Search alternatives:
processor » processes (Expand Search)
Showing 17,561 - 17,580 results of 30,198 for search '(processor OR process) (computing)', query time: 0.30s Refine Results
  1. 17561

    Seismic Response Analysis Method of Damping Structures Based on the Inter-history Iteration and Secondary Development of ABAQUS by JIA Chuanguo, QUAN Ziyu, CHEN Xi, LI Yutao

    Published 2025-05-01
    “…The seismic response analysis of damped structures is performed using ABAQUS, eliminating the need for a complex numerical integration method. 2) Efficiency of the iterative process. Unlike the extensive computational steps required by the numerical integration method, the inter-history iterative method achieves strong convergence with only a few iterations. 3) Nonlinear problem avoidance. …”
    Get full text
    Article
  2. 17562

    Sosialisasi Implementasi ABSS (Asian Business Software Solution) Accounting v.27 di SMAN 4 Padang by Sanda Patrisia Komalasari, Creaktivina Faozi Zai, Reza Fahlevi, Yuliana Firdasari, Hanum Yashthafi Anjani, Silmi Silmi, Fitriyeni Oktavia

    Published 2023-12-01
    “…The implementation and use of computer accounting is not only limited to technical aspects but also requires an effective socialization process to ensure acceptance and proper use by users. …”
    Get full text
    Article
  3. 17563

    基于模糊多级综合评判的齿轮故障危害度分析 by 贺朝霞, 刘更, 刘岚, 常乐浩

    Published 2013-01-01
    “…In the analysis of transmission gear fault mode,the occurrence probability of fault,serious degree and maintain ability of failure are considered.And the weight of fault factors is obtained based on experience data and AHP(Analytic Herarchy Process)method.The quantitative analysis of the gear fault criticality is realized through the fuzzy mathematics method.Furthermore,the criticality weight of the failure mode is computed by using Delphi method based on expert inquiry,then the influence of gear fault on higher-up transmission parts is obtained.The results of comparing with Risk Priority Number(RPN)method and criticality matrix diagram method show that,the result of quantitative analysis can be obtained by using fuzzy multilevel comprehensive evaluation,the otherness result can be more acquired on the basis of considering a variety of fault factors,and the support for the fault criticality evaluation is provided.Through the analysis of influence of criticality on higher-up transmission parts,the basis for overall design index distribution is provided.…”
    Get full text
    Article
  4. 17564

    APPLICATION DEVELOPMENT OF AUGMENTED REALITY FOR ELEMENTARY ENGLISH TEACHING by Irsyad - Nugraha

    Published 2023-01-01
    “…Keywords: Augmented Reality; elementary school; English teaching process.…”
    Get full text
    Article
  5. 17565

    Risk Assessment of Steel Structure Engineering Cost using Multi-Criteria Decision-Making Approach under Uncertainty by Bijun Ni

    Published 2025-04-01
    “…This study proposes multi-criteria decision making (MCDM) method to compute the criteria weights are rank the alternatives. …”
    Get full text
    Article
  6. 17566

    Solution of Fractional Partial Differential Equations Using Fractional Power Series Method by Asif Iqbal Ali, Muhammad Kalim, Adnan Khan

    Published 2021-01-01
    “…How to paradigm an initial representation plays an important role in the subsequent process, and a few examples are provided to clarify the initial solution collection.…”
    Get full text
    Article
  7. 17567

    Self-Tuning Control with Regularized RLS Algorithm for Vibration Cancellation of a Circular Plate by Lucyna LENIOWSKA, Paweł KOS

    Published 2014-09-01
    “…The self-tuning control assumes that the vibrating system is unknown and the controller procedure has the ability to identify the process and to update the necessary control law. …”
    Get full text
    Article
  8. 17568

    Privacy matching-based service proxy discovery scheme by Kui GENG, Sheng WAN, Feng-hua LI, Yuan-yuan HE, Han-yi WANG

    Published 2016-08-01
    “…According to user's requirements on the proxy performance,cost and safety in proxy discovery,and the pri-vacy-preserving issue during the process of the demand private matching,a new private matching algorithm was pre-sented based on Paillier homomorphic encryption,comprehensively considered the attributes of user and agents and their priority.It included four steps:building the similarity function based on Euclidean distance,carrying on the private matching by encryption algorithm,calculating the similarity and screening the proxy chain.Proposed scheme introduced semi trusted primary proxy from the global level,which is to manage all the sub proxy's business type and the connection status,and do the main computational overhead.At the same time,Euclidean distance and Paillier homomorphic encryp-tion algorithm were combined to support the multivariate attributes with priority to match,which can effectively protect the privacy of user and sub proxy.Finally,security analysis and evaluation results show the effectiveness and safety of proposed scheme.…”
    Get full text
    Article
  9. 17569

    THE MECHANISM OF DIGITAL TRANSFORMATION OF AGRIBUSINESS IN RUSSIA by Dmitriy Valerevich SERDOBINTSEV, Elena Aleksandrovna ALESHINA

    Published 2022-01-01
    “…Research methods: monographic, logical, abstract-logical, computational-constructive, statistical-economic and comparative analysis. …”
    Get full text
    Article
  10. 17570

    A Calculation Method for Axle Load and Wheel Weight Analysis of 100% Low Floor for Suspended-modular Tram by Zeya WANG, Caiying MI, Huadong DUAN

    Published 2020-05-01
    “…The results showed that the calculation method was reasonable and effective, and could be applied to the weight management of 100% low floor tram design process.…”
    Get full text
    Article
  11. 17571

    Applying Information Hiding in VANETs to Covertly Report Misbehaving Vehicles by Jose Maria de Fuentes, Jorge Blasco, Ana Isabel González-Tablas, Lorena González-Manzano

    Published 2014-02-01
    “…The approach is to embed information into beacon messages either in the signature process (subliminal channel) or altering the least significant bits of selected sensorial fields (steganography). …”
    Get full text
    Article
  12. 17572

    Efficient pseudonym certificate distribution scheme for Internet of vehicles based on novel sanitizable multi-signature by LIU Zhaoman, YANG Yafang, NING Jianting, ZHAO Yunlei

    Published 2024-11-01
    “…Security analysis shows that the scheme effectively resists correlation and impersonation attacks, with minimal computational overhead on RSU and vehicles, ensuring good efficiency and security during pseudonym certificate and anonymous authentication processes.…”
    Get full text
    Article
  13. 17573

    A Data Collection Application for Geosciences Professionals by Carla dos Santos Sá, Danilo Marques de Magalhães

    Published 2018-07-01
    “…<p>This article presents the process of elaborating a web platform that allows the georeferenced data collection in the Twitter API. …”
    Get full text
    Article
  14. 17574

    Novel virtual screening approach for the discovery of human tyrosinase inhibitors. by Ni Ai, William J Welsh, Uma Santhanam, Hong Hu, John Lyga

    Published 2014-01-01
    “…Tyrosinase is the key enzyme involved in the human pigmentation process, as well as the undesired browning of fruits and vegetables. …”
    Get full text
    Article
  15. 17575
  16. 17576

    Topology for gaze analyses - Raw data segmentation by Oliver Hein, Wolfgang H. Zangemeister

    Published 2017-03-01
    “…Recent years have witnessed a remarkable growth in the way mathematics, informatics, and computer science can process data. In disciplines such as machine learning, pattern recognition, computer vision, computational neurology, molecular biology, information retrieval, etc., many new methods have been developed to cope with the ever increasing amount and complexity of the data. …”
    Get full text
    Article
  17. 17577

    Design of an improved model using federated learning and LSTM autoencoders for secure and transparent blockchain network transactions by R. Vijay Anand, G. Magesh, I. Alagiri, Madala Guru Brahmam, Balamurugan Balusamy, Chithirai Pon Selvan, Haya Mesfer Alshahrani, Masresha Getahun, Ben Othman Soufiene

    Published 2025-01-01
    “…In homomorphic encryption, computations are made in the encrypted form so when forming privacy preserving global model, privacy is preserved. …”
    Get full text
    Article
  18. 17578

    Thermal state of ventilated concrete cask with spent nuclear fuel in the conditions of exterior airflow leaking by S. V. Alyokhina, V. N. Goloshchapov, A. O. Kostikov, Yu. M. Matsevity

    Published 2009-06-01
    “…The process of heat-and-mass transfer in the ventilated concrete container used for prolonged intermediate storage of sealed cask with spent fuel rods is investigated by computer modelling in conditions of exterior airflow leaking. …”
    Get full text
    Article
  19. 17579

    Particles in finite volumes and a toy model of decaying neutrons by Christian Käding

    Published 2025-07-01
    “…In this article, we consider real scalar particles confined to finite volumes with periodic boundary conditions, such that the particles’ spectra are discrete. We directly compute the density matrices describing the decay processes $$\phi \rightarrow \varphi ^2$$ ϕ → φ 2 and $$\phi \rightarrow \varphi \chi \nu $$ ϕ → φ χ ν , and subsequently derive expressions for the decay probabilities both for confined and unconfined particles. …”
    Get full text
    Article
  20. 17580

    Kunstgeschichte der digitalen Bilder by Maria Männig

    Published 2018-06-01
    “…This essay explores how medial innovations influence the perception of the past and characterise this process as a feedback phenomenon. …”
    Get full text
    Article