Showing 13,801 - 13,820 results of 16,001 for search '"bit"', query time: 0.14s Refine Results
  1. 13801

    Simulation of gas filled head-disk interface for future extremely high density magnetic recording by Seet, Isabel Yi Wen.

    Published 2012
    “…To meet the demand of consumer for an increased storage capacity, the bits on the platters needs to be made smaller. As the bits are smaller, the read/write heads need to be flying very close to the surface of the platters. …”
    Get full text
    Final Year Project (FYP)
  2. 13802

    Secured HF image transmission system by Shameri, Ahmad Zuri

    Published 2006
    “…An AES (Advanced Encryption Standard) block is cipher is used for both authentication and key distribution with key length 256 bits and 128 bits respectively. For confidentiality, stream cipher algorithm used is based on the linear feedback register (LFSR) and a nonlinear combining function. …”
    Get full text
    Monograph
  3. 13803

    FPGA Implementation of a Cryptographically-Secure PUF Based on Learning Parity with Noise by Chenglu Jin, Charles Herder, Ling Ren, Phuong Ha Nguyen, Benjamin Fuller, Srinivas Devadas, Marten van Dijk

    Published 2017-12-01
    “…Our simplifications allow for a dramatic reduction in area by making a mild security assumption on ring oscillator physical obfuscated key output bits.…”
    Get full text
    Article
  4. 13804

    Detectability Improved Tamper Detection Scheme for Absolute Moment Block Truncation Coding Compressed Images by Wien Hong, Xiaoyu Zhou, Der-Chyuan Lou, Xiaoqin Huang, Cancan Peng

    Published 2018-08-01
    “…Meanwhile, the most significant bits of QLs are symmetrically perturbed to generate the candidates of ACs. …”
    Get full text
    Article
  5. 13805

    Spectral and Energy Efficiency of Distributed Massive MIMO with Low-Resolution ADC by Jiamin Li, Qian Lv, Jing Yang, Pengcheng Zhu, Xiaohu You

    Published 2018-12-01
    “…Furthermore, low-resolution ADCs with 3 or 4 bits outperform perfect ADCs in energy efficiency. …”
    Get full text
    Article
  6. 13806

    An Enhanced Adaptive Block Truncation Coding with Edge Quantization Scheme by Ching-Nung Yang, Yung-Chien Chou, Tao-Ku Chang, Cheonshik Kim

    Published 2020-10-01
    “…However, it is observed that ABTC-EQ uses 2 bits to represent the index of three clusters in a block. …”
    Get full text
    Article
  7. 13807

    Bi-GRU Enhanced Cost-Effective Memory-Aware End-to-End Learning for Geometric Constellation Shaping in Optical Coherent Communications by Zhiyang Liu, Xiaoyu Liu, Shilin Xiao, Weiying Yang, Weisheng Hu

    Published 2024-01-01
    “…Results show that the proposed bi-GRU based GCS scheme can achieve a performance gain over square 64QAM in mutual information (MI) with 0.12 bits/symbol and a Q-factor gain of 0.4 dB at optimal launched optical power. …”
    Get full text
    Article
  8. 13808

    Reversible Data Hiding for AMBTC Compressed Images Based on Matrix and Hamming Coding by Chia-Chen Lin, Juan Lin, Chin-Chen Chang

    Published 2021-01-01
    “…To achieve our objective, for the first layer, four disjoint sets using different combinations of the mean value (AVG) and the standard deviation (VAR) are derived according to the combination of secret bits and the corresponding bitmap, following Lin et al.’s method. …”
    Get full text
    Article
  9. 13809

    Perancangan Sistem Kontrol CNC Pengebor PCB Otomatis Berbasis Raspberry PI by Eka Satrio, Koko Joni, Kunto Aji Wibisono

    Published 2021-05-01
    “…As well as before drilling, the installation of drill bits must be precise so that at the time of spinning, the drill bits do not shake.…”
    Get full text
    Article
  10. 13810

    Linear Layer Architecture Based on Cyclic Shift and XOR by Lev Gorlov, Maksim Iavich, Razvan Bocu

    Published 2023-07-01
    “…One of the nodes of a block symmetric encryption algorithm is represented by a linear layer, the purpose of which is to distribute the mutual influence of bits within the processed data block. Several methods exist for constructing a linear layer, the most common of which are matrix multiplication operations and the permutation of bits. …”
    Get full text
    Article
  11. 13811

    Improving the Signal-to-Noise Ratio of Photonic Frequency Conversion from 852 nm to 1560 nm Based on a Long-Wavelength Laser-Pumped PPLN Waveguide Module by Miao Guo, Kong Zhang, Yunhao Zhang, Jun He, Junmin Wang

    Published 2022-12-01
    “…The storage wavelength of quantum nodes based on atomic systems does not match the wavelength of optical fiber communication, which requires the establishment of an efficient conversion system between flying bits and storage bits. In this paper, based on the nonlinear wavelength conversion technology of the periodically poled lithium niobate waveguide, a low-noise conversion of 852-nm photons to 1560-nm photons was achieved by a 1878-nm pump laser. …”
    Get full text
    Article
  12. 13812

    A lower bound on the queueing delay in resource constrained load balancing by Gamarnik, David, Tsitsiklis, John N, Zubeldia, Martin

    Published 2021
    “…We study the fundamental resource requirements (memory bits and message exchange rate), in order to drive the expected queueing delay in steadystate of a typical job to zero, as n increases. …”
    Get full text
    Article
  13. 13813

    Stochastic inner product core for digital FIR filters by Hijazin, Ismat, Wong, Ming Ming, Wong, Dennis, Zhang, Cishen

    Published 2018
    “…As a result, an SC based FIR digital FIR filter is implemented on Altera Cyclone V FPGA which operates on stochastic sequences of 256-bits length (8-bits precision level). Experimental results show that the developed filter has lower hardware cost, better accuracy and higher fault tolerance level compared with other stochastic implementations.…”
    Get full text
    Get full text
    Get full text
    Journal Article
  14. 13814

    New Jochemsz–May Cryptanalytic bound for RSA system utilizing common Modulus N = p2q by Adenan, Nurul Nur Hanisah, Ariffin, Muhammad Rezal Kamel, Sapar, Siti Hasana, Abd Ghafar, Amir Hamzah, Asbullah, Muhammad Asyraf

    Published 2021
    “…Based on the two key equations e1d1 − k1φ(N) = 1 and e2d2 − k2φ(N) = 1 where φ(N) = p(p − 1)(q − 1), our attack works when the primes share a known amount of least significant bits (LSBs) and the private exponents share an amount of most significant bits (MSBs). …”
    Article
  15. 13815

    A comparison of discrete cosine transform and discrete wavelet transform algorithm in watermarking against common attacks by Said, Mohamed Abdisalan

    Published 2015
    “…With DCT, the watermark bits were embedded into the mid-band coefficients of the DCT in the cover image where the DWT algorithm was embedded the watermark bits into the horizontal and vertical sub-bands of DWT in the cover image. …”
    Get full text
    Get full text
    Get full text
    Thesis
  16. 13816

    A new method to increase the capacity of audio steganography based on the LSB algorithm by Bazyar, Mohsen, Sudirman, Rubita

    Published 2015
    “…The secret message bits are hidden into variable and multiple LSBs layer in this method. …”
    Get full text
    Article
  17. 13817

    Genetic algorithm for fragile audio watermarking by Zamani, Mazdak, Abdul Manaf, Azizah

    Published 2015
    “…A novel genetic-concept-based algorithm is proposed for fragile audio watermarking to reduce the distortion of least significant bits substitution and consequently improve the peak signal-to-noise ratio (PSNR) and increase the payload of results. …”
    Article
  18. 13818

    Bilateral Investment Treaties and the Increase in Egyptian Appearances Before International Arbitration Tribunals by Elfakharani, Ashraf M. A., Abdul Rahman, Rohana, Albaheth, Hamza E., Abdullah, Nor Anita

    Published 2021
    “…Bilateral investment treaties (BITs) are thus agreements which monitor investment relations between any two signatory states to safeguard their interests in terms of overseas investments by providing safety to all their foreign investors…”
    Get full text
    Article
  19. 13819

    Porting Rulex Software to the Raspberry Pi for Machine Learning Applications on the Edge by Ali Walid Daher, Ali Rizik, Marco Muselli, Hussein Chible, Daniele D. Caviglia

    Published 2021-09-01
    “…Specifically, we explain the porting Rulex’s libraries on Windows 32 Bits, Ubuntu 64 Bits, and Raspbian 32 Bits. Therefore, with the aim of carrying out an in-depth verification of the application possibilities, we propose to perform forecasts on five unrelated datasets from five different applications, having varying sizes in terms of the number of records, skewness, and dimensionality. …”
    Get full text
    Article
  20. 13820

    Method of information protection based on the integration of probabilistic encryption and noise immune coding by Volodymyr Korchynskyi, Valerii Hordiichuk, Vitalii Kildishev, Oleksandr Riabukha, Sergii Staikutsa, Khaled Alfaiomi

    Published 2023-12-01
    “…The tasks to be solved are as follows: to develop a probabilistic encryption algorithm that considers the entropy of the characters’ appearance in a message; to implement iterative coding with variable parameters of the information bits matrix; and to implement error decorrelation based on the generated matrix by interleaving information and check bits according to a given algorithm. …”
    Get full text
    Article