2006
DOI: 10.1007/11758501_63
|View full text |Cite
|
Sign up to set email alerts
|

Simulation of Time-Multiplexing Cellular Neural Networks with Numerical Integration Algorithms

Abstract: A novel approach to simulate Cellular Neural Networks (CNN) is presented in this paper. The approach, time-multiplexing simulation, is prompted by the need to simulate hardware models and test hardware implementations of CNN. For practical applications, due to hardware limitations, it is impossible to have a one-to-one mapping between the CNN hardware processors and all the pixels of the image. This simulator provides a solution by processing the input image block by block, with the number of pixels in a block… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
4
0

Year Published

2007
2007
2022
2022

Publication Types

Select...
5

Relationship

2
3

Authors

Journals

citations
Cited by 5 publications
(4 citation statements)
references
References 9 publications
0
4
0
Order By: Relevance
“…where we use the minimum value of x i j (t) in equation (12). Since the cell is inside the holes, its initial output of non-diagonal black pixels remain unchanged.…”
Section: Sub Casementioning
confidence: 99%
See 2 more Smart Citations
“…where we use the minimum value of x i j (t) in equation (12). Since the cell is inside the holes, its initial output of non-diagonal black pixels remain unchanged.…”
Section: Sub Casementioning
confidence: 99%
“…Three of the most widely used Numerical Integration Algorithms are used in Raster CNN Simulation described here. They are the Euler's Algorithm, RK-Gill Algorithm discussed by Oliveria [8] and the RK-Butcher Algorithm discussed by Badder [5,6] and Murugesh and Murugesan [10,11,12].…”
Section: Numerical Integration Algorithmsmentioning
confidence: 99%
See 1 more Smart Citation
“…In numerous felds like the monitoring system of the bank self-service cash machine, the new face-brushing technology of Alipay, the verifcation of identity by each application face scanning, along with the face unlocking of the mobile phone, FDR is applied with the continuous enhancement of science and technology [10]. Te FDR methodologies, which have been well-studied in the computer vision domain, have been amalgamated with these systems in an attempt to handle certain external issues like computational cost, face capture angle, facial expression, the existence of hair, along with facial alteration relying on the luminosity, time, usage of accessories or ornaments, classifer performance, ethnic variations amongst others, and longer distances as of the camera [11,12].…”
Section: Introductionmentioning
confidence: 99%