Results 81 to 90 of about 30,630 (205)
The transient impact components in vibration signal, which are the major information for bearing fault severity recognition, are often interfered with by ambient noise.
Jiancheng Yin +5 more
doaj +1 more source
Parallel data compression [PDF]
Data compression schemes remove data redundancy in communicated and stored data and increase the effective capacities of communication and storage devices. Parallel algorithms and implementations for textual data compression are surveyed.
Hirschberg, Daniel S., Stauffer, Lynn M.
core
An Optimized Parameterization of Sub‐Grid Scale Advection for Convection Permitting Models
Abstract Convection‐permitting models (CPMs) explicitly resolve deep convection yet under‐resolve the organized lateral exchanges among drafts and their environment that control entrainment/detrainment, precipitation efficiency, and mesoscale structure.
Samson Hagos +3 more
wiley +1 more source
A simple lossy audio coding scheme based on the DWT [PDF]
This paper proposes a simple scheme for audio coding that does not use perceptual models. The audio coder is based on the discrete wavelet transform to decorrelate signals, computed through the lifting scheme, and followed by Huffman coding.
Khevariya, Prashant K. +2 more
core
On Regular Quaternary Hadamard Matrices
ABSTRACT Through the use of regularizing vectors, all regular quaternary Hadamard matrices of orders 10 and 18 have been successfully identified. Of these, two matrices of order 10 and 184 matrices of order 18 were found to have unbiased mates. Converting the quaternary Hadamard matrices of order 18 to real Hadamard matrices, the study uncovered that ...
Hadi Kharaghani +2 more
wiley +1 more source
Cryptographic Algorithms with Data Shorter than the Encryption Key, Based on LZW and Huffman Coding. [PDF]
Krokosz T +4 more
europepmc +1 more source
Abstract Convection‐permitting regional climate models (CP‐RCMs) often outperform coarser‐resolution models in simulating precipitation, but assessing their accuracy across resolutions and configurations remains challenging. This study evaluates the performance and sensitivity of different configurations of the sixth version of the Canadian Regional ...
Kim Lahaie +3 more
wiley +1 more source
Entrainment of Muddy Sediment From Immobile Gravel River Beds
Abstract This study examines the transport of fine muddy sediment through a gravel‐bed reach. In such cases, mud is often conceptualized as a size fraction that interacts little with the bed (i.e., as washload). However, previous studies have shown that mud can deposit within gravel beds.
Brayden Schiller, Kyle Strom
wiley +1 more source
New Steganography System Based on Huffman Coding and Fibonacci Decomposition
Hiding secret information in the image is a challenging and painstaking task in computer security and steganography system. Certainly, the absolute intricacy of attacks to security system makes it more attractive.in this research on steganography ...
Fadheela Sabri Abu-Almash
doaj +1 more source
Mismatch negativity (MMN) and late discriminative negativity (LDN) were reliably elicited by pitch contour deviants across adulthood (18–86 years). MMN amplitude declined with age and predicted subsequent auditory memory precision, whereas LDN amplitude remained largely stable and showed no relationship with memory performance.
Ricky Chow +3 more
wiley +1 more source

