Showing 15,601 - 15,620 results of 16,001 for search '"bit"', query time: 0.13s Refine Results
  1. 15601
  2. 15602

    Inactive Region Filling Method for Efficient Compression Using Reinforcement Learning by Dongsin Kim, Kutub Uddin, Byung Tae Oh

    Published 2023-01-01
    “…Immersive video includes 3D information having a huge number of bits. Thus, a special coding standard is required to compress immersive video e.g., 360 and point cloud videos. …”
    Get full text
    Article
  3. 15603

    The Items of Armament and Horse Harness of Early Scythian Culture, Found near the Alekseevsky Hamlet of the Stavropol Region by Yuriy A. Prokopenko

    Published 2018-04-01
    “…The items include large rhombic arrowheads, bronze rings with a movable clutch, bronze horse bits with stape ends, bronze cheek-pieces with three cylinder-couplings in the rod, cylindrical strings of beads and metal platelets. …”
    Get full text
    Article
  4. 15604

    Extending NMR Quantum Computation Systems by Employing Compounds with Several Heavy Metals as Qubits by Jéssica Boreli dos Reis Lino, Mateus Aquino Gonçalves, Stephan P. A. Sauer, Teodorico Castro Ramalho

    Published 2022-04-01
    “…Currently, this technique is also being used as an experimental quantum simulator, where nuclear spins are employed as quantum bits or qubits. The present work is devoted to studying heavy metal complexes as possible candidates to act as qubit molecules. …”
    Get full text
    Article
  5. 15605

    Wide Band Beam Steering Digital Metasurface Reflectarray Antenna for Millimeter Wave Applications by Gazali Bashir, Amit K. Singh, Ankit Dubey

    Published 2023-01-01
    “…The metabit is quantized to generate two discrete reflection phase levels, resulting in binary states of 0 and 1, respectively. The binary bits are distributed over the reflector surface using uniform phase quantization to achieve a highly directive beam in the desired direction. …”
    Get full text
    Article
  6. 15606

    Innovative Decentralized Configuration Design of Chipless RFID Tag: Toward a Cost-Effective and Efficient Code Density by Yassin Abdullah, Muhammad Ali Riaz

    Published 2023-01-01
    “…The number of generated resonating modes (N) is mathematically obtained by N=2n-1, such (n) is the resonating elements number. An 11-bits data capacity is presented in the proposed tag within a physical dimension of <inline-formula> <tex-math notation="LaTeX">$10\times10$ </tex-math></inline-formula> mm2, resulting high data density of 11 b/cm2. …”
    Get full text
    Article
  7. 15607

    A novel approach for transcription factor analysis using SELEX with high-throughput sequencing (TFAST). by Daniel J Reiss, Frederick M Howard, Harry L T Mobley

    Published 2012-01-01
    “…Separating peaks by TFAST into classes of worst, second-best and best candidate peaks revealed a trend of increasing significance (e-values 4.5 × 10(12), 2.9 × 10(-46), and 1.2 × 10(-73)) and informational content (11.0, 11.9, and 12.5 bits over 15 bp) of discovered motifs within each respective class. …”
    Get full text
    Article
  8. 15608

    Post-Quantum Biometric Authentication Based on Homomorphic Encryption and Classic McEliece by Rosario Arjona, Paula López-González, Roberto Román, Iluminada Baturone

    Published 2023-01-01
    “…Experimental results with public databases show that the proposed scheme improves the accuracy and the False-Acceptance Rate of the unprotected scheme, maintaining the False-Rejection Rate, allows real-time execution in clients and servers for Classic McEliece security parameter sets of 128 and 256 bits (mceliece348864 and mceliece6688128, respectively), and reduces storage requirements in more than 90.5% compared to the most reduced-size homomorphic encryption-based schemes with post-quantum security reported in the literature.…”
    Get full text
    Article
  9. 15609

    Aperture-Fed Quad-Port Dual-Band Dielectric Resonator-MIMO Antenna for Sub-6 GHz 5G and WLAN Application by Trushit Upadhyaya, Ikmo Park, Rajat Pandey, Upesh Patel, Killol Pandya, Arpan Desai, Jayesh Pabari, Gangil Byun, Yogeshwar Kosta

    Published 2022-01-01
    “…The optimum envelope correlation coefficient (ECC) is 0.037, channel capacity coss (CCL) is 0.2 bits/sec/Hz, diversity gain (DG) is 9.99 dB, and total active reflection coefficient (TARC) is −18.87. …”
    Get full text
    Article
  10. 15610
  11. 15611

    Four-Port Dual-Band Multiple-Input Multiple-Output Dielectric Resonator Antenna for Sub-6 GHz 5G Communication Applications by Upesh Patel, Trushit Upadhyaya

    Published 2022-11-01
    “…The optimal envelope correlation coefficient (ECC) is 0.01, channel capacity loss (CCL) is 0.1 bits/sec/Hz, and the total active reflection coefficient (TARC) is −22.46. …”
    Get full text
    Article
  12. 15612

    Fundamental Limits of Coded Caching in Request-Robust D2D Communication Networks by Wuqu Wang, Zhe Tao, Nan Liu, Wei Kang

    Published 2024-03-01
    “…The objective is to minimize the average and worst-case delivery rate, i.e., the average and worst-case number of broadcast bits from all users among all possible demands. For this novel D2D coded caching problem, we propose a scheme based on uncoded cache placement and exploiting common demands and one-shot delivery. …”
    Get full text
    Article
  13. 15613
  14. 15614
  15. 15615

    Impact style of the changeable resistance in the development some of physical & functional changes for the National team for the badminton by Abeer Dakhil Hatim

    Published 2019-04-01
    “… The most better activities  of sports that Badminton  which develop the physical fitness , and the game needs the competition and more running and jumping  as well as , the fast  reaction and balance movement to association between the eyes and hands , hereby it needs to high felling and moving , specially when practice the extensive bits in the jumping or supporting , the player should be recognized the time of the ball when sending or receiving from the adversary . …”
    Get full text
    Article
  16. 15616

    A Sponge-Based Key Expansion Scheme for Modern Block Ciphers by Maciej Sawka, Marcin Niemiec

    Published 2022-09-01
    “…Based on the results of tests, we conclude that, while more research and more testing of the algorithm is advised, the proposed key expansion scheme provides a very good generation of unpredictable bits and could possibly be used in practice.…”
    Get full text
    Article
  17. 15617
  18. 15618

    B-Lynch Suture Management among Patients with Postpartum Hemorrhage in a Tertiary Care Centre: A Descriptive Cross-sectional Study by Poonam Koirala, Asmita Ghimire, Kesang Diki Bista

    Published 2023-02-01
    “…Patients with traumatic post-partum haemorrhage, congenital malformations, complete placenta previa/accreta, bleeding disorders, disseminated intravascular coagulation, and retained bits of placenta were excluded from the study. A convenience sampling method was used. …”
    Get full text
    Article
  19. 15619

    Generalization of Fibonacci Codes to the Non-Binary Case by Shmuel T. Klein, Tamar C. Serebro, Dana Shapira

    Published 2022-01-01
    “…Motivated by expected technological developments in which the basic unit of storage might possibly be <inline-formula> <tex-math notation="LaTeX">$d$ </tex-math></inline-formula>-ary elements, with <inline-formula> <tex-math notation="LaTeX">$d &gt; 2$ </tex-math></inline-formula>, and not just bits, we extend the traditional Fibonacci code to non-binary codes of higher order, and prove their theoretical properties, as follows: (1) these codes are fixed in advance, and therefore do not need to be generated for each new probability distribution, yielding very simple and fast encoding and decoding procedures; (2) the codes are prefix-free: no codeword in the code is the prefix of any other codeword; (3) the codes are complete: if one adjoins any other <inline-formula> <tex-math notation="LaTeX">$d$ </tex-math></inline-formula>-ary string as an additional codeword, the obtained extended set of codewords is not uniquely decipherable anymore, and is therefore not useful as it might lead to ambiguities; and (4) the codes provide robustness against decoding errors: the number of lost codewords in case of an error will be limited. …”
    Get full text
    Article
  20. 15620

    البناء الرقمي لخوارزميات أنظمة القيادة الكهربائية باستخدام المتحكمات الصغرية by أحمد عمار نعساني, محمد ناصيف

    Published 2019-01-01
    “…Les résultats de simulation, utilisant l’environnement Matlab-Simulink et les résultats expérimentaux réalisés sur la carte STK500, montrent la possibilité d’implanter des algorithmes complexes dans une cible microcontrôleur à virgule fixe dont les registres sont à 8bits. …”
    Get full text
    Article