Search alternatives:
processor » process (Expand Search)
processes » process (Expand Search)
Showing 14,321 - 14,340 results of 30,198 for search '(processor OR processes) (computing)', query time: 0.22s Refine Results
  1. 14321

    Pin Row Loading Analysis of Scraper Conveyor under Oblique Cut Condition by Mao Jun, Tian Song, Chen Hongyue

    Published 2016-01-01
    “…According to the force analysis of roller,the equation set of roller in the process of cutting by three- axis force is derived.Combining the MATLAB programming,the curve of the before and after roller load changing with the rotation angle under the oblique cut condition is obtained.With shearer machine as the research object,the whole machine mechanical equation is listed,the mathematical computing model is established.Based on MATLAB programming,combining with the before and after roller load changing curve under the oblique cut condition,the before and after sliding shoe load curves under the oblique cut condition is obtained.Due the contact relation between the sliding shoe and pin row and the principle of force mutual action,the curve of load acting on the pin rows under the oblique cut condition is achieved.And through the ANSYS Workbench simulation analysis,the stress distribution and deformation of pin rows of scraper conveyor are got.A reference for the future of design and analysis of damage causes of scraper conveyor pin row is provided.…”
    Get full text
    Article
  2. 14322

    New provable data transfer from provable data possession and deletion for secure cloud storage by Yudong Liu, Shuai Xiao, Han Wang, Xu An Wang

    Published 2019-04-01
    “…With the continuous and rapid development of cloud computing, it becomes more popular for users to outsource large-scale data files to cloud servers for storage and computation. …”
    Get full text
    Article
  3. 14323

    Geo-Statistics and Deep Learning-Based Algorithm Design for Real-Time Bus Geo-Location and Arrival Time Estimation Features with Load Resiliency Capacity by Smail Tigani

    Published 2025-07-01
    “…By employing decentralized data processing, our system significantly reduces network traffic and computational load, enabling data sharing and sophisticated analysis. …”
    Get full text
    Article
  4. 14324

    Hybrid Boson Sampling by Vitaly Kocharovsky

    Published 2024-10-01
    “…We propose boson sampling from a system of coupled photons and Bose–Einstein condensed atoms placed inside a multi-mode cavity as a simulation process testing the quantum advantage of quantum systems over classical computers. …”
    Get full text
    Article
  5. 14325

    Outsourced ciphertext-policy attribute-based encryption with partial policy hidden by Jinxia Yu, Guanghui He, Xixi Yan, Yongli Tang, Rongxia Qin

    Published 2020-05-01
    “…However, how to realize the attribute privacy concerns in the access policy and optimize the heavy computing overhead have been not adequately addressed. …”
    Get full text
    Article
  6. 14326

    Aerosol Distribution Due to Wildfire in Sumatra, Indonesia Considered from Model Simulation by Makiko Nakata, Sonoyo Mukai

    Published 2025-05-01
    “…The results of this study show that the injection process in the model simulations has a significant impact on the aerosol distribution. …”
    Get full text
    Article
  7. 14327

    Low variance estimations of many observables with tensor networks and informationally-complete measurements by Stefano Mangini, Daniel Cavalcanti

    Published 2025-07-01
    “…Accurately estimating the properties of quantum systems is a central challenge in quantum computing and quantum information. We propose a method to obtain unbiased estimators of multiple observables with low statistical error by post-processing informationally complete measurements using tensor networks. …”
    Get full text
    Article
  8. 14328

    A Size-Perimeter Discrete Growth Model for Percolation Clusters by Bendegúz Dezső Bak, Tamás Kalmár-Nagy

    Published 2021-01-01
    “…An iterative cluster growth model is considered for computing the expected size and perimeter of the growing cluster. …”
    Get full text
    Article
  9. 14329

    VECT: an automatic visual Perl programming tool for nonprogrammers by Hui-Hsien Chou

    Published 2005-04-01
    “…Modern high-throughput biological research produces enormous amount of data that must be processed by computers, but many biologists dealing with these data are not professional programmers. …”
    Get full text
    Article
  10. 14330

    Use of hybrid quantum-classical algorithms for enhancing biomarker classification. by Aninda Astuti, Pin-Keng Shih, Shan-Chih Lee, Venugopala Reddy Mekala, Ezra B Wijaya, Ka-Lok Ng

    Published 2025-01-01
    “…Quantum machine learning (QML) combines quantum computing with machine learning, offering potential for solving intricate problems. …”
    Get full text
    Article
  11. 14331

    Research on enterprise digital transformation: A case study of Alibaba by Zhang Ao

    Published 2024-01-01
    “…According to the research results of this paper, it is suggested that in the future digital transformation process, enterprises should strengthen investment in digital infrastructure and talent training, which is the most fundamental step of digital transformation.…”
    Get full text
    Article
  12. 14332

    Multi-version consolidation method for block-level backup data by WANG Shu-peng 1, WU Guang-jun1, WU Zhi-gang3, YUN Xiao-chun1

    Published 2011-01-01
    “…Historical version backup data query efficiency was dependent on the version chain length in a multi-version backup data storage system.A novel block-level backup data multi-version consolidation method was presented for this problem.Any version of a historical full system snapshot could be generated within the incremental backup data version sequence.Theoretical analysis showed that it could increase the target snapshot version query efficiency significantly in the version chain.A variable-length block version merging algorithm was presented to decrease the computing complex-ity in the process of snapshot version merging,according to the block-level backup data distribution features.Finally,the concrete applications and performance analysis for block-level version consolidation method was also introduced.The simulated experiments results expose that the version consolidation method can eliminate redundant version of backup data with the same version chain length,and it can increase full system recovery efficiency than traditional methods sig-nificantly.…”
    Get full text
    Article
  13. 14333

    Model Building and Simulation of the Electric Brake Energy of Urban Rail Vehicle by 师蔚, 方宇

    Published 2011-01-01
    “…By analyzing conditions that urban rail vehicles in the traction power supply network occur the regenerative braking or resistor braking in electric braking process, and depending on the grouping of vehicles, lines, load, run strategy, operation plans, traction power supply and other basic conditions, based on single vehicle computing model and multi-vehicles power supply network model, electric braking energy distribution model were established and simulation were carried out. …”
    Get full text
    Article
  14. 14334

    TraIL: Pinpoint Trajectory for Indoor Localization by Shengnan Li, Zheng Qin, Chenshu Wu, Zheng Yang

    Published 2015-11-01
    “…Indoor localization on smartphones is an enabler for a number of ubiquitous and mobile computing applications attracting worldwide attentions. …”
    Get full text
    Article
  15. 14335

    DEVELOPMENT OF THE MARKET OF ELECTRONIC INSURANCE by G. I. Shepelin

    Published 2017-10-01
    “…The paper is focused on cloud computing technologies, namely methods of distributed data processing, that make computer resources and capacities available to the user as an Internet service used in the insurance market, along with the description of their structure and specifics. …”
    Get full text
    Article
  16. 14336

    Strategies for implementing quantum error correction in molecular rotation by Brandon J. Furey, Zhenlin Wu, Mariano Isaza-Monsalve, Stefan Walser, Elyas Mattivi, René Nardi, Philipp Schindler

    Published 2024-12-01
    “…The presented strategies and methods might enable robust sensing or even fault-tolerant quantum computing using the rotation of individual molecules.…”
    Get full text
    Article
  17. 14337

    Torsion point attacks on ‘SIDH‐like’ cryptosystems by Péter Kutas, Christophe Petit

    Published 2023-03-01
    “…The best‐known protocol following that approach is the supersingular isogeny Diffie–Hellman protocol (SIDH); this protocol was turned into the CCA‐secure key encapsulation mechanism SIKE, which was submitted to and remains in the third round of NIST's post‐quantum standardisation process as an ‘alternate’ candidate. Isogeny‐based cryptography generally relies on the conjectured hardness of computing an isogeny between two isogenous elliptic curves, and most cryptanalytic work referenced on SIKE's webpage exclusively focusses on that problem. …”
    Get full text
    Article
  18. 14338

    Flipping the Classroom for higher Education Learners to Improve Productive and Receptive Skills by Cristina

    Published 2020-01-01
    “…Overall, the results of the study have shown the positive impact of this method on the teaching/learning process in the EFL classes for Tourism students, contributing to their motivation and development of their professional skills.…”
    Get full text
    Article
  19. 14339

    Comparative analysis of audio-MAE and MAE-AST models for real-time audio classification by Lesia Mochurad

    Published 2025-07-01
    “…The main challenges include processing large amounts of data, particularly for high-quality audio files, which require significant computing resources. …”
    Get full text
    Article
  20. 14340

    Penerapan Model Algoritma Unsupervised Learning untuk Klasterisasi Tingkat Kenyamanan Ruang Tidur berdasarkan Faktor Lingkungan by Mhd Idham Khalif, Listyo Edi Prabowo

    Published 2025-04-01
    “… Pada era revolusi industri 4.0, teknologi seperti cloud computing, robotic, internet of things(IoT), artificial intelligence (AI) dan machine learning (ML) sangat banyak dikembangkan di berbagai sektor seperti industri, pemerintahan, pendidikan hingga ke sektor rumah tangga. …”
    Get full text
    Article