Suggested Topics within your search.
Suggested Topics within your search.
- History 14
- Politics and government 8
- Social conditions 8
- Biochemistry 6
- Law 6
- methods 6
- Electric wiring, Interior 5
- Health 5
- Juvenile literature 5
- Physical fitness 5
- Sociology 5
- Digital techniques 4
- Economic conditions 4
- Economic policy 4
- Management 4
- Nursing 4
- Photography 4
- Race relations 4
- Social policy 4
- Social problems 4
- Cultural pluralism 3
- Discrimination 3
- Domestic relations 3
- Education 3
- Electric wiring 3
- Ethnic relations 3
- Ethnology 3
- Gays 3
- Health and Fitness 3
- History and criticism 3
-
12901
Vehicle-to-Vehicle Communication Channel Estimator Based on Gate Recurrent Unit
Published 2025-01-01“…The computer simulation results confirm that, compared to traditional schemes, the proposed estimator can achieve a lower bit error rate (BER) and normalized mean squared error (NMSE). …”
Get full text
Article -
12902
AN ASSESSMENT OF PERCEPTION OF THE PEOPLE ON MALARIA PREVENTION AND CONTROL IN DONGA LOCAL GOVERNMENT AREA OF TARABA STATE
Published 2024-04-01“…The study identified other protective practices against mosquito’s bites and further assessed whether such practices do affect insecticide treated net (ITN) usage. …”
Get full text
Article -
12903
A sociedade dos povos como solução dos conflitos internacionais
Published 2015-06-01Get full text
Article -
12904
Exploring Many-Core Design Templates for FPGAs and ASICs
Published 2012-01-01“…Throughout this study, we use a general-purpose graphics processing unit (GPGPU) implementation as a performance and area baseline. …”
Get full text
Article -
12905
Pregnant Women with Type 2 Diabetes Mellitus and Hypertension: A Physiological Overview
Published 2024-12-01“…Females with diabetes have a tiny bit fewer red blood cells (RBCs) than females without the disease. …”
Get full text
Article -
12906
MODIFICAREA PEISAJULUI AMENINȚĂRILOR CIBERNETICE DATORITĂ IMPLICĂRII GRUPĂRILOR DE CYBERCRIME ÎN RĂZBOIUL RUSO-UCRAINEAN
Published 2023-01-01“…Also, when we refer to ransomware, LockBit, and CL0P groups are currently the most important cybercrime groups that carry out major cyber-attacks on countries from Europe. …”
Get full text
Article -
12907
AFD and chaotic map‐based integrated approach for ECG compression, steganography and encryption in E‐healthcare paradigm
Published 2021-07-01“…Abstract The proliferation of tele‐healthcare services at an accelerated rate raises concerns over the management,security and privacy of the patient's confidential data (an individual's personal details and medical biography) during its transmission and storage. To resolve these issues, amalgamation of three fundamental techniques of remote healthcare systems, that is, signal compression, data hiding and encryption, are proposed. …”
Get full text
Article -
12908
Design Techniques for Single-Ended Wireline Crosstalk Cancellation Receiver Up To 112 Gb/s
Published 2024-01-01“…These 56 and 112 Gb/s receivers achieve a bit error rate of <<inline-formula> <tex-math notation="LaTeX">$10{^{-}10 }$ </tex-math></inline-formula> and <<inline-formula> <tex-math notation="LaTeX">$10{^{-}12 }$ </tex-math></inline-formula> with a single-ended channel loss of 24 and 25 dB, respectively.…”
Get full text
Article -
12909
Exploiting Extrinsic Information for Serial MAP Detection by Utilizing Estimator in Holographic Data Storage Systems
Published 2024-12-01“…In the big data era, data are created in huge volume. This leads to the development of storage devices. …”
Get full text
Article -
12910
Online Structural Health Monitoring and Parameter Estimation for Vibrating Active Cantilever Beams Using Low-Priced Microcontrollers
Published 2015-01-01“…The algorithm is implemented using automatically generated and deployed machine code on an electronics prototyping platform, featuring an economically feasible 8-bit microcontroller unit (MCU). The validation experiments demonstrate the viability of the proposed system to detect sudden or gradual mechanical changes in real-time, while the functionality on low-cost miniaturized hardware suggests a strong potential for mass-production and structural integration. …”
Get full text
Article -
12911
A New Chaotic Color Image Encryption Algorithm Based on Memristor Model and Random Hybrid Transforms
Published 2025-01-01“…By integrating both pixel-level and bit-level diffusion, the randomness of the image information distribution is significantly increased. …”
Get full text
Article -
12912
Smart Contract Penyimpanan Data Genetika Manusia Berbiaya Murah pada Blockchain Ethereum
Published 2024-07-01“…Hasil pengujian menjalankan smart contract pada blockchain Ethereum yang hanya menyimpan signature data genetik ini menunjukkan biaya gas yang sangat efisien karena hanya menyimpan 256 bit saja dari data genetik riilnya yang dapat mencapai giga byte.…”
Get full text
Article -
12913
Demonstration of high-reconfigurability and low-power strong physical unclonable function empowered by FeFET cycle-to-cycle variation and charge-domain computing
Published 2025-01-01“…Remarkably, our PUF achieves near-ideal reconfigurability and ultra-low 1.89fJ per bit readout energy, significantly outperforming the state-of-the-art PUFs. …”
Get full text
Article -
12914
On the Optimum Detection of MIMO-SVD Signals With Strong Nonlinear Distortion Effects at the Transmitter
Published 2025-01-01“…It also provides an approximate bound on the achievable ML Bit Error Rate (BER) performance. Our results indicate that the proposed receiver can have a performance close to the ML receiver with just a few iterations.…”
Get full text
Article -
12915
Optimized Wideband Beamforming for mm-wave Communication Systems with Intelligent Reflecting Surfaces
Published 2024-12-01“…This paper investigated the effect of millimeter wave beam splitting IRS systems and developed an IRS structure based on the sub-surface of its elements. The basic idea is to introduce time delay (TD) and phase shift units into the IRS elements to perform common phase and pre-delay modulation instead of traditional phase shift. …”
Get full text
Article -
12916
New hash function based on C-MD structure and chaotic neural network
Published 2023-06-01“…In recent years, widely used hash algorithms such as MD5 and SHA-1 have been found to have varying degrees of security risks.The iterative structure of the SHA-2 algorithm is similar to that of SHA-1, making it vulnerable to attacks as well.Meanwhile, SHA-3 has a complex internal structure and low implementation efficiency.To address these issues, a keyed hash function was designed and implemented based on chaotic neural network and C-MD structure.The approach involved improving the Merkle-Damgard structure by proposing the chaotic neural network Merkle-Damgard (C-MD) structure.This structure can be used to design a hash function that can withstand attacks such as the middle attack, multiple collision attack, and second pre-image attack for long information.Besides, the chaotic neural network was used as the compression function to increase the complexity of the hash function and improve its collision resistance, while also enabling it to output multiple lengths.Moreover, a plaintext preprocessor was designed, which used the coupled image lattice to generate chaos sequence related to the length of the plaintext to fill the plaintext, thus enhancing the ability of the hash function to resist length expansion attacks.Simulation results demonstrate that the proposed hash function performs faster than SHA-2, SHA-3 and the same type of chaotic hash function proposed by Teh et al.It can resist second pre-image attack, multi-collision attack and differential attack, while also exhibiting better collision resistance and mapping uniformity.In addition, the proposed Hash function can output Hash values of different lengths, making it suitable for use in digital signature, key generation, Hash-based message authentication code, deterministic random bit generator, and other application fields.…”
Get full text
Article -
12917
A Modified Implementation of Tristate Inverter Based Static Master-Slave Flip-Flop with Improved Power-Delay-Area Product
Published 2014-01-01“…To validate the correct behaviour of the proposed design, an eight bit asynchronous counter is designed to layout level. …”
Get full text
Article -
12918
Dijital Eşitsizliğin Hibrit Eğitimdeki Yansımaları
Published 2023-12-01“…Hibrit eğitimde dijital eşitsizliğin boyutlarını derinlemesine anlamak ve bu sorunla etkili bir şekilde mücadele etmek için alan yazına katkı sağlamak amaçlanmaktadır.Yöntem: Bu çalışmada hibrit eğitimde dijital eşitsizlik, Bilgi ve İletişim Teknolojileri (BİT) Gelişmişlik Endeksi, Türkiye İstatistik Kurumu (TÜİK) Hanehalkı Bilişim Teknolojileri Kullanım Araştırması, Ağa Hazırlık Endeksi gibi dijital eşitsizliğin belirlenmesinde kullanılan yaklaşımlarla birlikte değerlendirilmiştir. …”
Get full text
Article -
12919
ALBERTA: ALgorithm-Based Error Resilience in Transformer Architectures
Published 2025-01-01“…Results show that our approach achieves over 99% coverage for errors (single bit-flip fault model) that result in a mismatch with <inline-formula><tex-math notation="LaTeX">$< $</tex-math></inline-formula>0.2% and <inline-formula><tex-math notation="LaTeX">$< $</tex-math></inline-formula>0.01% computation and memory overheads, respectively. …”
Get full text
Article -
12920
Isopods infesting Atlantic bonefish (Albula vulpes) host novel viruses, including reoviruses related to global pathogens, and opportunistically feed on humans
Get full text
Article