Mohsen Machhout
YOU?
Author Swipe
View article: Charge Trapping Effects on n−MOSFET Current Mirrors Under TID Radiation
Charge Trapping Effects on n−MOSFET Current Mirrors Under TID Radiation Open
This study aims to evaluate the effects of total ionizing dose (TID) radiation on the performance of n−MOSFET current mirrors. We propose an ovel experimental approach to analyze the interaction between charge trapping in the MOSFET gate o…
View article: Reliability of LEON3 Processor’s Program Counter Against SEU, MBU, and SET Fault Injection
Reliability of LEON3 Processor’s Program Counter Against SEU, MBU, and SET Fault Injection Open
This paper presents a comprehensive register transfer-level (RTL) fault injection study targeting the program counter (PC) of the LEON3 processor, a SPARC V8-compliant core widely used in safety-critical and radiation-prone embedded applic…
View article: High-precision indoor localization in multi-level buildings
High-precision indoor localization in multi-level buildings Open
Accurate localization in multi-floor indoor environments is essential for applications such as large-scale inventory management, healthcare, and security systems. However, achieving high-precision tracking with passive Radio Frequency Iden…
View article: A data-driven machine learning framework for Alzheimer's disease diagnosis and staging using DRKPCA-ELM on MRI scans
A data-driven machine learning framework for Alzheimer's disease diagnosis and staging using DRKPCA-ELM on MRI scans Open
View article: Deep learning-based CAD system for Alzheimer’s diagnosis using deep downsized KPLS
Deep learning-based CAD system for Alzheimer’s diagnosis using deep downsized KPLS Open
View article: CNN Model-Based Denseblock Vs. BiLSTM Recurrent Network Model for Arrhythmia Class Detection
CNN Model-Based Denseblock Vs. BiLSTM Recurrent Network Model for Arrhythmia Class Detection Open
Artificial intelligence is spreading worldwide, achieving huge success in medical image and signal analysis, coming with various deep learning algorithms. In this light, this work proposed two deep algorithm models for electroencephalogram…
View article: Effects of Gamma Radiations on the I-V Electrical Parameters of a n-MOSFET
Effects of Gamma Radiations on the I-V Electrical Parameters of a n-MOSFET Open
Hostile environments usually contain different types of ionizing radiations. In Si-based MOSFETs, radiation-induced defects can lead to drastical degradations in the relevant current-voltage characteristics. At the micro-scale, the capacit…
View article: Design and hardware implementation of LED block cipher for vehicles keyless entry systems
Design and hardware implementation of LED block cipher for vehicles keyless entry systems Open
Security is paramount in vehicle keyless entry systems, as they are increasingly targeted by various attacks, including relay attacks, theft, and espionage. Keyless entry systems are particularly vulnerable to relay attacks, where attacker…
View article: Combined Effects of TID Radiation and Electrical Stress on n-MOSFET Current Mirrors
Combined Effects of TID Radiation and Electrical Stress on n-MOSFET Current Mirrors Open
The aim of this study is to present the combined effects of total ionizing dose (TID) radiation and electrical stress on the performance of n-MOSFET current mirrors. We propose a novel approach to analyze the complex interaction between th…
View article: FPGA Hardware Acceleration of AI Models for Real-Time Breast Cancer Classification
FPGA Hardware Acceleration of AI Models for Real-Time Breast Cancer Classification Open
Breast cancer detection is a critical task in healthcare, requiring fast, accurate, and efficient diagnostic tools. However, the high computational demands and latency of deep learning models in medical imaging present significant challeng…
View article: Enhancing IoT Security for Sustainable Development: A Parity Checking Approach for Fault Detection in PRESENT Block Cipher
Enhancing IoT Security for Sustainable Development: A Parity Checking Approach for Fault Detection in PRESENT Block Cipher Open
The PRESENT lightweight block cipher designed for resource-constrained environments exhibits vulnerabilities to fault injection attacks. By deliberately introducing errors during the computation, attackers can potentially recover secret ke…
View article: Innovative Fault Detection for AES in Embedded Systems: Advancing Resilient and Sustainable Digital Security
Innovative Fault Detection for AES in Embedded Systems: Advancing Resilient and Sustainable Digital Security Open
The AES algorithm is commonly used in embedded systems for security purposes, but its robustness can be compromised by natural and malicious faults, leading to potential information leakage. Various fault detection schemes have been propos…
View article: A Quality of Service Analysis of FPGA-Accelerated Conv2D Architectures for Brain Tumor Multi-Classification
A Quality of Service Analysis of FPGA-Accelerated Conv2D Architectures for Brain Tumor Multi-Classification Open
View article: In-depth study of lightweight block ciphers: Performance assessment and implementation on sensor motes
In-depth study of lightweight block ciphers: Performance assessment and implementation on sensor motes Open
In the rapidly evolving landscape of the Internet of Things (IoT) and Wireless Sensor Networks (WSN), the need for secure and efficient data transmission is paramount. Block ciphers, which are fundamental cryptographic algorithms used for …
View article: Α PRESENT Lightweight Algorithm High-Level SystemC Modeling using AOP Approach
Α PRESENT Lightweight Algorithm High-Level SystemC Modeling using AOP Approach Open
The increasing complexity of the PRESENT algorithm necessitates a fast modeling and simulation security environment, which is achieved using the SystemC language at the Electronic System Level (ESL), enhancing the speed of cryptographic mo…
View article: Enhanced lightweight encryption algorithm based on chaotic systems
Enhanced lightweight encryption algorithm based on chaotic systems Open
In order to improve security and efficiency, this study presents a novel lightweight encryption technique that makes use of chaotic systems. Our method creatively combines the new chaotic KLEIN_64 algorithm with the Keccak-256 hash functio…
View article: Deep Learning Based Recurrent Neural Network Model for Stress Detection in EEG Signals
Deep Learning Based Recurrent Neural Network Model for Stress Detection in EEG Signals Open
Automatic ElectroEncephalogram EEG classification for Stress detection represents a crucial interest, simultaneously with the increasing deaths caused by depression and psychological effects.Accurate automatic classification of EEG signals…
View article: Performance Evaluation of Mobile RPL-Based IoT Networks under Hello Flood Attack
Performance Evaluation of Mobile RPL-Based IoT Networks under Hello Flood Attack Open
The RPL protocol is essential for efficient communication within the Internet of Things (IoT) ecosystem, yet it remains vulnerable to various attacks, particularly in dense and mobile environments where it shows certain limitations and sus…
View article: An ASCON AOP-SystemC Environment for Security Fault Analysis
An ASCON AOP-SystemC Environment for Security Fault Analysis Open
Cryptographic devices’ complexity necessitates fast security simulation environments against fault attacks. SystemC, a promising candidate in Electronic System Levels (ESLs), can achieve higher simulation speeds while maintaining accuracy …
View article: FPGA Implementation of a CNN Application for ECG Class Detection
FPGA Implementation of a CNN Application for ECG Class Detection Open
International audience
View article: Perspective Chapter: Lightweight Ciphers for IoT Data Protection
Perspective Chapter: Lightweight Ciphers for IoT Data Protection Open
The book chapter highlights the importance of securing online identities using lightweight encryption in the Internet of Things (IoT). It explores how lightweight ciphers can enhance the security of digital personas by safeguarding user in…
View article: RPL-Based IoT Networks under Decreased Rank Attack: Performance Analysis in Static and Mobile Environments
RPL-Based IoT Networks under Decreased Rank Attack: Performance Analysis in Static and Mobile Environments Open
The RPL (IPv6 Routing Protocol for Low-Power and Lossy Networks) protocol is essential for efficient communication within the Internet of Things (IoT) ecosystem.Despite its significance, RPL's susceptibility to attacks remains a concern.Th…
View article: The Impact of Network Topologies and Radio Duty Cycle Mechanisms on the RPL Routing Protocol Power Consumption
The Impact of Network Topologies and Radio Duty Cycle Mechanisms on the RPL Routing Protocol Power Consumption Open
The Internet of Things (IoT) has witnessed a significant surge in adoption, particularly through the utilization of Wireless Sensor Networks (WSNs), which comprise small internet-connected devices.These deployments span various environment…
View article: A novel enhanced chaos based present lightweight cipher scheme
A novel enhanced chaos based present lightweight cipher scheme Open
Lightweight ciphers have been developed to meet the rising need for secure communication in environments with limited resources. These ciphers provide robust encryption while ensuring efficient computation. Our paper introduces a new enhan…
View article: Security Analysis of Medical Image Encryption using AES Modes for IoMT Systems
Security Analysis of Medical Image Encryption using AES Modes for IoMT Systems Open
The Internet of Medical Things (IoMT) driven health is the most advantageous aspect of technology in the global healthcare industry.Securing medical images in IoMT systems is a great challenge to protecting medical privacy.Many cryptograph…
View article: Design of elliptical photonic crystal fiber (E-PCF) for the transmission of 116 OAM channels across the S, C, L and U bands
Design of elliptical photonic crystal fiber (E-PCF) for the transmission of 116 OAM channels across the S, C, L and U bands Open
Orbital angular momentum (OAM) modes over photonic crystal fibers (PCFs) have shown great capability in unleashing the available data rates in optical communication systems. In this paper, we propose and numerically design a novel elliptic…
View article: Design, Hardware Implementation on FPGA and Performance Analysis of Three Chaos-Based Stream Ciphers
Design, Hardware Implementation on FPGA and Performance Analysis of Three Chaos-Based Stream Ciphers Open
In this paper, we come up with three secure chaos-based stream ciphers, implemented on an FPGA board, for data confidentiality and integrity. To do so, first, we performed the statistical security and hardware metrics of certain discrete c…
View article: A Secure Chaos-Based Lightweight Cryptosystem for the Internet of Things
A Secure Chaos-Based Lightweight Cryptosystem for the Internet of Things Open
This paper introduces a novel approach to addressing the security challenges of the Internet of Things (IoT) by presenting a secure Chaos-based lightweight cryptosystem. The proposed design incorporates a Pseudo-Chaotic Numbers Generator c…
View article: Secure Convolutional Neural Network-Based Internet-of-Healthcare Applications
Secure Convolutional Neural Network-Based Internet-of-Healthcare Applications Open
Convolutional neural networks (CNNs) have gained popularity for Internet-of-Healthcare (IoH) applications such as medical diagnostics. However, new research shows that adversarial attacks with slight imperceptible changes can undermine dee…
View article: Automatic Noise Reduction in Ultrasonic Computed Tomography Image for Adult Bone Fracture Detection
Automatic Noise Reduction in Ultrasonic Computed Tomography Image for Adult Bone Fracture Detection Open
Noise reduction in medical image analysis is still an interesting hot topic, especially in the field of ultrasonic images. Actually, a big concern has been given to automatically reducing noise in human-bone ultrasonic computed tomography …