Search alternatives:
processor » process (Expand Search)
processes » process (Expand Search)
Showing 3,801 - 3,820 results of 30,198 for search '(processor OR processes) (computing)', query time: 0.31s Refine Results
  1. 3801

    TinyML-Based Lightweight AI Healthcare Mobile Chatbot Deployment by Johnvictor AC, Poonkodi M, Prem Sankar N, VS T

    Published 2024-11-01
    “…To address these security concerns and ensure swift operation, this study has developed a chatbot tailored for hospital environments, running on a local server, and utilising TinyML for processing patient data.Patients and Methods: Edge computing technology enables secure on-site data processing. …”
    Get full text
    Article
  2. 3802

    First ElGamal Encryption/Decryption Scheme Based on Spiking Neural P Systems with Communication on Request, Weights on Synapses, and Delays in Rules by Irepan Rangel, Daniel-Eduardo Vázquez, Eduardo Vázquez, Gonzalo Duchen, Juan-Gerardo Avalos, Giovanny Sanchez

    Published 2025-04-01
    “…Here, we exert major efforts to create a compact and high-performance circuit to perform the extended Euclidean algorithm since the calculation of this algorithm is the most demanding when the decryption process is required. Finally, we perform several tests to show the computational capabilities of our proposal in comparison to conventional implementations on single-board computer systems. …”
    Get full text
    Article
  3. 3803

    Protocol-Agnostic and Packet-Based Intrusion Detection Using a Multi-Layer Deep-Learning Architecture at the Network Edge by Rodolphe Picot, Felipe Gohring de Magalhaes, Ahmad Shahnejat Bushehri, Maroua Ben Atti, Gabriela Nicolescu, Alejandro Quintero

    Published 2025-01-01
    “…Intrusion Detection (ID) faces multiple challenges, including the diversity of intrusion types and the risk of false positives and negatives. In an edge computing context, resource constraints further complicate the process, particularly during the training phase, which is computationally intensive. …”
    Get full text
    Article
  4. 3804

    A Computational Model for Two-Phase Fluid Flow, Chemical Reactions, and Heat Transfer in LAA-SOFC Fuel Cell by Fangzhe Zhou, Yidong Jiang, Yixiang Shi, Alexander Gelfgat

    Published 2025-07-01
    “…Preliminary results of computational modelling of a combined electrochemical, fluid dynamic, and heat transfer processes taking place in a liquid antimony anode (LAA) of a solid oxide fuel cell (SOFC) are reported. …”
    Get full text
    Article
  5. 3805

    INVESTIGATION OF HYDRAULIC OPERATIONAL REGIMES OF CIRCULATING SYSTEM AT THERMAL POWER PLANT OF VOLZHSKY AUTOMOTIVE WORKS USING COMPUTER MODEL by V. V. Dikop, A. V. Bukhtiarov, A. G. Kovalenko, V. V. Kotov, V. A. Kudinov

    Published 2005-02-01
    “…Investigation results of hydraulic operational regimes of a circulating system with the help of a computer model are presented in the paper. The models simulates hydraulic processes by means of an iterated solution of a set of algebraic non-linear equations that is formed while using a graph theory The circulating system is considered as a unit in the model. …”
    Get full text
    Article
  6. 3806

    Carbon Footprint Analysis Model of Computer-aided Translation Products in China: A Perspective From Life Cycle Assessment by Hong Xie

    Published 2025-08-01
    “…The modeling findings reveal that the stage of data processing of CAT products presents the lowest sensitivity, while the usage stage of CAT products showcases the highest sensitivity. …”
    Get full text
    Article
  7. 3807
  8. 3808
  9. 3809
  10. 3810

    Computational analysis of antimicrobial peptides targeting key receptors in infection-related cardiovascular diseases: molecular docking and dynamics insights by Doni Dermawan, Nasser Alotaiq

    Published 2025-03-01
    “…Antimicrobial peptides (AMPs) show the potential to disrupt pathogenic processes and offer a promising approach to CVD treatment. …”
    Get full text
    Article
  11. 3811

    Computational inference of co-regulatory modules from transcription factors, MicroRNAs, and their targets using CanMod2 by Ziynet Nesibe Kesimoglu, Jubair Ibn Malik Rifat, Serdar Bozdag

    Published 2025-04-01
    “…Here, we propose a computational pipeline, CanMod2, which infers modules of TFs, miRNAs, and their co-regulatory targets that are involved in a common biological process. …”
    Get full text
    Article
  12. 3812

    IUPHAR review: Computational Psychiatry 2.0. A new tool for supporting combination therapy of psychopharmacology with neuromodulation in schizophrenia by Hugo Geerts

    Published 2025-05-01
    “…This is based on the assumption that the information processing capacity of the human brain can be represented by a measure of the entropy that quantifies the level of uncertainty associated with the brain processes. …”
    Get full text
    Article
  13. 3813
  14. 3814

    An Integrative Approach to Computational Modelling of the Gene Regulatory Network Controlling Clostridium botulinum Type A1 Toxin Production. by Adaoha E C Ihekwaba, Ivan Mura, John Walshaw, Michael W Peck, Gary C Barker

    Published 2016-11-01
    “…Currently, mathematical models of C. botulinum growth and toxigenesis are largely aimed at risk assessment and do not include explicit genetic information beyond group level but integrate many component processes, such as signalling, membrane permeability and metabolic activity. …”
    Get full text
    Article
  15. 3815

    Computationally unmasking each fatty acyl C=C position in complex lipids by routine LC-MS/MS lipidomics by Leonida M. Lamp, Gosia M. Murawska, Joseph P. Argus, Aaron M. Armando, Radu A. Talmazan, Marlene Pühringer, Evelyn Rampler, Oswald Quehenberger, Edward A. Dennis, Jürgen Hartler

    Published 2025-08-01
    “…Abstract Identifying carbon-carbon double bond (C=C) positions in complex lipids is essential for elucidating physiological and pathological processes. Currently, this is impossible in high-throughput analyses of native lipids without specialized instrumentation that compromises ion yields. …”
    Get full text
    Article
  16. 3816
  17. 3817
  18. 3818

    How adolescents learn to build social bonds: A developmental computational account of social explore-exploit decision-making by Kathy T. Do, Sophie G. Paolizzi, Michael N. Hallquist

    Published 2024-10-01
    “…During adolescence, increased reward sensitivity and greater social flexibility both contribute to healthy social development, yet we lack a clear theory of how these processes interact to support social functioning. Here, we propose synthesizing these two literatures using a computational reinforcement learning framework that recasts how adolescents pursue and learn from social rewards as a social explore-exploit problem. …”
    Get full text
    Article
  19. 3819
  20. 3820

    Integrating computational thinking practices into early childhood education in culturally responsive ways: Insights from research–practice partnership by Jeanne Hubelbank, Mia Dubosarsky, Shakhnoza Kayumova, Tiffany Davis, Nea Sann, Shawn Fortin, Gillian Smith

    Published 2024-12-01
    “…Abstract The study examines the research–practice partnership (RPP) model aimed at co‐constructing and integrating computational thinking (CT) in culturally responsive (CR) ways within early childhood and elementary (PreK‐5) classrooms, focusing on teachers' RPP experiences. …”
    Get full text
    Article