350 results on '"Machhout, Mohsen"'
Search Results
2. Perspective Chapter: Lightweight Ciphers for IoT Data Protection
3. A novel holographic technique for RFID localization in indoor environments
4. An improvement of both security and reliability for elliptic curve scalar multiplication Montgomery algorithm
5. Real-time arrhythmia heart disease detection system using CNN architecture based various optimizers-networks
6. Design of elliptical photonic crystal fiber (E-PCF) for the transmission of 116 OAM channels across the S, C, L and U bands
7. Tele-Holography: a new concept for lossless compression and transmission of inline digital holograms
8. Automatic Noise Reduction in Ultrasonic Computed Tomography Image for Adult Bone Fracture Detection
9. Performance Evaluation of Mobile RPL-Based IoT Networks under Hello Flood Attack
10. Hardware Implementation of an Improved Hybrid Cryptosystem for Numerical Image Encryption and Authenticity
11. An improvement of both security and reliability for AES implementations
12. Deep learning based neural network application for automatic ultrasonic computed tomographic bone image segmentation
13. Multiplexing, Transmission and De-Multiplexing of OAM Modes through Specialty Fibers
14. Elucidating the electrical performance and thermal stability in14-nm FinFETs CMOS technology
15. Deep convolutional neural networks-based Hardware–Software on-chip system for computer vision application
16. Summary of Topological Study of Chaotic CBC Mode of Operation
17. Lyapunov Exponent Evaluation of the CBC Mode of Operation
18. Real-time application based CNN architecture for automatic USCT bone image segmentation
19. Real-time video security system using chaos- improved advanced encryption standard (IAES)
20. An ASCON AOP-SystemC Environment for Security Fault Analysis
21. Automatic USCT Image Processing Segmentation for Osteoporosis Detection
22. Deep Learning-Based Approach for Atrial Fibrillation Detection
23. Proving chaotic behaviour of CBC mode of operation
24. The dynamics of the CBC Mode of Operation
25. Quantitative Evaluation of Chaotic CBC Mode of Operation
26. Design of novel circular lattice photonic crystal fiber suitable for transporting 48 OAM modes
27. OAM Modes in Optical Fibers for Next Generation Space Division Multiplexing (SDM) Systems
28. Image encryption method based on improved ECC and modified AES algorithm
29. Deep Learning Based Recurrent Neural Network Model for Stress Detection in EEG Signals.
30. Inverse-raised-cosine fibers for next-generation orbital angular momentum systems
31. FPGA Implementation of a CNN Application for ECG Class Detection
32. A novel enhanced chaos based present lightweight cipher scheme
33. Hybrid Encryption Model Based on Advanced Encryption Standard and Elliptic Curve Pseudo Random
34. Optimized CAD System for Breast Cancer Detection with Tabu Search and RNN
35. The Impact of Network Topologies and Radio Duty Cycle Mechanisms on the RPL Routing Protocol Power Consumption.
36. A lightweight and robust block cipher algorithm for real-time applications
37. Performance Evaluation and Parameter Analysis of a Microwave Sensor for Liquid Characterization
38. Simulation-Based Analysis of L-Shaped RFID Tags for Enhanced Performance
39. 1800 MHz and 2.45 GHz Antennas for RF Energy Harvesting Applications
40. A Selective Video Encryption Scheme Based on a Block Cipher Algorithm and a Chaos Generator
41. A novel holographic technique for RFID localization in indoor environments
42. High-Performance Elliptic Curve Cryptography by Using the CIOS Method for Modular Multiplication
43. High speed and efficient area optimal ate pairing processor implementation over BN and BLS12 curves on FPGA
44. Trenched raised cosine FMF for differential mode delay management in next generation optical networks
45. A novel chaotic image cryptosystem based on DNA sequence operations and single neuron model
46. A Scalable and Systolic Architectures of Montgomery Modular Multiplication for Public Key Cryptosystems Based on DSPs
47. RPL-Based IoT Networks under Decreased Rank Attack: Performance Analysis in Static and Mobile Environments.
48. Automatic USCT Image Processing Segmentation for Osteoporosis Detection
49. Security Enhancements of a Mutual Authentication Protocol Used in a HF Full-Fledged RFID Tag
50. Security Analysis of Medical Image Encryption using AES Modes for IoMT Systems
Catalog
Books, media, physical & digital resources
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.