-
221
Multivariate Rayleigh, Rice, and Nakagami distributions and their applications in communication theory
Published 2024-07-01“…A method was developed to calculate the symbol and bit error probabilities for coherent diversity reception of multi-position signal structures in a communication channel with additive white Gaussian noise (AWGN) and general fading described by the multivariate Rayleigh and Nakagami distributions, as well as the bivariate Rice distribution.…”
Get full text
Article -
222
ŽUPNIČKA DJELATNOST ŠIME STARČEVIĆA
Published 2013-01-01“…Starčevićeva druga djelatnost bit će spomenuta samo u slučaju da se radi o podatcima koji nisu drugdje zabilježeni i objavljeni.…”
Get full text
Article -
223
Classification of All Associative Mono-n-ary Algebras with 2 Elements
Published 2009-01-01“…An application concerning the assignment of a control bit to a string is given.…”
Get full text
Article -
224
Efficient TTI for 3G Multimedia Applications
Published 2007-01-01“…It is shown that different operating environments require an appropriate TTI in terms of bit error rate (BER) performance for the following data rates: 28.8 kbps, 64 kbps, 144 kbps, 384 kbps, and 2 Mbps.…”
Get full text
Article -
225
Healthy Eating: Create Your Plate!
Published 2011-09-01“…The way you ‘create your plate’ to balance carbohydrates for blood glucose control is a bit different from the MyPlate recommendations. …”
Get full text
Article -
226
A Study of the Source Traffic Generator Using Poisson Distribution for ABR Service
Published 2012-01-01“…This paper describes modeling of the available bit rate (ABR) source traffic in asynchronous transfer mode (ATM) network using BLPos/GTEXP traffic generator, which employs Poisson distribution for modeling the burst length (BLPos) and exponential distribution for modeling the gap time (GTEXP). …”
Get full text
Article -
227
Healthy Eating: Create Your Plate!
Published 2011-09-01“…The way you ‘create your plate’ to balance carbohydrates for blood glucose control is a bit different from the MyPlate recommendations. …”
Get full text
Article -
228
Osiguranje odgovornosti marine – pogled iz prakse
Published 2024-01-01“…Na kraju, u posljednjem dijelu bit će izložena zaključna razmatranja.…”
Get full text
Article -
229
SpaceCAM: A 16 nm FinFET Low-Power Soft-Error Tolerant TCAM Design for Space Communication Applications
Published 2025-01-01“…It tolerates up to 5 soft errors per 144-bit row, provided the minimum Hamming distance between stored data patterns (such as the Active Control List (ACL) rules) is 26. …”
Get full text
Article -
230
A STEGENOGRAPHY IN 3D MESH BY REARRANGING THE ORDER OF VERTEX PRESENTATION
Published 2013-06-01“…This method also ensures the safety of data; each application can embed a little bit per vertex that not changes to the cover objects.…”
Get full text
Article -
231
On the Performance of Rate-Compatible LDPC Codes under All-Integer Quantization Decoding
Published 2022-01-01“…It is found in this work that the utilization of 4-bit all-integer quantization for MSA-based LDPC decoder is adequate to achieve the decoding performance of the nonquantized case which can be considered as the lower bound on the decoding performance. …”
Get full text
Article -
232
Shopping for Health: A Menu for One
Published 2013-04-01“…Whether you pop a dish into the microwave after a busy day or spend time cooking a special meal for yourself, shopping for and preparing healthy, low-cost meals for one can be easy and enjoyable with just a little bit of planning. This 4-page fact sheet was written by Morgan Denhard and Wendy Dahl and published by the UF Department of Food Science and Human Nutrition, February 2013. …”
Get full text
Article -
233
An Efficient Code-Based One-Time Blind Signature Scheme for Electronic Forensics
Published 2024-01-01“…The analysis proves that the scheme is secure and meets the requirements of completeness, blindness, and one-more unforgeability. Under the 128-bit security level, our scheme can achieve a signature length of 2.1 kB. …”
Get full text
Article -
234
The art of failure in translating a Navajo poem
Published 2016-10-01“…I then engage in a creative transposition, or more precisely a failure, of the poem, and engage in a bit of exegesis and philology about the poem. The goal is to bring a concern with voice into dialogue with a concern with theorizations of translation. …”
Get full text
Article -
235
Breaking barriers in two-party quantum cryptography via stochastic semidefinite programming
Published 2025-01-01“…For example, we find a way to switch between bit commitment, weak coin flipping, and oblivious transfer protocols to improve their security. …”
Get full text
Article -
236
A Fast Algorithm for Computing Binomial Coefficients Modulo Powers of Two
Published 2013-01-01“…denotes the time complexity of multiplying two -bit numbers, which can range from to or better. …”
Get full text
Article -
237
Thermal Decomposition Kinetics of Labile Chromium Complex with Benzoic Acid
Published 2011-01-01Get full text
Article -
238
CFO-CR: Carrier Frequency Offset Methodology for High-Rate Common Randomness Generation
Published 2025-01-01“…We provide insights into the tradeoffs between the reconciliation cost for correcting bit discrepancies and the CR generation parameters. …”
Get full text
Article -
239
An Iteration-Time Combination Method to Reduce the Dynamic Degradation of Digital Chaotic Maps
Published 2020-01-01“…A type of pseudorandom bit generator based on the iteration-time combination method is proposed to demonstrate its simple application.…”
Get full text
Article -
240
Image Encryption Performance Evaluation Based on Poker Test
Published 2016-01-01“…The cipher text image is transformed to bit stream. Then, Poker Test is implemented. The proposed metric considers the neighbor correlations of image by neighborhood selection and clip scan. …”
Get full text
Article