Showing 941 - 960 results of 1,322 for search '"bit"', query time: 0.05s Refine Results
  1. 941

    A New Chaotic Color Image Encryption Algorithm Based on Memristor Model and Random Hybrid Transforms by Yexia Yao, Xuemei Xu, Zhaohui Jiang

    Published 2025-01-01
    “…By integrating both pixel-level and bit-level diffusion, the randomness of the image information distribution is significantly increased. …”
    Get full text
    Article
  2. 942

    Smart Contract Penyimpanan Data Genetika Manusia Berbiaya Murah pada Blockchain Ethereum by Tri Stiyo Famuji, Herman Herman, Sunardi Sunardi

    Published 2024-07-01
    “…Hasil pengujian menjalankan smart contract pada blockchain Ethereum yang hanya menyimpan signature data genetik ini menunjukkan biaya gas yang sangat efisien karena hanya menyimpan 256 bit saja dari data genetik riilnya yang dapat mencapai giga byte.…”
    Get full text
    Article
  3. 943

    Demonstration of high-reconfigurability and low-power strong physical unclonable function empowered by FeFET cycle-to-cycle variation and charge-domain computing by Taixin Li, Xinrui Guo, Franz Müller, Sukhrob Abdulazhanov, Xiaoyang Ma, Hongtao Zhong, Yongpan Liu, Vijaykrishnan Narayanan, Huazhong Yang, Kai Ni, Thomas Kämpfe, Xueqing Li

    Published 2025-01-01
    “…Remarkably, our PUF achieves near-ideal reconfigurability and ultra-low 1.89fJ per bit readout energy, significantly outperforming the state-of-the-art PUFs. …”
    Get full text
    Article
  4. 944

    On the Optimum Detection of MIMO-SVD Signals With Strong Nonlinear Distortion Effects at the Transmitter by Joao Goncalves, M. Teresa Nogueira, Daniel Dinis, Joao Guerreiro, Rui Dinis

    Published 2025-01-01
    “…It also provides an approximate bound on the achievable ML Bit Error Rate (BER) performance. Our results indicate that the proposed receiver can have a performance close to the ML receiver with just a few iterations.…”
    Get full text
    Article
  5. 945

    Optimized Wideband Beamforming for mm-wave Communication Systems with Intelligent Reflecting Surfaces by Hiba A. Alsawaf, Saad Ahmed Ayoob

    Published 2024-12-01
    “…The results showed that the use of phase shift TD phase shift (PTDP) resulted in a 54% increase in data rate compared to the conventional design in the beam splitting case at IRS. The use of only two-bit phase shifters in the proposed PTDP is sufficient for near-optimal performance of the system's ability to focus the signal in the desired direction through the precoding technique, through which the losses caused by beam splitting can be compensated. …”
    Get full text
    Article
  6. 946

    New hash function based on C-MD structure and chaotic neural network by Liquan CHEN, Yuhang ZHU, Yu WANG, Zhongyuan QIN, Yang MA

    Published 2023-06-01
    “…In recent years, widely used hash algorithms such as MD5 and SHA-1 have been found to have varying degrees of security risks.The iterative structure of the SHA-2 algorithm is similar to that of SHA-1, making it vulnerable to attacks as well.Meanwhile, SHA-3 has a complex internal structure and low implementation efficiency.To address these issues, a keyed hash function was designed and implemented based on chaotic neural network and C-MD structure.The approach involved improving the Merkle-Damgard structure by proposing the chaotic neural network Merkle-Damgard (C-MD) structure.This structure can be used to design a hash function that can withstand attacks such as the middle attack, multiple collision attack, and second pre-image attack for long information.Besides, the chaotic neural network was used as the compression function to increase the complexity of the hash function and improve its collision resistance, while also enabling it to output multiple lengths.Moreover, a plaintext preprocessor was designed, which used the coupled image lattice to generate chaos sequence related to the length of the plaintext to fill the plaintext, thus enhancing the ability of the hash function to resist length expansion attacks.Simulation results demonstrate that the proposed hash function performs faster than SHA-2, SHA-3 and the same type of chaotic hash function proposed by Teh et al.It can resist second pre-image attack, multi-collision attack and differential attack, while also exhibiting better collision resistance and mapping uniformity.In addition, the proposed Hash function can output Hash values of different lengths, making it suitable for use in digital signature, key generation, Hash-based message authentication code, deterministic random bit generator, and other application fields.…”
    Get full text
    Article
  7. 947

    A Modified Implementation of Tristate Inverter Based Static Master-Slave Flip-Flop with Improved Power-Delay-Area Product by Kunwar Singh, Satish Chandra Tiwari, Maneesha Gupta

    Published 2014-01-01
    “…To validate the correct behaviour of the proposed design, an eight bit asynchronous counter is designed to layout level. …”
    Get full text
    Article
  8. 948

    Dijital Eşitsizliğin Hibrit Eğitimdeki Yansımaları by Mehmet Toplu, Elif Çevik

    Published 2023-12-01
    “…Hibrit eğitimde dijital eşitsizliğin boyutlarını derinlemesine anlamak ve bu sorunla etkili bir şekilde mücadele etmek için alan yazına katkı sağlamak amaçlanmaktadır.Yöntem: Bu çalışmada hibrit eğitimde dijital eşitsizlik, Bilgi ve İletişim Teknolojileri (BİT) Gelişmişlik Endeksi, Türkiye İstatistik Kurumu (TÜİK) Hanehalkı Bilişim Teknolojileri Kullanım Araştırması, Ağa Hazırlık Endeksi gibi dijital eşitsizliğin belirlenmesinde kullanılan yaklaşımlarla birlikte değerlendirilmiştir. …”
    Get full text
    Article
  9. 949

    ALBERTA: ALgorithm-Based Error Resilience in Transformer Architectures by Haoxuan Liu, Vasu Singh, Michal Filipiuk, Siva Kumar Sastry Hari

    Published 2025-01-01
    “…Results show that our approach achieves over 99&#x0025; coverage for errors (single bit-flip fault model) that result in a mismatch with <inline-formula><tex-math notation="LaTeX">$&lt; $</tex-math></inline-formula>0.2&#x0025; and <inline-formula><tex-math notation="LaTeX">$&lt; $</tex-math></inline-formula>0.01&#x0025; computation and memory overheads, respectively. …”
    Get full text
    Article
  10. 950

    Quantum secure patient login credential system using blockchain for electronic health record sharing framework by M. Natarajan, A. Bharathi, C. Sai Varun, Shitharth Selvarajan

    Published 2025-02-01
    “…The proposed scheme demonstrated enhanced security and performance, with IDEA achieving encryption in 58 ms and decryption in 278 ms for a 512-bit block, offering the best performance in terms of encryption speed.…”
    Get full text
    Article
  11. 951

    Isopods infesting Atlantic bonefish (Albula vulpes) host novel viruses, including reoviruses related to global pathogens, and opportunistically feed on humans by Tony L. Goldberg, Addiel U. Perez, Lewis J. Campbell

    “…During field collections, isopods aggressively bit humans, and blood meal analysis confirmed that isopods had fed on bonefish, other fish, and humans. …”
    Get full text
    Article
  12. 952

    An Efficient Detector for Automatic Tomato Classification Systems by Duy-Linh Nguyen, Xuan-Thuy Vo, Adri Priadana, Jehwan Choi, Kang-Hyun Jo

    Published 2025-01-01
    “…The video demonstration, datasets, weights, and models are available at <uri>https://bit.ly/3XdLrLM</uri>.…”
    Get full text
    Article
  13. 953

    A Study of an IT-Assisted Higher Education Model Based on Distributed Hardware-Assisted Tracking Intervention by Haijun Liu

    Published 2022-01-01
    “…The model dynamically adjusts the bit rate by referring to the broadband estimation and cache occupancy data to ensure users have a smooth experience effect. …”
    Get full text
    Article
  14. 954

    Effect of synchronization system errors on the reception noise immunity of amplitude-phase shift keyed signals by G. V. Kulikov, X. Kh. Dang, A. G. Kulikov

    Published 2023-06-01
    “…The dependencies of the bit error probability on the magnitude of the phase shift and the clock offset were characterized. …”
    Get full text
    Article
  15. 955

    Ethiopian Water Hyacinth Leaf Extract as a Potential Tannery Effluent Treatment Material by Fitsum Etefa Ahmed, Awoke Fenta Wodag, Gemeda Gebino Gelebo, Belay Meles Gebre

    Published 2022-01-01
    “…Though some researchers have tried to use this extract for the same, the researchers have experimented only to treat that of Cr3+ and there are a bit of difference in the methodology they followed. …”
    Get full text
    Article
  16. 956

    Qualitative and quantitative evaluations of topography for CAD/CAM all ceramic zirconia after different surface treatments by Sazan M. Azeez, Shatha A. Salih

    Published 2019-06-01
    “…Results: Stereomicroscopic images revealed that the grinded specimen showed grooves and scratches, reglazed surface showed the same criteria as control with a little bit more evidence of irregularities. While polished specimen appeared smoother and more homogeneity. …”
    Get full text
    Article
  17. 957

    Variable Is Better Than Invariable: Sparse VSS-NLMS Algorithms with Application to Adaptive MIMO Channel Estimation by Guan Gui, Zhang-xin Chen, Li Xu, Qun Wan, Jiyan Huang, Fumiyuki Adachi

    Published 2014-01-01
    “…At last, to verify the effectiveness of the proposed algorithms for ASCE, several selected simulation results are shown to prove that the proposed sparse VSS-NLMS algorithms can achieve better estimation performance than the conventional methods via mean square error (MSE) and bit error rate (BER) metrics.…”
    Get full text
    Article
  18. 958

    A chaotic digital signature algorithm based on a dynamic substitution box by Rolando Flores-Carapia, Víctor Manuel Silva-García, Manuel Alejandro Cardona-López, Miguel Gabriel Villarreal-Cervantes

    Published 2025-01-01
    “…In addition, to enhance security, this work uses a 2048-bit prime, double the length frequently used. This proposal induces chaotic behavior in the signature, making it highly sensitive to any changes in the signer’s private key or message content, thereby enhancing authentication and integrity verification. …”
    Get full text
    Article
  19. 959

    A deep learning-driven multi-layered steganographic approach for enhanced data security by Yousef Sanjalawe, Salam Al-E’mari, Salam Fraihat, Mosleh Abualhaj, Emran Alzubi

    Published 2025-02-01
    “…A novel multi-layered steganographic framework is proposed, integrating Huffman coding, Least Significant Bit (LSB) embedding, and a deep learning-based encoder–decoder to enhance imperceptibility, robustness, and security. …”
    Get full text
    Article
  20. 960

    Design of 10T SRAM cell with improved read performance and expanded write margin by Ashish Sachdeva, V. K. Tomar

    Published 2021-01-01
    “…Furthermore, the read and write delay of projected topology improve by 1.78× and 2.326× in comparison with conventional 6T bit SRAM cell. In FF process corner, the proposed topology shows lowest data retention voltage (DRV) and minimum variation in DRV with temperature. …”
    Get full text
    Article