Showing 15,441 - 15,460 results of 16,001 for search '"bit"', query time: 0.14s Refine Results
  1. 15441

    Classical Communication Coset State (t,n) Threshold Quantum Digital Signature by Qingshui Xue, Zixuan Lu, Jing Han, Jiewei Cai

    Published 2023-01-01
    “…In addition, we propose a novel reuse quantum-token protocol based on the length of the hash message to-be-signed to enable single-member signatures over multiple bits. This scheme has other potential applications, including eavesdropper identification, quantum threshold proxy signatures, and more flexible quantum threshold schemes. …”
    Get full text
    Article
  2. 15442
  3. 15443

    More optimal relativistic quantum key distribution by Georgi Bebrov

    Published 2022-09-01
    “…Both schemes rely on high-dimensional quantum systems (phase and polarization encodings are utilized for establishing key bits). One of the proposed schemes is a system comprised of two sequentially connected interferometers, as the first (interferometer) controls the behavior of the second one. …”
    Get full text
    Article
  4. 15444

    A Unified Framework for Full-Duplex Massive MIMO Cellular Networks With Low Resolution Data Converters by Elyes Balti, Brian L. Evans

    Published 2023-01-01
    “…Our contributions for forward and reverse links include (1) deriving signal-to-quantization-plus-interference-plus-noise ratio (SQINR) under pilot contamination, linear minimum mean square error (LMMSE) channel estimation and channel hardening; (2) deriving closed-form and approximate analytical expressions of spectral efficiency; (3) deriving asymptotic results and power scaling laws with respect to the number of quantization bits, base station antennas, and users, as well as base station and user equipment power budgets; and (4) analyzing outage probability and spectral efficiency vs. cell shape, shadowing, noise, cellular interference, pilot contamination, pilot overhead, and frequency reuse. …”
    Get full text
    Article
  5. 15445

    Design and Implementation of a Personalizable Alternative Mouse and Keyboard Interface for Individuals with Limited Upper Limb Mobility by Daniel Andreas, Hannah Six, Adna Bliek, Philipp Beckerle

    Published 2022-11-01
    “…With an average throughput of <inline-formula><math xmlns="http://www.w3.org/1998/Math/MathML" display="inline"><semantics><mrow><mn>1.56</mn></mrow></semantics></math></inline-formula> bits per second achieved by the alternative mouse and typing speeds of <inline-formula><math xmlns="http://www.w3.org/1998/Math/MathML" display="inline"><semantics><mrow><mn>8.44</mn></mrow></semantics></math></inline-formula> words per minute obtained using the alternative keyboard, the proposed interface could be a promising input device for people with limited upper limb mobility.…”
    Get full text
    Article
  6. 15446
  7. 15447

    Líquenes: bioindicadores de contaminación atmosférica de origen vehicular en tres zonas del distrito de Cajamarca by Felipe Gutierrez Arce

    Published 2020-06-01
    “…El área ocupada por cada especie liquénica fue procesada a partir del programa Adobe Photoshop CS6 Extended – Versión 13.0 64 bits, y el área se procesó en cm2. Se determinó el flujo vehicular, así como la abundancia y la riqueza de las especies liquénicas, para cada una de las tres zonas, utilizando una rejilla de 0,50 m x 0,10 m (dividida en cuadrículas de 20 cm2). …”
    Article
  8. 15448

    Latency-Aware Accelerator of SIMECK Lightweight Block Cipher by Adel R. Alharbi, Hassan Tariq, Amer Aljaedi, Abdullah Aljuhni

    Published 2022-12-01
    “…This article presents a latency-optimized implementation of the SIMECK lightweight block cipher on a field-programmable-gate-array (FPGA) platform with a block and key lengths of 32 and 64 bits. The critical features of our architecture include parallelism, pipelining, and a dedicated controller. …”
    Get full text
    Article
  9. 15449

    El no tan nuevo espíritu del predictivismo: de la estadística moderna al big data by Igor Sádaba Rodríguez

    Published 2020-05-01
    “…En este caso, no será la precisión o el cómputo nítido sino el enorme volumen de bits lo que garantizará, por puro cuantitativismo apabullante, anticiparse a los futuros sociales y sus comportamientos desviados. …”
    Get full text
    Article
  10. 15450

    Leakage-Resilient Anonymous Multi-Receiver Certificate-Based Key Encapsulation Scheme by Tung-Tso Tsai, Yuh-Min Tseng, Sen-Shan Huang

    Published 2023-01-01
    “…Attackers with the ability of such attacks can continuously obtain part (several bits) of the secret keys and then calculate the complete secret keys. …”
    Get full text
    Article
  11. 15451

    Enhancing Power Efficiency in Branch Target Buffer Design with a Two-Level Prediction Mechanism by Jiawei Nian, Hongjin Liu, Xin Gao, Shaolin Zhang, Mengfei Yang

    Published 2024-03-01
    “…The first level employs the skew mechanism, and the second level dissects the tag bits to create the Partial tag. These two levels of prediction mechanism correspond to the bank/way prediction for the two-level BTB structure. …”
    Get full text
    Article
  12. 15452

    Mapping flows by Marc Angélil, Cary Siress

    Published 2015-04-01
    “…Regardless of how it is mapped, Switzerland’s contemporary urban fabric hardly adheres to an immaculate image, manifesting instead a disjunctive amalgam of bits and pieces that operate according to their own rules and agendas. …”
    Get full text
    Article
  13. 15453

    Is NSGA-II Ready for Large-Scale Multi-Objective Optimization? by Antonio J. Nebro, Jesús Galeano-Brajones, Francisco Luna, Carlos A. Coello Coello

    Published 2022-11-01
    “…The same methodology, when applied to the telecommunications problem, shows that significant improvements can be obtained with respect to the original NSGA-II algorithm when solving problems with thousands of bits.…”
    Get full text
    Article
  14. 15454

    Securing Physical Layer for FHSS Communication System Using Code andPhase Hopping Techniques in CDMA, System Design and Implementation by Saifuldeen A. Mohammed

    Published 2020-07-01
    “…In 2017 Code and Phase Hopping Techniques are both proposed to resolve the most recent problem in security-related, but not with FHSS, therefore in this paper presents a new composed proposed system will progress Phase Shift and Code Hopping in Code Division Multiplexing Access (CDMA) to complement with FHSS; because the wireless Communications systems security in the last years became a nightmare for some individuals, also companies, and even countries, also join them needing for higher bits rate in the wireless channels; because of next-generation communication system 5G-6G and the evolution in social networking, IoT, stream media, IoE, visualizations, and cloud computing. …”
    Get full text
    Article
  15. 15455
  16. 15456

    Application of virtual simulation situational model in Russian spatial preposition teaching by Yanrong Gao, Yanrong Gao, R. T. Kassymova, Yong Luo

    Published 2022-09-01
    “…When the data length is 0.6-s, the Information Transfer Rate (ITR) reaches the highest: 242.21 ± 46.88 bits/min. Therefore, a high-speed BCI character input system based on SSVEP is designed using HFPM. …”
    Get full text
    Article
  17. 15457

    Comparative Reliability Analysis between Horizontal-Vertical-Diagonal Code and Code with Crosstalk Avoidance and Error Correction for NoC Interconnects by Hamdan Kadhim Abed, Wameedh Nazar Flayyih

    Published 2023-07-01
    “…Code with Crosstalk Avoidance and Error Correction (CCAEC) for network-on-chip interconnects uses simple parity check bits as the main technique to get high error correction capacity. …”
    Get full text
    Article
  18. 15458

    The Functions of Music in the Film and its Effect on the Audience by Ali Khaled Ali, Kamal Ahmed Sherif, Wael Mohammed Anany

    Published 2023-01-01
    “…Tempo tempo is determined by repeating combination bits and controlling the duration of each shot between one cut and the next, giving each scene a unique rhythmic character. …”
    Get full text
    Article
  19. 15459

    Improved Coefficient Recovery and Its Application for Rewritable Data Embedding by Alan Sii, Simying Ong, KokSheik Wong

    Published 2021-11-01
    “…Furthermore, the proposed rewritable data embedding method is able to embed 20,146 bits into an image of dimensions <inline-formula><math xmlns="http://www.w3.org/1998/Math/MathML" display="inline"><semantics><mrow><mn>512</mn><mo>×</mo><mn>512</mn></mrow></semantics></math></inline-formula>.…”
    Get full text
    Article
  20. 15460

    A Novel Privacy Paradigm for Improving Serial Data Privacy by Ayesha Shaukat, Adeel Anjum, Saif U. R. Malik, Munam Ali Shah, Carsten Maple

    Published 2022-04-01
    “…Protecting the privacy of individuals is of utmost concern in today’s society, as inscribed and governed by the prevailing privacy laws, such as GDPR. In serial data, bits of data are continuously released, but their combined effect may result in a privacy breach in the whole serial publication. …”
    Get full text
    Article