-
1181
Semi-fragile watermark algorithm based on Walsh-Hadamard transformand and convolution coding
Published 2009-01-01“…In the case of watermark detection, the tampered place of the image was located by detecting the error bits generated by convolution decoding, and its result was used to recover the tampered image. …”
Get full text
Article -
1182
Cryptomite: A versatile and user-friendly library of randomness extractors
Published 2025-01-01“…The extractor implementations are efficient in practice and tolerate input sizes of up to $2^{40}\gt10^{12}$ bits. Contrary to alternatives using the fast Fourier transform, we implement convolutions efficiently using the number-theoretic transform to avoid rounding errors, making them well suited to cryptography. …”
Get full text
Article -
1183
Vilayat-ı Sitte Islahatı’nın Van’da Uygulanma Çabaları
Published 2022-12-01“…The reform project, which was especially followed closely by England, France, Germany and Russia, included giving new rights to Armenians living in Erzurum, Diyarbekir, Bitlis, Van, Sivas and Mamuretulaziz provinces in political, social, economic, legal and many other fields. …”
Get full text
Article -
1184
-
1185
Certificateless strong designated verifier multi-signature
Published 2016-06-01“…,the definition and security model for certificateless strong designated verifier multi-signature were proposed.Then,the first certificateless strong designated verifier multi-signature scheme from bilinear pairings was constructed and it was proved that the scheme is existentially unforgeable under the computational bilinear Diffie-Hellman assumption and the computational Diffie-Hellman assumption.Moreover,the scheme meets the properties of both strong designated verifier signatures and multi-signatures.The scheme achieves high efficiency since the length of designated verifier multi-signature generated by the scheme is only 160 bits and the computational cost of bilinear pairings necessary for verification algorithm is constant,i.e.…”
Get full text
Article -
1186
Nonlinear Singular BVP of Limit Circle Type and the Presence of Reverse-Ordered Upper and Lower Solutions
Published 2011-01-01Get full text
Article -
1187
-
1188
High performance full diversity LDPC codes construction and performance analysis for H-ARQ channels
Published 2012-04-01“…In order to improve the performance of communication system with hybrid automatic repeat request(H-ARQ),a kind of full diversity low density parity check(LDPC)codes on H-ARQ block-fading channels was proposed.First,the outage probability and inherent diversity were analyzed,then a kind of full diversity PDPC codes for H-ARQ channel was designed.The new proposed LDPC codes connected the initial transmission with the repeated transmissions by root-connection to get extern diversity gain.In addition,the relationship between the structure of full diversity LDPC codes and the coding gain was given,and an algorithm to improve coding gain was brought forward by increasing the proportion of full diversity parity bits.Simulation results show that the proposed algorithm can not only achieve full diversity,but also get better performance than constructed LDPC codes at present.…”
Get full text
Article -
1189
Noncoherent multiple symbol detection of CPFSK based on decision-feedback
Published 2016-04-01“…To reduce complexity, the approach in which ruling element information was employed to filter waveforms during length of observing bits. Besides, the theoretical performance was approved by a composition of upper bound and lower bound. …”
Get full text
Article -
1190
Du rat-toto fils du porc-épic, de la panthère et de la nandinie
Published 2020-12-01“…It is up to the ethnologist, woman, to acquire this knowledge to seize these bits of secrecy (its secretions, secretas in the sense of Zempleni, 1996).…”
Get full text
Article -
1191
Algorithm design on energy efficiency maximization for UAV-assisted edge computing
Published 2020-10-01“…For the unmanned aerial vehicle (UAV)-assisted edge computing system,a two-stage alternative algorithm was proposed to solve the formulated complex non-convex problem.Firstly,the formulated non-linear fractional programming problem was reformulated to the equivalent parametric problem by using Dinkelbach method.Secondly,two sub-problems were further considered based on it.By employing the Lagrange duality method,the closed-form solutions for the central processing unit frequencies and the number of data bits were derived.Finally,based on the solutions obtained,the conditions that the source node prefers to offload/share its data and the relay chooses to forward the computation results,as well as the approaches to achieve high energy efficiency were revealed.Numerical results demonstrate that the proposed design can achieve a performance improvement of up to 20 times over the conventional schemes.…”
Get full text
Article -
1192
Shared entanglement for three-party causal order guessing game
Published 2025-01-01“…In a variant of communication tasks, players cooperate in choosing their local strategies to compute a given task later, working separately. Utilizing quantum bits for communication and sharing entanglement between parties is a recognized method to enhance performance in these situations. …”
Get full text
Article -
1193
Configurable Multi-Layer Perceptron-Based Soft Sensors on Embedded Field Programmable Gate Arrays: Targeting Diverse Deployment Goals in Fluid Flow Estimation
Published 2024-12-01“…For precision-focused and latency-sensitive deployments, a six-layer, 60-neuron MLP accelerator quantized to 8 bits on the XC7S15 achieved an MSE of 56.56, an MAPE of 1.61%, and an inference latency of 23.87 <inline-formula><math xmlns="http://www.w3.org/1998/Math/MathML" display="inline"><semantics><mo>μ</mo></semantics></math></inline-formula>s. …”
Get full text
Article -
1194
Dark Energy in Spherically Symmetric Universe Coupled with Brans-Dicke Scalar Field
Published 2019-01-01Get full text
Article -
1195
The Responses of Turkish Islam to COVID-19 Pandemic: Health and Salvation
Published 2021-10-01Get full text
Article -
1196
Research Developments in Generative Adversarial Networks for Image Restoration and Communication
Published 2025-01-01“…The system can realize encoding and decoding of input bits of arbitrary length with good generalization ability. …”
Get full text
Article -
1197
Application of Hybrid Transform Domain Digital Watermarking in Power System Information Security
Published 2013-11-01“…The secret watermark information bits were embedded into low frequency subband in hybrid transform. …”
Get full text
Article -
1198
On Key Evolution over Wireless Channels
Published 2015-07-01“…Finally, we propose a k -resistant encryption scheme that can use different keys to encrypt and decrypt messages if there are no more than k bits which differ between the encryption and decryption keys.…”
Get full text
Article -
1199
Improvement of Image Compression by Changing the Mathematical Equation Style in Communication Systems
Published 2022-01-01“…Compression is an essential process to reduce the amount of information by reducing the number of bits; this process is necessary for uploading images, audio, video, storage services, and TV transmission. …”
Get full text
Article -
1200
A new automatic watermarking algorithm based on Fuzzy Logic and Harris Hawks optimization
Published 2024-03-01“…Moreover, by decomposing the triangular matrix, which embeds the watermark bits in the matrix element, the use of Mamdani implication and the product inference engine have led to an efficient watermark extraction. …”
Get full text
Article