Showing 641 - 660 results of 1,299 for search 'face computational algorithms', query time: 0.08s Refine Results
  1. 641
  2. 642
  3. 643
  4. 644
  5. 645

    Prediction of amphipathic helix-membrane interactions with Rosetta. by Alican Gulsevin, Jens Meiler

    Published 2021-03-01
    “…Amphipathic helices have hydrophobic and hydrophilic/charged residues situated on opposite faces of the helix. They can anchor peripheral membrane proteins to the membrane, be attached to integral membrane proteins, or exist as independent peptides. …”
    Get full text
    Article
  6. 646
  7. 647

    ScITree: Scalable Bayesian inference of transmission tree from epidemiological and genomic data. by Hannah Waddel, Katia Koelle, Max S Y Lau

    Published 2025-06-01
    “…However, the Lau method faces major computational bottlenecks. As the volume of genomic data collected during outbreaks continues to grow, it is crucial to develop scalable yet accurate phylodynamic methods. …”
    Get full text
    Article
  8. 648
  9. 649

    Analysis of mutations in precision oncology using the automated, accurate, and user-friendly web tool PredictONCO by Rayyan Tariq Khan, Petra Pokorna, Jan Stourac, Simeon Borko, Adam Dobias, Joan Planas-Iglesias, Stanislav Mazurenko, Ihor Arefiev, Gaspar Pinto, Veronika Szotkowska, Jaroslav Sterba, Jiri Damborsky, Ondrej Slaby, David Bednar

    Published 2024-12-01
    “…Next-generation sequencing technology has created many new opportunities for clinical diagnostics, but it faces the challenge of functional annotation of identified mutations. …”
    Get full text
    Article
  10. 650
  11. 651
  12. 652
  13. 653
  14. 654

    SAFE-CAST: secure AI-federated enumeration for clustering-based automated surveillance and trust in machine-to-machine communication by Yusuf Kursat Tuncel, Kasım Öztoprak

    Published 2025-01-01
    “…Machine-to-machine (M2M) communication within the Internet of Things (IoT) faces increasing security and efficiency challenges as networks proliferate. …”
    Get full text
    Article
  15. 655
  16. 656

    SA3C-ID: a novel network intrusion detection model using feature selection and adversarial training by Wanwei Huang, Haobin Tian, Lei Wang, Sunan Wang, Kun Wang, Songze Li

    Published 2025-07-01
    “…With the continuous proliferation of emerging technologies such as cloud computing, 5G networks, and the Internet of Things, the field of cybersecurity is facing an increasing number of complex challenges. …”
    Get full text
    Article
  17. 657
  18. 658
  19. 659
  20. 660

    An Approach to Enable Human–3D Object Interaction Through Voice Commands in an Immersive Virtual Environment by Alessio Catalfamo, Antonio Celesti, Maria Fazio, A. F. M. Saifuddin Saif, Yu-Sheng Lin, Edelberto Franco Silva, Massimo Villari

    Published 2025-07-01
    “…Nowadays, the Metaverse is facing many challenges. In this context, Virtual Reality (VR) applications allowing voice-based human–3D object interactions are limited due to the current hardware/software limitations. …”
    Get full text
    Article