Results 41 to 50 of about 43,821 (259)
A novel chaotic interleaving algorithm for mobile wireless channels
Interleaving technique is an efficient technique to resist serious burst errors over mobile wireless fading channels.To resist 2 dimensionality burst errors effectively,a novel chaotic interleaving algorithm based on Baker map was proposed.In the ...
Xianping WANG, Hui CAO
doaj
Analisis Unjuk Kerja Convolutional Code pada Sistem MIMO MC-DSSS Melalui Kanal Rayleigh Fading
Kombinasi antara sistem MIMO (multiple input multiple output), OFDM (orthogonal frequency division multiplexing), dan spread spectrum serta adanya teknik pengkodean kanal mampu mengurangi efek fading dan error yang terjadi. Penelitian ini bertujuan untuk
Kadek Agus Mahabojana Dwi Prayoga +2 more
doaj +1 more source
Real‐Time 3D Ultrasound Imaging with an Ultra‐Sparse, Low Power Architecture
This article presents a novel, ultra‐sparse ultrasound architecture that paves the way for wearable real‐time 3D imaging. By integrating a unique convolutional array with chirped data acquisition, the system achieves high‐resolution volumetric scans at a fraction of the power and hardware complexity.
Colin Marcus +9 more
wiley +1 more source
Ferroelectric Quantum Dots for Retinomorphic In‐Sensor Computing
This work has provided a protocol for fabricating retinomorphic phototransistors by integrating ferroelectric ligands with quantum dots. The resulting device combines ferroelectricity, optical responsiveness, and low‐power operation to enable adaptive signal amplification and high recognition accuracy under low‐light conditions, while supporting ...
Tingyu Long +26 more
wiley +1 more source
Convolutional coding for code multiplexing of channels [PDF]
This paper explores the application of convolutional codes and their extensions in the context of binary channel code division. A novel method for channel division utilizing convolutional coding is presented, alongside a comparative analysis with block ...
Rabin Alexey +2 more
doaj +1 more source
Deep Learning and Regularization Algorithms for Malicious Code Classification
Network security has become a growing concern within the popularity and development of the Internet. Malicious code is one of the main threats to network security.
Haojun Wang +4 more
doaj +1 more source
Bioinspired Adaptive Sensors: A Review on Current Developments in Theory and Application
This review comprehensively summarizes the recent progress in the design and fabrication of sensory‐adaptation‐inspired devices and highlights their valuable applications in electronic skin, wearable electronics, and machine vision. The existing challenges and future directions are addressed in aspects such as device performance optimization ...
Guodong Gong +12 more
wiley +1 more source
AI‐Assisted Workflow for (Scanning) Transmission Electron Microscopy: From Data Analysis Automation to Materials Knowledge Unveiling. Abstract (Scanning) transmission electron microscopy ((S)TEM) has significantly advanced materials science but faces challenges in correlating precise atomic structure information with the functional properties of ...
Marc Botifoll +19 more
wiley +1 more source
Source code suggestion is the utmost helpful feature in the integrated development environments that helps to quicken software development by suggesting the next possible source code tokens.
Yasir Hussain, Zhiqiu Huang, Yu Zhou
doaj +1 more source
Magnetic doping of the topological insulator Bi2Te3 with erbium adatoms induces out‐of‐plane magnetism and breaks time‐reversal symmetry, opening a Dirac gap and driving a Fermi surface transition from hexagonal to star‐of‐David geometry. Microscopy, spectroscopy, and magnetic dichroism reveal atomically controlled magnetic interactions that tailor the
Beatriz Muñiz Cano +18 more
wiley +1 more source

