Macquarie University, Sydney Macquarie University ResearchOnline

Showing items 1 - 15 of 36.

Add to Quick Collection   All 36 Results

Sort:
 Add All Items to Quick Collection
Date: 2017
Language: eng
Resource Type: journal article
Identifier: http://hdl.handle.net/1959.14/1248256
Description: This article proposes a novel architecture to perform modular multiplication in the Residue Number System (RNS) by using sum of residues. The highly parallel architecture is implemented using VHDL and ... More
Reviewed: Reviewed
Date: 2016
Language: eng
Resource Type: journal article
Identifier: http://hdl.handle.net/1959.14/1195777
Description: Fingerprints are the oldest and most widely used form of biometric identification. Many researchers have addressed the fingerprint classification problem and significant progress has been made in desi ... More
Reviewed: Reviewed
Date: 2016
Language: eng
Resource Type: journal article
Identifier: http://hdl.handle.net/1959.14/1195592
Description: Sign detection is an essential part of many computer hardware designs, and is not a trivial task in residue number systems because it is a function of all the residues. This study proposes an algorith ... More
Reviewed: Reviewed
Date: 2016
Language: eng
Resource Type: conference paper
Identifier: http://hdl.handle.net/1959.14/1196651
Description: Elliptic curve cryptography (ECC) plays a vital role in pabing secure information among different wireleb devices. This paper presents a fast, high-performance hardware implementation of an ECC proceb ... More
Reviewed: Reviewed
Date: 2016
Language: eng
Resource Type: journal article
Identifier: http://hdl.handle.net/1959.14/1195770
Description: Modular multiplication can be performed in the residue number system (RNS) using a type of Montgomery reduction. This paper presents an alternative in which RNS modular multiplication are performed by ... More
Reviewed: Reviewed
Date: 2016
Language: eng
Resource Type: journal article
Identifier: http://hdl.handle.net/1959.14/1190515
Description: Digital image processing is widely used in fast and high-performance applications. The high speed and functional requirements of such applications, however, lead to increased power consumption. Hence, ... More
Reviewed: Reviewed
Date: 2016
Language: eng
Resource Type: journal article
Identifier: http://hdl.handle.net/1959.14/1201829
Description: Coherence-enhancing diffusion filtering is a striking application of the anisotropic diffusion in image processing. The technique deals with the problem of completion of interrupted lines and enhancem ... More
Reviewed: Reviewed
Date: 2015
Language: eng
Resource Type: conference paper
Identifier: http://hdl.handle.net/1959.14/1066996
Description: Multiplication is one of the most commonly used operations in the signal processing algorithms. Multipliers based on Wallace reduction tree provide an area-efficient strategy for high speed multiplica ... More
Reviewed: Reviewed
Date: 2015
Language: eng
Resource Type: conference paper
Identifier: http://hdl.handle.net/1959.14/1067804
Description: The Sum of Absolute Differences (SAD) is widely used in motion-estimation algorithms, the most computationally intensive task in video compression, and also in determining similarities between two dat ... More
Reviewed: Reviewed
Date: 2015
Language: eng
Resource Type: conference paper
Identifier: http://hdl.handle.net/1959.14/1067003
Description: Wallace tree multipliers provide a power-efficient strategy for high speed multiplication. The use of high speed 7?3 counters in the Wallace tree reduction can further improve the multiplier speed. Th ... More
Reviewed: Reviewed
Date: 2015
Language: eng
Resource Type: conference paper
Identifier: http://hdl.handle.net/1959.14/1066611
Description: Modular multiplication is the backbone for the whole asymmetric cryptographic process. In this paper, we have focused on a high-speed hardware implementation of modular multiplication for public-key c ... More
Reviewed: Reviewed
Date: 2015
Language: eng
Resource Type: conference paper
Identifier: http://hdl.handle.net/1959.14/1066280
Description: This paper presents a novel approach for automatic pupil segmentation. The proposed algorithm uses local histogram-based threshold, area and eccentricity that looks for the region that has the highest ... More
Reviewed: Reviewed
Date: 2015
Language: eng
Resource Type: conference paper
Identifier: http://hdl.handle.net/1959.14/1055893
Description: Cryptosystems, even after recent algorithmic improvements, can be vulnerable to side-channel attacks (SCA) In this paper, we investigate one of the powerful class of SCAs based on machine learning tec ... More
Reviewed: Reviewed
Date: 2015
Language: eng
Resource Type: conference paper
Identifier: http://hdl.handle.net/1959.14/362438
Description: Image and video processing applications require various 2D filters, many of them separable filters. This separable computation is an advantage since it implies less arithmetic computational complexity ... More
Reviewed: Reviewed
Date: 2015
Language: eng
Resource Type: conference paper
Identifier: http://hdl.handle.net/1959.14/1066979
Description: Different features of an image are relevant for different applications. Among the different features as edges which have been analyzed and investigated intensely. Of different edge detection methods, ... More
Reviewed: Reviewed