ELEKS helps a medical device company reduce patient assessment time by accelerating Magnetic Resonance Imaging (MRI) scanner post-processing software with CUDA™
US MRI scanners developer and manufacturer
Reduce patient time on the table by accelerating complex MRI image post-processing and reconstruction tasks.
ELEKS developed a library of specialized functions to perform extremely fast and efficient MRI images reconstruction and SVD processing using NVIDIA® CUDA™. Now these operations take less than a second compared to 28 seconds for FFT and 18.5 seconds for SVD processing (over benchmark datasets using single-threaded reference CPU implementation). And the maximum achieved SVD acceleration is 155x on a benchmark dataset of 96 512x384 frames acquired from 8 coils in YZ orientation.
NVIDIA® CUDA™ GPUs, C++, Microsoft .NET, C#.
The purpose of the project was to improve the security system which consists of Java Cards and PC Applications. The system automatically operates with cards by means of reading and verifying, card printing, etc. Additionally, the PC Application reads data from a smart card with user-friendly GUI and grants or denies access based on smart card and biometric data readings.
An IT solutions provider offering consulting services.
The challenge was to create a card-based security system that manages biometric data in order to access restricted area.
Java 6 SE, Java Cards, .Net Framework
ELEKS developed a highly effective and reliable security system, based on Java card Applet and set of PC applications, responsible for system configuration and operations. Personal identification of a card holder is accomplished using received personal data and fingerprints verification. The solution delivered ensures card data protection by means of data encryption and multi-level protection. All card service data is stored in a way which provides protection against attacks based on program flow prediction. Security of the system is also determined by limited access to the application, installation limitations, and other security constraints.Download PDF