Showing 14,741 - 14,760 results of 16,001 for search '"bit"', query time: 0.40s Refine Results
  1. 14741
  2. 14742

    Antenna Combining for Interference Limited MIMO Cellular Networks by Tae-Kyoung Kim

    Published 2020-07-01
    “…From the SCVQ, the ergodic spectral efficiency and the optimal number of feedback bits are investigated, and it is shown that the QBC degrades the gain of the effective channel. …”
    Get full text
    Article
  3. 14743

    Secure performance analysis and pilot spoofing attack detection in cell-free massive MIMO systems with finite-resolution ADCs by Xianyu Zhang, Xiaoqiang Qiao, Tao Liang, Kang An

    Published 2022-01-01
    “…Moreover, tight approximated ergodic secrecy rate expression is also presented with respect to analog-to-digital converters quantization bits, number of antennas, pilot power, and so on. …”
    Get full text
    Article
  4. 14744
  5. 14745

    SBMLeditor: effective creation of models in the Systems Biology Markup Language (SBML) by Le Novère Nicolas, Donizelli Marco, Rodriguez Nicolas

    Published 2007-03-01
    “…Users can create and remove all the necessary bits and pieces of SBML in a controlled way, that maintains the validity of the final SBML file.…”
    Get full text
    Article
  6. 14746

    A separable convolutional neural network-based fast recognition method for AR-P300 by Chunzhao He, Yulin Du, Xincan Zhao

    Published 2022-10-01
    “…Compared with four classical algorithms, SepCNN significantly improved the average target recognition accuracy (81.1%) and information transmission rate (57.90 bits/min) of AR–P300 single extraction. SepCNN with single extraction also attained better results than classical algorithms with multiple averaging.…”
    Get full text
    Article
  7. 14747
  8. 14748

    Generalized Scheme Based on Octagon-Shaped Shell for Data Hiding in Steganographic Applications by Hui-Shih Leng

    Published 2019-06-01
    “…To overcome this drawback, one study proposed a turtle shell-based scheme for data hiding, in which a reference matrix was constructed based on a hexagon-shaped shell to embed three secret bits into each pixel group of a pair of pixels of the cover image. …”
    Get full text
    Article
  9. 14749

    Secured Watermarking Image Using Spread Spectrum by Abdulkareem M. Salih

    Published 2016-09-01
    “…Similarly, the watermark image bits are spread by a large factor called chip-rate so that it is imperceptible and arrange in cover image in away where if the half of the watermarked image is cropped, the watermark image is not affected. …”
    Get full text
    Article
  10. 14750

    Esquema multicapa de compresión de encabezados para aplicaciones VoIP en contextos rurales en redes 802.11 by Álvaro Armenta Ramade, Arturo Serrano Santoyo

    Published 2014-01-01
    “…La reducción en el tamaño de los encabezados se logra a partir de la compresión de los campos estáticos de los encabezados RTP/UDP/IP y del uso de un direccionamiento virtual de 8 bits en la capa MAC. Si consideramos la longitud de los encabezados RTP/UDP/IP/MAC, este esquema permite obtener un 48% de eficiencia de compresión contra un 41% que ofrecen los esquemas CRTP y RoHC. …”
    Get full text
    Article
  11. 14751

    MAKASLAMA BANDI YAPRAKLANMASININ YÖNLENMESİ İLE MİLONİTLERDE MAKASLAMA YÖNÜNÜN TAYİNİ: KEBAN KARIŞIĞINDAN ARAZÎ KANITI by Gültekin SAVCI

    Published 1986-10-01
    “…Alpin-Himalaya orojenik kuşağı, Bitlis sütur zonunun, kuzeydoğu kısmının yapısal özellikleri yoğun iç deformasyonlar gösterir. …”
    Get full text
    Article
  12. 14752
  13. 14753

    Reassembling disaster risk: towards a more self-reflexive and enabling geography by Kewan Mertens

    Published 2022-03-01
    “…Physical and human geographers tend to look at the world as something that needs to be discovered and explained. Finding bits of nature or society, they further drive a wedge between their disciplines. …”
    Get full text
    Article
  14. 14754
  15. 14755

    Comprehensive Java Metadata Tracking for Attack Detection and Repair by Perkins, Jeff, Eikenberry, Jordan, Coglio, Alessandro, Rinard, Martin

    Published 2019
    “…We present ClearTrack, a system that tracks 32 bits of metadata for each primitive value in Java programs to detect and nullify a range of vulnerabilities such as integer overflow and underflow vulnerabilities, SQL injection vulnerabilities, and command injection vulnerabilities. …”
    Get full text
    Article
  16. 14756
  17. 14757
  18. 14758
  19. 14759

    iJam: Jamming Oneself for Secure Wireless Communication by Katabi, Dina, Gollakota, Shyamnath

    Published 2010
    “…We show that iJam makes the data bits at the adversary look random, i.e., the BER becomes close to 50%, whereas the receiver can perfectly decode the data.…”
    Get full text
  20. 14760