Showing 1 - 20 results of 88 for search '"Real-time computing"', query time: 0.11s Refine Results
  1. 1
  2. 2

    Euclidean and complex geometries from real-time computations of gravitational Rényi entropies by Jesse Held, Xiaoyi Liu, Donald Marolf, Zhencheng Wang

    Published 2025-02-01
    “…After brief explanations of these general points, we use JT gravity to illustrate the associated real-time computations in detail.…”
    Get full text
    Article
  3. 3

    Closed-Loop Control of Extrusion-Based Bioprinting Through Real-Time Computer Vision by Javier Arduengo, Nicolas Hascoët, Francisco Chinesta, Jean-Yves Hascoet

    Published 2025-06-01
    “…This work introduces a closed-loop control system for Extrusion-Based Bioprinting (EBB), utilizing real-time computer vision. The system employs a camera that is placed to monitor the line width immediately after extrusion, enabling real-time feedback to adjust the feedrate of the extrusion mechanism. …”
    Get full text
    Article
  4. 4
  5. 5

    Real-time computed tomography fluoroscopy-guided solitary lung tumor model in a rabbit. by Byeong Hyeon Choi, Hwan Seok Young, Yu Hua Quan, Ji Yun Rho, Jae Seon Eo, Kook Nam Han, Young Ho Choi, Hyun Koo Kim

    Published 2017-01-01
    “…We assessed the feasibility and safety of a novel rabbit lung cancer model of solitary tumors, in which real-time computed tomography fluoroscopy is used to guide inoculation of VX2 carcinoma single-cell suspensions. …”
    Get full text
    Article
  6. 6
  7. 7
  8. 8
  9. 9
  10. 10
  11. 11

    Research on deterministic computing power network by Qingmin JIA, Yujiao HU, Huayu ZHANG, Kailai PENG, Pingping CHEN, Renchao XIE, Tao HUANG

    Published 2022-10-01
    “…In order to meet the development requirements of time-sensitive and computing-intensive businesses, the guarantee problem of real-time transmission and real-time computing of computing tasks was studied.Firstly, the research progress of computing power network and deterministic networking was briefly overviewed.Then, the technical scheme of deterministic computing power network was proposed, and the technical architecture and working mechanism were designed.Real-time transmission and real-time computing of computing tasks were realized through the technical capabilities such as computing-network perception, planning and scheduling, resource management and control.The simulation results also verified the effectiveness of the proposed technical scheme.Finally, the representative application scenarios of deterministic computing power network were analyzed, and the future development trends and technical challenges were discussed.…”
    Get full text
    Article
  12. 12

    Research on cross-domain cooperation deployment of V2X infrastructure by Yuming GE, Qiqi MAO

    Published 2023-03-01
    “…Infrastructure is the foundation of the integration and innovative development of the vehicle to everything (V2X) industry.With the capabilities of reliable communication, accurate perception, and real-time computing, it supports the improvement of intelligent-connected vehicles, intelligent transportation and information and communication.On the basis of studying the scope and current situation of the new type V2X infrastructure, the challenges in cross-domain cooperation of it’s construction and service capability were analyzed.The framework of “physical separation and logic coordination” infrastructure architecture was proposed.Finally, the cross-domain cooperation of the new type V2X infrastructure at home and abroad was discussed, with corresponding development suggestions.…”
    Get full text
    Article
  13. 13

    Cost optimization model for multi-cloud network based on Kubernetes by Ming GAO, Ming LIU, Yangting CHEN, Weiming WANG

    Published 2023-02-01
    “…The cloud-native scheduling system, represented by Kubernetes, is widely used by cloud tenants in a multi-cloud environment.The problem of network observation becomes more and more serious, especially the cost of network traffic across cloud and region.In Kubernetes, the eBPF technology was introduced to collect the network data features of kernel state of operating system to solve the network observation problem, and then the network data features were modeled as QAP, a combination of heuristic and stochastic optimization was used to obtain the best near optimal solution in a real-time computing scenario.This model is superior to the Kubernetes native scheduler in the cost optimization of network resources, which is based on the scheduling strategy of computing resources only, and increases the complexity of scheduling links in a controllable range, effectively reduces the cost of network resources in a multi-cloud area deployment environment.…”
    Get full text
    Article
  14. 14

    Survey on data security and privacy-preserving for the research of edge computing by Jiale ZHANG, Yanchao ZHAO, Bing CHEN, Feng HU, Kun ZHU

    Published 2018-03-01
    “…With the rapid development and extensive application of the Internet of things (IoT),big data and 5G network architecture,the massive data generated by the edge equipment of the network and the real-time service requirements are far beyond the capacity if the traditional cloud computing.To solve such dilemma,the edge computing which deploys the cloud services in the edge network has envisioned to be the dominant cloud service paradigm in the era of IoT.Meanwhile,the unique features of edge computing,such as content perception,real-time computing,parallel processing and etc.,has also introduced new security problems especially the data security and privacy issues.Firstly,the background and challenges of data security and privacy-preserving in edge computing were described,and then the research architecture of data security and privacy-preserving was presented.Secondly,the key technologies of data security,access control,identity authentication and privacy-preserving were summarized.Thirdly,the recent research advancements on the data security and privacy issues that may be applied to edge computing were described in detail.Finally,some potential research points of edge computing data security and privacy-preserving were given,and the direction of future research work was pointed out.…”
    Get full text
    Article
  15. 15

    Real Time System Scheduling Approach:Survey by Dhuha Abdullah, Israa Abood, Raya hamdi

    Published 2023-06-01
    “…In this paper, we aim to investigate the scheduling attributes and scope of research in real-time computing, and classify real-time system in two categories: algorithms for multiprocessor scheduling and algorithms for uniprocessor scheduling. …”
    Get full text
    Article
  16. 16

    X-Ray Layered Refocusing Imaging Based on Linear Scanning by Bin Liu, Yue Luo, Ke Li, Xia Zhao

    Published 2020-01-01
    “…X-CT(Computed-Tomography) and X-CL(Computed-Laminography) are usually used to obtain structural information of objects at different depths, but they are limited by accurate multi-dimensional motion control systems, complex scanning methods and poor real-time computing performance.To solve the problems, this paper proposed a method of X-ray layered imaging based on linear scanning. …”
    Get full text
    Article
  17. 17
  18. 18

    Neural network inspired efficient scalable task scheduling for cloud infrastructure by Punit Gupta, Arnaav Anand, Pratyush Agarwal, Gavin McArdle

    Published 2024-01-01
    “…Smart cloud services derive real time computing and allows it to make smart decision. …”
    Get full text
    Article
  19. 19

    Dynamic Sensor-Based Data Management Optimization Strategy of Edge Artificial Intelligence Model for Intelligent Transportation System by Nu Wen, Ying Zhou, Yang Wang, Ye Zheng, Yong Fan, Yang Liu, Yankun Wang, Minmin Li

    Published 2025-03-01
    “…By doing so, it meets the real-time computing requirements of intelligent transportation business applications. …”
    Get full text
    Article
  20. 20

    UAV Mission Computer Operation Mode Optimization Focusing on Computational Energy Efficiency and System Responsiveness by Oleksandr Liubimov, Ihor Turkin, Valeriy Cheranovskiy, Lina Volobuieva

    Published 2024-11-01
    “…The results show that the ‘Boryviter 0.1’ computing platform can be used as a UAV mission computer for typical flight control tasks requiring real-time computing under the influence of external factors. …”
    Get full text
    Article