Showing 1 - 20 results of 1,033 for search '(string OR strong) encoding', query time: 0.13s Refine Results
  1. 1

    A quantum random access memory (QRAM) using a polynomial encoding of binary strings by Priyanka Mukhopadhyay

    Published 2025-03-01
    “…Integral to our design is a polynomial encoding of bit strings and so we refer to this design as $$\text {QRAM}_{poly}$$ . …”
    Get full text
    Article
  2. 2

    Spin coupling is all you need: Encoding strong electron correlation in molecules on quantum computers by Daniel Marti-Dafcik, Hugh G. A. Burton, David P. Tew

    Published 2025-02-01
    “…Here, we show that quantum computers can efficiently simulate strongly correlated molecular systems by directly encoding the dominant entanglement structure in the form of spin-coupled initial states. …”
    Get full text
    Article
  3. 3

    Boundary terms in string field theory by Atakan Hilmi Fırat, Raji Ashenafi Mamade

    Published 2025-02-01
    “…Abstract We supplement the string field theory action with boundary terms to make its variational principle well-posed. …”
    Get full text
    Article
  4. 4
  5. 5

    Encoding surprise by retinal ganglion cells. by Danica Despotović, Corentin Joffrois, Olivier Marre, Matthew Chalk

    Published 2024-04-01
    “…A central prediction of this theory is that neurons should preferentially encode stimuli that are most surprising. Previous studies suggest this may be the case in early visual areas, where many neurons respond strongly to rare or surprising stimuli. …”
    Get full text
    Article
  6. 6
  7. 7

    Image cluster algorithm of hybrid encoding method by Chun-hui ZHAO, Xue-yuan LI, Ying CUI

    Published 2017-02-01
    “…In the clustering analysis based on swarm intelligence optimization algorithm,the most of encoding method only used single form,and this method might be limit range of search space,the algorithm was easy to fall into local op-timum.In order to solve this problem,image clustering algorithm of hybrid encoding (HEICA) was proposed.Firstly,a hybrid encoding model based on image clustering was established,this method could expand the scope of the search space.Meanwhile,it was combined with two optimization algorithms which improved rain forest algorithm (IRFA) and quantum particle swarm optimization (QPSO),this method could improve the global search capability.In the simulation experiment,it was carried out to illustrate the performance of the proposed method based on four datasets.Compared with results form four measured cluster algorithm.The experimental results show that the algorithm has strong global search capability,high stability and clustering effect.…”
    Get full text
    Article
  8. 8

    Efficient Text Encoders for Labor Market Analysis by Jens-Joris Decorte, Jeroen van Hautte, Chris Develder, Thomas Demeester

    Published 2025-01-01
    “…While state-of-the-art methods for skill extraction achieve strong performance, they depend on large language models (LLMs), which are computationally expensive and slow. …”
    Get full text
    Article
  9. 9
  10. 10

    Packet information encoding in a cerebellum-like circuit. by Alejo Rodríguez-Cattáneo, Ana Carolina Pereira, Pedro Anibal Aguilera, Ángel Ariel Caputi

    Published 2024-01-01
    “…Packet information encoding of neural signals was proposed for vision about 50 years ago and has recently been revived as a plausible strategy generalizable to natural and artificial sensory systems. …”
    Get full text
    Article
  11. 11

    A DNA Encoding Image Encryption Algorithm Based on Chaos by Li Huang, Cong Ding, Zhenjie Bao, Haitao Chen, Changsheng Wan

    Published 2025-04-01
    “…The experimental results and security analysis show that this algorithm has a large enough key space, strong key sensitivity, high image encryption quality, strong robustness and high encryption efficiency. …”
    Get full text
    Article
  12. 12
  13. 13

    Confining strings in three-dimensional gauge theories beyond the Nambu-Gotō approximation by Michele Caselle, Nicodemo Magnoli, Alessandro Nada, Marco Panero, Dario Panfalone, Lorenzo Verzichelli

    Published 2024-08-01
    “…While their low-energy properties are known to be universal and are described well by the Nambu-Gotō action, a non-trivial dependence on the gauge group is encoded in a series of undetermined subleading corrections in an expansion around the limit of an arbitrarily long string. …”
    Get full text
    Article
  14. 14

    Classical black hole probes of UV scales by José Calderón-Infante, Matilda Delgado, Yixuan Li, Dieter Lüst, Angel Uranga

    Published 2025-06-01
    “…In this paper, we take the perspective of the two-derivative action of string theoretic effective field theories and explore various families of extremal black hole solutions that probe infinite distance limits at their horizons. …”
    Get full text
    Article
  15. 15

    An Image Encryption Method Based on the Feistel Network and Dynamic DNA Encoding by Xuncai Zhang, Zheng Zhou, Ying Niu

    Published 2018-01-01
    “…Based on the Feistel network and dynamic deoxyribonucleic acid (DNA) encoding technology, an image encryption method is proposed using the “permutation–diffusion–scrambling” structure. …”
    Get full text
    Article
  16. 16

    D-instanton induced effective action and its gauge invariance by Ashoke Sen

    Published 2025-06-01
    “…Abstract The effect of D-instantons on closed string scattering amplitudes may be encoded into an effective action obtained by integrating out the (transient) open string fields. …”
    Get full text
    Article
  17. 17

    Genetically encoded far-red fluorescent sensors for caspase-3 activity by Olga A. Zlobovskaya, Tatiana F. Sergeeva, Marina V. Shirmanova, Varvara V. Dudenkova, George V. Sharonov, Elena V. Zagaynova, Konstantin A. Lukyanov

    Published 2016-02-01
    “…In the present work, we developed new genetically encoded sensors for caspase-3 activity possessing the most red-shifted spectra to date. …”
    Get full text
    Article
  18. 18

    A multi layered encryption framework using intuitionistic fuzzy graphs and graph theoretic domination for secure communication networks by A. Meenakshi, S. Dhanushiya, Leo Mrsic, Antonios Kalampakas, Sovan Samanta

    Published 2025-07-01
    “…Key graph-theoretic measures, such as domination number, vertex categorization (alpha-strong, beta-strong, and gamma-strong), vertex order coloring, and chromatic number, play important roles in this process. …”
    Get full text
    Article
  19. 19
  20. 20

    Alternate encoder and dual decoder CNN-Transformer networks for medical image segmentation by Lin Zhang, Xinyu Guo, Hongkun Sun, Weigang Wang, Liwei Yao

    Published 2025-03-01
    “…Driven by these two designs, AD2Former demonstrates strong capture ability for target regions and fuzzy boundaries. …”
    Get full text
    Article