-
261
SENSITIVITY ANALYSIS OF AVALANCHE PHOTODIODE AND PIN DIODE DETECTORS IN OPTICAL RECEIVERS
Published 2018-12-01“… This research explained how to establish the optical receiver sensitivity and the link power budget design in terms of quality factor, receiver power and bit error rate (BER) for several values of attenuation at 100km fiber length. …”
Get full text
Article -
262
Design and Implementation of Multiple Ring Oscillator-Based TRNG Architecture by Using ADPLL
Published 2025-01-01“…Energy consumption per bit of the generated bitstream is in the range of 4.22 nJ/bit-5.85 nJ/bit, and throughput values are in the range of 206.82 Mbps-260.07 Mbps. …”
Get full text
Article -
263
New indifferentiability security proof of MDPH hash function
Published 2022-07-01“…When instantiated with an n‐bit block cipher, Naito proved that this achieves the (nearly) optimal indifferentiable security bound of O (n − log n)‐bit security. …”
Get full text
Article -
264
Identifier syntax and mnemonics in programming languages
Published 2000-12-01“…Modern computers uses 8 bit coding, and many programming languages does so. …”
Get full text
Article -
265
Study on residual tensile strength of carbon fiber composite laminates after drilling
Published 2024-06-01“…The results show that spindle speed, feed rate and bit tip angle all have significant effects on the laminate's tensile residual strength. …”
Get full text
Article -
266
No-feedback rate control algorithm for Wyner-Ziv video coding
Published 2011-01-01“…To avoid using feedback channel,an encoder rate control algorithm for Wyner-Ziv video coding was proposed.Firstly,using the target frame-rate and the target bit-rate,It could determine the bit allocation for each group-of-picture(GOP).According to the correlation between adjacent frames,the bit budget for a GOP were further allocated to key frame and Wyner-Ziv frames within the GOP by dynamically choosing quantization parameter and quantization matrices.Then,with refinement of correlation-noise model(CNM) parameter,different LDPC(low-density parity-check) check matrices might be chosen for each bitplane to control the encoding bitrate of Wyner-Ziv frame.Experimental results show that the difference between expected target bitrate and actual encoded bitrate is less than 0.57% using the proposed method,and compared with existing algorithm,average PSNR(peak signal-to-noise ratio) of decoded video quality can be increased by 1 dB.In addition,our algorithm slightly increases encoder complexity,and can be used in practice.…”
Get full text
Article -
267
Improved Cache trace driven attack on AES and CLEFIA
Published 2011-01-01“…An improved Cache trace attack on AES and CLEFIA was proposed by considering Cache miss trace informa-tion and S-box misalignment.Current trace driven attacks all assume that the S-box is perfectly aligned in Cache,and it’s impossible to recover the whole first round key of AES and CLEFIA under limited key searching space.However,the re-search demonstrates that the S-box is misaligned in Cache at most cases,by utilizing the Cache miss trace information of the cipher encryption,200 samples first round analysis and 50 samples last round analysis can reduce 128bit AES master key searching space to 216 and 1 respectively,80 samples first round analysis can reduce 128bit CLEFIA first round key searching space to 216,220 samples first three rounds analysis can reduce 128bit CLEFIA master key searching space to 216,all of the attacks above can be finished within 1 second.…”
Get full text
Article -
268
Related-Key Cryptanalysis on the Full PRINTcipher Suitable for IC-Printing
Published 2014-01-01“…PRINTcipher-48/96 are 48/96-bit block ciphers proposed in CHES 2010 which support the 80/160-bit secret keys, respectively. …”
Get full text
Article -
269
The Studies of Buffer Control Strategy of 128 kb/s Videophone System
Published 1995-01-01“…A new bit-rate control strategy with both global pre-allocation and local segmentation (GALS) for low bit rate application of Rec.H.261.is proposed in this paper. …”
Get full text
Article -
270
-
271
Non-orthogonal multiple access wireless energy harvesting cooperative system
Published 2021-04-01“…Non-orthogonal multiple access (NOMA) has recently attracted wide attention as a promising multiple access technology adopted in 5G cellular networks.In order to improve the spectrum efficiency, coverage and anti-noise performance of NOMA technology, while reduce the energy consumption of the system, a simultaneous wireless information and power transfer (SWIPT) cooperative network uplink NOMA transmission system based on orthogonal index modulation multiple access (IMMA) technology was designed, hereafter was denoted as QIMMA-SWIPT.Specifically, the QIMMA system was formed by multiple remote users, and it improved the spectrum efficiency and anti-noise performance as well as expanded the communication coverage and reduced the energy consumption of the system by decoding and forwarding relay cooperative transmission with SWIPT technology.The theoretical upper bound of the average bit error rate of QIMMA-SWIPT was derived.Simulation and analysis demonstrate that, under the same spectrum efficiency, the bit error rate performance of the cooperative QIMMA-SWIPT system is better than that of the cooperative IMMA-SWIPT and SCMA-SWIPT systems.In addition, the effects of power cut factor and source-to-relay distance on bit error performance were also deeply analyzed.…”
Get full text
Article -
272
Audio steganography by quantization index modulation in the DCT domain
Published 2009-01-01“…It is more challenge to extract embedded bit with non-error from audio. A novel audio steganography based on QIM (quantization index modulation) in the DCT (discrete cosine transform) domain was proposed. …”
Get full text
Article -
273
NUMERICAL SIMULATION STUDY ON COAL AND ROCK CRUSHING OF COAL PLOUGH
Published 2019-01-01“…Through the simulation of coal crushing process under different conditions of plow bit,get contact force plow bit and simulation of coal wall. …”
Get full text
Article -
274
Temporal dependent rate-distortion optimization based on distortion backward propagation
Published 2022-12-01“…Rate-distortion optimization (RDO) is a crucial technique in block based hybrid video encoders.However, the widely used independent RDO is far from obtaining optimal coding performance.To improve the rate-distortion (R-D) performance of high efficiency video coding (HEVC), a temporal dependent RDO algorithm was proposed.Firstly, the formula to calculate temporal distortion propagation factor was derived by using an exponential R-D function.Then, the coding distortion and motion compensation predicted error were obtained by pre-encoding, and the temporal distortion propagation factor was estimated by using distortion backward propagation.Finally, the Lagrange multiplier and quantization parameter of coding tree unit were adaptively adjusted to optimize bit resources allocation.Experimental results show that compared with the original RDO method in HEVC under the low-delay configuration, the proposed algorithm achieves an average 4.4% bit rate reduction for all test sequences, and up to 13.0% bit rate reduction for test sequence BasketballDrill, at the same reconstructed video quality.…”
Get full text
Article -
275
Differential fault attack on LiCi cipher
Published 2021-04-01“…LiCi lightweight block cipher is a new algorithm proposed in 2017.With advantages of small structure and low energy consumption, LiCi is more suitable for resource-constrained environments such as the internet of things (IoT).In the design document of LiCi, the ability of LiCi algorithm to resist differential attack and linear attack is analyzed, but the resistance of LiCi algorithm to differential fault attack has not been discussed.According to the permutation law of each round iteration of LiCi algorithm, 32-bit key can be recovered by injecting a single bit fault into the left half of the 31st round iteration combined with its differential property.According to the key choreography scheme of the LiCi algorithm, the same differential fault attack was performed on iterations 30th, 29th, 28th, 27th and 26th round to recover all the original keys.The attack requires a total of 48-bit faults, and the computational complexity is 2<sup>32</sup>, which indicates the LiCi algorithm is difficult to resist differential fault attacks.…”
Get full text
Article -
276
Resource allocation for multi-conductor power-cable carrier communications systems
Published 2010-01-01“…Owing to the limitation of lagrange multiplier method used to solve the resource allocation problem with cross-interfere, linear transformation was applying for the transmitting signal and its correlative parameters to decouple channels’ cross-interfere and decompose the complicated allocation problem into multiple simple equivalent channel optimization problems. A novel bit adding/subtracting algorithm based on SVD-GMD decoupling and dirty-paper coding was proposed with the classical water-filling theory, and another bit adding look-up table algorithm based on SVD decoupling is also proposed for comparison. …”
Get full text
Article -
277
Artificial intelligence artificial muscle of dielectric elastomers
Published 2025-03-01Get full text
Article -
278
Detection Schemes With Low-Resolution ADCs and Spatial Oversampling for Transmission With Higher-Order Constellations in Terahertz Band
Published 2025-01-01“…Furthermore, at low signal-to-noise ratios (SNRs), 1-bit quantization outperforms 2- and 3-bit quantization, respectively, even when employing higher-order constellations. …”
Get full text
Article -
279
Anisotropic Ferro- and Dielectric Properties of Textured Bi4Ti3O12 Ceramics Prepared by the Solid-State Reaction Based on Multiple Calcination
Published 2010-01-01“…The grain-oriented Bi4Ti3O12 (BIT) samples were prepared by the solid-state reaction method with a multicalcination process. …”
Get full text
Article -
280
Ring Oscillators with Additional Phase Detectors as a Random Source in a Random Number Generator
Published 2024-12-01“…Generating a specified number of bits is on-demand, eliminating the need for continuous RNG operation. …”
Get full text
Article