-
14081
Effects of best land management practices on the structure, composition and diversity of woody vegetation in agroforestry parklands: case of Dan Saga and Tabofatt villages in Niger...
Published 2023-01-01“…In Dan Saga site, the results obtained show the significant effect of the practice of assisted natural tree regeneration on the density of trees (97 against 58 plants/ha for the control plots), on the basal area (3.04 against 1.98 m2/ha for the control plots), on regeneration (61.96% against 40.91% for the controls) and on floristic diversity (2.93 against 2.41 bits for the control plots) with a clear dominance of Combretaceae. …”
Get full text
Article -
14082
Spectral Efficiency Augmentation in Uplink Massive MIMO Systems by Increasing Transmit Power and Uniform Linear Array Gain
Published 2020-09-01“…Moreover, simulation results validate the proposed model that is implementable in real-time scenarios by realizing maximum SE of 12.79 bits/s/Hz in Line of Sight (LoS) and 12.69 bits/s/Hz in Non-Line of Sight (NLoS) scenarios, respectively. …”
Get full text
Article -
14083
A Hybrid Speller Design Using Eye Tracking and SSVEP Brain–Computer Interface
Published 2020-02-01“…Using this speller, we obtained an average classification accuracy of 90.35 ± 3.597% with an average ITR of 184.06 ± 12.761 bits per minute in a cued-spelling task and an ITR of 190.73 ± 17.849 bits per minute in a free-spelling task. …”
Get full text
Article -
14084
Heterogeneous Defect Prediction Algorithm Combined With Federated Sparse Compression
Published 2023-01-01“…Experiments on nine projects in three public databases (Relink, NASA, and AEEEM) show that FSC can effectively reduce the amount of communication bits.…”
Get full text
Article -
14085
Viewport-Dependent Delivery for Conversational Immersive Video
Published 2022-01-01“…Viewport-dependent delivery (VDD) is a mechanism for bandwidth savings by assigning more bits to the part of the 360-degree video currently in the viewport and fewer or no bits to the areas of the 360-degree video that a user does not currently view. …”
Get full text
Article -
14086
Iceberg Hashing: Optimizing Many Hash-Table Criteria at Once
Published 2023“…In fact, in the setting where keys are $\Theta(\log n)$ bits, the space guarantees that Iceberg hashing offers, namely that is uses at most $\log \binom{|U|}{n} + O(n \log \log n)$ bits to store $n$ items from a universe $U$, matches a lower bound by Demaine et al. that applies to any stable hash table. …”
Get full text
Article -
14087
Suppressing the Oblivious RAM timing channel while making information leakage and program efficiency trade-offs
Published 2015“…By reducing leakage to 16 bits, our scheme degrades in performance by 5% but gains in power efficiency by 3%. …”
Get full text
Get full text
Get full text
Get full text
Get full text
Article -
14088
An energy efficient radix-4 Booth encoding parallel multiplier design
Published 2023-04-01“…By improving the partial product module, the compensation bits in conventional multipliers are eliminated, which reduces the delay and energy cost of multiplier. …”
Get full text
Article -
14089
Implementation of steganographic software for hiding information in mpeg video files
Published 2023-01-01“…The method of least significant bits was used to hide the data, and error-correcting coding with binary cyclic codes was used to increase the stability of the embedded data. …”
Get full text
Article -
14090
Parallel Bidirectional Port for a Soft-core Microprocessor Designing a System
Published 2013-06-01“…This paper introduces a technique to design an bits bidirectional port to be connected with soft core microblaze processor system that is configurable on Spartan 3E slice. …”
Get full text
Article -
14091
A Novel LSB Matching Algorithm Based on Information Pre-Processing
Published 2021-12-01“…This paper analyzes random bits and scanned documents, two forms of secret data. …”
Get full text
Article -
14092
Research and simulation of timing attacks on ECC
Published 2016-04-01“…Based on the hidden Markov model (HMM) idea,a timing attack on the elliptic curve digital signature system,which adopted the “double-and-add” scalar multiplication,was proposed.Simulation experiments on the secure Koblitz curve which released by the National Institute of Standards Technology (NIST) were implemented and four secure Koblitz curves except the K-571 were attacked successfully.The experiment results show that the attack can recover almost all the key bits in a few minutes by collecting only once time data,and is easy to imple-ment at a high success rate.…”
Get full text
Article -
14093
Design and Implementation of a Speller based on EMG Signal
Published 2017-01-01“…The average values achieved for spelling rate was 12.12 characters/minute and ITR was 71.39 bits/minute.…”
Get full text
Article -
14094
Applications of Diamond to Improve Tribological Performance in the Oil and Gas Industry
Published 2018-09-01“…Applications such as drill bits, bearings, and mechanical seals benefit from the use of diamond, while choke valves are the subject of research programs to assess the suitability of chemical vapor deposition (CVD) diamond for these components. …”
Get full text
Article -
14095
Image Watermarking Approach Using a Hybrid Domain Based on Performance Parameter Analysis
Published 2021-07-01“…Frequency transform domain techniques are complex and costly and degrade the quality of the image due to less embedding of bits. The proposed work utilize the original DCT method with some modifications and applies this method on frequency bands of DWT. …”
Get full text
Article -
14096
A single-slope 80MS/s ADC using two-step time-to-digital conversion
Published 2010“…An 80 MS/s analog-to-digital converter (ADC) based on single-slope conversion is presented which utilizes a recently developed gated ring oscillator (GRO) time-to-digital converter (TDC) to achieve an ENOB of 6.45 bits. To save power, the time-to-digital conversion is done in two steps, the first of which is based on coarse time quantization as measured by cycles of an oscillator and the second of which is based on fine time quantization by the GRO TDC. …”
Get full text
Article -
14097
A Multiprocessor Architecture Using Modular Arithmetic for Very High Precision Computation
Published 2004“…We outline a multiprocessor architecture that uses modular arithmetic to implement numerical computation with 900 bits of intermediate precision. A proposed prototype, to be implemented with off-the-shelf parts, will perform high-precision arithmetic as fast as some workstations and mini- computers can perform IEEE double-precision arithmetic. …”
Get full text
-
14098
Coding metasurface to reduce RCS
Published 2020“…This projects seeks to discover the way how to use various theories to design and create a metasurface to reduce RCS using this binary bits.…”
Get full text
Final Year Project (FYP) -
14099
Improving the robustness of ISB watermarking techniques by repetition of the embedding
Published 2011“…Digital watermarking is a direct embedding of additional information into the original content or host image, this study is overcome the problems existing in the classic LSB method by adapting the method to intermediate significant bits (ISB), which improve the robustness and maintain the quality of the image. …”
Get full text
Book Chapter -
14100
PDN characteristics of 3D-SiP with a wide-bus structure under 4k-IO operations
Published 2012“…The 4096 bits wide-bus three-dimensional integration device using through-silicon-vias (TSVs) has been designed and fabricated as a demonstrator for power integrity such as power distribution network (PDN) impedance and simultaneous switching output (SSO) noise characteristics. …”
Conference item