Ali M. Haidar - IEEE Xplore Author Profile

Showing 1-25 of 38 results

Filter Results

Show

Results

The Multiple-Value Logic (MVL) circuit significantly enhances propagation delay and energy consumption compared to the binary circuit. Additionally, the Carbon Nanotube Field-Effect Transistor (CNTFET) demonstrates enhancements in energy efficiency and circuit speed when compared to other transistor technologies. Therefore, this paper proposes two different designs of Ternary Decoders (TDecoders) ...Show More
This paper presents a novel approach to detect SYN flood Distributed Denial of Service (DDoS) attacks using the ResNet-50 architecture. DDoS attacks, known for their ability to disrupt normal network traffic through overwhelming floods, have evolved in complexity, rendering traditional detection methods inadequate. Our methodology is threefold: data acquisition from both simulated and real-world e...Show More
Algebraic machine learning is a novel parameter-free model that has demonstrated impressive accuracy in challenging tasks such as the MNIST dataset and N-Queens completion. However, its utilization of two semi-lattices can lead to significant computational demands. To tackle this issue, a solution has been proposed that employs a single semi-lattice model, resulting in reduced memory requirements ...Show More
The expansion of the Internet of Things (IoT), Smart Grids (SG), and renewable energy sources has created a greater need for effective cybersecurity measures. These systems need to be protected from all threats in order to maintain continuity and functionality. Smart grids are made up of integrated modules that rely on essential data communication. Each module is exposed to different cybersecurity...Show More
The heavy reliance on Wi-Fi networks has made them susceptible to various threats, especially given that the security protocols employed have some flaws that were exploited by malicious entities. In this paper, we introduce the first constituting block of our comprehensive Wi-Fi Intrusion Detection and Resource Management System. The primary objective of this system is to filter and classify incom...Show More
Decades have passed since the world went crazy about the revolution of the machine. Through the years, pioneers in the field tried to imagine how such progress in artificial intelligence (AI) could influence our lives. Were we going to witness sentient machines among us? What would their capabilities, superpowers, and limitations be? Were there ghosts in the machines? Many of these questions confu...Show More
Electricity or what some call as the miracle of modern technology is considered as a nightmare in Lebanon due to the shortage in supply, high cost and environmental impact. This indignation can be treated by the new trend in power systems integrating hybrid sources, smart meters, reliable grid, fair fees and efficient management. This new development is facing lot of challenges throughout its modu...Show More
As the 21st century continues, Deep Learning (DL) has become an important part in the digital world. The use of Artificial Neural Networks (ANNs), the core of DL, has led to the development of many novel applications, like speech recognition, character recognition, autonomous cars, etc. In this paper, we present a logic-based neural network processor for pattern correction, which can detect anomal...Show More
Fooling neural networks is a main concern in the process of Artificial Intelligence optimization. Character perturbation make part of a text unnoticeable for some systems, even for human observers. This research focuses the probe on a novel input preprocessing technique, which applies with the Convolutional Neural Networks for character recognition applications. Using Hand-written, Font, and Arabi...Show More
This paper presents a new lossy image compression technique using Logic-based Weightless Neural Networks, which underwrite two novel network architectures. The system endorses three processing phases, image optimization, inflation, and skimming. This research demonstrates an untraditional approach of auto-compression network guided by horizontal and vertical pixel intensity wavering trend. The per...Show More
This work proposes models for a L-trit TMUL (Ternary Multiplier) and THA (Half-Adder) using TMUXs (Ternary Multiplexers) and unary operators. The target of the proposed designs is to minimize energy consumption in nanoscale embedded circuits to improve their battery usage. To achieve that, different techniques are used: 32-nm CNTFET tranisistor, Multiple-Valued Logic (MVL), two voltage supplies $(...Show More
The embedded systems, IoT (Internet of Things) devices, and portable electronic devices spread very quickly recently. Most of them depend on batteries to operate. The target of this work is to decrease energy consumption by (1) using Multiple-valued logic (MVL) that shows notable enhancements regarding energy consumption over binary circuits and (2) using carbon nanotube field-effect transistors (...Show More
The limitations in binary data transmission are mainly for low speed and a notable increase in energy consumption. Whereas, Multiple-Valued Logic (MVL) has over two-valued logic to increase the speed and to reduce energy consumption. Therefore, this paper proposes a Ternary-to-Binary Converter based on Carbon Nano-Tube Field Effect Transistors (CNFETs) to be used in ternary data transmission. The ...Show More
Multiple-valued logic (MVL) circuit has many-valued logic in each digit to lower interconnections and energy consumption over a binary logic circuit. Therefore, this paper proposes a ternary multiplier (TMUL) that reduce energy consumption in the context of low-power embedded circuits. The CNTFET-based TMUL circuit use only cascading proposed ternary multiplexer to reduce the transistors count and...Show More
Energy consumption is a critical factor to be reduced when designing embedded systems and IoT devices. By using Multiple-valued logic (MVL) circuits, interconnections complexity and energy consumption are decreased in comparison to binary systems. This paper uses MVL circuits to present a ternary half-adder (THA) with reduced energy consumption to maintain the battery usage in nano-scale embedded ...Show More
The ternary circuit has an advantage over the binary circuit concerning interconnect complexity, propagation delay, and energy consumption. This paper proposes a novel binary-to-ternary converter using Double Pass-Transistor (DPL) with four bits as input and three trits as output. The importance of this work is gained through its potential to increase the data rate, and reduce power consumption. A...Show More
This paper introduces a new architecture of Biomimetic Cells, which is very different in its nucleus from simple cells, and presents a multi combinational grid between inputs, weights and outputs. Designers are free to use hybrid combination of cells to model any required arrangement style. This leads to a massive reduction in complexity. The high degrees of freedom in devising combinations in str...Show More
Recently, the demand for portable electronics and embedded systems has increased. These devices need low-power circuit designs because they depend on batteries as an energy resource. Moreover, multi-valued logic (MVL) circuits provide notable improvements over binary circuits in terms of interconnect complexity, chip area, propagation delay, and energy consumption. Therefore, this paper proposes n...Show More
This paper proposes a novel implementation of Ternary Decoder using CMOS DPL (Double Pass Logic) Binary logic gates, in digital CMOS technology. The physical design of the circuits is simulated and tested with Micro-Cap 10 SPICE simulator. The Proposed Ternary Decoder circuit can be used in VLSI design. The Proposed decoder circuit will be the basic circuit to create other Ternary Logic Circuits l...Show More
Security has always been a privilege for governments and banks, from the old Egyptian civilization to the latest technologies. Nowadays, security has become an essential part in our daily life; from protecting mobile chats to bank accounts to confidential data. It is everywhere due to the huge amount of data stored and transmitted over public and unsecure networks. On the other hand, computers are...Show More
This paper introduces a new imitation of neurons cells, based on the latest discoveries in neuroscience. After reobserving the latest revelations in the field of biological neurons, the conventional artificial models has proven strong potentials in image processing and pattern classification, but remains far from presenting a modern imitation of natural intelligent organisms. A Biomimetic cell des...Show More
The need to deploy wireless sensor networks (WSNs) for real-world applications, such as mobile multimedia for healthcare organizations, is increasing spectacularly. However, the energy problem remains one of the core barriers preventing an increase in investment in this technology. In this paper, we propose a new technique to resolve the problems due to limited energy sources. Using a quaternary t...Show More
In modern electronic systems, signal stability is a crucial issue. Many methods have been developed to mitigate the deviation from an ideal signal. One of them is called Automatic Gain Control, which tracks variation in an input signal to settle output amplitude. This paper proposes a Differential Automatic Gain Controller with offset stability. It is a Proportional Integral Derivative controller ...Show More
This paper presents a new field of artificial neuro-science, providing a group of mathematical relations and functional algorithms used to operate and improve Digital Artificial Neural Network models. It introduces all the main properties and characteristics of the digital artificial neurons by providing a modern platform of design and implementation of these intelligent artificial organisms. The ...Show More
Lifetime of a node is a critical concern in wireless sensor network (WSN). Nowadays networks are becoming large, so data collected is becoming even larger, which all consume great amount of energy leading to an early death of a node. Therefore, researches are done to minimize the energy used in data sampling and collection to prolong the life time of a network. Through years several routing protoc...Show More