SlideShare a Scribd company logo
The Master of IEEE Projects
Copyright © 2016LeMenizInfotech. All rights reserved
LeMenizInfotech
36, 100 Feet Road, Natesan Nagar, Near Indira Gandhi
Statue, Pondicherry-605 005.
Call: 0413-4205444, +91 9566355386, 99625 88976.
Web :www.lemenizinfotech.com/ www.ieeemaster.com
Mail : projects@lemenizinfotech.com
A Fast Fault-Tolerant Architecture for Sauvola Local
Image Thresholding Algorithm Using Stochastic
Computing
Abstract:
Binarization plays an important role in document image processing, particularly in degraded
document images. Among all local image thresholding algorithms, Sauvola has excellent
binarization performance for degraded document images. However, this algorithm is
computationally intensive and sensitive to the noises from the internal computational circuits. In
this paper, we present a stochastic implementation of Sauvola algorithm. Our experimental
results show that the stochastic implementation of Sauvola needs much less time and area and
can tolerate more faults, while consuming less power in comparison with its conventional
implementation. The proposed architecture of this paper analysis the logic size, area and power
consumption using Xilinx 14.2.
Enhancement of the project:
Existing System:
The main step of calculating t(x, y) for each image pixel in Sauvola is to compute m(x, y) and
s(x, y). Since we fixed the window size to 9 ∗ 9, we have to calculate the mean and the standard
deviation of 81 local numbers using
To implement the required square root function used in the standard deviation, we use Newton–
Raphson, a method for finding successively better approximations to the root of a real value
The Master of IEEE Projects
Copyright © 2016LeMenizInfotech. All rights reserved
LeMenizInfotech
36, 100 Feet Road, Natesan Nagar, Near Indira Gandhi
Statue, Pondicherry-605 005.
Call: 0413-4205444, +91 9566355386, 99625 88976.
Web :www.lemenizinfotech.com/ www.ieeemaster.com
Mail : projects@lemenizinfotech.com
number. Fig. 1 shows the implemented block diagram of the conventional architecture of
Sauvola method.
Fig. 1. Simple view of the conventional process of calculating threshold value for each pixel of
an input image using Sauvola method.
Disadvantages:
 High area and power consumption
Proposed System:
The Master of IEEE Projects
Copyright © 2016LeMenizInfotech. All rights reserved
LeMenizInfotech
36, 100 Feet Road, Natesan Nagar, Near Indira Gandhi
Statue, Pondicherry-605 005.
Call: 0413-4205444, +91 9566355386, 99625 88976.
Web :www.lemenizinfotech.com/ www.ieeemaster.com
Mail : projects@lemenizinfotech.com
Stochastic Implementation In stochastic implementation, we have to scale down all pixel
intensities from [0, 255] to [0, 1] interval. Therefore, the R constant in the Sauvola equation
changes to 1. The new modified Sauvola equation for our stochastic design will be
t(x, y) = m · [1 + 0.5(S − 1)] = m · (s + 1)/2. (1)
Now, to process all pixels, we need to do three steps:
1) Converting pixel values into stochastic streams;
2) Generating threshold streams;
3) Determining the output binary values.
1) Phase 1 (Generating Stochastic Bit Streams):
To convert pixel intensities from binary format into stochastic streams, we use the stochastic
number generator (SNG) presented. In generating pseudorandom numbers required in this SNG,
we used different maximum period linear feedback shift registers (LFSRs) corresponding to each
different lengths of streams (n-bit LFSR for 2n
stream).
2) Phase 2 (Generating Threshold Bit Streams):
a) First step (averaging local window bit streams): To build an 81-to-1 SMC, we propose to
combine nine 16-to-1 SMCs, each one as a 9-to-1 SMC. We use a simple technique to convert
the existing 16-to-1 SMC to a new 9-to-1 SMC.
b) Second step (generating standard deviation bit stream): In order to determine the standard
deviation of some input numbers, we need to have: 1) the average value of the squares and 2) the
square of the average values. The proposed 81-to-1 SMC in Fig. 2 can average 81 input streams.
Since this average is in stochastic form, generating its square will only need an AND gate with
two uncorrelated versions of the input.
The Master of IEEE Projects
Copyright © 2016LeMenizInfotech. All rights reserved
LeMenizInfotech
36, 100 Feet Road, Natesan Nagar, Near Indira Gandhi
Statue, Pondicherry-605 005.
Call: 0413-4205444, +91 9566355386, 99625 88976.
Web :www.lemenizinfotech.com/ www.ieeemaster.com
Mail : projects@lemenizinfotech.com
Fig. 2. Proposed (a) 9-to-1 SMC and (b) 81-to-1 SMC.
c) Third step (generating threshold bit stream): Considering (1), to generate threshold bit
streams, we need to perform two other simple operations. First, we should do a simple scaled
addition to convert the s bit stream to (s + 1)/2. Second, multiplying m and (s +1)/2 bit streams
by a simple AND gate. Fig. 3 shows the process of producing the threshold bit stream for each
pixel of image in Sauvola method.
The Master of IEEE Projects
Copyright © 2016LeMenizInfotech. All rights reserved
LeMenizInfotech
36, 100 Feet Road, Natesan Nagar, Near Indira Gandhi
Statue, Pondicherry-605 005.
Call: 0413-4205444, +91 9566355386, 99625 88976.
Web :www.lemenizinfotech.com/ www.ieeemaster.com
Mail : projects@lemenizinfotech.com
Fig. 3. Simple view of the process of calculating threshold bit stream stochastically for each
pixel of an input image using Sauvola method.
3) Phase 3 (Generating Output Binary Values): Now we reach to the final step, the estimation of
0 or 1 output binary values by comparing the produced threshold bit stream with the
corresponded pixel intensity bit stream. This function will be the responsibility of a specific
circuit, stochastic comparator.
The Master of IEEE Projects
Copyright © 2016LeMenizInfotech. All rights reserved
LeMenizInfotech
36, 100 Feet Road, Natesan Nagar, Near Indira Gandhi
Statue, Pondicherry-605 005.
Call: 0413-4205444, +91 9566355386, 99625 88976.
Web :www.lemenizinfotech.com/ www.ieeemaster.com
Mail : projects@lemenizinfotech.com
Fig. 4. Our proposed stochastic comparator.
Our proposed comparator (Fig. 4) is based on a simple counter. According to the length of the
input streams (2n), we choose an n bit counter. Now, by starting from the first bit of A stream, if
it is 1, we increase the counter by one unit, and continue this process for all bits of A. After
processing A, we start with the first bit of the second stream B. If this bit is 1 and the counter is
not empty, we decrease the counter by one unit, and continue for all B bits. By this simple two
stage process, we would know that which one of two input streams has more 1s and so is greater
than the other one. In the last step, after processing A and B streams, if the counter was showing
zero value, the output of the proposed comparator will be zero, otherwise the output will be a
stream with all bits 1.
Advantages:
 Low area and power
Software implementation:
 Modelsim
 Xilinx ISE

More Related Content

PPTX
Road Network Extraction using Satellite Imagery.
PPTX
Traffic Demand Prediction Based Dynamic Transition Convolutional Neural Network
PPTX
Invertible Denoising Network: A Light Solution for Real Noise Removal
PPTX
Image classification using cnn
PPTX
Convolutional Neural Network (CNN) - image recognition
PDF
PR-144: SqueezeNext: Hardware-Aware Neural Network Design
PDF
Neural network based image compression with lifting scheme and rlc
PDF
Review: “Implementation of Feedforward and Feedback Neural Network for Signal...
Road Network Extraction using Satellite Imagery.
Traffic Demand Prediction Based Dynamic Transition Convolutional Neural Network
Invertible Denoising Network: A Light Solution for Real Noise Removal
Image classification using cnn
Convolutional Neural Network (CNN) - image recognition
PR-144: SqueezeNext: Hardware-Aware Neural Network Design
Neural network based image compression with lifting scheme and rlc
Review: “Implementation of Feedforward and Feedback Neural Network for Signal...

What's hot (17)

PPTX
Parallel Left Ventricle Simulation Using the FEniCS Framework
PDF
Parn pyramidal+affine+regression+networks+for+dense+semantic+correspondence
PPT
Poster Segmentation Chain
PDF
Devil in the Details: Analysing the Performance of ConvNet Features
PDF
Optimizing Deep Networks (D1L6 Insight@DCU Machine Learning Workshop 2017)
PPTX
Convolutional neural network from VGG to DenseNet
PPTX
Presentation_OCR
PDF
Expert system design for elastic scattering neutrons optical model using bpnn
PDF
Image compression and reconstruction using a new approach by artificial neura...
PPTX
Clustering introduction
PDF
D1L5 Visualization (D1L2 Insight@DCU Machine Learning Workshop 2017)
PDF
PR-120: ShuffleNet V2: Practical Guidelines for Efficient CNN Architecture De...
PPTX
Image Compression Using Neural Network
PDF
Convolutional Neural Networks for Image Classification (Cape Town Deep Learni...
PPTX
Deep Learning - CNN and RNN
PDF
Convolutional Neural Networks : Popular Architectures
Parallel Left Ventricle Simulation Using the FEniCS Framework
Parn pyramidal+affine+regression+networks+for+dense+semantic+correspondence
Poster Segmentation Chain
Devil in the Details: Analysing the Performance of ConvNet Features
Optimizing Deep Networks (D1L6 Insight@DCU Machine Learning Workshop 2017)
Convolutional neural network from VGG to DenseNet
Presentation_OCR
Expert system design for elastic scattering neutrons optical model using bpnn
Image compression and reconstruction using a new approach by artificial neura...
Clustering introduction
D1L5 Visualization (D1L2 Insight@DCU Machine Learning Workshop 2017)
PR-120: ShuffleNet V2: Practical Guidelines for Efficient CNN Architecture De...
Image Compression Using Neural Network
Convolutional Neural Networks for Image Classification (Cape Town Deep Learni...
Deep Learning - CNN and RNN
Convolutional Neural Networks : Popular Architectures
Ad

Viewers also liked (17)

PPTX
Muscle pharm recon
PDF
A fast acquisition all-digital delay-locked loop using a starting-bit predict...
PPT
Hrp 091202140026-phpapp01
PPTX
инструкция по заполнению журнала
PDF
Diary Bert Caron
PPTX
Muslim art froms
PPTX
Announcements April 6, 2014
PPTX
Question 7
PDF
Dotnet IEEE Projects 2016-2017 | Dotnet IEEE Projects Titles 2016-2017
PPTX
Fall festival 2014 slideshow
PDF
PPTX
Medium access with adaptive relay selection in cooperative wireless networks
PPTX
Presentation jenny lourdes t. cayanan
PPTX
STEPS Home Care ppt_New
PPT
Week 4 proposal power point public
PDF
Customer Experiences with Soul - Sustainable Cosmetics Keynote
Muscle pharm recon
A fast acquisition all-digital delay-locked loop using a starting-bit predict...
Hrp 091202140026-phpapp01
инструкция по заполнению журнала
Diary Bert Caron
Muslim art froms
Announcements April 6, 2014
Question 7
Dotnet IEEE Projects 2016-2017 | Dotnet IEEE Projects Titles 2016-2017
Fall festival 2014 slideshow
Medium access with adaptive relay selection in cooperative wireless networks
Presentation jenny lourdes t. cayanan
STEPS Home Care ppt_New
Week 4 proposal power point public
Customer Experiences with Soul - Sustainable Cosmetics Keynote
Ad

Similar to A fast fault tolerant architecture for sauvola local image thresholding algorithm using stochastic computing (20)

PPTX
Real Time Implementation of Active Noise Control
PDF
Final Project Report
PDF
Layout Design Implementation of NOR Gate
DOCX
final report updated
PDF
IRJET - High Speed Inexact Speculative Adder using Carry Look Ahead Adder...
PDF
Dotnet in-network estimation with delay constraints in wireless sensor networks
PDF
In network estimation with delay constraints in wireless sensor networks
PDF
In network estimation with delay constraints in wireless sensor networks
PDF
In network estimation with delay constraints in wireless sensor networks
PDF
Dotnet in-network estimation with delay constraints in wireless sensor networks
PDF
A017110106
PDF
Development of a D.C Circuit Analysis Software Using Microsoft Visual C#.Net
PDF
IC Layout Design of 4-bit Magnitude Comparator using Electric VLSI Design System
PDF
Artificial Neural Network Based Graphical User Interface for Estimation of Fa...
PDF
Artificial Neural Network Based Graphical User Interface for Estimation of Fa...
PDF
Optimized Layout Design of Priority Encoder using 65nm Technology
PDF
A Fast Floating Point Double Precision Implementation on Fpga
DOCX
IEEE 2014 JAVA MOBILE COMPUTING PROJECTS A low complexity algorithm for neigh...
DOCX
2014 IEEE JAVA MOBILE COMPUTING PROJECT A low complexity algorithm for neighb...
PDF
IRJET - Single Image Super Resolution using Machine Learning
Real Time Implementation of Active Noise Control
Final Project Report
Layout Design Implementation of NOR Gate
final report updated
IRJET - High Speed Inexact Speculative Adder using Carry Look Ahead Adder...
Dotnet in-network estimation with delay constraints in wireless sensor networks
In network estimation with delay constraints in wireless sensor networks
In network estimation with delay constraints in wireless sensor networks
In network estimation with delay constraints in wireless sensor networks
Dotnet in-network estimation with delay constraints in wireless sensor networks
A017110106
Development of a D.C Circuit Analysis Software Using Microsoft Visual C#.Net
IC Layout Design of 4-bit Magnitude Comparator using Electric VLSI Design System
Artificial Neural Network Based Graphical User Interface for Estimation of Fa...
Artificial Neural Network Based Graphical User Interface for Estimation of Fa...
Optimized Layout Design of Priority Encoder using 65nm Technology
A Fast Floating Point Double Precision Implementation on Fpga
IEEE 2014 JAVA MOBILE COMPUTING PROJECTS A low complexity algorithm for neigh...
2014 IEEE JAVA MOBILE COMPUTING PROJECT A low complexity algorithm for neighb...
IRJET - Single Image Super Resolution using Machine Learning

More from LeMeniz Infotech (20)

PDF
A dynamically reconfigurable multi asip architecture for multistandard and mu...
PDF
Interleaved digital power factor correction based on the sliding mode approach
PDF
Bumpless control for reduced thd in power factor correction circuits
PDF
A bidirectional single stage three phase rectifier with high-frequency isolat...
PDF
A bidirectional three level llc resonant converter with pwam control
PDF
Efficient single phase transformerless inverter for grid tied pvg system with...
PDF
Highly reliable transformerless photovoltaic inverters with leakage current a...
PDF
Grid current-feedback active damping for lcl resonance in grid-connected volt...
PDF
Delay dependent stability of single-loop controlled grid-connected inverters ...
PDF
Connection of converters to a low and medium power dc network using an induct...
PDF
Stamp enabling privacy preserving location proofs for mobile users
PDF
Sbvlc secure barcode based visible light communication for smartphones
PDF
Read2 me a cloud based reading aid for the visually impaired
PDF
Privacy preserving location sharing services for social networks
PDF
Pass byo bring your own picture for securing graphical passwords
PDF
Eplq efficient privacy preserving location-based query over outsourced encryp...
PDF
Analyzing ad library updates in android apps
PDF
An exploration of geographic authentication scheme
PDF
Context based access control systems for mobile devices
PDF
Android security a survey of issues, malware penetration, and defenses
A dynamically reconfigurable multi asip architecture for multistandard and mu...
Interleaved digital power factor correction based on the sliding mode approach
Bumpless control for reduced thd in power factor correction circuits
A bidirectional single stage three phase rectifier with high-frequency isolat...
A bidirectional three level llc resonant converter with pwam control
Efficient single phase transformerless inverter for grid tied pvg system with...
Highly reliable transformerless photovoltaic inverters with leakage current a...
Grid current-feedback active damping for lcl resonance in grid-connected volt...
Delay dependent stability of single-loop controlled grid-connected inverters ...
Connection of converters to a low and medium power dc network using an induct...
Stamp enabling privacy preserving location proofs for mobile users
Sbvlc secure barcode based visible light communication for smartphones
Read2 me a cloud based reading aid for the visually impaired
Privacy preserving location sharing services for social networks
Pass byo bring your own picture for securing graphical passwords
Eplq efficient privacy preserving location-based query over outsourced encryp...
Analyzing ad library updates in android apps
An exploration of geographic authentication scheme
Context based access control systems for mobile devices
Android security a survey of issues, malware penetration, and defenses

Recently uploaded (20)

PPTX
Tissue processing ( HISTOPATHOLOGICAL TECHNIQUE
PDF
VCE English Exam - Section C Student Revision Booklet
PDF
RMMM.pdf make it easy to upload and study
PDF
01-Introduction-to-Information-Management.pdf
PDF
O7-L3 Supply Chain Operations - ICLT Program
PPTX
Final Presentation General Medicine 03-08-2024.pptx
PDF
Computing-Curriculum for Schools in Ghana
PPTX
Microbial diseases, their pathogenesis and prophylaxis
PDF
Module 4: Burden of Disease Tutorial Slides S2 2025
PDF
Complications of Minimal Access Surgery at WLH
PDF
GENETICS IN BIOLOGY IN SECONDARY LEVEL FORM 3
PPTX
Final Presentation General Medicine 03-08-2024.pptx
PDF
A systematic review of self-coping strategies used by university students to ...
PPTX
Introduction-to-Literarature-and-Literary-Studies-week-Prelim-coverage.pptx
PDF
FourierSeries-QuestionsWithAnswers(Part-A).pdf
PPTX
202450812 BayCHI UCSC-SV 20250812 v17.pptx
PDF
OBE - B.A.(HON'S) IN INTERIOR ARCHITECTURE -Ar.MOHIUDDIN.pdf
PDF
Yogi Goddess Pres Conference Studio Updates
PDF
Anesthesia in Laparoscopic Surgery in India
PDF
A GUIDE TO GENETICS FOR UNDERGRADUATE MEDICAL STUDENTS
Tissue processing ( HISTOPATHOLOGICAL TECHNIQUE
VCE English Exam - Section C Student Revision Booklet
RMMM.pdf make it easy to upload and study
01-Introduction-to-Information-Management.pdf
O7-L3 Supply Chain Operations - ICLT Program
Final Presentation General Medicine 03-08-2024.pptx
Computing-Curriculum for Schools in Ghana
Microbial diseases, their pathogenesis and prophylaxis
Module 4: Burden of Disease Tutorial Slides S2 2025
Complications of Minimal Access Surgery at WLH
GENETICS IN BIOLOGY IN SECONDARY LEVEL FORM 3
Final Presentation General Medicine 03-08-2024.pptx
A systematic review of self-coping strategies used by university students to ...
Introduction-to-Literarature-and-Literary-Studies-week-Prelim-coverage.pptx
FourierSeries-QuestionsWithAnswers(Part-A).pdf
202450812 BayCHI UCSC-SV 20250812 v17.pptx
OBE - B.A.(HON'S) IN INTERIOR ARCHITECTURE -Ar.MOHIUDDIN.pdf
Yogi Goddess Pres Conference Studio Updates
Anesthesia in Laparoscopic Surgery in India
A GUIDE TO GENETICS FOR UNDERGRADUATE MEDICAL STUDENTS

A fast fault tolerant architecture for sauvola local image thresholding algorithm using stochastic computing

  • 1. The Master of IEEE Projects Copyright © 2016LeMenizInfotech. All rights reserved LeMenizInfotech 36, 100 Feet Road, Natesan Nagar, Near Indira Gandhi Statue, Pondicherry-605 005. Call: 0413-4205444, +91 9566355386, 99625 88976. Web :www.lemenizinfotech.com/ www.ieeemaster.com Mail : [email protected] A Fast Fault-Tolerant Architecture for Sauvola Local Image Thresholding Algorithm Using Stochastic Computing Abstract: Binarization plays an important role in document image processing, particularly in degraded document images. Among all local image thresholding algorithms, Sauvola has excellent binarization performance for degraded document images. However, this algorithm is computationally intensive and sensitive to the noises from the internal computational circuits. In this paper, we present a stochastic implementation of Sauvola algorithm. Our experimental results show that the stochastic implementation of Sauvola needs much less time and area and can tolerate more faults, while consuming less power in comparison with its conventional implementation. The proposed architecture of this paper analysis the logic size, area and power consumption using Xilinx 14.2. Enhancement of the project: Existing System: The main step of calculating t(x, y) for each image pixel in Sauvola is to compute m(x, y) and s(x, y). Since we fixed the window size to 9 ∗ 9, we have to calculate the mean and the standard deviation of 81 local numbers using To implement the required square root function used in the standard deviation, we use Newton– Raphson, a method for finding successively better approximations to the root of a real value
  • 2. The Master of IEEE Projects Copyright © 2016LeMenizInfotech. All rights reserved LeMenizInfotech 36, 100 Feet Road, Natesan Nagar, Near Indira Gandhi Statue, Pondicherry-605 005. Call: 0413-4205444, +91 9566355386, 99625 88976. Web :www.lemenizinfotech.com/ www.ieeemaster.com Mail : [email protected] number. Fig. 1 shows the implemented block diagram of the conventional architecture of Sauvola method. Fig. 1. Simple view of the conventional process of calculating threshold value for each pixel of an input image using Sauvola method. Disadvantages:  High area and power consumption Proposed System:
  • 3. The Master of IEEE Projects Copyright © 2016LeMenizInfotech. All rights reserved LeMenizInfotech 36, 100 Feet Road, Natesan Nagar, Near Indira Gandhi Statue, Pondicherry-605 005. Call: 0413-4205444, +91 9566355386, 99625 88976. Web :www.lemenizinfotech.com/ www.ieeemaster.com Mail : [email protected] Stochastic Implementation In stochastic implementation, we have to scale down all pixel intensities from [0, 255] to [0, 1] interval. Therefore, the R constant in the Sauvola equation changes to 1. The new modified Sauvola equation for our stochastic design will be t(x, y) = m · [1 + 0.5(S − 1)] = m · (s + 1)/2. (1) Now, to process all pixels, we need to do three steps: 1) Converting pixel values into stochastic streams; 2) Generating threshold streams; 3) Determining the output binary values. 1) Phase 1 (Generating Stochastic Bit Streams): To convert pixel intensities from binary format into stochastic streams, we use the stochastic number generator (SNG) presented. In generating pseudorandom numbers required in this SNG, we used different maximum period linear feedback shift registers (LFSRs) corresponding to each different lengths of streams (n-bit LFSR for 2n stream). 2) Phase 2 (Generating Threshold Bit Streams): a) First step (averaging local window bit streams): To build an 81-to-1 SMC, we propose to combine nine 16-to-1 SMCs, each one as a 9-to-1 SMC. We use a simple technique to convert the existing 16-to-1 SMC to a new 9-to-1 SMC. b) Second step (generating standard deviation bit stream): In order to determine the standard deviation of some input numbers, we need to have: 1) the average value of the squares and 2) the square of the average values. The proposed 81-to-1 SMC in Fig. 2 can average 81 input streams. Since this average is in stochastic form, generating its square will only need an AND gate with two uncorrelated versions of the input.
  • 4. The Master of IEEE Projects Copyright © 2016LeMenizInfotech. All rights reserved LeMenizInfotech 36, 100 Feet Road, Natesan Nagar, Near Indira Gandhi Statue, Pondicherry-605 005. Call: 0413-4205444, +91 9566355386, 99625 88976. Web :www.lemenizinfotech.com/ www.ieeemaster.com Mail : [email protected] Fig. 2. Proposed (a) 9-to-1 SMC and (b) 81-to-1 SMC. c) Third step (generating threshold bit stream): Considering (1), to generate threshold bit streams, we need to perform two other simple operations. First, we should do a simple scaled addition to convert the s bit stream to (s + 1)/2. Second, multiplying m and (s +1)/2 bit streams by a simple AND gate. Fig. 3 shows the process of producing the threshold bit stream for each pixel of image in Sauvola method.
  • 5. The Master of IEEE Projects Copyright © 2016LeMenizInfotech. All rights reserved LeMenizInfotech 36, 100 Feet Road, Natesan Nagar, Near Indira Gandhi Statue, Pondicherry-605 005. Call: 0413-4205444, +91 9566355386, 99625 88976. Web :www.lemenizinfotech.com/ www.ieeemaster.com Mail : [email protected] Fig. 3. Simple view of the process of calculating threshold bit stream stochastically for each pixel of an input image using Sauvola method. 3) Phase 3 (Generating Output Binary Values): Now we reach to the final step, the estimation of 0 or 1 output binary values by comparing the produced threshold bit stream with the corresponded pixel intensity bit stream. This function will be the responsibility of a specific circuit, stochastic comparator.
  • 6. The Master of IEEE Projects Copyright © 2016LeMenizInfotech. All rights reserved LeMenizInfotech 36, 100 Feet Road, Natesan Nagar, Near Indira Gandhi Statue, Pondicherry-605 005. Call: 0413-4205444, +91 9566355386, 99625 88976. Web :www.lemenizinfotech.com/ www.ieeemaster.com Mail : [email protected] Fig. 4. Our proposed stochastic comparator. Our proposed comparator (Fig. 4) is based on a simple counter. According to the length of the input streams (2n), we choose an n bit counter. Now, by starting from the first bit of A stream, if it is 1, we increase the counter by one unit, and continue this process for all bits of A. After processing A, we start with the first bit of the second stream B. If this bit is 1 and the counter is not empty, we decrease the counter by one unit, and continue for all B bits. By this simple two stage process, we would know that which one of two input streams has more 1s and so is greater than the other one. In the last step, after processing A and B streams, if the counter was showing zero value, the output of the proposed comparator will be zero, otherwise the output will be a stream with all bits 1. Advantages:  Low area and power Software implementation:  Modelsim  Xilinx ISE