Search alternatives:
processor » process (Expand Search)
processes » process (Expand Search)
Showing 12,521 - 12,540 results of 30,198 for search '(processor OR processes) (computing)', query time: 0.26s Refine Results
  1. 12521

    Voice Security Using Hybrid Algorithm by Alyaa Abdul Majeed Haleem

    Published 2010-12-01
    “…The proposed method starts with speech compression to convert human speech into an efficiently encoded representation that can later be decoded to produce a close approximation of the original signal. The process of compression is achieved by first computing Discrete Wavelet Transform (DWT), truncating small-valued coefficients and then efficiently encoding them. …”
    Get full text
    Article
  2. 12522

    Improving Performance of Projector with the Protection of the Eyes while using a Smart Board by Abdulrafa Maree

    Published 2020-12-01
    “…One of the most important problems that a teacher faces when using a smart board in the teaching process is the fall of a strong light beam from the projector on their faces and bodies. …”
    Get full text
    Article
  3. 12523
  4. 12524
  5. 12525
  6. 12526
  7. 12527

    Design a Tool for Generating Test Cases using Swarm Intelligence by Shahbaa Khaleel, Ashraf Al Thanoon

    Published 2013-03-01
    “…In this research, the software engineering tool Generate Test Suite GTS TOOL was constructed and modeled with the aid of the computer, which is used to generate optimal test cases automatically and this tool also support the drawing of the control flowgraphs and paths inside the program and tests each path using CSO and PSO. …”
    Get full text
    Article
  8. 12528
  9. 12529
  10. 12530
  11. 12531
  12. 12532

    Machine Learning Potential for Serpentines by Hongjin Wang, Chenxing Luo, Renata M. Wentzcovitch

    Published 2024-12-01
    “…Abstract Serpentines are layered hydrous magnesium silicates (MgO⋅SiO2⋅H2O) formed through serpentinization, a geochemical process that significantly alters the physical property of the mantle. …”
    Get full text
    Article
  13. 12533

    Machine Learning Techniques for Kinship Verification: A Review by Olivia Oraha, Yusra Mohammad

    Published 2025-06-01
    “…Kinship verification is an automatic determining process of people relationships, if two or more individuals are in kin relation or not. …”
    Get full text
    Article
  14. 12534
  15. 12535

    Evaluation of Some Properties of Distributed Databases using Oracle by Alaa Saeed Al-Mukhtar

    Published 2013-09-01
    “…In this study, query processing efficiency of the distributed database in the relational database Oracle9i was examined and compared. …”
    Get full text
    Article
  16. 12536
  17. 12537

    Classification of Malware Images Using Fine-Tunned ViT by Özal Yıldırım, Oğuzhan Katar

    Published 2024-04-01
    “…Malware detection and classification have become critical tasks in ensuring the security and integrity of computer systems and networks. Traditional methods of malware analysis often rely on signature-based approaches, which struggle to cope with the ever-evolving landscape of malware variants. …”
    Get full text
    Article
  18. 12538

    Use the Genetic Algorithm to Encode and Hide Gray Image Data by Raya Essa, Reham Essa, Inam Sulaiman

    Published 2013-03-01
    “…With the development of means of communication, computer science and information exchange via electronic information networks an  urgent need emerged to find ways to save exchanged information. …”
    Get full text
    Article
  19. 12539
  20. 12540