-
181
Outcome for the group SL(2,57)
Publicerad 2024-01-01“… The set of all (n×n) non-singular matrices over the field F this set forms a group under the operation of matrix multiplication. This group is called the general linear group of dimension over the field F, denoted by . …”
Hämta fulltext
Artikel -
182
What are the risks of financial management under the digital transformation of enterprises? Evidence from systems engineering
Publicerad 2023-01-01“…This paper constructs the index system of enterprise financial management risk under the background of digital transformation, uses the interpretative structural model (ISM) to calculate and analyze the adjacency matrix, obtains the hierarchical division of influencing factors, summarizes the internal pointing relationship between the index factors at all levels, and then uses the cross influence matrix multiplication (MICMAC) to calculate the driving-dependence relationship of each factor to judge its attribute category. …”
Hämta fulltext
Artikel -
183
Polynomial Size Analysis of First-Order Shapely Functions
Publicerad 2009-05-01“…Examples of shapely function definitions may be implementations of matrix multiplication and the Cartesian product of two lists. …”
Hämta fulltext
Artikel -
184
Malicious domain name detection method based on associated information extraction
Publicerad 2021-10-01“…To improve the accuracy of malicious domain name detection based on the associated information, a detection method combining resolution information and query time was proposed.Firstly, the resolution information was mapped to nodes and edges in a heterogeneous information network, which improved the utilization rate.Secondly, considering the problem of high computational complexity in extracting associated information with matrix multiplication, an efficiency breadth-first network traversal algorithm based on meta-path was proposed.Then, the query time was used to detect the domain names lacking meta-path information, which improved the coverage rate.Finally, domain names were vectorized by representation learning with adaptive weight.The Euclidean distance between domain name feature vectors was used to quantify the correlation between domain names.Based on the vectors learned above, a supervised classifier was constructed to detect malicious domain names.Theoretical analysis and experimental results show that the proposed method preforms well in extraction domain name associated information.The coverage rate and F1 score are 97.7% and 0.951 respectively.…”
Hämta fulltext
Artikel -
185
A low-rank approximation of tensors and the topological group structure of invertible matrices
Publicerad 2018-12-01“…The multilinear matrix multiplication has been discussed from the viewpoint of transformation groups. …”
Hämta fulltext
Artikel -
186
Simple 2D chaotic remapping scheme for securing optical communication networks
Publicerad 2019-11-01“…The introduced system replaces complex operations such as matrix multiplication with simple operations such as multiplexing and inverting. …”
Hämta fulltext
Artikel -
187
Application of Extended Euclid Algorithm on Hill Cipher Cryptography Modulo 95
Publicerad 2023-07-01“…The result of the conversion is multiplied by matrix A using matrix multiplication operation modulo 95 which result added with 32. …”
Hämta fulltext
Artikel -
188
A comparison between GPU and FPGA as hardware accelerators
Publicerad 2016“…This is done via benchmarking their performance against a CPU in Square Matrix Multiplication, Fast Fourier Transform and Finite Impulse Response filtering. …”
Hämta fulltext
Final Year Project (FYP) -
189
LIMIT-CYCLE PREDICTIONS IN SAMPLED DATA SYSTEMS
Publicerad 1981“…For sampled data systems, it is possible to express discrete time convolution in terms of appropriate matrix multiplication. A limiting process then yields the steady-state response to a periodic input. …”
Journal article -
190
Scalable non-volatile tuning of photonic computational memories by automated silicon ion implantation
Publicerad 2023“…Based on this approach, spectrally aligned photonic memory and computing systems for general matrix multiplication are demonstrated, enabling wavelength multiplexed integrated architectures at large scales.…”
Journal article -
191
Performance analysis of hybrid OpenMP/MPI based on multi-core cluster architecture
Publicerad 2014“…The purpose of this paper is to analyze how pure MPI and hybrid code behave on two different multi-core clusters architecture using parallel application matrix multiplication. Hybrid programming code forced to face lack of performance compare to pure MPI at lower number of cores in overhead from shared memory. …”
Conference or Workshop Item -
192
Multi-Softcore Architecture on FPGA
Publicerad 2014-01-01“…Experimental results demonstrate the performance of the proposed multicore system, which achieves better speedup than the GPU (29.5% faster for the FIR filter and 23.6% faster for the matrix-matrix multiplication).…”
Hämta fulltext
Artikel -
193
New construction of mutually orthogonal complementary sequence sets
Publicerad 2024-09-01“…The new concept of coefficient paraunitary (CPU) matrices was defined, and by employing matrix multiplication, Kronecker product, and matrix iteration techniques, three types of PU matrices with varying sizes were constructed. …”
Hämta fulltext
Artikel -
194
Creating an immersive environment of Metaverse for businesses
Publicerad 2024-11-01“…The study deploys multi-criteria decision-making techniques, "Total Interpretive Structural Modelling," and "Cross-Impact Matrix Multiplication Applied to Classification" to establish cross-relationships among enablers. …”
Hämta fulltext
Artikel -
195
The Chunks and Tasks Matrix Library
Publicerad 2022-07-01“…This is demonstrated for the example of block-sparse matrix–matrix multiplication applied to three sequences of matrices with different nonzero structure, using the CHT-MPI 2.0 runtime library implementation of the Chunks and Tasks model. …”
Hämta fulltext
Artikel -
196
OPERATIONAL ANALYSIS OF COMPLEX MEDICAL STATES BY PHOTONICS METHODS
Publicerad 2018-04-01“…Such an analysis is carried out by the means of vector-matrix multiplication using laser photonics methods. It is significant that with the widening of the range of probability algorithms, it is possible to preserve certain advantages of the holographic method: multidimensionality, efficiency, high information capacity and speed, visibility and flexibility of the result presentation. …”
Hämta fulltext
Artikel -
197
Mod2VQLS: A Variational Quantum Algorithm for Solving Systems of Linear Equations Modulo 2
Publicerad 2024-01-01“…The quantum components are a new circuit design for implementing matrix multiplication modulo 2, and a variational circuit to be optimized. …”
Hämta fulltext
Artikel -
198
Industry 4.0 Implementation Drivers in Manufacturing Companies in Algeria: A Structural Analysis via ISM Method
Publicerad 2024-02-01“…The Interpretative Structural Modelling (ISM) method and the Cross-Impact Matrix Multiplication Applied to a Ranking (MICMAC) method were used. …”
Hämta fulltext
Artikel -
199
Analysis on influencing factors and assessment of psychological resilience of coal miners based on ISM and MICMAC model
Publicerad 2023-01-01“…Then the cross-impact matrix multiplication applied to classification (MICMAC) was used to analyze the driving force and dependence of each influencing factor, and a dependency-driving force diagram was drawn to verify the rationality of the hierarchical relationship between the influencing factors in the ISM. …”
Hämta fulltext
Artikel -
200
Matrix solution for the wall impedance of infinitely long multilayer circular beam tubes
Publicerad 2010-01-01“…By imposing power-flow constraints on the matrix, wave impedance mapping and field matching between layers is enforced and replaced by matrix multiplication. The longitudinal and transverse coupling impedances are derived from the wall impedance at the innermost boundary, and the different procedures for its determination are discussed. …”
Hämta fulltext
Artikel