-
15081
Untangling the confounded relationship between perceiver sex and walker sex on the bistable perception of emotion displaying point-light walkers
Published 2023-09-01“…Point-light displays of walking gait carries an assortment of information about the individual and this information is often perceivable to others. Some of these bits of information are entangled, with some facilitating and others inhibiting each other. …”
Get full text
Article -
15082
Optimizing Nano Metalworking Emulsions Preparation Using Response Surface Method
Published 2021-02-01“…Tool wear and surface roughness were studied at a different speed, the results have shown that the wear ratio of the bits for all selected speeds is as follow: using commercial fluid > MWFs. …”
Get full text
Article -
15083
Design and Construction of A General System for Food Inspection Classifying and Coding
Published 2023-07-01“…The methods of sequence coding, concatenation coding and combination coding were adopted to prepare the coding schemes of food inspection items and food inspection methods, and the coding structure of 6 code segments and 16 code bits was designed, Thus, the general system of food inspection classifying and coding with stable logical structure features and open data expansion functions was build. …”
Get full text
Article -
15084
Efficient Method for Error Detection and Correction in In‐Memory Computing Based on Reliable Ex‐Logic Gates
Published 2023-05-01“…Although detection and correction are demonstrated in NOR and NAND logic gates with the memristor model, the other logic gates can be applied with the same algorithm with the appropriate module‐enable signal and input‐checker bits.…”
Get full text
Article -
15085
Crustal Structure of the Eastern Anatolia Region (Turkey) Based on Seismic Tomography
Published 2021-02-01“…The Arabian plate was revealed as a high-velocity anomaly, and the low-velocity patterns north of the Bitlis suture are mostly associated with eastern Anatolia. …”
Get full text
Article -
15086
A Secret-Key Image Steganography Technique using Random Chain Codes
Published 2019-07-01“…One of the image steganography techniques is based on LSB method, where the secret message bits are embedded sequentially in LSB of the bytes of the carrier image. …”
Get full text
Article -
15087
A Hardware Realization Framework for Fuzzy Inference System Optimization
Published 2024-02-01“…Within the MSDF-computing FIS, fuzzification, inference, and defuzzification processes occur on serially incoming data bits. To illustrate the framework’s efficiency, we implemented it using MATLAB, Chisel3, and Vivado, starting from high-level FIS descriptions and progressing to hardware synthesis. …”
Get full text
Article -
15088
Molecular-fingerprint machine-learning-assisted design and prediction for high-performance MOFs for capture of NMHCs from air
Published 2022-07-01“…According to the performance, the fingerprint commonalities of the 100 top-performing MOFs were counted, and the excellent bits (EBs) that could promote the performance were defined. …”
Get full text
Article -
15089
Fault attacks on authenticated encryption modes for GIFT
Published 2022-01-01“…A new fault attack is launched on LOTUS/LOCUS assuming that two bits can be made to reset in the fixed location during the encryption process. …”
Get full text
Article -
15090
Noise Reduction Methods for Charge Stability Diagrams of Double Quantum Dots
Published 2022-01-01“…Operating semiconductor quantum dots as quantum bits requires isolating single electrons by adjusting gate voltages. …”
Get full text
Article -
15091
Simulator Proses Pengisian dan Pemasangan Tutup Botol Terkendali PLC Berbantuan Miniatur Konveyor
Published 2021-08-01“…The programming for the Omron PLC system is based on providing the CX-Programmer 64 bits, establishing algorithms and compiling ladder diagrams, and compiling and uploading processes. …”
Get full text
Article -
15092
Digital Background Compensation of Analog Impairments in Jointly Frequency-Time Interleaved DACs
Published 2023-01-01“…This system design emerges as a natural candidate to achieve the extreme specifications of applications such as next-generation optical communication systems, which will require converters with bandwidths in the 120 GHz range, sampling rates of about 300 GHz, and <inline-formula> <tex-math notation="LaTeX">$\ge 6.5$ </tex-math></inline-formula> effective number of bits. The compensation or calibration of analog impairments in this architecture is a new challenge that has not been addressed by prior research. …”
Get full text
Article -
15093
Optically Reconfigurable Complementary Logic Gates Enabled by Bipolar Photoresponse in Gallium Selenide Memtransistor
Published 2023-06-01“…Additionally, memtransistor array (1×8) is fabricated and programmed into binary bits representing ASCII (American Standard Code for Information Interchange) code for the uppercase letter “N”. …”
Get full text
Article -
15094
A new dynamic DNA-coding model for gray-scale image encryption
Published 2023-08-01“…The model is applied to gray-scale images, where using a predetermined coding rule, every two bits are DNA-encoded in the image. The proposed model generates the key by sending the image and its metadata to hash functions. …”
Get full text
Article -
15095
Numerical Analysis of Deterministic Switching of a Perpendicularly Magnetized Spin-Orbit Torque Memory Cell
Published 2021-01-01“…Due to the sub-critical current, the corresponding spin-orbit torque is weak and does not disturb the bits of non-selected cells. Therefore, a single additional wire can be routed through several cells in a row, reducing the number of transistors per cell, and simplifying the cell integration in a memory array.…”
Get full text
Article -
15096
Optimal Design of Eigenvalues for the Full-Spectrum Modulated Nonlinear Frequency Division Multiplexing Transmission System
Published 2023-01-01“…Through the numerical simulation, a 113 Gb/s (SE of 2.8 bits/s/Hz) full-spectrum modulated NFDM system was set up and transmitted 1120 km distance, where the Q-factors of both CS and DS are above the hard-decision forward error correction (HD-FEC) threshold. …”
Get full text
Article -
15097
Particle Swarm Optimization-Based Secure Computation Efficiency Maximization in a Power Beacon-Assisted Wireless-Powered Mobile Edge Computing NOMA System
Published 2020-10-01“…The problem is non-convex and challenging to solve because of the complexity of the objective function in meeting constraints that ensure the required quality of service, such as the minimum value of computed bits, limitations on total energy consumed by users, maximum CPU frequency, and minimum harvested energy and computation offloading times. …”
Get full text
Article -
15098
Improving Image Compression With Adjacent Attention and Refinement Block
Published 2023-01-01“…The adjacent attention block allocates the additional bits required to capture spatial correlations (both vertical and horizontal) and effectively remove worthless information. …”
Get full text
Article -
15099
Approximate Computing Circuits for Embedded Tactile Data Processing
Published 2022-01-01“…Besides, we propose a hybrid evaluation test approach that consists of implementing three different approximate SVD circuits having different numbers of approximated Least Significant Bits (LSBs). The results show that energy consumption is reduced by more than five percent with the same accuracy loss.…”
Get full text
Article -
15100
E-SAWM: A Semantic Analysis-Based ODF Watermarking Algorithm for Edge Cloud Scenarios
Published 2023-08-01“…These pseudostatements are strategically distributed to embed redundant bits into the structural documents, ensuring that the watermark remains resistant to removal or complete destruction. …”
Get full text
Article