Showing 1,141 - 1,160 results of 1,322 for search '"bit"', query time: 0.05s Refine Results
  1. 1141
  2. 1142
  3. 1143

    Efficient constructions for large‐state block ciphers based on AES New Instructions by Rentaro Shiba, Kosei Sakamoto, Takanori Isobe

    Published 2022-05-01
    “…Abstract Large‐state block ciphers with 256 bits or 512 bits block sizes receive much attention from the viewpoint of long‐term security. …”
    Get full text
    Article
  4. 1144

    Cryptanalysis of the Vesta-2M stream cipher by GUAN Jie

    Published 2003-01-01
    “…The author point out the mistake of attack introduced by the paper [1], and introduce a known plaintext attack method where only a small segment of known plaintext(about hundreds of bits) , the upper bound of the compute complexity is)2(372O.…”
    Get full text
    Article
  5. 1145

    A Sometimes Mercurial Process: New Protocols for the Preservation of Singapore’s Time Based Art Collection by Mar Cruz

    Published 2024-12-01
    “…The conservation of Time Based Media (TBM) artwork deals in the world of bits, bytes, checksums and obsolescence, terms far different from the conservation of paper, paintings or sculpture. …”
    Get full text
    Article
  6. 1146
  7. 1147

    A VHDL Code for Offset Pulse Position Modulation Working with Reed Solomon System by Using ModelSim by Ahmed H. Albatoosh, Mohamed Ibrahim Shuja'a, Basman M. Al-Nedawe

    Published 2022-12-01
    “…These bits can then be utilized by the receiver to identify and correct specific types of errors. …”
    Get full text
    Article
  8. 1148
  9. 1149

    Determining the Natural Disaster Diversity of Van Province by Fine Kinney Risk Assessment Method (FK-RAM) by Bülent Matpay, Sacit Mutlu

    Published 2023-07-01
    “…RAM, which was previously applied by researchers for Bitlis, was applied for the first time for Van province. …”
    Get full text
    Article
  10. 1150

    Wav-audio steganography algorithm based on amplitude modifying by 邹明光, 李芝棠

    Published 2014-10-01
    “…Algorithms in different effective domains are analysed,and a wav-audio steganography algorithm based on amplitude modifying is proposed.The secret audio is scrambled through a random number generator.Amplitude values of each sampling point group are compared in original audio.While amplitude values are modified,the secret information bits are embedded.Embedding strength can be adjusted according to the key.Simulation results demonstrate that hiding capacity of this algorithm is large and good invisibility can be achieved.The anti-steganalysis ability of this algorithm is good and blind extraction can be realized.…”
    Get full text
    Article
  11. 1151

    Study of FEC at edge node of optical code label switching network by Yu-bao WANG, Shao-yu ZHI

    Published 2012-05-01
    “…The structure block of the optical code label switching network was built,and the design scheme for the forwarding equivalent classes (FEC)was proposed employing OCDM technology which was appropriate for variable packets transmission and allow the label processed in parallel in core node.The overhead between the duration of control bits and the duration of payload was investigated based on the above design scheme.The fixed slot algorithm (FSA) was employed to assemble the incoming packets in the assemble queue,simulation results and analysis were given between the relation of arrival ratio/assemble slot and packets loss ratio.…”
    Get full text
    Article
  12. 1152

    Screen Guided Training Does Not Capture Goal-Oriented Behaviors: Learning Myoelectric Control Mappings From Scratch Using Context Informed Incremental Learning by Evan Campbell, Ethan Eddy, Xavier Isabel, Scott Bateman, Benoit Gosselin, Ulysse Cote-Allard, Erik Scheme

    Published 2025-01-01
    “…Despite lower offline accuracy, the ZS-A model achieved the highest online throughput (<inline-formula> <tex-math notation="LaTeX">$1.47~\pm ~0.46$ </tex-math></inline-formula> bits/s), significantly outperforming the SGT baseline (<inline-formula> <tex-math notation="LaTeX">$1.15~\pm ~0.37$ </tex-math></inline-formula> bits/s) and reached competitive performance within 200 seconds. …”
    Get full text
    Article
  13. 1153

    Security of the cryptosystems based on ergodic matrices by Hua-wei HUANG, Chang-wen PENG, Yun-yun QU, Chun-hua LI

    Published 2015-08-01
    “…The security of the public-key cryptosystems based on ergodicmatrices over finite field was analysed.According to the public key,a system of linear equations for the forged secret key bits is obtained by inverse matrix elimination method.It is proved that the computational TEME problem is solvablein polynomial time and the ciphertext of the PZZ1 cryptosystem can be decrypted by the forged secret key.In some case the SEME problem can be reduced to discrete logarithm problem in polynomial time.If the key parameters are chosen improperly,then PZZ2 cryptosystem is based on discrete logarithm problem instead of NP hard problem.…”
    Get full text
    Article
  14. 1154

    Research and simulation of timing attacks on ECC by Hui-hui JIA, Chao WANG, Jian GU, Hao-hao SONG, Di TANG

    Published 2016-04-01
    “…Based on the hidden Markov model (HMM) idea,a timing attack on the elliptic curve digital signature system,which adopted the “double-and-add” scalar multiplication,was proposed.Simulation experiments on the secure Koblitz curve which released by the National Institute of Standards Technology (NIST) were implemented and four secure Koblitz curves except the K-571 were attacked successfully.The experiment results show that the attack can recover almost all the key bits in a few minutes by collecting only once time data,and is easy to imple-ment at a high success rate.…”
    Get full text
    Article
  15. 1155

    Resource Allocation Algorithm for the Downlink of Multi-User OFDM System with Optimized Fairness by Limei Tang, Haiyan Cao, Jun Li, Shiyi Xie

    Published 2015-12-01
    “…Firstly, assign the subcarriers to users with the constraint on proportional fairness and the water-filling algorithm was used in this process for the power allocation of each subcarrier. Then update the bits and power for each subcarrier of all the users using greedy power allocation to achieve higher data rates and power efficiency. …”
    Get full text
    Article
  16. 1156
  17. 1157
  18. 1158
  19. 1159

    Generation of address sequences with specified switching activity and address repeatability by V. N. Yarmolik, N. A. Shevchenko, V. А. Levantsevich, D. V. Demenkovets

    Published 2022-09-01
    “…The relevance of this problem lies in the fact that the main characteristic of the difference and their effectiveness for address sequences is the switching activity of both individual address bits and their sequences.Methods. Presented results are based on a universal method for generating quasi-random Sobol sequences, which are effectively used to generate targeted test sequences. …”
    Get full text
    Article
  20. 1160

    Energy efficiency joint optimization algorithm for low-precision ADC massive MIMO systems by Haiyan CAO, Wenjuan HU, Yingjuan ZHI, Fangmin XU, Xin FANG

    Published 2020-06-01
    “…An uplink energy efficiency optimization algorithm based on alternating optimization algorithm was proposed for large-scale multiple-input multiple-output (MIMO) systems with low-precision analog to digital converters (ADC).That is,based on the maximum ratio combining (MRC) reception,an optimization model aiming at maximizing energy efficiency was established,and then the original fractional form optimization problem was converted into an equivalent subtractive form according to the nature of the fractional programming.In the case where the number of quantization bits was constant,the iterative optimization of the transmission power and the pilot length were performed.Simulation results show that the proposed algorithm has better spectral efficiency and energy efficiency.…”
    Get full text
    Article