All Stories

  1. Hybrid XGBoost-LSTM model for oil well production forecasting using the volve field dataset
  2. Air particulate matter (PM2.5) concentration prediction in Kuwait using vision transformer
  3. Evaluating large language models’ Arabic grammar error corrections and explanations
  4. Predictive Analysis of Early Thyroid Disorders Using Integration of Data Mining and Ensemble Intelligence Approaches
  5. Epileptic seizure detection by learning EEG as images using vision transformers
  6. An Approach for Hardware Trojan Detection Using Triple Modular Redundancy in Approximate Synthesis (HT-TRAPS)
  7. Formal Analysis of a Macro-Mini Robotic System for Physical Human-Robot Interaction
  8. Heart disease prediction by tabular modeling with deep learning network and interpretability
  9. Context-Aware Advisor System for Crowded Environments
  10. Enhanced POSIT Constant Multiplier Implementation using FPGA
  11. Arabic Question Generation Using Transformers
  12. Formalization of Biological Circuit Block Diagrams for Formally Analyzing Biomedical Control Systems in pHRI Applications
  13. ASIP Design Flow Automation with Node-Based Programming
  14. Automatic arabic handwritten characters Recognition using ensemble of convolutional neural networks from scratch
  15. Information hiding using approximate POSIT representation
  16. Network traffic prediction by learning time series as images
  17. Formal Verification of Universal Numbers using Theorem Proving
  18. IoT Lightweight Session Key Exchange to Improve Security Scheme
  19. Epileptic Seizure Detection Using Novel CNN with Residual Connections
  20. Two-stage framework for diabetic retinopathy diagnosis and disease stage screening with ensemble learning
  21. Improving Energy Consumption in Content-Addressable Memory Through Precomputation
  22. A smart admission control and cache replacement approach in content delivery networks
  23. Viral genome prediction from raw human DNA sequence samples by combining natural language processing and machine learning techniques
  24. Lung cancer classification and identification framework with automatic nodule segmentation screening using machine learning
  25. A Review on Blockchain and IoT Integration from Energy, Security and Hardware Perspectives
  26. Early detection of diabetic foot ulcers from thermal images using the bag of features technique
  27. Enhanced Not Recently Used Algorithm for Cache Memory Systems in Mobile Computing
  28. Formal Stability Analysis of Two-Dimensional Digital Image Processing Filters
  29. Using an Interactive Theorem Prover for Formally Analyzing the Dynamics of the Unmanned Aerial Vehicles
  30. CAD systems for COVID-19 diagnosis and disease stage classification by segmentation of infected regions from CT images
  31. Formal analysis of 2D image processing filters using higher-order logic theorem proving
  32. Runtime Trojan Detection using Step-Based Reverse Function Redundancy Algorithm
  33. Network Intrusion Detection With Auto-Encoder and One-Class Support Vector Machine
  34. Efficient hand vein recognition using local keypoint descriptors and directional gradients
  35. POSIT vs. Floating Point in Implementing IIR Notch Filter by Enhancing Radix-4 Modified Booth Multiplier
  36. Computer-aided detection of breast cancer on the Wisconsin dataset: An artificial neural networks approach
  37. DSM for Energy Optimization and Communications Within Smart Grid CPSs
  38. Enhanced video-on-demand security in cloud computing against insider and outsider threats
  39. Starvation Avoidance Task Scheduling Algorithm for Heterogeneous Computing Systems
  40. Cluster-Based Antiphishing (CAP) Model for Smart Phones
  41. Hardware Trojan detection for lightweight ciphers implemented on field‐programmable gate arrays using the replay algorithm
  42. HVoC: a Hybrid Model Checking - Interactive Theorem Proving Approach for Functional Verification of Digital Circuits
  43. Enhanced brain tumor classification using an optimized multi-layered convolutional neural network architecture
  44. An analysis and evaluation of lightweight hash functions for blockchain-based IoT devices
  45. Enhancement in data security and integrity using minhash technique
  46. Performance evaluation of the SM4 cipher based on field‐programmable gate array implementation
  47. A KNN Approach for Blockchain Based Electronic Health Record Analysis
  48. Customized Frequent Patterns Mining Algorithms for Enhanced Top-Rank-K Frequent Pattern Mining
  49. Approximate Population Count Using the Harley-Seal Method for Error-Tolerant Applications
  50. An Improved Least Significant Bit Image Steganography Method
  51. SAT‐based and CP‐based declarative approaches for Top‐Rank‐ K  closed frequent itemset mining
  52. Verification of Non-linear Arithmetic Circuits using Functionally Reduced And-Inverter-Graph (FRAIG)
  53. Formal Analysis of Unmanned Aerial Vehicles Using Higher-Order-Logic Theorem Proving
  54. Formal reasoning about synthetic biology using higher-order-logic theorem proving
  55. Formal analysis of the biological circuits using higher-order-logic theorem proving
  56. Implementation of Edge Detection Algorithm using FPGA Reconfigurable Hardware
  57. Error metrics determination in functionally approximated circuits using SAT solvers
  58. Enhanced SAT Solvers Based Hashing Method for Bitcoin Mining
  59. FPGA Implementation of Enhanced JPEG Algorithm for Colored Images
  60. Run-time Monitoring and Validation using Reverse Function (RMVRF) for Hardware Trojans Detection
  61. A secure and energy-efficient platform for the integration of Wireless Sensor Networks and Mobile Cloud Computing
  62. Efficient cover image selection based on spatial block analysis and DCT embedding
  63. Diacritics Effect on Arabic Speech Recognition
  64. An Automated Security Approach of Video Steganography–Based LSB Using FPGA Implementation
  65. Implementation of Speech Feature Extraction For Low-Resource Devices
  66. Enhanced JPEG Algorithm for Colored Images Based on FPGA Implementation
  67. FPGA Modeling and Optimization of a SIMON Lightweight Block Cipher
  68. Infection control measures in neonatal units: implementation of change in the Gaza-Strip
  69. An efficient multiple sclerosis segmentation and detection system using neural networks
  70. Enhancement of Task Scheduling Technique of Big Data Cloud Computing
  71. High-performance low-power approximate Wallace tree multiplier
  72. Leakage/Temperature-Aware Dynamic Voltage Scaling and Dynamic Cache Reconfiguration to Reduce Power Consumption
  73. A novel approach to classify and detect bean diseases based on image processing
  74. A comprehensive study and analysis on SAT-solvers: advances, usages and achievements
  75. DSM for Energy Optimization and Communications Within Smart Grid CPSs
  76. Energy-Efficient Virtual Machine Placement Algorithm
  77. Security approach for LSB steganography based FPGA implementation
  78. Fault tolerance design for NoCs
  79. Automatic Verification of Single-Electron Transistor Arrays Based on Multiway Decision Graphs
  80. Security of VoIP traffic over low or limited bandwidth networks
  81. A high-capacity and secure least significant bit embedding approach based on word and letter frequencies
  82. Effective optic disc detection method based on swarm intelligence techniques and novel pre-processing steps
  83. Optic disc detection in retinal fundus images using gravitational law-based edge detection
  84. Hybrid approach based on partial tag comparison technique and search methods to improve cache performance
  85. FPGA-based Implementation of Novel Dual-Slope Method for QRS Complex Detection
  86. Towards improving the performance of distributed virtual memory based reversal cache approach
  87. ANALYSIS AND MODELING OF FPGA IMPLEMENTATIONS OF SPATIAL STEGANOGRAPHY METHODS
  88. Software comprehension based on database relational algebra
  89. MPLS technology in wireless networks
  90. Carry-based reduction parallel counter design
  91. An Efficient Backup Technique for Database Systems Based on Threshold Sharing
  92. Synthesizing a Heart Rate Analyzer Chip QRS
  93. Four dimensional entertainment machine
  94. An Energy-Aware Virtual Machine Migration Algorithm
  95. FPGA hardware of the LSB steganography method
  96. Relational database approach for execution trace analysis
  97. Hierarchical steganography using novel optimum quantization technique
  98. A novel approach to enhance distributed virtual memory
  99. Design and implementation of interfacing two FPGAs
  100. Automatic verification of reduction techniques in Higher Order Logic
  101. Image Steganography Optimization Technique
  102. MDG-SAT: an automated methodology for efficient safety checking
  103. Abstract property language for MDG model checking methodology
  104. Towards an FPGA implementation and performance evaluation of a digital carrier synchronizer with a portable emulation environment
  105. Low power Wallace multiplier design based on wide counters
  106. NuMDG: A New Tool for Multiway Decision Graphs Construction
  107. A Methodology for Distributed Virtual Memory Improvement
  108. An automated SAT encoding-verification approach for efficient model checking
  109. SAT based model checking for MDG models
  110. MDGs Reduction Technique Based on the HOL Theorem Prover
  111. Processing APL properties to generate verification-ready MDG model
  112. Reliability of recursive concentrator
  113. LCF-style Platform based on Multiway Decision Graphs
  114. An Abstract Reachability Approach by Combining HOL Induction and Multiway Decision Graphs
  115. The performance of combining multiway decision graphs and HOL theorem prover
  116. Multiway Decision Graphs Reduction Approach based on the HOL Theorem Prover
  117. Reachability analysis using multiway decision graphs in the HOL theorem prover
  118. Integrating SAT with Multiway Decision Graphs for efficient model checking
  119. On The Integration of Decision Diagrams in High Order Logic Based Theorem Provers:a Survey
  120. High Level Reduction Technique for Multiway Decision Graphs Based Model Checking
  121. Towards First-Order Symbolic Trajectory Evaluation
  122. Closed-loop control system robustness improvement by a parameterised state feedback
  123. A New Approach for the Construction of Multiway Decision Graphs