Showing 81 - 100 results of 1,322 for search '"bit"', query time: 0.04s Refine Results
  1. 81

    Novel method to calculate average bit error probability of UWB non-coherent system by YANG Zhi-hua1, WANG Ye1, ZHANG Qin-yu1, WANG Yu-feng 2, LIU Ning-ning 3, ZHANG Nai-tong1

    Published 2010-01-01
    “…A novel method based on clustered point process was proposed to calculate average bit error probability(ABEP) of UWB non-coherent system on IEEE 802.15.3a channel.In particular,the expectation and variance of the sig-nal to noise ratio(SNR) in the detection window were derived in closed form.Moreover,lognormal and normal variants were employed and compared to approximate the SNR in receiver window with respects to several characteristics.The results show that lognormal approximation is more feasible than normal approximation.In term of performance with PPM and OOK modulations,the efficiency of lognormal approximation is respectively much better than that of normal approximation.…”
    Get full text
    Article
  2. 82
  3. 83
  4. 84

    Experimental and Numerical Analysis of Flow Behavior for Reverse Circulation Drill Bit with Inserted Swirl Vanes by Cheng Yang, Jianliang Jiang, Bo Qi, Guoqing Cui, Liyong Zhang, Yunwang Chen, Pinlu Cao

    Published 2022-01-01
    “…A swirling drill bit designed with an integrated vane swirler was developed to improve reverse circulation in down-the-hole hammer drilling. …”
    Get full text
    Article
  5. 85
  6. 86

    FGBC-iDistance:fine-grained bit-code filter based high-dimensional index by Xin-pan YUAN, Can-fei WANG, Jun LONG, Cheng-yuan ZHANG, Jun-feng MAN

    Published 2017-10-01
    “…In the high-dimensional vector retrieval,distance computation is a very time-consuming operation,the current research trend is to reduce the distance computation using divide and conquer algorithm.iDistance algorithm divides the vector space into subspace of clustering by pivot,BC-iDistance algorithm divides the subspace into 2 partitions in each dimension.A more fine-grained partition algorithm and index structure was proposed,each part corresponded with a unique FGBC code (fine-grained bit code),which realized the candidate sets filtered more precisely.The distance computation times of FGBC-iDistance can be reduced to <inline-formula><math xmlns="http://www.w3.org/1998/Math/MathML"> <mfrac> <mn>1</mn> <mrow> <msup> <mn>2</mn> <mrow> <mn>2</mn><mi>d</mi></mrow> </msup> </mrow> </mfrac> </math></inline-formula> of iDistance.The distance computation frequency comparison:FGBC-iDistance≤BC-iDistance≤iDistance.The experiment results show that when the scope radius of the range query is 0.08,FGBC-iDistance distance computation times is about 20,000,which is far less than other algorithms,the running time is also reduced.…”
    Get full text
    Article
  7. 87

    Reconstruction of LDPC code check matrix based on random extraction at high bit error rate by Zhongyong WANG, Zhenghao LI, Kexian GONG, Peng SUN, Qingtao LI

    Published 2023-03-01
    “…In order to improve the performance of the sparse check matrix reconstruction algorithm of LDPC codes at high BER, an open set recognition algorithm of the check matrix with strong fault tolerance under the condition of sufficient and insufficient number of received code words was proposed.Firstly, a new code word space was constructed by randomly extracting part bits of the code words for many times.Gaussian elimination method was used to solve the dual vector and restore the check vector in a lower dimension.Secondly, using the check vector, the proportion of error-free code groups in the received data was continuously increased by using the methods of “eliminating error code words” or“flipping the lowest unreliable bits” for iterative processing.Simulation results show that the proposed algorithm is superior to comparison algorithm under different bit error rates, different code lengths, different code rates and different number of code words.For (648,324) LDPC codes in IEEE 802.11n protocol, when the number of received code words is sufficient, the reconstruction rate of check matrix can reach more than 95% under the condition of bit error rate of 0.003.When the number of received code words is insufficient (the number of code words is 450), the reconstruction rate of check matrix can reach more than 90% under the condition of bit error rate of 0.0015.…”
    Get full text
    Article
  8. 88

    Low-Bit Rate Feedback Strategies for Iterative IA-Precoded MIMO-OFDM-Based Systems by Sara Teodoro, Adão Silva, Rui Dinis, Atílio Gameiro

    Published 2014-01-01
    “…We design low-complexity and low-bit rate feedback strategies where a quantized version of some CSI parameters is fed back from the user terminal (UT) to the base station (BS), which shares it with the other BSs through a limited-capacity backhaul network. …”
    Get full text
    Article
  9. 89

    A novel and efficient digital image steganography technique using least significant bit substitution by Shahid Rahman, Jamal uddin, Hameed Hussain, Sabir Shah, Abdu Salam, Farhan Amin, Isabel de la Torre Díez, Debora Libertad Ramírez Vargas, Julio César Martínez Espinosa

    Published 2025-01-01
    “…Therefore, to solve this issue, we propose an efficient technique based on the Least Significant Bit (LSB). The LSB substitution method minimizes the error rate in the embedding process and is used to achieve greater reliability. …”
    Get full text
    Article
  10. 90
  11. 91

    Upper Bound on the Bit Error Probability of Systematic Binary Linear Codes via Their Weight Spectra by Jia Liu, Mingyu Zhang, Chaoyong Wang, Rongjun Chen, Xiaofeng An, Yufei Wang

    Published 2020-01-01
    “…The proposed bound on the bit error probability requires only the knowledge of weight spectra, which is helpful when the input-output weight enumerating function (IOWEF) is not available. …”
    Get full text
    Article
  12. 92

    Simulation and Analysis of a Split Drill Bit for Pneumatic DTH Hammer Percussive Rotary Drilling by Yuanling Shi, Conghui Li

    Published 2024-01-01
    “…In this paper, several types of split drill bits for different drilling technologies are designed. …”
    Get full text
    Article
  13. 93

    Prediction and Analysis of PDC Bit Wear in Conglomerate Layer with Machine Learning and Finite-Element Method by Li-qiang Wang, Ming-ji Shao, Wei Zhang, Zhi-peng Xiao, Shuo Yang, Ming-he Yang

    Published 2022-01-01
    “…Polycrystalline diamond compact (PDC) bits experience a serious wear problem in drilling tight gravel layers. …”
    Get full text
    Article
  14. 94

    Survey on reinforcement learning based adaptive bit rate algorithm for mobile video streaming services by Li’na DU, Li ZHUO, Shuo YANG, Jiafeng LI, Jing ZHANG

    Published 2021-09-01
    “…In recent years, with the continuous release of HTTP adaptive streaming (HAS) video datasets and network trace datasets, the machine learning methods, such as deep learning and reinforcement learning, have been continuously applied to adaptive bit rate (ABR) algorithms, which obtain the optimal strategy of rate control through interactive learning, and achieve superior performance that surpasses the traditional heuristic methods.Based on the analysis of the research difficulties of ABR algorithms, the research advances of ABR algorithms based on reinforcement learning (including deep reinforcement learning) was investigated.Furthermore, several representative HAS video datasets and network trace datasets were summarized, the evaluation metrics of the performance were depicted.Finally, the existing problems and the future tendency of ABR research were discussed.…”
    Get full text
    Article
  15. 95

    Impacts of noise and interference on the bit error rate of the FBMC-OQAM modulation scheme in 5G systems by A. Androon, O. V. Tikhonova

    Published 2024-05-01
    “…The work sets out to evaluate the noise immunity of the signal modulation method in 5G networks using a filter bank multicarrier with offset quadrature amplitude modulation (FBMC-OQAM) and to analyze the bit error rate (BER).Methods. In the work, probability theory and mathematical statistics methods are applied according to computer modeling approaches.Results. …”
    Get full text
    Article
  16. 96
  17. 97

    A Novel Feature Extraction Technique Using Binarization of Bit Planes for Content Based Image Classification by Sudeep Thepade, Rik Das, Saurav Ghosh

    Published 2014-01-01
    “…The technique has binarized the significant bit planes of an image by selecting local thresholds. …”
    Get full text
    Article
  18. 98

    Community Perception through Comparative Analysis of Turkey's Disaster Preparedness Policy: The Case of Van-Bitlis Provinces by Ahmet Uğur, Metin Işık

    Published 2020-01-01
    “…In this context, a field survey was carried out in Van, where the disaster occurred recently (2011) and in Bitlis, where no recent disaster occurred. Thus, it is aimed to determine whether the perception of society regarding the practices made in line with disaster preparedness policies makes any difference between these two provinces. …”
    Get full text
    Article
  19. 99
  20. 100

    Strengthened 32‐bit AES implementation: Architectural error correction configuration with a new voting scheme by Saeideh Sheikhpur, Mahdi Taheri, Mohammad Saeed Ansari, Ali Mahani

    Published 2021-11-01
    “…In this paper, a reliable and secure 32‐bit data‐path AES implementation based on our robust fault resilient approach is developed. …”
    Get full text
    Article