Search alternatives:
processor » processes (Expand Search)
Showing 17,461 - 17,480 results of 30,198 for search '(processor OR process) (computing)', query time: 0.32s Refine Results
  1. 17461

    Research on sketch instruction recognition technology ased on convolutional neural network by ZHOU Yu, ZHANG Jingtao, LI Ligang, ZHANG Xiaoyan

    Published 2025-04-01
    “…By constructing and optimizing the convolutional neural network model, a large number of sketch instruction samples are used for training, and the accuracy of the validation set is closely monitored throughout the training process, and the learning rate is dynamically adjusted in real time and based on this. …”
    Get full text
    Article
  2. 17462

    Progress in the application of artificial intelligence in the diagnosis and treatment of maxillofacial fractures by HUANG Shuhui, ZHU Zhu, WANG Yunyi, XU Yuyue, LI Jing, YU Gang, ZHANG Feng

    Published 2025-05-01
    “…The traditional clinical diagnosis and treatment process is easily affected by complex maxillofacial anatomy and differences in doctors’ experience in reading X-rays and making diagnoses. …”
    Get full text
    Article
  3. 17463

    EL DIBUJO TÉCNICO MANUAL Y SU VIGENCIA EN EL ACTUAL CONTEXTO TECNOLÓGICO by GIOVANY SUÁREZ PINILLA

    Published 2020-01-01
    “…From ancient times, drawing has been used to express both the artistic and scientific ideas created in human brain.Although drafting -otherwise known as technical drawing made by hand- is a traditional subject taught at universities forengineering and architectural programs, current trends tend to replace it for computer assisted drawing software. Yet newtechnologies, in particular ICTs (information and communication technology) support with a large number of advantagesthe learning process, freehand drawing also provide students with very powerful skills that will be of their greatest benefitat school and work. …”
    Get full text
    Article
  4. 17464

    Case reports of incidental findings in COVID-19 CT-diagnostics by P. M. Zelter, S. S. Pervushkin, E. A. Sartakova

    Published 2021-03-01
    “…Due to the pandemic pneumonia caused by COVID-19, computed tomography (CT) has come to be considered the best imaging modality commonly used for early diagnosis and management of patients with Covid19 pneumonia. …”
    Get full text
    Article
  5. 17465

    Efficiency Optimization for PMSM of Electric Vehicle in the NEDC Condition by SHI Junxu, CHEN Zhichu, FU Minli, LI Weiye, WANG Yu

    Published 2019-01-01
    “…This dramatically decreases the computation time of the design process and provides the basis for the directional optimization design of efficiency. …”
    Get full text
    Article
  6. 17466
  7. 17467

    Accurate Reconstruction of Gas Turbine Blade Geometry Using 3D/2D Rigid-Registration and CT View Optimization by Hristo Valtchanov, Nicolas Piché, Vladimir Brailovski, Justin Byers, Catherine Desrosiers, François Guibault

    Published 2025-02-01
    “…Non-destructive X-ray or computed tomography (CT) testing plays a crucial role in the quality assurance process of turbine blades by allowing precise measurement of internal channels, ensuring adherence to the thermal and structural performance requirements. …”
    Get full text
    Article
  8. 17468

    Model Spreadsheet Excel Aplication sebagai Pengolahan Hasil Belajar Peserta Didik dalam Penilaian Kurikulum 2013 by Khusnuddin Khusnuddin

    Published 2018-05-01
    “…Utilization of spreadsheet of excel aplication in processing learners’ learning results in Curriculum 2013 is based on several considerations, among others are the changes of assessment pattern from just displaying value in the form of numbers into numeric value accompanied by descriptive achievement of student competence, which require high accuracy for teacher to record descriptive achievement learning outcomes of learners; implementation of thematic learning accompanied by reports of learning outcomes using a subject approach requires an analytical step in mapping into subject content; speed and accuracy in data processing can lead to progress in the service of report cards; and the development of technology and computer information allows to help simplify the process of assessing the learners’ learning outcomes. …”
    Get full text
    Article
  9. 17469

    Introduction to Thermal Field Theory: From First Principles to Applications by Alberto Salvio

    Published 2025-01-01
    “…The second part is dedicated to the computation of thermal Green’s function for scalars, vectors, and fermions with path-integral methods. …”
    Get full text
    Article
  10. 17470

    VIBRATION RESPONSE ANALYSIS OF FIVE-DEGREE-FREEDOM VEHICLE WITH STOCHASTIC STRUCTURAL PARAMETERS by JIA AiQin, JIANG ZhiQiang, CHEN JianJun, WEN ZhenHua

    Published 2015-01-01
    “…The example calculation results show that this method can improve the accuracy and efficiency of computation.…”
    Get full text
    Article
  11. 17471

    Aggregating Procedure for Fuzzy Cognitive Maps by Maikel Leon Espinosa

    Published 2023-05-01
    “…In the field of Knowledge Engineering and Representation, a typical struggle encompasses transferring the Subject Matter’s expertise into computational descriptions that could be used to create digital-twin representations of a given real-world scenario. …”
    Get full text
    Article
  12. 17472

    A New Collaborative Recommendation Approach Based on Users Clustering Using Artificial Bee Colony Algorithm by Chunhua Ju, Chonghuan Xu

    Published 2013-01-01
    “…After that we adopt the modified cosine similarity to compute the similarity between users in the same clusters. …”
    Get full text
    Article
  13. 17473

    Joint estimation of interference frequency offset and time delay in PCMA system by Xue-juan WEI, Yong YANG, Yi-ming GUO, Dong-ling ZHANG

    Published 2017-02-01
    “…For cooperative received high-order modulation PCMA (paired carrier multiple access) signals,joint estima-tion of frequency offset and time delay was proposed.The sequence samples stored locally were used as auxiliary data.Estimation of frequency offset and time delay was calculated by optimizing the objective function,which was obtained from the cross-correlation computation of the auxiliary data and mixed signal,and the optimized process was accom-plished by utilizing two-dimensional search.By setting the threshold of joint estimation,the calculated amount was greatly reduced.Modified Cramer-Rao bound (MCRB) of interference frequency offset and time delay was derived,which provided theoretical basis for performance of the proposed algorithm.Simulation results show that the algorithm has similar performance with existing algorithms,but its complexity is reduced by two-thirds.…”
    Get full text
    Article
  14. 17474

    Traumatic appendicitis is probably not real: an illustrative analysis of coincidental occurrences in nature by David N Naumann, Tom Barker

    Published 2023-11-01
    “…We suggest that unless there is a credible pathological process reported with demonstrable causality, further case reports of traumatic appendicitis need to have robust justification.…”
    Get full text
    Article
  15. 17475

    On-line Diagnosis Technology for the Shock Absorbers on Subway Vehicle Based on RLS by WANG Yu, LYU Yu, ZHAO Muhua

    Published 2018-01-01
    “…To ensure the safety of train operation and avoid excessive maintenance of shock absorbers, based on the vibration data, a process parameter evaluation model of the recursive least squares (RLS) and a input-output model were presented according to the research of the metro vehicle on-line monitoring technology. …”
    Get full text
    Article
  16. 17476

    PENINGKATAN PEMAHAMAN MAHASISWA PADA MATA KULIAH TELAAH KURIKULUM MELALUI MEDIA VISUAL BERBASIS MACROMEDIA FLASH MX by Syamsu Hadi

    Published 2016-02-01
    “…Moreover, it also improved students’ activeness and attention during the teaching learning process. Thus; it suggested for: (1) the institution to prepare all facilities and amenities such as LCD, computer, internet network, etc since the implementation of this media need those facilities, (2) the lecturers to master how to use the media and prepare their own materials so they can teach well.…”
    Get full text
    Article
  17. 17477

    Research on self-training neural machine translation based on monolingual priority sampling by ZHANG Xiaoyan, PANG Lei, DU Xiaofeng, LU Tianbo, XIA Yamei

    Published 2024-04-01
    “…To enhance the performance of neural machine translation (NMT) and ameliorate the detrimental impact of high uncertainty in monolingual data during the self-training process, a self-training NMT model based on priority sampling was proposed. …”
    Get full text
    Article
  18. 17478

    Study and implementation of integrated network security monitoring system by ZHANG Hui-min, QIAN Yi-ping, ZHENG Qing-hua, DONG Shi-jie, GUAN Xiao-hong

    Published 2003-01-01
    “…The main intention of intrusion detection system (IDS) is to detect the action of unauthorized use, misuse, and all other abuse of computer systems, but it lacks of an effective monitoring console. …”
    Get full text
    Article
  19. 17479

    Modeling and verification of data circulation control based on timed automata by LI Heng, LI Fenghua, LIANG Wanheng, GUO Yunchuan, ZHANG Lingcui, ZHOU Ziyan

    Published 2025-03-01
    “…To address the challenges of verifying the feasibility, correctness, and security of cross-domain data circulation control policies in their generation, transmission, and execution, a formal modeling and verification method was proposed based on timed automata and computation tree logic (CTL). Firstly, the formal models were established for the data circulation control process and key entities in data transaction scene, including data providers, data consumers (encompassing data brokers), and data supervisors. …”
    Get full text
    Article
  20. 17480

    Implementation of the Elliptic Curve Cryptography Method in Digital Image Security in Medical Images by Yanuar Bhakti Wira Tama, syamsul mujahidin

    Published 2024-12-01
    “…This attempt for this research will be made to use elliptic curve cryptography to hide messages in the form of digital images using multiplication matrix modified hill chipper and count entropy and time encryption and decryption. The encryption process, which utilizes matrix multiplication, ensures that the images achieve near-ideal entropy values, close to 8, indicating a high degree of randomness and security. …”
    Get full text
    Article