期刊文献+

基于可编程SOC的图像边缘检测系统

Image Edge Detection System Based on Programmable SOC
下载PDF
导出
摘要 随着人工智能的不断发展,云计算面临数据量大、实时性低等问题。为了解决该问题,一种新的计算方式——边缘计算进入了人们的视野。边缘计算推动人工智能走向嵌入式系统,与传统嵌入系统相比,边缘人工智能要复杂得多,传统嵌入式设备计算能力弱、效率低的问题更为突出。基于Xilinx公司Zynq-7000系列的全可编程SOC完成系统设计,实现对视频的边缘检测。测试结果显示,硬件边缘检测速度比纯软件边缘检测速度快10倍,为边缘人工智能在嵌入式应用方面提供了可行方向。 With the continuous development of artificial intelligence,cloud computing is facing the problems of large amount of data and low real-time.To solve this problem,a new computing method,edge computing,has come into people’s vision.Edge computing drives AI to embedded systems.Compared with traditional embedded systems,edge AI is much more complex.Traditional embedded devices have weak computing power and low efficiency.In this paper,based on Xilinx Zynq-7000 series of fully programmable SOC to complete the system design,to achieve video edge detection.The test results show that the speed of hardware edge detection is 10 times faster than that of software edge detection,which provides a feasible direction for the application of edge artificial intelligence in embedded system.
作者 胡龙宝 李丕丁 HU Long-bao;LI Pi-ding(School of Medical Devices and Food Engineering,University of Shanghai for Science and Technology,Shanghai 200093,China)
出处 《软件导刊》 2020年第3期244-247,共4页 Software Guide
关键词 边缘人工智能 边缘计算 可编程SOC 软硬件协同 边缘检测 嵌入式应用 edge artificial intelligence edge computing programmable SOC software and hardware cooperation edge detection embedded applications
  • 相关文献

参考文献16

二级参考文献71

  • 1白瑞林,江吕锋,王建.基于FPGA的模糊自整定PID控制器的研究[J].仪器仪表学报,2005,26(8):833-837. 被引量:23
  • 2肖政宏,韩秋凤,朱丽群.基于ARM和DSP的远程视频监控系统的设计与实现[J].计算机工程与科学,2006,28(9):53-55. 被引量:18
  • 3罗武庭.DJ—2可变矩形电子束曝光机的DMA驱动程序[J].LSI制造与测试,1989,10(4):20-26. 被引量:373
  • 4Organization for the Advancement of Structured Information Standards (OASIS) http://www.oasis-open.org/. 被引量:1
  • 5Distributed Management Task Force (DMTF) http://www.dmtf.org/home. 被引量:1
  • 6Cloud Security Alliance http://www.cloudsecurityalliance.org. 被引量:1
  • 7Crampton J, Martin K, Wild P. On key assignment for hierarchical access control. In: Guttan J, ed, Proc. of the 19th IEEE Computer Security Foundations Workshop--CSFW 2006. Venice: IEEE Computer Society Press, 2006. 5-7. 被引量:1
  • 8Damiani E, De S, Vimercati C, Foresti S, Jajodia S, Paraboschi S, Samarati P. An experimental evaluation of multi-key strategies for data outsourcing. In: Venter HS, Eloff MM, Labuschagne L, Eloff JHP, Solms RV, eds. New Approaches for Security, Privacy and Trust in Complex Environments, Proc. of the IFIP TC-11 22nd Int'l Information Security Conf. Sandton: Springer-Verlag, 2007. 395-396. 被引量:1
  • 9Bethencourt J, Sahai A, Waters B. Ciphertext-Policy attribute-based encryption. In: Shands D, ed. Proc. of the 2007 IEEE Symp. on Security and Privacy. Oakland: IEEE Computer Society, 2007. 321-334. [doi: 10.1109/SP.2007.11]. 被引量:1
  • 10Yu S, Ren K, Lou W, Li J. Defending against key abuse attacks in KP-ABE enabled broadcast systems. In: Bao F, ed. Proc. of the 5th Int'l Conf. on Security and Privacy in Communication Networks. Singapore: Springer-Verlag, http://www.linkpdf.com/ ebook-viewer.php?url=http://www.ualr.edu/sxyul/file/SecureCommO9_AFKP_ABE.pdf. 被引量:1

共引文献1500

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部