Search alternatives:
processor » processes (Expand Search)
Showing 15,881 - 15,900 results of 30,198 for search '(processor OR process) (computing)', query time: 0.25s Refine Results
  1. 15881

    Metabolic modeling of endosymbiont genome reduction on a temporal scale by Keren Yizhak, Tamir Tuller, Balázs Papp, Eytan Ruppin

    Published 2011-03-01
    “…Here, we study the order in which genes are lost in an in silico evolutionary process, leading from the metabolic network of Eschericia coli to that of the endosymbiont Buchnera aphidicola. …”
    Get full text
    Article
  2. 15882
  3. 15883

    Aggregated Recommendation through Random Forests by Heng-Ru Zhang, Fan Min, Xu He

    Published 2014-01-01
    “…Aggregated recommendation refers to the process of suggesting one kind of items to a group of users. …”
    Get full text
    Article
  4. 15884
  5. 15885

    Application of knowledge tools in training, based on problems’ solving: methodology and it support by D. V. Kudryavtsev, S. A. Kostousov

    Published 2017-07-01
    “…The distribution of work tools with knowledge on the stages of the problemsolving process is proposed. We have considered the use of computer tools and options for creating an informational educational environment for implementing the proposed ideas of problem-based learning and working with knowledge. …”
    Get full text
    Article
  6. 15886

    User Knowledge, Data Modelling, and Visualization: Handling through the Fuzzy Logic-Based Approach by Xiaoqun Liao, Shah Nazir, Yangbin Zhou, Muhammad Shafiq, Xuelin Qi

    Published 2021-01-01
    “…In data modelling, visualization is the process of extracting knowledge to reveal the detail data structure and process of data. …”
    Get full text
    Article
  7. 15887
  8. 15888
  9. 15889
  10. 15890

    Sample-Path Large Deviations in Credit Risk by V. J. G. Leijdekker, M. R. H. Mandjes, P. J. C. Spreij

    Published 2011-01-01
    “…We first derive a sample-path large deviation principle (LDP) for the portfolio's loss process, which enables the computation of the logarithmic decay rate of the probabilities of interest. …”
    Get full text
    Article
  11. 15891

    Detection of disease on nasal breath sound by new lightweight architecture: Using COVID-19 as an example by Jiayuan She, Lin Shi, Peiqi Li, Ziling Dong, Renxing Li, Shengkai Li, Liping Gu, Zhao Tong, Zhuochang Yang, Yajie Ji, Liang Feng, Jiangang Chen

    Published 2025-05-01
    “…The Dense-ReLU-Dropout model, combined with innovative feature processing techniques, offers a promising approach for efficient and accurate COVID-19 detection, showcasing the capabilities of mobile device-based diagnostics…”
    Get full text
    Article
  12. 15892

    Hyperparameter tuned deep learning-driven medical image analysis for intracranial hemorrhage detection. by Naif Almakayeel, E Laxmi Lydia, Oleg Razzhivin, S Rama Sree, Mohammed Altaf Ahmed, Bibhuti Bhusan Dash, S P Siddique Ibrahim

    Published 2025-01-01
    “…The ICH detection process is accomplished by the ensemble classification process, comprising long short-term memory (LSTM), stacked autoencoder (SAE), and bidirectional LSTM (Bi-LSTM) networks. …”
    Get full text
    Article
  13. 15893

    PROVIDING DISTANCE EDUCATION DURING THE WAR: THE EXPERIENCE OF UKRAINE by Lidia Londar, Marcus Pietsch

    Published 2023-12-01
    “…We also analyze the impact of digital technologies and educational IT infrastructure on the viability of the educational process under unfavorable social conditions. In addition, by constructing an educational regression model, we investigate various factors that may have influenced students’ achievement before the war (e.g., the availability of computers for students and teachers, schools’ access to high-speed internet, etc.), and identify the relationships between these factors. …”
    Get full text
    Article
  14. 15894

    Investigation of Opto‐magnetic Memory Effects in Antiferromagnetic CuMnAs Using Ultrafast Heat Dynamics and Quench Switching by Jan Zubáč, Miloslav Surýnek, Kamil Olejník, Andrej Farkaš, Filip Krizek, Lukáš Nádvorník, Peter Kubaščík, Zdeněk Kašpar, František Trojánek, Richard P. Campion, Vít Novák, Petr Němec, Tomáš Jungwirth

    Published 2025-06-01
    “…Antiferromagnets offer a promising platform for seeking such approaches due to their exceptional features: low‐power consumption and possible high integration density are desirable for information storage and processing or applications in unconventional computing. …”
    Get full text
    Article
  15. 15895

    Neuromorphic devices assisted by machine learning algorithms by Ziwei Huo, Qijun Sun, Jinran Yu, Yichen Wei, Yifei Wang, Jeong Ho Cho, Zhong Lin Wang

    Published 2025-01-01
    “…Neuromorphic computing extends beyond sequential processing modalities and outperforms traditional von Neumann architectures in implementing more complicated tasks, e.g., pattern processing, image recognition, and decision making. …”
    Get full text
    Article
  16. 15896

    A Classification Data Packets Using the Threshold Method for Detection of DDoS by Sukma Aji, Davito Rasendriya Rizqullah Putra, Imam Riadi, Abdul Fadlil, Muhammad Nur Faiz, Arif Wirawan Muhammad, Santi Purwaningrum, Laura Sari

    Published 2024-06-01
    “…The Threshold method is used to process numeric attributes so obtained from the logfile in a computer network so that data packages can be classified into 2, namely normal access and attack access. …”
    Get full text
    Article
  17. 15897

    Thermo-gravometric studies of fruits and vegetables by Kurbanova Madina, Dodayev Qo’chqor, Maksumova Dilrabo, Kurbanov Zhamshed, Dissanayake Kasun, Rifky Mohamed

    Published 2025-01-01
    “…When studying the kinetics of the process, the Wahuski-Voboril and Erofeev models were used, and a calculation program was given. …”
    Get full text
    Article
  18. 15898

    A new era in provisional restorations: evaluating marginal accuracy and fracture strength in additive, substractive and conventional techniques by Gizem Yılmaz, Zeynep Yeşil

    Published 2025-06-01
    “…Abstract Objective The aim of this study was to compare the marginal gaps and fracture resistance of fixed provisional restorations fabricated using conventional, subtractive (Computer-Aided Design/Computer-Aided Manufacturing (CAD/CAM)), and additive (3D printing) techniques. …”
    Get full text
    Article
  19. 15899
  20. 15900

    Removal of a maxillary tumor with simultaneous placement of intraosseous zygomatic implants by S. A. Epifanov, A. P. Polyakov, A. V. Mordovskiy, D. V. Dorokhin, O. V. Matorin, I. V. Rebrikova, N. V. Vereshchagina

    Published 2019-07-01
    “…During the examination of the oral cavity, we found a dense endophytic tumor in the area of two missing teeth (17 and 18) involving the alveolar process and palatine process of the maxilla. Computed tomography revealed destruction of the alveolar process, lateral, medial, and posterior walls of the maxillary sinus on the right, and tumor invasion into the right iliac fossa, pterygopalatine fossa, and right maxillary sinus. …”
    Get full text
    Article