Showing 1,261 - 1,280 results of 1,322 for search '"bit"', query time: 0.04s Refine Results
  1. 1261

    A Group Identification Protocol with Leakage Resilience of Secret Sharing Scheme by Ping Li, Shengjun Li, Hongyang Yan, Lishan Ke, Teng Huang, Alzubair Hassan

    Published 2020-01-01
    “…In our leakage-resilient GID-scheme, the verifier believes the validity of qualified group members and tolerates l bits of adversarial leakage in the distribution protocol, whereas for unqualified group members, the verifier cannot believe their valid identifications in the proof protocol.…”
    Get full text
    Article
  2. 1262

    A New Asymmetric Fully Homomorphic Encryption Scheme for Cloud Banking Data by Zana Thalage Omar, Fadhil Salman Abed, Shaimaa Khamees Ahmed

    Published 2021-01-01
    “…The security of the new system depends on the issue of analyzing huge integers, which reach 2048 bits, to their prime factors, which are considered almost impossible or unsolvable. …”
    Get full text
    Article
  3. 1263

    An Evolved Wavelet Library Based on Genetic Algorithm by D. Vaithiyanathan, R. Seshasayanan, K. Kunaraj, J. Keerthiga

    Published 2014-01-01
    “…Many conventional image compression algorithms use wavelet transform which can significantly reduce the number of bits needed to represent a pixel and the process of quantization and thresholding further increases the compression. …”
    Get full text
    Article
  4. 1264

    A Quantitative Risk Evaluation Model for Network Security Based on Body Temperature by Y. P. Jiang, C. C. Cao, X. Mei, H. Guo

    Published 2016-01-01
    “…This paper proposed a quantitative risk evaluation model for network security based on body temperature (QREM-BT), which refers to the mechanism of biological immune system and the imbalance of immune system which can result in body temperature changes, firstly, through the r-contiguous bits nonconstant matching rate algorithm to improve the detection quality of detector and reduce missing rate or false detection rate. …”
    Get full text
    Article
  5. 1265

    Asynchronous Realization of Algebraic Integer-Based 2D DCT Using Achronix Speedster SPD60 FPGA by Nilanka Rajapaksha, Amila Edirisuriya, Arjuna Madanayake, Renato J. Cintra, Dennis Onen, Ihab Amer, Vassil S. Dimitrov

    Published 2013-01-01
    “…Considering word lengths of 5 and 6 bits, a speed increase of 230% and 199% is observed, respectively. …”
    Get full text
    Article
  6. 1266

    Configuration of the Operation Modes for a Scintillating Fiber Sub-Detector in LHCb Experiment by Tomás Sierra-Polanco, Diego Milanés, Carlos E. Vera

    Published 2018-05-01
    “…This paper shows a step-by-step presentation of the modifications applied to the codes to move from a Standard Mode to a Wide Bus Mode, increasing the data rate by means of the quantity reduction of the control bits to enlarge the amount of analyzable information among the events.  …”
    Get full text
    Article
  7. 1267

    Design Time Optimization for Hardware Watermarking Protection of HDL Designs by E. Castillo, D. P. Morales, A. García, L. Parrilla, E. Todorovich, U. Meyer-Baese

    Published 2015-01-01
    “…IPP@HDL relies on spreading the bits of a digital signature at the HDL design level using combinational logic included within the original system. …”
    Get full text
    Article
  8. 1268

    Comparative Analysis of Drilling Behaviour of Synthetic and Natural Fiber-Based Composites by A. Mohan Kumar, R. Rajasekar, P. Manoj Kumar, R. Parameshwaran, Alagar Karthick, M. Muhibbullah

    Published 2021-01-01
    “…The axial force generated by candlestick drill is minimal compared to the other drill bits. The following may be responsible for lower thrust force: (1) the axial force distributes circumferential of the cutting tool instead of focusing at the center and (2) the interfacial adhesiveness between the matrix and the fiber is higher. …”
    Get full text
    Article
  9. 1269

    Scalable video coding algorithm based on 3D hybrid tree and visual characteristics by Ming-zhe FU, Xiang-hai WANG, Chuan-ming SONG

    Published 2012-11-01
    “…The distribution characteristic of three-dimensional wavelet coefficients of video data was ana ed,and a scalable video coding algorithm was subsequently addressed based on hybrid three-dimensional tree and human visual system (HVS) characteristics.First,the hybrid tree structure was adaptively determined according to the auto-correlation of low-pass and high-pass coefficients.It reduced obviously the number of ion bits locating significant wavelet coefficients when scanning and processing low-pass and high-pass coefficients in temporal dimension.Second,each wavelet coefficient was weighted in terms of HVS sensitivity to its corresponding subband.Significant coefficients thus tended to be coded with high priority and arranged at the front of bitstream,and the reconstructed video quality was improved at low and medium bitrates to a great extent.Experimental results in terms of peak signal-to-noise ratio (PSNR) verified the effectiveness of the proposed algorithm on several test videos with varying characteristics.0.65dB,1.75dB,and 1.77dB higher PSNR are gained than asymmetric 3-D orientation tree for Y,U,and V components,respectively.Moreover,0.23dB,2.11dB,and 1.72dB higher PSNR are reached than single temporal-spatial orientation tree separately for Y,U,and V components.Besides,better subjective quality is obtained through effectively attenuating ringing artifact.…”
    Get full text
    Article
  10. 1270

    A Steganographic Method Based on Pixel-Value Differencing and the Perfect Square Number by Hsien-Wen Tseng, Hui-Shih Leng

    Published 2013-01-01
    “…The pixel-value differencing (PVD) scheme uses the difference value between two consecutive pixels in a block to determine how many secret bits should be embedded. There are two types of the quantization range table in Wu and Tasi's method. …”
    Get full text
    Article
  11. 1271

    Self-Isolated Surface-Mountable MIMO Antenna for FR1 Band Communications by Arpita Patel, Abdulkarem H. M. Almawgani, Trushit Upadhyaya, Vishal Sorathia, Vipul Dabhi, Seif Shebl

    Published 2024-01-01
    “…The optimal envelope correlation coefficient (ECC) is near to 0.02, channel capacity loss (CCL) is around 0.2 bits/sec/Hz, directivity gain (DG) is around 9.98 dB, and the MEG ratios are near to unity. …”
    Get full text
    Article
  12. 1272

    Üniversite Öğrencilerinin Yaşadıkları Sosyo-Ekonomik Sorunlar Üzerine Bir İnceleme by Hüseyin Doğan, Gökçe Akçalı

    Published 2021-12-01
    “…Çalışmanın örneklemini İstanbul, Ankara, İzmir, Erzurum, Van, Muş, Batman, Gümüşhane, Bitlis, Konya illerine bağlı 10 üniversitede öğrenimine devam eden 1326 ön lisans, lisans, yüksek lisans, doktora öğrencisi oluşturmuştur. …”
    Get full text
    Article
  13. 1273

    Automatic Search of Differential Characteristics and Improved Differential Cryptanalysis for PRINCE, QARMA, and MANTIS by Yaxin Cui, Hong Xu, Lin Tan, Wenfeng Qi

    Published 2024-01-01
    “…With this model, we find two sets of 7-round differential characteristics for PRINCE with less guessed key bits and use them to present a multiple differential attack against 11-round PRINCE, which improves the known single-key attack on PRINCE by one round to our knowledge.…”
    Get full text
    Article
  14. 1274

    A Low-Power DNN Accelerator With Mean-Error-Minimized Approximate Signed Multiplier by Laimin Du, Leibin Ni, Xiong Liu, Guanqi Peng, Kai Li, Wei Mao, Hao Yu

    Published 2024-01-01
    “…In the optimal case of 8 bits, the proposed approximate multiplier saves 49.84% power, 46.41% area and 24.65% delay compared to the exact multiplier. …”
    Get full text
    Article
  15. 1275

    Integer wavelet transform‐based secret image sharing using rook polynomial and hamming code with authentication by Sara Charoghchi, Zahra Saeidi, Samaneh Mashhadi

    Published 2024-12-01
    “…Also, embedding the secret data in Least significant bits of the cover image, in many of these schemes, makes them very fragile to steganlysis. …”
    Get full text
    Article
  16. 1276

    Aktivitas Menggigit Nyamuk Aedes spp di Tiban Baru, Kota Batam by Risman Kurnia, Rusnaini Novalia, Rinaldi Daswito, Harvensica Gunnara

    Published 2023-05-01
    “…The distribution of Aedes albopictus mosquitoes in the Tiban Baru area was 89.4% of the total Aedes spp mosquitoes collected with a Man Bitting Rate (MBR) value of 56.6%. The average temperature and humidity in the Tiban Baru area were 280C and 75%. …”
    Get full text
    Article
  17. 1277

    In situ training of an in-sensor artificial neural network based on ferroelectric photosensors by Haipeng Lin, Jiali Ou, Zhen Fan, Xiaobing Yan, Wenjie Hu, Boyuan Cui, Jikang Xu, Wenjie Li, Zhiwei Chen, Biao Yang, Kun Liu, Linyuan Mo, Meixia Li, Xubing Lu, Guofu Zhou, Xingsen Gao, Jun-Ming Liu

    Published 2025-01-01
    “…Our FE-PS exhibits self-powered, fast (<30 μs), and multilevel (>4 bits) photoresponses, as well as long retention (50 days), high endurance (109), high write speed (100 ns), and small cycle-to-cycle and device-to-device variations (~0.66% and ~2.72%, respectively), all of which are desirable for the in situ training. …”
    Get full text
    Article
  18. 1278

    Fail-Safe Logic Design Strategies Within Modern FPGA Architectures by Priya A. Bhakta, Jim Plusquellic, Andrew Suchanek, Tom J. Mannos

    Published 2025-01-01
    “…The configuration memory bits (CMBs), which configure routing and designate logic functions within the LUTs of the FPGA, add complexity to fail-safe design strategies by introducing additional fault conditions and fault propagation paths. …”
    Get full text
    Article
  19. 1279

    A process inspired by fractals for embedding digital codes into additively manufactured components for supply chain security by Saber Nemati, Ali Mahmoudi, Kyungmin Ham, Tie Siemers, Shengmin Guo, Josephine Gutekunst, Joachim Schulz, Ian Taylor, Michele Maasberg, Leslie G. Butler

    Published 2025-01-01
    “…These results suggest a standard selective laser sintering printer with typical metal powders could reasonably expect to print 100 bits of embedded digital information in a gauge volume 6 mm in diameter as 300  $$\upmu$$ m voids while still maintaining tensile specifications.…”
    Get full text
    Article
  20. 1280

    Survey on intellectual property protection for deep learning model by Xinya WANG, Guang HUA, Hao JIANG, Haijian ZHANG

    Published 2022-04-01
    “…With the rapid development of deep learning technology, deep learning models have been widely used in many fields such as image classification and speech recognition.Training a deep learning model relies on a large amount of data and computing power, thus selling the trained model or providing specific services (DLaaS, e.g.) has become a new business.However, the commercial interests of model trainers and the intellectual property rights of model developers may be violated if the model is maliciously stolen.With deep neural network watermarking becoming a new research topic, multimedia copyright protection techniques were used for deep learning model protection.Numerous methods have been proposed in this field and then a comprehensive survey is needed.the existing deep neural network watermarking methods were elaborated and summarized and the future research directions of this field were discussed.The overall framework of neural network watermarking was presented, whereby the basic concepts such as classification model and model backdoor were introduced.Secondly, the existing methods were divided into two types according to the mechanism of watermark embedding, one is to embed the watermark bits into the carrier of internal information of the network, and the other one uses the established backdoor mapping as the watermark.These two existing deep neural network watermarking methods were analyzed and summarized, and attacks to the watermarks were also introduced and discussed.By analyzing the white-box and black-box conditions in watermarking scenario, it comes to the conclusion that the model is difficult to be effectively protected when it is distributed in the white-box manner, and the neural network watermark defenses in the black-box distribution and black-box verification are both worthy for further research.…”
    Get full text
    Article