Search alternatives:
processor » process (Expand Search)
processes » process (Expand Search)
Showing 5,261 - 5,280 results of 30,198 for search '(processor OR processes) (computing)', query time: 0.26s Refine Results
  1. 5261

    Optimizing Geospatial Data for ML/CV Applications: A Python-Based Approach to Streamlining Map Processing by Removing Irrelevant Areas by David Kasperek, Michal Podpora

    Published 2024-12-01
    “…Massive image datasets are often required for the proper functioning of Machine Learning (ML) and Computer Vision (CV) applications. This paper offers a solution to computational challenges in the Image Processing of satellite imagery, by proposing an optimization procedure. …”
    Get full text
    Article
  2. 5262
  3. 5263

    Improving Barcode Vision Scanning Process using a Drone-based Tracking PID Controller for Warehouse in Industry 4.0 by Samer Al-hamadani, Izzat Al-Darraji, Houssem Jerbi

    Published 2025-06-01
    “…Results showed that drones can achieve remarkable barcode scanning performance by incorporating sophisticated computer vision technologies into PID controllers. …”
    Get full text
    Article
  4. 5264

    The Physics and Metaphysics of Social Powers: Bridging Cognitive Processing and Social Dynamics, a New Perspective on Power Through Active Inference by Mahault Albarracin, Sonia de Jager, David Hyland

    Published 2025-05-01
    “…This computational advantage expands access to policies and buffers against vulnerabilities, amplifying an individual’s or group’s influence. …”
    Get full text
    Article
  5. 5265
  6. 5266
  7. 5267
  8. 5268
  9. 5269

    Finding a suitable chest x-ray image size for the process of Machine learning to build a model for predicting Pneumonia by Kriengsak Yothapakdee, Yosawaj Pugtao, Sarawoot Charoenkhun, Tanunchai Boonnuk, Kreangsak Tamee

    Published 2025-02-01
    “…These findings assist in optimizing chest X-ray image sizes for pneumonia prediction models by weighing diagnostic accuracy against computational resources.…”
    Get full text
    Article
  10. 5270
  11. 5271

    MODEL OF THE PROCESS OF FUNCTIONING OF THE INFORMATION PROTECTION SYSTEM FROM UNAUTHORIZED ACCESS CREATED IN THE SOFTWARE ENVIRONMENT OF IMITATION MODELING "CPN TOOLS" by O. I. Bokova, I. G. Drovnikov, A. D. Popov, E. A. Rogozin

    Published 2019-07-01
    “…At present, conducting a computational experiment on a system for protecting information from unauthorized access operated in an automated system is a time consuming process. …”
    Get full text
    Article
  12. 5272

    A novel hybrid fuzzy analytical hierarchy process–game theory model for prioritizing factors affecting the deterioration of water pipelines by Eslam Mohammed Abdelkader, Tarek Zayed, Nehal Elshaboury

    Published 2024-11-01
    “…Then, the relative importance priorities of water deterioration factors are scrutinized using seven weight computation methods. These methods encompass analytical hierarchy process (AHP), Monte Carlo AHP, fuzzy AHP, magnitude-based fuzzy AHP, total difference-based fuzzy AHP, spherical fuzzy AHP and Pythagorean fuzzy AHP. …”
    Get full text
    Article
  13. 5273

    Influence of the process of damage accumulation on the asymptotic behavior of stress fields under creep conditions of a sample with a central crack by Yulia S. Bykova, Larisa V. Stepanova

    Published 2023-12-01
    “…The objective of the study is to analyze the cracked plate experiencing uniaxial loading under creep conditions using the CAE software SIMULIA ABAQUS taking into account the damage accumulation processes near the crack tip. Computations were performed by means of the user procedure UMAT (User material), which is based on the Bailey-Norton creep power law and the Kachanov — Rabotnov damage evolution equation describing the power-law damage accumulation processes. …”
    Get full text
    Article
  14. 5274
  15. 5275
  16. 5276

    Insights into the Estimation of the Enhanced Thermal Conductivity of Phase Change Material-Containing Oxide Nanoparticles using Gaussian Process Regression Method by Tzu-Chia Chen, Hasan Sh. Majdi, Aras Masood Ismael, Jamshid Pouresmi, Danial Ahangari, Saja Mohammed Noori

    Published 2022-01-01
    “…The accessible computational techniques indicate the accuracy of our proposed GPR model compared to the previously proposed methods. …”
    Get full text
    Article
  17. 5277

    Decomposing decision mechanisms in female substance use disorder: drift diffusion modeling of context-dependent biases in gain and loss processing by Hao Zhang, Gavin Kader, Huoyin Zhang, Haijian Zhao, Wanke Pan, Peng Lei

    Published 2025-08-01
    “…Conclusions This study reveals distinct context-dependent decision biases in female SUD, characterized by computational signatures that differ markedly between gain and loss domains. …”
    Get full text
    Article
  18. 5278

    opstool: A Python library for OpenSeesPy analysis automation, streamlined pre- and post-processing, and enhanced data visualization by Yexiang Yan, Yazhou Xie

    Published 2025-05-01
    “…This paper presents opstool, a Python package designed to enhance the pre- and post-processing capabilities of OpenSees and OpenSeesPy. …”
    Get full text
    Article
  19. 5279
  20. 5280