Results 31 to 40 of about 136,387 (282)

Non-intrusive nonlinear model reduction via machine learning approximations to low-dimensional operators

open access: yesAdvanced Modeling and Simulation in Engineering Sciences, 2021
Although projection-based reduced-order models (ROMs) for parameterized nonlinear dynamical systems have demonstrated exciting results across a range of applications, their broad adoption has been limited by their intrusivity: implementing such a reduced-
Zhe Bai, Liqian Peng
doaj   +1 more source

Differentiable Programming for the Autonomous Movement Planning of a Small Vessel [PDF]

open access: yesTransNav, 2021
In this work we explore the use of differentiable programming to allow autonomous movement planning of a small vessel. We aim for an end to end architecture where the machine learning algorithm directly controls engine power and rudder movements of a ...
Christian Bahls, Agnes Schubert
doaj   +1 more source

Parameterized deformation sparse coding via tree-structured parameter search [PDF]

open access: yes2010 Conference Record of the Forty Fourth Asilomar Conference on Signals, Systems and Computers, 2010
Representing transformation invariances in data is known to be valuable in many domains. We consider a method by which prior knowledge about the structure of such invariances can be exploited using a novel algorithm for sparse coding across a learned dictionary of atoms combined with a parameterized deformation function that captures invariant ...
Brandon Burdge   +2 more
openaire   +1 more source

Vanishing Ideals Over Odd Cycles

open access: yesAnalele Stiintifice ale Universitatii Ovidius Constanta: Seria Matematica, 2019
Let K be a finite field. Let X* be a subset of the a ne space Kn, which is parameterized by odd cycles. In this paper we give an explicit Gröbner basis for the vanishing ideal, I(X*), of X*.
Uribe-Paczka M. Eduardo   +2 more
doaj   +1 more source

Rate Adaption for Secure HARQ-CC System with Multiple Eavesdroppers

open access: yesEntropy, 2020
In this paper, we studied the secure transmission of a hybrid automatic repeat request with chase combining (HARQ-CC) system, under the existence of multiple eavesdroppers and limited latency.
Yue Wu   +4 more
doaj   +1 more source

Safer typing of complex API usage through Java generics [PDF]

open access: yes, 2009
When several incompatible implementations of a single API are in use in a Java program, the danger exists that instances from different implementations may inadvertently be mixed, leading to errors.
Harrison, W., Lievens, D., Simeoni, F.
core   +1 more source

Incremental Detection of Parameterized Code Clones [PDF]

open access: yesSoftwaretechnik-Trends, 2013
This paper presents a new approach to incremental code clone detection that is based on a special clone representation model. The algorithm detects parameterized clones with parameters of arbitrary size. It can be used for cross-system and cross-revision clone detection.
openaire   +1 more source

Parameterized Colorings And Labellings Of Graphs In Topological Coding

open access: yes, 2022
The coming quantum computation is forcing us to reexamine the cryptosystems people use. We are applying graph colorings of topological coding to modern information security and future cryptography against supercomputer and quantum computer attacks in the near future.
Yao, Bing   +5 more
openaire   +2 more sources

MOTIF: MULTI-ORIENTATION TENSOR INDEX FEATURE DESCRIPTOR FOR SAR-OPTICAL IMAGE REGISTRATION [PDF]

open access: yesThe International Archives of the Photogrammetry, Remote Sensing and Spatial Information Sciences, 2022
The inherent speckle noise in synthetic aperture radar (SAR) images and the significant differences between SAR and optical images in nonlinear radiation give rise to the great difficulty in computing similarity between image features, improving ...
Y. Yao   +4 more
doaj   +1 more source

Tight Kernel Bounds for Problems on Graphs with Small Degeneracy [PDF]

open access: yes, 2013
In this paper we consider kernelization for problems on d-degenerate graphs, i.e. graphs such that any subgraph contains a vertex of degree at most $d$.
D. Harnik   +15 more
core   +2 more sources

Home - About - Disclaimer - Privacy