Search alternatives:
processor » processes (Expand Search)
Showing 2,141 - 2,160 results of 30,198 for search '(processor OR process) (computing)', query time: 0.20s Refine Results
  1. 2141
  2. 2142

    Development of the course of process management of the enterprise with the use of free software by A. G. Mikheev, V. E. Pyatetskiy, D. S. Kuznetsov

    Published 2018-05-01
    “…The goal of the search is to develop teaching methods of the process approach to enterprise management, which involves the execution of business process instances in a computer environment. …”
    Get full text
    Article
  3. 2143
  4. 2144

    Discovering hierarchical process models: an approach based on events partitioning by Antonina K. Begicheva, Irina A. Lomazova, Roman A. Nesterov

    Published 2024-09-01
    “…Process mining is a field of computer science that deals with the discovery and analysis of process models based on automatically generated event logs. …”
    Get full text
    Article
  5. 2145

    Teaching methods of work with data in the course of process management by A. G. Mikheev

    Published 2016-12-01
    “…The purpose of research is the development of a distance training method to teach students to work with data, used in the training course of process approach to the enterprise management. A difficult point in teaching development of business-processes that involve the execution of business-process instances in the enterprise computer environment is the interaction of business processes with data in cases where process management is taught to students, studying in the field of business information technology or financial and accounting professions. …”
    Get full text
    Article
  6. 2146
  7. 2147
  8. 2148

    PyNET-Q×Q: An Efficient PyNET Variant for Q×Q Bayer Pattern Demosaicing in CMOS Image Sensors by Minhyeok Cho, Haechang Lee, Hyunwoo Je, Kijeong Kim, Dongil Ryu, Albert No

    Published 2023-01-01
    “…Deep learning-based image signal processor (ISP) models for mobile cameras can generate high-quality images that rival those of professional DSLR cameras. …”
    Get full text
    Article
  9. 2149

    Implementation of A Geographically Integrated On-Demand Computer Service System Using the KNN Method by Hafiq Ibnu Wardana, Astrid Novita Putri

    Published 2025-07-01
    “…Difficult access for customers with limited mobility, the lack of location-based partner distribution, and the manual partner search process remain major challenges in conventional computer service. …”
    Get full text
    Article
  10. 2150

    Parallel Jacobian Computation Based on Distance-2 Algorithm and Its Application in Coupling Problems by LIU Lixun, ZHANG Han, PENG Xinru, DOU Qinrong, WU Yingjie, GUO Jiong, LI Fu

    Published 2024-06-01
    “…The Jacobian coloring and Jacobian computing based on this method were tested under a different number of processors. …”
    Article
  11. 2151

    16-channel photonic solver for optimization problems on a silicon chip by Jiayi Ouyang, Shengping Liu, Ziyue Yang, Wei Wang, Xue Feng, Yongzhuo Li, Yidong Huang

    Published 2025-03-01
    “…The photonic chip is employed to perform the optical vector-matrix multiplication (OVMM) to calculate the cost function of the QUBO problem, while the electronic processor runs the heuristic algorithm to search for the optimal solution. …”
    Get full text
    Article
  12. 2152
  13. 2153
  14. 2154

    Research on intrusion response strategy based on static Bayesian game in mobile edge computing network by Wei FAN, Cheng PENG, Dali ZHU, Yuqing WANG

    Published 2023-02-01
    “…In the mobile edge computing (MEC) environment, the resources of edge nodes are limited.It is difficult to detect the intrusion process accurately, and there is no effective intrusion response strategy to deal with external intrusions.An intrusion detection network structure suitable for mobile edge computing environment was proposed and an intrusion response decision model based on static Bayesian game was established to simulate the network interaction behavior between edge nodes and external intruders.The probability of attackers and defenders in the game process was predicted respectively.The influence of the system resource, the cost of intrusion response, the detection rate and false alarm rate were considered comprehensively by the intrusion response decision model.The response decision of the intrusion detection system was optimized on the basis of the considering both resource consumption of the intrusion detection and the privacy protection of the edge nodes.The factors that affected the decision-making of intrusion response were analyzed, and the experimental basis for the specific application was provided.…”
    Get full text
    Article
  15. 2155

    Research on intrusion response strategy based on static Bayesian game in mobile edge computing network by Wei FAN, Cheng PENG, Dali ZHU, Yuqing WANG

    Published 2023-02-01
    “…In the mobile edge computing (MEC) environment, the resources of edge nodes are limited.It is difficult to detect the intrusion process accurately, and there is no effective intrusion response strategy to deal with external intrusions.An intrusion detection network structure suitable for mobile edge computing environment was proposed and an intrusion response decision model based on static Bayesian game was established to simulate the network interaction behavior between edge nodes and external intruders.The probability of attackers and defenders in the game process was predicted respectively.The influence of the system resource, the cost of intrusion response, the detection rate and false alarm rate were considered comprehensively by the intrusion response decision model.The response decision of the intrusion detection system was optimized on the basis of the considering both resource consumption of the intrusion detection and the privacy protection of the edge nodes.The factors that affected the decision-making of intrusion response were analyzed, and the experimental basis for the specific application was provided.…”
    Get full text
    Article
  16. 2156
  17. 2157

    Stage-based colorectal cancer prediction on uncertain dataset using rough computing and LSTM models by K. Supriya, A. Anitha

    Published 2024-11-01
    “…Abstract Artificial intelligence (AI) is an attractive field of Computer Science that helps to classify and to predict various real-time applications. …”
    Get full text
    Article
  18. 2158

    Analisis Kinerja Jaringan Sensor Nirkabel untuk Edge Computing Menggunakan LORA SX1278 by Mochammad Hannats Hanafi Ichsan

    Published 2021-10-01
    “…The sensing process can be done by using various sensors as needed, while the technology for processing the sensing node is called Edge Computing technology. …”
    Get full text
    Article
  19. 2159

    Effects of AlOx Sub‐Oxide Layer on Conductance Training of Passive Memristor for Neuromorphic Computing by Qin Xie, Xinqiang Pan, Wenbo Luo, Yao Shuai, Yi Wang, Junde Tong, Zebin Zhao, Chuangui Wu, Wanli Zhang

    Published 2025-05-01
    “…Abstract Memristors are recognized as crucial devices for the hardware implementation of neuromorphic computing. The conductance training process of memristors has a direct impact on the performance of neuromorphic computing. …”
    Get full text
    Article
  20. 2160