Search alternatives:
processor » processes (Expand Search)
Showing 7,361 - 7,380 results of 30,198 for search '(processor OR process) (computing)', query time: 0.27s Refine Results
  1. 7361

    Virtual Machining of Total Knee Replacement Products Based on Finite Element Analysis (FEA) and Re-Design Optimization by ISO 14243 by Setyoadi Yuris, Ismail Rifky, Bayuseno AP., Jujur I Nyoman, Novriansyah Robin, Darmanto, Prawibowo Hartanto, Anggoro P. W.

    Published 2025-06-01
    “…The study also explored the machining process of the femoral component, highlighting the importance of using computer-aided manufacturing (CAM) software to ensure precision in producing complex geometries. …”
    Get full text
    Article
  2. 7362
  3. 7363
  4. 7364
  5. 7365

    Multi-key fully homomorphic encryption scheme based on NTRU bootstrapping by ZHENG Junhua, JIANG Hongwei, LIU Rong, LI Yixiu, LI Wen, WENG Jian

    Published 2024-12-01
    “…Compared with other schemes, the proposed scheme exhibited higher computational efficiency in the ciphertext expansion process. …”
    Get full text
    Article
  6. 7366
  7. 7367
  8. 7368
  9. 7369

    SASP: Segment any strawberry plant, an end-to-end strawberry canopy volume estimation by Zijing Huang, Won Suk Lee, Peigeng Zhang, Hongyoung Jeon, Heping Zhu

    Published 2025-08-01
    “…A reference box of known volume is included in the scene as a calibration object, mapping computed volumes from the virtual 3D space into real-world measurements. …”
    Get full text
    Article
  10. 7370

    GAN-Augmented Naïve Bayes for identifying high-risk coronary artery disease patients using CT angiography data by Lei Zhang, Anandakumar Haldorai, Nithesh Naik

    Published 2024-10-01
    “…Adding synthetic data to the training process allowed the discriminator to be utilized further to improve predictive modeling. …”
    Get full text
    Article
  11. 7371
  12. 7372
  13. 7373

    Steganographic method of acoustic information protection in critical applications systems by Олександр Можаєв, Юрій Гнусов, Олександр Манжай, Володимир Струков, Віталій Носов, Валерій Радченко, Сергій Єнгаличев

    Published 2023-09-01
    “… The subject of the study is the process of protecting acoustic information in critical computer systems to ensure the required level of system security. …”
    Get full text
    Article
  14. 7374

    Steganographic method of acoustic information protection in critical applications systems by Oleksandr Mozhaiev, Yurii Gnusov, Oleksandr Manzhai, Volodymyr Strukov, Vitalii Nosov, Valery Radchenko, Serhii Yenhalychev

    Published 2023-11-01
    “… The subject of the study is the process of protecting acoustic information in critical computer systems to ensure the required level of system security. …”
    Get full text
    Article
  15. 7375

    A Novel Recursive Methodology for Power Flow Analysis Based on the Holomorphic Embedding Method Using the Total Multiplication of Polynomials by Glaucus R. S. Lima, Edimar J. Oliveira, Leonardo W. Oliveira, Igor D. Melo

    Published 2025-01-01
    “…The main contribution is the TMP procedure, which accelerates the recursive solution process. Due to a significantly reduced computational time for higher-order term calculations, the proposed method is well suited for real-time applications, including ill-conditioned and overloaded power networks. …”
    Get full text
    Article
  16. 7376
  17. 7377
  18. 7378

    Deep Learning Network Selection and Optimized Information Fusion for Enhanced COVID-19 Detection: A Literature Review by Olga Adriana Caliman Sturdza, Florin Filip, Monica Terteliu Baitan, Mihai Dimian

    Published 2025-07-01
    “…Recent developments in COVID-19 diagnosis involve constructing expansive multi-noise information sets while creating clinical process-oriented AI algorithms and implementing distributed learning protocols for securing information security and system stability. …”
    Get full text
    Article
  19. 7379
  20. 7380