-
101
Processing streams in a monitoring cloud cluster
Published 2020-01-01Subjects: Get full text
Article -
102
Optimal integration of photovoltaic sources and capacitor banks considering irradiance, temperature, and load changes in electric distribution system
Published 2025-01-01Subjects: “…Efficient Metaheuristic BitTorrent (EM-BT) algorithm…”
Get full text
Article -
103
-
104
Clival Ectopic Pituitary Adenoma Mimicking a Chordoma: Case Report and Review of the Literature
Published 2016-01-01Get full text
Article -
105
Performance of Coherent Optical MPSK in Underwater Turbulent Channels With Phase Errors
Published 2025-01-01Subjects: Get full text
Article -
106
-
107
-
108
A fully differential switched‐capacitor integrator based programmable resolution hybrid ADC architecture for biomedical applications
Published 2021-03-01“…The hybrid ADC operates in SAR mode from 8‐bit to 11‐bit resolutions and as the first‐order DSM with a multi‐bit quantizer in 12‐bit to 15‐bit resolutions. …”
Get full text
Article -
109
Exploiting bias in optimal finite-time copying protocols
Published 2025-02-01“…We study a finite-time cyclic copy protocol that creates persisting correlations between a memory and a data bit. The average work to copy the two states of the data bit consists of the mutual information created between the memory and data bit after copying, a cost due to the difference between the initial and final states of the memory bit, and a finite-time cost. …”
Get full text
Article -
110
Assessing the effect of deposited bitumen or asphaltenes on the nitrification process in the north saskatchewan river sediment
Published 2025-04-01“…This study aimed to (1) examine the effects of deposited bitumen (Bit) and asphaltene (Asp) on the North Saskatchewan River (NSR) water quality, focusing on organic carbon and nitrogen; (2) assess the impact of Bit or Asp on sedimentary nitrification; and (3) explore the response of the microbial community to Bit or Asp. …”
Get full text
Article -
111
Accounting Data Encryption Processing Based on Data Encryption Standard Algorithm
Published 2021-01-01“…As a block encryption algorithm, the Data Encryption Standard (DES) algorithm uses 64-bit packet data for encryption and decryption. Each eighth bit of the key is used as a parity bit; that is, the actual key length is 56 bits. …”
Get full text
Article -
112
Analysis and Design of an Energy Efficient Differential Coherent Chaos Based System in Additive White Gaussian Noise Environment
Published 2017-01-01“…The proposed scheme provides reduction in bit energy and better bit error performance at large spreading factor. …”
Get full text
Article -
113
-
114
Approximate CNN Hardware Accelerators for Resource Constrained Devices
Published 2025-01-01“…Our proposed architectures are validated for functionality through an image classification application, utilising the popular MNIST dataset for 8-bit, 16-bit and 32-bit operational word size. Performance analysis of our proposed architectures show that the 32-bit FHA consumes 307.04pJ of energy while achieving acceleration of 76.91x. …”
Get full text
Article -
115
Lattice‐based hash‐and‐sign signatures using approximate trapdoor, revisited
Published 2022-01-01“…The implementation shows that the sizes of the hash‐and‐sign signature scheme can be reduced to 3.67 kB for an estimation of 81.67‐bit security, and 9.97 kB for an estimation of 168.81‐bit security. …”
Get full text
Article -
116
Pengamanan Citra Digital Menggunakan Kriptografi DnaDan Modified LSB
Published 2024-12-01“…Setelah enkripsi, ciphertext disembunyikan dalam citra sampul menggunakan teknik steganografi Modified Least Significant Bit (MLSB), yang mengoptimalkan penyisipan bit di saluran RGB dengan pemilihan piksel acak menggunakan generator modulo. …”
Get full text
Article -
117
Evading Antivirus Detection Using Fountain Code-Based Techniques for Executing Shellcodes
Published 2025-01-01“…The Meterpreter framework for Microsoft Windows 32-bit and 64-bit architectures was used to produce the shellcode used in this investigation. …”
Get full text
Article -
118
Optimal Design Parameters of a Percussive Drilling System for Efficiency Improvement
Published 2018-01-01“…This paper aims to determine the optimal design parameters for percussive drilling systems considering the bit-rock interaction. First, the motion dynamics of a bit impacted by a dropped piston are modeled by impact stress propagation and a rock-breaking mechanism representing the penetration resistance coefficient and unloading constant. …”
Get full text
Article -
119
Implemetasi Komputasi Akar Kuadrat Resolusi Tinggi pada Field Programmable Gate Array (FPGA)
Published 2022-12-01“…Sistem tersebut diimplementasikan menggunakan 32-bit input dan 16-bit output. Proses perhitungan melibatkan Finite State machine (FSM) untuk menghemat resource yang diperlukan. …”
Get full text
Article -
120
Prediction Model of Drilling Performance for Percussive Rock Drilling Tool
Published 2020-01-01“…A pneumatic dynamic model of the DTH hammer was developed that considers the mass flow rate relations representing the orifice opening areas of the air tube, the piston, and bit flushing channels. A drill bit motion model was developed to represent the dynamics of a drill bit impacted by a dropped piston and explain the impact stress propagation and rock-crushing mechanism. …”
Get full text
Article