Learn More
Elliptic curve cryptography (ECC) has been the focus of much recent attention since it ooers the highest security per bit of any known public key cryptosystem. This beneet of smaller key sizes makes ECC particularly attractive for embedded applications since its implementation requires less memory and processing power. In this paper a microcoded Xilinx(More)
Two-dimensional (2-D) image-matrix-based projection methods for feature extraction are widely used in many fields of computer vision and pattern recognition. In this paper, we propose a novel framework called sparse 2-D projections (S2DP) for image feature extraction. Different from the existing 2-D feature extraction methods, S2DP iteratively learns the(More)
In this paper, we study the distributed synchronization and pinning distributed synchronization of stochastic coupled neural networks via randomly occurring control. Two Bernoulli stochastic variables are used to describe the occurrences of distributed adaptive control and updating law according to certain probabilities. Both distributed adaptive control(More)
Many methods have been proposed for character recognition but they are often subjected to substantial constraints, due to unexpected difficulties encountered in real-life images. A real-life image may be complex for a variety of reasons. Rust, mud, peeling paint, or fading color may distort the images of the characters; uneven lighting may make them(More)
In this paper, multiobjective synchronization of chaotic systems is investigated by especially simultaneously minimizing optimization of control cost and convergence speed. The coupling form and coupling strength are optimized by an improved multiobjective evolutionary approach that includes a hybrid chromosome representation. The hybrid encoding scheme(More)