Showing 15,201 - 15,220 results of 16,001 for search '"bit"', query time: 0.15s Refine Results
  1. 15201

    Data hiding techniques in steganography using fibonacci sequence and knight tour algorithm by Khalaf, Mohammed Abdullah

    Published 2016
    “…High complexities of pixels distribution and replacement of bits will ensure better security and robust imperceptibility compared to the existing systems in the literature.…”
    Get full text
    Thesis
  2. 15202

    Energy-efficient non-orthogonal multiple access for UAV communication system by Muhammad FarhanSohail, Muhammad FarhanSohail, Leow, Chee Yen, Won, Seung Hwan

    Published 2019
    “…The objective of maximized information bits per unit energy consumption of the UAV-BS is developed assuming a multi-Quality of Service (QoS) scenario. …”
    Article
  3. 15203

    An FPGA implementation of Alamouti's transmit diversity technique by Mukilan, Pushpamalar

    Published 2008
    “…Using the spectrum more efficiently caters for the ever increasing demand for faster communications since more bits per second can be transmitted using the same bandwidth. …”
    Get full text
    Thesis
  4. 15204

    Prototype development for embedding large amount of information using secure LSB and neural based steganography by Saleh, Basam N.

    Published 2009
    “…A recent approach is using artificial intelligence that teaches the machine to give the best candidate bits to hide the information in. This approach is remarkably theoretically efficient, and this approach is the basis of this project to implement a prototype that uses this approach. …”
    Get full text
    Thesis
  5. 15205

    A cylindrical coordinate system with dynamic permutation table for blowfish algorithm by Al-Abiachi, Ashwak M., Mahmod, Ramlan, Ahmad, Faudziah

    Published 2014
    “…The Blowfish Algorithm (BA) is a symmetric block cipher that iterates simple encryption and decryption functions by using Feistel networks.BA keys vary from 32-448 bits to ensure a high level of security.However, the BA requires a high memory percentage and it has a problem regarding randomness of output with text and image files having large strings of identical bytes.One solution to the seissues is to design a new Cryptography algorithm based on the BA that incorporates an F-function into a Cylindrical Coordinate System (CCS).The resulting F-function is known as a CCS with a Dynamic Permutation Table (DPT) or CCSDPT whereas the new algorithm is called the New BA (NBA).The objectives of the CCSDPT are to reduce memory requirements, enhance the randomness of the output and increase resistance to attacks through byte relocation and transformation in the right cylinder.NBA is evaluated by investigates the output of the algorithm by using statistical tests from the National Institute of Standard and Technology (NIST) with five types of data and compared with the BA.The findings of the NIST tests show that the NBA is suitable for any data stream, even those with long strings of identical bytes. …”
    Get full text
    Article
  6. 15206

    Robust blind watermarking technique against geometric attacks for fingerprint image using DTCWT-DCT by Lebcir, Mohamed, Suryanti, Awang, Benziane, Ali

    Published 2020
    “…It is due to the fingerprint features that may be impacted by the incorporated watermark, fingerprint rotations, and displacements that result in multiple feature sets. To integrate the bits of the watermark sequence into a differential process, two DCT-transformed sub-vectors are implemented. …”
    Get full text
    Article
  7. 15207

    New High-Rate Timestamp Management with Real-Time Configurable Virtual Delay and Dead Time for FPGA-Based Time-to-Digital Converters by Fabio Garzetti, Gabriele Bonanno, Nicola Lusardi, Enrico Ronconi, Andrea Costa, Angelo Geraci

    Published 2024-03-01
    “…The high number of requested bits and channels, however, gives rise to routing congestion issues when routed in a parallel manner. …”
    Get full text
    Article
  8. 15208

    Evaluation of information amount to present for motorcycle head-up display by Kenichiro ITO, Yoshisuke TATEYAMA, Hidekazu NISHIMURA, Tetsuro OGI

    Published 2015-10-01
    “…Applying information theories, we conclude that the preferable information transmission rate is approximately 16 bits per seconds.…”
    Get full text
    Article
  9. 15209

    QSAR-derived affinity fingerprints (part 1): fingerprint construction and modeling performance for similarity searching, bioactivity classification and scaffold hopping by C. Škuta, I. Cortés-Ciriano, W. Dehaen, P. Kříž, G. J. P. van Westen, I. V. Tetko, A. Bender, D. Svozil

    Published 2020-05-01
    “…Both real-valued (rv-QAFFP) and binary (b-QAFFP) versions of the QAFFP fingerprint were implemented and their performance in similarity searching, biological activity classification and scaffold hopping was assessed and compared to that of the 1024 bits long Morgan2 fingerprint (the RDKit implementation of the ECFP4 fingerprint). …”
    Get full text
    Article
  10. 15210

    A Low-Power DNN Accelerator With Mean-Error-Minimized Approximate Signed Multiplier by Laimin Du, Leibin Ni, Xiong Liu, Guanqi Peng, Kai Li, Wei Mao, Hao Yu

    Published 2024-01-01
    “…In the optimal case of 8 bits, the proposed approximate multiplier saves 49.84% power, 46.41% area and 24.65% delay compared to the exact multiplier. …”
    Get full text
    Article
  11. 15211

    DOA Estimation for Hybrid Massive MIMO Systems Using Mixed-ADCs: Performance Loss and Energy Efficiency by Baihua Shi, Qi Zhang, Rongen Dong, Qijuan Jie, Shihao Yan, Feng Shu, Jiangzhou Wang

    Published 2023-01-01
    “…Finally, adopting 2–4 bits of resolution may be a good choice in practical massive MIMO systems.…”
    Get full text
    Article
  12. 15212

    Incremental Coding for Real-Time Remote Control over Bandwidth-Limited Channels and Its Applications in Smart Grids by Yiyu Qiu, Junjie Wu, Wei Chen

    Published 2024-01-01
    “…However, due to the limited bandwidth, the sub-packets or even bits have to be transmitted successively, thereby experiencing non-negligible latency and inducing serious performance loss in remote control. …”
    Get full text
    Article
  13. 15213

    A Conditional Privacy Preserving Generalized Ring Signcryption Scheme for Micro Aerial Vehicles by Insaf Ullah, Muhammad Asghar Khan, Ako Muhammad Abdullah, Syed Agha Hassnain Mohsan, Fazal Noor, Fahad Algarni, Nisreen Innab

    Published 2022-11-01
    “…Elliptic Curve Cryptography (ECC), with a key size of 160 bits, is used in the proposed scheme. The proposed scheme’s security robustness has been analyzed using the Random Oracle Model (ROM), a formal security evaluation method. …”
    Get full text
    Article
  14. 15214

    A Self-Error-Correction-Based Reversible Watermarking Scheme for Vector Maps by Yinguo Qiu, Jiuyun Sun, Jiaojue Zheng

    Published 2023-02-01
    “…Simulation results demonstrate that the watermark capacity of this scheme is 1.0000, the coordinate error caused by the watermark embedding process can be limited to no more than 0.00001 when the strength of watermark embedding is set to five, and several watermark bits can be effectively detected and corrected after watermark extraction. …”
    Get full text
    Article
  15. 15215

    Five-Direction Occlusion Filling with Five Layer Parallel Two-Stage Pipeline for Stereo Matching with Sub-Pixel Disparity Map Estimation by Yunhao Ma, Xiwei Fang, Xinyu Guan, Ke Li, Lei Chen, Fengwei An

    Published 2022-11-01
    “…It consumes about 5.6 K LUTs, 12.8 K registers, and 2.5 M bits of on-chip memory. Meanwhile, the non-occlusion error rate of only 4.61% is about 1% better than the state-of-the-art works in the KITTI2015 dataset. …”
    Get full text
    Article
  16. 15216

    Unoccupied surface and interface states in Pd thin films deposited on Fe/Ir(111) surface by Mohammed Bouhassoune, Imara Lima Fernandes, Stefan Blügel, Samir Lounis

    Published 2019-01-01
    “…The latter are topological magnetic objects with swirling spin-textures with possible implications in the context of spintronic devices since they have the potential to be used as magnetic bits for information technology. The stabilization, detection and manipulation of such non-collinear magnetic entities require a quantitative investigation and a fundamental understanding of their electronic structure. …”
    Get full text
    Article
  17. 15217

    A Chunked and Disordered Data Privacy Protection Algorithm: Application to Resource Platform Systems by Daike Zhang, Junyang Chen, Yihui He, Xiaoqing Lan, Xian Chen, Chunlin Dong, Jun Li

    Published 2023-05-01
    “…The key length can be up to 594 bits, rendering it challenging to decrypt. Compared with the traditional DES algorithm, our algorithm has better security under the same conditions and approaches the levels of security offered by the AES and RC4 algorithms.…”
    Get full text
    Article
  18. 15218

    Research progress on the correlation between gut microbiota and preeclampsia: microbiome changes, mechanisms and treatments by Yichi Zong, Xuguang Wang, Jun Wang

    Published 2023-10-01
    “…Research purpose was to compile the existing bits of present scientific data and to close the gap in the knowledge of changes in gut microbiota in preeclampsia and their association with preeclampsia. …”
    Get full text
    Article
  19. 15219

    Variability-Aware Design of RRAM-Based Analog CAMs by Jinane Bazzi, Jana Sweidan, Mohammed E. Fouda, Rouwaida Kanj, Ahmed M. Eltawil

    Published 2024-01-01
    “…The results show that our designs have the capability to encode up to 4 bits of storage and achieve up to 24 intervals compared to 6 intervals for the existing 4T2M2S design, with 5-<inline-formula> <tex-math notation="LaTeX">$10 \times $ </tex-math></inline-formula> lower latency and 10-<inline-formula> <tex-math notation="LaTeX">$30 \times $ </tex-math></inline-formula> lower energy consumption, while achieving a lower probability of failure. …”
    Get full text
    Article
  20. 15220

    Ferroelastic-strain-induced multiple nonvolatile resistance states in GeTe/Pb(Mg1/3Nb2/3)O3-PbTiO3 heterostructures by Zhi-Xue Xu, Jian-Min Yan, Meng Xu, Ting-Wei Chen, Lei Guo, Guan-Yin Gao, Xiao-Guang Li, Hao-Su Luo, Yu Wang, Ren-Kui Zheng

    Published 2018-12-01
    “…Such heterostructures may be used for multilevel data storage that allows each unit to store multiple bits of information and thus improve the memory density. …”
    Get full text
    Article