Category: 7. Maths

Continue Reading

  • Enhanced image hash using cellular automata with sponge construction and elliptic curve cryptography for secure image transaction

    Enhanced image hash using cellular automata with sponge construction and elliptic curve cryptography for secure image transaction

    In this section, we discuss the detailed methodologies used in the proposed hash algorithm, which is based on the combination of the CA and Sponge Functions. We divide the methodology into subsections, each covering a crucial aspect of algorithm…

    Continue Reading

  • Using ChatGPT, students might pass a course, but with a cost

    Using ChatGPT, students might pass a course, but with a cost

    With the assumption that students are going to use artificial intelligence and large language models such as ChatGPT to do their homework, researchers in the Department of Aerospace Engineering in The Grainger College of Engineering, University…

    Continue Reading

  • Vocal performance evaluation of the intelligent note recognition method based on deep learning

    Vocal performance evaluation of the intelligent note recognition method based on deep learning

    Datasets collection

    The data used for note recognition in this study came from the Camera-Processed Instrumental Music Scores (Camera-PrIMuS) dataset. This dataset contains images of the musical spectrum of an instrument processed by a camera and…

    Continue Reading

  • Self-checking principle and design of ternary Berger code

    Self-checking principle and design of ternary Berger code

    Modified signed-digit representation

    Modified Signed-Digit (MSD) redundancy representation was first proposed by Avizienis etc. in 196129. In 1986 MSD was applied to optical computing by Drake etc.30. Now MSD representation is widely used in…

    Continue Reading