Category: 7. Maths
-
Diophantine imaging reveals the broken symmetry of sums of integer cubes
Origin and purpose We call “Diophantine Imaging” a method of arithmetic geometry by which solutions of diophantine equations are represented over the unit circle based on their prefixes in certain bases. The purpose of this method is to keep the representation contained for arbitrarily large numbers and maintain an intuitive metric based on converging series…
-
Surface and underwater human pose recognition based on temporal 3D point cloud deep learning
To maximally utilize the information within the dataset while minimizing the impact of noise, this study proposes the flowchart shown in Fig. 3, which includes point cloud acquisition, point cloud filtering, point cloud secondary sampling, point cloud input, and model training. Point cloud preprocessing comprises point cloud filtering, point cloud secondary sampling, and sample representation. Point…
-
The AI–quantum computing mash-up: will it revolutionize science?
Call it the Avengers of futuristic computing. Put together two of the buzziest terms in technology — machine learning and quantum computers — and you get quantum machine learning. Like the Avengers comic books and films, which bring together an all-star cast of superheroes to build a dream team, the result is likely to attract…
-
Reversible data hiding in encrypted images with multi-prediction and adaptive huffman encoding
Figure 4 illustrates the framework of the proposed method, from which we can identify three processes: pre-processing and image encryption by the content-owner, data embedding by the data-hider, and data extraction and image decryption by the receiver. Prior to image encryption, the content-owner first uses the MED+GAP predictor to compute a label map of non-reference…
-
Using artificial intelligence to transform astrobiology
Domagal-Goldman, S. D. et al. Astrobiology 16, 561–653 (2016). Article ADS Google Scholar Cavalzzi, B. & Westall, F. (eds) Biosignatures for Astrobiology (Springer International Publishing, 2019). Schwieterman, E. W. et al. Astrobiology 18, 663–708 (2018). Article ADS Google Scholar Sparkes, A. et al. Autom. Exp. 2, 1 (2010). Article Google Scholar Chen, B. et al.…
-
On the interpretability of part-prototype based classifiers: a human centric analysis
The interpretability of a prototype-based machine learning method as a whole is too broad to be effectively evaluated. As a result, our experiments were designed to measure the human opinion on the individual properties required for an interpretable method. This focus on single aspects allowed us to gain fine-grained insight into how much human users…
-
Insight into the dynamics of heat and mass transfer in nanofluid flow with linear/nonlinear mixed convection, thermal radiation, and activation energy effects over the rotating disk
Suppose the nanoparticle flows across an infinitely large rough disc, which is placed in the z-plane \({\bar{z}}=0\). The investigation has chosen to use the \(({\bar{r}},\varphi ,{\bar{z}})\) spherical coordinates. An unsteady, electrically carrying nanofluid fills the half-filled space \({\bar{z}}\) is greater than 0. Consequently, the disc rotates at a uniform angular velocity of \({\bar{\Omega }}\), leading…
-
Research on vehicle detection based on improved YOLOX_S
Model pruning The YOLOX network structure is highly complex, and the backbone and detection structures contain many convolution operations. Training the model once will produce many redundant weight parameters and channels, affecting the convergence speed. Effective model compression methods can be used to simplify the network structure and reduce the computational complexity of the model,…
-
The impact mechanism of ownership change on university innovation
Sterzi, V. Patent quality and ownership: An analysis of UK faculty patenting. Res. Policy 42(2), 564–576. https://doi.org/10.1016/j.respol.2012.07.010 (2013). Article Google Scholar Li, D. & Fu, X. The Efficiency of university technology transfer in China. Asian Econ. Papers 20(3), 114–137. https://doi.org/10.1162/asep_a_00838 (2021). Article Google Scholar Ma, D., Cai, Z. & Zhu, C. Technology transfer efficiency of…
-
Oblivious network intrusion detection systems
In this section, we present two application algorithms that utilize the hybrid gates: 1. Hybrid Direct Matching (HDM): Matching of plaintext stream against a homomorphically encrypted ciphertext rule. The algorithm describes how an oblivious NIDS at the Cloud Side can use the hybrid gates to search within the payload for an exact match against an…