Results 21 to 30 of about 3,457,821 (295)
Network On Network for Tabular Data Classification in Real-world Applications
Tabular data is the most common data format adopted by our customers ranging from retail, finance to E-commerce, and tabular data classification plays an essential role to their businesses.
Chen, Yuqiang +5 more
core +1 more source
Towards a model of how designers mentally categorise design information [PDF]
This study aims to explore how designers mentally categorise design information during the early sketching performed in the generative phase. An action research approach is particularly appropriate for identifying the various sorts of design information ...
AOUSSAT, Améziane +3 more
core +3 more sources
Locality and information transfer in quantum operations
We investigate the situation in which no information can be transferred from a quantum system B to a quantum system A, even though both interact with a common system ...
Schumacher, Benjamin +1 more
core +1 more source
Classical information deficit and monotonicity on local operations
We investigate classical information deficit: a candidate for measure of classical correlations emerging from thermodynamical approach initiated in [Phys. Rev. Lett 89, 180402].
Alicki R Horodecki M Horodecki P Horodecki R +11 more
core +1 more source
Measurement-free topological protection using dissipative feedback [PDF]
Protecting quantum information from decoherence due to environmental noise is vital for fault-tolerant quantum computation. To this end, standard quantum error correction employs parallel projective measurements of individual particles, which makes the ...
Fujii, Keisuke +3 more
core +2 more sources
Propaganda Chimera: Unpacking the Iranian Perception Information Operations in the Arab World
In the past four years, Iranian Information Operations (IOs) have received a lot of scrutiny by social media companies and policymakers. From 2018 to 2021, several accounts on Twitter, Facebook, and Instagram were taken down by tech companies for ...
Elswah Mona, Alimardani Mahsa
doaj +1 more source
General impossible operations in quantum information
We prove a general limitation in quantum information that unifies the impossibility principles such as no-cloning and no-anticloning. Further, we show that for an unknown qubit one cannot design a universal Hadamard gate for creating equal superposition ...
A.K. Pati +24 more
core +1 more source
ИНФОРМАЦИСКА БЕЗБЕДНОСТ ВО САД [PDF]
In the modern world, the IT security has grown into a part of the general concept of national security. The article argues that the parameters of the theory of information warfare arise from the fundamental postulates of the general theory of security ...
Ванчо КЕНКОВ
doaj
THE APPEARANCE OF CYBERSPACE IN THE RUSSIAN MILITARY OPERATION IN THE LIGHT OF THE RUSSIAN-GEORGIAN WAR IN 2008 [PDF]
The goal of the monograph is to introduce the characteristics and development of Russian concepts in regard to the informational warfare through the incidences of the Russian-Georgian war in 2008. According to most authors, this war can be considered the
Zoltán Sipos, Csanád Fekete
doaj +1 more source
Optimal Fleet Policy of Rental Vehicles with Relocation: A Simulation Study
Popularity of one-way car rentals poses a challenge to rental car fleet management and brings to focus the importance of a strategic decision for rental car operators: whether to implement a single-fleet or a multifleet model.
John-Carlo Favier +2 more
doaj +1 more source

