-
381
Evaluation of cellular and physiological alterations of cells from Mytilus galloprovincialis exposed to benzisothiazolinone
Published 2025-01-01“…Benzisothiazolinone (BIT) is a preservative and antimicrobial agent widely used in various household and industrial products. …”
Get full text
Article -
382
Modelling and optimization of well hole cleaning using artificial intelligence techniques
Published 2025-02-01“…Abstract Ineffective hole cleaning in deviated and horizontal well drilling can lead to issues like stuck pipes, reduced rate of penetration (ROP), and drill bit damage, resulting in increased non-productive time (NPT) and operational costs. …”
Get full text
Article -
383
Campbell S. Rapid psychological change / trans. from Engl. O. M. Kadochnikova
Published 2020-10-01“…In case of rapid psychological change, the former personality is completely erased by brain-zap to install bit-by-bit a new person at 100 seconds. According to the psychological approach, a person cannot survive during such changes. …”
Get full text
Article -
384
A Novel Multi-Level Perceptron for Accurate Heart Stroke Diagnosis
Published 2025-01-01Get full text
Article -
385
Color code decoder with improved scaling for correcting circuit-level noise
Published 2025-01-01“…We provide comprehensive analyses of the decoder, covering its threshold and sub-threshold scaling both for bit-flip noise with ideal measurements and for circuit-level noise. …”
Get full text
Article -
386
Comparison of One-Drill Protocol to Sequential Drilling In Vitro and In Vivo
Published 2025-01-01“…The heat generated by a one-drill protocol with a new-generation drill bit and the Straumann BLT sequential drilling protocol was evaluated. …”
Get full text
Article -
387
Adaptive Watermarking Scheme Using Biased Shift of Quantization Index
Published 2010-01-01“…Our method performs embedding of a watermark bit by shifting the corresponding frequency transform coefficient (the watermark position) to a quantization index according to the value of the watermark bit, which prevents from losing the watermark information during the data compression process. …”
Get full text
Article -
388
Performance Analysis of Dimming Methods in Visible Light Communication Systems
Published 2022-09-01“…In particular, a performance comparison has been given for both techniques with respect to Bit Error Rate by considering the same bit length consisted in a symbol. …”
Get full text
Article -
389
Memristor‐transistor hybrid ternary content addressable memory using ternary memristive memory cell
Published 2021-10-01“…Simulation results show the worst search delay of 0.75 ns and the energy/bit/search of 0.866 fJ for the 128 × 128 bit MTCAM.…”
Get full text
Article -
390
Enhanced DeepSORT and StrongSORT for Multicattle Tracking With Optimized Detection and Re-Identification
Published 2025-01-01Get full text
Article -
391
Design of a Multi-Layer Symmetric Encryption System Using Reversible Cellular Automata
Published 2025-01-01“…By dividing plaintext into 128-bit blocks, the algorithm performs iterative transformations over multiple rounds. …”
Get full text
Article -
392
A Safe and Secured Medical Textual Information Using an Improved LSB Image Steganography
Published 2021-01-01“…Therefore, this study proposed a modified least significant bit (LSB) technique capable of protecting and hiding medical data to solve the crucial authentication issue. …”
Get full text
Article -
393
A Novel Steganography Technique for SDTV-H.264/AVC Encoded Video
Published 2016-01-01“…Finally, experimental results have been assessed through objective and subjective quality measures and reveal that less visible artifacts are produced with the technique proposed by reaching PSNR values above 40.0 dB and an embedding bit rate average per secret communication channel of 425 bits/sec. …”
Get full text
Article -
394
Teknoloji Bağımlılığı ve Dijital Detoks Turizmine Karşı Tutum ve Motivasyonlar: Turizm Akademisyenleri Tarafından Bir Değerlendirme
Published 2024-04-01“…Konaklama ve turizm endüstrisiyle ilgili işletmeler ise seyahat ederken Bilgi İletişim Teknolojilerinin (BİT) kullanımını azaltmak veya tamamen bırakmak isteyen bireyler için ürünler ve paketler oluşturmaktadır. …”
Get full text
Article -
395
Meet‐in‐the‐middle attacks on round‐reduced CRAFT based on automatic search
Published 2023-05-01“…The time complexity of the 20‐round attack is 2126.94 20‐round CRAFT encryption, the data complexity is 256 chosen plaintexts, and the memory complexity is 2109 64‐bit blocks.…”
Get full text
Article -
396
The performance analysis of SEMA system
Published 2003-01-01“…By statistical analyzing, the characters of the MAI and self-interference are studied and the numerical results of the error bit rate are given.…”
Get full text
Article -
397
MODERN INFORMATION TECHNOLOGIES FOR MODERN LIBRARY
Published 2016-09-01“…The results of upgrading Automated Library Information System BIT-2000u at the Y. KolasCentral Science Library of the National Academy of Sciences of Belarus by means of RFIDtechnologies are considered.…”
Get full text
Article -
398
Modelling of quantum yields in photocatalytic membrane reactors immobilising titanium dioxide
Published 2006-01-01Get full text
Article -
399
Accuracy Improvement With Weight Mapping Strategy and Output Transformation for STT-MRAM-Based Computing-in-Memory
Published 2024-01-01“…More importantly, strategies of accuracy improvement were innovatively proposed as follows: 1) mapping most significant bit (MSB) to the far side of the MRAM array and 2) output linear transformation based on the reference columns. …”
Get full text
Article -
400
An Efficient Image Compressor for Charge Coupled Devices Camera
Published 2014-01-01“…The pair base are DCT base and Hadamard base, which can be used on the high and low bit-rate, respectively. The best posttransform is selected by the lp-norm-based approach. …”
Get full text
Article