Showing 6,721 - 6,740 results of 21,428 for search '"computing"', query time: 0.11s Refine Results
  1. 6721

    HISS: Snakemake-based workflows for performing SMRT-RenSeq assembly, AgRenSeq and dRenSeq for the discovery of novel plant disease resistance genes by Thomas M. Adams, Moray Smith, Yuhan Wang, Lynn H. Brown, Micha M. Bayer, Ingo Hein

    Published 2023-05-01
    “…Since the initial publication of the methodology, it has continued to be developed as new technologies have become available and the increased availability of computing power has made new bioinformatic approaches possible. …”
    Get full text
    Article
  2. 6722

    SCovid v2.0: a comprehensive resource to decipher the molecular characteristics across tissues in COVID-19 and other human coronaviruses by Zijun Zhu, Xinyu Chen, Guoyou He, Rui Yu, Chao Wang, Changlu Qi, Liang Cheng

    Published 2025-02-01
    “…ABSTRACT SCovid v2.0 (http://bio-annotation.cn/scovid or http://bio-computing.hrbmu.edu.cn/scovid/) is an updated database designed to assist researchers in uncovering the molecular characteristics of coronavirus disease 2019 (COVID-19) across various tissues through transcriptome sequencing. …”
    Get full text
    Article
  3. 6723

    A Massively Parallel SMC Sampler for Decision Trees by Efthyvoulos Drousiotis, Alessandro Varsi, Alexander M. Phillips, Simon Maskell, Paul G. Spirakis

    Published 2025-01-01
    “…A widely used approach to reducing an algorithm’s runtime is to employ modern multi-core computer architectures, either with shared memory (SM) or distributed memory (DM), and use parallel computing to accelerate the algorithm. …”
    Get full text
    Article
  4. 6724
  5. 6725

    Three-Dimensional Inversion of Borehole-Surface Resistivity Method Based on the Unstructured Finite Element by Zhi Wang, Sinan Fang

    Published 2021-01-01
    “…The quasi-Newton method with limited memory (L_BFGS) is used to optimize the objective function in the inversion calculation, and a double-loop recursive method is used to solve the normal equation obtained at each iteration in order to avoid computing and storing the sensitivity matrix explicitly and reduce the amount of calculation. …”
    Get full text
    Article
  6. 6726
  7. 6727
  8. 6728

    An Intelligent Big Data Security Framework Based on AEFS-KENN Algorithms for the Detection of Cyber-Attacks from Smart Grid Systems by Sankaramoorthy Muthubalaji, Naresh Kumar Muniyaraj, Sarvade Pedda Venkata Subba Rao, Kavitha Thandapani, Pasupuleti Rama Mohan, Thangam Somasundaram, Yousef Farhaoui

    Published 2024-06-01
    “…The main obstacles in turning the heterogeneous large dataset into useful results are computational burden and information security. The original contribution of this paper is to develop a new big data framework for detecting various intrusions from the smart grid systems with the use of AI mechanisms. …”
    Get full text
    Article
  9. 6729

    Implementation of an information system for tuberculosis in healthcare facilities in Indonesia: evaluation of its effectiveness and challenges by Rita Dian Pratiwi, Bachti Alisjahbana, Yanri Wijayanti Subronto, Sigit Priyanta, Suharna Suharna

    Published 2025-01-01
    “…SITB utilization is comprehensively assessed using the End-User Computing Satisfaction (EUCS) method, which considers the dimensions of content, accuracy, timeliness, and ease of use. …”
    Get full text
    Article
  10. 6730
  11. 6731

    ASSESSING THE RESULTS OF TRAINING IN DIGITAL ENTREPRENEURSHIP IN THE AGE OF HIGH AND DEEP TECH by Oleg Kaminsky, Julia Yereshko, Sergii Kyrychenko, Maryna Duchenko

    Published 2024-02-01
    “…The article proposes a method of assessing the level of competences of students of economic specialties in the field of learning digital entrepreneurship based on soft computing, and also formulates the key basic competencies that arise during the online course of digital entrepreneurship, which are based on the latest development trends in the field of IT. …”
    Get full text
    Article
  12. 6732
  13. 6733

    LFN-YOLO: precision underwater small object detection via a lightweight reparameterized approach by Mingxin Liu, Mingxin Liu, Yujie Wu, Ruixin Li, Cong Lin, Cong Lin

    Published 2025-01-01
    “…Finally, we design a new detection head, CLLAHead, which reduces computational costs and strengthens the robustness of the model through cross-layer local attention. …”
    Get full text
    Article
  14. 6734

    Adsorption of Mo and O at S-vacancy on ReS2 surface of ReS2/MoTe2 vdW heterointerface by Puneet Kumar Shaw, Jehan Taraporewalla, Sohaib Raza, Akash Kumar, Rimisha Duttagupta, Hafizur Rahaman, Dipankar Saha

    Published 2025-06-01
    “…Applications like high density information storage, neuromorphic computing, nanophotonics, etc. require ultra-thin electronic devices which can be controlled with applied electric field. …”
    Get full text
    Article
  15. 6735
  16. 6736
  17. 6737
  18. 6738

    Brand Association and Competitive advantange in alcoholic beer products in Kabale District, Uganda. by Moses, Agaba

    Published 2020
    “…The descriptive analysis involving computing the mean, standard deviation, skewness, and kurtosis of the brand Association and competitive advantage variables was conducted. …”
    Get full text
    Article
  19. 6739

    Brand Loyalty and Competitive advantage a case of beer products in Kabale District, Uganda. by Moses, Agaba, Edward, Ahabwe

    Published 2020
    “…The descriptive analysis involving computing the mean, standard deviation, skewness, and kurtosis of the brand Loyalty and competitive advantage variables was conducted. …”
    Get full text
    Article
  20. 6740

    Perceived Quality and Competitive Advantage in Beer Products In Kabale District, South Western Uganda by Moses, Agaba, Alex, Kanyesiime

    Published 2020
    “…The descriptive analysis involving computing the mean, standard deviation, skewness, and kurtosis of percieved quality and competitive advantage variables was conducted. …”
    Get full text
    Article