Search alternatives:
processor » process (Expand Search)
processes » process (Expand Search)
Showing 7,941 - 7,960 results of 30,198 for search '(processor OR processes) (computing)', query time: 0.20s Refine Results
  1. 7941
  2. 7942
  3. 7943
  4. 7944

    Unseen Attack Detection in Software-Defined Networking Using a BERT-Based Large Language Model by Mohammed N. Swileh, Shengli Zhang

    Published 2025-07-01
    “…By utilizing Random Forest for feature selection, we optimize model performance and reduce computational overhead, ensuring efficient and accurate detection. …”
    Get full text
    Article
  5. 7945

    Evaluation of Automated Object-Detection Algorithms for Koala Detection in Infrared Aerial Imagery by Laith A. H. Al-Shimaysawee, Anthony Finn, Delene Weber, Morgan F. Schebella, Russell S. A. Brinkworth

    Published 2024-10-01
    “…This paper introduces a biologically inspired detection algorithm to locate koalas in eucalyptus plantations and evaluates its performance against ten other detection techniques, including both image processing and neural-network-based approaches. The nature of koala occlusion by canopy cover in these plantations was also examined using a combination of simulated and real data. …”
    Get full text
    Article
  6. 7946
  7. 7947

    Determination of Fast-Moving Objects’ Speed and Range with Linear Frequency Modulation Continuous Wave Radar Using Autocorrelation Scheme by N. V. Sokolik

    Published 2020-04-01
    “…The results of the field experiment make it possible to draw conclusions that the proposed algorithm is highly robust even in the absence of inter-period secondary processing. Its usage allows one to improve the stability of the algorithm without considerable additional computational costs. …”
    Get full text
    Article
  8. 7948
  9. 7949
  10. 7950
  11. 7951
  12. 7952
  13. 7953
  14. 7954
  15. 7955
  16. 7956
  17. 7957

    GuardianML: Anatomy of Privacy-Preserving Machine Learning Techniques and Frameworks by Nges Brian Njungle, Eric Jahns, Zhenqi Wu, Luigi Mastromauro, Milan Stojkov, Michel A. Kinsy

    Published 2025-01-01
    “…Privacy-preserving machine learning PPML aims to safeguard the confidentiality of both data and models and ensure that sensitive information remains protected during training and inference processes. Different techniques, protocols, libraries, and frameworks have been advanced to enable privacy-preserving machine learning, including implementation trade-offs, computational efficiency, communication overhead minimization, security guarantees, and scalability. …”
    Get full text
    Article
  18. 7958

    Thermal Analysis of Outer Rotor BLDC Motor for Drone Considering Airflow Ventilation Cooling by Jaebeom Kang, Jiheon Lee, Hyeong-Jin Kim, Thanh-Tuan Nguyen, Jiyoung Lee, Yi-Hwa Song, Sung-Joo Yoo

    Published 2025-01-01
    “…Computational Fluid Dynamics (CFD) can analyze flow and heat transfer phenomena with high resolution but involves high computational cost, making it impractical for iterative design processes. …”
    Get full text
    Article
  19. 7959

    Rice cultivation can mitigate soil salinization and alkalization by modifying the macropore structure in saline–sodic paddy fields by Wei Peng, Xiangming Zhu, Wenjuan Zheng, Qingyang Xie, Mingming Wang, Enhua Ran

    Published 2025-05-01
    “…Soil macropores play a critical role in complex physical coupling processes such as ion absorption and water/salt migration, which are closely associated with soil salinization and alkalization. …”
    Get full text
    Article
  20. 7960