Showing 421 - 440 results of 1,322 for search '"bit"', query time: 0.05s Refine Results
  1. 421

    Optimizing children's hand orthosis design: A study on contact pressure distribution using FSR sensors by Dhaval Patel, Ivaylo Mitev, Thomas Rockenbauer, Thomas Antretter, Sandra Schloegl, Margit Lang

    Published 2025-03-01
    “…Force Sensing Resistor (FSR) sensors were employed to record the contact force at 16 specific points on the orthoses using a voltage divider circuit with two different setups: the Teensy 3.5 chip board for 12-bit precision and the Elegoo Mega 2560 chip board for 10-bit precision. …”
    Get full text
    Article
  2. 422

    TX to RX Compact Leakage Cancellation Impedance Tuner for 60 GHz Monostatic Doppler Radar by Ahmad Mushtaq, Thomas Mausolf, Wolfgang Miesch, Nasir Uddin, Wolfgang Winkler, Dietmar Kissinger

    Published 2025-01-01
    “…This paper presents the design of an ultra-compact impedance tuner (IT) which is connected to the lumped Rat-Race coupler to minimize the TX to RX leakage signal. The IT offers 5-bit phase control and 8-bit magnitude control via the Serial Peripheral Interface (SPI); moreover, it uses SiGe transistors in reverse saturation to enhance the impedance tuning performance. …”
    Get full text
    Article
  3. 423

    Multi-frequency amplitude-programmable metasurface for multi-channel electromagnetic controls by Wu Rui Yuan, He Shi, Wu Jun Wei, Bao Lei, Cui Tie Jun

    Published 2023-03-01
    “…It is also possible to carry out multi-bit transmissions by mixing these frequency channels. …”
    Get full text
    Article
  4. 424

    Post-quantum encryption technology based on BRLWE for internet of things by Yitian GAO, Liquan CHEN, Tianyang TU, Yuan GAO, Qianye CHEN

    Published 2022-10-01
    “…With the development of quantum computers, the classical public key encryption system is not capable enough to guarantee the communication security of internet of things (IoT).Because the mathematical puzzles which post-quantum encryption algorithms are based on cannot yet be broken by quantum computers, these new algorithms have good anti-quantum computing security.In particular, the lattice-based cryptography is expected to become the main technology of the next generation public key cryptosystem.However, post-quantum encryption algorithms have the disadvantages of large amount of computation and high storage space.The communication efficiency of IoT will be affected if post-quantum encryption algorithms are directly applied to the lightweight device under IoT environment.In order to better guarantee the communication security and improve the commutation efficiency of IoT, Sym-BRLWE (symmetrical binary RLWE) encryption scheme was proposed.Sym-BRLWE was improved from the existing post-quantum encryption scheme based on BRLWE (binary ringlearning with errors) problem.Specifically, Sym-BRLWE encryption algorithm met the efficiency requirements of IoT via improving the random number selection on the discrete uniform distribution and the calculation of the polynomial multiplication.Sym-BRLWE encryption algorithm achieved high efficiency and high security via adding encryption security precautions, then it is more suitable for IoT lightweight devices.From the security analysis, the proposed Sym-BRLWE encryption scheme had high security.It could theoretically resist lattice attacks, timing attacks, simple power analysis (SPA) and differential power analysis (DPA).From simulation experiments, which were carried out in a binary computing environment simulating an 8-bit micro-device, the proposed Sym-BRLWE encryption scheme has high efficiency and small key size in encryption and decryption.It could reduce the total encryption time by 30% to 40% when compared with other BRLWE-based encryption schemes with the parameter selection of the 140 bit quantum security level.…”
    Get full text
    Article
  5. 425

    Energy-efficient and fast memristor-based serial multipliers applicable in image processing by Seyed Erfan Fatemieh, Bahareh Bagheralmoosavi, Mohammad Reza Reshadinezhad

    Published 2025-03-01
    “…The proposed 8-bit signed multiplier has also improved the computational steps, energy consumption, and required memristors by up to 59 %, 54 %, and 45 %. …”
    Get full text
    Article
  6. 426

    Performance Analysis of RIS-Assisted Smart Grid Wide Area Network With RF Energy Harvesting by Kandi Veera Venkata Ramana, Hemanta Kumar Sahu

    Published 2025-01-01
    “…We have derived the closed-form average bit error probability (ABEP) expressions for both RIS with dual-hop (RIS-DH) and RIS as transmitter (RIS-T) cases. …”
    Get full text
    Article
  7. 427

    Toward Fine-Grained Partitioning of Low-Level SRAM Caches for Emerging 3D-IC Designs by Sudipta Das, Bhawana Kumari, Siva Satyendra Sahoo, Yukai Chen, James Myers, Dragomir Milojevic, Dwaipayan Biswas, Julien Ryckaert

    Published 2024-01-01
    “…Our study focuses on partitioning and optimization of SRAM bit-cells and peripheral circuits, enabling heterogeneous integration, achieving up to 12% higher operating frequency with 50% leakage power reduction in the memory macros. …”
    Get full text
    Article
  8. 428

    Enhancing HEVC Efficiency: A Novel Approach to Intra-Mode Estimation Through Hadamard Cost Analysis by Junaid Tariq, Imran Javed, Touseef Sadiq, Hameedur Rahman, Ashfaq Hussain Farooqi, Amir Ijaz

    Published 2025-01-01
    “…Here we show how by employing a refined approach to the rate distortion optimization (RDO) module, we achieve a 5.8% reduction in HEVC complexity and a minor yet notable −0.02% improvement in Bjontegaard Delta Bit Rate (BD-BR). Our method stands out by not only reducing computational load but also by improving bit-rate, a rare feat in the literature. …”
    Get full text
    Article
  9. 429

    Theoretical and experimental study on cutting temperature in the presence of drilling fluid during ice-core drilling by Zhuo Chen, Pinlu Cao, Han Wang, He Yang, Qilei Yin

    Published 2024-01-01
    “…The heat generated by rotary cutting can melt ice chips, which seriously threatens the safety of drilling if the chips refreeze on the drill bit or barrel. Lowering the cutting heat is an effective method to reduce the melting of ice chips. …”
    Get full text
    Article
  10. 430
  11. 431
  12. 432

    New short interleaver design for Turbo codes by LIU Wen-ming, ZHU Guang-xi, HE Ye-jun

    Published 2005-01-01
    “…Simulation results show that they exhibit good bit error performance.…”
    Get full text
    Article
  13. 433

    Improved sphere decoding algorithm based on ±1 quadratic programming by LI Zi1, CAI Yue-ming1

    Published 2007-01-01
    “…With the ±1 quadratic programming of the MIMO detection,the necessary conditions for MIMO detection op-timal solution were derived.An improved sphere decoding algorithm based on these necessary conditions was proposed.The algorithm prunes redundant nodes by necessary conditions based on the origin sphere decoding.With this pruning strategy,the complexity of algorithm is reduced significantly,while holding the bit error rate performance.…”
    Get full text
    Article
  14. 434

    Spreading and coding for anti-interference in UWB system by XU Chen, ZHANG Shi-bing

    Published 2005-01-01
    “…Spreading every transmitted bit over each sub-band and interleaving the spread signals over all of the sub-bands would provide the robustness to narrow-band interference in the ultra-wide band (UWB) system based on orthogonal frequency-division multiplexing (OFDM). …”
    Get full text
    Article
  15. 435

    Extended integer tent maps and dynamic hash function by LIU Jian-dong

    Published 2010-01-01
    “…Based on the analysis of uniform distribution property of the extended integer tent maps,a novel dynamic hash function with the output length of 160bit was constructed.In addition,the MD structure was improved so that the capacity of collision resistance of the middle iteration process of the hash function was enhanced without extending intermediate states.Preliminary security testing indicates that,this hash function has a high degree of security,and it can be realized easily with great rapidity.The algorithm of hash function is an ideal subsititution for traditional hash function.…”
    Get full text
    Article
  16. 436

    End-to-End Message Exchange in a Deployable Marine Environment Hierarchical Wireless Sensor Network by César Ortega-Corral, Luis E. Palafox, J. Antonio García-Macías, Jaime Sánchez-García, Leocundo Aguilar

    Published 2014-01-01
    “…These LJSON messages are converted by the BS to 16-bit JSON and vice versa, for remote Internet interaction. …”
    Get full text
    Article
  17. 437
  18. 438

    Iterative channel estimation and decoding algorithm for quasi-coherent demodulation of Turbo coded GMSK signals by WU Tuan-feng, YANG Xi-gen

    Published 2006-01-01
    “…Numerous simulation results show that the proposed algorithm can improve bit error rate (BER) performance dramatically.…”
    Get full text
    Article
  19. 439

    Determination of the FIFO-stack size for the algorithm of the image region growing by V. Yu. Tsviatkou

    Published 2019-12-01
    “…The FIFO stack, organized on the principle of a ring multi-bit shift register, is considered. The conditions for maximum loading of the FIFO stack are formulated, for which an expression is obtained that allows one to accurately determine the required size of the FIFO stack, which provides memory savings.…”
    Get full text
    Article
  20. 440

    Multivariate Rayleigh, Rice, and Nakagami distributions and their applications in communication theory by Yu. A. Brychkov, N. V. Savischenko

    Published 2024-07-01
    “…A method was developed to calculate the symbol and bit error probabilities for coherent diversity reception of multi-position signal structures in a communication channel with additive white Gaussian noise (AWGN) and general fading described by the multivariate Rayleigh and Nakagami distributions, as well as the bivariate Rice distribution.…”
    Get full text
    Article