthogonal Matching Pursuit
Robust Image Denoising in RKHS via Orthogonal Matching PursuitPantelis Bouboulis
 
Big Data Analysis with Signal Processing on Graphs
Big Data Analysis with Signal Processing on GraphsBig Data Analysis with Signal Processing on Graphs
Big Data Analysis with Signal Processing on GraphsMohamed Seif
 
GENERIC APPROACH FOR VISIBLE WATERMARKING
GENERIC APPROACH FOR VISIBLE WATERMARKINGGENERIC APPROACH FOR VISIBLE WATERMARKING
GENERIC APPROACH FOR VISIBLE WATERMARKINGEditor IJCATR
 
study Streaming Multigrid For Gradient Domain Operations On Large Images
study Streaming Multigrid For Gradient Domain Operations On Large Imagesstudy Streaming Multigrid For Gradient Domain Operations On Large Images
study Streaming Multigrid For Gradient Domain Operations On Large ImagesChiamin Hsu
 
A Hough Transform Based On a Map-Reduce Algorithm
A Hough Transform Based On a Map-Reduce AlgorithmA Hough Transform Based On a Map-Reduce Algorithm
A Hough Transform Based On a Map-Reduce AlgorithmIJERA Editor
 
Welcome to International Journal of Engineering Research and Development (IJERD)
Welcome to International Journal of Engineering Research and Development (IJERD)Welcome to International Journal of Engineering Research and Development (IJERD)
Welcome to International Journal of Engineering Research and Development (IJERD)IJERD Editor
 
High Speed Memory Efficient Multiplier-less 1-D 9/7 Wavelet Filters Based NED...
High Speed Memory Efficient Multiplier-less 1-D 9/7 Wavelet Filters Based NED...High Speed Memory Efficient Multiplier-less 1-D 9/7 Wavelet Filters Based NED...
High Speed Memory Efficient Multiplier-less 1-D 9/7 Wavelet Filters Based NED...IJERA Editor
 
Optimization Techniques
Optimization TechniquesOptimization Techniques
Optimization TechniquesAjay Bidyarthy
 
Segmentation by Fusion of Self-Adaptive SFCM Cluster in Multi-Color Space Com...
Segmentation by Fusion of Self-Adaptive SFCM Cluster in Multi-Color Space Com...Segmentation by Fusion of Self-Adaptive SFCM Cluster in Multi-Color Space Com...
Segmentation by Fusion of Self-Adaptive SFCM Cluster in Multi-Color Space Com...CSCJournals
 
Image Restitution Using Non-Locally Centralized Sparse Representation Model
Image Restitution Using Non-Locally Centralized Sparse Representation ModelImage Restitution Using Non-Locally Centralized Sparse Representation Model
Image Restitution Using Non-Locally Centralized Sparse Representation ModelIJERA Editor
 

What's hot (20)

Dk32696699
Dk32696699Dk32696699
Dk32696699
 
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)
 
ANALYSIS OF INTEREST POINTS OF CURVELET COEFFICIENTS CONTRIBUTIONS OF MICROS...
ANALYSIS OF INTEREST POINTS OF CURVELET  COEFFICIENTS CONTRIBUTIONS OF MICROS...ANALYSIS OF INTEREST POINTS OF CURVELET  COEFFICIENTS CONTRIBUTIONS OF MICROS...
ANALYSIS OF INTEREST POINTS OF CURVELET COEFFICIENTS CONTRIBUTIONS OF MICROS...
 
Algorithm Finding Maximum Concurrent Multicommodity Linear Flow with Limited ...
Algorithm Finding Maximum Concurrent Multicommodity Linear Flow with Limited ...Algorithm Finding Maximum Concurrent Multicommodity Linear Flow with Limited ...
Algorithm Finding Maximum Concurrent Multicommodity Linear Flow with Limited ...
 
Social Network Analysis
Social Network AnalysisSocial Network Analysis
Social Network Analysis
 
Image Retrieval with Fisher Vectors of Binary Features (MIRU'14)
Image Retrieval with Fisher Vectors of Binary Features (MIRU'14)Image Retrieval with Fisher Vectors of Binary Features (MIRU'14)
Image Retrieval with Fisher Vectors of Binary Features (MIRU'14)
 
Oc2423022305
Oc2423022305Oc2423022305
Oc2423022305
 
Robust Image Denoising in RKHS via Orthogonal Matching Pursuit
Robust Image Denoising in RKHS via Orthogonal Matching PursuitRobust Image Denoising in RKHS via Orthogonal Matching Pursuit
Robust Image Denoising in RKHS via Orthogonal Matching Pursuit
 
Big Data Analysis with Signal Processing on Graphs
Big Data Analysis with Signal Processing on GraphsBig Data Analysis with Signal Processing on Graphs
Big Data Analysis with Signal Processing on Graphs
 
Slide11 icc2015
Slide11 icc2015Slide11 icc2015
Slide11 icc2015
 
GENERIC APPROACH FOR VISIBLE WATERMARKING
GENERIC APPROACH FOR VISIBLE WATERMARKINGGENERIC APPROACH FOR VISIBLE WATERMARKING
GENERIC APPROACH FOR VISIBLE WATERMARKING
 
study Streaming Multigrid For Gradient Domain Operations On Large Images
study Streaming Multigrid For Gradient Domain Operations On Large Imagesstudy Streaming Multigrid For Gradient Domain Operations On Large Images
study Streaming Multigrid For Gradient Domain Operations On Large Images
 
A Hough Transform Based On a Map-Reduce Algorithm
A Hough Transform Based On a Map-Reduce AlgorithmA Hough Transform Based On a Map-Reduce Algorithm
A Hough Transform Based On a Map-Reduce Algorithm
 
Welcome to International Journal of Engineering Research and Development (IJERD)
Welcome to International Journal of Engineering Research and Development (IJERD)Welcome to International Journal of Engineering Research and Development (IJERD)
Welcome to International Journal of Engineering Research and Development (IJERD)
 
High Speed Memory Efficient Multiplier-less 1-D 9/7 Wavelet Filters Based NED...
High Speed Memory Efficient Multiplier-less 1-D 9/7 Wavelet Filters Based NED...High Speed Memory Efficient Multiplier-less 1-D 9/7 Wavelet Filters Based NED...
High Speed Memory Efficient Multiplier-less 1-D 9/7 Wavelet Filters Based NED...
 
Optimization Techniques
Optimization TechniquesOptimization Techniques
Optimization Techniques
 
N045077984
N045077984N045077984
N045077984
 
Segmentation by Fusion of Self-Adaptive SFCM Cluster in Multi-Color Space Com...
Segmentation by Fusion of Self-Adaptive SFCM Cluster in Multi-Color Space Com...Segmentation by Fusion of Self-Adaptive SFCM Cluster in Multi-Color Space Com...
Segmentation by Fusion of Self-Adaptive SFCM Cluster in Multi-Color Space Com...
 
Matlab Working With Images
Matlab Working With ImagesMatlab Working With Images
Matlab Working With Images
 
Image Restitution Using Non-Locally Centralized Sparse Representation Model
Image Restitution Using Non-Locally Centralized Sparse Representation ModelImage Restitution Using Non-Locally Centralized Sparse Representation Model
Image Restitution Using Non-Locally Centralized Sparse Representation Model
 

Viewers also liked

Fast dct algorithm using winograd’s method
Fast dct algorithm using winograd’s methodFast dct algorithm using winograd’s method
Fast dct algorithm using winograd’s methodIAEME Publication
 
Flexural safety cost of optimized reinforced
Flexural safety cost of optimized reinforcedFlexural safety cost of optimized reinforced
Flexural safety cost of optimized reinforcedIAEME Publication
 
Transient stability enhancement by ann based
Transient stability enhancement by ann basedTransient stability enhancement by ann based
Transient stability enhancement by ann basedIAEME Publication
 
Comparison and analysis of combining techniques for spatial multiplexingspace...
Comparison and analysis of combining techniques for spatial multiplexingspace...Comparison and analysis of combining techniques for spatial multiplexingspace...
Comparison and analysis of combining techniques for spatial multiplexingspace...IAEME Publication
 
Rectangular microstrip array antennas for wide triple band operation
Rectangular microstrip array antennas for wide triple band operationRectangular microstrip array antennas for wide triple band operation
Rectangular microstrip array antennas for wide triple band operationIAEME Publication
 
Awareness of ict by the rural customers towards insurance services
Awareness of ict by the rural customers towards insurance servicesAwareness of ict by the rural customers towards insurance services
Awareness of ict by the rural customers towards insurance servicesIAEME Publication
 
Corner truncated inverted u slot triple band tunable rectangular microstrip...
Corner truncated inverted u   slot triple band tunable rectangular microstrip...Corner truncated inverted u   slot triple band tunable rectangular microstrip...
Corner truncated inverted u slot triple band tunable rectangular microstrip...IAEME Publication
 
Study of green supply chain management and operation strategic
Study of green supply chain management and operation strategicStudy of green supply chain management and operation strategic
Study of green supply chain management and operation strategicIAEME Publication
 
Downlink signal evaluation of haps m 55 aircraft above malaysian skies
Downlink signal evaluation of haps m 55 aircraft above malaysian skiesDownlink signal evaluation of haps m 55 aircraft above malaysian skies
Downlink signal evaluation of haps m 55 aircraft above malaysian skiesIAEME Publication
 
A framework for practical vulnerabilities of the tor (the onion routing) anon...
A framework for practical vulnerabilities of the tor (the onion routing) anon...A framework for practical vulnerabilities of the tor (the onion routing) anon...
A framework for practical vulnerabilities of the tor (the onion routing) anon...IAEME Publication
 

Viewers also liked (10)

Fast dct algorithm using winograd’s method
Fast dct algorithm using winograd’s methodFast dct algorithm using winograd’s method
Fast dct algorithm using winograd’s method
 
Flexural safety cost of optimized reinforced
Flexural safety cost of optimized reinforcedFlexural safety cost of optimized reinforced
Flexural safety cost of optimized reinforced
 
Transient stability enhancement by ann based
Transient stability enhancement by ann basedTransient stability enhancement by ann based
Transient stability enhancement by ann based
 
Comparison and analysis of combining techniques for spatial multiplexingspace...
Comparison and analysis of combining techniques for spatial multiplexingspace...Comparison and analysis of combining techniques for spatial multiplexingspace...
Comparison and analysis of combining techniques for spatial multiplexingspace...
 
Rectangular microstrip array antennas for wide triple band operation
Rectangular microstrip array antennas for wide triple band operationRectangular microstrip array antennas for wide triple band operation
Rectangular microstrip array antennas for wide triple band operation
 
Awareness of ict by the rural customers towards insurance services
Awareness of ict by the rural customers towards insurance servicesAwareness of ict by the rural customers towards insurance services
Awareness of ict by the rural customers towards insurance services
 
Corner truncated inverted u slot triple band tunable rectangular microstrip...
Corner truncated inverted u   slot triple band tunable rectangular microstrip...Corner truncated inverted u   slot triple band tunable rectangular microstrip...
Corner truncated inverted u slot triple band tunable rectangular microstrip...
 
Study of green supply chain management and operation strategic
Study of green supply chain management and operation strategicStudy of green supply chain management and operation strategic
Study of green supply chain management and operation strategic
 
Downlink signal evaluation of haps m 55 aircraft above malaysian skies
Downlink signal evaluation of haps m 55 aircraft above malaysian skiesDownlink signal evaluation of haps m 55 aircraft above malaysian skies
Downlink signal evaluation of haps m 55 aircraft above malaysian skies
 
A framework for practical vulnerabilities of the tor (the onion routing) anon...
A framework for practical vulnerabilities of the tor (the onion routing) anon...A framework for practical vulnerabilities of the tor (the onion routing) anon...
A framework for practical vulnerabilities of the tor (the onion routing) anon...
 

Similar to Parallel algorithm for computing edt with new architecture

ENHANCEMENT OF TRANSMISSION RANGE ASSIGNMENT FOR CLUSTERED WIRELESS SENSOR NE...
ENHANCEMENT OF TRANSMISSION RANGE ASSIGNMENT FOR CLUSTERED WIRELESS SENSOR NE...ENHANCEMENT OF TRANSMISSION RANGE ASSIGNMENT FOR CLUSTERED WIRELESS SENSOR NE...
ENHANCEMENT OF TRANSMISSION RANGE ASSIGNMENT FOR CLUSTERED WIRELESS SENSOR NE...IJCNCJournal
 
Implementation performance analysis of cordic
Implementation performance analysis of cordicImplementation performance analysis of cordic
Implementation performance analysis of cordiciaemedu
 
A comparative study on multicast routing using dijkstra’s
A comparative study on multicast routing using dijkstra’sA comparative study on multicast routing using dijkstra’s
A comparative study on multicast routing using dijkstra’siaemedu
 
A comparative study on multicast routing using dijkstra’s, prims and ant colo...
A comparative study on multicast routing using dijkstra’s, prims and ant colo...A comparative study on multicast routing using dijkstra’s, prims and ant colo...
A comparative study on multicast routing using dijkstra’s, prims and ant colo...IAEME Publication
 
11.quadrature radon transform for smoother tomographic reconstruction
11.quadrature radon transform for smoother  tomographic reconstruction11.quadrature radon transform for smoother  tomographic reconstruction
11.quadrature radon transform for smoother tomographic reconstructionAlexander Decker
 
11.[23 36]quadrature radon transform for smoother tomographic reconstruction
11.[23 36]quadrature radon transform for smoother  tomographic reconstruction11.[23 36]quadrature radon transform for smoother  tomographic reconstruction
11.[23 36]quadrature radon transform for smoother tomographic reconstructionAlexander Decker
 
Improved Timing Estimation Using Iterative Normalization Technique for OFDM S...
Improved Timing Estimation Using Iterative Normalization Technique for OFDM S...Improved Timing Estimation Using Iterative Normalization Technique for OFDM S...
Improved Timing Estimation Using Iterative Normalization Technique for OFDM S...IJECEIAES
 
Composite Field Multiplier based on Look-Up Table for Elliptic Curve Cryptogr...
Composite Field Multiplier based on Look-Up Table for Elliptic Curve Cryptogr...Composite Field Multiplier based on Look-Up Table for Elliptic Curve Cryptogr...
Composite Field Multiplier based on Look-Up Table for Elliptic Curve Cryptogr...Marisa Paryasto
 
Performance Improvement of Vector Quantization with Bit-parallelism Hardware
Performance Improvement of Vector Quantization with Bit-parallelism HardwarePerformance Improvement of Vector Quantization with Bit-parallelism Hardware
Performance Improvement of Vector Quantization with Bit-parallelism HardwareCSCJournals
 
student-problem-solutions.pdf
student-problem-solutions.pdfstudent-problem-solutions.pdf
student-problem-solutions.pdfssuser4d4e5a
 
student-problem-solutions.PDF
student-problem-solutions.PDFstudent-problem-solutions.PDF
student-problem-solutions.PDFKarminderSingh7
 
Modelling Quantum Transport in Nanostructures
Modelling Quantum Transport in NanostructuresModelling Quantum Transport in Nanostructures
Modelling Quantum Transport in Nanostructuresiosrjce
 
Numerical computation of eigenenergy and transmission coefficient of symmetri...
Numerical computation of eigenenergy and transmission coefficient of symmetri...Numerical computation of eigenenergy and transmission coefficient of symmetri...
Numerical computation of eigenenergy and transmission coefficient of symmetri...IAEME Publication
 
Welcome to International Journal of Engineering Research and Development (IJERD)
Welcome to International Journal of Engineering Research and Development (IJERD)Welcome to International Journal of Engineering Research and Development (IJERD)
Welcome to International Journal of Engineering Research and Development (IJERD)IJERD Editor
 
Mapping between Discrete Cosine Transform of Type-VI/VII and Discrete Fourier...
Mapping between Discrete Cosine Transform of Type-VI/VII and Discrete Fourier...Mapping between Discrete Cosine Transform of Type-VI/VII and Discrete Fourier...
Mapping between Discrete Cosine Transform of Type-VI/VII and Discrete Fourier...IJERA Editor
 
Spectral approach to image projection with cubic
Spectral approach to image projection with cubicSpectral approach to image projection with cubic
Spectral approach to image projection with cubiciaemedu
 
Spectral approach to image projection with cubic b spline interpolation
Spectral approach to image projection with cubic b spline interpolationSpectral approach to image projection with cubic b spline interpolation
Spectral approach to image projection with cubic b spline interpolationiaemedu
 
Photoacoustic tomography based on the application of virtual detectors
Photoacoustic tomography based on the application of virtual detectorsPhotoacoustic tomography based on the application of virtual detectors
Photoacoustic tomography based on the application of virtual detectorsIAEME Publication
 
performance analysis of MUSIC and ESPRIT DOA estimation used in adaptive arra...
performance analysis of MUSIC and ESPRIT DOA estimation used in adaptive arra...performance analysis of MUSIC and ESPRIT DOA estimation used in adaptive arra...
performance analysis of MUSIC and ESPRIT DOA estimation used in adaptive arra...CSCJournals
 

Similar to Parallel algorithm for computing edt with new architecture (20)

ENHANCEMENT OF TRANSMISSION RANGE ASSIGNMENT FOR CLUSTERED WIRELESS SENSOR NE...
ENHANCEMENT OF TRANSMISSION RANGE ASSIGNMENT FOR CLUSTERED WIRELESS SENSOR NE...ENHANCEMENT OF TRANSMISSION RANGE ASSIGNMENT FOR CLUSTERED WIRELESS SENSOR NE...
ENHANCEMENT OF TRANSMISSION RANGE ASSIGNMENT FOR CLUSTERED WIRELESS SENSOR NE...
 
Implementation performance analysis of cordic
Implementation performance analysis of cordicImplementation performance analysis of cordic
Implementation performance analysis of cordic
 
A comparative study on multicast routing using dijkstra’s
A comparative study on multicast routing using dijkstra’sA comparative study on multicast routing using dijkstra’s
A comparative study on multicast routing using dijkstra’s
 
A comparative study on multicast routing using dijkstra’s, prims and ant colo...
A comparative study on multicast routing using dijkstra’s, prims and ant colo...A comparative study on multicast routing using dijkstra’s, prims and ant colo...
A comparative study on multicast routing using dijkstra’s, prims and ant colo...
 
11.quadrature radon transform for smoother tomographic reconstruction
11.quadrature radon transform for smoother  tomographic reconstruction11.quadrature radon transform for smoother  tomographic reconstruction
11.quadrature radon transform for smoother tomographic reconstruction
 
11.[23 36]quadrature radon transform for smoother tomographic reconstruction
11.[23 36]quadrature radon transform for smoother  tomographic reconstruction11.[23 36]quadrature radon transform for smoother  tomographic reconstruction
11.[23 36]quadrature radon transform for smoother tomographic reconstruction
 
Improved Timing Estimation Using Iterative Normalization Technique for OFDM S...
Improved Timing Estimation Using Iterative Normalization Technique for OFDM S...Improved Timing Estimation Using Iterative Normalization Technique for OFDM S...
Improved Timing Estimation Using Iterative Normalization Technique for OFDM S...
 
Composite Field Multiplier based on Look-Up Table for Elliptic Curve Cryptogr...
Composite Field Multiplier based on Look-Up Table for Elliptic Curve Cryptogr...Composite Field Multiplier based on Look-Up Table for Elliptic Curve Cryptogr...
Composite Field Multiplier based on Look-Up Table for Elliptic Curve Cryptogr...
 
Performance Improvement of Vector Quantization with Bit-parallelism Hardware
Performance Improvement of Vector Quantization with Bit-parallelism HardwarePerformance Improvement of Vector Quantization with Bit-parallelism Hardware
Performance Improvement of Vector Quantization with Bit-parallelism Hardware
 
student-problem-solutions.pdf
student-problem-solutions.pdfstudent-problem-solutions.pdf
student-problem-solutions.pdf
 
student-problem-solutions.PDF
student-problem-solutions.PDFstudent-problem-solutions.PDF
student-problem-solutions.PDF
 
E010632226
E010632226E010632226
E010632226
 
Modelling Quantum Transport in Nanostructures
Modelling Quantum Transport in NanostructuresModelling Quantum Transport in Nanostructures
Modelling Quantum Transport in Nanostructures
 
Numerical computation of eigenenergy and transmission coefficient of symmetri...
Numerical computation of eigenenergy and transmission coefficient of symmetri...Numerical computation of eigenenergy and transmission coefficient of symmetri...
Numerical computation of eigenenergy and transmission coefficient of symmetri...
 
Welcome to International Journal of Engineering Research and Development (IJERD)
Welcome to International Journal of Engineering Research and Development (IJERD)Welcome to International Journal of Engineering Research and Development (IJERD)
Welcome to International Journal of Engineering Research and Development (IJERD)
 
Mapping between Discrete Cosine Transform of Type-VI/VII and Discrete Fourier...
Mapping between Discrete Cosine Transform of Type-VI/VII and Discrete Fourier...Mapping between Discrete Cosine Transform of Type-VI/VII and Discrete Fourier...
Mapping between Discrete Cosine Transform of Type-VI/VII and Discrete Fourier...
 
Spectral approach to image projection with cubic
Spectral approach to image projection with cubicSpectral approach to image projection with cubic
Spectral approach to image projection with cubic
 
Spectral approach to image projection with cubic b spline interpolation
Spectral approach to image projection with cubic b spline interpolationSpectral approach to image projection with cubic b spline interpolation
Spectral approach to image projection with cubic b spline interpolation
 
Photoacoustic tomography based on the application of virtual detectors
Photoacoustic tomography based on the application of virtual detectorsPhotoacoustic tomography based on the application of virtual detectors
Photoacoustic tomography based on the application of virtual detectors
 
performance analysis of MUSIC and ESPRIT DOA estimation used in adaptive arra...
performance analysis of MUSIC and ESPRIT DOA estimation used in adaptive arra...performance analysis of MUSIC and ESPRIT DOA estimation used in adaptive arra...
performance analysis of MUSIC and ESPRIT DOA estimation used in adaptive arra...
 

More from IAEME Publication

IAEME_Publication_Call_for_Paper_September_2022.pdf
IAEME_Publication_Call_for_Paper_September_2022.pdfIAEME_Publication_Call_for_Paper_September_2022.pdf
IAEME_Publication_Call_for_Paper_September_2022.pdfIAEME Publication
 
MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...
MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...
MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...IAEME Publication
 
A STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURS
A STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURSA STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURS
A STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURSIAEME Publication
 
BROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURS
BROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURSBROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURS
BROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURSIAEME Publication
 
DETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONS
DETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONSDETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONS
DETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONSIAEME Publication
 
ANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONS
ANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONSANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONS
ANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONSIAEME Publication
 
VOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINO
VOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINOVOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINO
VOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINOIAEME Publication
 
IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...
IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...
IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...IAEME Publication
 
VISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMY
VISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMYVISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMY
VISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMYIAEME Publication
 
A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...
A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...
A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...IAEME Publication
 
GANDHI ON NON-VIOLENT POLICE
GANDHI ON NON-VIOLENT POLICEGANDHI ON NON-VIOLENT POLICE
GANDHI ON NON-VIOLENT POLICEIAEME Publication
 
A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...
A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...
A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...IAEME Publication
 
ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...
ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...
ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...IAEME Publication
 
INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...
INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...
INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...IAEME Publication
 
A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...
A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...
A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...IAEME Publication
 
EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...
EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...
EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...IAEME Publication
 
ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...
ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...
ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...IAEME Publication
 
OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...
OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...
OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...IAEME Publication
 
APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...
APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...
APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...IAEME Publication
 
A MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENT
A MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENTA MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENT
A MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENTIAEME Publication
 

More from IAEME Publication (20)

IAEME_Publication_Call_for_Paper_September_2022.pdf
IAEME_Publication_Call_for_Paper_September_2022.pdfIAEME_Publication_Call_for_Paper_September_2022.pdf
IAEME_Publication_Call_for_Paper_September_2022.pdf
 
MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...
MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...
MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...
 
A STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURS
A STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURSA STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURS
A STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURS
 
BROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURS
BROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURSBROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURS
BROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURS
 
DETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONS
DETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONSDETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONS
DETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONS
 
ANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONS
ANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONSANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONS
ANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONS
 
VOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINO
VOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINOVOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINO
VOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINO
 
IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...
IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...
IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...
 
VISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMY
VISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMYVISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMY
VISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMY
 
A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...
A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...
A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...
 
GANDHI ON NON-VIOLENT POLICE
GANDHI ON NON-VIOLENT POLICEGANDHI ON NON-VIOLENT POLICE
GANDHI ON NON-VIOLENT POLICE
 
A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...
A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...
A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...
 
ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...
ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...
ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...
 
INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...
INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...
INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...
 
A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...
A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...
A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...
 
EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...
EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...
EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...
 
ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...
ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...
ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...
 
OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...
OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...
OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...
 
APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...
APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...
APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...
 
A MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENT
A MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENTA MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENT
A MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENT
 

Parallel algorithm for computing edt with new architecture

  • 1. International JournalElectronics and Communication Engineering & Technology (IJECET), International Journal of of Electronics and Communication ISSN 0976 – & Technology (IJECET) ISSN 0976 – 6464(Print), ISSN 0976 – 6472(Online) IJECET Engineering 6464(Print), ISSN 0976 – 6472(Online) Volume 1, Number 1, Sep - Oct (2010), © IAEME Volume 1, Number 1, Sep - Oct (2010), pp. 01-17 ©IAEME © IAEME, http://www.iaeme.com/ijecet.html PARALLEL ALGORITHM FOR COMPUTING EDT WITH NEW ARCHITECTURE Er. Kirti Rawal Lecturer, RIEIT,Railmajra Punjab, E-Mail: erkirti.rawal@gmail.com Er. Sonia Lecturer, BBSBEC Fatehgarh Sahib Er. Rajeev Kumar Patial Sr.Lecturer, LPU Phagwara Mahesh Mudavath Lecturer, RIEIT, Railmajra Punjab, E-Mail: mahesh_chauhan22@yahoo.com ABSTRACT A distance transformation converts a binary image consisting of foreground and background pixels into one in where each pixel has a value equal to its nearest background pixel (alternatively, distances could be the to the nearest foreground pixel). This paper provides an area-efficient hardware solution to the computation of EDT on a binary image. A Parallel algorithm for computing EDT of an n×n image is presented. Pipelined 2D array architecture for hardware implementation is designed. The architecture has a regular structure with locally connected identical processing elements. Further, pipelining reduces hardware resources. Such array architecture is easily scalable to handle images of different sizes. Keywords – Distance Transforms, Euclidean Distance Transform, Parallel Algorithm, Pipelined Architecture. 1
  • 2. International Journal of Electronics and Communication Engineering & Technology (IJECET), ISSN 0976 – 6464(Print), ISSN 0976 – 6472(Online) Volume 1, Number 1, Sep - Oct (2010), © IAEME 1. INTRODUCTION A distance transform, also known as distance map or distance field, is a representation of a digital image. Applications of distance transform are numerous. These include shape analysis of objects [2], machine vision [3] and image matching [4]. Figure 1 distance transformation Three different distance metrics are commonly used which are following [1]: • Manhattan distance • Chessboard distance • Euclidean distance A. Manhattan Distance Transform The Distance between two points measured along axes at right angles. In a plane with p1 at (x1, y1) and p2 at (x2, y2), it is |x1 - x2| + |y1 - y2|. Manhattan distance is often used in integrated circuits where wires only run parallel to the x or y axis Manhattan distance is often used in integrated circuits where wires only run parallel to the x or y axis. Also known as rectilinear distance, Minkowski's L1 distance, taxi cab metric, or city block distance. The formula for this distance between a point x= (x1, x2, etc.) and a point n y= (y1, y2, etc.) is d = ∑ xi − yi i =1 Figure 2 Manhattan distance transformation 2
  • 3. International Journal of Electronics and Communication Engineering & Technology (IJECET), ISSN 0976 – 6464(Print), ISSN 0976 – 6472(Online) Volume 1, Number 1, Sep - Oct (2010), © IAEME B. Chessboard Distance Transform The Chessboard distance between two spaces on a chess board is the minimum number of moves a king requires to move between them. Below are the Chessboard distances of each square from the square f6. Chessboard Distance is also called maximum value distance or Chebyshev distance. Mathematically it can be written as DChebyshev(p, q) = maxi(| pi − qi |).The city block distance, chessboard distance or the combination of those two are used for the benefit of their simplified architectures and integer computations[5-7]. Figure 3 Chessboard Distance Transformations C. Euclidean Distance Transform Euclidean Distance Transformation (EDT) is used to convert a digital binary image consisting of object (foreground) and non object (background) pixels into another image where each pixel has a value of the minimum Euclidean distance from non object pixels. Considerable research has been done on development of algorithms for computation of the EDT. Several sequential [8-11] and parallel [12-16] algorithms are available. Some work on parallel algorithms targeted to general-purpose processors is also known [17, 18]. Out of these three distance transforms EDT find widespread use. 2. PARALLEL ALGORITHM In this paper, a parallel algorithm is presented. The salient feature of this algorithm is that the computation of EDT involves only integer arithmetic operations within a small neighbourhood of each pixel and hence it is suitable for mapping onto high 3
  • 4. International Journal of Electronics and Communication Engineering & Technology (IJECET), ISSN 0976 – 6464(Print), ISSN 0976 – 6472(Online) Volume 1, Number 1, Sep - Oct (2010), © IAEME speed array architecture. The Euclidean distance is given by dp = ∆r 2 + ∆c 2 [19]. ( r, c) of background pixels are initialized to (0, 0) and those of foreground pixels are computed iteratively starting from the pixels nearby background and moving towards the far away pixels. That is, dp lies within (k - 0.5, k + 0.5] i.e. for k =1 its value lies between 0.5 to 1.5.Hence dp is not integer because from 0.5 to 1.5 there are some floating point numbers i.e. 0.7, 0.9 etc. So we take d2p whose values lies within ( k2 - k, k2 + k) since d2p is an integer. However, d2p is quite large in magnitude and it requires a large storage space in hardware. For K=1, value lies within k2-k to k2+k = (12 -1) to (12 +1) = 0 to 2. Thus range of d2p is from 0 to 2. For K=2, value lies within k2-k to k2+k = (22 -2) to (22 +2) = 2 to 6. So we take ∂(p) which is less than d2p is given by ∂(p) = k2+k - d2p. Here d2p is derived first and then substituted to find ∂(p). A new integer quantity ∂(p) which is much smaller than d2(p) is defined as (k2 + k) - d2p. d2p can be derived using the already computed ( r, c) of eight neighbors pi, i = 1–8, surrounding p. It is given by [min ri2 + ci2] where ri = (pi) if pi is in the same row of p. Otherwise, ri = r(pi) + 1. The increment by 1 is due to p being displaced from pi by one row. Similarly, ci is given in terms of c(pi). 3. STEPS OF PARALLEL ALGORITHM There are three steps of parallel algorithm which are used to compute Euclidean distance transform. Step 1: Compute ri, ci and ∂i , i = 1 to 8. Figure 4 Euclidean distance from reference value to the same column (above) 4
  • 5. International Journal of Electronics and Communication Engineering & Technology (IJECET), ISSN 0976 – 6464(Print), ISSN 0976 – 6472(Online) Volume 1, Number 1, Sep - Oct (2010), © IAEME Euclidean Distance dp= ∆r 2 + ∆c 2 d2 p = r2 + c2 d2 p = 12 + 02 = 1 ∂(p) = k2+k - d2p = 12+1 – 1 = 1 In this way all values of Euclidean distance for k = 1 are computed. Figure 5 Euclidean distance values for k=1 Figure 6 Euclidean distance from Reference value to the different row (Above) and different column (L.H.S) Euclidean Distance dp= ∆r 2 + ∆c 2 d2p = r2 + c2 d2p = 22 + 12 = 5 ∂ (p) = k2+k - d2p = 22+2 – 5 = 1 In this way all values of Euclidean distance for k = 2 are computed. 5
  • 6. International Journal of Electronics and Communication Engineering & Technology (IJECET), ISSN 0976 – 6464(Print), ISSN 0976 – 6472(Online) Volume 1, Number 1, Sep - Oct (2010), © IAEME Figure 7 Euclidean distance values for k=2 Figure 8 Euclidean distance values from reference value to corner side (above) Euclidean Distance dp= ∆r 2 + ∆c 2 d2 p = r2 + c2 d2 p = 22 + 22 = 8 ∂(p) = k2+k - d2p = 32+3 – 8 = 4 In this way all values of Euclidean distance for k = 3 are computed. 6
  • 7. International Journal of Electronics and Communication Engineering & Technology (IJECET), ISSN 0976 – 6464(Print), ISSN 0976 – 6472(Online) Volume 1, Number 1, Sep - Oct (2010), © IAEME Figure 9 Euclidean distance values for k = 3 Step 2: To find Maximum values Consider ∂i values corresponding to neighbors pi whose done (pi) = 1. Find the maximum, say ∂m. In step 2 , d2(p) can be rewritten as min[d2(pi) + Ri + Ci] where Ri = 0 if pi is in the same row of p. Otherwise, Ri = 2 r(pi) + 1. ∂ (p) is now derived as follows. ∂(p) = k2+k - d2p = max [ k2+k - d2 pi - Ri - Ci] = max [∂ pi - Ri - Ci] = max [∂i ] Consider iteration k = 2. ∂ of those twelve pixels whose ( r, c) have been computed at k =1 are incremented by 2k (i.e. 4). Figure 10 Maximum value of Euclidean distance from reference value to different row and different column (L.H.S) 7
  • 8. International Journal of Electronics and Communication Engineering & Technology (IJECET), ISSN 0976 – 6464(Print), ISSN 0976 – 6472(Online) Volume 1, Number 1, Sep - Oct (2010), © IAEME = 5 - 3 – 3 = -1 Where Ri = 2 rpi + 1 and Ci = 2 cpi + 1 = 2× 1+1 = 3 = 2× 1+1 = 3 Step 3: To find overlapped delta values, If done(p) = 0 and ∂m ≥ 0, then r(p)= rm, c(p)= cm, ∂ (p) =∂m and done(p) =1. If done(p) = 1, then ∂(p) = ∂(p) + 2k. To keep track of pixels whose ( r, c) have been computed, a flag done is assigned to each pixel, whose value is set to 1 when the transform values of pixels are computed at any iteration. Overlapped values for k=1 are computed as follows If previous value of ∂(p) is 0 (for k=0), then value for k=1 are computed by using the formula ∂(p) = ∂(p) + 2k. = 0 + 2×1 = 2 Figure 11 Overlapped value in k = 1 Similarly overlapped values for k=2 are computed as follows If previous value of ∂(p) is 2 (for k=1), then value for k=2 are computed by using the formula max (∂i ) = max (∂pi ) - Ri - Ci ∂(p) = ∂(p) + 2k. = 2 + 2×2 = 6 8
  • 9. International Journal of Electronics and Communication Engineering & Technology (IJECET), ISSN 0976 – 6464(Print), ISSN 0976 – 6472(Online) Volume 1, Number 1, Sep - Oct (2010), © IAEME Figure 12 Overlapped value in k = 2 Similarly overlapped values for k=3 are also computed by using the formula. ∂(p) = ∂(p) + 2k. = 6 + 2×3 = 12 In this way all the overlapped values of delta are computed. 4. PIPELINED ARCHITECTURE FOR COMPUTING EDT The computation of ∂i, Ri and Ci are computed first based on the position of neighbors pi. Ri (or Ci) takes either 0 or 2 r(pi) + 1 (or 2 c(pi) + 1). Therefore, the computation of ri and ci requires incrementers while the computation of ∂i requires adders and subtractors [32]. Pipelined Architecture for computing EDT is as shown in figure 13 Squaring Circuit for r and c: Squaring circuit is used to square the inputs of r and c in order to get the output rsq and csq. The maximum value of r and c is 2 so only two bits are required to represent 0,1and 2. The maximum value of rsq and csq is 4 so four bits are used to represent 0,1and 4. Squaring Circuit for k: Squaring circuit is used to square the inputs of k in order to get the output ksq. The maximum value of k is 3 so only two bits are required to represent 0, 1, 2 and 3. The maximum value of ksq is 9 so four bits are used to represent 0, 1, 4 and 9. 9
  • 10. International Journal of Electronics and Communication Engineering & Technology (IJECET), ISSN 0976 – 6464(Print), ISSN 0976 – 6472(Online) Volume 1, Number 1, Sep - Oct (2010), © IAEME Full Adder for k and ksq: Here 4bit full adder is used to add the values of k and ksq in order to get the output tot. The maximum value of k is 3 and ksq is 9 so four bits are required to represent ksq. The maximum value of tot is 12 so four bits are used to represent tot values. In this case there is no carry input i.e. cin1 and no carry output i.e. cout1 so both will remain zero. Subtractor for dp and total: Here subtractor is used to subtract the values of dp and tot in order to get the output del_p. The maximum value of dp is 8 and tot is 12 so four bits are required to represent dp and tot values. Del_p (delta) comes at the output through wire del_p_1. Pipelined Register1: Pipelined register1 is used to store all the r, c and delta values which are calculated in stage 1.The inputs of pipelined register1 is r1_0 to r1_29, c1_0 to c1_29 and del1_p0 to del1_p29 and output of pipelined register 1 is r0 to r29, c0 to c29 and del_p0 to del_p29.The main advantage of using pipelined register1 is the moment at which value is stored at the input, it comes at the output of pipelined register instantly. It does not wait to fill all the values in the register. These r and c values are those values which we are applying at the input of stage 1 and delta values are coming from the output of subtractor. With the help of wire we are using r and c values at the input of pipelined register1. So that EDT is computed only for those r and c values rather than any other value. Counter: Five bit counter is used to give output of subtractor i.e. delta values to input of pipelined register1.The inputs of five bit counter is clk_1 and clear having 1bit each. The output of counter is q_1 (5bit). Now q_1 is assigned to address of pipelined register1 so that when the output of counter is incremented then address is also incremented by filling delta values (del_p_1) one by one. When output of counter reach at 29th value, at that time pipelined register is completely filled. By giving next clk_1 again output of counter and address comes at zero position. 10
  • 11. International Journal of Electronics and Communication Engineering & Technology (IJECET), ISSN 0976 – 6464(Print), ISSN 0976 – 6472(Online) Volume 1, Number 1, Sep - Oct (2010), © IAEME Figure 13 Pipelined Architecture for computing EDT 11
  • 12. International Journal of Electronics and Communication Engineering & Technology (IJECET), ISSN 0976 – 6464(Print), ISSN 0976 – 6472(Online) Volume 1, Number 1, Sep - Oct (2010), © IAEME In this way all values of delta i.e. EDT are computed with this new architecture. The pipelined architecture consists of various blocks such as squaring circuit, full adder, full subtractor, pipelined registers, comparators and multiplexers. Out of these blocks, output of each block has to be computed individually 5. SIMULATION RESULTS In order to obtain results Verilog language has been used. Verilog Hardware Description Language (HDL) is used for computing EDT, which can describe hardware requirements of the architecture not only at the gate level, register level but at the algorithmic level [20]. Verilog HDL is one of the two most common Hardware Description Languages (HDL) used by integrated circuit (IC) designers [21]. For writing the code Xilinx is used and for simulation or to see the output waveforms Modelsim has been used. Figure 14, 15, 16 explains how the r_t, c_t, k_t, q_5_t, k_new_t, c_in1_t, cin1_t, clk_1_t, clear_1_t, and flag_t inputs are applied to produce output output_data. Here we consider 30 cases, in which different values of r_t and c_t are applied in order to produce different values of delta. Carry inputs are always zero and clk_t and flag_t is always 1. The value of k_t varies from 1 to 3. Here we take k_t = 01, q_5_t and k_new_t=11.Giving all these inputs we get complete delta values for 30 inputs i.e. output_data. Figure 14 Waveform of Calculation of overlapped delta operation 12
  • 13. International Journal of Electronics and Communication Engineering & Technology (IJECET), ISSN 0976 – 6464(Print), ISSN 0976 – 6472(Online) Volume 1, Number 1, Sep - Oct (2010), © IAEME Figure 15 Waveform of Calculation of overlapped delta operation Figure 16 Waveform of Calculation of overlapped delta operation 13
  • 14. International Journal of Electronics and Communication Engineering & Technology (IJECET), ISSN 0976 – 6464(Print), ISSN 0976 – 6472(Online) Volume 1, Number 1, Sep - Oct (2010), © IAEME 6. CONCLUSIONS A distance transformation converts a binary image consisting of foreground and background pixels into one in where each pixel has a value equal to its nearest background pixel (alternatively, distances could be the to the nearest foreground pixel). The types of transforms used generally are city block distance transform, chessboard distance transform and Euclidean distance transform. Of these EDT find widespread use in view of the natural metric employed. The pipelined architecture is presented in this dissertation proved to be applicable for computation of Euclidean distance transform. It comprises two dimensional arrays of locally interconnected processing elements where each element is a sequential logic and all elements are operated synchronously. This architecture is designed in such a way that it works on the steps of parallel algorithm. The algorithm involves only integer arithmetic operations. The architecture is fully digital and it is easily scalable for an image of any n×n size. 7. FUTURE SCOPE Proposed methodology can be used as an important tool in image analysis. Keeping in view the importance of image processing, it is required that the architecture should be robust, accurate as well as faster in order to handle images of different sizes. So, there is always perpetual need for improvements. 1. The ideas presented for the case of 4 pixels per processing element readily extend to the case of more than 4 pixels per processing element (such as 9,16 and so on). 2. The given architecture can be further modified to handle 3D images. 3. The work can be carried out to make it more robust. 4. The given architecture can be implemented on FPGA device. 5. The given source code is optimized to get synthesizable results. 14
  • 15. International Journal of Electronics and Communication Engineering & Technology (IJECET), ISSN 0976 – 6464(Print), ISSN 0976 – 6472(Online) Volume 1, Number 1, Sep - Oct (2010), © IAEME 8. REFERENCES [1] C. Tony Huang and O. Robert Mitchell (1991), “Rapid Euclidean distance transform using grayscale morphology decomposition”, IEEE Computer Society Conference on Pattern Analysis and Machine Intelligence ,1991,vol.14, pp. 695- 697. [2] P. Danielsson (1978), “A new shape factor”, Computer Graphics and Image Processing 1978, vol.2, pp. 292–299. [3] D.Paglieroni (1992), “Distance transforms: properties and machine vision applications”, CVGIP: Graphical Models and Image Processing, vol.54, 1992, pp. 56–74. [4] D.P. Huttenlocher, G.A. Klanderman, W.J. Rucklidge (1993), “Comparing images using the Hausdorff distance”, IEEE Transactions on Pattern Analysis and Machine Intelligence, vol. 15 ,1993, pp. 850–863. [5] P. A. Maragos and R. W. Schafer, “Morphological skeleton representation and coding of binary images,” IEEE Trans. Acoustic Speech, Signal Processing, vol. ASSP-34, no.5, 1986, pp. 1228-1244. [6] S. R. Stemberg, “Grayscale morphology,” Computer Vision Graphics and Image Processing, vol. 35, 1986, pp. 333-355. [7] J. Toriwaki and S. Yokoi. “Distance transformations and skeletons of digitized pictures with applications,” in Progress in Pattern Recognition, 1981, pp. 187-264. [8] H. Breu, J. Gil, D. Kirkpatrick, M. Werman (1995), “Linear time Euclidean distance transform algorithms”, IEEE Transactions on Pattern Analysis and Machine Intelligence, vol.17 ,1995, pp. 529 533. [9] S. Pavel, S.G. Akl (1995), “Efficient algorithms for the Euclidean distance transform”, Parallel Processing Letters, vol.5, 1995, pp. 205–212. [10] Hinnik Eggers (1998), “Two fast Euclidean distance transformations in z2 based on sufficient propagation”, Computer Vision and Image Understanding vol.69, 1998, pp. 106–116. [11] J. Maurer, R. Calvin, R. Qi, V. Raghavan (2003), “A linear time algorithm for computing exact Euclidean distance transforms of binary images in arbitrary 15
  • 16. International Journal of Electronics and Communication Engineering & Technology (IJECET), ISSN 0976 – 6464(Print), ISSN 0976 – 6472(Online) Volume 1, Number 1, Sep - Oct (2010), © IAEME dimensions”, IEEE Transactions on Pattern Analysis and Machine Intelligence, vol.25, 2003, pp. 265–270. [12] Hugo Embrechts, Dirk Roose (1996), “Parallel Euclidean distance transformation algorithm”, Computer Vision and Image Understanding vol.63, 1996, pp. 15–26. [13] Hinnik Eggers (1996), “Parallel Euclidean distance transformations in zng”, Parallel Recognition Letters, vol. 17, 1996, pp. 751–757. [14] T. Hirata, “A unified linear-time algorithm for computing distance maps”(1996), Information Processing Letters, vol.58, 1996, pp. 129–133. [15] N. Sudha, S. Nandi, K. Sridharan (1998), “Efficient computation of Euclidean distance transform for applications in image processing”, Proceedings of IEEE TENCON vol.2,1998, pp. 49–52. [16] Yu-Hua Lee, Shi-Jinn Horng, Jennifer Seitzer (2003), “Parallel computation of the Euclidean distance transform on a three-dimensional image array”, IEEE Transactions on Parallel and Distributed Systems, vol. 14,2003, pp. 203–212. [17] L. Chen, H.Y.H. Chuang (1995), “An efficient algorithm for complete Euclidean distance transform on mesh-connected SIMD”, Parallel Computing, vol. 21, 1995, pp. 841–852. [18] Y. Pan, M. Hamdi, K. Li (2000), “Euclidean distance transform for binary images on reconfigurable mesh-connected computers”, IEEE Transactions on Systems, Man Cybernetics, vol. 30 ,2000, pp. 240–244. [19] N. Sudha (2005), “A pipelined array architecture for Euclidean distance transformation and its FPGA implementation”, Microprocessors and Microsystems, vol. 29, 2005, pp. 405–410. [20] J. Bhaskar (1998), “Verilog HDL Synthesis a Practical Primer”, second edition, 1998, pp.1-230. [21] Peter M. Nyasulu (2001), “Introduction to Verilog”, third edition, 2001, pp.1-30. 16
  • 17. International Journal of Electronics and Communication Engineering & Technology (IJECET), ISSN 0976 – 6464(Print), ISSN 0976 – 6472(Online) Volume 1, Number 1, Sep - Oct (2010), © IAEME BIO DATA OF AUTHOR’S Ms. Kirti Rawal is working as an Lecturer in the Electronics and Communications Engineering Department, R.I.E.I.T, Railmajra (Punjab). She earned her M.Tech (ECE) Degree from BBSBEC Fatehgarh Sahib (Punjab) in 2010 and B.Tech (ECE) Degree from IITT Pojewal (Nawanshahr). She has published 2 research papers in International Conferences and national Conferences. She is a Life Membership of the “Indian Society for Technical Education (ISTE)”. Mr. Mahesh Mudavath is working as an Lecturer in the Electronics and Communications Engineering Department, R.I.E.I.T, Railmajra (Punjab). He earned his M.Tech (VLSI Design) Degree from C-DAC, Mohali (Punjab) in 2009 and B.Tech (ECE) Degree from JNTU, Hyderabad (Andhra Pradesh). He has published 6 research papers in International Journals and International Conferences. He is a Life Membership of the “Indian Society for Technical Education (ISTE)”. 17