Results 11 to 20 of about 40,626 (268)

Restricted Priestley Dualities and Discriminator Varieties [PDF]

open access: yesStudia Logica, 2017
Anyone who has ever worked with a variety~$\boldsymbol{\mathscr{A}}$ of algebras with a reduct in the variety of bounded distributive lattices will know a restricted Priestley duality when they meet one---but until now there has been no abstract definition. Here we provide one.
B. A. Davey, A. Gair
openaire   +5 more sources

The Subquasivariety Lattice of a Discriminator Variety

open access: yesAdvances in Mathematics, 2001
The quaterny discriminator on a set \(M\) is the mapping \(d:M^4\to M\) defined by \(d(x,y,z,w):=z\) if \(x=y\) and \(d(x,y,z,w):=w\) otherwise. A variety is called a discriminator variety if it is generated by a class \({\mathbf K}\) of algebras of the same type such that there exists a term representing the quaternary discriminator on every algebra ...
Blanco, Javier   +2 more
openaire   +3 more sources

Facial Image Privacy Protection Based on Principal Components of Adversarial Segmented Image Blocks

open access: yesIEEE Access, 2020
The features in facial images, which are utilized for a variety of technological applications, pose a significant privacy concern for users. This paper proposes a method for protecting privacy in facial images based on the principal components of ...
Jingjing Yang, Jiaxing Liu, Jinzhao Wu
doaj   +1 more source

A Logic for Dually Hemimorphic Semi-Heyting Algebras and its Axiomatic Extensions

open access: yesBulletin of the Section of Logic, 2022
The variety \(\mathbb{DHMSH}\) of dually hemimorphic semi-Heyting algebras was introduced in 2011 by the second author as an expansion of semi-Heyting algebras by a dual hemimorphism.
Juan Manuel Cornejo   +1 more
doaj   +1 more source

Optimal Data Transmission and Improve Efficiency through Machine Learning in Wireless Sensor Networks

open access: yesJOIV: International Journal on Informatics Visualization, 2022
Each sensor node in WSN is typically equipped with a limited capacity small battery. Energy-efficient communication is therefore considered a key component of network life extension.
Hyunjoo Park, Junheon Jeon
doaj   +1 more source

Topological magnetic structure generation using VAE-GAN hybrid model and discriminator-driven latent sampling

open access: yesScientific Reports, 2023
Recently, deep generative models using machine intelligence are widely utilized to investigate scientific systems by generating scientific data. In this study, we experiment with a hybrid model of a variational autoencoder (VAE) and a generative ...
S. M. Park   +5 more
doaj   +1 more source

Defect-aware Super-resolution Thermography by Adversarial Learning

open access: yesResearch and Review Journal of Nondestructive Testing, 2023
Infrared thermography is a valuable non-destructive tool for inspection of materials. It measures the surface temperature evolution, from which hidden defects may be detected. Yet, thermal cameras typically have a low native spatial resolution resulting
Cheng Liangliang, Kersemans Mathias
doaj   +1 more source

A Note on Regular De Morgan Semi-Heyting Algebras

open access: yesDemonstratio Mathematica, 2016
The purpose of this note is two-fold. Firstly, we prove that the variety RDMSH1 of regular De Morgan semi-Heyting algebras of level 1 satisfies Stone identity and present (equational) axiomatizations for several subvarieties of RDMSH1.
Sankappanavar Hanamantagouda P.
doaj   +1 more source

Restoration of non-structural damaged murals in Shenzhen Bao’an based on a generator–discriminator network

open access: yesHeritage Science, 2021
Shenzhen is a modern metropolis, but it hides a variety of valuable cultural heritage, such as ancient murals. How to effectively preserve and repair the murals is a worthy of discussion question. Here, we propose a generation-discriminator network model
Jiao Li   +4 more
doaj   +1 more source

Improving Face Recognition by Integrating Decision Forest into GAN

open access: yesApplied Artificial Intelligence, 2023
Posture variation and self-occlusion are well-known factors that can compromise the accuracy and robustness of face recognition systems. There are a variety of ways to combat the challenges listed above, include using Generative Adversarial Networks ...
Yea-Shuan Huang, Mahmood HB Alhlffee
doaj   +1 more source

Home - About - Disclaimer - Privacy