Search alternatives:
processor » process (Expand Search)
processes » process (Expand Search)
Showing 4,901 - 4,920 results of 30,198 for search '(processor OR processes) (computing)', query time: 0.20s Refine Results
  1. 4901

    Quantum chimp-enanced SqueezeNet for precise diabetic retinopathy classification by Anas Bilal, Muhammad Shafiq, Waeal J. Obidallah, Yousef A. Alduraywish, Alishba Tahir, Haixia Long

    Published 2025-04-01
    “…The classification process, QCOA optimizes the Support Vector Machine (SVM) parameters and performs feature selection. …”
    Get full text
    Article
  2. 4902

    Integrating high dimensional quadratic regression with penalties based predictive modeling for hydro power plants accurate tariff prediction by Ritesh Dash, Anupa Sinha, Abinash Mahapatro, Bhabasis Mohapatra, Binod Kumar Sahu

    Published 2025-07-01
    “…A total of 12 features including operational variables and nonlinear combinations are pre-processed using outlier detection normalization and interpolation techniques. …”
    Get full text
    Article
  3. 4903

    Mobile Traffic Prediction at the Edge Through Distributed and Deep Transfer Learning by Alfredo Petrella, Marco Miozzo, Paolo Dini

    Published 2024-01-01
    “…., by collecting data from the different network elements and process them in a cloud center. This translates into inefficiencies due to the large amount of data transmissions and computations required, leading to high energy consumption. …”
    Get full text
    Article
  4. 4904

    Temporal Decay Loss for Adaptive Log Anomaly Detection in Cloud Environments by Lelisa Adeba Jilcha, Deuk-Hun Kim, Jin Kwak

    Published 2025-04-01
    “…Unlike traditional sequence models that often overemphasize outdated information and impose high computational overhead, LDF constrains the training process by dynamically weighing log messages based on their temporal proximity, thereby aligning with the rapidly evolving nature of cloud computing environments. …”
    Get full text
    Article
  5. 4905

    Evaluating Windows Vista user account security by Baghdad Science Journal

    Published 2011-06-01
    “…However, for business computers it is necessary to restrict access to the computers, starting with defining a different password for every user account. …”
    Get full text
    Article
  6. 4906

    Optimal features assisted multi-attention fusion for robust fire recognition in adverse conditions by Inam Ullah, Nada Alzaben, Yousef Ibrahim Daradkeh, Mi Young Lee

    Published 2025-07-01
    “…This novel progressive attention-over-attention framework achieves state-of-the-art (SOTA) performance while maintaining computational efficiency. Our approach introduces three key innovations: Firstly, Convolutional Self-Attention (CSA), integrating global self-attention with convolution through dynamic kernels and trainable filters for enhanced low-level fire feature processing. …”
    Get full text
    Article
  7. 4907

    HPC-T-Assembly: a pipeline for de novo transcriptome assembly of large multi-specie datasets by Franco Liberati, Taiel Maximiliano Pose Marino, Paolo Bottoni, Daniele Canestrelli, Tiziana Castrignanò

    Published 2025-04-01
    “…Results To address computational challenges in transcriptomic analyses of non-model organisms, we present HPC-T-Assembly, a tool for de novo transcriptome assembly from RNA-seq data on high-performance computing (HPC) infrastructures. …”
    Get full text
    Article
  8. 4908

    YOLOLS: A Lightweight and High-Precision Power Insulator Defect Detection Network for Real-Time Edge Deployment by Qinglong Wang, Zhengyu Hu, Entuo Li, Guyu Wu, Wengang Yang, Yunjian Hu, Wen Peng, Jie Sun

    Published 2025-03-01
    “…Furthermore, when deployed on Jetson Orin NX, YOLOLS achieves 44.6 FPS, ensuring real-time processing capability. Compared to other lightweight YOLO variants, YOLOLS achieves a better balance between accuracy, computational efficiency, and inference speed, making it an optimal solution for real-time insulator defect detection in resource-constrained edge computing environments.…”
    Get full text
    Article
  9. 4909

    Human-Survey Interaction (HSI): A Study on Integrity of Human Data Collectors in a Mass-Scale Hajj Pilgrimage Survey by Saiful Islam Salim, Najla Abdulrahman Al-Nabhan, Masfiqur Rahaman, Nafisa Islam, Tarik Reza Toha, Jannatun Noor, Adnan Quaium, Aaiyeesha Mostak, Mainul Hossain, Md. Masum Mushfiq, A. B. M. Alim Al Islam

    Published 2021-01-01
    “…We observe that, although these computing-based filtering can indicate the integrity up to a certain level, human-in-the-loop is unavoidable for concluding on the integrity. …”
    Get full text
    Article
  10. 4910
  11. 4911

    Computationally Efficient Design of 16-Poles and 24-Slots IPMSM for EV Traction Considering PWM-Induced Iron Loss Using Active Transfer Learning by Soo-Hwan Park, Myung-Seop Lim

    Published 2025-03-01
    “…However, analyzing the PWM-induced iron loss requires a high computational cost because the inverter-motor model should be included in the calculation process. …”
    Get full text
    Article
  12. 4912
  13. 4913

    Numerical simulation of the two-phase flow and pollutant concentration changes in an oxidation ditch: A computational fluid dynamics and activated sludge model 3 approach by Rongrong Miao, Han Cui, Yuzhen Shi, Baoxiu Guo, Yanqiong Chen, Zhengbo Yang, Chengbo Chang, Wanyue Xu

    Published 2025-04-01
    “…In this study, a computational fluid dynamics (CFD) model integrated with activated sludge model 3 (ASM3), which is based on the tandem reactor model (tank-in-series (TIS) method), is proposed to simulate the oxygen mass transfer process and biochemical reaction process in an oxidation ditch. …”
    Get full text
    Article
  14. 4914

    Non-standard pipeline without MRI has replicability in computation of Centiloid scale values for PiB and 18F-labeled amyloid PET tracers by Motonobu Fujishima, Hiroshi Matsuda

    Published 2022-09-01
    “…., in 2018 calculates Centiloid scale values that are highly consistent with those computed using the standard pipeline. The purpose of this study was to demonstrate that the non-standard pipeline can compute Centiloid scale values in high agreement with the standard pipeline when using different datasets of amyloid PET tracers in our local computer environment.PET images of 11C-Pittsburgh compound B (11C-PiB), 18F-florbetapir, 18F-flutemetamol, 18F-florbetaben, and 18F-NAV4694 from the calibration dataset were processed using both the standard and non-standard pipelines, and the computed cortical standardized uptake value ratio (SUVr) value was converted to the Centiloid scale value using the method described by Klunk et al., in 2015. …”
    Get full text
    Article
  15. 4915
  16. 4916

    Utilization of Palm Frond Waste as Fuel for Co-Firing Coal and Biomass in a Tangentially Pulverized Coal Boiler Using Computational Fluid Dynamic Analysis by Sobar Ihsan, Prabowo, Wawan Aries Widodo, I Nyoman Agus Adi Saputra, Hariana

    Published 2024-10-01
    “…By utilizing computational fluid dynamics (CFD), this study has modeled and evaluated co-firing palm frond residue (HT-FRD) with hydrothermal treatment into a 315 MWe boiler. …”
    Get full text
    Article
  17. 4917

    Enhanced CoCoSo Framework for Computer Network Security Evaluation Through Utilizing the Type-2 Neutrosophic Multi-Attribute Group Decision-Making by Ziqiao Wang, Xiaomu Cai, Zhefeng Yin

    Published 2025-03-01
    “…Computer network security (CNS) evaluation is a comprehensive analysis and assessment of a network system's security to identify potential vulnerabilities and threats, ensuring the system complies with relevant security standards. …”
    Get full text
    Article
  18. 4918

    Deep learning based rapid X-ray fluorescence signal extraction and image reconstruction for preclinical benchtop X-ray fluorescence computed tomography applications by Amrit Kaphle, Sandun Jayarathna, Sang Hyun Cho

    Published 2025-06-01
    “…Abstract Recent research advances have resulted in an experimental benchtop X-ray fluorescence computed tomography (XFCT) system that likely meets the imaging dose/scan time constraints for benchtop XFCT imaging of live mice injected with gold nanoparticles (GNPs). …”
    Get full text
    Article
  19. 4919

    Low-dose computed tomography image denoising using pixel level non-local self-similarity prior with non-local means for healthcare informatics by Dawa Chyophel Lepcha, Bhawna Goyal, Ayush Dogra, Krunal Vaghela, Ashish Singh, K. S. Ravi Kumar, Durga Prasad Bavirisetti

    Published 2025-07-01
    “…Abstract Low-dose computed tomography (LDCT) has gained considerable attention for its ability to minimize patients’ exposure to radiation thereby reducing the associated cancer risks. …”
    Get full text
    Article
  20. 4920

    Experimental Verification and Multi-Physics-Based Computer-Aided Engineering Simulation Methods for Dynamic Characteristics Analysis of Gas Foil Bearings at Lift-Off State by Tai-Yuan Yu, Pei-Jen Wang

    Published 2025-02-01
    “…This paper presents an analysis of the dynamic characteristics observed and studied during the startup process of a gas foil radial bearing. It utilizes a comparison of both experimental data and three-dimensional fluid–solid interaction computational fluid dynamics simulations to investigate a gas foil bearing with three bump-type pads. …”
    Get full text
    Article