Search alternatives:
processor » process (Expand Search)
processes » process (Expand Search)
Showing 13,921 - 13,940 results of 30,198 for search '(processor OR processes) (computing)', query time: 0.32s Refine Results
  1. 13921
  2. 13922
  3. 13923
  4. 13924
  5. 13925

    Analisis Efek Augmentasi Dataset dan Fine Tune pada Algoritma Pre-Trained Convolutional Neural Network (CNN) by Theopilus Bayu Sasongko, Haryoko Haryoko, Agit Amrullah

    Published 2023-08-01
    “…Abstract Today deep learning technology is often associated with reliable processes (methods) when we have large amounts of data. …”
    Get full text
    Article
  6. 13926
  7. 13927
  8. 13928

    Co‐Design of the Structured Personalised Assessment for Reviews After Cancer (SPARC) Intervention by Rosalind Adam, Lisa Duncan, Sara MacLennan, Louise Locock, Anne E. Kiltie, Leslie Samuel, Peter Murchie

    Published 2025-02-01
    “…Methods Two co‐design workshops were held with patients, clinicians (including oncologists, general practitioners and nurses), digital/computing science experts and third‐sector representatives. …”
    Get full text
    Article
  9. 13929

    Energy saving in rail transport by Jan Antoš

    Published 2021-07-01
    “…Based on several partial results, emergent computing tool is functional and sufficiently accurate. …”
    Get full text
    Article
  10. 13930

    SIMULATION OF AIR HEAT TRANSFER IN CIRCULAR PIPES WITH TRIANGULAR AND SQUARE TURBULENCE STIMULATORS FOR HIGH REYNOLDS CRITERIA UP TO ONE MILLION by I. E. Lobanov

    Published 2021-04-01
    “…Mathematical simulations of the heat exchange process in straightand round horizontal pipes with turbulence stimulators with d/D=0.95...0.90 and t/D=0.25...1.00 of triangular and square transverse profiles with large Reynolds numbers (Re=106) on a foundation with multiblock computing technologies, which are based on solutions of factorized and finite-volume Reynolds equations and energy equations, were conducted. …”
    Get full text
    Article
  11. 13931
  12. 13932

    Dempster Shafer-Empowered Machine Learning-Based Scheme for Reducing Fire Risks in IoT-Enabled Industrial Environments by Jayameena Desikan, Sushil Kumar Singh, A. Jayanthiladevi, Saurabh Singh, Byungun Yoon

    Published 2025-01-01
    “…By preprocessing sensor data and by combining machine learning algorithms (MobileNet, EfficientNet, Random Forest, SVM, and Decision Trees) where each ML processes different sensor data types, this supports providing more accurate data to DST. …”
    Get full text
    Article
  13. 13933
  14. 13934
  15. 13935

    Enhancing cross-subject emotion recognition precision through unimodal EEG: a novel emotion preceptor model by Yihang Dong, Changhong Jing, Mufti Mahmud, Michael Kwok-Po Ng, Shuqiang Wang

    Published 2024-12-01
    “…Abstract Affective computing is a key research area in computer science, neuroscience, and psychology, aimed at enabling computers to recognize, understand, and respond to human emotional states. …”
    Get full text
    Article
  16. 13936
  17. 13937
  18. 13938

    Cross-Domain Recommendation With Personalized Rating Pattern Compatibility as Transfer Rate Between Domains by Natthapol Maneechote, Saranya Maneeroj, Atsuhiro Takasu

    Published 2025-01-01
    “…Specifically, relative density is computed by considering the ratio of the number of items in each domain to the number of interactions the target user has within that domain. …”
    Get full text
    Article
  19. 13939

    Life cycle support software components by S. A. Kudzh, V. Ya. Tsvetkov, I. E. Rogov

    Published 2020-10-01
    “…The external factor arises from external influences in the form of interference or purposeful actions, such as computer viruses. The problem of creating the structure of software components of computing systems and information systems that ensure the duration of the life cycle in the presence of external influences is topical. …”
    Get full text
    Article
  20. 13940

    Isolation of corporate local area networks using server virtualization by A. K. Blagorazumov, I. G. Kirpichev, D. V. Petrov

    Published 2019-12-01
    “…Secure enterprises have Local Area Networks (LANs) that store and process sensitive data that should not be accessed from outside. …”
    Get full text
    Article