-
14281
Computationally efficient phase control algorithm for intelligent reflecting surface-aided multiuser systems
Published 2023-12-01“…The proposed scheme is evaluated with continuous phase and discrete phases with 1, 2, and 3 bits and compared with the random phase and full-search cases.…”
Get full text
Article -
14282
Dual-Polarization Hermite-Gaussian-Based NFDM Transmission System
Published 2023-01-01“…We report here, a record high spectral efficiency of 12 bits/s/Hz for dual-polarization HG-based DP-NFDM systems.…”
Get full text
Article -
14283
On Information Rates Over a Binary-Input Filtered Gaussian Channel
Published 2021-01-01“…The gap between the known upper bound, which is based on spectral constrains of bipolar signals, and our new achievable lower bound is reduced to 0.93 bits per Nyquist interval at high SNR.…”
Get full text
Article -
14284
Differential Evolution under Fixed Point Arithmetic and FP16 Numbers
Published 2021-02-01“…In this work, the differential evolution algorithm behavior under a fixed point arithmetic is analyzed also using half-precision floating point (FP) numbers of 16 bits, and these last numbers are known as FP16. In this paper, it is considered that it is important to analyze differential evolution (DE) in these circumstances with the goal of reducing its consumption power, storage size of the variables, and improve its speed behavior. …”
Get full text
Article -
14285
Representing Measurement as a Thermodynamic Symmetry Breaking
Published 2020-05-01“…Allocating a subset of the received bits to system identification imposes two separability constraints and hence breaks two symmetries: first, between observational outcomes held constant and those allowed to vary; and, second, between observational outcomes regarded as “informative” and those relegated to purely thermodynamic functions of free-energy acquisition and waste heat dissipation. …”
Get full text
Article -
14286
Why Make the World Move?
Published 2017-12-01“… The next horizons of human-computer interaction promise a whirling world of digital bytes, physical bits, and their hybrids. Are human beings prepared to inhabit such cyber-physical, adaptive environments? …”
Get full text
Article -
14287
Distributed Joint Source-Channel Coding Using Quasi-Uniform Systematic Polar Codes
Published 2018-10-01“…In the proposed scheme, each distributed source encodes source message with a quasi-uniform systematic polar code (QSPC) or a punctured QSPC, and only transmits parity bits over its independent channel. These systematic codes play the role of both source compression and error protection. …”
Get full text
Article -
14288
Perceptions of wheat producers towards risk and risk management strategies: A case study from Turkey
Published 2019-11-01“…ABSTRACT: In this study, risk perception of wheat producers in Turkey was examined based on a case study conducted in Bitlis Province. The data set used in the study was obtained from 157 farmers randomly. …”
Get full text
Article -
14289
IMAGE HIDING ON HIGH FREQUENCY SPEECH COMPONENTS USING WAVELET PACKET TRANSFORM
Published 2018-06-01“…Best results were achieved with higher speech resolution (higher number of bits per sample) and longer periods (higher number of samples in the media file).…”
Get full text
Article -
14290
ARPNetSteg: Network Steganography Using Address Resolution Protocol
Published 2020-12-01“…Our technique is a robust technique that can transfer 44 bits of covert data per ARP reply packet.…”
Get full text
Article -
14291
Encrypted Image Watermark in Audio Files Using Homogenous Deffie-Hellman with Chebyshev Polynomial
Published 2016-06-01“…The embedding process will depend on binary similarity between the audio and watermark bits which reduces the effect of embedded data. The proposed method for the key generation is more secure and complicated since it combines the strength factors of both Diffie-Hellman and Chebyshev polynomial. …”
Get full text
Article -
14292
Spin textures in synthetic antiferromagnets: Challenges, opportunities, and future directions
Published 2023-07-01“…Spin textures, such as magnetic domain walls and skyrmions, have the potential to revolutionize electronic devices by encoding information bits. Although recent advancements in ferromagnetic films have led to promising device prototypes, their widespread implementation has been hindered by material-related drawbacks. …”
Get full text
Article -
14293
RBRIEF: a robust descriptor based on random binary comparisons
Published 2013-02-01“…Furthermore, the descriptor exhibits robust performance using only relatively few bits compared to other descriptors.…”
Get full text
Article -
14294
Finite state verifiers with constant randomness
Published 2014-08-01“…We give a new characterization of $\mathsf{NL}$ as the class of languages whose members have certificates that can be verified with small error in polynomial time by finite state machines that use a constant number of random bits, as opposed to its conventional description in terms of deterministic logarithmic-space verifiers. …”
Get full text
Article -
14295
Identification of Signatures Transmitted over Rayleigh Fading Channel by Using HMM and RLE
Published 2014-01-01“…To reduce the number of bits in the bitstream, the signal prior to transmission was compressed by means of run-length encoding (RLE), also known as source coding. …”
Get full text
Article -
14296
Steady-state visual evoked potential (SSVEP)-based brain–computer interface (BCI) of Chinese speller for a patient with amyotrophic lateral sclerosis: A case report
Published 2020-03-01“…The developed calibration-free and asynchronous spelling system provided a natural and efficient communication experience for the patient, achieving a maximum free-spelling accuracy above 90% and an information transfer rate of over 22.203 bits/min. A set of standard frequency scanning and task spelling data were also acquired to evaluate the patient’s SSVEP response and to facilitate further personalized BCI design. …”
Get full text
Article -
14297
An Adaptive Fault-Tolerant Event Detection Scheme for Wireless Sensor Networks
Published 2010-03-01“…In addition, the scheme employs a moving average filter to tolerate most transient faults in sensor readings, reducing the effective fault probability. Only three bits of data are exchanged to reduce the communication overhead in detecting events. …”
Get full text
Article -
14298
Creating Prototype Virus - Destroying Files and Texts on Any Computer
Published 2019-04-01“…When we study how viruses work and prevent them, we've developed a very simple application where we can see a prototype of a virus and virus function, as well as neutralizing a file if we want to break it down its structure at the level of the bits Purpose-Understand how a virus works by programming it in a high programming language. …”
Get full text
Article -
14299
Coverless Image Steganography Based on Generative Adversarial Network
Published 2020-08-01“…Experiments show that our model not only achieves a payload of 2.36 bits per pixel, but also successfully escapes the detection of steganalysis tools.…”
Get full text
Article -
14300
Recognition of the ICSID Awards in the USA
Published 2015-09-01“…This question is also of importance for Russia as for the active party to different BITs.…”
Get full text
Article