Search alternatives:
processor » processes (Expand Search)
Showing 14,761 - 14,780 results of 30,198 for search '(processor OR process) (computing)', query time: 0.35s Refine Results
  1. 14761

    Soybeans tempeh image dataset for tempeh maturity detectionGitHub by Riccosan, Soni Yora, Nur Azmi Karim, Ezrela Fidelyn Surya Wibisana

    Published 2025-08-01
    “…The creation of tempeh until now still utilizes the traditional method from the beginning, observation, until the collection of the final product, which still includes the human role inside the process. The process of creating tempeh products takes approximately 1 to 4 days. …”
    Get full text
    Article
  2. 14762

    Convolutional neural networks for sea surface data assimilation in operational ocean models: test case in the Gulf of Mexico by O. Zavala-Romero, O. Zavala-Romero, A. Bozec, E. P. Chassignet, J. R. Miranda, J. R. Miranda

    Published 2025-01-01
    “…<p>Deep learning models have demonstrated remarkable success in fields such as language processing and computer vision, routinely employed for tasks like language translation, image classification, and anomaly detection. …”
    Get full text
    Article
  3. 14763

    Nonlinear photonics on integrated platforms by Geng Wenpu, Fang Yuxi, Wang Yingning, Bao Changjing, Liu Weiwei, Pan Zhongqi, Yue Yang

    Published 2024-06-01
    “…The paper also examines the recent advances in on-chip switching, computing, signal processing, microwave generation, and quantum applications. …”
    Get full text
    Article
  4. 14764

    A comprehensive survey on big data privacy and Hadoop security: Insights into encryption mechanisms and emerging trends by Youness Filaly, Nisrine Berros, Fatna El mendili, Younes El Bouzekri EL idrissi

    Published 2025-09-01
    “…Big data has transformed analytics and data processing in many different industries, but securing security and privacy in distributed systems like Hadoop is still rather complex. …”
    Get full text
    Article
  5. 14765

    Advances in authentication and security protocols for 5G networks: a comprehensive survey by Sunil Kumar Patel, Satya Bhushan Verma, Bineet Kumar Gupta, Shubham Singh, E. Naresh, Piyush Kumar Pareek

    Published 2025-07-01
    “…With this ground-breaking innovation, it is crucial to have strong authentication and security processes to preserve critical data and shield consumers from any dangers. …”
    Get full text
    Article
  6. 14766

    A Parallel Algorithm for the Two-Dimensional Time Fractional Diffusion Equation with Implicit Difference Method by Chunye Gong, Weimin Bao, Guojian Tang, Yuewen Jiang, Jie Liu

    Published 2014-01-01
    “…The parallel efficiency of 81 processes is up to 88.24% compared with 9 processes on a distributed memory cluster system. …”
    Get full text
    Article
  7. 14767
  8. 14768

    Bibliometric analysis of financial management research issues in the information technologies field by O.Yu. Polchanov

    Published 2025-03-01
    “…The rapid evolutionary processes associated with the development and implementation of technological innovations have profoundly changed organizational processes in various industries, with the IT sector standing out as the most visible change. …”
    Get full text
    Article
  9. 14769

    Specular Reflection Image Enhancement Based on a Dark Channel Prior by Ye Xin, Zhenhong Jia, Jie Yang, Nikola K. Kasabov

    Published 2021-01-01
    “…Experimental results show that this method can effectively enhance the information in specular highlight images, and its processing results are obviously better than those of other algorithms.…”
    Get full text
    Article
  10. 14770

    Integrating holographic counterparts for intelligent IoT consumer devices by M. Rajesh, M. Usha, Sathishkumar Veerappampalayam Easwaramoorthy

    Published 2025-07-01
    “…In order to overcome the shortcomings of conventional Internet of Things (IoT) systems, such as slow response times, lack of flexibility, and security flaws, this article introduces a new multi-layered HC-IoT design that integrates blockchain technology, artificial intelligence (AI), edge computing, and quantum-assisted processing. With the help of the suggested architecture, smart devices may function more independently, rely less on centralised servers, and save more accurate data. …”
    Get full text
    Article
  11. 14771
  12. 14772
  13. 14773

    Protocol for phase-amplitude coupling analysis in local field potentials from macaque monkeys to investigate neural oscillation dynamics by Mohammad Aliramezani, Ashkan Farrokhi, Christos Constantinidis, Mohammad Reza Daliri

    Published 2025-09-01
    “…We describe steps for preprocessing local field potential (LFP), performing time-frequency decomposition, and computing PAC between distinct frequency bands. We then detail procedures for normalizing the results using surrogate data. …”
    Get full text
    Article
  14. 14774

    Robust machine learning based Intrusion detection system using simple statistical techniques in feature selection by Sunil Kaushik, Akashdeep Bhardwaj, Ahmad Almogren, Salil bharany, Ayman Altameem, Ateeq Ur Rehman, Seada Hussen, Habib Hamam

    Published 2025-02-01
    “…These gadgets frequently function in challenging environments with little energy and processing power, leaving them open to cyberattacks and making it more difficult to implement intrusion detection systems (IDS) that work. …”
    Get full text
    Article
  15. 14775

    Bridging Additive Manufacturing and Electronics Printing in the Age of AI by Jihua Chen, Yue Yuan, Qianshu Wang, Hanyu Wang, Rigoberto C. Advincula

    Published 2025-05-01
    “…Printing techniques have been instrumental in developing flexible and stretchable electronics, including organic light-emitting diode displays, organic thin film transistor arrays, electronic skins, organic electrochemical transistors for biosensors and neuromorphic computing, as well as flexible solar cells with low-cost processes such as inkjet printing, ultrasonic nozzle, roll-to-roll coating. …”
    Get full text
    Article
  16. 14776

    Control chart for geometrically distributed data based on Bayesian fast double bootstrap by Muhammad Yahya Matdoan, Muhammad Mashuri, Muhammad Ahsan

    Published 2025-06-01
    “…For specific conditions, such as limited data and no nonconforming items, bootstrap-based Bayesian estimators offer a computational alternative. However, these estimators may struggle to detect significant process shifts, particularly in the presence of large deviations. …”
    Get full text
    Article
  17. 14777

    Star-crossed Clusters: Asteroseismic Ages for Individual Stars Are in Tension with the Ages of Their Host Clusters by Jamie Tayar, Meridith Joyce

    Published 2025-01-01
    “…The scatter among asteroseismic ages for individual stars in any one of these clusters far surpasses both the absolute age uncertainty computed for reference cluster M92 (5.4%) and the model-to-model systematic uncertainties in isochrones (roughly 10%). …”
    Get full text
    Article
  18. 14778
  19. 14779
  20. 14780