-
14661
A Modified Wei-Hua-He Digital Signature Scheme Based on Factoring and Discrete Logarithm
Published 2022-11-01“…The proposed modified-He scheme is efficient, as evidenced by the analytical results with key lengths greater than 512 bits.…”
Get full text
Article -
14662
Resource and trajectory optimization for secure communication in RIS assisted UAV‐MEC system
Published 2023-11-01“…The simulation results show that the proposed scheme in this paper can effectively improve the system secure computing bits compared with the benchmark scheme.…”
Get full text
Article -
14663
Adaptive Congestion Control Mechanism to Enhance TCP Performance in Cooperative IoV
Published 2023-01-01“…In the proposed approach, the receiver appends two bits in the acknowledgment (ACK) packet that describes the status of the buffer space and link utilization. …”
Get full text
Article -
14664
Initialization of a spin qubit in a site-controlled nanowire quantum dot
Published 2016-01-01“…A fault-tolerant quantum repeater or quantum computer using solid-state spin-based quantum bits will likely require a physical implementation with many spins arranged in a grid. …”
Get full text
Article -
14665
Efficient Cost-Reduced With High-Quality Image of Imperceptible Steganography Using Modulo and Magic Cube
Published 2022-01-01“…The partial secret message bits are converted into decimals and then mapped to a predefined cube. …”
Get full text
Article -
14666
Quantum Secure Multi-Party Summation with Graph State
Published 2024-01-01“…Additionally, the stabilizer of the graph state is utilized to detect eavesdroppers and channel noise without the need for decoy bits. The protocol allows for the arbitrary addition and deletion of participants, enabling greater flexibility. …”
Get full text
Article -
14667
Fortified-Grid: Fortifying Smart Grids through the Integration of the Trusted Platform Module in Internet of Things Devices
Published 2023-09-01“…Fortified-Grid helps to validate the attested state of IoT devices with a minimal network overhead of 1984 bits.…”
Get full text
Article -
14668
Information Hiding Method Using Best DCT and Wavelet Coefficients and ItsWatermark Competition
Published 2015-03-01“…In particular, we use the BCH (Bose-Chaudhuri-Hocquenghem) (511,31,109) code to error correct the watermark bits and the BCH (63,16,11) code as the sync signal to withstand JPEG (Joint Photographic Experts Group) compression and cropping attacks. …”
Get full text
Article -
14669
From Iris Image to Embedded Code: System of Methods
Published 2023-02-01“…The system has been tested on several iris image databases from public sources. It allows storing 65 bits of the secret key, with zero possibility to unlock it with the impostor’s iris and <inline-formula><math xmlns="http://www.w3.org/1998/Math/MathML" display="inline"><semantics><mrow><mn>10.4</mn><mo>%</mo></mrow></semantics></math></inline-formula> probability to reject the owner in one attempt.…”
Get full text
Article -
14670
Reversible Data Hiding in Encrypted Image Using Multiple Data-Hiders Sharing Algorithm
Published 2023-01-01“…Finally, we divide the shared pixels into 8 bits and allocate them to the pixels of the shared image. …”
Get full text
Article -
14671
New Approach Based on Compressive Sampling for Sample Rate Enhancement in DASs for Low-Cost Sensing Nodes
Published 2014-10-01“…In particular, the results obtained in experimental tests with ADC included in actual 8- and 32-bits microcontrollers highlight the possibility of achieving effective sample rate up to 50 times higher than that of the original ADC sample rate.…”
Get full text
Article -
14672
Authenticated Encryption Based on Chaotic Neural Networks and Duplex Construction
Published 2021-12-01“…The MDC is implemented with two variants of width, i.e., 512 and 1024 bits. We tested our proposed scheme against the different cryptanalytic attacks. …”
Get full text
Article -
14673
Akıllı Telefon Bağımlılığının Sosyal Medya Kullanımı ve Beş Faktör Kişilik Özelliği İle İlişkisi: Üniversite Öğrencileri Üzerinden Bir Araştırma
Published 2018-06-01“…Dolayısıyla bu araştırmada; öğrencilerin akıllı telefon bağımlılık düzeyleri ve sosyal medya kullanmalarının, Beş Faktör Kişilik özelliği ile ilişkisi incelenmiştir. Araştırma, Bitlis Eren Üniversitesinde öğrenim gören 343 öğrenci üzerinde gerçekleştirilmiştir. …”
Get full text
Article -
14674
A High Fidelity Authentication Scheme for AMBTC Compressed Image Using Reference Table Encoding
Published 2021-10-01“…To enhance the image quality, we toggle bits in bitmap of smooth block to generate a set of authentication codes. …”
Get full text
Article -
14675
Classical decoherence in a nanomechanical resonator
Published 2016-01-01“…Building on the fruitful analogy introduced between spins/quantum bits and nanomechanical modes, we report on the methods available to define pure dephasing in these systems, while demonstrating the intrinsic almost-ideal properties of silicon nitride beams. …”
Get full text
Article -
14676
Research on Coded Excitation Using Kasami Sequence in the Long Rail Detection Based on UGW
Published 2022-05-01“…The main lobe width of the coded excitation is mainly determined by the number of carrier cycles and the carrier waveform, and the size of the side lobes is mainly determined by the number of coding bits. To quickly identify the corresponding transmissions at the receivers, a peak detection algorithm is shown. …”
Get full text
Article -
14677
Majorana box qubits
Published 2017-01-01“…In this paper, we construct quantum bits taking advantage of the topological protection and non-local properties of MBSs in a network of parallel wires, but without relying on braiding for quantum gates. …”
Get full text
Article -
14678
On Visual Walking-Remembering Warmipura – Among Women
Published 2020-03-01“…Experimental practice is seen as such maternal space, an assemblage using Deleuze-Guattarian term, of bits of life, adopting Smelik and Lykke’s words. …”
Get full text
Article -
14679
An Innovative Information Hiding Scheme Based on Block-Wise Pixel Reordering
Published 2024-01-01“…In recent studies, it has been shown that the indices of a codebook can be reordered to hide secret bits. The hiding capacity of the codeword index reordering scheme increases when the size of the codebook increases. …”
Get full text
Article -
14680
Compressed Image Encryption Scheme Based on Dual Two Dimensional Chaotic Map
Published 2022-08-01“…In order to improve the security and encryption speed of chaotic encryption system,a lightweight compression image encryption scheme based on chaotic mapping is proposed.Firstly,in order to speed up the encryption process and destroy the correlation between pixels,the digital image is divided into image blocks and compressed by processing in the frequency domain.Then,2D Logistic chaotic mapping is implemented to rearrange and transpose image pixels in the key generation,scrambling and replacement stages.In addition,to further improve the security level,in the diffusion stage,another chaotic map 2D Henon map is used to change the pixel value of the scrambled image.Performance evaluation results show that the proposed scheme can meet the security requirements of image encryption,and the key space is large.Compared with other excellent schemes,this scheme can better resist statistical and differential attacks,and it is highly sensitive to the change of the generated key space.Its key space size is 256bits,the <i>NPCR </i>value is about 99%,and <i>UACI </i>value is more than 15%.…”
Get full text
Article