SlideShare a Scribd company logo
1 of 11
Download to read offline
International Journal of Computer Science, Engineering and Information Technology (IJCSEIT), Vol.2, No.2, April 2012
DOI : 10.5121/ijcseit.2012.2203 19
ALGORITHMIC AND ARCHITECTURAL
OPTIMIZATION OF A 3D RECONSTRUCTION
MEDICAL IMAGES ALGORITHM
FOR A HARDWARE IMPLEMENTATION
MILI Manel1
, MAHMOUD Bouraoui2
, BOUBAKER Mohamed1
, BEN
ABDALLAH Asma1
, BEDOUI Mohamed Hédi1
, AKIL Mohamed3
1
Research Team of Medical Imaging Technology (TIM), Faculty of Medicine at Monastir
University of Monastir, Monastir, Tunisia
Mili.manel@gmail.com , medhedi.Bedoui@fmm.rnu.tn
2
National Engineering School of Sousse, University of Sousse, Sousse, Tunisia
Bouraoui.Mahmoud@eniso.rnu.tn
3
Laboratoiry of informatic Gaspard-Monge, Team A3SI, ESIEE Paris, University of Paris
EST, Bld Blaise Pascal, BP 99, Noisy-Le-Grand, 93162, France
akilm@esiee.fr
ABSTRACT
This paper presents an optimization of an FPGA circuit implementation of 3D reconstruction algorithm of
medicals images. It is based on an algorithmic specification in the shape of a Factorized and Conditioned
Data Dependences Graph (GFCDD). An automatic and optimized implementation of the algorithm of «
Marching Cubes » has been carried out. The repetitive property of the algorithm has been exploited, as
much as possible, by means of the methodology “Adequacy Algorithm Structures”.
KEYWORDS
3D reconstruction; marching cubes; optimization implementation; AAA; FPGA.
1. INTRODUCTION
The 3D reconstruction consists in providing a volumetric representation of an object from a set of
minimum information to ensure the description of the 3D volume. Its involvements are
increasingly important in various fields especially that in medicine and biology.
In this paper, we focus on the optimized implementation of latency and resource material for the
reconstruction of volume flux on programmable media to exploit the parallelism of implantation
and reduce the latency and area.
This article is organized as follow: Section 2 describes the Marching cubes algorithm, Section 3
presents the AAA methodology and SynDEx-IC tool. Section 4 describe Marching cubes
development by using SynDEx-IC. In Section 5 we propose the FPGA based system for the
Marching Cubes algorithm. Finally, the conclusion is given in Section 6.
International Journal of Computer Science, Engineering and Information Technology (IJCSEIT), Vol.2, No.2, April 2012
20
2. MARCHING CUBES
Since the Marching Cubes algorithm is not only fast but also easy to implement, it has become a
reference in the 3D reconstruction algorithm for the medical image data.
This algorithm was designed by William E. Lorensen and Harvey E. Cline in 1987 [1], to
generate a 3D model of an interesting anatomical structure, characterized by a given threshold. It
uses a set of 2D images previously segmented. The generated surface is described by a 3D
triangular mesh.
The basic principle of the Marching Cubes algorithm [1] [2] is to subdivide the space into a set of
cubes called voxels. Each voxel has 8 vertices and 12 edges [3]. Since each vertex is classified as
above or below a given isovalue (threshold), there are 256(28
) possible topologies inside a voxel.
Thanks to rotation symmetry and inversion of inner and outer points, these 265 initial
configurations can be reduced to 15 basic configurations.
The algorithm consists of drawing a polygon which is in fact, the intersection of a cube and the
plan which locally modelizes the surface. For example, if the polygon formed by the intersection
cuts only three edges, there will be a triangle (figure 5).
All the possible intersection configurations (256) are classified by the algorithm’s designers in
two tables [1]. The first one, named Edge-table, identifies the edges cut by the surface. The
second table, called Tri-Table, determines the direction to follow to connect the points which
form the corresponding polygon.
The organization chart of the Marching Cubes algorithm is described by figure 1.
Figure 1: The Marching cubes algorithm chart
International Journal of Computer Science, Engineering and Information Technology (IJCSEIT), Vol.2, No.2, April 2012
21
3. AAA/SYNDEX-IC METHODOLOGY
3.1 AAA methodology for specified integrated circuits
The AAA methodology aims rapid prototyping and optimized implementation of real time
applications. It is founded on models of graphs forming the algorithm, the architecture and the
adequation.
The data flow graph modeling the algorithm at the behavioral level is gradually transformed until
it matches the hardware graph architecture, which includes the control path graph and data path
graph [4] [5] [6]. The result of these transformations corresponds to optimized hardware
implementation [4] [5] [6].
The adequation is to choose among all possible algorithm implementations on an architecture the
one whose performance characteristics derived from the components of the architecture (the
current version of SynDEx-IC architecture supports a single-component), respecting the real-time
constraints, while minimizing the consumption of hardware resources (surface), thus an
optimization problem.
Figure 2 describes the stages of the implementation process AAA applied to the circuits.
Figure 2: The AAA methodology for circuits
3.2 SynDEx-IC tool
SynDEx-IC (Synchronized Distibuted Executive-IC) is free software developed by the ESIEE
team "design architecture" of A2SI Laboratory, focusing on the AAA methodology. This software
tries to be, before the execution, an implementation of the algorithm that meets a given latency
constraint while being implanted on the target circuit. For this, SynDEx-Ic works on factorization
ie the more factorized loop, the more parallelism.
But, the area is necessary for its implementation increases. It allows therefore exploring the
nested loops in order to find for each loop the rate defactorization, which can respect the
execution data contraints.
Because it is impossible to explore all possibilities defactorization in reasonable times, SynDEx-
IC use approximate methods based on heuristics. The result of the heuristic is then converted into
International Journal of Computer Science, Engineering and Information Technology (IJCSEIT), Vol.2, No.2, April 2012
22
a synthesizable VHDL code to be executed directly on the target component or to be simulated.
The specification of the algorithm is in the form a Data Dependence Graph (Figure 3) including
the regular parts (regular repeating patterns) and not regular. This specification should be
independent of any hardware implementation constraints and requires the implementation of a
process of decomposition of the algorithm in implantable operations (addition, subtraction and
multiplication) [6].
Figure 3.: Example of the SynDEx-IC main algorithm graph
To reduce the specification size and adopt these regular parts, we use a factorization process,
which shows four specific types of nodes (factorization frontiers nodes): F (Fork node), J (Join
node), D (Diffusion node) and I (Iterate node). This factorization process specifies different ways
to factor the data and operation across a factoring frontier.
The designer models the target architecture (the type of FPGA) through the graphic interface of
SynDEx-IC (Figure 4). Once the architecture has been specified, it is necessary to characterize the
set operations of the algorithm graph in terms of area by number of slices, and in terms of latency,
to ensure its hardware implementation on the target component. These values can come from
libraries or measurements.
Figure 4: Example of the SynDEx-IC architecture graph.
4. MARCHING CUBES DEVELOPMENT BY USING SYNDEX-IC
4.1 Algorithmic specification
The index calculation presents the second stage of the Marching cubes operation. This index is
calculated by comparing each vertex of the cube with the threshold. This latter, was chosen by the
user to characterize the interesting surface (in our case we chose a threshold = 80).
The index is a binary sequence of 8 bits size which the value varies from 0 to 255. It provides
information on the positions of the inside and outside for the interested surface.
International Journal of Computer Science, Engineering and Information Technology (IJCSEIT), Vol.2, No.2, April 2012
23
Each bit of the index is associated with one vertex; the bit is "1" if the point is internal, "0" if not.
The surface then cuts the edges of the cube when the two vertices forming the edge are signs
opposites (one is 0 the other is "1").
Figure 5 shows an example of index calculation where we have a cube whose vertices 0 and 2 are
internal points on the surface; thus producing an index equal to 5.
Figure 5: Example of Index calculation
Thus, by factoring the index calculation block, we have FF2 that represents the factorization
frontier of repetitive patterns of the index calculations block (the repeat unit contains a
comparator, multiplier and adder).these operators are specified in loop "For s = 0 ... 7 do." (Figure
6).
Figure 6: Factorization of index calculation block
FF2 is applied eight times and is delimited by factorization node (F1, F2, I1). The two nodes
F1 and F2 are separate its input array (8 intensities and 8 constants) in its elements, while the
node (I1) makes the factorization of inter-pattern data.
Added to the factorization frontier FF2, the GFCDD of the Marching Cubes algorithm contains
two nested frontiers FF3 and FF4 their factorization factor respectively 15 and 3. The first
(marked by the degree of repetition) is the factorization of unit calculations contained in the loop
"For a=1...15 do." The second is the factorization contained in the loop "For c = x, y, z do"
(Figure 7).
International Journal of Computer Science, Engineering and Information Technology (IJCSEIT), Vol.2, No.2, April 2012
24
Figure 7: GFCDD of Marching Cubes algorithm for a voxel processing
4.2 Architectural exploration of the Marching cubes implementation
The architectural exploration is based on a heuristic, which builds the solution iteratively. The
heuristic determines, at each iteration, a defactorization frontier and its defactorization degree.
The factorization frontier is the one that generates the weakest possible area and respects the
imposed latency. The evaluation of each solution is based on the predictive model performance
(latency and area). This prediction requires the characterization of every provider according to the
target technology of the used circuit.
Figure 8 presents the solutions obtained by heuristic optimization under different constraints (µs).
For each case presented, we give the estimated latency and area (number of slices) and the
defactorization degree (DF) of two frontiers FF3 and FF4 (TF means totally factorized).
The results presented in terms of surface and latency, prove that most defactorization solutions
reduce latency, but increase resource consumption. Thus, within the imposed constraints, the
variation of latency and area by the defactorization degree change in level Figure 8.
International Journal of Computer Science, Engineering and Information Technology (IJCSEIT), Vol.2, No.2, April 2012
25
Figure 8: Results of the heuristic according to constraints variation
It should be noted that, in terms of surface, these results correspond only to the area occupied by
the arithmetic and logical operator’s application. The area occupied by the control units of
different factorization frontier nodes are not counted by the SynDEx-IC. The comparator, the
divisor, the logical AND and the memories are defined as empty blocks (with the corresponding
inputs and outputs) in the data flow graph. We defined and allocated to each operator the
occupied area memory blocks (number of slices) and the latency in the architectural
specifications. The parallelism depends on the degree of each defactorization frontier following
the constraint. For a constant surface, the variation of latency depending on defactorization degree
is due to the sequential execution or partly parallel of the frontier.
4.3 Implementation optimization
4.3.1 Data graph
The graph in Figure 9 shows the data path optimized implementation of the Marching Cubes
algorithm for a voxel processing. These blocks include: the calculation operators, the memory and
the registers.
International Journal of Computer Science, Engineering and Information Technology (IJCSEIT), Vol.2, No.2, April 2012
26
Figure 9: Data path of the optimized implementation
4.3.2 Control graph
Figure 10 presents only the control path and shows the action of each control unit UC1, UC2 and
UC3 on different nodes of the factorization frontiers. Each UC contains a counter (corresponding
to the factorized repetitions), a requests (r) and acknowledge (a) signal implanting the
consumption / production of data between the different frontiers.
Figure 10: control path of the optimized implementation
Based on the neighborhood relations between the various factorizations frontiers of the algorithms
International Journal of Computer Science, Engineering and Information Technology (IJCSEIT), Vol.2, No.2, April 2012
27
graph, the AAA methodology generates a neighborhood graph Gv as described in figure 11.
Figure 11: the neighborhood graph corresponding to a defactorization by four
5. FPGA BASED SYSTEM FOR THE MARCHING CUBES
Since the processing core is concentrated in a voxel, we propose to keep the processing block of
an optimal cube made by SynDEx-IC like IP and integrated into a platform created for the 3D
reconstruction (Marching Cubes), as described below by Figure 12.
International Journal of Computer Science, Engineering and Information Technology (IJCSEIT), Vol.2, No.2, April 2012
28
Figure 12: Block schema of the Marching Cubes algorithm
Table 1 : the implementation resource of blok processing of on cube on Virtex 4
We subdivise the Marching Cubes algorithm into two modules named respectively: Managing
Memory and Calculation of triangles. The memory management system can store the image slices
into a RAM. Every eight intensity pixel values forming a voxel will be loaded into a line. This
ensures the processing of voxels, one by one. The intensities of the pixels and their coordinates
(x, y, z) are coded by 8 bits. Z is the number of slices which are been processing.
The architecture of the memory management module, allows reading intensities of 8 pixels (4
pixels of each section). The eight intensity values are then put into a comparator to be compared
to a threshold called iso-value (this is the segmentation image by thresholding in real time). An
index will be generated by the comparator noted cube_index coded by 8 bits. The coordinates (x,
y, z) of each pixel will be used in the second part of the algorithm for calculating the coordinates
of the intersection points and the triangles creation of the interested surface.
To respect the latency constraint, the heuristic identified the optimal defactorization factors of
each frontier component on the critical path. In our example, the heu heuristic has opted for a
implementation defactorization both frontiers FF2 and FF3 by a factor of 4.
Table 1 presents the number of sections occupied by the processing block of a cube made by
SynDEx-IC as IP for two different constraints on Virtex4 (XC4VLX15).
6. CONCLUSION
From an algorithmic specification of factorized and conditioned data dependence graph
(GFCDD), we have adopted the AAA methodology and software SynDEx -IC to optimize the
implementation of the 3D reconstruction algorithm "Marching Cubes" on programmable circuit.
We exploited the aspect of repetitive mode in this algorithm for a better factorization. This
approach allowed the synthesis of the implementation of the Marching Cubes algorithm by
imposing latency constraints.
We have showed the benefit of using the AAA methodology and the associated software tool to
specify and explore the different possible architectural solutions and to select the optimal solution
which corresponds to the target application. By using a Virtex 4 (XC4VLX15) device, the best
match of the location of the Marching Cubes Algorithm for a cube processing is a fully factorized
architecture whose execution time is equal to 43 81 776 ms at a frequency of 50 MHz. By
International Journal of Computer Science, Engineering and Information Technology (IJCSEIT), Vol.2, No.2, April 2012
29
implementing defactorized one (defactorization degree equal to 4) the execution time is reduced
to 16.43166 ms at a same frequency for 24 slices of size 64 x 64.
REFERENCES
[1] William E. Lorensen and Harvey E. Cline. (1987) “Marching cubes: A high resolution 3D surface
construction algorithm,” Computer Graphics, 21(4), 163–169.
[2] H. Hoppe, T. DeRose, T. Duchamp, J. McDonald & W. Stuetzle (1992) “Surface Reconstruction from
Unorganized Points”. Proceedings of Computer graphics, pp 71 78.
[3] D. Marr et E. Hildreth (1980 ) “Theory of Edge Detection”, Proc. R. Soc. London, B207, pp:1187-
217.
[4] Boubaker Mohamed, Akil Mohamed, Ben Khalifa Khaled, Bedoui Mohamed Hedi, (2007)
“Architecture dédiée pour le traitement temps réel des signaux physiologiques: spécification
algorithmique et méthodologie d’implantation sur circuits reconfigurables” Colloque GRETSI 2007,
Troyes.
[5] T. Grandpierre, Y. Sorel. (2003) “From Algorithm and Architecture Specifiations to Automatic
Generation of Distributed Real-Time Executives: a Seamless Flow Graphs Transformations”, IN
Procs. IEEE Formal Methods and Models for Codesign Conference (MEMCODE’2003), pp: 123-
133, Mont Saint-Michel, France.
[6] L.Kaouane, M.Akil, Y.Sorel, T.grandpierre, (2004) ”A methodology to implement real-time
applications on reconfigurable circuits”, Special issue on Engineering of Configurable Systems of the
Journal of Supercomputing, Kluwer Academic Publisher, Vol.30, No.3.
Authors
Manel MILI received the Bachelor’s and Master‘s Degree in the National
Engineering School of Sfax, University of Sfax, in 2007 and 2008 respectively. Since
2009, she has been working as a Research Scientist at the Research team of Medical
Imaging Technology (TIM), Faculty of Medicine at Monastir University of Monastir
where she prepares his thesis. She has also four published paper in international
conference in the same areas. His areas of interest include dedicated architecture of
medical image processing.
Bouraoui MAHMOUD received the Bachelor’s, Master‘s Degree and doctorate in
the Faculty of Science at Monastir from Mastir University, in 1997, 1999 and 2006
respectively. Since 2008, He is currently Assistant Professor in the Department of
Industrial Electronics in the National Engineering School of Sousse, University of
Sousse. He has four published papers in international journals. His areas of interest
include embedded processor, embedded system, medical imaging, codesign HW/SW.
Mohamed Hedi BEDOUI Since 2011, He is currently Professor in Biophysics in the Faculty of Medecine
at Monastir from Monastir University. He has many published papers in international journals. His areas of
interest include Biophysics, medical imaging processing, embedded system, codesign HW/SW.

More Related Content

What's hot

A Fast Floating Point Double Precision Implementation on Fpga
A Fast Floating Point Double Precision Implementation on FpgaA Fast Floating Point Double Precision Implementation on Fpga
A Fast Floating Point Double Precision Implementation on FpgaIJERA Editor
 
Data Processing Techniques for 3D Surface Morphology
Data Processing Techniques for 3D Surface MorphologyData Processing Techniques for 3D Surface Morphology
Data Processing Techniques for 3D Surface Morphologytheijes
 
Design of advanced encryption standard using Vedic Mathematics
Design of advanced encryption standard using Vedic MathematicsDesign of advanced encryption standard using Vedic Mathematics
Design of advanced encryption standard using Vedic MathematicsAM Publications
 
Automatic rectification of perspective distortion from a single image using p...
Automatic rectification of perspective distortion from a single image using p...Automatic rectification of perspective distortion from a single image using p...
Automatic rectification of perspective distortion from a single image using p...ijcsa
 
Real-time Multi-object Face Recognition Using Content Based Image Retrieval (...
Real-time Multi-object Face Recognition Using Content Based Image Retrieval (...Real-time Multi-object Face Recognition Using Content Based Image Retrieval (...
Real-time Multi-object Face Recognition Using Content Based Image Retrieval (...IJECEIAES
 
GRAPH PARTITIONING FOR IMAGE SEGMENTATION USING ISOPERIMETRIC APPROACH: A REVIEW
GRAPH PARTITIONING FOR IMAGE SEGMENTATION USING ISOPERIMETRIC APPROACH: A REVIEWGRAPH PARTITIONING FOR IMAGE SEGMENTATION USING ISOPERIMETRIC APPROACH: A REVIEW
GRAPH PARTITIONING FOR IMAGE SEGMENTATION USING ISOPERIMETRIC APPROACH: A REVIEWDrm Kapoor
 
Integration of poses to enhance the shape of the object tracking from a singl...
Integration of poses to enhance the shape of the object tracking from a singl...Integration of poses to enhance the shape of the object tracking from a singl...
Integration of poses to enhance the shape of the object tracking from a singl...eSAT Journals
 
Image confusion and diffusion based on multi-chaotic system and mix-column
Image confusion and diffusion based on multi-chaotic system and mix-columnImage confusion and diffusion based on multi-chaotic system and mix-column
Image confusion and diffusion based on multi-chaotic system and mix-columnjournalBEEI
 
AutomeshPaper1996.DOC
AutomeshPaper1996.DOCAutomeshPaper1996.DOC
AutomeshPaper1996.DOCPeter Bailey
 
Enhanced slicing algorithm
Enhanced slicing algorithmEnhanced slicing algorithm
Enhanced slicing algorithmMostapha Aharak
 
Based on the cross section contour surface model reconstruction
Based on the cross section contour surface model reconstructionBased on the cross section contour surface model reconstruction
Based on the cross section contour surface model reconstructionIJRES Journal
 
The automatic license plate recognition(alpr)
The automatic license plate recognition(alpr)The automatic license plate recognition(alpr)
The automatic license plate recognition(alpr)eSAT Journals
 
11.design and modeling of tool trajectory in c0000www.iiste.org call for pape...
11.design and modeling of tool trajectory in c0000www.iiste.org call for pape...11.design and modeling of tool trajectory in c0000www.iiste.org call for pape...
11.design and modeling of tool trajectory in c0000www.iiste.org call for pape...Alexander Decker
 
3-D FFT Moving Object Signatures for Velocity Filtering
3-D FFT Moving Object Signatures for Velocity Filtering3-D FFT Moving Object Signatures for Velocity Filtering
3-D FFT Moving Object Signatures for Velocity FilteringIDES Editor
 
The automatic license plate recognition(alpr)
The automatic license plate recognition(alpr)The automatic license plate recognition(alpr)
The automatic license plate recognition(alpr)eSAT Publishing House
 

What's hot (19)

A Fast Floating Point Double Precision Implementation on Fpga
A Fast Floating Point Double Precision Implementation on FpgaA Fast Floating Point Double Precision Implementation on Fpga
A Fast Floating Point Double Precision Implementation on Fpga
 
Kq3518291832
Kq3518291832Kq3518291832
Kq3518291832
 
Data Processing Techniques for 3D Surface Morphology
Data Processing Techniques for 3D Surface MorphologyData Processing Techniques for 3D Surface Morphology
Data Processing Techniques for 3D Surface Morphology
 
Design of advanced encryption standard using Vedic Mathematics
Design of advanced encryption standard using Vedic MathematicsDesign of advanced encryption standard using Vedic Mathematics
Design of advanced encryption standard using Vedic Mathematics
 
Automatic rectification of perspective distortion from a single image using p...
Automatic rectification of perspective distortion from a single image using p...Automatic rectification of perspective distortion from a single image using p...
Automatic rectification of perspective distortion from a single image using p...
 
Real-time Multi-object Face Recognition Using Content Based Image Retrieval (...
Real-time Multi-object Face Recognition Using Content Based Image Retrieval (...Real-time Multi-object Face Recognition Using Content Based Image Retrieval (...
Real-time Multi-object Face Recognition Using Content Based Image Retrieval (...
 
GRAPH PARTITIONING FOR IMAGE SEGMENTATION USING ISOPERIMETRIC APPROACH: A REVIEW
GRAPH PARTITIONING FOR IMAGE SEGMENTATION USING ISOPERIMETRIC APPROACH: A REVIEWGRAPH PARTITIONING FOR IMAGE SEGMENTATION USING ISOPERIMETRIC APPROACH: A REVIEW
GRAPH PARTITIONING FOR IMAGE SEGMENTATION USING ISOPERIMETRIC APPROACH: A REVIEW
 
Integration of poses to enhance the shape of the object tracking from a singl...
Integration of poses to enhance the shape of the object tracking from a singl...Integration of poses to enhance the shape of the object tracking from a singl...
Integration of poses to enhance the shape of the object tracking from a singl...
 
B018110915
B018110915B018110915
B018110915
 
Image confusion and diffusion based on multi-chaotic system and mix-column
Image confusion and diffusion based on multi-chaotic system and mix-columnImage confusion and diffusion based on multi-chaotic system and mix-column
Image confusion and diffusion based on multi-chaotic system and mix-column
 
AutomeshPaper1996.DOC
AutomeshPaper1996.DOCAutomeshPaper1996.DOC
AutomeshPaper1996.DOC
 
Cad cam
Cad camCad cam
Cad cam
 
Enhanced slicing algorithm
Enhanced slicing algorithmEnhanced slicing algorithm
Enhanced slicing algorithm
 
Based on the cross section contour surface model reconstruction
Based on the cross section contour surface model reconstructionBased on the cross section contour surface model reconstruction
Based on the cross section contour surface model reconstruction
 
The automatic license plate recognition(alpr)
The automatic license plate recognition(alpr)The automatic license plate recognition(alpr)
The automatic license plate recognition(alpr)
 
11.design and modeling of tool trajectory in c0000www.iiste.org call for pape...
11.design and modeling of tool trajectory in c0000www.iiste.org call for pape...11.design and modeling of tool trajectory in c0000www.iiste.org call for pape...
11.design and modeling of tool trajectory in c0000www.iiste.org call for pape...
 
3-D FFT Moving Object Signatures for Velocity Filtering
3-D FFT Moving Object Signatures for Velocity Filtering3-D FFT Moving Object Signatures for Velocity Filtering
3-D FFT Moving Object Signatures for Velocity Filtering
 
The automatic license plate recognition(alpr)
The automatic license plate recognition(alpr)The automatic license plate recognition(alpr)
The automatic license plate recognition(alpr)
 
paper
paperpaper
paper
 

Similar to ALGORITHMIC AND ARCHITECTURAL OPTIMIZATION OF A 3D RECONSTRUCTION MEDICAL IMAGES ALGORITHM FOR A HARDWARE IMPLEMENTATION

Implementation of an arithmetic logic using area efficient carry lookahead adder
Implementation of an arithmetic logic using area efficient carry lookahead adderImplementation of an arithmetic logic using area efficient carry lookahead adder
Implementation of an arithmetic logic using area efficient carry lookahead adderVLSICS Design
 
Advanced Algorithms for Etching Simulation of 3d Mems-Tunable Lasers
Advanced Algorithms for Etching Simulation of 3d Mems-Tunable Lasers Advanced Algorithms for Etching Simulation of 3d Mems-Tunable Lasers
Advanced Algorithms for Etching Simulation of 3d Mems-Tunable Lasers ijctcm
 
Comparative analysis of multi stage cordic using micro rotation techniq
Comparative analysis of multi stage cordic using micro rotation techniqComparative analysis of multi stage cordic using micro rotation techniq
Comparative analysis of multi stage cordic using micro rotation techniqIAEME Publication
 
Comparative analysis of multi stage cordic using micro rotation techniq
Comparative analysis of multi stage cordic using micro rotation techniqComparative analysis of multi stage cordic using micro rotation techniq
Comparative analysis of multi stage cordic using micro rotation techniqIAEME Publication
 
Comparative analysis of multi stage cordic using micro rotation techniq
Comparative analysis of multi stage cordic using micro rotation techniqComparative analysis of multi stage cordic using micro rotation techniq
Comparative analysis of multi stage cordic using micro rotation techniqIAEME Publication
 
Comparative analysis of multi stage cordic using micro rotation technique
Comparative analysis of multi stage cordic using micro rotation techniqueComparative analysis of multi stage cordic using micro rotation technique
Comparative analysis of multi stage cordic using micro rotation techniqueIAEME Publication
 
3-Phase Recognition Approach to Pseudo 3D Building Generation from 2D Floor P...
3-Phase Recognition Approach to Pseudo 3D Building Generation from 2D Floor P...3-Phase Recognition Approach to Pseudo 3D Building Generation from 2D Floor P...
3-Phase Recognition Approach to Pseudo 3D Building Generation from 2D Floor P...ijcga
 
IC Layout Design of 4-bit Magnitude Comparator using Electric VLSI Design System
IC Layout Design of 4-bit Magnitude Comparator using Electric VLSI Design SystemIC Layout Design of 4-bit Magnitude Comparator using Electric VLSI Design System
IC Layout Design of 4-bit Magnitude Comparator using Electric VLSI Design SystemIOSRJVSP
 
Design of a Novel Multiplier and Accumulator using Modified Booth Algorithm w...
Design of a Novel Multiplier and Accumulator using Modified Booth Algorithm w...Design of a Novel Multiplier and Accumulator using Modified Booth Algorithm w...
Design of a Novel Multiplier and Accumulator using Modified Booth Algorithm w...IRJET Journal
 
Fuzzy Type Image Fusion Using SPIHT Image Compression Technique
Fuzzy Type Image Fusion Using SPIHT Image Compression TechniqueFuzzy Type Image Fusion Using SPIHT Image Compression Technique
Fuzzy Type Image Fusion Using SPIHT Image Compression TechniqueIJERA Editor
 
Bivariatealgebraic integerencoded arai algorithm for
Bivariatealgebraic integerencoded arai algorithm forBivariatealgebraic integerencoded arai algorithm for
Bivariatealgebraic integerencoded arai algorithm foreSAT Publishing House
 
IRJET - Single Image Super Resolution using Machine Learning
IRJET - Single Image Super Resolution using Machine LearningIRJET - Single Image Super Resolution using Machine Learning
IRJET - Single Image Super Resolution using Machine LearningIRJET Journal
 
Application of gaussian filter with principal component analysis
Application of gaussian filter with principal component analysisApplication of gaussian filter with principal component analysis
Application of gaussian filter with principal component analysisIAEME Publication
 
Application of gaussian filter with principal component analysis
Application of gaussian filter with principal component analysisApplication of gaussian filter with principal component analysis
Application of gaussian filter with principal component analysisIAEME Publication
 
Implementation of an Effective Self-Timed Multiplier for Single Precision Flo...
Implementation of an Effective Self-Timed Multiplier for Single Precision Flo...Implementation of an Effective Self-Timed Multiplier for Single Precision Flo...
Implementation of an Effective Self-Timed Multiplier for Single Precision Flo...IRJET Journal
 

Similar to ALGORITHMIC AND ARCHITECTURAL OPTIMIZATION OF A 3D RECONSTRUCTION MEDICAL IMAGES ALGORITHM FOR A HARDWARE IMPLEMENTATION (20)

imagefiltervhdl.pptx
imagefiltervhdl.pptximagefiltervhdl.pptx
imagefiltervhdl.pptx
 
Lv3421272135
Lv3421272135Lv3421272135
Lv3421272135
 
Implementation of an arithmetic logic using area efficient carry lookahead adder
Implementation of an arithmetic logic using area efficient carry lookahead adderImplementation of an arithmetic logic using area efficient carry lookahead adder
Implementation of an arithmetic logic using area efficient carry lookahead adder
 
Advanced Algorithms for Etching Simulation of 3d Mems-Tunable Lasers
Advanced Algorithms for Etching Simulation of 3d Mems-Tunable Lasers Advanced Algorithms for Etching Simulation of 3d Mems-Tunable Lasers
Advanced Algorithms for Etching Simulation of 3d Mems-Tunable Lasers
 
50120130406037
5012013040603750120130406037
50120130406037
 
C010421720
C010421720C010421720
C010421720
 
Comparative analysis of multi stage cordic using micro rotation techniq
Comparative analysis of multi stage cordic using micro rotation techniqComparative analysis of multi stage cordic using micro rotation techniq
Comparative analysis of multi stage cordic using micro rotation techniq
 
Comparative analysis of multi stage cordic using micro rotation techniq
Comparative analysis of multi stage cordic using micro rotation techniqComparative analysis of multi stage cordic using micro rotation techniq
Comparative analysis of multi stage cordic using micro rotation techniq
 
Comparative analysis of multi stage cordic using micro rotation techniq
Comparative analysis of multi stage cordic using micro rotation techniqComparative analysis of multi stage cordic using micro rotation techniq
Comparative analysis of multi stage cordic using micro rotation techniq
 
Comparative analysis of multi stage cordic using micro rotation technique
Comparative analysis of multi stage cordic using micro rotation techniqueComparative analysis of multi stage cordic using micro rotation technique
Comparative analysis of multi stage cordic using micro rotation technique
 
3-Phase Recognition Approach to Pseudo 3D Building Generation from 2D Floor P...
3-Phase Recognition Approach to Pseudo 3D Building Generation from 2D Floor P...3-Phase Recognition Approach to Pseudo 3D Building Generation from 2D Floor P...
3-Phase Recognition Approach to Pseudo 3D Building Generation from 2D Floor P...
 
IC Layout Design of 4-bit Magnitude Comparator using Electric VLSI Design System
IC Layout Design of 4-bit Magnitude Comparator using Electric VLSI Design SystemIC Layout Design of 4-bit Magnitude Comparator using Electric VLSI Design System
IC Layout Design of 4-bit Magnitude Comparator using Electric VLSI Design System
 
Design of a Novel Multiplier and Accumulator using Modified Booth Algorithm w...
Design of a Novel Multiplier and Accumulator using Modified Booth Algorithm w...Design of a Novel Multiplier and Accumulator using Modified Booth Algorithm w...
Design of a Novel Multiplier and Accumulator using Modified Booth Algorithm w...
 
Fuzzy Type Image Fusion Using SPIHT Image Compression Technique
Fuzzy Type Image Fusion Using SPIHT Image Compression TechniqueFuzzy Type Image Fusion Using SPIHT Image Compression Technique
Fuzzy Type Image Fusion Using SPIHT Image Compression Technique
 
Bivariatealgebraic integerencoded arai algorithm for
Bivariatealgebraic integerencoded arai algorithm forBivariatealgebraic integerencoded arai algorithm for
Bivariatealgebraic integerencoded arai algorithm for
 
IRJET - Single Image Super Resolution using Machine Learning
IRJET - Single Image Super Resolution using Machine LearningIRJET - Single Image Super Resolution using Machine Learning
IRJET - Single Image Super Resolution using Machine Learning
 
Application of gaussian filter with principal component analysis
Application of gaussian filter with principal component analysisApplication of gaussian filter with principal component analysis
Application of gaussian filter with principal component analysis
 
Application of gaussian filter with principal component analysis
Application of gaussian filter with principal component analysisApplication of gaussian filter with principal component analysis
Application of gaussian filter with principal component analysis
 
Ijetcas14 430
Ijetcas14 430Ijetcas14 430
Ijetcas14 430
 
Implementation of an Effective Self-Timed Multiplier for Single Precision Flo...
Implementation of an Effective Self-Timed Multiplier for Single Precision Flo...Implementation of an Effective Self-Timed Multiplier for Single Precision Flo...
Implementation of an Effective Self-Timed Multiplier for Single Precision Flo...
 

More from IJCSEIT Journal

ANALYSIS OF EXISTING TRAILERS’ CONTAINER LOCK SYSTEMS
ANALYSIS OF EXISTING TRAILERS’ CONTAINER LOCK SYSTEMS ANALYSIS OF EXISTING TRAILERS’ CONTAINER LOCK SYSTEMS
ANALYSIS OF EXISTING TRAILERS’ CONTAINER LOCK SYSTEMS IJCSEIT Journal
 
A MODEL FOR REMOTE ACCESS AND PROTECTION OF SMARTPHONES USING SHORT MESSAGE S...
A MODEL FOR REMOTE ACCESS AND PROTECTION OF SMARTPHONES USING SHORT MESSAGE S...A MODEL FOR REMOTE ACCESS AND PROTECTION OF SMARTPHONES USING SHORT MESSAGE S...
A MODEL FOR REMOTE ACCESS AND PROTECTION OF SMARTPHONES USING SHORT MESSAGE S...IJCSEIT Journal
 
BIOMETRIC APPLICATION OF INTELLIGENT AGENTS IN FAKE DOCUMENT DETECTION OF JOB...
BIOMETRIC APPLICATION OF INTELLIGENT AGENTS IN FAKE DOCUMENT DETECTION OF JOB...BIOMETRIC APPLICATION OF INTELLIGENT AGENTS IN FAKE DOCUMENT DETECTION OF JOB...
BIOMETRIC APPLICATION OF INTELLIGENT AGENTS IN FAKE DOCUMENT DETECTION OF JOB...IJCSEIT Journal
 
FACE RECOGNITION USING DIFFERENT LOCAL FEATURES WITH DIFFERENT DISTANCE TECHN...
FACE RECOGNITION USING DIFFERENT LOCAL FEATURES WITH DIFFERENT DISTANCE TECHN...FACE RECOGNITION USING DIFFERENT LOCAL FEATURES WITH DIFFERENT DISTANCE TECHN...
FACE RECOGNITION USING DIFFERENT LOCAL FEATURES WITH DIFFERENT DISTANCE TECHN...IJCSEIT Journal
 
BIOMETRICS AUTHENTICATION TECHNIQUE FOR INTRUSION DETECTION SYSTEMS USING FIN...
BIOMETRICS AUTHENTICATION TECHNIQUE FOR INTRUSION DETECTION SYSTEMS USING FIN...BIOMETRICS AUTHENTICATION TECHNIQUE FOR INTRUSION DETECTION SYSTEMS USING FIN...
BIOMETRICS AUTHENTICATION TECHNIQUE FOR INTRUSION DETECTION SYSTEMS USING FIN...IJCSEIT Journal
 
PERFORMANCE ANALYSIS OF FINGERPRINTING EXTRACTION ALGORITHM IN VIDEO COPY DET...
PERFORMANCE ANALYSIS OF FINGERPRINTING EXTRACTION ALGORITHM IN VIDEO COPY DET...PERFORMANCE ANALYSIS OF FINGERPRINTING EXTRACTION ALGORITHM IN VIDEO COPY DET...
PERFORMANCE ANALYSIS OF FINGERPRINTING EXTRACTION ALGORITHM IN VIDEO COPY DET...IJCSEIT Journal
 
Effect of Interleaved FEC Code on Wavelet Based MC-CDMA System with Alamouti ...
Effect of Interleaved FEC Code on Wavelet Based MC-CDMA System with Alamouti ...Effect of Interleaved FEC Code on Wavelet Based MC-CDMA System with Alamouti ...
Effect of Interleaved FEC Code on Wavelet Based MC-CDMA System with Alamouti ...IJCSEIT Journal
 
FUZZY WEIGHTED ASSOCIATIVE CLASSIFIER: A PREDICTIVE TECHNIQUE FOR HEALTH CARE...
FUZZY WEIGHTED ASSOCIATIVE CLASSIFIER: A PREDICTIVE TECHNIQUE FOR HEALTH CARE...FUZZY WEIGHTED ASSOCIATIVE CLASSIFIER: A PREDICTIVE TECHNIQUE FOR HEALTH CARE...
FUZZY WEIGHTED ASSOCIATIVE CLASSIFIER: A PREDICTIVE TECHNIQUE FOR HEALTH CARE...IJCSEIT Journal
 
GENDER RECOGNITION SYSTEM USING SPEECH SIGNAL
GENDER RECOGNITION SYSTEM USING SPEECH SIGNALGENDER RECOGNITION SYSTEM USING SPEECH SIGNAL
GENDER RECOGNITION SYSTEM USING SPEECH SIGNALIJCSEIT Journal
 
DETECTION OF CONCEALED WEAPONS IN X-RAY IMAGES USING FUZZY K-NN
DETECTION OF CONCEALED WEAPONS IN X-RAY IMAGES USING FUZZY K-NNDETECTION OF CONCEALED WEAPONS IN X-RAY IMAGES USING FUZZY K-NN
DETECTION OF CONCEALED WEAPONS IN X-RAY IMAGES USING FUZZY K-NNIJCSEIT Journal
 
META-HEURISTICS BASED ARF OPTIMIZATION FOR IMAGE RETRIEVAL
META-HEURISTICS BASED ARF OPTIMIZATION FOR IMAGE RETRIEVALMETA-HEURISTICS BASED ARF OPTIMIZATION FOR IMAGE RETRIEVAL
META-HEURISTICS BASED ARF OPTIMIZATION FOR IMAGE RETRIEVALIJCSEIT Journal
 
ERROR PERFORMANCE ANALYSIS USING COOPERATIVE CONTENTION-BASED ROUTING IN WIRE...
ERROR PERFORMANCE ANALYSIS USING COOPERATIVE CONTENTION-BASED ROUTING IN WIRE...ERROR PERFORMANCE ANALYSIS USING COOPERATIVE CONTENTION-BASED ROUTING IN WIRE...
ERROR PERFORMANCE ANALYSIS USING COOPERATIVE CONTENTION-BASED ROUTING IN WIRE...IJCSEIT Journal
 
M-FISH KARYOTYPING - A NEW APPROACH BASED ON WATERSHED TRANSFORM
M-FISH KARYOTYPING - A NEW APPROACH BASED ON WATERSHED TRANSFORMM-FISH KARYOTYPING - A NEW APPROACH BASED ON WATERSHED TRANSFORM
M-FISH KARYOTYPING - A NEW APPROACH BASED ON WATERSHED TRANSFORMIJCSEIT Journal
 
RANDOMIZED STEGANOGRAPHY IN SKIN TONE IMAGES
RANDOMIZED STEGANOGRAPHY IN SKIN TONE IMAGESRANDOMIZED STEGANOGRAPHY IN SKIN TONE IMAGES
RANDOMIZED STEGANOGRAPHY IN SKIN TONE IMAGESIJCSEIT Journal
 
A NOVEL WINDOW FUNCTION YIELDING SUPPRESSED MAINLOBE WIDTH AND MINIMUM SIDELO...
A NOVEL WINDOW FUNCTION YIELDING SUPPRESSED MAINLOBE WIDTH AND MINIMUM SIDELO...A NOVEL WINDOW FUNCTION YIELDING SUPPRESSED MAINLOBE WIDTH AND MINIMUM SIDELO...
A NOVEL WINDOW FUNCTION YIELDING SUPPRESSED MAINLOBE WIDTH AND MINIMUM SIDELO...IJCSEIT Journal
 
CSHURI – Modified HURI algorithm for Customer Segmentation and Transaction Pr...
CSHURI – Modified HURI algorithm for Customer Segmentation and Transaction Pr...CSHURI – Modified HURI algorithm for Customer Segmentation and Transaction Pr...
CSHURI – Modified HURI algorithm for Customer Segmentation and Transaction Pr...IJCSEIT Journal
 
AN EFFICIENT IMPLEMENTATION OF TRACKING USING KALMAN FILTER FOR UNDERWATER RO...
AN EFFICIENT IMPLEMENTATION OF TRACKING USING KALMAN FILTER FOR UNDERWATER RO...AN EFFICIENT IMPLEMENTATION OF TRACKING USING KALMAN FILTER FOR UNDERWATER RO...
AN EFFICIENT IMPLEMENTATION OF TRACKING USING KALMAN FILTER FOR UNDERWATER RO...IJCSEIT Journal
 
USING DATA MINING TECHNIQUES FOR DIAGNOSIS AND PROGNOSIS OF CANCER DISEASE
USING DATA MINING TECHNIQUES FOR DIAGNOSIS AND PROGNOSIS OF CANCER DISEASEUSING DATA MINING TECHNIQUES FOR DIAGNOSIS AND PROGNOSIS OF CANCER DISEASE
USING DATA MINING TECHNIQUES FOR DIAGNOSIS AND PROGNOSIS OF CANCER DISEASEIJCSEIT Journal
 
FACTORS AFFECTING ACCEPTANCE OF WEB-BASED TRAINING SYSTEM: USING EXTENDED UTA...
FACTORS AFFECTING ACCEPTANCE OF WEB-BASED TRAINING SYSTEM: USING EXTENDED UTA...FACTORS AFFECTING ACCEPTANCE OF WEB-BASED TRAINING SYSTEM: USING EXTENDED UTA...
FACTORS AFFECTING ACCEPTANCE OF WEB-BASED TRAINING SYSTEM: USING EXTENDED UTA...IJCSEIT Journal
 
PROBABILISTIC INTERPRETATION OF COMPLEX FUZZY SET
PROBABILISTIC INTERPRETATION OF COMPLEX FUZZY SETPROBABILISTIC INTERPRETATION OF COMPLEX FUZZY SET
PROBABILISTIC INTERPRETATION OF COMPLEX FUZZY SETIJCSEIT Journal
 

More from IJCSEIT Journal (20)

ANALYSIS OF EXISTING TRAILERS’ CONTAINER LOCK SYSTEMS
ANALYSIS OF EXISTING TRAILERS’ CONTAINER LOCK SYSTEMS ANALYSIS OF EXISTING TRAILERS’ CONTAINER LOCK SYSTEMS
ANALYSIS OF EXISTING TRAILERS’ CONTAINER LOCK SYSTEMS
 
A MODEL FOR REMOTE ACCESS AND PROTECTION OF SMARTPHONES USING SHORT MESSAGE S...
A MODEL FOR REMOTE ACCESS AND PROTECTION OF SMARTPHONES USING SHORT MESSAGE S...A MODEL FOR REMOTE ACCESS AND PROTECTION OF SMARTPHONES USING SHORT MESSAGE S...
A MODEL FOR REMOTE ACCESS AND PROTECTION OF SMARTPHONES USING SHORT MESSAGE S...
 
BIOMETRIC APPLICATION OF INTELLIGENT AGENTS IN FAKE DOCUMENT DETECTION OF JOB...
BIOMETRIC APPLICATION OF INTELLIGENT AGENTS IN FAKE DOCUMENT DETECTION OF JOB...BIOMETRIC APPLICATION OF INTELLIGENT AGENTS IN FAKE DOCUMENT DETECTION OF JOB...
BIOMETRIC APPLICATION OF INTELLIGENT AGENTS IN FAKE DOCUMENT DETECTION OF JOB...
 
FACE RECOGNITION USING DIFFERENT LOCAL FEATURES WITH DIFFERENT DISTANCE TECHN...
FACE RECOGNITION USING DIFFERENT LOCAL FEATURES WITH DIFFERENT DISTANCE TECHN...FACE RECOGNITION USING DIFFERENT LOCAL FEATURES WITH DIFFERENT DISTANCE TECHN...
FACE RECOGNITION USING DIFFERENT LOCAL FEATURES WITH DIFFERENT DISTANCE TECHN...
 
BIOMETRICS AUTHENTICATION TECHNIQUE FOR INTRUSION DETECTION SYSTEMS USING FIN...
BIOMETRICS AUTHENTICATION TECHNIQUE FOR INTRUSION DETECTION SYSTEMS USING FIN...BIOMETRICS AUTHENTICATION TECHNIQUE FOR INTRUSION DETECTION SYSTEMS USING FIN...
BIOMETRICS AUTHENTICATION TECHNIQUE FOR INTRUSION DETECTION SYSTEMS USING FIN...
 
PERFORMANCE ANALYSIS OF FINGERPRINTING EXTRACTION ALGORITHM IN VIDEO COPY DET...
PERFORMANCE ANALYSIS OF FINGERPRINTING EXTRACTION ALGORITHM IN VIDEO COPY DET...PERFORMANCE ANALYSIS OF FINGERPRINTING EXTRACTION ALGORITHM IN VIDEO COPY DET...
PERFORMANCE ANALYSIS OF FINGERPRINTING EXTRACTION ALGORITHM IN VIDEO COPY DET...
 
Effect of Interleaved FEC Code on Wavelet Based MC-CDMA System with Alamouti ...
Effect of Interleaved FEC Code on Wavelet Based MC-CDMA System with Alamouti ...Effect of Interleaved FEC Code on Wavelet Based MC-CDMA System with Alamouti ...
Effect of Interleaved FEC Code on Wavelet Based MC-CDMA System with Alamouti ...
 
FUZZY WEIGHTED ASSOCIATIVE CLASSIFIER: A PREDICTIVE TECHNIQUE FOR HEALTH CARE...
FUZZY WEIGHTED ASSOCIATIVE CLASSIFIER: A PREDICTIVE TECHNIQUE FOR HEALTH CARE...FUZZY WEIGHTED ASSOCIATIVE CLASSIFIER: A PREDICTIVE TECHNIQUE FOR HEALTH CARE...
FUZZY WEIGHTED ASSOCIATIVE CLASSIFIER: A PREDICTIVE TECHNIQUE FOR HEALTH CARE...
 
GENDER RECOGNITION SYSTEM USING SPEECH SIGNAL
GENDER RECOGNITION SYSTEM USING SPEECH SIGNALGENDER RECOGNITION SYSTEM USING SPEECH SIGNAL
GENDER RECOGNITION SYSTEM USING SPEECH SIGNAL
 
DETECTION OF CONCEALED WEAPONS IN X-RAY IMAGES USING FUZZY K-NN
DETECTION OF CONCEALED WEAPONS IN X-RAY IMAGES USING FUZZY K-NNDETECTION OF CONCEALED WEAPONS IN X-RAY IMAGES USING FUZZY K-NN
DETECTION OF CONCEALED WEAPONS IN X-RAY IMAGES USING FUZZY K-NN
 
META-HEURISTICS BASED ARF OPTIMIZATION FOR IMAGE RETRIEVAL
META-HEURISTICS BASED ARF OPTIMIZATION FOR IMAGE RETRIEVALMETA-HEURISTICS BASED ARF OPTIMIZATION FOR IMAGE RETRIEVAL
META-HEURISTICS BASED ARF OPTIMIZATION FOR IMAGE RETRIEVAL
 
ERROR PERFORMANCE ANALYSIS USING COOPERATIVE CONTENTION-BASED ROUTING IN WIRE...
ERROR PERFORMANCE ANALYSIS USING COOPERATIVE CONTENTION-BASED ROUTING IN WIRE...ERROR PERFORMANCE ANALYSIS USING COOPERATIVE CONTENTION-BASED ROUTING IN WIRE...
ERROR PERFORMANCE ANALYSIS USING COOPERATIVE CONTENTION-BASED ROUTING IN WIRE...
 
M-FISH KARYOTYPING - A NEW APPROACH BASED ON WATERSHED TRANSFORM
M-FISH KARYOTYPING - A NEW APPROACH BASED ON WATERSHED TRANSFORMM-FISH KARYOTYPING - A NEW APPROACH BASED ON WATERSHED TRANSFORM
M-FISH KARYOTYPING - A NEW APPROACH BASED ON WATERSHED TRANSFORM
 
RANDOMIZED STEGANOGRAPHY IN SKIN TONE IMAGES
RANDOMIZED STEGANOGRAPHY IN SKIN TONE IMAGESRANDOMIZED STEGANOGRAPHY IN SKIN TONE IMAGES
RANDOMIZED STEGANOGRAPHY IN SKIN TONE IMAGES
 
A NOVEL WINDOW FUNCTION YIELDING SUPPRESSED MAINLOBE WIDTH AND MINIMUM SIDELO...
A NOVEL WINDOW FUNCTION YIELDING SUPPRESSED MAINLOBE WIDTH AND MINIMUM SIDELO...A NOVEL WINDOW FUNCTION YIELDING SUPPRESSED MAINLOBE WIDTH AND MINIMUM SIDELO...
A NOVEL WINDOW FUNCTION YIELDING SUPPRESSED MAINLOBE WIDTH AND MINIMUM SIDELO...
 
CSHURI – Modified HURI algorithm for Customer Segmentation and Transaction Pr...
CSHURI – Modified HURI algorithm for Customer Segmentation and Transaction Pr...CSHURI – Modified HURI algorithm for Customer Segmentation and Transaction Pr...
CSHURI – Modified HURI algorithm for Customer Segmentation and Transaction Pr...
 
AN EFFICIENT IMPLEMENTATION OF TRACKING USING KALMAN FILTER FOR UNDERWATER RO...
AN EFFICIENT IMPLEMENTATION OF TRACKING USING KALMAN FILTER FOR UNDERWATER RO...AN EFFICIENT IMPLEMENTATION OF TRACKING USING KALMAN FILTER FOR UNDERWATER RO...
AN EFFICIENT IMPLEMENTATION OF TRACKING USING KALMAN FILTER FOR UNDERWATER RO...
 
USING DATA MINING TECHNIQUES FOR DIAGNOSIS AND PROGNOSIS OF CANCER DISEASE
USING DATA MINING TECHNIQUES FOR DIAGNOSIS AND PROGNOSIS OF CANCER DISEASEUSING DATA MINING TECHNIQUES FOR DIAGNOSIS AND PROGNOSIS OF CANCER DISEASE
USING DATA MINING TECHNIQUES FOR DIAGNOSIS AND PROGNOSIS OF CANCER DISEASE
 
FACTORS AFFECTING ACCEPTANCE OF WEB-BASED TRAINING SYSTEM: USING EXTENDED UTA...
FACTORS AFFECTING ACCEPTANCE OF WEB-BASED TRAINING SYSTEM: USING EXTENDED UTA...FACTORS AFFECTING ACCEPTANCE OF WEB-BASED TRAINING SYSTEM: USING EXTENDED UTA...
FACTORS AFFECTING ACCEPTANCE OF WEB-BASED TRAINING SYSTEM: USING EXTENDED UTA...
 
PROBABILISTIC INTERPRETATION OF COMPLEX FUZZY SET
PROBABILISTIC INTERPRETATION OF COMPLEX FUZZY SETPROBABILISTIC INTERPRETATION OF COMPLEX FUZZY SET
PROBABILISTIC INTERPRETATION OF COMPLEX FUZZY SET
 

Recently uploaded

Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...srsj9000
 
What are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxWhat are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxwendy cai
 
Application of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptxApplication of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptx959SahilShah
 
complete construction, environmental and economics information of biomass com...
complete construction, environmental and economics information of biomass com...complete construction, environmental and economics information of biomass com...
complete construction, environmental and economics information of biomass com...asadnawaz62
 
pipeline in computer architecture design
pipeline in computer architecture  designpipeline in computer architecture  design
pipeline in computer architecture designssuser87fa0c1
 
GDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSCAESB
 
Churning of Butter, Factors affecting .
Churning of Butter, Factors affecting  .Churning of Butter, Factors affecting  .
Churning of Butter, Factors affecting .Satyam Kumar
 
DATA ANALYTICS PPT definition usage example
DATA ANALYTICS PPT definition usage exampleDATA ANALYTICS PPT definition usage example
DATA ANALYTICS PPT definition usage examplePragyanshuParadkar1
 
An experimental study in using natural admixture as an alternative for chemic...
An experimental study in using natural admixture as an alternative for chemic...An experimental study in using natural admixture as an alternative for chemic...
An experimental study in using natural admixture as an alternative for chemic...Chandu841456
 
Risk Assessment For Installation of Drainage Pipes.pdf
Risk Assessment For Installation of Drainage Pipes.pdfRisk Assessment For Installation of Drainage Pipes.pdf
Risk Assessment For Installation of Drainage Pipes.pdfROCENODodongVILLACER
 
Concrete Mix Design - IS 10262-2019 - .pptx
Concrete Mix Design - IS 10262-2019 - .pptxConcrete Mix Design - IS 10262-2019 - .pptx
Concrete Mix Design - IS 10262-2019 - .pptxKartikeyaDwivedi3
 
Electronically Controlled suspensions system .pdf
Electronically Controlled suspensions system .pdfElectronically Controlled suspensions system .pdf
Electronically Controlled suspensions system .pdfme23b1001
 
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdfCCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdfAsst.prof M.Gokilavani
 
EduAI - E learning Platform integrated with AI
EduAI - E learning Platform integrated with AIEduAI - E learning Platform integrated with AI
EduAI - E learning Platform integrated with AIkoyaldeepu123
 
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube ExchangerStudy on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube ExchangerAnamika Sarkar
 
Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024hassan khalil
 
main PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidmain PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidNikhilNagaraju
 

Recently uploaded (20)

Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
 
What are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxWhat are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptx
 
Application of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptxApplication of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptx
 
complete construction, environmental and economics information of biomass com...
complete construction, environmental and economics information of biomass com...complete construction, environmental and economics information of biomass com...
complete construction, environmental and economics information of biomass com...
 
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
 
pipeline in computer architecture design
pipeline in computer architecture  designpipeline in computer architecture  design
pipeline in computer architecture design
 
GDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentation
 
Churning of Butter, Factors affecting .
Churning of Butter, Factors affecting  .Churning of Butter, Factors affecting  .
Churning of Butter, Factors affecting .
 
DATA ANALYTICS PPT definition usage example
DATA ANALYTICS PPT definition usage exampleDATA ANALYTICS PPT definition usage example
DATA ANALYTICS PPT definition usage example
 
An experimental study in using natural admixture as an alternative for chemic...
An experimental study in using natural admixture as an alternative for chemic...An experimental study in using natural admixture as an alternative for chemic...
An experimental study in using natural admixture as an alternative for chemic...
 
Risk Assessment For Installation of Drainage Pipes.pdf
Risk Assessment For Installation of Drainage Pipes.pdfRisk Assessment For Installation of Drainage Pipes.pdf
Risk Assessment For Installation of Drainage Pipes.pdf
 
Concrete Mix Design - IS 10262-2019 - .pptx
Concrete Mix Design - IS 10262-2019 - .pptxConcrete Mix Design - IS 10262-2019 - .pptx
Concrete Mix Design - IS 10262-2019 - .pptx
 
Electronically Controlled suspensions system .pdf
Electronically Controlled suspensions system .pdfElectronically Controlled suspensions system .pdf
Electronically Controlled suspensions system .pdf
 
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdfCCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
 
EduAI - E learning Platform integrated with AI
EduAI - E learning Platform integrated with AIEduAI - E learning Platform integrated with AI
EduAI - E learning Platform integrated with AI
 
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube ExchangerStudy on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
 
Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024
 
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCRCall Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
 
POWER SYSTEMS-1 Complete notes examples
POWER SYSTEMS-1 Complete notes  examplesPOWER SYSTEMS-1 Complete notes  examples
POWER SYSTEMS-1 Complete notes examples
 
main PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidmain PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfid
 

ALGORITHMIC AND ARCHITECTURAL OPTIMIZATION OF A 3D RECONSTRUCTION MEDICAL IMAGES ALGORITHM FOR A HARDWARE IMPLEMENTATION

  • 1. International Journal of Computer Science, Engineering and Information Technology (IJCSEIT), Vol.2, No.2, April 2012 DOI : 10.5121/ijcseit.2012.2203 19 ALGORITHMIC AND ARCHITECTURAL OPTIMIZATION OF A 3D RECONSTRUCTION MEDICAL IMAGES ALGORITHM FOR A HARDWARE IMPLEMENTATION MILI Manel1 , MAHMOUD Bouraoui2 , BOUBAKER Mohamed1 , BEN ABDALLAH Asma1 , BEDOUI Mohamed Hédi1 , AKIL Mohamed3 1 Research Team of Medical Imaging Technology (TIM), Faculty of Medicine at Monastir University of Monastir, Monastir, Tunisia Mili.manel@gmail.com , medhedi.Bedoui@fmm.rnu.tn 2 National Engineering School of Sousse, University of Sousse, Sousse, Tunisia Bouraoui.Mahmoud@eniso.rnu.tn 3 Laboratoiry of informatic Gaspard-Monge, Team A3SI, ESIEE Paris, University of Paris EST, Bld Blaise Pascal, BP 99, Noisy-Le-Grand, 93162, France akilm@esiee.fr ABSTRACT This paper presents an optimization of an FPGA circuit implementation of 3D reconstruction algorithm of medicals images. It is based on an algorithmic specification in the shape of a Factorized and Conditioned Data Dependences Graph (GFCDD). An automatic and optimized implementation of the algorithm of « Marching Cubes » has been carried out. The repetitive property of the algorithm has been exploited, as much as possible, by means of the methodology “Adequacy Algorithm Structures”. KEYWORDS 3D reconstruction; marching cubes; optimization implementation; AAA; FPGA. 1. INTRODUCTION The 3D reconstruction consists in providing a volumetric representation of an object from a set of minimum information to ensure the description of the 3D volume. Its involvements are increasingly important in various fields especially that in medicine and biology. In this paper, we focus on the optimized implementation of latency and resource material for the reconstruction of volume flux on programmable media to exploit the parallelism of implantation and reduce the latency and area. This article is organized as follow: Section 2 describes the Marching cubes algorithm, Section 3 presents the AAA methodology and SynDEx-IC tool. Section 4 describe Marching cubes development by using SynDEx-IC. In Section 5 we propose the FPGA based system for the Marching Cubes algorithm. Finally, the conclusion is given in Section 6.
  • 2. International Journal of Computer Science, Engineering and Information Technology (IJCSEIT), Vol.2, No.2, April 2012 20 2. MARCHING CUBES Since the Marching Cubes algorithm is not only fast but also easy to implement, it has become a reference in the 3D reconstruction algorithm for the medical image data. This algorithm was designed by William E. Lorensen and Harvey E. Cline in 1987 [1], to generate a 3D model of an interesting anatomical structure, characterized by a given threshold. It uses a set of 2D images previously segmented. The generated surface is described by a 3D triangular mesh. The basic principle of the Marching Cubes algorithm [1] [2] is to subdivide the space into a set of cubes called voxels. Each voxel has 8 vertices and 12 edges [3]. Since each vertex is classified as above or below a given isovalue (threshold), there are 256(28 ) possible topologies inside a voxel. Thanks to rotation symmetry and inversion of inner and outer points, these 265 initial configurations can be reduced to 15 basic configurations. The algorithm consists of drawing a polygon which is in fact, the intersection of a cube and the plan which locally modelizes the surface. For example, if the polygon formed by the intersection cuts only three edges, there will be a triangle (figure 5). All the possible intersection configurations (256) are classified by the algorithm’s designers in two tables [1]. The first one, named Edge-table, identifies the edges cut by the surface. The second table, called Tri-Table, determines the direction to follow to connect the points which form the corresponding polygon. The organization chart of the Marching Cubes algorithm is described by figure 1. Figure 1: The Marching cubes algorithm chart
  • 3. International Journal of Computer Science, Engineering and Information Technology (IJCSEIT), Vol.2, No.2, April 2012 21 3. AAA/SYNDEX-IC METHODOLOGY 3.1 AAA methodology for specified integrated circuits The AAA methodology aims rapid prototyping and optimized implementation of real time applications. It is founded on models of graphs forming the algorithm, the architecture and the adequation. The data flow graph modeling the algorithm at the behavioral level is gradually transformed until it matches the hardware graph architecture, which includes the control path graph and data path graph [4] [5] [6]. The result of these transformations corresponds to optimized hardware implementation [4] [5] [6]. The adequation is to choose among all possible algorithm implementations on an architecture the one whose performance characteristics derived from the components of the architecture (the current version of SynDEx-IC architecture supports a single-component), respecting the real-time constraints, while minimizing the consumption of hardware resources (surface), thus an optimization problem. Figure 2 describes the stages of the implementation process AAA applied to the circuits. Figure 2: The AAA methodology for circuits 3.2 SynDEx-IC tool SynDEx-IC (Synchronized Distibuted Executive-IC) is free software developed by the ESIEE team "design architecture" of A2SI Laboratory, focusing on the AAA methodology. This software tries to be, before the execution, an implementation of the algorithm that meets a given latency constraint while being implanted on the target circuit. For this, SynDEx-Ic works on factorization ie the more factorized loop, the more parallelism. But, the area is necessary for its implementation increases. It allows therefore exploring the nested loops in order to find for each loop the rate defactorization, which can respect the execution data contraints. Because it is impossible to explore all possibilities defactorization in reasonable times, SynDEx- IC use approximate methods based on heuristics. The result of the heuristic is then converted into
  • 4. International Journal of Computer Science, Engineering and Information Technology (IJCSEIT), Vol.2, No.2, April 2012 22 a synthesizable VHDL code to be executed directly on the target component or to be simulated. The specification of the algorithm is in the form a Data Dependence Graph (Figure 3) including the regular parts (regular repeating patterns) and not regular. This specification should be independent of any hardware implementation constraints and requires the implementation of a process of decomposition of the algorithm in implantable operations (addition, subtraction and multiplication) [6]. Figure 3.: Example of the SynDEx-IC main algorithm graph To reduce the specification size and adopt these regular parts, we use a factorization process, which shows four specific types of nodes (factorization frontiers nodes): F (Fork node), J (Join node), D (Diffusion node) and I (Iterate node). This factorization process specifies different ways to factor the data and operation across a factoring frontier. The designer models the target architecture (the type of FPGA) through the graphic interface of SynDEx-IC (Figure 4). Once the architecture has been specified, it is necessary to characterize the set operations of the algorithm graph in terms of area by number of slices, and in terms of latency, to ensure its hardware implementation on the target component. These values can come from libraries or measurements. Figure 4: Example of the SynDEx-IC architecture graph. 4. MARCHING CUBES DEVELOPMENT BY USING SYNDEX-IC 4.1 Algorithmic specification The index calculation presents the second stage of the Marching cubes operation. This index is calculated by comparing each vertex of the cube with the threshold. This latter, was chosen by the user to characterize the interesting surface (in our case we chose a threshold = 80). The index is a binary sequence of 8 bits size which the value varies from 0 to 255. It provides information on the positions of the inside and outside for the interested surface.
  • 5. International Journal of Computer Science, Engineering and Information Technology (IJCSEIT), Vol.2, No.2, April 2012 23 Each bit of the index is associated with one vertex; the bit is "1" if the point is internal, "0" if not. The surface then cuts the edges of the cube when the two vertices forming the edge are signs opposites (one is 0 the other is "1"). Figure 5 shows an example of index calculation where we have a cube whose vertices 0 and 2 are internal points on the surface; thus producing an index equal to 5. Figure 5: Example of Index calculation Thus, by factoring the index calculation block, we have FF2 that represents the factorization frontier of repetitive patterns of the index calculations block (the repeat unit contains a comparator, multiplier and adder).these operators are specified in loop "For s = 0 ... 7 do." (Figure 6). Figure 6: Factorization of index calculation block FF2 is applied eight times and is delimited by factorization node (F1, F2, I1). The two nodes F1 and F2 are separate its input array (8 intensities and 8 constants) in its elements, while the node (I1) makes the factorization of inter-pattern data. Added to the factorization frontier FF2, the GFCDD of the Marching Cubes algorithm contains two nested frontiers FF3 and FF4 their factorization factor respectively 15 and 3. The first (marked by the degree of repetition) is the factorization of unit calculations contained in the loop "For a=1...15 do." The second is the factorization contained in the loop "For c = x, y, z do" (Figure 7).
  • 6. International Journal of Computer Science, Engineering and Information Technology (IJCSEIT), Vol.2, No.2, April 2012 24 Figure 7: GFCDD of Marching Cubes algorithm for a voxel processing 4.2 Architectural exploration of the Marching cubes implementation The architectural exploration is based on a heuristic, which builds the solution iteratively. The heuristic determines, at each iteration, a defactorization frontier and its defactorization degree. The factorization frontier is the one that generates the weakest possible area and respects the imposed latency. The evaluation of each solution is based on the predictive model performance (latency and area). This prediction requires the characterization of every provider according to the target technology of the used circuit. Figure 8 presents the solutions obtained by heuristic optimization under different constraints (µs). For each case presented, we give the estimated latency and area (number of slices) and the defactorization degree (DF) of two frontiers FF3 and FF4 (TF means totally factorized). The results presented in terms of surface and latency, prove that most defactorization solutions reduce latency, but increase resource consumption. Thus, within the imposed constraints, the variation of latency and area by the defactorization degree change in level Figure 8.
  • 7. International Journal of Computer Science, Engineering and Information Technology (IJCSEIT), Vol.2, No.2, April 2012 25 Figure 8: Results of the heuristic according to constraints variation It should be noted that, in terms of surface, these results correspond only to the area occupied by the arithmetic and logical operator’s application. The area occupied by the control units of different factorization frontier nodes are not counted by the SynDEx-IC. The comparator, the divisor, the logical AND and the memories are defined as empty blocks (with the corresponding inputs and outputs) in the data flow graph. We defined and allocated to each operator the occupied area memory blocks (number of slices) and the latency in the architectural specifications. The parallelism depends on the degree of each defactorization frontier following the constraint. For a constant surface, the variation of latency depending on defactorization degree is due to the sequential execution or partly parallel of the frontier. 4.3 Implementation optimization 4.3.1 Data graph The graph in Figure 9 shows the data path optimized implementation of the Marching Cubes algorithm for a voxel processing. These blocks include: the calculation operators, the memory and the registers.
  • 8. International Journal of Computer Science, Engineering and Information Technology (IJCSEIT), Vol.2, No.2, April 2012 26 Figure 9: Data path of the optimized implementation 4.3.2 Control graph Figure 10 presents only the control path and shows the action of each control unit UC1, UC2 and UC3 on different nodes of the factorization frontiers. Each UC contains a counter (corresponding to the factorized repetitions), a requests (r) and acknowledge (a) signal implanting the consumption / production of data between the different frontiers. Figure 10: control path of the optimized implementation Based on the neighborhood relations between the various factorizations frontiers of the algorithms
  • 9. International Journal of Computer Science, Engineering and Information Technology (IJCSEIT), Vol.2, No.2, April 2012 27 graph, the AAA methodology generates a neighborhood graph Gv as described in figure 11. Figure 11: the neighborhood graph corresponding to a defactorization by four 5. FPGA BASED SYSTEM FOR THE MARCHING CUBES Since the processing core is concentrated in a voxel, we propose to keep the processing block of an optimal cube made by SynDEx-IC like IP and integrated into a platform created for the 3D reconstruction (Marching Cubes), as described below by Figure 12.
  • 10. International Journal of Computer Science, Engineering and Information Technology (IJCSEIT), Vol.2, No.2, April 2012 28 Figure 12: Block schema of the Marching Cubes algorithm Table 1 : the implementation resource of blok processing of on cube on Virtex 4 We subdivise the Marching Cubes algorithm into two modules named respectively: Managing Memory and Calculation of triangles. The memory management system can store the image slices into a RAM. Every eight intensity pixel values forming a voxel will be loaded into a line. This ensures the processing of voxels, one by one. The intensities of the pixels and their coordinates (x, y, z) are coded by 8 bits. Z is the number of slices which are been processing. The architecture of the memory management module, allows reading intensities of 8 pixels (4 pixels of each section). The eight intensity values are then put into a comparator to be compared to a threshold called iso-value (this is the segmentation image by thresholding in real time). An index will be generated by the comparator noted cube_index coded by 8 bits. The coordinates (x, y, z) of each pixel will be used in the second part of the algorithm for calculating the coordinates of the intersection points and the triangles creation of the interested surface. To respect the latency constraint, the heuristic identified the optimal defactorization factors of each frontier component on the critical path. In our example, the heu heuristic has opted for a implementation defactorization both frontiers FF2 and FF3 by a factor of 4. Table 1 presents the number of sections occupied by the processing block of a cube made by SynDEx-IC as IP for two different constraints on Virtex4 (XC4VLX15). 6. CONCLUSION From an algorithmic specification of factorized and conditioned data dependence graph (GFCDD), we have adopted the AAA methodology and software SynDEx -IC to optimize the implementation of the 3D reconstruction algorithm "Marching Cubes" on programmable circuit. We exploited the aspect of repetitive mode in this algorithm for a better factorization. This approach allowed the synthesis of the implementation of the Marching Cubes algorithm by imposing latency constraints. We have showed the benefit of using the AAA methodology and the associated software tool to specify and explore the different possible architectural solutions and to select the optimal solution which corresponds to the target application. By using a Virtex 4 (XC4VLX15) device, the best match of the location of the Marching Cubes Algorithm for a cube processing is a fully factorized architecture whose execution time is equal to 43 81 776 ms at a frequency of 50 MHz. By
  • 11. International Journal of Computer Science, Engineering and Information Technology (IJCSEIT), Vol.2, No.2, April 2012 29 implementing defactorized one (defactorization degree equal to 4) the execution time is reduced to 16.43166 ms at a same frequency for 24 slices of size 64 x 64. REFERENCES [1] William E. Lorensen and Harvey E. Cline. (1987) “Marching cubes: A high resolution 3D surface construction algorithm,” Computer Graphics, 21(4), 163–169. [2] H. Hoppe, T. DeRose, T. Duchamp, J. McDonald & W. Stuetzle (1992) “Surface Reconstruction from Unorganized Points”. Proceedings of Computer graphics, pp 71 78. [3] D. Marr et E. Hildreth (1980 ) “Theory of Edge Detection”, Proc. R. Soc. London, B207, pp:1187- 217. [4] Boubaker Mohamed, Akil Mohamed, Ben Khalifa Khaled, Bedoui Mohamed Hedi, (2007) “Architecture dédiée pour le traitement temps réel des signaux physiologiques: spécification algorithmique et méthodologie d’implantation sur circuits reconfigurables” Colloque GRETSI 2007, Troyes. [5] T. Grandpierre, Y. Sorel. (2003) “From Algorithm and Architecture Specifiations to Automatic Generation of Distributed Real-Time Executives: a Seamless Flow Graphs Transformations”, IN Procs. IEEE Formal Methods and Models for Codesign Conference (MEMCODE’2003), pp: 123- 133, Mont Saint-Michel, France. [6] L.Kaouane, M.Akil, Y.Sorel, T.grandpierre, (2004) ”A methodology to implement real-time applications on reconfigurable circuits”, Special issue on Engineering of Configurable Systems of the Journal of Supercomputing, Kluwer Academic Publisher, Vol.30, No.3. Authors Manel MILI received the Bachelor’s and Master‘s Degree in the National Engineering School of Sfax, University of Sfax, in 2007 and 2008 respectively. Since 2009, she has been working as a Research Scientist at the Research team of Medical Imaging Technology (TIM), Faculty of Medicine at Monastir University of Monastir where she prepares his thesis. She has also four published paper in international conference in the same areas. His areas of interest include dedicated architecture of medical image processing. Bouraoui MAHMOUD received the Bachelor’s, Master‘s Degree and doctorate in the Faculty of Science at Monastir from Mastir University, in 1997, 1999 and 2006 respectively. Since 2008, He is currently Assistant Professor in the Department of Industrial Electronics in the National Engineering School of Sousse, University of Sousse. He has four published papers in international journals. His areas of interest include embedded processor, embedded system, medical imaging, codesign HW/SW. Mohamed Hedi BEDOUI Since 2011, He is currently Professor in Biophysics in the Faculty of Medecine at Monastir from Monastir University. He has many published papers in international journals. His areas of interest include Biophysics, medical imaging processing, embedded system, codesign HW/SW.