Search alternatives:
processor » processes (Expand Search)
Showing 13,241 - 13,260 results of 30,198 for search '(processor OR process) (computing)', query time: 0.22s Refine Results
  1. 13241

    Multifractal Feature Descriptor for Histopathology by Chamidu Atupelage, Hiroshi Nagahashi, Masahiro Yamaguchi, Michiie Sakamoto, Akinori Hashiguchi

    Published 2012-01-01
    “…Observing the structural changes of these chaotic textures from the human eye is challenging process. However, the challenge can be defeat by forming mathematical descriptor to represent the histologic texture and classify the structural changes via a sophisticated computational method.…”
    Get full text
    Article
  2. 13242

    Probabilistic approach to robust wearable gaze tracking by Miika Toivanen, Kristian Lukander, Kai Puolamäki

    Published 2017-11-01
    “…This paper presents a method for computing the gaze point using camera data captured with a wearable gaze tracking device. …”
    Get full text
    Article
  3. 13243
  4. 13244

    Realization of vOLT and development trend by Fengchao FU, Peng WANG, Yu MAO, Yongmei HUANG, Xiaobing GAO, Aihua ZHANG, Guoqiang LIN

    Published 2018-07-01
    “…SDN technology,NFV technology and cloud computing technology have been studied widely recently.How to realize vOLT based on these three techniques mentioned above was studied in order to solve theproblems that the OLTs of traditional PON faced,such as the OLTs of the PON were too difficultto operate and maintain,the resources allocation including ports,VLAN,MAC and others were not flexible,and theservice provisioning process was complicated.Four vOLT schemes were proposed.From the perspectiveof telecom operators,these four methods were compared and analyzed from the perspectives of application scenariosand the difficulty of introduction.Finally,the evolution route and the development trend of vOLT were conclued.…”
    Get full text
    Article
  5. 13245
  6. 13246

    Benchmarking QCi's EmuCore Device for Time Series Forecasting by Babak Emami, Prajnesh Kumar, Wesley Dyk

    Published 2025-05-01
    “… Reservoir computing (RC) has emerged as an efficient and scalable approach for processing time-dependent data, particularly in physical reservoir computing implementations. …”
    Get full text
    Article
  7. 13247
  8. 13248
  9. 13249
  10. 13250
  11. 13251

    METHODOLOGICAL APPROACHES TO CREATION OF THE RISK MANAGEMENT SUBSYSTEM IN A CONTROL SYSTEM OF THE INTEGRATED INDUSTRIAL COMPANY by О. М. Коваленко, О. В. Станіславик

    Published 2017-02-01
    “…The subject of the research is a process of creation of the risk management subsystem in a control system of the integrated industrial company. …”
    Get full text
    Article
  12. 13252

    Semiconductor Wafer Defect Recognition Based on Improved Coordinate Attention Mechanism by Hao He, Yuanjie Wei, Xionghao Lin, Minmin Zhu, Haizhong Zhang

    Published 2025-01-01
    “…In the semiconductor wafer manufacturing process, it is necessary to inspect the electrical parameters and functions of the wafer to identify the defects in the chip manufacturing process. …”
    Get full text
    Article
  13. 13253

    Multi-locus analysis of genomic time series data from experimental evolution. by Jonathan Terhorst, Christian Schlötterer, Yun S Song

    Published 2015-04-01
    “…The mean and covariance structure of the Gaussian process are obtained by computing the corresponding moments in discrete-time Wright-Fisher models conditioned on the presence of a linked selected site. …”
    Get full text
    Article
  14. 13254
  15. 13255

    Community Vitality in Dynamic Temporal Networks by Fu Cai, Li Min, Zou Deqing, Qu Shuyan, Han Lansheng, James J. Park

    Published 2013-12-01
    “…In this paper, we put forward the concept of Community Vitality (CV), which shows a community's life intensity on a time slice. In the process of computing CV, the “dead communities” can also be distinguished. …”
    Get full text
    Article
  16. 13256
  17. 13257
  18. 13258
  19. 13259
  20. 13260

    Design of Block-Scrambling-Based privacy protection mechanism in healthcare using fusion of transfer learning models with Hippopotamus optimization algorithm by Ghada Moh. Samir Elhessewi, Mohammed Yahya Alzahrani, Mohammad Alamgeer, Abdulbasit A. Darem, Da’ad Albalawneh, Mohammed Alqahtani, Mutasim Al Sadig, Sultan Alanazi

    Published 2025-07-01
    “…At first, the block-scrambling-based encryption (BSBE) technique is utilized in the image encryption pre-processing stage, and then the decryption process is performed. …”
    Get full text
    Article