default search action
Talal Bonny
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j23]Aceng Sambas, Miroslav Mahdal, Sundarapandian Vaidyanathan, Brisbane Ovilla-Martínez, Esteban Tlelo-Cuautle, Ahmed A. Abd El-Latif, Bassem Abd-El-Atty, Khaled Benkouider, Talal Bonny:
A New Hyperjerk System With a Half Line Equilibrium: Multistability, Period Doubling Reversals, Antimonotonocity, Electronic Circuit, FPGA Design, and an Application to Image Encryption. IEEE Access 12: 9177-9194 (2024) - [j22]Talal Bonny, Wafaa Al Nassan:
NeuroChaosCrypt: Revolutionizing Chaotic-Based Cryptosystem With Artificial Neural Networks - A Comparison With Traditional Cryptosystems. IEEE Access 12: 62030-62046 (2024) - [j21]Talal Bonny, Sundarapandian Vaidyanathan, Wafaa Al Nassan, Fareh Hannachi, Aceng Sambas:
A New Chaotic System With Two Stable Node-Foci Equilibria and an Unstable Saddle-Focus Equilibrium: Bifurcation and Multistability Analysis, Circuit Design, Voice Cryptosystem Application, and FPGA Implementation. IEEE Access 12: 94018-94034 (2024) - [j20]Talal Bonny, Farah AlMutairi, Wafaa Al Nassan:
A novel clock-glitch-attack-proof image encryption algorithm implemented on FPGA. Multim. Tools Appl. 83(7): 18881-18906 (2024) - 2023
- [j19]Talal Bonny, Sundarapandian Vaidyanathan, Aceng Sambas, Khaled Benkouider, Wafaa Al Nassan, Omar Naqaweh:
Multistability and Bifurcation Analysis of a Novel 3D Jerk System: Electronic Circuit Design, FPGA Implementation, and Image Cryptography Scheme. IEEE Access 11: 78584-78600 (2023) - [j18]Talal Bonny, Mahmmud Qatmh, Khaled Obaideen, Maryam Nooman AlMallahi, Mohammad Al-Shabi, Ahmed Al-Shamma'a:
Speed and Accuracy Trade-off ANN/SVM Based Sleep Apnea Detection with FPGA Implementation. Comput. methods Biomech. Biomed. Eng. Imaging Vis. 11(6): 2479-2494 (2023) - [j17]Abdullatif Baba, Talal Bonny:
FPGA-based parallel implementation to classify Hyperspectral images by using a Convolutional Neural Network. Integr. 92: 15-23 (2023) - [j16]Nida Nasir, Afreen Kansal, Feras Barneih, Omar Alshaltone, Talal Bonny, Mohammad Al-Shabi, Ahmed Al-Shamma'a:
Multi-modal image classification of COVID-19 cases using computed tomography and X-rays scans. Intell. Syst. Appl. 17: 200160 (2023) - [j15]Talal Bonny, Wafaa Al Nassan, Abdullatif Baba:
Voice encryption using a unified hyper-chaotic system. Multim. Tools Appl. 82(1): 1067-1085 (2023) - [j14]Talal Bonny, Wafaa Al Nassan, Sundarapandian Vaidyanathan, Aceng Sambas:
Highly-secured chaos-based communication system using cascaded masking technique and adaptive synchronization. Multim. Tools Appl. 82(22): 34229-34258 (2023) - [j13]Omar Kaziha, Talal Bonny, Anwar Jarndal:
Genetic Algorithm Augmented Inception-Net based Image Classifier Accelerated on FPGA. Multim. Tools Appl. 82(29): 45097-45125 (2023) - [c27]Hind Alzarooni, Hessa Al-Ali, Salma Fadaaq, Talal Bonny:
AI-Based Sign Language Interpreter (GestPret). ICAAI 2023: 79-85 - [c26]Mohammad AlShabi, Omar Saleh Osman Hassan, Talal Bonny, Maamar Bettayeb:
Parameter Estimation of PRRR Robotic Arm Using Dandelion Technique. ICKII 2023: 786-789 - 2022
- [j12]Aceng Sambas, Sundarapandian Vaidyanathan, Xuncai Zhang, Ismail Koyuncu, Talal Bonny, Murat Tuna, Murat Alçin, Sen Zhang, Ibrahim Mohammed Sulaiman, Aliyu Muhammed Awwal, Poom Kumam:
A Novel 3D Chaotic System With Line Equilibrium: Multistability, Integral Sliding Mode Control, Electronic Circuit, FPGA Implementation and Its Image Encryption. IEEE Access 10: 68057-68074 (2022) - [j11]Talal Bonny, Mariam Kashkash:
Highly optimized Q-learning-based bees approach for mobile robot path planning in static and dynamic environments. J. Field Robotics 39(4): 317-334 (2022) - 2021
- [j10]Talal Bonny:
Chaotic or Hyper-chaotic Oscillator? Numerical Solution, Circuit Design, MATLAB HDL-Coder Implementation, VHDL Code, Security Analysis, and FPGA Realization. Circuits Syst. Signal Process. 40(3): 1061-1088 (2021) - [c25]Razan Adnan Alhamad, Sara A. Mohammed, Meiaad A. Abdullah, Fatima H. Mohammed, Talal Bonny:
Sleep Apnea Detecting and Monitoring System(SADMS). DeSE 2021: 265-268 - [c24]Mahmmud Qatmh, Talal Bonny, Nida Nasir, Mohammad Al-Shabi, Ahmed Al-Shamma'a:
Detection of Epileptic Seizure using Discrete Wavelet Transform on Gamma band and Artificial Neural Network. DeSE 2021: 401-406 - [c23]Nida Nasir, Paul Oswald, Feras Barneih, Omar Alshaltone, Mohammad AlShabi, Talal Bonny, Ahmed Al-Shamma'a:
Hypertension Classification Using Machine Learning Part II. DeSE 2021: 459-463 - [c22]Nida Nasir, Omar Alshaltone, Feras Barneih, Mohammad Al-Shabi, Talal Bonny, Ahmed Al-Shamma'a:
Hypertension Classification using Machine Learning - Part I. DeSE 2021: 464-468 - 2020
- [j9]Tamer Rabie, Mohammed Baziyad, Talal Bonny, Raouf Fareh:
Toward a Unified Performance Metric for Benchmarking Steganography Systems. J. Circuits Syst. Comput. 29(3): 2050042:1-2050042:30 (2020) - [j8]Talal Bonny, Abrar Ul Haq:
Emulation of high-performance correlation-based quantum clustering algorithm for two-dimensional data on FPGA. Quantum Inf. Process. 19(6): 179 (2020) - [c21]Omar Kaziha, Talal Bonny:
Exploring Quantization-Aware Training on a Convolution Neural Network. CCCI 2020: 1-5 - [c20]Omar Kaziha, Anwar Jarndal, Talal Bonny:
Genetic Algorithm Augmented Convolutional Neural Network for Image Recognition Applications. CCCI 2020: 1-5 - [c19]Farah AlMutairi, Talal Bonny:
Image Encryption Based on Chua Chaotic Oscillator. ICSPIS 2020: 1-4 - [c18]Wafaa Al Nassan, Talal Bonny, Abdullatif Baba:
A New Chaos-Based Cryptoystem for Voice Encryption. ICSPIS 2020: 1-4
2010 – 2019
- 2019
- [j7]Talal Bonny, Ridhwan Al Debsi, Sohaib Majzoub, Ahmed S. Elwakil:
Hardware Optimized FPGA Implementations of High-Speed True Random Bit Generators Based on Switching-Type Chaotic Oscillators. Circuits Syst. Signal Process. 38(3): 1342-1359 (2019) - [j6]Talal Bonny, Ridhwan Al Debsi, Mohamed Basel Almourad:
Time Efficient Segmented Technique for Dynamic Programming Based Algorithms with FPGA Implementation. J. Circuits Syst. Comput. 28(13): 1950227:1-1950227:21 (2019) - [j5]Talal Bonny, Tamer Rabie, Mohammed Baziyad, Walid Balid:
SHORT: Segmented histogram technique for robust real-time object recognition. Multim. Tools Appl. 78(18): 25781-25806 (2019) - [c17]Nourhan Tahoun, Anwar Awad, Talal Bonny:
Smart Assistant for Blind and Visually Impaired People. ICAAI 2019: 227-231 - [c16]Mohamed Abdelsalam, Talal Bonny:
IoV Road Safety: Vehicle Speed Limiting System. ICCSPA 2019: 1-6 - [c15]Waleed Obaid, Talal Bonny, Abdul Kadir Hamid:
FPGA Reconfigurable UWB CPW Bow-Tie Aperture Antenna for Wi-Fi Applications (4.9 GHz) by Rotating Slots. ICCSPA 2019: 1-6 - 2018
- [j4]Talal Bonny, Safaa Henno:
Image Edge Detectors under Different Noise Levels with FPGA Implementations. J. Circuits Syst. Comput. 27(13): 1850209:1-1850209:22 (2018) - [j3]Talal Bonny, Tamer Rabie, A. H. Abdul Hafez:
Multiple histogram-based face recognition with high speed FPGA implementation. Multim. Tools Appl. 77(18): 24269-24288 (2018) - 2016
- [c14]Mohamed Basel Al-Mourad, Mohammed Hussain, Talal Bonny:
An Algorithm for Inferring Big Data Objects Correlation Using Word Net. ANT/SEIT 2016: 1238-1243 - 2015
- [c13]Talal Bonny, Bassel Soudan:
Computation Time Reduction to Speed-up the Database Searching Process. ISMVL 2015: 121-126 - [c12]Talal Bonny, Bassel Soudan:
High Speed Database Sequence Comparison. SCSE 2015: 73-80 - [c11]Talal Bonny, Bassel Soudan:
Filtering technique for high speed database sequence comparison. ICSC 2015: 73-76 - 2014
- [c10]M. Sammer Srouji, Talal Bonny, Jörg Henkel:
High-speed enoding/decoding technique for reliable data transmission in wireless sensor networks. SECON 2014: 329-336 - 2011
- [c9]Talal Bonny, Khaled N. Salama:
Fast global sequence alignment technique. ACSCC 2011: 1046-1049 - [c8]Talal Bonny, Khaled N. Salama:
ABS: Sequence alignment by scanning. EMBC 2011: 928-931 - [c7]M. Affan Zidan, Talal Bonny, Khaled N. Salama:
High performance technique for database applicationsusing a hybrid GPU/CPU platform. ACM Great Lakes Symposium on VLSI 2011: 85-90 - 2010
- [b1]Talal Bonny:
Huffman-based code compression techniques for embedded systems. Karlsruhe Institute of Technology, 2010 - [j2]Talal Bonny, Jörg Henkel:
Huffman-based code compression techniques for embedded processors. ACM Trans. Design Autom. Electr. Syst. 15(4): 31:1-31:37 (2010)
2000 – 2009
- 2009
- [c6]Talal Bonny, Jörg Henkel:
LICT: left-uncompressed instructions compression technique to improve the decoding performance of VLIW processors. DAC 2009: 903-906 - 2008
- [j1]Talal Bonny, Jörg Henkel:
Efficient Code Compression for Embedded Processors. IEEE Trans. Very Large Scale Integr. Syst. 16(12): 1696-1707 (2008) - [c5]Talal Bonny, Jörg Henkel:
Instruction Re-encoding Facilitating Dense Embedded Code. DATE 2008: 770-775 - [c4]Talal Bonny, Jörg Henkel:
FBT: filled buffer technique to reduce code size for VLIW processors. ICCAD 2008: 549-554 - 2007
- [c3]Talal Bonny, Jörg Henkel:
Instruction Splitting for Efficient Code Compression. DAC 2007: 646-651 - [c2]Talal Bonny, Jörg Henkel:
Efficient code density through look-up table compression. DATE 2007: 809-814 - 2006
- [c1]Talal Bonny, Jörg Henkel:
Using Lin-Kernighan algorithm for look-up table compression to improve code density. ACM Great Lakes Symposium on VLSI 2006: 259-265
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-01-21 00:05 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint