Results 51 to 60 of about 2,519,267 (345)
Primitive computations in speech processing [PDF]
Previous research suggests that artificial-language learners exposed to quasi-continuous speech can learn that the first and the last syllables of words have to belong to distinct classes (e.g., Endress & Bonatti, 2007; Peña, Bonatti, Nespor, & Mehler, 2002). The mechanisms of these generalizations, however, are debated.
Endress, A., Mehler, J.
openaire +2 more sources
Atovaquone is an antimalarial requiring potentiation for sufficient efficacy. We pursued strategies to enhance its activity, showing that 4‐nitrobenzoate inhibits 4‐hydroxybenzoate polyprenyltransferase, decreasing ubiquinone biosynthesis. Since atovaquone competes with ubiquinol in mitochondria, 4‐nitrobenzoate facilitates its action, potentiating ...
Ignasi Bofill Verdaguer +7 more
wiley +1 more source
Machining process parameters optimization using soft computing technique
This work introduces an approach for optimization machinability measures of power consumption, machining time, and the surface roughness (PMS). This approach is starting with market customer’s demands, passing by optimizing the machinability measures ...
Tarek M. El Hossainy +2 more
doaj +1 more source
Introduction. The modeling of multidimensional fields on multiprocessors, with a neural network architecture, which is rebuilt in the process of solving the problem by means of deep learning, is considered.
Mykola Kosovets, Lilia Tovstenko
doaj +1 more source
Process-Oriented Parallel Programming with an Application to Data-Intensive Computing [PDF]
We introduce process-oriented programming as a natural extension of object-oriented programming for parallel computing. It is based on the observation that every class of an object-oriented language can be instantiated as a process, accessible via a ...
Givelberg, Edward
core
Privacy-Preserving and Outsourced Multi-User k-Means Clustering [PDF]
Many techniques for privacy-preserving data mining (PPDM) have been investigated over the past decade. Often, the entities involved in the data mining process are end-users or organizations with limited computing and storage resources.
Bertino, Elisa +4 more
core +3 more sources
Cells must clear mislocalized or faulty proteins from membranes to survive. The AAA+ ATPase Msp1 performs this task, but dissecting how its six subunits work together is challenging. We engineered linked dimers with varied numbers of functional subunits to reveal how Msp1 subunits cooperate and use energy to extract proteins from the lipid bilayer ...
Deepika Gaur +5 more
wiley +1 more source
Computing within the 2021 Snowmass process [PDF]
We present different elements of the 2021–2022 Computational Frontier (CompF) effort within the Snowmass process, including organization, events, and highlights of the final report [1].
Elvira V. Daniel
doaj +1 more source
Reservoir Computing Approach to Robust Computation using Unreliable Nanoscale Networks
As we approach the physical limits of CMOS technology, advances in materials science and nanotechnology are making available a variety of unconventional computing substrates that can potentially replace top-down-designed silicon-based computing devices ...
A. Atiya +22 more
core +1 more source
Phototrophs evolved light‐harvesting systems adapted for efficient photon capture in habitats enriched in far‐red radiation. A subset of eukaryotic pigment‐binding proteins can absorb far‐red photons via low‐energy chlorophyll states known as red forms.
Antonello Amelii +8 more
wiley +1 more source

