Search alternatives:
processor » processes (Expand Search)
Showing 13,861 - 13,880 results of 30,198 for search '(processor OR process) (computing)', query time: 0.29s Refine Results
  1. 13861

    Implementation of an Intelligent Trap for Effective Monitoring and Control of the <i>Aedes aegypti</i> Mosquito by Danilo Oliveira, Samuel Mafra

    Published 2024-10-01
    “…The application of machine learning (ML) algorithms and computer vision for the identification and classification of <i>Aedes aegypti</i> is a crucial part of this process. …”
    Get full text
    Article
  2. 13862

    LCDDN-YOLO: Lightweight Cotton Disease Detection in Natural Environment, Based on Improved YOLOv8 by Haoran Feng, Xiqu Chen, Zhaoyan Duan

    Published 2025-02-01
    “…In summary, the LCDDN-YOLO model offers excellent detection accuracy and speed, making it effective for pest and disease control in cotton fields, particularly in lightweight computing scenarios.…”
    Get full text
    Article
  3. 13863

    Wavelet-Enhanced Desnowing: A Novel Single Image Restoration Approach for Traffic Surveillance Under Adverse Weather Conditions by Zihan Shen, Yu Xuan, Qingyu Yang

    Published 2025-01-01
    “…Image restoration under adverse weather conditions refers to the process of removing degradation caused by weather particles while improving visual quality. …”
    Get full text
    Article
  4. 13864
  5. 13865

    Analysis of deep learning-based technological innovation governance on the intelligent allocation of innovation resources in the high-technology industry by Xiaoxuan Yu, Zhen Chen, Xinyu Zhang

    Published 2025-08-01
    “…The development of DL provides new opportunities to address the challenges of innovation resource allocation in the high-tech industry, as it can process massive datasets and uncover intricate relationships. …”
    Get full text
    Article
  6. 13866

    Research on Reservoir History Matching Method Based on Real⁃Coded Genetic Algorithm and Connectivity Model by Ainiwaer AILIYAER, Chunli ZHAO, Feng LIU

    Published 2025-06-01
    “…As gradient⁃based methods face challenges in computing the gradient of the objective function, intelligent optimization algorithms with stochastic properties are widely applied in reservoir optimization processes. …”
    Get full text
    Article
  7. 13867
  8. 13868
  9. 13869

    Unified regularity measures for sample-wise learning and generalization by Chi Zhang, Meng Yuan, Xiaoning Ma, Yu Liu, Haoang Lu, Le Wang, Yuanqi Su, Yuehu Liu

    Published 2024-12-01
    “…Abstract Fundamental machine learning theory shows that different samples contribute unequally to both the learning and testing processes. Recent studies on deep neural networks (DNNs) suggest that such sample differences are rooted in the distribution of intrinsic pattern information, namely sample regularity. …”
    Get full text
    Article
  10. 13870

    A lightweight and style-robust neural network for autonomous driving in end side devices by Sheng Han, Youfang Lin, Zhihui Guo, Kai Lv

    Published 2023-12-01
    “…Due to the limitation of the computing power of end side devices, the autonomous driving algorithm should adopt a lightweight model and have high performance. …”
    Get full text
    Article
  11. 13871

    Two-party cooperative blind signature based on SM2 by Xue BAI, Baodong QIN, Rui GUO, Dong ZHENG

    Published 2022-12-01
    “…SM2, issued by China in 2010, is a public key cryptography standard based on elliptic curves.It has been widely used in finance, social security and other fields thanks to its advantages of improved signature efficiency, decreased storage space and computing complexity than RSA.With the popularization and application of SM2, the issues of its key security and data privacy are of great concern.The single-key mode inhibits the potential application in multi-user settings, and the leakage of the key will threaten the security of the entire cryptosystem due to the centralization.The problem of secure storage and reasonable utilization of keys needs to be solved urgently.In addition, the SM2 digital signature algorithm cannot guarantee the message privacy.Aiming at the issues of key security and data privacy of the signature algorithm, many researchers have proposed the idea of cooperative signature and blind signature for SM2.However, there isn’t SM2 collaborative blind signature scheme proposed.Then a two-party cooperative blind signing protocol based on SM2 was proposed in this paper, which allowed two parties to sign except the user.The signing process did not require recovering the complete private key, while not revealing the information of the partial private key and secret number.The key was stored separately to improve the security of the key, while the blind signature protected the privacy of the message.In terms of security, the protocol satisfied unforgeability and unlinkability.The protocol was implemented using C to demonstrate the efficiency of each participant’s local operation.In the honest model, the time cost of each entity in the cooperative signature phase was similar as that of executing a lightweight SM2 blind signature.Overall, the proposed protocol has certain advantages in terms of function and efficiency.…”
    Get full text
    Article
  12. 13872

    General Inverse Problem Solution for Two-Level Systems and Its Application to Charge Transfer by Agostino Migliore, Hiromichi Nakazato, Alessandro Sergi, Antonino Messina

    Published 2024-09-01
    “…Our formulation is proposed as a basic step towards potential uses of charge transfer in quantum computing and quantum information transfer.…”
    Get full text
    Article
  13. 13873

    Beyond the hype: longitudinal trends in virtual reality perceptions beyond the COVID-19 pandemic by Christopher Ball, Kuo-Ting Huang, Jess Francis-Levin

    Published 2025-03-01
    “…The metaverse is shaped significantly by spatial computing technologies, such as virtual reality (VR). …”
    Get full text
    Article
  14. 13874
  15. 13875

    ALGORITHMIC AND PROGRAM IMPLEMENTATION OF THE PLAGIARISM DEFINITION IN LEARNING MANAGEMENT SYSTEMS by Y. B. Popova, A. V. Goloburda

    Published 2018-06-01
    “…The proposed modification will also speed up the calculation process, since there is no need to search for common terms for all documents. …”
    Get full text
    Article
  16. 13876
  17. 13877

    Efficient and Lightweight IoT Security Using CNTFET-Based Ultra-Low Power SRAM-PUF by Alireza Shafiei, Mehrnaz Monajati

    Published 2025-03-01
    “…Further post-processing procedures are executed using MATLAB software.…”
    Get full text
    Article
  18. 13878
  19. 13879
  20. 13880