يعرض 41 - 50 نتائج من 8,378 نتيجة بحث عن '"Nguyen, Phuong The"', وقت الاستعلام: 1.68s تنقيح النتائج
  1. 41
    تقرير

    الوصف: The Competition on Legal Information Extraction/Entailment (COLIEE) is held annually to encourage advancements in the automatic processing of legal texts. Processing legal documents is challenging due to the intricate structure and meaning of legal language. In this paper, we outline our strategies for tackling Task 2, Task 3, and Task 4 in the COLIEE 2023 competition. Our approach involved utilizing appropriate state-of-the-art deep learning methods, designing methods based on domain characteristics observation, and applying meticulous engineering practices and methodologies to the competition. As a result, our performance in these tasks has been outstanding, with first places in Task 2 and Task 3, and promising results in Task 4. Our source code is available at https://github.com/Nguyen2015/CAPTAIN-COLIEE2023/tree/coliee2023.

  2. 42
    تقرير

    الوصف: Trions are a three-particle bound state of electrons and holes. Experimental realization of a trion liquid in the degenerate quantum limit would open a wide range of phenomena in quantum many-body physics. However, trions have been observed only as optically excited states in doped semiconductors to date. Here we report the emergence of a degenerate trion liquid in a Bose-Fermi mixture of holes and excitons in Coulomb-coupled MoSe2/WSe2 monolayers. By electrically tuning the hole density in WSe2 to be two times the electron density in MoSe2, we generate equilibrium interlayer trions with binding energy about 1 meV at temperatures two orders of magnitude below the Fermi temperature. We further demonstrate a density-tuned phase transition to an electron-hole plasma, spin-singlet correlations for the constituent holes and Zeeman-field-induced dissociation of trions. The results pave the way for exploration of the correlated phases of composite particles in solids.

  3. 43
    تقرير

    مصطلحات موضوعية: Computer Science - Cryptography and Security

    الوصف: Unreliable XOR Arbiter PUFs were broken by a machine learning attack, which targets the underlying Arbiter PUFs individually. However, reliability information from the PUF was required for this attack. We show that, for the first time, a perfectly reliable XOR Arbiter PUF, where no reliability information is accessible, can be efficiently attacked in the same divide-and-conquer manner. Our key insight is that the responses of correlated challenges also reveal their distance to the decision boundary. This leads to a chosen challenge attack on XOR Arbiter PUFs. The effectiveness of our attack is confirmed through PUF simulation and FPGA implementation.

  4. 44
    دورية أكاديمية

    المؤلفون: Nguyen, Phuong X.T.Aff1, Aff2, Aff3, Pham, Anh P.N., Nguyen, Hong T.T., Do, Tai C.Aff3, IDs10934024016540_cor4, Le, Phung K.Aff1, Aff2, IDs10934024016540_cor5

    المصدر: Journal of Porous Materials. :1-14

  5. 45
  6. 46
  7. 47
    دورية أكاديمية
  8. 48
  9. 49
  10. 50
    دورية أكاديمية

    المؤلفون: Nguyen, Phuong Hoang, Fay, Kayla Ashley, English, Jada Mae, Gill, Harman SinghAff1, Aff2, Aff3, IDs11739023035124_cor4

    المصدر: Internal and Emergency Medicine: Official Journal of the Italian Society of Internal Medicine. 19(4):1099-1107