To see the other types of publications on this topic, follow the link: Nibble.

Journal articles on the topic 'Nibble'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 journal articles for your research on the topic 'Nibble.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

Rangsee, Pattarakamon Rangsee*,, Dr K. B. Raja, and Dr Venugopal K R. "Hybrid Feature Approach of Face Recognition based on Pixel Binary Segmentation." International Journal of Engineering and Advanced Technology 11, no. 3 (2022): 86–95. http://dx.doi.org/10.35940/ijeat.c3361.0211322.

Full text
Abstract:
The pose, illumination, and expression variations are challenging tasks in Facial Recognition (FR) and are a popular research area nowadays. We introduce novel nibbles of pixel technique and hybrid features from nibbles in this paper. The color images are converted into grayscale and then converts decimal values from each pixel into eight-bit binary values. The novel concepts of segmenting eight-bit binary into two groups of four-bit binary as Leftmost Nibble (LN) and Rightmost Nibble (RN) is presented. The nibble concept increases the computational speed and decreases the complexity of the sy
APA, Harvard, Vancouver, ISO, and other styles
2

Pattarakamon, Rangsee, K. B. Raja Dr., and Venugopal K. R. Dr. "Hybrid Feature Approach of Face Recognition based on Pixel Binary Segmentation." International Journal of Engineering and Advanced Technology (IJEAT) 111, no. 3 (2022): 86–95. https://doi.org/10.35940/ijeat.C3361.0211322.

Full text
Abstract:
<strong>Abstract: </strong>The pose, illumination, and expression variations are challenging tasks in Facial Recognition (FR) and are a popular research area nowadays. We introduce novel nibbles of pixel technique and hybrid features from nibbles in this paper. The color images are converted into grayscale and then converts decimal values from each pixel into eight-bit binary values. The novel concepts of segmenting eight-bit binary into two groups of four-bit binary as Leftmost Nibble (LN) and Rightmost Nibble (RN) is presented. The nibble concept increases the computational speed and decreas
APA, Harvard, Vancouver, ISO, and other styles
3

Neureder, U. "Investigation into steering wheel nibble." Proceedings of the Institution of Mechanical Engineers, Part D: Journal of Automobile Engineering 216, no. 4 (2002): 267–77. http://dx.doi.org/10.1243/0954407021529101.

Full text
Abstract:
Many studies of mechanisms contributing to steering wheel nibble have been carried out in the past. This paper deals with some aspects that have not yet been studied, or those that have been presented by several authors but are deemed to be controversial. Firstly, an overview of stimulation sources (disturbance factors), and the significance these have with respect to steering nibble, is given. As an example of the controversial aspects of the problem, this paper deals with the assumption of dry friction in steering gear models and its conflict with the observed transfer of vibration caused by
APA, Harvard, Vancouver, ISO, and other styles
4

Howard, Jay R., Katherine B. Novak, Krista M. C. Cline, and Marvin B. Scott. "Another Nibble at the Core." Teaching Sociology 42, no. 3 (2014): 177–86. http://dx.doi.org/10.1177/0092055x14527422.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Blau, Susan R., and Patricia B. Campbell. "To Nibble or to Byte:." Computers in the Schools 8, no. 4 (1991): 147–57. http://dx.doi.org/10.1300/j025v08n04_13.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Liu, Feng, Xuan Liu, and Shuai Meng. "Differential Fault Attack and Meet-in-the-Middle Attack on Block Cipher LED." Advanced Materials Research 850-851 (December 2013): 529–32. http://dx.doi.org/10.4028/www.scientific.net/amr.850-851.529.

Full text
Abstract:
In this paper, on the basis of the nibble-based faulty model and the differential analysis principle, we propose a kind of attack on the new low-cost LED block cipher which combine differential fault attack with meet-in-the-middle attack. We inject the nibble faulty at round 29, which is earlier than other papers. More precisely, ciphertext need to be multiplied by a matrix before add the key in order to reduce the effect from key spreading. Finally, the key candidates are recovered by solving the equation set. Hence the secret key bits can be recovered faster than exhaustive search.
APA, Harvard, Vancouver, ISO, and other styles
7

Milius, Susan. "Carnivorous Fish Nibble at Farming Gain." Science News 158, no. 1 (2000): 7. http://dx.doi.org/10.2307/3981447.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Raloff, J. "Cholesterol Worries? Nibble More on Less." Science News 143, no. 11 (1993): 165. http://dx.doi.org/10.2307/3977249.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Takken, F. L. W., and W. I. L. Tameling. "To Nibble at Plant Resistance Proteins." Science 324, no. 5928 (2009): 744–46. http://dx.doi.org/10.1126/science.1171666.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Mikdar, Mahmoud, and Slim Azouzi. "AMIS RBC antigen loss: nibble or devour?" Blood 143, no. 9 (2024): 742–44. http://dx.doi.org/10.1182/blood.2023023058.

Full text
APA, Harvard, Vancouver, ISO, and other styles
11

Napolitano, L. M., D. D. Andaleon, W. O. Shreeve, and G. R. Redinbo. "Nibble-based error detection or correction (EDOC) chip." Electronics Letters 25, no. 22 (1989): 1542. http://dx.doi.org/10.1049/el:19891037.

Full text
APA, Harvard, Vancouver, ISO, and other styles
12

Larkin, Marilynn. "Functional foods nibble away at serum cholesterol concentrations." Lancet 355, no. 9203 (2000): 555. http://dx.doi.org/10.1016/s0140-6736(05)73205-0.

Full text
APA, Harvard, Vancouver, ISO, and other styles
13

Dong, Liang, Hongxin Zhang, Shaofei Sun, Lei Zhu, Xiaotong Cui, and Bablu K. Ghosh. "An Effective Simulation Analysis of Transient Electromagnetic Multiple Faults." Sensors 20, no. 7 (2020): 1976. http://dx.doi.org/10.3390/s20071976.

Full text
Abstract:
Embedded encryption devices and smart sensors are vulnerable to physical attacks. Due to the continuous shrinking of chip size, laser injection, particle radiation and electromagnetic transient injection are possible methods that introduce transient multiple faults. In the fault analysis stage, the adversary is unclear about the actual number of faults injected. Typically, the single-nibble fault analysis encounters difficulties. Therefore, in this paper, we propose novel ciphertext-only impossible differentials that can analyze the number of random faults to six nibbles. We use the impossible
APA, Harvard, Vancouver, ISO, and other styles
14

Marcheix, David, and Stefka Gueorguieva. "Nibble meshing: incremental triangulation of non-manifold solid boundary." Computers & Graphics 22, no. 2-3 (1998): 181–88. http://dx.doi.org/10.1016/s0097-8493(98)00005-3.

Full text
APA, Harvard, Vancouver, ISO, and other styles
15

Dubhashi, Devdatt, David A. Grable, and Alessandro Panconesi. "Near-optimal, distributed edge colouring via the nibble method." Theoretical Computer Science 203, no. 2 (1998): 225–51. http://dx.doi.org/10.1016/s0304-3975(98)00022-x.

Full text
APA, Harvard, Vancouver, ISO, and other styles
16

Muhammad anis and Nadia Paramita Retno Adiati. "Pencarian Karakteristik Truncated Differential pada 8 Iterasi Algoritme Design 32 Bit Lightweight Block Cipher Algorithm (DLBCA)." Info Kripto 16, no. 1 (2022): 1–6. http://dx.doi.org/10.56706/ik.v16i1.43.

Full text
Abstract:
Algoritme DLBCA merupakan algoritme block cipher dengan struktur feistel yang terdiri dari 15 iterasi dan memiliki plaintext sepanjang 32 bit dan kunci sepanjang 80 bit. Serangan diferensial telah diterapkan pada algoritme DLBCA dengan hasil jumlah s-box cenderung lebih sedikit ketika dibandingkan dengan beberapa algoritme lainnya. Serangan diferensial dapat dikembangkan menjadi serangan truncated diferential dengan menggabungkan n buah karakteristik truncated. Pada penelitian ini dilakukan pencarian karakteristik truncated untuk delapan iterasi algoritme DLBCA. Penentuan karakteristik truncat
APA, Harvard, Vancouver, ISO, and other styles
17

Rakesh, Ravuru, Shantan Devathi, Prashanth Sekhar Chandra Sekaran, and SiramSanath Kumar. "Adaptive Randomization in Image Steganography Pertaining to Most Significant Nibble." International Journal of Computer Applications 22, no. 3 (2011): 1–6. http://dx.doi.org/10.5120/2567-3529.

Full text
APA, Harvard, Vancouver, ISO, and other styles
18

Rajagopala, Sundararaman, Har Narayan Upadhyay, Swetha Varadaraja, J. B. B. Rayappan, and Rengarajan Amirtharaj. "Gyratory Assisted Info Hide-A Nibble Differencing for Message Embedding." Information Technology Journal 13, no. 12 (2014): 2005–10. http://dx.doi.org/10.3923/itj.2014.2005.2010.

Full text
APA, Harvard, Vancouver, ISO, and other styles
19

Chakraborty, Anirban, and Subhendu Das. "A novel method for secret image sharing Using nibble exchange." INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY 4, no. 1 (2013): 94–97. http://dx.doi.org/10.24297/ijct.v4i1b.3064.

Full text
Abstract:
This paper proposes a new scheme for secret image sharing which shuffles and manipulates the nibbles (and hence the bytes) of the pixel values of the images. We have developed a new algorithm called LDRU (Left-Down-Right-Up) for the construction of shares. Using LDRU algorithm any type of (Binary, Gray scale or Color) secret images can be shared and reconstructed precisely in linear time.
APA, Harvard, Vancouver, ISO, and other styles
20

Immink, Kees A. Schouhamer. "High-Rate Maximum Runlength Constrained Coding Schemes Using Nibble Replacement." IEEE Transactions on Information Theory 58, no. 10 (2012): 6572–80. http://dx.doi.org/10.1109/tit.2012.2204034.

Full text
APA, Harvard, Vancouver, ISO, and other styles
21

张, 志辉. "Electromagnetic Radiation Suppression Method for Single Edge Nibble Transmission Signal." Instrumentation and Equipments 11, no. 01 (2023): 49–56. http://dx.doi.org/10.12677/iae.2023.111007.

Full text
APA, Harvard, Vancouver, ISO, and other styles
22

Patel, Viral, and Dheeraj Dadhich. "Impact of the Nibble Substitution for Image Steganography - An Enhanced Lsb Algorithm." International Journal of Scientific Research 2, no. 10 (2012): 1–3. http://dx.doi.org/10.15373/22778179/oct2013/158.

Full text
APA, Harvard, Vancouver, ISO, and other styles
23

Luo, Haoxiang, Weijian Chen, Xinyue Ming, and Yifan Wu. "General Differential Fault Attack on PRESENT and GIFT Cipher With Nibble." IEEE Access 9 (2021): 37697–706. http://dx.doi.org/10.1109/access.2021.3062665.

Full text
APA, Harvard, Vancouver, ISO, and other styles
24

Kaur, Sukhbir, Paramjeet Singh, and Shaveta Rani. "Advanced Lossless Text Compression System based on Dynamic Nibble Reduction Algorithm." International Journal of Computer Sciences and Engineering 6, no. 7 (2018): 382–86. http://dx.doi.org/10.26438/ijcse/v6i7.382386.

Full text
APA, Harvard, Vancouver, ISO, and other styles
25

Wei, Debao, Libao Deng, Peng Zhang, Liyan Qiao, and Xiyuan Peng. "NRC: A Nibble Remapping Coding Strategy for NAND Flash Reliability Extension." IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems 35, no. 11 (2016): 1942–46. http://dx.doi.org/10.1109/tcad.2016.2533861.

Full text
APA, Harvard, Vancouver, ISO, and other styles
26

Dr., Mamillapally Raghavender Sharma. "CASE STUDY OF NTBS PROTOCOL IMPLEMENTATION IN NIBBLE BITS FOR VANET." GLOBAL JOURNAL OF ENGINEERING SCIENCE AND RESEARCHES 6, no. 3 (2019): 198–206. https://doi.org/10.5281/zenodo.2616899.

Full text
Abstract:
The pervasiveness of VANET system network eases our daily activities and improves the communication between world and human beings. The capability of communication among vehicular nodes in VANET environment and transfer of information from one node to another node in every situation under every condition is tremendously increasing day-by-day in Vehicular field. VANET is an emerging technology which provides ubiquitous connectivity among vehicular nodes. VANET system incorporates large number of communicational sensors in order to provide better facilities to passengers in its field reliably an
APA, Harvard, Vancouver, ISO, and other styles
27

Immink, Kees Schouhamer, Jos H. Weber, and Kui Cai. "Properties of Maxentropic DNA Synthesis Codes." Entropy 26, no. 12 (2024): 1028. http://dx.doi.org/10.3390/e26121028.

Full text
Abstract:
Low-weight codes have been proposed for efficiently synthesizing deoxyribonucleic acid (DNA) for massive data storage, where a multiple of DNA strands are synthesized in parallel. We report on the redundancy and information rate of maxentropic low-weight codes for asymptotically large codeword length. We compare the performance of low-complexity nibble replacement (NR) codes, which are designed to minimize the synthesis time, with the performance of maxentropic low-weight codes. Finally, the asymptotic redundancy and information rate of codes with a runlength limitation are investigated.
APA, Harvard, Vancouver, ISO, and other styles
28

Shi, Jiali, Guoqiang Liu, and Chao Li. "SAT-Based Security Evaluation for WARP against Linear Cryptanalysis." IET Information Security 2023 (December 6, 2023): 1–14. http://dx.doi.org/10.1049/2023/5323380.

Full text
Abstract:
WARP, an efficient lightweight block cipher presented by Banik et al., offers a viable alternative to AES with its 128-bit block and a 128-bit key. It adopts a 32-nibble type-II generalized Feistel network (GFN) structure, incorporating a nibble permutation optimized for both security and efficiency. Notably, WARP has achieved the lowest hardware implementation among 128-bit block ciphers. Its bit-serial encryption-only circuit is only 763 gate equivalents (GEs). Consequently, WARP has received significant attention since its inception. The designers evaluated the number of active Sboxes for l
APA, Harvard, Vancouver, ISO, and other styles
29

Lavieu, Belinda. "Pour votre santé, évitez de manger trop gras, trop salé, trop sucré : de la notion de «complément» à la «manière de manger»." Scolia 27, no. 1 (2013): 75–95. http://dx.doi.org/10.3406/scoli.2013.1155.

Full text
Abstract:
This article is organised in two parts : the first one reviews the so often problematic terminology between the different terms of complements : adverbial phrase, adjunct ; the second part deals with VMManger (verbs expressing the way of eating) like to savour, to devour, to taste, to eat, to nibble and their "adjunct of manner". The idea is to find if they are semantically redundant with respect to the verb or whether, on the contrary, they activate another semantic parameter that is not present in the semantics of the verb.
APA, Harvard, Vancouver, ISO, and other styles
30

Andrea Widener. "A new nighttime nibble, and a robot baby helps decipher dust risks." C&EN Global Enterprise 99, no. 11 (2021): 40. http://dx.doi.org/10.1021/cen-09911-newscripts.

Full text
APA, Harvard, Vancouver, ISO, and other styles
31

Gao, Min, Zongguang Yu, Shuqin Wan, and Jie Shao. "Design of low-power CIC decimation filter based on nibble serial arithmetic." Journal of Physics: Conference Series 2294, no. 1 (2022): 012008. http://dx.doi.org/10.1088/1742-6596/2294/1/012008.

Full text
Abstract:
Abstract Aiming at the problem of large area and high power consumption of traditional CIC (Cascade Integral Comb Filter) decimation filter, a folded multistage cascade CIC decimation filter is designed. The nibble-serial arithmetic and multiplexing technology are used to reduce the operation and storage logic unit, lower the cost and improve the utilization efficiency of system resources. The folded multistage cascade CIC decimation filter has a programmable structure of down sampling factor and can dynamically realize 1∼16 times extraction. It is suitable for communication systems with multi
APA, Harvard, Vancouver, ISO, and other styles
32

Fredericks, Lynn, Pam Koch, and Juliette Pope. "Nibble With Willow: Successes and Barriers of a Culinary Nutrition Preschool Program." Journal of Nutrition Education and Behavior 56, no. 8 (2024): S68. http://dx.doi.org/10.1016/j.jneb.2024.05.156.

Full text
APA, Harvard, Vancouver, ISO, and other styles
33

Olson, Rita Brennan, Nancy Cohen, Eileen Atallah, and John Cunningham. "NIBBLE for Adult Basic Education: Website and Lessons for Low-Literate Learners." Journal of Nutrition Education 32, no. 5 (2000): 285–86. http://dx.doi.org/10.1016/s0022-3182(00)70577-2.

Full text
APA, Harvard, Vancouver, ISO, and other styles
34

Zhang, Xiaowen, Zhanyang Zhang, and Xinzhou Wei. "An Improved Lightweight RFID Authentication Protocol." International Journal of Applied Logistics 2, no. 1 (2011): 76–84. http://dx.doi.org/10.4018/ijal.2011010105.

Full text
Abstract:
This study extends the vulnerability analysis of a RFID authentication protocol and offers solutions to security weaknesses through enhanced measures. Vajda and Buttyan (VB) proposed a lightweight RFID authentication protocol, called XOR. Defend, Fu, and Juels (DFJ) analyzed it and proposed repeated keys and nibble attacks to the protocol. In this paper, we identify the source of vulnerability within VB’s original successive session key permutation algorithm. We propose three improvements, namely removing bad shuffles, hopping the runs, and authenticating mutually, to prevent DFJ’s attacks, th
APA, Harvard, Vancouver, ISO, and other styles
35

Dance, Amber. "Core Concept: Cells nibble one another via the under-appreciated process of trogocytosis." Proceedings of the National Academy of Sciences 116, no. 36 (2019): 17608–10. http://dx.doi.org/10.1073/pnas.1912252116.

Full text
APA, Harvard, Vancouver, ISO, and other styles
36

Wei Peng, Jianxin Wang, Bihai Zhao, and Lusheng Wang. "Identification of Protein Complexes Using Weighted PageRank-Nibble Algorithm and Core-Attachment Structure." IEEE/ACM Transactions on Computational Biology and Bioinformatics 12, no. 1 (2015): 179–92. http://dx.doi.org/10.1109/tcbb.2014.2343954.

Full text
APA, Harvard, Vancouver, ISO, and other styles
37

Neureder, Uwe. "Modelling and simulation of the steering system for the investigation of steering nibble." ATZ worldwide 103, no. 3 (2001): 12–15. http://dx.doi.org/10.1007/bf03226432.

Full text
APA, Harvard, Vancouver, ISO, and other styles
38

Weijzen, P. L. G., D. G. Liem, E. H. Zandstra, and C. de Graaf. "Sensory specific satiety and intake: The difference between nibble- and bar-size snacks." Appetite 50, no. 2-3 (2008): 435–42. http://dx.doi.org/10.1016/j.appet.2007.09.008.

Full text
APA, Harvard, Vancouver, ISO, and other styles
39

Pancza, A. "Le Château Cugny, un escarpement particulièrement gélif du Jura." Geographica Helvetica 40, no. 2 (1985): 67–73. http://dx.doi.org/10.5194/gh-40-67-1985.

Full text
Abstract:
Abstract. Château Cugny is an exceptional place where the actual cliffs evolution is quite rapid. Because of the frost action, considerable quantities of frost-rived nibble broke off the cliffs each year. The relative frequency of rock falls enables measurements to be made with simple installations. Two examples of the daily freeze-thaw cycle show the variations of the rock falls during the day according to the temperature's changes. Frequent rock falls contribute to Château Cugny's cliffs rapid scarp retreat. These rock falls occur by a 2-stage process: first, the frost susceptible lower port
APA, Harvard, Vancouver, ISO, and other styles
40

Bonaldo, Roberta Martini, João Paulo Krajewski, and Ivan Sazima. "Does the association of young fishes with jellyfishes protect from predation?A report on a failure case due to damage to the jellyfish." Neotropical Ichthyology 2, no. 2 (2004): 103–5. http://dx.doi.org/10.1590/s1679-62252004000200008.

Full text
Abstract:
The fish-jellyfish association is regarded as a temporary symbiosis believed to protect the fishes from predators. Here we report on juvenile scads (Trachurus lathami) associated with the jellyfish Chrysaora lactea, opportunistically preyed on by the grouper Mycteroperca acutirostris while the medusa was being damaged. The predation instances occurred when a couple of the filefish Stephanolepis hispidus approached the jellyfish to nibble on its umbrella. The feeding of the filefish caused a momentary disturbance of the defensive association, perceived and capitalised on by the watchful grouper
APA, Harvard, Vancouver, ISO, and other styles
41

Neal, Melissa, and Ellen B. Peffley. "Members of the Family Leporidae Can Select for Onions with High Soluble Sugars and Low Pyruvates." HortScience 35, no. 4 (2000): 550C—550b. http://dx.doi.org/10.21273/hortsci.35.4.550c.

Full text
Abstract:
Over the past several growing seasons researchers at Texas Tech University have observed that certain onions appeal to rabbits more than other onions, meaning that rabbits tend to nibble on certain lines or varieties and leave other lines undisturbed. We were interested in determining the cahracteristics of the onions that rabbits seemed to like. Onions were planted at random in the TTU breeding nursery. During the growing season all onions were rated for rabbit appeal - those with chewed leaves and or bulbs were recorded as liked by the rabbits. All onions in each plot, whether disturbed or u
APA, Harvard, Vancouver, ISO, and other styles
42

Srivastava, Dr Aniket, and Dr Parul Verma. "Mobile Learning for Zen G Learners." International Journal of Research Publication and Reviews 04, no. 02 (2023): 513–17. http://dx.doi.org/10.55248/gengpi.2023.4221.

Full text
Abstract:
Mobile learning implies that you can convey figuring out how to learn anyplace/whenever which is something that customary learning models will neglect to do by GenZ. In any case, it's more than about operations. Research shows that recent Genz learners are inspired by customized learning and mobile based learning has maybe the best ability to follow through on this. By customized, we mean empowering the student to control the nature, timing, and heading of the growing experience. This degree of exemplification and adaptability can't be accomplished with conventional, up close and personal lear
APA, Harvard, Vancouver, ISO, and other styles
43

Perla, Venkata K., Sarit K. Ghosh, and Kaushik Mallick. "Carbon Nitride Supported Ultrafine Manganese Sulfide Based Nonvolatile Resistive Switching Device for Nibble-Sized Memory Application." ACS Applied Electronic Materials 2, no. 12 (2020): 3987–93. http://dx.doi.org/10.1021/acsaelm.0c00817.

Full text
APA, Harvard, Vancouver, ISO, and other styles
44

YUE, Lina, Li HAO, Xiaolu PEI, Li GUAN, Guoli XU, and Chunhong SHI. "Application of nibble debridement and dressing change technology in nursing of patients with diabetic foot ulcer." Chinese Journal of Integrative Nursing 9, no. 6 (2023): 44–47. http://dx.doi.org/10.55111/j.issn2709-1961.202304084.

Full text
APA, Harvard, Vancouver, ISO, and other styles
45

Thakur, R. "Laboratory and mound testing of armoured optical fibre cable against termites." Indian Journal of Forestry 32, no. 3 (2009): 463–64. http://dx.doi.org/10.54207/bsmps1000-2009-n31lng.

Full text
Abstract:
The termites are known to cause extensive damage to forestry, agriculture, horticulture, and all kinds of wood work of buildings, etc. However, they have also been reported to nibble on the outer covering of the cables, and cause significant damage to adhesive coatings used at the joints of the cables. Two samples of armored optical fibre cable were received from Ministry of Railways, New Delhi for testing their durability against termites in the laboratory as well as in the field. In the laboratory, cable samples were tested against termite species, Microcerotermes beesoni Snyder and in the f
APA, Harvard, Vancouver, ISO, and other styles
46

Fu, Yanwen, Guangcai Xu, Shang Gao, Limin Feng, Qinghua Guo, and Haitao Yang. "LiDAR Reveals the Process of Vision-Mediated Predator–Prey Relationships." Remote Sensing 14, no. 15 (2022): 3730. http://dx.doi.org/10.3390/rs14153730.

Full text
Abstract:
Exploring the processes of interspecific relationships is crucial to understanding the mechanisms of biodiversity maintenance. Visually detecting interspecies relationships of large mammals is limited by the reconstruction accuracy of the environmental structure and the timely detection of animal behavior. Hence, we used backpack laser scanning (BLS) to reconstruct the high-resolution three-dimensional environmental structure to simulate the process of a predator approaching its prey, indicating that predator tigers would reduce their visibility by changing their behavior. Wild boars will nibb
APA, Harvard, Vancouver, ISO, and other styles
47

Gong, Jingyi, Thomas N. Gaitanos, Olivia Luu, et al. "Gulp1 controls Eph/ephrin trogocytosis and is important for cell rearrangements during development." Journal of Cell Biology 218, no. 10 (2019): 3455–71. http://dx.doi.org/10.1083/jcb.201901032.

Full text
Abstract:
Trogocytosis, in which cells nibble away parts of neighboring cells, is an intercellular cannibalism process conserved from protozoa to mammals. Its underlying molecular mechanisms are not well understood and are likely distinct from phagocytosis, a process that clears entire cells. Bi-directional contact repulsion induced by Eph/ephrin signaling involves transfer of membrane patches and full-length Eph/ephrin protein complexes between opposing cells, resembling trogocytosis. Here, we show that the phagocytic adaptor protein Gulp1 regulates EphB/ephrinB trogocytosis to achieve efficient cell r
APA, Harvard, Vancouver, ISO, and other styles
48

Zhivago, N. A. "SEMANTICS AND PRAGMATICS OF VERBAL METAPHOR OF FOOD (THE SEMANTIC GROUP «FOOD CONSUMPTION WITH THE AID OF TEETH»)." Bulletin of Kemerovo State University, no. 4 (January 10, 2018): 167–74. http://dx.doi.org/10.21603/2078-8975-2017-4-167-174.

Full text
Abstract:
The article features an analysis of semantics, pragmatics and text-based functioning of figurative vocabulary and expressions, which are metaphorically motivated by such verbs as bite, gnaw, nibble and chew. These verbs name various activities, processes and phenomena because of their analogy to food consumption with the aid of teeth. The analysis allowed the author to describe a number of cognitive metaphorical models which, in their turn, reflect the image projection from the source-domain “Food Consumption” into the conceptual spheres of physiological, mental, psychological and social pheno
APA, Harvard, Vancouver, ISO, and other styles
49

Li, He, Zhengyu Li, Yanbin Cai, et al. "Design of a Single-Edge Nibble Transmission Signal Simulation and Acquisition System for Power Machinery Virtual Testing." Designs 8, no. 6 (2024): 124. http://dx.doi.org/10.3390/designs8060124.

Full text
Abstract:
With the advancement of technology, the Single-Edge Nibble Transmission (SENT) protocol has become increasingly prevalent in automotive sensor applications, highlighting the need for a robust SENT signal simulation and acquisition system. This paper presents a real-time SENT signal acquisition system based on NI Field Programmable Gate Array (FPGA) technology. The system supports a range of message and data frame formats specified by the SAE J2716 SENT protocol, operates autonomously within a LabVIEW self-compiled environment, and is compatible with NI hardware-in-the-loop (HIL) systems for vi
APA, Harvard, Vancouver, ISO, and other styles
50

Johansson, R. "A class of (12, 8) codes for correcting single errors and detecting double errors within a nibble." IEEE Transactions on Computers 42, no. 12 (1993): 1504–6. http://dx.doi.org/10.1109/12.260641.

Full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!