Search alternatives:
processor » processes (Expand Search)
Showing 8,481 - 8,500 results of 30,198 for search '(processor OR process) (computing)', query time: 0.31s Refine Results
  1. 8481
  2. 8482
  3. 8483
  4. 8484
  5. 8485
  6. 8486

    Achieving Business Excellence by Optimizing Corporate Forensic Readiness by Gojko Grubor, Ivan Barać, Nataša Simeunović, Nenad Ristić

    Published 2017-02-01
    “…Proposed model can, first of all, help managers of small and medium-sized companies to justify their decisions to employ digital forensic investigators and include them in their information security teams in order to choose the optimal CCIDFI model and improve forensic readiness in the computer incident management process that will result with minimization of potential losses of company in the future and improve its business quality.…”
    Get full text
    Article
  7. 8487

    Electromagnetic radiation security estimation on the residential building roof for cellular antenna by MarinaYu. . Zvezdina, Andrey V. Shokov, Yulia A. Shokova, Alexey R Lebedev

    Published 2015-09-01
    “…The difference between the developed model and the known ones lies within the research possibility not only in the computational points but within a whole computational plane. …”
    Get full text
    Article
  8. 8488

    Dynamic Patch-Based Sample Generation for Pulmonary Nodule Segmentation in Low-Dose CT Scans Using 3D Residual Networks for Lung Cancer Screening by Ioannis D. Marinakis, Konstantinos Karampidis, Giorgos Papadourakis, Mostefa Kara

    Published 2025-03-01
    “…To address the challenges of processing large CT volumes, an efficient patch-based extraction pipeline was developed. …”
    Get full text
    Article
  9. 8489

    Digital Humanities: Is it a New Science or a Set of Models and Practices of the Global Network Project? by R. I. Mamina, E. E. Yelkina

    Published 2020-10-01
    “…In general, those changes characterize the process of the new science image development in the network society.…”
    Get full text
    Article
  10. 8490

    A numerical method for solving ill-posed problems for two-dimensional integral equations of the first kind by Igor Eduardovich Naats, Victoria Igorevna Naats, Roman Andreevich Ryskalenko

    Published 2022-09-01
    “…This in turn requires the construction of regularizing algorithms in accordance with the theory of solving ill-posed problems of computational mathematics. The solution to this problem is of primary importance in computational mathematics, hence its relevance. …”
    Get full text
    Article
  11. 8491

    Crowdsourcing Evaluation of Video Summarization Algorithm by Avrajyoti Dutta, Dawid Juszka, Mikołaj Leszczuk

    Published 2024-11-01
    “…This technique helps in dividing a task into multiple parts, and each of these parts is then evaluated using a large group of individuals to solve problems that are otherwise difficult to solve using traditional computational machines. In this study, we offer a crowdsourcing subjective experiment in which summaries of processed video sequences are evaluated. …”
    Get full text
    Article
  12. 8492
  13. 8493
  14. 8494
  15. 8495

    Hermitian matrix inversion algorithm by Marina Yuryevna Zvezdina, Olga Valeryevna Komova, Nikolay Valentinovich Shatskiy, Andrey Victorovich Shokov

    Published 2015-06-01
    “…Because of complexity and a large operation number, Gaussian-Jordan method does not allow realizing the real time signal processing in computing systems of the adaptive antenna arrays that are widely used in communication, radiolocation, and radio navigation systems. …”
    Get full text
    Article
  16. 8496

    Weapon detection with FMR-CNN and YOLOv8 for enhanced crime prevention and security by Shanthi P, Manjula V

    Published 2025-07-01
    “…To overcome these challenges, the suggested system combines closed-circuit television (CCTV) surveillance cameras with advanced deep learning methods, image processing, and computer vision techniques for real-time crime prediction and prevention. …”
    Get full text
    Article
  17. 8497
  18. 8498
  19. 8499

    Study on Title Encoding Methods for e-Commerce Downstream Tasks by Cristian Cardellino, Rafael Carrascosa

    Published 2022-05-01
    “…Usually in these tasks the product titles are an appealing feature since they integrate key aspects of the product, are cheaply available and are easy to process. In this setting it makes sense to invest in a few high quality models that extract as much information as possible from the title and are shared among many downstream tasks. …”
    Get full text
    Article
  20. 8500