Search alternatives:
processor » processes (Expand Search)
Showing 17,181 - 17,200 results of 30,198 for search '(processor OR process) (computing)', query time: 0.31s Refine Results
  1. 17181
  2. 17182

    Associations between smartphone GPS data and changes in psychological health and burden outcomes among family caregivers and patients with advanced cancer: an exploratory longitudi... by J. Nicholas Odom, Kyungmi Lee, Erin R. Harrell, Kristen Allen Watts, Avery C. Bechthold, Sally Engler, Frank Puga, Natashia Bibriescas, Arif H. Kamal, Christine S. Ritchie, George Demiris, Alexi A. Wright, Marie A. Bakitas, Andres Azuero

    Published 2025-04-01
    “…Participants completed self-report measures (PROs) of anxiety and depressive symptoms (Hospital Anxiety and Depression Scale [HADS]), mental health (PROMIS Mental Health), and caregiver burden (Montgomery-Borgatta Caregiver Burden scale) at baseline and every 6 weeks for 24 weeks. After pre-processing raw GPS data into daily GPS features (e.g., time spent at home, distance traveled/day), computing biweekly moving averages and standard deviations, and conducting a principal components analysis (PCA) of the resulting variables, within-person regression models were used to assess associations between changes in PRO measures and changes in PCA scores, with adjusted-R2 as the measure of effect size (small = 0.02, medium = 0.13, large = 0.26). …”
    Get full text
    Article
  3. 17183

    The Impact of Vaccination on Disease Course and Outcome in Intensive Care Patients With COVID-19 by B. I. Kurilin, V. Y. Kiselevskaya-Babinina, Y. V. Kuzmicheva, A. V. Shapoval, N. E. Drozdova, K. A. Popugayev

    Published 2023-02-01
    “…After the anonymization of the personal data of patients and the distribution of patients into comparison groups, the obtained information was processed by standard means of mathematical statistics using the R-free software computing environment. …”
    Get full text
    Article
  4. 17184

    Intraoperative Axillary Artery Injury as a Complication of Reverse Total Shoulder Arthroplasty by K. A. Egiazaryan, D. S. Ershov, A. P. Ratyev, T. V. Gediev, N. S. Ershov, A. Z. Salekh

    Published 2025-01-01
    “…There is a need for more extensive coverage of this problem in order to prevent similar situations in the future.THE AIM of this publication is to present a clinical case of intraoperative axillary artery injury in the process of reverse shoulder arthroplasty, and the medium­ term result of surgical treatment after replacement of the artery defect with a synthetic graft.MATERIAL AND METHODS We present a rare clinical case of intraoperative axillary artery injury in the process of reverse shoulder arthroplasty. …”
    Get full text
    Article
  5. 17185

    Towards a self-applied, mobile-based geolocated exposure therapy software for anxiety disorders: SyMptOMS-ET app by Alberto González-Pérez, Laura Diaz-Sanahuja, Miguel Matey-Sanz, Jorge Osma, Carlos Granell, Juana Bretón-López, Sven Casteleyn

    Published 2024-10-01
    “…Methods A team of computer scientists and psychologists developed the ET Component for in-vivo ET using geolocation-based technology, following the process-centred design methodology. …”
    Get full text
    Article
  6. 17186
  7. 17187
  8. 17188

    Research of authentication techniques for the Internet of things by Hongqiang YAN, Linjie WANG

    Published 2020-07-01
    “…Identity authentication technology is a key technology in the Internet of things (IoT)security field which ensures the authenticity of the identity information of users and device nodes connected to the IoT.Due to the low cost,low power consumption,small storage of IoT devices and heterogeneity of IoT network,the identity authentication mechanisms in traditional computer networks are often not applicable.Firstly,the development process of IoT was introduced,the security risks of IoT and the challenges faced by the authentication work were analyzed.Then the emphasis was put on comparison of the advantages and disadvantages among five typical authentication protocols.Moreover,the authentication technologies in several practical scenarios of RFID,smart grid,Internet of vehicles,and smart home were summarized and analyzed.Finally,the future research direction was discussed.…”
    Get full text
    Article
  9. 17189

    High-purity single-photon generation based on cavity QED by Seigo Kikura, Rui Asaoka, Masato Koashi, Yuuki Tokunaga

    Published 2025-03-01
    “…Our scheme can contribute to developing distributed quantum computation or quantum communication with high accuracy.…”
    Get full text
    Article
  10. 17190

    Using a WebCT to Develop a Research Skills Module by Kelli Bellew Martin, Jennifer Lee

    Published 2003-05-01
    “…This paper outlines the process and experience of creating and administering the sessions through WebCT and summarizes student feedback and lessons learned. …”
    Get full text
    Article
  11. 17191

    Research and application on megawatt level intelligent fracturing pump system in coal mine by Ran LI, Chuliang WANG, Bo LIU, Yanjun FENG, Pengfei JIANG, Rongming CHEN, Jingbin CHEN, Zhuo CHEN, Dalong WANG, Haicheng LU, Zongkai GUO, Tianze CAO, Yuanzheng YU, Chao WANG

    Published 2025-05-01
    “…The research included: Development of high-strength, erosion-resistant martensitic precipitation hardening stainless steel suitable for extreme conditions with large flow, ultra-high pressure, and sand-mixed media, along with ultra-high pressure self-reinforcing treatment to enhance the fatigue life of the hydraulic ends of fracturing pumps; Investigation of critical reliability technologies, including high-strength welding for alloy steel, high-load-bearing, high-power-to-weight ratio gear transmission technology, and wear-resistant friction pairs of aluminum bronze alloy-cast iron, to ensure the reliability of the transmission system under high-power conditions; Creation of a high-durability metal plunger-combination seal fracturing fluid sealing pair, with the application of computer simulation technologies such as virtual prototyping, FEA, CFD, and hydraulic system simulation to optimize the structure, performance, and reliability of the fracturing pump’s fluid end suction and discharge systems; Mastery of technologies such as low-frequency variable flow sealing for deep boreholes, automatic identification of coal and rock layer fracturing, and cyclic fracturing control, enabling intelligent control throughout the fracturing process. …”
    Get full text
    Article
  12. 17192

    Turbo Warrants under Hybrid Stochastic and Local Volatility by Min-Ku Lee, Ji-Hun Yoon, Jeong-Hoon Kim, Sun-Hwa Cho

    Published 2014-01-01
    “…The model consists of the constant elasticity of variance model incorporated by a fast fluctuating Ornstein-Uhlenbeck process for stochastic volatility. The sensitive structure of the turbo warrant price is revealed by asymptotic analysis and numerical computation based on the observation that the elasticity of variance controls leverage effects and plays an important role in characterizing various phases of volatile markets.…”
    Get full text
    Article
  13. 17193
  14. 17194
  15. 17195
  16. 17196
  17. 17197
  18. 17198
  19. 17199

    AI-Powered Spectral Imaging for Virtual Pathology Staining by Adam Soker, Maya Almagor, Sabine Mai, Yuval Garini

    Published 2025-06-01
    “…First, the rise in whole slide imaging has enabled work in front of a computer screen and the integration of image processing tools to enhance diagnostics. …”
    Get full text
    Article
  20. 17200

    Agri-business for elderly people through the Internet by Kenji Hashimoto

    Published 2012-10-01
    “…The leaf business of Irodori is an example of a successful enterprise realized by connecting elderly people and local agricultural resources in a peripheral area with an aging population. In the process of developing the business, Irodori has overcome three difficulties with regard to information systems. …”
    Get full text
    Article