Showing 15,481 - 15,500 results of 16,001 for search '"bit"', query time: 0.14s Refine Results
  1. 15481

    Two-Layer Error Control Codes Combining Rectangular and Hamming Product Codes for Cache Error by Zhang, Meilin, Ampadu, Paul

    Published 2014
    “…Based on the fact of low latency and overhead of rectangular codes and high error control capability of Hamming product codes, two-layer error control codes employ simple rectangular codes for each cache line to detect cache errors, while loading the extra Hamming product code checks bits in the case of error detection; thus enabling reliable large-scale cache operations. …”
    Get full text
    Article
  2. 15482

    Investigation of charging phenomena in gold nanoparticle based organic memory device by Yang, Xiaoyu

    Published 2009
    “…They are of low-cost since they are much simpler to manufacture than silicon chips and are easy to stack, packing bits at high density. Organic memories also have the extendibility to sensing, radio frequency identification (RFID) and passive or active matrix backplanes. …”
    Get full text
    Final Year Project (FYP)
  3. 15483

    Design and analysis of SRAM-based PUFs for security applications by Wang, Zhipeng

    Published 2022
    “…The conventional 6T SRAM has disadvantages which it requires a buffer circuit to store the bits when the SRAM switches from memory to PUF and 6T SRAM only can generate one response for one cell. …”
    Get full text
    Thesis-Master by Coursework
  4. 15484

    Innovative coding schemes for cooperative multihop radio systems by James, Ashish

    Published 2012
    “…The proposed scheme processes the implicit information to select the best transmitter, i.e., either source or relay, for the additional coded bits based on the quality of relaying. Such a scheme enhances the reliability as it ensures the availability of the correct information at the receiver for decoding. …”
    Get full text
    Thesis
  5. 15485

    Design a power-efficient asyncrhonous logic quasi-delay-insensitive network-on-chip for multi-core processor by Lim, Eng Soon.

    Published 2013
    “…The proposed NoC is designed for a 3 × 3 mesh topology, uses wormhole routing, with a flit size of 18 bits, quad-rail encoding and deterministic order routing (DOR). …”
    Get full text
    Final Year Project (FYP)
  6. 15486

    Ultra-low-voltage adder circuit design for smart sensor nodes in electrical vehicle applications by Zhou, Wei

    Published 2015
    “…The conclusion drawn from the comparison is that the Radix-2 Kogge-Stone Adder is an ideal addition algorithm to calculate large bits addition. After choosing the adder algorithm, the next issue is transistor-level schematic implementation. …”
    Get full text
    Thesis
  7. 15487

    Low-power column-parallel ADC for CMOS image sensor by leveraging spatial likelihood in natural scene by Liu, Lifen

    Published 2015
    “…Because there is strong correlation between consecutive rows in most natural scenes, pre-ADC pixel estimation could save bits in ADC conversion cycles. The total number of ADC conversions would effectively be reduced, resulting in lower power consumption. …”
    Get full text
    Thesis
  8. 15488

    Visible light communication system using mobile phone camera receiver and imaging receiver by Deng, Lingzhe

    Published 2016
    “…Through experiments, 11 bits can be extracted correctly from a photo. The system data rate is found to be limited by the intrinsic property of rolling shutter effect. …”
    Get full text
    Final Year Project (FYP)
  9. 15489

    PERMUKIMAN KEMBALI PASCA BENCANA TSUNAMI DI DESA KUALA BUBON KECAMATAN SAMATIGA KABUPATEN ACEH BARAT by , Zulfiadi, , Prof. Ir. Sudaryono, M.Eng, Ph.D

    Published 2014
    “…Descriptive analysis was conducted to obtain keywords which are then bitted into the themes and resulted local concepts. …”
    Thesis
  10. 15490

    PEMANFAATAN VIRTUAL LOCAL AREA NETWORK (VLAN) UNTUK OPTIMALISASI JARINGAN KOMPUTER PEMERINTAH PROVINSI DIY DALAM MENDUKUNG PROGRAM DIGITAL GOVERNMENT SERVICES (DGS) by , DWI ATMOKO, , Ir. P. Insap Santosa, M.Sc., Ph.D.

    Published 2011
    “…Subnetting is a way to break up Network ID is by using some bits hostID to make subnetID. Subnetting process conducted on this single Network ID produces 8 subnets that have been established based on the needs of organizations in the province of DIY. …”
    Thesis
  11. 15491

    Image based static hand gesture recognition as user input using self organizing maps / Fakhzan Firdaus Abdullah by Abdullah, Fakhzan Firdaus

    Published 2006
    “…In the neural network design, each of the bits that represents the image will be input into the SOM network. …”
    Get full text
    Thesis
  12. 15492

    Work, heat, and power of quantum processes by Binder, F

    Published 2016
    “…Focussing on the case of qubits (or rather wits, short for ‘work bits’) the chapter’s first result is an explicit protocol for maximally powerful driving for any given initial state. …”
    Thesis
  13. 15493

    Bibliographical Tools by Rahtz, S, Rahtz, S

    Published 1988
    “…This paper examines three solutions to the citation problem Firstly, there is the sophisticated word-processor package Nota Bene, which has facilities for tagging bits of text as bibliographical references, associated with particular places in the text, for defining style sheets (which could be applied to the bibliography) and for textual databases for citation collections Secondly, we examine the Unix solution of a set of tools for manipulating reference databases (refer, lookbtb and pubindex), and their integration into typesetting with troff Lastly, we look at the integrated system available in a TEX environment, using the LATEX macros and the separate BIBTEX program. …”
    Journal article
  14. 15494

    Experimental quantum key distribution certified by Bell's theorem by Nadlinger, DP, Drmota, P, Nichol, BC, Araneda, G, Main, D, Srinivas, R, Lucas, DM, Ballance, CJ, Ivanov, K, Tan, EY-Z, Sekatski, P, Urbanke, RL, Renner, R, Sangouard, N, Bancal, J-D

    Published 2022
    “…By combining theoretical developments with an improved optical fibre link generating entanglement between two trapped-ion qubits, we obtain 95,628 key bits with device-independent security<sup>9-12</sup> from 1.5 million Bell pairs created during eight hours of run time. …”
    Journal article
  15. 15495

    A probabilistic model for the evolution of RNA structure

    Published 2004
    “…The logic runs as follows: suppose there are various kinds of conserved element x, y, z . . . (e.g. exons, bits of RNA, promoters, etc) that might explain an observed sequence homology. …”
    Journal article
  16. 15496

    Ensemble based quantum memory and adiabatic phase gates in electron spins by Wu, H

    Published 2011
    “…I demonstrate the storage and on-demand retrieval of multiple bits of quantum information into and from a single electron spin ensemble by applying magnetic field gradient pulses. …”
    Thesis
  17. 15497

    Linear optics quantum computing with single photons from an atom-cavity system by Holleczek, A

    Published 2015
    “…Here, we present a photon source to on-demand deliver photonic quantum bits of information based on a strongly coupled atom-cavity system. …”
    Thesis
  18. 15498
  19. 15499

    Effects of total Dose irradiation on Semiconductor devices by Haider F. Abdul Amir, Abdullah Chik, Chee, Fuei Pien

    Published 2009
    “…In this research, analytical studies of the effects of ionizing radiation introduced in commercial-off-the shelf (COTS) NPN bipolar junction transistors (BITs) and optoelectronic devices by ionizing radiation, Cobalt- 60 (60Co) gamma (y) rays and x-rays had been performed. …”
    Get full text
    Get full text
    Research Report
  20. 15500

    Enhanced bandwidth management model using software defined networking by Emilia Rosa Jimson

    Published 2019
    “…Available bandwidth is the maximum unused bandwidth at a link, whereby it is measured in bits per second. However, since available bandwidth in network is limited, it is very critical to manage the network bandwidth efficiently. …”
    Get full text
    Thesis