Search Results - "Nedjah, N."

Refine Results
  1. 1

    Dynamic MAC-based architecture of artificial neural networks suitable for hardware implementation on FPGAs by Nedjah, N., da Silva, R.M., Mourelle, L.M., da Silva, M.V.C.

    Published in Neurocomputing (Amsterdam) (01-06-2009)
    “…Artificial neural networks (ANNs) is a well known bio-inspired model that simulates human brain capabilities such as learning and generalization. ANNs consist…”
    Get full text
    Journal Article
  2. 2

    Migration selection of strategies for parallel genetic algorithms: implementation on networks on chips by Mourelle, L., Ferreira, R. E., Nedjah, N.

    Published in International journal of electronics (01-10-2010)
    “…The aim of the work described in this article is to investigate migration strategies for the execution of parallel genetic algorithms in a multi-processor…”
    Get full text
    Journal Article
  3. 3

    Three hardware architectures for the binary modular exponentiation: sequential, parallel, and systolic by Nedjah, N., Mourelle, Ld.M.

    “…Modular exponentiation is the cornerstone computation in public-key cryptography systems such as RSA cryptosystems. The operation is time consuming for large…”
    Get full text
    Journal Article
  4. 4

    Power-aware multi-objective evolutionary optimisation for application mapping on network-on-chip platforms by da Silva, M. V.C., Nedjah, N., Mourelle, L. M.

    Published in International journal of electronics (01-10-2010)
    “…Network-on-chip (NoC) is considered the next generation of communication infrastructure, which will be omnipresent in different environments. In the…”
    Get full text
    Journal Article
  5. 5
  6. 6

    Efficient yet robust biometric iris matching on smart cards for data high security and privacy by Nedjah, N., Wyant, R.S., Mourelle, L.M., Gupta, B.B.

    Published in Future generation computer systems (01-11-2017)
    “…Smart control access to any service and/or critical data is at the very basis of any smart project. Biometrics have been used as a solution for system access…”
    Get full text
    Journal Article
  7. 7

    Three hardware implementations for the binary modular exponentiation: sequential, parallel and systolic by Nedjah, N., de Macedo Mourelle, L.

    “…Modular exponentiation is the cornerstone computation performed in public-key cryptography systems such as the RSA cryptosystem. The operation is time…”
    Get full text
    Conference Proceeding
  8. 8

    Congestion-aware ant colony based routing algorithms for efficient application execution on Network-on-Chip platform by Nedjah, Nadia, Silva Junior, Luneque, de Macedo Mourelle, Luiza

    Published in Expert systems with applications (15-11-2013)
    “…•Two novel congestion-aware algorithms based on ACO adapted to the routing problem.•An adaptive and static routing.•The proposed algorithms overcome the…”
    Get full text
    Journal Article
  9. 9
  10. 10

    Stochastic reconfigurable hardware for neural networks by Nedjah, N., de Macedo Mourelle, L.

    “…In this paper, we propose reconfigurable, low-cost and readily available hardware architecture for an artificial neuron. This is used to build a feed-forward…”
    Get full text
    Conference Proceeding
  11. 11

    Two hardware implementations for the Montgomery modular multiplication: sequential versus parallel by Nedjah, N., de Macedo Mourelle, L.

    “…Modular multiplication is the most dominant part of the computation performed in public-key cryptography systems such as the RSA cryptosystem. The operation is…”
    Get full text
    Conference Proceeding
  12. 12
  13. 13

    A reconfigurable recursive and efficient hardware for Karatsuba-Ofman's multiplication algorithm by Nedjah, N., de Macedo Mourelle, L.

    “…Multiplication of long integers is a cornerstone primitive in most public-key cryptosystems. Multiplication for big numbers can be performed best using…”
    Get full text
    Conference Proceeding
  14. 14

    Massively parallel hardware architecture for genetic algorithms by Nedjah, N., de Macedo Mourelle, L.

    “…In this paper, we propose a massively parallel architecture for hardware implementation of genetic algorithms. This is design is quite innovative as it…”
    Get full text
    Conference Proceeding
  15. 15

    Reconfigurable hardware for addition chains based modular exponentiation by de Macedo Mourelle, L., Nedjah, N.

    “…In several public-key cryptosystems, the main operation consists of the modular exponentiation, which is performed using successive modular multiplications…”
    Get full text
    Conference Proceeding
  16. 16

    Efficient cryptographic hardware using the co-design methodology by de Macedo Mourelle, L., Nedjah, N.

    “…Most cryptography systems are based on the modular exponentiation to perform the nonlinear scrambling operation of data. It is performed using successive…”
    Get full text
    Conference Proceeding
  17. 17

    FPGA-based hardware architecture for neural networks: binary radix vs. stochastic by Nedjah, N., Mourelle, Lde.M.

    “…This paper is focused on the hardware implementation of neural networks. It describes the characteristics of two architectures designed to implement…”
    Get full text
    Conference Proceeding
  18. 18

    Evolutionary time scheduling by Nedjah, N., de Macedo Mourelle, L.

    “…Genetic algorithms are generally used to solve NP-complete problems, which include scheduling problem in academic institutions. Scheduling consists of…”
    Get full text
    Conference Proceeding
  19. 19

    Pareto-optimal hardware for substitution boxes by Nedjah, N., de Macedo Mourelle, L.

    “…In this paper, we propose a methodology based on genetic programming to automatically generate hardware designs of substitution boxes necessary for many…”
    Get full text
    Conference Proceeding
  20. 20

    Multi-objective evolutionary hardware for RSA-based cryptosystems by Nedjah, N., de Macedo Mourelle, L.

    “…We propose a methodology based on genetic programming to automatically generate data-flow based specifications for hardware designs of public-key cryptosystems…”
    Get full text
    Conference Proceeding