Search alternatives:
processor » processes (Expand Search)
Showing 10,661 - 10,680 results of 30,198 for search '(processor OR process) (computing)', query time: 0.26s Refine Results
  1. 10661
  2. 10662
  3. 10663
  4. 10664

    Design a Tool for Generating Test Cases using Swarm Intelligence by Shahbaa Khaleel, Ashraf Al Thanoon

    Published 2013-03-01
    “…And that was conducted through using the Particle Swarm Optimization PSO and Cat Swarm Optimization CSO in generating optimal test cases of the software written with C++ language in an automatic way because that enables the corporation which develops the program to save time and costs as well as ensuring the test process quality, which is estimated by 50% of the product cost. …”
    Get full text
    Article
  5. 10665

    Machine Learning Potential for Serpentines by Hongjin Wang, Chenxing Luo, Renata M. Wentzcovitch

    Published 2024-12-01
    “…Abstract Serpentines are layered hydrous magnesium silicates (MgO⋅SiO2⋅H2O) formed through serpentinization, a geochemical process that significantly alters the physical property of the mantle. …”
    Get full text
    Article
  6. 10666

    Machine Learning Techniques for Kinship Verification: A Review by Olivia Oraha, Yusra Mohammad

    Published 2025-06-01
    “…Kinship verification is an automatic determining process of people relationships, if two or more individuals are in kin relation or not. …”
    Get full text
    Article
  7. 10667
  8. 10668
  9. 10669
  10. 10670

    Classification of Malware Images Using Fine-Tunned ViT by Özal Yıldırım, Oğuzhan Katar

    Published 2024-04-01
    “…In recent years, deep learning techniques have shown promising results in automating the process of malware classification. This paper presents a novel approach to malware image classification using the Vision Transformer (ViT) architecture. …”
    Get full text
    Article
  11. 10671

    Use the Genetic Algorithm to Encode and Hide Gray Image Data by Raya Essa, Reham Essa, Inam Sulaiman

    Published 2013-03-01
    “…With the development of means of communication, computer science and information exchange via electronic information networks an  urgent need emerged to find ways to save exchanged information. …”
    Get full text
    Article
  12. 10672
  13. 10673
  14. 10674

    Controlling and Protecting Windows Applications by Analyzing and Manipulating PE File Format by Rawaa Qasha, Zaid Monther

    Published 2012-07-01
    “…Also it includes analyzing the structure of PE file and comparing a specified part from PE with a same part from common viruses file, this process offers a good way to detect malicious programs and viruses in the computer by saving viruses signatures in a specified file and scanning all PE files. …”
    Get full text
    Article
  15. 10675
  16. 10676
  17. 10677
  18. 10678
  19. 10679
  20. 10680