-
221
Processing streams in a monitoring cloud cluster
Published 2020-01-01Subjects: Get full text
Article -
222
Optimal integration of photovoltaic sources and capacitor banks considering irradiance, temperature, and load changes in electric distribution system
Published 2025-01-01Subjects: “…Efficient Metaheuristic BitTorrent (EM-BT) algorithm…”
Get full text
Article -
223
-
224
Clival Ectopic Pituitary Adenoma Mimicking a Chordoma: Case Report and Review of the Literature
Published 2016-01-01Get full text
Article -
225
Performance of Coherent Optical MPSK in Underwater Turbulent Channels With Phase Errors
Published 2025-01-01Subjects: Get full text
Article -
226
-
227
La utilidad didáctica percibida del ChatGPT por parte del alumnado universitario [The educational perceived usefulness of ChatGPT by university students]
Published 2025-01-01“…Pixel-Bit…”
Get full text
Article -
228
-
229
-
230
Improving breaking efficiency of hard rock: Research on the mechanism of impact-shear rock breaking technology
Published 2025-01-01“…The RHT constitutive model was used to describe the structural behavior of rock, and the rock-breaking simulation model of full-size bit was established. Compared with PDC bit and hammer bit, the rock-breaking force, bit torque, and rock stress characteristics of impact-shear bit were analyzed. …”
Get full text
Article -
231
A fully differential switched‐capacitor integrator based programmable resolution hybrid ADC architecture for biomedical applications
Published 2021-03-01“…The hybrid ADC operates in SAR mode from 8‐bit to 11‐bit resolutions and as the first‐order DSM with a multi‐bit quantizer in 12‐bit to 15‐bit resolutions. …”
Get full text
Article -
232
Exploiting bias in optimal finite-time copying protocols
Published 2025-02-01“…We study a finite-time cyclic copy protocol that creates persisting correlations between a memory and a data bit. The average work to copy the two states of the data bit consists of the mutual information created between the memory and data bit after copying, a cost due to the difference between the initial and final states of the memory bit, and a finite-time cost. …”
Get full text
Article -
233
Psychometric properties of the English and Hindi versions of the Brief Inventory of Thriving for use among Indian adolescents
Published 2024-12-01“…The present study investigated the unidimensional structure, internal consistency, convergent/discriminant, and criterion validity of both the original English version of the BIT (BIT-E) and its Hindi-translated version (BIT-H) among adolescents in India. …”
Get full text
Article -
234
Polarization-based puncturing pattern selection of shortened Polar code
Published 2019-02-01“…In order to solve the problem of inflexible Polar code length,a new puncturing pattern selection scheme based on feedback cost puncturing was proposed to generate shortened Polar codes.In this scheme,the Polarization effect was reserved,the sub-optimal subchannel was selected as the cost bit,the output bit corresponding to the cost bit was used as the puncturing pattern,and then the value of the cost bit is adjusted by feedback to obtain the shortened Polar code.Simulation results show that the performance of the proposed shortened Polar code is better than that of the shortened Polar code generated by bit-reversal permutation method,and the shortened Polar codes generated by direct puncturing method at the end under different channel and code rate conditions,and slightly weaker than that of the shortened Polar code proposed by Wang R and Liu R et al.In the AGWN channel,when the block error rate is 10<sup>-3</sup>,the proposed shortened Polar code with a code rate of 0.5 can obtain a gain of 0.5 dB compared with the shortened Polar code generated by bit-reversal permutation method,and the coding performance is greatly improved.…”
Get full text
Article -
235
Construction of diffusion layers based on cipher structures
Published 2017-06-01“…Taked diffusion layers of block cipher algorithms as the research object,lightweight diffusion layers were constructed by two cipher structures based on the characteristics of diffusion layers of lightweight block cipher algorithms,which were the construction of software-oriented diffusion layers based on Feistel structure and the construction of hardware-oriented diffusion layers based on LFSR.Lightweight involution diffusion layers with branch numbers 7 over eight 4-bit and 8-bit S-boxes were constructed by 3-round Feistel structure and the round functions adopt linear transformations with rotation and XORs.Some suboptimal diffusion layers over four 4 bit and 8 bit S-boxes and diffusion layers with branch numbers 7 over eight 4 bit and 8 bit S boxes based on LFSR were constructed.In addition,6,7,8 dimension MDBL matrices and many 16,18,32 dimension binary matrices with big dimension and branch numbers 7,7,12 based on LFSR were constructed.The experimental results have high practical significance in realm of the design of block cipher algorithms.…”
Get full text
Article -
236
Assessing the effect of deposited bitumen or asphaltenes on the nitrification process in the north saskatchewan river sediment
Published 2025-04-01“…This study aimed to (1) examine the effects of deposited bitumen (Bit) and asphaltene (Asp) on the North Saskatchewan River (NSR) water quality, focusing on organic carbon and nitrogen; (2) assess the impact of Bit or Asp on sedimentary nitrification; and (3) explore the response of the microbial community to Bit or Asp. …”
Get full text
Article -
237
Accounting Data Encryption Processing Based on Data Encryption Standard Algorithm
Published 2021-01-01“…As a block encryption algorithm, the Data Encryption Standard (DES) algorithm uses 64-bit packet data for encryption and decryption. Each eighth bit of the key is used as a parity bit; that is, the actual key length is 56 bits. …”
Get full text
Article -
238
Analysis and Design of an Energy Efficient Differential Coherent Chaos Based System in Additive White Gaussian Noise Environment
Published 2017-01-01“…The proposed scheme provides reduction in bit energy and better bit error performance at large spreading factor. …”
Get full text
Article -
239
An empirical study of LLaMA3 quantization: from LLMs to MLLMs
Published 2024-12-01“…Given the wide application of low-bit quantization for LLMs in resource-constrained scenarios, we explore LLaMA3’s capabilities when quantized to low bit-width. …”
Get full text
Article -
240