Search alternatives:
processor » processes (Expand Search)
Showing 12,701 - 12,720 results of 30,198 for search '(processor OR process) (computing)', query time: 0.30s Refine Results
  1. 12701
  2. 12702
  3. 12703
  4. 12704

    Copy-move forgery detection using binary discriminant features by Priya Mariam Raju, Madhu S. Nair

    Published 2022-02-01
    “…Experimental results show that the proposed method has better detection accuracy, in terms of precision, recall and F1 Score, when compared with the state-of-the-art methods of copy-move forgery detection, under conditions of plain copy-move forgery as well as post-processing conditions like brightness changes, contrast adjustments, color reduction and blurring.…”
    Get full text
    Article
  5. 12705
  6. 12706

    Lightweight detection of cotton leaf diseases using StyleGAN2-ADA and decoupled focused self-attention by Henghui Mo, Linjing Wei

    Published 2025-05-01
    “…The Layer-Adaptive Magnitude-based Pruning (LAMP) method reduces computational and memory demands, and the teacher-assistant-student architecture further improves accuracy through knowledge distillation. …”
    Get full text
    Article
  7. 12707
  8. 12708
  9. 12709
  10. 12710
  11. 12711
  12. 12712
  13. 12713

    Graph-based reinforcement learning for software-defined networking traffic engineering by Jingwen Lu, Chaowei Tang, Wenyu Ma, Wenjuan Xing

    Published 2025-07-01
    “…This paper proposes GRL-TE (Graph-based Reinforcement Learning for Traffic Engineering), a novel framework that achieves near-optimal performance while maintaining computational efficiency across diverse network scales. …”
    Get full text
    Article
  14. 12714
  15. 12715

    Low-overhead defect-adaptive surface code with bandage-like super-stabilizers by Zuolin Wei, Tan He, Yangsen Ye, Dachao Wu, Yiming Zhang, Youwei Zhao, Weiping Lin, He-Liang Huang, Xiaobo Zhu, Jian-Wei Pan

    Published 2025-05-01
    “…However, a major challenge arises from defects in processor fabrication, as well as occasional losses or cosmic rays during the computing process, all of which can lead to qubit malfunctions and disrupt error-correcting codes’ normal operations. …”
    Get full text
    Article
  16. 12716

    Bias-field digitized counterdiabatic quantum algorithm for higher-order binary optimization by Sebastián V. Romero, Anne-Maria Visuri, Alejandro Gomez Cadavid, Anton Simen, Enrique Solano, Narendra N. Hegade

    Published 2025-08-01
    “…Our results show that BF-DCQO offers an effective path for solving large-scale HUBO problems on current and near-term quantum processors.…”
    Get full text
    Article
  17. 12717

    Study on Key Technologies of Intelligent IoT Device by Yingqi Wei, Weiping Lin, Ying Li

    Published 2015-08-01
    “…Smart IoT devices go into product stage from hype stage.Sensors are being miniaturized,integrated,intelligent and diversified,turn the reality into digital.IoT device’s intelligent is based on power of processor and advanced operation system,and be enhanced by the cloud computing and big data.As smart phone,the smart IoT devices need to build an active ecosystem that engage developers to innovate.The several key technologies development status and future trends were explored,analyzed,and displayed.…”
    Get full text
    Article
  18. 12718

    Heterogeneous bioinformatic data encryption on portable devices by Hao Chen, Xiayun Hong, Yao Cheng, Xiaotong Wang, Liyan Chen, Xuan Cheng, Juncong Lin

    Published 2025-04-01
    “…For mobile devices, encryption is even more important yet more challenging, as these devices are usually used in environments that may not be well protected and have rather limited computing resources. With heterogeneous multi-core processors becoming popular on mobile devices to satisfy different needs of applications, designing heterogeneous algorithms to harness all the available resources are tricky but have the potential to deliver high performance. …”
    Get full text
    Article
  19. 12719

    Application of Grouped MCDM Technique for Ranking and Selection of Laptops in the Current Scenario of COVID-19 by Avinash Gaur

    Published 2023-08-01
    “…This paper exhibits a group of two MCDM techniques; Best Worst Method (BWM) and Analytical Hierarchy Process (AHP), which have been used to evaluate relative weights of considered conflicting criteria such as brand, price, storage capacity, RAM, processor, weight, touch screen, Bluetooth, and screen size, and these weights are used in the Technique for Order Preference by Similarity to Ideal Solution (TOPSIS) for ranking and selecting the best product of laptops.…”
    Get full text
    Article
  20. 12720

    FalconSign: An Efficient and High-Throughput Hardware Architecture for Falcon Signature Generation by Yi Ouyang, Yihong Zhu, Wenping Zhu, Bohan Yang, Zirui Zhang, Hanning Wang, Qichao Tao, Min Zhu, Shaojun Wei, Leibo Liu

    Published 2024-12-01
    “…Our approach involves a new scheduling flow and architecture for Fast-Fourier Sampling to enhance computing unit reuse and reduce processing time. Additionally, we introduce several optimized modules, including configurable randomness generation units, parallel floating-point processing units, and an optimized SamplerZ module, to improve execution efficiency. …”
    Get full text
    Article