Results 11 to 20 of about 1,407,158 (281)
This research is intended to discuss the relevance of the application of presidential threshold and the implementation of simultaneous general elections in Indonesia.
Rizki Bagus Prasetio, Febri Sianipar
doaj +1 more source
Design and Implementation of Local Threshold Segmentation Based on FPGA
In the process of the development of image processing technology, image segmentation is a very important image processing technology in the field of machine vision, pedestrian detection, medical imaging, and so on.
Shangshang Gao +5 more
doaj +1 more source
Critical Review of the Constitutional Court’s Decision on the Presidential Threshold
This article aims to enrich the literature on the threshold for presidential candidacy in Indonesia by: Firstly, summarizing the main criticisms of its implementation; Secondly, refuting the arguments of the Constitutional Court regarding the threshold ...
Denny Indra Sukmawan, Syaugi Pratama
doaj +1 more source
Threshold implementations [PDF]
Embedded devices are used pervasively in a wide range of applications some of which require cryptographic algorithms in order to provide security. Today’s standardized algorithms are secure in the black-box model where an adversary has access to several inputs and/or outputs of the algorithm.
openaire +3 more sources
AN OPTIONAL THRESHOLD WITH SVM CLOUD DETECTION ALGORITHM AND DSP IMPLEMENTATION [PDF]
This paper presents a method which combines the traditional threshold method and SVM method, to detect the cloud of Landsat-8 images. The proposed method is implemented using DSP for real-time cloud detection.
G. Zhou, X. Zhou, T. Yue, Y. Liu
doaj +1 more source
Error Threshold for Color Codes and Random 3-Body Ising Models [PDF]
We study the error threshold of color codes, a class of topological quantum codes that allow a direct implementation of quantum Clifford gates suitable for entanglement distillation, teleportation and fault-tolerant quantum computation.
E. N. Gilbert +6 more
core +2 more sources
Lightweight Authenticated Encryption Mode of Operation for Tweakable Block Ciphers
The use of a small block length is a common strategy when designing lightweight (tweakable) block ciphers (TBCs), and several 64-bit primitives have been proposed.
Yusuke Naito, Takeshi Sugawara
doaj +1 more source
Rhythmic Keccak: SCA Security and Low Latency in HW
Glitches entail a great issue when securing a cryptographic implementation in hardware. Several masking schemes have been proposed in the literature that provide security even in the presence of glitches.
Victor Arribas +4 more
doaj +1 more source
Increase in the random dopant induced threshold fluctuations and lowering in sub-100 nm MOSFETs due to quantum effects: a 3-D density-gradient simulation study [PDF]
In this paper, we present a detailed simulation study of the influence of quantum mechanical effects in the inversion layer on random dopant induced threshold voltage fluctuations and lowering in sub-100 mn MOSFETs.
Asenov, A +4 more
core +2 more sources
Threshold Implementations in the Robust Probing Model [PDF]
Threshold Implementations (TI) are provably secure algorithmic countermeasures against side-channel attacks in the form of differential power analysis. The strength of TI lies in its minimal algorithmic requirements. These requirements have been studied over more than 10 years and many efficient implementations for symmetric primitives have been ...
Dhooghe, Siemen +2 more
openaire +2 more sources

