Search alternatives:
processor » processes (Expand Search)
Showing 13,421 - 13,440 results of 30,198 for search '(processor OR process) (computing)', query time: 0.27s Refine Results
  1. 13421

    Separate Analysis of Informational Signs in Multi-Parametric Combined Patterns Recognition Systems by Zakhozhay O.I., Menyaylenko A.S., Lyfar V.A.

    Published 2019-06-01
    “…Well known solutions to this problem: data processing algorithms complication, boosting algorithms using and install more productive computing systems. …”
    Get full text
    Article
  2. 13422

    Adaptive Top-K Algorithm for Medical Conversational Diagnostic Model by Yiqing Yang, Guoyin Zhang, Yanxia Wu, Zhixiang Zhao, Yan Fu

    Published 2024-08-01
    “…Nevertheless, such systems in acute medical situations need to process information quickly and accurately, but the complexity of differential diagnosis increases the system’s computational cost. …”
    Get full text
    Article
  3. 13423
  4. 13424

    A machine learning based authentication and intrusion detection scheme for IoT users anonymity preservation in fog environment. by Khondokar Oliullah, Md Whaiduzzaman, Md Julkar Nayeen Mahi, Tony Jan, Alistair Barros

    Published 2025-01-01
    “…Authentication is a critical challenge in fog computing security, especially as fog servers provide services to many IoT users. …”
    Get full text
    Article
  5. 13425

    AI-Based Linguistic Frameworks for Monitoring Physical Health, Sports Performance, and Educational Contexts by Rakhimov Vladimir, Saidnazarov Ulugbek, Mustafaev Ispandiyar

    Published 2025-01-01
    “…Advancements in discourse analysis techniques on health and sports data streams are challenging traditional conceptions of diagnostic validity and educational feedback systems, and in the process, opening up windows of opportunity for redefining the interpretive logics associated with language-mediated monitoring systems. …”
    Get full text
    Article
  6. 13426

    Evaluation of Slope Stability and Landslide Prevention in a Closed Open-Pit Mine Used for Water Storage by Pengjiao Zhang, Yuan Gao, Yachao Liu, Tianhong Yang

    Published 2025-08-01
    “…This study shows that during the impoundment process, the slope stability has a nonlinear decreasing trend due to the decrease in effective stress caused by the increase in pore water pressure. …”
    Get full text
    Article
  7. 13427

    A Comprehensive Skills Analysis of Novice Software Developers Working in the Professional Software Development Industry by Imdad Ahmad Mian, null Ijaz-ul-Haq, Aamir Anwar, Roobaea Alroobaea, Syed Sajid Ullah, Fahad Almansour, Fazlullah Umar

    Published 2022-01-01
    “…Measuring and evaluating a learner’s learning ability is always the focus of every person whose aim is to develop strategies and plans for their learners to improve the learning process. For example, classroom assessments, self-assessment using computer systems such as Intelligent Tutoring Systems (ITS), and other approaches are available. …”
    Get full text
    Article
  8. 13428
  9. 13429

    A Geospatial Information Grid Framework for Geological Survey. by Liang Wu, Lei Xue, Chaoling Li, Xia Lv, Zhanlong Chen, Mingqiang Guo, Zhong Xie

    Published 2015-01-01
    “…The geological survey information cloud-computing platform has been implemented, and based on the platform, some geological data services and geological processing services were developed. …”
    Get full text
    Article
  10. 13430

    Malware Classification Using Few-Shot Learning Approach by Khalid Alfarsi, Saim Rasheed, Iftikhar Ahmad

    Published 2024-11-01
    “…Malware detection, targeting the microarchitecture of processors, has recently come to light as a potentially effective way to improve computer system security. …”
    Get full text
    Article
  11. 13431

    An enhanced fusion of transfer learning models with optimization based clinical diagnosis of lung and colon cancer using biomedical imaging by N. A. S. Vinoth, J. Kalaivani, R. Madonna Arieth, S. Sivasakthiselvan, Gi-Cheon Park, Gyanendra Prasad Joshi, Woong Cho

    Published 2025-07-01
    “…Initially, the image pre-processing stage applies the median filter (MF) model to eliminate the unwanted noise from the input image data. …”
    Get full text
    Article
  12. 13432
  13. 13433

    Broadband γ-Ray Spectrum of Supernova Remnant Cassiopeia A by Zhen Cao, F. Aharonian, Y. X. Bai, Y. W. Bao, D. Bastieri, X. J. Bi, Y. J. Bi, W. Bian, A. V. Bukevich, C. M. Cai, W. Y. Cao, Zhe Cao, J. Chang, J. F. Chang, A. M. Chen, E. S. Chen, H. X. Chen, Liang Chen, Long Chen, M. J. Chen, M. L. Chen, Q. H. Chen, S. Chen, S. H. Chen, S. Z. Chen, T. L. Chen, X. B. Chen, X. J. Chen, Y. Chen, N. Cheng, Y. D. Cheng, M. C. Chu, M. Y. Cui, S. W. Cui, X. H. Cui, Y. D. Cui, B. Z. Dai, H. L. Dai, Z. G. Dai, Danzengluobu, Y. X. Diao, X. Q. Dong, K. K. Duan, J. H. Fan, Y. Z. Fan, J. Fang, J. H. Fang, K. Fang, C. F. Feng, H. Feng, L. Feng, S. H. Feng, X. T. Feng, Y. Feng, Y. L. Feng, S. Gabici, B. Gao, C. D. Gao, Q. Gao, W. Gao, W. K. Gao, M. M. Ge, T. T. Ge, L. S. Geng, G. Giacinti, G. H. Gong, Q. B. Gou, M. H. Gu, F. L. Guo, J. Guo, X. L. Guo, Y. Q. Guo, Y. Y. Guo, Y. A. Han, O. A. Hannuksela, M. Hasan, H. H. He, H. N. He, J. Y. He, X. Y. He, Y. He, S. Hern ndez-Cadena, Y. K. Hor, B. W. Hou, C. Hou, X. Hou, H. B. Hu, S. C. Hu, C. Huang, D. H. Huang, J. J. Huang, T. Q. Huang, W. J. Huang, X. T. Huang, X. Y. Huang, Y. Huang, Y. Y. Huang, X. L. Ji, H. Y. Jia, K. Jia, H. B. Jiang, K. Jiang, X. W. Jiang, Z. J. Jiang, M. Jin, S. Kaci, M. M. Kang, I. Karpikov, D. Khangulyan, D. Kuleshov, K. Kurinov, B. B. Li, Cheng Li, Cong Li, D. Li, F. Li, H. B. Li, H. C. Li, Jian Li, Jie Li, K. Li, L. Li, R. L. Li, S. D. Li, T. Y. Li, W. L. Li, X. R. Li, Xin Li, Y. Z. Li, Zhe Li, Zhuo Li, E. W. Liang, Y. F. Liang, S. J. Lin, B. Liu, C. Liu, D. Liu, D. B. Liu, H. Liu, H. D. Liu, J. Liu, J. L. Liu, J. R. Liu, M. Y. Liu, R. Y. Liu, S. M. Liu, W. Liu, X. Liu, Y. Liu, Y. Liu, Y. N. Liu, Y. Q. Lou, Q. Luo, Y. Luo, H. K. Lv, B. Q. Ma, L. L. Ma, X. H. Ma, J. R. Mao, Z. Min, W. Mitthumsiri, G. B. Mou, H. J. Mu, Y. C. Nan, A. Neronov, K. C. Y. Ng, M. Y. Ni, L. Nie, L. J. Ou, P. Pattarakijwanich, Z. Y. Pei, J. C. Qi, M. Y. Qi, J. J. Qin, A. Raza, C. Y. Ren, D. Ruffolo, A. Sáiz, M. Saeed, D. Semikoz, L. Shao, O. Shchegolev, Y. Z. Shen, X. D. Sheng, Z. D. Shi, F. W. Shu, H. C. Song, Yu. V. Stenkin, V. Stepanov, Y. Su, D. X. Sun, H. Sun, Q. N. Sun, X. N. Sun, Z. B. Sun, N. H. Tabasam, J. Takata, P. H. T. Tam, H. B. Tan, Q. W. Tang, R. Tang, Z. B. Tang, W. W. Tian, C. N. Tong, L. H. Wan, C. Wang, G. W. Wang, H. G. Wang, H. H. Wang, J. C. Wang, K. Wang, Kai Wang, Kai Wang, L. P. Wang, L. Y. Wang, L. Y. Wang, R. Wang, W. Wang, X. G. Wang, X. J. Wang, X. Y. Wang, Y. Wang, Y. D. Wang, Z. H. Wang, Z. X. Wang, Zheng Wang, D. M. Wei, J. J. Wei, Y. J. Wei, T. Wen, S. S. Weng, C. Y. Wu, H. R. Wu, Q. W. Wu, S. Wu, X. F. Wu, Y. S. Wu, S. Q. Xi, J. Xia, J. J. Xia, G. M. Xiang, D. X. Xiao, G. Xiao, Y. L. Xin, Y. Xing, D. R. Xiong, Z. Xiong, D. L. Xu, R. F. Xu, R. X. Xu, W. L. Xu, L. Xue, D. H. Yan, J. Z. Yan, T. Yan, C. W. Yang, C. Y. Yang, F. F. Yang, L. L. Yang, M. J. Yang, R. Z. Yang, W. X. Yang, Y. H. Yao, Z. G. Yao, X. A. Ye, L. Q. Yin, N. Yin, X. H. You, Z. Y. You, Y. H. Yu, Q. Yuan, H. Yue, H. D. Zeng, T. X. Zeng, W. Zeng, M. Zha, B. B. Zhang, B. T. Zhang, F. Zhang, H. Zhang, H. M. Zhang, H. Y. Zhang, J. L. Zhang, Li Zhang, P. F. Zhang, P. P. Zhang, R. Zhang, S. R. Zhang, S. S. Zhang, W. Y. Zhang, X. Zhang, X. P. Zhang, Yi Zhang, Yong Zhang, Z. P. Zhang, J. Zhao, L. Zhao, L. Z. Zhao, S. P. Zhao, X. H. Zhao, Z. H. Zhao, F. Zheng, W. J. Zhong, B. Zhou, H. Zhou, J. N. Zhou, M. Zhou, P. Zhou, R. Zhou, X. X. Zhou, X. X. Zhou, B. Y. Zhu, C. G. Zhu, F. R. Zhu, H. Zhu, K. J. Zhu, Y. C. Zou, X. Zuo

    Published 2025-01-01
    Get full text
    Article
  14. 13434
  15. 13435
  16. 13436
  17. 13437
  18. 13438

    Implementation of an Image Tampering Detection System with a CMOS Image Sensor PUF and OP-TEE by Tatsuya Oyama, Manami Hagizaki, Shunsuke Okura, Takeshi Fujino

    Published 2024-11-01
    “…In this study, we propose and demonstrate an image tampering detection system based on MAC verification with CIS-PUF and OP-TEE in an open portable TEE on an ARM processor. In the experiments, we demonstrated a system that computed and transmitted MAC for captured images using the CIS-PUF key and then performed MAC verification in the secure world of the OP-TEE.…”
    Get full text
    Article
  19. 13439

    A New Distributed Type-2 Fuzzy Logic Method for Efficient Data Science Models of Medical Informatics by Fatéma Zahra Benchara, Mohamed Youssfi

    Published 2020-01-01
    “…The great challenge in the medicine field is to provide a scalable image processing model, which integrates the computing processing requirements and computing-aided medical decision making. …”
    Get full text
    Article
  20. 13440

    An innovative contactless current sensor for smart grids applications by Khaled Osmani, Lachlan Jones, Detlef Schulz

    Published 2025-05-01
    “…An Arduino Mega 2560 serves as the data processor, converting Magnetic Field (MF) sensors readings into computer-readable voltage data. …”
    Get full text
    Article