Results 21 to 30 of about 3,457,821 (295)

Network On Network for Tabular Data Classification in Real-world Applications

open access: yes, 2020
Tabular data is the most common data format adopted by our customers ranging from retail, finance to E-commerce, and tabular data classification plays an essential role to their businesses.
Chen, Yuqiang   +5 more
core   +1 more source

Towards a model of how designers mentally categorise design information [PDF]

open access: yes, 2010
This study aims to explore how designers mentally categorise design information during the early sketching performed in the generative phase. An action research approach is particularly appropriate for identifying the various sorts of design information ...
AOUSSAT, Améziane   +3 more
core   +3 more sources

Locality and information transfer in quantum operations

open access: yes, 2004
We investigate the situation in which no information can be transferred from a quantum system B to a quantum system A, even though both interact with a common system ...
Schumacher, Benjamin   +1 more
core   +1 more source

Classical information deficit and monotonicity on local operations

open access: yes, 2004
We investigate classical information deficit: a candidate for measure of classical correlations emerging from thermodynamical approach initiated in [Phys. Rev. Lett 89, 180402].
Alicki R Horodecki M Horodecki P Horodecki R   +11 more
core   +1 more source

Measurement-free topological protection using dissipative feedback [PDF]

open access: yes, 2014
Protecting quantum information from decoherence due to environmental noise is vital for fault-tolerant quantum computation. To this end, standard quantum error correction employs parallel projective measurements of individual particles, which makes the ...
Fujii, Keisuke   +3 more
core   +2 more sources

Propaganda Chimera: Unpacking the Iranian Perception Information Operations in the Arab World

open access: yesOpen Information Science, 2021
In the past four years, Iranian Information Operations (IOs) have received a lot of scrutiny by social media companies and policymakers. From 2018 to 2021, several accounts on Twitter, Facebook, and Instagram were taken down by tech companies for ...
Elswah Mona, Alimardani Mahsa
doaj   +1 more source

General impossible operations in quantum information

open access: yes, 2002
We prove a general limitation in quantum information that unifies the impossibility principles such as no-cloning and no-anticloning. Further, we show that for an unknown qubit one cannot design a universal Hadamard gate for creating equal superposition ...
A.K. Pati   +24 more
core   +1 more source

ИНФОРМАЦИСКА БЕЗБЕДНОСТ ВО САД [PDF]

open access: yesBezbednosni Dijalozi, 2010
In the modern world, the IT security has grown into a part of the general concept of national security. The article argues that the parameters of the theory of information warfare arise from the fundamental postulates of the general theory of security ...
Ванчо КЕНКОВ
doaj  

THE APPEARANCE OF CYBERSPACE IN THE RUSSIAN MILITARY OPERATION IN THE LIGHT OF THE RUSSIAN-GEORGIAN WAR IN 2008 [PDF]

open access: yesDefence Science Review, 2018
The goal of the monograph is to introduce the characteristics and development of Russian concepts in regard to the informational warfare through the incidences of the Russian-Georgian war in 2008. According to most authors, this war can be considered the
Zoltán Sipos, Csanád Fekete
doaj   +1 more source

Optimal Fleet Policy of Rental Vehicles with Relocation: A Simulation Study

open access: yesJournal of Advanced Transportation
Popularity of one-way car rentals poses a challenge to rental car fleet management and brings to focus the importance of a strategic decision for rental car operators: whether to implement a single-fleet or a multifleet model.
John-Carlo Favier   +2 more
doaj   +1 more source

Home - About - Disclaimer - Privacy