Search alternatives:
processor » process (Expand Search)
processes » process (Expand Search)
Showing 25,241 - 25,260 results of 30,198 for search '(processor OR processes) (computing)', query time: 0.24s Refine Results
  1. 25241
  2. 25242
  3. 25243
  4. 25244
  5. 25245
  6. 25246
  7. 25247
  8. 25248
  9. 25249
  10. 25250

    A Novel Multi-Image Encryption Scheme Using Generalized Rectangular Transform and Advanced 5-D Hyperchaotic Map by Yu-Chi Lan, Chung-Ming Wang

    Published 2025-01-01
    “…This paper presents GRTPHM (Generalized Rectangular Transform and Penta-Hyperchaotic Map), a novel multi-image encryption scheme that enhances security, efficiency, and versatility. The encryption process consists of two key phases: pixel permutation and pixel diffusion. …”
    Get full text
    Article
  11. 25251

    Efficient Robot Localization Through Deep Learning-Based Natural Fiduciary Pattern Recognition by Ramón Alberto Mena-Almonte, Ekaitz Zulueta, Ismael Etxeberria-Agiriano, Unai Fernandez-Gamiz

    Published 2025-01-01
    “…As robots increasingly operate in environments where computational efficiency and adaptability are paramount, our methodology offers a viable solution to enhance localization without compromising accuracy or speed. …”
    Get full text
    Article
  12. 25252

    Reinforcement Q-Learning-Based Adaptive Encryption Model for Cyberthreat Mitigation in Wireless Sensor Networks by Sreeja Balachandran Nair Premakumari, Gopikrishnan Sundaram, Marco Rivera, Patrick Wheeler, Ricardo E. Pérez Guzmán

    Published 2025-03-01
    “…A Hybrid Policy Derivation Algorithm is introduced to balance encryption complexity and computational overhead by dynamically switching between these learning models. …”
    Get full text
    Article
  13. 25253
  14. 25254
  15. 25255

    Deep Residual Transfer Ensemble Model for mRNA Gene-Expression-Based Breast Cancer by Job Prasanth Kumar Chinta Kunta, Vijayalakshmi A. Lepakshi

    Published 2025-01-01
    “…Executing standard pre-processing tasks, the synthetic underrepresented class over-sampling technique (SMOTE) was applied to alleviate any possible class-imbalance problem. …”
    Get full text
    Article
  16. 25256

    Touch of Privacy: A Homomorphic Encryption-Powered Deep Learning Framework for Fingerprint Authentication by U. Sumalatha, K. Krishna Prakasha, Srikanth Prabhu, Vinod C. Nayak

    Published 2025-01-01
    “…TenSEAL ensures all computations occur in the encrypted domain, preventing raw biometric data exposure during authentication. …”
    Get full text
    Article
  17. 25257
  18. 25258
  19. 25259
  20. 25260