-
15441
Classical Communication Coset State (t,n) Threshold Quantum Digital Signature
Published 2023-01-01“…In addition, we propose a novel reuse quantum-token protocol based on the length of the hash message to-be-signed to enable single-member signatures over multiple bits. This scheme has other potential applications, including eavesdropper identification, quantum threshold proxy signatures, and more flexible quantum threshold schemes. …”
Get full text
Article -
15442
-
15443
More optimal relativistic quantum key distribution
Published 2022-09-01“…Both schemes rely on high-dimensional quantum systems (phase and polarization encodings are utilized for establishing key bits). One of the proposed schemes is a system comprised of two sequentially connected interferometers, as the first (interferometer) controls the behavior of the second one. …”
Get full text
Article -
15444
A Unified Framework for Full-Duplex Massive MIMO Cellular Networks With Low Resolution Data Converters
Published 2023-01-01“…Our contributions for forward and reverse links include (1) deriving signal-to-quantization-plus-interference-plus-noise ratio (SQINR) under pilot contamination, linear minimum mean square error (LMMSE) channel estimation and channel hardening; (2) deriving closed-form and approximate analytical expressions of spectral efficiency; (3) deriving asymptotic results and power scaling laws with respect to the number of quantization bits, base station antennas, and users, as well as base station and user equipment power budgets; and (4) analyzing outage probability and spectral efficiency vs. cell shape, shadowing, noise, cellular interference, pilot contamination, pilot overhead, and frequency reuse. …”
Get full text
Article -
15445
Design and Implementation of a Personalizable Alternative Mouse and Keyboard Interface for Individuals with Limited Upper Limb Mobility
Published 2022-11-01“…With an average throughput of <inline-formula><math xmlns="http://www.w3.org/1998/Math/MathML" display="inline"><semantics><mrow><mn>1.56</mn></mrow></semantics></math></inline-formula> bits per second achieved by the alternative mouse and typing speeds of <inline-formula><math xmlns="http://www.w3.org/1998/Math/MathML" display="inline"><semantics><mrow><mn>8.44</mn></mrow></semantics></math></inline-formula> words per minute obtained using the alternative keyboard, the proposed interface could be a promising input device for people with limited upper limb mobility.…”
Get full text
Article -
15446
Sosyal Medya Bağımlılığı ve Uyku Kalitesi Arasındaki İlişki: Sanal Dünyanın Ergenler Üzerindeki Etkisi
Published 2023-09-01Get full text
Article -
15447
Líquenes: bioindicadores de contaminación atmosférica de origen vehicular en tres zonas del distrito de Cajamarca
Published 2020-06-01“…El área ocupada por cada especie liquénica fue procesada a partir del programa Adobe Photoshop CS6 Extended – Versión 13.0 64 bits, y el área se procesó en cm2. Se determinó el flujo vehicular, así como la abundancia y la riqueza de las especies liquénicas, para cada una de las tres zonas, utilizando una rejilla de 0,50 m x 0,10 m (dividida en cuadrículas de 20 cm2). …”
Article -
15448
Latency-Aware Accelerator of SIMECK Lightweight Block Cipher
Published 2022-12-01“…This article presents a latency-optimized implementation of the SIMECK lightweight block cipher on a field-programmable-gate-array (FPGA) platform with a block and key lengths of 32 and 64 bits. The critical features of our architecture include parallelism, pipelining, and a dedicated controller. …”
Get full text
Article -
15449
El no tan nuevo espíritu del predictivismo: de la estadística moderna al big data
Published 2020-05-01“…En este caso, no será la precisión o el cómputo nítido sino el enorme volumen de bits lo que garantizará, por puro cuantitativismo apabullante, anticiparse a los futuros sociales y sus comportamientos desviados. …”
Get full text
Article -
15450
Leakage-Resilient Anonymous Multi-Receiver Certificate-Based Key Encapsulation Scheme
Published 2023-01-01“…Attackers with the ability of such attacks can continuously obtain part (several bits) of the secret keys and then calculate the complete secret keys. …”
Get full text
Article -
15451
Enhancing Power Efficiency in Branch Target Buffer Design with a Two-Level Prediction Mechanism
Published 2024-03-01“…The first level employs the skew mechanism, and the second level dissects the tag bits to create the Partial tag. These two levels of prediction mechanism correspond to the bank/way prediction for the two-level BTB structure. …”
Get full text
Article -
15452
Mapping flows
Published 2015-04-01“…Regardless of how it is mapped, Switzerland’s contemporary urban fabric hardly adheres to an immaculate image, manifesting instead a disjunctive amalgam of bits and pieces that operate according to their own rules and agendas. …”
Get full text
Article -
15453
Is NSGA-II Ready for Large-Scale Multi-Objective Optimization?
Published 2022-11-01“…The same methodology, when applied to the telecommunications problem, shows that significant improvements can be obtained with respect to the original NSGA-II algorithm when solving problems with thousands of bits.…”
Get full text
Article -
15454
Securing Physical Layer for FHSS Communication System Using Code andPhase Hopping Techniques in CDMA, System Design and Implementation
Published 2020-07-01“…In 2017 Code and Phase Hopping Techniques are both proposed to resolve the most recent problem in security-related, but not with FHSS, therefore in this paper presents a new composed proposed system will progress Phase Shift and Code Hopping in Code Division Multiplexing Access (CDMA) to complement with FHSS; because the wireless Communications systems security in the last years became a nightmare for some individuals, also companies, and even countries, also join them needing for higher bits rate in the wireless channels; because of next-generation communication system 5G-6G and the evolution in social networking, IoT, stream media, IoE, visualizations, and cloud computing. …”
Get full text
Article -
15455
-
15456
Application of virtual simulation situational model in Russian spatial preposition teaching
Published 2022-09-01“…When the data length is 0.6-s, the Information Transfer Rate (ITR) reaches the highest: 242.21 ± 46.88 bits/min. Therefore, a high-speed BCI character input system based on SSVEP is designed using HFPM. …”
Get full text
Article -
15457
Comparative Reliability Analysis between Horizontal-Vertical-Diagonal Code and Code with Crosstalk Avoidance and Error Correction for NoC Interconnects
Published 2023-07-01“…Code with Crosstalk Avoidance and Error Correction (CCAEC) for network-on-chip interconnects uses simple parity check bits as the main technique to get high error correction capacity. …”
Get full text
Article -
15458
The Functions of Music in the Film and its Effect on the Audience
Published 2023-01-01“…Tempo tempo is determined by repeating combination bits and controlling the duration of each shot between one cut and the next, giving each scene a unique rhythmic character. …”
Get full text
Article -
15459
Improved Coefficient Recovery and Its Application for Rewritable Data Embedding
Published 2021-11-01“…Furthermore, the proposed rewritable data embedding method is able to embed 20,146 bits into an image of dimensions <inline-formula><math xmlns="http://www.w3.org/1998/Math/MathML" display="inline"><semantics><mrow><mn>512</mn><mo>×</mo><mn>512</mn></mrow></semantics></math></inline-formula>.…”
Get full text
Article -
15460
A Novel Privacy Paradigm for Improving Serial Data Privacy
Published 2022-04-01“…Protecting the privacy of individuals is of utmost concern in today’s society, as inscribed and governed by the prevailing privacy laws, such as GDPR. In serial data, bits of data are continuously released, but their combined effect may result in a privacy breach in the whole serial publication. …”
Get full text
Article