To see the other types of publications on this topic, follow the link: BRT (key words).

Journal articles on the topic 'BRT (key words)'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 journal articles for your research on the topic 'BRT (key words).'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

Ferranti, Emma, Lauren Andres, Stuart Paul Denoon-Stevens, Lorena Melgaço, Daniel Oberling, and Andrew Quinn. "Operational Challenges and Mega Sporting Events Legacy: The Case of BRT Systems in the Global South." Sustainability 12, no. 4 (February 21, 2020): 1609. http://dx.doi.org/10.3390/su12041609.

Full text
Abstract:
This paper examines the bus rapid transit (BRT) legacies of mega sporting events (MSEs) held in the Global South cities of Cape Town and Rio de Janeiro. It discusses the extent to which these transport systems have been operationally sustainable, post-MSE; in other words, their ability to be maintained at a certain rate or level and hence their ability to act as public good as planned and according to specific needs. It argues that in both cities, long-term operational challenges have emerged due to conflictual temporalities between the priorities of the MSE and the mid/long term requirements of a transport system, supplemented by a poor spatial contextualisation of BRT design. These include financial viability, providing a service with appropriate frequency and capacity, integration with other transport systems, and resilience to external shocks such as extreme weather. These findings have key academic and policy implications both by opening further areas of research towards MSEs as a tool to deliver sustainable urban transport, and provides important lessons for future MSE hosts and cities considering BRT.
APA, Harvard, Vancouver, ISO, and other styles
2

Carmona Rojas, Madisson Yojan. "Prácticas espaciales en el transporte público de la Avenida Insurgentes de la Ciudad de México / Space practices in public transport of the Insurgentes Avenue of Mexico City." Caderno de Geografia 27, no. 51 (October 11, 2017): 656. http://dx.doi.org/10.5752/p.2318-2962.2017v27n51p656.

Full text
Abstract:
<p>El modelo de transporte púbico BRT (Bus Rapid Transit) llega a la ciudad de México en el año 2005, impulsado por un importante grupo de organizaciones privadas dedicadas a promocionar su decidido papel en la transformación de la movilidad cotidiana de las principales ciudades de América Latina. En este artículo se toman como base los operadores espaciales (estaciones de abordaje, sistema de cobro y acceso sistematizado, carriles confinados y automatización en los tiempos de circulación) sobre los cuales se diseña e implementa el Metrobús, para analizar los cambios en la normatividad de transporte y vialidad y las prácticas de movilidad cotidiana de los usuarios de este sistema. Además, este texto se propone leer este modelo de transporte público como resultado de una tendencia a la sobrerregulación y extrema vigilancia de las prácticas de uso y apropiación del espacio urbano.</p><p><strong> </strong></p><p><strong>Palabras Clave: </strong>BRT (Autobuses de Tránsito Rápido), operadores espaciales, prácticas espaciales, espacio urbano. </p><p><strong> </strong></p><p><strong>Abstract </strong></p><p>The BRT (Bus Rapid Transit) public transportation model arrives in Mexico City in 2005, driven by an important group of private organizations dedicated to promoting its decisive role in transforming the daily mobility of the main cities of Latin America. In this article, the space operators (boarding stations, system of collection and systematized access, confined lanes and automation in the times of circulation) are taken as base, on which Metrobús is designed and implemented, to analyze the changes in the normativity of Transport and road and the daily mobility practices of the users of this system. In addition, this text intends to read this model of public transport as a result of a tendency to overregulation and extreme vigilance of the practices of use and appropriation of urban space.</p><p><strong> </strong></p><p><strong>Key Words: </strong>BRT (Bus Rapid Transit), space operators, space practices, urban space. </p>
APA, Harvard, Vancouver, ISO, and other styles
3

Putri, Mukhlisya Dewi Ratna, Reni Karno Kinasih, and Nabila Nabila Nabila. "Kesertaan Warga Senior Jakarta pada Sistem Transportasi Era Industri 4.0." Rekayasa Sipil 9, no. 2 (October 8, 2020): 71. http://dx.doi.org/10.22441/jrs.2020.v09.i2.05.

Full text
Abstract:
AbstractJakarta, the capital of Indonesia, undertook a major change of the transportation system, digitization of the transportation system was initiated by implementing a cashless payment system on the Commuter line in Jabodetabek, followed by implementing BRT with Busway mode, then MRT and LRT all of them are also cashless. All-digitization and application-based transportation systems force people to change. This is a trouble for senior citizens and is alleged to be one of the factors that causes them to be reluctant to switch to public transportation.This study analyzes the hypothesis that the reluctance of people of late adulthood to late elderly to use public transportation is due to the difficulty in understanding the digitalization system that is applied and because of the low level of respondents' trust in digital systems in public transportation. The study was conducted by distributing closed questionnaires to respondents who are Jabodetabek (Jakarta-Bogor-Depok-Tangerang-Bekasi) residents aged 45 years to 65 years who still have a fairly high activity, data tabulated then performed regression analysis. Key words: transportation system 4.0 era, transportation digitization, elderly transportation ­­­­­­­­­­­­­­­­­­­­­­­­­­­­­­­­­­­­­­­­­­­­­­­­AbstrakDaerah Khusus Ibu Kota Jakarta, ibu kota Indonesia, melakukan perombakan besar pada sistem transportasi, digitalisasi pada sistem transportasi diawali dengan menerapkan sistem pembayaran tanpa uang tunai (cashless) pada Commuter line di Jabodetabek, disusul dengan mengimplementasi BRT dengan moda Busway, kemudian MRT dan LRT yang semuanya juga cashless. Sistem transportasi yang serba didigitalisasi serta berorientasi pada aplikasi memaksa masyarakat untuk berubah. Hal ini merepotkan bagi warga senior dan disinyalir menjadi salah satu faktor yang menyebabkan mereka enggan untuk beralih ke transportasi publik.Penelitian ini menganalisa menguji hipotesa bahwa keengganan masyarakat usia dewasa akhir hingga lansia akhir untuk menggunakan transportasi umum adalah karena kesulitan memahami sistem digitalisasi yang diterapkan dan karena rendahnya tingkat kepercayaan responden terhadap sistem digital pada transportasi umum. Penelitian dilakukan dengan menyebarkan kuesioner tertutup kepada responden yang merupakan warga jabodetabek berusia 45 tahun hingga 65 tahun yang masih mempunyai aktivitas yang cukup tinggi data ditabulasi kemudian dilakukan analisa statistik dengan SPSS.Kata kunci: sistem transportasi era 4.0, sistem transportasi, digitalisasi transportasi.
APA, Harvard, Vancouver, ISO, and other styles
4

Teymur qızı Bəxtiyarova, Aynur. "BMT-nin TƏSİSATLARI VƏ İNFORMASİYA CƏMİYYƏTİ QURUCULUĞU." SCIENTIFIC WORK 52, no. 03 (February 28, 2020): 43–46. http://dx.doi.org/10.36719/aem/2007-2020/52/43-46.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Noor, Agustian. "Perangkat Lunak Pembelajaran Metode Kriptografi WAKE (Word Auto Key Encryption)." Jurnal Sains dan Informatika 3, no. 1 (September 28, 2017): 33–42. http://dx.doi.org/10.34128/jsi.v3i1.68.

Full text
Abstract:
Metode kriptografi dapat digunakan untuk mengamankan data yang bersifat rahasia agar data tersebut tidak diketahui oleh orang lain yang tidak berkepentingan. Metode WAKE merupakan salah satu metode yang telah digunakan secara komersial. WAKE merupakan singkatan dari Word Auto Key Encryption. Metode ini ditemukan oleh David Wheeler pada tahun 1993. Metode ini menggunakan kunci 128 bit, dan sebuah tabel 256 x 32 bit. Dalam algoritmanya, metode ini menggunakan operasi XOR, AND, OR dan Shift Right. Metode WAKE ini telah digunakan pada program Dr. Solomon Anti Virus versi terbaru. Metode WAKE dapat dibagi menjadi beberapa proses yaitu proses pembentukan tabel dan kunci, enkripsi dan dekripsi. Proses penyelesaian metode ini cukup rumit dan sulit untuk dikerjakan secara manual berhubung karena algoritmanya yang cukup panjang dan kompleks
APA, Harvard, Vancouver, ISO, and other styles
6

Contreras, Jorge A. Vargas, J. Rafael Herrera Herrera, and J. Enrique Escobedo Cabrera. "NOTEWORTHY RECORDS OF MAMMAL FROM CAMPECHE, MÉXICO." Revista Mexicana de Mastozoología (Nueva Epoca) 8, no. 1 (December 1, 2004): 61. http://dx.doi.org/10.22201/ie.20074484e.2004.8.1.186.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Diez–Arroyo, Marisa. "English words as euphemisms in Spanish fashion." English Today 32, no. 3 (March 2, 2016): 30–39. http://dx.doi.org/10.1017/s0266078416000043.

Full text
Abstract:
Euphemism is a concept closely related to taboo or embarrassing topics; classic examples include sex, religion and politics. It has been mainly studied to show how, within a given language, alternative expressions replace other unsuitable ones that, accordingly, may cause offence and discomfort to the audience. While this first approximation to the question of euphemism anticipates a key point in the use of these substitute expressions, namely the relationship between speaker-hearer in communication, the present discussion seeks to push this interdependence a bit further, framing it around English words or Anglicisms in the context of Spanish fashion. Some examples include ‘backstage’, ‘fifties’, and ‘street style’. This brings up some interesting questions: why should fashion, a clearly non-taboo topic, resort to the use of euphemistic words? How can English words qualify as good candidates to carry out the euphemistic role?
APA, Harvard, Vancouver, ISO, and other styles
8

Arnelas Seco, Itziar, and Juan Antonio Devesa Alcaraz. "Rectificación de errata en Centaurea corcubionensis M. Laínz (Acta Bot. Malacitana 37: 53 y 69, 2012). Error correction of Centaurea corcubionensis M. Laínz (Acta Bot. Malacitana 37: 53 and 69, 2012)." Acta Botanica Malacitana 38 (December 1, 2013): 262–63. http://dx.doi.org/10.24310/abm.v38i0.2615.

Full text
Abstract:
Error correction of Centaurea corcubionensis M. Laínz (Acta Bot. Malacitana 37: 53 and 69, 2012) Palabras clave. Centaurea, Asteraceae, corología, Península Ibérica. Key words: Centaurea, Asteraceae, chorology, Iberian Peninsula
APA, Harvard, Vancouver, ISO, and other styles
9

Carneiro, J. W. P., A. S. Muniz, and T. A. Guedes. "Greenhouse bedding plant production of Stevia rebaudiana (Bert) Bertoni." Canadian Journal of Plant Science 77, no. 3 (July 1, 1997): 473–74. http://dx.doi.org/10.4141/p96-166.

Full text
Abstract:
The purpose of this experiment was to determine the effects of 14 growing media on greenhouse bedding plant production of Stevia rebaudiana (Bert) Bertoni. The best mixture consisted of sand clay (LEd2) soil, laying hen manure (10% vol/vol), and lime. Key words: Natural sweetener, fertilizers, transplant production
APA, Harvard, Vancouver, ISO, and other styles
10

Shimal, Abeer F., Baydaa H. Helal, and Ashwaq T. Hashim. "Extended of TEA: A 256 bits block cipher algorithm for image encryption." International Journal of Electrical and Computer Engineering (IJECE) 11, no. 5 (October 1, 2021): 3996. http://dx.doi.org/10.11591/ijece.v11i5.pp3996-4007.

Full text
Abstract:
<p>This paper introduces an effective image encryption approach that merges a chaotic map and polynomial with a block cipher. According to this scheme, there are three levels of encryption. In the first level, pixel positions of the image are scuffled into blocks randomly based on a chaotic map. In the second level, the polynomials are constructed by taking N unused pixels from the permuted blocks as polynomial coefficients. Finally, the third level a proposed secret-key block cipher called extended of tiny encryption algorithm (ETEA) is used. The proposed ETEA algorithm increased the block size from 64-bit to 256-bit by using F-function in type three Feistel network design. The key schedule generation is very straightforward through admixture the entire major subjects in the identical manner for every round. The proposed ETEA algorithm is word-oriented, where wholly internal operations are executed on words of 32 bits. So, it is possible to efficiently implement the proposed algorithm on smart cards. The results of the experimental demonstration that the proposed encryption algorithm for all methods are efficient and have high security features through statistical analysis using histograms, correlation, entropy, randomness tests, and the avalanche effect.</p>
APA, Harvard, Vancouver, ISO, and other styles
11

Zhang, Jinbao, Ning Wu, Fang Zhou, Muhammad Yahya, and Jianhua Li. "A Novel Differential Fault Analysis on the Key Schedule of SIMON Family." Electronics 8, no. 1 (January 15, 2019): 93. http://dx.doi.org/10.3390/electronics8010093.

Full text
Abstract:
As a family of lightweight block ciphers, SIMON has attracted lots of research attention since its publication in 2013. Recent works show that SIMON is vulnerable to differential fault analysis (DFA) and existing DFAs on SIMON assume the location of induced faults are on the cipher states. In this paper, a novel DFA on SIMON is proposed where the key schedule is selected as the location of induced faults. Firstly, we assume a random one-bit fault is induced in the fourth round key KT−4 to the last. Then, by utilizing the key schedule propagation properties of SIMON, we determine the exact position of induced fault and demonstrate that the proposed DFA can retrieve 4 bits of the last round key KT−1 on average using one-bit fault. Till now this is the largest number of bits that can be cracked as compared to DFAs based on random bit fault model. Furthermore, by reusing the induced fault, we prove that 2 bits of the penultimate round key KT−2 could be retrieved. To the best of our knowledge, the proposed attack is the first one which extracts a key from SIMON based upon DFA on the key schedule. Finally, correctness and validity of our proposed attack is verified through detailed simulation and analysis.
APA, Harvard, Vancouver, ISO, and other styles
12

Khaldi, Amine. "Diffie-Hellman Key Exchange through Steganographied Images." Law, State and Telecommunications Review 10, no. 1 (May 14, 2018): 147–60. http://dx.doi.org/10.26512/lstr.v10i1.21504.

Full text
Abstract:
Purpose – In a private key system, the major problem is the exchange of the key between the two parties. Diffie and Hellman have set up a way to share the key. However, this technique is not protected against a man-in-the-middle attack as the settings are not authenticated. The Diffie-Hellman key exchange requires the use of digital signature or creating a secure channel for data exchanging to avoid the man-in-the-middle attack. Methodology/approach/design – We present a Diffie-Hellman key exchange implementation using steganographied images. Using steganography made invisible the data exchange to a potential attacker. So, we will not need a digital signature or creating a secure channel to do our key exchange since only the two concerned parts are aware of this exchange. Findings – We generate a symmetric 128-bit key between two users without use of digital signature or secure channel. However, it works only on bitmap images, heavy images and sensitive to compression.
APA, Harvard, Vancouver, ISO, and other styles
13

Wang, Zongyue, Xiaoyang Dong, Keting Jia, and Jingyuan Zhao. "Differential Fault Attack on KASUMI Cipher Used in GSM Telephony." Mathematical Problems in Engineering 2014 (2014): 1–7. http://dx.doi.org/10.1155/2014/251853.

Full text
Abstract:
The confidentiality of GSM cellular telephony depends on the security of A5 family of cryptosystems. As an algorithm in this family survived from cryptanalysis, A5/3 is based on the block cipher KASUMI. This paper describes a novel differential fault attack on KAUSMI with a 64-bit key. Taking advantage of some mathematical observations on the FL, FO functions, and key schedule, only one 16-bit word fault is required to recover all information of the 64-bit key. The time complexity is only 232encryptions. We have practically simulated the attack on a PC which takes only a few minutes to recover all the key bits. The simulation also experimentally verifies the correctness and complexity.
APA, Harvard, Vancouver, ISO, and other styles
14

Villanueva-Polanco, Ricardo, and Eduardo Angulo-Madrid. "Cold Boot Attacks on the Supersingular Isogeny Key Encapsulation (SIKE) Mechanism." Applied Sciences 11, no. 1 (December 28, 2020): 193. http://dx.doi.org/10.3390/app11010193.

Full text
Abstract:
This research paper evaluates the feasibility of cold boot attacks on the Supersingular Isogeny Key Encapsulation (SIKE) mechanism. This key encapsulation mechanism has been included in the list of alternate candidates of the third round of the National Institute of Standards and Technology (NIST) Post-Quantum Cryptography Standardization Process. To the best of our knowledge, this is the first time this scheme is assessed in the cold boot attacks setting. In particular, our evaluation is focused on the reference implementation of this scheme. Furthermore, we present a dedicated key-recovery algorithm for SIKE in this setting and show that the key recovery algorithm works for all the parameter sets recommended for this scheme. Moreover, we compute the success rates of our key recovery algorithm through simulations and show the key recovery algorithm may reconstruct the SIKE secret key for any SIKE parameters for a fixed and small α=0.001 (the probability of a 0 to 1 bit-flipping) and varying values for β (the probability of a 1 to 0 bit-flipping) in the set {0.001,0.01,…,0.1}. Additionally, we show how to integrate a quantum key enumeration algorithm with our key-recovery algorithm to improve its overall performance.
APA, Harvard, Vancouver, ISO, and other styles
15

Bolaños, Jorge, Eduardo Naranjo, Griselda Escalona, and Consuelo Lorenzo. "Eumops underwoodii (Chiroptera: Molossidae) en Campeche." Revista Mexicana de Mastozoología (Nueva Epoca) 10, no. 1 (January 1, 2006): 75. http://dx.doi.org/10.22201/ie.20074484e.2006.10.1.144.

Full text
Abstract:
Abstract: We document a record of Underwood's bonneted bat (Eumops underwoodii) in the state of Campeche, Mexico. The specimen was found close to a water hole called "Cacatucha" within the natural protected area of Balam-Kin, Municipality of Hopelchén. There is a previous record of the species in the central region of Peten "El Remate" in the Municipality of Calkini, Campeche. The bat captured is on the Mammals Colletion of El Colegio de la Frontera Sur, San Cristobal de las Casas, Chiapas. Key words: Underwood's bonneted bat, Balam-kin, Eumops underwoodii, Campeche. Palabras clave: murciélago mastín, Balam-kin, Eumops underwoodii, Campeche.
APA, Harvard, Vancouver, ISO, and other styles
16

Bianco, A. C., and J. E. Silva. "Optimal response of key enzymes and uncoupling protein to cold in BAT depends on local T3 generation." American Journal of Physiology-Endocrinology and Metabolism 253, no. 3 (September 1, 1987): E255—E263. http://dx.doi.org/10.1152/ajpendo.1987.253.3.e255.

Full text
Abstract:
We have examined the activity of three lipogenic enzymes [malic enzyme (ME), glucose-6-phosphate dehydrogenase (G-6-PD), and acetyl coenzyme A (CoA) carboxylase], the activity of the mitochondrial FAD-dependent alpha-glycerolphosphate dehydrogenase (alpha-GPD), and the mitochondrial concentration of uncoupling protein (UCP) in brown adipose tissue (BAT) of euthyroid and hypothyroid rats, both at room temperature and in response to acute cold stress. These enzymes and UCP are important for the thermogenic response of BAT in adaptation to cold. The basal level of the lipogenic enzymes was normal or slightly elevated in hypothyroid rats maintained at 23 degrees C, but the levels of alpha-GPD and UCP were markedly reduced. Forty-eight hours at 4 degrees C resulted in an increase in the activity of G-6-PD, acetyl-CoA carboxylase, and alpha-GPD and in the concentration of UCP both in euthyroid and hypothyroid animals, but the levels reached were invariably less in hypothyroid animals, indicating that thyroid hormone is necessary for a full metabolic response of BAT under maximal demands. Of all variables measured, the most affected was UCP (only one-fifth of the response of euthyroid rats to cold) followed by alpha-GPD (approximately 50% the euthyroid response). The administration of replacement doses of triiodothyronine (T3) to hypothyroid rats for 5-7 days did not normalize any of the BAT responses, whereas the replacement of thyroxine (T4) for only 2 days sufficed to normalize them all. This effect of T4 was abolished by preventing its conversion to T3 with iopanoic acid.(ABSTRACT TRUNCATED AT 250 WORDS)
APA, Harvard, Vancouver, ISO, and other styles
17

Pedroza Carneiro, José Walter. "Stevia rebaudiana (Bert.) Bertoni: Stages of plant development." Canadian Journal of Plant Science 87, no. 4 (October 1, 2007): 861–65. http://dx.doi.org/10.4141/p06-040.

Full text
Abstract:
Vegetative and reproductive codes were developed to describe seeds under germination, normal seedlings, seedling growth, plant growth and branching, plant regrowth, flower buds, crop flowering (anthesis), developing seeds, seed dispersion, and senescent plants as V0, V1.i, V2.i, V3.i.k, V4.i.k, R1.i, R2.i, R3.i, R4.i and R5.i, respectively. The numerical code attached to both capital letters indicates the stage, and the lower case letters i or k indicate a number or a percentage. Key words: Natural sweetener, plant regrowth, anthesis, seed, seedling, transplant
APA, Harvard, Vancouver, ISO, and other styles
18

Özdemir, Canan, Kâmuran Akta?, and Yasin Altan. "Morphological and anatomical investigations on three Allium L. (Liliaceae) species of east Anatolia, Turkey." Bangladesh Journal of Botany 40, no. 1 (July 12, 2011): 9–15. http://dx.doi.org/10.3329/bjb.v40i1.7990.

Full text
Abstract:
Three East Anatolia species of Allium namely, A. karsianum Fomin, A. kunthianum Vved., A. rupestre Steven are compared morphologically and anatomically. The results showed that all the species investigated can be distinguished by their morphological and anatomical characters. Key words: Allium; Anatomy; Morphology DOI: http://dx.doi.org/10.3329/bjb.v40i1.7990 Bangladesh J. Bot. 40(1): 9-15, 2011 (June)
APA, Harvard, Vancouver, ISO, and other styles
19

KODAMA, H., M. JAAKKIMAINEN, and R. DUCOURNEAU. "A MULTI-SAMPLE HOLDER ASSEMBLY FOR THE QUANTASORB® SURFACE AREA ANALYZER." Canadian Journal of Soil Science 67, no. 3 (August 1, 1987): 709–13. http://dx.doi.org/10.4141/cjss87-069.

Full text
Abstract:
An inexpensive and simple multi-sample holder assembly was designed and constructed for the Quantasorb® surface area analyzer which is based on the BET gas adsorption isotherm principle. Four sample holder U-tubes were connected in parallel in order to maintain all samples equidistant from the detector. This arrangement keeps high gas detection sensitivity and minimizes the occurrence of unwanted turbulent gas flows in the system. The system was tested by measuring surface areas of reference standard samples. Excellent agreement was obtained. Key words: BET method, gas adsorption, gas flow sytem, parallel connection
APA, Harvard, Vancouver, ISO, and other styles
20

Villanueva-Polanco, Ricardo. "Cold Boot Attacks on LUOV." Applied Sciences 10, no. 12 (June 15, 2020): 4106. http://dx.doi.org/10.3390/app10124106.

Full text
Abstract:
This research article assesses the feasibility of cold boot attacks on the lifted unbalanced oil and Vinegar (LUOV) scheme, a variant of the UOV signature scheme. This scheme is a member of the family of asymmetric cryptographic primitives based on multivariable polynomials over a finite field K and has been submitted as candidate to the ongoing National Institute of Standards and Technology (NIST) standardisation process of post-quantum signature schemes. To the best of our knowledge, this is the first time that this scheme is evaluated in this setting. To perform our assessment of the scheme in this setting, we review two implementations of this scheme, the reference implementation and the libpqcrypto implementation, to learn the most common in-memory private key formats and next develop a key recovery algorithm exploiting the structure of this scheme. Since the LUOV’s key generation algorithm generates its private components and public components from a 256-bit seed, the key recovery algorithm works for all the parameter sets recommended for this scheme. Additionally, we tested the effectiveness and performance of the key recovery algorithm through simulations and found the key recovery algorithm may retrieve the private seed when α = 0.001 (probability that a 0 bit of the original secret key will flip to a 1 bit) and β (probability that a 1 bit of the original private key will flip to a 0 bit) in the range { 0.001 , 0.01 , 0.02 , … , 0.15 } by enumerating approximately 2 40 candidates.
APA, Harvard, Vancouver, ISO, and other styles
21

Han, Dandan, Lequan Min, and Guanrong Chen. "A Stream Encryption Scheme with Both Key and Plaintext Avalanche Effects for Designing Chaos-Based Pseudorandom Number Generator with Application to Image Encryption." International Journal of Bifurcation and Chaos 26, no. 05 (May 2016): 1650091. http://dx.doi.org/10.1142/s0218127416500917.

Full text
Abstract:
Based on a stream encryption scheme with avalanche effect (SESAE), a stream encryption scheme with both key avalanche effect and plaintext avalanche effect (SESKPAE) is introduced. Using this scheme and an ideal [Formula: see text]-word ([Formula: see text]-segment) pseudorandom number generator (PRNG), a plaintext can be encrypted such that each bit of the ciphertext block has a change with the probable probability of [Formula: see text] when any word of the key is changed or any bit of the plaintext is changed. To that end, a novel four-dimensional discrete chaotic system (4DDCS) is proposed. Combining the 4DDCS with a generalized synchronization (GS) theorem, a novel eight-dimensional discrete GS chaotic system (8DDGSCS) is constructed. Using the 8DDGSCS, a [Formula: see text]-word chaotic pseudorandom number generator (CPRNG) is designed. The keyspace of the [Formula: see text]-word CPRNG is larger than [Formula: see text]. Then, the FIPS 140-2 test suit/generalized FIPS 140-2 test suit is used to test the randomness of the 1000-key streams consisting of 20[Formula: see text]000 bits generated by the [Formula: see text]-word CPRNG, the RC4 algorithm PRNG and the ZUC algorithm PRNG, respectively. The test results show that for the three PRNGs, there are 100%/98.9%, 99.9%/98.8%, 100%/97.9% key streams passing the tests, respectively. Furthermore, the SP800-22 test suite is used to test the randomness of four 100-key streams consisting of 1000[Formula: see text]000 bits generated by four PRNGs, respectively. The numerical results show that the randomness performances of the [Formula: see text]-word CPRNG is promising, showing that there are no significant correlations between the key streams and the perturbed key streams generated via the [Formula: see text]-word CPRNG. Finally, using the [Formula: see text]-word CPRNG and the SESKPAE to encrypt two gray-scale images, test results demonstrate that the [Formula: see text]-word CPRNG is able to generate both key avalanche effect and plaintext avalanche effect, which are similar to those generated via an ideal CPRNG, and performs better than other comparable schemes.
APA, Harvard, Vancouver, ISO, and other styles
22

Sy, Alex, and R. G. (Dick) Campanella. "Becker and standard penetration tests (BPT–SPT) correlations with consideration of casing friction." Canadian Geotechnical Journal 31, no. 3 (June 1, 1994): 343–56. http://dx.doi.org/10.1139/t94-042.

Full text
Abstract:
The Becker penetration test (BPT), through correlations with the standard penetration test (SPT), is widely used for foundation design and liquefaction assessment in gravelly soils. Most of the existing correlations, however, do not adequately account for the variable energy output of the diesel hammer used in the Becker system, and shaft friction on the Becker casing is ignored. An alternative and more rational approach to BPT–SPT correlations is presented, based on experimental and numerical studies conducted at the University of British Columbia. The research involves performing SPT, BPT, and other in situ tests at several sites in British Columbia and includes dynamic measurements of energy transfer in the SPT and BPT. Stress-wave measurements and wave-equation analyses are used to evaluate the effect of friction on the BPT blow count. New BPT–SPT correlations are proposed that consider the energy transfer in both tests and explicitly consider casing friction in the BPT. A recommended procedure for estimating equivalent SPT N60 from BPT blow count is presented. Key words : Becker penetration test, standard penetration test, dynamic measurement, pile driving, stress-wave propagation.
APA, Harvard, Vancouver, ISO, and other styles
23

Xu, Huaxing, Shaohua Wang, Yang Huang, Yaqi Song, and Changlei Wang. "A Self-Stabilizing Phase Decoder for Quantum Key Distribution." Applied Sciences 10, no. 5 (March 1, 2020): 1661. http://dx.doi.org/10.3390/app10051661.

Full text
Abstract:
Self-stabilization quantum key distribution (QKD) systems are often based on the Faraday magneto-optic effect such as “plug and play” QKD systems and Faraday–Michelson QKD systems. In this article, we propose a new anti-quantum-channel disturbance decoder for QKD without magneto-optic devices, which can be a benefit for the photonic integration and applications in magnetic environments. The decoder is based on a quarter-wave plate reflector–Michelson (Q–M) interferometer, with which the QKD system can be free of polarization disturbance caused by quantum channel and optical devices in the system. The theoretical analysis indicates that the Q–M interferometer is immune to polarization-induced signal fading, where the operator of the Q–M interferometer corresponding to Pauli Matrix σ2 makes it satisfy the anti-disturbance condition naturally. A Q–M interferometer based time-bin phase encoding QKD setup is demonstrated, and the experimental results show that the QKD setup works stably with a low quantum bit error rate about 1.3% for 10 h over 60.6 km standard telecommunication optical fiber.
APA, Harvard, Vancouver, ISO, and other styles
24

Collado, E., and Y. Saez. "Optimization-Based Strategies for the Error Removal Method in the Ideal, Symmetric KLJN Secure Key Exchanger." Fluctuation and Noise Letters 18, no. 01 (January 9, 2019): 1950004. http://dx.doi.org/10.1142/s0219477519500044.

Full text
Abstract:
The Kirchhoff’s-Law-Johnson-Noise (KLJN) secure key exchanger is a simple, low-cost scheme that provides symmetric encryption with unconditional security in electronic communication. The key bits are generated based on measurements of the mean-square value of the noise voltage and/or current of the channel between the two communicating parties. In this work, a combined current–voltage measurement mode scenario and an error removal method for the ideal, symmetric KLJN secure key exchanger that uses an identical pair of resistors at both ends of the communication line were considered, which improves the fidelity and reduces the bit error probability compared to the schemes when either voltage or current measurement are being used. It has been shown in previous works that the error probability of the original, symmetric KLJN secure key exchanger decays exponentially with parameters such as the time window for performing the key exchange and other relevant criteria used in the interpretation of the key bits. The objective of this work is to develop optimization strategies for the ideal, symmetric KLJN secure key exchanger in order to obtain optimal values of these parameters while ensuring that errors are kept within acceptable values. For those strategies, closed-form solutions to the optimal values were derived by solving the Karush–Kuhn–Tucker (KKT) conditions. Numerical results show that the proposed optimization techniques not only ensure that the bit probability error remains within the desired limit, but also provide more flexibility to define the thresholds values, reduce the bit exchange period needed to guarantee an acceptable bit error probability, weaken Eve’s statistics, and improve the system resource managing.
APA, Harvard, Vancouver, ISO, and other styles
25

Bhattacharya, Asish K., Florian Stolz, Jürgen Kurzeck, Wolfgang Rüger, and Richard R. Schmidt. "Synthesis and in vitro evaluation of substituted aryl- and hetarylmethyl phosphonate and phosphate — UMP derivatives as potential glucosyltransferase inhibitors." Canadian Journal of Chemistry 80, no. 8 (August 1, 2002): 973–82. http://dx.doi.org/10.1139/v02-119.

Full text
Abstract:
The enzyme β (1[Formula: see text]4)-glucosyltransferase (BGT) catalyses the transfer of glucose from uridine diphosphoglucose (UDP-Glc) to 5-hydroxymethylcytosine (5-HMC) bases in double-stranded DNA. Potential inhibitors of BGT were developed by structure-based design and synthesized. The designed inhibitors 1–6 provide conformational mimicry of the transition state in glucosyltransfer reactions. The key synthetic steps involve a Michaelis–Arbuzov reaction followed by coupling with uridine-5'-morpholidophosphate as activated UMP derivative. The compounds were tested for in vitro inhibitory activity against BGT and the inhibition kinetics were examined. Three of the designed molecules were found to be potential inhibitors of BGT having IC50 values in the micromolar (µM) range. Useful structure–activity relationships were established which provide guidelines for the design of future generations of inhibitors of BGT.Key words: β-glucosyltransferase, transition state, enzyme inhibitors, structure-based design, synthesis.
APA, Harvard, Vancouver, ISO, and other styles
26

Jeon, Jin-Kwan, In-Won Hwang, Hyun-Jun Lee, and Younho Lee. "Improving the Performance of RLizard on Memory-Constraint IoT Devices with 8-Bit ATmega MCU." Electronics 9, no. 9 (September 22, 2020): 1549. http://dx.doi.org/10.3390/electronics9091549.

Full text
Abstract:
We propose an improved RLizard implementation method that enables the RLizard key encapsulation mechanism (KEM) to run in a resource-constrained Internet of Things (IoT) environment with an 8-bit micro controller unit (MCU) and 8–16 KB of SRAM. Existing research has shown that the proposed method can function in a relatively high-end IoT environment, but there is a limitation when applying the existing implementation to our environment because of the insufficient SRAM space. We improve the implementation of the RLizard KEM by utilizing electrically erasable, programmable, read-only memory (EEPROM) and flash memory, which is possessed by all 8-bit ATmega MCUs. In addition, in order to prevent a decrease in execution time related to their use, we improve the multiplication process between polynomials utilizing the special property of the second multiplicand in each algorithm of the RLizard KEM. Thus, we reduce the required MCU clock cycle consumption. The results show that, compared to the existing code submitted to the National Institute of Standard and Technology (NIST) PQC standardization competition, the required MCU clock cycle is reduced by an average of 52%, and the memory used is reduced by approximately 77%. In this way, we verified that the RLizard KEM works well in our low-end IoT environments.
APA, Harvard, Vancouver, ISO, and other styles
27

Gomurgen, AN, I. Potoglu Erkara, and H. Altnozlu. "Chromosome and pollen morphology of the rare endemic Centaurae lycopifolia Boiss. & Kotschy." Bangladesh Journal of Botany 39, no. 2 (April 20, 2011): 223–28. http://dx.doi.org/10.3329/bjb.v39i2.7484.

Full text
Abstract:
Chromosome and pollen morphology of Centaurea lycopifolia Boiss. & Kotschy were studied. The chromosome number is 2n = 34 with haploid karyotype formula 9m + 9sm. Metaphase chromosome length ranging from 6.16 to 2.23 μm and the total haploid chromosome length was 65, 85 μm. The light and scanning electron microscope investigations revealed spheroidal-subprolate, the amb triangular and tricolporatae pollens in the taxon. Exine ornamentation was tectatae and microechinate-scabrate. Key words: Centaurea lycopifolia; Chromosome; Pollen morphology; Endemic; Turkey DOI: 10.3329/bjb.v39i2.7484 Bangladesh J. Bot. 39(2): 223-228, 2010 (December)
APA, Harvard, Vancouver, ISO, and other styles
28

Guo, Qian, Thomas Johansson, and Carl Löndahl. "Solving LPN Using Covering Codes." Journal of Cryptology 33, no. 1 (October 15, 2019): 1–33. http://dx.doi.org/10.1007/s00145-019-09338-8.

Full text
Abstract:
Abstract We present a new algorithm for solving the LPN problem. The algorithm has a similar form as some previous methods, but includes a new key step that makes use of approximations of random words to a nearest codeword in a linear code. It outperforms previous methods for many parameter choices. In particular, we can now solve the $$(512,\frac{1}{8})$$(512,18) LPN instance with complexity less than $$2^{80}$$280 operations in expectation, indicating that cryptographic schemes like HB variants and LPN-C should increase their parameter size for 80-bit security.
APA, Harvard, Vancouver, ISO, and other styles
29

Saiyed, I. M., P. R. Bullock, H. D. Sapirstein, G. J. Finlay, and C. K. Jarvis. "Thermal time models for estimating wheat phenological development and weather-based relationships to wheat quality." Canadian Journal of Plant Science 89, no. 3 (May 1, 2009): 429–39. http://dx.doi.org/10.4141/cjps07114.

Full text
Abstract:
Accurate prediction of crop phenology is a key requirement for crop development models. The prediction of spring wheat yield and quality from meteorological data can be improved by quantifying heat and moisture conditions during specified phenological phases; therefore, accurate prediction of phenological development is important for estimating weather impacts on wheat quality. The objective of this study was to test the accuracy of biometeorological time (BMT), growing degree days (GDD), and physiological days (Pdays) for prediction of wheat phenological stages and impacts of growing season weather during those stages on wheat bread-making quality. Observed crop phenological stages and detailed weather data across 17 site-years in western Canada for six hard spring wheat varieties were collected to assess BMT, GDD and Pdays. Biometeorological time was most consistent for predicting the length of the seeding to jointing and seeding to anthesis growth stages and second most consistent behind GDD for predicting seeding to soft dough and seeding to maturity. The ability of the BMT and GDD models to predict calendar days to anthesis and maturity were further tested using field data from 166 farms across western Canada. Both GDD and BMT models were effective for predicting time from seeding to anthesis (R2 = 0.84 and 0.90, respectively) and seeding to maturity (R2 = 0.62 and 0.66, respectively). BMT- and GDD-predicted wheat growth phases were used to calculate modeled crop water use by growth period for producer fields. Crop water use is significantly correlated to key bread-making quality parameters of flour protein, farinograph dough development time and farinograph stability. Biometeorological time predicted water use was more highly correlated to these quality parameters than GDD predictions. Accordingly, the BMT scale is recommended for estimation of wheat phenological development especially for modeling weather impacts on wheat end-use quality.Key words: Spring wheat, phenological development, biometeorological time, growing degree day, physiological day, wheat quality
APA, Harvard, Vancouver, ISO, and other styles
30

Chai, Cheng, Yao Song, and Zhenzhen Qin. "A Thousand Words Express a Common Idea? Understanding International Tourists’ Reviews of Mt. Huangshan, China, through a Deep Learning Approach." Land 10, no. 6 (May 21, 2021): 549. http://dx.doi.org/10.3390/land10060549.

Full text
Abstract:
Tourists’ experiential perceptions and specific behaviors are of importance to facilitate geographers’ and planners’ understanding of landscape surroundings. In addition, the potentially significant role of online user generated content (UGC) in tourism landscape research has only received limited attention, especially in the era of artificial intelligence. The motivation of the present study is to understand international tourists’ online reviews of Mt. Huangshan in China. Through a state-of-the-art natural language processing network (BERT) analyzing posted reviews across international tourists, our results facilitate relevant landscape development and design decisions. Second, the proposed analytic method can be an exemplified model to inspire relevant landscape planners and decision-makers to conduct future researches. Through the clustering results, several key topics are revealed, including international tourists’ perceptual image of Mt. Huangshan, tour route planning, and negative experience of staying.
APA, Harvard, Vancouver, ISO, and other styles
31

Jang, Kyungbae, Gyeongju Song, Hyunjun Kim, Hyeokdong Kwon, Hyunji Kim, and Hwajeong Seo. "Efficient Implementation of PRESENT and GIFT on Quantum Computers." Applied Sciences 11, no. 11 (May 23, 2021): 4776. http://dx.doi.org/10.3390/app11114776.

Full text
Abstract:
Grover search algorithm is the most representative quantum attack method that threatens the security of symmetric key cryptography. If the Grover search algorithm is applied to symmetric key cryptography, the security level of target symmetric key cryptography can be lowered from n-bit to n2-bit. When applying Grover’s search algorithm to the block cipher that is the target of potential quantum attacks, the target block cipher must be implemented as quantum circuits. Starting with the AES block cipher, a number of works have been conducted to optimize and implement target block ciphers into quantum circuits. Recently, many studies have been published to implement lightweight block ciphers as quantum circuits. In this paper, we present optimal quantum circuit designs of symmetric key cryptography, including PRESENT and GIFT block ciphers. The proposed method optimized PRESENT and GIFT block ciphers by minimizing qubits, quantum gates, and circuit depth. We compare proposed PRESENT and GIFT quantum circuits with other results of lightweight block cipher implementations in quantum circuits. Finally, quantum resources of PRESENT and GIFT block ciphers required for the oracle of the Grover search algorithm were estimated.
APA, Harvard, Vancouver, ISO, and other styles
32

Peng, Jun, Du Zhang, and Xiaofeng Liao. "A Novel Algorithm for Block Encryption of Digital Image Based on Chaos." International Journal of Cognitive Informatics and Natural Intelligence 5, no. 1 (January 2011): 59–74. http://dx.doi.org/10.4018/jcini.2011010104.

Full text
Abstract:
This paper proposes a novel image block encryption algorithm based on three-dimensional Chen chaotic dynamical system. The algorithm works on 32-bit image blocks with a 192-bit secret key. The idea is that the key is employed to drive the Chen’s system to generate a chaotic sequence that is inputted to a specially designed function G, in which we use new 8x8 S-boxes generated by chaotic maps (Tang, 2005). In order to improve the robustness against differental cryptanalysis and produce desirable avalanche effect, the function G is iteratively performed several times and its last outputs serve as the keystreams to encrypt the original image block. The design of the encryption algorithm is described along with security analyses. The results from key space analysis, differential attack analysis, and information entropy analysis, correlation analysis of two adjacent pixels prove that the proposed algorithm can resist cryptanalytic, statistical and brute force attacks, and achieve a higher level of security. The algorithm can be employed to realize the security cryptosystems over the Internet.
APA, Harvard, Vancouver, ISO, and other styles
33

Akotoye, Francis Xavier Kofi. "A Text Steganographic System Based on Word Length Entropy Rate." International Journal of Recent Contributions from Engineering, Science & IT (iJES) 5, no. 3 (October 10, 2017): 71. http://dx.doi.org/10.3991/ijes.v5i3.7521.

Full text
Abstract:
<p class="0abstract">The widespread adoption of electronic distribution of material is accompanied by illicit copying and distribution. This is why individuals, businesses and governments have come to think of how to protect their work, prevent such illicit activities and trace the distribution of a document. It is in this context that a lot of attention is being focused on steganography. Implementing steganography in text document is not an easy undertaking considering the fact that text document has very few places in which to embed hidden data. Any minute change introduced to text objects can easily be noticed thus attracting attention from possible hackers. This study investigates the possibility of embedding data in text document by employing the entropy rate of the constituent characters of words not less than four characters long. The scheme was used to embed bits in text according to the alphabetic structure of the words, the respective characters were compared with their neighbouring characters and if the first character was alphabetically lower than the succeeding character according to their ASCII codes, a zero bit was embedded otherwise 1 was embedded after the characters had been transposed. Before embedding, the secret message was encrypted with a secret key to add a layer of security to the secret message to be embedded, and then a pseudorandom number was generated from the word counts of the text which was used to paint the starting point of the embedding process. The embedding capacity of the scheme was relatively high compared with the space encoding and semantic method.</p>
APA, Harvard, Vancouver, ISO, and other styles
34

Wei, Yuechuan, Yisheng Rong, and Xu An Wang. "Security Analysis of Cipher ICEBERG against Bit-pattern Based Integral Attack." International Journal of Technology and Human Interaction 12, no. 2 (April 2016): 60–71. http://dx.doi.org/10.4018/ijthi.2016040105.

Full text
Abstract:
Significant progress in the development of lightweight symmetric cryptographic primitives has been made in recent years. Security of ciphers against current cryptanalysis methods should be carefully evaluated. Integral attack is one of the most effective attacks against block ciphers. However, traditional integral attack based on byte or word is not available for a bit-oriented cipher. Bit-pattern based integral attack technique, introduced by Z'aba et al. addresses this issue to some extent. In this paper, bit-pattern based integral attack is applied to ICEBERG—a lightweight block cipher efficient in reconfigurable hard-ware. By tracing the propagation of the plaintext structure at bit-level, the balance property is obtained and then key guesses are verified. The result shows that 3, 4 and 5 rounds ICEBERG are not immune to this attack. All attacks presented in this paper manage to recover the full subkeys of the final round.
APA, Harvard, Vancouver, ISO, and other styles
35

Lamanauskas, Vincentas. "“McDONALDIZED” EDUCATION: IN A FAST, CHEAP AND EASY WAY, BUT INEFFECTIVELY." ŠVIETIMAS: POLITIKA, VADYBA, KOKYBĖ / EDUCATION POLICY, MANAGEMENT AND QUALITY 3, no. 2 (August 25, 2011): 4–10. http://dx.doi.org/10.48127/spvk-epmq/11.3.04a.

Full text
Abstract:
We live in such time period when there is a wish to get everything quickly and desirably for free. And, the quicker, the better. This applies to education as well. In fact, it is depreciated. Often it is said, that education does not add wisdom. There is some truth in this statement. If we speak about pseudo education acquired in any way and anywhere, then yes. However, a good, proper education is the outcome of rationality. These are related things, determining each other. It is thought, that today everything is rapidly changing, it is impossible, and there is no need of funda-mental “lifelong” education. This is an illusion, which does not let us see the essence. And a lot do not want and are incapable to see it. Like the house which can’t stand without good foundation, human’s good life is impossible without good education. The same can be said about society as a whole. Educated society is a warrant of state’s prosperity. Knowledge, abilities, values is, indeed, the true foundation of good education. A proper combination of these three components guarantees good education. Moreover, it would be nice if this component would entirely become integrated into given diplomas. Unfortunately, it has to be stated once again, that universities oriented or being oriented only to providing service will never be able to guarantee such integration. Thus, more or less it is agreed on an international level, that our contemporary society is not properly ready for the challenges of the 21st century. “A quick diploma” does not guarantee any-thing, in fact – neither individual nor society progress. Universities, being oriented only to giving “quick diplomas” are condemned. Education is not a game and universities are not “sandpits”. Unfortunately, it makes an im-pression that the number of “sandpits” is increasing, and wishing to play in them are getting more and more. We can be taught by others, but we can get educated only ourselves. An educated man is an independent man, knowing himself and making his own decisions. An educated nation is a na-tion knowing itself, independent and making its own decisions independently. Key words: educated people, education policy, educated nation, university education system.
APA, Harvard, Vancouver, ISO, and other styles
36

Muttoo, Sunil Kumar, Vinay Kumar, and Abhishek Bansal. "Secure Data Hiding Using Eight Queens Solutions." International Journal of Information Security and Privacy 6, no. 4 (October 2012): 55–70. http://dx.doi.org/10.4018/jisp.2012100103.

Full text
Abstract:
The 8-queens problem of placing 8 non-attacking queens on an 8x8 chessboard is used to hide message in an image. The method helps in randomizing the bit selection in a cover image for hiding purpose. Cover image is divided into blocks of 8x1 bytes and then masked with solutions of the 8-queens problem. Bits from the block are collected corresponding to the 8-queen solution to make a 7 bit string. LSB of the block is not considered. It gives a number in the range of 0 to 127. If a bit string, corresponding to the 8-queens solutions, matches with ASCII code of the first character from message, the corresponding solution number of the 8-queens problem is encrypted using RC4, and the cipher is stored in first block of the cover. This encrypted value works as key. The solution number corresponding to next character is XORED with the key and the resultant value is embedded in the LSB of next block. The algorithm has been tested with cover of different image file formats like BMP, PNG and TIFF. The algorithm provides very good capacity, imperceptibility and robustness.
APA, Harvard, Vancouver, ISO, and other styles
37

Protzner, Andrea B., and Mary Pat McAndrews. "Network Alterations Supporting Word Retrieval in Patients with Medial Temporal Lobe Epilepsy." Journal of Cognitive Neuroscience 23, no. 9 (September 2011): 2605–19. http://dx.doi.org/10.1162/jocn.2010.21599.

Full text
Abstract:
Although the hippocampus is not considered a key structure in semantic memory, patients with medial-temporal lobe epilepsy (mTLE) have deficits in semantic access on some word retrieval tasks. We hypothesized that these deficits reflect the negative impact of focal epilepsy on remote cerebral structures. Thus, we expected that the networks that support word retrieval tasks would be altered in left mTLE patients. We measured brain activity with fMRI while participants (13 controls, 13 left mTLE, and 13 right mTLE) performed a verb generation task. We examined functional connectivity during this task in relation to language performance on an off-line clinical test of lexical access (Boston Naming Test, BNT). Using task–seed–behavior partial least squares, we identified a canonical language network that was more active during verb generation than the baseline condition, but this network did not correlate with variability in BNT performance in either controls or patients. Instead, additional networks were identified for each group, with more anterior temporal and prefrontal regions recruited for controls and more posterior temporal regions for both left and right mTLE patients. Our findings go beyond the literature emphasizing differences in laterality of language processes in mTLE patients and, critically, highlight how network changes can be used to account for performance variation among patients on clinically relevant measures. This strategy of correlating network changes and off-line behavior may provide a powerful tool for predicting a postoperative decline in language performance.
APA, Harvard, Vancouver, ISO, and other styles
38

Hulle, N. B., Prathiba B., Sarika R. Khope, K. Anuradha, Yogini Borole, and D. Kotambkar. "Optimized architecture for SNOW 3G." International Journal of Electrical and Computer Engineering (IJECE) 11, no. 1 (February 1, 2021): 545. http://dx.doi.org/10.11591/ijece.v11i1.pp545-557.

Full text
Abstract:
SNOW 3G is a synchronous, word-oriented stream cipher used by the 3GPP standards as a confidentiality and integrity algorithms. It is used as first set in long term evolution (LTE) and as a second set in universal mobile telecommunications system (UMTS) networks. The cipher uses 128-bit key and 128 bit IV to produce 32-bit ciphertext. The paper presents two techniques for performance enhancement. The first technique uses novel CLA architecture to minimize the propagation delay of the 2<sup>32</sup> modulo adders. The second technique uses novel architecture for S-box to minimize the chip area. The presented work uses VHDL language for coding. The same is implemented on the FPGA device Virtex xc5vfx100e manufactured by Xilinx. The presented architecture achieved a maximum frequency of 254.9 MHz and throughput of 7.2235 Gbps.
APA, Harvard, Vancouver, ISO, and other styles
39

Naurzkulova, S. M., B. K. Massalimova, K. A. Shorayeva, G. М. Dzhienbaeva, M. V. Arapova, and V. A. Sadykov. "SYNTHESIS AND STUDY OF STRUCTURAL PROPERTIES OF COMPOSITES BASED ON NI-RU FOR STEAM CONVERSION OF ETHANOL." SERIES CHEMISTRY AND TECHNOLOGY 2, no. 440 (April 15, 2020): 138–44. http://dx.doi.org/10.32014/2020.2518-1491.34.

Full text
Abstract:
Сatalyst precursors, substituted by rare-earth and transition metals, promoted with Ru nanoparticles using the modified Pechinimethod (Organic polymeric precursor) have been synthesized. To transform biofuel (ethanol) into hydrogen from the obtained active phases, three different methods were used to synthesize composites with the general formula [LaMn1-xBxO3 + δ / Ln1-yZryO2] (1: 1 by mass), B = Ni, Ru, Ln = Pr, Sm , Ce. Structural and surface properties of the obtained samples of complex oxides and composites were studied using the BET and XPA methods. The textural and structural characteristics of composites differing in the methods of their preparationare presented. Key words: perovskite, fluorite, composites, biomass, hydrogen.
APA, Harvard, Vancouver, ISO, and other styles
40

Fetalvero, Eddie G. "CONSENSUS-BASED EDUCATION: ITS EFFECT ON COLLEGE STUDENTS’ ACHIEVEMENT IN BIOENERGETICS AS MODERATED BY GENDER AND LEARNING STYLES." Journal of Baltic Science Education 16, no. 4 (August 25, 2017): 533–48. http://dx.doi.org/10.33225/jbse/17.16.533.

Full text
Abstract:
Involving students in making an educational decision is claimed to produce better outcomes. The effect of consensus-based education (CBE) on achievement in bioenergetics as moderated by gender and learning styles was determined. Two undergraduate biology classes were compared employing the quasi-experimental design, one using CBE and the other taught the conventional way. The Biology Achievement Test (BAT) was the main data collection tool used, supplemented with questionnaires, learning style inventory, videos, journal, and informal interviews. ANCOVA tested the effect of educational approach and the moderating effects of gender and learning styles while t-test compared the BAT scores between the groups. Results show that CBE can be a feasible alternative approach to teaching biology as it fairly addresses issues on gender and learning styles. It has also helped students develop their reasoning skills and improve their appreciation of democratic practices in the classroom. Key words: educational decision-making, consensus-based education, learning style effect, gender effect, achievement in bioenergetics.
APA, Harvard, Vancouver, ISO, and other styles
41

Deb, Shomen, and Md Mokammel Haque. "Elliptic curve and pseudo-inverse matrix based cryptosystem for wireless sensor networks." International Journal of Electrical and Computer Engineering (IJECE) 9, no. 5 (October 1, 2019): 4479. http://dx.doi.org/10.11591/ijece.v9i5.pp4479-4492.

Full text
Abstract:
Applying asymmetric key security to wireless sensor network (WSN) has been challenging task for the researcher of this field. One common trade-off is that asymmetric key architecture does provide good enough security than symmetric key but on the other hand, sensor network has some resource limitations to implement asymmetric key approach. Elliptic curve cryptography (ECC) has significant advantages than other asymmetric key system like RSA, D-H etc. The most important feature of ECC is that it has much less bit requirement and at the same time, ensures better security compared to others. Hence, ECC can be a better option for implementing asymmetric key approach for sensor network. We propose a new cryptosystem which is based on Pseudo-inverse matrix and Elliptic Curve Cryptography. We establish a relationship between these two different concepts and evaluate our proposed system on the basis of the results of similar works as well as our own simulation done in TinyOS environment.
APA, Harvard, Vancouver, ISO, and other styles
42

Huang, Ming Xin, Li Guang Wang, Huan Liu, and Bao Lin Liu. "Design of a Downhole Motor Drilling Experimental System." Advanced Materials Research 998-999 (July 2014): 401–4. http://dx.doi.org/10.4028/www.scientific.net/amr.998-999.401.

Full text
Abstract:
In order to research the technology of impregnated diamond core bit and turbodrill which can be applied to the oil and geological field, this paper here designed a set of downhole motor drilling experimental system. We built a virtual prototype simulation model by using Solid Works which can help us dynamically design and optimize the key components and the overall structure of the whole system. In this paper, virtual assembly is available to assess the feasibility of the overall design. While the model simplification and the simulation check of the key components were carried out. Finally, we will be able to verify the correctness of the virtual prototype simulation analysis by setting up a physical prototype.
APA, Harvard, Vancouver, ISO, and other styles
43

Sy, Alex, and R. G. (Dick) Campanella. "Dynamic performance of the Becker hammer drill and penetration test." Canadian Geotechnical Journal 30, no. 4 (August 1, 1993): 607–19. http://dx.doi.org/10.1139/t93-053.

Full text
Abstract:
The Becker penetration test (BPT) blow counts are commonly correlated to the standard penetration test (SPT) N-values for foundation design and liquefaction potential assessment in coarse-grained soils. Most of the existing correlations, however, do not adequately account for the variable energy output of the ICE 180 diesel hammer used in the Becker system, and the shaft resistance acting on the Becker pipe is often ignored. To obtain reliable BPT–SPT correlations, an extensive study of the BPT has been conducted at several sites in British Columbia. Dynamic measurements of Becker drill rigs and penetration tests were conducted that included hammer combustion and bounce chamber pressures, as well as force and acceleration near the top of the drill pipe. The dynamic field data are presented, including the maximum energy transferred to the top of the Becker pipe (ENTHRU). An energy approach for correcting Becker blow counts to a reference ENTHRU level of 30% of the hammer-rated energy is proposed. Different combustion conditions, drill rigs, and pipe sizes are investigated in the study. The test results show that ENTHRU is a fundamental and useful parameter for normalizing the BPT blow counts to account for the variable energy transfer from the diesel hammer. Key words : penetration test, dynamic measurement, energy, pile driving, diesel hammer, stress-wave propagation.
APA, Harvard, Vancouver, ISO, and other styles
44

Gao, Zhi Qiang, Jin Bao Lan, Xiao Wei Liu, and Liang Yin. "The Delta-Sigma Modulator of Fractional-N Frequency Synthesizer for Wireless Sensors Network Applications." Key Engineering Materials 609-610 (April 2014): 1014–19. http://dx.doi.org/10.4028/www.scientific.net/kem.609-610.1014.

Full text
Abstract:
This paper presents a design of fractional-N frequency synthesizer with low dithering, which is fabricated in a 130nm CMOS process. A 3rd-order delta-sigma modulator is based on digital multi-stage noise shaping (MASH) structure with its second and third stage dithered by 7-bit linear feedback shift register (LFSR) was designed for the frequency synthesizer, and a long word is used for the first modulator in the MASH structure. The simulation result of the whole frequency synthesizer shows that it can output two-way I/Q signal between 2.28GHz and 2.53GHz, and its spurs are lower than-75dBc.
APA, Harvard, Vancouver, ISO, and other styles
45

Paul, KK, MA Bari, and SC Debnath. "Genetic variability of Colocasia esculenta (L.) Schott." Bangladesh Journal of Botany 40, no. 2 (February 7, 2012): 185–88. http://dx.doi.org/10.3329/bjb.v40i2.9775.

Full text
Abstract:
Studies on the nature and extent of variability of aqua edible aroids cultivars, Colocasia esculenta (L.) Schott. revealed significant differences and wide range of variations among the accessions and cultivars. Genotypic variances and coefficient of variation for most of the characters were remarkably higher than their corresponding variances due to environment which also indicate the existence of variation in genotypic origin. Plant height, petiole length, leaf length, each stolon weight, total stolon weight, stolon length and corm length expressed high heritability with moderate to high genetic advance signaled heritable in nature. Key words: Genetic variability; Heritability; Colocasia esculenta; Genetic advance DOI: http://dx.doi.org/10.3329/bjb.v40i2.9775 Bangladesh J. Bot. 40(2): 185-188, 2011 (December)
APA, Harvard, Vancouver, ISO, and other styles
46

Mehmet, Michael, Kane Callaghan, and Clifford Lewis. "Lots of bots or maybe nots: A process for detecting bots in social media research." International Journal of Market Research 63, no. 5 (June 28, 2021): 552–59. http://dx.doi.org/10.1177/14707853211027486.

Full text
Abstract:
The use of bot messaging, that being artificially created messages, has increased since 2010. While not all bots are bad, many have been used to share extreme and divisive views on a range of topics, from policy discussion to brand electronic word of mouth. The issue with bot messaging and its prevalence is that it can affect researchers’ understanding of a topic. For example, if 25% of a dataset is fabricated, decision-making may result in a loss of profit or poor policy formation. To counteract the use of bots, this research note offers a framework to alleviate the potentially destructive nature of bot data and ensure the cleaning of data is thorough and beneficial to decision-making based on social media commentary. The framework is a four-step process, which includes thematic, automated, and characteristic identification stages. We provide three case studies to demonstrate the approach and conclude by providing key practical implications.
APA, Harvard, Vancouver, ISO, and other styles
47

ARGALL, J. F., and K. A. STEWART. "THE EFFECT OF YEAR, PLANTING DATE, MULCHES AND TUNNELS ON THE PRODUCTIVITY OF FIELD CUCUMBERS IN SOUTHERN QUEBEC." Canadian Journal of Plant Science 70, no. 4 (October 1, 1990): 1207–13. http://dx.doi.org/10.4141/cjps90-149.

Full text
Abstract:
In 1986 and 1987, five mulch/tunnel treatments (bare soil (BS), black mulch (BM), transparent mulch (TM), black mulch/perforated transparent tunnel (BMT), and transparent mulch/perforated transparent tunnel (TMT)) were factorially combined with three planting dates representing very early (10 May), early (21 May) and normal (3 June) dates for Southern Québec. Following a late frost after the first two planting dates of 1986, all treatment combinations resulted in significant improvements in survival rates over BS plants. Only the TMT treatment proved justifiable for the earliest planting date across both years, though there were no significant differences between TMT and BMT treatments under milder growing conditions. Tunnel treatments proved superior to their mulch-only counterparts for earlier plantings and/or the cooler season (1986). TM resulted in superior yields over BM for all planting dates in 1986, and for no planting dates in the warmer season. TM generally resulted in yields superior to that of BS. BM treatments rarely improved early yields over BS, though total yields were improved in 1986.Key words: Cucumber, planting date, mulch, tunnels
APA, Harvard, Vancouver, ISO, and other styles
48

Zhang, Cheng, Qing Shan Gao, Lu Yun Jiao, Laura Bogen, Nicole Forte, and Elizabeth Nestler. "Hollow Graphitic Carbon Nanospheres Synthesized by Rapid Pyrolytic Carbonization." Journal of Nano Research 68 (June 29, 2021): 1–16. http://dx.doi.org/10.4028/www.scientific.net/jnanor.68.1.

Full text
Abstract:
Hollow graphitic porous carbon nanosphere (CNS) materials are synthesized from polymerization of resorcinol (R) and formaldehyde (F) in the presence of templating iron polymeric complex (IPC), followed by carbonization treatment. The effect of rapid heating in the carbonization process is investigated for the formation of hollow graphitic carbon nanospheres. The resulting CNS from rapid heating was characterized for its structure and properties by transmission electron microscope (TEM), x-ray diffraction (XRD), Raman spectroscopy, bulk conductivity measurement and Brunauer-Emmett-Teller (BET) surface area. Hollow graphitic CNS with reduced degree of agglomeration is observed under rapid heating during the carbonization process when compared to the CNS synthesized using the standard slow heating approach. Key words: carbon nanosphere (CNS), rapid pyrolytic carbonization, agglomeration
APA, Harvard, Vancouver, ISO, and other styles
49

Coombs, Timothy. "Origin stories in CSR: genesis of CSR at British American Tobacco." Corporate Communications: An International Journal 22, no. 2 (April 3, 2017): 178–91. http://dx.doi.org/10.1108/ccij-01-2016-0007.

Full text
Abstract:
Purpose Graphic novels have a concept known as the origin story. The origin story is background information on how a hero or villain came into being. The purpose of this paper is to explore the origin story of corporate social responsibility at British American Tobacco (BAT). The CSR origin story is unpacked by examining corporate documents from BAT that discuss the initial development of the company’s CSR program. The BAT documents are part of the Legacy Tobacco Documents Library (LTDL), a searchable, digital archive developed and managed by the University of California, San Francisco. It contains 85,569,326 pages in 14,360,422 documents. The library was created as part of the tobacco company settlement of a major law suit in the USA. Design/methodology/approach For this case study, the authors searched the archive for documents from BAT that had the key words “corporate social responsibility.” The documents were then analyzed using qualitative content analysis to identify key themes related to BAT’s created of its CSR programs. Findings The two dominant themes were business case BAT made for CSR and the environmental factors that shaped CSR. The business case had sub-themes of the new operating environment and reinforcing employees. The environmental sub-themes were the importance of NGOS and the top issues to be addressed in CSR efforts. The themes helped to explain why BAT was engaging in CSR, the factors shaping the start of its CSR programs, and the issues it intended to address through CSR. Research limitations/implications The analysis is limited to one organization and does not include interviews to go with the archived documents. Practical implications The paper considers the implications of the analysis for theory and practice for internal CSR communication. Originality/value The documents provide a rare glimpse inside a corporate decision to begin a CSR program and how the managers “talked” about CSR. Instead of examining external CSR communication, it examines the early days of internal CSR communication at a specific firm. The yields of the document analysis provide insights into how BAT conceptualized CSR and communicated the rationale for creating a CSR program internally. Research has relied primarily upon speculation of corporate motives or corporate public discourse designed to frame their CSR efforts. The internal documents provide an unfiltered examination of the motives for a CSR program. This allows us to better understand why a CSR program was created including the motives, targets, and desired outcomes.
APA, Harvard, Vancouver, ISO, and other styles
50

CARTER, M. R., J. R. PEAREN, R. R. CAIRNS, D. W. McANDREW, and P. G. KARKANIS. "IMPROVEMENT OF SOIL PROPERTIES AND PLANT GROWTH ON A BROWN SOLONETZIC SOIL USING IRRIGATION, CALCIUM AMENDMENTS AND NITROGEN." Canadian Journal of Soil Science 66, no. 4 (November 1, 1986): 581–89. http://dx.doi.org/10.4141/cjss86-058.

Full text
Abstract:
A 4-yr study was conducted on an irrigated Brown Solonetzic soil in southern Alberta to determine the effects of relatively low rates (4.2 Mg Ca ha−1) of surface-applied gypsum (CaSO4·2H2O) and lime (CaCO3) on soil chemical properties, water penetration and growth of bromegrass (Bromus inermis Leyss). Annual applications (155 kg N ha−1) of ammonium nitrate (NH4NO3) and ammonium bisulphite (NH4HSO3) were applied alone and in combination with the Ca amendments. Gypsum improved the chemical condition of the Bnt horizon by decreasing soluble Na and the electrical conductivity, and increasing levels of exchangeable Ca. The exchangeable Ca to Na ratio was increased from 5.5 to 16.9, while the sodium adsorption ratio was reduced from 18.1 to 7.6. Gypsum also decreased the EC of the Csk horizon from 12.7 to 5.2 dS m−1. In contrast, the lime amendment only increased the exchangeable Ca level of the Bnt horizon. Ammonium bisulphite decreased the soil pH of the soil profile, especially the Ap horizon (7.3–6.3), and increased the initial rate of water penetration into the Bnt horizon. Gypsum increased by threefold the rate of water infiltration into the Bnt horizon compared with the control soil. Plant yields were increased over the control by ammonium bisulphite (46%), ammonium nitrate (66%), gypsum (77%) and gypsum plus ammonium nitrate (111%). The study indicates that a combination of irrigation with gypsum was capable of moving Ca into a relatively high sodic Bnt horizon, causing an improvement in both the soil condition and plant productivity. Key words: Solonetzic soil, irrigation, gypsum, lime, sodic soil, ammonium nitrate
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography