-
1261
A Group Identification Protocol with Leakage Resilience of Secret Sharing Scheme
Published 2020-01-01“…In our leakage-resilient GID-scheme, the verifier believes the validity of qualified group members and tolerates l bits of adversarial leakage in the distribution protocol, whereas for unqualified group members, the verifier cannot believe their valid identifications in the proof protocol.…”
Get full text
Article -
1262
A New Asymmetric Fully Homomorphic Encryption Scheme for Cloud Banking Data
Published 2021-01-01“…The security of the new system depends on the issue of analyzing huge integers, which reach 2048 bits, to their prime factors, which are considered almost impossible or unsolvable. …”
Get full text
Article -
1263
An Evolved Wavelet Library Based on Genetic Algorithm
Published 2014-01-01“…Many conventional image compression algorithms use wavelet transform which can significantly reduce the number of bits needed to represent a pixel and the process of quantization and thresholding further increases the compression. …”
Get full text
Article -
1264
A Quantitative Risk Evaluation Model for Network Security Based on Body Temperature
Published 2016-01-01“…This paper proposed a quantitative risk evaluation model for network security based on body temperature (QREM-BT), which refers to the mechanism of biological immune system and the imbalance of immune system which can result in body temperature changes, firstly, through the r-contiguous bits nonconstant matching rate algorithm to improve the detection quality of detector and reduce missing rate or false detection rate. …”
Get full text
Article -
1265
Asynchronous Realization of Algebraic Integer-Based 2D DCT Using Achronix Speedster SPD60 FPGA
Published 2013-01-01“…Considering word lengths of 5 and 6 bits, a speed increase of 230% and 199% is observed, respectively. …”
Get full text
Article -
1266
Configuration of the Operation Modes for a Scintillating Fiber Sub-Detector in LHCb Experiment
Published 2018-05-01“…This paper shows a step-by-step presentation of the modifications applied to the codes to move from a Standard Mode to a Wide Bus Mode, increasing the data rate by means of the quantity reduction of the control bits to enlarge the amount of analyzable information among the events. …”
Get full text
Article -
1267
Design Time Optimization for Hardware Watermarking Protection of HDL Designs
Published 2015-01-01“…IPP@HDL relies on spreading the bits of a digital signature at the HDL design level using combinational logic included within the original system. …”
Get full text
Article -
1268
Comparative Analysis of Drilling Behaviour of Synthetic and Natural Fiber-Based Composites
Published 2021-01-01“…The axial force generated by candlestick drill is minimal compared to the other drill bits. The following may be responsible for lower thrust force: (1) the axial force distributes circumferential of the cutting tool instead of focusing at the center and (2) the interfacial adhesiveness between the matrix and the fiber is higher. …”
Get full text
Article -
1269
Scalable video coding algorithm based on 3D hybrid tree and visual characteristics
Published 2012-11-01“…The distribution characteristic of three-dimensional wavelet coefficients of video data was ana ed,and a scalable video coding algorithm was subsequently addressed based on hybrid three-dimensional tree and human visual system (HVS) characteristics.First,the hybrid tree structure was adaptively determined according to the auto-correlation of low-pass and high-pass coefficients.It reduced obviously the number of ion bits locating significant wavelet coefficients when scanning and processing low-pass and high-pass coefficients in temporal dimension.Second,each wavelet coefficient was weighted in terms of HVS sensitivity to its corresponding subband.Significant coefficients thus tended to be coded with high priority and arranged at the front of bitstream,and the reconstructed video quality was improved at low and medium bitrates to a great extent.Experimental results in terms of peak signal-to-noise ratio (PSNR) verified the effectiveness of the proposed algorithm on several test videos with varying characteristics.0.65dB,1.75dB,and 1.77dB higher PSNR are gained than asymmetric 3-D orientation tree for Y,U,and V components,respectively.Moreover,0.23dB,2.11dB,and 1.72dB higher PSNR are reached than single temporal-spatial orientation tree separately for Y,U,and V components.Besides,better subjective quality is obtained through effectively attenuating ringing artifact.…”
Get full text
Article -
1270
A Steganographic Method Based on Pixel-Value Differencing and the Perfect Square Number
Published 2013-01-01“…The pixel-value differencing (PVD) scheme uses the difference value between two consecutive pixels in a block to determine how many secret bits should be embedded. There are two types of the quantization range table in Wu and Tasi's method. …”
Get full text
Article -
1271
Self-Isolated Surface-Mountable MIMO Antenna for FR1 Band Communications
Published 2024-01-01“…The optimal envelope correlation coefficient (ECC) is near to 0.02, channel capacity loss (CCL) is around 0.2 bits/sec/Hz, directivity gain (DG) is around 9.98 dB, and the MEG ratios are near to unity. …”
Get full text
Article -
1272
Üniversite Öğrencilerinin Yaşadıkları Sosyo-Ekonomik Sorunlar Üzerine Bir İnceleme
Published 2021-12-01“…Çalışmanın örneklemini İstanbul, Ankara, İzmir, Erzurum, Van, Muş, Batman, Gümüşhane, Bitlis, Konya illerine bağlı 10 üniversitede öğrenimine devam eden 1326 ön lisans, lisans, yüksek lisans, doktora öğrencisi oluşturmuştur. …”
Get full text
Article -
1273
Automatic Search of Differential Characteristics and Improved Differential Cryptanalysis for PRINCE, QARMA, and MANTIS
Published 2024-01-01“…With this model, we find two sets of 7-round differential characteristics for PRINCE with less guessed key bits and use them to present a multiple differential attack against 11-round PRINCE, which improves the known single-key attack on PRINCE by one round to our knowledge.…”
Get full text
Article -
1274
A Low-Power DNN Accelerator With Mean-Error-Minimized Approximate Signed Multiplier
Published 2024-01-01“…In the optimal case of 8 bits, the proposed approximate multiplier saves 49.84% power, 46.41% area and 24.65% delay compared to the exact multiplier. …”
Get full text
Article -
1275
Integer wavelet transform‐based secret image sharing using rook polynomial and hamming code with authentication
Published 2024-12-01“…Also, embedding the secret data in Least significant bits of the cover image, in many of these schemes, makes them very fragile to steganlysis. …”
Get full text
Article -
1276
Aktivitas Menggigit Nyamuk Aedes spp di Tiban Baru, Kota Batam
Published 2023-05-01“…The distribution of Aedes albopictus mosquitoes in the Tiban Baru area was 89.4% of the total Aedes spp mosquitoes collected with a Man Bitting Rate (MBR) value of 56.6%. The average temperature and humidity in the Tiban Baru area were 280C and 75%. …”
Get full text
Article -
1277
In situ training of an in-sensor artificial neural network based on ferroelectric photosensors
Published 2025-01-01“…Our FE-PS exhibits self-powered, fast (<30 μs), and multilevel (>4 bits) photoresponses, as well as long retention (50 days), high endurance (109), high write speed (100 ns), and small cycle-to-cycle and device-to-device variations (~0.66% and ~2.72%, respectively), all of which are desirable for the in situ training. …”
Get full text
Article -
1278
Fail-Safe Logic Design Strategies Within Modern FPGA Architectures
Published 2025-01-01“…The configuration memory bits (CMBs), which configure routing and designate logic functions within the LUTs of the FPGA, add complexity to fail-safe design strategies by introducing additional fault conditions and fault propagation paths. …”
Get full text
Article -
1279
A process inspired by fractals for embedding digital codes into additively manufactured components for supply chain security
Published 2025-01-01“…These results suggest a standard selective laser sintering printer with typical metal powders could reasonably expect to print 100 bits of embedded digital information in a gauge volume 6 mm in diameter as 300 $$\upmu$$ m voids while still maintaining tensile specifications.…”
Get full text
Article -
1280
Survey on intellectual property protection for deep learning model
Published 2022-04-01“…With the rapid development of deep learning technology, deep learning models have been widely used in many fields such as image classification and speech recognition.Training a deep learning model relies on a large amount of data and computing power, thus selling the trained model or providing specific services (DLaaS, e.g.) has become a new business.However, the commercial interests of model trainers and the intellectual property rights of model developers may be violated if the model is maliciously stolen.With deep neural network watermarking becoming a new research topic, multimedia copyright protection techniques were used for deep learning model protection.Numerous methods have been proposed in this field and then a comprehensive survey is needed.the existing deep neural network watermarking methods were elaborated and summarized and the future research directions of this field were discussed.The overall framework of neural network watermarking was presented, whereby the basic concepts such as classification model and model backdoor were introduced.Secondly, the existing methods were divided into two types according to the mechanism of watermark embedding, one is to embed the watermark bits into the carrier of internal information of the network, and the other one uses the established backdoor mapping as the watermark.These two existing deep neural network watermarking methods were analyzed and summarized, and attacks to the watermarks were also introduced and discussed.By analyzing the white-box and black-box conditions in watermarking scenario, it comes to the conclusion that the model is difficult to be effectively protected when it is distributed in the white-box manner, and the neural network watermark defenses in the black-box distribution and black-box verification are both worthy for further research.…”
Get full text
Article