Showing 581 - 600 results of 702 for search '"bit"', query time: 0.05s Refine Results
  1. 581

    High Capacity Reversible Watermarking for Audio by Histogram Shifting and Predicted Error Expansion by Fei Wang, Zhaoxin Xie, Zuo Chen

    Published 2014-01-01
    “…Second, in order to reduce location map bits length, we introduced histogram shifting scheme. …”
    Get full text
    Article
  2. 582

    ECN-Based Congestion Probability Prediction over Hybrid Wired-Wireless Networks by Jin Ye, Jiawei Huang, Jianxin Wang, Shigeng Zhang, Zhenrong Zhang

    Published 2014-03-01
    “…This method combines the information contained in CE bits of a sequence of ECN-enabled acknowledge packets to calculate the probability of network congestion; thus it is more accurate than methods using CE bits of a single acknowledge packet. …”
    Get full text
    Article
  3. 583
  4. 584

    Noise Robustness of Quantum Relaxation for Combinatorial Optimization by Kentaro Tamura, Yohichi Suzuki, Rudy Raymond, C. Hiroshi Watanabe, Yuki Sato, Ruho Kondo, Michihiko Sugawara, Naoki Yamamoto

    Published 2024-01-01
    “…Quantum random-access optimization (QRAO) is a quantum-relaxation-based optimizer that uses fewer qubits than the number of bits in the original problem by encoding multiple variables per qubit using quantum random-access code (QRAC). …”
    Get full text
    Article
  5. 585

    Locality preserving binary face representations using auto‐encoders by Mohamed Amine Hmani, Dijana Petrovska‐Delacrétaz, Bernadette Dorizzi

    Published 2022-09-01
    “…Using a pretrained convolutional neural network and training the model on a cleaned version of the MS‐celeb‐1M database, binary representations of length 4096 bits and 3300 bits of entropy are obtained. The extracted representations have high entropy and are long enough to be used in crypto‐biometric systems, such as fuzzy commitment. …”
    Get full text
    Article
  6. 586
  7. 587

    Bi-GRU Enhanced Cost-Effective Memory-Aware End-to-End Learning for Geometric Constellation Shaping in Optical Coherent Communications by Zhiyang Liu, Xiaoyu Liu, Shilin Xiao, Weiying Yang, Weisheng Hu

    Published 2024-01-01
    “…Results show that the proposed bi-GRU based GCS scheme can achieve a performance gain over square 64QAM in mutual information (MI) with 0.12 bits/symbol and a Q-factor gain of 0.4 dB at optimal launched optical power. …”
    Get full text
    Article
  8. 588
  9. 589
  10. 590

    An Integrated Image Encryption Scheme Based on Elliptic Curve by Ijaz Khalid, Tariq Shah, Sayed M. Eldin, Dawood Shah, Muhammad Asif, Imran Saddique

    Published 2023-01-01
    “…Afterwards, the proposed scheme uses the first 128-bits for the confidentiality of the data, while the remaining 128-bits are for authentication. …”
    Get full text
    Article
  11. 591

    Measuring Complexity in Manufacturing: Integrating Entropic Methods, Programming and Simulation by Germán Herrera-Vidal, Jairo R. Coronado-Hernández, Ivan Derpich-Contreras, Breezy P. Martínez Paredes, Gustavo Gatica

    Published 2025-01-01
    “…The results confirm that factors such as production sequence and product volume significantly influence the structural complexity of the workstations, with station A being less complex (0.4154 to 0.9913 bits) compared to stations B and C, which reached up to 2.2084 bits. …”
    Get full text
    Article
  12. 592

    Topology-Aware Bus Routing in Complex Networks of Very-Large-Scale Integration with Nonuniform Track Configurations and Obstacles by Ziran Zhu, Zhipeng Huang, Jianli Chen, Longkun Guo

    Published 2021-01-01
    “…As one of the most important routing problems in the complex network within a very-large-scale integration (VLSI) circuit, bus routing has become much more challenging when witnessing the advanced technology node enters the deep nanometer era because all bus bits need to be routed with the same routing topology in the context. …”
    Get full text
    Article
  13. 593
  14. 594
  15. 595
  16. 596

    Efficient constructions for large‐state block ciphers based on AES New Instructions by Rentaro Shiba, Kosei Sakamoto, Takanori Isobe

    Published 2022-05-01
    “…Abstract Large‐state block ciphers with 256 bits or 512 bits block sizes receive much attention from the viewpoint of long‐term security. …”
    Get full text
    Article
  17. 597

    A Sometimes Mercurial Process: New Protocols for the Preservation of Singapore’s Time Based Art Collection by Mar Cruz

    Published 2024-12-01
    “…The conservation of Time Based Media (TBM) artwork deals in the world of bits, bytes, checksums and obsolescence, terms far different from the conservation of paper, paintings or sculpture. …”
    Get full text
    Article
  18. 598
  19. 599

    A VHDL Code for Offset Pulse Position Modulation Working with Reed Solomon System by Using ModelSim by Ahmed H. Albatoosh, Mohamed Ibrahim Shuja'a, Basman M. Al-Nedawe

    Published 2022-12-01
    “…These bits can then be utilized by the receiver to identify and correct specific types of errors. …”
    Get full text
    Article
  20. 600

    Determining the Natural Disaster Diversity of Van Province by Fine Kinney Risk Assessment Method (FK-RAM) by Bülent Matpay, Sacit Mutlu

    Published 2023-07-01
    “…RAM, which was previously applied by researchers for Bitlis, was applied for the first time for Van province. …”
    Get full text
    Article