-
15601
Relationship between mean platelet volume and ischemic stroke in patients with patent foramen ovale
Published 2017-01-01Get full text
Article -
15602
Inactive Region Filling Method for Efficient Compression Using Reinforcement Learning
Published 2023-01-01“…Immersive video includes 3D information having a huge number of bits. Thus, a special coding standard is required to compress immersive video e.g., 360 and point cloud videos. …”
Get full text
Article -
15603
The Items of Armament and Horse Harness of Early Scythian Culture, Found near the Alekseevsky Hamlet of the Stavropol Region
Published 2018-04-01“…The items include large rhombic arrowheads, bronze rings with a movable clutch, bronze horse bits with stape ends, bronze cheek-pieces with three cylinder-couplings in the rod, cylindrical strings of beads and metal platelets. …”
Get full text
Article -
15604
Extending NMR Quantum Computation Systems by Employing Compounds with Several Heavy Metals as Qubits
Published 2022-04-01“…Currently, this technique is also being used as an experimental quantum simulator, where nuclear spins are employed as quantum bits or qubits. The present work is devoted to studying heavy metal complexes as possible candidates to act as qubit molecules. …”
Get full text
Article -
15605
Wide Band Beam Steering Digital Metasurface Reflectarray Antenna for Millimeter Wave Applications
Published 2023-01-01“…The metabit is quantized to generate two discrete reflection phase levels, resulting in binary states of 0 and 1, respectively. The binary bits are distributed over the reflector surface using uniform phase quantization to achieve a highly directive beam in the desired direction. …”
Get full text
Article -
15606
Innovative Decentralized Configuration Design of Chipless RFID Tag: Toward a Cost-Effective and Efficient Code Density
Published 2023-01-01“…The number of generated resonating modes (N) is mathematically obtained by N=2n-1, such (n) is the resonating elements number. An 11-bits data capacity is presented in the proposed tag within a physical dimension of <inline-formula> <tex-math notation="LaTeX">$10\times10$ </tex-math></inline-formula> mm2, resulting high data density of 11 b/cm2. …”
Get full text
Article -
15607
A novel approach for transcription factor analysis using SELEX with high-throughput sequencing (TFAST).
Published 2012-01-01“…Separating peaks by TFAST into classes of worst, second-best and best candidate peaks revealed a trend of increasing significance (e-values 4.5 × 10(12), 2.9 × 10(-46), and 1.2 × 10(-73)) and informational content (11.0, 11.9, and 12.5 bits over 15 bp) of discovered motifs within each respective class. …”
Get full text
Article -
15608
Post-Quantum Biometric Authentication Based on Homomorphic Encryption and Classic McEliece
Published 2023-01-01“…Experimental results with public databases show that the proposed scheme improves the accuracy and the False-Acceptance Rate of the unprotected scheme, maintaining the False-Rejection Rate, allows real-time execution in clients and servers for Classic McEliece security parameter sets of 128 and 256 bits (mceliece348864 and mceliece6688128, respectively), and reduces storage requirements in more than 90.5% compared to the most reduced-size homomorphic encryption-based schemes with post-quantum security reported in the literature.…”
Get full text
Article -
15609
Aperture-Fed Quad-Port Dual-Band Dielectric Resonator-MIMO Antenna for Sub-6 GHz 5G and WLAN Application
Published 2022-01-01“…The optimum envelope correlation coefficient (ECC) is 0.037, channel capacity coss (CCL) is 0.2 bits/sec/Hz, diversity gain (DG) is 9.99 dB, and total active reflection coefficient (TARC) is −18.87. …”
Get full text
Article -
15610
-
15611
Four-Port Dual-Band Multiple-Input Multiple-Output Dielectric Resonator Antenna for Sub-6 GHz 5G Communication Applications
Published 2022-11-01“…The optimal envelope correlation coefficient (ECC) is 0.01, channel capacity loss (CCL) is 0.1 bits/sec/Hz, and the total active reflection coefficient (TARC) is −22.46. …”
Get full text
Article -
15612
Fundamental Limits of Coded Caching in Request-Robust D2D Communication Networks
Published 2024-03-01“…The objective is to minimize the average and worst-case delivery rate, i.e., the average and worst-case number of broadcast bits from all users among all possible demands. For this novel D2D coded caching problem, we propose a scheme based on uncoded cache placement and exploiting common demands and one-shot delivery. …”
Get full text
Article -
15613
Field-Validated Communication Systems for Smart Microgrid Energy Management in a Rural Microgrid Cluster
Published 2021-10-01Get full text
Article -
15614
-
15615
Impact style of the changeable resistance in the development some of physical & functional changes for the National team for the badminton
Published 2019-04-01“… The most better activities of sports that Badminton which develop the physical fitness , and the game needs the competition and more running and jumping as well as , the fast reaction and balance movement to association between the eyes and hands , hereby it needs to high felling and moving , specially when practice the extensive bits in the jumping or supporting , the player should be recognized the time of the ball when sending or receiving from the adversary . …”
Get full text
Article -
15616
A Sponge-Based Key Expansion Scheme for Modern Block Ciphers
Published 2022-09-01“…Based on the results of tests, we conclude that, while more research and more testing of the algorithm is advised, the proposed key expansion scheme provides a very good generation of unpredictable bits and could possibly be used in practice.…”
Get full text
Article -
15617
-
15618
B-Lynch Suture Management among Patients with Postpartum Hemorrhage in a Tertiary Care Centre: A Descriptive Cross-sectional Study
Published 2023-02-01“…Patients with traumatic post-partum haemorrhage, congenital malformations, complete placenta previa/accreta, bleeding disorders, disseminated intravascular coagulation, and retained bits of placenta were excluded from the study. A convenience sampling method was used. …”
Get full text
Article -
15619
Generalization of Fibonacci Codes to the Non-Binary Case
Published 2022-01-01“…Motivated by expected technological developments in which the basic unit of storage might possibly be <inline-formula> <tex-math notation="LaTeX">$d$ </tex-math></inline-formula>-ary elements, with <inline-formula> <tex-math notation="LaTeX">$d > 2$ </tex-math></inline-formula>, and not just bits, we extend the traditional Fibonacci code to non-binary codes of higher order, and prove their theoretical properties, as follows: (1) these codes are fixed in advance, and therefore do not need to be generated for each new probability distribution, yielding very simple and fast encoding and decoding procedures; (2) the codes are prefix-free: no codeword in the code is the prefix of any other codeword; (3) the codes are complete: if one adjoins any other <inline-formula> <tex-math notation="LaTeX">$d$ </tex-math></inline-formula>-ary string as an additional codeword, the obtained extended set of codewords is not uniquely decipherable anymore, and is therefore not useful as it might lead to ambiguities; and (4) the codes provide robustness against decoding errors: the number of lost codewords in case of an error will be limited. …”
Get full text
Article -
15620
البناء الرقمي لخوارزميات أنظمة القيادة الكهربائية باستخدام المتحكمات الصغرية
Published 2019-01-01“…Les résultats de simulation, utilisant l’environnement Matlab-Simulink et les résultats expérimentaux réalisés sur la carte STK500, montrent la possibilité d’implanter des algorithmes complexes dans une cible microcontrôleur à virgule fixe dont les registres sont à 8bits. …”
Get full text
Article