Showing 1,201 - 1,220 results of 1,322 for search '"bit"', query time: 0.04s Refine Results
  1. 1201

    Channel access mechanism based on equally allocation of protocol sequence for VANET by Zhe-xin XU, Ling-ling CAI, Xiao LIN, Yi WU

    Published 2016-04-01
    “…In addition, the frame structure was also redesigned according to the characteristic of user irrepressible protocol sequence. A few bits of data were used to find out the number of nodes in the competition zone. …”
    Get full text
    Article
  2. 1202

    Approximately Nearest Neighborhood Image Search Using Unsupervised Hashing via Homogeneous Kernels by Jun-Yi Li, Jian-Hua Li

    Published 2018-01-01
    “…To address problems related to the unstable search accuracy of an unsupervised image hashing function and degradation of the search-time performance with increases in the number of hashing bits, we propose a method that combines additive explicit homogeneous kernel mapping and image feature histograms to construct a search algorithm based on a locality-sensitive hashing function. …”
    Get full text
    Article
  3. 1203

    Spectrum sharing scheme in cognitive radio networks based on primary limited feedback by Huan-qin1 GAO, Rong-fang SONG

    Published 2014-04-01
    “…Numerical results show that, with only 3 or 4 bits of feedback to each pri-mary user, the effective throughput of the secondary system is comparable to the case with both primary and secondary transmitters having the perfect CQI of the primary link. …”
    Get full text
    Article
  4. 1204

    Esthetic Rehabilitation of Anterior Teeth with Copy-Milled Restorations: A Report of Two Cases by Sapna Rani, Jyoti Devi, Chandan Jain, Parul Mutneja, Mahesh Verma

    Published 2017-01-01
    “…This digital revolution started in the latter half of the 20th century by converting analog objects/signals into digital bits and bytes. Recent developments in all-ceramic materials and systems of computer-aided designing and computer-aided manufacturing (CAD/CAM), copy milling, and so forth offer excellent esthetics and superb biocompatibility. …”
    Get full text
    Article
  5. 1205

    Linear Array Design with Switched Beams for Wireless Communications Systems by Vinícius Ludwig-Barbosa, Edson Schlosser, Renato Machado, Filipe Guterres Ferreira, Sabrina Müller Tolfo, Marcos Vinício Thomas Heckler

    Published 2015-01-01
    “…The goal of the analysis is to determine the best trade-off between the array size and number of feedback bits necessary to maximize the SNR at the receiver. …”
    Get full text
    Article
  6. 1206

    Revisiting Sum of Residues Modular Multiplication by Yinan Kong, Braden Phillips

    Published 2010-01-01
    “…We compare FPGA implementations of modular multiplication up to 24 bits wide. The sum of residues multipliers demonstrate reduced latency at nearly 50% compared to Montgomery architectures at the cost of nearly doubled circuit area. …”
    Get full text
    Article
  7. 1207
  8. 1208
  9. 1209
  10. 1210

    Resource allocation algorithm for the downlink of multi-carrier and multi-user NOMA systems by Jie YAN, Rongfang SONG

    Published 2019-11-01
    “…Non-orthogonal multiple access (NOMA) technology had received considerable attention as a candidate technology for 5G cellular systems.The resource allocation problem in multi-carrier and multi-user downlink NOMA systems were studied with the goal of optimizing system throughput.In the solution of the problem,the linear water-filling power allocation was used between subcarriers as the fractional transmit power allocation algorithm was used between the superposed users,so that system throughput could be improved.Meanwhile,the concept of time slot was adopted in the design of NOMA transmission scheme,in order to be able to schedule more users in the scenario where the number of cellcenter users and celledge users were not equal.The whole time period was divided into two time slots.On the basis of ensuring the fairness of users,different user pairing groups were implemented in different time slots so as to fully utilizing the entire resource to improve system throughput.The simulation results show that this method can transmit more bits under the same transmit power comparing with traditional non-orthogonal multiple access(NOMA) and OFDMA.…”
    Get full text
    Article
  11. 1211

    LSKE: Lightweight Secure Key Exchange Scheme in Fog Federation by Yashar Salami, Vahid Khajehvand

    Published 2021-01-01
    “…The results show that the proposed design reduced 3.2457 ms of computational overhead and 1,024 transmitted data bits.…”
    Get full text
    Article
  12. 1212

    Reconstruction of LDPC code sparse check matrix based on modified LBP decoding by ZHANG Tianqi, LI Chunyun, WU Xianyue, WU Yunge

    Published 2024-05-01
    “…In order to reconstruct the sparse check matrix of LDPC code, a sparse check matrix reconstruction algorithm for LDPC code at high BER was proposed based on modified LBP decoding. Firstly, some bits were selected randomly from the codeword matrix to construct the codeword analysis matrix, and Gaussian elimination on it was performed to find the dual space. …”
    Get full text
    Article
  13. 1213
  14. 1214

    Layered bandwidth allocation algorithm for multi-service in orthogonal frequency division multiplexing passive optical network by Yejun LIU, Yuying LIU, Pengchao HAN, Jidong WANG, Lei GUO

    Published 2018-09-01
    “…Due to the superiority in large bandwidth capacity and flexible resource allocation,orthogonal frequency division multiplexing passive optical network (OFDM-PON) has been recognized as one of the promising candidates for the next generation PON.There are many research works on the system architecture design of OFDM-PON.However,most of these works focused on the techniques of physical structure and signal transmission and less addressed the bandwidth allocation algorithms supporting the new types of system architecture.The bandwidth allocation in OFDM-PON,which is one of the key techniques to enable the access of multi-service,refers to the joint optimization of multi-dimensional resources in time domain,frequency domain and bits.A layered bandwidth allocation algorithm was proposed for multi-service in the enhanced system architecture of OFDM-PON,aiming at the efficient bandwidth resource utilization.Simulation results prove that the proposed bandwidth allocation algorithm outperforms the conventional algorithms without layered transmission significantly in terms of resource utilization and packet delay.…”
    Get full text
    Article
  15. 1215

    Interlayer Simplified Depth Coding for Quality Scalability on 3D High Efficiency Video Coding by Mengmeng Zhang, Hongyun Lu, Huihui Bai

    Published 2014-01-01
    “…A novel interlayer simplified depth coding (SDC) prediction tool is added to reduce the amount of bits for depth maps representation by exploiting the correlation between coding layers. …”
    Get full text
    Article
  16. 1216

    Quantum Two-Way Protocol Beyond Superdense Coding: Joint Transfer of Data and Entanglement by Kristian S. Jensen, Lorenzo Valentini, Rene B. Christensen, Marco Chiani, Petar Popovski

    Published 2025-01-01
    “…In this article, we introduce a generalization of one-way superdense coding to two-way communication protocols for transmitting classical bits by using entangled quantum pairs. The proposed protocol jointly addresses the provision of entangled pairs and superdense coding, introducing an integrated approach for managing entanglement within the communication protocol. …”
    Get full text
    Article
  17. 1217

    An Efficient Adaptive Anticollision Algorithm Based on 4-Ary Pruning Query Tree by Wei Zhang, Yajun Guo, Xueming Tang, Guohua Cui, Longkai Wu, Ying Mei

    Published 2013-12-01
    “…On the basis of the information of collision bits, some idle timeslots can be eliminated through pruning the 4-ary tree. …”
    Get full text
    Article
  18. 1218

    Contact plan design based on bi-directional particle swarm optimization in satellite network by Cuiqin DAI, Huang TANG, Linfeng GUO

    Published 2019-08-01
    “…Aiming at the problems of time-varying topology,intermittent connection,and constrained resource in satellite network,a contact plan design (CPD) scheme based on bi-directional particle optimization (BPSO) algorithm was proposed.Firstly,the task-based time-expanded graph (TEG) model was constructed through the analysis of resource-constrained time-varying satellite network.Next,available contact plan (CP) in satellite network were generated through initialization,coding and repairing by considering the discreteness of network topology and the limitation of node resources.Then,an evaluation function was designed according to the characteristics of the execution task to distinguish whether the generated available CP was good or bad.Finally,the bits to be corrected in the worst location were determined according to the sparse characteristics of links in CP,and the CP was continuously modified by the proposed BPSO algorithm to optimize the performance of spatial data transmission.The simulation results show that the proposed BPSO-based CPD scheme can effectively reduce the task delivery time and increase the task arrival rate.…”
    Get full text
    Article
  19. 1219

    El arbitraje del CIADI y su contribución al desarrollo a la luz de las inversiones directas en mercados emergentes by Lidia MORENO BLESA

    Published 2015-05-01
    “…To achieve this, all Bilateral Promotion and Reciprocal Protection of Investments Treaties (BITs) contain mechanisms for resolution of disputes between investors and States similar to the ICSID Convention or refer to it. …”
    Get full text
    Article
  20. 1220