Showing 7,081 - 7,100 results of 29,852 for search '(process OR processes) (computing)', query time: 0.30s Refine Results
  1. 7081
  2. 7082
  3. 7083

    Feasibility Analysis of an Immersive Network Laboratory as a Support Tool for Teaching Practices by Erberson Evangelista Vieira, Francisco Petrônio de A. Medeiros

    Published 2025-04-01
    “…The sense of presence in immersive virtual environments enhances realism, facilitating information processing during practical activities. This immersion can significantly benefit computing education, especially in laboratory-intensive subjects like Computer Networks that rely on physical equipment. …”
    Get full text
    Article
  4. 7084

    Feasibility Analysis of an Immersive Network Laboratory as a Support Tool for Teaching Practices by Erberson Evangelista Vieira, Francisco Petrônio de A. Medeiros

    Published 2025-04-01
    “…The sense of presence in immersive virtual environments enhances realism, facilitating information processing during practical activities. This immersion can significantly benefit computing education, especially in laboratory-intensive subjects like Computer Networks that rely on physical equipment. …”
    Get full text
    Article
  5. 7085

    Gender Classification From Pashto Handwritten Text Images by Khan Sultan, Riaz Ahmad, Siraj Muhammad, Sulaiman Almutairi, Mohammed Abohashrh, Khalil Ullah, Abdallah Namoun, Ibrar Hussain

    Published 2025-01-01
    “…Computer vision (CV) is a subfield of computer science that enables machines to perceive, interpret, and understand visual data. …”
    Get full text
    Article
  6. 7086
  7. 7087
  8. 7088
  9. 7089

    Context-Aware Markov Sensors and Finite Mixture Models for Adaptive Stochastic Dynamics Analysis of Tourist Behavior by Xiaolong Chen, Hongfeng Zhang, Cora Un In Wong, Zhengchun Song

    Published 2025-06-01
    “…The key contribution lies in the explicit modeling of contextual shocks and the dynamic adaptation of stochastic processes, which significantly improves robustness in volatile tourism scenarios. …”
    Get full text
    Article
  10. 7090

    Modern technologies of e-learning by G. A. gyzy Mamedova, F. T. ogly Agaev

    Published 2017-07-01
    “…The article provides an overview of the technologies used in foreign universities for managing e-learning, such as 3D technologies in training programs, interactive technologies, personalization of learning using cloud computing and big data technologies. It is shown that today quite a large number of software and hardware development was created and introduced, implementing various mechanisms of introducing information technologies in the educational process. …”
    Get full text
    Article
  11. 7091
  12. 7092

    “Keeleteadlane raputab lausemalle korpusest loendisse”: lausemallide automaatse tuvastamise esimesed sammud by Kertu Saul, Kadri Muischnek, Jelena Kallas

    Published 2025-04-01
    “…The study contributes significant insights for the computational processing of Estonian syntax and suggests further directions for the efficient representation of valency patterns.…”
    Get full text
    Article
  13. 7093

    Cross‐cutting digital technologies as a tool to counteract sanctions restrictions by S.S. Krasnykh

    Published 2025-03-01
    “…The imposed sanctions restrictions lead to the transformation of economic processes, which include restricted access to external markets, investments, technologies and innovations. …”
    Get full text
    Article
  14. 7094

    Contextualization of Information Objects Towards Supporting Knowledge Management in Digital Workspaces by Mara Romanovska, Ilze Birzniece, Signe Balina

    Published 2024-10-01
    “…It is shown how combining large language models (LLMs) and organization-specific metamodels contributes to computing secondary context attributes. The research concludes that contextualizing information objects, supported by artificial intelligence and LLMs, can enhance organizational productivity by providing a ground for personalized digital workspaces, efficient information handling, and improved knowledge management processes. …”
    Get full text
    Article
  15. 7095

    A Comprehensive Review of MI-HFE and IPHFE Cryptosystems: Advances in Internal Perturbations for Post-Quantum Security by Yong Wang, Lingyue Li, Ying Zhou, Huili Zhang

    Published 2024-10-01
    “…While Grover’s algorithm presents a comparatively lesser threat to symmetric encryption, it still accelerates key search processes, creating potential vulnerabilities. In light of these challenges, there has been an intensified focus on developing quantum-resistant cryptography. …”
    Get full text
    Article
  16. 7096
  17. 7097
  18. 7098

    BedEye: A Bed Exit and Bedside Fall Warning System Based on Skeleton Recognition Technology for Elderly Patients by Liang-Bi Chen, Wan-Jung Chang, Tzu-Chin Yang

    Published 2025-01-01
    “…This ensures faster processing with minimized delays and without reliance on cloud computing, which reduces network bandwidth use. …”
    Get full text
    Article
  19. 7099

    Toward 6G: Latency-Optimized MEC Systems with UAV and RIS Integration by Abdullah Alshahrani

    Published 2025-03-01
    “…Multi-access edge computing (MEC) has emerged as a cornerstone technology for deploying 6G network services, offering efficient computation and ultra-low-latency communication. …”
    Get full text
    Article
  20. 7100