Results 41 to 50 of about 5,402 (301)

EESSI: A cross‐platform ready‐to‐use optimised scientific software stack

open access: yesSoftware: Practice and Experience, Volume 53, Issue 1, Page 176-210, January 2023., 2023
Abstract Getting scientific software installed correctly and ensuring it performs well has been a ubiquitous problem for several decades now, which is compounded currently by the changing landscape of computational science with the (re‐)emergence of different microprocessor families, and the expansion to additional scientific domains like artificial ...
Bob Dröge   +5 more
wiley   +1 more source

kProbLog: An Algebraic Prolog for Kernel Programming [PDF]

open access: yes, 2016
kProbLog is a simple algebraic extension of Prolog with facts and rules annotated with semiring labels. We propose kProbLog as a language for learning with kernels. kProbLog allows to elegantly specify systems of algebraic expressions on databases. We propose some code examples of gradually increasing complexity, we give a declarative specification of ...
Luc De Raedt   +3 more
openaire   +3 more sources

The Corona Problem for Kernel Multiplier Algebras [PDF]

open access: yesIntegral Equations and Operator Theory, 2016
v1: 34 pages. v2: 34 pages, typos corrected. v3: 35 pages, typos corrected, presentation improved. v4 35 pages, typos corrected and referee comments included.
Eric T. Sawyer, Brett D. Wick
openaire   +4 more sources

An efficient deep learning model for brain tumour detection with privacy preservation

open access: yesCAAI Transactions on Intelligence Technology, EarlyView., 2023
Abstract Internet of medical things (IoMT) is becoming more prevalent in healthcare applications as a result of current AI advancements, helping to improve our quality of life and ensure a sustainable health system. IoMT systems with cutting‐edge scientific capabilities are capable of detecting, transmitting, learning and reasoning.
Mujeeb Ur Rehman   +8 more
wiley   +1 more source

Privacy‐preserving generative framework for images against membership inference attacks

open access: yesIET Communications, Volume 17, Issue 1, Page 45-62, January 2023., 2023
Abstract Machine learning has become an integral part of modern intelligent systems in all aspects of life. Membership inference attacks (MIAs), as the significant model attacks, also jeopardize the privacy of the intelligent systems. Previous works on defending MIAs concentrate on the model output perturbation or tampering with the training process ...
Ruikang Yang   +3 more
wiley   +1 more source

Parallel kernel solver of an FPGA‐based real‐time simulator for active distribution networks

open access: yesIET Renewable Power Generation, Volume 17, Issue 1, Page 162-175, 6 January 2023., 2023
Abstract Field‐programmable gate array (FPGA)‐based real‐time simulators are often applied in simulations of active distribution networks (ADNs) because of their parallel architectures and low cost. The overall performance of an FPGA‐based real‐time simulator is mainly determined by its kernel solver, which solves the nodal equation at each simulation ...
Peng Li   +5 more
wiley   +1 more source

Construction of Discrete Symmetries Using the Pauli Algebra Form of the Dirac Equation

open access: yesPhysical Sciences Forum, 2023
Two equations whose variables take values in the Pauli algebra of complex quaternions are shown to be equivalent to the standard Dirac equation and its Hermitian conjugate taken together.
Avraham Nofech
doaj   +1 more source

Magnetic neutron scattering from spherical nanoparticles with Néel surface anisotropy: analytical treatment

open access: yesJournal of Applied Crystallography, Volume 55, Issue 6, Page 1475-1487, December 2022., 2022
The magnetization profile and the ensuing magnetic neutron scattering signal from an inhomogeneously magnetized spherical nanoparticle with Néel surface anisotropy are derived analytically.The magnetization profile and the related magnetic small‐angle neutron scattering cross section of a single spherical nanoparticle with Néel surface anisotropy are ...
Michael P. Adams   +2 more
wiley   +1 more source

RKHS Representations for Augmented Quaternion Random Signals: Application to Detection Problems

open access: yesMathematics, 2022
The reproducing kernel Hilbert space (RKHS) methodology has shown to be a suitable tool for the resolution of a wide range of problems in statistical signal processing both in the real and complex domains.
Antonia Oya
doaj   +1 more source

TomocuPy – efficient GPU‐based tomographic reconstruction with asynchronous data processing

open access: yesJournal of Synchrotron Radiation, Volume 30, Issue 1, Page 179-191, January 2023., 2023
TomocuPy, a Python software package for fast 3D reconstruction on graphics processing units (GPUs) and modern storage drives supporting parallel read/write operations, is presented. The package demonstrates significant performance gain compared with analogs and can be efficiently used when processing data during experiments requiring steering of ...
Viktor Nikitin
wiley   +1 more source

Home - About - Disclaimer - Privacy