-
14461
The implied volatility index: Is ‘investor fear gauge’ or ‘forward-looking’?
Published 2015-03-01Get full text
Article -
14462
Interference-aware receiver structure for multi-user MIMO and LTE
Published 2011-01-01“…Reflecting on these results, we propose a LTE codebook design based on two additional feedback bits of CSIT and show that this new codebook significantly outperforms the currently standardized LTE codebooks for multi-user MIMO transmission.…”
Get full text
Article -
14463
Improving a Power Line Communications Standard with LDPC Codes
Published 2007-01-01“…The proposed scheme also dispenses with the repetition of information bits in ROBO mode to gain time diversity, resulting in 4-fold increase in physical layer throughput.…”
Get full text
Article -
14464
Bilateral Papillophlebitis in a Patient with Mutation of Metilenetetrahydrofolate Reductase Enzyme
Published 2016-08-01Get full text
Article -
14465
Landauer Bound and Continuous Phase Transitions
Published 2023-06-01“…This ordering process can be seen as information erasure by resetting a certain number of bits to a standard value. The thermodynamic entropy in the partially ordered phase is given by the information-theoretic expression for the generalized Landauer bound in terms of error probability. …”
Get full text
Article -
14466
First Digits’ Shannon Entropy
Published 2022-10-01“…While the entropy of the first digits following an NB distribution amounts to H = 2.88, for other data distributions (diameters of craters on Venus or the weight of fragments of crushed minerals), entropy values of 2.76 and 2.04 bits per digit have been found.…”
Get full text
Article -
14467
-
14468
Performance study of differential frequency hopping
Published 2013“…The concepts of singleuser and multi-user efficiency have also been included in the discussion which can be considered as a reasonable means to compare FFI I and OFII systems. For the same bits per symbol and same dwell time, it is shown that the data rate of a single-user DFH is larger than the FFlI data rate. …”
Get full text
Thesis -
14469
In search of stability: the EU-China strategic partnership and the EU-China investment dilemma
Published 2015“…Key words: EU-China strategic partnership, EU-China investment relations, UK-China investment relations, Germany-China investment relations, France-China investment relations, Euro crisis, BITs…”
Get full text
Thesis -
14470
Demonstration (web-based) of cryptographic hashing
Published 2018“…This report reviews the entire process of implementing the web demonstration of the Secure Hash Algorithm 3 (“SHA3”), with a digest length of 224 bits. The report is broken up into several phases each targeting a specific aspect of the project from start to finish. …”
Get full text
Final Year Project (FYP) -
14471
Real-time adaptive estimation of decoherence timescales for a single qubit
Published 2024“…Characterizing the time over which quantum coherence survives is critical for any implementation of quantum bits, memories, and sensors. The usual method for determining a quantum system's decoherence rate involves a suite of experiments probing the entire expected range of this parameter, and extracting the resulting estimation in postprocessing. …”
Journal article -
14472
Dual sampling sigma delta analog to digital converter
Published 2012“…The ADC further includes a clock (106) operating at a conversion clock frequency for producing a clock signal (108), and a decimator (110) for processing the multiple digital signals produced by the sigma delta modulator (102) and generating an output digital signal (150), and the decimator (110) includes multiple decimation elements (112, 114) and a combining element (116) for generating the output digital signal (150) with N-bits. The sigma delta modulator (102) further includes a comparator (118) having a first input (120) for receiving the analog input signal (104), a second input (121) for receiving an analog estimate of the analog input signal (104), and a comparator output (122).…”
Patent -
14473
Network monitoring application for IPV6 network with IPSEC
Published 2005“…The Linux Router will check the all IP packets from the network, if IP packets has IPSec bits then its secured otherwise it will discard. …”
Get full text
Thesis -
14474
HILBERT-LSB-C as Authentication System for Color Medical Images
Published 2015“…The proposed method uses Hilbert pattern numbering before watermarking operations such as parity bits check and comparison between average intensities as the authentication data. …”
Get full text
Conference or Workshop Item -
14475
Development and implementation of a video watermarking method based on DCT transform
Published 2021“…This approach uses a differential embedding technique to insert the bits of the watermark into the video frames so that the extraction process is blind and straightforward. …”
Get full text
Article -
14476
Local Position Estimation Using an Artificial Neural Network Based Model with a Hardware Implementation
Published 2012“…The proposed method used second order nonlinear function (SONF) as a foundation and further improves the result by using 320 bits of read only memory (ROM) for storing a differential lookup table (differential LUT). …”
Get full text
Conference or Workshop Item -
14477
High Imperceptible Data Hiding Method Based on Combination Theory for AMBTC Compressed Images
Published 2023-06-01“…The experimental findings proved that the proposed method achieved high imperceptibility and high hiding capacity by modifying one pixel in a block to embed confidential bits.…”
Get full text
Article -
14478
The Configuration of “Time” in the Story of “Siavash”
Published 2015-06-01“…Through eliminating certain pieces of information or revealing them outside of their initial chronological spot, he creates suspense and thereby reduces the readers' speed of comprehension encouraging them to assimilate their previous information with the most recent bits presented. The narrator focuses on the validity of prospective and prior to the initial orientation of the whole story and makes the reader obey himself. …”
Get full text
Article -
14479
PUFKEY: A High-Security and High-Throughput Hardware True Random Number Generator for Sensor Networks
Published 2015-10-01“…Then, the true random seeds are used as the input for a non-deterministic hardware RNG to generate a stream of true random bits with a throughput as high as 803 Mbps. The experimental results show that the bitstream generated by the proposed PUFKEY can pass all standard national institute of standards and technology (NIST) randomness tests and is resilient to a wide range of security attacks.…”
Get full text
Article -
14480
An Application of Non-Dominated Sorting Genetic Algorithm for Reversible Data Hiding Based on Histogram Shifting in Neuroimages
Published 2022-12-01“…The performance of the proposed method has been measured in terms of the peak signal-to-noise ratio (PSNR) for image quality and the bits per pixel (bpp) for capacity assessments. The experimental results show that the proposed method is better than its counterparts…”
Get full text
Article