Browsing by Author "At, Nuray"
Now showing items 1-20 of 29
-
Central and projection algorithms in identification with periodic set membership inputs
At, Nuray; Akçay, Hüseyin (IEEE, 2004)In this paper, we study the central and the projection algorithms in set membership identification with periodic input signals for the case that the number of the estimated parameters equals the input period. First, we ... -
Central and projection algorithms in set membership identification with periodic inputs
At, Nuray; Akçay, Hüseyin (2004)In this paper, we study the central and the projection algorithms in set membership identification with periodic input signals for the case that the number of the estimated parameters equals the input period. First, we ... -
Compact hardware architecture for Hummingbird cryptographic algorithm
San, İsmail; At, Nuray (2011)Hummingbird is an ultra-lightweight cryptographic algorithm aiming at resource-constrained devices. In this paper, we present an enhanced hardware implementation of the Hummingbird cryptographic algorithm that is based on ... -
Compact Hardware Implementations of ChaCha, BLAKE, Threefish, and Skein on FPGA
At, Nuray; Beuchat, Jean-Luc; Okamoto, Eiji; San, İsmail; Yamazaki, Teppei (IEEE-Inst Electrical Electronics Engineers Inc, 2014)The cryptographic hash functions BLAKE and Skein are built from the ChaCha stream cipher and the tweakable Threefish block cipher, respectively. Interestingly enough, they are based on the same arithmetic operations, and ... -
Compact implementation of threefish and Skein on FPGA
At, Nuray; Beuchat, Jean-Luc; San, İsmail (2012)The SHA-3 finalist Skein is built from the tweak able Threefish block cipher. In order to have a better understanding of the computational efficiency of Skein (resource sharing, memory access scheme, scheduling, etc.), we ... -
Compact Keccak Hardware Architecture for Data Integrity and Authentication on FPGAs
San, İsmail; At, Nuray (2012)Cryptographic hash functions play a crucial role in networking and communication security, including their use for data integrity and message authentication. Keccak hash algorithm is one of the finalists in the next ... -
Convergence analysis of central and minimax algorithms in scalar regressor models
Akçay, Hüseyin; At, Nuray (Springer London LTD, 2006)In this paper, the estimation of a scalar parameter is considered with given lower and upper bounds of the scalar regressor. We derive non-asymptotic, lower and upper bounds on the convergence rates of the parameter estimate ... -
Design of a Scenario-Based Synthetic Mixed Pulse Generator
Gençol, Kenan; Kara, Alpagutli; At, Nuray (IEEE, 2013)Electronic Support Measures (ESM) plays an important role in modern Electronic Warfare (EW) systems. The main purpose of an ESM system is to intercept as many emissions as it can, and then to deinterleave mixed streams of ... -
Design of a scenario-based synthetic mixed pulse generator [Senaryo tabanli bir sentetik darbe üreteci tasarimi]
Gençol, Kenan; Kara, Alpagut; At, Nuray (2013)Electronic Support Measures (ESM) plays an important role in modern Electronic Warfare (EW) systems. The main purpose of an ESM system is to intercept as many emissions as it can, and then to deinterleave mixed streams of ... -
Effect of distance metrics on positioning accuracy [Uzaklik metriklerinin konumlama başarimina etkisi]
Altın, U. C.; At, Nuray; Topal, C. (Institute of Electrical and Electronics Engineers Inc., 2018)RF fingerprinting based positioning systems have come to the forefront among indoor positioning systems as they provide both high precision and can use existing infrastructure like Wi-Fi access points effectively. In this ... -
Effectiveness of online RF fingerprinting for indoor localization
Othman, H.; At, Nuray; Topal, C. (Institute of Electrical and Electronics Engineers Inc., 2018)This paper proposes a method for indoor localization by introducing an online Radio Frequency (RF) fingerprinting approach instead of the traditional offline RF fingerprinting. The offline phase is a time-consuming stage ... -
Efficient hardware architectures for crytographic algorithms used in computer and communication systems
San, İsmail (Anadolu Üniversitesi, 2014)Modern kriptografi matematik, elektrik mühendisliği ve bilgisayar bilimini içinde barındıran-bilgi sistemleri için güvenlik hizmetlerinin basit ögelerini sunan önemli bir disiplindir. Günümüzde, daha önemli olan kriptografi ... -
Efficient paillier cryptoprocessor for privacy-preserving data mining
San, İsmail; At, Nuray; Yakut, İbrahim; Polat, Hüseyin (Wiley-Hindawi, 2016)Paillier cryptosystem is extensively utilized as a homomorphic encryption scheme to ensure privacy requirements in many privacy-preserving data mining schemes. However, overall performance of the applications employing ... -
Grid matching in compressive sensing
Şar, Hüseyin (Anadolu Üniversitesi, 2014)Seyrek sinyallerin sıkıştırılmış ölçümlerden rekonstrüksiyonunda, sinyalin destek noktalarının tahmin edildiği muhtemel destek noktalarından oluşan bir ızgara kullanılır. Ancak yüksek ölçüm çözünürlüklü dalga şekillerinin ... -
Grid Matching in Monte Carlo Bayesian Compressive Sensing
Kyriakides, Ioannis; Pribic, Radmila; Sar, Hüseyin; At, Nuray (IEEE, 2013)Sparse signal reconstruction from compressive measurements assumes a grid of possible support points from which to estimate the signal support set. However, reconstruction of high measurement resolution waveforms is very ... -
GRID matching in Monte Carlo Bayesian compressive sensing
Sparse signal reconstruction from compressive measurements assumes a grid of possible support points from which to estimate the signal support set. However, reconstruction of high measurement resolution waveforms is very ... -
Improvements on deinterleaving of radar pulses in dynamically varying signal environments
Gençol, Kenan; Kara, Alpagutli; At, Nuray (Academic Press Inc Elsevier Science, 2017)An electronic support system receiver which is a passive receiver picks up an interleaved stream of pulses and extracts their pulse parameters. These parameters are sent to a deinterleaving subsystem which sorts them and ... -
Improving the computational efficiency of modular operations for embedded systems
San, İsmail; At, Nuray (Elsevier, 2014)Security protocols such as IPSec, SSL and VPNs used in many communication systems employ various cryptographic algorithms in order to protect the data from malicious attacks. Thanks to public-key cryptography, a public ... -
Improving the Efficiency of Predictive Coders Via Adaptive Multiple Predictor Cooperation
Sar, Hüseyin; Topal, Cihan; At, Nuray; Gerek, Ömer Nezih (IEEE, 2013)Due to the popularity of the prediction concept in time series analysis, predictive coding has been an attractive approach, particularly in lossless image compression. Utilization of prediction in time series not only makes ... -
A low-area unified hardware architecture for the AES and the cryptographic hash function Grostl
At, Nuray; Beuchat, Jean-Luc; Okamoto, Eiji; San, İsmail; Yamazaki, Teppei (Academic Press Inc Elsevier Science, 2017)This article describes the design of a compact 8-bit coprocessor for the Advanced Encryption standard (AES) (encryption, decryption, and key expansion) and the cryptographic hash function Grostl. Our Arithmetic and Logic ...