Results 71 to 80 of about 2,705,238 (250)
Global Urban‐Rural Differences in Precipitation: Cities See More Light Rain But Milder Extremes
Abstract Ample evidence has shown that cities modulate regional hydrometeorology and hydroclimatology. Because different precipitation intensities have distinct hydrological and societal impacts, with light precipitation helping to alleviate urban heat and extreme precipitation often driving flood risks, it is important to understand whether and how ...
Mingze Ding +5 more
wiley +1 more source
Quick response code adalah matriks dua dimensi yang dapat menyimpan informasi dalam empat mode pengkodean berbeda. QR Code menawarkan kemudahan dan kecepatan dalam menyimpan dan mengakses informasi sehingga dalam implementasinya terbatas pada penyematan ...
Muliyadi -, Rahmat Karim
doaj +1 more source
Applications of Non-Uniquely Decodable Codes to Privacy-Preserving High-Entropy Data Representation
Non-uniquely-decodable (non-UD) codes can be defined as the codes that cannot be uniquely decoded without additional disambiguation information. These are mainly the class of non–prefix–free codes, where a code-word can be a prefix of other(s)
Muhammed Oğuzhan Külekci +1 more
doaj +1 more source
Parallel data compression [PDF]
Data compression schemes remove data redundancy in communicated and stored data and increase the effective capacities of communication and storage devices. Parallel algorithms and implementations for textual data compression are surveyed.
Hirschberg, Daniel S., Stauffer, Lynn M.
core
Efficient Kilometer‐Scale Precipitation Downscaling With Conditional Wavelet Diffusion
Abstract Precipitation products such as Integrated Multi‐satellitE Retrievals have coarse resolution (∼10 ${\sim} 10$ km), which limits their application in hydrological modeling and extreme weather analysis. We propose the Wavelet Diffusion Model (WDM), a fast generative framework for high‐quality precipitation downscaling trained on multi‐radar multi‐
Chugang Yi +4 more
wiley +1 more source
Error Free Perfect Secrecy Systems
Shannon's fundamental bound for perfect secrecy says that the entropy of the secret message cannot be larger than the entropy of the secret key initially shared by the sender and the legitimate receiver. Massey gave an information theoretic proof of this
Chan, Terence H. +3 more
core +1 more source
Abstract Effective drought management is critical for agriculture‐based economies like India. This study examines whether a transformer‐based architecture can function as a robust pre‐trained backbone for operational drought forecasting across India. We utilized a pre‐trained transformer model, which was trained on the Indian Monsoon Data Assimilation ...
Ashish Pathania, Vivek Gupta
wiley +1 more source
New Steganography System Based on Huffman Coding and Fibonacci Decomposition
Hiding secret information in the image is a challenging and painstaking task in computer security and steganography system. Certainly, the absolute intricacy of attacks to security system makes it more attractive.in this research on steganography ...
Fadheela Sabri Abu-Almash
doaj +1 more source
Abstract Atmospheric rivers (ARs) were first documented by Zhu and Newell for transporting global water vapor. ARs contribute to extreme rainfall, especially over the Western United States. The primary water vapor source of ARs is from the tropical ocean, where convective systems bring the moist flux upward from the surface to the troposphere. Previous
Chad A. Small +2 more
wiley +1 more source
Abstract Atmospheric rivers (ARs) constitute a global, interconnected highway network rather than isolated regional events. In boreal summer, cross‐Pacific ARs originate over Southeast Asia, are fueled by subtropical outflows from the Asian monsoon plume, transport warm, moist air across the North Pacific, and make landfall in North America (NA).
Yurong Song, Mengqian Lu, Yang Zhao
wiley +1 more source

