Search alternatives:
processor » process (Expand Search)
processes » process (Expand Search)
Showing 1,681 - 1,700 results of 30,198 for search '(processor OR processes) (computing)', query time: 0.28s Refine Results
  1. 1681

    Computational epitope-based vaccine design with bioinformatics approach; a review by Esmaeil Roohparvar Basmenj, Susan Radman Pajhouh, Afsane Ebrahimi Fallah, Rafe naijian, Elmira Rahimi, Hossein Atighy, Shadan Ghiabi, Shamim Ghiabi

    Published 2025-01-01
    “…It is widely recognized that the vaccine design process is traditionally both time-consuming and costly. …”
    Get full text
    Article
  2. 1682
  3. 1683

    Accelerating and Compressing Transformer-Based PLMs for Enhanced Comprehension of Computer Terminology by Jian Peng, Kai Zhong

    Published 2024-10-01
    “…However, the vast size and computational demands of transformer-based PLMs present challenges, particularly regarding storage efficiency and processing speed. …”
    Get full text
    Article
  4. 1684

    Computer aided photographic memory enhancement and speed reading (case study) by Baghdad Science Journal

    Published 2014-06-01
    “…This work aimed to design and testing of a computer program – based eyeQ improvement, photographic memory enhancement, and speed reading to match the reading speed 150 – 250 word per minute (WPM) with the mind ability of processing and eye snap shooting 5000WPM . …”
    Get full text
    Article
  5. 1685

    Robotic optimization of powdered beverages leveraging computer vision and Bayesian optimization by Emilia Szymańska, Emilia Szymańska, Josie Hughes

    Published 2025-06-01
    “…By leveraging Bayesian Optimization and image analysis, the robot explores the parameter space to identify the ideal conditions for producing cappuccino with high foam quality. A computer vision-based feedback loop further improves the beverage by mimicking human-like corrections in preparation process. …”
    Get full text
    Article
  6. 1686
  7. 1687

    Modeling Viral Capsid Assembly: A Review of Computational Strategies and Applications by Wenhan Guo, Esther Alarcon, Jason E. Sanchez, Chuan Xiao, Lin Li

    Published 2024-12-01
    “…Each of these techniques offers unique advantages, and by integrating these diverse computational strategies, researchers can more accurately model the dynamic behaviors and structural features of viral capsids, deepening our understanding of the assembly process. …”
    Get full text
    Article
  8. 1688
  9. 1689
  10. 1690
  11. 1691

    Algorithm for Computationally Efficient Imaging of Sound Speed in Conventional Ultrasound Sonography by Piotr KARWAT

    Published 2023-10-01
    “…They differ in terms of input data requirements, computational complexity, imaging quality, and the potential for signal analysis at the intermediate stages of processing. …”
    Get full text
    Article
  12. 1692

    Optimal iodine staining of cardiac tissue for X-ray computed tomography. by Timothy D Butters, Simon J Castro, Tristan Lowe, Yanmin Zhang, Ming Lei, Philip J Withers, Henggui Zhang

    Published 2014-01-01
    “…X-ray computed tomography (XCT) has been shown to be an effective imaging technique for a variety of materials. …”
    Get full text
    Article
  13. 1693

    The Need and Possibility of Bilingual Teaching of Computer Science in Universities of the Republic of Tuva by Dolana O. Kuular

    Published 2025-07-01
    “…Barkhatova in developing tools and methods for bilingual education in computer science. A set of complementary research methods was also used: theoretical (analysis of sources on the research problem, specification of data, generalization of psychological and pedagogical literature, comparison of data, deduction, substantive interpretation, analysis of results) and empirical (questionnaires, testing, processing and analysis of the obtained results).Results. …”
    Get full text
    Article
  14. 1694
  15. 1695
  16. 1696
  17. 1697

    Influence of studying in higher educational establishment on students’ harmful computer habits by M.D. Kudryavtsev, I.E. Kramida, S.S. Iermakov

    Published 2016-10-01
    “…Purpose: to determine influence of educational process on prevalence of students’ harmful computer habits. …”
    Get full text
    Article
  18. 1698

    Analysis of Conti Ransomware Attack on Computer Network with Live Forensic Method by Rusydi Umar, Imam Riadi, Ridho Surya Kusuma

    Published 2021-06-01
    “…This study analyzes the Conti virus attack through a network forensic process based on network behavior logs. The research process consists of three stages, the first stage is simulating attacks on the host computer, the second stage is carrying network forensics by using live forensics methods, and the third stage is analysing malware by using statistical and dynamic analysis. …”
    Get full text
    Article
  19. 1699

    A Novel Method and Application for Route Choiceof Computer Interlocking Protection by TANG Bin, ZHANG Datao

    Published 2015-01-01
    “…Aiming at the existing problem of route choice in traditional computer interlocking protection, a new route choice methodwas proposed. …”
    Get full text
    Article
  20. 1700

    Modeling diffusive search by non-adaptive sperm: Empirical and computational insights. by Benjamin M Brisard, Kylie D Cashwell, Stephanie M Stewart, Logan M Harrison, Aidan C Charles, Chelsea V Dennis, Ivie R Henslee, Ethan L Carrow, Heather A Belcher, Debajit Bhowmick, Paul W Vos, Maciej Majka, Martin Bier, David M Hart, Cameron A Schmidt

    Published 2025-04-01
    “…In this report, we reframe the physiological function of sperm as a collective diffusive search process and develop multi-scale computational models to explore the causal dynamics that constrain sperm fitness during fertilization. …”
    Get full text
    Article