Search alternatives:
processor » processes (Expand Search)
Showing 8,681 - 8,700 results of 30,198 for search '(processor OR process) (computing)', query time: 0.28s Refine Results
  1. 8681
  2. 8682
  3. 8683
  4. 8684
  5. 8685
  6. 8686

    Enhancing User Experiences in Digital Marketing Through Machine Learning: Cases, Trends, and Challenges by Alexios Kaponis, Manolis Maragoudakis, Konstantinos Chrysanthos Sofianos

    Published 2025-05-01
    “…These include algorithmic bias, concerns about the privacy of the data, and the need for greater transparency of ML-based decision-making processes. This research also contributes to the field by delivering actionable, data-driven strategies for marketing professionals and offering them frameworks to deal with the evolving responsibilities and tasks that accompany the introduction of ML technologies into DM.…”
    Get full text
    Article
  7. 8687
  8. 8688
  9. 8689
  10. 8690

    Improved Big Data Security Using Quantum Chaotic Map of Key Sequence by Archana Kotangale, Meesala Sudhir Kumar, Amol P. Bhagat

    Published 2025-06-01
    “…In the era of ubiquitous big data, ensuring secure storage, transmission, and processing has become a paramount concern. Classical cryptographic methods face increasing vulnerabilities in the face of quantum computing advancements. …”
    Get full text
    Article
  11. 8691

    Simulation-Based Development of Internet of Cyber-Things Using DEVS by Laurent Capocchi, Bernard P. Zeigler, Jean-Francois Santucci

    Published 2025-06-01
    “…Cyber-Physical Systems (CPSs) integrate computing directly into physical processes to enable real-time control. …”
    Get full text
    Article
  12. 8692
  13. 8693

    Design of Morlet Wavelet Neural Networks for Solving the Nonlinear Van der Pol–Mathieu–Duffing Oscillator Model by Ali Hasan Ali, Muhammad Amir, Jamshaid Ul Rahman, Ali Raza, Ghassan Ezzulddin Arif

    Published 2025-01-01
    “…The motivation behind this study is to simplify the complex mathematical formulations and reduce the time-consuming processes involved in traditional numerical methods for solving differential equations. …”
    Get full text
    Article
  14. 8694
  15. 8695
  16. 8696

    A Hybrid Deep Learning Approach for Secure Biometric Authentication Using Fingerprint Data by Abdulrahman Hussian, Foud Murshed, Mohammed Nasser Alandoli, Ghalib Aljafari

    Published 2025-05-01
    “…Additionally, the optimized architecture reduces computational overheads, ensuring faster processing suitable for real-time authentication systems. …”
    Get full text
    Article
  17. 8697
  18. 8698
  19. 8699
  20. 8700