-
421
Optimizing children's hand orthosis design: A study on contact pressure distribution using FSR sensors
Published 2025-03-01“…Force Sensing Resistor (FSR) sensors were employed to record the contact force at 16 specific points on the orthoses using a voltage divider circuit with two different setups: the Teensy 3.5 chip board for 12-bit precision and the Elegoo Mega 2560 chip board for 10-bit precision. …”
Get full text
Article -
422
TX to RX Compact Leakage Cancellation Impedance Tuner for 60 GHz Monostatic Doppler Radar
Published 2025-01-01“…This paper presents the design of an ultra-compact impedance tuner (IT) which is connected to the lumped Rat-Race coupler to minimize the TX to RX leakage signal. The IT offers 5-bit phase control and 8-bit magnitude control via the Serial Peripheral Interface (SPI); moreover, it uses SiGe transistors in reverse saturation to enhance the impedance tuning performance. …”
Get full text
Article -
423
Multi-frequency amplitude-programmable metasurface for multi-channel electromagnetic controls
Published 2023-03-01“…It is also possible to carry out multi-bit transmissions by mixing these frequency channels. …”
Get full text
Article -
424
Post-quantum encryption technology based on BRLWE for internet of things
Published 2022-10-01“…With the development of quantum computers, the classical public key encryption system is not capable enough to guarantee the communication security of internet of things (IoT).Because the mathematical puzzles which post-quantum encryption algorithms are based on cannot yet be broken by quantum computers, these new algorithms have good anti-quantum computing security.In particular, the lattice-based cryptography is expected to become the main technology of the next generation public key cryptosystem.However, post-quantum encryption algorithms have the disadvantages of large amount of computation and high storage space.The communication efficiency of IoT will be affected if post-quantum encryption algorithms are directly applied to the lightweight device under IoT environment.In order to better guarantee the communication security and improve the commutation efficiency of IoT, Sym-BRLWE (symmetrical binary RLWE) encryption scheme was proposed.Sym-BRLWE was improved from the existing post-quantum encryption scheme based on BRLWE (binary ringlearning with errors) problem.Specifically, Sym-BRLWE encryption algorithm met the efficiency requirements of IoT via improving the random number selection on the discrete uniform distribution and the calculation of the polynomial multiplication.Sym-BRLWE encryption algorithm achieved high efficiency and high security via adding encryption security precautions, then it is more suitable for IoT lightweight devices.From the security analysis, the proposed Sym-BRLWE encryption scheme had high security.It could theoretically resist lattice attacks, timing attacks, simple power analysis (SPA) and differential power analysis (DPA).From simulation experiments, which were carried out in a binary computing environment simulating an 8-bit micro-device, the proposed Sym-BRLWE encryption scheme has high efficiency and small key size in encryption and decryption.It could reduce the total encryption time by 30% to 40% when compared with other BRLWE-based encryption schemes with the parameter selection of the 140 bit quantum security level.…”
Get full text
Article -
425
Energy-efficient and fast memristor-based serial multipliers applicable in image processing
Published 2025-03-01“…The proposed 8-bit signed multiplier has also improved the computational steps, energy consumption, and required memristors by up to 59 %, 54 %, and 45 %. …”
Get full text
Article -
426
Performance Analysis of RIS-Assisted Smart Grid Wide Area Network With RF Energy Harvesting
Published 2025-01-01“…We have derived the closed-form average bit error probability (ABEP) expressions for both RIS with dual-hop (RIS-DH) and RIS as transmitter (RIS-T) cases. …”
Get full text
Article -
427
Toward Fine-Grained Partitioning of Low-Level SRAM Caches for Emerging 3D-IC Designs
Published 2024-01-01“…Our study focuses on partitioning and optimization of SRAM bit-cells and peripheral circuits, enabling heterogeneous integration, achieving up to 12% higher operating frequency with 50% leakage power reduction in the memory macros. …”
Get full text
Article -
428
Enhancing HEVC Efficiency: A Novel Approach to Intra-Mode Estimation Through Hadamard Cost Analysis
Published 2025-01-01“…Here we show how by employing a refined approach to the rate distortion optimization (RDO) module, we achieve a 5.8% reduction in HEVC complexity and a minor yet notable −0.02% improvement in Bjontegaard Delta Bit Rate (BD-BR). Our method stands out by not only reducing computational load but also by improving bit-rate, a rare feat in the literature. …”
Get full text
Article -
429
Theoretical and experimental study on cutting temperature in the presence of drilling fluid during ice-core drilling
Published 2024-01-01“…The heat generated by rotary cutting can melt ice chips, which seriously threatens the safety of drilling if the chips refreeze on the drill bit or barrel. Lowering the cutting heat is an effective method to reduce the melting of ice chips. …”
Get full text
Article -
430
-
431
-
432
New short interleaver design for Turbo codes
Published 2005-01-01“…Simulation results show that they exhibit good bit error performance.…”
Get full text
Article -
433
Improved sphere decoding algorithm based on ±1 quadratic programming
Published 2007-01-01“…With the ±1 quadratic programming of the MIMO detection,the necessary conditions for MIMO detection op-timal solution were derived.An improved sphere decoding algorithm based on these necessary conditions was proposed.The algorithm prunes redundant nodes by necessary conditions based on the origin sphere decoding.With this pruning strategy,the complexity of algorithm is reduced significantly,while holding the bit error rate performance.…”
Get full text
Article -
434
Spreading and coding for anti-interference in UWB system
Published 2005-01-01“…Spreading every transmitted bit over each sub-band and interleaving the spread signals over all of the sub-bands would provide the robustness to narrow-band interference in the ultra-wide band (UWB) system based on orthogonal frequency-division multiplexing (OFDM). …”
Get full text
Article -
435
Extended integer tent maps and dynamic hash function
Published 2010-01-01“…Based on the analysis of uniform distribution property of the extended integer tent maps,a novel dynamic hash function with the output length of 160bit was constructed.In addition,the MD structure was improved so that the capacity of collision resistance of the middle iteration process of the hash function was enhanced without extending intermediate states.Preliminary security testing indicates that,this hash function has a high degree of security,and it can be realized easily with great rapidity.The algorithm of hash function is an ideal subsititution for traditional hash function.…”
Get full text
Article -
436
End-to-End Message Exchange in a Deployable Marine Environment Hierarchical Wireless Sensor Network
Published 2014-01-01“…These LJSON messages are converted by the BS to 16-bit JSON and vice versa, for remote Internet interaction. …”
Get full text
Article -
437
Usefulness of body composition assessment by bioelectrical impedance vector analysis in subacute post-stroke patients in rehabilitation
Published 2025-01-01“…The change in modified Barthel Index (mBIT1-mBIT0) was assessed to evaluate the improvement in functional recovery. …”
Get full text
Article -
438
Iterative channel estimation and decoding algorithm for quasi-coherent demodulation of Turbo coded GMSK signals
Published 2006-01-01“…Numerous simulation results show that the proposed algorithm can improve bit error rate (BER) performance dramatically.…”
Get full text
Article -
439
Determination of the FIFO-stack size for the algorithm of the image region growing
Published 2019-12-01“…The FIFO stack, organized on the principle of a ring multi-bit shift register, is considered. The conditions for maximum loading of the FIFO stack are formulated, for which an expression is obtained that allows one to accurately determine the required size of the FIFO stack, which provides memory savings.…”
Get full text
Article -
440
Multivariate Rayleigh, Rice, and Nakagami distributions and their applications in communication theory
Published 2024-07-01“…A method was developed to calculate the symbol and bit error probabilities for coherent diversity reception of multi-position signal structures in a communication channel with additive white Gaussian noise (AWGN) and general fading described by the multivariate Rayleigh and Nakagami distributions, as well as the bivariate Rice distribution.…”
Get full text
Article