default search action
Mohammed Benaissa
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2023
- [j32]Hoda Nemat, Heydar Khadem, Jackie Elliott, Mohammed Benaissa:
Causality analysis in type 1 diabetes mellitus with application to blood glucose level prediction. Comput. Biol. Medicine 153: 106535 (2023) - 2022
- [j31]Heydar Khadem, Hoda Nemat, Mohammad R. Eissa, Jackie Elliott, Mohammed Benaissa:
COVID-19 mortality risk assessments for individuals with and without diabetes mellitus: Machine learning models integrated with interpretation framework. Comput. Biol. Medicine 144: 105361 (2022) - [j30]Heydar Khadem, Hoda Nemat, Jackie Elliott, Mohammed Benaissa:
Interpretable Machine Learning for Inpatient COVID-19 Mortality Risk Assessments: Diabetes Mellitus Exclusive Interplay. Sensors 22(22): 8757 (2022) - [j29]Hoda Nemat, Heydar Khadem, Mohammad R. Eissa, Jackie Elliott, Mohammed Benaissa:
Blood Glucose Level Prediction: Advanced Deep-Ensemble Learning Approach. IEEE J. Biomed. Health Informatics 26(6): 2758-2769 (2022) - 2020
- [j28]Aleksandr Zaitcev, Mohammad R. Eissa, Zheng Hui, Tim Good, Jackie Elliott, Mohammed Benaissa:
A Deep Neural Network Application for Improved Prediction of $\text{HbA}_{\text{1c}}$ in Type 1 Diabetes. IEEE J. Biomed. Health Informatics 24(10): 2932-2941 (2020) - [j27]Mohammad R. Eissa, Tim Good, Jackie Elliott, Mohammed Benaissa:
Intelligent Data-Driven Model for Diabetes Diurnal Patterns Analysis. IEEE J. Biomed. Health Informatics 24(10): 2984-2992 (2020) - [c51]Hoda Nemat, Heydar Khadem, Jackie Elliott, Mohammed Benaissa:
Data Fusion of Activity and CGM for Predicting Blood Glucose Levels. KDH@ECAI 2020: 120-124 - [c50]Heydar Khadem, Hoda Nemat, Jackie Elliott, Mohammed Benaissa:
Multi-lag Stacking for Blood Glucose Level Prediction. KDH@ECAI 2020: 146-150 - [c49]Krishna Chaitanya Patchava, Mohammed Benaissa, Shuzhi Sam Ge:
Hilbert Huang Transformation with filtering as a pre-treatment method for the quantitative study of glucose in near infrared spectra. EMBC 2020: 9-12
2010 – 2019
- 2019
- [j26]Ahmed Al-Baidhani, Mikko Vehkaperä, Mohammed Benaissa:
Simultaneous Wireless Information and Power Transfer Based on Generalized Triangular Decomposition. IEEE Trans. Green Commun. Netw. 3(3): 751-764 (2019) - 2018
- [j25]Sarmad Al-gawwam, Mohammed Benaissa:
Robust Eye Blink Detection Based on Eye Landmarks and Savitzky-Golay Filtering. Inf. 9(4): 93 (2018) - [c48]Ahmed Al-Baidhani, Mohammed Benaissa, Mikko Vehkaperä:
Wireless Information and Power Transfer Based on Generalized Triangular Decomposition. GLOBECOM 2018: 1-7 - [c47]Shakirah Hashim, Mohammed Benaissa:
Accelerating Integer Based Fully Homomorphic Encryption Using Frequency Domain Multiplication. ICICS 2018: 161-176 - [c46]Krishna Chaitanya Patchava, Mohammed Benaissa, Hatim Behairy, Saleh AlShebeili:
Improved Support Vector Regression Coupled with Fourier Self-Deconvolution in the Quantitative Analysis of Glucose in NIR Spectra. IISA 2018: 1-6 - [c45]Sarmad Al-gawwam, Mohammed Benaissa:
Depression Detection From Eye Blink Features. ISSPIT 2018: 388-392 - [c44]Ahmed Al-Baidhani, Mohammed Benaissa, Mikko Vehkaperä:
Transceiver Design for Data Rate Maximization of MIMO SWIPT System Based on Generalized Triangular Decomposition. WCSP 2018: 1-5 - 2017
- [j24]Zia Uddin Ahamed Khan, Mohammed Benaissa:
High-Speed and Low-Latency ECC Processor Implementation Over GF(2m) on FPGA. IEEE Trans. Very Large Scale Integr. Syst. 25(1): 165-176 (2017) - [c43]Osamah Abdulhameed Alrezj, Krishna Chaitanya Patchava, Mohammed Benaissa, Saleh AlShebeili:
Coupling Scatter Correction with bandpass filtering for preprocessing in the quantitative analysis of glucose from near infrared spectra. EMBC 2017: 1800-1803 - [c42]Sarmad Al-gawwam, Mohammed Benaissa:
Eye Blink Detection Using Facial Features Tracker. ICBRA 2017: 27-30 - [c41]Sabah Al-Hameed, Mohammed Benaissa, Heidi Christensen:
Detecting and Predicting Alzheimer's Disease Severity in Longitudinal Acoustic Data. ICBRA 2017: 57-61 - 2016
- [c40]Krishna Chaitanya Patchava, Osamah Alrezj, Mohammed Benaissa, Hatim Behairy:
Savitzky-golay coupled with digital bandpass filtering as a pre-processing technique in the quantitative analysis of glucose from near infrared spectra. EMBC 2016: 6210-6213 - [c39]M. S. Albahri, Mohammed Benaissa, Zia Uddin Ahamed Khan:
Parallel Implementation of ECC Point Multiplication on a Homogeneous Multi-Core Microcontroller. MSN 2016: 386-389 - 2015
- [j23]Zia Uddin Ahamed Khan, Mohammed Benaissa:
Throughput/Area-efficient ECC Processor Using Montgomery Point Multiplication on FPGA. IEEE Trans. Circuits Syst. II Express Briefs 62-II(11): 1078-1082 (2015) - [c38]Krishna Chaitanya Patchava, Mohammed Benaissa, Hatim Behairy:
Improving the prediction performance of PLSR using RReliefF and FSD for the quantitative analysis of glucose in Near Infrared spectra. EMBC 2015: 2379-2382 - [c37]Zia Uddin Ahamed Khan, Mohammed Benaissa:
High speed ECC implementation on FPGA over GF(2m). FPL 2015: 1-6 - [c36]M. S. Albahri, Mohammed Benaissa:
Parallel comba multiplication in GF(2163) using homogenous multicore microcontroller. ICECS 2015: 641-644 - 2013
- [j22]Junfeng Chu, Mohammed Benaissa:
Error detecting AES using polynomial residue number systems. Microprocess. Microsystems 37(2): 228-234 (2013) - [j21]Tim Good, Mohammed Benaissa:
A holistic approach examining RFID design for security and privacy. J. Supercomput. 64(3): 664-684 (2013) - [c35]Zia Uddin Ahamed Khan, Mohammed Benaissa:
Low area ECC implementation on FPGA. ICECS 2013: 581-584 - 2012
- [c34]Mohammed Benaissa, Bilal Malik, Anastasios Kanakis, Neil P. Wright:
Tele-healthcare for diabetes management: A low cost automatic approach. EMBC 2012: 1290-1293 - [c33]Bilal Malik, Mohammed Benaissa:
Determination of glucose concentration from near-infrared spectra using locally weighted partial least square regression. EMBC 2012: 6169-6171 - [c32]Junfeng Chu, Mohammed Benaissa:
Low area memory-free FPGA implementation of the AES algorithm. FPL 2012: 623-626 - [c31]Anastasios Kanakis, Bilal Malik, Mohammed Benaissa:
Low Cost Universal Remote Patient Monitoring System. HPCC-ICESS 2012: 1587-1591 - 2011
- [c30]Junfeng Chu, Mohammed Benaissa:
A Novel Architecture of Implementing Error Detecting AES Using PRNS. DSD 2011: 667-673 - 2010
- [j20]Omar Nibouche, Said Boussakta, Michael Darnell, Mohammed Benaissa:
Algorithms and pipeline architectures for 2-D FFT and FFT-like transforms. Digit. Signal Process. 20(4): 1072-1086 (2010) - [j19]Tim Good, Mohammed Benaissa:
692-nW Advanced Encryption Standard (AES) on a 0.13-mum CMOS. IEEE Trans. Very Large Scale Integr. Syst. 18(12): 1753-1757 (2010) - [c29]Mohamed N. Hassan, Mohammed Benaissa, Anastasios Kanakis:
Flexible hardware/software co-design for scalable elliptic curve cryptography for low-resource applications. ASAP 2010: 285-288 - [c28]Saleh Suleman Saraireh, Mohammed Benaissa:
A scalable block cipher design using filter banks over finite fields. ICASSP 2010: 1810-1813 - [c27]Mohamed N. Hassan, Mohammed Benaissa:
Small Footprint Implementations of Scalable ECC Point Multiplication on FPGA. ICC 2010: 1-4 - [c26]Mohamed N. Hassan, Mohammed Benaissa:
A scalable hardware/software co-design for elliptic curve cryptography on PicoBlaze microcontroller. ISCAS 2010: 2111-2114 - [c25]Mohamed N. Hassan, Mohammed Benaissa:
Efficient Time-Area Scalable ECC Processor Using µ-Coding Technique. WAIFI 2010: 250-268
2000 – 2009
- 2009
- [j18]Mohamed N. Hassan, Mohammed Benaissa:
Embedded Software Design of Scalable Low-Area Elliptic-Curve Cryptography. IEEE Embed. Syst. Lett. 1(2): 42-45 (2009) - [c24]Junfeng Chu, Mohammed Benaissa:
Polynomial Residue Number System GF(2m) multiplier using trinomials. EUSIPCO 2009: 958-962 - [c23]Saleh Suleman Saraireh, Mohammed Benaissa:
A Scalable Block Cipher Design Using Filter Banks and Lifting over Finite Fields. ICC 2009: 1-5 - [c22]Mohammed Benaissa, Tim Good:
A Low-Frequency RFID to Challenge Security and Privacy Concerns. MASS 2009: 856-863 - [c21]Mohamed N. Hassan, Mohammed Benaissa:
Low Area-Scalable Hardware/Software Co-Design for Elliptic Curve Cryptography. NTMS 2009: 1-5 - 2008
- [j17]William N. Chelton, Mohammed Benaissa:
Concurrent error detection in GF(2m) multiplication and its application in elliptic curve cryptography. IET Circuits Devices Syst. 2(3): 289-297 (2008) - [j16]William N. Chelton, Mohammed Benaissa:
Fast Elliptic Curve Cryptography on FPGA. IEEE Trans. Very Large Scale Integr. Syst. 16(2): 198-205 (2008) - [c20]Mohamed N. Hassan, Mohammed Benaissa:
An improved Montgomery inversion algorithm over GF(2m) targeted for low area scalable inverter on FPGA. APCCAS 2008: 1510-1513 - [c19]Junfeng Chu, Mohammed Benaissa:
GF(2m) multiplier using Polynomial Residue Number System. APCCAS 2008: 1514-1517 - [c18]Tim Good, Mohammed Benaissa:
Price to Provide RFID Security and Privacy?. SECRYPT 2008: 209-213 - [c17]Mohamed N. Hassan, Mohammed Benaissa:
Low Area Scalable Montgomery Inversion Over GF(2m). SECRYPT 2008: 363-367 - [p1]Tim Good, Mohammed Benaissa:
ASIC Hardware Performance. The eSTREAM Finalists 2008: 267-293 - 2007
- [j15]Tim Good, Mohammed Benaissa:
Pipelined AES on FPGA with support for feedback modes (in a multi-channel environment). IET Inf. Secur. 1(1): 1-10 (2007) - [j14]Riyaz A. Patel, Mohammed Benaissa, Said Boussakta:
Fast Modulo 2n - (2n-2+1) Addition: A New Class of Adder for RNS. IEEE Trans. Computers 56(4): 572-576 (2007) - [j13]Riyaz A. Patel, Mohammed Benaissa, Said Boussakta:
Fast Parallel-Prefix Architectures for Modulo 2n-1 Addition with a Single Representation of Zero. IEEE Trans. Computers 56(11): 1484-1492 (2007) - [j12]Mohammed Benaissa, Yiqun Zhu:
Reconfigurable Hardware Architectures for Sequential and Hybrid Decoding. IEEE Trans. Circuits Syst. I Regul. Pap. 54-I(3): 555-565 (2007) - [j11]Riyaz A. Patel, Mohammed Benaissa, Neil Powell, Said Boussakta:
Novel Power-Delay-Area-Efficient Approach to Generic Modular Addition. IEEE Trans. Circuits Syst. I Regul. Pap. 54-I(6): 1279-1292 (2007) - 2006
- [j10]Tim Good, Mohammed Benaissa:
Very small FPGA application-specific instruction processor for AES. IEEE Trans. Circuits Syst. I Regul. Pap. 53-I(7): 1477-1486 (2006) - [j9]Mohammed Benaissa, Wei Ming Lim:
Design of flexible GF(2m) elliptic curve cryptography processors. IEEE Trans. Very Large Scale Integr. Syst. 14(6): 659-662 (2006) - [c16]William N. Chelton, Mohammed Benaissa:
Design Space Exploration of Division over GF(2m) on FPGA: A Digit-Serial Approach. ICECS 2006: 172-175 - [c15]Tim Good, Mohammed Benaissa:
AES as stream cipher on a small FPGA. ISCAS 2006 - [c14]William N. Chelton, Mohammed Benaissa:
High-Speed Pipelined EGG Processor on FPGA. SiPS 2006: 136-141 - [c13]William N. Chelton, Mohammed Benaissa:
Limiting Flexibility in Multiplication over GF(2m): A Design Methodology. SiPS 2006: 153-156 - 2005
- [c12]Tim Good, Mohammed Benaissa:
AES on FPGA from the Fastest to the Smallest. CHES 2005: 427-440 - 2004
- [j8]Ashraf Mahran, Mohammed Benaissa:
Adaptive combined Chase-GMD algorithms for block codes. IEEE Commun. Lett. 8(4): 235-237 (2004) - [j7]Ashraf Mahran, Mohammed Benaissa:
Iterative decoding with a hamming threshold for block turbo codes. IEEE Commun. Lett. 8(9): 567-569 (2004) - 2003
- [j6]Mohammed Benaissa, Yiqun Zhu:
A Novel High-Speed Configurable Viterbi Decoder for Broadband Access. EURASIP J. Adv. Signal Process. 2003(13): 1317-1327 (2003) - [c11]Yiqun Zhu, Mohammed Benaissa:
Reconfigurable Viterbi Decoding Using a New ACS Pipelining Technique. ASAP 2003: 360-368 - [c10]Wei Ming Lim, Mohammed Benaissa:
Design space exploration of a hardware-software co-designed GF(2m) galois field processor for forward error correction and cryptography. CODES+ISSS 2003: 53-58 - [c9]Yiqun Zhu, Mohammed Benaissa:
A novel ACS scheme for area-efficient Viterbi decoders. ISCAS (2) 2003: 264-267 - 2000
- [c8]Ali Mahmudi, Mohammed Benaissa, Peter Sweeney:
The implementation of generalized minimum distance decoding for Reed Solomon codes. ISCAS 2000: 53-56 - [c7]A. Mahmudi, Mohammed Benaissa, P. Sweeney, Martin J. N. Sibley:
On the implementation of soft-decision decoding for RS codes. PIMRC 2000: 170-174
1990 – 1999
- 1998
- [j5]Sebastian T. J. Fenn, Michael Gössel, Mohammed Benaissa, David Taylor:
On-Line Error Detection for Bit-Serial Multipliers in GF(2m). J. Electron. Test. 13(1): 29-40 (1998) - [c6]R. Furness, Mohammed Benaissa, Sebastian T. J. Fenn:
Circuit architectures for semi-bit-serial & programmable arithmetic in finite fields. ICECS 1998: 415-418 - 1997
- [j4]M. G. Parker, Mohammed Benaissa:
Modular Arithmetic Using Low Order Redundant Bases. IEEE Trans. Computers 46(5): 611-616 (1997) - 1996
- [j3]Sebastian T. J. Fenn, Mohammed Benaissa, David Taylor:
GF(2^m) Multiplication and Division Over the Dual Basis. IEEE Trans. Computers 45(3): 319-327 (1996) - [j2]Sebastian T. J. Fenn, Mohammed Benaissa, David Taylor:
Finite field inversion over the dual basis. IEEE Trans. Very Large Scale Integr. Syst. 4(1): 134-137 (1996) - [c5]Sebastian T. J. Fenn, Mohammed Benaissa, David Taylor, J. Luty:
Programmable bit-serial Reed-Solomon encoders. EUSIPCO 1996: 1-4 - 1995
- [j1]Sebastian T. J. Fenn, David Taylor, Mohammed Benaissa:
A dual basis bit-serial systolic multiplier for GF(2m). Integr. 18(2-3): 139-149 (1995) - [c4]Sebastian T. J. Fenn, Mohammed Benaissa, David Taylor:
Bit-Serial Dual Basis Systolic Multipliers for GF 2m. ISCAS 1995: 2000-2003 - 1994
- [c3]Sebastian T. J. Fenn, David Taylor, Mohammed Benaissa:
A Dual Basis Systolic Divider for GF(2m). ISCAS 1994: 307-310 - [c2]M. G. Parker, Mohammed Benaissa:
Fault-Tolerant Linear Convolution using Residue Number Systems. ISCAS 1994: 441-444 - 1993
- [c1]M. G. Parker, Mohammed Benaissa:
Bit-serial, VLSI architecture for the implementation of maximum-length number-theoretic transforms using mixed basis representation. ICASSP (1) 1993: 341-344
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 21:14 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint