Results 121 to 130 of about 2,963,905 (354)

An Iterative Detection Aided Unequal Error Protection Wavelet Video Scheme Using Irregular Convolutional Codes

open access: yes, 2006
A wavelet-based videophone scheme proposed, where the video bits are Unequal Error Protection (UEP) using Irregular Convolutional Codes (IRCCs). The proposed system uses Adaptive Arithmetic Coding (AAC) for encoding the motion vectors and individual ...
Hanzo, L.   +3 more
core  

Novel Medical Image Compression/Decompression Technique Based on Bicubic Interpolation With Matrix Reduction Algorithm

open access: yesIEEE Access
Medical imaging is an important contributor to diagnostic accuracy and monitoring of various health conditions, enabling healthcare professionals to gain valuable insights into the internal structures and functions of the body.
Sazeen Taha Abdulrazzaq   +4 more
doaj   +1 more source

Disturbance‐Resilient Voltage/Power‐Quality Management for Islanded Inverters Using Self‐Tuning Type‐3 Fuzzy Controller

open access: yesEnergy Science &Engineering, EarlyView.
An adaptive fuzzy controller using an interval type‐3 fuzzy logic system replaces the SMC switching term to mitigate chattering while preserving global stability for islanded inverters. Simulations show lower THD, greater robustness to disturbances and parameter variations, and improved voltage‐tracking accuracy, with applicability to other uncertain ...
Man‐Wen Tian   +7 more
wiley   +1 more source

Recruitment of the premotor cortex during arithmetic operations by the monkey

open access: yesScientific Reports
Arithmetic operations are complex mental processes rooted in the abstract concept of numerosity. Despite the significance, the neural architecture responsible for these operations has remained largely uncharted. In this study, we explored the presence of
Sumito Okuyama   +2 more
doaj   +1 more source

Nonlinear recurrences and arithmetic codes

open access: yesInformation and Control, 1977
We show that the binary expansion of the code numbers in an arithmetic BN-code, where B = (2e − 1)/A and e is the order of 2 mod A, may be generated by a unique nonsingular shift register of order k = [log2 A]. The shift register is linear if and only if A = 2k − 1 or 2k−1 + 1.
openaire   +1 more source

Decentralized Federated Learning for Wind Turbine Bearing Prognostics Under Data Scarcity and Statistical Heterogeneity

open access: yesEnergy Science &Engineering, EarlyView.
This paper proposes a decentralized peer‐to‐peer federated learning framework for wind turbine bearing remaining useful life prediction, introducing a virtual client paradigm in which statistical health indicators serve as independent feature‐level clients—enabling privacy‐preserving collaborative prognostics from a single physical asset under ...
Jihene Sidhom   +2 more
wiley   +1 more source

GABAC: an arithmetic coding solution for genomic data. [PDF]

open access: yesBioinformatics, 2020
Voges J   +9 more
europepmc   +1 more source

Antioxidant and Cytotoxic Properties of Piper spp. Volatile Oils That Inhibit Pathogenic Microorganisms

open access: yesFlavour and Fragrance Journal, EarlyView.
The samples were fungicidal against Candida, with MICs ranging from 62.5 to 250 μg/mL, and fungistatic against Penicillium adametzii, Aspergillus flavus and A. niger, with MICs of 1000 μg/mL. The volatile oils of Piper aduncum and Piper marginatum reduced the viability of MDA‐MB231 cells.
Midiã R. Oliveira   +11 more
wiley   +1 more source

Performance Assessment of the Immersed Boundary Method in the Framework of the Moment Representation Lattice Boltzmann Method

open access: yesInternational Journal for Numerical Methods in Fluids, EarlyView.
The immersed boundary method (IBM) was coupled with the moment representation lattice Boltzmann method (MR‐LBM), reducing bandwidth requirements compared to population‐based LBM formulations. A systematic assessment of IBM parameters was conducted to quantify their effect on computational performance.
Marco A. Ferrari   +2 more
wiley   +1 more source

Home - About - Disclaimer - Privacy