Search alternatives:
processor » process (Expand Search)
processes » process (Expand Search)
Showing 13,321 - 13,340 results of 30,198 for search '(processor OR processes) (computing)', query time: 0.20s Refine Results
  1. 13321
  2. 13322

    Enhancing Speed and Imperceptibility in Watermarking Systems by Leveraging Galois Field Tables by Yasmin Alaa Hassan, Abdul Monem S. Rahma

    Published 2024-01-01
    “…GF tables are used to increase computing effectiveness and enable real-time processing, whereas irreducible polynomials are selected to maximize imperceptibility. …”
    Get full text
    Article
  3. 13323

    Research on Reservoir History Matching Method Based on Real⁃Coded Genetic Algorithm and Connectivity Model by Ainiwaer AILIYAER, Chunli ZHAO, Feng LIU

    Published 2025-06-01
    “…As gradient⁃based methods face challenges in computing the gradient of the objective function, intelligent optimization algorithms with stochastic properties are widely applied in reservoir optimization processes. …”
    Get full text
    Article
  4. 13324

    METHODOLOGICAL APPROACHES TO CREATION OF THE RISK MANAGEMENT SUBSYSTEM IN A CONTROL SYSTEM OF THE INTEGRATED INDUSTRIAL COMPANY by О. М. Коваленко, О. В. Станіславик

    Published 2017-02-01
    “…The subject of the research is a process of creation of the risk management subsystem in a control system of the integrated industrial company. …”
    Get full text
    Article
  5. 13325
  6. 13326

    Neuromorphic Hebbian learning with magnetic tunnel junction synapses by Peng Zhou, Alexander J. Edwards, Frederick B. Mancoff, Sanjeev Aggarwal, Stephen K. Heinrich-Barna, Joseph S. Friedman

    Published 2025-08-01
    “…Abstract Neuromorphic computing aims to mimic both the function and structure of biological neural networks to provide artificial intelligence with extreme efficiency. …”
    Get full text
    Article
  7. 13327

    Tectonic depressions on the East-European and Siberian platforms: numerical modeling of convection beneath the Eurasian continent by V. V. Chervov, N. A. Bushenkova, G. G. Chernykh

    Published 2021-03-01
    “…Mathematical modeling is a basic method for studying convective processes in the mantle. Our paper presents a numerical model of convection, which is based on the implicit artificial compressibility method. …”
    Get full text
    Article
  8. 13328

    Optimized framework for magnetohydrodynamic Darcy–Forchheimer flow of Reiner–Philippoff fluid incorporating homogeneous–heterogeneous reactions with radiative heat transfer and Cat... by M.S. Alqurashi

    Published 2025-10-01
    “…The findings point to a new function for nuclear reactors, chemical processes, electronic cooling, microheater pipes, and heat transfer phenomena.…”
    Get full text
    Article
  9. 13329
  10. 13330
  11. 13331

    Identifying and understanding the nonlinear behavior of memristive devices by Sahitya Yarragolla, Torben Hemke, Fares Jalled, Tobias Gergs, Jan Trieschmann, Tolga Arul, Thomas Mussenbrock

    Published 2024-12-01
    “…Abstract Nonlinearity is a crucial characteristic for implementing hardware security primitives or neuromorphic computing systems. The main feature of all memristive devices is this nonlinear behavior observed in their current-voltage characteristics. …”
    Get full text
    Article
  12. 13332

    Is It Really a Paradox? A Mixed-Methods, Within-Country Analysis of the Gender Gap in STEM Education by Islam Abu-Asaad, Maria Charles, Yariv Feniger, Gila Manevich-Malul, Halleli Pinson

    Published 2025-04-01
    “…Findings support arguments positing gender-specific effects of postmaterialist, individualistic value systems, and suggest that the cultural and organizational processes that generate larger gender gaps in more affluent countries may also play out within countries.…”
    Get full text
    Article
  13. 13333

    A Program for Master of Information Technology by Kabale University

    Published 2022
    “…The Master of Information Technology (MIT) mainly deals with the Management of Information Technology focusing on a number of areas including but not limited to business process management, e-services, computer security, technology modeling and data management. …”
    Get full text
    Other
  14. 13334
  15. 13335
  16. 13336
  17. 13337

    Frequency modulation on magnons in synthetic dimensions by Meng Xu, Chensong Hua, Yan Chen, Weichao Yu

    Published 2025-04-01
    “…Abstract Magnons are promising candidates for next-generation computing architectures, offering the ability to manipulate their amplitude and phase for information encoding. …”
    Get full text
    Article
  18. 13338

    Securable networked scheme with face authentication by Da‐You Huang, Chun‐Liang Lin, Yang‐Yi Chen

    Published 2022-03-01
    “…Wide applications are associated with a large amount of data transmission so that edge computing is inspired accordingly. In this research task, the major goal of edge computing is to handover a part of the computing work to the terminal equipment; the server only needs to process the results of final return. …”
    Get full text
    Article
  19. 13339
  20. 13340

    Performance Estimation of Low Power and Area-Efficient Parallel Pipelined FFT by Surya P, Arunachalaperumal C, Dhilipkumar S

    Published 2025-06-01
    “…We present a novel parallel and pipelined fast Fourier transform (FFT) architecture for high-speed and low-power applications, a critical component in wireless communications and digital signal processors. The new FFT model implements a data-inverted Vedic multiplier in the FFT architecture, which reduces data switching activity in the input patterns to minimize dynamic power consumption and computational delay. …”
    Get full text
    Article