All Stories

  1. Arabic Question Generation Using Transformers
  2. Information hiding using approximate POSIT representation
  3. Network traffic prediction by learning time series as images
  4. Formal Verification of Universal Numbers using Theorem Proving
  5. Epileptic Seizure Detection Using Novel CNN with Residual Connections
  6. Two-stage framework for diabetic retinopathy diagnosis and disease stage screening with ensemble learning
  7. Improving Energy Consumption in Content-Addressable Memory Through Precomputation
  8. A smart admission control and cache replacement approach in content delivery networks
  9. Viral genome prediction from raw human DNA sequence samples by combining natural language processing and machine learning techniques
  10. Lung cancer classification and identification framework with automatic nodule segmentation screening using machine learning
  11. A Review on Blockchain and IoT Integration from Energy, Security and Hardware Perspectives
  12. Early detection of diabetic foot ulcers from thermal images using the bag of features technique
  13. Enhanced Not Recently Used Algorithm for Cache Memory Systems in Mobile Computing
  14. Formal Stability Analysis of Two-Dimensional Digital Image Processing Filters
  15. Using an Interactive Theorem Prover for Formally Analyzing the Dynamics of the Unmanned Aerial Vehicles
  16. CAD systems for COVID-19 diagnosis and disease stage classification by segmentation of infected regions from CT images
  17. Formal analysis of 2D image processing filters using higher-order logic theorem proving
  18. Runtime Trojan Detection using Step-Based Reverse Function Redundancy Algorithm
  19. Network Intrusion Detection With Auto-Encoder and One-Class Support Vector Machine
  20. Efficient hand vein recognition using local keypoint descriptors and directional gradients
  21. POSIT vs. Floating Point in Implementing IIR Notch Filter by Enhancing Radix-4 Modified Booth Multiplier
  22. Computer-aided detection of breast cancer on the Wisconsin dataset: An artificial neural networks approach
  23. DSM for Energy Optimization and Communications Within Smart Grid CPSs
  24. Enhanced video-on-demand security in cloud computing against insider and outsider threats
  25. Starvation Avoidance Task Scheduling Algorithm for Heterogeneous Computing Systems
  26. Cluster-Based Antiphishing (CAP) Model for Smart Phones
  27. Hardware Trojan detection for lightweight ciphers implemented on field‐programmable gate arrays using the replay algorithm
  28. HVoC: a Hybrid Model Checking - Interactive Theorem Proving Approach for Functional Verification of Digital Circuits
  29. Enhanced brain tumor classification using an optimized multi-layered convolutional neural network architecture
  30. An analysis and evaluation of lightweight hash functions for blockchain-based IoT devices
  31. Enhancement in data security and integrity using minhash technique
  32. Performance evaluation of the SM4 cipher based on field‐programmable gate array implementation
  33. A KNN Approach for Blockchain Based Electronic Health Record Analysis
  34. Customized Frequent Patterns Mining Algorithms for Enhanced Top-Rank-K Frequent Pattern Mining
  35. Approximate Population Count Using the Harley-Seal Method for Error-Tolerant Applications
  36. An Improved Least Significant Bit Image Steganography Method
  37. SAT‐based and CP‐based declarative approaches for Top‐Rank‐ K  closed frequent itemset mining
  38. Verification of Non-linear Arithmetic Circuits using Functionally Reduced And-Inverter-Graph (FRAIG)
  39. Formal Analysis of Unmanned Aerial Vehicles Using Higher-Order-Logic Theorem Proving
  40. Formal reasoning about synthetic biology using higher-order-logic theorem proving
  41. Formal analysis of the biological circuits using higher-order-logic theorem proving
  42. Implementation of Edge Detection Algorithm using FPGA Reconfigurable Hardware
  43. Error metrics determination in functionally approximated circuits using SAT solvers
  44. Enhanced SAT Solvers Based Hashing Method for Bitcoin Mining
  45. FPGA Implementation of Enhanced JPEG Algorithm for Colored Images
  46. Run-time Monitoring and Validation using Reverse Function (RMVRF) for Hardware Trojans Detection
  47. A secure and energy-efficient platform for the integration of Wireless Sensor Networks and Mobile Cloud Computing
  48. Efficient cover image selection based on spatial block analysis and DCT embedding
  49. Diacritics Effect on Arabic Speech Recognition
  50. An Automated Security Approach of Video Steganography–Based LSB Using FPGA Implementation
  51. Implementation of Speech Feature Extraction For Low-Resource Devices
  52. Enhanced JPEG Algorithm for Colored Images Based on FPGA Implementation
  53. FPGA Modeling and Optimization of a SIMON Lightweight Block Cipher
  54. Infection control measures in neonatal units: implementation of change in the Gaza-Strip
  55. An efficient multiple sclerosis segmentation and detection system using neural networks
  56. Enhancement of Task Scheduling Technique of Big Data Cloud Computing
  57. High-performance low-power approximate Wallace tree multiplier
  58. Leakage/Temperature-Aware Dynamic Voltage Scaling and Dynamic Cache Reconfiguration to Reduce Power Consumption
  59. A novel approach to classify and detect bean diseases based on image processing
  60. A comprehensive study and analysis on SAT-solvers: advances, usages and achievements
  61. DSM for Energy Optimization and Communications Within Smart Grid CPSs
  62. Energy-Efficient Virtual Machine Placement Algorithm
  63. Security approach for LSB steganography based FPGA implementation
  64. Fault tolerance design for NoCs
  65. Automatic Verification of Single-Electron Transistor Arrays Based on Multiway Decision Graphs
  66. Security of VoIP traffic over low or limited bandwidth networks
  67. A high-capacity and secure least significant bit embedding approach based on word and letter frequencies
  68. Effective optic disc detection method based on swarm intelligence techniques and novel pre-processing steps
  69. Optic disc detection in retinal fundus images using gravitational law-based edge detection
  70. Hybrid approach based on partial tag comparison technique and search methods to improve cache performance
  71. FPGA-based Implementation of Novel Dual-Slope Method for QRS Complex Detection
  72. Towards improving the performance of distributed virtual memory based reversal cache approach
  73. ANALYSIS AND MODELING OF FPGA IMPLEMENTATIONS OF SPATIAL STEGANOGRAPHY METHODS
  74. Software comprehension based on database relational algebra
  75. MPLS technology in wireless networks
  76. Carry-based reduction parallel counter design
  77. An Efficient Backup Technique for Database Systems Based on Threshold Sharing
  78. Synthesizing a Heart Rate Analyzer Chip QRS
  79. Four dimensional entertainment machine
  80. An Energy-Aware Virtual Machine Migration Algorithm
  81. FPGA hardware of the LSB steganography method
  82. Relational database approach for execution trace analysis
  83. Hierarchical steganography using novel optimum quantization technique
  84. A novel approach to enhance distributed virtual memory
  85. Design and implementation of interfacing two FPGAs
  86. Automatic verification of reduction techniques in Higher Order Logic
  87. Image Steganography Optimization Technique
  88. MDG-SAT: an automated methodology for efficient safety checking
  89. Abstract property language for MDG model checking methodology
  90. Towards an FPGA implementation and performance evaluation of a digital carrier synchronizer with a portable emulation environment
  91. Low power Wallace multiplier design based on wide counters
  92. NuMDG: A New Tool for Multiway Decision Graphs Construction
  93. A Methodology for Distributed Virtual Memory Improvement
  94. An automated SAT encoding-verification approach for efficient model checking
  95. SAT based model checking for MDG models
  96. MDGs Reduction Technique Based on the HOL Theorem Prover
  97. Processing APL properties to generate verification-ready MDG model
  98. Reliability of recursive concentrator
  99. LCF-style Platform based on Multiway Decision Graphs
  100. An Abstract Reachability Approach by Combining HOL Induction and Multiway Decision Graphs
  101. The performance of combining multiway decision graphs and HOL theorem prover
  102. Multiway Decision Graphs Reduction Approach based on the HOL Theorem Prover
  103. Reachability analysis using multiway decision graphs in the HOL theorem prover
  104. Integrating SAT with Multiway Decision Graphs for efficient model checking
  105. On The Integration of Decision Diagrams in High Order Logic Based Theorem Provers:a Survey
  106. High Level Reduction Technique for Multiway Decision Graphs Based Model Checking
  107. Towards First-Order Symbolic Trajectory Evaluation
  108. Closed-loop control system robustness improvement by a parameterised state feedback
  109. A New Approach for the Construction of Multiway Decision Graphs