Showing 12,901 - 12,920 results of 14,440 for search 'BCIT~', query time: 1.27s Refine Results
  1. 12901

    Vehicle-to-Vehicle Communication Channel Estimator Based on Gate Recurrent Unit by Jun-Han Wang, He He, Kosuke Tamura, Shun Kojima, Jaesang Cha, Chang-Jun Ahn

    Published 2025-01-01
    “…The computer simulation results confirm that, compared to traditional schemes, the proposed estimator can achieve a lower bit error rate (BER) and normalized mean squared error (NMSE). …”
    Get full text
    Article
  2. 12902

    AN ASSESSMENT OF PERCEPTION OF THE PEOPLE ON MALARIA PREVENTION AND CONTROL IN DONGA LOCAL GOVERNMENT AREA OF TARABA STATE by SILAS JOSHUA, SUNDAY EMMANUEL BAMISE

    Published 2024-04-01
    “…The study identified other protective practices against mosquito’s bites and further assessed whether such practices do affect insecticide treated net (ITN) usage. …”
    Get full text
    Article
  3. 12903
  4. 12904

    Exploring Many-Core Design Templates for FPGAs and ASICs by Ilia Lebedev, Christopher Fletcher, Shaoyi Cheng, James Martin, Austin Doupnik, Daniel Burke, Mingjie Lin, John Wawrzynek

    Published 2012-01-01
    “…Throughout this study, we use a general-purpose graphics processing unit (GPGPU) implementation as a performance and area baseline. …”
    Get full text
    Article
  5. 12905

    Pregnant Women with Type 2 Diabetes Mellitus and Hypertension: A Physiological Overview by Muhsin Hmeadi Ubeid

    Published 2024-12-01
    “…Females with diabetes have a tiny bit fewer red blood cells (RBCs) than females without the disease. …”
    Get full text
    Article
  6. 12906

    MODIFICAREA PEISAJULUI AMENINȚĂRILOR CIBERNETICE DATORITĂ IMPLICĂRII GRUPĂRILOR DE CYBERCRIME ÎN RĂZBOIUL RUSO-UCRAINEAN by Claudia-Alecsandra GABRIAN

    Published 2023-01-01
    “…Also, when we refer to ransomware, LockBit, and CL0P groups are currently the most important cybercrime groups that carry out major cyber-attacks on countries from Europe. …”
    Get full text
    Article
  7. 12907

    AFD and chaotic map‐based integrated approach for ECG compression, steganography and encryption in E‐healthcare paradigm by Neetika Soni, Indu Saini, Butta Singh

    Published 2021-07-01
    “…Abstract The proliferation of tele‐healthcare services at an accelerated rate raises concerns over the management,security and privacy of the patient's confidential data (an individual's personal details and medical biography) during its transmission and storage. To resolve these issues, amalgamation of three fundamental techniques of remote healthcare systems, that is, signal compression, data hiding and encryption, are proposed. …”
    Get full text
    Article
  8. 12908

    Design Techniques for Single-Ended Wireline Crosstalk Cancellation Receiver Up To 112 Gb/s by Liping Zhong, Quan Pan

    Published 2024-01-01
    “…These 56 and 112 Gb/s receivers achieve a bit error rate of &#x003C;<inline-formula> <tex-math notation="LaTeX">$10{^{-}10 }$ </tex-math></inline-formula> and &#x003C;<inline-formula> <tex-math notation="LaTeX">$10{^{-}12 }$ </tex-math></inline-formula> with a single-ended channel loss of 24 and 25 dB, respectively.…”
    Get full text
    Article
  9. 12909

    Exploiting Extrinsic Information for Serial MAP Detection by Utilizing Estimator in Holographic Data Storage Systems by Thien An Nguyen, Jaejin Lee

    Published 2024-12-01
    “…In the big data era, data are created in huge volume. This leads to the development of storage devices. …”
    Get full text
    Article
  10. 12910

    Online Structural Health Monitoring and Parameter Estimation for Vibrating Active Cantilever Beams Using Low-Priced Microcontrollers by Gergely Takács, Ján Vachálek, Boris Rohal’-Ilkiv

    Published 2015-01-01
    “…The algorithm is implemented using automatically generated and deployed machine code on an electronics prototyping platform, featuring an economically feasible 8-bit microcontroller unit (MCU). The validation experiments demonstrate the viability of the proposed system to detect sudden or gradual mechanical changes in real-time, while the functionality on low-cost miniaturized hardware suggests a strong potential for mass-production and structural integration. …”
    Get full text
    Article
  11. 12911

    A New Chaotic Color Image Encryption Algorithm Based on Memristor Model and Random Hybrid Transforms by Yexia Yao, Xuemei Xu, Zhaohui Jiang

    Published 2025-01-01
    “…By integrating both pixel-level and bit-level diffusion, the randomness of the image information distribution is significantly increased. …”
    Get full text
    Article
  12. 12912

    Smart Contract Penyimpanan Data Genetika Manusia Berbiaya Murah pada Blockchain Ethereum by Tri Stiyo Famuji, Herman Herman, Sunardi Sunardi

    Published 2024-07-01
    “…Hasil pengujian menjalankan smart contract pada blockchain Ethereum yang hanya menyimpan signature data genetik ini menunjukkan biaya gas yang sangat efisien karena hanya menyimpan 256 bit saja dari data genetik riilnya yang dapat mencapai giga byte.…”
    Get full text
    Article
  13. 12913

    Demonstration of high-reconfigurability and low-power strong physical unclonable function empowered by FeFET cycle-to-cycle variation and charge-domain computing by Taixin Li, Xinrui Guo, Franz Müller, Sukhrob Abdulazhanov, Xiaoyang Ma, Hongtao Zhong, Yongpan Liu, Vijaykrishnan Narayanan, Huazhong Yang, Kai Ni, Thomas Kämpfe, Xueqing Li

    Published 2025-01-01
    “…Remarkably, our PUF achieves near-ideal reconfigurability and ultra-low 1.89fJ per bit readout energy, significantly outperforming the state-of-the-art PUFs. …”
    Get full text
    Article
  14. 12914

    On the Optimum Detection of MIMO-SVD Signals With Strong Nonlinear Distortion Effects at the Transmitter by Joao Goncalves, M. Teresa Nogueira, Daniel Dinis, Joao Guerreiro, Rui Dinis

    Published 2025-01-01
    “…It also provides an approximate bound on the achievable ML Bit Error Rate (BER) performance. Our results indicate that the proposed receiver can have a performance close to the ML receiver with just a few iterations.…”
    Get full text
    Article
  15. 12915

    Optimized Wideband Beamforming for mm-wave Communication Systems with Intelligent Reflecting Surfaces by Hiba A. Alsawaf, Saad Ahmed Ayoob

    Published 2024-12-01
    “…This paper investigated the effect of millimeter wave beam splitting IRS systems and developed an IRS structure based on the sub-surface of its elements. The basic idea is to introduce time delay (TD) and phase shift units into the IRS elements to perform common phase and pre-delay modulation instead of traditional phase shift. …”
    Get full text
    Article
  16. 12916

    New hash function based on C-MD structure and chaotic neural network by Liquan CHEN, Yuhang ZHU, Yu WANG, Zhongyuan QIN, Yang MA

    Published 2023-06-01
    “…In recent years, widely used hash algorithms such as MD5 and SHA-1 have been found to have varying degrees of security risks.The iterative structure of the SHA-2 algorithm is similar to that of SHA-1, making it vulnerable to attacks as well.Meanwhile, SHA-3 has a complex internal structure and low implementation efficiency.To address these issues, a keyed hash function was designed and implemented based on chaotic neural network and C-MD structure.The approach involved improving the Merkle-Damgard structure by proposing the chaotic neural network Merkle-Damgard (C-MD) structure.This structure can be used to design a hash function that can withstand attacks such as the middle attack, multiple collision attack, and second pre-image attack for long information.Besides, the chaotic neural network was used as the compression function to increase the complexity of the hash function and improve its collision resistance, while also enabling it to output multiple lengths.Moreover, a plaintext preprocessor was designed, which used the coupled image lattice to generate chaos sequence related to the length of the plaintext to fill the plaintext, thus enhancing the ability of the hash function to resist length expansion attacks.Simulation results demonstrate that the proposed hash function performs faster than SHA-2, SHA-3 and the same type of chaotic hash function proposed by Teh et al.It can resist second pre-image attack, multi-collision attack and differential attack, while also exhibiting better collision resistance and mapping uniformity.In addition, the proposed Hash function can output Hash values of different lengths, making it suitable for use in digital signature, key generation, Hash-based message authentication code, deterministic random bit generator, and other application fields.…”
    Get full text
    Article
  17. 12917

    A Modified Implementation of Tristate Inverter Based Static Master-Slave Flip-Flop with Improved Power-Delay-Area Product by Kunwar Singh, Satish Chandra Tiwari, Maneesha Gupta

    Published 2014-01-01
    “…To validate the correct behaviour of the proposed design, an eight bit asynchronous counter is designed to layout level. …”
    Get full text
    Article
  18. 12918

    Dijital Eşitsizliğin Hibrit Eğitimdeki Yansımaları by Mehmet Toplu, Elif Çevik

    Published 2023-12-01
    “…Hibrit eğitimde dijital eşitsizliğin boyutlarını derinlemesine anlamak ve bu sorunla etkili bir şekilde mücadele etmek için alan yazına katkı sağlamak amaçlanmaktadır.Yöntem: Bu çalışmada hibrit eğitimde dijital eşitsizlik, Bilgi ve İletişim Teknolojileri (BİT) Gelişmişlik Endeksi, Türkiye İstatistik Kurumu (TÜİK) Hanehalkı Bilişim Teknolojileri Kullanım Araştırması, Ağa Hazırlık Endeksi gibi dijital eşitsizliğin belirlenmesinde kullanılan yaklaşımlarla birlikte değerlendirilmiştir. …”
    Get full text
    Article
  19. 12919

    ALBERTA: ALgorithm-Based Error Resilience in Transformer Architectures by Haoxuan Liu, Vasu Singh, Michal Filipiuk, Siva Kumar Sastry Hari

    Published 2025-01-01
    “…Results show that our approach achieves over 99&#x0025; coverage for errors (single bit-flip fault model) that result in a mismatch with <inline-formula><tex-math notation="LaTeX">$&lt; $</tex-math></inline-formula>0.2&#x0025; and <inline-formula><tex-math notation="LaTeX">$&lt; $</tex-math></inline-formula>0.01&#x0025; computation and memory overheads, respectively. …”
    Get full text
    Article
  20. 12920

    Isopods infesting Atlantic bonefish (Albula vulpes) host novel viruses, including reoviruses related to global pathogens, and opportunistically feed on humans by Tony L. Goldberg, Addiel U. Perez, Lewis J. Campbell

    “…During field collections, isopods aggressively bit humans, and blood meal analysis confirmed that isopods had fed on bonefish, other fish, and humans. …”
    Get full text
    Article