Wagner, Goldberg and Briceno have recently published an attack [2] on what they believe to be Comp128, the GSM A3A8 authentication hash function [1]. Provided that the attacker has...
- The model of a simple perceptron using phase-encoded inputs and complex-valued weights is presented. Multilayer two-input and three-input complex-valued neurons (CVNs) are implem...
Howard E. Michel, David Rancour, Sushanth Iringent...
The Gene Ontology captures information at a very small scale, namely: molecular function, biological process, and cellular components. At this level, the Gene Ontology project shou...
We introduce an active imaging method to measure scene illumination. The system implementation is divided into four steps. First, the system acquires two images: one is an ordinar...
Currently, fuzzy controllers are the most popular choice for hardware implementation of complex control surfaces because they are easy to design. Neural controllers are more compl...