- Article
This work proposes the first scaler designed specifically for the three-moduli set M 1 = { 2 n + 1 − 1 , 2 n , 2 n − 1 } . Hence, there is no other functionally similar scaler to compare the proposed scaler with. Howeve...
September 2018 - 10 articles
This work proposes the first scaler designed specifically for the three-moduli set M 1 = { 2 n + 1 − 1 , 2 n , 2 n − 1 } . Hence, there is no other functionally similar scaler to compare the proposed scaler with. Howeve...
Education values such as knowledge sharing, and the linked data (LD) abilities such as interoperability are in perfect harmony. Much research has exploited that and provided important contributions and improvements in education through LD. Internatio...
The paper discusses the use of parallel computation to obtain rough set approximations from large-scale information systems where missing data exist in both condition and decision attributes. To date, many studies have focused on missing condition da...
The scale of modern neural networks is growing rapidly, with direct hardware implementations providing significant speed and energy improvements over their software counterparts. However, these hardware implementations frequently assume global connec...
Online social network users share their information in different social sites to establish connections with individuals with whom they want to be a friend. While users share all their information to connect to other individuals, they need to hide the...
Over the past decades, many systems composed of arrays of microphones have been developed to satisfy the quality demanded by acoustic applications. Such microphone arrays are sound acquisition systems composed of multiple microphones used to sample t...
A Ring Oscillator Physical Unclonable Function (RO PUF) is an application-constrained hardware security primitive that can be used for authentication and key generation. PUFs depend on variability during the fabrication process to produce random outp...
While Internet of Things (IoT) technology has been widely recognized as an essential part of Smart Cities, it also brings new challenges in terms of privacy and security. Access control (AC) is among the top security concerns, which is critical in re...
Biometrics play an avid role in today’s mobile security realm. Security experts have attempted to implement different forms of biometrics, from finger, hand, and signature to voice, retina, and iris. Recently, facial biometrics has been added t...
The end of Dennard scaling led to the use of heterogeneous multi-processor systems-on-chip (MPSoCs). Heterogeneous MPSoCs provide a high efficiency in terms of energy and performance due to the fact that each processing element can be optimized for a...