Open Access. Powered by Scholars. Published by Universities.®
- Keyword
-
- Advanced Encryption Standard (1)
- Automatic (1)
- CT (1)
- Concurrent fault detection (1)
- Elliptic curve cryptography (1)
-
- FPGA (1)
- Finite field (1)
- Finite field arithmetic multiplication (1)
- GPU (1)
- Galois/Counter Mode (1)
- Harvester (1)
- High performance ASIC and FPGA (1)
- Image processing (1)
- Image reconstruction (1)
- Implementation (1)
- Mushroom (1)
- Power8 (1)
- Robotic (1)
- Scalar multiplication (1)
- Serial-out bit-level. (1)
- Tests (1)
Articles 1 - 4 of 4
Full-Text Articles in Computer Engineering
Analysis Of 3d Cone-Beam Ct Image Reconstruction Performance On A Fpga, Devin Held
Analysis Of 3d Cone-Beam Ct Image Reconstruction Performance On A Fpga, Devin Held
Electronic Thesis and Dissertation Repository
Efficient and accurate tomographic image reconstruction has been an intensive topic of research due to the increasing everyday usage in areas such as radiology, biology, and materials science. Computed tomography (CT) scans are used to analyze internal structures through capture of x-ray images. Cone-beam CT scans project a cone-shaped x-ray to capture 2D image data from a single focal point, rotating around the object. CT scans are prone to multiple artifacts, including motion blur, streaks, and pixel irregularities, therefore must be run through image reconstruction software to reduce visual artifacts. The most common algorithm used is the Feldkamp, Davis, and …
Development Of An Autonomous Robotic Mushroom Harvester, Nikita Alexeevich Kuchinskiy
Development Of An Autonomous Robotic Mushroom Harvester, Nikita Alexeevich Kuchinskiy
Electronic Thesis and Dissertation Repository
The process of development of a new robot is one of the modern technological arts. This process involves multiple complex steps and recursive approach. In this project, a solution for automatic harvesting of mushrooms is developed. In order to design an effective solution, it is necessary to explore and take into consideration the limitations of grasping very soft and fragile objects (particularly mushrooms). We will elaborate several strategies of picking and analyze each strategy to formulate the design requirements, develop a solution, and finally, evaluate the efficiency of the proposed solution in actual farm conditions for real mushrooms. The mushroom …
Efficient Arithmetic For The Implementation Of Elliptic Curve Cryptography, Ebrahim Abdulrahman Hasan Abdulrahman
Efficient Arithmetic For The Implementation Of Elliptic Curve Cryptography, Ebrahim Abdulrahman Hasan Abdulrahman
Electronic Thesis and Dissertation Repository
The technology of elliptic curve cryptography is now an important branch in public-key based crypto-system. Cryptographic mechanisms based on elliptic curves depend on the arithmetic of points on the curve. The most important arithmetic is multiplying a point on the curve by an integer. This operation is known as elliptic curve scalar (or point) multiplication operation. A cryptographic device is supposed to perform this operation efficiently and securely. The elliptic curve scalar multiplication operation is performed by combining the elliptic curve point routines that are defined in terms of the underlying finite field arithmetic operations. This thesis focuses on hardware …
Reliable And High-Performance Hardware Architectures For The Advanced Encryption Standard/Galois Counter Mode, Mehran Mozaffari-Kermani
Reliable And High-Performance Hardware Architectures For The Advanced Encryption Standard/Galois Counter Mode, Mehran Mozaffari-Kermani
Electronic Thesis and Dissertation Repository
The high level of security and the fast hardware and software implementations of the Advanced Encryption Standard (AES) have made it the first choice for many critical applications. Since its acceptance as the adopted symmetric-key algorithm, the AES has been utilized in various security-constrained applications, many of which are power and resource constrained and require reliable and efficient hardware implementations.
In this thesis, first, we investigate the AES algorithm from the concurrent fault detection point of view. We note that in addition to the efficiency requirements of the AES, it must be reliable against transient and permanent internal faults or …