SlideShare une entreprise Scribd logo
1  sur  6
Télécharger pour lire hors ligne
Time multiplexing CNN simulator using RK7(5)
Osama H. Abdelwahed
1,2
and M. El-Sayed Wahed
2
1
Mathematics Department, Faculty of Science, Suez Canal University, Egypt
2
Department of Computer Science, Faculty of Computers and Informatics, Suez Canal University, Egypt
-************************-
Abstract
RK7(5) is a numerical method was used to minimize the local truncation error using selection step size algorithm.
Time multiplexing CNN simulator was modied using RK7(5) to improve the performance of the simulator and the
quality of the output image for edge detection. The results showed better performance than those in the literature.
Keywords Cellular neural network; Image processing; CNN simulator; RK7(5); Local truncation error
-************************-
1 Introduction
Edge detection is considered to be one of the essential
steps in identifying an object in image processing. Many
techniques have been proposed to detect edges in image
processing using cellular neural network(CNN) [8]. CNN
was introduced by Chua and Yang [3] in 1988. The main
properties of CNN are their local interactions among their
nearby cells in addition to their parallel processing which
is considered to be one of the most important aspects in
CNN. CNN has many applications in image processing
like medical image segmentation, image denoising, and
edge detection. Time multiplexing CNN simulator was
proposed by C.C. Lee and Jose Pineda de Gyvez [6] in
1994. They used the numerical integration algorithms
Euler, the improved Euler and Runge Kutta method to
solve the dierential equations which represent CNN.
Their results for edge detection need to be improved and
also the computation time need to be decreased. Another
work presented by V. Murugesh and K. Murugesan[8].
They introduced the numerical methods, RK-Gill [10]
and RK-Butcher [1, 2, 7], but unfortunately, the obtained
results need to be improved. So we proposed RK7(5)
[12] as a numerical integration method used to minimize
the local truncation error using the selection step size
algorithm [11]. Our proposed method showed better
results than those in the literature. The obtained results
included both faster performance and better edge detec-
tion.
RK7(5) is proposed to achieve two targets: First, to
increase the eciency of the time multiplexing CNN
simulator by decreasing the needed simulation time;
Second, to improve the quality of the edge detection
results. The organization of the paper is as follows:
section (2) presented CNN in details. In Section (3)
time multiplexing CNN simulator was discussed.
Section (4) presented the proposed method. Results of
the performance of the simulator and edge detection
were discussed in section (5). Section 6 discussed the
Conclusion.
2 Overview of CNN
Cellular neural network is a method used both the con-
cepts of neural networks and cellular automata in which
its cells are connected locally through their neighbors and
processed in parallel through their interactions [3].
The r-neighborhood of CNN is dened as in the follow-
ing:
Nr(i, j) = {C(k, l)} | max
i=1,M;j=1,N
{|k − i| , |l − j|} ≤ r,
(1)
Where r  0.
The expression 1− neighborhood is expressed for
r = 1,  2− neighborhood is expressed for r = 2, 3−
neighborhood is expressed for r = 3, etc. as illustrated
in Fig. (1).
(a) 1− neighbor-
hood
(b) 2− neighbor-
hood
(c) 3− neighborhood
Figure 1: Examples of r− neighborhood
Page 171
A two dimensional CNN with size equal to 4 has shown
in Fig. (2), where each cell has interactions with its nearby
cells locally for the 1− neighborhood case.
Figure 2: CNN structure with size = 4
The most important operators in CNN are the tem-
plates A and B which represent the output feedback and
the input control respectively. They control the behavior
of CNN in addition to the bias value I.
According to [3], the CNN equation is represented as in
the following:
C
dxij
dt
(t) = −
1
Rx
xij(t) +
C(k,l)
A(i; j; k, l)ykl(t)+
C(k,l)
B(i; j; k, l)ukl(t) + Iij (2)
Iyx controls the behavior of the following output function
yij:
f (x) =
1
2
(|x + 1| − |x − 1|) (3)
Where,
Iyx =
1
Ry
f (xij) (4)
The output function yij = IyxRy can represented as in
the following:
yij = f (xij (t)) =
1
2
(|xij (t) + 1| − |xij (t) − 1|) (5)
The general form of CNN dynamics is represented by
the following equation:
dxij
dt
(t) = −xij(t) +
C(k,l)
A(i; j; k, l)ykl(t)+
C(k,l)
B(i; j; k, l)ukl(t) + Iij (6)
The dierent values of the templates A and B and the
bias value I determines the type of application used in
CNN. For example, edge detection, noise removal, or pat-
tern recognition has dierent template values.
The templates of CNN are space invariant i.e. for exam-
ple the template B(i, j; i + 1, j) is the same for all values
at (i, j).
3 Time Multipexing CNN simula-
tor
The time multiplexing CNN simulator [6] was proposed
to solve the problem of hardware implementation. From
hardware point of view, may be there are thousands of
pixels need to be implemented using the single layer CNN
simulator [5]. It is very dicult to manage this problem
because of the limitation of the hardware. Hence the time
multiplexing algorithm was proposed to x this complex
problem by dividing the input image into a number of sub-
images whose size equal to to the size of the block of CNN
processors. In this case, each block will process a sub-
image using single layer CNN simulator till it converges.
The algorithm continues for the next sub-images using the
same procedure till the whole image will be processed [6].
Although the algorithm succeeded to solve the problem of
the hardware limitation, some side eects appeared. The
border pixels for each sub-image have incorrect results be-
cause there is no information for the neighbors which re-
sults in two erroneous values. The rst error is occurred
because of the eect of the template B. This error is com-
puted using the following formula [9]:
EB
ij =
3
i=1
bi,j+1sign (ui,j+1) (7)
Where bi,j+1 represents the values missed by using the
template B due to the absence of the input signals ui,j+1.
And sign() is the sign function which is used to represent
the pixel status either black or white. This error depends
on the input image and the template value.
The second error appeared as a result of the eect of the
template A. This error is evaluated using the following
equation:
EA
ij =
3
i=1
ai,j+1yi,j+1 (t) (8)
Since ai,j+1 is the error obtained due to the template A
Page 172
because of the absence of the values of yi,j+1 (t).
To minimize the errors EB
ij and EA
ij , we exploit the
advantage of CNN in which there is a local interaction
among neighboring cells. First, to minimize the error, EB
ij
, we chose a belt of pixels from the input image equals
to the radius of the neighborhood of CNN around each
sub-image. Second to minimize the error, EA
ij, the pixels
between adjacent sub-images were overlapped and each
cell in the border can interact with its neighbors as in-
terior cells. The minimum overlap width is twice of the
neighborhood's radius of the CNN [9].
Although overlap property improved the interaction
among neighboring cells, the simulation time increased.
Fortunately, the big chance of having the pixels of each
sub-image all black or all white helped in reducing the
simulation time nearly to the time consumed in the case
of using single layer CNN simulator. Since all black-block
or all white-block will be simulated one time, after con-
vergence all nal states were saved in the memory. Every
time all black-block or all white-block encountered again ,
their nal states are just restored from the memory since
there is no need for simulation again. The structure of
time multiplexing CNN simulator is demonstrated in Fig.
(3).
Figure 3: The structure of time multiplexing CNN simu-
lator [9]
The steps of the time multiplexing CNN algorithm [9]
with RK7(5) are summarized as follows:
1. Read input image
2. Divide the input image into a number of m blocks
3. Construct for each block, a belt of cells around it with
size equal to the radius of the neighborhood from the
input image
4. Between each two blocks construct an overlapped cells
with size equal to the twice of the radius of the neigh-
borhood
5. For each block, apply single layer CNN simulator [6]:
(a) Read block C
(b) Process all black-blocks or all white-blocks once
and after convergence, store their state values in
the memory
(c) for each black or white block encountered again,
just restore its state values from the memory
(d) If the block didn't converge yet, compute its new
state values using the equation (6) by applying
RK7(5)
(e) If the new state values are not the nal states(
didn't converge), go to (a)
(f) Compute the error tolerance EA
ij and EB
ij for the
templates A and B respectively for block C.
6. End
The most important point of the above steps will be the
proposed numerical integration algorithm RK7(5) that
will be presented in section (4.1). The main purpose of
this algorithm is to reduce the CPU time or simulation
time and to improve the edge detection results.
4 The numerical integration meth-
ods
Euler, RK-Gill [10] and RK-Butcher [1, 2] are three
numerical integration methods used in the literature to
solve the non linear dierential equations which represent
CNN dynamics. Section (4.1 ) discussed the proposed
numerical integration algorithm RK7(5).
4.1 The numerical integration method
RK7(5)
RK7(5) [12] was proposed as a new technique used in
the time multiplexing CNN simulator[9] to improve the
performance of the time multiplexing CNN simulator
and edge detection results. The algorithm is based
on minimizing the local truncation error and choosing
an adaptive step size value using the selection step size
algorithm. The equations of RK7(5) [12] are shown below:
Page 173
kij
1 = τf (xij (nτ))
kij
2 = τf (xij (nτ)) +
1
18
kij
1
kij
3 = τf (xij (nτ)) +
1
9
kij
1
kij
4 = τf (xij (nτ)) +
1
24
kij
1 +
1
8
kij
2
kij
5 = τf (xij (nτ)) +
2183971
4000000
kij
1
−
8340813
4000000
kij
3 +
3968421
2000000
kij
4
kij
6 = τf (xij (nτ)) −
695768212
746374411
kij
1
−
1803549175
7007942496
kij
3 +
3474507053
6790877290
kij
4
+
2188198899
15264927763
kij
5
kij
7 = τf (xij (nτ)) −
118949348557
8390623634
kij
1
+
53094780276
9800512003
kij
3 −
8415376229
2277049503
kij
4
−
18647567697
10138317907
kij
5 +
275514944893
11905950217
kij
6
kij
8 = τf (xij (nτ)) −
30828057951
7654644085
kij
1
−
4511704
324729
kij
3 +
16217851618
1651177175
kij
4
+
282768186839
40694064384
kij
5 −
104400780537
15869257619
kij
6
+
5409241639
9600177208
kij
7
kij
9 = τf (xij (nτ)) −
133775720546
26753383835
kij
1
+
49608695511
4066590848
kij
3 −
5989647201
7901259813
kij
4
−
48035527651
5727379426
kij
5 +
86266718551
10188951048
kij
6
−
7751618114
23575802495
kij
7 +
2289274942
8464405725
kij
8
The solution of RK7(5) is given below:
xij ((n + 1) τ) = xij (nτ) +
597988726
12374436915
kij
1 +
3138312158
11968408119
kij
4 +
480882843
7850665645
kij
5 +
988558885
3512253271
kij
6 +
5302636961
26425940286
kij
7 +
1259489433
12163586030
kij
8 +
1016647712
23899101975
kij
9
(9)
Our method is based on applying adaptive step size
selection method [4] in time multiplexing CNN simulator
using RK7(5).
The algorithm divides the input image into blocks
and single layer CNN simulator is applied for each
block. According to [4], The step size,h of p(q)−order
RK methods is computed using the error per unit step
(EPUS) [11] by using the following equation:
hn+1 = f1hn
tolerance
errn
1
q+1
, (10)
Where f1 is the factor of safety and hn+1 = xn+1 − xn
is evaluated according to the estimation of errn which is
approximated using the equation[4]:
errn
yn − ˆyn
hn
(11)
Since ynand ˆyn are the estimated solutions of order pth
and qth respectively.
And tolerance represents the required tolerance.
If errn+1 ≤ tolerance, then yn+1 is applied otherwise,
Eq. (10) is recalculated by errn → errn+1.
So we propose Rk7(5) to get better results than those
in the literature by reducing the computation time and
improving the edge detection.
5 Simulation Results
The input image which is used for testing is the Mona Lisa
image. The edge detection results are shown in Fig. (4).
The input image and the edge detection results are shown
in Fig. (4a) and Fig. (4b) respectively.
(a) Input image (b) Output image
Figure 4: Edge detection results
The performane results are shown in Fig. (5) since
the simulation results are shown in Fig. (5a) and the
maximum step size for all techniques are shown in Fig.
(5b). The results obtained by simulating a small image of
Mona Lisa for edge detection.
Page 174
(a) Simulation time for 4 dierent techniques
(b) Maximum h for 4 dierent techniques:
1-Edge detection 2:Averaging template 3:Connected component
Figure 5: Performance results of the proposed method
From these results we notice that the value of the step
size h using our method is higher than those in the related
work. Hence the simulation time for the proposed method
is decreased. . We notice that the value of h is considered
to have a value to be increased to some range in order to
avoid the divergence status. On the other hand, the value
of h should be not very small because this implies more
computation time as in the case of using Euler method.
Method EA
EB
Local Truncation Error
Euler 0.785 0.885 0.7365
RK-Gill 0.676 0.764 0.6542
RK-Butcher 0.543 0.551 0.5754
RK 6(4) 0.329 0.428 0.457
Table 1: Results of the error tolerances EA
, EB
and Local
Truncation Error
Table (1) demonstrates that the results of the error
tolerances EA
and EB
and the local minimum truncation
error using RK7(5) are less than those in the literature.
The error tolerance represent the average of the error
tolerances of the blocks of the input image. Also the simu-
lation time is better than using RK-Gill and RK-Butcher
methods found in the literature. So these results prove
that our proposed method is promising when compared
with those in the literature.
So the proposed method improved the results found
in the literature by minimizing the error tolerances EA
and EB
and the local truncation error for each step
which means that the obtained results using our proposed
method has a good impact in decreasing the CPU time
which is taken by the proposed simulator. In addition,
the edge detection results were better if they were com-
pared by the results found in the literature.
6 Conclusion
Our method used the selection step size algorithm to
get better results using RK7(5). The time multiplexing
CNN simulator using RK7(5) has shown better results for
both the simulation time and edge detection results. This
means that the performance of our method is better than
those in the literature. Also, the obtained results of the
error tolerances for the proposed method of time multi-
plexing CNN simulator is less than those found in the
literature. For future work, we are planning to present
more ecient numerical integration algorithms which can
improve the performance of the simulator in addition to
the quality of the output image for edge detection.
References
[1] M. Bader. A comparative study of new trunca-
tion error estimates and intrinsic accuracies of some
higher order runge-kutta algorithms. Computers and
Biomedical Research Chemistry, pages 121124, 1987.
[2] M. Bader. A new technique for the early detection of
stiness in coupled dierential equations and applica-
tion to standard runge-kutta algorithms. Theoretical
Chemistry Accounts, pages 215219, 1988.
[3] L. O. Chua and L. Yang. Cellular neural networks:
Theory and applications. IEEE Trans. Circuits and
Systems, 1988.
[4] T. E. Hull, W. H. Enright, B. M. Fellen, and A. E.
Sedgwick. Comparing numerical methods for ordi-
nary dierential equations. Comparing numerical
methods for ordinary dierential equations, 9:603
637, 1972.
[5] C.C. Lee and JP. de. Gyvez. Single-layer cnn simu-
lator. In IEEE International Symposium on Circuits
and Systems, 1994.
Page 175
[6] C.C. Lee and JP. de. Gyvez. Time-multiplexing cnn
simulator. In Proc. IEEE Int. Symposium on Circuits
and Syst., pages 407410, Dec. 1994.
[7] K. Murugesan, S. Sekar, V. Murugesh, and J.Y. Park.
Numerical solution of an industrial robot arm con-
trol problem using the rk-butcher algorithm. Inter-
national Journal of Computer Applications in Tech-
nology, pages 132138, 2004.
[8] V. Murugesh and K. Murugesan. Comparison of Nu-
merical Integration in Raster CNN Simulation, vol-
ume 3285. LNCS, Springer, 2004. 115-122.
[9] V. Murugesh and K. Murugesan. Simulation of time-
multiplexing cellular neural networks with numerical
integration algorithms. In Lecture Notes in Computer
Science, volume 3991, pages 457464, 2006.
[10] S.C. Oliveira. Evaluation of eectiveness factor of
immobilized enzymes using rungekutta-gill method:
how to solve mathematical undetermination at parti-
cle center point? Bio Process Engineering, 20, 1999.
[11] L. F. Shampine. Some practical runge-kutta formulas.
Math. Comp., 46:135150, 1986.
[12] CH. Tsitouras and S. N. Papakostas. Cheap error
estimation for rungekutta methods. SIAM J. Sci.
Comput., 20(6):20672088, 1999.
Page 176

Contenu connexe

Tendances

COLOR IMAGE ENCRYPTION BASED ON MULTIPLE CHAOTIC SYSTEMS
COLOR IMAGE ENCRYPTION BASED ON MULTIPLE CHAOTIC SYSTEMSCOLOR IMAGE ENCRYPTION BASED ON MULTIPLE CHAOTIC SYSTEMS
COLOR IMAGE ENCRYPTION BASED ON MULTIPLE CHAOTIC SYSTEMS
IJNSA Journal
 
Edge Representation Learning with Hypergraphs
Edge Representation Learning with HypergraphsEdge Representation Learning with Hypergraphs
Edge Representation Learning with Hypergraphs
MLAI2
 
Accurate Learning of Graph Representations with Graph Multiset Pooling
Accurate Learning of Graph Representations with Graph Multiset PoolingAccurate Learning of Graph Representations with Graph Multiset Pooling
Accurate Learning of Graph Representations with Graph Multiset Pooling
MLAI2
 

Tendances (16)

COLOR IMAGE ENCRYPTION BASED ON MULTIPLE CHAOTIC SYSTEMS
COLOR IMAGE ENCRYPTION BASED ON MULTIPLE CHAOTIC SYSTEMSCOLOR IMAGE ENCRYPTION BASED ON MULTIPLE CHAOTIC SYSTEMS
COLOR IMAGE ENCRYPTION BASED ON MULTIPLE CHAOTIC SYSTEMS
 
Edge Representation Learning with Hypergraphs
Edge Representation Learning with HypergraphsEdge Representation Learning with Hypergraphs
Edge Representation Learning with Hypergraphs
 
Jpeg compression
Jpeg compressionJpeg compression
Jpeg compression
 
Accurate Learning of Graph Representations with Graph Multiset Pooling
Accurate Learning of Graph Representations with Graph Multiset PoolingAccurate Learning of Graph Representations with Graph Multiset Pooling
Accurate Learning of Graph Representations with Graph Multiset Pooling
 
Road Segmentation from satellites images
Road Segmentation from satellites imagesRoad Segmentation from satellites images
Road Segmentation from satellites images
 
Kassem2009
Kassem2009Kassem2009
Kassem2009
 
Next generation image compression standards: JPEG XR and AIC
Next generation image compression standards: JPEG XR and AICNext generation image compression standards: JPEG XR and AIC
Next generation image compression standards: JPEG XR and AIC
 
An35225228
An35225228An35225228
An35225228
 
Image confusion and diffusion based on multi-chaotic system and mix-column
Image confusion and diffusion based on multi-chaotic system and mix-columnImage confusion and diffusion based on multi-chaotic system and mix-column
Image confusion and diffusion based on multi-chaotic system and mix-column
 
SQUASHED JPEG IMAGE COMPRESSION VIA SPARSE MATRIX
SQUASHED JPEG IMAGE COMPRESSION VIA SPARSE MATRIXSQUASHED JPEG IMAGE COMPRESSION VIA SPARSE MATRIX
SQUASHED JPEG IMAGE COMPRESSION VIA SPARSE MATRIX
 
Repeat-Frame Selection Algorithm for Frame Rate Video Transcoding
Repeat-Frame Selection Algorithm for Frame Rate Video TranscodingRepeat-Frame Selection Algorithm for Frame Rate Video Transcoding
Repeat-Frame Selection Algorithm for Frame Rate Video Transcoding
 
FPGA Implementation of 2-D DCT & DWT Engines for Vision Based Tracking of Dyn...
FPGA Implementation of 2-D DCT & DWT Engines for Vision Based Tracking of Dyn...FPGA Implementation of 2-D DCT & DWT Engines for Vision Based Tracking of Dyn...
FPGA Implementation of 2-D DCT & DWT Engines for Vision Based Tracking of Dyn...
 
DESIGN OF DELAY COMPUTATION METHOD FOR CYCLOTOMIC FAST FOURIER TRANSFORM
DESIGN OF DELAY COMPUTATION METHOD FOR CYCLOTOMIC FAST FOURIER TRANSFORMDESIGN OF DELAY COMPUTATION METHOD FOR CYCLOTOMIC FAST FOURIER TRANSFORM
DESIGN OF DELAY COMPUTATION METHOD FOR CYCLOTOMIC FAST FOURIER TRANSFORM
 
Multiple region of interest tracking of non rigid objects using demon's algor...
Multiple region of interest tracking of non rigid objects using demon's algor...Multiple region of interest tracking of non rigid objects using demon's algor...
Multiple region of interest tracking of non rigid objects using demon's algor...
 
MULTIPLE REGION OF INTEREST TRACKING OF NON-RIGID OBJECTS USING DEMON'S ALGOR...
MULTIPLE REGION OF INTEREST TRACKING OF NON-RIGID OBJECTS USING DEMON'S ALGOR...MULTIPLE REGION OF INTEREST TRACKING OF NON-RIGID OBJECTS USING DEMON'S ALGOR...
MULTIPLE REGION OF INTEREST TRACKING OF NON-RIGID OBJECTS USING DEMON'S ALGOR...
 
Design of multiloop controller for
Design of multiloop controller forDesign of multiloop controller for
Design of multiloop controller for
 

En vedette

[IJET V2I3P15] Authors: Sidharam Ambadas Basargi, Prof Gopal Joshi
[IJET V2I3P15] Authors: Sidharam Ambadas Basargi, Prof Gopal Joshi[IJET V2I3P15] Authors: Sidharam Ambadas Basargi, Prof Gopal Joshi
[IJET V2I3P15] Authors: Sidharam Ambadas Basargi, Prof Gopal Joshi
IJET - International Journal of Engineering and Techniques
 

En vedette (19)

[IJET V2I3P13] Authors: Anshika, Sujit Tak, Sandeep Ugale, Abhishek Pohekar
[IJET V2I3P13] Authors: Anshika, Sujit Tak, Sandeep Ugale, Abhishek Pohekar[IJET V2I3P13] Authors: Anshika, Sujit Tak, Sandeep Ugale, Abhishek Pohekar
[IJET V2I3P13] Authors: Anshika, Sujit Tak, Sandeep Ugale, Abhishek Pohekar
 
[IJET V2I3P11] Authors: Payal More, Rohini Pandit, Supriya Makude, Harsh Nirb...
[IJET V2I3P11] Authors: Payal More, Rohini Pandit, Supriya Makude, Harsh Nirb...[IJET V2I3P11] Authors: Payal More, Rohini Pandit, Supriya Makude, Harsh Nirb...
[IJET V2I3P11] Authors: Payal More, Rohini Pandit, Supriya Makude, Harsh Nirb...
 
[IJET - V1I1P1] Author :Husssain Babu, Mohammad Ali
[IJET - V1I1P1] Author :Husssain Babu, Mohammad Ali [IJET - V1I1P1] Author :Husssain Babu, Mohammad Ali
[IJET - V1I1P1] Author :Husssain Babu, Mohammad Ali
 
[IJET V2I2P29] Authors: Praveen Ghuge, ChavanNitishR. ,KatteSagar S. ,PawarSu...
[IJET V2I2P29] Authors: Praveen Ghuge, ChavanNitishR. ,KatteSagar S. ,PawarSu...[IJET V2I2P29] Authors: Praveen Ghuge, ChavanNitishR. ,KatteSagar S. ,PawarSu...
[IJET V2I2P29] Authors: Praveen Ghuge, ChavanNitishR. ,KatteSagar S. ,PawarSu...
 
[IJCT-V3I2P17] Authors: Sheng Lai, Xiaohua Meng, Dongqin Zheng
[IJCT-V3I2P17] Authors: Sheng Lai, Xiaohua Meng, Dongqin Zheng[IJCT-V3I2P17] Authors: Sheng Lai, Xiaohua Meng, Dongqin Zheng
[IJCT-V3I2P17] Authors: Sheng Lai, Xiaohua Meng, Dongqin Zheng
 
[IJET V2I3P2] Authors: Shraddha Kallappa Walikar, Dr. Aswatha Kumar M
[IJET V2I3P2] Authors: Shraddha Kallappa Walikar,  Dr. Aswatha Kumar M[IJET V2I3P2] Authors: Shraddha Kallappa Walikar,  Dr. Aswatha Kumar M
[IJET V2I3P2] Authors: Shraddha Kallappa Walikar, Dr. Aswatha Kumar M
 
[IJET V2I4P4] Authors: Miss. Smita .A. Bhole
[IJET V2I4P4] Authors: Miss. Smita .A. Bhole[IJET V2I4P4] Authors: Miss. Smita .A. Bhole
[IJET V2I4P4] Authors: Miss. Smita .A. Bhole
 
[IJCT-V3I2P23] Authors: Baljinder Kaur, Narinder Sharma
[IJCT-V3I2P23] Authors: Baljinder Kaur, Narinder Sharma[IJCT-V3I2P23] Authors: Baljinder Kaur, Narinder Sharma
[IJCT-V3I2P23] Authors: Baljinder Kaur, Narinder Sharma
 
[IJET V2I2P28] Authors: ROSA MAHTOUT, FARID ZAIDI, LINDA OULD SAADI, SOUHILA ...
[IJET V2I2P28] Authors: ROSA MAHTOUT, FARID ZAIDI, LINDA OULD SAADI, SOUHILA ...[IJET V2I2P28] Authors: ROSA MAHTOUT, FARID ZAIDI, LINDA OULD SAADI, SOUHILA ...
[IJET V2I2P28] Authors: ROSA MAHTOUT, FARID ZAIDI, LINDA OULD SAADI, SOUHILA ...
 
[IJET V2I2P23] Authors: K. Deepika, Sudha M. S., Sandhya Rani M.H
[IJET V2I2P23] Authors: K. Deepika, Sudha M. S., Sandhya Rani M.H[IJET V2I2P23] Authors: K. Deepika, Sudha M. S., Sandhya Rani M.H
[IJET V2I2P23] Authors: K. Deepika, Sudha M. S., Sandhya Rani M.H
 
[IJET-V1I2P1] Authors :Imran Ullah Khan ,Mohd. Javed Khan ,S.Hasan Saeed ,Nup...
[IJET-V1I2P1] Authors :Imran Ullah Khan ,Mohd. Javed Khan ,S.Hasan Saeed ,Nup...[IJET-V1I2P1] Authors :Imran Ullah Khan ,Mohd. Javed Khan ,S.Hasan Saeed ,Nup...
[IJET-V1I2P1] Authors :Imran Ullah Khan ,Mohd. Javed Khan ,S.Hasan Saeed ,Nup...
 
[IJET- V2I2P17] Authors: Gaurav B. Patil., Paresh J. Shah
[IJET- V2I2P17] Authors: Gaurav B. Patil., Paresh J. Shah[IJET- V2I2P17] Authors: Gaurav B. Patil., Paresh J. Shah
[IJET- V2I2P17] Authors: Gaurav B. Patil., Paresh J. Shah
 
[IJET V2I3P15] Authors: Sidharam Ambadas Basargi, Prof Gopal Joshi
[IJET V2I3P15] Authors: Sidharam Ambadas Basargi, Prof Gopal Joshi[IJET V2I3P15] Authors: Sidharam Ambadas Basargi, Prof Gopal Joshi
[IJET V2I3P15] Authors: Sidharam Ambadas Basargi, Prof Gopal Joshi
 
[IJET V2I3-1P3] Authors:G.Siva Prasad K.Dinesh Achari E.Dileep Kumar Goud M.N...
[IJET V2I3-1P3] Authors:G.Siva Prasad K.Dinesh Achari E.Dileep Kumar Goud M.N...[IJET V2I3-1P3] Authors:G.Siva Prasad K.Dinesh Achari E.Dileep Kumar Goud M.N...
[IJET V2I3-1P3] Authors:G.Siva Prasad K.Dinesh Achari E.Dileep Kumar Goud M.N...
 
[IJCT-V3I2P26] Authors: Sunny Sharma
[IJCT-V3I2P26] Authors: Sunny Sharma[IJCT-V3I2P26] Authors: Sunny Sharma
[IJCT-V3I2P26] Authors: Sunny Sharma
 
[IJET-V2I3P18] Authors: Mr. B. N. Patil , Mr. Sandesh Sonar , Mr. Pavankumar ...
[IJET-V2I3P18] Authors: Mr. B. N. Patil , Mr. Sandesh Sonar , Mr. Pavankumar ...[IJET-V2I3P18] Authors: Mr. B. N. Patil , Mr. Sandesh Sonar , Mr. Pavankumar ...
[IJET-V2I3P18] Authors: Mr. B. N. Patil , Mr. Sandesh Sonar , Mr. Pavankumar ...
 
[IJET-V1I2P4] Authors :Mrs.Rita S. Pimpalkar, Rutuja U. Joshi, Rakesh R. Khan...
[IJET-V1I2P4] Authors :Mrs.Rita S. Pimpalkar, Rutuja U. Joshi, Rakesh R. Khan...[IJET-V1I2P4] Authors :Mrs.Rita S. Pimpalkar, Rutuja U. Joshi, Rakesh R. Khan...
[IJET-V1I2P4] Authors :Mrs.Rita S. Pimpalkar, Rutuja U. Joshi, Rakesh R. Khan...
 
[IJET V2I2P24] Authors: Galal Ali Hassaan
[IJET V2I2P24] Authors: Galal Ali Hassaan[IJET V2I2P24] Authors: Galal Ali Hassaan
[IJET V2I2P24] Authors: Galal Ali Hassaan
 
[IJET-V2I3P17] Authors: R.C.Rohini, G.Srividhya
[IJET-V2I3P17] Authors: R.C.Rohini, G.Srividhya[IJET-V2I3P17] Authors: R.C.Rohini, G.Srividhya
[IJET-V2I3P17] Authors: R.C.Rohini, G.Srividhya
 

Similaire à [IJCT-V3I2P24] Authors: Osama H. Abdelwahed; and M. El-Sayed Wahed

COLOR IMAGE ENCRYPTION BASED ON MULTIPLE CHAOTIC SYSTEMS
COLOR IMAGE ENCRYPTION BASED ON MULTIPLE CHAOTIC SYSTEMSCOLOR IMAGE ENCRYPTION BASED ON MULTIPLE CHAOTIC SYSTEMS
COLOR IMAGE ENCRYPTION BASED ON MULTIPLE CHAOTIC SYSTEMS
IJNSA Journal
 
COLOR IMAGE ENCRYPTION BASED ON MULTIPLE CHAOTIC SYSTEMS
COLOR IMAGE ENCRYPTION BASED ON MULTIPLE CHAOTIC SYSTEMSCOLOR IMAGE ENCRYPTION BASED ON MULTIPLE CHAOTIC SYSTEMS
COLOR IMAGE ENCRYPTION BASED ON MULTIPLE CHAOTIC SYSTEMS
IJNSA Journal
 

Similaire à [IJCT-V3I2P24] Authors: Osama H. Abdelwahed; and M. El-Sayed Wahed (20)

Pipelined Architecture of 2D-DCT, Quantization and ZigZag Process for JPEG Im...
Pipelined Architecture of 2D-DCT, Quantization and ZigZag Process for JPEG Im...Pipelined Architecture of 2D-DCT, Quantization and ZigZag Process for JPEG Im...
Pipelined Architecture of 2D-DCT, Quantization and ZigZag Process for JPEG Im...
 
PIPELINED ARCHITECTURE OF 2D-DCT, QUANTIZATION AND ZIGZAG PROCESS FOR JPEG IM...
PIPELINED ARCHITECTURE OF 2D-DCT, QUANTIZATION AND ZIGZAG PROCESS FOR JPEG IM...PIPELINED ARCHITECTURE OF 2D-DCT, QUANTIZATION AND ZIGZAG PROCESS FOR JPEG IM...
PIPELINED ARCHITECTURE OF 2D-DCT, QUANTIZATION AND ZIGZAG PROCESS FOR JPEG IM...
 
Enhancement of genetic image watermarking robust against cropping attack
Enhancement of genetic image watermarking robust against cropping attackEnhancement of genetic image watermarking robust against cropping attack
Enhancement of genetic image watermarking robust against cropping attack
 
MEDIAN BASED PARALLEL STEERING KERNEL REGRESSION FOR IMAGE RECONSTRUCTION
MEDIAN BASED PARALLEL STEERING KERNEL REGRESSION FOR IMAGE RECONSTRUCTIONMEDIAN BASED PARALLEL STEERING KERNEL REGRESSION FOR IMAGE RECONSTRUCTION
MEDIAN BASED PARALLEL STEERING KERNEL REGRESSION FOR IMAGE RECONSTRUCTION
 
Two-Channel Quadrature Mirror Filter Bank Design using FIR Polyphase Component
Two-Channel Quadrature Mirror Filter Bank Design using FIR Polyphase ComponentTwo-Channel Quadrature Mirror Filter Bank Design using FIR Polyphase Component
Two-Channel Quadrature Mirror Filter Bank Design using FIR Polyphase Component
 
E0212730
E0212730E0212730
E0212730
 
A DIGITAL COLOR IMAGE WATERMARKING SYSTEM USING BLIND SOURCE SEPARATION
A DIGITAL COLOR IMAGE WATERMARKING SYSTEM USING BLIND SOURCE SEPARATIONA DIGITAL COLOR IMAGE WATERMARKING SYSTEM USING BLIND SOURCE SEPARATION
A DIGITAL COLOR IMAGE WATERMARKING SYSTEM USING BLIND SOURCE SEPARATION
 
Vector-Based Back Propagation Algorithm of.pdf
Vector-Based Back Propagation Algorithm of.pdfVector-Based Back Propagation Algorithm of.pdf
Vector-Based Back Propagation Algorithm of.pdf
 
COLOR IMAGE ENCRYPTION BASED ON MULTIPLE CHAOTIC SYSTEMS
COLOR IMAGE ENCRYPTION BASED ON MULTIPLE CHAOTIC SYSTEMSCOLOR IMAGE ENCRYPTION BASED ON MULTIPLE CHAOTIC SYSTEMS
COLOR IMAGE ENCRYPTION BASED ON MULTIPLE CHAOTIC SYSTEMS
 
COLOR IMAGE ENCRYPTION BASED ON MULTIPLE CHAOTIC SYSTEMS
COLOR IMAGE ENCRYPTION BASED ON MULTIPLE CHAOTIC SYSTEMSCOLOR IMAGE ENCRYPTION BASED ON MULTIPLE CHAOTIC SYSTEMS
COLOR IMAGE ENCRYPTION BASED ON MULTIPLE CHAOTIC SYSTEMS
 
Reconfiguration layers of convolutional neural network for fundus patches cla...
Reconfiguration layers of convolutional neural network for fundus patches cla...Reconfiguration layers of convolutional neural network for fundus patches cla...
Reconfiguration layers of convolutional neural network for fundus patches cla...
 
A DIGITAL COLOR IMAGE WATERMARKING SYSTEM USING BLIND SOURCE SEPARATION
A DIGITAL COLOR IMAGE WATERMARKING SYSTEM USING BLIND SOURCE SEPARATIONA DIGITAL COLOR IMAGE WATERMARKING SYSTEM USING BLIND SOURCE SEPARATION
A DIGITAL COLOR IMAGE WATERMARKING SYSTEM USING BLIND SOURCE SEPARATION
 
Fast Segmentation of Sub-cellular Organelles
Fast Segmentation of Sub-cellular OrganellesFast Segmentation of Sub-cellular Organelles
Fast Segmentation of Sub-cellular Organelles
 
Detection of Seam Carving in Uncompressed Images using eXtreme Gradient Boosting
Detection of Seam Carving in Uncompressed Images using eXtreme Gradient BoostingDetection of Seam Carving in Uncompressed Images using eXtreme Gradient Boosting
Detection of Seam Carving in Uncompressed Images using eXtreme Gradient Boosting
 
B.tech_project_ppt.pptx
B.tech_project_ppt.pptxB.tech_project_ppt.pptx
B.tech_project_ppt.pptx
 
A proposed accelerated image copy-move forgery detection-vcip2014
A proposed accelerated image copy-move forgery detection-vcip2014A proposed accelerated image copy-move forgery detection-vcip2014
A proposed accelerated image copy-move forgery detection-vcip2014
 
IRJET- Chord Classification of an Audio Signal using Artificial Neural Network
IRJET- Chord Classification of an Audio Signal using Artificial Neural NetworkIRJET- Chord Classification of an Audio Signal using Artificial Neural Network
IRJET- Chord Classification of an Audio Signal using Artificial Neural Network
 
A Review on Color Recognition using Deep Learning and Different Image Segment...
A Review on Color Recognition using Deep Learning and Different Image Segment...A Review on Color Recognition using Deep Learning and Different Image Segment...
A Review on Color Recognition using Deep Learning and Different Image Segment...
 
ADAPTIVE FUZZY KERNEL CLUSTERING ALGORITHM
ADAPTIVE FUZZY KERNEL CLUSTERING ALGORITHMADAPTIVE FUZZY KERNEL CLUSTERING ALGORITHM
ADAPTIVE FUZZY KERNEL CLUSTERING ALGORITHM
 
ADAPTIVE FUZZY KERNEL CLUSTERING ALGORITHM
ADAPTIVE FUZZY KERNEL CLUSTERING ALGORITHMADAPTIVE FUZZY KERNEL CLUSTERING ALGORITHM
ADAPTIVE FUZZY KERNEL CLUSTERING ALGORITHM
 

Plus de IJET - International Journal of Engineering and Techniques

healthcare supervising system to monitor heart rate to diagonize and alert he...
healthcare supervising system to monitor heart rate to diagonize and alert he...healthcare supervising system to monitor heart rate to diagonize and alert he...
healthcare supervising system to monitor heart rate to diagonize and alert he...
IJET - International Journal of Engineering and Techniques
 
IJET-V3I2P23
IJET-V3I2P23IJET-V3I2P23
IJET-V3I2P21
IJET-V3I2P21IJET-V3I2P21

Plus de IJET - International Journal of Engineering and Techniques (20)

healthcare supervising system to monitor heart rate to diagonize and alert he...
healthcare supervising system to monitor heart rate to diagonize and alert he...healthcare supervising system to monitor heart rate to diagonize and alert he...
healthcare supervising system to monitor heart rate to diagonize and alert he...
 
verifiable and multi-keyword searchable attribute-based encryption scheme for...
verifiable and multi-keyword searchable attribute-based encryption scheme for...verifiable and multi-keyword searchable attribute-based encryption scheme for...
verifiable and multi-keyword searchable attribute-based encryption scheme for...
 
Ijet v5 i6p18
Ijet v5 i6p18Ijet v5 i6p18
Ijet v5 i6p18
 
Ijet v5 i6p17
Ijet v5 i6p17Ijet v5 i6p17
Ijet v5 i6p17
 
Ijet v5 i6p16
Ijet v5 i6p16Ijet v5 i6p16
Ijet v5 i6p16
 
Ijet v5 i6p15
Ijet v5 i6p15Ijet v5 i6p15
Ijet v5 i6p15
 
Ijet v5 i6p14
Ijet v5 i6p14Ijet v5 i6p14
Ijet v5 i6p14
 
Ijet v5 i6p13
Ijet v5 i6p13Ijet v5 i6p13
Ijet v5 i6p13
 
Ijet v5 i6p12
Ijet v5 i6p12Ijet v5 i6p12
Ijet v5 i6p12
 
Ijet v5 i6p11
Ijet v5 i6p11Ijet v5 i6p11
Ijet v5 i6p11
 
Ijet v5 i6p10
Ijet v5 i6p10Ijet v5 i6p10
Ijet v5 i6p10
 
Ijet v5 i6p2
Ijet v5 i6p2Ijet v5 i6p2
Ijet v5 i6p2
 
IJET-V3I2P24
IJET-V3I2P24IJET-V3I2P24
IJET-V3I2P24
 
IJET-V3I2P23
IJET-V3I2P23IJET-V3I2P23
IJET-V3I2P23
 
IJET-V3I2P22
IJET-V3I2P22IJET-V3I2P22
IJET-V3I2P22
 
IJET-V3I2P21
IJET-V3I2P21IJET-V3I2P21
IJET-V3I2P21
 
IJET-V3I2P20
IJET-V3I2P20IJET-V3I2P20
IJET-V3I2P20
 
IJET-V3I2P19
IJET-V3I2P19IJET-V3I2P19
IJET-V3I2P19
 
IJET-V3I2P18
IJET-V3I2P18IJET-V3I2P18
IJET-V3I2P18
 
IJET-V3I2P17
IJET-V3I2P17IJET-V3I2P17
IJET-V3I2P17
 

Dernier

Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Christo Ananth
 
result management system report for college project
result management system report for college projectresult management system report for college project
result management system report for college project
Tonystark477637
 
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Christo Ananth
 
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 BookingVIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
dharasingh5698
 
AKTU Computer Networks notes --- Unit 3.pdf
AKTU Computer Networks notes ---  Unit 3.pdfAKTU Computer Networks notes ---  Unit 3.pdf
AKTU Computer Networks notes --- Unit 3.pdf
ankushspencer015
 

Dernier (20)

VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...
VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...
VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...
 
Glass Ceramics: Processing and Properties
Glass Ceramics: Processing and PropertiesGlass Ceramics: Processing and Properties
Glass Ceramics: Processing and Properties
 
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
 
UNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its PerformanceUNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its Performance
 
result management system report for college project
result management system report for college projectresult management system report for college project
result management system report for college project
 
Intze Overhead Water Tank Design by Working Stress - IS Method.pdf
Intze Overhead Water Tank  Design by Working Stress - IS Method.pdfIntze Overhead Water Tank  Design by Working Stress - IS Method.pdf
Intze Overhead Water Tank Design by Working Stress - IS Method.pdf
 
Roadmap to Membership of RICS - Pathways and Routes
Roadmap to Membership of RICS - Pathways and RoutesRoadmap to Membership of RICS - Pathways and Routes
Roadmap to Membership of RICS - Pathways and Routes
 
Thermal Engineering-R & A / C - unit - V
Thermal Engineering-R & A / C - unit - VThermal Engineering-R & A / C - unit - V
Thermal Engineering-R & A / C - unit - V
 
Water Industry Process Automation & Control Monthly - April 2024
Water Industry Process Automation & Control Monthly - April 2024Water Industry Process Automation & Control Monthly - April 2024
Water Industry Process Automation & Control Monthly - April 2024
 
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
 
PVC VS. FIBERGLASS (FRP) GRAVITY SEWER - UNI BELL
PVC VS. FIBERGLASS (FRP) GRAVITY SEWER - UNI BELLPVC VS. FIBERGLASS (FRP) GRAVITY SEWER - UNI BELL
PVC VS. FIBERGLASS (FRP) GRAVITY SEWER - UNI BELL
 
Double rodded leveling 1 pdf activity 01
Double rodded leveling 1 pdf activity 01Double rodded leveling 1 pdf activity 01
Double rodded leveling 1 pdf activity 01
 
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 BookingVIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
 
The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...
The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...
The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...
 
UNIT-II FMM-Flow Through Circular Conduits
UNIT-II FMM-Flow Through Circular ConduitsUNIT-II FMM-Flow Through Circular Conduits
UNIT-II FMM-Flow Through Circular Conduits
 
AKTU Computer Networks notes --- Unit 3.pdf
AKTU Computer Networks notes ---  Unit 3.pdfAKTU Computer Networks notes ---  Unit 3.pdf
AKTU Computer Networks notes --- Unit 3.pdf
 
Thermal Engineering Unit - I & II . ppt
Thermal Engineering  Unit - I & II . pptThermal Engineering  Unit - I & II . ppt
Thermal Engineering Unit - I & II . ppt
 
chapter 5.pptx: drainage and irrigation engineering
chapter 5.pptx: drainage and irrigation engineeringchapter 5.pptx: drainage and irrigation engineering
chapter 5.pptx: drainage and irrigation engineering
 
Unit 1 - Soil Classification and Compaction.pdf
Unit 1 - Soil Classification and Compaction.pdfUnit 1 - Soil Classification and Compaction.pdf
Unit 1 - Soil Classification and Compaction.pdf
 
UNIT-IFLUID PROPERTIES & FLOW CHARACTERISTICS
UNIT-IFLUID PROPERTIES & FLOW CHARACTERISTICSUNIT-IFLUID PROPERTIES & FLOW CHARACTERISTICS
UNIT-IFLUID PROPERTIES & FLOW CHARACTERISTICS
 

[IJCT-V3I2P24] Authors: Osama H. Abdelwahed; and M. El-Sayed Wahed

  • 1. Time multiplexing CNN simulator using RK7(5) Osama H. Abdelwahed 1,2 and M. El-Sayed Wahed 2 1 Mathematics Department, Faculty of Science, Suez Canal University, Egypt 2 Department of Computer Science, Faculty of Computers and Informatics, Suez Canal University, Egypt -************************- Abstract RK7(5) is a numerical method was used to minimize the local truncation error using selection step size algorithm. Time multiplexing CNN simulator was modied using RK7(5) to improve the performance of the simulator and the quality of the output image for edge detection. The results showed better performance than those in the literature. Keywords Cellular neural network; Image processing; CNN simulator; RK7(5); Local truncation error -************************- 1 Introduction Edge detection is considered to be one of the essential steps in identifying an object in image processing. Many techniques have been proposed to detect edges in image processing using cellular neural network(CNN) [8]. CNN was introduced by Chua and Yang [3] in 1988. The main properties of CNN are their local interactions among their nearby cells in addition to their parallel processing which is considered to be one of the most important aspects in CNN. CNN has many applications in image processing like medical image segmentation, image denoising, and edge detection. Time multiplexing CNN simulator was proposed by C.C. Lee and Jose Pineda de Gyvez [6] in 1994. They used the numerical integration algorithms Euler, the improved Euler and Runge Kutta method to solve the dierential equations which represent CNN. Their results for edge detection need to be improved and also the computation time need to be decreased. Another work presented by V. Murugesh and K. Murugesan[8]. They introduced the numerical methods, RK-Gill [10] and RK-Butcher [1, 2, 7], but unfortunately, the obtained results need to be improved. So we proposed RK7(5) [12] as a numerical integration method used to minimize the local truncation error using the selection step size algorithm [11]. Our proposed method showed better results than those in the literature. The obtained results included both faster performance and better edge detec- tion. RK7(5) is proposed to achieve two targets: First, to increase the eciency of the time multiplexing CNN simulator by decreasing the needed simulation time; Second, to improve the quality of the edge detection results. The organization of the paper is as follows: section (2) presented CNN in details. In Section (3) time multiplexing CNN simulator was discussed. Section (4) presented the proposed method. Results of the performance of the simulator and edge detection were discussed in section (5). Section 6 discussed the Conclusion. 2 Overview of CNN Cellular neural network is a method used both the con- cepts of neural networks and cellular automata in which its cells are connected locally through their neighbors and processed in parallel through their interactions [3]. The r-neighborhood of CNN is dened as in the follow- ing: Nr(i, j) = {C(k, l)} | max i=1,M;j=1,N {|k − i| , |l − j|} ≤ r, (1) Where r 0. The expression 1− neighborhood is expressed for r = 1, 2− neighborhood is expressed for r = 2, 3− neighborhood is expressed for r = 3, etc. as illustrated in Fig. (1). (a) 1− neighbor- hood (b) 2− neighbor- hood (c) 3− neighborhood Figure 1: Examples of r− neighborhood Page 171
  • 2. A two dimensional CNN with size equal to 4 has shown in Fig. (2), where each cell has interactions with its nearby cells locally for the 1− neighborhood case. Figure 2: CNN structure with size = 4 The most important operators in CNN are the tem- plates A and B which represent the output feedback and the input control respectively. They control the behavior of CNN in addition to the bias value I. According to [3], the CNN equation is represented as in the following: C dxij dt (t) = − 1 Rx xij(t) + C(k,l) A(i; j; k, l)ykl(t)+ C(k,l) B(i; j; k, l)ukl(t) + Iij (2) Iyx controls the behavior of the following output function yij: f (x) = 1 2 (|x + 1| − |x − 1|) (3) Where, Iyx = 1 Ry f (xij) (4) The output function yij = IyxRy can represented as in the following: yij = f (xij (t)) = 1 2 (|xij (t) + 1| − |xij (t) − 1|) (5) The general form of CNN dynamics is represented by the following equation: dxij dt (t) = −xij(t) + C(k,l) A(i; j; k, l)ykl(t)+ C(k,l) B(i; j; k, l)ukl(t) + Iij (6) The dierent values of the templates A and B and the bias value I determines the type of application used in CNN. For example, edge detection, noise removal, or pat- tern recognition has dierent template values. The templates of CNN are space invariant i.e. for exam- ple the template B(i, j; i + 1, j) is the same for all values at (i, j). 3 Time Multipexing CNN simula- tor The time multiplexing CNN simulator [6] was proposed to solve the problem of hardware implementation. From hardware point of view, may be there are thousands of pixels need to be implemented using the single layer CNN simulator [5]. It is very dicult to manage this problem because of the limitation of the hardware. Hence the time multiplexing algorithm was proposed to x this complex problem by dividing the input image into a number of sub- images whose size equal to to the size of the block of CNN processors. In this case, each block will process a sub- image using single layer CNN simulator till it converges. The algorithm continues for the next sub-images using the same procedure till the whole image will be processed [6]. Although the algorithm succeeded to solve the problem of the hardware limitation, some side eects appeared. The border pixels for each sub-image have incorrect results be- cause there is no information for the neighbors which re- sults in two erroneous values. The rst error is occurred because of the eect of the template B. This error is com- puted using the following formula [9]: EB ij = 3 i=1 bi,j+1sign (ui,j+1) (7) Where bi,j+1 represents the values missed by using the template B due to the absence of the input signals ui,j+1. And sign() is the sign function which is used to represent the pixel status either black or white. This error depends on the input image and the template value. The second error appeared as a result of the eect of the template A. This error is evaluated using the following equation: EA ij = 3 i=1 ai,j+1yi,j+1 (t) (8) Since ai,j+1 is the error obtained due to the template A Page 172
  • 3. because of the absence of the values of yi,j+1 (t). To minimize the errors EB ij and EA ij , we exploit the advantage of CNN in which there is a local interaction among neighboring cells. First, to minimize the error, EB ij , we chose a belt of pixels from the input image equals to the radius of the neighborhood of CNN around each sub-image. Second to minimize the error, EA ij, the pixels between adjacent sub-images were overlapped and each cell in the border can interact with its neighbors as in- terior cells. The minimum overlap width is twice of the neighborhood's radius of the CNN [9]. Although overlap property improved the interaction among neighboring cells, the simulation time increased. Fortunately, the big chance of having the pixels of each sub-image all black or all white helped in reducing the simulation time nearly to the time consumed in the case of using single layer CNN simulator. Since all black-block or all white-block will be simulated one time, after con- vergence all nal states were saved in the memory. Every time all black-block or all white-block encountered again , their nal states are just restored from the memory since there is no need for simulation again. The structure of time multiplexing CNN simulator is demonstrated in Fig. (3). Figure 3: The structure of time multiplexing CNN simu- lator [9] The steps of the time multiplexing CNN algorithm [9] with RK7(5) are summarized as follows: 1. Read input image 2. Divide the input image into a number of m blocks 3. Construct for each block, a belt of cells around it with size equal to the radius of the neighborhood from the input image 4. Between each two blocks construct an overlapped cells with size equal to the twice of the radius of the neigh- borhood 5. For each block, apply single layer CNN simulator [6]: (a) Read block C (b) Process all black-blocks or all white-blocks once and after convergence, store their state values in the memory (c) for each black or white block encountered again, just restore its state values from the memory (d) If the block didn't converge yet, compute its new state values using the equation (6) by applying RK7(5) (e) If the new state values are not the nal states( didn't converge), go to (a) (f) Compute the error tolerance EA ij and EB ij for the templates A and B respectively for block C. 6. End The most important point of the above steps will be the proposed numerical integration algorithm RK7(5) that will be presented in section (4.1). The main purpose of this algorithm is to reduce the CPU time or simulation time and to improve the edge detection results. 4 The numerical integration meth- ods Euler, RK-Gill [10] and RK-Butcher [1, 2] are three numerical integration methods used in the literature to solve the non linear dierential equations which represent CNN dynamics. Section (4.1 ) discussed the proposed numerical integration algorithm RK7(5). 4.1 The numerical integration method RK7(5) RK7(5) [12] was proposed as a new technique used in the time multiplexing CNN simulator[9] to improve the performance of the time multiplexing CNN simulator and edge detection results. The algorithm is based on minimizing the local truncation error and choosing an adaptive step size value using the selection step size algorithm. The equations of RK7(5) [12] are shown below: Page 173
  • 4. kij 1 = τf (xij (nτ)) kij 2 = τf (xij (nτ)) + 1 18 kij 1 kij 3 = τf (xij (nτ)) + 1 9 kij 1 kij 4 = τf (xij (nτ)) + 1 24 kij 1 + 1 8 kij 2 kij 5 = τf (xij (nτ)) + 2183971 4000000 kij 1 − 8340813 4000000 kij 3 + 3968421 2000000 kij 4 kij 6 = τf (xij (nτ)) − 695768212 746374411 kij 1 − 1803549175 7007942496 kij 3 + 3474507053 6790877290 kij 4 + 2188198899 15264927763 kij 5 kij 7 = τf (xij (nτ)) − 118949348557 8390623634 kij 1 + 53094780276 9800512003 kij 3 − 8415376229 2277049503 kij 4 − 18647567697 10138317907 kij 5 + 275514944893 11905950217 kij 6 kij 8 = τf (xij (nτ)) − 30828057951 7654644085 kij 1 − 4511704 324729 kij 3 + 16217851618 1651177175 kij 4 + 282768186839 40694064384 kij 5 − 104400780537 15869257619 kij 6 + 5409241639 9600177208 kij 7 kij 9 = τf (xij (nτ)) − 133775720546 26753383835 kij 1 + 49608695511 4066590848 kij 3 − 5989647201 7901259813 kij 4 − 48035527651 5727379426 kij 5 + 86266718551 10188951048 kij 6 − 7751618114 23575802495 kij 7 + 2289274942 8464405725 kij 8 The solution of RK7(5) is given below: xij ((n + 1) τ) = xij (nτ) + 597988726 12374436915 kij 1 + 3138312158 11968408119 kij 4 + 480882843 7850665645 kij 5 + 988558885 3512253271 kij 6 + 5302636961 26425940286 kij 7 + 1259489433 12163586030 kij 8 + 1016647712 23899101975 kij 9 (9) Our method is based on applying adaptive step size selection method [4] in time multiplexing CNN simulator using RK7(5). The algorithm divides the input image into blocks and single layer CNN simulator is applied for each block. According to [4], The step size,h of p(q)−order RK methods is computed using the error per unit step (EPUS) [11] by using the following equation: hn+1 = f1hn tolerance errn 1 q+1 , (10) Where f1 is the factor of safety and hn+1 = xn+1 − xn is evaluated according to the estimation of errn which is approximated using the equation[4]: errn yn − ˆyn hn (11) Since ynand ˆyn are the estimated solutions of order pth and qth respectively. And tolerance represents the required tolerance. If errn+1 ≤ tolerance, then yn+1 is applied otherwise, Eq. (10) is recalculated by errn → errn+1. So we propose Rk7(5) to get better results than those in the literature by reducing the computation time and improving the edge detection. 5 Simulation Results The input image which is used for testing is the Mona Lisa image. The edge detection results are shown in Fig. (4). The input image and the edge detection results are shown in Fig. (4a) and Fig. (4b) respectively. (a) Input image (b) Output image Figure 4: Edge detection results The performane results are shown in Fig. (5) since the simulation results are shown in Fig. (5a) and the maximum step size for all techniques are shown in Fig. (5b). The results obtained by simulating a small image of Mona Lisa for edge detection. Page 174
  • 5. (a) Simulation time for 4 dierent techniques (b) Maximum h for 4 dierent techniques: 1-Edge detection 2:Averaging template 3:Connected component Figure 5: Performance results of the proposed method From these results we notice that the value of the step size h using our method is higher than those in the related work. Hence the simulation time for the proposed method is decreased. . We notice that the value of h is considered to have a value to be increased to some range in order to avoid the divergence status. On the other hand, the value of h should be not very small because this implies more computation time as in the case of using Euler method. Method EA EB Local Truncation Error Euler 0.785 0.885 0.7365 RK-Gill 0.676 0.764 0.6542 RK-Butcher 0.543 0.551 0.5754 RK 6(4) 0.329 0.428 0.457 Table 1: Results of the error tolerances EA , EB and Local Truncation Error Table (1) demonstrates that the results of the error tolerances EA and EB and the local minimum truncation error using RK7(5) are less than those in the literature. The error tolerance represent the average of the error tolerances of the blocks of the input image. Also the simu- lation time is better than using RK-Gill and RK-Butcher methods found in the literature. So these results prove that our proposed method is promising when compared with those in the literature. So the proposed method improved the results found in the literature by minimizing the error tolerances EA and EB and the local truncation error for each step which means that the obtained results using our proposed method has a good impact in decreasing the CPU time which is taken by the proposed simulator. In addition, the edge detection results were better if they were com- pared by the results found in the literature. 6 Conclusion Our method used the selection step size algorithm to get better results using RK7(5). The time multiplexing CNN simulator using RK7(5) has shown better results for both the simulation time and edge detection results. This means that the performance of our method is better than those in the literature. Also, the obtained results of the error tolerances for the proposed method of time multi- plexing CNN simulator is less than those found in the literature. For future work, we are planning to present more ecient numerical integration algorithms which can improve the performance of the simulator in addition to the quality of the output image for edge detection. References [1] M. Bader. A comparative study of new trunca- tion error estimates and intrinsic accuracies of some higher order runge-kutta algorithms. Computers and Biomedical Research Chemistry, pages 121124, 1987. [2] M. Bader. A new technique for the early detection of stiness in coupled dierential equations and applica- tion to standard runge-kutta algorithms. Theoretical Chemistry Accounts, pages 215219, 1988. [3] L. O. Chua and L. Yang. Cellular neural networks: Theory and applications. IEEE Trans. Circuits and Systems, 1988. [4] T. E. Hull, W. H. Enright, B. M. Fellen, and A. E. Sedgwick. Comparing numerical methods for ordi- nary dierential equations. Comparing numerical methods for ordinary dierential equations, 9:603 637, 1972. [5] C.C. Lee and JP. de. Gyvez. Single-layer cnn simu- lator. In IEEE International Symposium on Circuits and Systems, 1994. Page 175
  • 6. [6] C.C. Lee and JP. de. Gyvez. Time-multiplexing cnn simulator. In Proc. IEEE Int. Symposium on Circuits and Syst., pages 407410, Dec. 1994. [7] K. Murugesan, S. Sekar, V. Murugesh, and J.Y. Park. Numerical solution of an industrial robot arm con- trol problem using the rk-butcher algorithm. Inter- national Journal of Computer Applications in Tech- nology, pages 132138, 2004. [8] V. Murugesh and K. Murugesan. Comparison of Nu- merical Integration in Raster CNN Simulation, vol- ume 3285. LNCS, Springer, 2004. 115-122. [9] V. Murugesh and K. Murugesan. Simulation of time- multiplexing cellular neural networks with numerical integration algorithms. In Lecture Notes in Computer Science, volume 3991, pages 457464, 2006. [10] S.C. Oliveira. Evaluation of eectiveness factor of immobilized enzymes using rungekutta-gill method: how to solve mathematical undetermination at parti- cle center point? Bio Process Engineering, 20, 1999. [11] L. F. Shampine. Some practical runge-kutta formulas. Math. Comp., 46:135150, 1986. [12] CH. Tsitouras and S. N. Papakostas. Cheap error estimation for rungekutta methods. SIAM J. Sci. Comput., 20(6):20672088, 1999. Page 176