Showing 1,021 - 1,040 results of 21,428 for search '"computing"', query time: 0.07s Refine Results
  1. 1021

    Simulation of asymmetric modes of operation of electrical network and processing of results using computer program by A. I. Antonov, Yu. M. Denchik, D. A. Zubanov, N. V. Zubanova, A. A. Ruppel

    Published 2018-04-01
    “…The results of the experiment are processed using a computer program and an analysis of the processing of the results data is carried out.…”
    Get full text
    Article
  2. 1022
  3. 1023
  4. 1024
  5. 1025

    Moroccan natural products for multitarget-based treatment of Alzheimer's disease: A computational study. by Fatima Zahra Guerguer, Amal Bouribab, El Mehdi Karim, Meriem Khedraoui, Fatiha Amegrissi, Yasir S Raouf, Abdelouahid Samadi, Samir Chtita

    Published 2025-01-01
    “…This study investigates the potential of phytochemical compounds from Moroccan medicinal plants as multi-target agents against Alzheimer's disease, employing computational approaches. A virtual screening of 386 phytochemical compounds, followed by an assessment of pharmacokinetic properties and ADMET profiles, led to the identification of two promising compounds, naringenin (C23) and hesperetin (C24), derived from Anabasis aretioides. …”
    Get full text
    Article
  6. 1026

    Experimental and computational investigation of the effect of machining parameters on the turning process of C45 steel by Tien-Thinh Le, Hang Thi Pham, Hiep Khac Doan, Panagiotis G. Asteris

    Published 2025-02-01
    “…The validity of the computational results was confirmed by comparing them with experimental findings on chip morphology and temperature rise during cutting. …”
    Get full text
    Article
  7. 1027
  8. 1028

    Two-Step Root-MUSIC for Direction of Arrival Estimation without EVD/SVD Computation by Feng-Gang Yan, Shuai Liu, Jun Wang, Ming Jin

    Published 2018-01-01
    “…Most popular techniques for super-resolution direction of arrival (DOA) estimation rely on an eigen-decomposition (EVD) or a singular value decomposition (SVD) computation to determine the signal/noise subspace, which is computationally expensive for real-time applications. …”
    Get full text
    Article
  9. 1029
  10. 1030

    Efficient Computation of Shortest Paths in Networks Using Particle Swarm Optimization and Noising Metaheuristics by Ammar W. Mohemmed, Nirod Chandra Sahoo

    Published 2007-01-01
    “…Simulation results on several networks with random topologies are used to illustrate the efficiency of the proposed hybrid algorithm for shortest-path computation. The proposed algorithm can be used as a platform for solving other NP-hard SPPs.…”
    Get full text
    Article
  11. 1031

    Hardware-efficient preparation of architecture-specific graph states on near-term quantum computers by Sebastian Brandhofer, Ilia Polian, Stefanie Barz, Daniel Bhatti

    Published 2025-01-01
    “…Abstract Highly entangled quantum states are an ingredient in numerous applications in quantum computing. However, preparing these highly entangled quantum states on currently available quantum computers at high fidelity is limited by ubiquitous errors. …”
    Get full text
    Article
  12. 1032
  13. 1033

    Hardware Architecture for Real-Time Computation of Image Component Feature Descriptors on a FPGA by Abdul Waheed Malik, Benny Thörnberg, Muhammad Imran, Najeem Lawal

    Published 2014-01-01
    “…This paper describes a hardware architecture for real-time image component labeling and the computation of image component feature descriptors. …”
    Get full text
    Article
  14. 1034
  15. 1035

    Unilateral Fusion of Maxillary Lateral Incisor: Diagnosis Using Cone Beam Computed Tomography by Iury Oliveira Castro, Carlos Estrela, Vinícius Rezende Souza, Lawrence Gonzaga Lopes, João Batista de Souza

    Published 2014-01-01
    “…To report a case of right maxillary lateral incisor fusion and a supernumerary tooth, the anatomy of the root canal and dental united portion were assessed by cone beam computed tomography (CBCT). Results. The clinical examination showed dental juxtaposition with the absence of interdental papilla and esthetic impairment in the right maxillary lateral incisor region. …”
    Get full text
    Article
  16. 1036
  17. 1037

    Computer Deep Learning Network Security Vulnerability Detection Based on Virtual Reality Technology by Xiaokun Zheng

    Published 2022-01-01
    “…In order to detect the computer network security technology vulnerabilities due to various factors, the normal operation of the computer network must be ensured, the user’s confidential information must be protected, and it is proposed that the analysis and research on security vulnerability detection must be strengthened. …”
    Get full text
    Article
  18. 1038

    Effects of Resource Limitations and Cost Influences on Computer Virus Epidemic Dynamics and Tipping Points by Chung-Yuan Huang, Chuen-Tsai Sun

    Published 2012-01-01
    “…One of the most important assessment indicators of computer virus infections is epidemic tipping point. …”
    Get full text
    Article
  19. 1039
  20. 1040

    Feasibility and appropriateness of using electronic hierarchical structures in teaching computer science in primary school by Esen Y. Bidaibekov, Baglan B. Kaldanov

    Published 2024-12-01
    “…Modern requirements for teaching computer science in primary schools demonstrate the necessity of using innovative educational technologies. …”
    Get full text
    Article