Search alternatives:
processor » processes (Expand Search)
Showing 921 - 940 results of 30,198 for search '(processor OR process) (computing)', query time: 0.26s Refine Results
  1. 921

    PRACTICE GUIDELINES FOR THE USE OF STANDARDS FOR DESIGN OF INTERACTIVE SYSTEMS IN TERMAL IMAGING PROCESSING TASKS by A. Y. Tsunikov

    Published 2016-10-01
    “…According to the results of theoretical analysis of the current state of the problem of data processing automation of noisy and distorted IR images revealed that the image processing procedure is an indispensable component of the total signal processing procedure in the chain of data transformations from its registration photodetectors to the presentation to the operator, so the lack of standardized quantitative criterion imaging quality to solve practical problems of modern optoelectronic instrument makes it especially urgent to develop treatment algorithms thermal images with ergonomic requirements for computer systems. …”
    Get full text
    Article
  2. 922

    Photonics Breakthroughs 2024: Nonlinear Photonic Computing at Scale by Hao Wang, Jianqi Hu, Andrea Morandi, Alfonso Nardi, Fei Xia, Xuanchen Li, Romolo Savo, Qiang Liu, Rachel Grange, Sylvain Gigan

    Published 2025-01-01
    “…A photonic neural network utilizes photons instead of electrons to process information, with the prospect of higher computing efficiency, lower power consumption, and reduced latency. …”
    Get full text
    Article
  3. 923

    Computational mechanism underlying switching of motor actions. by Shan Zhong, Nader Pouratian, Vassilios Christopoulos

    Published 2025-02-01
    “…Although considerable research has been devoted to understanding how the brain switches actions, the computations underlying the switching process and how it relates to the selecting and stopping processes remain elusive. …”
    Get full text
    Article
  4. 924

    A Reconfigurable Framework for Hybrid Quantum–Classical Computing by Pratibha, Naveed Mahmud

    Published 2025-05-01
    “…In this paper, we propose a reconfigurable framework for hybrid quantum–classical computing. The proposed framework integrates field-programmable gate arrays (FPGAs) with quantum processing units (QPUs) for deploying HQC algorithms. …”
    Get full text
    Article
  5. 925

    Structure for interaction software process modules in the development of technological processes of cast by Yu. N. Fasevich, F. I. Rudnitsky

    Published 2019-04-01
    “…The software algorithm uses the means of computational experiment to determine the optimal values of the parameters in the development of cast processes. …”
    Get full text
    Article
  6. 926

    THE ROLE OF COMPUTED TOMOGRAPHY IN THE DIAGNOSIS OF RETROPERITONEAL FIBROSIS by A. O. Rudnev, M. N. Maxim, V. B. Vizhgorodsky, A. V. Kiryushin, S. Yu. Kotans

    Published 2018-06-01
    “…Although the final diagnosis can be made only on the basis of biopsy, computed tomography is of great importance for the evaluation of the pathological process, it allows diagnosing the disease, assessing its prevalence and observing the dynamics during treatment. …”
    Get full text
    Article
  7. 927

    ELEMENTS OF COMPUTER LEXICOGRAPHY IN AGRICULTURAL MANAGERS EDUCATION by Lesia H. Matviienko, Olena H. Krasota

    Published 2021-12-01
    “…Special programs (databases, computer files, word processing programs) let us automatically generate dictionary entries, store dictionary information and process it. …”
    Get full text
    Article
  8. 928

    Computed Tomography in the Diagnosis of Neonatal Lung Diseases by S. A. Perepelitsa, V. Yu. Kanykin, S. V Goncharov, Ye. F. Smerdova, A. M. Golubev

    Published 2009-04-01
    “…CT established the pattern of a pathological process in the lung. It clarified the nature of the disease in all the cases. …”
    Get full text
    Article
  9. 929
  10. 930

    Computer-Modeling System of Agronomist’s Labor Functions by I. E. Bystrenina

    Published 2024-11-01
    “…This development can also be used in the system of additional education for children. Using a computer game in the educational process will expand children’s knowledge about agriculture: it will familiarize them with different agricultural processes, such as planting, growing and harvesting crops, as well as with various types of crop cultivation technologies. …”
    Get full text
    Article
  11. 931

    Monitored Reconstruction: Computed Tomography as an Anytime Algorithm by Konstantin Bulatov, Marina Chukalina, Alexey Buzmakov, Dmitry Nikolaev, Vladimir V. Arlazarov

    Published 2020-01-01
    “…Computed tomography is an important technique for non-destructive analysis of an object’s internal structure, relevant for scientific studies, medical applications, and industry. …”
    Get full text
    Article
  12. 932

    Computationally secure steganography based on speech synthesis by Menghan LI, Kejiang CHEN, Weiming ZHANG, Nenghai YU

    Published 2022-06-01
    “…The steganography theory of computing security has been proposed for a long time, but it has not been widely adopted for mainstream steganography using multimedia data as a carrier.The reason is that the prerequisite for calculating secure steganography is to obtain the accurate distribution of the carrier or to accurately sample according to the carrier distribution.However, naturally collected images and audio/video cannot meet this prerequisite.With the development of deep learning technology, various machine-generated media such as image generation and synthesized speech, have become more and more common on the Internet and then generated media has become a reasonable steganography carrier.Steganography can use normal generated media to cover up secret communications, and pursue in distinguishability from normal generated media.The distribution learned by some generative models is known or controllable, which provides an opportunity to push computational security steganography for practical use.Taking the widely used synthetic speech model as an example, a computationally secure symmetric key steganography algorithm was designed and implemented.The message was decompressed into the synthetic audio according to the decoding process of arithmetic coding based on the conditional probability of sample points, and the message receiver had the same generation model to complete the message extraction by reproducing the audio synthesis process.The public key steganography algorithm was additionally designed based on this algorithm, which provided algorithmic support for the realization of full-flow steganographic communication.Steganographic key exchange ensured the security of steganographic content and the security of steganographic behavior was also achieved.The theoretical analysis showed that the security of the proposed algorithm is determined by the randomness of the embedded message.And the steganography analysis experiment further verified that the attacker cannot distinguish the synthesized carrier audio from the encrypted audio.…”
    Get full text
    Article
  13. 933

    Parameter estimation and model selection in computational biology. by Gabriele Lillacci, Mustafa Khammash

    Published 2010-03-01
    “…A central challenge in computational modeling of biological systems is the determination of the model parameters. …”
    Get full text
    Article
  14. 934

    Data-intensive service deployment based on edge computing by Yongmei GAO, Guanjie CHENG

    Published 2019-07-01
    “…The demand is getting higher and higher for data processing due to big data volume, thus, data-intensive service shave emerged. …”
    Get full text
    Article
  15. 935

    Data-intensive service deployment based on edge computing by Yongmei GAO, Guanjie CHENG

    Published 2019-07-01
    “…The demand is getting higher and higher for data processing due to big data volume, thus, data-intensive service shave emerged. …”
    Get full text
    Article
  16. 936
  17. 937

    Computational Work with Very Large Text Collections by John Unsworth

    Published 2011-06-01
    “…The argument of the piece is that interoperability is a process as well as a state, that it requires mechanisms that would sustain it, and that TEI is one of those mechanisms.…”
    Get full text
    Article
  18. 938

    Formation of the measuring channel for quantum diagnostic computer by S. V. Dianov, V. M. Novichkov

    Published 2019-08-01
    “…The result is a description of the processes in the quantum measuring channel, which is used to enter diagnostic data in a quantum computer. …”
    Get full text
    Article
  19. 939

    Efficiently computing RKN for keyword queries on XML data by HENZi-yang C, ANGXuan W, ANGXian T

    Published 2014-07-01
    “…As RKN-Base cannot avoid processing all useless nodes,an optimized algorithm,namely RKN-Optimized,was then proposed,which computes RKN sets based on the set of ELCA nodes, rather than the set of inverted lists as RKN-Base does. …”
    Get full text
    Article
  20. 940

    Efficiently computing RKN for keyword queries on XML data by HENZi-yang C, ANGXuan W, ANGXian T

    Published 2014-07-01
    “…As RKN-Base cannot avoid processing all useless nodes,an optimized algorithm,namely RKN-Optimized,was then proposed,which computes RKN sets based on the set of ELCA nodes, rather than the set of inverted lists as RKN-Base does. …”
    Get full text
    Article