Showing 4,001 - 4,020 results of 29,852 for search '(process OR processes) (computing)', query time: 0.39s Refine Results
  1. 4001

    Computational epitope-based vaccine design with bioinformatics approach; a review by Esmaeil Roohparvar Basmenj, Susan Radman Pajhouh, Afsane Ebrahimi Fallah, Rafe naijian, Elmira Rahimi, Hossein Atighy, Shadan Ghiabi, Shamim Ghiabi

    Published 2025-01-01
    “…It is widely recognized that the vaccine design process is traditionally both time-consuming and costly. …”
    Get full text
    Article
  2. 4002

    Modulation of brain signal variability in visual cortex reflects aging, GABA, and behavior by Poortata Lalwani, Thad Polk, Douglas D Garrett

    Published 2025-04-01
    “…Using a combination of behavioral methods, computational modeling, fMRI, MR spectroscopy, and pharmacological intervention, we investigated the role of aging and GABA in neural variability during visual processing. …”
    Get full text
    Article
  3. 4003
  4. 4004
  5. 4005

    A deep learning model for estimating body weight of live pacific white shrimp in a clay pond shrimp aquaculture by Nitthita Chirdchoo, Suvimol Mukviboonchai, Weerasak Cheunta

    Published 2024-12-01
    “…Specifically, an automated feed tray captures images of live shrimp, which are then processed using a combination of Detectron2, PyTorch, and CUDA (Compute Unified Device Architecture) for individual shrimp detection. …”
    Get full text
    Article
  6. 4006
  7. 4007

    Semantic activation and time course of ambiguous morphemes and whole words in Chinese compounds by Zexi Guo, Maimaiti Yilizhati

    Published 2025-06-01
    “…Combining the event-related potential (ERP) and masking priming paradigms, this study aims to resolve the theoretical debate between the meaning computation model and the dual-path competition model in the processing of Chinese compound words by comparing the influence of ambiguous morpheme semantics (the same as or different from the target word) and position (head or tail) on target words. …”
    Get full text
    Article
  8. 4008
  9. 4009
  10. 4010
  11. 4011
  12. 4012
  13. 4013
  14. 4014

    Novel Algorithm for Joint Channel Estimation and Spreading Sequence Detection in DSSS Systems by Seungjun Oh, Hichan Moon

    Published 2024-01-01
    “…The receiver performs a turbo processing to generate a performance metric for each candidate angle, then selects the angle with the best performance metric among candidate angles. …”
    Get full text
    Article
  15. 4015

    A guide to evade hallucinations and maintain reliability when using large language models for medical research: a narrative review by Sangzin Ahn

    Published 2025-06-01
    “…This review highlights the importance of understanding the technical limitations of LLMs while maximizing their potential through thoughtful application and rigorous verification processes, ensuring high standards of scientific integrity in medical research.…”
    Get full text
    Article
  16. 4016
  17. 4017
  18. 4018

    Deep learning-based phase demodulation for distributed acoustic sensor by Yiming Tang, Kewei Liu, Chen Liu, Haiyong Wu, Rugang Wang, Mengmeng Chen, Fei Xu

    Published 2025-08-01
    “…The proposed approach aims to replace the computationally intensive processes of traditional demodulation algorithms, such as the Hilbert transform, in specific scenarios. …”
    Get full text
    Article
  19. 4019

    Design and Research of Intelligent Chatbot for Campus Information Consultation Assistant by Yao Song, Chunli Lv, Kun Zhu, Xiaobin Qiu

    Published 2025-03-01
    “…It can also automatically collect and process teaching data, such as students' learning progress and grades, to help teachers better understand students' learning situations and optimize teaching strategies. …”
    Get full text
    Article
  20. 4020

    Reinforcement Learning-Based Generative Security Framework for Host Intrusion Detection by Yongsik Kim, Su-Youn Hong, Sungjin Park, Huy Kang Kim

    Published 2025-01-01
    “…Recently, researchers applied Natural Language Processing (NLP) in HIDS to scrutinize complex attack patterns, but they could have more effectively provided useful outputs for detecting intrusions based on these patterns. …”
    Get full text
    Article