-
14161
Artificial-noise-aided coordinated secure transmission design in multi-cell multi-antenna networks with limited feedback
Published 2022“…Finally, numerical results are also provided to validate our theoretical results and the proposed feedback bits and power allocation methods.…”
Get full text
Journal Article -
14162
Fragile Image Watermarking For Medical Images
Published 2006“…The purpose is to verify the integrity and authenticity of medical images. We used 800x600x8 bits ultrasound (US)greyscale images in our experiment. …”
Get full text
Conference or Workshop Item -
14163
The state of the art in beyond 5G distributed massive multiple-input multiple-output communication system solutions [version 1; peer review: 1 approved, 2 approved with reservation...
Published 2022-09-01“…Beyond fifth generation (5G) communication systems aim towards data rates in the tera bits per second range, with improved and flexible coverage options, introducing many new technological challenges in the fields of network architecture, signal processing, and radio frequency front-ends. …”
Get full text
Article -
14164
Intensity modulation and direct detection quantum key distribution based on quantum noise
Published 2016-01-01“…Two slightly intensity-modulated pulses are sent from a transmitter, and a receiver determines key bits from the directly detected intensity. We analyzed the system performance for two typical eavesdropping methods, a beam splitting attack and an intercept-resend attack, with an assumption that the transmitting and receiving devices are fully trusted. …”
Get full text
Article -
14165
An Improvement of Serpent Algorithm
Published 2005-06-01“…The block size is 256 bits , and the key can be any length up to 256 bytes . …”
Get full text
Article -
14166
Data Literacy in The Smart City
Published 2021-01-01“…Aarhus Bibliotek har arbejdet med børn om at indsamle og analysere data om lyden fra Aarhus ved hjælp af micro:bits. Målet er at træne de studerendes datakendskab og samtidig få dem til at bidrage til en større 'datafortælling' om byen. …”
Get full text
Article -
14167
Text Files Compression using Combination of two Dictionary methods (Specific dictionary for specific language and LZ77 Approach)
Published 2011-12-01“…A words not exists in the dictionary is written without changing preceded by four bits for length of this word. A modification was made on this approach for reducing the file to minimum size. …”
Get full text
Article -
14168
Coherent one-way quantum conference key agreement based on twin field
Published 2021-01-01“…Exploiting coherent states with intensity 0 and μ to encode logic bits, our protocol can break the limit. Additionally, the requirements of phase randomization and multiple intensity modulation are removed in our protocol, making its experimental demonstration simple.…”
Get full text
Article -
14169
Message Concealment and Encryption Technique in Digital Image with Combination of LSB and RSA Methods
Published 2018-02-01“…So in this study, it is proposed to convert pixel image value to 16 bits so that the key used can be more varied. Experimental results proved that there was a steady increase in security and imperceptibility. …”
Get full text
Article -
14170
Storing the portrait of Antoine de Lavoisier in a single macromolecule
Published 2021-03-01“…The storage capacity attained in this work (440 bits/chain) is the highest ever reported for a synthetic informational polymer. …”
Get full text
Article -
14171
StructCode: Leveraging Fabrication Artifacts to Store Data in Laser-Cut Objects
Published 2023“…StructCode modifies the lengths of laser-cut finger joints and/or living hinges to represent bits of information without introducing additional parts or materials. …”
Get full text
Article -
14172
Scalar quantization with random thresholds
Published 2012“…The distortion is at most six times that of an optimal (deterministically-designed) quantizer, and for a large number of levels the output entropy is reduced by approximately (1-γ)/(ln 2) bits, where γ is the Euler-Mascheroni constant. This shows that the high-rate asymptotic distortion of these quantizers in an entropy-constrained context is worse than the optimal quantizer by at most a factor of 6e[superscript -2(1-γ)] ≈ 2.58.…”
Get full text
Article -
14173
NICAM decoder to PC data link
Published 2008“…The unit retrieves information carried upon normally unused data bits within NICAM encoded sound transmissions.…”
Get full text
Thesis -
14174
Quantum Gravity Constraints on Inflation
Published 2012“…We give two prescriptions for determining the inflationary entropy, based on either `bits per unit area' or entanglement entropy. The existence of transPlanckian flat directions, necessary for large tensor modes in the CMB, correlates with an inflationary entropy greater than that allowed by de Sitter space. …”
Journal article -
14175
Simple quantum error-correcting codes.
Published 1996“…The recipe C1/2⊆C1), where C1 and C2 are classical codes, is used to obtain codes for up to 16 information quantum bits (qubits) with correction of small numbers of errors. …”
Journal article -
14176
The machining characteristics of oil palm empty-fruit bunches particleboard and its suitability for furniture
Published 2008“…A series of machining experiments were carried out using a CNC router, with single fluted router-bits, to evaluate the machining and tool wearing properties of the particleboard made from oil palm empty-fruit bunches. …”
Get full text
Article -
14177
-
14178
Alarm triggered multiple display thermometer using MC68HC11
Published 2008“…It consist the module of the temperature sensor, LCD, control switch, buzzer which integrated with 8-bits microcontroller MC68HC11. The temperature sensor will measure the temperature in range from 0°C to 100°C and the buzzer will triggered if temperature is equal or higher than set temperature. …”
Get full text
Undergraduates Project Papers -
14179
A Taxonomy of Blockchain Consensus Methods
Published 2020-11-01“…The study provides a survey of 19 methods classified by the scarce resource they employ: clock-cycles, bits, tokens, votes, time, and biometrics. Blockchain implementations are split between consensus algorithms requiring proof of resource and those that use majority voting to update the ledger.…”
Get full text
Article -
14180
Chemical, microbial and sensory properties of a chestnut and milk ice cream with improved healthy characteristics
Published 2020-01-01“…With the aim of revalorization of two productions of economic relevance (milk and chestnuts), a novel ice cream was formulated incorporating milk, chestnut flour and chestnut bits. Using the best sensory valued formula as a basis, eight ice cream formulations were elaborated replacing the ingredients normally used (milk fat, sucrose and carboxymethylcellulose) by healthier ones (olive oil, erythritol + steviol glycosides, and tara (Caesalpinia spinosa) gum, respectively). …”
Get full text
Article