Search alternatives:
processor » processes (Expand Search)
Showing 3,021 - 3,040 results of 30,198 for search '(processor OR process) (computing)', query time: 0.26s Refine Results
  1. 3021
  2. 3022
  3. 3023
  4. 3024

    MUSIC-COMPUTER TECHNOLOGY SOUND RECORDING ENRICHES STUDENTS' MUSIC KNOWLEDGE AND SKILLS IN AN EXTRACURRICULAR LEARNING ENVIRONMENT by M. Velikova, T. Radev

    Published 2023-06-01
    “…It’s necessary that the approach and forms of the structure of the learning process to stimulate students’ development to the maximum extent. …”
    Get full text
    Article
  5. 3025

    Study on the Fracture Evolution Law of Coal Based on Image Retrieval Method and X-Ray Computed Tomography by Yan Wu, Dengke Wang, Xiaofei Pang, Hang Zhang

    Published 2022-01-01
    “…The combination of real-time computed tomography (CT) scanning test and loading test can visualize the evolution process of defects such as internal pores and fissures in the coal. …”
    Get full text
    Article
  6. 3026

    Computation of Wiener and Wiener Polarity Indices of a Class of Nanostar Dendrimer Using Vertex Weighted Graphs by Syed Ahtsham Ul Haq Bokhary, Pakeeza Bashir, Allah Nawaz, Shreefa O. Hilali, Mohammed Alhagyan, Ameni Gargouri, Mohammed M. A. Almazah

    Published 2024-01-01
    “…They are built in a step-by-step, controlled synthesis process, with each layer or generation building on the previous one. …”
    Get full text
    Article
  7. 3027

    Mapping the public understanding of computational thinking education: Insights from social Q&A platform discussions by Stella Xin Yin, Dion Hoe-Lian Goh, Choon Lang Quek, Zhengyuan Liu

    Published 2025-04-01
    “…With the growing popularity of computational thinking (CT) classes in K-12 schools, it is important to investigate public perceptions of these initiatives. …”
    Get full text
    Article
  8. 3028

    THE ATTITUDES OF TEACHERS AND SPECIAL EDUCATORS TOWARDS THE USE OF COMPUTERS AND MODERN TECHNOLOGY IN TEACHING CHILDREN WITH DEVELOPMENTAL DISABILITIES by Aleksandra Bašić, Dragana Maćešić Pterović, Bojana Arsić

    Published 2025-07-01
    “…Subject-teachers who had experience with children with ASD had less interest (t = -2.14, p <0.05) and less confidence in the usefulness of computers (t = -2.54, p <0.05). In general, attitudes of all sample groups were positive, when it comes to computer use with children with disabilities. …”
    Get full text
    Article
  9. 3029

    Inferences for Skew-Wiener Degradation Model: Approximate Bayesian Computation via Gibbs-Step and Model Selection by Isyaku Muhammad, Mustapha Muhammad, Ren Aihua, Aiqiang Zhang

    Published 2025-01-01
    “…The Skew-Wiener Degradation (SKWD) model presents a novel approach for addressing unit-to-unit variability in degradation processes by integrating the skew-normal distribution into the Wiener process. …”
    Get full text
    Article
  10. 3030

    Prioritizing simulation-based stress tests to assess the resilience of transport systems: a computation-free methodology by Hossein Nasrazadani, Maria Nogal, Bryan T. Adey, Stergios A. Mitoulis

    Published 2025-04-01
    “…It enables infrastructure managers to efficiently screen and rank stress tests, optimizing the selection process to maximize insights into system resilience while minimizing computational demands. …”
    Get full text
    Article
  11. 3031

    From imaging to computational domains for physics-driven molecular biology simulations: Hindered diffusion in platelet masses. by Catherine House, Ziyi Huang, Kaushik N Shankar, Sandra J Young, Meghan E Roberts, Scott L Diamond, Maurizio Tomaiuolo, Timothy J Stalker, Lu Lu, Talid Sinno

    Published 2025-07-01
    “…This process constitutes a computational pipeline that combines purely data-derived biological domains with physics-driven simulations to estimate how molecular movement is hindered in a hemostatic platelet mass. …”
    Get full text
    Article
  12. 3032

    Analytical and Computational Investigations of Stochastic Functional Integral Equations: Solution Existence and Euler–Karhunen–Loève Simulation by Manochehr Kazemi, AliReza Yaghoobnia, Behrouz Parsa Moghaddam, Alexandra Galhano

    Published 2025-01-01
    “…Additionally, this paper introduces the Euler–Karhunen–Loève method, which utilizes the Karhunen–Loève expansion to represent stochastic processes, particularly suited for handling continuous-time processes with an infinite number of random variables. …”
    Get full text
    Article
  13. 3033

    Exploration of computational method for far-field aerodynamic noise from bogie zone of high-speed train by ZHANG Hongjun, WANG Zhonghui, XU Yumin, GAO Yang, WANG Yigang, ZHU Langxian

    Published 2024-05-01
    “…This assumption led to the establishment of an identification method, which was then used to identify sound sources in the bogie zone, with the support of Computational Fluid Dynamics (CFD). Through this identification process, the main dipole aerodynamic sources were found to be located near the walls of 11 components within the bogie zone, including cow catchers and front wheels. …”
    Get full text
    Article
  14. 3034

    Visceral and Vascular Imaging Findings of Hypovolemic Shock in Contrast-enhanced Computed Tomography: A Case Report by Vaishali Bodhraj Dhawan, Rakshanda Pravin Agrawal, Gahana Kataria

    Published 2025-01-01
    “…Imaging can play an important role in this process. Certain identifiable features on Contrast-enhanced Computed Tomography (CECT) may alert radiologists to the presence of Hypovolemic Shock (HS). …”
    Get full text
    Article
  15. 3035

    Comprehensive Framework for Collaborative Decision-Making in Evaluating Computer Network Security Using Interval Neutrosophic Information by Wenbao Qiao

    Published 2025-02-01
    “…Computer network security (CNS) evaluation is crucial for protecting information assets and maintaining the stable operation of network systems. …”
    Get full text
    Article
  16. 3036

    Integrated Computational Approach to Rational Drug Design Targeting SIK2/3: From Theory to Practice by Eid Youssef Eid Rashed, Alisa Gorislav

    Published 2024-11-01
    “…By bridging computational predictions with experimental validation, this approach not only accelerates the drug discovery process but also increases the likelihood of identifying clinically relevant compounds. …”
    Get full text
    Article
  17. 3037

    Systematic Literature Review of the Use of Computational Intelligence in the Routing and Spectrum Assignment Problem in Elastic Optical Networks by Renan V. B. Carvalho, Henrique A. Dinarte, Raul C. Almeida Jr., Carmelo J. A. Bastos-Filho

    Published 2025-04-01
    “…In EONs, connections must have a route and a spectrum slice available between the nodes to establish communication. The process associated with this task is named routing and spectrum allocation (RSA) problem. …”
    Get full text
    Article
  18. 3038
  19. 3039

    Towards Seamless Human–Robot Interaction: Integrating Computer Vision for Tool Handover and Gesture-Based Control by Branislav Malobický, Marián Hruboš, Júlia Kafková, Jakub Krško, Mário Michálik, Rastislav Pirník, Pavol Kuchár

    Published 2025-03-01
    “…By integrating real-time computer vision into the robot’s decision-making process, the system demonstrates heightened adaptability and responsiveness, creating the way for more natural and effective human–robot collaboration in industrial contexts.…”
    Get full text
    Article
  20. 3040

    A Complementary Approach for Securing and Anti-Counterfeiting of Valuable Documents Based on Encryption of Computer-Generated Hologram by Zakaria E. Ahmed, Rania M. Abdelazeem, Yasser A. Attia, Tawfik A. Khattab, Claas Falldorf, Ralf B. Bergmann, Mostafa Agour

    Published 2025-04-01
    “…The generated CGH is then secured by binary phase randomization, which is implemented using the symmetric encryption technique, exclusive OR (XOR). The reconstruction process for the calculated secured CGHs varied slightly depending on whether the documents were digital or physical. …”
    Get full text
    Article