Search alternatives:
processor » processes (Expand Search)
Showing 18,001 - 18,020 results of 30,198 for search '(processor OR process) (computing)', query time: 0.33s Refine Results
  1. 18001
  2. 18002

    Disease candidate genes prediction using positive labeled and unlabeled instances by Sepideh Molaei, Saeed Jalili

    Published 2025-04-01
    “…Nowadays, laboratory approaches are not only used for disease gene identification but also using computational approaches like machine learning are becoming considerable for this purpose. …”
    Get full text
    Article
  3. 18003

    Novel View Synthesis of Defocused Blur Scenes Based on Neural Radiance Fields by Zhaoji Lin, Yuxin Zheng, Li Yao

    Published 2025-01-01
    “…In recent years, neural radiance fields have been widely used in the field of computer graphics due to their excellent reconstruction quality. …”
    Get full text
    Article
  4. 18004

    A Pinning Actor-Critic Structure-Based Algorithm for Sizing Complex-Shaped Depth Profiles in MFL Inspection with High Degree of Freedom by Zhenning Wu, Yiming Deng, Lixing Wang

    Published 2021-01-01
    “…By learning with more information from the depth profile without knowing the corresponding MFL signal, the algorithm proposed saves computational costs and is robust. A pinning strategy is embedded in the reconstruction process, which highly reduces the dimension of action space. …”
    Get full text
    Article
  5. 18005
  6. 18006
  7. 18007

    Editor’s Note by Alberto Raposo

    Published 2015-12-01
    “…In this paper, the authors use a computational model for emotion contagion process in the context of crowd simulation to create realistic perception of agent behaviors on crowds. …”
    Get full text
    Article
  8. 18008

    A New Guess-and-Determine Method for Cryptanalysis of the GSM Encryption by Ashish Jain, Inderjeet Kaur, Akhilesh Kumar Sharma, Nirmal Kumar Gupta, Partha Chakraborty

    Published 2023-01-01
    “…Cryptanalysis is the process of finding flaws or oversights in an encryption algorithm. …”
    Get full text
    Article
  9. 18009
  10. 18010
  11. 18011
  12. 18012
  13. 18013
  14. 18014
  15. 18015
  16. 18016
  17. 18017
  18. 18018

    Watershed Health Prediction based on Surface Water Quality Variables (Case Study: Taleghan Watershed) by Payam Ebrahimi, Ali Salajegheh, Mohsen Mohseni Saravi, Arash Malekian, Amir Sadoddin

    Published 2018-05-01
    “…Changes in the natural data process, especially in annual scale, are slow, and it is recommended to pay attention to the causes of these changes. …”
    Get full text
    Article
  19. 18019

    A complete (48, 4)-arc in the Projective Plane Over the Field of Order Seventeen by zainab Shehab Hamed, J.W. Hirschfeld

    Published 2021-12-01
    “…The article describes a certain computation method of -arcs to construct the number of distinct -arcs in  for . …”
    Get full text
    Article
  20. 18020

    Rethinking literary creativity in the digital age: a comparative study of human versus AI playwriting by Silvia Elias, Bunder Sebail Alshammari, Khaled Nasser Alfraidi, Khaled Mostafa Karam

    Published 2025-05-01
    “…Therefore, this interdisciplinary study aims to draw a comparison between an AI-generated play and a human-authored play in terms of originality, fluency, flexibility, and effectiveness. It utilizes Computational methods and NLP tools to process the two plays, analyze both content and language, and derive quantitative measures that support the creativity assessment of the two plays. …”
    Get full text
    Article