Zobrazeno 1 - 10
of 348
pro vyhledávání: '"A. A El-Moursy"'
Autor:
Darya, Abdollah Masoud, Majzoub, Sohaib, El-Moursy, Ali A., Eladham, Mohamed Wed, Javeed, Khalid, Elwakil, Ahmed S.
This letter proposes using intermittent chaotic clocks, generated from chaotic maps, to drive cryptographic chips running the Advanced Encryption Standard as a countermeasure against Correlation Power Analysis attacks. Five different chaotic maps --
Externí odkaz:
http://arxiv.org/abs/2410.12281
Publikováno v:
IEEE Access, Vol 12, Pp 147552-147563 (2024)
Elliptic curve cryptography (ECC) is largely deployed public key cryptographic algorithms in the design of key exchange, digital signature, and secure multiparty computation protocols. A compact and high-performance implementation of ECC is essential
Externí odkaz:
https://doaj.org/article/4ef2780c3abb4f8080a5a397044e12b8
Publikováno v:
IEEE Access, Vol 12, Pp 83858-83875 (2024)
To better design AI processors, it is critical to characterize artificial intelligence (AI) workloads and contrast them to normal personal computer (PC) workloads. In this work, we profiled the AIBench and PassMark PerformanceTest benchmarks with the
Externí odkaz:
https://doaj.org/article/bfc1184721d548119afa5f0dd1833036
Autor:
Somaya A. Aboulrous, Amany Abdelsamea, Ali A. El-Moursy, Mohamed Saad, Fadi N. Sibai, Salwa M. Nassar, Hazem Abbas
Publikováno v:
IEEE Access, Vol 12, Pp 16696-16714 (2024)
The main goals of fifth generation (5G) systems are to significantly increase the network capacity and to support new 5G service requirements. Ultra network densification with small cells is among the key pillars for 5G evolution. The inter-small-cel
Externí odkaz:
https://doaj.org/article/9bcf852e70e74ff586f32e63d4ff193b
Autor:
Zaki, Pavly Salah, William, Marco Magdy, Soliman, Bolis Karam, Alexsan, Kerolos Gamal, Khalil, Keroles, El-Moursy, Magdy
With the rapid development of technology, automobiles have become an essential asset in our day-to-day lives. One of the more important researches is Traffic Signs Recognition (TSR) systems. This paper describes an approach for efficiently detecting
Externí odkaz:
http://arxiv.org/abs/2003.03256
Publikováno v:
In Pervasive and Mobile Computing August 2023 94
Publikováno v:
IEEE Access, Vol 11, Pp 56649-56662 (2023)
Elliptic Curve Cryptography (ECC) based security protocols require much shorter key space which makes ECC the most suitable option for resource-limited devices as compared to the other public key cryptography (PKC) schemes. This paper presents a high
Externí odkaz:
https://doaj.org/article/ee06ac50f3c5483a8777287642d97b38
Autor:
Javeed, Khalid1 (AUTHOR) kjaveed@sharjah.ac.ae, El-Moursy, Ali1 (AUTHOR), Gregg, David2 (AUTHOR)
Publikováno v:
Journal of Supercomputing. Jan2024, Vol. 80 Issue 1, p50-74. 25p.
Publikováno v:
IEEE Access, Vol 10, Pp 95571-95584 (2022)
A convolutional neural network (CNN) classifies images with high accuracy. However, CNN operation requires a large number of computations which consume a significant amount of power when implemented on hardware. Precision scaling has been recently us
Externí odkaz:
https://doaj.org/article/66a47373aba7492b82ec9e0a7e816710
Publikováno v:
IEEE Access, Vol 10, Pp 50265-50277 (2022)
Recognition of the modulation scheme is the intermediate step between signal detection and demodulation of the received signal in communication networks. Automatic modulation recognition (AMR) plays a central role in many applications, especially in
Externí odkaz:
https://doaj.org/article/bb93edfa8f5647deacf8c3785f3e7a1f