Results 41 to 50 of about 822,562 (319)

Software implementation of 2 FA Software implementation of two-factor authentication to ensure security when accessing an information system

open access: yesВестник КазНУ. Серия математика, механика, информатика, 2019
The article describes methods for applying two-factor authentication (2FA). An example of two-factor authentication using mobile devices as identifiers and the generation of a temporary password based on the hash function of encryption standards is ...
О. А. Ussatova   +2 more
doaj   +1 more source

Combined Effect of Radiant Heat, Local Nusselt Number and Skin Friction Coefficient of a Third Grade Fluid through a Channel Flow in a Saturated Porous Medium

open access: yesJournal of Applied Sciences and Environmental Management, 2022
This paper investigates the combined effects of radiant heat, local Nusselt number and Skin friction coefficient on a channel flow of third grade fluid in the presence of saturated porous medium.
B. A. Peter   +3 more
doaj   +1 more source

Notions of Anonymous Existence in Martin-L\"of Type Theory [PDF]

open access: yes, 2016
As the groupoid model of Hofmann and Streicher proves, identity proofs in intensional Martin-L\"of type theory cannot generally be shown to be unique. Inspired by a theorem by Hedberg, we give some simple characterizations of types that do have unique ...
Altenkirch, Thorsten   +3 more
core   +2 more sources

Enhancing Wind Energy Potential Assessment with Three-Parameter Weibull Distribution: A Comparative Analysis using MATLAB [PDF]

open access: yesE3S Web of Conferences
To determine the wind energy potential, the probability density function is typically used. For data distribution with modest wind speeds, this paper developed a three-parameter Weibull model.
K Kannakumar   +6 more
doaj   +1 more source

Measure Transformer Semantics for Bayesian Machine Learning [PDF]

open access: yesLogical Methods in Computer Science, 2013
The Bayesian approach to machine learning amounts to computing posterior distributions of random variables from a probabilistic model of how the variables are related (that is, a prior distribution) and a set of observations of variables.
Johannes Borgström   +4 more
doaj   +1 more source

Blang: Bayesian Declarative Modeling of General Data Structures and Inference via Algorithms Based on Distribution Continua

open access: yesJournal of Statistical Software, 2022
Consider a Bayesian inference problem where a variable of interest does not take values in a Euclidean space. These "non-standard" data structures are in reality fairly common. They are frequently used in problems involving latent discrete factor models,
Alexandre Bouchard-Côté   +7 more
doaj   +1 more source

Schumacher's quantum data compression as a quantum computation

open access: yes, 1996
An explicit algorithm for performing Schumacher's noiseless compression of quantum bits is given. This algorithm is based on a combinatorial expression for a particular bijection among binary strings.
A. Barenco   +18 more
core   +2 more sources

DEVELOPMENT OF R PACKAGE AND EXPERIMENTAL ANALYSIS ON PREDICTION OF THE CO2 COMPRESSIBILITY FACTOR USING GRADIENT DESCENT [PDF]

open access: yesJournal of Engineering Science and Technology, 2018
Nowadays, many variants of gradient descent (i.e., the methods included in machine learning for regression) have been proposed. Moreover, these algorithms have been widely used to deal with real-world problems.
LALA SEPTEM RIZA   +5 more
doaj  

Exploring the structure of the university-students obsessive–compulsive tendency scale in Iranian university students: a network analysis study

open access: yesBMC Research Notes, 2023
Introduction A risk factor for developing obsessive–compulsive disorder (OCD) in non-clinical samples is obsessive–compulsive tendencies (OCT). An OCT scale has recently been developed for university students (UOC) and showed promising psychometric ...
Mohammadreza Davoudi   +4 more
doaj   +1 more source

Statistical Assertions for Validating Patterns and Finding Bugs in Quantum Programs [PDF]

open access: yes, 2019
In support of the growing interest in quantum computing experimentation, programmers need new tools to write quantum algorithms as program code. Compared to debugging classical programs, debugging quantum programs is difficult because programmers have limited ability to probe the internal states of quantum programs; those states are difficult to ...
arxiv   +1 more source

Home - About - Disclaimer - Privacy