Showing 101 - 120 results of 702 for search '"bit"', query time: 0.05s Refine Results
  1. 101
  2. 102
  3. 103
  4. 104
  5. 105
  6. 106
  7. 107
  8. 108

    A fully differential switched‐capacitor integrator based programmable resolution hybrid ADC architecture for biomedical applications by Sreenivasulu Polineni, Rekha S., M. S. Bhat

    Published 2021-03-01
    “…The hybrid ADC operates in SAR mode from 8‐bit to 11‐bit resolutions and as the first‐order DSM with a multi‐bit quantizer in 12‐bit to 15‐bit resolutions. …”
    Get full text
    Article
  9. 109

    Exploiting bias in optimal finite-time copying protocols by Daan Mulder, Pieter Rein ten Wolde, Thomas E. Ouldridge

    Published 2025-02-01
    “…We study a finite-time cyclic copy protocol that creates persisting correlations between a memory and a data bit. The average work to copy the two states of the data bit consists of the mutual information created between the memory and data bit after copying, a cost due to the difference between the initial and final states of the memory bit, and a finite-time cost. …”
    Get full text
    Article
  10. 110

    Assessing the effect of deposited bitumen or asphaltenes on the nitrification process in the north saskatchewan river sediment by Nayereh Saborimanesh, Patricia Q. Tran, Md Hosnay Mobarok

    Published 2025-04-01
    “…This study aimed to (1) examine the effects of deposited bitumen (Bit) and asphaltene (Asp) on the North Saskatchewan River (NSR) water quality, focusing on organic carbon and nitrogen; (2) assess the impact of Bit or Asp on sedimentary nitrification; and (3) explore the response of the microbial community to Bit or Asp. …”
    Get full text
    Article
  11. 111

    Accounting Data Encryption Processing Based on Data Encryption Standard Algorithm by Meixi Chen

    Published 2021-01-01
    “…As a block encryption algorithm, the Data Encryption Standard (DES) algorithm uses 64-bit packet data for encryption and decryption. Each eighth bit of the key is used as a parity bit; that is, the actual key length is 56 bits. …”
    Get full text
    Article
  12. 112

    Analysis and Design of an Energy Efficient Differential Coherent Chaos Based System in Additive White Gaussian Noise Environment by Nizar Al Bassam, Oday D. Jerew

    Published 2017-01-01
    “…The proposed scheme provides reduction in bit energy and better bit error performance at large spreading factor. …”
    Get full text
    Article
  13. 113
  14. 114

    Approximate CNN Hardware Accelerators for Resource Constrained Devices by P Thejaswini, Gautham Suresh, V. Chiraag, Sukumar Nandi

    Published 2025-01-01
    “…Our proposed architectures are validated for functionality through an image classification application, utilising the popular MNIST dataset for 8-bit, 16-bit and 32-bit operational word size. Performance analysis of our proposed architectures show that the 32-bit FHA consumes 307.04pJ of energy while achieving acceleration of 76.91x. …”
    Get full text
    Article
  15. 115

    Lattice‐based hash‐and‐sign signatures using approximate trapdoor, revisited by Huiwen Jia, Yupu Hu, Chunming Tang

    Published 2022-01-01
    “…The implementation shows that the sizes of the hash‐and‐sign signature scheme can be reduced to 3.67 kB for an estimation of 81.67‐bit security, and 9.97 kB for an estimation of 168.81‐bit security. …”
    Get full text
    Article
  16. 116

    Pengamanan Citra Digital Menggunakan Kriptografi DnaDan Modified LSB by Sabrina Adela Br Sibarani, Andreas Munthe, Ronsen Purba, Ali Akbar Lubis

    Published 2024-12-01
    “…Setelah enkripsi, ciphertext disembunyikan dalam citra sampul menggunakan teknik steganografi Modified Least Significant Bit (MLSB), yang mengoptimalkan penyisipan bit di saluran RGB dengan pemilihan piksel acak menggunakan generator modulo. …”
    Get full text
    Article
  17. 117

    Evading Antivirus Detection Using Fountain Code-Based Techniques for Executing Shellcodes by Gang-Cheng Huang, Ko-Chin Chang, Tai-Hung Lai

    Published 2025-01-01
    “…The Meterpreter framework for Microsoft Windows 32-bit and 64-bit architectures was used to produce the shellcode used in this investigation. …”
    Get full text
    Article
  18. 118

    Optimal Design Parameters of a Percussive Drilling System for Efficiency Improvement by Changheon Song, Jintai Chung, Jae-Sang Cho, Yun-Joo Nam

    Published 2018-01-01
    “…This paper aims to determine the optimal design parameters for percussive drilling systems considering the bit-rock interaction. First, the motion dynamics of a bit impacted by a dropped piston are modeled by impact stress propagation and a rock-breaking mechanism representing the penetration resistance coefficient and unloading constant. …”
    Get full text
    Article
  19. 119

    Implemetasi Komputasi Akar Kuadrat Resolusi Tinggi pada Field Programmable Gate Array (FPGA) by Muhammad Irfan, Hendra Setiawan

    Published 2022-12-01
    “…Sistem tersebut diimplementasikan menggunakan 32-bit input dan 16-bit output. Proses perhitungan melibatkan Finite State machine (FSM) untuk menghemat resource yang diperlukan. …”
    Get full text
    Article
  20. 120

    Prediction Model of Drilling Performance for Percussive Rock Drilling Tool by Dae-Ji Kim, Jaewon Kim, Booyeong Lee, Min-Seok Shin, Joo-Young Oh, Jung-Woo Cho, Changheon Song

    Published 2020-01-01
    “…A pneumatic dynamic model of the DTH hammer was developed that considers the mass flow rate relations representing the orifice opening areas of the air tube, the piston, and bit flushing channels. A drill bit motion model was developed to represent the dynamics of a drill bit impacted by a dropped piston and explain the impact stress propagation and rock-crushing mechanism. …”
    Get full text
    Article