Results 61 to 70 of about 4,335 (184)

Energy‐Efficient Hardware Implementation of Spiking‐Restricted Boltzmann Machines Using Pseudo‐Synaptic Sampling

open access: yesAdvanced Intelligent Systems, Volume 7, Issue 5, May 2025.
In this article, an energy‐efficient hardware implementation of spiking‐restricted Boltzmann machines using the pseudo‐synaptic sampling (PS2) method is presented. In the PS2 method, superior area and energy efficiency over previous approaches, such as the random walk method, are demonstrated, achieving a 94.94% reduction in power consumption during on‐
Hyunwoo Kim   +10 more
wiley   +1 more source

A new (k,n) verifiable secret image sharing scheme (VSISS)

open access: yesEgyptian Informatics Journal, 2014
In this paper, a new (k,n) verifiable secret image sharing scheme (VSISS) is proposed in which third order LFSR (linear-feedback shift register)-based public key cryptosystem is applied for the cheating prevention and preview before decryption.
Amitava Nag   +3 more
doaj   +1 more source

A note on the multiple-recursive matrix method for generating pseudorandom vectors

open access: yes, 2017
The multiple-recursive matrix method for generating pseudorandom vectors was introduced by Niederreiter (Linear Algebra Appl. 192 (1993), 301-328). We propose an algorithm for finding an efficient primitive multiple-recursive matrix method. Moreover, for
Bishoi, Susil Kumar   +2 more
core   +1 more source

New Families of Strength‐3 Covering Arrays Using Linear Feedback Shift Register Sequences

open access: yesJournal of Combinatorial Designs, Volume 33, Issue 4, Page 156-171, April 2025.
ABSTRACT In an array over an alphabet of v symbols, a t‐set of column indices { c 1 , … , c t } is covered if each t‐tuple of the alphabet occurs at least once as a row of the sub‐array indexed by c 1 , … , c t. A covering array, denoted by CA( N ; t , k , v ), is an N × k array over an alphabet with v symbols with the property that any t‐set of ...
Kianoosh Shokri, Lucia Moura
wiley   +1 more source

Translating weighted probabilistic bits to synthetic genetic circuits

open access: yesThe Plant Genome, Volume 18, Issue 1, March 2025.
Abstract Synthetic genetic circuits in plants could be the next technological horizon in plant breeding, showcasing potential for precise patterned control over expression. Nevertheless, uncertainty in metabolic environments prevents robust scaling of traditional genetic circuits for agricultural use, and studies show that a deterministic system is at ...
Matthew D. Ciccone, Carlos D. Messina
wiley   +1 more source

A P-N Sequence Generator Using LFSR with Dual Edge Trigger Technique

open access: yesMATEC Web of Conferences, 2016
This paper represents the design and implementation of a low power 4-bit LFSR using Dual edge triggered flip flop. A linear feedback shift register (LFSR) is assembled by N number of flip flops connected in series and a combinational logic generally xor ...
Naghwal Nitin Kumar, Kumar Abhishek
doaj   +1 more source

Enabling Quantum Privacy and Security by Design: Imperatives for Contemporary State‐of‐the‐Art in Quantum Software Engineering

open access: yesJournal of Software: Evolution and Process, Volume 37, Issue 2, February 2025.
ABSTRACT With the advent of Quantum Computing and its exponential research endeavors in the past couple of decades, we are looking at a Golden Era of Quantum Computing. We are transitioning into an age of Hybrid Classical‐Quantum Computers, where the quantum computational resources are selectively harnessed for resource‐intensive tasks. On the one hand,
Vita Santa Barletta   +4 more
wiley   +1 more source

An LFSR-based address generator using optimized address partition for low power memory BIST

open access: yesJournal of Measurement Science and Instrumentation, 2020
Power consumption in test mode is much higher than that in normal mode, which is prone to causing circuit damage and reducing the yield of chips. To reduce the power dissipation efficiently, a modified linear feedback shift register(LFSR) is designed to ...
YU Zhi-guo   +3 more
doaj  

Calculando equivalentes débiles de filtrados no lineales [PDF]

open access: yes, 2014
Dada una secuencia binaria generada con una función filtro no lineal aplicada sobre un registro de desplazamiento lineal o LFSR (Linear Feedback Shift Register), siempre es posible generar la misma secuencia a partir de cualquier otro LFSR de la misma ...
Caballero Gil, Pino   +1 more
core  

Securing Ports of Web Applications Against Cross Site Port Attack (XSPA) by Using a Strong Session Identifier (Session ID)

open access: yesIET Cyber-Physical Systems: Theory &Applications, Volume 10, Issue 1, January/December 2025.
A cookie contains a session ID that is a unique number generated by the server. The proposed generator is suitable for all types of web applications, because it requires the smallest area of only 134 Gate Equivalent (GE) on the application specific integrated circuit (ASIC) for its execution.
Kavita Bhatia   +3 more
wiley   +1 more source

Home - About - Disclaimer - Privacy