... Abstract - The major growth of information technology is based on the way how the security measures are implemented. Steganography is a technique that implements high level security by hiding a message in a multimedia ...
... high computationalcomplexity: Turbo codes are de- coded iteratively by using constituent decoders, which ex- change their beliefs about the transmitted information bits in the form of Log Likelihood Ratios ...
... the computationalcomplexity is reduced, since many complex-complex operations are substituted by real-complex operations, less ...The computationalcomplexity evaluation showed that the ...
... In this paper we have studied the computationalcomplexity of solving initial- value problems involving analytic ordinary differential equations (ODEs). We gave special importance to solutions defined on ...
... The problem with these formulations concerns the computational complexity of most decentralized discrete-event control problems (Tsitsiklis, 1989). Today, there is no common software [r] ...
... OFDM is a form of multicarrier transmission scheme; it is also known as DMT, with high spectral efficiency, multipath delay spread tolerance, power efficiency, robustness to channel fading and immunity to the frequency ...
... on-line computationalcomplexity and relies on taking advantage of the control problem time invariant elements, in order to replace, as much as possible, on-line by off-line computation, while guaranteeing ...
... Global or national energy system models as TIMES [15], MESSAGE [16,17] or PRIMES [18] integrate the several components of the system from resource extraction, to conversion into energy carriers and to end-use ...
... The computationalcomplexity in terms of cycles was measured for all the approaches. A 48kHz frequency sweep audio signal was provided as input to the implemented codes. The outputs were observed for the ...
... and computationalcomplexity of lot size prob- ...and Computational Mathematics Department at Sheffield University with professor Alan Solon Ivor ...
... Abstract: Problem statement: The Multiple Input Multiple Output (MIMO) Orthogonal Frequency Division Multiplexing (OFDM) system has been receiving a great attention, as one of solutions for achieving high speed, ...
... The computational model was tested with the product class of multipurpose chairs. A multipur- pose chair is a chair that can suit several uses. The choice of this product class is justified by three main reasons: ...
... the computational fluid ...swimsuit. Computational fluid dynamics methodology and reverse engineering procedures were used to carry out this study with accurate digital models of the female ...
... transition complexity of Boolean operations. The transition complexity re- sults for union and complementation turn out to be essentially different from the known state complexity results [16, 17] ...
... It might be readily obvious by now in this essay that the ‘‘decline’’ of media interest and the potential diminution of the linguistic use of ‘‘bioinformatics’’ might not reflect the knee-jerk explanation of ‘‘too much ...
... It requires the understanding of the concept of “self-organization”: it refers to the ability of a system to be able to construct and change its own behaviour or internal organization; in a recursive way, the order in ...
... Within the field of Computational Lexical Semantics, and based on the assumption that the performance of meaning determination computational processes is largely assisted by structured[r] ...
... The pharmacotherapy represents the main therapeutic resource to cure and control diseases. Among the determinant factors of the extension of medication use by the population is the constant development of new drugs, the ...
... For the case of trace particles in PW (Figs. 2a and 3a) we observed that the trajectories were almost symmetric and do not present so many fluc- tuations for both geometries[r] ...