Robotic Exploration and Landmark Determination: Hardware-Efficient Algorithms and FPGA Implementations
نویسندگان
چکیده
robotic exploration and landmark determination hardware efficient algorithms and fpga implementation What to say and what to do when mostly your friends love reading? Are you the one that don't have such hobby? So, it's important for you to start having that hobby. You know, reading is not the force. We're sure that reading will lead you to join in better concept of life. Reading will be a positive activity to do every time. And do you know our friends become fans of robotic exploration and landmark determination hardware efficient algorithms and fpga implementation as the best book to read? Yeah, it's neither an obligation nor order. It is the referred book that will not make you feel disappointed.
منابع مشابه
Systematic Exploration of Trade-Offs between Application Throughput and Hardware Resource Requirements in DSP Systems
Title of dissertation: SYSTEMATIC EXPLORATION OF TRADE-OFFS BETWEEN APPLICATION THROUGHPUT AND HARDWARE RESOURCE REQUIREMENTS IN DSP SYSTEMS Hojin Kee, Doctor of Philosophy, 2010 Dissertation directed by: Shuvra S. Bhattacharyya, Professor Department of Electrical and Computer Engineering, and Institute for Advanced Computer Studies Dataflow has been used extensively as an efficient model-of-co...
متن کاملThreshold Implementation as a Countermeasure against Power Analysis Attacks
One of the usual ways to find sensitive data or secret parameters of cryptographic devices is to use their physical leakages. Power analysis is one of the attacks which lay in such a model. In comparison with other types of side-channels, power analysis is so efficient and has a high success rate. So it is important to provide a countermeasure against it. Different types of countermeasures use ...
متن کاملSecure FPGA Design by Filling Unused Spaces
Nowadays there are different kinds of attacks on Field Programmable Gate Array (FPGA). As FPGAs are used in many different applications, its security becomes an important concern, especially in Internet of Things (IoT) applications. Hardware Trojan Horse (HTH) insertion is one of the major security threats that can be implemented in unused space of the FPGA. This unused space is unavoidable to ...
متن کاملFPGA Implementations of eSTREAM Phase-2 Focus Candidates with Hardware Profile
Efficient cryptographic implementations are a fundamental factor in the achievement and dissemination of new computerized applications. In some recent environments with (very) limited resources such as smart cards, sensor networks or RFID tags, standard algorithms may not be completely adapted.Consequently, the design of new solutions for low-cost cryptography is sometimes necessary and is at l...
متن کاملDesign Space Exploration of Hummingbird Implementations on FPGAs
Abstract Hummingbird is a recently proposed ultra-lightweight cryptographic algorithm targeted for resource-constrained devices like RFID tags, smart cards, and wireless sensor nodes. In this paper, we describe efficient hardware implementations of a stand-alone Hummingbird component in field-programmable gate array (FPGA) devices. We implement an encryption only core and an encryption/decrypti...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره 81 شماره
صفحات -
تاریخ انتشار 2008