-
15201
Data hiding techniques in steganography using fibonacci sequence and knight tour algorithm
Published 2016“…High complexities of pixels distribution and replacement of bits will ensure better security and robust imperceptibility compared to the existing systems in the literature.…”
Get full text
Thesis -
15202
Energy-efficient non-orthogonal multiple access for UAV communication system
Published 2019“…The objective of maximized information bits per unit energy consumption of the UAV-BS is developed assuming a multi-Quality of Service (QoS) scenario. …”
Article -
15203
An FPGA implementation of Alamouti's transmit diversity technique
Published 2008“…Using the spectrum more efficiently caters for the ever increasing demand for faster communications since more bits per second can be transmitted using the same bandwidth. …”
Get full text
Thesis -
15204
Prototype development for embedding large amount of information using secure LSB and neural based steganography
Published 2009“…A recent approach is using artificial intelligence that teaches the machine to give the best candidate bits to hide the information in. This approach is remarkably theoretically efficient, and this approach is the basis of this project to implement a prototype that uses this approach. …”
Get full text
Thesis -
15205
A cylindrical coordinate system with dynamic permutation table for blowfish algorithm
Published 2014“…The Blowfish Algorithm (BA) is a symmetric block cipher that iterates simple encryption and decryption functions by using Feistel networks.BA keys vary from 32-448 bits to ensure a high level of security.However, the BA requires a high memory percentage and it has a problem regarding randomness of output with text and image files having large strings of identical bytes.One solution to the seissues is to design a new Cryptography algorithm based on the BA that incorporates an F-function into a Cylindrical Coordinate System (CCS).The resulting F-function is known as a CCS with a Dynamic Permutation Table (DPT) or CCSDPT whereas the new algorithm is called the New BA (NBA).The objectives of the CCSDPT are to reduce memory requirements, enhance the randomness of the output and increase resistance to attacks through byte relocation and transformation in the right cylinder.NBA is evaluated by investigates the output of the algorithm by using statistical tests from the National Institute of Standard and Technology (NIST) with five types of data and compared with the BA.The findings of the NIST tests show that the NBA is suitable for any data stream, even those with long strings of identical bytes. …”
Get full text
Article -
15206
Robust blind watermarking technique against geometric attacks for fingerprint image using DTCWT-DCT
Published 2020“…It is due to the fingerprint features that may be impacted by the incorporated watermark, fingerprint rotations, and displacements that result in multiple feature sets. To integrate the bits of the watermark sequence into a differential process, two DCT-transformed sub-vectors are implemented. …”
Get full text
Article -
15207
New High-Rate Timestamp Management with Real-Time Configurable Virtual Delay and Dead Time for FPGA-Based Time-to-Digital Converters
Published 2024-03-01“…The high number of requested bits and channels, however, gives rise to routing congestion issues when routed in a parallel manner. …”
Get full text
Article -
15208
Evaluation of information amount to present for motorcycle head-up display
Published 2015-10-01“…Applying information theories, we conclude that the preferable information transmission rate is approximately 16 bits per seconds.…”
Get full text
Article -
15209
QSAR-derived affinity fingerprints (part 1): fingerprint construction and modeling performance for similarity searching, bioactivity classification and scaffold hopping
Published 2020-05-01“…Both real-valued (rv-QAFFP) and binary (b-QAFFP) versions of the QAFFP fingerprint were implemented and their performance in similarity searching, biological activity classification and scaffold hopping was assessed and compared to that of the 1024 bits long Morgan2 fingerprint (the RDKit implementation of the ECFP4 fingerprint). …”
Get full text
Article -
15210
A Low-Power DNN Accelerator With Mean-Error-Minimized Approximate Signed Multiplier
Published 2024-01-01“…In the optimal case of 8 bits, the proposed approximate multiplier saves 49.84% power, 46.41% area and 24.65% delay compared to the exact multiplier. …”
Get full text
Article -
15211
DOA Estimation for Hybrid Massive MIMO Systems Using Mixed-ADCs: Performance Loss and Energy Efficiency
Published 2023-01-01“…Finally, adopting 2–4 bits of resolution may be a good choice in practical massive MIMO systems.…”
Get full text
Article -
15212
Incremental Coding for Real-Time Remote Control over Bandwidth-Limited Channels and Its Applications in Smart Grids
Published 2024-01-01“…However, due to the limited bandwidth, the sub-packets or even bits have to be transmitted successively, thereby experiencing non-negligible latency and inducing serious performance loss in remote control. …”
Get full text
Article -
15213
A Conditional Privacy Preserving Generalized Ring Signcryption Scheme for Micro Aerial Vehicles
Published 2022-11-01“…Elliptic Curve Cryptography (ECC), with a key size of 160 bits, is used in the proposed scheme. The proposed scheme’s security robustness has been analyzed using the Random Oracle Model (ROM), a formal security evaluation method. …”
Get full text
Article -
15214
A Self-Error-Correction-Based Reversible Watermarking Scheme for Vector Maps
Published 2023-02-01“…Simulation results demonstrate that the watermark capacity of this scheme is 1.0000, the coordinate error caused by the watermark embedding process can be limited to no more than 0.00001 when the strength of watermark embedding is set to five, and several watermark bits can be effectively detected and corrected after watermark extraction. …”
Get full text
Article -
15215
Five-Direction Occlusion Filling with Five Layer Parallel Two-Stage Pipeline for Stereo Matching with Sub-Pixel Disparity Map Estimation
Published 2022-11-01“…It consumes about 5.6 K LUTs, 12.8 K registers, and 2.5 M bits of on-chip memory. Meanwhile, the non-occlusion error rate of only 4.61% is about 1% better than the state-of-the-art works in the KITTI2015 dataset. …”
Get full text
Article -
15216
Unoccupied surface and interface states in Pd thin films deposited on Fe/Ir(111) surface
Published 2019-01-01“…The latter are topological magnetic objects with swirling spin-textures with possible implications in the context of spintronic devices since they have the potential to be used as magnetic bits for information technology. The stabilization, detection and manipulation of such non-collinear magnetic entities require a quantitative investigation and a fundamental understanding of their electronic structure. …”
Get full text
Article -
15217
A Chunked and Disordered Data Privacy Protection Algorithm: Application to Resource Platform Systems
Published 2023-05-01“…The key length can be up to 594 bits, rendering it challenging to decrypt. Compared with the traditional DES algorithm, our algorithm has better security under the same conditions and approaches the levels of security offered by the AES and RC4 algorithms.…”
Get full text
Article -
15218
Research progress on the correlation between gut microbiota and preeclampsia: microbiome changes, mechanisms and treatments
Published 2023-10-01“…Research purpose was to compile the existing bits of present scientific data and to close the gap in the knowledge of changes in gut microbiota in preeclampsia and their association with preeclampsia. …”
Get full text
Article -
15219
Variability-Aware Design of RRAM-Based Analog CAMs
Published 2024-01-01“…The results show that our designs have the capability to encode up to 4 bits of storage and achieve up to 24 intervals compared to 6 intervals for the existing 4T2M2S design, with 5-<inline-formula> <tex-math notation="LaTeX">$10 \times $ </tex-math></inline-formula> lower latency and 10-<inline-formula> <tex-math notation="LaTeX">$30 \times $ </tex-math></inline-formula> lower energy consumption, while achieving a lower probability of failure. …”
Get full text
Article -
15220
Ferroelastic-strain-induced multiple nonvolatile resistance states in GeTe/Pb(Mg1/3Nb2/3)O3-PbTiO3 heterostructures
Published 2018-12-01“…Such heterostructures may be used for multilevel data storage that allows each unit to store multiple bits of information and thus improve the memory density. …”
Get full text
Article