Open Access. Powered by Scholars. Published by Universities.®

Computer Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 4 of 4

Full-Text Articles in Computer Engineering

Analysis Of 3d Cone-Beam Ct Image Reconstruction Performance On A Fpga, Devin Held Dec 2016

Analysis Of 3d Cone-Beam Ct Image Reconstruction Performance On A Fpga, Devin Held

Electronic Thesis and Dissertation Repository

Efficient and accurate tomographic image reconstruction has been an intensive topic of research due to the increasing everyday usage in areas such as radiology, biology, and materials science. Computed tomography (CT) scans are used to analyze internal structures through capture of x-ray images. Cone-beam CT scans project a cone-shaped x-ray to capture 2D image data from a single focal point, rotating around the object. CT scans are prone to multiple artifacts, including motion blur, streaks, and pixel irregularities, therefore must be run through image reconstruction software to reduce visual artifacts. The most common algorithm used is the Feldkamp, Davis, and …


Development Of An Autonomous Robotic Mushroom Harvester, Nikita Alexeevich Kuchinskiy Feb 2016

Development Of An Autonomous Robotic Mushroom Harvester, Nikita Alexeevich Kuchinskiy

Electronic Thesis and Dissertation Repository

The process of development of a new robot is one of the modern technological arts. This process involves multiple complex steps and recursive approach. In this project, a solution for automatic harvesting of mushrooms is developed. In order to design an effective solution, it is necessary to explore and take into consideration the limitations of grasping very soft and fragile objects (particularly mushrooms). We will elaborate several strategies of picking and analyze each strategy to formulate the design requirements, develop a solution, and finally, evaluate the efficiency of the proposed solution in actual farm conditions for real mushrooms. The mushroom …


Efficient Arithmetic For The Implementation Of Elliptic Curve Cryptography, Ebrahim Abdulrahman Hasan Abdulrahman Nov 2013

Efficient Arithmetic For The Implementation Of Elliptic Curve Cryptography, Ebrahim Abdulrahman Hasan Abdulrahman

Electronic Thesis and Dissertation Repository

The technology of elliptic curve cryptography is now an important branch in public-key based crypto-system. Cryptographic mechanisms based on elliptic curves depend on the arithmetic of points on the curve. The most important arithmetic is multiplying a point on the curve by an integer. This operation is known as elliptic curve scalar (or point) multiplication operation. A cryptographic device is supposed to perform this operation efficiently and securely. The elliptic curve scalar multiplication operation is performed by combining the elliptic curve point routines that are defined in terms of the underlying finite field arithmetic operations. This thesis focuses on hardware …


Reliable And High-Performance Hardware Architectures For The Advanced Encryption Standard/Galois Counter Mode, Mehran Mozaffari-Kermani Jun 2011

Reliable And High-Performance Hardware Architectures For The Advanced Encryption Standard/Galois Counter Mode, Mehran Mozaffari-Kermani

Electronic Thesis and Dissertation Repository

The high level of security and the fast hardware and software implementations of the Advanced Encryption Standard (AES) have made it the first choice for many critical applications. Since its acceptance as the adopted symmetric-key algorithm, the AES has been utilized in various security-constrained applications, many of which are power and resource constrained and require reliable and efficient hardware implementations.

In this thesis, first, we investigate the AES algorithm from the concurrent fault detection point of view. We note that in addition to the efficiency requirements of the AES, it must be reliable against transient and permanent internal faults or …