نتایج جستجو برای: exclusive orxor gate

تعداد نتایج: 70849  

Journal: :American journal of physiology. Cell physiology 2005
Craig Gatto Jeff B Helms Megan C Prasse Krista L Arnett Mark A Milanick

Current models of the Na(+)-K(+)-ATPase reaction cycle have ATP binding with low affinity to the K(+)-occluded form and accelerating K(+) deocclusion, presumably by opening the inside gate. Implicit in this situation is that ATP binds after closing the extracellular gate and thus predicts that ATP binding and extracellular cation binding to be mutually exclusive. We tested this hypothesis. Acco...

Journal: :Science 1993
R MacKinnon R W Aldrich A W Lee

Shaker potassium channels from Drosophila are composed of four identical subunits. The contribution of a single subunit to the inactivation gating transition was investigated. Channels carrying a specific mutation in a single subunit can be labeled in a heterogeneous population and studied quantitatively with scorpion toxin sensitivity as a selection tag. Linkage within a single subunit of a mu...

2011
Faisal K. Chowdhury Karumbaiah N. Chappanda Daniel Saab Massood Tabib-Azar

We discuss novel functional MEMS/NEMS structures that enable implementation of universal logic gates such as XOR, AND, NAND, NOT, etc. in a single device instead of using 6-14 individual switches used in CMOS. By reducing the number of devices, our approach improves yield, reproducibility and speed and simplifies implementation of circuits such as adders and multiplexers. We show the feasibilit...

1994
David J. Wheeler Roger M. Needham

We give a short routine which is based on a Feistel iteration and uses a large number of rounds to get security with simplicity. Introduction We design a short program which will run on most machines and encypher safely. It uses a large number of iterations rather than a complicated program. It is hoped that it can easily be translated into most languages in a compatible way. The rst program is...

1997
Gueesang Lee

| In this paper, an e cient approach to the synthesis of CA(Cellular Architecture)-type FPGAs is presented. To exploit the array structure of cells in CA-type FPGAs, logic expressions called Maitra terms, which can be mapped directly to the cell arrays are generated. In this approach, a BDD is modi ed so that each node of the BDD has another branch which is an exclusive-OR of the two branches o...

1998
Cees H.M. van Kemenade

The NK-xor landscapes are a class of optimization problems with adjustable ruggedness of its fitness landscape. The optimal value for each of the loci is dependent upon a k-neighbourhood of this locus. A set of these landscapes is analyzed and the evolution of certain generic algorithms when applied to these fitness-landscapes is approximated by means of a transmision-function model. 1991 Mathe...

Journal: :Neurocomputing 2002
Paulo J. G. Lisboa Terence A. Etchells Dave C. Pountney

AbstractFitting the continuous valid logic of the exclusive OR (XOR) problem requires more than a minimal neural network configuration. This letter shows that the simplest logic to fit the XOR problem involves boundaries that cannot be mapped by a Multi-Layer Perceptron (MLP) with just two hidden nodes. This observation calls into question rule extraction methodologies based on pruning, since t...

Journal: :Symmetry 2015
Min-Soo Jung

Recently, due to the introduction of NFC (Near Field Communication), it has become possible to make easy electronic payments. Therefore, a secure communication method is necessary in these environments. NFC can be said to be relatively safe compared to other communication methods, because it carries out communications within 10 cm. However, it has made possible the risk of impersonation attacks...

2016
Liqun Chen Thalia M. Laing Keith M. Martin

We propose a new, lightweight (t, n)−threshold secret sharing scheme that can be implemented using only XOR operations. Our scheme is based on an idea extracted from a patent application by Hewlett Packard that utilises error correction codes. Our scheme improves on the patent by requiring fewer randomly generated bits and by reducing the size of shares given to each player, thereby making the ...

Journal: :IACR Cryptology ePrint Archive 2013
Ahmed Mahmoud Ulrich Rührmair Mehrdad Majzoobi Farinaz Koushanfar

Physical Unclonable Functions (PUFs) have established themselves in the scientific literature, and are also gaining ground in commercial applications. Recently, however, several attacks on PUF core properties have been reported. They concern their physical and digital unclonability, as well as their assumed resilience against invasive or side channel attacks. In this paper, we join some of thes...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید