Search alternatives:
processor » processes (Expand Search)
Showing 13,701 - 13,720 results of 30,198 for search '(processor OR process) (computing)', query time: 0.21s Refine Results
  1. 13701

    Reduction of Vision-Based Models for Fall Detection by Asier Garmendia-Orbegozo, Miguel Angel Anton, Jose David Nuñez-Gonzalez

    Published 2024-11-01
    “…The complexity of the models used to process the input data and detect these activities makes them almost impossible to complete on devices with limited resources, which are the ones that could offer an immediate response avoiding unnecessary communications between sensors and centralized computing centers. …”
    Get full text
    Article
  2. 13702

    A framework of critical success factors of cloud based project management software adoption by L. I. Assalaarachchi, M. P. P. Liyanage, C. Hewagamage

    Published 2025-04-01
    “…Organization size, the technological readiness of the organization, employee willingness, top management support, and change management process were identified under organizational factors. …”
    Get full text
    Article
  3. 13703
  4. 13704

    Applications of machine learning to high temperature and high pressure environments: A literature review by Hengkai Wang, Zengtao Lv, Santosh Kumar, Qinglin Wang

    Published 2024-12-01
    “…In addition, its simulation process is very fast, and the cost is not as expensive as that of density functional theory, so machine learning in the field of HTHP computing has aroused great research interest. …”
    Get full text
    Article
  5. 13705

    Edge intelligent collaborative privacy protection solution for smart medical by Jinshan Lai, Xiaotong Song, Ruijin Wang, Xiong Li

    Published 2023-12-01
    “…At the same time, there is a risk of privacy leakage in the process of health monitoring and auxiliary diagnosis. …”
    Get full text
    Article
  6. 13706

    Architectural Design of Referral Patient Data Security using Advanced Encryption Standard by Moh. Ali Romli, Muhammad Zakariyah

    Published 2025-05-01
    “…The system that has been developed is deployed into a SaaS model on cloud computing. The SaaS architecture for securing patient referral data has been adapted to the stakeholders involved (users), the medical data exchange standard used (HL7 standard), workflow and data exchange processes, and the data security technique itself (AES).…”
    Get full text
    Article
  7. 13707
  8. 13708

    Analysis of thermoelastic stresses in filament wound composite pressure vessels using evolutionary deep learning and many-objective optimisation by Dominik Vondráček, Zdeněk Padovec, Tomáš Mareš, Nirupam Chakraborti

    Published 2025-12-01
    “…Knowing the critical places of the pressure vessel may improve the designer’s decision during the development and design process.…”
    Get full text
    Article
  9. 13709

    The Load Cycle Amplitude Model: An Efficient Time-Domain Extrapolation Technique for Non-Stationary Loads in Agricultural Machinery by Zihan Yang, Xuke Liu, Zhenghe Song, Hanting Liu

    Published 2024-12-01
    “…Furthermore, the streamlined modelling process results in reductions of 10.63% and 20.84% in the average computing time for the algorithm when addressing stress and vibration loads, respectively. …”
    Get full text
    Article
  10. 13710
  11. 13711

    A Centralized Approach to the Logging Mechanisms of Distributed Complex ERP Applications by Cosmin Strilețchi, Petre G. Pop, Christian Gavrilă

    Published 2025-03-01
    “…The physical location of each software component can differ, their running environments often being distributed across several computing systems connected via various communication protocols. …”
    Get full text
    Article
  12. 13712

    A lightweight algorithm for steel surface defect detection using improved YOLOv8 by Shuangbao Ma, Xin Zhao, Li Wan, Yapeng Zhang, Hongliang Gao

    Published 2025-03-01
    “…This model achieves a balance between lightweighting and detection accuracy while providing a viable solution for deployment in computationally resource-constrained edge computing environments such as embedded systems and mobile devices.…”
    Get full text
    Article
  13. 13713

    Exploring on the integration of vBRAS architecture and DPU technology by GONG Xia, ZHU Yongqing, YUAN Shizhang, WANG Xiaoyong, ZHANG Jiancheng

    Published 2025-06-01
    “…With the rapid development of 5G, cloud computing, and edge computing, metropolitan area networks (MANs), as critical hubs connecting users and core networks, face multifaceted challenges in bandwidth, latency, and flexibility. …”
    Get full text
    Article
  14. 13714
  15. 13715

    Diseño de un Software de Intermediación de Comunicación para Sistemas Distribuidos de Tiempo Real Críticos en Java by Daniel Tejera, Alejandro Alonso, Miguel A. de Miguel

    Published 2013-04-01
    “…This work proposes a predictable serialization that introduces a new compiler to generate optimized code according to the computational model. The proposed solution has the advantage of allowing us to schedule the communications and to adjust the memory usage at compilation time.In order to validate the design and the implementation a demanding validation process was carried out with emphasis in the functional behavior, the memory usage, the processor usage (the end-to-end response time and the response time in each functional block) and the network usage (real consumption according to the calculated consumption). …”
    Get full text
    Article
  16. 13716
  17. 13717
  18. 13718
  19. 13719
  20. 13720