Showing 11,081 - 11,100 results of 28,739 for search '"computability"', query time: 0.10s Refine Results
  1. 11081

    Enhancing unsupervised learning in medical image registration through scale-aware context aggregation by Yuchen Liu, Ling Wang, Xiaolin Ning, Yang Gao, Defeng Wang

    Published 2025-02-01
    “…Traditional registration algorithms often require significant computational resources due to iterative optimization, while deep learning approaches face challenges in managing diverse deformation complexities and task requirements. …”
    Get full text
    Article
  2. 11082

    RF-PSSM: A Combination of Rotation Forest Algorithm and Position-Specific Scoring Matrix for Improved Prediction of Protein-Protein Interactions Between Hepatitis C Virus and Human by Xin Liu, Yaping Lu, Liang Wang, Wei Geng, Xinyi Shi, Xiao Zhang

    Published 2023-03-01
    “…An increasing number of clinically and experimentally validated interactions between HCV and human proteins have been documented in public databases, facilitating studies based on computational methods. In this study, we proposed a new computational approach, rotation forest position-specific scoring matrix (RF-PSSM), to predict the interactions among HCV and human proteins. …”
    Get full text
    Article
  3. 11083

    TOPS-speed complex-valued convolutional accelerator for feature extraction and inference by Yunping Bai, Yifu Xu, Shifan Chen, Xiaotian Zhu, Shuai Wang, Sirui Huang, Yuhang Song, Yixuan Zheng, Zhihui Liu, Sim Tan, Roberto Morandotti, Sai T. Chu, Brent E. Little, David J. Moss, Xingyuan Xu, Kun Xu

    Published 2025-01-01
    “…The ever-increasing data capacity and network scale place substantial demands on underlying computing hardware. In parallel with the successes and extensive efforts made in electronics, optical neuromorphic hardware is promising to achieve ultra-high computing performances due to its inherent analog architecture and wide bandwidth. …”
    Get full text
    Article
  4. 11084

    Modern approaches to artificial gene synthesis: aspects of oligonucleotide synthesis, enzymatic assembly, sequence verification and error correction by G. Y. Shevelev, D. V. Pyshnyi

    Published 2018-08-01
    “…Synthetic biology accumulates the achievements of modern biological sciences, programming and computational model­ing as well as engineering technologies for creation of biologi­cal objects with user-defined properties. …”
    Get full text
    Article
  5. 11085

    Cloud data secure deduplication scheme via role-based symmetric encryption by Jinbo XIONG, Yuanyuan ZHANG, Youliang TIAN, Zuobin YING, Qi LI, Rong MA

    Published 2018-05-01
    “…The rapid development of cloud computing and big data technology brings prople to enter the era of big data,more and more enterprises and individuals outsource their data to the cloud service providers.The explosive growth of data and data replicas as well as the increasing management overhead bring a big challenge to the cloud storage space.Meanwhile,some serious issues such as the privacy disclosure,authorized access,secure deduplication,rekeying and permission revocation should also be taken into account.In order to address these problems,a role-based symmetric encryption algorithm was proposed,which established a mapping relation between roles and role keys.Moreover,a secure deduplication scheme was proposed via role-based symmetric encryption to achieve both the privacy protection and the authorized deduplication under the hierarchical architecture in the cloud computing environment.Furthermore,in the proposed scheme,the group key agreement protocol was utilized to achieve rekeying and permission revocation.Finally,the security analysis shows that the proposed role-based symmetric encryption algorithm is provably secure under the standard model,and the deduplication scheme can meet the security requirements.The performance analysis and experimental results indicate that the proposed scheme is effective and efficient.…”
    Get full text
    Article
  6. 11086

    A gender perspective on Internet use: consequences for information seeking on the net by AnnBritt Enochsson

    Published 2005-01-01
    “…Some analyses were strictly quantitative and compared data from coded qualitative material with questionnaires and computer logs in a database sheet. Others were of qualitative nature and based on selected material from the coded texts. …”
    Get full text
    Article
  7. 11087

    An Adaptive Multilevel Security Framework for the Data Stored in Cloud Environment by Sudha Devi Dorairaj, Thilagavathy Kaliannan

    Published 2015-01-01
    “…Cloud computing is renowned for delivering information technology services based on internet. …”
    Get full text
    Article
  8. 11088

    A human single-neuron dataset for object recognition by Runnan Cao, Peter Brunner, Nicholas J. Brandmeir, Jon T. Willie, Shuo Wang

    Published 2025-01-01
    “…Together, our extensive dataset, offering the highest spatial and temporal resolution currently available in humans, will not only facilitate a comprehensive analysis of the neural correlates of object recognition but also provide valuable opportunities for training and validating computational models.…”
    Get full text
    Article
  9. 11089

    Downlink wireless resource allocation method of V2X based on wireless sensing assistance by Zhimin HE, Yuzhe LIN, Yujie CHENG, Shi YAN

    Published 2022-09-01
    “…In vehicle-to-everything, the high-speed distribution and sharing of perception and safety data is crucial to road safety.However, the instability of communication links caused by high-speed vehicle movement will make the existing communication resource allocation methods based on vehicle location information reporting no longer efficient.Therefore, a downlink wireless resource allocation method based on wireless sensing assistance of communication nodes was proposed.Firstly, a joint optimization problem of communication mode selection and wireless resource allocation under the orthogonality of communication and sensing resources was constructed.Then, a communication mode selection based on clustering by Delaunay triangulation and a resource allocation strategy based on improved graph coloring to improve the downlink throughput was proposed to solve the problem of construction.Finally, the impact of wireless sensing estimation error and the number of vehicles on the performance of the algorithm was simulated and analyzed.Simulation results show that compared with traditional methods, the proposed algorithm can obtain better downlink communication performance gain under the same proportion of sensing bandwidth resources, and can withstand the impact of larger sensing errors on performance.At the same time, the computational complexity of the proposed algorithm is lower and the network computing resources can be saved.…”
    Get full text
    Article
  10. 11090

    Staff Attendance Management System: A Case Study of Kinyamaseke Town Council Kasese District. by Munono, Edson

    Published 2024
    “…The staff members can consult the appropriate system admin on the computer, which has helped them to keep updated about their attendance. …”
    Get full text
    Thesis
  11. 11091
  12. 11092
  13. 11093
  14. 11094
  15. 11095
  16. 11096

    Membrane-bound model of the ternary complex between factor VIIa/tissue factor and factor X by Melanie P. Muller, Alex Mortenson, Josepha C. Sedzro, Po-Chao Wen, James H. Morrissey, Emad Tajkhorshid

    Published 2025-02-01
    “…This lipid dependence has made experimental characterization of the EC structure challenging. Using a novel computational methodology combining rigid-body protein-protein docking and extensive nonequilibrium molecular dynamics simulations in the explicit presence of a membrane, we developed, to our knowledge, the first atomic-level model of the EC, taking full account of the role of the membrane. …”
    Get full text
    Article
  17. 11097
  18. 11098

    5G Networks Security Mitigation Model: An ANN-ISM Hybrid Approach by Rafiq Ahmad Khan, Habib Ullah Khan, Hathal Salamah Alwageed, Hussein Al Hashimi, Ismail Keshta

    Published 2025-01-01
    “…This model aims to improve the accuracy and effectiveness of security measures by integrating advanced computational practices with systematic modeling. Initially, a systematic evaluation of existing 5G network security threats was conducted to identify gaps and incorporate best practices into the proposed model. …”
    Get full text
    Article
  19. 11099
  20. 11100