Results 31 to 40 of about 817,451 (339)

Level Set Dynamics and the Non-blowup of the 2D Quasi-geostrophic Equation [PDF]

open access: yes, 2006
In this article we apply the technique proposed in Deng-Hou-Yu (Comm. PDE, 2005) to study the level set dynamics of the 2D quasi-geostrophic equation. Under certain assumptions on the local geometric regularity of the level sets of $\theta$, we obtain ...
Deng, Jian   +3 more
core   +4 more sources

Cyberattack Detection in Social Network Messages Based on Convolutional Neural Networks and NLP Techniques

open access: yesMachine Learning and Knowledge Extraction, 2023
Social networks have captured the attention of many people worldwide. However, these services have also attracted a considerable number of malicious users whose aim is to compromise the digital assets of other users by using messages as an attack vector ...
Jorge E. Coyac-Torres   +3 more
doaj   +1 more source

Fidelity susceptibility and general quench near an anisotropic quantum critical point

open access: yes, 2011
We study the scaling behavior of fidelity susceptibility density $(\chi_{\rm f})$ at or close to an anisotropic quantum critical point characterized by two different correlation length exponents $\nu_{||}$ and $\nu_{\bot}$ along parallel and ...
Amit Dutta   +5 more
core   +1 more source

Optimising Humanness: Designing the best human-like Bot for Unreal Tournament 2004 [PDF]

open access: yes, 2017
This paper presents multiple hybridizations of the two best bots on the BotPrize 2014 competition, which sought for the best humanlike bot playing the First Person Shooter game Unreal Tournament 2004.
Fernández-Leiva, Antonio José   +2 more
core   +1 more source

White-Hat Worm to Fight Malware and Its Evaluation by Agent-Oriented Petri Nets

open access: yesSensors, 2020
A new kind of malware called Mirai is spreading like wildfire. Mirai is characterized by targeting Internet of Things (IoT) devices. Since IoT devices are increasing explosively, it is not realistic to manage their vulnerability by human-wave tactics ...
Shingo Yamaguchi
doaj   +1 more source

T-Violation in $K^+ \to \mu^+ \nu \gamma$ Decay And Supersymmetry

open access: yes, 1996
Measurement of the transverse muon polarization $P^{\bot}_{\mu}$ in the $K^+ \rightarrow \mu^+\nu\gamma$ decay will be attempted for the first time at the ongoing KEK E246 experiment and also at a proposed BNL experiment. We provide a general analysis of
A. R. Zhitnitskii   +32 more
core   +1 more source

A Comprehensive Review on Bot - Discord Bot

open access: yesInternational Journal of Scientific Research in Computer Science, Engineering and Information Technology, 2021
The bot’s purpose is to make the Discord server a bit more fun by making it interactive and interesting. This bot brings together various people from all over the world and helps them remain connected to each other. Once people join the server they can use all the features of the bot and join voice channels to communicate or share ideas thoughts or ...
Anirudh Verma   +2 more
openaire   +1 more source

OPTIMIZATION OF FIXED ASSETS INVENTORY BY CREATING A TELEGRAM BOT

open access: yesInternational Journal of Advanced Studies, 2023
This article is about the optimization of fixed assets inventory by means of Telegram bot. The feature of the systems which are realized with the help of bots is the ease of use and minimization of resources spent on software storage, which greatly ...
Ruslan O. Nasibulin   +3 more
doaj   +1 more source

Fermi surface renormalization and confinement in two coupled metallic chains

open access: yes, 2007
Using a non-perturbative functional renormalization group approach involving both fermionic and bosonic fields we calculate the interaction-induced change of the Fermi surface of spinless fermions moving on two chains connected by weak interchain hopping
C. Bourbonnais   +12 more
core   +1 more source

Assessing the Believability of Computer Players in Video Games: A New Protocol and Computer Tool

open access: yesFrontiers in Computer Science, 2021
In this paper, we address the challenge of believability in multiplayer video games. Our contribution is a system for assessing the believability of computer players.
Cindy Even   +2 more
doaj   +1 more source

Home - About - Disclaimer - Privacy