Search Results - "Nedjah, N."
-
1
Dynamic MAC-based architecture of artificial neural networks suitable for hardware implementation on FPGAs
Published in Neurocomputing (Amsterdam) (01-06-2009)“…Artificial neural networks (ANNs) is a well known bio-inspired model that simulates human brain capabilities such as learning and generalization. ANNs consist…”
Get full text
Journal Article -
2
Migration selection of strategies for parallel genetic algorithms: implementation on networks on chips
Published in International journal of electronics (01-10-2010)“…The aim of the work described in this article is to investigate migration strategies for the execution of parallel genetic algorithms in a multi-processor…”
Get full text
Journal Article -
3
Three hardware architectures for the binary modular exponentiation: sequential, parallel, and systolic
Published in IEEE transactions on circuits and systems. I, Regular papers (01-03-2006)“…Modular exponentiation is the cornerstone computation in public-key cryptography systems such as RSA cryptosystems. The operation is time consuming for large…”
Get full text
Journal Article -
4
Power-aware multi-objective evolutionary optimisation for application mapping on network-on-chip platforms
Published in International journal of electronics (01-10-2010)“…Network-on-chip (NoC) is considered the next generation of communication infrastructure, which will be omnipresent in different environments. In the…”
Get full text
Journal Article -
5
Reconfigurable and adaptive computing
Published in International journal of electronics (02-01-2015)Get full text
Journal Article -
6
Efficient yet robust biometric iris matching on smart cards for data high security and privacy
Published in Future generation computer systems (01-11-2017)“…Smart control access to any service and/or critical data is at the very basis of any smart project. Biometrics have been used as a solution for system access…”
Get full text
Journal Article -
7
Three hardware implementations for the binary modular exponentiation: sequential, parallel and systolic
Published in Proceedings. 15th Symposium on Computer Architecture and High Performance Computing (2003)“…Modular exponentiation is the cornerstone computation performed in public-key cryptography systems such as the RSA cryptosystem. The operation is time…”
Get full text
Conference Proceeding -
8
Congestion-aware ant colony based routing algorithms for efficient application execution on Network-on-Chip platform
Published in Expert systems with applications (15-11-2013)“…•Two novel congestion-aware algorithms based on ACO adapted to the routing problem.•An adaptive and static routing.•The proposed algorithms overcome the…”
Get full text
Journal Article -
9
-
10
Stochastic reconfigurable hardware for neural networks
Published in Euromicro Symposium on Digital System Design, 2003. Proceedings (2003)“…In this paper, we propose reconfigurable, low-cost and readily available hardware architecture for an artificial neuron. This is used to build a feed-forward…”
Get full text
Conference Proceeding -
11
Two hardware implementations for the Montgomery modular multiplication: sequential versus parallel
Published in Proceedings. 15th Symposium on Integrated Circuits and Systems Design (2002)“…Modular multiplication is the most dominant part of the computation performed in public-key cryptography systems such as the RSA cryptosystem. The operation is…”
Get full text
Conference Proceeding -
12
Special issue of International Journal of Electronics on evolutionary synthesis of network-on-chip-based systems
Published in International journal of electronics (01-10-2010)Get full text
Journal Article -
13
A reconfigurable recursive and efficient hardware for Karatsuba-Ofman's multiplication algorithm
Published in Proceedings of 2003 IEEE Conference on Control Applications, 2003. CCA 2003 (2003)“…Multiplication of long integers is a cornerstone primitive in most public-key cryptosystems. Multiplication for big numbers can be performed best using…”
Get full text
Conference Proceeding -
14
Massively parallel hardware architecture for genetic algorithms
Published in 8th Euromicro Conference on Digital System Design (DSD'05) (2005)“…In this paper, we propose a massively parallel architecture for hardware implementation of genetic algorithms. This is design is quite innovative as it…”
Get full text
Conference Proceeding -
15
Reconfigurable hardware for addition chains based modular exponentiation
Published in International Conference on Information Technology: Coding and Computing (ITCC'05) - Volume II (2005)“…In several public-key cryptosystems, the main operation consists of the modular exponentiation, which is performed using successive modular multiplications…”
Get full text
Conference Proceeding -
16
Efficient cryptographic hardware using the co-design methodology
Published in International Conference on Information Technology: Coding and Computing, 2004. Proceedings. ITCC 2004 (2004)“…Most cryptography systems are based on the modular exponentiation to perform the nonlinear scrambling operation of data. It is performed using successive…”
Get full text
Conference Proceeding -
17
FPGA-based hardware architecture for neural networks: binary radix vs. stochastic
Published in 16th Symposium on Integrated Circuits and Systems Design, 2003. SBCCI 2003. Proceedings (2003)“…This paper is focused on the hardware implementation of neural networks. It describes the characteristics of two architectures designed to implement…”
Get full text
Conference Proceeding -
18
Evolutionary time scheduling
Published in International Conference on Information Technology: Coding and Computing, 2004. Proceedings. ITCC 2004 (2004)“…Genetic algorithms are generally used to solve NP-complete problems, which include scheduling problem in academic institutions. Scheduling consists of…”
Get full text
Conference Proceeding -
19
Pareto-optimal hardware for substitution boxes
Published in International Conference on Information Technology: Coding and Computing (ITCC'05) - Volume II (2005)“…In this paper, we propose a methodology based on genetic programming to automatically generate hardware designs of substitution boxes necessary for many…”
Get full text
Conference Proceeding -
20
Multi-objective evolutionary hardware for RSA-based cryptosystems
Published in International Conference on Information Technology: Coding and Computing, 2004. Proceedings. ITCC 2004 (2004)“…We propose a methodology based on genetic programming to automatically generate data-flow based specifications for hardware designs of public-key cryptosystems…”
Get full text
Conference Proceeding