Search alternatives:
processor » process (Expand Search)
processes » process (Expand Search)
Showing 10,141 - 10,160 results of 30,198 for search '(processor OR processes) (computing)', query time: 0.20s Refine Results
  1. 10141

    A Robust Watermarking Scheme Based on Maximum Wavelet Coefficient Modification and Optimal Threshold Technique by Chunlei Li, Xiaowei Song, Zhoufeng Liu, Aihua Zhang, Ruimin Yang

    Published 2015-01-01
    “…During the extraction process, an optimal threshold value calculated by iterative computation is used to extract the watermark from the watermarked image under different attacks, without using the original image or watermark. …”
    Get full text
    Article
  2. 10142
  3. 10143
  4. 10144
  5. 10145
  6. 10146
  7. 10147
  8. 10148
  9. 10149
  10. 10150
  11. 10151
  12. 10152
  13. 10153
  14. 10154

    Towards a Scalable and Adaptive Learning Approach for Network Intrusion Detection by Alebachew Chiche, Million Meshesha

    Published 2021-01-01
    “…Therefore, security experts are recommended to integrate intrusion detection in their network and computer systems, not only for well-being of their computer systems but also for the sake of improving their working process.…”
    Get full text
    Article
  15. 10155
  16. 10156
  17. 10157
  18. 10158
  19. 10159
  20. 10160

    Transmission Network Expansion Planning Considering Phase-Shifter Transformers by Celso T. Miasaki, Edgar M. C. Franco, Ruben A. Romero

    Published 2012-01-01
    “…Results obtained from computational simulations carried out with IEEE-24 bus system show an outstanding performance of the proposed methodology and model, indicating the technical viability of using these nonconventional devices during the planning process.…”
    Get full text
    Article