Villagarcía Wanza, Horacio A.
The National Institute of Standards and Technology (NIST) created a new standard known as Advanced Encryption Standard (AES), with the objective of developing the Federal Information Processing Standard (FIPS) which specifies an encryption algorithm capable of protecting sensitive information to be used by the government of the United States. In October 2000, the NIST selected Rijndael as the algorithm proposed for the AES.
The algorithm has a round shape made up by three uniform and non-reversible transformations which assures broadcast over the total set of fixed rounds and optimal non-linearity properties. This thesis presents an 8-bit FPGA implementation of the 128-bit...
Tinetti, Fernando Gustavo
Such as the author states in the first pages, this book is the result of several years of teaching the involved topics at the California Polytechnic State University (Cal Poly), San Luis Obispo, California, U.S.A, to undergraduates. This characteristic can be observed in the organization of the book, in each of the chapters, and in the "hands-on" orientation of each of the presented topics.
(Párrafo extraído del texto a modo de resumen)
Saad, El-Sayed M.; Hadhoud, Mohiy M.; Moawad, Moawad I.; El-Halawany, Mohamed; Abbas, Alaa M.
In this paper, an efficient algorithm for detecting frontalview faces in color images is proposed. The proposed algorithm has a special task; it detects faces in the presence of skin-tone regions such as human body, clothes, and background. Firstly, a pixel based color classifier is applied to segment the skin pixels from background. Next, a hybrid cluster algorithm is applied to partition the skin region. It is well known that the frontal face is symmetrical; therefore we introduce a new symmetry approach, which is the main distinguishing feature of the proposed algorithm. It measures a symmetrical value, searches for the...
Pastore, Juan Ignacio; Bouchet, A.; Moler, Emilce Graciela; Ballarín, Virginia Laura
This article describes an automatic method applicable to the segmentation of mediastinum Computerized Axial Tomography (CAT) images with tumors, by means of Alternating Sequential Filters (ASFs) of Mathematical Morphology, and connected components extraction based on continuous topology concepts. Digital images can be related to topological space structures, and then general topology principles can be straightforwardly implemented.
This method allows not only to accurately determine the area and external boundary of the segmented structures but also to obtain their precise location.
Throughout these last years, technological development has significantly improved diagnostic imaging, enabling renal tumor and incidental hepatic tumor detection -usually small in...
Khela, Raja Singh; Bansal, Raj Kumar; Sandhu, K. S.; Goel, Ashok Kumar
It is observed that conventional techniques to analyse the steady state analysis of Self-Excited Induction Generator (SEIG) involve cumbersome mathematical procedures. In this paper an Artificial Intelligence (AI) technique has been used to analyse the behaviour of Self-Excited Induction Generator, which does not require rigorous modelling as required in conventional techniques.
Proposed Artificial Neural Network (ANN) model has been implemented to predict the effect of speed, capacitance and load on generated voltage and frequency of SEIG. Experimental data is used for the training of ANN. Results obtained from the trained ANN are found to be in close agreement with the experimental...
Sabri, Khair Eddin M.; Al-Jaafer, Jubair J.
In this research a system, referred to as Jubair-Khaireddin (JK), has been developed to assess the degree of similarity between two programs even though they look superficially dissimilar. The JK system has the capability to detect deliberate attempts of plagiarism. Reverse engineering technique is used to bring each suspected program back to its initial specification stage. This operation enables us to extract the structure of the program which is an important factor in detecting plagiarism. This can be achieved through the extraction of the Static Execution Tree (SET) for each program. The SET is then transformed into Terminating Binary Sequence...
Mostaccio, Diego; Dalforno, Christianne; Suppi, Remo; Luque Fadón, Emilio
The distributed simulation for high performance models has been carried-out into a very useful and low-cost tool. In the present work their application to an individual oriented model (Fish Schools) is analyzed. To do this, it was analyzed different alternatives for this type of simulation and their application to obtain performance and model scalability using different implementation. Thus, two distributed simulator have been developed based on PVM and MPI communication libraries. This paper resumes the advantages and drawbacks of each implementation and some conclusions about the distributed simulation for this type of models are extracted. Moreover, visualization aspects and the...
De Giusti, Marisa Raquel; Vila, María Marta; Villarreal, Gonzalo Luján
The image recognizing process requires the identification of every logical object that compose every image, which first implies to recognize it as an object (segmentation) and then identify which object is, or at least which is the most likely one from the universe of objects that can be recognized (recognition). During the segmentation process, the aim is to identify as many objects that compose the images as possible. This process must be adapted to the universe of all objects that are looked for, which can vary from printed or manuscript characters to fruits or animals, or even fingerprints. Once all...