-
14741
Regionalization of Online Shopping, Product Listings and Logistics Management in the Digital Economy
Published 2022-12-01Get full text
Article -
14742
Antenna Combining for Interference Limited MIMO Cellular Networks
Published 2020-07-01“…From the SCVQ, the ergodic spectral efficiency and the optimal number of feedback bits are investigated, and it is shown that the QBC degrades the gain of the effective channel. …”
Get full text
Article -
14743
Secure performance analysis and pilot spoofing attack detection in cell-free massive MIMO systems with finite-resolution ADCs
Published 2022-01-01“…Moreover, tight approximated ergodic secrecy rate expression is also presented with respect to analog-to-digital converters quantization bits, number of antennas, pilot power, and so on. …”
Get full text
Article -
14744
-
14745
SBMLeditor: effective creation of models in the Systems Biology Markup Language (SBML)
Published 2007-03-01“…Users can create and remove all the necessary bits and pieces of SBML in a controlled way, that maintains the validity of the final SBML file.…”
Get full text
Article -
14746
A separable convolutional neural network-based fast recognition method for AR-P300
Published 2022-10-01“…Compared with four classical algorithms, SepCNN significantly improved the average target recognition accuracy (81.1%) and information transmission rate (57.90 bits/min) of AR–P300 single extraction. SepCNN with single extraction also attained better results than classical algorithms with multiple averaging.…”
Get full text
Article -
14747
Ürün Demeti Fiyatlandırma Yönteminin Yiyecek İçecek İşletmelerinde Tüketici Satın Alma Tercihlerine Etkisi
Published 2019-10-01Get full text
Article -
14748
Generalized Scheme Based on Octagon-Shaped Shell for Data Hiding in Steganographic Applications
Published 2019-06-01“…To overcome this drawback, one study proposed a turtle shell-based scheme for data hiding, in which a reference matrix was constructed based on a hexagon-shaped shell to embed three secret bits into each pixel group of a pair of pixels of the cover image. …”
Get full text
Article -
14749
Secured Watermarking Image Using Spread Spectrum
Published 2016-09-01“…Similarly, the watermark image bits are spread by a large factor called chip-rate so that it is imperceptible and arrange in cover image in away where if the half of the watermarked image is cropped, the watermark image is not affected. …”
Get full text
Article -
14750
Esquema multicapa de compresión de encabezados para aplicaciones VoIP en contextos rurales en redes 802.11
Published 2014-01-01“…La reducción en el tamaño de los encabezados se logra a partir de la compresión de los campos estáticos de los encabezados RTP/UDP/IP y del uso de un direccionamiento virtual de 8 bits en la capa MAC. Si consideramos la longitud de los encabezados RTP/UDP/IP/MAC, este esquema permite obtener un 48% de eficiencia de compresión contra un 41% que ofrecen los esquemas CRTP y RoHC. …”
Get full text
Article -
14751
MAKASLAMA BANDI YAPRAKLANMASININ YÖNLENMESİ İLE MİLONİTLERDE MAKASLAMA YÖNÜNÜN TAYİNİ: KEBAN KARIŞIĞINDAN ARAZÎ KANITI
Published 1986-10-01“…Alpin-Himalaya orojenik kuşağı, Bitlis sütur zonunun, kuzeydoğu kısmının yapısal özellikleri yoğun iç deformasyonlar gösterir. …”
Get full text
Article -
14752
-
14753
Reassembling disaster risk: towards a more self-reflexive and enabling geography
Published 2022-03-01“…Physical and human geographers tend to look at the world as something that needs to be discovered and explained. Finding bits of nature or society, they further drive a wedge between their disciplines. …”
Get full text
Article -
14754
-
14755
Comprehensive Java Metadata Tracking for Attack Detection and Repair
Published 2019“…We present ClearTrack, a system that tracks 32 bits of metadata for each primitive value in Java programs to detect and nullify a range of vulnerabilities such as integer overflow and underflow vulnerabilities, SQL injection vulnerabilities, and command injection vulnerabilities. …”
Get full text
Article -
14756
-
14757
-
14758
A high performance zero-crossing based pipelined analog-to-digital converter
Published 2009Get full text
Thesis -
14759
iJam: Jamming Oneself for Secure Wireless Communication
Published 2010“…We show that iJam makes the data bits at the adversary look random, i.e., the BER becomes close to 50%, whereas the receiver can perfectly decode the data.…”
Get full text
-
14760