Showing 14,621 - 14,640 results of 16,001 for search '"bit"', query time: 0.13s Refine Results
  1. 14621

    Multiple Fault Attack on PRESENT with a Hardware Trojan Implementation in FPGA by Breier, Jakub, He, Wei

    Published 2016
    “…Utilizing the Differential Fault Analysis technique, we were able to recover the secret key with two faulty encryptions and an exhaustive search of 216 remaining key bits. Our attack aims at four nibbles in the penultimate round of the cipher, causing faulty output in all nibbles of the output. …”
    Get full text
    Get full text
    Conference Paper
  2. 14622

    High-speed and low-power serial accumulator for serial/parallel multiplier by Meher, Manas Ranjan, Jong, Ching Chuen, Chang, Chip Hong

    Published 2010
    “…This paper presents a new approach to serial/parallel multiplier design by using parallel 1's counters to accumulate the binary partial product bits. The 1's in each column of the partial product matrix due to the serially input operands are accumulated using a serial T-flip flop (TFF) counter. …”
    Get full text
    Get full text
    Conference Paper
  3. 14623

    Reducing location map in prediction-based difference expansion for reversible image data embedding by Liu, Minglei, Seah, Hock Soon, Zhu, Ce, Lin, Weisi, Tian, Feng

    Published 2013
    “…However, location map bits lower payload capacity for data embedding. To reduce the location map, our proposed scheme aims to predict small prediction errors for expansion by using an edge detector. …”
    Get full text
    Get full text
    Journal Article
  4. 14624

    Protocol of secure key distribution using Hash Functions and Quantum Authenticated channels (KDP-6DP) by Majeed, Mohammed Munther A, Al-Khateeb, Khalid A. Saeed, Wahiddin, Mohamed Ridza, Saeb, Magdy M.

    Published 2010
    “…Approach: This study presented a new protocol concept that allows the session and key generation on-site by independently applying a cascade of two hash functions on a random string of bits at the sender and receiver sides. This protocol however, required a reliable method of authentication. …”
    Get full text
    Article
  5. 14625

    Protocol of secure key distribution using hash functions and quantum authenticated channels key distribution process six-state quantum protocol by Majeed, Mohammed Munther A., Al-Khateeb, Khalid A. Saeed, Wahiddin, Mohamed Ridza, Saeb, Magdy M.

    Published 2010
    “…Approach: This study presented a new protocol concept that allows the session and key generation on-site by independently applying a cascade of two hash functions on a random string of bits at the sender and receiver sides. This protocol however, required a reliable method of authentication. …”
    Get full text
    Article
  6. 14626

    HyperBlock floating point: generalised quantization scheme for gradient and inference computation by Gennari do Nascimento, M, Adrian Prisacariu, V, Fawcett, R, Langhammer, M

    Published 2023
    “…We show no loss of accuracy when quantizing AlexNet weights, activations and gradients to only 4 bits training ImageNet.…”
    Conference item
  7. 14627

    A Direct Mapping of Max k-SAT and High Order Parity Checks to a Chimera Graph by Chancellor, N, Zohren, S, Warburton, P, Benjamin, S, Roberts, S

    Published 2016
    “…We further show that this mapping can be used to map a similar class of maximum satisfiability problems where the clauses are replaced by parity checks over potentially large numbers of bits. The latter is of specific interest for applications in decoding for communication. …”
    Journal article
  8. 14628

    An optimization technique on ultrasonic and cutting parameters for drilling and deep drilling of nickel-based high-strength Inconel 738LC superalloy with deeper and higher hole qua... by Baghlani, V., Mehbudi, P., Akbari, J., Nezhad, E.Z., Sarhan, A.A.D., Hamouda, A.M.S.

    Published 2016
    “…In this research work, an ultrasonic assisted drilling system is employed to apply both rotation and vibration to drill bits. The transducer horn transfers power very efficiently and changes tools effortlessly. …”
    Article
  9. 14629

    Energy-driven scheduling for Digital Video Broadcasting - Satellite Second Generation (DVB-S2) by Thian, Laah Lean, Al-Saegh, Ali Mohammed, Ramli, K. F., Ibrahim, N. S., Sali, Aduwati, Salman, Mustafa Ismael

    Published 2013
    “…Furthermore, EEF outperforms RR by 264% concerning the useful transmitted bits when QPSK modulation scheme with different coding rates is used.…”
    Get full text
    Conference or Workshop Item
  10. 14630

    A weighted hard combination scheme for cooperative spectrum sensing in cognitive radio sensor networks by Mustapha, Ibrahim, Mohd Ali, Borhanuddin, A. Rasid, Mohd Fadlee, Sali, Aduwati, Mohamad, Hafizal

    Published 2015
    “…The results indicate that the WHC scheme minimizes reporting energy cost by 70% and improves detection performance by 5.6% compared to the quantized 3-bits scheme.…”
    Get full text
    Conference or Workshop Item
  11. 14631

    A survey about the latest trends and research issues of cryptographic elements by Shoukat, Ijaz Ali, Abu Bakar, Kamalrulnizam, Iftikhar, Mohsin

    Published 2011
    “…Some schemes carry the use of long bits key and some support the use of small key. …”
    Get full text
    Article
  12. 14632

    Flexible ultra-wideband antenna incorporated with metamaterial structures: multiple notches for chipless RFID application by Jalil, M. E., Rahim, M. K. A., Samsuri, N. A., Dewan, R., Kamardin, K.

    Published 2017
    “…To achieve encoding of 10-bits data (10,234 number), six MCSRRs are proposed with three-slotted MCSRR in the radiator and three-slotted MCSRR in the ground plane.…”
    Article
  13. 14633

    Revisiting modular inversion hidden number problem and its applications by Xu, Jun, Sarkar, Santanu, Hu, Lei, Wang, Huaxiong, Pan, Yanbin

    Published 2023
    “…The Modular Inversion Hidden Number Problem (MIHNP), which was proposed at Asiacrypt 2001 by Boneh, Halevi, and Howgrave-Graham, is summarized as follows: Assume that the δ most significant bits of z are denoted by MSBδ(z). The goal is to retrieve the hidden number α ϵ ℤp given many samples (ti,MSBδ((α + ti)-1 mod p)) for random ti ϵ ℤp. …”
    Get full text
    Journal Article
  14. 14634

    Evaluating the consistency of surface brightness, greenness, and wetness observations between Landsat-8 OLI and Landsat-9 OLI2 through underfly images by Hanqiu Xu, Mengjie Ren, Lijuan Yang

    Published 2023-11-01
    “…The deviations observed in the TCT components between the two sensors are primarily due to the higher radiometric resolution of Landsat-9 (14 bits) compared to Landsat-8 (12 bits), as the deviations occurring in bright and dark areas are larger than those in other areas. …”
    Get full text
    Article
  15. 14635

    Compression Helps Deep Learning in Image Classification by En-Hui Yang, Hossam Amer, Yanbing Jiang

    Published 2021-07-01
    “…Given an underlying deep neural network (DNN) pre-trained with pristine ImageNet images, it is demonstrated that, if, for any original image, one can select, among its many JPEG compressed versions including its original version, a suitable version as an input to the underlying DNN, then the classification accuracy of the underlying DNN can be improved significantly while the size in bits of the selected input is, on average, reduced dramatically in comparison with the original image. …”
    Get full text
    Article
  16. 14636
  17. 14637
  18. 14638
  19. 14639

    Extending jochemsz-may analytical strategies upon integer factorization problem by Adenan, Nurul Nur Hanisah

    Published 2021
    “…From ed − kφ(N) = 1, by utilizing the extended strategy of Jochemsz and May, our attack works when the primes share a known amount of Least Significant Bits (LSBs). This is achievable since we obtain the small roots of our constructed integer polynomial that consequently leads to the factorization of N. …”
    Get full text
    Thesis
  20. 14640

    Image watermarking based on integer wavelet transform-singular value decomposition with variance pixels by Ernawan, F., Ariatmanto, Dhani

    Published 2019
    “…The orthogonal U matrix component of U3,1 and U4,1 are modified using certain rules by considering the watermark bits and an optimal threshold. This research reveals an optimal threshold value based on the trade-off between robustness and imperceptibility of watermarked image. …”
    Get full text
    Article