You are currently viewing a new version of our website. To view the old version click .

6,832 Results Found

  • Article
  • Open Access
1 Citations
2,306 Views
11 Pages

Establishment of the Foot-and-Mouth Disease Virus Type Asia1 Expressing the HiBiT Protein: A Useful Tool for a NanoBiT Split Luciferase Assay

  • Giyoun Cho,
  • Hyejin Kim,
  • Dong-Wan Kim,
  • Seong Yun Hwang,
  • Ji-Hyeon Hwang,
  • Yeon Rae Chae,
  • Yoon-Hee Lee,
  • Ok-Mi Jeong,
  • Jung-Won Park and
  • Sung-Han Park
  • + 1 author

21 June 2024

Foot-and-mouth disease virus (FMDV) is a highly contagious virus that affects cloven-hoofed animals and causes severe economic losses in the livestock industry. Given that this high-risk pathogen has to be handled in a biosafety level (BSL)-3 facilit...

  • Article
  • Open Access
27 Citations
7,543 Views
16 Pages

PZT/PZT and PZT/BiT Composite Piezo-Sensors in Aerospace SHM Applications: Photochemical Metal Organic + Infiltration Deposition and Characterization

  • Hamidreza Hoshyarmanesh,
  • Nafiseh Ebrahimi,
  • Amir Jafari,
  • Parisa Hoshyarmanesh,
  • Minjae Kim and
  • Hyung-Ho Park

20 December 2018

The composition of fine-ground lead zirconate-titanate powder Pb(Zr0.52Ti0.48)O3, suspended in PZT and bismuth titanate (BiT) solutions, is deposited on the curved surface of IN718 and IN738 nickel-based supper alloy substrates up to 100 µm thi...

  • Article
  • Open Access
5 Citations
2,729 Views
21 Pages

Lightweight SAR: A Two-Bit Strategy

  • Shiqi Liu,
  • Bo Zhao,
  • Lei Huang,
  • Bing Li and
  • Weimin Bao

5 January 2023

By benefiting from one-bit sampling, the system deployment of synthetic aperture radar (SAR) can be greatly simplified. However, it usually requires a high oversampling rate to avoid the apparent degradation in imagery, which counteracts the storage-...

  • Proceeding Paper
  • Open Access
1,089 Views
10 Pages

Analysis and Synthesis of Single-Bit Adders for Multi-Bit Adders with Sequential Transfers

  • Sakhybay Tynymbayev,
  • Assel Mukasheva,
  • Kuanyshbek Ibragimov,
  • Adil Mukhamedgali,
  • Gani Sergazin and
  • Teodor Iliev

This paper provides an analysis of existing single-digit binary adders from the point of view of their implementation on fans built based on metal-oxide-semiconductor field-effect transistor—MOSFETs. The synthesis of a single-digit adder with a...

  • Article
  • Open Access
1 Citations
1,526 Views
23 Pages

Symmetry in the Bit-Stream Converter Design

  • Olga Bureneva,
  • Nikolay Safyannikov and
  • Sergey Mironov

31 October 2023

The paper presents the results of the study of the influence of symmetry in the design of bit-stream digital converters. We have shown realizations of the symmetry-based approach at different levels: at the level of basic elements, functional convert...

  • Article
  • Open Access
929 Views
11 Pages

Factors Influencing the Intra-Oral Movement of the Bit: A Cadaveric Study

  • Elke Pollaris,
  • Chris Hannes,
  • Maarten Haspeslagh,
  • Wouter Demey,
  • Stijn Teysen,
  • Bernard Boussauw and
  • Lieven Vlaminck

10 September 2025

Bit-related trauma is a welfare issue in equestrian sports; therefore, a proper understanding of how the bit behaves inside the mouth is of importance. The objective of this study is to investigate the influence of bit design (snaffle bits/single/dou...

  • Article
  • Open Access
30 Citations
4,928 Views
14 Pages

Deep Unsupervised Embedding for Remote Sensing Image Retrieval Using Textual Cues

  • Mohamad M. Al Rahhal,
  • Yakoub Bazi,
  • Taghreed Abdullah,
  • Mohamed L. Mekhalfi and
  • Mansour Zuair

14 December 2020

Compared to image-image retrieval, text-image retrieval has been less investigated in the remote sensing community, possibly because of the complexity of appropriately tying textual data to respective visual representations. Moreover, a single image...

  • Feature Paper
  • Article
  • Open Access
12 Citations
4,572 Views
31 Pages

23 October 2020

The evolution of microelectronics increased the information acquired by today’s biomedical sensor systems to an extent where the capacity of low-power communication interfaces becomes one of the central bottlenecks. Hence, this paper mathematic...

  • Article
  • Open Access
2 Citations
5,870 Views
9 Pages

2 July 2018

In this letter, it is proposed that cryogenic quantum bits can operate based on the nonlinearity due to the quantum capacitance of two-dimensional Dirac materials, and in particular graphene. The anharmonicity of a typical superconducting quantum bit...

  • Article
  • Open Access
2 Citations
2,312 Views
17 Pages

14 January 2020

As the number of users using multimedia sharing services increases, the need to ensure the minimum data rate of wireless users increases. Meanwhile, in the cooperative cognitive radio (CR) network, it is important to provide the quality-of-services f...

  • Article
  • Open Access
833 Views
18 Pages

7 September 2025

Besides oral temperature, meteorological parameters are expected to be relevant for mouthpiece temperature, potentially influenced by the material, surface area and weight of the bit. This study measured the temperature of the mouthpieces at the corn...

  • Article
  • Open Access
6 Citations
4,215 Views
12 Pages

9 March 2020

Bit commitment is a cryptographic task in which Alice commits a bit to Bob such that she cannot change the value of the bit after her commitment and Bob cannot learn the value of the bit before Alice opens her commitment. According to the Mayers&ndas...

  • Article
  • Open Access
11 Citations
4,491 Views
19 Pages

Bit Independence Criterion Extended to Stream Ciphers

  • Evaristo José Madarro-Capó,
  • Carlos Miguel Legón-Pérez,
  • Omar Rojas,
  • Guillermo Sosa-Gómez and
  • Raisa Socorro-Llanes

29 October 2020

The bit independence criterion was proposed to evaluate the security of the S-boxes used in block ciphers. This paper proposes an algorithm that extends this criterion to evaluate the degree of independence between the bits of inputs and outputs of t...

  • Article
  • Open Access
2 Citations
1,532 Views
16 Pages

Study on Evaluation and Prediction for Shale Gas PDC Bit in Luzhou Block Sichuan Based on BP Neural Network and Bit Structure

  • Ye Chen,
  • Yu Sang,
  • Xudong Wang,
  • Xiaoke Ye,
  • Huaizhong Shi,
  • Pengcheng Wu,
  • Xinlong Li and
  • Chao Xiong

22 May 2024

Deep and ultra-deep shale gas resources have great potential, but well drilling faces many challenges. The Polycrystalline Diamond Compact (PDC) bit has become the primary rock-breaking instrument for oil and gas drilling. Reasonable bit structure de...

  • Feature Paper
  • Article
  • Open Access
2 Citations
1,286 Views
13 Pages

The Structure of Bit-String Similarity Networks

  • David M. Schneider and
  • Damián H. Zanette

10 January 2025

We study the structural properties of networks formed by random sets of bit strings—namely the ordered arrays of binary variables representing, for instance, genetic information or cultural profiles. Two bit strings are connected by a network l...

  • Review
  • Open Access
1 Citations
1,556 Views
16 Pages

Polycrystalline Diamond Composite Bit Technology for Sustainable Work

  • Xiaoao Liu,
  • Guodong Ji,
  • Liyuan Yang,
  • Haitao Ren,
  • Qiang Wu,
  • Jinping Yu and
  • Kuilin Huang

5 February 2025

Reducing the auxiliary drilling time and improving the drilling efficiency are not only important technical means to enhance the development and deep exploration of oil and gas reserves, but also have significant implications for ensuring energy secu...

  • Article
  • Open Access
748 Views
17 Pages

Intelligent Method for PDC Bit Selection Based on Graph Neural Network

  • Ning Li,
  • Chengkai Zhang,
  • Tianguo Xia,
  • Mengna Hao,
  • Long Chen,
  • Zhaopeng Zhu,
  • Chaochen Wang,
  • Shanlin Ye and
  • Xiran Liu

12 September 2025

As oil and gas exploration extends to deep, ultra-deep, and unconventional reservoirs, high drilling costs persist. Drill bit performance, as the critical rock-breaking component, directly governs efficiency and economics. While optimal bit selection...

  • Article
  • Open Access
24 Citations
5,044 Views
28 Pages

24 October 2023

Sign languages are complex, but there are ongoing research efforts in engineering and data science to recognize, understand, and utilize them in real-time applications. Arabic sign language recognition (ArSL) has been examined and applied using vario...

  • Article
  • Open Access
4 Citations
3,681 Views
22 Pages

Suspicion Distillation Gradient Descent Bit-Flipping Algorithm

  • Predrag Ivaniš,
  • Srdjan Brkić and
  • Bane Vasić

15 April 2022

We propose a novel variant of the gradient descent bit-flipping (GDBF) algorithm for decoding low-density parity-check (LDPC) codes over the binary symmetric channel. The new bit-flipping rule is based on the reliability information passed from neigh...

  • Article
  • Open Access
1,226 Views
13 Pages

Neutralizing Antibody Screening Using NanoBiT-Based Virus-like Particles of Foot-and-Mouth Disease Type Asia1 Enhances Biosafety and Sensitivity

  • Hyejin Kim,
  • Dong-Wan Kim,
  • Giyoun Cho,
  • Ji-Hyeon Hwang,
  • Yeonrae Chae,
  • Taejun Kim,
  • Jae Young Kim,
  • Young-Joon Ko,
  • Jong-Hyeon Park and
  • Yoon-Hee Lee
  • + 1 author

27 February 2025

Background/Objectives: Foot-and-mouth disease (FMD) is a highly contagious class 1 animal disease that affects cloven-hoofed animals, such as cattle, pigs, and goats. Diagnosis and research on live FMD virus (FMDV) typically require biosafety level 3...

  • Article
  • Open Access
1 Citations
1,698 Views
17 Pages

3 June 2023

The bit–rock interaction is a key point in the fracture process observed in excavation applications, which makes its analysis relevant. As the discrete element method (DEM) has been successfully applied to study rock breakage behavior, we apply...

  • Article
  • Open Access
119 Views
17 Pages

18 December 2025

This study investigates bit error rate (BER)-constrained power allocation for uplink non-orthogonal multiple access (NOMA) systems in which a base station employs one-bit analog-to-digital converters. Although one-bit quantization significantly reduc...

  • Article
  • Open Access
3 Citations
2,601 Views
13 Pages

Strengthening Quality of Chaotic Bit Sequences

  • Michal Melosik and
  • Wieslaw Marszalek

We discuss chaos and its quality as measured through the 0-1 test for chaos. When the 0-1 test indicates deteriorating quality of chaos, because of the finite precision representations of real numbers in digital implementations, then the process may...

  • Article
  • Open Access
2 Citations
3,159 Views
12 Pages

The Role of the Equestrian Professional in Bridle and Bit Fit in the United Kingdom

  • Kathryn Nankervis,
  • Jane M. Williams,
  • Diana Fisher and
  • Russell MacKechnie-Guire

6 November 2024

To ensure the comfort of ridden horses, equipment including bridles and bits should be suitable and fit correctly. Horse owners employ a variety of equestrian professionals with varying degrees of responsibility regarding bridle and bit fit. This stu...

  • Article
  • Open Access
11 Citations
3,942 Views
22 Pages

Efficient Implementation of ARX-Based Block Ciphers on 8-Bit AVR Microcontrollers

  • YoungBeom Kim,
  • Hyeokdong Kwon,
  • SangWoo An,
  • Hwajeong Seo and
  • Seog Chung Seo

19 October 2020

As the development of Internet of Things (IoT), the data exchanged through the network has significantly increased. To secure the sensitive data with user’s personal information, it is necessary to encrypt the transmitted data. Since resource-c...

  • Article
  • Open Access
11 Citations
3,546 Views
17 Pages

Neuron-by-Neuron Quantization for Efficient Low-Bit QNN Training

  • Artem Sher,
  • Anton Trusov,
  • Elena Limonova,
  • Dmitry Nikolaev and
  • Vladimir V. Arlazarov

29 April 2023

Quantized neural networks (QNNs) are widely used to achieve computationally efficient solutions to recognition problems. Overall, eight-bit QNNs have almost the same accuracy as full-precision networks, but working several times faster. However, the...

  • Article
  • Open Access
3 Citations
4,225 Views
18 Pages

22 June 2020

It is very challenging to design the capacity-approaching labeling schemes for large constellations, such as 32-QAM, in delayed bit-interleaved coded modulation (DBICM). In this paper, we investigate the labeling design for 32-QAM DBICM with various...

  • Article
  • Open Access
9 Citations
3,171 Views
18 Pages

Secure Reversible Data Hiding in Images Based on Linear Prediction and Bit-Plane Slicing

  • Maham Nasir,
  • Waqas Jadoon,
  • Iftikhar Ahmed Khan,
  • Nosheen Gul,
  • Sajid Shah,
  • Mohammed ELAffendi and
  • Ammar Muthanna

12 September 2022

Reversible Data Hiding (RDH) should be secured as per requirements to protect content in open environments such as the cloud and internet. Integrity and undetectability of steganographic images are amongst the main concerns in any RDH scheme. As steg...

  • Article
  • Open Access
3 Citations
2,595 Views
27 Pages

A Novel Mesoscopic Drill Bit Model for Deep Drilling Applications

  • Mohamed Ichaoui,
  • Frank Schiefer and
  • Georg-Peter Ostermeyer

20 June 2023

This paper deals with the development of a novel mesoscopic model of polycrystalline diamond compact (PDC) drill bits that can be implemented in complex drill string models for simulations to analyse the influence of rock inhomogeneities or the impac...

  • Article
  • Open Access
5 Citations
3,301 Views
18 Pages

12 May 2023

Due to the cloud coverage of remote-sensing images, the ground object information will be attenuated or even lost, and the texture and spectral information of the image will be changed at the same time. Accurately detecting clouds from remote-sensing...

  • Article
  • Open Access
2 Citations
3,239 Views
16 Pages

Reinforcement Learning for Bit-Flipping Decoding of Polar Codes

  • Xiumin Wang,
  • Jinlong He,
  • Jun Li and
  • Liang Shan

30 January 2021

A traditional successive cancellation (SC) decoding algorithm produces error propagation in the decoding process. In order to improve the SC decoding performance, it is important to solve the error propagation. In this paper, we propose a new algorit...

  • Communication
  • Open Access
1 Citations
2,513 Views
12 Pages

High-Throughput Bit-Pattern Matching under Heavy Interference on FPGA

  • Dimitris Nikolaidis,
  • Panos Groumas,
  • Christos Kouloumentas and
  • Hercules Avramopoulos

Bit-pattern matching is an important technological capability, used in many fields such as network intrusion detection (NID) and packet classification systems. Essentially, it involves the matching of an input bit pattern to a bit-pattern entry of a...

  • Article
  • Open Access
13 Citations
5,883 Views
17 Pages

Lossless Data Compression for Time-Series Sensor Data Based on Dynamic Bit Packing

  • Sang-Ho Hwang,
  • Kyung-Min Kim,
  • Sungho Kim and
  • Jong Wook Kwak

19 October 2023

In this paper, we propose a bit depth compression (BDC) technique, which performs bit packing by dynamically determining the pack size based on the pattern of the bit depth level of the sensor data, thereby maximally reducing the space wastage that m...

  • Article
  • Open Access
18 Citations
5,159 Views
14 Pages

Research on Drilling Response Characteristics of Two-Wing PDC Bit

  • Cancan Liu,
  • Xigui Zheng,
  • Gang Wang,
  • Mengbin Xu and
  • Zhishang Li

4 January 2020

Research on drilling response characteristics of two-wing polycrystalline diamond compact (PDC) bit in different rocks is an important way to further understand the mechanism of rock-breaking, improve drilling efficiency, and identify the rock format...

  • Article
  • Open Access
3 Citations
2,629 Views
15 Pages

12 September 2019

A roller bit is a drilling tool widely used in oil and gas exploitation. The roller bit is applied to cutting the rock stratum, and its working life and rotational speed are important factors affecting the drilling efficiency. Moreover, a bearing sea...

  • Article
  • Open Access
1 Citations
1,317 Views
11 Pages

Impact of Drill Bit Wear on Screw Withdrawal Resistance in Pinewood

  • Maciej Sydor,
  • Krystian Waszkiewicz and
  • Zbigniew Potok

23 November 2024

Many factors affect screw withdrawal resistance (SWR), including screw size, embedment depth, the pre-drilled hole’s diameter, dimensional accuracy, and the furniture pieces’ material properties being joined. While prior research has exte...

  • Article
  • Open Access
2 Citations
3,339 Views
9 Pages

A Private Quantum Bit String Commitment

  • Mariana Gama,
  • Paulo Mateus and
  • André Souto

27 February 2020

We propose an entanglement-based quantum bit string commitment protocol whose composability is proven in the random oracle model. This protocol has the additional property of preserving the privacy of the committed message. Even though this property...

  • Article
  • Open Access
12 Citations
3,759 Views
14 Pages

Joint Angle and Frequency Estimation Using One-Bit Measurements

  • Zeyang Li,
  • Junpeng Shi,
  • Xinhai Wang and
  • Fangqing Wen

9 December 2019

Joint angle and frequency estimation is an important branch in array signal processing with numerous applications in radar, sonar, wireless communications, etc. Extensive attention has been paid and numerous algorithms have been developed. However, e...

  • Article
  • Open Access
2 Citations
1,759 Views
12 Pages

23 October 2022

This paper focuses on the hardware components of smartphones, namely, the use of displays and cameras in mobile devices as transmitters and receivers to establish a near-field multiple-input–multiple-output (MIMO) visible light communication (V...

  • Article
  • Open Access
9 Citations
4,874 Views
12 Pages

Design and Experimental Study of Core Bit for Hard Rock Drilling in Deep-Sea

  • Xingchen Li,
  • Liang Xiong,
  • Wenwei Xie,
  • Ke Gao,
  • Yutao Shao,
  • Yunlong Chen,
  • Yanjiang Yu,
  • Beibei Kou,
  • Qiuping Lu and
  • Jing Zeng
  • + 1 author

The hard rock stratum will seriously affect the efficiency of deep-sea drilling and greatly increase the cost of drilling operations due to its complexity. In ocean drilling operations, the design of the bit is critical. Therefore, the core bit shoul...

  • Article
  • Open Access
733 Views
21 Pages

11 August 2025

Neural networks (NNs) are increasingly used in embedded systems driven by artificial intelligence (AI) features. Such systems are now developed for many critical applications with strong dependability constraints and trustworthiness requirements. The...

  • Article
  • Open Access
2 Citations
2,039 Views
17 Pages

23 July 2024

Stick–slip vibration (SV) of drill string systems is the main cause of fatigue failure of PDC bits under complex drilling conditions. Exploring its mechanism is helpful for identifying the causes of bit failure and developing preventive measure...

  • Article
  • Open Access
11 Citations
4,494 Views
15 Pages

Motion Planning for Mobile Robot with Modified BIT* and MPC

  • Puyong Xu,
  • Ning Wang,
  • Shi-Lu Dai and
  • Lei Zuo

4 January 2021

In this paper, a mobile robot motion planning method with modified BIT* (batch informed trees) and MPC (Model Predictive Control) is presented. The conventional BIT* was modified here by integrating a stretch method that improves the path points conn...

  • Article
  • Open Access
2 Citations
1,652 Views
21 Pages

23 February 2024

Omnidirectional images have gained significant popularity and drawn great attention nowadays, which poses challenges to omnidirectional image processing in solving the bottleneck of storage and transmission. Projecting onto a two-dimensional image pl...

  • Article
  • Open Access
6 Citations
4,417 Views
16 Pages

13 March 2018

This paper proposes a different approach to pinpoint the causes for which an unconditionally secure quantum bit commitment protocol cannot be realized, beyond the technical details on which the proof of Mayers’ no-go theorem is constructed. We have a...

  • Article
  • Open Access
43 Citations
3,406 Views
22 Pages

23 April 2021

Image security is a hot topic in the era of Internet and big data. Hyperchaotic image encryption, which can effectively prevent unauthorized users from accessing image content, has become more and more popular in the community of image security. In g...

  • Article
  • Open Access
2 Citations
1,610 Views
17 Pages

5 June 2024

Drilling is one of the most commonly used techniques in hydrogeological exploration and is employed to obtain rock samples and create boreholes. During conventional drilling, it is necessary to raise all the drilling tools in the borehole when switch...

  • Review
  • Open Access
22 Citations
10,803 Views
36 Pages

A Survey of Bit-Flip Attacks on Deep Neural Network and Corresponding Defense Methods

  • Cheng Qian,
  • Ming Zhang,
  • Yuanping Nie,
  • Shuaibing Lu and
  • Huayang Cao

As the machine learning-related technology has made great progress in recent years, deep neural networks are widely used in many scenarios, including security-critical ones, which may incura great loss when DNN is compromised. Starting from introduci...

  • Article
  • Open Access
2,539 Views
18 Pages

Design of a 3-Bit Circularly Polarized Reconfigurable Reflectarray

  • Zhe Chen,
  • Chenlu Huang,
  • Xinmi Yang,
  • Xiaoming Yan,
  • Xianqi Lin and
  • Yedi Zhou

In this paper, a 3-bit circularly polarized reconfigurable reflectarray is proposed. The array consists of 64 units in an 8 × 8 configuration, with each unit containing a circular metal patch loaded with phase-delay lines and eight PIN diodes....

  • Article
  • Open Access
2,380 Views
11 Pages

30 November 2024

Down-the-hole (DTH) hammer drilling has high rock-breaking efficiency and a decisive advantage in hard rock drilling, which can reduce the cost of geothermal drilling. However, when the drill bit rotation speed and the DTH percussion frequency do not...

of 137