-
461
Design of 10T SRAM cell with improved read performance and expanded write margin
Published 2021-01-01“…Furthermore, the read and write delay of projected topology improve by 1.78× and 2.326× in comparison with conventional 6T bit SRAM cell. In FF process corner, the proposed topology shows lowest data retention voltage (DRV) and minimum variation in DRV with temperature. …”
Get full text
Article -
462
A Covert α-Stable Noise-Based Extended Random Communication by Incorporating Multiple Inverse Systems
Published 2025-01-01“…The results from Monte Carlo simulations show that deploying the proposed ERCS not only leads to better Bit Error Rate (BER) performance but also provides increased covertness values, which proves the design’s ability to enhance performance and security compared to earlier models. …”
Get full text
Article -
463
Contaminated Pond Water Favors Cholera Outbreak at Haibatpur Village, Purba Medinipur District, West Bengal, India
Published 2014-01-01“…The underground water was a bit saline in nature. Using pond water for preparation of fermented rice (Panta Bhat) (OR 4.73, 95% CI 1.69–13.51), washing utensil in pond water (OR 7.31, 95% CI 1.77–42.29) were associated with cholera outbreak. …”
Get full text
Article -
464
Properties of the new N $$ \mathcal{N} $$ = 1 AdS4 vacuum of maximal supergravity
Published 2020-01-01“…Studying the structure of the submanifold of SO(3) × ℤ2-invariant supergravity scalars, we find that it has a simple interpretation as a submanifold of the 14-dimensional ℤ 2 3 $$ {\mathbb{Z}}_2^3 $$ -invariant scalar manifold (SU(1, 1)/U(1))7, for which we find a rather remarkable superpotential whose structure matches the single bit error correcting (7, 4) Hamming code. This 14-dimensional scalar manifold contains approximately one quarter of the known critical points. …”
Get full text
Article -
465
A multi-band dual-layer encoded microwave absorber with angle selectivity
Published 2025-03-01“…This work aims to develop a microwave absorber with tunable angles, utilizing 1-bit coding to achieve precise regulation of absorption angles across different coding states, resulting in selective absorption exceeding 99 %. …”
Get full text
Article -
466
Revisit two memoryless state‐recovery cryptanalysis methods on A5/1
Published 2023-07-01“…Abstract At ASIACRYPT 2019, Zhang proposed a near collision attack on A5/1 claiming to recover the 64‐bit A5/1 state with a time complexity around 232 cipher ticks with negligible memory requirements. …”
Get full text
Article -
467
Study of Rock Burst Risk Evolution in Front of Deep Longwall Panel Based on Passive Seismic Velocity Tomography
Published 2020-01-01“…Tomography results are in good agreement with the drilling bit result, rock burst occurrence, microseismic activity, and working resistance of hydraulic supports. …”
Get full text
Article -
468
A Cryptographic Scheme for Construction of Substitution Boxes Using Quantic Fractional Transformation
Published 2022-01-01“…The usefulness of the constructed S-box was also tested using several criteria such as nonlinearity, differential uniformity, strict avalanche criteria, linear approximation probability and bit independence criteria. To assess the reliability of S-box, its performance outcomes are compared to those of previously developed S-boxes. …”
Get full text
Article -
469
Dual-Polarization Self-Coherent Transceivers for Free Space Optical Communications in the Presence of Atmospheric Turbulence
Published 2025-01-01“…This leads to an increased bit error rate (BER) in conventional systems that use two photodetectors (PDs). …”
Get full text
Article -
470
LoRa Resource Allocation Algorithm for Higher Data Rates
Published 2025-01-01“…In this paper, we introduce the LoRa Resource Allocation (LRA) algorithm, designed to address these limitations by enabling parallel transmissions, thereby reducing the total transmission time (<i>T<sub>tx</sub></i>) and increasing the bit rate (BR). The LRA algorithm leverages the quasi-orthogonality of LoRa’s Spreading Factors (SFs) and employs specially designed end devices equipped with dual LoRa transceivers, each operating on a distinct SF. …”
Get full text
Article -
471
Influence of drilling incidence angle on the drilling force distribution of pneumatic impactor
Published 2025-01-01“…Based on the dynamic theory of impact drilling and finite element method (FEM), the constitutive model of HJC criterion and INVENTOR 3D mechanical structure design software, a 3D numerical analysis system of piston-bit head-rock during pneumatic impactor drilling is established by ANSYS LS-DYNA, a nonlinear dynamic analysis software. …”
Get full text
Article -
472
Solving Nonnative Combinatorial Optimization Problems Using Hybrid Quantum–Classical Algorithms
Published 2024-01-01“…These solutions typically have several challenges: 1) there is little to no performance gain over classical methods; 2) not all constraints and objectives may be efficiently encoded in the quantum ansatz; and 3) the solution domain of the objective function may not be the same as the bit strings of measurement outcomes. This work presents “nonnative hybrid algorithms”: a framework to overcome these challenges by integrating quantum and classical resources with a hybrid approach. …”
Get full text
Article -
473
Numerical and Analytical Calculations for Modeling and Designing Drilling Wicks or Rotary Cutters Based of Functionally Graded Materials
Published 2018-01-01“…Drilling tools or drilling pipes, such as drill bit and mill drill, are often subjected to various forces, including essentially tangential forces, centered on their axis of rotation. …”
Get full text
Article -
474
The Evaluation of LSB Steganography on Image File Using 3DES and MD5 Key
Published 2024-03-01“…This study proposes the utilization of LSB (Least Significant Bit) steganography on image files employing the 3DES (Triple Data Encryption Standard) algorithm. …”
Get full text
Article -
475
Performance Analysis of Multi-UAV Optical Communication Systems Over Foggy Channel Under Málaga Turbulence and Pointing Error Impairments
Published 2024-01-01“…Specifically, some critical statistical expressions, such as probability and cumulative density functions, were derived, which were employed to assess the performance metrics, including outage probability, average bit error rate, and ergodic capacity. Additionally, these performance metrics obtained through theoretical analysis in the presence of atmospheric turbulence, fog absorption, and pointing errors were corroborated by Monte Carlo simulations. …”
Get full text
Article -
476
Improving Performance of Integrated Ground-HAPS FSO Communication Links With MIMO Application
Published 2024-01-01“…Capitalizing on this PDF expression, we present novel results for fundamental performance metrics, including outage probability, average bit-error rate (BER) of on-off keying (OOK) modulation scheme, and ergodic capacity expressed in terms of the Meijer's G function. …”
Get full text
Article -
477
Computer Simulation and Field Experiment for Downlink Multiuser MIMO in Mobile WiMAX System
Published 2015-01-01“…In computer simulation, a MU-MIMO transmission system can be realized by using the block diagonalization (BD) algorithm, and each user can receive signals without any signal interference from other users. The bit error rate (BER) performance and channel capacity in accordance with modulation schemes and the number of streams were simulated in a spatially correlated multipath fading environment. …”
Get full text
Article -
478
Monte Carlo simulation of interferometric measurement and wavefront shaping under influence of shot noise and camera noise
Published 2025-01-01“…In particular, we have focused on evaluating wavefront shaping fidelity under the influence of shot noise with practical considerations on the operation of digital image sensors, including readout noise, dark current noise, and digitization with finite bit-depth. Based on some exemplary simulation results, we provide practical guidance for setting up an interferometric measurement system for wavefront shaping applications.…”
Get full text
Article -
479
A Performance Analysis of Business Intelligence Techniques on Crime Prediction
Published 2018“…Also the execution time in seconds of J48, Naïve bayes, Multilayer perceptron and SVO is 0.06, 0.14, 9.26 and 0.66 respectively using windows7 32 bit. Hence, Decision Tree (J48) out performed Naïve bayes, Multilayer perceptron and Support Vector Machine (SMO) algorithms, and manifested higher performance both in execution time and in accuracy. …”
Get full text
Article -
480
Vehicle Detection Algorithm Based on Embedded Video Image Processing in the Background of Information Technology
Published 2022-01-01“…Developers need to support complex configurations and various aspects, such as different resolutions/display sizes, different bit rates, real-time issues, and even the reliability of the video source. …”
Get full text
Article