-
1161
VLSI design of an irregular LDPC decoder in DTMB
Published 2007-01-01“…An irregular LDPC decoder with a code length of 7 493 bits for DTMB system was implemented based on SMIC 0.13μm CMOS process.A new method to control memories was proposed,which can reuse memories for three different code rates only by increasing 5% memory usage.The throughput of the LDPC decoder is up to 150Mbit/s with the max iterative number of 15.While keeping the throughout of 50Mbit/s,its max iterative number can reach 45.The FPGA synthesis reports and the decoder layout in SMIC 0.13μm CMOS technology are given.…”
Get full text
Article -
1162
Novel robust content-based watermarking for image
Published 2005-01-01“…The chaotic mapping enables the logo pixels rearrange randomly in the specified spatial domain, and the mixed bits of the logo were embedded in the image DCT coefficients. …”
Get full text
Article -
1163
Editorial
Published 2018-06-01“…Basically, this revelation raised only a corner of the veil which, up to then, had hidden the invention, of which only a few bits of advance information, well-crafted to arouse curiosity and interest, had previously been disclosed. …”
Get full text
Article -
1164
-
1165
Ameliyat Öncesi Açlık Hakkında Hemşirelerin Bilgi, Tutum Ve Uygulamalarının Güncel Rehberlere Uygunluğunun Değerlendirilmesi
Published 2022-12-01“…Yöntem: Tanımlayıcı tipteki araştırma, Ağustos-Eylül 2019 tarihleri arasında Bitlis Devlet Hastanesi ve Bitlis/Tatvan Devlet Hastanesi’nde yapıldı. …”
Get full text
Article -
1166
Critical Gates Identification for Fault-Tolerant Design in Math Circuits
Published 2017-01-01“…These critical gates should be hardened first under the area constraint of design criteria. Indeed, output bits considered crucial to a system receive higher priorities to be protected, reducing the occurrence of critical errors. …”
Get full text
Article -
1167
Firm Growth Function and Extended-Gibrat’s Property
Published 2016-01-01“…By employing around one million bits of exhaustive sales data of Japanese firms in the ORBIS database, we confirmed our analytic results.…”
Get full text
Article -
1168
Comparative analysis of integer factorization algorithms
Published 2015-10-01“…Our results showed that for numbers up to 296 bits the Pollard rho algorithm is the fastest one, while Fermat algorithm is fast when distances between factors are small. …”
Get full text
Article -
1169
Kernel technologies and applications of AVS2 video coding standard
Published 2017-08-01“…A brief introduction was given to the development history of AVS video coding standards.Then an overview of the key technologies adopted in AVS2 video coding standard (GB/T 33475.2-2016) was provided,including flexible prediction partition,multiple hypothesis prediction,optimized two-level transform,adaptive loop filter and background picture model based prediction coding for scene video.Compared to the AVS1,AVS2 can achieve more than 50% bits saving.And compared to HEVC/H.265,AVS2 can achieve significant coding efficiency improvement for scene video coding.Moreover,the applications of AVS standard in digital TV broadcasting was introduced briefly.…”
Get full text
Article -
1170
Gaussian-bihyperbolic Numbers Containing Pell and Pell-Lucas Numbers
Published 2023-03-01Get full text
Article -
1171
MECHANICAL STATE ANALYSIS USING QUANTUM THEORY AND MATHEMATICAL MORPHOLOGICAL FILTER
Published 2018-01-01“…Aiming at the erosion operator for the mathematical morphological filter( MMF),the quantum-inspired weighting structuring element( QWSE) is proposed based on the quantum theory to extract fault information of mechanical vibration signal.Firstly,after analyzing the system with multiple quantum bits,a method which is employed to map the quantum space to the real number space is presented and the calculation formula of the QWSE is obtained. …”
Get full text
Article -
1172
McEliece public key cryptosystem attack algorithm based on enumeration error vector
Published 2014-05-01“…The effect on probability of correct decryption by the numbers of error flipping bits and algorithm iteration was focused on. And the security of (1 024,524,101) Goppa-based M public key cryptosystem was analyzed. …”
Get full text
Article -
1173
Enhanced overloaded code division multiple access for network on chip
Published 2022-03-01“…On the other hand, one drawback is that the number of transmitters is limited to the number of encoding bits. In this study, the authors used the combination of Walsh codes and their inverses, as well as the simultaneous application of the time‐division multiple access (TDMA) method, to increase the transmission capacity of this protocol more than four times the standard mode. …”
Get full text
Article -
1174
Combining Alamouti coding with V-BLAST through dynamic antenna grouping
Published 2008-01-01“…Based on the optimal detection ordering information generated in the conventional V-BLAST systems, several bits feedback information was built without any additional computational complexity and then the transmit antennas are dynamically divided into two groups: the two weakest antennas are grouped for Alamouti coding and the rest antennas operates as V-BLAST. …”
Get full text
Article -
1175
Partially adaptive baeam-forming maethods based on genetic algorithms
Published 2006-01-01“…Two partially adaptive schemes, partial elements and partial bits adaptive beam-forming, were discussed with the genetic algorithm. …”
Get full text
Article -
1176
-
1177
Parameter selection of autocorrelation test for block ciphers
Published 2009-01-01“…Autocorrelation test was a statistical test to evaluate the correlation between one sequence and the corresponding non-cyclic left-shifted d bits sequence.It was impractical to adopt all the values of d since its range was often very wide.Three relations between parameters of randomness test were defined firstly.Then the relationships among the subclass D={1,2,m/4,m/2,3m/4,m,2m}of autocorrelation test for block cipher were studied by statistical experiments,where m was block length.The experiments show that the prefer choice of parameter d is m when doing autocorrelation test for block cipher.The method is also available for parameter selection of other randomness test for other types of cryptosystem.…”
Get full text
Article -
1178
Improved meet-in-the-middle attack on Joltik-BC-128
Published 2024-10-01“…The memory and time complexities of the improved 9-round Joltik-BC-128 were 244.91 64-bits blocks and 248 9-round Joltik-BC-128 encryptions. …”
Get full text
Article -
1179
Research on adaptive rate control algorithm for H.264 based on R-Q model
Published 2012-12-01“…The foundation theory of rate control theory in H.264 video coding standard was analyzed.The latest research work about rate control algorithm were summarized.On the basis of analysis.A novel frame-level rate control algorithm was proposed.Firstly,in order to reduce the inter-dependency between RDO (rate-distortion optimization) and rate control,a kind of two-stage rate control algorithm was presented.Secondly,to provide more accurate prediction of the frame complexity,instead of the MAD (mean absolute difference),bits information in the RDO-based mode decision process was employed to predict the frame complexity.Thirdly,a self-adaptive exponential R-Q model was proposed.The proposed rate control algorithm overcomes the disadvantages in the rate control precision and encoding performance of former algorithms.…”
Get full text
Article -
1180
Modified Newton's Law of Gravitation due to Minimal Length in Quantum Gravity
Published 2013-01-01“…This leads to a area -type correction to the area law of entropy which implies that the number of bits N is modified. Therefore, we obtain a modified Newton’s law of gravitation. …”
Get full text
Article