Search alternatives:
processor » process (Expand Search)
processes » process (Expand Search)
Showing 7,681 - 7,700 results of 30,198 for search '(processor OR processes) (computing)', query time: 0.24s Refine Results
  1. 7681
  2. 7682

    Privacy protection scheme of DBSCAN clustering based on homomorphic encryption by Chunfu JIA, Ruiqi LI, Yafei WANG

    Published 2021-02-01
    “…In order to reduce the risk of data privacy leakage in the process of outsourced clustering, a privacy protection scheme of DBSCAN clustering based on homomorphic encryption was proposed.In order to encrypt the float data in the actual scene, three data preprocessing methods for different data accuracy were given, and a policy for choosing a proper data preprocessing method based on data characteristics, accuracy and computational cost was also proposed.For the ciphertext comparison operation that was not supported by homomorphic encryption, a protocol between the client and the cloud server was designed to realize the function of ciphertext comparison.Theoretical analysis and experimental results show that the proposed scheme can ensure the security of data privacy, and has a higher clustering accuracy rate and lower time overhead.…”
    Get full text
    Article
  3. 7683

    Privacy protection scheme of DBSCAN clustering based on homomorphic encryption by Chunfu JIA, Ruiqi LI, Yafei WANG

    Published 2021-02-01
    “…In order to reduce the risk of data privacy leakage in the process of outsourced clustering, a privacy protection scheme of DBSCAN clustering based on homomorphic encryption was proposed.In order to encrypt the float data in the actual scene, three data preprocessing methods for different data accuracy were given, and a policy for choosing a proper data preprocessing method based on data characteristics, accuracy and computational cost was also proposed.For the ciphertext comparison operation that was not supported by homomorphic encryption, a protocol between the client and the cloud server was designed to realize the function of ciphertext comparison.Theoretical analysis and experimental results show that the proposed scheme can ensure the security of data privacy, and has a higher clustering accuracy rate and lower time overhead.…”
    Get full text
    Article
  4. 7684
  5. 7685
  6. 7686
  7. 7687

    TRANSFORMATIVE TECHNOLOGIES by Grzegorz Bryda, António Pedro Costa

    Published 2024-07-01
    “…This reflection explores the integration of artificial intelligence (AI) and advanced visualisation techniques within computer-assisted qualitative data analysis software (CAQDAS) tools. …”
    Get full text
    Article
  8. 7688
  9. 7689

    Machine learning algorithms for manufacturing quality assurance: A systematic review of performance metrics and applications by Ashfakul Karim Kausik, Adib Bin Rashid, Ramisha Fariha Baki, Md Mifthahul Jannat Maktum

    Published 2025-07-01
    “…Performance metrics include accuracy, precision, speed, recall, computational efficiency, scalability, and real-time processing capabilities. …”
    Get full text
    Article
  10. 7690

    Interval-based principal component analysis for reliable fault detection under data uncertainty by Raoudha Bel Hadj Ali, Anissa Ben Aicha, Belkhiria Kamel, Gilles Mourot, Majdi Mansouri

    Published 2025-09-01
    “…Principal Component Analysis (PCA) has gained widespread use in industrial process monitoring due to its ability to model high-dimensional data and detect abnormal events. …”
    Get full text
    Article
  11. 7691

    Innovative and Interactive Technologies in Creative Product Design Education: A Review by Ioanna Nazlidou, Nikolaos Efkolidis, Konstantinos Kakoulis, Panagiotis Kyratsis

    Published 2024-12-01
    “…The findings highlight several categories of technologies utilized in design education, including virtual and augmented reality, robotics, interactive embedded systems, immersive technologies, and computational intelligence systems. These technologies are primarily integrated as supportive tools throughout different stages of the design process within learning environments. …”
    Get full text
    Article
  12. 7692

    A Multicriteria Evaluation of Single Underwater Image Improvement Algorithms by Iracema del P. Angulo-Fernández, Javier Bello-Pineda, J. Alejandro Vásquez-Santacruz, Rogelio de J. Portillo-Vélez, Pedro J. García-Ramírez, Luis F. Marín-Urías

    Published 2025-07-01
    “…For this research’s target application of generating underwater photomosaics, the Dark Channel Prior (DCP) algorithm emerged as the most suitable under a weighting scheme of 75% for processing time and 25% for keypoint increase. This proposal represents a solution for evaluating improvement algorithms in applications where computational efficiency is critical.…”
    Get full text
    Article
  13. 7693
  14. 7694

    Adaptive Spatial Lattice Manufacturing (ASLM): A novel approach to efficient lattice structure production by Justin Dirrenberger, Pierre Lapouge, Rachel Azulay, Peter Evers, Tom Vroemen

    Published 2025-01-01
    “…This paper introduces the ASLM process, detailing its computational design principles, build mechanics, and material compatibility using AISI 316L stainless steel. …”
    Get full text
    Article
  15. 7695
  16. 7696

    Error Analysis of Trigonometry Students in a Technological University by Catalino L. Centillas Jr., Christian Caben M. Larisma

    Published 2016-06-01
    “…Thus, students had learned some concepts defectively. Generally, processing the error of the students needs teachers' consideration through process-focus instruction. …”
    Get full text
    Article
  17. 7697

    Parametric Analytical Modulation Transfer Function Model in Turbid Atmosphere with Application to Image Restoration by Mengxing Guo, Pengfei Wu, Zizhao Fan, Hao Lu, Ruizhong Rao

    Published 2024-10-01
    “…This approach represents a novel solution to the challenges of image processing in complex atmospheric environments.…”
    Get full text
    Article
  18. 7698
  19. 7699

    The potential of artificial intelligence (AI) to improve electronic word-of-mouth's (eWOM) efficacy by Baltezarević Radoslav V., Kwiatek Piotr B.

    Published 2024-01-01
    “…Opinion mining, (sentiment analysis), is a popular subdomain in Natural language processing (NLP) which allows for transforming qualitative data into quantitative information. …”
    Get full text
    Article
  20. 7700

    Bilateral Olecranon and Left Lesser Trochanter Avulsion Fractures in Renal Osteodystrophy: A Rare Case Report and Comprehensive Review by Vijay Papineni, Rajesh Botchu, Kartikeyan P. Iyengar, Shashank Chapala, Asad Rabbani Shah, Balamurugan Rathinavelu

    Published 2025-07-01
    “…This review summarizes the role of imaging (Radiography, US, Computed Tomography, and Magnetic Resonance Imaging) in assessing avulsion fractures in patients with end-stage renal disease. …”
    Get full text
    Article