Results 1 to 10 of about 983,735 (259)

Metacognitive Information Theory. [PDF]

open access: yesOpen Mind (Camb), 2023
The capacity that subjects have to rate confidence in their choices is a form of metacognition, and can be assessed according to bias, sensitivity and efficiency. Rich networks of domain-specific and domain-general regions of the brain are involved in the rating, and are associated with its quality and its use for regulating the processes of thinking ...
Dayan P.
europepmc   +4 more sources

Information Theory in Game Theory [PDF]

open access: yesEntropy, 2018
Information theory, as the mathematics of communication and storage of information, and game theory, as the mathematics of adversarial and cooperative strategic behaviour, are each successful fields of research on their own. [...]
MHR Khouzani, Pasquale Malacaria
doaj   +4 more sources

Dataset for file fragment classification of video file formats

open access: yesBMC Research Notes, 2020
Objectives File fragment classification of video file formats is a topic of interest in network forensics. There are some publicly available datasets for file fragments of various file types such as textual, audio, and image file formats.
Narges Sadeghi   +2 more
doaj   +1 more source

Analysis of tree algorithm for collision resolution [PDF]

open access: yesDiscrete Mathematics & Theoretical Computer Science, 2005
For the tree algorithm introduced by [Cap79] and [TsMi78] let $L_N$ denote the expected collision resolution time given the collision multiplicity $N$. If $L(z)$ stands for the Poisson transform of $L_N$, then we show that $L_N - L(N) ≃ 1.29·10^-4 \cos ...
Laszlo Gyorfi, Sándor Gyori
doaj   +1 more source

Channel Hardening in Massive MIMO: Model Parameters and Experimental Assessment

open access: yesIEEE Open Journal of the Communications Society, 2020
Reliability is becoming increasingly important for many applications envisioned for future wireless systems. A technology that could improve reliability in these systems is massive MIMO (Multiple-Input Multiple-Output).
Sara Willhammar   +3 more
doaj   +1 more source

Stealthy Secret Key Generation

open access: yesEntropy, 2020
In order to make a warden, Willie, unaware of the existence of meaningful communications, there have been different schemes proposed including covert and stealth communications.
Pin-Hsun Lin   +3 more
doaj   +1 more source

CNNPRE: A CNN-Based Protocol Reverse Engineering Method

open access: yesIEEE Access, 2023
Given the growth in computer networks and Internet usage, the traditional network environment has evolved into a more intricate system. Many applications utilize unknown communication protocols, for which the specification documentation is not available.
Javad Garshasbi, Mehdi Teimouri
doaj   +1 more source

Genetic Optimization of Liquid Crystal Matrix Based Interference Suppression for VLC MIMO Transmissions

open access: yesIEEE Photonics Journal, 2022
Optical channel decorrelation is a key aspect in designing a multi-user visible light communication system. As light-emitting diodes (LEDs) are commonly used for illumination and data transmission in such a system simultaneously, the interference between
Adrian Krohn   +2 more
doaj   +1 more source

Structured channel covariance estimation from limited samples for large antenna arrays

open access: yesEURASIP Journal on Wireless Communications and Networking, 2023
In massive multiuser multiple antenna systems, the knowledge of the users’ channel covariance matrix is crucial for minimum mean square error channel estimation in the uplink and it plays an important role in several multiuser beamforming schemes in the ...
Tianyu Yang   +3 more
doaj   +1 more source

Extended IMD2020: a large‐scale annotated dataset tailored for detecting manipulated images

open access: yesIET Biometrics, 2021
Image forensic datasets need to accommodate a complex diversity of systematic noise and intrinsic image artefacts to prevent any overfitting of learning methods to a small set of camera types or manipulation techniques.
Adam Novozámský   +2 more
doaj   +1 more source

Home - About - Disclaimer - Privacy