Showing 12,281 - 12,300 results of 16,001 for search '"bit"', query time: 0.38s Refine Results
  1. 12281

    Fully printed electronics on flexible substrates : high gain amplifiers and DAC by Chang, Joseph Sylvester, Zhang, Xi, Ge, Tong, Zhou, Jia

    Published 2014
    “…Several analog and mixed-signal circuits are demonstrated, including proposed and conventional differential amplifiers, and a charge-redistribution 4-bit digital-to-analog converter (DAC). The proposed amplifier embodies a novel positive-cum-negative feedback to simultaneously significantly improve the gain and reduce susceptibility to process variations. …”
    Get full text
    Get full text
    Journal Article
  2. 12282

    Unimodal model-based inter mode decision for high efficiency video coding by Zeng, Huanqiang, Xiang, Wenjie, Chen, Jing, Cai, Canhui, Ni, Zhangkai, Ma, Kai-Kuang

    Published 2019
    “…The extensive simulation results have shown that the proposed UMIMD algorithm is able to individually achieve a significant reduction on computational complexity at the encoder by 61.9% and 64.2% on average while incurring only 1.7% and 2.1% increment on the total Bjontegaard delta bit rate (BDBR) for the low delay and random access test conditions, compared with the exhaustive mode decision in the HEVC. …”
    Get full text
    Get full text
    Get full text
    Journal Article
  3. 12283

    Sequence design for cognitive CDMA communications under arbitrary spectrum hole constraint by Hu, Su, Liu, Zilong, Guan, Yong Liang, Xiong, Wenhui, Bi, Guoan, Li, Shaoqian

    Published 2015
    “…Simulations show that they give rise to single-user bit-error-rate performance in CR-CDMA systems which outperform traditional noncontiguous multicarrier CDMA and transform domain communication systems; they also lead to CR-CDMA systems which are more resilient than non-contiguous OFDM systems to spectrum sensing mismatch, due to the wideband spreading.…”
    Get full text
    Get full text
    Get full text
    Journal Article
  4. 12284

    Detecting adversarial examples for deep neural networks via layer directed discriminative noise injection by Wang, Si, Liu, Wenye, Chang, Chip-Hong

    Published 2020
    “…The approach is evaluated on the ImageNet Dataset with 8-bit truncated models for the state-of-the-art DNN architectures. …”
    Get full text
    Conference Paper
  5. 12285

    Capacity-achieving MIMO-NOMA : iterative LMMSE detection by Liu, Lei, Chi, Yuhao, Yuen, Chau, Guan, Yong Liang, Li, Ying

    Published 2020
    “…Numerical results shows that the bit error rate performance of the proposed iterative LMMSE detection outperforms the state-of-art methods and is within 0.8dB from the associated capacity limit.…”
    Get full text
    Journal Article
  6. 12286
  7. 12287

    Secret sharing with binary shares by Lin, Fuchun, Cheraghchi, Mahdi, Guruswami, Venkatesan, Safavi-Naini, Reihaneh, Wang, Huaxiong

    Published 2020
    “…In this work, we study secret sharing in the extremal case of bit-long shares and arbitrarily small gap ratio g/N, where standard ramp secret sharing becomes impossible. …”
    Get full text
    Journal Article
  8. 12288
  9. 12289

    Fired neuron rate based decision tree for detection of adversarial examples in DNNs by Wang, Si, Liu, Wenye, Chang, Chip-Hong

    Published 2020
    “…Effectiveness of the method is validated on the ImageNet dataset with 8-bit truncated models for the state-of-the-art DNN architectures. …”
    Get full text
    Conference Paper
  10. 12290

    On approximating matrix norms in data streams by Li, Yi, Nguyẽn, Huy L., Woodruff, David P.

    Published 2021
    “…Both kinds of space complexities, bit complexity and sketching dimension, are considered. …”
    Get full text
    Journal Article
  11. 12291

    Practical side-channel based model extraction attack on tree-based machine learning algorithm by Jap, Dirmanto, Yli-Mäyry, Ville, Ito, Akira, Ueno, Rei, Bhasin, Shivam, Homma, Naofumi

    Published 2021
    “…It has been shown in a recent publication, that Bonsai, a small tree-based algorithm, can be successfully fitted in a small 8-bit microcontroller. However, the security of machine learning algorithm has also been a major concern, especially with the threat of secret parameter recovery which could lead to breach of privacy. …”
    Get full text
    Conference Paper
  12. 12292

    Deep learning-based end-to-end receiver for the NOMA system by Liu, Yifan

    Published 2021
    “…Results discussed in Chapter four show that II BPNN and RNN methods outperform conventional methods, with a lower bit-error rate (BER) at same signal-to-noise ratio (SNR). …”
    Get full text
    Thesis-Master by Coursework
  13. 12293

    Crossbar-constrained technology mapping for ReRAM based in-memory computing by Bhattacharjee, Debjyoti, Tavva, Yaswanth, Easwaran, Arvind, Chattopadhyay, Anupam

    Published 2021
    “…To support the ReVAMP architecture, we present two technology mapping flows that fully exploit the bit-level parallelism offered by the execution of logic using ReRAM crossbar array. …”
    Get full text
    Journal Article
  14. 12294

    An integrated multi-channel biopotential recording analog front-end IC with area-efficient driven-right-leg circuit by Tang, Tao, Goh, Wang Ling, Yao, Lei, Cheong, Jia Hao, Gao, Yuan

    Published 2022
    “…The proposed AFE includes 10 channels of low-noise capacitive coupled instrumentation amplifier (CCIA), one shared 10-bit SAR ADC and a fully integrated DRL to enhance the system-level common-mode rejection ratio (CMRR). …”
    Get full text
    Journal Article
  15. 12295

    Will you cross the threshold for me? Generic side-channel assisted chosen-ciphertext attacks on NTRU-based KEMs by Ravi, Prasanna, Ezerman, Martianus Frederic, Bhasin, Shivam, Chattopadhyay, Anupam, Sinha Roy, Sujoy

    Published 2022
    “…We perform experimental validation of the attacks on optimized and unprotected implementations of NTRU-based schemes, taken from the open-source pqm4 library, using the EM-based side-channel on the 32-bit ARM Cortex-M4 microcontroller. All of our proposed attacks are capable of recovering the full secret key in only a few thousand chosen ciphertext queries on all parameter sets of NTRU and NTRU Prime. …”
    Get full text
    Journal Article
  16. 12296

    A comparative study on temporal phase unwrapping methods in high-speed fringe projection profilometry by He, Xiaoyu, Qian, Kemao

    Published 2022
    “…This paper compares the accuracy of the two-frequency (TF), phase coding (PC), and gray code (GC) methods with different situations, including the traditional 8-bit focused FPP (aFPP), the high-speed binary defocused FPP (bFPP), and the geometry/continuity constrained binary defocused FPP (cFPP). …”
    Get full text
    Journal Article
  17. 12297

    High-speed and energy-efficient carry look-ahead adder by Balasubramanian, Padmanabhan, Mastorakis, Nikos E.

    Published 2022
    “…Many adders ranging from ripple carry to parallel-prefix adders were implemented using a 32-28 nm CMOS standard digital cell library by considering a 32-bit addition. The adders were structurally described in Verilog and synthesized using Synopsys Design Compiler. …”
    Get full text
    Journal Article
  18. 12298

    Digital image blending by inexact multiplication by Balasubramanian, Padmanabhan, Nayar, Raunaq, Min, Okkar, Maskell, Douglas L.

    Published 2022
    “…Towards this, we describe how an exact array multiplier can be made inexact by introducing vertical cut(s) in it and assigning distinct combinations of binary values to the dangling inputs and product bits. We considered many 8-bit digital images for blending and the blended images obtained using exact and inexact multipliers are shown, which demonstrates the usefulness of inexact multiplication for image blending. …”
    Get full text
    Journal Article
  19. 12299

    Mitigation of corner polysilicon residues through nitride liner etch relocation by Zheng, Zhe

    Published 2023
    “…In 3D NAND, a vertical polysilicon channel connects the source line and bit line. In the previous technologies, the contact between the pillar and the source polysilicon was performed by dry etching by punching a hole in the pillar bottom. …”
    Get full text
    Thesis-Master by Coursework
  20. 12300

    Investigation on the security of stored data in emerging non-volatile memory devices using AFM- based techniques by Tay, Jing Yun

    Published 2023
    “…Next, deprocessing steps such as chemical etching and reactive ion etching will be developed to access the data storage layer of the RRAM/MRAM where the devices store their data depending on the resistance state, which corresponds to the binary bit of ‘1’ or ‘0’. Then, the AFM technique such as conductive probe AFM (CP-AFM), using a constant dc bias, will be used to scan across the sample’s surface and directly probe on the data storage layer to measure the current and thus its resistance. …”
    Get full text
    Thesis-Master by Research