Showing 14,101 - 14,120 results of 16,001 for search '"bit"', query time: 0.13s Refine Results
  1. 14101

    Quantum computing with an electron spin ensemble by Wesenberg, J, Ardavan, A, Briggs, G, Morton, J, Schoelkopf, R, Schuster, D, Mølmer, K

    Published 2009
    “…We propose to encode a register of quantum bits in different collective electron spin wave excitations in a solid medium. …”
    Journal article
  2. 14102

    Brokered graph-state quantum computation by Fitzsimons, J, Benjamin, S, Browne, D, Morton, J

    Published 2006
    “…Using the <em>graph-state</em> approach to quantum computation, one can avoid the need for complex array nanostructures in which quantum bits (qubits) interact directly. Instead one can employ simple 'atom-like' nanostructures, coupled over macroscopic distances via optical emissions. …”
    Journal article
  3. 14103

    Mixed state dense coding and its relation to entanglement measures by Bose, S, Plenio, M, Vedral, V

    Published 2000
    “…Ideal dense coding protocols allow one to use prior maximal entanglement to send two bits of classical information by the physical transfer of a single encoded qubit. …”
    Journal article
  4. 14104

    An adaptive error correction scheme for SDH based wavelength division multiplexed optical networks by Cheah, Cheng Lai, Abdullah, Mohamad Khazani, Ahmad Anas, Siti Barirah, Mahdi, Mohd Adzir, Mohd Ali, Borhanuddin

    Published 2005
    “…The error location analysis of the FEC correctable bits, combined with B2 bytes analysis are used to decide the suitable FEC code for the payload channels. …”
    Get full text
    Conference or Workshop Item
  5. 14105

    AAβ public key cryptosystem - a comparative analysis against RSA and ECC by Kamel Ariffin, Muhammad Rezal, Mahad, Zahari

    Published 2012
    “…This paper provides the algorithms to implement these ciphers as well as highlights the operating time and performance for varying key sizes of 128/1024/3072, 160/2048/6144 and 192/4096/12288 bits. We target our implementation to justify if the probabilistic model - AAβ, can perform equivalently against deterministic models so as to be considered to be used in practical scenarios today.…”
    Get full text
    Conference or Workshop Item
  6. 14106

    Improving the robustness of ISB watermarking techniques by repetition of the embedding by Zeki, A. M., Abdul Manaf, Azizah, Mahmod, S. S.

    Published 2011
    “…Digital watermarking is a direct embedding of additional information into the original content or host image, this study is overcome the problems existing in the classic LSB method by adapting the method to intermediate significant bits (ISB), which improve the robustness and maintain the quality of the image. …”
    Book Section
  7. 14107

    Improving the robustness of ISB watermarking techniques by repetition of the embedding by M. Zeki, Akram, A. Manaf, Azizah, S. Mahmod, Shayma'a

    Published 2011
    “…Digital watermarking is a direct embedding of additional information into the original content or host image, this study is overcome the problems existing in the classic LSB method by adapting the method to intermediate significant bits (ISB), which improve the robustness and maintain the quality of the image. …”
    Article
  8. 14108

    Approximating Max Function in Fully Homomorphic Encryption by Hyunjun Lee, Jina Choi, Younho Lee

    Published 2023-04-01
    “…However, there is no known way to find a <i>k</i>-approximate maximum value, i.e., a value with the same most significant <i>k</i>-bits as the maximum value. In this study, when the value range of all data in each slot in the ciphertext is [0, 1], we propose a method for finding all slot positions of values whose most significant <i>k</i>-bits match the maximum value. …”
    Get full text
    Article
  9. 14109
  10. 14110

    A Study on the Concept of Using Efficient Lightweight Hash Chain to Improve Authentication in VMF Military Standard by Dohoon Kim, Sang Seo, Heesang Kim, Won Gi Lim, Youn Kyu Lee

    Published 2020-12-01
    “…This is because TDL and MTN require maximum tactical security, communication integrity, and low network overhead based on many protocol header bits for rapid communication with limited network resources. …”
    Get full text
    Article
  11. 14111
  12. 14112

    Indian Herb-Derived Phytoconstituent-Based Antiviral, Antimicrobial and Antifungal Formulation: An Oral Rinse Candidate for Oral Hygiene and the Potential Prevention of COVID-19 Ou... by Shashwat Sharad, Suman Kapur

    Published 2021-09-01
    “…Moreover, bacterial and yeast cells treated with BITS-003 displayed reduced growth. Topical use of the formulation as a mouthwash/gargle could be effective in reducing symptoms of respiratory viral infections, with the potential to decrease the viral load in the buccal/oral cavity. …”
    Get full text
    Article
  13. 14113

    THE STATE OF STANDARDIZATION OF POST-QUANTUM CRYPTO-ALGORITHMS AT THE GLOBAL LEVEL by Oleksandra Tsentseria, Kateryna Hleha, Aleksandra Matiyko, Igor Samoilov

    Published 2023-06-01
    “…NIST has already recommended moving from the sizes of keys and algorithms that provide 80 security bits to the sizes of keys and algorithms that provide 112 or 128 security bits in order to protect against classic attacks. …”
    Get full text
    Article
  14. 14114
  15. 14115

    Composition, abundance and diversity of coral reef fishes at two sites in Mochima National Park, Venezuela by LJ Ruiz, E Méndez-de-E, A Torres-de-J, A Prieto-A, B Marín, A Fariña

    Published 2003-03-01
    “…Diversity ranged from 0.68 to 3.21 bits/ind, evenness from 0.29 to 0.98, and species richness from 0.68 to 2.24. …”
    Get full text
    Article
  16. 14116
  17. 14117

    Closed-Form Sum-Rate Analysis of Interference Alignment with Limited Feedback Based on Scalar Quantization and Random Vector Quantization by Long Suo, Fei Liu

    Published 2022-06-01
    “…Most existing IA performance analysis approaches focus on the vector quantization (VQ)-based feedback strategy, but the implementation complexity of VQ will be excessive when more quantization bits are required to achieve the expected quantization accuracy for larger-sized matrices or higher signal-to-noise ratio (SNR) regimes. …”
    Get full text
    Article
  18. 14118

    A suggestion on how to include calendar dates in Bloom Filters by Antony Stevens

    Published 2017-04-01
    “…It could be as much as 365 bits per year, far more than is usually used for the other fields. …”
    Get full text
    Article
  19. 14119
  20. 14120

    An Efficient Variant of Pollard’s p − 1 for the Case That All Prime Factors of the p − 1 in B-Smooth by Kritsanapong Somsuk

    Published 2022-02-01
    “…Due to the computational limitations at present, there is no efficient integer factorization algorithm that can break at least 2048 bits of RSA with strong prime factors in polynomial time. …”
    Get full text
    Article