Results 41 to 50 of about 246,403 (284)
A VLSI architecture of JPEG2000 encoder [PDF]
Copyright @ 2004 IEEEThis paper proposes a VLSI architecture of JPEG2000 encoder, which functionally consists of two parts: discrete wavelet transform (DWT) and embedded block coding with optimized truncation (EBCOT).
Chen, H +5 more
core +1 more source
On the construction of reversible DNA codes over $ F_{4^{2m}} $ via $ T^n $-set codes
The main objective of this paper is to introduce a new approach for constructing reversible and reversible DNA codes over the finite fields $ F_{4^{2m}} $, $ m\ge 1 $ from any given polynomials by utilizing $ T^n $-set codes.
Elif Segah Oztas +5 more
doaj +1 more source
Studying Acetylation of Aconitase Isozymes by Genetic Code Expansion
Aconitase catalyzes the second reaction of the tricarboxylic acid cycle, the reversible conversion of citrate and isocitrate. Escherichia coli has two isoforms of aconitase, AcnA and AcnB. Acetylomic studies have identified acetylation at multiple lysine
Jessica Araujo +5 more
doaj +1 more source
Polynomial-time T-depth Optimization of Clifford+T circuits via Matroid Partitioning [PDF]
Most work in quantum circuit optimization has been performed in isolation from the results of quantum fault-tolerance. Here we present a polynomial-time algorithm for optimizing quantum circuits that takes the actual implementation of fault-tolerant ...
Amy, Matthew +2 more
core +1 more source
Two-Layer Reversible Data Hiding Based on AMBTC Image With (7, 4) Hamming Code
In Malik et al.'s method, each pixel can be embedded with log23 bits by being modified at most 1. Thus, their method achieves significant hiding capacity while maintaining good visual quality. However, in their method, the first lower and the first upper
Juan Lin +4 more
doaj +1 more source
Reversible Data Hiding in Encrypted Image Based on (7, 4) Hamming Code and UnitSmooth Detection
With the development of cloud storage and privacy protection, reversible data hiding in encrypted images (RDHEI) plays the dual role of privacy protection and secret information transmission. RDHEI has a good application prospect and practical value. The
Lin Li, Chin-Chen Chang, Chia-Chen Lin
doaj +1 more source
Entanglement Wedge Reconstruction via Universal Recovery Channels [PDF]
We apply and extend the theory of universal recovery channels from quantum information theory to address the problem of entanglement wedge reconstruction in AdS/CFT. It has recently been proposed that any low-energy local bulk operators in a CFT boundary
Cotler, Jordan +5 more
core +3 more sources
An intracellular transporter mitigates the CO2‐induced decline in iron content in Arabidopsis shoots
This study identifies a gene encoding a transmembrane protein, MIC, which contributes to the reduction of shoot Fe content observed in plants under elevated CO2. MIC is a putative Fe transporter localized to the Golgi and endosomal compartments. Its post‐translational regulation in roots may represent a potential target for improving plant nutrition ...
Timothy Mozzanino +7 more
wiley +1 more source
PERSYMMETRIC MATRIX AND ITS APPLICATION IN CODING THEORY
A persymmetric matrix is a square matrix that is symmetric concerning its antidiagonal. This article discusses some characteristics of a persymmetric matrix and its application in coding theory. A persymmetric matrix is used to form a generator matrix of
Ardi Nur Hidayat +2 more
doaj +1 more source
Based on the method of electrical charge storage, supercapacitors are divided into two categories, double-layer electrical capacitor (EDLC) and pseudocapacitors.
Andriono Manalu +5 more
doaj +1 more source

