Showing 261 - 280 results of 1,322 for search '"bit"', query time: 0.05s Refine Results
  1. 261

    SENSITIVITY ANALYSIS OF AVALANCHE PHOTODIODE AND PIN DIODE DETECTORS IN OPTICAL RECEIVERS by ELECHI PROMISE, ORIKE SUNNY, MINAH-EEBA WINNER, EZINNE IKPO CHIKERENMA

    Published 2018-12-01
    “… This research explained how to establish the optical receiver sensitivity and the link power budget design in terms of quality factor, receiver power and bit error rate (BER) for several values of attenuation at 100km fiber length. …”
    Get full text
    Article
  2. 262

    Design and Implementation of Multiple Ring Oscillator-Based TRNG Architecture by Using ADPLL by Huirem Bharat Meitei, Manoj Kumar

    Published 2025-01-01
    “…Energy consumption per bit of the generated bitstream is in the range of 4.22 nJ/bit-5.85 nJ/bit, and throughput values are in the range of 206.82 Mbps-260.07 Mbps. …”
    Get full text
    Article
  3. 263

    New indifferentiability security proof of MDPH hash function by Chun Guo, Tetsu Iwata, Kazuhiko Minematsu

    Published 2022-07-01
    “…When instantiated with an n‐bit block cipher, Naito proved that this achieves the (nearly) optimal indifferentiable security bound of O (n − log n)‐bit security. …”
    Get full text
    Article
  4. 264

    Identifier syntax and mnemonics in programming languages by Mikas Grigaliūnas, Gintautas Grigas

    Published 2000-12-01
    “…Modern computers uses 8 bit coding, and many programming languages does so. …”
    Get full text
    Article
  5. 265

    Study on residual tensile strength of carbon fiber composite laminates after drilling by YU Fen, CUI NaiWei, HE ZhenPeng, LI BaiChun

    Published 2024-06-01
    “…The results show that spindle speed, feed rate and bit tip angle all have significant effects on the laminate's tensile residual strength. …”
    Get full text
    Article
  6. 266

    No-feedback rate control algorithm for Wyner-Ziv video coding by SONG Bin, YANG Ming-ming, QIN Hao, HE Hong

    Published 2011-01-01
    “…To avoid using feedback channel,an encoder rate control algorithm for Wyner-Ziv video coding was proposed.Firstly,using the target frame-rate and the target bit-rate,It could determine the bit allocation for each group-of-picture(GOP).According to the correlation between adjacent frames,the bit budget for a GOP were further allocated to key frame and Wyner-Ziv frames within the GOP by dynamically choosing quantization parameter and quantization matrices.Then,with refinement of correlation-noise model(CNM) parameter,different LDPC(low-density parity-check) check matrices might be chosen for each bitplane to control the encoding bitrate of Wyner-Ziv frame.Experimental results show that the difference between expected target bitrate and actual encoded bitrate is less than 0.57% using the proposed method,and compared with existing algorithm,average PSNR(peak signal-to-noise ratio) of decoded video quality can be increased by 1 dB.In addition,our algorithm slightly increases encoder complexity,and can be used in practice.…”
    Get full text
    Article
  7. 267

    Improved Cache trace driven attack on AES and CLEFIA by ZHAO Xin-jie1, GUO Shi-ze2, WANG Tao1, LIU Hui-ying1

    Published 2011-01-01
    “…An improved Cache trace attack on AES and CLEFIA was proposed by considering Cache miss trace informa-tion and S-box misalignment.Current trace driven attacks all assume that the S-box is perfectly aligned in Cache,and it’s impossible to recover the whole first round key of AES and CLEFIA under limited key searching space.However,the re-search demonstrates that the S-box is misaligned in Cache at most cases,by utilizing the Cache miss trace information of the cipher encryption,200 samples first round analysis and 50 samples last round analysis can reduce 128bit AES master key searching space to 216 and 1 respectively,80 samples first round analysis can reduce 128bit CLEFIA first round key searching space to 216,220 samples first three rounds analysis can reduce 128bit CLEFIA master key searching space to 216,all of the attacks above can be finished within 1 second.…”
    Get full text
    Article
  8. 268

    Related-Key Cryptanalysis on the Full PRINTcipher Suitable for IC-Printing by Yuseop Lee, Kitae Jeong, Changhoon Lee, Jaechul Sung, Seokhie Hong

    Published 2014-01-01
    “…PRINTcipher-48/96 are 48/96-bit block ciphers proposed in CHES 2010 which support the 80/160-bit secret keys, respectively. …”
    Get full text
    Article
  9. 269

    The Studies of Buffer Control Strategy of 128 kb/s Videophone System by 王海松, 何芸

    Published 1995-01-01
    “…A new bit-rate control strategy with both global pre-allocation and local segmentation (GALS) for low bit rate application of Rec.H.261.is proposed in this paper. …”
    Get full text
    Article
  10. 270
  11. 271

    Non-orthogonal multiple access wireless energy harvesting cooperative system by Xiaoping JIN, Qing WU, Wenchao ZHAI, Jianrong BAO

    Published 2021-04-01
    “…Non-orthogonal multiple access (NOMA) has recently attracted wide attention as a promising multiple access technology adopted in 5G cellular networks.In order to improve the spectrum efficiency, coverage and anti-noise performance of NOMA technology, while reduce the energy consumption of the system, a simultaneous wireless information and power transfer (SWIPT) cooperative network uplink NOMA transmission system based on orthogonal index modulation multiple access (IMMA) technology was designed, hereafter was denoted as QIMMA-SWIPT.Specifically, the QIMMA system was formed by multiple remote users, and it improved the spectrum efficiency and anti-noise performance as well as expanded the communication coverage and reduced the energy consumption of the system by decoding and forwarding relay cooperative transmission with SWIPT technology.The theoretical upper bound of the average bit error rate of QIMMA-SWIPT was derived.Simulation and analysis demonstrate that, under the same spectrum efficiency, the bit error rate performance of the cooperative QIMMA-SWIPT system is better than that of the cooperative IMMA-SWIPT and SCMA-SWIPT systems.In addition, the effects of power cut factor and source-to-relay distance on bit error performance were also deeply analyzed.…”
    Get full text
    Article
  12. 272

    Audio steganography by quantization index modulation in the DCT domain by CHEN Ming1, ZHANG Ru1, LIU Fan-fan1, NIU Xin-xin1, YANG Yi-xian1

    Published 2009-01-01
    “…It is more challenge to extract embedded bit with non-error from audio. A novel audio steganography based on QIM (quantization index modulation) in the DCT (discrete cosine transform) domain was proposed. …”
    Get full text
    Article
  13. 273

    NUMERICAL SIMULATION STUDY ON COAL AND ROCK CRUSHING OF COAL PLOUGH by HAO ZhiYong, WANG ShuaiLing, CHEN ZhiQiang, YUAN Zhi

    Published 2019-01-01
    “…Through the simulation of coal crushing process under different conditions of plow bit,get contact force plow bit and simulation of coal wall. …”
    Get full text
    Article
  14. 274

    Temporal dependent rate-distortion optimization based on distortion backward propagation by Hongwei GUO, Ce ZHU, Xu YANG, Lei LUO

    Published 2022-12-01
    “…Rate-distortion optimization (RDO) is a crucial technique in block based hybrid video encoders.However, the widely used independent RDO is far from obtaining optimal coding performance.To improve the rate-distortion (R-D) performance of high efficiency video coding (HEVC), a temporal dependent RDO algorithm was proposed.Firstly, the formula to calculate temporal distortion propagation factor was derived by using an exponential R-D function.Then, the coding distortion and motion compensation predicted error were obtained by pre-encoding, and the temporal distortion propagation factor was estimated by using distortion backward propagation.Finally, the Lagrange multiplier and quantization parameter of coding tree unit were adaptively adjusted to optimize bit resources allocation.Experimental results show that compared with the original RDO method in HEVC under the low-delay configuration, the proposed algorithm achieves an average 4.4% bit rate reduction for all test sequences, and up to 13.0% bit rate reduction for test sequence BasketballDrill, at the same reconstructed video quality.…”
    Get full text
    Article
  15. 275

    Differential fault attack on LiCi cipher by Weijian CHEN, Haoxiang LUO

    Published 2021-04-01
    “…LiCi lightweight block cipher is a new algorithm proposed in 2017.With advantages of small structure and low energy consumption, LiCi is more suitable for resource-constrained environments such as the internet of things (IoT).In the design document of LiCi, the ability of LiCi algorithm to resist differential attack and linear attack is analyzed, but the resistance of LiCi algorithm to differential fault attack has not been discussed.According to the permutation law of each round iteration of LiCi algorithm, 32-bit key can be recovered by injecting a single bit fault into the left half of the 31st round iteration combined with its differential property.According to the key choreography scheme of the LiCi algorithm, the same differential fault attack was performed on iterations 30th, 29th, 28th, 27th and 26th round to recover all the original keys.The attack requires a total of 48-bit faults, and the computational complexity is 2<sup>32</sup>, which indicates the LiCi algorithm is difficult to resist differential fault attacks.…”
    Get full text
    Article
  16. 276

    Resource allocation for multi-conductor power-cable carrier communications systems by XU Zhi-qiang1, ZHAI Ming-yue1, ZHAO Yu-ming2

    Published 2010-01-01
    “…Owing to the limitation of lagrange multiplier method used to solve the resource allocation problem with cross-interfere, linear transformation was applying for the transmitting signal and its correlative parameters to decouple channels’ cross-interfere and decompose the complicated allocation problem into multiple simple equivalent channel optimization problems. A novel bit adding/subtracting algorithm based on SVD-GMD decoupling and dirty-paper coding was proposed with the classical water-filling theory, and another bit adding look-up table algorithm based on SVD decoupling is also proposed for comparison. …”
    Get full text
    Article
  17. 277
  18. 278

    Detection Schemes With Low-Resolution ADCs and Spatial Oversampling for Transmission With Higher-Order Constellations in Terahertz Band by Christian Forsch, Peter Zillmann, Osama Alrabadi, Stefan Brueck, Wolfgang Gerstacker

    Published 2025-01-01
    “…Furthermore, at low signal-to-noise ratios (SNRs), 1-bit quantization outperforms 2- and 3-bit quantization, respectively, even when employing higher-order constellations. …”
    Get full text
    Article
  19. 279

    Anisotropic Ferro- and Dielectric Properties of Textured Bi4Ti3O12 Ceramics Prepared by the Solid-State Reaction Based on Multiple Calcination by Xiangyu Mao, Wei Wang, Hui Sun, Xiaobing Chen

    Published 2010-01-01
    “…The grain-oriented Bi4Ti3O12 (BIT) samples were prepared by the solid-state reaction method with a multicalcination process. …”
    Get full text
    Article
  20. 280

    Ring Oscillators with Additional Phase Detectors as a Random Source in a Random Number Generator by Łukasz Matuszewski, Mieczysław Jessa, Jakub Nikonowicz

    Published 2024-12-01
    “…Generating a specified number of bits is on-demand, eliminating the need for continuous RNG operation. …”
    Get full text
    Article