Showing 1,461 - 1,480 results of 28,739 for search '"computability"', query time: 0.11s Refine Results
  1. 1461
  2. 1462
  3. 1463
  4. 1464

    Moroccan natural products for multitarget-based treatment of Alzheimer's disease: A computational study. by Fatima Zahra Guerguer, Amal Bouribab, El Mehdi Karim, Meriem Khedraoui, Fatiha Amegrissi, Yasir S Raouf, Abdelouahid Samadi, Samir Chtita

    Published 2025-01-01
    “…This study investigates the potential of phytochemical compounds from Moroccan medicinal plants as multi-target agents against Alzheimer's disease, employing computational approaches. A virtual screening of 386 phytochemical compounds, followed by an assessment of pharmacokinetic properties and ADMET profiles, led to the identification of two promising compounds, naringenin (C23) and hesperetin (C24), derived from Anabasis aretioides. …”
    Get full text
    Article
  5. 1465

    Experimental and computational investigation of the effect of machining parameters on the turning process of C45 steel by Tien-Thinh Le, Hang Thi Pham, Hiep Khac Doan, Panagiotis G. Asteris

    Published 2025-02-01
    “…The validity of the computational results was confirmed by comparing them with experimental findings on chip morphology and temperature rise during cutting. …”
    Get full text
    Article
  6. 1466
  7. 1467
  8. 1468

    Two-Step Root-MUSIC for Direction of Arrival Estimation without EVD/SVD Computation by Feng-Gang Yan, Shuai Liu, Jun Wang, Ming Jin

    Published 2018-01-01
    “…Most popular techniques for super-resolution direction of arrival (DOA) estimation rely on an eigen-decomposition (EVD) or a singular value decomposition (SVD) computation to determine the signal/noise subspace, which is computationally expensive for real-time applications. …”
    Get full text
    Article
  9. 1469
  10. 1470

    Efficient Computation of Shortest Paths in Networks Using Particle Swarm Optimization and Noising Metaheuristics by Ammar W. Mohemmed, Nirod Chandra Sahoo

    Published 2007-01-01
    “…Simulation results on several networks with random topologies are used to illustrate the efficiency of the proposed hybrid algorithm for shortest-path computation. The proposed algorithm can be used as a platform for solving other NP-hard SPPs.…”
    Get full text
    Article
  11. 1471

    Hardware-efficient preparation of architecture-specific graph states on near-term quantum computers by Sebastian Brandhofer, Ilia Polian, Stefanie Barz, Daniel Bhatti

    Published 2025-01-01
    “…Abstract Highly entangled quantum states are an ingredient in numerous applications in quantum computing. However, preparing these highly entangled quantum states on currently available quantum computers at high fidelity is limited by ubiquitous errors. …”
    Get full text
    Article
  12. 1472
  13. 1473

    Hardware Architecture for Real-Time Computation of Image Component Feature Descriptors on a FPGA by Abdul Waheed Malik, Benny Thörnberg, Muhammad Imran, Najeem Lawal

    Published 2014-01-01
    “…This paper describes a hardware architecture for real-time image component labeling and the computation of image component feature descriptors. …”
    Get full text
    Article
  14. 1474

    Indications for Laparotomy in Patients with Abdominal Penetrating Injuries Presenting with Ambiguous Computed Tomography Findings by Eun Ji Choi, Sanghee Choi, Byung Hee Kang

    Published 2021-06-01
    “…Purpose Negative laparotomy in patients with abdominal penetrating injuries (APIs) is associated with deleterious outcomes and unnecessary expense; however, the indications for laparotomy in hemodynamically stable patients with ambiguous computed tomography (CT) findings remain unclear. This study aimed to identify the factors associated with negative laparotomy. findings Methods Data of patients who underwent laparotomy for APIs between 2011 and 2019 were retrospectively reviewed. …”
    Get full text
    Article
  15. 1475
  16. 1476
  17. 1477
  18. 1478

    Unilateral Fusion of Maxillary Lateral Incisor: Diagnosis Using Cone Beam Computed Tomography by Iury Oliveira Castro, Carlos Estrela, Vinícius Rezende Souza, Lawrence Gonzaga Lopes, João Batista de Souza

    Published 2014-01-01
    “…To report a case of right maxillary lateral incisor fusion and a supernumerary tooth, the anatomy of the root canal and dental united portion were assessed by cone beam computed tomography (CBCT). Results. The clinical examination showed dental juxtaposition with the absence of interdental papilla and esthetic impairment in the right maxillary lateral incisor region. …”
    Get full text
    Article
  19. 1479
  20. 1480

    Computer Deep Learning Network Security Vulnerability Detection Based on Virtual Reality Technology by Xiaokun Zheng

    Published 2022-01-01
    “…In order to detect the computer network security technology vulnerabilities due to various factors, the normal operation of the computer network must be ensured, the user’s confidential information must be protected, and it is proposed that the analysis and research on security vulnerability detection must be strengthened. …”
    Get full text
    Article