Showing 14,581 - 14,600 results of 16,001 for search '"bit"', query time: 1.75s Refine Results
  1. 14581

    Frequency-Coded Chipless RFID Tags: Notch Model, Detection, Angular Orientation, and Coverage Measurements by Jahangir Alam, Maher Khaliel, Abdelfattah Fawky, Ahmed El-Awamry, Thomas Kaiser

    Published 2020-03-01
    “…This paper focuses on the frequency coded chipless Radio Frequency Identification (RFID) wherein the tag’s information bits are physically encoded by the resonators’ notch position which has an effect on the frequency spectrum of the backscattered or retransmitted signal of the tag. …”
    Get full text
    Article
  2. 14582

    Post Quantum Cryptographic Keys Generated with Physical Unclonable Functions by Bertrand Cambou, Michael Gowanlock, Bahattin Yildiz, Dina Ghanaimiandoab, Kaitlyn Lee, Stefan Nelson, Christopher Philabaum, Alyssa Stenberg, Jordan Wright

    Published 2021-03-01
    “…Handshakes between client devices containing the physical unclonable functions (PUFs) and a server are used to select sets of addressable positions in the PUFs, from which streams of bits called seeds are generated on demand. The public and private cryptographic key pairs are computed from these seeds together with additional streams of random numbers. …”
    Get full text
    Article
  3. 14583

    Edge-assisted quantum protocol for secure multiparty logical AND its applications by Run-hua Shi, Xia-qin Fang

    Published 2023-07-01
    “…In this paper, we present a feasible quantum solution to an important primitive of secure multiparty computations, i.e., Secure Multiparty Logical AND (SMLA), in which n participants can securely compute logical AND of n private bits. In order to ensure perfect security and achieve good feasibility, we introduce a semi-honest edge server and two non-collusive fog nodes, and design a secure and feasible edge-assisted quantum protocol for SMLA, which cleverly utilizes Secure Multiparty XOR to implement SMLA group by group. …”
    Get full text
    Article
  4. 14584

    QKeyShield: A Practical Receiver-Device-Independent Entanglement-Swapping-Based Quantum Key Distribution by Mohammed Y. Al-Darwbi, Ali A. Ghorbani, Arash Habibi Lashkari

    Published 2022-01-01
    “…It adopts the use of a biased operator choice, thus, increasing the rate of generated bits. Several measures have been integrated to protect the sent qubits. …”
    Get full text
    Article
  5. 14585

    A New Quantum Private Protocol for Set Intersection Cardinality Based on a Quantum Homomorphic Encryption Scheme for Toffoli Gate by Wen Liu, Yangzhi Li, Zhirao Wang, Yugang Li

    Published 2023-03-01
    “…The simulation of the quantum homomorphic encryption scheme for the Toffoli gate on two quantum bits is given by the IBM Quantum Experience platform. …”
    Get full text
    Article
  6. 14586

    A Methodology to Analyze the Fault Tolerance of Demosaicking Methods against Memory Single Event Functional Interrupts (SEFIs) by Luis Alberto Aranda, Alfonso Sánchez-Macián, Juan Antonio Maestro

    Published 2020-10-01
    “…A single event functional interrupt (SEFI) can affect the behavior of a memory chip, with one or more rows, columns or even the whole device producing a wrong value when reading a set of stored bits. This problem may affect raw Bayer images stored in satellites and other spacecraft. …”
    Get full text
    Article
  7. 14587

    Finite-key security analysis for multilevel quantum key distribution by Kamil Brádler, Mohammad Mirhosseini, Robert Fickler, Anne Broadbent, Robert Boyd

    Published 2016-01-01
    “…The finite secret key rates (in bits per detected photon) are calculated as a function of the length of the sifted key by (i) generalizing the uncertainly relation-based insight from BB84 to any d -level 2-MUB QKD protocol and (ii) by adopting recent advances in the second-order asymptotics for finite block length quantum coding (for both d -level 2- and 3-MUB QKD protocols). …”
    Get full text
    Article
  8. 14588

    Secret Key Distillation with Speech Input and Deep Neural Network-Controlled Privacy Amplification by Jelica Radomirović, Milan Milosavljević, Zoran Banjac, Miloš Jovanović

    Published 2023-03-01
    “…For a sampling rate of 16 kHz and quantization of input speech signals with 16 bits per sample, the system provides secret keys at a rate of 28 kb/s. …”
    Get full text
    Article
  9. 14589

    Repair Rates for Multiple Descriptions on Distributed Storage by Anders Høst-Madsen, Heecheol Yang, Minchul Kim, Jungwoo Lee

    Published 2022-04-01
    “…The question is how many extra bits are needed for repair. We find an achievable rate and show that this is optimal in certain cases. …”
    Get full text
    Article
  10. 14590

    EXPRESS: Exploiting Energy–Accuracy Tradeoffs in 3D NAND Flash Memory for Energy-Efficient Storage by Md Raquibuzzaman, Aleksandar Milenkovic, Biswajit Ray

    Published 2022-01-01
    “…The density and cost-effectiveness of flash memory chips continue to increase, driven by: (a) The continuous physical scaling of memory cells in a single layer; (b) The vertical stacking of multiple layers; and (c) Logical scaling through storing multiple bits of information in a single memory cell. The physical properties of flash memories impose disproportionate latency and energy expenditures to ensure the high integrity of the data during flash memory writes. …”
    Get full text
    Article
  11. 14591

    A Soft-Error-Tolerant SAR ADC with Dual-Capacitor Sample-and-Hold Control for Sensor Systems by Duckhoon Ro, Minseong Um, Hyung-Min Lee

    Published 2021-07-01
    “…The measured analog signal is converted into digital bits through the sensor readout system. However, in extreme radiation environments, such as in space, during flights, and in nuclear fusion reactors, the performance of the analog-to-digital converter (ADC) constituting the sensor readout system can be degraded due to soft errors caused by radiation effects, leading to system malfunction. …”
    Get full text
    Article
  12. 14592

    Development and Application of MAGIC-f Gel in Cancer Research and Medical Imaging by Rabin Dhakal, Mohammad Yosofvand, Hanna Moussa

    Published 2021-08-01
    “…Finally, various future works are suggested based on the past and present works on MAGIC-f gel and polymer gel in general, with the hope that these bits of knowledge can provide important clues for future research on MAGIC-f gel as a dosimeter.…”
    Get full text
    Article
  13. 14593

    8×8 S-boxes over Klein four-group and Galois field $ {GF}\left({2}^{4}\right) $: AES redesign by Mohammad Mazyad Hazzazi, Amer Aljaedi, Zaid Bassfar, Misbah Rani, Tariq Shah

    Published 2024-03-01
    “…Nonlinear properties were mainly set to inspect the behavior of I/O bits and could apply image encryption. Then, the performance of proposed S-boxes and newly structured AES was tested in comparison with other prevailing S-boxes.…”
    Get full text
    Article
  14. 14594

    An Efficient Adaptive Anticollision Algorithm Based on 4-Ary Pruning Query Tree by Wei Zhang, Yajun Guo, Xueming Tang, Guohua Cui, Longkai Wu, Ying Mei

    Published 2013-12-01
    “…On the basis of the information of collision bits, some idle timeslots can be eliminated through pruning the 4-ary tree. …”
    Get full text
    Article
  15. 14595

    A Multi-Channel Electromyography, Electrocardiography and Inertial Wireless Sensor Module Using Bluetooth Low-Energy by Giorgio Biagetti, Paolo Crippa, Laura Falaschetti, Claudio Turchetti

    Published 2020-06-01
    “…The sensor is able to acquire up to three independent bioelectrical channels (six electrodes), each with 24 bits of resolution and a sampling rate up to 3.2 kHz, and has a 6-DoF inertial platform measuring linear acceleration and angular velocity. …”
    Get full text
    Article
  16. 14596

    Efficient lattice‐based authenticated key exchange based on key encapsulation mechanism and signature by Guanhao Xue, Baocang Wang, Quanbo Qu, Weidong Zhang

    Published 2021-01-01
    “…Concrete parameter specifications are suggested under the 102 and 218 bits post‐quantum security, respectively. Compared with the implicit authenticated key exchange derived directly from the key encapsulation mechanism, our proposals reduce the communication costs by 21.7% and 25.7%, respectively, under the same post‐quantum security level. …”
    Get full text
    Article
  17. 14597

    True Random Number Generator Based on RRAM-Bias Current Starved Ring Oscillator by D. Arumi, S. Manich, A. Gomez-Pau, R. Rodriguez-Montanes, M. B. Gonzalez, F. Campabadal

    Published 2023-01-01
    “…The oscillation frequency is finally leveraged to extract the sequence of random bits. The design is simple and adds low area overhead. …”
    Get full text
    Article
  18. 14598

    A Gaussian-Distributed Quantum Random Number Generator Using Vacuum Shot Noise by Min Huang, Ziyang Chen, Yichen Zhang, Hong Guo

    Published 2020-06-01
    “…Furthermore, a related post-processing method, which maintains the fine distribution and autocorrelation properties of raw data, is exploited to extend the precision of generated Gaussian distributed random numbers to over 20 bits, making the sequences possible to be utilized by the following system with requiring high precision numbers. …”
    Get full text
    Article
  19. 14599

    A Novel Turbo Detector Design for a High-Speed SSVEP-Based Brain Speller by Changkai Tong, Huali Wang, Jun Cai

    Published 2022-12-01
    “…The results show that the turbo detector can achieve an average ITR of 130 bits/min, which is about 8% higher than FBCCA. As the size of the data pool increases, the ITR of the turbo detector could be further improved.…”
    Get full text
    Article
  20. 14600

    Distribution and Seasonal Variations of <em>Argas persicus</em> in Senegal by A. Gueye, M. Sylla, A. Diouf, I. Touré, J.L. Camicas

    Published 2004-01-01
    “…Traditional fowl houses – habitat of this tick species – were characterized in rural areas and various models were described: the bits-and-pieces model, thorn-branches model, weaved-plants models, and clay-made models. …”
    Get full text
    Article