Results 1 to 10 of about 7,180 (158)
Deep Q-Learning with Bit-Swapping-Based Linear Feedback Shift Register fostered Built-In Self-Test and Built-In Self-Repair for SRAM [PDF]
Including redundancy is popular and widely used in a fault-tolerant method for memories. Effective fault-tolerant methods are a demand of today’s large-size memories.
Mohammed Altaf Ahmed, Suleman Alnatheer
doaj +2 more sources
DESIGNING CONFIGURABLE SHIFT REGISTER WITH A LINEAR FEEDBACK
A method for designing a configurable shift register is considered, which allows setting its capacity in various operation modes. The suggested shift register with a linear feedback can be used as a cyclic shift register, a generator of M-sequences ...
A. A. Ivaniuk
doaj +1 more source
The paper describes methods of protection against reverse engineering of logic circuits of pseudo-random number generators (PRNG) on linear and non-linear feedback shift registers.
Michael A. Ivanov +3 more
doaj +1 more source
Linear transformation shift register sequences
Linear transformation shift registers (TSR) were introduced by Tsaban and Vishne,which was a word-oriented shift register output a word per step.Some basic properties of sequences generated by the TSR were presented,and a new criterion for deciding if ...
Ming-sheng WANG, Zai-liang TANG
doaj +3 more sources
Blind Estimation of Self-Synchronous Scrambler in DSSS Systems
Self-synchronous scramblers are more difficult to blindly estimate than synchronous scramblers because their input sequence affects the state of the scrambler’s linear feedback shift register.
Dongyeong Kim, Dongweon Yoon
doaj +1 more source
Blind Estimation of Self-Synchronous Scrambler Using Orthogonal Complement Space in DSSS Systems
In a non-cooperative context, a receiver has to estimate the communication parameters without any prior knowledge of the transmitter, which is highly demanding.
Yoonji Kim +3 more
doaj +1 more source
On the Estimation of Synchronous Scramblers in Direct Sequence Spread Spectrum Systems
In a non-cooperative context, the receiver has no information about communication parameters; therefore, it must perform communication forensics, which is the process of identifying what information it can from the collected data.
Dongyeong Kim +2 more
doaj +1 more source
Telemedicine gains prominence in today’s scenario and image security plays a vital role in the healthcare sector for authenticating data transfer.
Siju John, S.N. Kumar
doaj +1 more source
A Novel Nonlinear Pseudorandom Sequence Generator for the Fractal Function
A pseudorandom sequence is a repeatable sequence with random statistical properties that is widely used in communication encryption, authentication and channel coding.
Yelai Feng +5 more
doaj +1 more source
The Pagoda Sequence: a Ramble through Linear Complexity, Number Walls, D0L Sequences, Finite State Automata, and Aperiodic Tilings [PDF]
We review the concept of the number wall as an alternative to the traditional linear complexity profile (LCP), and sketch the relationship to other topics such as linear feedback shift-register (LFSR) and context-free Lindenmayer (D0L) sequences.
Fred Lunnon
doaj +1 more source

