Security protocols such as Transport Layer Security implement the Elliptic curve digital signature algorithm (ECDSA) over different binary extension fields defined by the National Institute of Standards and Technology (NIST). Specifically, such…
Improved low-density spreading (LDS) code designs based on the Gaussian separability criterion are conceived. We show that the bit error rate (BER) hinges not only on the minimum distance criterion, but also on the average Gaussian separability…
Privacy-preserving data mining (PPDM) is a popular research topic in the data mining field. For individual information protection, it is vital to protect sensitive information during data mining procedures. Furthermore, it is also a serious offense…
Deep Neural Networks (DNNs) have demonstrated promising performance in accuracy for several applications such as image processing, speech recognition, and autonomous systems and vehicles. Spatial accelerators have been proposed to achieve high…
In this paper, we study American sign language (ASL) hand gesture recognition using Doppler radar. A set of ASL hand gesture motions are captured as micro- Doppler signals using a microwave X-band Doppler radar transceiver. We apply joint…
In this letter, we investigate the sequence estimation problem of faster-than-Nyquist (FTN) signaling as a promising approach for increasing spectral efficiency (SE) in future communication systems. In doing so, we exploit the concept of Gaussian…
The Internet of Vehicles (IoV) is an emerging research framework, with network and graph theories as two of the major fields. Researchers in these topics use a variety of tools and approaches to simulate and perform experimentation on their proposed…
The Gaussian normal bases (GNBs) recommended by the National Institute of Standards and Technology (NIST) for the five binary extension fields of the Elliptic Curve Digital Signature Algorithm (ECDSA), are self-dual. Multiplication, is a complex, and…