Results 91 to 100 of about 28,128 (285)
Hashing to detect identical ordering of species in a shared sublattice
Finding very low energy configurations of species on a shared sublattice is unavoidable in some problems governed by ground states of the sublattice, such as voltage curve estimation of battery cathode materials. Calculations of partial occupancy systems,
Yoyo Hinuma
doaj +1 more source
Abstract Data is the key element that runs the modern society. Large amounts of data are being released day by day as a result of many activities. The digital data is transferred through the Internet which may be vulnerable to attacks while transmitting. Especially, the medical data is observed to be of at most importance.
Rupa Ch +4 more
wiley +1 more source
Heisenberg Group-Based Digital Signatures for Secure Communications
This paper proposes a new digital signature algorithm that employs the Heisenberg group over a prime field and exploits its structure to provide strong cryptographic properties. The developed scheme involves the Heisenberg group within a commutator-based
Najla Althuniyan +4 more
doaj +1 more source
Similarity preserving hashing for appliance identification based on V-I trajectory [PDF]
Xingqi Liu +4 more
openalex +1 more source
A Bridge Transformer Network With Deep Graph Convolution for Hyperspectral Image Classification
ABSTRACT Transformers have been widely applied to hyperspectral image classification, leveraging their self‐attention mechanism for powerful global modelling. However, two key challenges remain as follows: excessive memory and computational costs from calculating correlations between all tokens (especially as image size or spectral bands increase) and ...
Yuquan Gan +5 more
wiley +1 more source
TNCOA: Efficient Exploration via Observation‐Action Constraint on Trajectory‐Based Intrinsic Reward
ABSTRACT Efficient exploration is critical in handling sparse rewards and partial observability in deep reinforcement learning. However, most existing intrinsic reward methods based on novelty rely on single‐step observations or Euclidean distances.
Jingxiang Ma, Hongbin Ma, Youzhi Zhang
wiley +1 more source
Hashing for secure optical information compression in a heterogeneous convolutional neural network [PDF]
Maria Solyanik‐Gorgone +4 more
openalex +1 more source
How should we evaluate supervised hashing? [PDF]
Alexandre Sablayrolles +3 more
openalex +1 more source
Abstract This study explores the practical impact of blockchain technology (BCT), which contrasts strongly with literature that has predominantly hypothesised BCT's potential to disrupt accounting practice. We interviewed 44 practitioners and academics with knowledge of BCT across 13 countries and industries.
Musbaudeen Titilope Oladejo +3 more
wiley +1 more source

