Open Access. Powered by Scholars. Published by Universities.®
Articles 1 - 2 of 2
Full-Text Articles in Engineering
Recognition Of Incomplete Objects Based On Synthesis Of Views Using A Geometric Based Local-Global Graphs, Michael Christopher Robbeloth
Recognition Of Incomplete Objects Based On Synthesis Of Views Using A Geometric Based Local-Global Graphs, Michael Christopher Robbeloth
Browse all Theses and Dissertations
The recognition of single objects is an old research field with many techniques and robust results. The probabilistic recognition of incomplete objects, however, remains an active field with challenging issues associated to shadows, illumination and other visual characteristics. With object incompleteness, we mean missing parts of a known object and not low-resolution images of that object. The employment of various single machine-learning methodologies for accurate classification of the incomplete objects did not provide a robust answer to the challenging problem. In this dissertation, we present a suite of high-level, model-based computer vision techniques encompassing both geometric and machine learning approaches …
Image Stitching And Matching Tool In The Automated Iterative Reverse Engineer (Aire) Integrated Circuit Analysis Suite, David C. Bowman
Image Stitching And Matching Tool In The Automated Iterative Reverse Engineer (Aire) Integrated Circuit Analysis Suite, David C. Bowman
Browse all Theses and Dissertations
Due to current market forces, leading-edge semiconductor fabrication plants have moved outside of the US. While this is not a problem at first glance, when it comes to security-sensitive applications, over-production, device cloning, or design alteration becomes a possibility. Since these vulnerabilities exist during the fabrication phase, a Reverse Engineering (RE) step must be introduced to help ensure secure device operation. This thesis proposes several unique methods and a collection of tools to ensure trust assurance in integrated circuit design by detecting fabrication flaws and possible hardware Trojans using several image processing techniques; fused into a singular view of the …