Showing 14,321 - 14,340 results of 16,001 for search '"bit"', query time: 0.14s Refine Results
  1. 14321
  2. 14322
  3. 14323
  4. 14324

    SOSYAL BİLGİLER ÖĞRETMENLERİNİN ‘OKUL DIŞI TARİH ÖĞRETİMİ’NE İLİŞKİN GÖRÜŞLERİNİN İNCELENMESİ by Galip ÖNER

    Published 2015-02-01
    “…Bolu, Antalya, Düzce, Aydın, Trabzon, Bitlis and İstanbul). The data was analysed and interpreted according to the variables such as gender, city, school type and outdoor activities.According to the findings, female teachers do more outdoor teaching than male teachers. …”
    Get full text
    Article
  5. 14325

    Estructura trófica de la asociación de peces intermareales de la costa rocosa del norte de Chile by C. Viviana Berrios, F. Mauricio Vargas

    Published 2004-03-01
    “…Los peces carnívoros Cheilodactylus variegatus, Helcogrammoides chilensis y Labrisomus philippii y el omnívoro Oplegnatus insignis registraron una tendencia a la eurifágia (H >2.0 bits), sin embargo la mayor superposicion trófica (>0.90) se observó entre los peces herbívoros y omnívoros. …”
    Get full text
    Article
  6. 14326
  7. 14327

    A Communication-Efficient Local Differentially Private Algorithm in Federated Optimization by Syed Eqbal Alam, Dhirendra Shukla, Shrisha Rao

    Published 2023-01-01
    “…The algorithm incurs very little communication overhead; for <inline-formula> <tex-math notation="LaTeX">$m$ </tex-math></inline-formula> heterogeneous resources in the system, the asymptotic upper bound on the communication complexity is <inline-formula> <tex-math notation="LaTeX">$\mathcal {O}(m)$ </tex-math></inline-formula> bits at a time step. Furthermore, if the algorithm converges in <inline-formula> <tex-math notation="LaTeX">$K$ </tex-math></inline-formula> time steps, then the upper bound communication complexity will be <inline-formula> <tex-math notation="LaTeX">$\mathcal {O}(mK)$ </tex-math></inline-formula> bits. …”
    Get full text
    Article
  8. 14328
  9. 14329

    Energy-efficient algorithms for lossless data compression schemes in wireless sensor networks by Lucia K. Ketshabetswe, Adamu Murtala Zungeru, Caspar K. Lebekwe, Bokani Mtengi

    Published 2024-03-01
    “…ALDC and FELACS algorithms encode differences between consecutive data readings, thereby reducing the number of bits required for encoding. ALDC employs Huffman coding, while FELACS leverages the Golomb-Rice coding method. …”
    Get full text
    Article
  10. 14330
  11. 14331
  12. 14332
  13. 14333

    Algebraic Attack on FHE-Friendly Cipher HERA Using Multiple Collisions by Fukang Liu, Abul Kalam, Santanu Sarkar, Willi Meier

    Published 2024-03-01
    “…However, the security of HERA with 80 and 128 bits of security is not affected by our attacks due to the high cost to find multiple collisions. …”
    Get full text
    Article
  14. 14334

    Predictors of pregnancy stress and psychological birth trauma in women undergoing vaginal delivery: a cross-sectional study in China by Dongmei Ma, Shiwen Sun, Jialu Qian, Man Wang, Huimin Gu, Jingjing Lou, Xiaoyan Yu

    Published 2023-08-01
    “…Results The median (IQR) of PSRS and City BiTS scores were 10.00 (14.00) and 3.00 (9.00), respectively. …”
    Get full text
    Article
  15. 14335

    İŞGÖRENLER TARAFINDAN ALGILANAN AÇIK LİDERLİĞİN YENİLİKÇİ İŞ DAVRANIŞINA ETKİSİNDE YÖNETİCİ DESTEK ALGISININ ARACILIK ROLÜ by Zeki UÇAR, Barış GÜNDOĞDU

    Published 2023-06-01
    “…Oluşturulan araştırma hipotezlerini test etmek için gerekli olan veri Bitlis ili kamu ve özel sektör çalışanlarından sağlanmıştır. …”
    Get full text
    Article
  16. 14336
  17. 14337
  18. 14338

    Softwar: A Novel Theory on Power Projection and the National Strategic Significance of Bitcoin by Lowery, Jason P.

    Published 2023
    “…Based on the core concepts of Power Projection Theory, the author inductively reasons that proof-of-work technologies like Bitcoin could not only function as monetary technology, but could also (and perhaps more importantly) function as a new form of electro-cyber power projection technology which could empower nations to secure their most precious bits of information (including but not limited to financial bits of information) against belligerent actors by giving them the ability to impose severe physical costs on other nations in, from, and through cyberspace. …”
    Get full text
    Thesis
  19. 14339
  20. 14340