-
15001
Alman Reformistlerin Tefecilik Yorumu (Usury Exegesis of German Reformists)
Published 2010-01-01“…According to him, the objections to usury depend on the Old Testament apply not to all increments on loans, but properly to bitting usury upon usury.…”
Get full text
Article -
15002
Improvement of the automatic gamma correction method in cloud image detection
Published 2022-11-01“…Gamma correction has an efficient characteristic of storing and dividing imagery by small bits, thus the study proposed an image detection development using automatic gamma correction, with ground truth being Image data from SWIMSEG Nanyang Technological University Singapore. …”
Get full text
Article -
15003
A New Lossless DNA Compression Algorithm Based on A Single-Block Encoding Scheme
Published 2020-04-01“…Second, to encode the generated streams, we propose a new single-block encoding scheme (SEB) based on the exploitation of the position of neighboring bits within the block using two different techniques. …”
Get full text
Article -
15004
Energy-Efficient Bridge Detection Algorithms for Wireless Sensor Networks
Published 2013-04-01“…The second algorithm runs proposed rules on 2-hop neighborhoods of each node and tries to detect all bridges in a breadth-first search (BFS) execution session using O( N ) messages with O ( Δ ( log 2 ( N ) ) ) bits where N is the node count and Δ is the maximum node degree. …”
Get full text
Article -
15005
The Cold War
Published 2022-06-01“…I was of course an eyewitness to bits and pieces of the whole period we call the Cold War—but don’t look for fragmentary anecdotes which would not do justice to the serious purpose of this symposium. …”
Get full text
Article -
15006
Peoples’ right to self-determination and self-governance over natural resources: Possible and desirable?
Published 2014-12-01“…Finally, the article identifies the role of human rights in bilateral investment treaties (BITs). It finds that there are less jurisdictional restrictions – as many treaties have a wide understanding of applicable law – than cognitive restrictions – as human rights competence is rarely sought when establishing tribunals mandated to solve investments disputes.…”
Get full text
Article -
15007
A New Guess-and-Determine Method for Cryptanalysis of the GSM Encryption
Published 2023-01-01“…A5/1 consists of three linear feedback registers of lengths 23, 22, and 19 bits. Due to the nonlinear clocking mechanism of A5/1, cryptanalytic attacks of guess-and-determine (GD) nature are efficient and more successful. …”
Get full text
Article -
15008
Memristor Based Multi-State Shift Register Architecture
Published 2019-09-01“…The designed shift register consists of stages with capability to store and transfer multiple bits. The number of stages can be adjusted depending on the requirements of the specific applications. …”
Get full text
Article -
15009
Broncística y Poblamiento post-orientalizante en la Alta Extremadura: a partir de unos materiales procedentes de El Risco (Sierra de Fuentes, Cáceres)
Published 2009-12-01“…The luxurious nature of the objects (jugs, bassins, spits, horse-bits, incense-burners...) involves some reflexions about the function of this site in the unknown scene of the Early Iron (7th-5th centuries B.C.) at North-Extremadura.…”
Get full text
Article -
15010
Improved Masking Multiplication with PRGs and Its Application to Arithmetic Addition
Published 2024-01-01“…On the theoretical level, we push the limits of the randomness requirement by providing an improved masking multiplication using only d PRGs, each of which is fed with d random variables, saving more than half random bits. On the practical level, considering that the masking of arithmetic addition usually requires more randomness (than multiplication), we apply the technique to the algorithm proposed at FSE 2015 that is a very efficient scheme performing arithmetic addition modulo 2w. …”
Get full text
Article -
15011
Statistical Analysis of Encryption Quality for Medical Images Based on Rijndael Encryption Algorithm Using Both Static and Chaotic Cipher Key
Published 2014-12-01“…Most of these algorithms are based on a block cipher that use a predetermined fixed/constant key with at least 128 bits length. Method: In this study encryption performed by Rijndael encryption algorithm using conventional constant and variable cipher key. …”
Get full text
Article -
15012
before cutting, wrap the scissors with yarn to spare yourself the sound of separation*
Published 2022-09-01“…Through sonic suturing of voice, dialects, bits of time, memories and other ways of wearing – of cloth as clothes – we explore, cut, collage, stitch, overlay/overlap these off-cuttings into new remembrances. …”
Get full text
Article -
15013
NOISE SECURES SECRET DATA! BY ACT AS A REFERENCE FOR EMBEDDING
Published 2014-03-01“…Based on added salt, pepper, and no noise portions of reference image completely different range of bits are embedded into the cover image. The result is analyzed by using MSE, PSNR and capacity performance metrics.…”
Get full text
Article -
15014
-
15015
Low-noise delta-sigma analog front end with capacitor swapping technique for capacitive microsensors
Published 2022-05-01“…The measured effective resolution is 16.2 bits, and the non-linearity is 0.05% full-scale output (FSO). …”
Get full text
Article -
15016
تحسين أداء لقمة المكبح المستخدمة في نظام الفرملة للقطار
Published 2016-02-01“…The test results were compared to the heat treated samples with samples that were not subjected to heat treatment, and treatment processes gave good results that allow to apply these operations on bits currently used on the railway network in Syria. …”
Get full text
Article -
15017
“Robots in Space” Multiagent Problem: Complexity, Information and Cryptographic Aspects
Published 2013-04-01“…We proved that (1) there is no protocol that solves the RinS, which transfers a bounded number of bits, and (2) suggested the protocol that allows robots to check whether their paths intersect, without revealing additional information about their relative positions (with respect to shelters). …”
Get full text
Article -
15018
Field RNG Data Analysis, Based on Viewing the Japanese Movie Departures (Okuribito)
Published 2010-12-01“…One hardware and two software random number generators simultaneously generated random numbers at 512 bits per second. The results showed significant Z-scores derived from chi-squares during the film viewing. …”
Get full text
Article -
15019
CARACTERÍSTICAS FÍSICAS, QUÍMICAS E BIOLÓGICAS (ZOOPLÂNCTON) DA ÁGUA QUE ABASTECE A ESTAÇÃO DE PISCICUTURA DA UNIVERSIDADE FEDERAL DE LAVRAS - MG
Published 2018-10-01“…A diversidade média foi de 2,98 bits.ind-1. …”
Get full text
Article -
15020
DANCER: The routing algorithm in delay tolerant networks based on dynamic and polymorphic combination of dimensions and energy consideration
Published 2017-06-01“…After simplification, each node obtains the binary topology which consists of links where flag bits are respectively 1 or 0. Finally, based on the binary topology, each node could decide the suitable routing for every specific packet sending. …”
Get full text
Article