Showing 5,201 - 5,220 results of 21,428 for search '"computing"', query time: 0.06s Refine Results
  1. 5201

    Data Analysis Method of Intelligent Analysis Platform for Big Data of Film and Television by Youwen Ma, Yi Wan

    Published 2021-01-01
    “…Based on cloud computing and statistics theory, this paper proposes a reasonable analysis method for big data of film and television. …”
    Get full text
    Article
  2. 5202
  3. 5203

    Limit Cycles and Local Bifurcation of Critical Periods in a Class of Switching Z2 Equivariant Quartic System by Jian Yang, Jukun Liu, Jingping Lu

    Published 2024-01-01
    “…First, through the computation of Lyapunov constants, the conditions of the two singularities to become the centers are determined. …”
    Get full text
    Article
  4. 5204
  5. 5205

    DHRCA: A Design of Security Architecture Based on Dynamic Heterogeneous Redundant for System on Wafer by Bo Mei, Zhengbin Zhu, Peijie Li, Bo Zhao

    Published 2024-01-01
    “…In this paper, we propose a computing architecture based on endogenous security theory—dynamic heterogeneous redundant computing architecture (DHRCA) that can tolerate and detect HTs at runtime. …”
    Get full text
    Article
  6. 5206
  7. 5207
  8. 5208

    Sumudu residual power series method to solve time-fractional Fisher’s equation by Rajendra Pant, Geeta Arora, Homan Emadifar, Ahmed A. Hamoud

    Published 2025-01-01
    “…In this paper, the one-dimensional nonlinear temporal fractional-order Fisher’s equation is solved by using the Sumudu residual power series method (SRPSM), a powerful computing technique. This method combines the RPSM and Sumudu transform to provide approximations of solutions using the notion of limit, in contrast to the standard residual power series method, which necessitates computing fractional derivatives. …”
    Get full text
    Article
  9. 5209

    A hybrid singular value thresholding algorithm with diagonal-modify for low-rank matrix recovery by Ruiping Wen, Liang Zhang, Yalei Pei

    Published 2024-11-01
    “…In this paper, a new hybrid singular value thresholding with diagonal-modify algorithm based on the augmented Lagrange multiplier (ALM) method was proposed for low-rank matrix recovery, in which only part singular values were treated by a hybrid threshold operator with diagonal-update, and which allowed the algorithm to make use of simple arithmetic operation and keep the computational cost of each iteration low. The new algorithm decreased the complexity of the singular value decomposition and shortened the computing time. …”
    Get full text
    Article
  10. 5210
  11. 5211
  12. 5212
  13. 5213

    LSKE: Lightweight Secure Key Exchange Scheme in Fog Federation by Yashar Salami, Vahid Khajehvand

    Published 2021-01-01
    “…The fog computing architecture allows data exchange with the vehicle network, sensor networks, etc. …”
    Get full text
    Article
  14. 5214
  15. 5215

    Grad Ready: Enhancing graduate readiness through intelligent mobile application by Hanan ALOTAIBI, Shireen S. SAIFUDDIN

    Published 2024-12-01
    “…It is an intelligent mobile app that bridges the gap between academic knowledge and the professional skill requirements for computer science graduates using matching algorithms to enable companies to target and recruit them. …”
    Get full text
    Article
  16. 5216
  17. 5217

    Video Data Integrity Verification Method Based on Full Homomorphic Encryption in Cloud System by Ruoshui Liu, Jianghui Liu, Jingjie Zhang, Moli Zhang

    Published 2018-01-01
    “…Cloud computing is a new way of data storage, where users tend to upload video data to cloud servers without redundantly local copies. …”
    Get full text
    Article
  18. 5218
  19. 5219

    Innovative IaaS Management System for Sensor Devices and IT Resources by Hitomi Takahashi, Takayuki Kushida

    Published 2014-06-01
    “…The evaluation results of SC show that the transmission delay for sensor data between the sensor devices and the users in SC was decreased by up to 81% compared to a typical cloud computing implementation.…”
    Get full text
    Article
  20. 5220