Search alternatives:
processor » processes (Expand Search)
Showing 2,741 - 2,760 results of 30,198 for search '(processor OR process) (computing)', query time: 0.25s Refine Results
  1. 2741

    Anatomic characteristics of the lacrimal sac and adjacent bony structures–a computed tomographic-dacryocystography research by Xin-Han Cui, Yan-Wen Fang, Li-Min Zhang, Ji-Ni Qiu, Chao-Ran Zhang, Yan Wang

    Published 2025-02-01
    “…Horizontally, the junction between the maxillary bone and the lacrimal bone (MB-LB) was close to, mostly (60.2%) posterior to, the lacrimal sac. The uncinate process was more frequently attached to the lacrimal bones (75.1%). …”
    Get full text
    Article
  2. 2742
  3. 2743

    Harnessing advanced computational approaches to design novel antimicrobial peptides against intracellular bacterial infections by Yanpeng Fang, Duoyang Fan, Bin Feng, Yingli Zhu, Ruyan Xie, Xiaorong Tan, Qianhui Liu, Jie Dong, Wenbin Zeng

    Published 2025-08-01
    “…This study presents a novel computational framework for efficiently screening candidate peptides against these infections. …”
    Get full text
    Article
  4. 2744
  5. 2745
  6. 2746

    Advances in Multi-Source Navigation Data Fusion Processing Methods by Xiaping Ma, Peimin Zhou, Xiaoxing He

    Published 2025-04-01
    “…In the future, with the widespread adoption of technologies such as 5G, the Internet of Things, and edge computing, multi-source navigation data fusion is expected to evolve towards real-time processing, intelligence, and distributed systems. …”
    Get full text
    Article
  7. 2747
  8. 2748

    OPTIMIZATION OF TOPOLOGICAL STRUCTURES OF CENTRALIZED LOGISTICS NETWORKS IN THE PROCESS OF REENGINEERING by Vladimir Beskorovainyi, Antonii Sudik

    Published 2021-03-01
    “…The purpose of the work is to create a mathematical model and methods for solving problems of optimization of topological structures of centralized logistics networks in the process of reengineering, taking into account many topological and functional constraints. …”
    Get full text
    Article
  9. 2749
  10. 2750
  11. 2751
  12. 2752

    Design and validation for a remote attestation security protocol by WANG Dan, WEI Jin-feng, ZHOU Xiao-dong

    Published 2009-01-01
    “…By analyzing current remote attestation model, an improved remote attestation model was provided and de-signed.In order to verify whether it conforms to security requirement, a formal analysis method CSP was used to analyze the protocol and model it with CSP method.Meanwhile, it was checked with FDR tool.A loophole of the protocol was found.For solving the problem, an improvement to the protocol was made.It has been verified that security properties can be guaranteed by the re-validate.This protocol can be used for the remote attestation in trust computing and it can ensure the secrecy, integrity, authentication and freshmen in the interoperation process of the protocol.…”
    Get full text
    Article
  13. 2753

    Ionic-electronic photodetector for vision assistance with in-sensor image processing by Zhipeng Zhong, Yezhao Zhuang, Xin Cheng, Jingtao Zheng, Qianyi Yang, Xiang Li, Yan Chen, Hong Shen, Tie Lin, Wu Shi, Xiangjian Meng, Junhao Chu, Hai Huang, Jianlu Wang

    Published 2025-08-01
    “…Artificial photodetectors attempt to mimic vision but often require complex processing to overcome these limitations. Thus, developing photodetectors that complement human vision is crucial to overcoming these limitations. …”
    Get full text
    Article
  14. 2754

    Exploration and Practice of Cloud Platform About Supporting Telecom Operators Intensive Management by Jingwei Yang, Lin Hu, Jinling Li, Zhiyong Liu

    Published 2013-08-01
    “…One solution was presented that telecom operators can achieve whole network resource intensive management by building centralized and unified cloud platform.Some problems were analyzed in detail and further resolved when bringing into and managing resource.The unified management,unified dispatch and unified presentation of resource by decentralization of authority and domain can be achieved,automatic opening of service by means of process connection can be achieved.The usage and use efficiency of monitored resource were also discussed combined with the actual application in cloud computer platform,which can provide evidence for intensive usage of resource.…”
    Get full text
    Article
  15. 2755

    Spin coupling is all you need: Encoding strong electron correlation in molecules on quantum computers by Daniel Marti-Dafcik, Hugh G. A. Burton, David P. Tew

    Published 2025-02-01
    “…The performance of quantum algorithms for eigenvalue problems, such as computing Hamiltonian spectra, depends strongly on the overlap of the initial wave function and the target eigenvector. …”
    Get full text
    Article
  16. 2756
  17. 2757
  18. 2758

    Design of OpenFOAM mesh generation client software based on C/S architecture by Zhang Zhida, Huai Xiaoyong, Gao Ruochen

    Published 2022-02-01
    “…To meet the requirements of human-computer interaction of OpenFOAM deployed in the cloud GUI, this paper designs and implements an OpenFOAM mesh generation client software. …”
    Get full text
    Article
  19. 2759

    TPCM-based trusted PXE boot method for servers by Guojie LIU, Jianbiao ZHANG

    Published 2020-12-01
    “…The PXE startup mechanism downloads operating system files through the network and starts the operating system,which is widely used in server network startup.It is widely used in server network startup.The PXE boot process is secured and trusted through trusted computing technology to prevent the PXE boot file from being tampered with maliciously,ensuring the safe and reliable operation of the server.The cyber security classified protection standard requires that the system boot program and system program of the server device be trusted and verified based on the trusted root.A TPCM-based server trusted PXE boot method based on the requirements of classified protection standard was proposed to ensure the security and trust of the server's BIOS firmware,PXE bootfiles,and Linux system files.When the server performs PXE boot,TPCM measured BIOS firmware,BIOS boot environment measured PXE boot files,and PXE boot environment measured Linux system files.Taking TPCM as the root of trust,one level of measurement,one level of trust,and a chain of trust were established to achieve a trusted server operating environment.The proposed method was tested on a domestically-controlled,self-controllable Shenwei server.The experimental results show that the proposed method is feasible.…”
    Get full text
    Article
  20. 2760

    Rehabilitation and Motion Symmetry Analysis With a TACX Smart Cycling Trainer Using Computational Intelligence by Hana Charvatova, Daniel Martynek, Alexandra Molcanova, Ales Prochazka

    Published 2025-01-01
    “…In general, the paper presents selected processing methods and experimental results pointing to the effectiveness of computational intelligence in motion analysis.…”
    Get full text
    Article