Showing 81 - 100 results of 645 for search '"Computational complexity theory', query time: 0.12s Refine Results
  1. 81
  2. 82

    Unconditional quantum magic advantage in shallow circuit computation by Xingjian Zhang, Zhaokai Pan, Guoding Liu

    Published 2024-12-01
    “…Abstract Quantum theory promises computational speed-ups over classical approaches. …”
    Get full text
    Article
  3. 83
  4. 84

    A low-complexity detection algorithm for quadrature spatial modulation systems by Kai LUO, Junwei HUANG, Pengguang ZHOU, Hao XU, Can WU

    Published 2017-05-01
    “…To tackle the issues of the uncertainty number of the activated antennas and high computational complexity of maximum likelihood (ML) detection algorithm in quadrature spatial modulation (QSM),a low-complexity detec-tion algorithm was proposed.Firstly,the system model was reconstructed into a new model suitable for low-complexity detection algorithms in fixed active antennas systems based on compressed sensing (CS) signal re-construction theory.Then,based on the idea of orthogonal matching pursuit (OMP) algorithm and reconstructed model,a candidate set of activated antennas was obtained.Lastly,using ML algorithm to search the candidate,the index of activated antennas and the modulation symbol were selected.Simulation results show that the proposed de-tector is capable of achieving about 90% reduction in complexity with low performance loss compared with ML al-gorithm.…”
    Get full text
    Article
  5. 85
  6. 86
  7. 87

    Computer-based music production: Specifics of professional training by A. A. Konovalov, N. I. Butorina

    Published 2021-10-01
    “…The research methodological framework is based on the concepts of competency-based, activity-based, technological and personality-oriented approaches to education; research papers on the problems of using computer music technologies in education; theory and practice of teaching models application in higher education.The leading method was the modelling of the educational process in specialised training in the field of computer-based music production. …”
    Get full text
    Article
  8. 88

    Analysis of the Impact of Big Data on E-Commerce in Cloud Computing Environment by Rongrui Yu, Chunqiong Wu, Bingwen Yan, Baoqin Yu, Xiukao Zhou, Yanliang Yu, Na Chen

    Published 2021-01-01
    “…Finally, based on the impact of cloud computing, mobile e-commerce is analyzed, including relevant theories, service mode, architecture, core technology, and the application in e-commerce, which can realize e-commerce precision marketing, find the optimal path of logistics, and take effective security measures to avoid transaction risks. …”
    Get full text
    Article
  9. 89

    Computational Swarming: A Cultural Technique for Generative Architecture by Sebastian Vehlken

    Published 2014-11-01
    “…By taking advantage of the self-organisational capabilities of computational agent collectives whose global behaviour emerges from the local interaction of a large number of relatively simple individuals (as it does, for instance, in animal swarms), architects are able to understand buildings and urbanscapes in a novel way as complex spaces that are constituted by the movement of multiple material and informational elements. …”
    Get full text
    Article
  10. 90
  11. 91
  12. 92
  13. 93

    Reappraising double pendulum dynamics across multiple computational platforms by Sandy Herho, Faiz Fajary, Katarina Herho, Iwan Anwar, Rusmawan Suwarman, Dasapta Irawan

    Published 2025-02-01
    “…This work will be useful for understanding chaos theory and efficient computational approaches in complex systems of dynamical nature. …”
    Get full text
    Article
  14. 94

    Modular Calabi-Yau fourfolds and connections to M-theory fluxes by Hans Jockers, Sören Kotlewski, Pyry Kuusela

    Published 2024-12-01
    “…This, in turn, is sensitive to the complex structure of the fourfold. Focusing mainly on examples of fourfolds with a single complex structure parameter, it is demonstrated that the proposed arithmetic techniques are both applicable and consistent. …”
    Get full text
    Article
  15. 95

    Network Anomaly Detection System with Optimized DS Evidence Theory by Yuan Liu, Xiaofeng Wang, Kaiyu Liu

    Published 2014-01-01
    “…Network anomaly detection has been focused on by more people with the fast development of computer network. Some researchers utilized fusion method and DS evidence theory to do network anomaly detection but with low performance, and they did not consider features of network—complicated and varied. …”
    Get full text
    Article
  16. 96

    Correlation functions in T T ¯ $$ \textrm{T}\overline{\textrm{T}} $$ -deformed theories on the torus by Netanel Barel

    Published 2024-11-01
    “…We focus on the two-point correlation functions in momentum space when the undeformed theory is a conformal field theory. The large momentum behavior of the correlation functions is computed and compared to that of T T ¯ $$ \textrm{T}\overline{\textrm{T}} $$ -deformed field theories defined on a plane. …”
    Get full text
    Article
  17. 97
  18. 98
  19. 99

    Cross media knowledge information retrieval model based on D-S evidence theory by Hongbo Li, Xin Li, Boning Liu, Kaiji Mao, Hemin Xu

    Published 2024-12-01
    “…Therefore, a cross media knowledge information retrieval model using D-S evidence theory is proposed, which involves using approximate calculation methods to improve this theory for information fusion, reducing computational complexity, and using deep networks for fine-grained information retrieval to improve retrieval accuracy. …”
    Get full text
    Article
  20. 100