Showing 13,641 - 13,660 results of 16,001 for search '"bit"', query time: 0.13s Refine Results
  1. 13641

    Endemik Ranunculus poluninii ve Ranunculus crateris (Ranunculaceae) Populasyonları Üzerinde Taksonomik ve Ekolojik Araştırmalar by Hasan ÖZÇELİK

    Published 2016-05-01
    “…R. poluninii is only distributed in Bitlis and Van, whereas R. crateris is grown only in Bitlis vilayet. …”
    Get full text
    Article
  2. 13642

    Distributed multi-agent consensus under constraints by Qiu, Zhirong

    Published 2017
    “…In a multi-agent network, any communication channel has limited capacity and only finite bits of error-free information can be transmitted per unit time. …”
    Get full text
    Thesis
  3. 13643

    Anti-forensic steganography method based on randomization by Khalaf, Emad Taha, Norrozila, Sulaiman, Mohammed, Muamer N.

    Published 2013
    “…However, these random numbers will be the index to hiding the encrypted data bits randomly in the least significant bits of pixel channels. …”
    Get full text
    Article
  4. 13644

    A capacitor mismatch calibration scheme for SAR ADC based on genetic algorithm by Yujia Huang, Qiao Meng, Fei Li, Xinyan Song, Jie Wu

    Published 2023-03-01
    “…After calibration, ENOB increases from 10.19 bits to 11.46 bits, INL changes from +2.22/−2.12 LSB to +0.81/−0.80 LSB, and DNL changes from +1.79/−1.00 LSB to +0.99/−1.00LSB. …”
    Get full text
    Article
  5. 13645

    Spatial Modulation and MP-WFRFT-Aided Multi-Beam Wireless Communication Scheme Based On Random Frequency Diverse Array by Jianbang Gao, Bin Qiu, Jing Zhou

    Published 2020-09-01
    “…Furthermore, with the aid of spatial modulation (SM) technology and cooperative legitimate users (LUs), we can transmit more information bits by the use of LU number informations than the single modulation symbols. …”
    Get full text
    Article
  6. 13646

    Increasing the Protocol Gain of Quantum Cryptography by Firas Ali Sabir Al-Juboori, Noor Kareem Juma, a Al-Mandilawi

    Published 2013-09-01
    “…Quantum cryptography is a technique to distribute a sequence of truly random and unconditionally secure bits over a secure communication by applying the phenomena of quantum physics. …”
    Get full text
    Article
  7. 13647

    LOW COST APPROXIMATE ADDER SUBTRACTOR FOR FIR FILTER by W.A. Mahmou, Dhafer R. Zagha, Mohannad K. Sabir

    Published 2003-09-01
    “…This method reduces the accuracy of FIR filter, in other words it adds small noise to the output of the filter, but the level of this noise is inversely proportional with the number of bits in data bus of FIR filter. Therefore this method will be used with midum noise output filters or with wide data bus (12-bits or more) FIR filter. …”
    Get full text
    Article
  8. 13648

    Cryptographic Algorithms with Data Shorter than the Encryption Key, Based on LZW and Huffman Coding by Tomasz Krokosz, Jarogniew Rykowski, Małgorzata Zajęcka, Robert Brzoza-Woch, Leszek Rutkowski

    Published 2023-08-01
    “…In such cases, the data payload can be as short as a few bits of data while the typical length of the key is several hundred bits or more. …”
    Get full text
    Article
  9. 13649

    Realization of coprocessor which supports counting of discrete logarithm on elliptic curves with partial knowledge by Michał Kędzierski, Michał Misztal, Michał Wroński

    Published 2017-12-01
    “…We showed the simplified case in which we know l most significant bits of key k and we used one-dimensional Gaudry–Schost method. …”
    Get full text
    Article
  10. 13650

    Nanoconnectomic upper bound on the variability of synaptic plasticity by Thomas M Bartol Jr, Cailey Bromer, Justin Kinney, Michael A Chirillo, Jennifer N Bourne, Kristen M Harris, Terrence J Sejnowski

    Published 2015-11-01
    “…Information in a computer is quantified by the number of bits that can be stored and recovered. An important question about the brain is how much information can be stored at a synapse through synaptic plasticity, which depends on the history of probabilistic synaptic activity. …”
    Get full text
    Article
  11. 13651

    Boosting image watermarking authenticity spreading secrecy from counting‐based secret‐sharing by Adnan Gutub

    Published 2023-06-01
    “…The anticipated watermarking technique guaranteed to scatter the share bits implanting at different least significant bits of image pixels as boosting up the trust overall authentication practicality. …”
    Get full text
    Article
  12. 13652

    Nanoconnectomic upper bound on the variability of synaptic plasticity by Bromer, Cailey, Kinney, Justin, Bartol, Thomas M., Chirillo, Michael A., Bourne, Jennifer N., Harris, Kristen M., Sejnowski, Terrence J.

    Published 2016
    “…Information in a computer is quantified by the number of bits that can be stored and recovered. An important question about the brain is how much information can be stored at a synapse through synaptic plasticity, which depends on the history of probabilistic synaptic activity. …”
    Get full text
    Article
  13. 13653

    Optimal Classical Simulation of State-Independent Quantum Contextuality by Cabello, Adán, Gu, Mile, Gühne, Otfried, Xu, Zhen-Peng

    Published 2018
    “…In particular, we show that, while classically simulating two qubits tested with the Peres-Mermin set requires log2 24 ≈ 4.585 bits, simulating a single qutrit tested with the Yu-Oh set requires, at least, 5.740 bits.…”
    Get full text
    Get full text
    Journal Article
  14. 13654

    Enhancement of Alex encryption algorithm for use in secure email system by Quek, Swee Thiam.

    Published 2008
    “…The aims of this project were to identify the security and usage problems of secure email systems, the study of the Alex Encryption Algorithm designed by Alexandra Enrst, and the application of bits padding, error correction coding and data compression to further improve the security of this algorithm.…”
    Get full text
    Thesis
  15. 13655
  16. 13656
  17. 13657
  18. 13658
  19. 13659
  20. 13660