-
1
A quantum random access memory (QRAM) using a polynomial encoding of binary strings
Published 2025-03-01“…Integral to our design is a polynomial encoding of bit strings and so we refer to this design as $$\text {QRAM}_{poly}$$ . …”
Get full text
Article -
2
Spin coupling is all you need: Encoding strong electron correlation in molecules on quantum computers
Published 2025-02-01“…Here, we show that quantum computers can efficiently simulate strongly correlated molecular systems by directly encoding the dominant entanglement structure in the form of spin-coupled initial states. …”
Get full text
Article -
3
Boundary terms in string field theory
Published 2025-02-01“…Abstract We supplement the string field theory action with boundary terms to make its variational principle well-posed. …”
Get full text
Article -
4
Structural Synthesis and Isomorphism Identification of Multi-DOF AT Planetary Gear Trains
Published 2023-02-01Subjects: Get full text
Article -
5
Encoding surprise by retinal ganglion cells.
Published 2024-04-01“…A central prediction of this theory is that neurons should preferentially encode stimuli that are most surprising. Previous studies suggest this may be the case in early visual areas, where many neurons respond strongly to rare or surprising stimuli. …”
Get full text
Article -
6
-
7
Image cluster algorithm of hybrid encoding method
Published 2017-02-01“…In the clustering analysis based on swarm intelligence optimization algorithm,the most of encoding method only used single form,and this method might be limit range of search space,the algorithm was easy to fall into local op-timum.In order to solve this problem,image clustering algorithm of hybrid encoding (HEICA) was proposed.Firstly,a hybrid encoding model based on image clustering was established,this method could expand the scope of the search space.Meanwhile,it was combined with two optimization algorithms which improved rain forest algorithm (IRFA) and quantum particle swarm optimization (QPSO),this method could improve the global search capability.In the simulation experiment,it was carried out to illustrate the performance of the proposed method based on four datasets.Compared with results form four measured cluster algorithm.The experimental results show that the algorithm has strong global search capability,high stability and clustering effect.…”
Get full text
Article -
8
Efficient Text Encoders for Labor Market Analysis
Published 2025-01-01“…While state-of-the-art methods for skill extraction achieve strong performance, they depend on large language models (LLMs), which are computationally expensive and slow. …”
Get full text
Article -
9
Autoencoder-driven clustering of intersecting D-brane models via tadpole charge
Published 2024-08-01Get full text
Article -
10
Packet information encoding in a cerebellum-like circuit.
Published 2024-01-01“…Packet information encoding of neural signals was proposed for vision about 50 years ago and has recently been revived as a plausible strategy generalizable to natural and artificial sensory systems. …”
Get full text
Article -
11
A DNA Encoding Image Encryption Algorithm Based on Chaos
Published 2025-04-01“…The experimental results and security analysis show that this algorithm has a large enough key space, strong key sensitivity, high image encryption quality, strong robustness and high encryption efficiency. …”
Get full text
Article -
12
Accelerating the inference of string generation-based chemical reaction models for industrial applications
Published 2025-03-01Get full text
Article -
13
Confining strings in three-dimensional gauge theories beyond the Nambu-Gotō approximation
Published 2024-08-01“…While their low-energy properties are known to be universal and are described well by the Nambu-Gotō action, a non-trivial dependence on the gauge group is encoded in a series of undetermined subleading corrections in an expansion around the limit of an arbitrarily long string. …”
Get full text
Article -
14
Classical black hole probes of UV scales
Published 2025-06-01“…In this paper, we take the perspective of the two-derivative action of string theoretic effective field theories and explore various families of extremal black hole solutions that probe infinite distance limits at their horizons. …”
Get full text
Article -
15
An Image Encryption Method Based on the Feistel Network and Dynamic DNA Encoding
Published 2018-01-01“…Based on the Feistel network and dynamic deoxyribonucleic acid (DNA) encoding technology, an image encryption method is proposed using the “permutation–diffusion–scrambling” structure. …”
Get full text
Article -
16
D-instanton induced effective action and its gauge invariance
Published 2025-06-01“…Abstract The effect of D-instantons on closed string scattering amplitudes may be encoded into an effective action obtained by integrating out the (transient) open string fields. …”
Get full text
Article -
17
Genetically encoded far-red fluorescent sensors for caspase-3 activity
Published 2016-02-01“…In the present work, we developed new genetically encoded sensors for caspase-3 activity possessing the most red-shifted spectra to date. …”
Get full text
Article -
18
A multi layered encryption framework using intuitionistic fuzzy graphs and graph theoretic domination for secure communication networks
Published 2025-07-01“…Key graph-theoretic measures, such as domination number, vertex categorization (alpha-strong, beta-strong, and gamma-strong), vertex order coloring, and chromatic number, play important roles in this process. …”
Get full text
Article -
19
Phase-Image-Encryption-Based Elliptic Curve and Double-Random-Phase Encoding
Published 2024-01-01Get full text
Article -
20
Alternate encoder and dual decoder CNN-Transformer networks for medical image segmentation
Published 2025-03-01“…Driven by these two designs, AD2Former demonstrates strong capture ability for target regions and fuzzy boundaries. …”
Get full text
Article