Showing 221 - 240 results of 702 for search '"bit"', query time: 0.04s Refine Results
  1. 221

    Multivariate Rayleigh, Rice, and Nakagami distributions and their applications in communication theory by Yu. A. Brychkov, N. V. Savischenko

    Published 2024-07-01
    “…A method was developed to calculate the symbol and bit error probabilities for coherent diversity reception of multi-position signal structures in a communication channel with additive white Gaussian noise (AWGN) and general fading described by the multivariate Rayleigh and Nakagami distributions, as well as the bivariate Rice distribution.…”
    Get full text
    Article
  2. 222

    ŽUPNIČKA DJELATNOST ŠIME STARČEVIĆA by MILE BOGOVIĆ

    Published 2013-01-01
    “…Starčevićeva druga djelatnost bit će spomenuta samo u slučaju da se radi o podatcima koji nisu drugdje zabilježeni i objavljeni.…”
    Get full text
    Article
  3. 223

    Classification of All Associative Mono-n-ary Algebras with 2 Elements by Stephan Dominique Andres

    Published 2009-01-01
    “…An application concerning the assignment of a control bit to a string is given.…”
    Get full text
    Article
  4. 224

    Efficient TTI for 3G Multimedia Applications by Costas Chaikalis

    Published 2007-01-01
    “…It is shown that different operating environments require an appropriate TTI in terms of bit error rate (BER) performance for the following data rates: 28.8 kbps, 64 kbps, 144 kbps, 384 kbps, and 2 Mbps.…”
    Get full text
    Article
  5. 225

    Healthy Eating: Create Your Plate! by Jennifer Hillan, Linda B. Bobroff

    Published 2011-09-01
    “…The way you ‘create your plate’ to balance carbohydrates for blood glucose control is a bit different from the MyPlate recommendations. …”
    Get full text
    Article
  6. 226

    A Study of the Source Traffic Generator Using Poisson Distribution for ABR Service by Mohsen Hosamo

    Published 2012-01-01
    “…This paper describes modeling of the available bit rate (ABR) source traffic in asynchronous transfer mode (ATM) network using BLPos/GTEXP traffic generator, which employs Poisson distribution for modeling the burst length (BLPos) and exponential distribution for modeling the gap time (GTEXP). …”
    Get full text
    Article
  7. 227

    Healthy Eating: Create Your Plate! by Jennifer Hillan, Linda B. Bobroff

    Published 2011-09-01
    “…The way you ‘create your plate’ to balance carbohydrates for blood glucose control is a bit different from the MyPlate recommendations. …”
    Get full text
    Article
  8. 228

    Osiguranje odgovornosti marine – pogled iz prakse by Ines Bezić

    Published 2024-01-01
    “…Na kraju, u posljednjem dijelu bit će izložena zaključna razmatranja.…”
    Get full text
    Article
  9. 229

    SpaceCAM: A 16 nm FinFET Low-Power Soft-Error Tolerant TCAM Design for Space Communication Applications by Itay Merlin, Benjamin Zambrano, Marco Lanuzza, Alexander Fish, Avner Haran, Leonid Yavits

    Published 2025-01-01
    “…It tolerates up to 5 soft errors per 144-bit row, provided the minimum Hamming distance between stored data patterns (such as the Active Control List (ACL) rules) is 26. …”
    Get full text
    Article
  10. 230

    A STEGENOGRAPHY IN 3D MESH BY REARRANGING THE ORDER OF VERTEX PRESENTATION by Thái Duy Quý

    Published 2013-06-01
    “…This method also ensures the safety of data; each application can embed a little bit per vertex that not changes to the cover objects.…”
    Get full text
    Article
  11. 231

    On the Performance of Rate-Compatible LDPC Codes under All-Integer Quantization Decoding by Patinya Muangkammuen, Wongpram Vongjampa, Puripong Suthisopapan

    Published 2022-01-01
    “…It is found in this work that the utilization of 4-bit all-integer quantization for MSA-based LDPC decoder is adequate to achieve the decoding performance of the nonquantized case which can be considered as the lower bound on the decoding performance. …”
    Get full text
    Article
  12. 232

    Shopping for Health: A Menu for One by Morgan Denhard, Wendy Dahl

    Published 2013-04-01
    “…Whether you pop a dish into the microwave after a busy day or spend time cooking a special meal for yourself, shopping for and preparing healthy, low-cost meals for one can be easy and enjoyable with just a little bit of planning. This 4-page fact sheet was written by Morgan Denhard and Wendy Dahl and published by the UF Department of Food Science and Human Nutrition, February 2013. …”
    Get full text
    Article
  13. 233

    An Efficient Code-Based One-Time Blind Signature Scheme for Electronic Forensics by Haiyan Xiu, Fang Ren, Xinglong Xue, Dong Zheng

    Published 2024-01-01
    “…The analysis proves that the scheme is secure and meets the requirements of completeness, blindness, and one-more unforgeability. Under the 128-bit security level, our scheme can achieve a signature length of 2.1 kB. …”
    Get full text
    Article
  14. 234

    The art of failure in translating a Navajo poem by Anthony K. Webster

    Published 2016-10-01
    “…I then engage in a creative transposition, or more precisely a failure, of the poem, and engage in a bit of exegesis and philology about the poem. The goal is to bring a concern with voice into dialogue with a concern with theorizations of translation. …”
    Get full text
    Article
  15. 235

    Breaking barriers in two-party quantum cryptography via stochastic semidefinite programming by Akshay Bansal, Jamie Sikora

    Published 2025-01-01
    “…For example, we find a way to switch between bit commitment, weak coin flipping, and oblivious transfer protocols to improve their security. …”
    Get full text
    Article
  16. 236

    A Fast Algorithm for Computing Binomial Coefficients Modulo Powers of Two by Mugurel Ionut Andreica

    Published 2013-01-01
    “…denotes the time complexity of multiplying two -bit numbers, which can range from to or better. …”
    Get full text
    Article
  17. 237
  18. 238

    CFO-CR: Carrier Frequency Offset Methodology for High-Rate Common Randomness Generation by Prashanth Kumar Herooru Sheshagiri, Martin Reisslein, Juan A. Cabrera, Frank H. P. Fitzek

    Published 2025-01-01
    “…We provide insights into the tradeoffs between the reconciliation cost for correcting bit discrepancies and the CR generation parameters. …”
    Get full text
    Article
  19. 239

    An Iteration-Time Combination Method to Reduce the Dynamic Degradation of Digital Chaotic Maps by Yao Wu, Lingfeng Liu

    Published 2020-01-01
    “…A type of pseudorandom bit generator based on the iteration-time combination method is proposed to demonstrate its simple application.…”
    Get full text
    Article
  20. 240

    Image Encryption Performance Evaluation Based on Poker Test by Shanshan Li, Weiyang Sun

    Published 2016-01-01
    “…The cipher text image is transformed to bit stream. Then, Poker Test is implemented. The proposed metric considers the neighbor correlations of image by neighborhood selection and clip scan. …”
    Get full text
    Article