-
1141
Loss Estimation for Kırşehir Province According to Different Earthquake Scenarios
Published 2019-01-01Get full text
Article -
1142
3D Bioprinting Strategies for Melatonin‐Loaded Polymers in Bone Tissue Engineering
Published 2025-01-01Get full text
Article -
1143
Efficient constructions for large‐state block ciphers based on AES New Instructions
Published 2022-05-01“…Abstract Large‐state block ciphers with 256 bits or 512 bits block sizes receive much attention from the viewpoint of long‐term security. …”
Get full text
Article -
1144
Cryptanalysis of the Vesta-2M stream cipher
Published 2003-01-01“…The author point out the mistake of attack introduced by the paper [1], and introduce a known plaintext attack method where only a small segment of known plaintext(about hundreds of bits) , the upper bound of the compute complexity is)2(372O.…”
Get full text
Article -
1145
A Sometimes Mercurial Process: New Protocols for the Preservation of Singapore’s Time Based Art Collection
Published 2024-12-01“…The conservation of Time Based Media (TBM) artwork deals in the world of bits, bytes, checksums and obsolescence, terms far different from the conservation of paper, paintings or sculpture. …”
Get full text
Article -
1146
LeaData a novel reference data of leather images for automatic species identification
Published 2025-02-01Get full text
Article -
1147
A VHDL Code for Offset Pulse Position Modulation Working with Reed Solomon System by Using ModelSim
Published 2022-12-01“…These bits can then be utilized by the receiver to identify and correct specific types of errors. …”
Get full text
Article -
1148
-
1149
Determining the Natural Disaster Diversity of Van Province by Fine Kinney Risk Assessment Method (FK-RAM)
Published 2023-07-01“…RAM, which was previously applied by researchers for Bitlis, was applied for the first time for Van province. …”
Get full text
Article -
1150
Wav-audio steganography algorithm based on amplitude modifying
Published 2014-10-01“…Algorithms in different effective domains are analysed,and a wav-audio steganography algorithm based on amplitude modifying is proposed.The secret audio is scrambled through a random number generator.Amplitude values of each sampling point group are compared in original audio.While amplitude values are modified,the secret information bits are embedded.Embedding strength can be adjusted according to the key.Simulation results demonstrate that hiding capacity of this algorithm is large and good invisibility can be achieved.The anti-steganalysis ability of this algorithm is good and blind extraction can be realized.…”
Get full text
Article -
1151
Study of FEC at edge node of optical code label switching network
Published 2012-05-01“…The structure block of the optical code label switching network was built,and the design scheme for the forwarding equivalent classes (FEC)was proposed employing OCDM technology which was appropriate for variable packets transmission and allow the label processed in parallel in core node.The overhead between the duration of control bits and the duration of payload was investigated based on the above design scheme.The fixed slot algorithm (FSA) was employed to assemble the incoming packets in the assemble queue,simulation results and analysis were given between the relation of arrival ratio/assemble slot and packets loss ratio.…”
Get full text
Article -
1152
Screen Guided Training Does Not Capture Goal-Oriented Behaviors: Learning Myoelectric Control Mappings From Scratch Using Context Informed Incremental Learning
Published 2025-01-01“…Despite lower offline accuracy, the ZS-A model achieved the highest online throughput (<inline-formula> <tex-math notation="LaTeX">$1.47~\pm ~0.46$ </tex-math></inline-formula> bits/s), significantly outperforming the SGT baseline (<inline-formula> <tex-math notation="LaTeX">$1.15~\pm ~0.37$ </tex-math></inline-formula> bits/s) and reached competitive performance within 200 seconds. …”
Get full text
Article -
1153
Security of the cryptosystems based on ergodic matrices
Published 2015-08-01“…The security of the public-key cryptosystems based on ergodicmatrices over finite field was analysed.According to the public key,a system of linear equations for the forged secret key bits is obtained by inverse matrix elimination method.It is proved that the computational TEME problem is solvablein polynomial time and the ciphertext of the PZZ1 cryptosystem can be decrypted by the forged secret key.In some case the SEME problem can be reduced to discrete logarithm problem in polynomial time.If the key parameters are chosen improperly,then PZZ2 cryptosystem is based on discrete logarithm problem instead of NP hard problem.…”
Get full text
Article -
1154
Research and simulation of timing attacks on ECC
Published 2016-04-01“…Based on the hidden Markov model (HMM) idea,a timing attack on the elliptic curve digital signature system,which adopted the “double-and-add” scalar multiplication,was proposed.Simulation experiments on the secure Koblitz curve which released by the National Institute of Standards Technology (NIST) were implemented and four secure Koblitz curves except the K-571 were attacked successfully.The experiment results show that the attack can recover almost all the key bits in a few minutes by collecting only once time data,and is easy to imple-ment at a high success rate.…”
Get full text
Article -
1155
Resource Allocation Algorithm for the Downlink of Multi-User OFDM System with Optimized Fairness
Published 2015-12-01“…Firstly, assign the subcarriers to users with the constraint on proportional fairness and the water-filling algorithm was used in this process for the power allocation of each subcarrier. Then update the bits and power for each subcarrier of all the users using greedy power allocation to achieve higher data rates and power efficiency. …”
Get full text
Article -
1156
FPGA-QNN: Quantized Neural Network Hardware Acceleration on FPGAs
Published 2025-01-01Get full text
Article -
1157
-
1158
Cheating Detection in Online Exams Using Deep Learning and Machine Learning
Published 2025-01-01Get full text
Article -
1159
Generation of address sequences with specified switching activity and address repeatability
Published 2022-09-01“…The relevance of this problem lies in the fact that the main characteristic of the difference and their effectiveness for address sequences is the switching activity of both individual address bits and their sequences.Methods. Presented results are based on a universal method for generating quasi-random Sobol sequences, which are effectively used to generate targeted test sequences. …”
Get full text
Article -
1160
Energy efficiency joint optimization algorithm for low-precision ADC massive MIMO systems
Published 2020-06-01“…An uplink energy efficiency optimization algorithm based on alternating optimization algorithm was proposed for large-scale multiple-input multiple-output (MIMO) systems with low-precision analog to digital converters (ADC).That is,based on the maximum ratio combining (MRC) reception,an optimization model aiming at maximizing energy efficiency was established,and then the original fractional form optimization problem was converted into an equivalent subtractive form according to the nature of the fractional programming.In the case where the number of quantization bits was constant,the iterative optimization of the transmission power and the pilot length were performed.Simulation results show that the proposed algorithm has better spectral efficiency and energy efficiency.…”
Get full text
Article