Results 11 to 20 of about 1,407,158 (281)

The Relevance of the Application of the Presidential Threshold and the Implementation of Simultaneous Elections in Indonesia

open access: yesJurnal Penelitian Hukum De Jure, 2021
This research is intended to discuss the relevance of the application of presidential threshold and the implementation of simultaneous general elections in Indonesia.
Rizki Bagus Prasetio, Febri Sianipar
doaj   +1 more source

Design and Implementation of Local Threshold Segmentation Based on FPGA

open access: yesJournal of Electrical and Computer Engineering, 2022
In the process of the development of image processing technology, image segmentation is a very important image processing technology in the field of machine vision, pedestrian detection, medical imaging, and so on.
Shangshang Gao   +5 more
doaj   +1 more source

Critical Review of the Constitutional Court’s Decision on the Presidential Threshold

open access: yesJurnal Konstitusi, 2023
This article aims to enrich the literature on the threshold for presidential candidacy in Indonesia by: Firstly, summarizing the main criticisms of its implementation; Secondly, refuting the arguments of the Constitutional Court regarding the threshold ...
Denny Indra Sukmawan, Syaugi Pratama
doaj   +1 more source

Threshold implementations [PDF]

open access: yes, 2015
Embedded devices are used pervasively in a wide range of applications some of which require cryptographic algorithms in order to provide security. Today’s standardized algorithms are secure in the black-box model where an adversary has access to several inputs and/or outputs of the algorithm.
openaire   +3 more sources

AN OPTIONAL THRESHOLD WITH SVM CLOUD DETECTION ALGORITHM AND DSP IMPLEMENTATION [PDF]

open access: yesThe International Archives of the Photogrammetry, Remote Sensing and Spatial Information Sciences, 2016
This paper presents a method which combines the traditional threshold method and SVM method, to detect the cloud of Landsat-8 images. The proposed method is implemented using DSP for real-time cloud detection.
G. Zhou, X. Zhou, T. Yue, Y. Liu
doaj   +1 more source

Error Threshold for Color Codes and Random 3-Body Ising Models [PDF]

open access: yes, 2009
We study the error threshold of color codes, a class of topological quantum codes that allow a direct implementation of quantum Clifford gates suitable for entanglement distillation, teleportation and fault-tolerant quantum computation.
E. N. Gilbert   +6 more
core   +2 more sources

Lightweight Authenticated Encryption Mode of Operation for Tweakable Block Ciphers

open access: yesTransactions on Cryptographic Hardware and Embedded Systems, 2019
The use of a small block length is a common strategy when designing lightweight (tweakable) block ciphers (TBCs), and several 64-bit primitives have been proposed.
Yusuke Naito, Takeshi Sugawara
doaj   +1 more source

Rhythmic Keccak: SCA Security and Low Latency in HW

open access: yesTransactions on Cryptographic Hardware and Embedded Systems, 2018
Glitches entail a great issue when securing a cryptographic implementation in hardware. Several masking schemes have been proposed in the literature that provide security even in the presence of glitches.
Victor Arribas   +4 more
doaj   +1 more source

Increase in the random dopant induced threshold fluctuations and lowering in sub-100 nm MOSFETs due to quantum effects: a 3-D density-gradient simulation study [PDF]

open access: yes, 2001
In this paper, we present a detailed simulation study of the influence of quantum mechanical effects in the inversion layer on random dopant induced threshold voltage fluctuations and lowering in sub-100 mn MOSFETs.
Asenov, A   +4 more
core   +2 more sources

Threshold Implementations in the Robust Probing Model [PDF]

open access: yesProceedings of ACM Workshop on Theory of Implementation Security Workshop, 2019
Threshold Implementations (TI) are provably secure algorithmic countermeasures against side-channel attacks in the form of differential power analysis. The strength of TI lies in its minimal algorithmic requirements. These requirements have been studied over more than 10 years and many efficient implementations for symmetric primitives have been ...
Dhooghe, Siemen   +2 more
openaire   +2 more sources

Home - About - Disclaimer - Privacy