Showing 561 - 580 results of 702 for search '"bit"', query time: 0.05s Refine Results
  1. 561
  2. 562
  3. 563

    Multi-Index Monitoring and Evaluation on Rock Burst in Yangcheng Mine by Yunliang Tan, Yanchun Yin, Shitan Gu, Zhiwei Tian

    Published 2015-01-01
    “…Microseismic monitoring and electromagnetic radiation monitoring were early warning method, and drilling bits monitoring was burst region identification method. …”
    Get full text
    Article
  4. 564

    XOR-FREE Implementation of Convolutional Encoder for Reconfigurable Hardware by Gaurav Purohit, Kota Solomon Raju, Vinod Kumar Chaubey

    Published 2016-01-01
    “…The hardware (HW) implementation of new architecture uses Lookup Table (LUT) for storing the parity bits. The design implements architectural reconfigurability by modifying the generator polynomial of the same constraint length and code rate to reduce the design complexity. …”
    Get full text
    Article
  5. 565
  6. 566
  7. 567
  8. 568
  9. 569
  10. 570
  11. 571
  12. 572

    Measuring Biometric Sample Quality in terms of Biometric Feature Information in Iris Images by R. Youmaran, A. Adler

    Published 2012-01-01
    “…From this, the biometric feature information is calculated to be approximately 278 bits for PCA and 288 bits for ICA iris features using Masek's iris recognition scheme. …”
    Get full text
    Article
  13. 573

    Preimage attacks on reduced‐round Keccak hash functions by solving algebraic systems by Junling Pei, Lusheng Chen

    Published 2023-05-01
    “…The authors propose some new properties about the components of Keccak permutation, reconsider the existing preimage attacks, and further refine the linearisation processes of quadratic bits to lower the complexities. For 3‐round Keccak‐256 and Keccak‐512, priority is given to values with higher probability for quadratic bits, such that the guessing complexities decrease from slightly more than 265 and 2440 to 264.79 and 2424, respectively. …”
    Get full text
    Article
  14. 574
  15. 575
  16. 576

    A Post-Processing Method for Quantum Random Number Generator Based on Zero-Phase Component Analysis Whitening by Longju Liu, Jie Yang, Mei Wu, Jinlu Liu, Wei Huang, Yang Li, Bingjie Xu

    Published 2025-01-01
    “…Furthermore, the randomness extraction is performed after ZCA whitening, after which the final random bits can pass the NIST test.…”
    Get full text
    Article
  17. 577

    A Simple Binary Run-Length Compression Technique for Non-Binary Sources Based on Source Mapping by Abdel-Rahman Jaradat, Mansour I. Irshid

    Published 2001-01-01
    “…When applying this simple encoding technique to English text files, we achieve a compression of 5.44bits/character and 4.6bits/character for the fixed-length code and the variablelength (Huffman) code, respectively.…”
    Get full text
    Article
  18. 578

    Design of Compact Trapezoidal Bow-Tie Chipless RFID Tag by Lei Xu, Kama Huang

    Published 2015-01-01
    “…A coding capacity of 12 bits is obtained with 12 slots within a reasonable size of 35 mm × 33 mm. …”
    Get full text
    Article
  19. 579

    New attacks against reduced Rijndael‐160 by Xiaoli Dong, Yongzhuang Wei

    Published 2022-01-01
    “…For the improved 8‐round ID attacks, to take advantage of the key‐schedule weaknesses for Rijndael‐160 under key sizes of 160 and 256 bits, some new attack paths are found. With these attack paths, the 5‐round IDs are proposed based on the property of MixColumns above, and then the attacks on the 8‐round Rijndael‐160 under key sizes of 160 and 256 bits are performed. …”
    Get full text
    Article
  20. 580

    Redesigning the Serpent Algorithm by PA-Loop and Its Image Encryption Application by Sadam Hussain, Muhammad Asif, Tariq Shah, Abid Mahboob, Sayed M. Eldin

    Published 2023-01-01
    “…The observed speed of this technique, which uses a key of 256 bits and a block size of 128 bits, is comparable to three-key triple-DES.…”
    Get full text
    Article