All Stories

  1. Epileptic seizure detection by learning EEG as images using vision transformers
  2. An Approach for Hardware Trojan Detection Using Triple Modular Redundancy in Approximate Synthesis (HT-TRAPS)
  3. Heart disease prediction by tabular modeling with deep learning network and interpretability
  4. Context-Aware Advisor System for Crowded Environments
  5. Enhanced POSIT Constant Multiplier Implementation using FPGA
  6. Arabic Question Generation Using Transformers
  7. Formalization of Biological Circuit Block Diagrams for Formally Analyzing Biomedical Control Systems in pHRI Applications
  8. ASIP Design Flow Automation with Node-Based Programming
  9. Automatic arabic handwritten characters Recognition using ensemble of convolutional neural networks from scratch
  10. Information hiding using approximate POSIT representation
  11. Network traffic prediction by learning time series as images
  12. Formal Verification of Universal Numbers using Theorem Proving
  13. IoT Lightweight Session Key Exchange to Improve Security Scheme
  14. Epileptic Seizure Detection Using Novel CNN with Residual Connections
  15. Two-stage framework for diabetic retinopathy diagnosis and disease stage screening with ensemble learning
  16. Improving Energy Consumption in Content-Addressable Memory Through Precomputation
  17. A smart admission control and cache replacement approach in content delivery networks
  18. Viral genome prediction from raw human DNA sequence samples by combining natural language processing and machine learning techniques
  19. Lung cancer classification and identification framework with automatic nodule segmentation screening using machine learning
  20. A Review on Blockchain and IoT Integration from Energy, Security and Hardware Perspectives
  21. Early detection of diabetic foot ulcers from thermal images using the bag of features technique
  22. Enhanced Not Recently Used Algorithm for Cache Memory Systems in Mobile Computing
  23. Formal Stability Analysis of Two-Dimensional Digital Image Processing Filters
  24. Using an Interactive Theorem Prover for Formally Analyzing the Dynamics of the Unmanned Aerial Vehicles
  25. CAD systems for COVID-19 diagnosis and disease stage classification by segmentation of infected regions from CT images
  26. Formal analysis of 2D image processing filters using higher-order logic theorem proving
  27. Runtime Trojan Detection using Step-Based Reverse Function Redundancy Algorithm
  28. Network Intrusion Detection With Auto-Encoder and One-Class Support Vector Machine
  29. Efficient hand vein recognition using local keypoint descriptors and directional gradients
  30. POSIT vs. Floating Point in Implementing IIR Notch Filter by Enhancing Radix-4 Modified Booth Multiplier
  31. Computer-aided detection of breast cancer on the Wisconsin dataset: An artificial neural networks approach
  32. DSM for Energy Optimization and Communications Within Smart Grid CPSs
  33. Enhanced video-on-demand security in cloud computing against insider and outsider threats
  34. Starvation Avoidance Task Scheduling Algorithm for Heterogeneous Computing Systems
  35. Cluster-Based Antiphishing (CAP) Model for Smart Phones
  36. Hardware Trojan detection for lightweight ciphers implemented on field‐programmable gate arrays using the replay algorithm
  37. HVoC: a Hybrid Model Checking - Interactive Theorem Proving Approach for Functional Verification of Digital Circuits
  38. Enhanced brain tumor classification using an optimized multi-layered convolutional neural network architecture
  39. An analysis and evaluation of lightweight hash functions for blockchain-based IoT devices
  40. Enhancement in data security and integrity using minhash technique
  41. Performance evaluation of the SM4 cipher based on field‐programmable gate array implementation
  42. A KNN Approach for Blockchain Based Electronic Health Record Analysis
  43. Customized Frequent Patterns Mining Algorithms for Enhanced Top-Rank-K Frequent Pattern Mining
  44. Approximate Population Count Using the Harley-Seal Method for Error-Tolerant Applications
  45. An Improved Least Significant Bit Image Steganography Method
  46. SAT‐based and CP‐based declarative approaches for Top‐Rank‐ K  closed frequent itemset mining
  47. Verification of Non-linear Arithmetic Circuits using Functionally Reduced And-Inverter-Graph (FRAIG)
  48. Formal Analysis of Unmanned Aerial Vehicles Using Higher-Order-Logic Theorem Proving
  49. Formal reasoning about synthetic biology using higher-order-logic theorem proving
  50. Formal analysis of the biological circuits using higher-order-logic theorem proving
  51. Implementation of Edge Detection Algorithm using FPGA Reconfigurable Hardware
  52. Error metrics determination in functionally approximated circuits using SAT solvers
  53. Enhanced SAT Solvers Based Hashing Method for Bitcoin Mining
  54. FPGA Implementation of Enhanced JPEG Algorithm for Colored Images
  55. Run-time Monitoring and Validation using Reverse Function (RMVRF) for Hardware Trojans Detection
  56. A secure and energy-efficient platform for the integration of Wireless Sensor Networks and Mobile Cloud Computing
  57. Efficient cover image selection based on spatial block analysis and DCT embedding
  58. Diacritics Effect on Arabic Speech Recognition
  59. An Automated Security Approach of Video Steganography–Based LSB Using FPGA Implementation
  60. Implementation of Speech Feature Extraction For Low-Resource Devices
  61. Enhanced JPEG Algorithm for Colored Images Based on FPGA Implementation
  62. FPGA Modeling and Optimization of a SIMON Lightweight Block Cipher
  63. Infection control measures in neonatal units: implementation of change in the Gaza-Strip
  64. An efficient multiple sclerosis segmentation and detection system using neural networks
  65. Enhancement of Task Scheduling Technique of Big Data Cloud Computing
  66. High-performance low-power approximate Wallace tree multiplier
  67. Leakage/Temperature-Aware Dynamic Voltage Scaling and Dynamic Cache Reconfiguration to Reduce Power Consumption
  68. A novel approach to classify and detect bean diseases based on image processing
  69. A comprehensive study and analysis on SAT-solvers: advances, usages and achievements
  70. DSM for Energy Optimization and Communications Within Smart Grid CPSs
  71. Energy-Efficient Virtual Machine Placement Algorithm
  72. Security approach for LSB steganography based FPGA implementation
  73. Fault tolerance design for NoCs
  74. Automatic Verification of Single-Electron Transistor Arrays Based on Multiway Decision Graphs
  75. Security of VoIP traffic over low or limited bandwidth networks
  76. A high-capacity and secure least significant bit embedding approach based on word and letter frequencies
  77. Effective optic disc detection method based on swarm intelligence techniques and novel pre-processing steps
  78. Optic disc detection in retinal fundus images using gravitational law-based edge detection
  79. Hybrid approach based on partial tag comparison technique and search methods to improve cache performance
  80. FPGA-based Implementation of Novel Dual-Slope Method for QRS Complex Detection
  81. Towards improving the performance of distributed virtual memory based reversal cache approach
  82. ANALYSIS AND MODELING OF FPGA IMPLEMENTATIONS OF SPATIAL STEGANOGRAPHY METHODS
  83. Software comprehension based on database relational algebra
  84. MPLS technology in wireless networks
  85. Carry-based reduction parallel counter design
  86. An Efficient Backup Technique for Database Systems Based on Threshold Sharing
  87. Synthesizing a Heart Rate Analyzer Chip QRS
  88. Four dimensional entertainment machine
  89. An Energy-Aware Virtual Machine Migration Algorithm
  90. FPGA hardware of the LSB steganography method
  91. Relational database approach for execution trace analysis
  92. Hierarchical steganography using novel optimum quantization technique
  93. A novel approach to enhance distributed virtual memory
  94. Design and implementation of interfacing two FPGAs
  95. Automatic verification of reduction techniques in Higher Order Logic
  96. Image Steganography Optimization Technique
  97. MDG-SAT: an automated methodology for efficient safety checking
  98. Abstract property language for MDG model checking methodology
  99. Towards an FPGA implementation and performance evaluation of a digital carrier synchronizer with a portable emulation environment
  100. Low power Wallace multiplier design based on wide counters
  101. NuMDG: A New Tool for Multiway Decision Graphs Construction
  102. A Methodology for Distributed Virtual Memory Improvement
  103. An automated SAT encoding-verification approach for efficient model checking
  104. SAT based model checking for MDG models
  105. MDGs Reduction Technique Based on the HOL Theorem Prover
  106. Processing APL properties to generate verification-ready MDG model
  107. Reliability of recursive concentrator
  108. LCF-style Platform based on Multiway Decision Graphs
  109. An Abstract Reachability Approach by Combining HOL Induction and Multiway Decision Graphs
  110. The performance of combining multiway decision graphs and HOL theorem prover
  111. Multiway Decision Graphs Reduction Approach based on the HOL Theorem Prover
  112. Reachability analysis using multiway decision graphs in the HOL theorem prover
  113. Integrating SAT with Multiway Decision Graphs for efficient model checking
  114. On The Integration of Decision Diagrams in High Order Logic Based Theorem Provers:a Survey
  115. High Level Reduction Technique for Multiway Decision Graphs Based Model Checking
  116. Towards First-Order Symbolic Trajectory Evaluation
  117. Closed-loop control system robustness improvement by a parameterised state feedback
  118. A New Approach for the Construction of Multiway Decision Graphs