Results 111 to 120 of about 2,970,762 (373)

On the insecurity of arithmetic coding [PDF]

open access: yesComputers & Security, 1995
John G. Cleary   +2 more
openaire   +1 more source

Arithmetic coding of sub-band residuals in FDLP speech/audio codec [PDF]

open access: green, 2009
Petr Motlíček   +2 more
openalex   +1 more source

Comparison of modelling approaches for liquid fluidized beds

open access: yesThe Canadian Journal of Chemical Engineering, EarlyView.
Abstract This study presents a comparison of three promising numerical models for the detailed simulation of liquid–solid fluidized bed. These models differ in their treatment of the solid phase, ranging from treating each particle individually to treating the collection of particles as a continuum.
Andreu Bernad‐Serra   +3 more
wiley   +1 more source

Goppa Codes Arising From Quasihermitian Curves

open access: yesIEEE Access
Code-based cryptography is particularly relevant in contemporary research, as it offers the potential to resist attacks from future quantum computers, which could easily compromise many current cryptographic algorithms.
M. C. Rodriguez-Palanquex
doaj   +1 more source

Self-testing and repairing computer Patent [PDF]

open access: yes, 1970
Self testing and repairing computer comprising control and diagnostic unit and rollback points for error ...
Avizienis, A. A.
core   +1 more source

Prediction of Acute Liver Injury Trajectory in Patients Following Acetaminophen Overdose: A Multibiomarker Machine Learning Proof‐of‐Concept Study

open access: yesClinical Pharmacology &Therapeutics, EarlyView.
Clinical translation of novel therapies can be hindered by heterogeneity‐driven sample size inflation in late‐stage trials. In acetaminophen‐induced liver injury (APAP DILI), many patients recover spontaneously, diluting investigational drug efficacy signals.
Chris Humphries   +8 more
wiley   +1 more source

Plotting Gothic: A Paradox

open access: yesArchitectural Histories, 2014
The paradox of the title is that while most historians of medieval architecture agree that a combination of geometric and arithmetic methods was generally used to lay out a medieval church, there has been little consensus on the specifics of the process ...
Stephen Murray
doaj   +1 more source

A New Strategy to Design Reconfigurable Rivest–Shamir–Adleman (RSA) Accelerators

open access: yesInternational Journal of Circuit Theory and Applications, EarlyView.
A reconfigurable FPGA‐based RSA accelerator is proposed using compression‐based modular multipliers combined with pseudomoduli arithmetic. The approach maps modular exponentiation to low‐cost arithmetic domains and applies a correction stage, achieving significant improvements in delay, operating frequency, and delay–area efficiency compared with ...
Augusto C. B. Vassoler   +4 more
wiley   +1 more source

p-Suffix Sorting as Arithmetic Coding

open access: yesJournal of Discrete Algorithms, 2011
zbMATH Open Web Interface contents unavailable due to conflicting licenses.
Richard Beal, Donald A. Adjeroh
openaire   +2 more sources

Scalable Reverse Converters for the Moduli Set {2n+1−1,2n−1,2n−1−1}$$ \left\{{2}^{n+1}-1,{2}^n-1,{2}^{n-1}-1\right\} $$ (n$$ n $$ Even)

open access: yesInternational Journal of Circuit Theory and Applications, EarlyView.
This work explores the conversion from residues to binary representation in RNS using the Chinese remainder theorem (CRT) or mixed radix conversion (MRC) algorithms. The proposed approach relocates CRT multiplicative inverses to the arithmetic stage without extra cost, improving scalability while achieving speedups over state‐of‐the‐art MRC ...
Gabriel B. M. Fernandes   +2 more
wiley   +1 more source

Home - About - Disclaimer - Privacy