-
441
Analysis of Visible Light Communication Link’s Performance in Fire Smoke Environment
Published 2021-01-01“…Firstly, the variation of background light noise caused by sunlight during a day was analyzed, then signal-to-noise ratio (SNR) and bit error rate (BER) of the visible light communication link in fire smoke environment with different visibility were calculated, and finally, the variation of received power with the angle β between the LED optical axis and the communication link (from LED to receiver) was analyzed. …”
Get full text
Article -
442
Vehicle-to-Vehicle Communication Channel Estimator Based on Gate Recurrent Unit
Published 2025-01-01“…The computer simulation results confirm that, compared to traditional schemes, the proposed estimator can achieve a lower bit error rate (BER) and normalized mean squared error (NMSE). …”
Get full text
Article -
443
AN ASSESSMENT OF PERCEPTION OF THE PEOPLE ON MALARIA PREVENTION AND CONTROL IN DONGA LOCAL GOVERNMENT AREA OF TARABA STATE
Published 2024-04-01“…The study recommends that in a bit to improve malaria control measures, community members need to be educated on the relationship between mosquitoes and malaria, and the benefits of accepting cost effective preventive measures including early seeking of treatment from the health facilities or health personnel. …”
Get full text
Article -
444
Exploring Many-Core Design Templates for FPGAs and ASICs
Published 2012-01-01“…The key benefits of this approach are that it (i) allows programmers to express parallelism through an API defined in a high-level programming language, (ii) supports coarse-grained multithreading and fine-grained threading while permitting bit-level resource control, and (iii) reduces the effort required to repurpose the system for different algorithms or different applications. …”
Get full text
Article -
445
AFD and chaotic map‐based integrated approach for ECG compression, steganography and encryption in E‐healthcare paradigm
Published 2021-07-01“…The performance of the three processes is evaluated in terms of distortion (both statistical and clinical), compression [(compression ratio (CR) and quality score], steganography [embedding capacity (EC), bit error rate], and encryption (sensitivity, predictivity, correlation coefficient). …”
Get full text
Article -
446
Design Techniques for Single-Ended Wireline Crosstalk Cancellation Receiver Up To 112 Gb/s
Published 2024-01-01“…These 56 and 112 Gb/s receivers achieve a bit error rate of <<inline-formula> <tex-math notation="LaTeX">$10{^{-}10 }$ </tex-math></inline-formula> and <<inline-formula> <tex-math notation="LaTeX">$10{^{-}12 }$ </tex-math></inline-formula> with a single-ended channel loss of 24 and 25 dB, respectively.…”
Get full text
Article -
447
Online Structural Health Monitoring and Parameter Estimation for Vibrating Active Cantilever Beams Using Low-Priced Microcontrollers
Published 2015-01-01“…The algorithm is implemented using automatically generated and deployed machine code on an electronics prototyping platform, featuring an economically feasible 8-bit microcontroller unit (MCU). The validation experiments demonstrate the viability of the proposed system to detect sudden or gradual mechanical changes in real-time, while the functionality on low-cost miniaturized hardware suggests a strong potential for mass-production and structural integration. …”
Get full text
Article -
448
A New Chaotic Color Image Encryption Algorithm Based on Memristor Model and Random Hybrid Transforms
Published 2025-01-01“…By integrating both pixel-level and bit-level diffusion, the randomness of the image information distribution is significantly increased. …”
Get full text
Article -
449
Smart Contract Penyimpanan Data Genetika Manusia Berbiaya Murah pada Blockchain Ethereum
Published 2024-07-01“…Hasil pengujian menjalankan smart contract pada blockchain Ethereum yang hanya menyimpan signature data genetik ini menunjukkan biaya gas yang sangat efisien karena hanya menyimpan 256 bit saja dari data genetik riilnya yang dapat mencapai giga byte.…”
Get full text
Article -
450
A Modified Implementation of Tristate Inverter Based Static Master-Slave Flip-Flop with Improved Power-Delay-Area Product
Published 2014-01-01“…To validate the correct behaviour of the proposed design, an eight bit asynchronous counter is designed to layout level. …”
Get full text
Article -
451
Dijital Eşitsizliğin Hibrit Eğitimdeki Yansımaları
Published 2023-12-01“…Hibrit eğitimde dijital eşitsizliğin boyutlarını derinlemesine anlamak ve bu sorunla etkili bir şekilde mücadele etmek için alan yazına katkı sağlamak amaçlanmaktadır.Yöntem: Bu çalışmada hibrit eğitimde dijital eşitsizlik, Bilgi ve İletişim Teknolojileri (BİT) Gelişmişlik Endeksi, Türkiye İstatistik Kurumu (TÜİK) Hanehalkı Bilişim Teknolojileri Kullanım Araştırması, Ağa Hazırlık Endeksi gibi dijital eşitsizliğin belirlenmesinde kullanılan yaklaşımlarla birlikte değerlendirilmiştir. …”
Get full text
Article -
452
Quantum secure patient login credential system using blockchain for electronic health record sharing framework
Published 2025-02-01“…The proposed scheme demonstrated enhanced security and performance, with IDEA achieving encryption in 58 ms and decryption in 278 ms for a 512-bit block, offering the best performance in terms of encryption speed.…”
Get full text
Article -
453
An Efficient Detector for Automatic Tomato Classification Systems
Published 2025-01-01“…The video demonstration, datasets, weights, and models are available at <uri>https://bit.ly/3XdLrLM</uri>.…”
Get full text
Article -
454
A Study of an IT-Assisted Higher Education Model Based on Distributed Hardware-Assisted Tracking Intervention
Published 2022-01-01“…The model dynamically adjusts the bit rate by referring to the broadband estimation and cache occupancy data to ensure users have a smooth experience effect. …”
Get full text
Article -
455
Effect of synchronization system errors on the reception noise immunity of amplitude-phase shift keyed signals
Published 2023-06-01“…The dependencies of the bit error probability on the magnitude of the phase shift and the clock offset were characterized. …”
Get full text
Article -
456
Ethiopian Water Hyacinth Leaf Extract as a Potential Tannery Effluent Treatment Material
Published 2022-01-01“…Though some researchers have tried to use this extract for the same, the researchers have experimented only to treat that of Cr3+ and there are a bit of difference in the methodology they followed. …”
Get full text
Article -
457
Qualitative and quantitative evaluations of topography for CAD/CAM all ceramic zirconia after different surface treatments
Published 2019-06-01“…Results: Stereomicroscopic images revealed that the grinded specimen showed grooves and scratches, reglazed surface showed the same criteria as control with a little bit more evidence of irregularities. While polished specimen appeared smoother and more homogeneity. …”
Get full text
Article -
458
Variable Is Better Than Invariable: Sparse VSS-NLMS Algorithms with Application to Adaptive MIMO Channel Estimation
Published 2014-01-01“…At last, to verify the effectiveness of the proposed algorithms for ASCE, several selected simulation results are shown to prove that the proposed sparse VSS-NLMS algorithms can achieve better estimation performance than the conventional methods via mean square error (MSE) and bit error rate (BER) metrics.…”
Get full text
Article -
459
A chaotic digital signature algorithm based on a dynamic substitution box
Published 2025-01-01“…In addition, to enhance security, this work uses a 2048-bit prime, double the length frequently used. This proposal induces chaotic behavior in the signature, making it highly sensitive to any changes in the signer’s private key or message content, thereby enhancing authentication and integrity verification. …”
Get full text
Article -
460
A deep learning-driven multi-layered steganographic approach for enhanced data security
Published 2025-02-01“…A novel multi-layered steganographic framework is proposed, integrating Huffman coding, Least Significant Bit (LSB) embedding, and a deep learning-based encoder–decoder to enhance imperceptibility, robustness, and security. …”
Get full text
Article