Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Skip to main content

Showing 1–4 of 4 results for author: Omrani, T

.
  1. arXiv:2408.07734  [pdf, other

    cs.NE eess.SP

    Analog Spiking Neuron in CMOS 28 nm Towards Large-Scale Neuromorphic Processors

    Authors: Marwan Besrour, Jacob Lavoie, Takwa Omrani, Gabriel Martin-Hardy, Esmaeil Ranjbar Koleibi, Jeremy Menard, Konin Koua, Philippe Marcoux, Mounir Boukadoum, Rejean Fontaine

    Abstract: The computational complexity of deep learning algorithms has given rise to significant speed and memory challenges for the execution hardware. In energy-limited portable devices, highly efficient processing platforms are indispensable for reproducing the prowess afforded by much bulkier processing platforms. In this work, we present a low-power Leaky Integrate-and-Fire (LIF) neuron design fabric… ▽ More

    Submitted 14 August, 2024; originally announced August 2024.

  2. arXiv:2406.17779  [pdf, other

    q-bio.NC eess.SP eess.SY physics.bio-ph

    Design and Implementation of a Low-Power Low-Noise Biopotential Amplifier in 28 nm CMOS Technology with a Compact Die-Area of 2500 $μ$m$^2$

    Authors: Esmaeil Ranjbar Koleibi, Konin Koua, William Lemaire, Maher Benhouria, Marwan Besrour, Takwa Omrani, Jérémy Ménard, Louis-Philippe Gauthier, Montassar Dridi, Mahziar Serri Mazandarani, Benoit Gosselin, Sébastien Royand Réjean Fontaine

    Abstract: This paper presents a compact low-power, low-noise bioamplifier for multi-channel electrode arrays, aimed at recording action potentials. The design we put forth attains a notable decrease in both size and power consumption. This is achieved by incorporating an active lowpass filter that doesn't rely on bulky DC-blocking capacitors, and by utilizing the TSMC 28 nm HPC CMOS technology. This paper p… ▽ More

    Submitted 9 January, 2024; originally announced June 2024.

  3. arXiv:1801.02746  [pdf, ps, other

    cs.CR cs.LG

    Fusion of ANN and SVM Classifiers for Network Attack Detection

    Authors: Takwa Omrani, Adel Dallali, Bilgacem Chibani Rhaimi, Jaouhar Fattahi

    Abstract: With the progressive increase of network application and electronic devices (computers, mobile phones, android, etc.) attack and intrusion, detection has become a very challenging task in cybercrime detection area. in this context, most of the existing approaches of attack detection rely mainly on a finite set of attacks. These solutions are vulnerable, that is, they fail in detecting some attacks… ▽ More

    Submitted 9 January, 2018; v1 submitted 8 January, 2018; originally announced January 2018.

    Comments: Accepted and presented at the 18th international conference on Sciences and Techniques of Automatic control and computer engineering STA'2017

  4. Witness-Functions versus Interpretation-Functions for Secrecy in Cryptographic Protocols: What to Choose?

    Authors: Jaouhar Fattahi, Mohamed Mejri, Marwa Ziadia, Takwa Omrani, Emil Pricop

    Abstract: Proving that a cryptographic protocol is correct for secrecy is a hard task. One of the strongest strategies to reach this goal is to show that it is increasing, which means that the security level of every single atomic message exchanged in the protocol, safely evaluated, never deceases. Recently, two families of functions have been proposed to measure the security level of atomic messages. The f… ▽ More

    Submitted 27 July, 2017; originally announced July 2017.

    Comments: Accepted at the IEEE SMC (6 two column pages) on 2017-07-10