-
13641
Endemik Ranunculus poluninii ve Ranunculus crateris (Ranunculaceae) Populasyonları Üzerinde Taksonomik ve Ekolojik Araştırmalar
Published 2016-05-01“…R. poluninii is only distributed in Bitlis and Van, whereas R. crateris is grown only in Bitlis vilayet. …”
Get full text
Article -
13642
Distributed multi-agent consensus under constraints
Published 2017“…In a multi-agent network, any communication channel has limited capacity and only finite bits of error-free information can be transmitted per unit time. …”
Get full text
Thesis -
13643
Anti-forensic steganography method based on randomization
Published 2013“…However, these random numbers will be the index to hiding the encrypted data bits randomly in the least significant bits of pixel channels. …”
Get full text
Article -
13644
A capacitor mismatch calibration scheme for SAR ADC based on genetic algorithm
Published 2023-03-01“…After calibration, ENOB increases from 10.19 bits to 11.46 bits, INL changes from +2.22/−2.12 LSB to +0.81/−0.80 LSB, and DNL changes from +1.79/−1.00 LSB to +0.99/−1.00LSB. …”
Get full text
Article -
13645
Spatial Modulation and MP-WFRFT-Aided Multi-Beam Wireless Communication Scheme Based On Random Frequency Diverse Array
Published 2020-09-01“…Furthermore, with the aid of spatial modulation (SM) technology and cooperative legitimate users (LUs), we can transmit more information bits by the use of LU number informations than the single modulation symbols. …”
Get full text
Article -
13646
Increasing the Protocol Gain of Quantum Cryptography
Published 2013-09-01“…Quantum cryptography is a technique to distribute a sequence of truly random and unconditionally secure bits over a secure communication by applying the phenomena of quantum physics. …”
Get full text
Article -
13647
LOW COST APPROXIMATE ADDER SUBTRACTOR FOR FIR FILTER
Published 2003-09-01“…This method reduces the accuracy of FIR filter, in other words it adds small noise to the output of the filter, but the level of this noise is inversely proportional with the number of bits in data bus of FIR filter. Therefore this method will be used with midum noise output filters or with wide data bus (12-bits or more) FIR filter. …”
Get full text
Article -
13648
Cryptographic Algorithms with Data Shorter than the Encryption Key, Based on LZW and Huffman Coding
Published 2023-08-01“…In such cases, the data payload can be as short as a few bits of data while the typical length of the key is several hundred bits or more. …”
Get full text
Article -
13649
Realization of coprocessor which supports counting of discrete logarithm on elliptic curves with partial knowledge
Published 2017-12-01“…We showed the simplified case in which we know l most significant bits of key k and we used one-dimensional Gaudry–Schost method. …”
Get full text
Article -
13650
Nanoconnectomic upper bound on the variability of synaptic plasticity
Published 2015-11-01“…Information in a computer is quantified by the number of bits that can be stored and recovered. An important question about the brain is how much information can be stored at a synapse through synaptic plasticity, which depends on the history of probabilistic synaptic activity. …”
Get full text
Article -
13651
Boosting image watermarking authenticity spreading secrecy from counting‐based secret‐sharing
Published 2023-06-01“…The anticipated watermarking technique guaranteed to scatter the share bits implanting at different least significant bits of image pixels as boosting up the trust overall authentication practicality. …”
Get full text
Article -
13652
Nanoconnectomic upper bound on the variability of synaptic plasticity
Published 2016“…Information in a computer is quantified by the number of bits that can be stored and recovered. An important question about the brain is how much information can be stored at a synapse through synaptic plasticity, which depends on the history of probabilistic synaptic activity. …”
Get full text
Article -
13653
Optimal Classical Simulation of State-Independent Quantum Contextuality
Published 2018“…In particular, we show that, while classically simulating two qubits tested with the Peres-Mermin set requires log2 24 ≈ 4.585 bits, simulating a single qutrit tested with the Yu-Oh set requires, at least, 5.740 bits.…”
Get full text
Get full text
Journal Article -
13654
Enhancement of Alex encryption algorithm for use in secure email system
Published 2008“…The aims of this project were to identify the security and usage problems of secure email systems, the study of the Alex Encryption Algorithm designed by Alexandra Enrst, and the application of bits padding, error correction coding and data compression to further improve the security of this algorithm.…”
Get full text
Thesis -
13655
Evanescent wave in multiple slit diffraction and n-array antennas in metamaterial using Cesàro convergence
Published 2023-06-01Get full text
Article -
13656
4-Klorometil-6-etoksikumarin bileşiğinin deneysel ve kuantum kimyasal hesaplamaları
Published 2017-10-01Get full text
Article -
13657
-
13658
-
13659
Intraosseous Mucoepidermoid Carcinoma of the Jaw: Report of Three Cases
Published 2018-03-01Get full text
Article -
13660