Search alternatives:
processor » process (Expand Search)
processes » process (Expand Search)
Showing 26,001 - 26,020 results of 30,198 for search '(processor OR processes) (computing)', query time: 0.40s Refine Results
  1. 26001
  2. 26002

    Curriculum-Guided Adversarial Learning for Enhanced Robustness in 3D Object Detection by Jinzhe Huang, Yiyuan Xie, Zhuang Chen, Ye Su

    Published 2025-03-01
    “…The pursuit of robust 3D object detection has emerged as a critical focus within the realm of computer vision. This paper presents a curriculum-guided adversarial learning (CGAL) framework, which significantly enhances the adversarial robustness and detection accuracy of the LiDAR-based 3D object detector PointPillars. …”
    Get full text
    Article
  3. 26003

    Analysis of junior servers approaching a senior server in the multi-server queueing-inventory system by K. Jeganathan, V. Anzen Koffer, K. Prasanna Lakshmi, N. Anbazhagan, Gyanendra Prasad Joshi, Woong Cho

    Published 2025-05-01
    “…We analyze the performance of such a system by modeling it into a quasi-birth-and-death process, and its steady-state probability vector has been computed. …”
    Get full text
    Article
  4. 26004
  5. 26005

    Encouraging Sustainable Choices Through Socially Engaged Persuasive Recycling Initiatives: A Participatory Action Design Research Study by Emilly Marques da Silva, Daniel Schneider, Claudio Miceli, António Correia

    Published 2025-01-01
    “…Human-Computer Interaction (HCI) research has illuminated how technology can influence users’ awareness of their environmental impact and the potential for mitigating these impacts. …”
    Get full text
    Article
  6. 26006
  7. 26007

    A New Machine Learning Algorithm for Regional Low-Carbon Economic Development Analysis Based on Data Mining by Xinlei Liu

    Published 2022-01-01
    “…The development of information technology such as the continuous improvement of mobile Internet infrastructure and the performance of computers has made it easy to process and share information. …”
    Get full text
    Article
  8. 26008

    Didactic potential of digital technologies in linguistic education of university students by Olga M. Osiyanova, Yulia S. Kondrashina

    Published 2025-04-01
    “…The integration of digital technologies into the educational process set the task of identifying their potential in foreign language training, necessary for effective interaction of university graduates in the global information space. …”
    Get full text
    Article
  9. 26009

    Fusion of satellite-ground and inter-satellite AKA protocols for double-layer satellite networks by Jin CAO, Xiaoping SHI, Ruhui MA, Hui LI

    Published 2023-02-01
    “…With the characteristics of large space-time and satellite-ground network integration, the space integrated ground network has attracted much attention.Satellites can not only be used as emergency communication supplements, but also serve as air stations to expand the coverage of terrestrial networks, occupying an important position in both military and civilian scenarios.The entity authentication and key negotiation mechanism can prevent the malicious entities from joining the integrated network to steal users’ privacy, and guarantee network information security.In view of the characteristics of the high satellite-ground transmission delays, exposed links, limited processing capability and dynamic topology of the integrated network, a lightweight authentication scheme between satellites and ground suitable for double-layer satellite network was proposed to achieve a secure satellite networking architecture with session keys to protect data transmission.The scheme was based on symmetric cryptographic system, using lightweight cryptographic algorithms and introducing group key and hierarchical management mechanisms.The proposed scheme included three parts: inter-satellite authentication for geostationary earth orbit satellites, layer and inter-satellite authentication for same low earth orbit, and inter-satellite authentication for adjacent low earth orbit satellites.The group key and hierarchical management mechanism improved the efficiency of inter-group information transfer, reduced the authentication pressure on the ground control center, and enhanced the authentication security strength by realizing double verification in the three-entities authentication protocol.Different from the previous single scene authentication, the proposed authentication protocol took the form of multiplexing authentication parameters, which can realize the authentication requirements of dual scenes in one process.The results of Scyther, a protocol formal security simulation tool, show that the proposed scheme achieves secure access authentication.Compared with existing protocols, the proposed scheme improves authentication security and reduces communication and computational overhead.…”
    Get full text
    Article
  10. 26010

    An In Vitro Study of Intaglio Surface, Periphery/Palatal Seal Area, and Primary Bearing Area Adaptation of 3D-Printed Denture Base Manufactured in Various Build Angles by Kanyakorn Charoenphol, Chaimongkon Peampring

    Published 2022-01-01
    “…Denture bases were fabricated by printing with a digital light processing (DLP) technique and divided into 3 groups according to build angles of 0°, 45°, and 90° (n = 10). …”
    Get full text
    Article
  11. 26011

    Features of Internet Dialogue at the Modern Stage by Zuret Khalidovna Kobleva, Irina Asfarovna Karataban

    Published 2023-03-01
    “…With the growth of modern computer technologies, the forms and methods of Internet communications are constantly changing and improving. …”
    Get full text
    Article
  12. 26012

    BIOTECHNICAL SYSTEM FOR INTEGRATED OLFACTOMETRY DIAGNOSTICS by Yana Nosova, Oleg Avrunin, Valery Semenets

    Published 2017-09-01
    “…The subject matter of the article is the process of olfactometric research of a human olfactory function. …”
    Get full text
    Article
  13. 26013

    Integrating encryption and watermarking for enhanced information transmission security by Hadi Nazari, Mahmoud Mahlouji Bidgoli, Hossein Ghasvari

    Published 2024-06-01
    “…The chosen encryption method is computationally light, meaning it requires minimal processing power, yet still effectively shields the embedded watermark. …”
    Get full text
    Article
  14. 26014

    Daur al Ta’lim al Iliktruni fii Ta’lim al Lughoh al ‘Arabiyyah by Erma Febriani, Talqis Nurdianto

    Published 2018-12-01
    “…Abstract Developments and advances of educational technology led to the emergence of advanced technology that has become a necessity in the educational process to improve the efficiency of the educational process. …”
    Get full text
    Article
  15. 26015

    واقع استخدام معايير الاعتماد الاكاديمي في العملية التعليمية دراسة تجريبية لعينة من كليات جامعة الكوفة... by قاسم محمد العنزي, مريم ابراهيم الگرعاوي, حيدر جاسم الجبوري

    Published 2015-05-01
    “…((The reality of the use of academic accreditation standards in the educational process)) experimental study of a sample of the faculties of the University of Kufa Abstract Aimed research to identify and measure the possibility of the use of academic accreditation standards to improve the educational process at the University of Kufa. …”
    Get full text
    Article
  16. 26016

    Driver-Car Interaction and Safety Conference 2023 by Editorial, Foreword

    Published 2024-12-01
    “…Conference presentations and discussions covered the following topics: • Human-Machine Interaction • Human factor in transportation • User needs and user acceptance  • Quality methods in vehicle and vehicle systems design • Urban mobility • Transport safety  • Passive and active safety of vehicles • Advanced driving simulators • Virtual reality  • Computer science  • Artificial intelligence  • Data mining, data analysis, data classification  • Driver training and driver operator  • Accident analysis and prevention  • Psycho-physiological measurements  Peer-review The presented papers were peer reviewed by at least to reviewers, within a half-blind review process supervised by scientific committee. …”
    Get full text
    Article
  17. 26017

    New progress in the theoretical research and application of pulsating heat pipe by LI Qing-feng, WANG Ya-nan, HE Xin, LIAN Chen, LI Hua

    Published 2019-09-01
    “…Then, the operational process, working mechanism, and latest research progress in pulsating heat pipes at home and abroad were reviewed from the aspects of experimental and computational visualization research. …”
    Get full text
    Article
  18. 26018

    Towards an Estonian dataset on document-level subjectivity by Karl Gustav Gailit, Kadri Muischnek, Kairit Sirts

    Published 2025-06-01
    “…Subjectivity has been explored within many fields of linguistics, including pragmatics and formal semantics, as well as natural ­ language processing where computational methods are used to create models for detecting subjectivity, often for further processing. …”
    Get full text
    Article
  19. 26019

    A LINEAR SIMULATION MODEL FOR OPTIMIZING CROP STRUCTURE IN ORDER TO MAXIMIZE INCOME IN A VEGETAL AGRICULTURAL FARM by Sorin IONITESCU

    Published 2023-01-01
    “…The goal of the agricultural digitalization strategy is to incorporate computer technologies at the workplace of engineers, technicians, economists and farm managers. …”
    Get full text
    Article
  20. 26020

    Numerical Simulation of Flood Evolution in Pangtoupao Flood Storage Area Based on Two-Dimensional Shallow Water Equation by SUN Zhenyu, ZHOU Yunhao, ZHANG Qinxu, QIN Mengen, ZHANG Mingliang

    Published 2024-06-01
    “…The model thus can rapidly and accurately calculate the flood evolution process of dam-break flows in complex terrain. The results provide relevant information for flood control planning and disaster warning in flood storage areas.…”
    Get full text
    Article