Results 41 to 50 of about 822,562 (319)
The article describes methods for applying two-factor authentication (2FA). An example of two-factor authentication using mobile devices as identifiers and the generation of a temporary password based on the hash function of encryption standards is ...
О. А. Ussatova+2 more
doaj +1 more source
This paper investigates the combined effects of radiant heat, local Nusselt number and Skin friction coefficient on a channel flow of third grade fluid in the presence of saturated porous medium.
B. A. Peter+3 more
doaj +1 more source
Notions of Anonymous Existence in Martin-L\"of Type Theory [PDF]
As the groupoid model of Hofmann and Streicher proves, identity proofs in intensional Martin-L\"of type theory cannot generally be shown to be unique. Inspired by a theorem by Hedberg, we give some simple characterizations of types that do have unique ...
Altenkirch, Thorsten+3 more
core +2 more sources
Enhancing Wind Energy Potential Assessment with Three-Parameter Weibull Distribution: A Comparative Analysis using MATLAB [PDF]
To determine the wind energy potential, the probability density function is typically used. For data distribution with modest wind speeds, this paper developed a three-parameter Weibull model.
K Kannakumar+6 more
doaj +1 more source
Measure Transformer Semantics for Bayesian Machine Learning [PDF]
The Bayesian approach to machine learning amounts to computing posterior distributions of random variables from a probabilistic model of how the variables are related (that is, a prior distribution) and a set of observations of variables.
Johannes Borgström+4 more
doaj +1 more source
Consider a Bayesian inference problem where a variable of interest does not take values in a Euclidean space. These "non-standard" data structures are in reality fairly common. They are frequently used in problems involving latent discrete factor models,
Alexandre Bouchard-Côté+7 more
doaj +1 more source
Schumacher's quantum data compression as a quantum computation
An explicit algorithm for performing Schumacher's noiseless compression of quantum bits is given. This algorithm is based on a combinatorial expression for a particular bijection among binary strings.
A. Barenco+18 more
core +2 more sources
DEVELOPMENT OF R PACKAGE AND EXPERIMENTAL ANALYSIS ON PREDICTION OF THE CO2 COMPRESSIBILITY FACTOR USING GRADIENT DESCENT [PDF]
Nowadays, many variants of gradient descent (i.e., the methods included in machine learning for regression) have been proposed. Moreover, these algorithms have been widely used to deal with real-world problems.
LALA SEPTEM RIZA+5 more
doaj
Introduction A risk factor for developing obsessive–compulsive disorder (OCD) in non-clinical samples is obsessive–compulsive tendencies (OCT). An OCT scale has recently been developed for university students (UOC) and showed promising psychometric ...
Mohammadreza Davoudi+4 more
doaj +1 more source
Statistical Assertions for Validating Patterns and Finding Bugs in Quantum Programs [PDF]
In support of the growing interest in quantum computing experimentation, programmers need new tools to write quantum algorithms as program code. Compared to debugging classical programs, debugging quantum programs is difficult because programmers have limited ability to probe the internal states of quantum programs; those states are difficult to ...
arxiv +1 more source