Showing 221 - 240 results of 1,322 for search '"bit"', query time: 0.05s Refine Results
  1. 221
  2. 222
  3. 223
  4. 224
  5. 225
  6. 226
  7. 227
  8. 228
  9. 229
  10. 230

    Improving breaking efficiency of hard rock: Research on the mechanism of impact-shear rock breaking technology by Pei Ju, Dongzhuang Tian

    Published 2025-01-01
    “…The RHT constitutive model was used to describe the structural behavior of rock, and the rock-breaking simulation model of full-size bit was established. Compared with PDC bit and hammer bit, the rock-breaking force, bit torque, and rock stress characteristics of impact-shear bit were analyzed. …”
    Get full text
    Article
  11. 231

    A fully differential switched‐capacitor integrator based programmable resolution hybrid ADC architecture for biomedical applications by Sreenivasulu Polineni, Rekha S., M. S. Bhat

    Published 2021-03-01
    “…The hybrid ADC operates in SAR mode from 8‐bit to 11‐bit resolutions and as the first‐order DSM with a multi‐bit quantizer in 12‐bit to 15‐bit resolutions. …”
    Get full text
    Article
  12. 232

    Exploiting bias in optimal finite-time copying protocols by Daan Mulder, Pieter Rein ten Wolde, Thomas E. Ouldridge

    Published 2025-02-01
    “…We study a finite-time cyclic copy protocol that creates persisting correlations between a memory and a data bit. The average work to copy the two states of the data bit consists of the mutual information created between the memory and data bit after copying, a cost due to the difference between the initial and final states of the memory bit, and a finite-time cost. …”
    Get full text
    Article
  13. 233

    Psychometric properties of the English and Hindi versions of the Brief Inventory of Thriving for use among Indian adolescents by Usama Ghayas Syed, Shikha Dixit, Margaret L. Kern

    Published 2024-12-01
    “…The present study investigated the unidimensional structure, internal consistency, convergent/discriminant, and criterion validity of both the original English version of the BIT (BIT-E) and its Hindi-translated version (BIT-H) among adolescents in India. …”
    Get full text
    Article
  14. 234

    Polarization-based puncturing pattern selection of shortened Polar code by Shunlan LIU, Aiming HU, Jianrong BAO

    Published 2019-02-01
    “…In order to solve the problem of inflexible Polar code length,a new puncturing pattern selection scheme based on feedback cost puncturing was proposed to generate shortened Polar codes.In this scheme,the Polarization effect was reserved,the sub-optimal subchannel was selected as the cost bit,the output bit corresponding to the cost bit was used as the puncturing pattern,and then the value of the cost bit is adjusted by feedback to obtain the shortened Polar code.Simulation results show that the performance of the proposed shortened Polar code is better than that of the shortened Polar code generated by bit-reversal permutation method,and the shortened Polar codes generated by direct puncturing method at the end under different channel and code rate conditions,and slightly weaker than that of the shortened Polar code proposed by Wang R and Liu R et al.In the AGWN channel,when the block error rate is 10<sup>-3</sup>,the proposed shortened Polar code with a code rate of 0.5 can obtain a gain of 0.5 dB compared with the shortened Polar code generated by bit-reversal permutation method,and the coding performance is greatly improved.…”
    Get full text
    Article
  15. 235

    Construction of diffusion layers based on cipher structures by Peng-fei LI

    Published 2017-06-01
    “…Taked diffusion layers of block cipher algorithms as the research object,lightweight diffusion layers were constructed by two cipher structures based on the characteristics of diffusion layers of lightweight block cipher algorithms,which were the construction of software-oriented diffusion layers based on Feistel structure and the construction of hardware-oriented diffusion layers based on LFSR.Lightweight involution diffusion layers with branch numbers 7 over eight 4-bit and 8-bit S-boxes were constructed by 3-round Feistel structure and the round functions adopt linear transformations with rotation and XORs.Some suboptimal diffusion layers over four 4 bit and 8 bit S-boxes and diffusion layers with branch numbers 7 over eight 4 bit and 8 bit S boxes based on LFSR were constructed.In addition,6,7,8 dimension MDBL matrices and many 16,18,32 dimension binary matrices with big dimension and branch numbers 7,7,12 based on LFSR were constructed.The experimental results have high practical significance in realm of the design of block cipher algorithms.…”
    Get full text
    Article
  16. 236

    Assessing the effect of deposited bitumen or asphaltenes on the nitrification process in the north saskatchewan river sediment by Nayereh Saborimanesh, Patricia Q. Tran, Md Hosnay Mobarok

    Published 2025-04-01
    “…This study aimed to (1) examine the effects of deposited bitumen (Bit) and asphaltene (Asp) on the North Saskatchewan River (NSR) water quality, focusing on organic carbon and nitrogen; (2) assess the impact of Bit or Asp on sedimentary nitrification; and (3) explore the response of the microbial community to Bit or Asp. …”
    Get full text
    Article
  17. 237

    Accounting Data Encryption Processing Based on Data Encryption Standard Algorithm by Meixi Chen

    Published 2021-01-01
    “…As a block encryption algorithm, the Data Encryption Standard (DES) algorithm uses 64-bit packet data for encryption and decryption. Each eighth bit of the key is used as a parity bit; that is, the actual key length is 56 bits. …”
    Get full text
    Article
  18. 238

    Analysis and Design of an Energy Efficient Differential Coherent Chaos Based System in Additive White Gaussian Noise Environment by Nizar Al Bassam, Oday D. Jerew

    Published 2017-01-01
    “…The proposed scheme provides reduction in bit energy and better bit error performance at large spreading factor. …”
    Get full text
    Article
  19. 239

    An empirical study of LLaMA3 quantization: from LLMs to MLLMs by Wei Huang, Xingyu Zheng, Xudong Ma, Haotong Qin, Chengtao Lv, Hong Chen, Jie Luo, Xiaojuan Qi, Xianglong Liu, Michele Magno

    Published 2024-12-01
    “…Given the wide application of low-bit quantization for LLMs in resource-constrained scenarios, we explore LLaMA3’s capabilities when quantized to low bit-width. …”
    Get full text
    Article
  20. 240