Showing 14,281 - 14,300 results of 16,001 for search '"bit"', query time: 0.12s Refine Results
  1. 14281

    Computationally efficient phase control algorithm for intelligent reflecting surface-aided multiuser systems by Gwang Hae Kim, Duk Kyung Kim

    Published 2023-12-01
    “…The proposed scheme is evaluated with continuous phase and discrete phases with 1, 2, and 3 bits and compared with the random phase and full-search cases.…”
    Get full text
    Article
  2. 14282

    Dual-Polarization Hermite-Gaussian-Based NFDM Transmission System by Muyiwa Balogun, Stanislav Derevyanko, Liam Barry

    Published 2023-01-01
    “…We report here, a record high spectral efficiency of 12 bits/s/Hz for dual-polarization HG-based DP-NFDM systems.…”
    Get full text
    Article
  3. 14283

    On Information Rates Over a Binary-Input Filtered Gaussian Channel by Michael Peleg, Tomer Michaeli, Shlomo Shamai

    Published 2021-01-01
    “…The gap between the known upper bound, which is based on spectral constrains of bipolar signals, and our new achievable lower bound is reduced to 0.93 bits per Nyquist interval at high SNR.…”
    Get full text
    Article
  4. 14284

    Differential Evolution under Fixed Point Arithmetic and FP16 Numbers by Luis Gerardo de la Fraga

    Published 2021-02-01
    “…In this work, the differential evolution algorithm behavior under a fixed point arithmetic is analyzed also using half-precision floating point (FP) numbers of 16 bits, and these last numbers are known as FP16. In this paper, it is considered that it is important to analyze differential evolution (DE) in these circumstances with the goal of reducing its consumption power, storage size of the variables, and improve its speed behavior. …”
    Get full text
    Article
  5. 14285

    Representing Measurement as a Thermodynamic Symmetry Breaking by Chris Fields, James F. Glazebrook

    Published 2020-05-01
    “…Allocating a subset of the received bits to system identification imposes two separability constraints and hence breaks two symmetries: first, between observational outcomes held constant and those allowed to vary; and, second, between observational outcomes regarded as “informative” and those relegated to purely thermodynamic functions of free-energy acquisition and waste heat dissipation. …”
    Get full text
    Article
  6. 14286

    Why Make the World Move? by Keith Evan Green

    Published 2017-12-01
    “… The next horizons of human-computer interaction promise a whirling world of digital bytes, physical bits, and their hybrids. Are human beings prepared to inhabit such cyber-physical, adaptive environments? …”
    Get full text
    Article
  7. 14287

    Distributed Joint Source-Channel Coding Using Quasi-Uniform Systematic Polar Codes by Liqiang Jin, Hongwen Yang

    Published 2018-10-01
    “…In the proposed scheme, each distributed source encodes source message with a quasi-uniform systematic polar code (QSPC) or a punctured QSPC, and only transmits parity bits over its independent channel. These systematic codes play the role of both source compression and error protection. …”
    Get full text
    Article
  8. 14288

    Perceptions of wheat producers towards risk and risk management strategies: A case study from Turkey by Seyit Hayran

    Published 2019-11-01
    “…ABSTRACT: In this study, risk perception of wheat producers in Turkey was examined based on a case study conducted in Bitlis Province. The data set used in the study was obtained from 157 farmers randomly. …”
    Get full text
    Article
  9. 14289

    IMAGE HIDING ON HIGH FREQUENCY SPEECH COMPONENTS USING WAVELET PACKET TRANSFORM by Mohammed Al-Turfi

    Published 2018-06-01
    “…Best results were achieved with higher speech resolution (higher number of bits per sample) and longer periods (higher number of samples in the media file).…”
    Get full text
    Article
  10. 14290

    ARPNetSteg: Network Steganography Using Address Resolution Protocol by Punam Bedi, Arti Dua

    Published 2020-12-01
    “…Our technique is a robust technique that can transfer 44 bits of covert data per ARP reply packet.…”
    Get full text
    Article
  11. 14291

    Encrypted Image Watermark in Audio Files Using Homogenous Deffie-Hellman with Chebyshev Polynomial by Hala B. Abdul Wahab, Abdul-Mohssen J. Abdul-Hossen, Sana Ahmed Kadhom

    Published 2016-06-01
    “…The embedding process will depend on binary similarity between the audio and watermark bits which reduces the effect of embedded data. The proposed method for the key generation is more secure and complicated since it combines the strength factors of both Diffie-Hellman and Chebyshev polynomial. …”
    Get full text
    Article
  12. 14292

    Spin textures in synthetic antiferromagnets: Challenges, opportunities, and future directions by Kang Wang, Vineetha Bheemarasetty, Gang Xiao

    Published 2023-07-01
    “…Spin textures, such as magnetic domain walls and skyrmions, have the potential to revolutionize electronic devices by encoding information bits. Although recent advancements in ferromagnetic films have led to promising device prototypes, their widespread implementation has been hindered by material-related drawbacks. …”
    Get full text
    Article
  13. 14293

    RBRIEF: a robust descriptor based on random binary comparisons by Wei Huang, Ling‐Da Wu, Han‐Chen Song, Ying‐Mei Wei

    Published 2013-02-01
    “…Furthermore, the descriptor exhibits robust performance using only relatively few bits compared to other descriptors.…”
    Get full text
    Article
  14. 14294

    Finite state verifiers with constant randomness by Cem Say, Abuzer Yakaryilmaz

    Published 2014-08-01
    “…We give a new characterization of $\mathsf{NL}$ as the class of languages whose members have certificates that can be verified with small error in polynomial time by finite state machines that use a constant number of random bits, as opposed to its conventional description in terms of deterministic logarithmic-space verifiers. …”
    Get full text
    Article
  15. 14295

    Identification of Signatures Transmitted over Rayleigh Fading Channel by Using HMM and RLE by Djamhari Sirat, Arman D. Diponegoro, Leni N. Hidayati, Filbert H. Juwono

    Published 2014-01-01
    “…To reduce the number of bits in the bitstream, the signal prior to transmission was compressed by means of run-length encoding (RLE), also known as source coding. …”
    Get full text
    Article
  16. 14296

    Steady-state visual evoked potential (SSVEP)-based brain–computer interface (BCI) of Chinese speller for a patient with amyotrophic lateral sclerosis: A case report by Nanlin Shi, Liping Wang, Yonghao Chen, Xinyi Yan, Chen Yang, Yijun Wang, Xiaorong Gao

    Published 2020-03-01
    “…The developed calibration-free and asynchronous spelling system provided a natural and efficient communication experience for the patient, achieving a maximum free-spelling accuracy above 90% and an information transfer rate of over 22.203 bits/min. A set of standard frequency scanning and task spelling data were also acquired to evaluate the patient’s SSVEP response and to facilitate further personalized BCI design. …”
    Get full text
    Article
  17. 14297

    An Adaptive Fault-Tolerant Event Detection Scheme for Wireless Sensor Networks by Yoon-Hwa Choi, Sung-Jib Yim

    Published 2010-03-01
    “…In addition, the scheme employs a moving average filter to tolerate most transient faults in sensor readings, reducing the effective fault probability. Only three bits of data are exchanged to reduce the communication overhead in detecting events. …”
    Get full text
    Article
  18. 14298

    Creating Prototype Virus - Destroying Files and Texts on Any Computer by Naim BAFTIU, Samedin KRABAJ

    Published 2019-04-01
    “…When we study how viruses work and prevent them, we've developed a very simple application where we can see a prototype of a virus and virus function, as well as neutralizing a file if we want to break it down its structure at the level of the bits Purpose-Understand how a virus works by programming it in a high programming language. …”
    Get full text
    Article
  19. 14299

    Coverless Image Steganography Based on Generative Adversarial Network by Jiaohua Qin, Jing Wang, Yun Tan, Huajun Huang, Xuyu Xiang, Zhibin He

    Published 2020-08-01
    “…Experiments show that our model not only achieves a payload of 2.36 bits per pixel, but also successfully escapes the detection of steganalysis tools.…”
    Get full text
    Article
  20. 14300

    Recognition of the ICSID Awards in the USA by Ilia V. Rachkov

    Published 2015-09-01
    “…This question is also of importance for Russia as for the active party to different BITs.…”
    Get full text
    Article