-
1241
Some New Constructions of <i>q</i>-ary Codes for Correcting a Burst of at Most <i>t</i> Deletions
Published 2025-01-01“…For the first scenario, our construction has redundancy <inline-formula><math xmlns="http://www.w3.org/1998/Math/MathML" display="inline"><semantics><mrow><mi>log</mi><mi>n</mi><mo>+</mo><mn>8</mn><mi>log</mi><mi>log</mi><mi>n</mi><mo>+</mo><mi>o</mi><mo>(</mo><mi>log</mi><mi>log</mi><mi>n</mi><mo>)</mo></mrow></semantics></math></inline-formula> bits, encoding complexity <inline-formula><math xmlns="http://www.w3.org/1998/Math/MathML" display="inline"><semantics><mrow><mi>O</mi><mo>(</mo><msup><mi>q</mi><mrow><mn>7</mn><mi>t</mi></mrow></msup><mi>n</mi><msup><mrow><mo>(</mo><mi>log</mi><mi>n</mi><mo>)</mo></mrow><mn>3</mn></msup><mo>)</mo></mrow></semantics></math></inline-formula> and decoding complexity <inline-formula><math xmlns="http://www.w3.org/1998/Math/MathML" display="inline"><semantics><mrow><mi>O</mi><mo>(</mo><mi>n</mi><mi>log</mi><mi>n</mi><mo>)</mo></mrow></semantics></math></inline-formula>. …”
Get full text
Article -
1242
Information-Theoretic Analysis of Underwater Acoustic OFDM Systems in Highly Dispersive Channels
Published 2012-01-01“…Numerical assessments on real UA channels with spread factors around 10−1 show that reliable OFDM transmissions at 2 to 4 bits/sec/Hz are achievable provided an average signal-to-noise ratio of 15 to 20 dB.…”
Get full text
Article -
1243
Chemical Feature-Based Molecular Modeling of Urotensin-II Receptor Antagonists: Generation of Predictive Pharmacophore Model for Early Drug Discovery
Published 2014-01-01“…The results demonstrate that the best model, Hypo 1, shows a correlation (r) of 0.902, a root mean square deviation (RMSD) of 0.886, and the cost difference of 39.69 bits. The model obtained is highly predictive with good correlation values for both internal (r2=0.707) as well as external (r2=0.614) test set compounds. …”
Get full text
Article -
1244
Reversible data hiding scheme based on pixel-value differencing in dual images
Published 2020-07-01“…In the proposed scheme, the cover image is divided into non-overlapping blocks and the maximum difference value is calculated to hide secret bits. On the sender side, the length of embeddable secret data is calculated by using the maximum difference value and the log function, and the decimal secret data are embedded into the two stego-images after applying the ceil function and floor function. …”
Get full text
Article -
1245
New and Safe Treatment of Food Impacted in the Esophagus: A Single Center Experience of 100 Consecutive Cases
Published 2013-01-01“…Aim. Large food bits can get stuck in the esophagus and must be removed by endoscopy. …”
Get full text
Article -
1246
Controlled Bidirectional Quantum Secure Direct Communication
Published 2014-01-01“…Our proposed protocol is aimed at protecting against external and participant attacks on such a system, and the cost of transmitting quantum bits using our protocol is less than that achieved in other studies. …”
Get full text
Article -
1247
Performance analysis of insertion loss incorporated hybrid precoding for massive MIMO
Published 2024-04-01“…Characterizing the effect of quantized analog precoding, it was shown that the subconnected structure was able to achieve better performance with fewer feedback bits than the fully connected structure.…”
Get full text
Article -
1248
A Modified Wolf Pack Algorithm for Multiconstrained Sparse Linear Array Synthesis
Published 2020-01-01“…In the new method, wolves are coded by Bloch spherical coordinates of quantum bits, updated by quantum revolving gates, and selectively adaptively mutated when performing poorly. …”
Get full text
Article -
1249
The Effect of Vertical Earthquake Motion on Steel Structures Behaviour in Different Seismic Zones
Published 2022-09-01“…In this study, four different settlements with different seismicity such as İzmir, Bitlis, Samsun and Konya were considered. Seismic risks and parameters for these provinces were compared. …”
Get full text
Article -
1250
-
1251
Diversité et état de conservation de la flore ligneuse des îlots forestiers du massif montagneux de Lubero (R.D. Congo)
Published 2024-03-01“…The Shannon diversity index is highly variable (1.98 to 4.03 bits) and the Pielou equitability is fairly high (0.83 to 0.94). …”
Get full text
Article -
1252
Security evaluation for parameters of SIMON-like cipher based on neural network distinguisher
Published 2023-04-01“…The neural distinguisher is a new tool widely used in crypto analysis of some ciphers.For SIMON-like block ciphers, there are multiple choices for their parameters, but the reasons for designer’s selection remain unexplained.Using neural distinguishers, the security of the parameters (a,b,c) of the SIMON-like with a block size of 32 bits was researched, and good choices of parameters were given.Firstly, using the idea of affine equivalence class proposed by Kölbl et al.in CRYPTO2015, these parameters can be divided into 509 classes.And 240 classes which satisfied gcd(a-b,2)=1 were mainly researched.Then a SAT/SMT model was built to help searching differential characteristics for each equivalent class.From these models, the optimal differential characteristics of SIMON-like was obtained.Using these input differences of optimal differential characteristics, the neural distinguishers were trained for the representative of each equivalence class, and the accuracy of the distinguishers was saved.It was found that 20 optimal parameters given by Kölbl et al.cannot make the neural distinguishers the lowest accuracy.On the contrary, there were 4 parameters, whose accuracy exceeds 80%.Furthermore, the 4 parameters were bad while facing neural distinguishers.Finally, comprehensively considering the choice of Kölbl et al.and the accuracy of different neural distinguishers, three good parameters, namely (6,11,1),(1,8,3), and(6,7,5) were given.…”
Get full text
Article -
1253
Futbolcu Transferlerinin Hisse Senedi Fiyatlarına Etkisi: Stoxx Avrupa Futbol Endeksi Üzerine Bir Analiz
Published 2022-10-01Get full text
Article -
1254
-
1255
FROM PHENOMENA AND LAWS OF NATURE TO INITIAL DATA SYMMETRY PRINCIPLES (EXPERIENCE OF RELATIONSHIP OF NATURAL SCIENCE AND THEOLOGY)
Published 2015-06-01“…So, in accordance with conformal symmetry, elementary objects of space-time are twistors that mathematically equivalent to cubits or to quantum generalisations of bits – information units. The general theory of knowledge eventually conducts to the fundamental theory of the information which, probably, will accept the name of quantum informodynamics, by analogy with quantum chromodynamics.…”
Get full text
Article -
1256
Diyanet İşleri Başkanlığı Hutbelerinde Kudüs ve Mescid-i Aksâ
Published 2024-12-01Get full text
Article -
1257
-
1258
DAVİD HUME’DA SİYASAL OTORİTEYE İTAAT YÜKÜMLÜLÜĞÜNÜN GEREKÇESİ VE SINIRLARI
Published 2023-08-01Get full text
Article -
1259
Quantum-resilient software security: A fuzzy AHP-based assessment framework in the era of quantum computing.
Published 2024-01-01“…The rapid development of quantum bits (qubits) regarded as basic quantum entities adds complexity and risk to the software security landscape. …”
Get full text
Article -
1260
A Hardware Accelerator for the Inference of a Convolutional Neural network
Published 2019-11-01“…Our implementation achieved a of accuracy for the MNIST database using only 12-bits fixed-point format. The results show that the co-processing scheme operating at a conservative speed of 100 MHz can identify around 441 images per second, which is about 17% times faster than a 650 MHz - software implementation. …”
Get full text
Article