-
941
A New Chaotic Color Image Encryption Algorithm Based on Memristor Model and Random Hybrid Transforms
Published 2025-01-01“…By integrating both pixel-level and bit-level diffusion, the randomness of the image information distribution is significantly increased. …”
Get full text
Article -
942
Smart Contract Penyimpanan Data Genetika Manusia Berbiaya Murah pada Blockchain Ethereum
Published 2024-07-01“…Hasil pengujian menjalankan smart contract pada blockchain Ethereum yang hanya menyimpan signature data genetik ini menunjukkan biaya gas yang sangat efisien karena hanya menyimpan 256 bit saja dari data genetik riilnya yang dapat mencapai giga byte.…”
Get full text
Article -
943
Demonstration of high-reconfigurability and low-power strong physical unclonable function empowered by FeFET cycle-to-cycle variation and charge-domain computing
Published 2025-01-01“…Remarkably, our PUF achieves near-ideal reconfigurability and ultra-low 1.89fJ per bit readout energy, significantly outperforming the state-of-the-art PUFs. …”
Get full text
Article -
944
On the Optimum Detection of MIMO-SVD Signals With Strong Nonlinear Distortion Effects at the Transmitter
Published 2025-01-01“…It also provides an approximate bound on the achievable ML Bit Error Rate (BER) performance. Our results indicate that the proposed receiver can have a performance close to the ML receiver with just a few iterations.…”
Get full text
Article -
945
Optimized Wideband Beamforming for mm-wave Communication Systems with Intelligent Reflecting Surfaces
Published 2024-12-01“…The results showed that the use of phase shift TD phase shift (PTDP) resulted in a 54% increase in data rate compared to the conventional design in the beam splitting case at IRS. The use of only two-bit phase shifters in the proposed PTDP is sufficient for near-optimal performance of the system's ability to focus the signal in the desired direction through the precoding technique, through which the losses caused by beam splitting can be compensated. …”
Get full text
Article -
946
New hash function based on C-MD structure and chaotic neural network
Published 2023-06-01“…In recent years, widely used hash algorithms such as MD5 and SHA-1 have been found to have varying degrees of security risks.The iterative structure of the SHA-2 algorithm is similar to that of SHA-1, making it vulnerable to attacks as well.Meanwhile, SHA-3 has a complex internal structure and low implementation efficiency.To address these issues, a keyed hash function was designed and implemented based on chaotic neural network and C-MD structure.The approach involved improving the Merkle-Damgard structure by proposing the chaotic neural network Merkle-Damgard (C-MD) structure.This structure can be used to design a hash function that can withstand attacks such as the middle attack, multiple collision attack, and second pre-image attack for long information.Besides, the chaotic neural network was used as the compression function to increase the complexity of the hash function and improve its collision resistance, while also enabling it to output multiple lengths.Moreover, a plaintext preprocessor was designed, which used the coupled image lattice to generate chaos sequence related to the length of the plaintext to fill the plaintext, thus enhancing the ability of the hash function to resist length expansion attacks.Simulation results demonstrate that the proposed hash function performs faster than SHA-2, SHA-3 and the same type of chaotic hash function proposed by Teh et al.It can resist second pre-image attack, multi-collision attack and differential attack, while also exhibiting better collision resistance and mapping uniformity.In addition, the proposed Hash function can output Hash values of different lengths, making it suitable for use in digital signature, key generation, Hash-based message authentication code, deterministic random bit generator, and other application fields.…”
Get full text
Article -
947
A Modified Implementation of Tristate Inverter Based Static Master-Slave Flip-Flop with Improved Power-Delay-Area Product
Published 2014-01-01“…To validate the correct behaviour of the proposed design, an eight bit asynchronous counter is designed to layout level. …”
Get full text
Article -
948
Dijital Eşitsizliğin Hibrit Eğitimdeki Yansımaları
Published 2023-12-01“…Hibrit eğitimde dijital eşitsizliğin boyutlarını derinlemesine anlamak ve bu sorunla etkili bir şekilde mücadele etmek için alan yazına katkı sağlamak amaçlanmaktadır.Yöntem: Bu çalışmada hibrit eğitimde dijital eşitsizlik, Bilgi ve İletişim Teknolojileri (BİT) Gelişmişlik Endeksi, Türkiye İstatistik Kurumu (TÜİK) Hanehalkı Bilişim Teknolojileri Kullanım Araştırması, Ağa Hazırlık Endeksi gibi dijital eşitsizliğin belirlenmesinde kullanılan yaklaşımlarla birlikte değerlendirilmiştir. …”
Get full text
Article -
949
ALBERTA: ALgorithm-Based Error Resilience in Transformer Architectures
Published 2025-01-01“…Results show that our approach achieves over 99% coverage for errors (single bit-flip fault model) that result in a mismatch with <inline-formula><tex-math notation="LaTeX">$< $</tex-math></inline-formula>0.2% and <inline-formula><tex-math notation="LaTeX">$< $</tex-math></inline-formula>0.01% computation and memory overheads, respectively. …”
Get full text
Article -
950
Quantum secure patient login credential system using blockchain for electronic health record sharing framework
Published 2025-02-01“…The proposed scheme demonstrated enhanced security and performance, with IDEA achieving encryption in 58 ms and decryption in 278 ms for a 512-bit block, offering the best performance in terms of encryption speed.…”
Get full text
Article -
951
Isopods infesting Atlantic bonefish (Albula vulpes) host novel viruses, including reoviruses related to global pathogens, and opportunistically feed on humans
Get full text
Article -
952
An Efficient Detector for Automatic Tomato Classification Systems
Published 2025-01-01“…The video demonstration, datasets, weights, and models are available at <uri>https://bit.ly/3XdLrLM</uri>.…”
Get full text
Article -
953
A Study of an IT-Assisted Higher Education Model Based on Distributed Hardware-Assisted Tracking Intervention
Published 2022-01-01“…The model dynamically adjusts the bit rate by referring to the broadband estimation and cache occupancy data to ensure users have a smooth experience effect. …”
Get full text
Article -
954
Effect of synchronization system errors on the reception noise immunity of amplitude-phase shift keyed signals
Published 2023-06-01“…The dependencies of the bit error probability on the magnitude of the phase shift and the clock offset were characterized. …”
Get full text
Article -
955
Ethiopian Water Hyacinth Leaf Extract as a Potential Tannery Effluent Treatment Material
Published 2022-01-01“…Though some researchers have tried to use this extract for the same, the researchers have experimented only to treat that of Cr3+ and there are a bit of difference in the methodology they followed. …”
Get full text
Article -
956
Qualitative and quantitative evaluations of topography for CAD/CAM all ceramic zirconia after different surface treatments
Published 2019-06-01“…Results: Stereomicroscopic images revealed that the grinded specimen showed grooves and scratches, reglazed surface showed the same criteria as control with a little bit more evidence of irregularities. While polished specimen appeared smoother and more homogeneity. …”
Get full text
Article -
957
Variable Is Better Than Invariable: Sparse VSS-NLMS Algorithms with Application to Adaptive MIMO Channel Estimation
Published 2014-01-01“…At last, to verify the effectiveness of the proposed algorithms for ASCE, several selected simulation results are shown to prove that the proposed sparse VSS-NLMS algorithms can achieve better estimation performance than the conventional methods via mean square error (MSE) and bit error rate (BER) metrics.…”
Get full text
Article -
958
A chaotic digital signature algorithm based on a dynamic substitution box
Published 2025-01-01“…In addition, to enhance security, this work uses a 2048-bit prime, double the length frequently used. This proposal induces chaotic behavior in the signature, making it highly sensitive to any changes in the signer’s private key or message content, thereby enhancing authentication and integrity verification. …”
Get full text
Article -
959
A deep learning-driven multi-layered steganographic approach for enhanced data security
Published 2025-02-01“…A novel multi-layered steganographic framework is proposed, integrating Huffman coding, Least Significant Bit (LSB) embedding, and a deep learning-based encoder–decoder to enhance imperceptibility, robustness, and security. …”
Get full text
Article -
960
Design of 10T SRAM cell with improved read performance and expanded write margin
Published 2021-01-01“…Furthermore, the read and write delay of projected topology improve by 1.78× and 2.326× in comparison with conventional 6T bit SRAM cell. In FF process corner, the proposed topology shows lowest data retention voltage (DRV) and minimum variation in DRV with temperature. …”
Get full text
Article