Zobrazeno 1 - 10
of 366
pro vyhledávání: '"residue number system (RNS)"'
Autor:
Piotr Patronik, Stanisław J. Piestrak
Publikováno v:
EURASIP Journal on Advances in Signal Processing, Vol 2023, Iss 1, Pp 1-28 (2023)
Abstract This paper presents a new design method of the reverse (residue-to-binary) converter for the flexible 3-moduli residue number system (RNS) set $$\{ 2^k, 2^n-1, 2^n+1 \}$$ { 2 k , 2 n - 1 , 2 n + 1 } , where k and n are a pair of arbitrary in
Externí odkaz:
https://doaj.org/article/1fb945dbacb0438aa9e9c960d0fcbfa3
Autor:
Gian Carlo Cardarilli, Luca Di Nunzio, Rocco Fazzolari, Daniele Giardino, Marco Re, Alberto Nannarelli, Sergio Spano
Publikováno v:
IEEE Access, Vol 11, Pp 98586-98595 (2023)
In digital systems, the Residue Number System (RNS) represents an interesting alternative to the traditional two’s complement representation. Its performance and low-power properties have attracted significant research interest over the years. In t
Externí odkaz:
https://doaj.org/article/a9f881b779a547f89c263bb080f9d9d8
Autor:
Ruisi Wu, Wen-Kang Jia
Publikováno v:
IEEE Access, Vol 11, Pp 20952-20962 (2023)
Due to the variable length and uniqueness of names in NDN, traditional IP address-based routing and forwarding architecture is no longer suitable for NDN networks. It is still a challenge to design a high-performance forwarding engine to solve the pr
Externí odkaz:
https://doaj.org/article/0b297a6f939d474f89be29042fb31dae
Publikováno v:
Dyna, Vol 90, Iss 226 (2023)
In low-power hardware implementations for classification algorithms, it is often essential to use physical resources efficiently. In this sense, the use of modulo-M integer operations instead of floating-point arithmetic, can lead to better performan
Externí odkaz:
https://doaj.org/article/39686b0a34824a3598630323bc27af05
Publikováno v:
Revista Română de Informatică și Automatică, Vol 31, Iss 4, Pp 97-108 (2021)
Full video Encryption has been established as the most suitable technique to guarantee the security of digital video data during transmission but cannot be widely adopted because of its large disk space and long processing time. Therefore, this paper
Externí odkaz:
https://doaj.org/article/fb0d69a5b29a4a3390521faa17855f6e
Autor:
Kiernan George, Alan J. Michaels
Publikováno v:
IoT, Vol 2, Iss 4, Pp 669-687 (2021)
This paper focuses on a block cipher adaptation of the Galois Extension Fields (GEF) combination technique for PRNGs and targets application in the Internet of Things (IoT) space, an area where the combination technique was concluded as a quality str
Externí odkaz:
https://doaj.org/article/3eacaae032f9456f931711c68bd69f74
Publikováno v:
IoT, Vol 2, Iss 3, Pp 375-400 (2021)
This paper explores the security of a single-stage residue number system (RNS) pseudorandom number generator (PRNG), which has previously been shown to provide extremely high-quality outputs when evaluated through available RNG statistical test suite
Externí odkaz:
https://doaj.org/article/2c0bb0efbc3d4357a6b17e1e003b4c47
Publikováno v:
IEEE Access, Vol 9, Pp 121154-121166 (2021)
Multimedia data security has become a noticeable problem in the continuous development of multimedia technology. Traditional chaotic systems usually require larger bit-width iterative calculations to affect the generation rate of chaotic systems when
Externí odkaz:
https://doaj.org/article/68744d19b8434e4293fe73067d29cf0c
Publikováno v:
ETRI Journal, Vol 42, Iss 4, Pp 596-607 (2020)
Scaling is an important operation because of the iterative nature of arithmetic processes in digital signal processors (DSPs). In residue number system (RNS)–based DSPs, scaling represents a performance bottleneck based on the complexity of inter
Externí odkaz:
https://doaj.org/article/8cf3a7ab96164943bf549a5b75c0a072
Autor:
Paulo Martins, Leonel Sousa
Publikováno v:
IEEE Access, Vol 8, Pp 59533-59549 (2020)
Number representation systems establish ways in which numbers are mapped to computer architectures, and how operations over the numbers are translated into computer instructions. The efficiency of public-key cryptography is strongly affected by the u
Externí odkaz:
https://doaj.org/article/2301cedb8610424a98175e74422ceba2