Search alternatives:
processor » process (Expand Search)
processes » process (Expand Search)
Showing 26,321 - 26,340 results of 30,198 for search '(processor OR processes) (computing)', query time: 0.36s Refine Results
  1. 26321

    Shear-driven solid-state additive manufacturing of aerospace aluminum on impurity contaminated surfaces by Xiaofeng Wu, Abhishek Rastogi, Nikhil Gotawala, Mark A. Pandol, Yunhui Zhu, Hang Z. Yu

    Published 2025-08-01
    “…We explore the environmental resilience of a next-generation solid-state additive process, additive friction stir deposition, highlighting its ability to print on surfaces contaminated by impurity particles. …”
    Get full text
    Article
  2. 26322

    Revolutionizing Utility of Big Data Analytics in Personalized Cardiovascular Healthcare by Praneel Sharma, Pratyusha Sharma, Kamal Sharma, Vansh Varma, Vansh Patel, Jeel Sarvaiya, Jonsi Tavethia, Shubh Mehta, Anshul Bhadania, Ishan Patel, Komal Shah

    Published 2025-04-01
    “…The term “big data analytics (BDA)” defines the computational techniques to study complex datasets that are too large for common data processing software, encompassing techniques such as data mining (DM), machine learning (ML), and predictive analytics (PA) to find patterns, correlations, and insights in massive datasets. …”
    Get full text
    Article
  3. 26323
  4. 26324
  5. 26325

    Bilinear Sequence Regression: A Model for Learning from Long Sequences of High-Dimensional Tokens by Vittorio Erba, Emanuele Troiani, Luca Biggio, Antoine Maillard, Lenka Zdeborová

    Published 2025-06-01
    “…Current progress in artificial intelligence is centered around so-called large language models that consist of neural networks processing long sequences of high-dimensional vectors called tokens. …”
    Get full text
    Article
  6. 26326

    Privacy Protection of Digital Images Using Watermarking and QR Code-based Visual Cryptography by Akanksha Arora, Hitendra Garg, Shivendra Shivani

    Published 2023-01-01
    “…The original secret image is processed with a watermark image (copyright logo, signature, and so on), and then halftoning of the watermarked image has been done to limit pixel expansion. …”
    Get full text
    Article
  7. 26327

    Bézier Cubics and Neural Network Agreement along a Moderate Geomagnetic Storm by Emre Eroglu, Mehmet Emir Koksal

    Published 2024-01-01
    “…In a sense, the comparison of a classical and mechanical approach with a modern and computer-based one is a considerable experience for the paper. …”
    Get full text
    Article
  8. 26328

    Risk Assessment of Urban Water-Logging Disaster Based on Weight-improved AHP Method-Taking Haojiang District of Shantou City as an Example by ZHOU Jiaqi, LIN Kairong, XIE Xue, CHEN Haiyan, GAO Xin

    Published 2021-01-01
    “…Under the background of global climate change,the frequency of extreme rainfall events increases,and the urban water-logging disaster occurs frequently.The risk assessment of water-logging disaster can effectively reduce the loss.Taking Haojiang District of Shantou City as case study,this paper improves the weights of the analytic hierarchy process (AHP) by neural network,expands the traditional nine-point scaling,and constructs the water-logging disaster risk evaluation model.The results show that the water-logging disaster risk in Haojiang District is generally high in the south-central region and low in the northwest region.Especially,Yuxin Street,Binhai Street,Majiao Street and Dahao Street have higher risk values,which need to take preventive measures.After verification of evaluation results with historical data,it is shown that about 80% of historical flood disaster points are distributed in high-risk areas,which is consistent with the verification results of historical disaster points.The weight determination method of AHP is improved by neural network,the intermediate variables of the traditional nine-point method is expanded to three decimal places,and the weight is determined by the computer to reduce subjectivity to a certain extent.The results of risk assessment can provide technical support for flood warning and flood control scheduling within a certain time limit.…”
    Get full text
    Article
  9. 26329

    New Approaches to Recycling Plastic E-Waste by Natalya A. Kulenova, Marzhan A. Sadenova, Andrey S. Babenko, Murat Yeleukenov, Nail A. Beisekenov, Viktor V. Chub

    Published 2024-12-01
    “…The article deals with the utilization of plastic waste generated after the disassembly of used fragments of computer equipment and household electronic devices. …”
    Get full text
    Article
  10. 26330

    Myocardial Infarction And Ischemic Heart Disease In Patients With Acute Ischemic Stroke by Daniela Arabadzhieva, Zhaneta Georgieva, Ara Kaprelyan, Zdravko Slavov

    Published 2015-06-01
    “…The diagnosis of acute ischemic stroke was confirmed by Doppler sonography and computed tomography of the cerebral circulation. Data were statistically processed by variation and correlation analysis. …”
    Get full text
    Article
  11. 26331

    Multidimensional State Data Reduction and Evaluation of College Students’ Mental Health Based on SVM by Han Peiqing

    Published 2022-01-01
    “…In response to the shortcomings of the traditional methods for evaluating the mental health status of college students in terms of computational complexity and low accuracy, a method for evaluating the mental health status of college students based on data reduction and support vector machines was proposed. …”
    Get full text
    Article
  12. 26332

    Internet is Changing Cultures by Vladimir-Aurelian ENACHESCU, Donna TARABAY

    Published 2016-07-01
    “…Computer and internet are invading the world changing all cultures and affecting people behavior. …”
    Get full text
    Article
  13. 26333

    Reputation and Energy-Aware Dynamic Hybrid Consensus (READ-HC) Model for IIoT by Sristi Mitra, Vaishnavi Santosh Sable, Danium Shahnowaz Syed

    Published 2025-07-01
    “…Private blockchains, with flexible rules and strong privacy, could therefore be deployed inside IIoT systems to address security concerns and process large volumes of data. Traditional consensus mechanisms in blockchain, such as PoW and PoS, are computationally demanding and energy-intensive and may not be suitable for resource-constrained IIoT scenarios. …”
    Get full text
    Article
  14. 26334

    Examining validity in computerized dynamic assessment by Zaha Alonazi

    Published 2025-01-01
    “…Due to the scarcity of research on CDA, this paper explores the potentials and the viability of this intervention-based assessment in computer assisted language testing context in light of its conformity with Messick’s unitary view of validity. …”
    Get full text
    Article
  15. 26335

    In situ observation of rolling contact fatigue cracks by laminography using ultrabright synchrotron radiation by Y. Nakai, D. Shiozawa, S. Kikuchi, K. Sato, T. Obama

    Published 2015-09-01
    “…In the present study, synchrotron radiation computed laminography (SRCL) imaging was performed to observe flaking defects during the RCF of a high-strength steel. …”
    Get full text
    Article
  16. 26336

    Enhanced YOLOv8-based pavement crack detection: A high-precision approach. by ZuXuan Zhang, HongLi Zhang, TongJia Zhang

    Published 2025-01-01
    “…Secondly, GSConv is used in the neck part to reduce computation and enhance feature representation, especially in the processing of multi-scale fracture features. …”
    Get full text
    Article
  17. 26337

    Pixel-Based Machine Learning in Medical Imaging by Kenji Suzuki

    Published 2012-01-01
    “…Machine learning (ML) plays an important role in the medical imaging field, including medical image analysis and computer-aided diagnosis, because objects such as lesions and organs may not be represented accurately by a simple equation; thus, medical pattern recognition essentially require “learning from examples.” …”
    Get full text
    Article
  18. 26338

    One-Shot Segmentation of Battery Cells with Gradual Learning by Johann Christopher Engster, Nele Blum, Laura Hellwege, Thorsten M. Buzug, Maik Stille

    Published 2025-02-01
    “…One aspect is the visualization of inner structures, which can be achieved by computed tomography (CT) as a non-destructive testing (NDT) method. …”
    Get full text
    Article
  19. 26339

    Visual Planarization in Oil Painting Techniques in Digital Information Age by Yiping Zhang

    Published 2022-01-01
    “…The purpose of this paper is to realize the research on the visual planarization of oil painting techniques in the digital information environment to promote the ecological development of the computer and art field. By using the advanced methods and technologies of its information display, this paper proposed the use of image processing algorithms in the digital information age to guide the integration of digital information technology and oil painting techniques. …”
    Get full text
    Article
  20. 26340

    Problems of Distance Learning in EU Countries During the COVID-19 Pandemic by Alexander I. Egorov

    Published 2024-06-01
    “…Each EU member state was forced to transform its education policy, trying not only to reduce the risks of infection during professional contacts between teachers and students, but also to ensure the maintenance of the necessary quality of the educational process. The ambiguous influence of distance learning on the level of academic achievement of students in various EU countries is shown. …”
    Get full text
    Article