Search alternatives:
processor » processes (Expand Search)
Showing 14,821 - 14,840 results of 30,198 for search '(processor OR process) (computing)', query time: 0.30s Refine Results
  1. 14821

    2024 Chinese guideline on the construction and application of medical blockchain# by Xiaoping Chen, Feng Cao, Qing Wang, Zhewei Ye, Xiaoping Chen, Zhewei Ye, Feng Cao, Weiqian Chen, Wei Cui, Donglei Feng, Guozhong Ji, Zhean Lin, Qinghu Meng, Min Luo, Yilong Luo, Weijia Lv, Yanguo Qin, Xihu Qin, Xueming Si, Bing Tan, Zhihong Tian, Qing Wang, Chenhui Wang, Weigang Wu, Lipeng Xiang, Guangjun Yu, Dawei Ye, Xiumei Zhang, He Zhao, Zibin Zheng, Ceng Zeng, Wei Zhang, Qiru Zhou, Peizhuo Zang, Xiaoping Chen, Feng Cao, Qing Wang, Zhewei Ye, Yi Xie, Zhewei Ye, Feng Cao, Geng Lu, He Zhao, Feng Cao, Weiqian Chen, Wurong Chen, Xiaoping Chen, Min Cai, Yang Deng, Donglei Feng, Liang Gao, Yong Gao, Wentao Gong, Zheng Guo, Bin He, Debiao He, Zhiwei Hao, Guoliang Hu, Yong Hu, Dongchen Huang, Jufang Huang, Biqiang Huang, Wei Huang, Guozhong Ji, Jie Ji, Yijie Kuang, Qing Lei, Huiwu Li, Jie Li, Jing Li, Kainan Li, Zhi Li, Zhean Lin, Yuehong Liu, Geng Lu, Tong Lu, Sheng Lu, Min Luo, Yilong Luo, Weijia Lv, Qinghu Meng, Qingjiang Pang, Shijie Peng, Xihu Qin, Yanguo Qin, Bing Qiu, Bing Qin, Hongxun Sang, Qing Shan, Xueming Si, Shan Tan, Zhihong Tian, Chenhui Wang, Kai Wang, Qing Wang, Yi Wang, Xiaoru Wen, Jiangxin Wu, Weigang Wu, Lipeng Xiang, Xuan Xiao, Yi Xie, Liming Xiong, Jinlin Xu, Dawei Ye, Zhewei Ye, Guangjun Yu, Huiwen Yang, Peizhuo Zang, Cheng Zeng, Wei Zhang, Xiumei Zhang, Yuanzhi Zhang, He Zhao, Meng Zhao, Zibin Zheng, Da Zhong, Feifei Zhou, Qiru Zhou, Qinmiao Zhu, Jun Zou, Yi Xie

    Published 2025-02-01
    “…This clinical practice guideline is developed following the World Health Organization's recommended process, adopting Grading of Recommendations Assessment, Development and Evaluation in assessing evidence quality. …”
    Get full text
    Article
  2. 14822

    Enhancing IoT Security in Vehicles: A Comprehensive Review of AI-Driven Solutions for Cyber-Threat Detection by Rafael Abreu, Emanuel Simão, Carlos Serôdio, Frederico Branco, António Valente

    Published 2024-11-01
    “…While the study selection and data collection processes are robust, the reliance on narrative synthesis and the limited exploration of potential biases in the selection process introduce some risk. …”
    Get full text
    Article
  3. 14823
  4. 14824
  5. 14825

    U-Net-based VGG19 model for improved facial expression recognition by Xiaohu ZHAO, Jingyi ZHANG, Mingzhi JIAO, Lixun XIE, Lanfei WANG, Weiqing SUN, Di ZHANG

    Published 2025-06-01
    “…The robustness and efficiency of the proposed method highlight its potential for various applications requiring accurate real-time facial expression analysis, such as human-computer interaction, security systems, and emotion-driven computing. …”
    Get full text
    Article
  6. 14826

    Impact of Surface Roughness on Consistent Resonator Performance by Senthil Kumar Karuppannan, Naga Manikanta Kommanaboina, Adrian Nugraha Utama, Manas Mukherjee

    Published 2025-07-01
    “…Abstract Superconducting circuit‐based quantum processors are leading platforms for quantum computing. …”
    Get full text
    Article
  7. 14827

    Enabling the Analysis of Emergent Behavior in Future Electrical Distribution Systems Using Agent-Based Modeling and Simulation by Sonja Kolen, Stefan Dähling, Timo Isermann, Antonello Monti

    Published 2018-01-01
    “…The major novelty is a parallelization of the entire model—including the power system, communication system, control, and all interactions—using processes instead of threads. Thereby, a distribution of the simulation to multiple computing nodes with a distributed memory architecture becomes possible. …”
    Get full text
    Article
  8. 14828

    Analysis of Reactive Injection Compression Molding by Numerical Simulations and Experiments by Giorgio Ramorino, Silvia Agnelli, Matteo Guindani

    Published 2020-01-01
    “…However, for being competitive a minimal market time is a very important requirement and computer simulations can help to optimize the process at the only expense of computational time. …”
    Get full text
    Article
  9. 14829

    Deep Learning in Finance: A Survey of Applications and Techniques by Ebikella Mienye, Nobert Jere, George Obaido, Ibomoiye Domor Mienye, Kehinde Aruleba

    Published 2024-10-01
    “…At the core of this transformation is deep learning (DL), a subset of ML that is robust in processing and analyzing complex and large datasets. …”
    Get full text
    Article
  10. 14830

    Efficient Differential Diagnosis using Cost-aware Active Testing by Emile van Gerwen, Leonardo Barbini, Michael Borth, Robert Passmann

    Published 2024-10-01
    “…We developed and successfully tried our methodology for diagnosing cyber-physical systems in the high-tech industry, but we found that it supports more processes, such as computing intervention actions for autonomous robots.…”
    Get full text
    Article
  11. 14831

    Android-based Action Recognition with 3D CNN and UCF 101 dataset by Dasan Abhijith, Darshan R., Kumar Ashvyn, Minu M. S., Arthy J.

    Published 2025-01-01
    “…Efficient resource management of this lightweight design enables mid-range mobile devices to work with the system which advances video analysis methods for edge computing systems. Future efforts will concentrate on raising power efficiency by using hardware-aware techniques while adding basic-processing technology support as well.…”
    Get full text
    Article
  12. 14832

    Cluster Node Migration Oriented Holistic Trust Management Protocol for Ubiquitous and Pervasive IoT Network by Anup Patnaik, Banitamani Mallik, M. Vamsi Krishna

    Published 2021-01-01
    “…The created zones are self-resilient against any malicious attacks and saves lots processing usage time and energy to address the security issues. …”
    Get full text
    Article
  13. 14833

    A man–vehicle e-passport system using biometric blockchain for automated border control by Bing Xu, Ahmed Bouridane, Qiang Ni, Richard Jiang

    Published 2025-07-01
    “…Performance evaluations conducted using Hyperledger Caliper demonstrate the potential of the proposed system, showing a 3.5-fold improvement in processing efficiency compared to traditional ABC setups.…”
    Get full text
    Article
  14. 14834
  15. 14835

    The Goldilocks principle of learning unitaries by interlacing fixed operators with programmable phase shifters on a photonic chip by Kevin Zelaya, Matthew Markowitz, Mohammad-Ali Miri

    Published 2024-05-01
    “…Abstract Programmable photonic integrated circuits represent an emerging technology that amalgamates photonics and electronics, paving the way for light-based information processing at high speeds and low power consumption. …”
    Get full text
    Article
  16. 14836

    Comparative Analysis of Text Mining Classification Algorithms for English and Indonesian Qur’an Translation by Rahmat Hidayat, Sekar Minati

    Published 2019-06-01
    “…Indonesian translation was processed by using the sastrawi package in Python to do the pre-processing and StringToWord Vector in WEKA with the TF-IDF method to implement the algorithms. …”
    Get full text
    Article
  17. 14837

    UNSTABLE CRITICAL EQUILIBRIUM IN THE DYNAMICS OF COMPLEX STRUCTURED POPULATION OF STURGEON by V. A. Dubrovskaya, T. N. Solovieva, A. Yu. Perevaryukha

    Published 2016-03-01
    “…The article deals with the consequences of the existence of special conditions that determine the character of the rapid further development of population processes. The most probable connection of these critical conditions deals with the optimal number of subpopulation groups. …”
    Get full text
    Article
  18. 14838

    Smart Data Placement Strategy in Heterogeneous Hadoop by Nour-Eddine Bakni, Ismail Assayad

    Published 2025-03-01
    “…The Hadoop framework is a solution that allows storing and processing these large amounts of data in parallel on a cluster of machines. …”
    Get full text
    Article
  19. 14839

    Social Work in Cybersecurity by Samah Monammed Albargi

    Published 2024-12-01
    “…To be effective, cyber-security requires critical considerations of current and evolving human factors and processes, including the complex processes of interactions between technology and human belief-thought-behavior patterns, in protection, detection, response, and recovery programs. …”
    Get full text
    Article
  20. 14840

    A unified model integrating UTAUT-Behavioural intension and Object-Oriented approaches for sustainable adoption of Cloud-Based collaborative platforms in higher education by Kaihong Feng, Divya Haridas

    Published 2025-07-01
    “…Abstract In recent years, cloud computing (CC) services have expanded rapidly, with platforms like Google Drive, Dropbox and Apple iCloud and gaining global adoption. …”
    Get full text
    Article