Results 11 to 20 of about 3,133,938 (283)

Research Performance, Collaboration, and Movement of Researchers in the Field of Business and Management: A Comparison between International and Domestic Migrants in East Asia [PDF]

open access: yesJournal of Library and Information Studies, 2023
This study examines differences in research performance, international collaboration, and migration moves between two types of migrant researchers: international and domestic migrant researchers.
Ying-Han Chang, Mu-Hsuan Huang
doaj   +1 more source

Semi-tensor product-based one-bit compressed sensing

open access: yesEURASIP Journal on Advances in Signal Processing, 2023
The area of one-bit compressed sensing (1-bit CS) focuses on the recovery of sparse signals from binary measurements. Over the past decade, this field has witnessed the emergence of well-developed theories.
Jingyao Hou, Xinling Liu
doaj   +1 more source

Existence and Uniqueness Results of Fractional Differential Inclusions and Equations in Sobolev Fractional Spaces

open access: yesAxioms, 2023
In this work, by using the iterative method, we discuss the existence and uniqueness of solutions for multiterm fractional boundary value problems. Next, we examine some existence and uniqueness returns for semilinear fractional differential inclusions ...
Safia Meftah   +3 more
doaj   +1 more source

An Optimality Summary: Secret Key Agreement with Physical Unclonable Functions

open access: yesEntropy, 2020
We address security and privacy problems for digital devices and biometrics from an information-theoretic optimality perspective to conduct authentication, message encryption/decryption, identification or secure and private computations by using a secret
Onur Günlü, Rafael F. Schaefer
doaj   +1 more source

Stealthy Secret Key Generation

open access: yesEntropy, 2020
In order to make a warden, Willie, unaware of the existence of meaningful communications, there have been different schemes proposed including covert and stealth communications.
Pin-Hsun Lin   +3 more
doaj   +1 more source

Analysis and Control of Fault Ride-Through Capability Improvement for Wind Energy Conversion System Using Linear Active Disturbance Rejection Control With Correction Link

open access: yesIEEE Access, 2020
Wind energy, as a kind of renewable natural energy, is spread all over the world. It is one of the most widely used and promising green energy to adjust the energy structure. Therefore, wind energy conversion systems (WECSs) have captured a great deal of
Youjie Ma   +3 more
doaj   +1 more source

Information-Anchored Sensitivity Analysis: Theory and Application [PDF]

open access: yesJournal of the Royal Statistical Society Series A: Statistics in Society, 2018
SummaryAnalysis of longitudinal randomized clinical trials is frequently complicated because patients deviate from the protocol. Where such deviations are relevant for the estimand, we are typically required to make an untestable assumption about post-deviation behaviour to perform our primary analysis and to estimate the treatment effect.
Cro, S, Carpenter, JR, Kenward, MG
openaire   +6 more sources

Information transmission through a noisy quantum channel [PDF]

open access: yes, 1997
Noisy quantum channels may be used in many information-carrying applications. We show that different applications may result in different channel capacities. Upper bounds on several of these capacities are proved.
Barnum, Howard   +2 more
core   +2 more sources

Polycyclic Compounds Affecting Electrical Tree Growth in Polypropylene Under Ambient Temperature

open access: yesIEEE Access, 2020
Polypropylene (PP) has great potential to be used as recyclable high-voltage direct current (HVDC) cable insulation material. Electrical tree is the key factor that leads to cable insulation failure and limits the increase of HVDC transmission voltage ...
Lewei Zhu   +4 more
doaj   +1 more source

Robust Biometric Authentication from an Information Theoretic Perspective

open access: yesEntropy, 2017
Robust biometric authentication is studied from an information theoretic perspective. Compound sources are used to account for uncertainty in the knowledge of the source statistics and are further used to model certain attack classes.
Andrea Grigorescu   +2 more
doaj   +1 more source

Home - About - Disclaimer - Privacy