Browse Items (4 total)

Hayssam-ieee-tc-oct-2021 - Reza Raeisi-1.jpg
Security protocols such as Transport Layer Security implement the Elliptic curve digital signature algorithm (ECDSA) over different binary extension fields defined by the National Institute of Standards and Technology (NIST). Specifically, such…

Low-density spreading codes for NOMA systems and a Gaussian separability-based design
Improved low-density spreading (LDS) code designs based on the Gaussian separability criterion are conceived. We show that the bit error rate (BER) hinges not only on the minimum distance criterion, but also on the average Gaussian separability…

tayeb2021 - Reza Raeisi-1.jpg
Privacy-preserving data mining (PPDM) is a popular research topic in the data mining field. For individual information protection, it is vital to protect sensitive information during data mining procedures. Furthermore, it is also a serious offense…

WiNN_Laha - Reza Raeisi-1.jpg
Deep Neural Networks (DNNs) have demonstrated promising performance in accuracy for several applications such as image processing, speech recognition, and autonomous systems and vehicles. Spatial accelerators have been proposed to achieve high…
Output Formats

atom, dcmes-xml, json, omeka-xml, rss2