Showing 15,001 - 15,020 results of 16,001 for search '"bit"', query time: 0.13s Refine Results
  1. 15001

    Alman Reformistlerin Tefecilik Yorumu (Usury Exegesis of German Reformists) by Kürşat Haldun AKALIN

    Published 2010-01-01
    “…According to him, the objections to usury depend on the Old Testament apply not to all increments on loans, but properly to bitting usury upon usury.…”
    Get full text
    Article
  2. 15002

    Improvement of the automatic gamma correction method in cloud image detection by Bayu Nadya Kusuma, Dian Budhi Santoso

    Published 2022-11-01
    “…Gamma correction has an efficient characteristic of storing and dividing imagery by small bits, thus the study proposed an image detection development using automatic gamma correction, with ground truth being Image data from SWIMSEG Nanyang Technological University Singapore. …”
    Get full text
    Article
  3. 15003

    A New Lossless DNA Compression Algorithm Based on A Single-Block Encoding Scheme by Deloula Mansouri, Xiaohui Yuan, Abdeldjalil Saidani

    Published 2020-04-01
    “…Second, to encode the generated streams, we propose a new single-block encoding scheme (SEB) based on the exploitation of the position of neighboring bits within the block using two different techniques. …”
    Get full text
    Article
  4. 15004

    Energy-Efficient Bridge Detection Algorithms for Wireless Sensor Networks by Orhan Dagdeviren, Vahid Khalilpour Akram

    Published 2013-04-01
    “…The second algorithm runs proposed rules on 2-hop neighborhoods of each node and tries to detect all bridges in a breadth-first search (BFS) execution session using O( N ) messages with O ( Δ ( log 2 ( N ) ) ) bits where N is the node count and Δ is the maximum node degree. …”
    Get full text
    Article
  5. 15005

    The Cold War by Harlan Cleveland

    Published 2022-06-01
    “…I was of course an eyewitness to bits and pieces of the whole period we call the Cold War—but don’t look for fragmentary anecdotes which would not do justice to the serious purpose of this symposium. …”
    Get full text
    Article
  6. 15006

    Peoples’ right to self-determination and self-governance over natural resources: Possible and desirable? by Hans Morten Haugen

    Published 2014-12-01
    “…Finally, the article identifies the role of human rights in bilateral investment treaties (BITs). It finds that there are less jurisdictional restrictions – as many treaties have a wide understanding of applicable law – than cognitive restrictions – as human rights competence is rarely sought when establishing tribunals mandated to solve investments disputes.…”
    Get full text
    Article
  7. 15007

    A New Guess-and-Determine Method for Cryptanalysis of the GSM Encryption by Ashish Jain, Inderjeet Kaur, Akhilesh Kumar Sharma, Nirmal Kumar Gupta, Partha Chakraborty

    Published 2023-01-01
    “…A5/1 consists of three linear feedback registers of lengths 23, 22, and 19 bits. Due to the nonlinear clocking mechanism of A5/1, cryptanalytic attacks of guess-and-determine (GD) nature are efficient and more successful. …”
    Get full text
    Article
  8. 15008

    Memristor Based Multi-State Shift Register Architecture by Dincer Gokcen

    Published 2019-09-01
    “…The designed shift register consists of stages with capability to store and transfer multiple bits. The number of stages can be adjusted depending on the requirements of the specific applications. …”
    Get full text
    Article
  9. 15009

    Broncística y Poblamiento post-orientalizante en la Alta Extremadura: a partir de unos materiales procedentes de El Risco (Sierra de Fuentes, Cáceres) by F. Javier JIMÉNEZ ÁVILA, Antonio GONZÁLEZ CORDERO

    Published 2009-12-01
    “…The luxurious nature of the objects (jugs, bassins, spits, horse-bits, incense-burners...) involves some reflexions about the function of this site in the unknown scene of the Early Iron (7th-5th centuries B.C.) at North-Extremadura.…”
    Get full text
    Article
  10. 15010

    Improved Masking Multiplication with PRGs and Its Application to Arithmetic Addition by Bohan Wang, Qian Sui, Fanjie Ji, Chun Guo, Weijia Wang

    Published 2024-01-01
    “…On the theoretical level, we push the limits of the randomness requirement by providing an improved masking multiplication using only d PRGs, each of which is fed with d random variables, saving more than half random bits. On the practical level, considering that the masking of arithmetic addition usually requires more randomness (than multiplication), we apply the technique to the algorithm proposed at FSE 2015 that is a very efficient scheme performing arithmetic addition modulo 2w. …”
    Get full text
    Article
  11. 15011

    Statistical Analysis of Encryption Quality for Medical Images Based on Rijndael Encryption Algorithm Using Both Static and Chaotic Cipher Key by Mohammadreza Naeemabadi, Alireza Mehri Dehnavi, Hossein Rabbani

    Published 2014-12-01
    “…Most of these algorithms are based on a block cipher that use a predetermined fixed/constant key with at least 128 bits length. Method: In this study encryption performed by Rijndael encryption algorithm using conventional constant and variable cipher key. …”
    Get full text
    Article
  12. 15012

    before cutting, wrap the scissors with yarn to spare yourself the sound of separation* by African Fashion Research Institute (AFRI)

    Published 2022-09-01
    “…Through sonic suturing of voice, dialects, bits of time, memories and other ways of wearing – of cloth as clothes – we explore, cut, collage, stitch, overlay/overlap these off-cuttings into new remembrances. …”
    Get full text
    Article
  13. 15013

    NOISE SECURES SECRET DATA! BY ACT AS A REFERENCE FOR EMBEDDING by J. Jayaseelan, B. Kruthika

    Published 2014-03-01
    “…Based on added salt, pepper, and no noise portions of reference image completely different range of bits are embedded into the cover image. The result is analyzed by using MSE, PSNR and capacity performance metrics.…”
    Get full text
    Article
  14. 15014
  15. 15015

    Low-noise delta-sigma analog front end with capacitor swapping technique for capacitive microsensors by Kyeongsik Nam, Hyungseup Kim, Gyuri Choi, Mookyoung Yoo, Hyoungho Ko

    Published 2022-05-01
    “…The measured effective resolution is 16.2 bits, and the non-linearity is 0.05% full-scale output (FSO). …”
    Get full text
    Article
  16. 15016

    تحسين أداء لقمة المكبح المستخدمة في نظام الفرملة للقطار by نزار عبد الرحمن, ميساء شاش, مجدولين طريفي

    Published 2016-02-01
    “…The test results were compared to the heat treated samples with samples that were not subjected to heat treatment, and treatment processes gave good results that allow to apply these operations on bits currently used on the railway network in Syria.   …”
    Get full text
    Article
  17. 15017

    “Robots in Space” Multiagent Problem: Complexity, Information and Cryptographic Aspects by A. Yu. Bernstein, N. V. Shilov

    Published 2013-04-01
    “…We proved that (1) there is no protocol that solves the RinS, which transfers a bounded number of bits, and (2) suggested the protocol that allows robots to check whether their paths intersect, without revealing additional information about their relative positions (with respect to shelters). …”
    Get full text
    Article
  18. 15018

    Field RNG Data Analysis, Based on Viewing the Japanese Movie Departures (Okuribito) by Takeshi Shimizu, Masato Ishikawa

    Published 2010-12-01
    “…One hardware and two software random number generators simultaneously generated random numbers at 512 bits per second. The results showed significant Z-scores derived from chi-squares during the film viewing. …”
    Get full text
    Article
  19. 15019
  20. 15020

    DANCER: The routing algorithm in delay tolerant networks based on dynamic and polymorphic combination of dimensions and energy consideration by Jianxin Jia, Guangzhong Liu, Dezhi Han

    Published 2017-06-01
    “…After simplification, each node obtains the binary topology which consists of links where flag bits are respectively 1 or 0. Finally, based on the binary topology, each node could decide the suitable routing for every specific packet sending. …”
    Get full text
    Article