نتایج جستجو برای: گیت xor

تعداد نتایج: 3115  

2017
P. Mano

In digital communication, convolutional codes are important to control the errors between the transmitter and receiver. Convolutional code is a type of error correction code (ECC) which can perform both error detection and correction operation between transmitter and receiver side. Here information bits are transformed serially through the architecture which is one of the major advantages as co...

Journal: :Hypertension 2013
Suborno M Ghosh Vikas Kapil Isabel Fuentes-Calvo Kristen J Bubb Vanessa Pearl Alexandra B Milsom Rayomand Khambata Sheiva Maleki-Toyserkani Mubeen Yousuf Nigel Benjamin Andrew J Webb Mark J Caulfield Adrian J Hobbs Amrita Ahluwalia

Elevation of circulating nitrite (NO2(-)) levels causes vasodilatation and lowers blood pressure in healthy volunteers. Whether these effects and the underpinning mechanisms persist in hypertension is unknown. Therefore, we investigated the consequences of systemic nitrite elevation in spontaneously hypertensive rats and conducted proof-of-principle studies in patients. Nitrite caused dose-depe...

2003
V. Shmatikov

We present decidability results for the verification ofcryptographic protocols in the presence of equational the-ories corresponding to xor and Abelian groups. Since theperfect cryptography assumption is unrealistic for crypto-graphic primitives with visible algebraic properties such asxor, we extend the conventional Dolev-Yao model by per-mitting the intruder to exploit...

2012
Qiuying Chen Hyeong-Cheon Park Michael S. Goligorsky Praveen Chander Steven M. Fischer Steven S. Gross

A major challenge in systems biology is integration of molecular findings for individual enzyme activities into a cohesive high-level understanding of cellular metabolism and physiology/pathophysiology. However, meaningful prediction for how a perturbed enzyme activity will globally impact metabolism in a cell, tissue or intact organisms is precluded by multiple unknowns, including in vivo enzy...

Journal: :Cardiovascular research 2003
Harald Kögler Heather Fraser Sylvia McCune Ruth Altschuld Eduardo Marbán

OBJECTIVE Xanthine oxidase (XO) inhibitors enhance myofilament Ca(2+) responsiveness of normal rat myocardium. We examined whether this inotropic action is preserved or magnified in failing rat myocardium and whether the magnitude of this effect correlates with tissue xanthine-oxidoreductase (XOR) activity. METHODS Hearts of 18-20 month-old SHHF (spontaneous hypertensive/heart failure) rats w...

Journal: :Saudi medical journal 2009
Nadjet Hanachi Noureddine Charef Abderrahmane Baghiani Seddik Khennouf Yacine Derradji Sabah Boumerfeg Daoud Harzallah Lekhmici Arrar

OBJECTIVE To search whether xanthine oxido-reductase (XOR) present in the synovium is also liberated, to determine its activity in synovial fluid and to establish a possible relationship between XOR levels in rheumatoid arthritis (RA) and non-RA patients. METHODS This study was carried out in the Laboratory of Immunology, University Ferhat Abbas, Setif, Algeria from 2001-2008. This study is a...

2013
Peter Gazi

Cascading-based constructions represent the predominant approach to the problem of keylength extension for block ciphers. Besides the plain cascade, existing works also consider its modification containing key-whitening steps between the invocations of the block cipher, called randomized cascade or XOR-cascade. We contribute to the understanding of the security of these two designs by giving th...

Journal: :IACR Transactions on Symmetric Cryptology 2017

Journal: :npj Quantum Information 2022

Abstract Quantum compilation is the task of translating a high-level description quantum algorithm into sequence low-level operations. We propose and motivate use Xor-And-Inverter Graphs (XAG) to specify Boolean functions for compilation. present three different XAG-based algorithms synthesize circuits in Clifford + T library, hence targeting fault-tolerant computing. The are designed minimize ...

2015
Georg T. Becker

In this paper we demonstrate the first real-world cloning attack on a commercial PUF-based RFID tag. The examined commercial PUFs can be attacked by measuring only 4 protocol executions, which takes less than 200 ms. Using a RFID smartcard emulator, it is then possible to impersonate, i.e., “clone” the PUF. While attacking the 4-way PUF used by these tags can be done using traditional machine l...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید