Results 21 to 30 of about 3,979 (237)
Nitrogen is commonly implanted in silicon to suppress the diffusion of self-interstitials and the formation of voids through the creation of nitrogen–vacancy complexes and nitrogen–nitrogen pairs.
Chloé Simha +5 more
doaj +1 more source
Human-Machine Duality: What’s Next in Cognitive Aspects of Artificial Intelligence?
The goal of the paper is to find means for the unification of human-machine duality in collective behavior of people and machines, by conciliating approaches that proceed in opposite directions. The first approach proceeds top-down from non-formalizable,
Alexander N. Raikov, Massimiliano Pirani
doaj +1 more source
Measure Transformer Semantics for Bayesian Machine Learning [PDF]
The Bayesian approach to machine learning amounts to computing posterior distributions of random variables from a probabilistic model of how the variables are related (that is, a prior distribution) and a set of observations of variables.
Johannes Borgström +4 more
doaj +1 more source
Non-equilibrium work switching simulations and Jarzynski’s equation are a reliable method for computing free energy differences, ΔAlow→high, between two levels of theory, such as a pure molecular mechanical (MM) and a quantum mechanical/molecular ...
Andreas Schöller +2 more
doaj +1 more source
Solutions of the Yang–Baxter Equation and Automaticity Related to Kronecker Modules
The Kronecker algebra K is the path algebra induced by the quiver with two parallel arrows, one source and one sink (i.e., a quiver with two vertices and two arrows going in the same direction). Modules over K are said to be Kronecker modules.
Agustín Moreno Cañadas +2 more
doaj +1 more source
A Structural and Nominal Syntax for Diagrams [PDF]
The correspondence between monoidal categories and graphical languages of diagrams has been studied extensively, leading to applications in quantum computing and communication, systems theory, circuit design and more.
Dan R Ghica, Aliaume Lopez
doaj +1 more source
A New Robust and Secure 3-Level Digital Image Watermarking Method Based on G-BAT Hybrid Optimization
This contribution applies tools from the information theory and soft computing (SC) paradigms to the embedding and extraction of watermarks in aerial remote sensing (RS) images to protect copyright.
Kilari Jyothsna Devi +6 more
doaj +1 more source
Adaptive Privacy-Preserving Coded Computing with Hierarchical Task Partitioning
Coded computing is recognized as a promising solution to address the privacy leakage problem and the straggling effect in distributed computing. This technique leverages coding theory to recover computation tasks using results from a subset of workers ...
Qicheng Zeng, Zhaojun Nan, Sheng Zhou
doaj +1 more source
This paper presents a distributed smoothing neurodynamic approach for solving the L1-Lp minimization problem, with application to robust and collaborative multi-view three-dimensional (3D) space localization.
Youran Qu +4 more
doaj +1 more source
P Systems with Evolutional Communication and Division Rules
A widely studied field in the framework of membrane computing is computational complexity theory. While some types of P systems are only capable of efficiently solving problems from the class P, adding one or more syntactic or semantic ingredients to ...
David Orellana-Martín +2 more
doaj +1 more source

