Search alternatives:
processor » processes (Expand Search)
Showing 3,541 - 3,560 results of 30,198 for search '(processor OR process) (computing)', query time: 0.29s Refine Results
  1. 3541
  2. 3542
  3. 3543
  4. 3544

    Soft Computing Techniques to Model the Compressive Strength in Geo-Polymer Concrete: Approaches Based on an Adaptive Neuro-Fuzzy Inference System by Zhiguo Chang, Xuyang Shi, Kaidan Zheng, Yijun Lu, Yunhui Deng, Jiandong Huang

    Published 2024-11-01
    “…To reduce carbon emission in the process of creating and displaying visual art and structures (visual communication), geo-polymer concrete (GePC) is considered by designers. …”
    Get full text
    Article
  5. 3545
  6. 3546

    FPGA-based point processing for denoising of the show-through effect in scanned document images by Habibunnisha Nazeer, Nedumaran Damodaran

    Published 2023-01-01
    “…The Altera Cyclone® V DE1-SoC board was chosen for this study due to its performance, size compatibility, and real-time implementation, which are better than the programmable DSP chips. The Pixel/Point processing operations were implemented using the DSP builder tool, which boost-up better execution of computational operations involved in complex algorithms. …”
    Get full text
    Article
  7. 3547
  8. 3548

    Heuristically enhanced multi-head attention based recurrent neural network for denial of wallet attacks detection on serverless computing environment by Sarah A. Alzakari, Mohammad Alamgeer, Abdullah M. Alashjaee, Monir Abdullah, Khalid Nazim Abdul Sattar, Asma Alshuhail, Ahmad A. Alzahrani, Abdulwhab Alkharashi

    Published 2025-04-01
    “…Abstract Denial of Wallet (DoW) attacks are a cyber threat designed to utilize and deplete an organization’s financial resources by generating excessive prices or charges in their cloud computing (CC) and serverless computing platforms. …”
    Get full text
    Article
  9. 3549

    Modeling of Ionization and Recombination Processes in Plasma with Arbitrary Non-Maxwellian Electron Distribution by Chengcai Shen, Xiaocan Li, Yuan-Kuen Ko, John C. Raymond, Fan Guo, Vanessa Polito, Viviane Pierrard

    Published 2025-01-01
    “…In astronomical environments, the high-temperature emission of plasma mainly depends on ion charge states, requiring accurate analysis of the ionization and recombination processes. For various phenomena involving energetic particles, non-Maxwellian distributions of electrons exhibiting high-energy tails can significantly enhance the ionization process. …”
    Get full text
    Article
  10. 3550

    Advanced climate model evaluation with ESMValTool v2.11.0 using parallel, out-of-core, and distributed computing by M. Schlund, B. Andela, J. Benke, R. Comer, B. Hassler, E. Hogan, P. Kalverla, A. Lauer, B. Little, S. Loosveldt Tomas, F. Nattino, P. Peglar, V. Predoi, S. Smeets, S. Worsley, M. Yeo, K. Zimmermann

    Published 2025-07-01
    “…These optimizations include parallel computing (execute multiple computation tasks simultaneously), out-of-core computing (process data larger than available memory), and distributed computing (spread computation tasks across multiple interconnected nodes or machines). …”
    Get full text
    Article
  11. 3551

    Analisis Kepuasan Pengguna Aplikasi Sidawai Menggunakan End User Computing Statisfaction (EUCS) DAn Importance Performance Analysis (IPA) by Kiki Haerani, Khairul Imtihan, Wafiah Murniati

    Published 2024-08-01
    “…To determine the gap between expectations and performance, and measure user satisfaction with the SIDAWAI Application using the IPA (Importance Performance Analysis) method based on the results of processing questionnaire data from the End-User Computing Statisfanction (EUCS) model. …”
    Get full text
    Article
  12. 3552
  13. 3553

    High-Power, Computer-Controlled, Light-Emitting Diode–Based Light Sources for Fluorescence Imaging and Image-Guided Surgery by Sylvain Gioux, Vida Kianzad, Razvan Ciocan, Sunil Gupta, Rafiou Oketokoun, John V. Frangioni

    Published 2009-05-01
    “…We also describe software that can be used to design multimodule light housings and an embedded processor that permits computer control and temperature monitoring. …”
    Get full text
    Article
  14. 3554
  15. 3555

    A dual-mode transparent device for 360° quasi-omnidirectional self-driven photodetection and efficient ultralow-power neuromorphic computing by Min Jiang, Yukun Zhao, Tong Liu, Yanyan Chang, Yuan Tang, Min Zhou, Yiping Shi, Jianya Zhang, Lifeng Bian, Shulong Lu

    Published 2025-08-01
    “…This work provides new insights into the integrated manufacturing of multifunctional monolithic devices and foresees their immense potential in upcoming advanced, low-power neuromorphic computing systems.…”
    Get full text
    Article
  16. 3556

    Fortified-Edge 2.0: Advanced Machine-Learning-Driven Framework for Secure PUF-Based Authentication in Collaborative Edge Computing by Seema G. Aarella, Venkata P. Yanambaka, Saraju P. Mohanty, Elias Kougianos

    Published 2025-06-01
    “…These feature vectors are then processed using lightweight cryptographic primitives, including ECDSA, to enable secure authentication without exposing the original CRP. …”
    Get full text
    Article
  17. 3557
  18. 3558

    Enhanced sensor web services by incorporating IoT interface protocols and spatio-temporal data streams for edge computing-based sensing by Dong Chen, Shaoju Wang, Chao Wang, Xiang Zhang, Nengcheng Chen

    Published 2025-01-01
    “…Compared with cloud-based architectures, this approach significantly improves resource accessibility and real-time processing. By extending SensorML and Sensor Observation Service (SOS), the framework bridges the gap between conventional Sensor Webs and edge computing demands. …”
    Get full text
    Article
  19. 3559

    Safety After Dark: A Privacy Compliant and Real-Time Edge Computing Intelligent Video Analytics for Safer Public Transportation by Johan Barthelemy, Umair Iqbal, Yan Qian, Mehrdad Amirghasemi, Pascal Perez

    Published 2024-12-01
    “…The solution captures video streams from remote train stations closed circuit television (CCTV) networks, processes the data in the cloud, applies the action recognition model, and transmits the results to a live web application. …”
    Get full text
    Article
  20. 3560