Search alternatives:
processor » process (Expand Search)
processes » process (Expand Search)
Showing 13,641 - 13,660 results of 30,198 for search '(processor OR processes) (computing)', query time: 0.22s Refine Results
  1. 13641
  2. 13642
  3. 13643

    Leveraging AlphaFold2 structural space exploration for generating drug target structures in structure-based virtual screening by Keisuke Uchikawa, Kairi Furui, Masahito Ohue

    Published 2025-09-01
    “…Computational virtual screening (VS) plays a vital role in early-stage drug discovery by enabling the efficient selection of candidate compounds and reducing associated costs. …”
    Get full text
    Article
  4. 13644
  5. 13645

    Impact of voids on the solder joint integrity and fatigue life of IGBT power module by Sunday E. Nebo, Emeka H. Amalu, David J. Hughes

    Published 2025-06-01
    “…However, as the deployment of IGBT modules penetrates several mission-critical systems operating in harsher ambient, process voids in the solder joints challenge their reliability and fatigue life. …”
    Get full text
    Article
  6. 13646
  7. 13647
  8. 13648

    Low-Cost, LiDAR-Based, Dynamic, Flood Risk Communication Viewer by Debra F. Laefer, Evan O’Keeffe, Kshitij Chandna, Kim Hertz, Jing Zhu, Raul Lejano, Anh Vu Vo, Michela Bertolotto, Ulrich Ofterdinger

    Published 2025-02-01
    “…Through decoupling physics-based predictions from the visualization, a dynamic, flood risk viewer was produced with modest processing resources involving only a single, quad-core processor with a frequency around 4.30 GHz and with no graphics card. …”
    Get full text
    Article
  9. 13649

    Lightweight encryption solution for train communication network by TANG Jun, GE Qianghua, ZOU Zhirong, CHEN Bo, TANG Pin

    Published 2024-01-01
    “…This solution employs a key negotiation process based on traditional communication encryption scheme, aiming to achieve lightweight encryption in train communication networks and compliance with the authenticity, integrity, and confidentiality requirements of communication data, while greatly reducing hardware demands and computational burdens associated with key management. …”
    Get full text
    Article
  10. 13650
  11. 13651

    Research and application of V2X based on MEC by Jiahui QIU, Zhichao ZHOU, Xiaobo LIN, Yu XIAO, Chao CAI, Liu LIU

    Published 2020-06-01
    “…The large-scale construction of 5G wireless communication network enhances the development of C-V2X (cellular-vehicle to everything) towards diversified directions.Large bandwidth services,such as high-definition video and AR/VR,bring great transmission and processing pressure to the classical network architecture.Meanwhile,traffic safety services characterized by ultra-high reliability and low delay put stringent requirements on network performance.The network architecture of providing services and computing localization through setting user panel down to close to the terminals and MEC (multiple access edge computing) can meet the requirements of data short loop transmission and ultra-low delay in the internet of vehicles scenario.The combination of MEC and V2X was explored in depth,the MEC networking scenario,MEC network architecture and the key technologies and challenges of MEC were analyzed.The combination scheme of MEC and C-V2X integration of network planning was provided.The application of MEC in C-V2X was presented in several specific scenarios.…”
    Get full text
    Article
  12. 13652

    Lattice-based lightweight post quantum access authentication scheme for satellite network by WANG Shanshan, ZHAO Guofeng, XU Chuan, HAN Zhenzhen

    Published 2024-10-01
    “…In the authentication phase, a low dimensional modular multiplication modular addition mutual authentication algorithm was designed based on the bonsai tree algorithm, which reduced the algorithm complexity from the quadratic level to the linear level, further decreasing the communication costs during the authentication process and computational costs on satellite. Theoretical proof and performance analysis show that the scheme resists quantum computing attacks and reduces authentication time by at least 150% compared to lattice authentication schemes.…”
    Get full text
    Article
  13. 13653
  14. 13654

    Breaking Digital Health Barriers Through a Large Language Model–Based Tool for Automated Observational Medical Outcomes Partnership Mapping: Development and Validation Study by Meredith CB Adams, Matthew L Perkins, Cody Hudson, Vithal Madhira, Oguz Akbilgic, Da Ma, Robert W Hurley, Umit Topaloglu

    Published 2025-05-01
    “…MethodsWe developed a 3-tiered semantic matching system using GPT-3 embeddings to transform heterogeneous clinical data to the OMOP Common Data Model. The system processes input terms by generating vector embeddings, computing cosine similarity against precomputed Observational Health Data Sciences and Informatics vocabulary embeddings, and ranking potential matches. …”
    Get full text
    Article
  15. 13655
  16. 13656
  17. 13657
  18. 13658
  19. 13659

    Non-Gaussian quantum steering produced by quasi-phase-matching third-harmonic generation by S Q Ma, D Y Zhang, Y Zhao, Y B Yu, G R Jin, A X Chen

    Published 2025-01-01
    “…With the rapid advancements in fields such as quantum entanglement distillation and quantum metrology, the limitations of Gaussian states in certain applications within quantum computing and information processing have come to the forefront. …”
    Get full text
    Article
  20. 13660

    Integrated Non-Destructive Testing for Assessing Manufacturing Defects in Melt-Fusion Bonded Thermoplastic Composite Pipes by Obinna Okolie, Nadimul Haque Faisal, Harvey Jamieson, Arindam Mukherji, James Njuguna

    Published 2025-03-01
    “…The thermoplastic composite pipe (TCP) manufacturing process introduces defects that impact performance, such as voids, misalignment, and delamination. …”
    Get full text
    Article