Search alternatives:
processor » processes (Expand Search)
Showing 6,941 - 6,960 results of 30,198 for search '(processor OR process) (computing)', query time: 0.21s Refine Results
  1. 6941
  2. 6942

    Mechanistic Simulation of Salt‐Affected Soil‐Plant‐Atmosphere Continuum Dynamics in Seasonally Frozen Regions by Yihao Xun, Xu Xu, Barret Kurylyk, Xinhu Li, Danning Mu, Guanhua Huang

    Published 2024-11-01
    “…Abstract The salt‐affected Soil‐Plant‐Atmosphere Continuum (SPAC) is a dynamic, interactive system that is particularly complex in seasonally frozen regions where salt transport, precipitation‐dissolution, and soil freeze‐thaw processes play crucial, interrelated roles. Understanding these coupled processes and representing them with mathematical models is critical for effective management of SPAC systems. …”
    Get full text
    Article
  3. 6943
  4. 6944

    Deep learning-based phase demodulation for distributed acoustic sensor by Yiming Tang, Kewei Liu, Chen Liu, Haiyong Wu, Rugang Wang, Mengmeng Chen, Fei Xu

    Published 2025-08-01
    “…The proposed approach aims to replace the computationally intensive processes of traditional demodulation algorithms, such as the Hilbert transform, in specific scenarios. …”
    Get full text
    Article
  5. 6945

    Design and Research of Intelligent Chatbot for Campus Information Consultation Assistant by Yao Song, Chunli Lv, Kun Zhu, Xiaobin Qiu

    Published 2025-03-01
    “…They can be used as the interface of human‐computer interaction in this assistant; learning becomes more interesting. …”
    Get full text
    Article
  6. 6946

    Reinforcement Learning-Based Generative Security Framework for Host Intrusion Detection by Yongsik Kim, Su-Youn Hong, Sungjin Park, Huy Kang Kim

    Published 2025-01-01
    “…Since the attack does not occur only at a specific point in the network, there is a limitation in identifying computer intrusion simply using network packets. A Host-based Intrusion Detection System (HIDS) is a highly effective tool for monitoring computer systems and detecting unusual or unauthorized activities. …”
    Get full text
    Article
  7. 6947
  8. 6948
  9. 6949
  10. 6950
  11. 6951
  12. 6952
  13. 6953
  14. 6954
  15. 6955
  16. 6956
  17. 6957
  18. 6958
  19. 6959

    AI-Driven Precision: Transforming Below-Knee Amputation Care in Modern Healthcare by Sarah Duraid AlQaissi, Ahmed A.A. AlDuroobi, Abdulkader Ali. A. Kadaw

    Published 2024-09-01
    “… Recently, three-dimensional models 3DM in the prosthetics field gained popularity, especially in the context of residual limb shape creation resulting from collecting medical images in Digital Imaging and Communications in Medicine DICOM format from a magnetic resonance imaging MRI after image processing accurately. In this study, a three-dimensional model of the residual limb for a patient with transtibial amputation was realized with the integration of artificial intelligence and a computer vision approach demonstrating the benefits of AI segmentation tools and artificial algorithms to generate higher accuracy three-dimensional model before prosthetic socket design or in case of comparison the 3D model generated from MRI with another 3D model generated from another technique, where a residual limb of a 23 years old male patient with amputation in the left leg wearing a prosthetic socket liner, and having 62 kg weight, 168 cm height, with high activity level. …”
    Get full text
    Article
  20. 6960

    METAHEURISTIC-DRIVEN MULTI OBJECTIVE FIR FILTER DESIGN FOR ECG DENOISING by Mehmet Fatih Karakaş, Fatma Latifoğlu

    Published 2025-06-01
    “…Digital signal processing in biomedical applications requires advanced filtering techniques that can simultaneously optimize multiple performance criteria. …”
    Get full text
    Article