Showing 14,661 - 14,680 results of 16,001 for search '"bit"', query time: 0.13s Refine Results
  1. 14661

    A Modified Wei-Hua-He Digital Signature Scheme Based on Factoring and Discrete Logarithm by Elumalai R, G. S. G. N. Anjaneyulu

    Published 2022-11-01
    “…The proposed modified-He scheme is efficient, as evidenced by the analytical results with key lengths greater than 512 bits.…”
    Get full text
    Article
  2. 14662

    Resource and trajectory optimization for secure communication in RIS assisted UAV‐MEC system by Shihao Liu, Yangchao Huang, Hang Hu, Jiangbo Si, Guobing Cheng, Tao Huang, Xiaoliang Hu

    Published 2023-11-01
    “…The simulation results show that the proposed scheme in this paper can effectively improve the system secure computing bits compared with the benchmark scheme.…”
    Get full text
    Article
  3. 14663

    Adaptive Congestion Control Mechanism to Enhance TCP Performance in Cooperative IoV by Tapas Kumar Mishra, Kshira Sagar Sahoo, Muhammad Bilal, Sayed Chhattan Shah, Manas Kumar Mishra

    Published 2023-01-01
    “…In the proposed approach, the receiver appends two bits in the acknowledgment (ACK) packet that describes the status of the buffer space and link utilization. …”
    Get full text
    Article
  4. 14664

    Initialization of a spin qubit in a site-controlled nanowire quantum dot by Konstantinos G Lagoudakis, Peter L McMahon, Kevin A Fischer, Shruti Puri, Kai Müller, Dan Dalacu, Philip J Poole, Michael E Reimer, Val Zwiller, Yoshihisa Yamamoto, Jelena Vučković

    Published 2016-01-01
    “…A fault-tolerant quantum repeater or quantum computer using solid-state spin-based quantum bits will likely require a physical implementation with many spins arranged in a grid. …”
    Get full text
    Article
  5. 14665

    Efficient Cost-Reduced With High-Quality Image of Imperceptible Steganography Using Modulo and Magic Cube by Hung-Jui Ko, Cheng-Ta Huang, Hsueh-Wen Tseng, Shiuh-Jeng Wang

    Published 2022-01-01
    “…The partial secret message bits are converted into decimals and then mapped to a predefined cube. …”
    Get full text
    Article
  6. 14666

    Quantum Secure Multi-Party Summation with Graph State by Yaohua Lu, Gangyi Ding

    Published 2024-01-01
    “…Additionally, the stabilizer of the graph state is utilized to detect eavesdroppers and channel noise without the need for decoy bits. The protocol allows for the arbitrary addition and deletion of participants, enabling greater flexibility. …”
    Get full text
    Article
  7. 14667

    Fortified-Grid: Fortifying Smart Grids through the Integration of the Trusted Platform Module in Internet of Things Devices by Giriraj Sharma, Amit M. Joshi, Saraju P. Mohanty

    Published 2023-09-01
    “…Fortified-Grid helps to validate the attested state of IoT devices with a minimal network overhead of 1984 bits.…”
    Get full text
    Article
  8. 14668

    Information Hiding Method Using Best DCT and Wavelet Coefficients and ItsWatermark Competition by Hyunho Kang, Keiichi Iwamura

    Published 2015-03-01
    “…In particular, we use the BCH (Bose-Chaudhuri-Hocquenghem) (511,31,109) code to error correct the watermark bits and the BCH (63,16,11) code as the sync signal to withstand JPEG (Joint Photographic Experts Group) compression and cropping attacks. …”
    Get full text
    Article
  9. 14669

    From Iris Image to Embedded Code: System of Methods by Ivan Matveev, Ilia Safonov

    Published 2023-02-01
    “…The system has been tested on several iris image databases from public sources. It allows storing 65 bits of the secret key, with zero possibility to unlock it with the impostor’s iris and <inline-formula><math xmlns="http://www.w3.org/1998/Math/MathML" display="inline"><semantics><mrow><mn>10.4</mn><mo>%</mo></mrow></semantics></math></inline-formula> probability to reject the owner in one attempt.…”
    Get full text
    Article
  10. 14670

    Reversible Data Hiding in Encrypted Image Using Multiple Data-Hiders Sharing Algorithm by Chi-Yao Weng, Cheng-Hsing Yang

    Published 2023-01-01
    “…Finally, we divide the shared pixels into 8 bits and allocate them to the pixels of the shared image. …”
    Get full text
    Article
  11. 14671

    New Approach Based on Compressive Sampling for Sample Rate Enhancement in DASs for Low-Cost Sensing Nodes by Francesco Bonavolontà, Massimo D'Apuzzo, Annalisa Liccardo, Michele Vadursi

    Published 2014-10-01
    “…In particular, the results obtained in experimental tests with ADC included in actual 8- and 32-bits microcontrollers highlight the possibility of achieving effective sample rate up to 50 times higher than that of the original ADC sample rate.…”
    Get full text
    Article
  12. 14672

    Authenticated Encryption Based on Chaotic Neural Networks and Duplex Construction by Nabil Abdoun, Safwan El Assad, Thang Manh Hoang, Olivier Deforges, Rima Assaf, Mohamad Khalil

    Published 2021-12-01
    “…The MDC is implemented with two variants of width, i.e., 512 and 1024 bits. We tested our proposed scheme against the different cryptanalytic attacks. …”
    Get full text
    Article
  13. 14673

    Akıllı Telefon Bağımlılığının Sosyal Medya Kullanımı ve Beş Faktör Kişilik Özelliği İle İlişkisi: Üniversite Öğrencileri Üzerinden Bir Araştırma by Metin Işık, İrem Kaptangil

    Published 2018-06-01
    “…Dolayısıyla bu araştırmada; öğrencilerin akıllı telefon bağımlılık düzeyleri ve sosyal medya kullanmalarının, Beş Faktör Kişilik özelliği ile ilişkisi incelenmiştir. Araştırma, Bitlis Eren Üniversitesinde öğrenim gören 343 öğrenci üzerinde gerçekleştirilmiştir. …”
    Get full text
    Article
  14. 14674

    A High Fidelity Authentication Scheme for AMBTC Compressed Image Using Reference Table Encoding by Tungshou Chen, Xiaoyu Zhou, Rongchang Chen, Wien Hong, Kiasheng Chen

    Published 2021-10-01
    “…To enhance the image quality, we toggle bits in bitmap of smooth block to generate a set of authentication codes. …”
    Get full text
    Article
  15. 14675

    Classical decoherence in a nanomechanical resonator by O Maillet, F Vavrek, A D Fefferman, O Bourgeois, E Collin

    Published 2016-01-01
    “…Building on the fruitful analogy introduced between spins/quantum bits and nanomechanical modes, we report on the methods available to define pure dephasing in these systems, while demonstrating the intrinsic almost-ideal properties of silicon nitride beams. …”
    Get full text
    Article
  16. 14676

    Research on Coded Excitation Using Kasami Sequence in the Long Rail Detection Based on UGW by Wenqing Yao, Yuan Yang, Xiaoyuan Wei

    Published 2022-05-01
    “…The main lobe width of the coded excitation is mainly determined by the number of carrier cycles and the carrier waveform, and the size of the side lobes is mainly determined by the number of coding bits. To quickly identify the corresponding transmissions at the receivers, a peak detection algorithm is shown. …”
    Get full text
    Article
  17. 14677

    Majorana box qubits by Stephan Plugge, Asbjørn Rasmussen, Reinhold Egger, Karsten Flensberg

    Published 2017-01-01
    “…In this paper, we construct quantum bits taking advantage of the topological protection and non-local properties of MBSs in a network of parallel wires, but without relying on braiding for quantum gates. …”
    Get full text
    Article
  18. 14678

    On Visual Walking-Remembering Warmipura – Among Women by Marta, Bridget Sheridan, Ana María López Carmona

    Published 2020-03-01
    “…Experimental practice is seen as such maternal space, an assemblage using Deleuze-Guattarian term, of bits of life, adopting Smelik and Lykke’s words. …”
    Get full text
    Article
  19. 14679

    An Innovative Information Hiding Scheme Based on Block-Wise Pixel Reordering by Jui-Chuan Liu, Heng-Xiao Chi, Ching-Chun Chang, Chin-Chen Chang

    Published 2024-01-01
    “…In recent studies, it has been shown that the indices of a codebook can be reordered to hide secret bits. The hiding capacity of the codeword index reordering scheme increases when the size of the codebook increases. …”
    Get full text
    Article
  20. 14680

    Compressed Image Encryption Scheme Based on Dual Two Dimensional Chaotic Map by ZHOU Lian-bing, ZHOU Xiang-zhen, CUI Xue-rong

    Published 2022-08-01
    “…In order to improve the security and encryption speed of chaotic encryption system,a lightweight compression image encryption scheme based on chaotic mapping is proposed.Firstly,in order to speed up the encryption process and destroy the correlation between pixels,the digital image is divided into image blocks and compressed by processing in the frequency domain.Then,2D Logistic chaotic mapping is implemented to rearrange and transpose image pixels in the key generation,scrambling and replacement stages.In addition,to further improve the security level,in the diffusion stage,another chaotic map 2D Henon map is used to change the pixel value of the scrambled image.Performance evaluation results show that the proposed scheme can meet the security requirements of image encryption,and the key space is large.Compared with other excellent schemes,this scheme can better resist statistical and differential attacks,and it is highly sensitive to the change of the generated key space.Its key space size is 256bits,the <i>NPCR </i>value is about 99%,and <i>UACI </i>value is more than 15%.…”
    Get full text
    Article