Showing 13,301 - 13,320 results of 14,440 for search 'BCIT~', query time: 1.20s Refine Results
  1. 13301

    Revize vzdělávacího obsahu bezpečnostní problematiky pohledem klíčových aktérů kurikulární reformy by Miroslava Kovaříková

    Published 2025-01-01
    “…Je tedy zřejmé, že jsou učiteli považována za témata patřící do vzdělávání. …”
    Get full text
    Article
  2. 13302

    Wav-audio steganography algorithm based on amplitude modifying by 邹明光, 李芝棠

    Published 2014-10-01
    “…Algorithms in different effective domains are analysed,and a wav-audio steganography algorithm based on amplitude modifying is proposed.The secret audio is scrambled through a random number generator.Amplitude values of each sampling point group are compared in original audio.While amplitude values are modified,the secret information bits are embedded.Embedding strength can be adjusted according to the key.Simulation results demonstrate that hiding capacity of this algorithm is large and good invisibility can be achieved.The anti-steganalysis ability of this algorithm is good and blind extraction can be realized.…”
    Get full text
    Article
  3. 13303

    Study of FEC at edge node of optical code label switching network by Yu-bao WANG, Shao-yu ZHI

    Published 2012-05-01
    “…The structure block of the optical code label switching network was built,and the design scheme for the forwarding equivalent classes (FEC)was proposed employing OCDM technology which was appropriate for variable packets transmission and allow the label processed in parallel in core node.The overhead between the duration of control bits and the duration of payload was investigated based on the above design scheme.The fixed slot algorithm (FSA) was employed to assemble the incoming packets in the assemble queue,simulation results and analysis were given between the relation of arrival ratio/assemble slot and packets loss ratio.…”
    Get full text
    Article
  4. 13304

    La Sante Nan Lavi Granmoun: Gid Pou Manje Storaj by Jennifer Hillan

    Published 2005-02-01
    “… Si ou pa achte manje souvan, ou achte manje ki pral sevi-w pou anpil tan. …”
    Get full text
    Article
  5. 13305

    La Sante Nan Lavi Granmoun: Gid Pou Manje Storaj by Jennifer Hillan

    Published 2005-02-01
    “… Si ou pa achte manje souvan, ou achte manje ki pral sevi-w pou anpil tan. …”
    Get full text
    Article
  6. 13306

    A VHDL Code for Offset Pulse Position Modulation Working with Reed Solomon System by Using ModelSim by Ahmed H. Albatoosh, Mohamed Ibrahim Shuja'a, Basman M. Al-Nedawe

    Published 2022-12-01
    “…These bits can then be utilized by the receiver to identify and correct specific types of errors. …”
    Get full text
    Article
  7. 13307

    Screen Guided Training Does Not Capture Goal-Oriented Behaviors: Learning Myoelectric Control Mappings From Scratch Using Context Informed Incremental Learning by Evan Campbell, Ethan Eddy, Xavier Isabel, Scott Bateman, Benoit Gosselin, Ulysse Cote-Allard, Erik Scheme

    Published 2025-01-01
    “…Despite lower offline accuracy, the ZS-A model achieved the highest online throughput (<inline-formula> <tex-math notation="LaTeX">$1.47~\pm ~0.46$ </tex-math></inline-formula> bits/s), significantly outperforming the SGT baseline (<inline-formula> <tex-math notation="LaTeX">$1.15~\pm ~0.37$ </tex-math></inline-formula> bits/s) and reached competitive performance within 200 seconds. …”
    Get full text
    Article
  8. 13308

    Determining the Natural Disaster Diversity of Van Province by Fine Kinney Risk Assessment Method (FK-RAM) by Bülent Matpay, Sacit Mutlu

    Published 2023-07-01
    “…RAM, which was previously applied by researchers for Bitlis, was applied for the first time for Van province. …”
    Get full text
    Article
  9. 13309

    Effect of a Selective Progesterone Receptor Modulator on Induction of Apoptosis in Uterine Fibroids In Vivo by Petr Horak, Michal Mara, Pavel Dundr, Kristyna Kubinova, David Kuzel, Robert Hudecek, Roman Chmel

    Published 2012-01-01
    “…No statistical difference in the AI was observed between the two groups of patients treated with ulipristal acetate (5 mg or 10 mg). Conclusion. Treatment with ulipristal acetate induces apoptosis in uterine fibroid cells. …”
    Get full text
    Article
  10. 13310

    Active Cycle Of Breathing Technique Terhadap Fungsi Paru pada Pasien Paska Operasi Bedah Jantung by Fakrul Ardiansyah, Elly Nurachmah, Muhamad Adam

    Published 2021-03-01
    “…This study used pra experiment method involving 30 respondents with purposive sampling technique in adult surgery intensive care unit and Surgical ward. This group applies ACBT for 4 days: 2x/day, duration 15 minutes/session on 1st and 2nd day after surgery; 1x/day, duration 15 minutes/session on 3rd and 4th day after surgery. …”
    Get full text
    Article
  11. 13311

    Security of the cryptosystems based on ergodic matrices by Hua-wei HUANG, Chang-wen PENG, Yun-yun QU, Chun-hua LI

    Published 2015-08-01
    “…The security of the public-key cryptosystems based on ergodicmatrices over finite field was analysed.According to the public key,a system of linear equations for the forged secret key bits is obtained by inverse matrix elimination method.It is proved that the computational TEME problem is solvablein polynomial time and the ciphertext of the PZZ1 cryptosystem can be decrypted by the forged secret key.In some case the SEME problem can be reduced to discrete logarithm problem in polynomial time.If the key parameters are chosen improperly,then PZZ2 cryptosystem is based on discrete logarithm problem instead of NP hard problem.…”
    Get full text
    Article
  12. 13312

    Research and simulation of timing attacks on ECC by Hui-hui JIA, Chao WANG, Jian GU, Hao-hao SONG, Di TANG

    Published 2016-04-01
    “…Based on the hidden Markov model (HMM) idea,a timing attack on the elliptic curve digital signature system,which adopted the “double-and-add” scalar multiplication,was proposed.Simulation experiments on the secure Koblitz curve which released by the National Institute of Standards Technology (NIST) were implemented and four secure Koblitz curves except the K-571 were attacked successfully.The experiment results show that the attack can recover almost all the key bits in a few minutes by collecting only once time data,and is easy to imple-ment at a high success rate.…”
    Get full text
    Article
  13. 13313

    Resource Allocation Algorithm for the Downlink of Multi-User OFDM System with Optimized Fairness by Limei Tang, Haiyan Cao, Jun Li, Shiyi Xie

    Published 2015-12-01
    “…Firstly, assign the subcarriers to users with the constraint on proportional fairness and the water-filling algorithm was used in this process for the power allocation of each subcarrier. Then update the bits and power for each subcarrier of all the users using greedy power allocation to achieve higher data rates and power efficiency. …”
    Get full text
    Article
  14. 13314
  15. 13315

    Energy efficiency joint optimization algorithm for low-precision ADC massive MIMO systems by Haiyan CAO, Wenjuan HU, Yingjuan ZHI, Fangmin XU, Xin FANG

    Published 2020-06-01
    “…An uplink energy efficiency optimization algorithm based on alternating optimization algorithm was proposed for large-scale multiple-input multiple-output (MIMO) systems with low-precision analog to digital converters (ADC).That is,based on the maximum ratio combining (MRC) reception,an optimization model aiming at maximizing energy efficiency was established,and then the original fractional form optimization problem was converted into an equivalent subtractive form according to the nature of the fractional programming.In the case where the number of quantization bits was constant,the iterative optimization of the transmission power and the pilot length were performed.Simulation results show that the proposed algorithm has better spectral efficiency and energy efficiency.…”
    Get full text
    Article
  16. 13316

    VLSI design of an irregular LDPC decoder in DTMB by CHEN Yun, ZENG Xiao-yang, LIN Yi-fan, XIANG Bo, DENG Yun-song

    Published 2007-01-01
    “…An irregular LDPC decoder with a code length of 7 493 bits for DTMB system was implemented based on SMIC 0.13μm CMOS process.A new method to control memories was proposed,which can reuse memories for three different code rates only by increasing 5% memory usage.The throughput of the LDPC decoder is up to 150Mbit/s with the max iterative number of 15.While keeping the throughout of 50Mbit/s,its max iterative number can reach 45.The FPGA synthesis reports and the decoder layout in SMIC 0.13μm CMOS technology are given.…”
    Get full text
    Article
  17. 13317

    Novel robust content-based watermarking for image by YANG Shi-yong1, WU Xiao-li2, YUE An-jun2, GE Jian-hua2

    Published 2005-01-01
    “…The chaotic mapping enables the logo pixels rearrange randomly in the specified spatial domain, and the mixed bits of the logo were embedded in the image DCT coefficients. …”
    Get full text
    Article
  18. 13318

    Active Cycle Of Breathing Technique Terhadap Fungsi Paru pada Pasien Paska Operasi Bedah Jantung by Fakrul Ardiansyah, Elly Nurachmah, Muhamad Adam

    Published 2021-05-01
    “…This study used pra experiment method involving 30 respondents  with purposive sampling technique in adult surgery intensive care unit and Surgical ward. This group applies ACBT for 4 days: 2x/day, duration 15 minutes/session on 1st and 2nd  day after surgery; 1x/day, duration 15 minutes/session on 3rd and 4th day after surgery. …”
    Get full text
    Article
  19. 13319

    Bacterias productoras de hidrolasas aisladas de suelos de cultivos de arroz: Caracterización fenotípica y molecular by Manuel Vilchez-Chávez, Juan C. Flores-Santos, Susana Calderón-Toledo, Julio Palma-Villanueva, Amparo Iris Zavaleta

    Published 2024-04-01
    “…Las bacterias, según su actividad hidrolítica, formaron cinco grupos: tres degradaron gelatina, leche descremada, caseína, aceite de oliva, almidón, celulosa, pectina, y tributirina; una, aceite de oliva y tributirina; otra, gelatina, leche descremada, aceite de oliva y tributirina; una, gelatina, aceite de oliva, almidón, tributirina; y una, gelatina, leche descremada, caseína, aceite de oliva y tributirina. …”
    Get full text
    Article
  20. 13320

    Crystal structure of poly[μ3-acetato-diaqua-μ3-sulfato-cerium(III)]: serendipitous synthesis of a layered coordination polymer exhibiting interlayer O—H...O hydrogen bonding by Niklas Ruser, Christian Näther, Norbert Stock

    Published 2025-02-01
    “…Single crystals of the title compound, [Ce(CH3COO)(SO4)(H2O)2]n, were obtained serendipitously by the reaction of Ce(NO3)3·6H2O with 2,5-thiophenedicarboxylic acid (H2TDC) and acetic acid in a mixture of ethanol and water, where it is assumed that the sulfate ions leached from the Teflon reactor, which was treated with peroxymonosulfuric acid prior to its use. …”
    Get full text
    Article