-
561
-
562
Energy Efficient Clustering Based Network Protocol Stack for 3D Airborne Monitoring System
Published 2017-01-01Get full text
Article -
563
Multi-Index Monitoring and Evaluation on Rock Burst in Yangcheng Mine
Published 2015-01-01“…Microseismic monitoring and electromagnetic radiation monitoring were early warning method, and drilling bits monitoring was burst region identification method. …”
Get full text
Article -
564
XOR-FREE Implementation of Convolutional Encoder for Reconfigurable Hardware
Published 2016-01-01“…The hardware (HW) implementation of new architecture uses Lookup Table (LUT) for storing the parity bits. The design implements architectural reconfigurability by modifying the generator polynomial of the same constraint length and code rate to reduce the design complexity. …”
Get full text
Article -
565
An Empirical Rate Constant Based Model to Study Capacity Fading in Lithium Ion Batteries
Published 2015-01-01Get full text
Article -
566
-
567
-
568
Leakage Immune Modified Pass Transistor Based 8T SRAM Cell in Subthreshold Region
Published 2015-01-01Get full text
Article -
569
Modular Self-Reconfigurable Robotic Systems: A Survey on Hardware Architectures
Published 2017-01-01Get full text
Article -
570
On ρ−statistical convergence of order α of sequences of function
Published 2022-12-01Get full text
Article -
571
-
572
Measuring Biometric Sample Quality in terms of Biometric Feature Information in Iris Images
Published 2012-01-01“…From this, the biometric feature information is calculated to be approximately 278 bits for PCA and 288 bits for ICA iris features using Masek's iris recognition scheme. …”
Get full text
Article -
573
Preimage attacks on reduced‐round Keccak hash functions by solving algebraic systems
Published 2023-05-01“…The authors propose some new properties about the components of Keccak permutation, reconsider the existing preimage attacks, and further refine the linearisation processes of quadratic bits to lower the complexities. For 3‐round Keccak‐256 and Keccak‐512, priority is given to values with higher probability for quadratic bits, such that the guessing complexities decrease from slightly more than 265 and 2440 to 264.79 and 2424, respectively. …”
Get full text
Article -
574
-
575
-
576
A Post-Processing Method for Quantum Random Number Generator Based on Zero-Phase Component Analysis Whitening
Published 2025-01-01“…Furthermore, the randomness extraction is performed after ZCA whitening, after which the final random bits can pass the NIST test.…”
Get full text
Article -
577
A Simple Binary Run-Length Compression Technique for Non-Binary Sources Based on Source Mapping
Published 2001-01-01“…When applying this simple encoding technique to English text files, we achieve a compression of 5.44bits/character and 4.6bits/character for the fixed-length code and the variablelength (Huffman) code, respectively.…”
Get full text
Article -
578
Design of Compact Trapezoidal Bow-Tie Chipless RFID Tag
Published 2015-01-01“…A coding capacity of 12 bits is obtained with 12 slots within a reasonable size of 35 mm × 33 mm. …”
Get full text
Article -
579
New attacks against reduced Rijndael‐160
Published 2022-01-01“…For the improved 8‐round ID attacks, to take advantage of the key‐schedule weaknesses for Rijndael‐160 under key sizes of 160 and 256 bits, some new attack paths are found. With these attack paths, the 5‐round IDs are proposed based on the property of MixColumns above, and then the attacks on the 8‐round Rijndael‐160 under key sizes of 160 and 256 bits are performed. …”
Get full text
Article -
580
Redesigning the Serpent Algorithm by PA-Loop and Its Image Encryption Application
Published 2023-01-01“…The observed speed of this technique, which uses a key of 256 bits and a block size of 128 bits, is comparable to three-key triple-DES.…”
Get full text
Article