Showing 15,581 - 15,600 results of 16,001 for search '"bit"', query time: 0.14s Refine Results
  1. 15581

    Dynamic ham-sandwich cuts in the plane by Abbott, Timothy G., Burr, Michael A., Chan, Timothy M., Demaine, Erik D., Demaine, Martin L., Hugg, John, Kane, Daniel, Langerman, Stefan, Nelson, Jelani, Rafalin, Eynat, Seyboth, Kathryn, Yeung, Vincent

    Published 2015
    “…Alternatively, we can view each convex point set as a convex polygon, and we show how to find a ham-sandwich cut that bisects the total areas or total perimeters of these polygons in O(klog[superscript 4]n) time plus the O((kb)polylog(kb)) time required to approximate the root of a polynomial of degree O(k) up to b bits of precision. We also show how to maintain a partition of the plane by two lines into four regions each containing a quarter of the total point count, area, or perimeter in polylogarithmic time.…”
    Get full text
    Get full text
    Article
  2. 15582

    New results on modular inversion hidden number problem and inversive congruential generator by Xu, Jun, Sarkar, Santanu, Hu, Lei, Wang, Huaxiong, Pan, Yanbin

    Published 2020
    “…The Modular Inversion Hidden Number Problem (MIHNP), introduced by Boneh, Halevi and Howgrave-Graham in Asiacrypt 2001, is briefly described as follows: Let MSB𝛿(𝑧) refer to the δ most significant bits of z. Given many samples(𝑡𝑖,MSB𝛿((𝛼+𝑡𝑖)−1mod𝑝))(ti,MSBδ((α+ti)−1modp)) for random 𝑡𝑖∈ℤ𝑝, the goal is to recover the hidden number 𝛼∈ℤ . …”
    Get full text
    Conference Paper
  3. 15583
  4. 15584

    Energy efficiency of coordinated multipoint transmission (CoMP) over LTE-A by Mohamed Yusoff, Zainatul Yushaniza, Hashim, Fazirulhisyam, Sali, Aduwati

    Published 2017
    “…The energy efficiency is in the unit of bits/joule. Via the simulation, a system with best energy efficiency is identified. …”
    Get full text
    Conference or Workshop Item
  5. 15585
  6. 15586

    A framework of enhanced authentication for PDF textual documents using Zigzag-LSB embedding algorithm by Nur Alya Afikah, Usop

    Published 2024
    “…A framework of enhanced authentication for PDF textual documents using Zigzag-lsb embedding algorithm is proposed in order to apply a new technique of watermarking scheme which can be used in general size of document, to study the current numbering of watermarking system to secure the authentication of digital documents, and evaluate the watermarking scheme for digital documents in terms of accuracy rate, and analyse the performance. Least significant bits (LSB) were used by the techniques to encrypt authentication data. …”
    Get full text
    Thesis
  7. 15587
  8. 15588

    Mapping Clinical Contents onto Longitudinal Depictions of Cross-Continuum Service Events in Island Health: Clinical Context Coding Scheme by Andriy Koval, Kenneth Moselle

    Published 2018-09-01
    “…Introduction All bits of clinical information acquire meaning against a backdrop of longitudinal engagement with a potentially large constellation of services. …”
    Get full text
    Article
  9. 15589
  10. 15590

    TWO-STEP PROVIDING OF DESIRED QUALITY IN LOSSY IMAGE COMPRESSION BY SPIHT by Fangfang Li, Sergey Krivenko, Vladimir Lukin

    Published 2020-04-01
    “…This paper considers the application of the two-step method in an encoder based on a discrete wavelet transform (DWT). In the experiment, bits per pixel (BPP) is used as the control parameter to vary and predict the compressed image quality, and three visual quality evaluation metrics (PSNR, PSNR-HVS, PSNR-HVS-M) are analyzed. …”
    Get full text
    Article
  11. 15591

    Robust Watermarking Algorithm for Building Information Modeling Based on Element Perturbation and Invisible Characters by Qianwen Zhou, Changqing Zhu, Na Ren

    Published 2023-12-01
    “…The proposed algorithm first calculates the centroid of the enclosing box to locate the elements, and establishes a synchronous relationship between the element coordinates and the watermarked bits using a mapping mechanism, by which the watermarking robustness is effectively enhanced. …”
    Get full text
    Article
  12. 15592

    Multiple-analysis correlation study between human psychological variables and binary random events by Hartmut Grote

    Published 2017-06-01
    “…The study comprises a total of 720000 bits from 20 equal sessions each on a different human participant. …”
    Get full text
    Article
  13. 15593

    Novel Algorithm for Multi-Time Data Implantation in a Special Cyber-Manufacturing Architecture by Mahbubun Nahar, A. H. M. Kamal, Md Rafiul Hassan, Mohammad Ali Moni

    Published 2022-09-01
    “…The number of implanted bits is no more than the length of nucleotides, however, these schemes expand the stego DNA sequence noticeably. …”
    Get full text
    Article
  14. 15594

    Cross-World Covert Channel on ARM Trustzone through PMU by Xinyao Li, Akhilesh Tyagi

    Published 2022-09-01
    “…This proposed finer-grained microarchitecture event encoding covert channel can achieve throughput of the order of 11 Kbits/s as opposed to previous work’s throughput of the order of 760 bits/s.…”
    Get full text
    Article
  15. 15595

    Virgil re-purposed in the Old French «Roman d’Eneas» by Raymond Cormier

    Published 2015-07-01
    “…<div class="page"><div class="layoutArea"><div class="column"><p><span>In these pages, I deal with three “sticky bits” in the twelfth-century </span><em>Roman d’Eneas </em><span>(vv. 483-496, 534-539, and 9792-9814). …”
    Get full text
    Article
  16. 15596

    Quantum AI and hybrid simulators for a Universal Quantum Field Computation Model by Philip Baback Alipour, Thomas Aaron Gulliver

    Published 2023-12-01
    “…A quantum-classical hybrid model of processors via QAI, classifies and predicts states by decoding qubits into classical bits. For example, a QDF as a quantum field computation model (QFCM) in IBM-QE, performs the doubling of P|ij〉 for a strong state prediction outcome. …”
    Get full text
    Article
  17. 15597

    Quantum Machine Learning Revolution in Healthcare: A Systematic Review of Emerging Perspectives and Applications by Ubaid Ullah, Begonya Garcia-Zapirain

    Published 2024-01-01
    “…It leverages the power of quantum bits (qubits) and harnesses the unique properties exhibited by subatomic particles, such as superposition, entanglement, and interference. …”
    Get full text
    Article
  18. 15598

    Problems Experienced by Babies Between 4-36 Months During Teething Process and the Practices Made by Mothers by Zeynep Erkut, Selmin Köse, Fatma Dumandağ

    Published 2021-12-01
    “…It was found that most babies (95.9%) had at least one problem during teething and the most common problems were restlessness (76.6%), redness and itching of the gums (64.8%), increased bitting and chewing (55.2%), increased salivation (52.4%), sleeplessness (49.7%) and fever (48.3%). …”
    Get full text
    Article
  19. 15599
  20. 15600

    Análise Microestrutural de Arenito da Formação Rio do Rasto pela Microtomografia Computadorizada por raios X by Alisson Henrique Dal Col, Paulo Henrique Gali, Carlos Roberto Appoloni

    Published 2016-08-01
    “…Aplicado o limiar médio de 67(2) em uma escala de cores de 8 bits, se obteve – pelo software Imago – uma porosidade absoluta de 13,54(66) %, onde 12,58(74) % são poros conectados. …”
    Get full text
    Article