-
15801
Petrology of ultramafic to mafic cumulate rocks from the Göksun (Kahramanmaraş) ophiolite, southeast Turkey
Published 2020-01-01“…The latter were contemporaneous and genetically/tectonically related within the same SSZ setting during the closure of the Neotethyan oceanic basin (Berit Ocean) between the Taurides to the north and the Bitlis-Pütürge massif to the south during the Late Cretaceous. …”
Get full text
Article -
15802
High Isolated Four Element MIMO Antenna for ISM/LTE/5G (Sub-6GHz) Applications
Published 2023-01-01“…The maximum channel capacity of the four elements is 21.34bits/sec./Hz. Equivalent circuit of the proposed MIMO is discussed in this article and S-parameter has been compared with simulated results and found good agreement between simulated and circuit results. …”
Get full text
Article -
15803
Design of a 900 MHz Dual-Mode SWIPT for Low-Power IoT Devices
Published 2019-10-01“…The ID path could demodulate 4-ASK- and BPSK-modulated signals at the same time, thus receiving 3 bits from the demodulation process. Maximum data rate of 4 Mbps was achieved in the measurement.…”
Get full text
Article -
15804
Feature selection method based on quantum inspired genetic algorithm for Arabic signature verification
Published 2023-03-01“…QIGAs are constructed using quantum computing concepts such as qubits (Q-bits) and superposition of states. QIGA is able to express a linear superposition of solutions with the objective of increasing gene diversity by utilizing the qubit as a representation. …”
Get full text
Article -
15805
Structuring Unreliable Radio Networks
Published 2012“…The algorithm solves the CCDS problem in O(Δ\log[superscript 2] n/b + log[superscript 3] n) rounds, with high probability, where Δ is the maximum degree in the reliable link graph, n is the network size, and b is an upper bound in bits on the message size. The algorithm works by first building a Maximal Independent Set (MIS) in log[superscript 3] n time, and then leveraging the local topology knowledge to efficiently connect nearby MIS processes. …”
Get full text
Get full text
Article -
15806
AM with Multiple Merlins
Published 2014“…We illustrate the power of multiple Merlins by giving an AM(2) protocol for 3SAT, in which the Merlins' challenges and responses consist of only n[superscript 1/2+o(1)] bits each. Our protocol has the consequence that, assuming the Exponential Time Hypothesis (ETH), any algorithm for approximating a dense CSP with a polynomial-size alphabet must take n[superscript (log n)1-o(1)] time. …”
Get full text
Get full text
Get full text
Article -
15807
Local differential privacy-based federated learning for Internet of Things
Published 2021“…The output possibilities of Three-Outputs can be encoded with two bits to reduce the communication cost. Besides, to maximize the performance when the privacy budget is large, an optimal piecewise mechanism (PM-OPT) is proposed. …”
Get full text
Journal Article -
15808
Watermarking of single and multi frame ultrasound medical images
Published 2016“…This dissertation has focused on watermarking of grayscale eight bits single and multi-frame ultrasound medical images. …”
Get full text
Thesis -
15809
Tamper localization and recovery watermarking schemes for medical images in PACS
Published 2011“…The watermarked image can be reversed by restoring the least significant bits (LSBs) in a predefined region of interest (ROI) and regions of non-interest (RONI) to their original states. …”
Get full text
Thesis -
15810
Sustainable Machining of Mg-9Al-1.4Zn Foam Used for Temporary Biomedical Implant Using Cryogenic Cooling
Published 2022-09-01Get full text
Article -
15811
Small Private Exponent Attacks on RSA Using Continued Fractions and Multicore Systems
Published 2022-09-01“…When <i>n</i> is 1024 bits, we used 20 cores to extend the bound of <i>d</i> by <inline-formula><math xmlns="http://www.w3.org/1998/Math/MathML" display="inline"><semantics><mrow><mn>0.016</mn></mrow></semantics></math></inline-formula> for de Weger, Maitra-Sarkar, and Nassr et al. attacks in average times 7.67 h, 2.7 h, and 44 min, respectively.…”
Get full text
Article -
15812
Improvement of Information Transfer Rates Using a Hybrid EEG-NIRS Brain-Computer Interface with a Short Trial Length: Offline and Pseudo-Online Analyses
Published 2018-06-01“…However, with respect to NIRS-BCI, in order to fully induce a task-related brain activation, a relatively long trial length (≥10 s) is selected owing to the inherent hemodynamic delay that lowers the information transfer rate (ITR; bits/min). To alleviate the ITR degradation, we propose a more practical hBCI operated by intuitive mental tasks, such as mental arithmetic (MA) and word chain (WC) tasks, performed within a short trial length (5 s). …”
Get full text
Article -
15813
Low-Resolution ADCs for Two-Hop Massive MIMO Relay System under Rician Channels
Published 2021-08-01“…Moreover, in the two-hop system, when quantization bits <inline-formula><math xmlns="http://www.w3.org/1998/Math/MathML" display="inline"><semantics><mrow><mi>q</mi><mo> </mo><mo>=</mo><mo> </mo><mn>4</mn></mrow></semantics></math></inline-formula>, the achievable sum rate converges. …”
Get full text
Article -
15814
Assessment of the Influence of Instrument Parameters on the Detection Accuracy of Greenhouse-Gases Absorption Spectrometer-2 (GAS-2)
Published 2023-09-01“…Additionally, GAS-2’s radiance quantization depth is 14 bits, which is comparable to similar international payloads and maintains a root mean squared error below 0.1 ppm, thus ensuring a high level of precision. …”
Get full text
Article -
15815
Enhancing Detection of Control State for High-Speed Asynchronous SSVEP-BCIs Using Frequency-Specific Framework
Published 2023-01-01“…Using averaged data length of 591.63±5.65 ms, the online FS system significantly outperformed the FU system and achieved an information transfer rate, true positive rate, false positive rate, and balanced accuracy of 124.95±12.35 bits/min, 93.16±4.4%, 5.21±5.85%, and 92.89±4.02%, respectively. …”
Get full text
Article -
15816
Drilling practice of marine shale gas in Permian Wujiaping Formation in Hongxing area of eastern Sichuan
Published 2023-11-01“…The "three opening" wellbore structure with three different diameters, "irregular tooth PDC and mixed drill bits + high torque equal wall thickness screw + reinforced parameter drilling", simple pressure control by a rotary control head, and low density and strong sealing drilling fluid technology for "both leakage and collapse treatment" were formed. …”
Get full text
Article -
15817
-
15818
Gem5-AVX: Extension of the Gem5 Simulator to Support AVX Instruction Sets
Published 2024-01-01“…It can simulate the key features of the AVX, AVX2 and AVX-512 such as 256 and 512 bits wide registers, three and four operands syntax, fused multiply-add (FMA), vector gather-scatter using vector scale-index-base (VSIB), mask registers, embedded broadcasting, compressed displacement memory addressing mode. …”
Get full text
Article -
15819
How to Support Students in Maximizing their Outcome with Online Cooperation?
Published 2021-10-01“…These tasks consisted of solving combinatory puzzles based on isolated information bits and hints that were distributed among the group members. …”
Get full text
Article -
15820