Showing 15,801 - 15,820 results of 16,001 for search '"bit"', query time: 7.25s Refine Results
  1. 15801

    Petrology of ultramafic to mafic cumulate rocks from the Göksun (Kahramanmaraş) ophiolite, southeast Turkey by Osman Parlak, Utku Bağcı, Tamer Rızaoğlu, Corina Ionescu, Güzide Önal, Volker Höck, Hüseyin Kozlu

    Published 2020-01-01
    “…The latter were contemporaneous and genetically/tectonically related within the same SSZ setting during the closure of the Neotethyan oceanic basin (Berit Ocean) between the Taurides to the north and the Bitlis-Pütürge massif to the south during the Late Cretaceous. …”
    Get full text
    Article
  2. 15802

    High Isolated Four Element MIMO Antenna for ISM/LTE/5G (Sub-6GHz) Applications by Santosh Kumar Mahto, Ajit Kumar Singh, Rashmi Sinha, Mohammad Alibakhshikenari, Salahuddin Khan, Giovanni Pau

    Published 2023-01-01
    “…The maximum channel capacity of the four elements is 21.34bits/sec./Hz. Equivalent circuit of the proposed MIMO is discussed in this article and S-parameter has been compared with simulated results and found good agreement between simulated and circuit results. …”
    Get full text
    Article
  3. 15803

    Design of a 900 MHz Dual-Mode SWIPT for Low-Power IoT Devices by Hamed Abbasizadeh, Sang Yun Kim, Behnam Samadpoor Rikan, Arash Hejazi, Danial Khan, Young Gun Pu, Keum Cheol Hwang, Youngoo Yang, Dong In Kim, Kang-Yoon Lee

    Published 2019-10-01
    “…The ID path could demodulate 4-ASK- and BPSK-modulated signals at the same time, thus receiving 3 bits from the demodulation process. Maximum data rate of 4 Mbps was achieved in the measurement.…”
    Get full text
    Article
  4. 15804

    Feature selection method based on quantum inspired genetic algorithm for Arabic signature verification by Ansam A. Abdulhussien, Mohammad F. Nasrudin, Saad M. Darwish, Zaid Abdi Alkareem Alyasseri

    Published 2023-03-01
    “…QIGAs are constructed using quantum computing concepts such as qubits (Q-bits) and superposition of states. QIGA is able to express a linear superposition of solutions with the objective of increasing gene diversity by utilizing the qubit as a representation. …”
    Get full text
    Article
  5. 15805

    Structuring Unreliable Radio Networks by Censor-Hillel, Keren, Lynch, Nancy Ann, Newport, Calvin Charles

    Published 2012
    “…The algorithm solves the CCDS problem in O(Δ\log[superscript 2] n/b + log[superscript 3] n) rounds, with high probability, where Δ is the maximum degree in the reliable link graph, n is the network size, and b is an upper bound in bits on the message size. The algorithm works by first building a Maximal Independent Set (MIS) in log[superscript 3] n time, and then leveraging the local topology knowledge to efficiently connect nearby MIS processes. …”
    Get full text
    Get full text
    Article
  6. 15806

    AM with Multiple Merlins by Aaronson, Scott, Impagliazzo, Russell, Moshkovitz Aaronson, Dana Hadar

    Published 2014
    “…We illustrate the power of multiple Merlins by giving an AM(2) protocol for 3SAT, in which the Merlins' challenges and responses consist of only n[superscript 1/2+o(1)] bits each. Our protocol has the consequence that, assuming the Exponential Time Hypothesis (ETH), any algorithm for approximating a dense CSP with a polynomial-size alphabet must take n[superscript (log n)1-o(1)] time. …”
    Get full text
    Get full text
    Get full text
    Article
  7. 15807

    Local differential privacy-based federated learning for Internet of Things by Zhao, Yang, Zhao, Jun, Yang, Mengmeng, Wang, Teng, Wang, Ning, Lyu, Lingjuan, Niyato, Dusit, Lam, Kwok-Yan

    Published 2021
    “…The output possibilities of Three-Outputs can be encoded with two bits to reduce the communication cost. Besides, to maximize the performance when the privacy budget is large, an optimal piecewise mechanism (PM-OPT) is proposed. …”
    Get full text
    Journal Article
  8. 15808

    Watermarking of single and multi frame ultrasound medical images by Gran, Badshah

    Published 2016
    “…This dissertation has focused on watermarking of grayscale eight bits single and multi-frame ultrasound medical images. …”
    Get full text
    Thesis
  9. 15809

    Tamper localization and recovery watermarking schemes for medical images in PACS by Liew, Siew Chuin

    Published 2011
    “…The watermarked image can be reversed by restoring the least significant bits (LSBs) in a predefined region of interest (ROI) and regions of non-interest (RONI) to their original states. …”
    Get full text
    Thesis
  10. 15810
  11. 15811

    Small Private Exponent Attacks on RSA Using Continued Fractions and Multicore Systems by Hatem M. Bahig, Dieaa I. Nassr, Mohammed A. Mahdi, Hazem M. Bahig

    Published 2022-09-01
    “…When <i>n</i> is 1024 bits, we used 20 cores to extend the bound of <i>d</i> by <inline-formula><math xmlns="http://www.w3.org/1998/Math/MathML" display="inline"><semantics><mrow><mn>0.016</mn></mrow></semantics></math></inline-formula> for de Weger, Maitra-Sarkar, and Nassr et al. attacks in average times 7.67 h, 2.7 h, and 44 min, respectively.…”
    Get full text
    Article
  12. 15812

    Improvement of Information Transfer Rates Using a Hybrid EEG-NIRS Brain-Computer Interface with a Short Trial Length: Offline and Pseudo-Online Analyses by Jaeyoung Shin, Do-Won Kim, Klaus-Robert Müller, Han-Jeong Hwang

    Published 2018-06-01
    “…However, with respect to NIRS-BCI, in order to fully induce a task-related brain activation, a relatively long trial length (&ge;10 s) is selected owing to the inherent hemodynamic delay that lowers the information transfer rate (ITR; bits/min). To alleviate the ITR degradation, we propose a more practical hBCI operated by intuitive mental tasks, such as mental arithmetic (MA) and word chain (WC) tasks, performed within a short trial length (5 s). …”
    Get full text
    Article
  13. 15813

    Low-Resolution ADCs for Two-Hop Massive MIMO Relay System under Rician Channels by Shujuan Yu, Xinyi Liu, Jian Cao, Yun Zhang

    Published 2021-08-01
    “…Moreover, in the two-hop system, when quantization bits <inline-formula><math xmlns="http://www.w3.org/1998/Math/MathML" display="inline"><semantics><mrow><mi>q</mi><mo> </mo><mo>=</mo><mo> </mo><mn>4</mn></mrow></semantics></math></inline-formula>, the achievable sum rate converges. …”
    Get full text
    Article
  14. 15814

    Assessment of the Influence of Instrument Parameters on the Detection Accuracy of Greenhouse-Gases Absorption Spectrometer-2 (GAS-2) by Shizhao Li, Long Cheng, Hongchun Yang, Zengwei Wang, Lei Ding

    Published 2023-09-01
    “…Additionally, GAS-2’s radiance quantization depth is 14 bits, which is comparable to similar international payloads and maintains a root mean squared error below 0.1 ppm, thus ensuring a high level of precision. …”
    Get full text
    Article
  15. 15815

    Enhancing Detection of Control State for High-Speed Asynchronous SSVEP-BCIs Using Frequency-Specific Framework by Yufeng Ke, Jiale Du, Shuang Liu, Dong Ming

    Published 2023-01-01
    “…Using averaged data length of 591.63&#x00B1;5.65 ms, the online FS system significantly outperformed the FU system and achieved an information transfer rate, true positive rate, false positive rate, and balanced accuracy of 124.95&#x00B1;12.35 bits/min, 93.16&#x00B1;4.4&#x0025;, 5.21&#x00B1;5.85&#x0025;, and 92.89&#x00B1;4.02&#x0025;, respectively. …”
    Get full text
    Article
  16. 15816

    Drilling practice of marine shale gas in Permian Wujiaping Formation in Hongxing area of eastern Sichuan by Jun LI, Heping LU, Xianghui HU, Li WANG, Qing ZHOU, Meng PENG

    Published 2023-11-01
    “…The "three opening" wellbore structure with three different diameters, "irregular tooth PDC and mixed drill bits + high torque equal wall thickness screw + reinforced parameter drilling", simple pressure control by a rotary control head, and low density and strong sealing drilling fluid technology for "both leakage and collapse treatment" were formed. …”
    Get full text
    Article
  17. 15817
  18. 15818

    Gem5-AVX: Extension of the Gem5 Simulator to Support AVX Instruction Sets by Seungmin Lee, Youngsok Kim, Dukyun Nam, Jong Kim

    Published 2024-01-01
    “…It can simulate the key features of the AVX, AVX2 and AVX-512 such as 256 and 512 bits wide registers, three and four operands syntax, fused multiply-add (FMA), vector gather-scatter using vector scale-index-base (VSIB), mask registers, embedded broadcasting, compressed displacement memory addressing mode. …”
    Get full text
    Article
  19. 15819

    How to Support Students in Maximizing their Outcome with Online Cooperation? by Benninghoff Mark J., Isfort Peter, Baumann Martin

    Published 2021-10-01
    “…These tasks consisted of solving combinatory puzzles based on isolated information bits and hints that were distributed among the group members. …”
    Get full text
    Article
  20. 15820