Skip to Content

61 Results Found

  • Article
  • Open Access
6 Citations
2,924 Views
18 Pages

A Scalable Digit-Parallel Polynomial Multiplier Architecture for NIST-Standardized Binary Elliptic Curves

  • Harish Kumar,
  • Muhammad Rashid,
  • Ahmed Alhomoud,
  • Sikandar Zulqarnain Khan,
  • Ismail Bahkali and
  • Saud S. Alotaibi

24 April 2022

This work presents a scalable digit-parallel finite field polynomial multiplier architecture with a digit size of 32 bits for NIST-standardized binary elliptic fields. First, a dedicated digit-parallel architecture is proposed for each binary field r...

  • Article
  • Open Access
11 Citations
3,938 Views
15 Pages

High-Speed Grouping and Decomposition Multiplier for Binary Multiplication

  • Khamalesh Kumar Padmanabhan,
  • Umadevi Seerengasamy and
  • Abraham Sudharson Ponraj

16 December 2022

In the computation systems that are frequently utilized in Digital Signal Processing (DSP)- and Fast Fourier transform (FFT)-based applications, binary multipliers play a crucial role. Multipliers are one of the basic arithmetic components used, and...

  • Article
  • Open Access
3 Citations
2,070 Views
21 Pages

A Crypto Accelerator of Binary Edward Curves for Securing Low-Resource Embedded Devices

  • Asher Sajid,
  • Omar S. Sonbul,
  • Muhammad Rashid,
  • Atif Raza Jafri,
  • Muhammad Arif and
  • Muhammad Yousuf Irfan Zia

26 July 2023

This research presents a novel binary Edwards curve (BEC) accelerator designed specifically for resource-constrained embedded systems. The proposed accelerator incorporates the fixed window algorithm, a two-stage pipelined architecture, and the Montg...

  • Article
  • Open Access
10 Citations
2,633 Views
19 Pages

A Hybrid Approach for Efficient and Secure Point Multiplication on Binary Edwards Curves

  • Asher Sajid,
  • Omar S. Sonbul,
  • Muhammad Rashid and
  • Muhammad Yousuf Irfan Zia

8 May 2023

The focus of this article is to present a novel crypto-accelerator architecture for a resource-constrained embedded system that utilizes elliptic curve cryptography (ECC). The architecture is built around Binary Edwards curves (BEC) to provide resist...

  • Article
  • Open Access
2 Citations
4,911 Views
23 Pages

Machine Learning Attacks and Countermeasures on Hardware Binary Edwards Curve Scalar Multipliers

  • Charis Dimopoulos,
  • Apostolos P. Fournaris and
  • Odysseas Koufopavlou

Machine Learning techniques have proven effective in Side Channel Analysis (SCA), enabling multiple improvements over the already-established profiling process of Template Attacks. Focusing on the need to mitigate their impact on embedded devices, a...

  • Article
  • Open Access
1 Citations
2,026 Views
18 Pages

20 December 2023

Binary Edwards Curves (BEC) play a pivotal role in modern cryptographic processes and applications, offering a combination of robust security as well as computational efficiency. For robust security, this article harnesses the inherent strengths of B...

  • Article
  • Open Access
4 Citations
4,579 Views
17 Pages

Designing Energy-Efficient Approximate Multipliers

  • Stefania Perri,
  • Fanny Spagnolo,
  • Fabio Frustaci and
  • Pasquale Corsonello

This paper proposes a novel approach suitable to design energy-efficient approximate multipliers using both ASIC and FPGAs. The new strategy harnesses specific encoding logics based on bit significance and computes the approximate product performing...

  • Review
  • Open Access
3 Citations
3,766 Views
21 Pages

29 June 2021

Financial and commercial data are mostly represented in decimal format. To avoid errors introduced when converting some decimal fractions to binary, these data are processed with decimal arithmetic. Most processors only have hardwired binary arithmet...

  • Article
  • Open Access
28 Citations
6,013 Views
11 Pages

Stochastic computing, which is based on probability, involves a trade-off between accuracy and power and is a promising solution for energy-efficiency in error-tolerance designs. In this paper, adder and multiplier circuits based on the proposed stoc...

  • Article
  • Open Access
2 Citations
3,313 Views
16 Pages

19 April 2020

Binary field ( B F ) multiplication is a basic and important operation for widely used crypto algorithms such as the GHASH function of GCM (Galois/Counter Mode) mode and NIST-compliant binary Elliptic Curve Cryptosystems (ECCs). Recently, Seo e...

  • Article
  • Open Access
2,481 Views
20 Pages

17 October 2021

This paper proposes a code defined on a finite ring pM, where pM = 2m1 is a Mersenne prime, and m is a binary size of ring elements. The code is based on a splitting sequence (splitting set) S, defined for the given multiplier set E=±20, ±21,...

  • Article
  • Open Access
1 Citations
2,581 Views
13 Pages

Digital Image Blending by Inexact Multiplication

  • Padmanabhan Balasubramanian,
  • Raunaq Nayar,
  • Okkar Min and
  • Douglas L. Maskell

10 September 2022

Digital image blending is commonly used in applications such as photo editing and computer graphics where two images are combined to produce a desired blended image. Digital images can be blended by addition or multiplication, and usually exact addit...

  • Article
  • Open Access
3 Citations
3,124 Views
18 Pages

An Efficient Crypto Processor Architecture for Side-Channel Resistant Binary Huff Curves on FPGA

  • Usama Umer,
  • Muhammad Rashid,
  • Adel R. Alharbi,
  • Ahmed Alhomoud,
  • Harish Kumar and
  • Atif Raza Jafri

This article presents an efficient crypto processor architecture for point multiplication acceleration of side-channel secured Binary Huff Curves (BHC) on FPGA (field-programmable gate array) over GF(2233). We have implemented six finite field polyno...

  • Article
  • Open Access
30 Citations
4,712 Views
16 Pages

Energy-Efficient Ternary Multipliers Using CNT Transistors

  • Sepehr Tabrizchi,
  • Atiyeh Panahi,
  • Fazel Sharifi,
  • Hamid Mahmoodi and
  • Abdel-Hameed A. Badawy

In recent decades, power consumption has become an essential factor in attracting the attention of integrated circuit (IC) designers. Multiple-valued logic (MVL) and approximate computing are some techniques that could be applied to integrated circui...

  • Article
  • Open Access
8 Citations
3,371 Views
16 Pages

12 December 2020

This work presents an efficient high-speed hardware architecture for point multiplication (PM) computation of Elliptic-curve cryptography using binary fields over GF(2163) and GF(2571). The efficiency is achieved by reducing: (1) the time required fo...

  • Article
  • Open Access
1 Citations
1,523 Views
23 Pages

5 March 2024

We discuss several algorithms for solving a network optimization problem of simultaneous routing and bandwidth allocation in green networks in a decomposed way, based on the augmented Lagrangian. The problem is difficult due to the nonconvexity cause...

  • Article
  • Open Access
21 Citations
12,292 Views
23 Pages

This paper presents hardware-efficient Delta Sigma linear processing circuits for the next generation low-power VLSI devices in the Internet-of-things (IoT).We first propose the P-N (positive-negative) pair method to manipulate both the analog value...

  • Article
  • Open Access
6 Citations
2,381 Views
19 Pages

A major limitation of most metabolomics datasets is the sparsity of pathway annotations for detected metabolites. It is common for less than half of the identified metabolites in these datasets to have a known metabolic pathway involvement. Trying to...

  • Article
  • Open Access
7 Citations
3,393 Views
10 Pages

CNTFET-Based Ternary Multiply-and-Accumulate Unit

  • Amr Mohammaden,
  • Mohammed E. Fouda,
  • Ihsen Alouani,
  • Lobna A. Said and
  • Ahmed G. Radwan

Multiply-Accumulate (MAC) is one of the most commonly used operations in modern computing systems due to its use in matrix multiplication, signal processing, and in new applications such as machine learning and deep neural networks. Ternary number sy...

  • Article
  • Open Access
1 Citations
1,743 Views
27 Pages

Polarization-Mode Transformation of the Light Field during Diffraction on Amplitude Binary Gratings

  • Pavel A. Khorin,
  • Mariia P. Mamaeva,
  • Yury V. Kapitonov and
  • Svetlana N. Khonina

6 September 2024

In this paper, a comparative analysis and numerical simulation of operation of two types of amplitude binary gratings (conventional and fork), both in the focal plane and near-field diffraction under illumination by mode beams with different polariza...

  • Article
  • Open Access
3 Citations
1,512 Views
15 Pages

11 May 2024

Security and privacy concerns pose significant obstacles to the widespread adoption of IoT technology. One potential solution to address these concerns is the implementation of cryptographic protocols on resource-constrained IoT edge nodes. However,...

  • Article
  • Open Access
1 Citations
2,238 Views
6 Pages

6 December 2021

I deal with an alienation problem for the system of two fundamental Cauchy functional equations with an unknown function f mapping a ring X into an integral domain Y and preserving binary operations of addition and multiplication, respectively. The r...

  • Article
  • Open Access
11 Citations
3,998 Views
26 Pages

In many types of music, percussion plays an essential role to establish the rhythm and the groove of the music. Algorithms that can decompose the percussive signal into its constituent components would therefore be very useful, as they would enable m...

  • Article
  • Open Access
3 Citations
2,326 Views
17 Pages

A Unified Point Multiplication Architecture of Weierstrass, Edward and Huff Elliptic Curves on FPGA

  • Muhammad Arif,
  • Omar S. Sonbul,
  • Muhammad Rashid,
  • Mohsin Murad and
  • Mohammed H. Sinky

25 March 2023

This article presents an area-aware unified hardware accelerator of Weierstrass, Edward, and Huff curves over GF(2233) for the point multiplication step in elliptic curve cryptography (ECC). The target implementation platform is a field-programmable...

  • Article
  • Open Access
7 Citations
5,219 Views
11 Pages

Image-Based Scratch Detection by Fuzzy Clustering and Morphological Features

  • Zhiying Tan,
  • Yan Ji,
  • Zhongwen Fei,
  • Xiaobin Xu and
  • Baolai Zhao

17 September 2020

Detection of scratch defects on randomly textured surfaces remains challenging due to their unnoticeable visual features. In this paper, an algorithm for piezoelectric ceramic plate surface scratch defects based on the combination of fuzzy c-means cl...

  • Article
  • Open Access
2,033 Views
17 Pages

Usually, optical tweezers for trapping atoms or nanoparticles are based on the focusing of a Gaussian laser beam (GB). The optical trap is characterised by its longitudinal stability (LS), expressed as the ratio of the backward axial gradient and the...

  • Article
  • Open Access
7 Citations
3,541 Views
15 Pages

Efficient Stochastic Computing FIR Filtering Using Sigma-Delta Modulated Signals

  • Nikos Temenos,
  • Anastasis Vlachos and
  • Paul P. Sotiriadis

This work presents a soft-filtering digital signal processing architecture based on sigma-delta modulators and stochastic computing. A sigma-delta modulator converts the input high-resolution signal to a single-bit stream enabling filtering structure...

  • Article
  • Open Access
5 Citations
2,801 Views
14 Pages

AREEBA: An Area Efficient Binary Huff-Curve Architecture

  • Asher Sajid,
  • Muhammad Rashid,
  • Sajjad Shaukat Jamal,
  • Malik Imran,
  • Saud S. Alotaibi and
  • Mohammed H. Sinky

Elliptic curve cryptography is the most widely employed class of asymmetric cryptography algorithm. However, it is exposed to simple power analysis attacks due to the lack of unifiedness over point doubling and addition operations. The unified crypto...

  • Article
  • Open Access
1,804 Views
29 Pages

25 July 2024

Support vector data description (SVDD) is widely regarded as an effective technique for addressing anomaly detection problems. However, its performance can significantly deteriorate when the training data are affected by outliers or mislabeled observ...

  • Article
  • Open Access
7 Citations
3,388 Views
14 Pages

In optical communications, it is desirable to know some quantities describing a light field, which are conserved on propagation or resistant to some distortions. Typically, optical vortex beams are characterized by their orbital angular momentum (OAM...

  • Feature Paper
  • Article
  • Open Access
11 Citations
6,933 Views
21 Pages

Multiple Use SiPM Integrated Circuit (MUSIC) for Large Area and High Performance Sensors

  • Sergio Gómez,
  • David Sánchez,
  • Joan Mauricio,
  • Eduardo Picatoste,
  • Andreu Sanuy,
  • Anand Sanmukh,
  • Marc Ribó and
  • David Gascón

The 8-channel Multiple Use Silicon Photo-multiplier (SiPM) Integrated Circuit (MUSIC) Application specific integrated circuit (ASIC) for SiPM anode readout has been designed for applications where large photo-detection areas are required. MUSIC offer...

  • Article
  • Open Access
2 Citations
3,343 Views
16 Pages

14 September 2021

Image manipulation localization is one of the most challenging tasks because it pays more attention to tampering artifacts than to image content, which suggests that richer features need to be learned. Unlike many existing solutions, we employ a sema...

  • Article
  • Open Access
1 Citations
1,051 Views
19 Pages

30 July 2025

Accurate and efficient cloud detection is critical for maintaining the usability of optical remote sensing imagery, particularly in large-scale Earth observation systems. In this study, we propose FEMNet, a lightweight dual-branch network that combin...

  • Article
  • Open Access
6 Citations
3,047 Views
21 Pages

Multimodal Tucker Decomposition for Gated RBM Inference

  • Mauricio Maldonado-Chan,
  • Andres Mendez-Vazquez and
  • Ramon Osvaldo Guardado-Medina

11 August 2021

Gated networks are networks that contain gating connections in which the output of at least two neurons are multiplied. The basic idea of a gated restricted Boltzmann machine (RBM) model is to use the binary hidden units to learn the conditional dist...

  • Article
  • Open Access
8 Citations
2,411 Views
12 Pages

Approximated Mixed-Integer Convex Model for Phase Balancing in Three-Phase Electric Networks

  • Oscar Danilo Montoya,
  • Luis Fernando Grisales-Noreña and
  • Edwin Rivas-Trujillo

31 August 2021

With this study, we address the optimal phase balancing problem in three-phase networks with asymmetric loads in reference to a mixed-integer quadratic convex (MIQC) model. The objective function considers the minimization of the sum of the square cu...

  • Article
  • Open Access
21 Citations
4,968 Views
23 Pages

Unambiguous Acquisition/Tracking Technique Based on Sub-Correlation Functions for GNSS Sine-BOC Signals

  • Fang Hao,
  • Baoguo Yu,
  • Xingli Gan,
  • Ruicai Jia,
  • Heng Zhang,
  • Lu Huang and
  • Boyuan Wang

15 January 2020

The autocorrelation function (ACF) of the Binary Offset Carrier modulation (BOC) signal for Global Navigation Satellite System (GNSS) has multiple peaks, ambiguity is easily generated during the synchronization of the baseband signal. Some methods ha...

  • Article
  • Open Access
5 Citations
1,820 Views
19 Pages

Multi-Dimensional Low-Rank with Weighted Schatten p-Norm Minimization for Hyperspectral Anomaly Detection

  • Xi’ai Chen,
  • Zhen Wang,
  • Kaidong Wang,
  • Huidi Jia,
  • Zhi Han and
  • Yandong Tang

24 December 2023

Hyperspectral anomaly detection is an important unsupervised binary classification problem that aims to effectively distinguish between background and anomalies in hyperspectral images (HSIs). In recent years, methods based on low-rank tensor represe...

  • Article
  • Open Access
1 Citations
1,470 Views
10 Pages

New High-Speed Arithmetic Circuits Based on Spiking Neural P Systems with Communication on Request Implemented in a Low-Area FPGA

  • José Rangel,
  • Esteban Anides,
  • Eduardo Vázquez,
  • Giovanny Sanchez,
  • Juan-Gerardo Avalos,
  • Gonzalo Duchen and
  • Linda K. Toscano

7 November 2024

During the last years, the demand for internet-of-things (IoT) resource-constrained devices has grown exponentially. To address this need, several digital methods have been proposed to improve these devices in terms of area and power consumption. Des...

  • Article
  • Open Access
2 Citations
1,869 Views
14 Pages

13 September 2024

In recent years, one-bit quantization has attracted widespread attention in the field of direction-of-arrival (DOA) estimation as a low-cost and low-power solution. Many researchers have proposed various estimation algorithms for one-bit DOA estimati...

  • Article
  • Open Access
2 Citations
4,763 Views
12 Pages

Bullying and Cyberbullying Are Associated with Inappropriate Use of the Internet, Cell Phones, and Video Games in Children and Adolescents

  • José Enrique Moral-García,
  • Alba Rusillo-Magdaleno,
  • Fredy Alonso Patiño-Villada and
  • Emilio J. Martínez-López

The aim of the present study was to analyze the association of bullying and cyberbullying with the level of Internet, cell phone, and video game use in children and adolescents. In total, 677 Spanish students (53.03% girls) aged 10 to 16 years (13.81...

  • Article
  • Open Access
820 Views
20 Pages

24 October 2025

This study provides a comprehensive analysis of the confirmation of homestead rights (CHR) in China, filling a gap in the research field of the distribution consequences of China’s homestead policy reform. The main innovation of this study is t...

  • Article
  • Open Access
117 Views
25 Pages

SSKD: Stepwise Self-Knowledge Distillation for Binary Neural Networks in Keyword Spotting

  • Hailong Zou,
  • Jionghao Zhang,
  • Jun Li,
  • Hang Ran,
  • Wulve Yang,
  • Rui Zhou,
  • Zenghui Yu,
  • Yi Zhan and
  • Shushan Qiao

18 February 2026

The hardware power-aware keyword spotting (KWS) implementation requires small memory footprint, low-complex computation, and high accuracy performances. Binary neural networks (BNNs) naturally satisfy these constraints. They quantize both weights and...

  • Article
  • Open Access
1 Citations
2,563 Views
16 Pages

Techno-Pessimistic Shock and the Banning of Mobile Phones in Secondary Schools: The Case of Madrid

  • Joaquín Paredes-Labra,
  • Isabel Solana-Domínguez,
  • Marco Ramos-Ramiro and
  • Ada Freitas-Cortina

18 July 2025

Over a three-year R&D project, the perception of mobile phone use in Spanish secondary schools shifted from initial tolerance to increasingly prohibitive policies. Drawing on the Actor–Network Theory, this study examines how mobile phones&m...

  • Article
  • Open Access
14 Citations
2,978 Views
16 Pages

A Low-Complexity Edward-Curve Point Multiplication Architecture

  • Asher Sajid,
  • Muhammad Rashid,
  • Malik Imran and
  • Atif Raza Jafri

The Binary Edwards Curves (BEC) are becoming more and more important, as compared to other forms of elliptic curves, thanks to their faster operations and resistance against side channel attacks. This work provides a low-complexity architecture for p...

  • Article
  • Open Access
17 Citations
3,761 Views
22 Pages

28 May 2018

The GPS provides positioning information almost anytime and anywhere on Earth, regardless of the weather conditions, and has become an essential technology for positioning and navigation. As a modernization program, the fourth civil GPS signal, denot...

  • Article
  • Open Access
1 Citations
1,911 Views
22 Pages

29 August 2025

Wearable systems are increasingly adopted for health monitoring and wellness promotion. Among the most relevant biosignals, the electrocardiogram (ECG) plays a key role; however, in wearable settings (e.g., during physical activity), it is often corr...

  • Feature Paper
  • Article
  • Open Access
10 Citations
9,259 Views
34 Pages

Recently, the Logic-in-Memory (LiM) concept has been widely studied in the literature. This paradigm represents one of the most efficient ways to solve the limitations of a Von Neumann’s architecture: by placing simple logic circuits inside or...

  • Article
  • Open Access
2 Citations
1,317 Views
18 Pages

An Optimized Flexible Accelerator for Elliptic Curve Point Multiplication over NIST Binary Fields

  • Amer Aljaedi,
  • Muhammad Rashid,
  • Sajjad Shaukat Jamal,
  • Adel R. Alharbi and
  • Mohammed Alotaibi

30 September 2023

This article proposes a flexible hardware accelerator optimized from a throughput and area point of view for the computationally intensive part of elliptic curve cryptography. The target binary fields, defined by the National Institute of Standards a...

  • Article
  • Open Access
5 Citations
3,186 Views
18 Pages

Efficient Binary Weight Convolutional Network Accelerator for Speech Recognition

  • Lunyi Guo,
  • Shining Mu,
  • Yijie Deng,
  • Chaofan Shi,
  • Bo Yan and
  • Zhuoling Xiao

30 January 2023

Speech recognition has progressed tremendously in the area of artificial intelligence (AI). However, the performance of the real-time offline Chinese speech recognition neural network accelerator for edge AI needs to be improved. This paper proposes...

of 2