Results 21 to 30 of about 7,199,601 (292)

Data Pre-processing [PDF]

open access: yes, 2016
In this chapter, the reader will gain knowledge and practical skills about preparing raw clinical data for secondary statistical analysis.
Malley, B, Ramazzotti, D, Wu, JT-Y
openaire   +2 more sources

Knowledge Reasoning Based on Neural Tensor Network

open access: yesITM Web of Conferences, 2017
Knowledge base (KBs) is a very important part of applications such as Q&A system, but the knowledge base is always faced with incompleteness and the lack of inter-entity relationships.
Huang Jian-Hui   +3 more
doaj   +1 more source

Local Channels under Decomposition of Quantum Gates in Bipartite Systems

open access: yesJournal of Mathematics, 2023
For a bipartite quantum system with Hilbert space Hm⊗Hn, this paper considers a quantum channel ϕ from the system to itself which preserves the set of separable states.
Yihui Lao, Pei Wang, Shanli Liao
doaj   +1 more source

RepDarkNet: A Multi-Branched Detector for Small-Target Detection in Remote Sensing Images

open access: yesISPRS International Journal of Geo-Information, 2022
Recent years have seen rapid progress in target-detection missions, whereas small targets, dense target distribution, and shadow occlusion continue to hinder progress in the detection of small targets, such as cars, in remote sensing images.
Liming Zhou   +6 more
doaj   +1 more source

Quantum data processing and error correction [PDF]

open access: yes, 1996
This paper investigates properties of noisy quantum information channels. We define a new quantity called {\em coherent information} which measures the amount of quantum information conveyed in the noisy channel.
A. Wehrl   +14 more
core   +3 more sources

CIE-LSCP: color image encryption scheme based on the lifting scheme and cross-component permutation

open access: yesComplex & Intelligent Systems, 2022
Encryption of meaningful images into unidentifiable noise-like images can improve the security of images during storage and transmission. In this paper, a novel color image encryption method based on the lifting scheme and cross-component permutation ...
Xiuhui Chen   +5 more
doaj   +1 more source

Wind Turbine Prognosis Models Based on SCADA Data and Extreme Learning Machines

open access: yesApplied Sciences, 2021
In this paper, a method to build models to monitor and evaluate the health status of wind turbines using Single-hidden Layer Feedforward Neural networks (SLFN) is presented. The models are trained using the Extreme Learning Machines (ELM) strategy.
Pere Marti-Puig   +3 more
doaj   +1 more source

Model-Guided Manufacturing of Transducer Arrays Based on Single-Fibre Piezocomposites

open access: yesApplied Sciences, 2020
For breast cancer imaging, ultrasound computer tomography (USCT) is an emerging technology. To improve the image quality of our full 3-D system, a new transducer array system (TAS) design was previously proposed.
Martin Angerer   +3 more
doaj   +1 more source

A Deep Reinforcement Learning Real-Time Recommendation Model Based on Long and Short-Term Preference

open access: yesInternational Journal of Computational Intelligence Systems, 2023
With the development of Internet technology, the problem of information overload has increasingly attracted attention. Nowadays, the recommendation system with excellent performance in information retrieval and filtering would be widely used in the ...
Yan-e Hou   +3 more
doaj   +1 more source

Nature in the Heart and Mind of the Beholder: Psycho-Emotional and EEG Differences in Perception of Virtual Nature Due to Gender

open access: yesVision, 2023
Natural environment experiences in virtual reality (VR) can be a feasible option for people unable to connect with real nature. Existing research mostly focuses on health and emotional advantages of the “virtual nature” therapy, but studies of its ...
Artem Davidov   +2 more
doaj   +1 more source

Home - About - Disclaimer - Privacy