Search alternatives:
processor » process (Expand Search)
processes » process (Expand Search)
Showing 5,421 - 5,440 results of 30,198 for search '(processor OR processes) (computing)', query time: 0.25s Refine Results
  1. 5421
  2. 5422
  3. 5423
  4. 5424
  5. 5425

    Machine-learning-driven prediction of flow curves and development of processing maps for hot-deformed Ni–Cu–Co–Ti–Ta alloy by Reliance Jain, Sandeep Jain, Sheetal Kumar Dewangan, M.R. Rahul, Sumanta Samal, Eunhyo Song, Younggeon Lee, Yongho Jeon, Krishanu Biswas, Gandham Phanikumar, Byungmin Ahn

    Published 2025-05-01
    “…The flow curves predicted by the RF model were used to develop precise processing maps, identifying optimal and safe deformation conditions.The resulting processing maps were validated through experiments, confirming that the alloy can be safely deformed within the temperature range of 1173–1273 K and strain rates between 10−0.8 and 10−2 s−1. …”
    Get full text
    Article
  6. 5426

    DEVELOPMENT OF INTERACTIVE SCIENCE LEARNING E-MODULES BASED ON PROJECT BASED LEARNING TO IMPROVE SCIENCE PROCESS SKILLS AT ISLAMIC ELEMENTARY SCHOOL by Elma Yuniarti, Sutiah Sutiah, Rini Nafsiati Astuti

    Published 2024-10-01
    “…Interactive Science Learning E-Module teaching materials are developed with science process skills. The interactive science learning e-module has the form of software that can be used with the help of a laptop, computer and cellphone. …”
    Get full text
    Article
  7. 5427
  8. 5428
  9. 5429
  10. 5430
  11. 5431
  12. 5432

    A Step-by-Step Harmonization Process for Nutritional Epidemiology Purposes: A Methodological Work of the Collaborative PROMED-COG Pooled Cohorts Study by Federica Prinelli, Silvia Conti, Claire T. McEvoy, Caterina Trevisan, Stefania Maggi, Giuseppe Sergi, Marianna Noale

    Published 2023-11-01
    “…Here, we described our step-by-step dietary data harmonization process applied within the PROMED-COG pooled cohorts study aiming to evaluate the effect of nutrition on neurocognitive ageing. …”
    Get full text
    Article
  13. 5433
  14. 5434

    Engineering Safety-Oriented Blasting-Induced Seismic Wave Signal Processing: An EMD Endpoint Suppression Method Based on Multi-Scale Feature by Miao Sun, Jing Wu, Yani Lu, Fangda Yu, Hang Zhou

    Published 2025-07-01
    “…However, during the empirical mode decomposition (EMD) processing of blasting-induced seismic waves, endpoint effects occur, resulting in varying degrees of divergence in the obtained intrinsic mode function (IMF) components at both ends. …”
    Get full text
    Article
  15. 5435

    Hyperspectral imaging for precision nitrogen management: A comparative exploration of two methodological approaches to estimate optimal nitrogen rate in processing tomato by Vito Aurelio Cerasola, Francesco Orsini, Giuseppina Pennisi, Gaia Moretti, Stefano Bona, Francesco Mirone, Jochem Verrelst, Katja Berger, Giorgio Gianquinto

    Published 2025-03-01
    “…The estimated biomass is used to derive the critical N uptake, and the optimal N rate is computed as the difference between the critical N uptake and the estimated actual N uptake. …”
    Get full text
    Article
  16. 5436
  17. 5437
  18. 5438

    Enhancing Injector Performance Through CFD Optimization: Focus on Cavitation Reduction by Jose Villagomez-Moreno, Aurelio Dominguez-Gonzalez, Carlos Gustavo Manriquez-Padilla, Juan Jose Saucedo-Dorantes, Angel Perez-Cruz

    Published 2025-06-01
    “…The use of computer-aided engineering (CAE) tools has become essential in modern design processes, significantly streamlining mechanical design tasks. …”
    Get full text
    Article
  19. 5439

    HyperCell: A Bio-inspired Design Framework for Real-time Interactive Architectures by Jia-Rey Chang

    Published 2018-01-01
    “…“Form” has always been the most critical focus in architectural design, and this focus has also been a major driver behind the application computational design in Architecture. Nonetheless, this research will interpret the term “Form” in architecture as a continual “information processor” rather than the result of information processing. …”
    Get full text
    Article
  20. 5440

    Enhancing Security for Resource-Constrained Smart Cities IoT Applications: Optimizing Cryptographic Techniques with Effective Field Multipliers by Atef Ibrahim, Fayez Gebali

    Published 2025-06-01
    “…Commonly, these devices exhibit deficiencies stemming from restricted computational capabilities and the absence of uniform security standards. …”
    Get full text
    Article