Skip to main page content
U.S. flag

An official website of the United States government

Dot gov

The .gov means it’s official.
Federal government websites often end in .gov or .mil. Before sharing sensitive information, make sure you’re on a federal government site.

Https

The site is secure.
The https:// ensures that you are connecting to the official website and that any information you provide is encrypted and transmitted securely.

Access keys NCBI Homepage MyNCBI Homepage Main Content Main Navigation

Search Page

Filters

My NCBI Filters

Results by year

Table representation of search results timeline featuring number of search results per year.

Year Number of Results
1975 4
1976 1
1978 1
1979 2
1980 2
1981 1
1982 2
1983 2
1984 1
1985 1
1987 4
1988 2
1989 2
1990 1
1991 2
1992 4
1993 2
1994 4
1995 3
1996 6
1997 6
1998 5
1999 3
2000 9
2001 8
2002 4
2003 9
2004 9
2005 12
2006 11
2007 14
2008 13
2009 12
2010 16
2011 15
2012 24
2013 36
2014 41
2015 30
2016 34
2017 43
2018 45
2019 37
2020 52
2021 76
2022 75
2023 91
2024 34

Text availability

Article attribute

Article type

Publication date

Search Results

754 results

Results by year

Filters applied: . Clear all
Page 1
Showing results for E. bits
Your search for E. Bitsa retrieved no results
Bio-Hash Secured Hardware e-Health Record System.
Sravani MM, Durai SA. Sravani MM, et al. IEEE Trans Biomed Circuits Syst. 2023 Jun;17(3):420-432. doi: 10.1109/TBCAS.2023.3263177. Epub 2023 Jul 12. IEEE Trans Biomed Circuits Syst. 2023. PMID: 37030700
Dual securing strategy for all-hardware e-Health Record System is designed and developed for improved security and reduced Hardware Execution Time (HET). ...The subsequent Random Compression Logic (RCL) skims the hashed value from 512 to 128 bits along with the help …
Dual securing strategy for all-hardware e-Health Record System is designed and developed for improved security and reduced Hardware E …
Multicomponent molecular memory.
Arcadia CE, Kennedy E, Geiser J, Dombroski A, Oakley K, Chen SL, Sprague L, Ozmen M, Sello J, Weber PM, Reda S, Rose C, Kim E, Rubenstein BM, Rosenstein JK. Arcadia CE, et al. Nat Commun. 2020 Feb 4;11(1):691. doi: 10.1038/s41467-020-14455-1. Nat Commun. 2020. PMID: 32019933 Free PMC article.
Using this combinatorial chemistry we encode more than 1.8 million bits of art historical images, including a Cubist drawing by Picasso. ...
Using this combinatorial chemistry we encode more than 1.8 million bits of art historical images, including a Cubist drawing by Picas …
Reconstructing meaning from bits of information.
Kivisaari SL, van Vliet M, Hultén A, Lindh-Knuutila T, Faisal A, Salmelin R. Kivisaari SL, et al. Nat Commun. 2019 Feb 25;10(1):927. doi: 10.1038/s41467-019-08848-0. Nat Commun. 2019. PMID: 30804334 Free PMC article.
Modern theories of semantics posit that the meaning of words can be decomposed into a unique combination of semantic features (e.g., "dog" would include "barks"). Here, we demonstrate using functional MRI (fMRI) that the brain combines bits of information into meani …
Modern theories of semantics posit that the meaning of words can be decomposed into a unique combination of semantic features (e.g., …
Landauer Bound and Continuous Phase Transitions.
Diamantini MC. Diamantini MC. Entropy (Basel). 2023 Jun 28;25(7):984. doi: 10.3390/e25070984. Entropy (Basel). 2023. PMID: 37509932 Free PMC article. Review.
This ordering process can be seen as information erasure by resetting a certain number of bits to a standard value. The thermodynamic entropy in the partially ordered phase is given by the information-theoretic expression for the generalized Landauer bound in terms of erro …
This ordering process can be seen as information erasure by resetting a certain number of bits to a standard value. The thermodynamic …
Locality-preserving minimal perfect hashing of k-mers.
Pibiri GE, Shibuya Y, Limasset A. Pibiri GE, et al. Bioinformatics. 2023 Jun 30;39(Suppl 1):i534-i543. doi: 10.1093/bioinformatics/btad219. Bioinformatics. 2023. PMID: 37387137 Free PMC article.
MOTIVATION: Minimal perfect hashing is the problem of mapping a static set of n distinct keys into the address space {1,,n} bijectively. It is well-known that n log 2(e) bits are necessary to specify a minimal perfect hash function (MPHF) f, when no additional knowl …
MOTIVATION: Minimal perfect hashing is the problem of mapping a static set of n distinct keys into the address space {1,,n} bijectively. It …
Robust fingerprinting of genomic databases.
Ji T, Ayday E, Yilmaz E, Li P. Ji T, et al. Bioinformatics. 2022 Jun 24;38(Suppl 1):i143-i152. doi: 10.1093/bioinformatics/btac243. Bioinformatics. 2022. PMID: 35758787 Free PMC article.
Moreover, since malicious genomic database recipients may compromise the embedded fingerprint (distort the steganographic marks, i.e. the embedded fingerprint bit-string) by launching effective correlation attacks, which leverage the intrinsic correlations among genomic da …
Moreover, since malicious genomic database recipients may compromise the embedded fingerprint (distort the steganographic marks, i.e. …
Better together: Contrasting the hypotheses explaining the one-target advantage.
Bested SR, de Grosbois J, Tremblay L. Bested SR, et al. Hum Mov Sci. 2018 Apr;58:347-356. doi: 10.1016/j.humov.2017.11.001. Epub 2017 Nov 22. Hum Mov Sci. 2018. PMID: 29174399 Review.
Ultimately, preferential support for each theoretical explanation was found to be related to the higher indices of difficulty (IDs: Fitts, 1954) employed. That is, studies that included higher IDs (i.e., 6-8 bits) were more likely to provide more support for the mov …
Ultimately, preferential support for each theoretical explanation was found to be related to the higher indices of difficulty (IDs: Fitts, 1 …
Noncontextual Wirings.
Amaral B, Cabello A, Cunha MT, Aolita L. Amaral B, et al. Phys Rev Lett. 2018 Mar 30;120(13):130403. doi: 10.1103/PhysRevLett.120.130403. Phys Rev Lett. 2018. PMID: 29694169
As applications, we show that the relative entropy of contextuality is a contextuality monotone and that maximally contextual boxes that serve as contextuality bits exist for a broad class of scenarios. Our results complete a unified resource-theoretic framework for contex …
As applications, we show that the relative entropy of contextuality is a contextuality monotone and that maximally contextual boxes that ser …
Information theory and headache triggers.
Turner DP, Caplis E, Bertsch J, Houle TT. Turner DP, et al. Headache. 2023 Jul-Aug;63(7):899-907. doi: 10.1111/head.14583. Epub 2023 Jul 3. Headache. 2023. PMID: 37395303
For example, the trigger "joy" exhibited 0.03 bits when assessed using binary coding but 1.81 bits when coded using an ordinal scale. More information was observed with the use of count data (0.86 to 1.75 bits), Likert rating scales (1.50 to 2.76 bits) …
For example, the trigger "joy" exhibited 0.03 bits when assessed using binary coding but 1.81 bits when coded using an ordinal …
Probabilistic Interpolation of Quantum Rotation Angles.
Koczor B, Morton JJL, Benjamin SC. Koczor B, et al. Phys Rev Lett. 2024 Mar 29;132(13):130602. doi: 10.1103/PhysRevLett.132.130602. Phys Rev Lett. 2024. PMID: 38613262
Quantum computing requires a universal set of gate operations; regarding gates as rotations, any rotation angle must be possible. However a real device may only be capable of B bits of resolution, i.e., it might support only 2^{B} possible variants of a given physic …
Quantum computing requires a universal set of gate operations; regarding gates as rotations, any rotation angle must be possible. However a …
754 results