-
661
-
662
DAVİD HUME’DA SİYASAL OTORİTEYE İTAAT YÜKÜMLÜLÜĞÜNÜN GEREKÇESİ VE SINIRLARI
Published 2023-08-01Get full text
Article -
663
A Hardware Accelerator for the Inference of a Convolutional Neural network
Published 2019-11-01“…Our implementation achieved a of accuracy for the MNIST database using only 12-bits fixed-point format. The results show that the co-processing scheme operating at a conservative speed of 100 MHz can identify around 441 images per second, which is about 17% times faster than a 650 MHz - software implementation. …”
Get full text
Article -
664
A Group Identification Protocol with Leakage Resilience of Secret Sharing Scheme
Published 2020-01-01“…In our leakage-resilient GID-scheme, the verifier believes the validity of qualified group members and tolerates l bits of adversarial leakage in the distribution protocol, whereas for unqualified group members, the verifier cannot believe their valid identifications in the proof protocol.…”
Get full text
Article -
665
A New Asymmetric Fully Homomorphic Encryption Scheme for Cloud Banking Data
Published 2021-01-01“…The security of the new system depends on the issue of analyzing huge integers, which reach 2048 bits, to their prime factors, which are considered almost impossible or unsolvable. …”
Get full text
Article -
666
An Evolved Wavelet Library Based on Genetic Algorithm
Published 2014-01-01“…Many conventional image compression algorithms use wavelet transform which can significantly reduce the number of bits needed to represent a pixel and the process of quantization and thresholding further increases the compression. …”
Get full text
Article -
667
A Quantitative Risk Evaluation Model for Network Security Based on Body Temperature
Published 2016-01-01“…This paper proposed a quantitative risk evaluation model for network security based on body temperature (QREM-BT), which refers to the mechanism of biological immune system and the imbalance of immune system which can result in body temperature changes, firstly, through the r-contiguous bits nonconstant matching rate algorithm to improve the detection quality of detector and reduce missing rate or false detection rate. …”
Get full text
Article -
668
Asynchronous Realization of Algebraic Integer-Based 2D DCT Using Achronix Speedster SPD60 FPGA
Published 2013-01-01“…Considering word lengths of 5 and 6 bits, a speed increase of 230% and 199% is observed, respectively. …”
Get full text
Article -
669
Configuration of the Operation Modes for a Scintillating Fiber Sub-Detector in LHCb Experiment
Published 2018-05-01“…This paper shows a step-by-step presentation of the modifications applied to the codes to move from a Standard Mode to a Wide Bus Mode, increasing the data rate by means of the quantity reduction of the control bits to enlarge the amount of analyzable information among the events. …”
Get full text
Article -
670
Comparative Analysis of Drilling Behaviour of Synthetic and Natural Fiber-Based Composites
Published 2021-01-01“…The axial force generated by candlestick drill is minimal compared to the other drill bits. The following may be responsible for lower thrust force: (1) the axial force distributes circumferential of the cutting tool instead of focusing at the center and (2) the interfacial adhesiveness between the matrix and the fiber is higher. …”
Get full text
Article -
671
A Steganographic Method Based on Pixel-Value Differencing and the Perfect Square Number
Published 2013-01-01“…The pixel-value differencing (PVD) scheme uses the difference value between two consecutive pixels in a block to determine how many secret bits should be embedded. There are two types of the quantization range table in Wu and Tasi's method. …”
Get full text
Article -
672
Self-Isolated Surface-Mountable MIMO Antenna for FR1 Band Communications
Published 2024-01-01“…The optimal envelope correlation coefficient (ECC) is near to 0.02, channel capacity loss (CCL) is around 0.2 bits/sec/Hz, directivity gain (DG) is around 9.98 dB, and the MEG ratios are near to unity. …”
Get full text
Article -
673
Automatic Search of Differential Characteristics and Improved Differential Cryptanalysis for PRINCE, QARMA, and MANTIS
Published 2024-01-01“…With this model, we find two sets of 7-round differential characteristics for PRINCE with less guessed key bits and use them to present a multiple differential attack against 11-round PRINCE, which improves the known single-key attack on PRINCE by one round to our knowledge.…”
Get full text
Article -
674
A Low-Power DNN Accelerator With Mean-Error-Minimized Approximate Signed Multiplier
Published 2024-01-01“…In the optimal case of 8 bits, the proposed approximate multiplier saves 49.84% power, 46.41% area and 24.65% delay compared to the exact multiplier. …”
Get full text
Article -
675
A process inspired by fractals for embedding digital codes into additively manufactured components for supply chain security
Published 2025-01-01“…These results suggest a standard selective laser sintering printer with typical metal powders could reasonably expect to print 100 bits of embedded digital information in a gauge volume 6 mm in diameter as 300 $$\upmu$$ m voids while still maintaining tensile specifications.…”
Get full text
Article -
676
Exploring Shared SRAM Tables in FPGAs for Larger LUTs and Higher Degree of Sharing
Published 2017-01-01“…In this paper, we first present a detailed analysis of a previously proposed FPGA architecture which allows sharing of LUTs memory (SRAM) tables among NPN-equivalent functions, to reduce the area as well as the number of configuration bits. We then propose several methods to improve the existing architecture. …”
Get full text
Article -
677
Construction and application of march tests for pattern sensitive memory faults detection
Published 2021-03-01“…Passive pattern sensitive faults (PNPSFk) are allocated, in which arbitrary k from N memory cells participate, where k << N, and N is the memory capacity in bits. For these faults, analytical expressions are given for the minimum and maximum fault coverage that is achievable within the march tests. …”
Get full text
Article -
678
Analysis of the Effects of Livestock Economics on the Sustainability of Rural Settlements, Case Study: Eastern Gavdool District, Malekan
Published 2021-03-01“…Livestock farming is one of the most important activities in rural areasand most villagers, along with agriculture and horticulture, are engaged in animal husbandry (Livestock storage) and some products of the villagers in the agriculture and horticulture sector are devoted to livestock feeding, and others are consumed or sold, such as lob bits, live meat and etc. The purpose of this research is to analyze the effects of livestock economics on sustainable rural development. …”
Get full text
Article -
679
Exploiting the Quantum Advantage for Satellite Image Processing: Review and Assessment
Published 2024-01-01“…These are a unique dataset compared with other satellite images since they have a limited number of input quantum bits and a small number of labeled benchmark images, making them less challenging to deploy on quantum computers.…”
Get full text
Article -
680
A Highly Isolated Tapered Triangular Dual-Polarized Multiband MIMO Antenna for WLAN, C, X and Ku Bands
Published 2024-01-01“…On the basis of comparison with similar existing structures, the proposed antenna demonstrates superior performance in terms of total active reflection coefficient (TARC < −5 dB), diversity gain (DG around 10 dB), channel capacity loss (CCL < 0.3 bits/s/Hz), mean effective gain (MEG) and envelope correlation coefficient (ECC < 0.024). …”
Get full text
Article