Showing 1,181 - 1,200 results of 1,322 for search '"bit"', query time: 0.06s Refine Results
  1. 1181

    Semi-fragile watermark algorithm based on Walsh-Hadamard transformand and convolution coding by ZHAO Feng1, LI Jian2, LI Sheng-hong2

    Published 2009-01-01
    “…In the case of watermark detection, the tampered place of the image was located by detecting the error bits generated by convolution decoding, and its result was used to recover the tampered image. …”
    Get full text
    Article
  2. 1182

    Cryptomite: A versatile and user-friendly library of randomness extractors by Cameron Foreman, Richie Yeung, Alec Edgington, Florian J. Curchod

    Published 2025-01-01
    “…The extractor implementations are efficient in practice and tolerate input sizes of up to $2^{40}\gt10^{12}$ bits. Contrary to alternatives using the fast Fourier transform, we implement convolutions efficiently using the number-theoretic transform to avoid rounding errors, making them well suited to cryptography. …”
    Get full text
    Article
  3. 1183

    Vilayat-ı Sitte Islahatı’nın Van’da Uygulanma Çabaları by Serhat Aras TUNA

    Published 2022-12-01
    “…The reform project, which was especially followed closely by England, France, Germany and Russia, included giving new rights to Armenians living in Erzurum, Diyarbekir, Bitlis, Van, Sivas and Mamuretulaziz provinces in political, social, economic, legal and many other fields. …”
    Get full text
    Article
  4. 1184
  5. 1185

    Certificateless strong designated verifier multi-signature by Hong-zhen DU, Qiao-yan WEN

    Published 2016-06-01
    “…,the definition and security model for certificateless strong designated verifier multi-signature were proposed.Then,the first certificateless strong designated verifier multi-signature scheme from bilinear pairings was constructed and it was proved that the scheme is existentially unforgeable under the computational bilinear Diffie-Hellman assumption and the computational Diffie-Hellman assumption.Moreover,the scheme meets the properties of both strong designated verifier signatures and multi-signatures.The scheme achieves high efficiency since the length of designated verifier multi-signature generated by the scheme is only 160 bits and the computational cost of bilinear pairings necessary for verification algorithm is constant,i.e.…”
    Get full text
    Article
  6. 1186
  7. 1187
  8. 1188

    High performance full diversity LDPC codes construction and performance analysis for H-ARQ channels by Rui GUO, Fang-ning HU, Ji-lin LIU

    Published 2012-04-01
    “…In order to improve the performance of communication system with hybrid automatic repeat request(H-ARQ),a kind of full diversity low density parity check(LDPC)codes on H-ARQ block-fading channels was proposed.First,the outage probability and inherent diversity were analyzed,then a kind of full diversity PDPC codes for H-ARQ channel was designed.The new proposed LDPC codes connected the initial transmission with the repeated transmissions by root-connection to get extern diversity gain.In addition,the relationship between the structure of full diversity LDPC codes and the coding gain was given,and an algorithm to improve coding gain was brought forward by increasing the proportion of full diversity parity bits.Simulation results show that the proposed algorithm can not only achieve full diversity,but also get better performance than constructed LDPC codes at present.…”
    Get full text
    Article
  9. 1189

    Noncoherent multiple symbol detection of CPFSK based on decision-feedback by Qiang CHEN, Guo-sheng RUI, Wen-jun SUN, Wen-biao TIAN, Yang ZHANG

    Published 2016-04-01
    “…To reduce complexity, the approach in which ruling element information was employed to filter waveforms during length of observing bits. Besides, the theoretical performance was approved by a composition of upper bound and lower bound. …”
    Get full text
    Article
  10. 1190

    Du rat-toto fils du porc-épic, de la panthère et de la nandinie by Claudie Haxaire

    Published 2020-12-01
    “…It is up to the ethnologist, woman, to acquire this knowledge to seize these bits of secrecy (its secretions, secretas in the sense of Zempleni, 1996).…”
    Get full text
    Article
  11. 1191

    Algorithm design on energy efficiency maximization for UAV-assisted edge computing by Qihui WU, Wei WU

    Published 2020-10-01
    “…For the unmanned aerial vehicle (UAV)-assisted edge computing system,a two-stage alternative algorithm was proposed to solve the formulated complex non-convex problem.Firstly,the formulated non-linear fractional programming problem was reformulated to the equivalent parametric problem by using Dinkelbach method.Secondly,two sub-problems were further considered based on it.By employing the Lagrange duality method,the closed-form solutions for the central processing unit frequencies and the number of data bits were derived.Finally,based on the solutions obtained,the conditions that the source node prefers to offload/share its data and the relay chooses to forward the computation results,as well as the approaches to achieve high energy efficiency were revealed.Numerical results demonstrate that the proposed design can achieve a performance improvement of up to 20 times over the conventional schemes.…”
    Get full text
    Article
  12. 1192

    Shared entanglement for three-party causal order guessing game by Ryszard Kukulski, Paulina Lewandowska, Karol Życzkowski

    Published 2025-01-01
    “…In a variant of communication tasks, players cooperate in choosing their local strategies to compute a given task later, working separately. Utilizing quantum bits for communication and sharing entanglement between parties is a recognized method to enhance performance in these situations. …”
    Get full text
    Article
  13. 1193

    Configurable Multi-Layer Perceptron-Based Soft Sensors on Embedded Field Programmable Gate Arrays: Targeting Diverse Deployment Goals in Fluid Flow Estimation by Tianheng Ling, Chao Qian, Theodor Mario Klann, Julian Hoever, Lukas Einhaus, Gregor Schiele

    Published 2024-12-01
    “…For precision-focused and latency-sensitive deployments, a six-layer, 60-neuron MLP accelerator quantized to 8 bits on the XC7S15 achieved an MSE of 56.56, an MAPE of 1.61%, and an inference latency of 23.87 <inline-formula><math xmlns="http://www.w3.org/1998/Math/MathML" display="inline"><semantics><mo>μ</mo></semantics></math></inline-formula>s. …”
    Get full text
    Article
  14. 1194
  15. 1195
  16. 1196

    Research Developments in Generative Adversarial Networks for Image Restoration and Communication by Zhou Peng

    Published 2025-01-01
    “…The system can realize encoding and decoding of input bits of arbitrary length with good generalization ability. …”
    Get full text
    Article
  17. 1197

    Application of Hybrid Transform Domain Digital Watermarking in Power System Information Security by Shaomin Zhu, Zhiqiang Zhang

    Published 2013-11-01
    “…The secret watermark information bits were embedded into low frequency subband in hybrid transform. …”
    Get full text
    Article
  18. 1198

    On Key Evolution over Wireless Channels by Zhihong Liu, Yong Zeng, Pingjuan Zhang, Qiping Huang

    Published 2015-07-01
    “…Finally, we propose a k -resistant encryption scheme that can use different keys to encrypt and decrypt messages if there are no more than k bits which differ between the encryption and decryption keys.…”
    Get full text
    Article
  19. 1199

    Improvement of Image Compression by Changing the Mathematical Equation Style in Communication Systems by Riyadh M. Al-Saleem, Yasameen A. Ghani, Shihab A. Shawkat

    Published 2022-01-01
    “…Compression is an essential process to reduce the amount of information by reducing the number of bits; this process is necessary for uploading images, audio, video, storage services, and TV transmission. …”
    Get full text
    Article
  20. 1200

    A new automatic watermarking algorithm based on Fuzzy Logic and Harris Hawks optimization by Mehdi Fallah Kazemi, Arash Ahmadpour, Nadia Pourmahdi

    Published 2024-03-01
    “…Moreover, by decomposing the triangular matrix, which embeds the watermark bits in the matrix element, the use of Mamdani implication and the product inference engine have led to an efficient watermark extraction. …”
    Get full text
    Article