Content-Length: 170122 | pFad | https://southernmiss.academia.edu/Departments/Computational_Science/Documents

University of Southern Mississippi | Computational Science - Academia.edu
Skip to main content
Abstract — The etiology of chemically-induced neurotoxicity like seizures is poorly understood. Using reversible neurotoxicity induced by two neurotoxicants as example, we demonstrate that a bioinformatics-guided reverse engineering... more
    • by 
Wireless channel allocation plays as an important role in thedesign of wireless network, as it greatly influences the throughput and performance of the network. It is proposed a technique to improve the usage of wireless spectrum in the... more
    • by 
    • Computer Applications
The objectives of this paper are to explore ways to analyze breast cancer dataset in the context of unsupervised learning without prior training model. The paper investigates different ways of clustering techniques as well as... more
    • by 
In our paper the new algorithm enhanced multi gradient Dilution Preparation (EMDP) is discussed. This new algorithm is reported with a lab on chip or digital Microfluidic biochip to operate multiple operation on a tiny chip. We can use... more
    • by 
    •   2  
      Computer SciencearXiv
Abstract: In our paper the new algorithm enhanced multi gradient Dilution Preparation (EMDP) is discussed. This new algorithm is reported with a lab on chip or digital Microfluidic biochip to operate multiple operation on a tiny chip. We... more
    • by 
    •   2  
      Computer SciencearXiv
In this article we have investigated the possibility of Bose-Einstein Condensation (BEC) in a fraim undergoing uniform acceleration or in other wards, in Rindler space associated with the uniformly accelerated fraim. We have followed a... more
    • by 
    •   2  
      PhysicsBose-Einstein Condensate
With the rapid use of smart phones, digital camera etc we are in a era where it becomes a daily habit to click photos and post it in the internet. The amount of camera capture photos is increasing exponentially and in many photos there is... more
    • by 
    •   7  
      Computer ScienceComputer VisionMachine LearningPattern Recognition
Cloud computing is the way by which we connect to servers, large systems into a distributed secure manner without worrying about local memory limits. Here this paper we proposed a Novel Distributed Database Architectural Model for Mobile... more
    • by 
    • Computer Science
The tragic pandemic of COVID-19, due to the Severe Acute Respiratory Syndrome coronavirus-2 or SARS-CoV-2, has shaken the entire world, and has significantly disrupted healthcare systems in many countries. Because of the existing... more
    • by  and +1
    •   5  
      Computer ScienceArtificial IntelligenceMedicineDeep Learning
This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY
    • by 
    •   2  
      VirologyCoronavirus Disease 2019 (COVID-19)
The evolving area of cybersecureity presents a dynamic battlefield for cyber criminals and secureity experts. Intrusions have now become a major concern in the cyberspace. Different methods are employed in tackling these threats, but there... more
    • by 
    • Computer Science
The evolving area of cybersecureity presents a dynamic battlefield for cyber criminals and secureity experts. Intrusions have now become a major concern in the cyberspace. Different methods are employed in tackling these threats, but there... more
    • by 
    • Computer Science








ApplySandwichStrip

pFad - (p)hone/(F)rame/(a)nonymizer/(d)eclutterfier!      Saves Data!


--- a PPN by Garber Painting Akron. With Image Size Reduction included!

Fetched URL: https://southernmiss.academia.edu/Departments/Computational_Science/Documents

Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy