Academic literature on the topic 'Byte'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Byte.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Byte"

1

Tyagi, Vinod, and Ambika Tyagi. "Byte protecting perfect burst code." Discrete Mathematics, Algorithms and Applications 09, no. 04 (2017): 1750051. http://dx.doi.org/10.1142/s1793830917500513.

Full text
Abstract:
Byte correcting perfect codes are developed to correct burst errors within bytes. If a code is byte correcting code and we say that the code is [Formula: see text]-burst correcting, meaning that it corrects a single burst of length [Formula: see text] or less within a byte. A byte correcting code is such that if [Formula: see text]; [Formula: see text] denote the set of syndromes obtained from the [Formula: see text]th-byte of the parity check matrix [Formula: see text] and [Formula: see text]; [Formula: see text] denote the set of syndromes obtained from the [Formula: see text]th-byte of the
APA, Harvard, Vancouver, ISO, and other styles
2

Tyagi, Vinod, and Tarun Lata. "bi-Byte correcting non-binary perfect codes." Discrete Mathematics, Algorithms and Applications 11, no. 02 (2019): 1950018. http://dx.doi.org/10.1142/s1793830919500186.

Full text
Abstract:
Etzion [T. Etzion, Perfect byte correcting codes, IEEE Trans. Inform. Theory 44 (1998) 3140–3146.] has classified byte error correcting binary codes into five different categories with respect to the size of the byte. If a code is partitioned into [Formula: see text] equal byte of size say [Formula: see text] then [Formula: see text] or the size of bytes is [Formula: see text]. Alternatively if bytes are of different size say, [Formula: see text] then [Formula: see text]. The result was further modified by Tyagi and Sethi [V. Tyagi and A. Sethi, [Formula: see text]-Byte correcting perfect code
APA, Harvard, Vancouver, ISO, and other styles
3

Tyagi, Vinod, and Amita Sethi. "bi-BYTE CORRECTING PERFECT CODES." Asian-European Journal of Mathematics 07, no. 01 (2014): 1350045. http://dx.doi.org/10.1142/s1793557113500459.

Full text
Abstract:
In this correspondence, we show how to generate bi-byte correcting perfect codes, i > 0 organized in m bytes of size β, n = mβ, and present necessary and sufficient conditions for their existence. By a bi-byte correcting perfect codes we mean a code that corrects burst of size b1 in the first byte, burst of length b2 in the second byte and so on, burst of length bm in the mth byte.
APA, Harvard, Vancouver, ISO, and other styles
4

JURAYEVA, Nazokat. "OBSERVATION OF THE POETIC UNITY OF THE VERSE IN THE POETRY OF MUHAMMAD RIZA OGAKHI." Art and Design: Social Science 02, no. 01 (2022): 9–12. http://dx.doi.org/10.37547/ssa-v2-i1-4.

Full text
Abstract:
This article presents scientific and analytical ideas on the definition of types in Uzbek literature in terms of the structure of the byte and its function in the structure of the poetic work. Also, in our literature on the relationship of bytes and genres, historical sources have been studied and the correct theoretical foundations have been formed. The level of application, types, and functions of genres such as chiston, the problem is analyzed. This article examines in detail the use of the poetic unity of the byte in the poetry of Muhammad Rizo Ogakhi, a unique representative of Uzbek clas
APA, Harvard, Vancouver, ISO, and other styles
5

Sokolovskyi, Vladyslav, Eduard Zharikov, Sergii Telenyk, Grzegorz Nowakowski, Svitlana Popereshnyak, and Mykhailo Marynenko. "Devising a method for detecting and correcting multi-bit data transmission errors in Iot systems based on the Golay code." Eastern-European Journal of Enterprise Technologies 2, no. 9 (134) (2025): 14–23. https://doi.org/10.15587/1729-4061.2025.326222.

Full text
Abstract:
The object of this study is information systems within the Internet of Things. The task addressed involves devising an innovative method for detecting and correcting multi-bit data transmission errors in the Internet of Things networks based on Golay codes. As the main result of the research, a method has been devised for detecting and correcting multi-bit data transmission errors based on Golay codes during byte-by-byte transmission of an information block. The method devised is distinguished by its coding scheme, which involves calculating 11 control bits and one parity bit for twelve bytes
APA, Harvard, Vancouver, ISO, and other styles
6

Sonwalkar, Prasun. "Byte by byte." Journalism: Theory, Practice & Criticism 10, no. 3 (2009): 378–80. http://dx.doi.org/10.1177/1464884909102580.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Sura, Sura, Rihab .., AbdulRahman Kareem .., et al. "Discovering Unknown Non-Consecutive Double Byte Biases in RC4 Stream Cipher Algorithm." Journal of Cybersecurity and Information Management 13, no. 2 (2024): 75–83. http://dx.doi.org/10.54216/jcim.130206.

Full text
Abstract:
RC4 is one of the most widely used stream cipher algorithms. It is fast, easy and suitable for hardware and software. It is used in various applications, but it has a weakness in the distribution of generated key bytes. The first few bytes of Pseudo-Random Generation Algorithm (PRGA) key stream are biased or attached to some private key bytes and thus the analysis of key stream bytes makes it potential to attack RC4, and there is connection between the key stream bytes that make it weak and breakable by single- and double-byte biases attack. This work shows the analysis of RC4 key stream based
APA, Harvard, Vancouver, ISO, and other styles
8

Xue, Linting, Aditya Barua, Noah Constant, et al. "ByT5: Towards a Token-Free Future with Pre-trained Byte-to-Byte Models." Transactions of the Association for Computational Linguistics 10 (2022): 291–306. http://dx.doi.org/10.1162/tacl_a_00461.

Full text
Abstract:
Abstract Most widely used pre-trained language models operate on sequences of tokens corresponding to word or subword units. By comparison, token-free models that operate directly on raw text (bytes or characters) have many benefits: They can process text in any language out of the box, they are more robust to noise, and they minimize technical debt by removing complex and error-prone text preprocessing pipelines. Because byte or character sequences are longer than token sequences, past work on token-free models has often introduced new model architectures designed to amortize the cost of oper
APA, Harvard, Vancouver, ISO, and other styles
9

Liang, Zheng You, Yi Xuan Tang, and Shuai Chang. "Smallest Cache Utility Algorithm Based on Popularity." Advanced Materials Research 171-172 (December 2010): 358–63. http://dx.doi.org/10.4028/www.scientific.net/amr.171-172.358.

Full text
Abstract:
Streaming media is an important research direction in internet applications. In this paper, A Smallest Cache Utility algorithm based on Popularity in future (SCU-PK) is proposed. It comprehensively considered the merit of media time popularity and the smallest cache utility algorithm, using the entire file byte usefulness instead of the file segment bytes usefulness, so that a more effective byte usefulness calculation method and a more rational file segment popularity calculation method was designed and implement. The experiments show that the SCU-PK algorithm has better performance in increa
APA, Harvard, Vancouver, ISO, and other styles
10

Wang, Ling. "Computer Hardware and Network Data Transmission based on Internet of Things Communication Technology." Scalable Computing: Practice and Experience 24, no. 2 (2023): 127–37. http://dx.doi.org/10.12694/scpe.v24i2.2146.

Full text
Abstract:
In order to meet the requirements of computer hardware and network data transmission security, a research based on Internet of Things communication technology is proposed. The main content of this research is the research based on the communication technology of the Internet of Things, through the description of the communication protocol of the Internet of Things, the system hardware design and implementation methods are used, and finally the research method based on the communication technology of the Internet of Things is constructed through experiments and analysis. The core technologies o
APA, Harvard, Vancouver, ISO, and other styles
More sources

Dissertations / Theses on the topic "Byte"

1

Johansson, Sanna, and Gona Mohammed. "Byte av hissbeklädnad." Thesis, Tekniska Högskolan, Högskolan i Jönköping, JTH, Maskinteknik, 2012. http://urn.kb.se/resolve?urn=urn:nbn:se:hj:diva-18446.

Full text
Abstract:
Examensarbetet har utförts i sammarbete med Weland Lagersystem AB i Gislaved som är ett företag där smarta lagersystem tillverkas. Weland Lagersystem AB säljer och monterar lagerhissar som lagrar artiklar i höjdled. De här hissarna är beklädda av paneler, monteringsskenor, dekorlister och hörnprofiler. Alla beklädnadsdelar förekommer i varierande storlek. Problemet med hissarna är att beklädnaden av dem är kostsam samt att delarna för beklädnaden är många att montera. Målet med arbetet är att undersöka om en beklädnad i plast kan bli mer kostnads- och monteringseffektiv än dagens lösning. Om r
APA, Harvard, Vancouver, ISO, and other styles
2

Orhan, Banu, and Hussein Samir Ali. "Omstruktureringar vid VD-byte." Thesis, Södertörn University College, School of Business Studies, 2009. http://urn.kb.se/resolve?urn=urn:nbn:se:sh:diva-3133.

Full text
Abstract:
<p><strong>Objective</strong>: The aim of this paper is to see if there are higher restructuring expenses under the item provision for the first year when a new president takes office.</p><p><strong>Method:</strong> The study was done by a quantitative study. Financial statements have been examined for companies listed on the OMX Stockholm Stock Exchange, Large Cap. We have examined all the companies’ annual reports between the years 2002-2008. We have looked at the experience of restructuring and other expenses that occur in the context of CEO change. In addition, a student t-test done to see
APA, Harvard, Vancouver, ISO, and other styles
3

Afverberg, Marcus. "Optimering vid byte av fyllningsplatta." Thesis, Karlstads universitet, 2018. http://urn.kb.se/resolve?urn=urn:nbn:se:kau:diva-68164.

Full text
Abstract:
Denna rapport är en del av ett examensarbete på högskoleprogrammet i maskinteknik vid Karlstads Universitet med programkod MSGC17. Arbetet omfattar 22.5 högskolepoäng. Arbetet har utförts på Swegon Operations AB i Arvika. På fabriken i Arvika tillverkas ljuddämpare för ventilationssystem. I tillverkningscellen där dessa ljuddämpare tillverkas sker ett moment där en platta ska bytas mot en annan platta av en robot, detta moment fungerar inte optimalt och orsakar stora störningar i produktionen. Dessa plattor kallas fyllningsplattor. Varje modell av ljuddämparna har en egen fyllningsplatta. Vid
APA, Harvard, Vancouver, ISO, and other styles
4

Broman, Monica, and Margareta Eklöv. "Läkemedelsöverföring vid byte av vårdform. Litteraturstudie." Thesis, University of Gävle, Department of Caring Sciences and Sociology, 2008. http://urn.kb.se/resolve?urn=urn:nbn:se:hig:diva-773.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Norling, Jessica, and Emelie Rönnqvist. "Tidsintervall för byte av perifier venkateter." Thesis, Örebro universitet, Institutionen för hälsovetenskap och medicin, 2012. http://urn.kb.se/resolve?urn=urn:nbn:se:oru:diva-22337.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Chamoun, Simon. "Byte av kontaktdonsgränssnitt för Scania bromssystem." Thesis, KTH, Maskinkonstruktion (Inst.), 2012. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-99263.

Full text
Abstract:
This master thesis was carried out at Scania in Södertälje, Sweden. It investigates the possibility of changing a connector interface that is used when there is a need for splicing the wheel speed sensor and thereby determine the consequences. The problems that exist with the current connector interface occur during assembly, as more time is required to complete a connection in a reliable manner. A complete connection requires joining the male and female connector, insert the connection into a protective retainer and then strap a cable tie on each end of the retainer. This process makes it mor
APA, Harvard, Vancouver, ISO, and other styles
7

Lennartsson, Aron. "Byte av styrsystem i mellantork B." Thesis, Högskolan Väst, Avd för elektro- och automationsteknik, 2011. http://urn.kb.se/resolve?urn=urn:nbn:se:hv:diva-3698.

Full text
Abstract:
Saab Automobile AB är ett företag som tillverkar bilar i familjesegmentet och har sin fabrik belägen i Trollhättan. Deras underhållsavdelning i måleriet har ett behov av att byta ut sin Sattscope H terminal som styr mellantork täckfärg B. Anledningen är att terminalens display tappar pixlar och att nya terminaler inte längre finns som reservdel. Mellantork täckfärg B fungerar inte utan terminalen. Saab ser därför att terminalen byts ut mot en dator med Ledpanel designer installerad, som skall fungera som operatörspanel. Nya menyer skall också programmeras. Detta för att underlätta vid byte av
APA, Harvard, Vancouver, ISO, and other styles
8

Jonsson, Jakob. "Processjämförelse : Byte av kommunikationsutrustning i elnätet." Thesis, Linnéuniversitetet, Institutionen för fysik och elektroteknik (IFE), 2016. http://urn.kb.se/resolve?urn=urn:nbn:se:lnu:diva-53352.

Full text
Abstract:
Denna rapport behandlar olika typer av tillvägagångssätt som används vid byte utav kommunikationsutrustning. Arbetet som gjorts innefattar en jämförelse mellan två olika bytesprojekt och deras olika organisationer. En beskrivning utav kommunikationsenheten (Remote Terminal Unit) som används i de olika projekten görs, för att ge läsaren en uppfattning av enheten och dess funktion i det svenska elnätet. När läsaren bildat sig en uppfattning utav enheten så påbörjas själva organisationsjämförelsen. De två projektens olika organisationsuppbyggnader presenteras och granskas, för att sedan kunna ana
APA, Harvard, Vancouver, ISO, and other styles
9

Svensson, Thea, and Sandra Sunnegårdh. "Lyftverktyg för ergonomiskt byte av lastbilsbatterier." Thesis, KTH, Maskinkonstruktion (Inst.), 2014. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-168913.

Full text
Abstract:
Uppsatsen dokumenterar ett produktutvecklingsprojekt där två studenter har arbetat för Scania meduppgift att ta fram ett sätt att lyfta ut och byta lastbilsbatterier i Scanias serviceverkstäder. Problemet ligger i att utrymmet omkring batterierna är extremt begränsat, samtidigt som batterierna är mycket tunga och av ergonomiska anledningar inte får lyftas manuellt. För att kartlägga belastningsergonomiska aspekter, såväl som andra viktiga aspekter, som måste tas hänsyn till, har studenterna genomfört en omfattande förstudie. Denna förstudie har innefattat allt från benchmarking och observation
APA, Harvard, Vancouver, ISO, and other styles
10

Ekman, Maud, and Annika Lingeby. "Byte av styrsystem för en CNC-svarv." Thesis, Linköping University, Department of Science and Technology, 2003. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-2234.

Full text
Abstract:
<p>Examensarbetet som beskrivs i denna rapport handlar om byte av styrsystem i en CNC-svarv på företaget Precisionsdetaljer Mekatronik i Linköping. Ett Fanuc 5 styrsystem har ersatts av ett modernare Fanuc 21i-styrsystem. Rapporten beskriver det nya styrsystemet och redovisar hur arbetet med att praktiskt byta system har gått till. Arbetet indelades i tre delar, informationssökning, praktiskt arbete och dokumentation. Informationssökningen behövdes både för hopkoppling av de olika delarna och för parameter- och ladderprogrammering. Det praktiska arbetet bestod i att koppla tillsammans de delar
APA, Harvard, Vancouver, ISO, and other styles
More sources

Books on the topic "Byte"

1

Jay, Ranade, and Nash Alan, eds. The Best of BYTE. McGraw-Hill, 1994.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
2

1965-, Nash Alan, ed. The best of BYTE. McGraw-Hill, 1994.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
3

Lindberg, Pirkko. Byte: Roman. Schildts, 1990.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
4

Jones, Pauline Baird. Byte me. Five Star, 2000.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
5

Lindberg, Pirkko. Byte: Roman. Alba, 1990.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
6

Mashaw, Bijan. Programming byte by byte: Structured FORTRAN 77. 2nd ed. American Computer Press, 1987.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
7

Breez, Daniels, Walstad Karon ill, and Finer Suzi ill, eds. Computers don't byte. 2nd ed. Teacher Created Materials, 2001.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
8

Pereira, Linda. Computers don't byte. Teacher Created Materials, 1996.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
9

Garand, Geneviève, David Hirmes, Cody Lindley, et al. Byte-Size Flash MX. Apress, 2002. http://dx.doi.org/10.1007/978-1-4302-5207-8.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Hopper, Martin. Does your computer byte? Walrus Productions, 1998.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
More sources

Book chapters on the topic "Byte"

1

Weik, Martin H. "byte." In Computer Science and Communications Dictionary. Springer US, 2000. http://dx.doi.org/10.1007/1-4020-0613-6_1995.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Holschbach, Susanne. "Foto/Byte." In Medien Kunst Netz 2. Springer Vienna, 2005. http://dx.doi.org/10.1007/3-211-27506-1_7.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Holschbach, Susanne. "Foto/Byte." In Medien Kunst Netz 2. Springer Vienna, 2005. http://dx.doi.org/10.1007/3-211-27506-1_8.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Gomez, Jeff. "Byte flight." In Print is Dead. Palgrave Macmillan US, 2008. http://dx.doi.org/10.1007/978-1-4299-5477-8_2.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Fortner, Brand. "Byte Numbers." In The Data Handbook. Springer New York, 1995. http://dx.doi.org/10.1007/978-1-4612-2538-6_3.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Weik, Martin H. "attribute byte." In Computer Science and Communications Dictionary. Springer US, 2000. http://dx.doi.org/10.1007/1-4020-0613-6_1004.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Rennie, Frank, and Keith Smyth. "Bit/byte." In Digital Learning: The Key Concepts, 2nd ed. Routledge, 2019. http://dx.doi.org/10.4324/9780429425240-21.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Weik, Martin H. "bit byte." In Computer Science and Communications Dictionary. Springer US, 2000. http://dx.doi.org/10.1007/1-4020-0613-6_1597.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Weik, Martin H. "displacement byte." In Computer Science and Communications Dictionary. Springer US, 2000. http://dx.doi.org/10.1007/1-4020-0613-6_5311.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Hunt, John. "Byte Code Protection." In Java for Practitioners. Springer London, 1999. http://dx.doi.org/10.1007/978-1-4471-0843-6_36.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "Byte"

1

Aljaber, Rozan A., and Gheith A. Abandah. "Automatic Diacritization of Arabic Text and Poetry Using Pretrained Byte-to-Byte Language Models and Multiphase Training." In 2025 1st International Conference on Computational Intelligence Approaches and Applications (ICCIAA). IEEE, 2025. https://doi.org/10.1109/icciaa65327.2025.11013629.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Xiang, Zhenggui. "Multi-byte Hash based CSV Load in Bioinformatics." In 2024 IEEE International Conference on Bioinformatics and Biomedicine (BIBM). IEEE, 2024. https://doi.org/10.1109/bibm62325.2024.10822437.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Nishiyama, Hikaru, Daisuke Fujimoto, and Yuichi Hayashi. "Controlling Faulty Byte Outputs with IEMI against Cryptographic ICs." In 2024 14th International Workshop on the Electromagnetic Compatibility of Integrated Circuits (EMC Compo). IEEE, 2024. http://dx.doi.org/10.1109/emccompo61192.2024.10742058.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Durge, Renuka S., and Vaishali M. Deshmukh. "Analyzing Byte Level Tokenization for two Layer Encryption Technique." In 2024 2nd DMIHER International Conference on Artificial Intelligence in Healthcare, Education and Industry (IDICAIEI). IEEE, 2024. https://doi.org/10.1109/idicaiei61867.2024.10842702.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Hsiao, Roger, Liuhui Deng, Erik McDermott, Ruchir Travadi, and Xiaodan Zhuang. "Optimizing Byte-Level Representation For End-To-End ASR." In 2024 IEEE Spoken Language Technology Workshop (SLT). IEEE, 2024. https://doi.org/10.1109/slt61566.2024.10832272.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Simelane, Sicelo, and Peter Olukanmi. "Optimizing Byte Pair Encoding Tokenization for South African Languages." In 2024 4th International Conference on Advanced Enterprise Information System (AEIS). IEEE, 2024. https://doi.org/10.1109/aeis65978.2024.00022.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Erman, Jeffrey, Anirban Mahanti, and Martin Arlitt. "Byte me." In the 3rd annual ACM workshop. ACM Press, 2007. http://dx.doi.org/10.1145/1269880.1269890.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Kim, Donghyun, Youn Kyu Lee, and Jongwook Jeong. "NULL byte injection." In MobiHoc '22: The Twenty-third International Symposium on Theory, Algorithmic Foundations, and Protocol Design for Mobile Networks and Mobile Computing. ACM, 2022. http://dx.doi.org/10.1145/3492866.3558587.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Wang, Xiaolin, Xiao Pang, and Yingwei Luo. "Byte-Map: A Novel Mobile Map Format Using Two-Byte Coordinates." In 2010 IEEE Vehicular Technology Conference (VTC 2010-Fall). IEEE, 2010. http://dx.doi.org/10.1109/vetecf.2010.5594117.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Gracia-Tinedo, Raúl, Flavio Junqueira, and Tom Kaitchuck. ""Back to the Byte": Towards Byte-oriented Semantics for Streaming Storage." In MIDDLEWARE '24: 25th International Middleware Conference. ACM, 2024. http://dx.doi.org/10.1145/3700824.3701099.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Reports on the topic "Byte"

1

Stearns, S. D. Authentication of byte sequences. Office of Scientific and Technical Information (OSTI), 1991. http://dx.doi.org/10.2172/5217104.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Research Institute (IFPRI), International Food Policy. Byte by byte: Policy innovation for transforming Africa’s food system with digital technologies. International Food Policy Research Institute, Center for Development Research University of Bonn, Imperial College London, 2019. http://dx.doi.org/10.2499/9780896296848.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Briscoe, B., and J. Manner. Byte and Packet Congestion Notification. RFC Editor, 2014. http://dx.doi.org/10.17487/rfc7141.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Allman, M. TCP Congestion Control with Appropriate Byte Counting (ABC). RFC Editor, 2003. http://dx.doi.org/10.17487/rfc3465.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Truong, Vuong, James Chafouleas, Thomas Mosdal, Sophia Bragdon, Megan Bishop, and Jay Clausen. Thermography conversion for optimal noise reduction. Engineer Research and Development Center (U.S.), 2024. http://dx.doi.org/10.21079/11681/49414.

Full text
Abstract:
Computer vision applications in terms of raw thermal radiance are limited by byte size. Normalizing the raw imagery reduces functional complexities that could otherwise aide a computer processing algorithm. This work explores a method to normalize 16-bit signed integer (I16) into unsigned 8-bit (U8) while maintaining the integrity of the correlation coefficients between the raw data sets and the environmental parameters that affects thermal anomaly detectability.
APA, Harvard, Vancouver, ISO, and other styles
6

Liu, Z., and K. Le. Zero-byte Support for Bidirectional Reliable Mode (R-mode) in Extended Link-Layer Assisted RObust Header Compression (ROHC) Profile. RFC Editor, 2002. http://dx.doi.org/10.17487/rfc3408.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Alsanius, Beatrix W., Andreas Nicolaidis Lindqvist, and Ivar Vågsholm. Transport av bladgrönsaker med batteridrivna tunga lastbilar. SLU Future food, Swedish University of Agricultural Sciences, 2023. http://dx.doi.org/10.54612/a.1kv6bthjsp.

Full text
Abstract:
Tre viktiga anledningar till varför det svenska livsmedelssystemet är beroende av transporter är låg självförsörjningsgrad, centralisering av marknaden samt mycket varierande klimatförhållanden i Sverige som hindrar lokalproduktion av vegetabilier. Transporter av varor som är beroende av en kylkedja kräver inte bara energi för själva transporten, utan också för att hålla temperaturen på en nivå som inte äventyrar livsmedelssäkerhet och produktens hållbarhet. Målkonflikten berör tre globala miljömål, nämligen SDG2 – ingen hunger, SDG12 – hållbar konsumtion och produktion, samt SDG13 – bekämpa k
APA, Harvard, Vancouver, ISO, and other styles
8

Bauer, Andrew. In situ and time. Engineer Research and Development Center (U.S.), 2022. http://dx.doi.org/10.21079/11681/46162.

Full text
Abstract:
Large-scale HPC simulations with their inherent I/O bottleneck have made in situ visualization an essential approach for data analysis, although the idea of in situ visualization dates back to the era of coprocessing in the 1990s. In situ coupling of analysis and visualization to a live simulation circumvents writing raw data to disk for post-mortem analysis -- an approach that is already inefficient for today's very large simulation codes. Instead, with in situ visualization, data abstracts are generated that provide a much higher level of expressiveness per byte. Therefore, more details can
APA, Harvard, Vancouver, ISO, and other styles
9

van de Sand, Ron, and Jörg Reiff-Stephan. FrostByte Dataset. Technische Hochschule Wildau, 2021. http://dx.doi.org/10.15771/1894.

Full text
Abstract:
It is with great pleasure that we announce the release of the “Frost Byte” dataset. The dataset was collected during research on fault detection and diagnosis (FDD) approaches and their transferability to heterogeneous systems of industrial refrigeration systems at the Technical University of Applied Sciences Wildau. The data collection took place between 2018 and 2019 and is intended to supplement the ASHRAE 1043-RP dataset (Comstock &amp; Braun, 1999), which has been the only publicly available data source in this area to date. For comparison purposes, the method of data collection was chose
APA, Harvard, Vancouver, ISO, and other styles
10

Lamb, Michael W. Bytes: Weapons of Mass Disruption. Defense Technical Information Center, 2002. http://dx.doi.org/10.21236/ada420703.

Full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!