Results 61 to 70 of about 120,753 (284)

RTL fast convolution using the mersenne number transform [PDF]

open access: yes, 1997
VHDL is a versatile high level language for the specification and simulation of hardware components. Here a functional VHDL model is presented for performing fast convolution based on Mersenne's number theoretic transform.\nFor filtering a rather long ...
Bria, Oscar N.   +1 more
core   +1 more source

Arithmetic Spacetime Geometry from String Theory

open access: yes, 2005
An arithmetic framework to string compactification is described. The approach is exemplified by formulating a strategy that allows to construct geometric compactifications from exactly solvable theories at $c=3$.
Conway J. H.   +14 more
core   +1 more source

Understanding bio‐based polymers: A study of origins, properties, biodegradation and their impact on health and the environment

open access: yesFEBS Open Bio, EarlyView.
This review provides an overview of bio‐based polymer sources, their unique functional properties and their environmental impact, and addresses their role as sustainable alternatives. It discusses end‐of‐life options, including composting and anaerobic digestion for renewable energy.
Sabina Kolbl Repinc   +8 more
wiley   +1 more source

HARQ Buffer Management: An Information-Theoretic View

open access: yes, 2015
A key practical constraint on the design of Hybrid automatic repeat request (HARQ) schemes is the size of the on-chip buffer that is available at the receiver to store previously received packets. In fact, in modern wireless standards such as LTE and LTE-
Kang, Joonhyuk   +4 more
core   +1 more source

A light‐triggered Time‐Resolved X‐ray Solution Scattering (TR‐XSS) workflow with application to protein conformational dynamics

open access: yesFEBS Open Bio, EarlyView.
Time‐resolved X‐ray solution scattering captures how proteins change shape in real time under near‐native conditions. This article presents a practical workflow for light‐triggered TR‐XSS experiments, from data collection to structural refinement. Using a calcium‐transporting membrane protein as an example, the approach can be broadly applied to study ...
Fatemeh Sabzian‐Molaei   +3 more
wiley   +1 more source

FINAL bootstrap acceleration on FPGA using DSP-free constant-multiplier NTTs

open access: yesTransactions on Cryptographic Hardware and Embedded Systems
This work showcases Quatorze-bis, a state-of-the-art Number Theoretic Transform circuit for TFHE-like cryptosystems on FPGAs. It contains a novel modular multiplication design for modular multiplication with a constant for a constant modulus.
Jonas Bertels   +2 more
doaj   +1 more source

The theory of manipulations of pure state asymmetry: basic tools and equivalence classes of states under symmetric operations

open access: yes, 2013
If a system undergoes symmetric dynamics, then the final state of the system can only break the symmetry in ways in which it was broken by the initial state, and its measure of asymmetry can be no greater than that of the initial state.
Barut A O   +14 more
core   +1 more source

Visual Recovery Reflects Cortical MeCP2 Sensitivity in Rett Syndrome

open access: yesAnnals of Clinical and Translational Neurology, EarlyView.
ABSTRACT Objective Rett syndrome (RTT) is a devastating neurodevelopmental disorder with developmental regression affecting motor, sensory, and cognitive functions. Sensory disruptions contribute to the complex behavioral and cognitive difficulties and represent an important target for therapeutic interventions.
Alex Joseph Simon   +12 more
wiley   +1 more source

Heterogeneous Reconfigurable Accelerator for Homomorphic Evaluation on Encrypted Data

open access: yesIEEE Access
Homomorphic encryption (HE) enables third-party servers to perform computations on encrypted user data while preserving privacy. Although conceptually attractive, the speed of software implementations of HE is almost impractical.
Wenqing Song   +7 more
doaj   +1 more source

Area-Efficient Polynomial Multiplication Hardware Implementation for Lattice-based Cryptography [PDF]

open access: yesJisuanji gongcheng
Lattice-based post-quantum cryptography algorithms demonstrate significant potential in public-key cryptography. A key performance bottleneck in hardware implementation is the computational complexity of polynomial multiplication. To address the problems
XIE Jiaxing, PU Jinwei, FANG Weitian, ZHENG Xin, XIONG Xiaoming
doaj   +1 more source

Home - About - Disclaimer - Privacy