Results 31 to 40 of about 31,786 (276)

Robust and Efficient Frequency Estimator for Undersampled Waveforms Based on Frequency Offset Recognition. [PDF]

open access: yesPLoS ONE, 2016
This paper proposes an efficient frequency estimator based on Chinese Remainder Theorem for undersampled waveforms. Due to the emphasis on frequency offset recognition (i.e., frequency shift and compensation) of small-point DFT remainders, compared to ...
Xiangdong Huang   +3 more
doaj   +1 more source

THE NEW SCHEME OF INFORMATION STORAGE IN CLOUD ENVIRONMENTS BASED ON A SYSTEM OF RESIDUAL CLASSES, SCHEMES SECRET SHARING

open access: yesСовременная наука и инновации, 2022
The article deals with the theoretical aspects of structural and group analysis. A mathematical model and software implementation of a multilevel disjunctive threshold scheme of the secret based on the Chinese remainder theorem is proposed.
Nikolay Ivanovich Chervyakov   +4 more
doaj  

IP Traceback through modified Probabilistic Packet Marking algorithm using Chinese Remainder Theorem

open access: yesAin Shams Engineering Journal, 2015
Probabilistic Packet Marking algorithm suggests a methodology to identify all the participated routers of the attack path by probabilistically marking the packets.
Y. Bhavani, V. Janaki, R. Sridevi
doaj   +1 more source

Quantum secret sharing with graph states based on Chinese remainder theorem

open access: yesTongxin xuebao, 2018
Based on the topological features of quantum graph states,a quantum secret sharing scheme based on Chinese remainder theorem with a vivid graphic description was proposed.The dealer extracts sub-secrets according to Chinese remainder theorem over finite ...
Jianwu LIANG, Xiaoshu LIU, Zi CHENG
doaj   +2 more sources

Chinese remainder approximation theorem

open access: yesTopology and its Applications, 2017
22 ...
openaire   +3 more sources

Proposed Hybrid Cryptosystems Based on Modifications of Playfair Cipher and RSA Cryptosystem

open access: yesمجلة بغداد للعلوم
Cipher security is becoming an important step when transmitting important information through networks. The algorithms of cryptography play major roles in providing security and avoiding hacker attacks.
Saja Mohammed Suhael   +2 more
doaj   +1 more source

A Note on Multiple Secret Sharing Using Chinese Remainder Theorem and Exclusive-OR

open access: yesIEEE Access, 2019
This paper reviews the former existing scheme on (n,n) -multiple secret sharing (MSS) for color images along with its slight limitation. This scheme generates a set of n shared images from a set of n secret images using the Chinese remainder theorem (CRT)
Heri Prasetyo, Jing-Ming Guo
doaj   +1 more source

Equidistribution from the Chinese Remainder Theorem

open access: yesAdvances in Mathematics, 2021
ISSN:1090 ...
Kowalski, Emmanuel   +1 more
openaire   +4 more sources

Ferromagnetism of Molecular Beam Epitaxy‐grown Ultra‐thin Cr2Ge2Te6 Films Down to the Monolayer Limit on Si Substrates

open access: yesAdvanced Materials, EarlyView.
Uniform monolayer Cr2Ge2Te6 films are achieved on Si substrates by molecular beam epitaxy. Intrinsic ferromagnetism with perpendicular magnetic anisotropy is established in the films by anomalous Hall effect and superconducting quantum interference device measurements, albeit with strong magnetic fluctuations characteristic of its 2D nature.
Pengfei Ji   +15 more
wiley   +1 more source

Sharing DSS by the Chinese Remainder Theorem

open access: yesJournal of Computational and Applied Mathematics, 2014
zbMATH Open Web Interface contents unavailable due to conflicting licenses.
Selçuk, Ali Aydın, Kaya, Kamer
openaire   +4 more sources

Home - About - Disclaimer - Privacy