Showing 1,221 - 1,240 results of 1,322 for search '"bit"', query time: 0.07s Refine Results
  1. 1221

    Recursive Quantum Relaxation for Combinatorial Optimization Problems by Ruho Kondo, Yuki Sato, Rudy Raymond, Naoki Yamamoto

    Published 2025-01-01
    “…Combining this finding with the concept of quantum random access codes (QRACs) for encoding bits into quantum states on fewer qubits, we propose an efficient recursive quantum relaxation method called recursive quantum random access optimization (RQRAO) for MAX-CUT. …”
    Get full text
    Article
  2. 1222

    A Tsunami Ball Approach to Storm Surge and Inundation: Application to Hurricane Katrina, 2005 by Steven N. Ward

    Published 2009-01-01
    “…I develop a completely new approach that uses a momentum equation to accelerate bits or balls of water over variable depth topography. …”
    Get full text
    Article
  3. 1223

    Reversible data hiding in encrypted images based on fine-grained embedding room reservation by Jinwei LI, Xiaoya ZHANG, Yuanzhi YAO, Nenghai YU

    Published 2022-02-01
    “…Reversible data hiding in encrypted images has attracted considerable attention due to the privacy-preserving requirement for cloud data management.The good performance in this area can be achieved by using the existing framework of reserving room before encryption, where the image is partitioned to two independent slices consisting of blocks and then traditional reversible data hiding techniques are utilized to vacate room.In order to better exploit the spatial correlation of images, a fine-grained scalable embedding room reservation strategy in which blocks were rearranged to constitute the textured slice and the smooth slice was proposed.The block-size can be adjusted adaptively according to the texture of the images and the size of room to be vacated.The original locations of these blocks were efficiently represented as the to-be-embedded auxiliary information for image restoration.Because pixels in the smooth slice are easier to be predicted, the smooth slice can contain more pixel bits from the textured slice to reserve more room and fewer embedding distortions are induced with traditional reversible data hiding techniques.Extensive experiments demonstrate the merits of the proposed method in terms of embedding capacity and image quality.…”
    Get full text
    Article
  4. 1224
  5. 1225

    Micro-Trivium: A lightweight algorithm designed for radio frequency identification systems by Shiyong Zhang, Gongliang Chen

    Published 2017-02-01
    “…In this article, we generalize Trivium to the Trivium-Model algorithm and highlight that security is mainly determined by the internal state bits and the number of nonlinear terms. We propose principles for choosing parameters and generating better parameters that are feasible for low-cost radio frequency identification tags in distributed sensor networks. …”
    Get full text
    Article
  6. 1226

    Establishment and performance analysis of RIS-assisted coded relay cooperation system based on LDPC product codes by Shunwai ZHANG, Jin WANG

    Published 2023-11-01
    “…To pursue the ultra-reliable information transmission, the system which combined the reconfigurable intelligent surface (RIS) technology and coded relay cooperation technology was investigated.The RIS-assisted coded relay cooperation system model based on low density parity check (LDPC) product codes was established.Based on LDPC product codes, the information matrix was row-encoded by the source node and column-encoded by the relay node, respectively.An efficient joint iterative decoding algorithm was proposed.The two received signals at the destination were row-decoded and column-decoded iteratively to update the logarithmic likelihood ratios of information bits, and then the decoding decision was made.The closed-form solutions of the outage probability and the channel capacity with finite codelength were theoretically derived.Theoretical analysis and simulation results show that the proposed system obviously outperforms the traditional coded relay cooperation.The more number of RIS elements, the more significant advantage can be obtained.Simulation results also demonstrate that the channel capacity with finite codelength approaches the ideal channel capacity with the codelength of LDPC product codes increasing.…”
    Get full text
    Article
  7. 1227

    An Efficient Approximate Multiplier with Encoded Partial Products and Inexact Counter for Joint Photographic Experts Group Compression by Elham Esmaeili, Nabiollah Shiri

    Published 2024-01-01
    “…In this study, a low-power and high-speed approximate 4 : 2 counter is proposed to add partial product (PP) bits. Also, a new partial product generation (PPG) is introduced by inserting errors in Karnaugh’s map to reduce the circuit complexity. …”
    Get full text
    Article
  8. 1228
  9. 1229

    Tribal Health: A Public Health Exigency and Road Map to Future by Monalisha Sahu, Anit Kujur, Vinayagamoorthy Venugopal, Parag Govil, Ratnesh Sinha, Medha Mathur, Tanveer Rehman, Rishabh Kumar Rana, Dewesh Kumar

    Published 2024-12-01
    “…Although the information available in bits and pieces shows a dismal picture of their health. …”
    Get full text
    Article
  10. 1230

    Improved 2D Discrete Hyperchaos Mapping with Complex Behaviour and Algebraic Structure for Strong S-Boxes Generation by Musheer Ahmad, Eesa Al-Solami

    Published 2020-01-01
    “…The standard set of performance parameters such as nonlinearity, strict avalanche criterion, bits independent criterion, differential uniformity, and linear approximation probability is quantified to assess the security and robustness of proposed S-box. …”
    Get full text
    Article
  11. 1231

    Green communication and networking for Carbon-peaking and Carbon-neutrality: challenges and solutions by Zhisheng NIU, Sheng ZHOU, Yuxuan SUN

    Published 2022-02-01
    “…Driven by the Carbon-peaking and Carbon-neutrality strategic goals, future mobile communication and networks need to drastically reduce energy consumption while satisfying the growing traffic demand.Therefore, it is necessary to study the theories and technologies used to send more information bits with less energy (SMILE).To meet the challenge, it was far from enough to rely solely on the improvements of wireless transmission technologies and hardware.It was necessary to explore efficient energy utilization mechanisms from the perspective of the system and network.Both energy saving and renewable energy utilization approaches were proposed, and solutions for the growing computing energy consumption were provided.Specifically, by introducing hyper-cellular network, agile coverage and elastic access were realized, and thus service base stations and edge servers could enter the sleeping mode to save energy when the traffic volume was low.Meanwhile, by the introduction of renewable energy and the smart adaption of energy flow and information flow, the energy consumption of the power grid could be greatly reduced.Furthermore, green computing and artificial intelligence could be realized through network function virtualization, energy-efficient coordination of communication and compute resources, and distributed computing and coordination approaches of moving agents.…”
    Get full text
    Article
  12. 1232

    Combinational Circuits Testing Based on Hsiao Codes with Self-Dual Check Functions by Dmitry V. Efanov, Tatiana S. Pogodina, Nazirjan M. Aripov, Sunnatillo T. Boltayev, Asadulla R. Azizov, Elnara K. Ametova, Feruza F. Shakirova

    Published 2025-01-01
    “…These signs indicate that the functions (there are functions that describe check bits) belong to the class of self-dual Boolean functions and also belong to the codewords of Hsiao codes (these are codes with an odd column of weights). …”
    Get full text
    Article
  13. 1233

    Optical semantic communication through multimode fiber: from symbol transmission to sentiment analysis by Zheng Gao, Ting Jiang, Mingming Zhang, Hao Wu, Ming Tang

    Published 2025-01-01
    “…We further enhance spectral efficiency by implementing 4-level pulse amplitude modulation (PAM-4), achieving 9.12 bits/s/Hz without decoding errors. Additionally, we explore the application of this system for sentiment analysis using the IMDb movie review dataset. …”
    Get full text
    Article
  14. 1234

    Full-Scale Laboratory Test of Cutting Large-Diameter Piles Directly by Shield Cutterhead by Yuqing Wang, Xinyu Wang, Yangyang Xiong, Zhuangzhi Yang, Jie Zhang

    Published 2022-01-01
    “…It is recommended that majorities of the cutters shall be disc cutters and supplemented with drag bits and tear cutters.…”
    Get full text
    Article
  15. 1235

    Modeling and Experimental Validation of the Intrinsic SNR in Spin Qubit Gate-Based Readout and Its Impacts on Readout Electronics by Bagas Prabowo, Jurgen Dijkema, Xiao Xue, Fabio Sebastiano, Lieven M. K. Vandersypen, Masoud Babaie

    Published 2024-01-01
    “…In semiconductor spin quantum bits (qubits), the radio-frequency (RF) gate-based readout is a promising solution for future large-scale integration, as it allows for a fast, frequency-multiplexed readout architecture, enabling multiple qubits to be read out simultaneously. …”
    Get full text
    Article
  16. 1236

    Indications of Brain Computed Tomography Scan in Children Younger Than 3 Years of Age with Minor Head Trauma by İsmail Gülşen, Hakan Ak, Sevdegül Karadaş, İsmail Demır, Mehmet Deniz Bulut, Soner Yaycioğlu

    Published 2014-01-01
    “…In this study, hospital case notes of 1350 children attending the emergency department of Bitlis State Hospital between January 2011 and June 2013 were retrospectively reviewed. 508 children under 3 years of age with minor head trauma were included in this study. …”
    Get full text
    Article
  17. 1237

    A Four Quadrature Signals’ Generator with Precise Phase Adjustment by Xiushan Wu, Yanzhi Wang, Siguang An, Jianqiang Han, Ling Sun

    Published 2016-01-01
    “…The circuit uses a supply voltage of 1.8 V, a bias current of 7.2 μA, and the bits of phase-setting input level n=6 in the design. …”
    Get full text
    Article
  18. 1238
  19. 1239

    Secure and Privacy Enhanced Gait Authentication on Smart Phone by Thang Hoang, Deokjai Choi

    Published 2014-01-01
    “…We achieved the lowest false acceptance rate (FAR) and false rejection rate (FRR) of 3.92% and 11.76%, respectively, in terms of key length of 50 bits.…”
    Get full text
    Article
  20. 1240