Results 11 to 20 of about 3,133,938 (283)
Research Performance, Collaboration, and Movement of Researchers in the Field of Business and Management: A Comparison between International and Domestic Migrants in East Asia [PDF]
This study examines differences in research performance, international collaboration, and migration moves between two types of migrant researchers: international and domestic migrant researchers.
Ying-Han Chang, Mu-Hsuan Huang
doaj +1 more source
Semi-tensor product-based one-bit compressed sensing
The area of one-bit compressed sensing (1-bit CS) focuses on the recovery of sparse signals from binary measurements. Over the past decade, this field has witnessed the emergence of well-developed theories.
Jingyao Hou, Xinling Liu
doaj +1 more source
In this work, by using the iterative method, we discuss the existence and uniqueness of solutions for multiterm fractional boundary value problems. Next, we examine some existence and uniqueness returns for semilinear fractional differential inclusions ...
Safia Meftah +3 more
doaj +1 more source
An Optimality Summary: Secret Key Agreement with Physical Unclonable Functions
We address security and privacy problems for digital devices and biometrics from an information-theoretic optimality perspective to conduct authentication, message encryption/decryption, identification or secure and private computations by using a secret
Onur Günlü, Rafael F. Schaefer
doaj +1 more source
Stealthy Secret Key Generation
In order to make a warden, Willie, unaware of the existence of meaningful communications, there have been different schemes proposed including covert and stealth communications.
Pin-Hsun Lin +3 more
doaj +1 more source
Wind energy, as a kind of renewable natural energy, is spread all over the world. It is one of the most widely used and promising green energy to adjust the energy structure. Therefore, wind energy conversion systems (WECSs) have captured a great deal of
Youjie Ma +3 more
doaj +1 more source
Information-Anchored Sensitivity Analysis: Theory and Application [PDF]
SummaryAnalysis of longitudinal randomized clinical trials is frequently complicated because patients deviate from the protocol. Where such deviations are relevant for the estimand, we are typically required to make an untestable assumption about post-deviation behaviour to perform our primary analysis and to estimate the treatment effect.
Cro, S, Carpenter, JR, Kenward, MG
openaire +6 more sources
Information transmission through a noisy quantum channel [PDF]
Noisy quantum channels may be used in many information-carrying applications. We show that different applications may result in different channel capacities. Upper bounds on several of these capacities are proved.
Barnum, Howard +2 more
core +2 more sources
Polycyclic Compounds Affecting Electrical Tree Growth in Polypropylene Under Ambient Temperature
Polypropylene (PP) has great potential to be used as recyclable high-voltage direct current (HVDC) cable insulation material. Electrical tree is the key factor that leads to cable insulation failure and limits the increase of HVDC transmission voltage ...
Lewei Zhu +4 more
doaj +1 more source
Robust Biometric Authentication from an Information Theoretic Perspective
Robust biometric authentication is studied from an information theoretic perspective. Compound sources are used to account for uncertainty in the knowledge of the source statistics and are further used to model certain attack classes.
Andrea Grigorescu +2 more
doaj +1 more source

