Results 51 to 60 of about 3,158,886 (321)

Bit-Table Based Biclustering and Frequent Closed Itemset Mining in High-Dimensional Binary Data

open access: yesThe Scientific World Journal, 2014
During the last decade various algorithms have been developed and proposed for discovering overlapping clusters in high-dimensional data. The two most prominent application fields in this research, proposed independently, are frequent itemset mining ...
András Király   +2 more
doaj   +1 more source

Development of a Cluster with Cloud Computing Based on Neural Networks With Deep Learning for Modeling Multidimensional Fields

open access: yesКібернетика та комп'ютерні технології, 2021
Introduction. The modeling of multidimensional fields on multiprocessors, with a neural network architecture, which is rebuilt in the process of solving the problem by means of deep learning, is considered.
Mykola Kosovets, Lilia Tovstenko
doaj   +1 more source

Enacting Coordination Processes [PDF]

open access: yesarXiv, 2020
With the rise of data-centric process management paradigms, interdependent processes, such as artifacts or object lifecycles, form a business process through their interactions. Coordination processes may be used to coordinate these interactions, guiding the overall business process towards a meaningful goal.
arxiv  

Cloud/fog computing resource management and pricing for blockchain networks

open access: yes, 2018
The mining process in blockchain requires solving a proof-of-work puzzle, which is resource expensive to implement in mobile devices due to the high computing power and energy needed.
Feng, Shaohan   +5 more
core   +1 more source

Comparison of kinship‐identification methods for robust stock assessment using close‐kin mark–recapture data for Pacific bluefin tuna

open access: yesPopulation Ecology, EarlyView.
In this study, we compared three methods for kinship identification using different algorithms in samples of wild Pacific bluefin tuna and generated genotyping data. The three methods resulted in different numbers of inferred kinship pairs for both generated and actual data. Particularly for the half‐sibling pairs, considerable number of false‐positive
Yohei Tsukahara   +5 more
wiley   +1 more source

Machining process parameters optimization using soft computing technique

open access: yesJournal of Engineering and Applied Science, 2023
This work introduces an approach for optimization machinability measures of power consumption, machining time, and the surface roughness (PMS). This approach is starting with market customer’s demands, passing by optimizing the machinability measures ...
Tarek M. El Hossainy   +2 more
doaj   +1 more source

Insights into the renal pathophysiology in Hermansky‐Pudlak syndrome‐1 from urinary extracellular vesicle proteomics and a new mouse model

open access: yesFEBS Letters, EarlyView.
Hermansky‐Pudlak syndrome type 1 (HPS‐1) is a rare, autosomal recessive disorder with poorly understood renal involvement. Urinary extracellular vesicle (uEV) proteomics and a novel Hps1 mouse model reveal mitochondrial abnormalities and lipid accumulation in HPS‐1 kidney proximal tubule cells. Serum ApoA1 correlates with kidney function in our patient
Dawn M. Maynard   +7 more
wiley   +1 more source

Computing within the 2021 Snowmass process [PDF]

open access: yesEPJ Web of Conferences
We present different elements of the 2021–2022 Computational Frontier (CompF) effort within the Snowmass process, including organization, events, and highlights of the final report [1].
Elvira V. Daniel
doaj   +1 more source

Analysis of Green Computing Strategy in University: Analytic Network Process (ANP) Approach [PDF]

open access: yes, 2010
Strengths, Weaknesses, Opportunities and Threats (SWOT) analysis do not provide an analytical means to determine the importance of the identified factors of green computing strategy and implementation. Although the SWOT analysis successfully explores the
Jati, Handaru
core  

Quantum picturalism for topological cluster-state computing

open access: yes, 2020
Topological quantum computing is a way of allowing precise quantum computations to run on noisy and imperfect hardware. One implementation uses surface codes created by forming defects in a highly-entangled cluster state.
Abramsky S   +15 more
core   +1 more source

Home - About - Disclaimer - Privacy