-
13921
Circularly Polarized Hybrid Dielectric Resonator Antennas: A Brief Review and Perspective Analysis
Published 2021-06-01Get full text
Article -
13922
Effect of Variable Viscosity on MHD Inclined Arterial Blood Flow with Chemical Reaction
Published 2018-08-01Get full text
Article -
13923
Microneedles-based drug delivery strategies: A breakthrough approach for the management of pain
Published 2022-11-01Get full text
Article -
13924
Performance Analysis of an R744 Supermarket Refrigeration System Integrated with an Organic Rankine Cycle
Published 2023-11-01Get full text
Article -
13925
-
13926
Cracking the Curious Case of the Cascade Protocol
Published 2023-01-01“…Quantum Key Distribution is one of its integral parts and it necessarily requires the usage of an information reconciliation protocol to correct the errors present in the key bits transmitted via the physical system involved. …”
Get full text
Article -
13927
Tangled Circuits: Characterizing Errors in Experimental Superconducting Quantum Processors
Published 2023“…As progress is made towards the first generation of error-corrected quantum computers based on physical quantum bits (qubits), researchers require robust techniques for designing, operating, and characterizing coupled multi-qubit systems in the laboratory, and for understanding the errors which arise in such systems. …”
Get full text
Get full text
Thesis -
13928
Digital pulse width modulator for high-speed DC-DC converters
Published 2018“…The DPWM generator operates at a supply voltage of 1.2V with a 5 bits resolution and runs at a high speed of 100MHz. …”
Get full text
Final Year Project (FYP) -
13929
Silently disabling ECUs and enabling blind attacks on the CAN bus
Published 2022“…Performing this attack requires the ability to flip bits on the bus, but not with any level of sophistication. …”
Conference item -
13930
Simple communication complexity separation from quantum state antidistinguishability
Published 2020“…If the conjecture holds, then there is a two-player communication task that can be solved with log <i>d</i> qubits, but requires exact one-way communication of Ω (<i>d</i> log <i>d</i>) classical bits.…”
Journal article -
13931
Ownership authentication by digital image watermarking based on block truncation coding
Published 2013“…In proposed method, considering the texture sub blocks and Least Significant Bits (LSBs of higher mean value and lower mean value) substitution combine together for designing improved the BTC watermarking scheme. …”
Get full text
Thesis -
13932
Publisher Correction: Solution proposal for completed preference structure in ORESTE method
Published 2023-04-01Get full text
Article -
13933
Recovering Secrets From Prefix-Dependent Leakage
Published 2020-06-01“…We discuss how to recover a secret bitstring given partial information obtained during a computation over that string, assuming the computation is a deterministic algorithm processing the secret bits sequentially. That abstract situation models certain types of side-channel attacks against discrete logarithm and RSA-based cryptosystems, where the adversary obtains information not on the secret exponent directly, but instead on the group or ring element that varies at each step of the exponentiation algorithm.…”
Get full text
Article -
13934
How Well Can We Infer Selection Benefits and Mutation Rates from Allele Frequencies?
Published 2023-04-01“…We calculate limits to their ability in the context of the Wright-Fisher model by first finding the maximal amount of information that can be acquired using allele frequencies about the mutation rate and selection coefficient– at least 2 bits per allele– and then by finding how the organisms would have shaped their mutation rates and selection coefficients so as to maximize the information transfer.…”
Get full text
Article -
13935
Libraries, the long tail and the future of legacy print collections
Published 2021“…Anderson’s long tail theory is an attempt to explain the changes that have occurred to markets as both the records of trade (that is, inventories and catalogues) and the traded items themselves, have become digital rather than physical (or in Anderson’s terms, bits rather than atoms).…”
Get full text
Journal Article -
13936
A secure audio steganography approach
Published 2009“…Using the proposed genetic algorithm, message bits are embedded into multiple, vague and higher LSB layers, resulting in increased robustness.…”
Get full text
Proceeding Paper -
13937
A secure audio steganography approach
Published 2009“…Using the proposed genetic algorithm, message bits are embedded into multiple, vague and higher LSB layers, resulting in increased robustness.…”
Conference or Workshop Item -
13938
Career distinction : stand out by building your brand /
Published 2007“…Understand the future of work -- Adopt the career distinction mindset -- Brand yourself for career success -- Know yourself to grow yourself -- Remember, it's what they think that counts -- Define your brand community -- Tell your brand story -- Create your career-marketing tools -- Express yourself -- Assess your online identity -- Build your brand in bits and bytes -- Be on-brand in all that you do -- Get a visual identity -- Increase your career karma -- Summary: evolve and resolve.…”
-
13939
B-VGG16: Binary Quantized Convolutional Neuronal Network for image classification
Published 2022-12-01“…Binarized neural networks reduce the amount of memory, and it is possible to implement them with less hardware than those that use real value variables (Floating Point 32 bits). This type of network can be implemented in embedded systems, such as FPGA. …”
Get full text
Article -
13940
Multi‐step incremental ADC with extended binary counting
Published 2016-04-01“…The second step reuses the single integrator and extends the accuracy to 18 bits by a binary counting technique. For the same accuracy, the conversion cycle is shortened by a factor of more than 28 as compared with the single‐step IADC.…”
Get full text
Article