Showing 14,161 - 14,180 results of 16,001 for search '"bit"', query time: 0.12s Refine Results
  1. 14161

    Artificial-noise-aided coordinated secure transmission design in multi-cell multi-antenna networks with limited feedback by Tang, Zhiyao, Sun, Liang, Tian, Xinyu, Niyato, Dusit, Zhang, Yang

    Published 2022
    “…Finally, numerical results are also provided to validate our theoretical results and the proposed feedback bits and power allocation methods.…”
    Get full text
    Journal Article
  2. 14162

    Fragile Image Watermarking For Medical Images by Jasni, Mohamad Zain, Nor Amizam, Jusoh

    Published 2006
    “…The purpose is to verify the integrity and authenticity of medical images. We used 800x600x8 bits ultrasound (US)greyscale images in our experiment. …”
    Get full text
    Conference or Workshop Item
  3. 14163
  4. 14164

    Intensity modulation and direct detection quantum key distribution based on quantum noise by Takuya Ikuta, Kyo Inoue

    Published 2016-01-01
    “…Two slightly intensity-modulated pulses are sent from a transmitter, and a receiver determines key bits from the directly detected intensity. We analyzed the system performance for two typical eavesdropping methods, a beam splitting attack and an intercept-resend attack, with an assumption that the transmitting and receiving devices are fully trusted. …”
    Get full text
    Article
  5. 14165

    An Improvement of Serpent Algorithm by Saleh Al - Karaawy, Ashwaq Hashim

    Published 2005-06-01
    “…The block size is 256 bits , and the key can be any length up to 256 bytes . …”
    Get full text
    Article
  6. 14166

    Data Literacy in The Smart City by Jane Kunze

    Published 2021-01-01
    “…Aarhus Bibliotek har arbejdet med børn om at indsamle og analysere data om lyden fra Aarhus ved hjælp af micro:bits. Målet er at træne de studerendes datakendskab og samtidig få dem til at bidrage til en større 'datafortælling' om byen. …”
    Get full text
    Article
  7. 14167

    Text Files Compression using Combination of two Dictionary methods (Specific dictionary for specific language and LZ77 Approach)

    Published 2011-12-01
    “…A words not exists in the dictionary is written without changing preceded by four bits for length of this word. A modification was made on this approach for reducing the file to minimum size. …”
    Get full text
    Article
  8. 14168

    Coherent one-way quantum conference key agreement based on twin field by Xiao-Yu Cao, Jie Gu, Yu-Shuo Lu, Hua-Lei Yin, Zeng-Bing Chen

    Published 2021-01-01
    “…Exploiting coherent states with intensity 0 and μ to encode logic bits, our protocol can break the limit. Additionally, the requirements of phase randomization and multiple intensity modulation are removed in our protocol, making its experimental demonstration simple.…”
    Get full text
    Article
  9. 14169

    Message Concealment and Encryption Technique in Digital Image with Combination of LSB and RSA Methods by Antonius Erick Handoyo, De Rosal Ignatius Moses Setiadi, Eko Hari Rachmawanto, Christy Atika Sari, Ajib Susanto

    Published 2018-02-01
    “…So in this study, it is proposed to convert pixel image value to 16 bits so that the key used can be more varied. Experimental results proved that there was a steady increase in security and imperceptibility. …”
    Get full text
    Article
  10. 14170

    Storing the portrait of Antoine de Lavoisier in a single macromolecule by Laurent, Eline, Amalian, Jean-Arthur, Schutz, Thibault, Launay, Kevin, Clément, Jean-Louis, Gigmes, Didier, Burel, Alexandre, Carapito, Christine, Charles, Laurence, Delsuc, Marc-André, Lutz, Jean-François

    Published 2021-03-01
    “…The storage capacity attained in this work (440 bits/chain) is the highest ever reported for a synthetic informational polymer. …”
    Get full text
    Article
  11. 14171

    StructCode: Leveraging Fabrication Artifacts to Store Data in Laser-Cut Objects by Dogan, Mustafa Doga, Chan, Vivian Hsinyueh, Qi, Richard, Tang, Grace, Roumen, Thijs, Mueller, Stefanie

    Published 2023
    “…StructCode modifies the lengths of laser-cut finger joints and/or living hinges to represent bits of information without introducing additional parts or materials. …”
    Get full text
    Article
  12. 14172

    Scalar quantization with random thresholds by Goyal, Vivek K.

    Published 2012
    “…The distortion is at most six times that of an optimal (deterministically-designed) quantizer, and for a large number of levels the output entropy is reduced by approximately (1-γ)/(ln 2) bits, where γ is the Euler-Mascheroni constant. This shows that the high-rate asymptotic distortion of these quantizers in an entropy-constrained context is worse than the optimal quantizer by at most a factor of 6e[superscript -2(1-γ)] ≈ 2.58.…”
    Get full text
    Article
  13. 14173

    NICAM decoder to PC data link by Jolyon Peter Caplin

    Published 2008
    “…The unit retrieves information carried upon normally unused data bits within NICAM encoded sound transmissions.…”
    Get full text
    Thesis
  14. 14174

    Quantum Gravity Constraints on Inflation by Conlon, J

    Published 2012
    “…We give two prescriptions for determining the inflationary entropy, based on either `bits per unit area' or entanglement entropy. The existence of transPlanckian flat directions, necessary for large tensor modes in the CMB, correlates with an inflationary entropy greater than that allowed by de Sitter space. …”
    Journal article
  15. 14175

    Simple quantum error-correcting codes. by Steane, A

    Published 1996
    “…The recipe C1/2⊆C1), where C1 and C2 are classical codes, is used to obtain codes for up to 16 information quantum bits (qubits) with correction of small numbers of errors. …”
    Journal article
  16. 14176

    The machining characteristics of oil palm empty-fruit bunches particleboard and its suitability for furniture by Ratnasingam, Jegatheswaran, Mcnulty, T., Manikam, M.

    Published 2008
    “…A series of machining experiments were carried out using a CNC router, with single fluted router-bits, to evaluate the machining and tool wearing properties of the particleboard made from oil palm empty-fruit bunches. …”
    Get full text
    Article
  17. 14177
  18. 14178

    Alarm triggered multiple display thermometer using MC68HC11 by Ahmad Firdaus, Makhtar

    Published 2008
    “…It consist the module of the temperature sensor, LCD, control switch, buzzer which integrated with 8-bits microcontroller MC68HC11. The temperature sensor will measure the temperature in range from 0°C to 100°C and the buzzer will triggered if temperature is equal or higher than set temperature. …”
    Get full text
    Undergraduates Project Papers
  19. 14179

    A Taxonomy of Blockchain Consensus Methods by Jeff Nijsse, Alan Litchfield

    Published 2020-11-01
    “…The study provides a survey of 19 methods classified by the scarce resource they employ: clock-cycles, bits, tokens, votes, time, and biometrics. Blockchain implementations are split between consensus algorithms requiring proof of resource and those that use majority voting to update the ledger.…”
    Get full text
    Article
  20. 14180

    Chemical, microbial and sensory properties of a chestnut and milk ice cream with improved healthy characteristics by Luis A. Espinoza, Laura Purriños, Juan A. Centeno, Javier Carballo

    Published 2020-01-01
    “…With the aim of revalorization of two productions of economic relevance (milk and chestnuts), a novel ice cream was formulated incorporating milk, chestnut flour and chestnut bits. Using the best sensory valued formula as a basis, eight ice cream formulations were elaborated replacing the ingredients normally used (milk fat, sucrose and carboxymethylcellulose) by healthier ones (olive oil, erythritol + steviol glycosides, and tara (Caesalpinia spinosa) gum, respectively). …”
    Get full text
    Article