Showing 441 - 460 results of 1,322 for search '"bit"', query time: 0.04s Refine Results
  1. 441

    Effective cooperative scheme based on relay selection by YU Fei1, YANG Lv-xi1

    Published 2010-01-01
    “…Based on the capacity of multi-access channel,a relay selection algorithm was proposed.It was proposed that: relays were selected according to the eigenvalue decomposition of the equivalent relay-destination channel,and the beamforming vectors were designed in a distributed manner.It could be seen that joint processing and information trans-mission between multiple relays were avoided,which could reduce system complexity.Simulation results show that the system proposed can achieve better bit error rate(BER) comparing to the one with multi-relay parallel transmission.…”
    Get full text
    Article
  2. 442

    ŽUPNIČKA DJELATNOST ŠIME STARČEVIĆA by MILE BOGOVIĆ

    Published 2013-01-01
    “…Starčevićeva druga djelatnost bit će spomenuta samo u slučaju da se radi o podatcima koji nisu drugdje zabilježeni i objavljeni.…”
    Get full text
    Article
  3. 443

    Classification of All Associative Mono-n-ary Algebras with 2 Elements by Stephan Dominique Andres

    Published 2009-01-01
    “…An application concerning the assignment of a control bit to a string is given.…”
    Get full text
    Article
  4. 444

    Distance-based target tracking algorithm in binary sensor network by SUN Xiao-yan1, LI Jian-dong1, HUANG Peng-yu1, ZHANG Wen-zhu1

    Published 2010-01-01
    “…A distance-based target tracking algorithm for binary sensor network was proposed.This algorithm can decide the output bit information and compute the weighting simultaneously.The simulation is used to validate the effectiveness of distance-based weighting scheme.This algorithm has good performance,when the target moves linearly,curvilinear,or randomly through the sensing field,and the error distribution of single target position is in .…”
    Get full text
    Article
  5. 445

    Performance of modified multiple access scheme for DCSK by ZHOU Yi-gang1, SHI Ying1

    Published 2008-01-01
    “…To compare with TLMA-DCSK,the performance was evalu-ated in terms of the bit error rate (BER) under AGWN channel model and multipath Rayleigh fading channel model. …”
    Get full text
    Article
  6. 446

    An IEC61850 communication model for network devices in smart substation by Feng DENG, Siyuan HE, Gaofeng ZHAO

    Published 2015-12-01
    “…An IEC61850 communication model for network devices in smart substation was proposed,and the network device status information management was imtroduced into a unified monitoring and management system of smart substation.The substation monitoring system can directly get the state information and configuration information of the communication network and network devices,such as link status,bandwidth status,port forwarding state,the port packet loss rate,bit error rate and so on.…”
    Get full text
    Article
  7. 447

    Study on the SOVA decoding algorithm for Turbo codes based on modified path-metric by LIU Xing-cheng, ZHU Zhi

    Published 2008-01-01
    “…The reliability value of the last bit within the decoding trellis is adjusted based on the difference of the accumulated path-metrics among the survivor paths connected to register states. …”
    Get full text
    Article
  8. 448

    Optimization of Expression Matching for String Matching by Tianlong Yang, Hongli Zhang

    Published 2013-01-01
    “…The inclusion relationship for expression was classified, and the algorithms eliminating redundant expressions were proposed. Then, to optimize the BitCount algorithm, a theoretical O(1)algorithm(MaskVeri)for mask verification was designed. …”
    Get full text
    Article
  9. 449

    Efficient TTI for 3G Multimedia Applications by Costas Chaikalis

    Published 2007-01-01
    “…It is shown that different operating environments require an appropriate TTI in terms of bit error rate (BER) performance for the following data rates: 28.8 kbps, 64 kbps, 144 kbps, 384 kbps, and 2 Mbps.…”
    Get full text
    Article
  10. 450

    In-loop filter algorithm based on content pre-analysis by LU Wen, GAO Xin-bo, HE Li-huo, ZHANG Hua

    Published 2009-01-01
    “…Traditional block-based video coders suffered from annoying blocking artifacts in low bit-rate coding.Aiming to high complexity for determining the block edge strength of deblocking filter,a fast in-loop deblocking filter based on content pre-analysis was proposed,which utilized STGS-image to partition character of different regions and measured the block effect intension in blockwise based on optical flow equation and relativity of interframe.Experimental results show that the proposed greatly reduces the complexity of filter algorithm,and then the subjective image quality of the proposed is approximate to that of the H.264 in-loop filter.…”
    Get full text
    Article
  11. 451

    Healthy Eating: Create Your Plate! by Jennifer Hillan, Linda B. Bobroff

    Published 2011-09-01
    “…The way you ‘create your plate’ to balance carbohydrates for blood glucose control is a bit different from the MyPlate recommendations. …”
    Get full text
    Article
  12. 452

    Improved non-Rake receiver based on two dimensional spread spectrum for WCDMA systems by TANG You-xi, SHAO Shi-hai, PAN Wen-sheng, LI Shao-qian

    Published 2005-01-01
    “…And compared with the conventional Rake receiver, the proposed receiver is presented by computer simulations to support its bit error rate (BER) performance when it is difficult for the Rake receiver to distinguish each path accurately.…”
    Get full text
    Article
  13. 453

    A Study of the Source Traffic Generator Using Poisson Distribution for ABR Service by Mohsen Hosamo

    Published 2012-01-01
    “…This paper describes modeling of the available bit rate (ABR) source traffic in asynchronous transfer mode (ATM) network using BLPos/GTEXP traffic generator, which employs Poisson distribution for modeling the burst length (BLPos) and exponential distribution for modeling the gap time (GTEXP). …”
    Get full text
    Article
  14. 454

    Differential fault analysis on the SMS4 cipher by inducing faults to the key schedule by LI Wei, GU Da-wu

    Published 2008-01-01
    “…On the basis of the byte-oriented fault model and the differential analysis,a differential fault analysis on the SMS4 cipher by inducing faults in its key schedule was proposed.Mathematical analysis and simulating experiment show that the attack could recover its 128-bit secret key by introducing only eight faulty ciphertexts.Simultaneously,a method of distinguishing effective faults was presented to increase the efficiency of fault injection and decrease the num-ber of faulty ciphertexts.Thus,experiment results are beneficial to the analysis of other iterated block ciphers.…”
    Get full text
    Article
  15. 455

    Healthy Eating: Create Your Plate! by Jennifer Hillan, Linda B. Bobroff

    Published 2011-09-01
    “…The way you ‘create your plate’ to balance carbohydrates for blood glucose control is a bit different from the MyPlate recommendations. …”
    Get full text
    Article
  16. 456

    Trustworthy identity system based on IPv6 source address validation by Duan-qi ZHOU, Jun BI, Guang YAO

    Published 2014-10-01
    “…In the Internet,there are no mechanisms to verify the identity of a message sender,resulting in a large number of forged identity attacks,such as phishing websites.By mapping the user identity into the rightmost 64 bit of the IPv6 address,this paper tries to make every message embedded with an identity,which lay a credible foundation for communications on the Internet.We design and realize a true identity communication system based on source address validation improvement,which can protect the privacy of the users,and ensure the verifiability and authenticity of the user identities.…”
    Get full text
    Article
  17. 457

    Osiguranje odgovornosti marine – pogled iz prakse by Ines Bezić

    Published 2024-01-01
    “…Na kraju, u posljednjem dijelu bit će izložena zaključna razmatranja.…”
    Get full text
    Article
  18. 458

    SSRFSC flipping decoding algorithm based on critical simplification set for polar codes by GUO Rui, LIU Yang, HE Meilin, LIU Zhaoting, ZHAO Yinan

    Published 2024-10-01
    “…Firstly, the information bit of the longest repetition (REP) node in SSR was selected as candidate bit (CB), thus constructing a CSS based on SSR. …”
    Get full text
    Article
  19. 459

    SpaceCAM: A 16 nm FinFET Low-Power Soft-Error Tolerant TCAM Design for Space Communication Applications by Itay Merlin, Benjamin Zambrano, Marco Lanuzza, Alexander Fish, Avner Haran, Leonid Yavits

    Published 2025-01-01
    “…It tolerates up to 5 soft errors per 144-bit row, provided the minimum Hamming distance between stored data patterns (such as the Active Control List (ACL) rules) is 26. …”
    Get full text
    Article
  20. 460

    Design, Implementation, and Analysis of High-Speed Single-Stage N-Sorters and N-Filters by Robert B. Kent, Marios S. Pattichis

    Published 2021-01-01
    “…When used for max pooling 32-bit data in the fastest analyzed FPGA, a single 9-max filter will process 500 million 9-pixel groups per second (4K:3840x2160 at 500 frames/second). …”
    Get full text
    Article