Search alternatives:
processor » processes (Expand Search)
Showing 4,961 - 4,980 results of 30,198 for search '(processor OR process) (computing)', query time: 0.28s Refine Results
  1. 4961
  2. 4962

    Characterization and modeling of laser transmission welded polyetherketoneketone (PEKK) joints: Influence of process parameters and annealing on weld properties by Marcela Matus-Aguirre, Benoît Cosson, Christian Garnier, Fabrice Schmidt, André Chateau Akué-Asséko, France Chabert

    Published 2024-11-01
    “…PEKK, being a semi-crystalline thermoplastic, requires additional care during processing due to its propensity to crystallize. This study presents both experimental and numerical investigations into LTW of PEKK molded parts, aiming to understand the influence of welding parameters and crystallinity on weld joint morphology and mechanical properties. …”
    Get full text
    Article
  3. 4963

    Linear and nonlinear multidimensional functional connectivity methods reveal similar networks for semantic processing in EEG/MEG data by Setareh Rahimi, Rebecca L. Jackson, Rebecca L. Jackson, Olaf Hauk

    Published 2025-07-01
    “…IntroductionInvestigating task- and stimulus-dependent connectivity is key to understanding how the interactions between brain regions underpin complex cognitive processes. Yet, the connections identified depend on the assumptions of the connectivity method. …”
    Get full text
    Article
  4. 4964

    Effect of a single ultra processed meal on myocardial endothelial function, adenosine mediated effects and cognitive performances by Yousif A. Lucinian, Christine Gagnon, Élise Latour, Virginie Hamel, Josep Iglesies-Grau, Anil Nigam, Francois Harel, Anna Nozza, Martin Juneau, Jean-Claude Moubarac, Louis Bherer, Matthieu Pelletier-Galarneau

    Published 2025-08-01
    “…This study aimed to evaluate the impact of a single ultra-processed meal on myocardial blood flow (MBF), measured using positron emission tomography/computed tomography (PET/CT), and its effects on cognitive performance. …”
    Get full text
    Article
  5. 4965

    Distributionally robust hybrid energy management in smart mining using process-coupled primal-dual mirror descent by Dawei Wang, Yifei Li, Cheng Gong, Tianle Li, Fang Wang, Shanna Luo, Jun Li

    Published 2025-07-01
    “…Mining safety regulations are integrated via chance constraints, embedding safety-critical margins related to pressure, airflow, and gas concentration. To alleviate the computational burden caused by nested risk formulations, a Primal-Dual Reformulated Distributionally Robust Process Scheduling (PDR-DRPS) algorithm is proposed. …”
    Get full text
    Article
  6. 4966
  7. 4967
  8. 4968

    The effectiveness of endobronchial therapy in patients with chemo-resistant tuberculosis when specific process is localized in the lungs apical segments by V. M. Khlystun

    Published 2017-08-01
    “…Results of the study were processed with modern methods of analysis on a personal computer with using the Statistical Package license software Statistica® for Windows 6.0 (StatSoft Inc., № AXXR712 D833214FAN5). …”
    Get full text
    Article
  9. 4969
  10. 4970

    Ultra-secure quantum protection for e-healthcare images: Hybrid chaotic one-time pad with cipher chaining encryption framework by Roayat Ismail Abdelfatah, Reham Mohamed Elsobky, Salah Aldeen Khamis

    Published 2025-08-01
    “…Abstract Quantum computing introduces major threats to conventional image encryption methods, especially in medical contexts. …”
    Get full text
    Article
  11. 4971

    Design of miner type identification mechanism based on reputation management model by Jiaren YU, Youliang TIAN, Hui LIN

    Published 2022-02-01
    “…In the public mining pool, miners can freely enter the mining pool to submit proof of work to obtain rewards, and there are no conditions to restrict different types of miners.There will be malicious miners submitting invalid workloads and miners not submitting workloads in the mining pool, occupying the verification computing resources of the mining pool, reducing the verification efficiency of the mining pool, and causing the mining pool system to collapse.Aiming at the problem that it is difficult to distinguish the type of miners in the mining pool, which leads to the collapse of the mining pool system, a reputation management mechanism was introduced to measure the behavior of miners, and contracts were deployed to prevent miners from colluding with the pool manager.A design of miner type identification mechanism based on reputation management model was proposed.A reputation mechanism was constructed to measure the behavior of miners.When a miner conducts malicious behavior, the miner's reputation value would be lowered.When the miner's reputation value was less than the reputation threshold of the mining pool, the system would remove the miner, so that the miner can no longer enter the mining pool to submit proof of work and get rewards.The miners in the mining pool were dynamically updated by Markov process, so that the miners in the mining pool were conducting honest behaviors and submitting proof of work.At the same time, a reward system was designed to motivate the miners in the mining pool, and smart contracts were deployed in the mining pool to prevent miners from collusion with the mining pool manager.Finally, analyzing the scheme from the perspective of security and performance, the proposed scheme was not only safe in the process of miners submitting proof of workload, but also solved the problem of identifying miner types in public mining pools, thereby solving the problem of malicious miners submitting invalid workloads, eliminating malicious miners, and avoiding mining pools verifying invalid workloads, to improve the verification efficiency of the mining pool.…”
    Get full text
    Article
  12. 4972
  13. 4973
  14. 4974
  15. 4975
  16. 4976

    Algorithmic Analysis of Queuing System with Varying Number of Servers, Phase-Type Service Time Distribution, and Changeable Arrival Process Depending on Random Environment by Alexander Dudin, Olga Dudina, Sergei Dudin

    Published 2025-06-01
    “…Using the tools of the corresponding processes or chains, a stationary analysis of the system is implemented. …”
    Get full text
    Article
  17. 4977

    TurboPixels: A Superpixel Segmentation Algorithm Suitable for Real-Time Embedded Applications by Abiel Aguilar-González, Alejandro Medina Santiago, Jorge Antonio Orozco Torres, J. A. de Jesús Osuna-Coutiño, Madaín Pérez Patricio, Néstor A. Morales-Navarro

    Published 2024-12-01
    “…In recent years, the importance of superpixel segmentation has increased in computer vision since it offers useful primitives for extracting image features and simplifies the complexity of other image processing steps. …”
    Get full text
    Article
  18. 4978
  19. 4979
  20. 4980