Search alternatives:
processor » processes (Expand Search)
Showing 17,141 - 17,160 results of 30,198 for search '(processor OR process) (computing)', query time: 0.28s Refine Results
  1. 17141

    Prioritized Multi‐Step Decision‐Making Gray Wolf Optimization Algorithm for Engineering Applications by Idriss Dagal, Alpaslan Demirci, Ambe Harrison, Wulfran Fendzi Mbasso, Said Mirza Tercan, Burak Akın, Kürşat Tanriöven, Havva Aysun Sezgin Köksal, Ahmet Nayir

    Published 2025-05-01
    “…The multi‐step decision‐making process implemented in PMS‐GWO is critical to achieving these improved convergence and diversity metrics.…”
    Get full text
    Article
  2. 17142

    Machine learning and response surface methodology forecasting comparison for improved spray dry scrubber performance with brine sludge-derived sorbent by B.J. Chepkonga, L. Koech, R.S. Makomere, H.L. Rutto

    Published 2025-03-01
    “…A quadratic model correlating the process variables with desulfurization efficiency was developed, yielding an R-squared value of 93.47%. …”
    Get full text
    Article
  3. 17143

    Simulation of the scrapers with pusher by Nilov V.A.

    Published 2017-12-01
    “…The question of the economic-mathematical modeling of working process of trailed scraper working with a tractor-pusher. …”
    Get full text
    Article
  4. 17144

    Place of clinical evaluation in the identification of obstructive coronary arteries lesions in patients with stable coronary artery disease: Part II by A. N. Sumin

    Published 2019-09-01
    “…The article discusses the main stages of the diagnostic process (clinical evaluation, determination of pre-test probability, non-invasive tests). …”
    Get full text
    Article
  5. 17145

    Under-scanning non-line-of-sight imaging based on convolution approximation and optimization by Jinye Miao, Yingjie Shi, Lingfeng Liu, Yi Wei, Fuyao Cai, Lianfa Bai, Enlai Guo, Jing Han

    Published 2025-06-01
    “…Specifically, we incorporate Poisson probability distribution characteristics and a total variation norm of transient images as well as the non-negativity and sparseness of objects into the deconvolution process. This incorporation effectively compensates for the inaccuracies in deconvolution caused by under-scanning measurements and also facilitates the use of regularization terms in the deconvolution process. …”
    Get full text
    Article
  6. 17146

    A Deep Learning Approach for Image Analysis and Reading Body Weight From Digital Scales in Pigs Farms by Nicolas A. Reyes-Reyes, Mihai Catalin Doja, Pol Llagostera-Blasco, Lluis M. Pla-Aragones, Marcela C. Gonzalez-Araya

    Published 2025-01-01
    “…Traditionally, pig weighing is done directly, i.e. placing one or more pigs at a time on a scale while the total body weight is displayed and recorded. However, this process is labor-intensive, causes stress to the animals, and is highly prone to manual recording errors. …”
    Get full text
    Article
  7. 17147

    Impact of the new handling recommendations for hazardous drugs in a hospital pharmacy service by Beatriz G García-Alcántara, Catalina Perelló Alomar, Elena Moreno Centeno, Pilar Modamio, Eduardo L Mariño, Olga Delgado Sánchez Olga Delgado Sánchez Olga Delgado Sánchez

    Published 2017-03-01
    “…Any relevant information about the handling and administration of hazardous drugs was included in the prescription computer program. There were changes in the acquisition process of two drugs, in order to avoid splitting and multi-dose formulations. …”
    Get full text
    Article
  8. 17148

    Surgical Treatment of Purulent Complications and Widespread Paraprosthetic Infection in the Area of the Mesh Prosthesis After Laparoscopic Transabdominal Preperitoneal Hernioplasty... by H.M.H. Karkhani, E. A. Gallyamov, A. S. Vorotyntsev, A. Yu. Emelyanov, D.M.E. Henein, A. B. Shalygin, B. Sharma

    Published 2024-10-01
    “…The purpose of our article is to draw the attention of surgeons to the possibility of a rare infectious complication in the area of the synthetic mesh prosthesis after right laparoscopic preperitoneal hernioplasty for inguinal hernia 4 months after the initial operation, after which the infectious process may spread from the area of the infected prosthesis into the abdominal cavity. …”
    Get full text
    Article
  9. 17149

    An integrated expert recommender system approach to environmental service priorities in renewable energy by Serhat Yüksel, Hasan Dinçer, Ümit Hacıoğlu, Jaehyung An, Alexey Mikhaylov, Zuleima Karpyn

    Published 2024-01-01
    “…Similarly, collaborative filtering methodology is taken into consideration to complete missing evaluations. In this process, the decision makers are allowed to leave the questions they wanted blank. …”
    Get full text
    Article
  10. 17150

    Efficient Recursive Methods for Partial Fraction Expansion of General Rational Functions by Youneng Ma, Jinhua Yu, Yuanyuan Wang

    Published 2014-01-01
    “…The proposed pfe methods require only simple pure-algebraic operations in the whole computation process. They do not involve derivatives when tackling proper functions and require no polynomial division when dealing with improper functions. …”
    Get full text
    Article
  11. 17151

    Deep Learning Approach for Estimating Workability of Self-Compacting Concrete from Mixing Image Sequences by Zhongcong Ding, Xuehui An

    Published 2018-01-01
    “…We propose a deep learning approach to better utilize the spatial and temporal information obtained from image sequences of the self-compacting concrete- (SCC-) mixing process to recover SCC characteristics in terms of the predicted slump flow value (SF) and V-funnel flow time (VF). …”
    Get full text
    Article
  12. 17152

    Nicolai maps and uniqueness in the light-cone gauge by Nipun Bhave, Saurabh Pant

    Published 2024-09-01
    “…The process of integrating out unphysical degrees of freedom in this gauge, produces a four fermion interaction term. …”
    Get full text
    Article
  13. 17153

    Research of STR multicast key management protocol based on bilinear pairing in ad hoc network by ZHOU Fu-cai1, XU Jian2, XU Hai-fang1, LIU Ze-chao1

    Published 2008-01-01
    “…STR multicast key management protocol has an optimal cost in computation,communication and storage.But on security property,STR cannot resist active attacks without providing key authentication.By introducing the bilinear pairing cryptosystem and the 3-ary key tree,the improved STR protocol which is called PSTR(bilinear pairing-based STR) was proposed.The key generation process and six basic sub-protocols were included in the protocol.Through proving the bilinear form of PSTR key tree,the security of the PSTR in computation was proved.Finally PSTR were compared with STR through performance analysis,the results of which show that: PSTR is more efficient than STR in the communication cost and the computation cost as well as the storage requirement.Therefore,PSTR is a novel,reliable group key management protocol,and is well-suited for Ad hoc networks.…”
    Get full text
    Article
  14. 17154
  15. 17155
  16. 17156
  17. 17157
  18. 17158
  19. 17159
  20. 17160

    The relationship between artificial intelligence and reducing the cognitive load of learners by Haseeb Mohammed Fakih

    Published 2020-12-01
    “…Moreover, the use of cognitive intelligence reduces the cognitive burden and allows review a large amount of formation that can be obtained from the computer automatically and quickly so that the learner uses it as information or uses it in analysis and inference. …”
    Get full text
    Article