-
1101
-
1102
Diversité et importance de la flore ligneuse de la ville de Sokodé (Centre - Togo)
Published 2021-02-01“…The Shannon diversity index (4.8 bits) is relatively higher at the establishment level, followed by concessions (4.61 bits), interstices (4.03 bits) then roads (3.7 bits). …”
Get full text
Article -
1103
Research on unequal error protection of irregular LDPC codes
Published 2005-01-01“…With systematic encoding, the important information bits in information sequence could successfully be mapped to the elite bits of an irregular LDPC code. …”
Get full text
Article -
1104
-
1105
Joint iterative decision feedback channel estimation and detection for Turbo coded V-BLAST MIMO-OFDM systems
Published 2006-01-01“…For Turbo coded V-BLAST MIMO-OFDM systems,a joint iterative decision feedback channel estimation and detection scheme were presented,which combined the Turbo iterative decoding with least square channel estimation,and made full use of the soft systematic bits and soft parity bits of Turbo iterative decoding to improve the channel estimation performance.The simulation results showed that not only the error propagation was corrected at low signal-noise-ratio but also the channel estimation performance of the whole system was improved greatly.Furthermore,the scheme is applicable for very bad channel environments.…”
Get full text
Article -
1106
Leakage Immune Modified Pass Transistor Based 8T SRAM Cell in Subthreshold Region
Published 2015-01-01Get full text
Article -
1107
Modular Self-Reconfigurable Robotic Systems: A Survey on Hardware Architectures
Published 2017-01-01Get full text
Article -
1108
On ρ−statistical convergence of order α of sequences of function
Published 2022-12-01Get full text
Article -
1109
-
1110
-
1111
Chaotic sequence based polar code encrypted scheme in negative secrecy capacity case
Published 2020-10-01“…A chaos based encrypted polar coding scheme,which could be applied to the negative secrecy capacity case,was proposed.Chaotic sequences were employed to encrypt the information bits and fill the frozen bits.And multi-block polar coding structure was also employed in the proposed scheme.The proposed scheme was featured as lower complexity and higher secrecy transmission rate.Corresponding mathematical analysis had been performed in terms of the error probability,security and transmission rate.The result reveals that the proposed scheme can achieve reliability,security in negative secrecy capacity case.What’s more,it has relatively low complexity and high secrecy transmission rate compared with the existing schemes.…”
Get full text
Article -
1112
-
1113
-
1114
Measuring Biometric Sample Quality in terms of Biometric Feature Information in Iris Images
Published 2012-01-01“…From this, the biometric feature information is calculated to be approximately 278 bits for PCA and 288 bits for ICA iris features using Masek's iris recognition scheme. …”
Get full text
Article -
1115
Preimage attacks on reduced‐round Keccak hash functions by solving algebraic systems
Published 2023-05-01“…The authors propose some new properties about the components of Keccak permutation, reconsider the existing preimage attacks, and further refine the linearisation processes of quadratic bits to lower the complexities. For 3‐round Keccak‐256 and Keccak‐512, priority is given to values with higher probability for quadratic bits, such that the guessing complexities decrease from slightly more than 265 and 2440 to 264.79 and 2424, respectively. …”
Get full text
Article -
1116
-
1117
A Post-Processing Method for Quantum Random Number Generator Based on Zero-Phase Component Analysis Whitening
Published 2025-01-01“…Furthermore, the randomness extraction is performed after ZCA whitening, after which the final random bits can pass the NIST test.…”
Get full text
Article -
1118
A Simple Binary Run-Length Compression Technique for Non-Binary Sources Based on Source Mapping
Published 2001-01-01“…When applying this simple encoding technique to English text files, we achieve a compression of 5.44bits/character and 4.6bits/character for the fixed-length code and the variablelength (Huffman) code, respectively.…”
Get full text
Article -
1119
Communication-efficient federated learning method via redundant data elimination
Published 2023-05-01“…To address the influence of limited network bandwidth of edge devices on the communication efficiency of federated learning, and efficiently transmit local model update to complete model aggregation, a communication-efficient federated learning method via redundant data elimination was proposed.The essential reasons for generation of redundant update parameters and according to non-IID properties and model distributed training features of FL were analyzed, a novel sensitivity and loss function tolerance definitions for coreset was given, and a novel federated coreset construction algorithm was proposed.Furthermore, to fit the extracted coreset, a novel distributed adaptive sparse network model evolution mechanism was designed to dynamically adjust the structure and the training model size before each global training iteration, which reduced the number of communication bits between edge devices and the server while also guarantees the training model accuracy.Experimental results show that the proposed method achieves 17% reduction in communication bits transmission while only 0.5% degradation in model accuracy compared with state-of-the-art method.…”
Get full text
Article -
1120
Design of Compact Trapezoidal Bow-Tie Chipless RFID Tag
Published 2015-01-01“…A coding capacity of 12 bits is obtained with 12 slots within a reasonable size of 35 mm × 33 mm. …”
Get full text
Article