Showing 13,421 - 13,440 results of 29,852 for search '(process OR processes) (computing)', query time: 0.34s Refine Results
  1. 13421

    Pin Row Loading Analysis of Scraper Conveyor under Oblique Cut Condition by Mao Jun, Tian Song, Chen Hongyue

    Published 2016-01-01
    “…According to the force analysis of roller,the equation set of roller in the process of cutting by three- axis force is derived.Combining the MATLAB programming,the curve of the before and after roller load changing with the rotation angle under the oblique cut condition is obtained.With shearer machine as the research object,the whole machine mechanical equation is listed,the mathematical computing model is established.Based on MATLAB programming,combining with the before and after roller load changing curve under the oblique cut condition,the before and after sliding shoe load curves under the oblique cut condition is obtained.Due the contact relation between the sliding shoe and pin row and the principle of force mutual action,the curve of load acting on the pin rows under the oblique cut condition is achieved.And through the ANSYS Workbench simulation analysis,the stress distribution and deformation of pin rows of scraper conveyor are got.A reference for the future of design and analysis of damage causes of scraper conveyor pin row is provided.…”
    Get full text
    Article
  2. 13422

    New provable data transfer from provable data possession and deletion for secure cloud storage by Yudong Liu, Shuai Xiao, Han Wang, Xu An Wang

    Published 2019-04-01
    “…With the continuous and rapid development of cloud computing, it becomes more popular for users to outsource large-scale data files to cloud servers for storage and computation. …”
    Get full text
    Article
  3. 13423

    Hybrid Boson Sampling by Vitaly Kocharovsky

    Published 2024-10-01
    “…We propose boson sampling from a system of coupled photons and Bose–Einstein condensed atoms placed inside a multi-mode cavity as a simulation process testing the quantum advantage of quantum systems over classical computers. …”
    Get full text
    Article
  4. 13424

    Outsourced ciphertext-policy attribute-based encryption with partial policy hidden by Jinxia Yu, Guanghui He, Xixi Yan, Yongli Tang, Rongxia Qin

    Published 2020-05-01
    “…However, how to realize the attribute privacy concerns in the access policy and optimize the heavy computing overhead have been not adequately addressed. …”
    Get full text
    Article
  5. 13425

    Aerosol Distribution Due to Wildfire in Sumatra, Indonesia Considered from Model Simulation by Makiko Nakata, Sonoyo Mukai

    Published 2025-05-01
    “…The results of this study show that the injection process in the model simulations has a significant impact on the aerosol distribution. …”
    Get full text
    Article
  6. 13426

    A Size-Perimeter Discrete Growth Model for Percolation Clusters by Bendegúz Dezső Bak, Tamás Kalmár-Nagy

    Published 2021-01-01
    “…Invasion percolation is a stochastic branching process in which a network of sites is getting occupied that leads to the formation of clusters (group of interconnected, occupied sites). …”
    Get full text
    Article
  7. 13427

    Use of hybrid quantum-classical algorithms for enhancing biomarker classification. by Aninda Astuti, Pin-Keng Shih, Shan-Chih Lee, Venugopala Reddy Mekala, Ezra B Wijaya, Ka-Lok Ng

    Published 2025-01-01
    “…Quantum machine learning (QML) combines quantum computing with machine learning, offering potential for solving intricate problems. …”
    Get full text
    Article
  8. 13428

    Research on enterprise digital transformation: A case study of Alibaba by Zhang Ao

    Published 2024-01-01
    “…According to the research results of this paper, it is suggested that in the future digital transformation process, enterprises should strengthen investment in digital infrastructure and talent training, which is the most fundamental step of digital transformation.…”
    Get full text
    Article
  9. 13429

    Multi-version consolidation method for block-level backup data by WANG Shu-peng 1, WU Guang-jun1, WU Zhi-gang3, YUN Xiao-chun1

    Published 2011-01-01
    “…Historical version backup data query efficiency was dependent on the version chain length in a multi-version backup data storage system.A novel block-level backup data multi-version consolidation method was presented for this problem.Any version of a historical full system snapshot could be generated within the incremental backup data version sequence.Theoretical analysis showed that it could increase the target snapshot version query efficiency significantly in the version chain.A variable-length block version merging algorithm was presented to decrease the computing complex-ity in the process of snapshot version merging,according to the block-level backup data distribution features.Finally,the concrete applications and performance analysis for block-level version consolidation method was also introduced.The simulated experiments results expose that the version consolidation method can eliminate redundant version of backup data with the same version chain length,and it can increase full system recovery efficiency than traditional methods sig-nificantly.…”
    Get full text
    Article
  10. 13430

    Model Building and Simulation of the Electric Brake Energy of Urban Rail Vehicle by 师蔚, 方宇

    Published 2011-01-01
    “…By analyzing conditions that urban rail vehicles in the traction power supply network occur the regenerative braking or resistor braking in electric braking process, and depending on the grouping of vehicles, lines, load, run strategy, operation plans, traction power supply and other basic conditions, based on single vehicle computing model and multi-vehicles power supply network model, electric braking energy distribution model were established and simulation were carried out. …”
    Get full text
    Article
  11. 13431

    TraIL: Pinpoint Trajectory for Indoor Localization by Shengnan Li, Zheng Qin, Chenshu Wu, Zheng Yang

    Published 2015-11-01
    “…Indoor localization on smartphones is an enabler for a number of ubiquitous and mobile computing applications attracting worldwide attentions. …”
    Get full text
    Article
  12. 13432

    Torsion point attacks on ‘SIDH‐like’ cryptosystems by Péter Kutas, Christophe Petit

    Published 2023-03-01
    “…The best‐known protocol following that approach is the supersingular isogeny Diffie–Hellman protocol (SIDH); this protocol was turned into the CCA‐secure key encapsulation mechanism SIKE, which was submitted to and remains in the third round of NIST's post‐quantum standardisation process as an ‘alternate’ candidate. Isogeny‐based cryptography generally relies on the conjectured hardness of computing an isogeny between two isogenous elliptic curves, and most cryptanalytic work referenced on SIKE's webpage exclusively focusses on that problem. …”
    Get full text
    Article
  13. 13433

    Flipping the Classroom for higher Education Learners to Improve Productive and Receptive Skills by Cristina

    Published 2020-01-01
    “…Overall, the results of the study have shown the positive impact of this method on the teaching/learning process in the EFL classes for Tourism students, contributing to their motivation and development of their professional skills.…”
    Get full text
    Article
  14. 13434

    Research on Anti-Interference Performance of Spiking Neural Network Under Network Connection Damage by Yongqiang Zhang, Haijie Pang, Jinlong Ma, Guilei Ma, Xiaoming Zhang, Menghua Man

    Published 2025-02-01
    “…Background: With the development of artificial intelligence, memristors have become an ideal choice to optimize new neural network architectures and improve computing efficiency and energy efficiency due to their combination of storage and computing power. …”
    Get full text
    Article
  15. 13435

    Leveraging Local LLMs for Secure In-System Task Automation With Prompt-Based Agent Classification by Suthir Sriram, C. H. Karthikeya, K. P. Kishore Kumar, Nivethitha Vijayaraj, Thangavel Murugan

    Published 2024-01-01
    “…Every module is has its own function, including file search, document summarization, code interpretation, and general tasks, to make certain that all processing happens locally on the user’s device. …”
    Get full text
    Article
  16. 13436
  17. 13437
  18. 13438

    An information theoretic limit to data amplification by S J Watts, L Crow

    Published 2025-01-01
    “…This is not the only way to amplify data so this process will be referred to as data amplification which is studied using information theoretic concepts. …”
    Get full text
    Article
  19. 13439

    The glass transition temperature investigation of polymers by molecular dynamic simulations by П. Саидахметов, И. Пиянзина, Г. Байман, О. Недопекин, Д. Таюрский

    Published 2023-12-01
    “… In this paper, the process of glass transition is studied, the theory of which is not fully developed. …”
    Get full text
    Article
  20. 13440