Search alternatives:
processor » processes (Expand Search)
Showing 13,961 - 13,980 results of 30,198 for search '(processor OR process) (computing)', query time: 0.32s Refine Results
  1. 13961
  2. 13962

    LE-YOLOv5: A Lightweight and Efficient Neural Network for Steel Surface Defect Detection by Chengshun Zhu, Yong Sun, Hongji Zhang, Shilong Yuan, Hui Zhang

    Published 2024-01-01
    “…Due to the influence of manufacturing process and external factors, there will be some undesired defects on the steel surface, which seriously affects the lifetime of steel, and the traditional surface defect detection efficiency and speed are not satisfactory. …”
    Get full text
    Article
  3. 13963
  4. 13964

    Method for constructing an adaptive suboptimal stationary train traffic controller based on artificial neural networks by S. V. Malakhov, M. Yu. Kapustin

    Published 2021-04-01
    “…The article discusses the process of creating and training an artificial neural network based on model data to solve the problem of suboptimal control. …”
    Get full text
    Article
  5. 13965

    Heterogeneity-aware device selection for efficient federated edge learning by Yiran Shi, Jieyan Nie, Xingwei Li, Hui Li

    Published 2024-01-01
    “…This rigorous selection process ensures that the participating device set is optimally positioned to balance the dual objectives of training efficiency and model accuracy. …”
    Get full text
    Article
  6. 13966
  7. 13967
  8. 13968

    Retracted: Efficiency Analysis of Machine Learning Intelligent Investment Based on K-Means Algorithm by Liang Li, Jia Wang, Xuetao Li

    Published 2020-01-01
    “…The results show that Capricorn has a certain randomness in the selection process of the fund, and chooses to reduce the rate of return in order to control the risk. …”
    Get full text
    Article
  9. 13969
  10. 13970
  11. 13971

    Breast cancer image classification by using HCNN and LeNet5 by Pramoda Patro, Shaik Honey Fathima, R. Harikishore, Aditya Kumar Sahu

    Published 2024-12-01
    “…However, the time complexity of the available techniques is immense due to the many processes. Additionally, the current research attempts to improve the computation time involved in the detection process. …”
    Get full text
    Article
  12. 13972

    On the Application of a Sparse Data Observers (SDOs) Outlier Detection Algorithm to Mitigate Poisoning Attacks in UltraWideBand (UWB) Line-of-Sight (LOS)/Non-Line-of-Sight (NLOS) C... by Gianmarco Baldini

    Published 2025-02-01
    “…Such attacks aim to hamper the ML classification process by poisoning the data set. Mitigation techniques are designed to counter this threat using different approaches. …”
    Get full text
    Article
  13. 13973

    Stochastic Technique on Assigning Adaptive Minimal Code Bits to Locally Frequent Symbols in Continuous Data Stream by Taiki Kato, Shinichi Yamagiwa

    Published 2025-01-01
    “…As increasing demands for recognizing social environment and/or human activity using sensory devices and video cameras, streaming data has become one of major data types. The applications process the data stream and generate new knowledge due to recent AI technologies. …”
    Get full text
    Article
  14. 13974

    Reliable smart models for estimating frictional pressure drop in two-phase condensation through smooth channels of varying sizes by M. A. Moradkhani, S. H. Hosseini, Mengjie Song, A. Abbaszadeh

    Published 2024-05-01
    “…Hence, after identifying the most effective input variables through the Spearman's correlation analysis, three soft-computing paradigms, i.e., multilayer perceptron (MLP), gaussian process regression (GPR) and radial basis function (RBF) were employed to establish intelligent and dimensionless predictive tools for the FPD based on the separated model suggested by Lockhart and Martinelli. …”
    Get full text
    Article
  15. 13975
  16. 13976

    Coordinating REST interactions in service choreographies using blockchain by Francesco Donini, Alessandro Marcelletti, Andrea Morichetta, Andrea Polini

    Published 2025-03-01
    “…In Service Oriented Computing (SOC), different services interact and exchange information to reach specific objectives. …”
    Get full text
    Article
  17. 13977

    mTanh: A Low-Cost Inkjet-Printed Vanishing Gradient Tolerant Activation Function by Shahrin Akter, Mohammad Rafiqul Haider

    Published 2025-05-01
    “…Inkjet-printed circuits on flexible substrates are rapidly emerging as a key technology in flexible electronics, driven by their minimal fabrication process, cost-effectiveness, and environmental sustainability. …”
    Get full text
    Article
  18. 13978

    Performing statistical population reconstruction using Program PopRecon 2.0 by Michael V. Clawson, John R. Skalski, James M. Lady, Christian A. Hagen, Joshua J. Millspaugh, David Budeau, John P. Severson

    Published 2017-09-01
    “…Each statistical population reconstruction model is handcrafted to account for varying levels of available demographic data, hunting regulations, sampling of the harvest process, and biology of the harvested species. PopRecon 2.0 is a software program that facilitates the creation and analysis of these unique demographic models and capable of analyzing either full or pooled age‐at‐harvest data using either fixed or random effects on the annual survival and harvest processes. …”
    Get full text
    Article
  19. 13979

    YOLO-HPSD: A high-precision ship target detection model based on YOLOv10. by Manlin Zhu, Dezhi Han, Bing Han, Xiaohu Huang

    Published 2025-01-01
    “…This study provides technical support for real-time ship target detection and the development of edge computing devices.…”
    Get full text
    Article
  20. 13980

    Multi-Paragraph Machine Reading Comprehension with Hybrid Reader over Tables and Text by Sanghyun Cho, SeongReol Park, Hye-Lynn Kim, Jung-Hun Lee, JoongMin Shin, Hyuk-Chul Kwon

    Published 2024-12-01
    “…To address this issue, we introduce the hybrid reader model that can manage both tables and text using a modified K-Adapter architecture for effectively encoding the structured information of tables. The training process infuses knowledge for tabular data into a pre-trained model while retaining its original weights from pre-training. …”
    Get full text
    Article