Showing 14,461 - 14,480 results of 16,001 for search '"bit"', query time: 2.37s Refine Results
  1. 14461
  2. 14462

    Interference-aware receiver structure for multi-user MIMO and LTE by Ghaffar Rizwan, Knopp Raymond

    Published 2011-01-01
    “…Reflecting on these results, we propose a LTE codebook design based on two additional feedback bits of CSIT and show that this new codebook significantly outperforms the currently standardized LTE codebooks for multi-user MIMO transmission.…”
    Get full text
    Article
  3. 14463

    Improving a Power Line Communications Standard with LDPC Codes by Praveen Jain, Wai-Yip Chan, Neng Wang, Christine Hsu

    Published 2007-01-01
    “…The proposed scheme also dispenses with the repetition of information bits in ROBO mode to gain time diversity, resulting in 4-fold increase in physical layer throughput.…”
    Get full text
    Article
  4. 14464
  5. 14465

    Landauer Bound and Continuous Phase Transitions by Maria Cristina Diamantini

    Published 2023-06-01
    “…This ordering process can be seen as information erasure by resetting a certain number of bits to a standard value. The thermodynamic entropy in the partially ordered phase is given by the information-theoretic expression for the generalized Landauer bound in terms of error probability. …”
    Get full text
    Article
  6. 14466

    First Digits’ Shannon Entropy by Welf Alfred Kreiner

    Published 2022-10-01
    “…While the entropy of the first digits following an NB distribution amounts to H = 2.88, for other data distributions (diameters of craters on Venus or the weight of fragments of crushed minerals), entropy values of 2.76 and 2.04 bits per digit have been found.…”
    Get full text
    Article
  7. 14467
  8. 14468

    Performance study of differential frequency hopping by Avinash Sankar

    Published 2013
    “…The concepts of singleuser and multi-user efficiency have also been included in the discussion which can be considered as a reasonable means to compare FFI I and OFII systems. For the same bits per symbol and same dwell time, it is shown that the data rate of a single-user DFH is larger than the FFlI data rate. …”
    Get full text
    Thesis
  9. 14469

    In search of stability: the EU-China strategic partnership and the EU-China investment dilemma by Hang, Zhao

    Published 2015
    “…Key words: EU-China strategic partnership, EU-China investment relations, UK-China investment relations, Germany-China investment relations, France-China investment relations, Euro crisis, BITs…”
    Get full text
    Thesis
  10. 14470

    Demonstration (web-based) of cryptographic hashing by Au, Yun Sheng

    Published 2018
    “…This report reviews the entire process of implementing the web demonstration of the Secure Hash Algorithm 3 (“SHA3”), with a digest length of 224 bits. The report is broken up into several phases each targeting a specific aspect of the project from start to finish. …”
    Get full text
    Final Year Project (FYP)
  11. 14471

    Real-time adaptive estimation of decoherence timescales for a single qubit by Arshad, MJ, Bekker, C, Haylock, B, Skrzypczak, K, White, D, Griffiths, B, Gore, J, Morley, GW, Salter, P, Smith, J, Zohar, I, Finkler, A, Altmann, Y, Gauger, EM, Bonato, C

    Published 2024
    “…Characterizing the time over which quantum coherence survives is critical for any implementation of quantum bits, memories, and sensors. The usual method for determining a quantum system's decoherence rate involves a suite of experiments probing the entire expected range of this parameter, and extracting the resulting estimation in postprocessing. …”
    Journal article
  12. 14472

    Dual sampling sigma delta analog to digital converter by Mohd Isa, Maryam, Noor Shah, Mohd Syahril, Hamidon, Mohd Nizar

    Published 2012
    “…The ADC further includes a clock (106) operating at a conversion clock frequency for producing a clock signal (108), and a decimator (110) for processing the multiple digital signals produced by the sigma delta modulator (102) and generating an output digital signal (150), and the decimator (110) includes multiple decimation elements (112, 114) and a combining element (116) for generating the output digital signal (150) with N-bits. The sigma delta modulator (102) further includes a comparator (118) having a first input (120) for receiving the analog input signal (104), a second input (121) for receiving an analog estimate of the analog input signal (104), and a comparator output (122).…”
    Patent
  13. 14473

    Network monitoring application for IPV6 network with IPSEC by Aashique, Mohammad Aashraful

    Published 2005
    “…The Linux Router will check the all IP packets from the network, if IP packets has IPSec bits then its secured otherwise it will discard. …”
    Get full text
    Thesis
  14. 14474

    HILBERT-LSB-C as Authentication System for Color Medical Images by Syifak Izhar, Hisham, Jasni, Mohamad Zain, Nurul Wahidah, Arshad, Siau-Chuin, Liew

    Published 2015
    “…The proposed method uses Hilbert pattern numbering before watermarking operations such as parity bits check and comparison between average intensities as the authentication data. …”
    Get full text
    Conference or Workshop Item
  15. 14475

    Development and implementation of a video watermarking method based on DCT transform by Benziane, Ali, Suryanti, Awang, Lebcir, Mohamed

    Published 2021
    “…This approach uses a differential embedding technique to insert the bits of the watermark into the video frames so that the extraction process is blind and straightforward. …”
    Get full text
    Article
  16. 14476

    Local Position Estimation Using an Artificial Neural Network Based Model with a Hardware Implementation by Abdullah, Embong, Rohani, Abu Bakar, Syahrulanuar, Ngah

    Published 2012
    “…The proposed method used second order nonlinear function (SONF) as a foundation and further improves the result by using 320 bits of read only memory (ROM) for storing a differential lookup table (differential LUT). …”
    Get full text
    Conference or Workshop Item
  17. 14477

    High Imperceptible Data Hiding Method Based on Combination Theory for AMBTC Compressed Images by Kurnia Anggriani, Shu-Fen Chiou, Nan-I Wu, Min-Shiang Hwang

    Published 2023-06-01
    “…The experimental findings proved that the proposed method achieved high imperceptibility and high hiding capacity by modifying one pixel in a block to embed confidential bits.…”
    Get full text
    Article
  18. 14478

    The Configuration of “Time” in the Story of “Siavash” by Gholamali Fallah, Leila Sadat Peyghambarzadeh

    Published 2015-06-01
    “…Through eliminating certain pieces of information or revealing them outside of their initial chronological spot, he creates suspense and thereby reduces the readers' speed of comprehension encouraging them to assimilate their previous information with the most recent bits presented. The narrator focuses on the validity of prospective and prior to the initial orientation of the whole story and makes the reader obey himself. …”
    Get full text
    Article
  19. 14479

    PUFKEY: A High-Security and High-Throughput Hardware True Random Number Generator for Sensor Networks by Dongfang Li, Zhaojun Lu, Xuecheng Zou, Zhenglin Liu

    Published 2015-10-01
    “…Then, the true random seeds are used as the input for a non-deterministic hardware RNG to generate a stream of true random bits with a throughput as high as 803 Mbps. The experimental results show that the bitstream generated by the proposed PUFKEY can pass all standard national institute of standards and technology (NIST) randomness tests and is resilient to a wide range of security attacks.…”
    Get full text
    Article
  20. 14480

    An Application of Non-Dominated Sorting Genetic Algorithm for Reversible Data Hiding Based on Histogram Shifting in Neuroimages by Fusun Er, Yıldıray YALMAN

    Published 2022-12-01
    “…The performance of the proposed method has been measured in terms of the peak signal-to-noise ratio (PSNR) for image quality and the bits per pixel (bpp) for capacity assessments. The experimental results show that the proposed method is better than its counterparts…”
    Get full text
    Article