-
461
-
462
Symbol-error performance and bit-error performance of QAM signalling
Published 2022“…Using MATLAB simulation, this project will evaluate the performance of the various modulation schemes under the channel conditions mentioned above by comparing the bit error rates (BER) and symbol error rates (SER) results obtained through the simulation.…”
Get full text
Final Year Project (FYP) -
463
16-bit low-power CMOS multiplier IC design
Published 2022“…Finally, four kinds of 16-bit multipliers are designed. Two different optimization approaches to multiplication are explored. …”
Get full text
Thesis-Master by Coursework -
464
Application of convolutional neural network to defect diagnosis of drill bits
Published 2023“…In this study, a convolutional neural network (CNN), a deep-learning method, is applied to the defect diagnosis of drill bits. Four drill bits with different health conditions were used to drill holes in an aluminum block, and a vibration sensor collected the signals. …”
Get full text
Journal Article -
465
Ethernet module design for a 32-bit micro controller
Published 2008“…An Ethernet module for a 32-bit micro-controller was designed and developed as a hard macro IP. …”
Get full text
Thesis -
466
Enabling standardized cryptography on ultra-constrained 4-bit microcontrollers
Published 2013“…4-bit microcontrollers (MCUs) are among the simplest, cheapest and most abundant computing devices that, thanks to their low power consumption, may be deployed even in passive RFID tags. …”
Get full text
Get full text
Conference Paper -
467
Feasibility and practicability of standardized cryptography on 4-bit micro controllers
Published 2013“…Myriads of ultra-constrained 4-bit micro controllers (MCUs) are deployed in (mostly) legacy devices, some in security sensitive applications, such as remote access and control systems or all sort of sensors. …”
Get full text
Get full text
Conference Paper -
468
256 bit standardized crypto for 650 GE – GOST revisited
Published 2012“…Our post-synthesis figures for an ASIC implementation of GOST with a key-length of 256 bits require only 800 GE, which makes this implementation well suitable for low-cost passive RFID-tags. …”
Get full text
Get full text
Journal Article -
469
Improving the security of LBlock lightweight algorithm using bit permutation
Published 2013“…LBlock uses word permutation to do the diffusion while this research uses bit permutation to increase the number of active Substitution box (S-box). …”
Get full text
Get full text
Proceeding Paper -
470
-
471
-
472
-
473
Unrestricted termination and non-termination arguments for bit-vector programs
Published 2015Conference item -
474
-
475
Quantum random bit generation using stimulated Raman scattering.
Published 2011“…The use of phase offers robustness to classical pump noise and the ability to generate multiple bits per measurement. The Stokes light is generated with high intensity and as a result, fast detectors with high signal-to-noise ratios can be used for measurement, eliminating the need for single-photon sensitive devices. …”
Journal article -
476
"Privacy is the boring Bit": User perceptions and behaviour in the Internet-of-Things
Published 2018Conference item -
477
The Number of Bits Needed to Represent a Unit Disk Graph.
Published 2010“…We also show that dn bits always suffice, for some d>1. © 2010 Springer-Verlag.…”
Journal article -
478
Behavior of l-bits near the many-body localization transition
Published 2018“…Eigenstates of fully many-body localized (FMBL) systems are described by quasilocal operators τzi (l-bits), which are conserved exactly under Hamiltonian time evolution. …”
Journal article -
479
-
480
An Efficient Architecture of 8-Bit CMOS Analog-To-Digital Converter
Published 2000“…An 8-bit CMOS analog-to-digital converter (ADC) has been designed by using a more efficient architecture, which is known as the simplified multistep flash architecture. …”
Get full text
Thesis