Results 61 to 70 of about 176,906 (321)

Cognitive Computation sans Representation [PDF]

open access: yes, 2017
The Computational Theory of Mind (CTM) holds that cognitive processes are essentially computational, and hence computation provides the scientific key to explaining mentality. The Representational Theory of Mind (RTM) holds that representational content
A Clark   +30 more
core   +2 more sources

LssDet: A Lightweight Deep Learning Detector for SAR Ship Detection in High-Resolution SAR Images

open access: yesRemote Sensing, 2022
Synthetic aperture radar (SAR) ship detection has been the focus of many previous studies. Traditional SAR ship detectors face challenges in complex environments due to the limitations of manual feature extraction.
Guoxu Yan   +4 more
doaj   +1 more source

Linguistic and computational semantics [PDF]

open access: yesProceedings of the 20th annual meeting on Association for Computational Linguistics -, 1982
We argue that because the very concept of computation rests on notions of interpretation, the semantics of natural languages and the semantics of computational formalisms are in the deepest sense the same subject. The attempt to use computational formalisms in aid of an explanation of natural language semantics, therefore, is an enterprise that must be
openaire   +2 more sources

BInD: Bond and Interaction‐Generating Diffusion Model for Multi‐Objective Structure‐Based Drug Design

open access: yesAdvanced Science, EarlyView.
Can a generative model design molecules that truly understand their targets? BInD, a diffusion‐based framework, co‐generates 3D molecules and their interactions with proteins by learning target‐specific interacting patterns. With knowledge‐based guidance and NCI‐driven optimization, BInD balances affinity, geometry, and drug‐likeness – pushing the ...
Joongwon Lee   +3 more
wiley   +1 more source

Virtual Evidence: A Constructive Semantics for Classical Logics [PDF]

open access: yes, 2014
This article presents a computational semantics for classical logic using constructive type theory. Such semantics seems impossible because classical logic allows the Law of Excluded Middle (LEM), not accepted in constructive logic since it does not have
Constable, Robert L.
core  

A Neotropical Miocene Pollen Database Employing Image-Based Search and Semantic Modeling

open access: yesApplications in Plant Sciences, 2014
Premise of the study: Digital microscopic pollen images are being generated with increasing speed and volume, producing opportunities to develop new computational methods that increase the consistency and efficiency of pollen analysis and provide the ...
Jing Ginger Han   +5 more
doaj   +1 more source

A Multi‐Property Optimizing Generative Adversarial Network for de novo Antimicrobial Peptide Design

open access: yesAdvanced Science, EarlyView.
A Multi‐Property Optimizing Generative Adversarial Network (MPOGAN) is proposed to iteratively learn the relationship between peptides and multiple properties using a dynamically dataset. As the quality of the dataset improves, MPOGAN's ability to design antimicrobial peptides (AMPs) with multiple desired properties is enhanced.
Jiaming Liu   +16 more
wiley   +1 more source

Privacy-Preserved Approximate Classification Based on Homomorphic Encryption

open access: yesMathematical and Computational Applications, 2019
Privacy is a crucial issue for outsourcing computation, which means that clients utilize cloud infrastructure to perform online prediction without disclosing sensitive information.
Xiaodong Xiao   +3 more
doaj   +1 more source

Fast Split Bregman Based Deconvolution Algorithm for Airborne Radar Imaging

open access: yesRemote Sensing, 2020
Deconvolution methods can be used to improve the azimuth resolution in airborne radar imaging. Due to the sparsity of targets in airborne radar imaging, an L 1 regularization problem usually needs to be solved.
Yin Zhang   +5 more
doaj   +1 more source

Integration of Multi-Head Self-Attention and Convolution for Person Re-Identification

open access: yesSensors, 2022
Person re-identification is essential to intelligent video analytics, whose results affect downstream tasks such as behavior and event analysis. However, most existing models only consider the accuracy, rather than the computational complexity, which is ...
Yalei Zhou   +4 more
doaj   +1 more source

Home - About - Disclaimer - Privacy