-
121
Two-Party Quantum Private Comparison Protocol for Direct Secret Comparison
Published 2025-01-01“…Compared with existing QPC protocols that employ bit-to-bit comparison methods, our approach offers improved practicality and scalability. …”
Get full text
Article -
122
The Security Weakness of Block Cipher Piccolo against Fault Analysis
Published 2014-03-01“…Piccolo is a 64-bit lightweight block cipher which is able to be implemented in constrained hardware environments such as a wireless sensor network. …”
Get full text
Article -
123
A Jointly Optimized Variable M-QAM and Power Allocation Scheme for Image Transmission
Published 2012-01-01“…In this optimization process, the significance of bits with regard to the overall quality of the image is exploited. …”
Get full text
Article -
124
Design and evaluation of clock-gating-based approximate multiplier for error-tolerant applications
Published 2025-04-01“…In this study, approximate multipliers (AMs) are designed using both conventional and approximate half adders (A-HAs) and full adders (A-FAs), which are strategically placed to add partial products at the most significant bit (MSB) positions, and OR gates are used to add partial products at the lower significant bit (LSB). …”
Get full text
Article -
125
-
126
SENSITIVITY ANALYSIS OF AVALANCHE PHOTODIODE AND PIN DIODE DETECTORS IN OPTICAL RECEIVERS
Published 2018-12-01“… This research explained how to establish the optical receiver sensitivity and the link power budget design in terms of quality factor, receiver power and bit error rate (BER) for several values of attenuation at 100km fiber length. …”
Get full text
Article -
127
Design and Implementation of Multiple Ring Oscillator-Based TRNG Architecture by Using ADPLL
Published 2025-01-01“…Energy consumption per bit of the generated bitstream is in the range of 4.22 nJ/bit-5.85 nJ/bit, and throughput values are in the range of 206.82 Mbps-260.07 Mbps. …”
Get full text
Article -
128
New indifferentiability security proof of MDPH hash function
Published 2022-07-01“…When instantiated with an n‐bit block cipher, Naito proved that this achieves the (nearly) optimal indifferentiable security bound of O (n − log n)‐bit security. …”
Get full text
Article -
129
Identifier syntax and mnemonics in programming languages
Published 2000-12-01“…Modern computers uses 8 bit coding, and many programming languages does so. …”
Get full text
Article -
130
Related-Key Cryptanalysis on the Full PRINTcipher Suitable for IC-Printing
Published 2014-01-01“…PRINTcipher-48/96 are 48/96-bit block ciphers proposed in CHES 2010 which support the 80/160-bit secret keys, respectively. …”
Get full text
Article -
131
-
132
Artificial intelligence artificial muscle of dielectric elastomers
Published 2025-03-01Get full text
Article -
133
Detection Schemes With Low-Resolution ADCs and Spatial Oversampling for Transmission With Higher-Order Constellations in Terahertz Band
Published 2025-01-01“…Furthermore, at low signal-to-noise ratios (SNRs), 1-bit quantization outperforms 2- and 3-bit quantization, respectively, even when employing higher-order constellations. …”
Get full text
Article -
134
Anisotropic Ferro- and Dielectric Properties of Textured Bi4Ti3O12 Ceramics Prepared by the Solid-State Reaction Based on Multiple Calcination
Published 2010-01-01“…The grain-oriented Bi4Ti3O12 (BIT) samples were prepared by the solid-state reaction method with a multicalcination process. …”
Get full text
Article -
135
Ring Oscillators with Additional Phase Detectors as a Random Source in a Random Number Generator
Published 2024-12-01“…Generating a specified number of bits is on-demand, eliminating the need for continuous RNG operation. …”
Get full text
Article -
136
A IEEE 802.11e HCCA Scheduler with a Reclaiming Mechanism for Multimedia Applications
Published 2014-01-01“…The QoS offered by the IEEE 802.11e reference scheduler is satisfactory in the case of Constant Bit Rate traffic streams, but not yet in the case of Variable Bit Rate traffic streams, whose variations stress its scheduling behavior. …”
Get full text
Article -
137
Exploiting statistical effective fault attack in a blind setting
Published 2023-07-01“…However, FTA relies on bit fault injection, which is difficult to implement in practice. …”
Get full text
Article -
138
ENHANCEMENT OF GENERALISED SELECTIVE COMBINER USING COMBINED MODULATION SCHEMES OVER RAYLEIGH FADING CHANNEL
Published 2023-02-01“… This research paper focused on the enhancement improvement of communication system using a combined modulation signal of Quadrature Amplitude Multiplexing and Orthogonal-frequency division multiplexing (OFDM) using a performance metrics of bit error rate (BER) and Signal to Noise Ratio (SNR) tested on a Rayleigh fading channel. …”
Get full text
Article -
139
BELEDİYE İKTİSADİ TEŞEBBÜSLERİ’NİN KURULUŞ AMACI, HUKUKİ DAYANAKLARI VE GÜNCEL DURUM
Published 2011-12-01“…Bunların arasında, günümüz büyükşehir belediyeleri için olmazsa olmaz ekonomik birim haline gelmiş olan, ancak hakkında olumlu-olumsuz birçok görüş bulunan Belediye İktisadi Teşebbüsleri (BİT) öne çıkmaktadır. Bu çalışmada, alternatif yerel kamu hizmet biçimi olan BİT’lerin kuruluş amaçları, hukuki dayanakları, konumları, yürüttükleri faaliyetler ve bu faaliyetlerin sonuçları incelenmektedir.…”
Get full text
Article -
140
Nonlinear Dynamic Characteristic Analysis of a Landing String in Deepwater Riserless Drilling
Published 2018-01-01“…The heaving motion of the drilling platform is taken as the upper boundary condition and the motion of the drilling bit caused by the interaction between the rock and the bit as the lower boundary condition. …”
Get full text
Article