Showing 6,601 - 6,620 results of 21,428 for search '"computing"', query time: 0.08s Refine Results
  1. 6601

    Scalable and Privacy-Preserving Inter-AS Routing Through Machine-Learning-Based Graph Pruning by Davide Andreoletti, Cristina Rottondi, Silvia Giordano, Andrea Bianco

    Published 2025-01-01
    “…These protocols are based on Multi-Party Computation (MPC) schemes, which guarantee privacy at the cost of high computational and communication complexity, thus limiting scalability. …”
    Get full text
    Article
  2. 6602
  3. 6603

    Integrated Photonic Neural Networks for Equalizing Optical Communication Signals: A Review by Luís C. B. Silva, Pablo R. N. Marciano, Maria J. Pontes, Maxwell E. Monteiro, Paulo S. B. André, Marcelo E. V. Segatto

    Published 2025-01-01
    “…From this review, it can be concluded that perceptron photonic neural networks perform slightly better in equalizing signals transmitted over greater distances than reservoir computing photonic neural networks, but with signals at lower data rates. …”
    Get full text
    Article
  4. 6604

    Machine Learning-Driven Optimization for Solution Space Reduction in the Quadratic Multiple Knapsack Problem by Diego Yanez-Oyarce, Carlos Contreras-Bolton, Fredy Troncoso-Espinosa, Carlos Rey

    Published 2025-01-01
    “…Finally, we conduct comparison experiments, demonstrating that using a ML model is highly beneficial for reducing computing times and achieving rapid convergence.…”
    Get full text
    Article
  5. 6605

    Evaluating 28-Days Performance of Rice Husk Ash Green Concrete under Compression Gleaned from Neural Networks by Sharanjit Singh, Harish Chandra Arora, Aman Kumar, Nishant Raj Kapoor, Kennedy C. Onyelowe, Krishna Kumar, Hardeep Singh Rai

    Published 2023-01-01
    “…This work will nudge civil engineering and material science researchers toward opting for sustainable computing techniques. However, the study’s limitations include the need for additional research into the material’s long-term behaviour as well as the consideration of other characteristics that may affect its strength, such as environmental conditions like temperature and humidity.…”
    Get full text
    Article
  6. 6606

    Sustainable Mobility in B5G/6G: V2X Technology Trends and Use Cases by Sandra Roger, Carmen Botella-Mascarell, David Martin-Sacristan, David Garcia-Roger, Jose F. Monserrat, Tommy Svensson

    Published 2024-01-01
    “…We start by identifying three current technology trends, namely, towards climate neutral; cloudification and edge computing; and Big Data and artificial intelligence, and then we examine their capability to enable sustainable Vehicle-to-Everything (V2X) communication systems in beyond 5G and 6G networks. …”
    Get full text
    Article
  7. 6607
  8. 6608
  9. 6609

    A study on the carbon emission reduction pathways of China’s digital economy from multiple perspectives by Xiaoyan Shi, Zhenhua Zhu, Jiaxin Wu, Zhijiang Li

    Published 2025-01-01
    “…As the share of the digital economy’s output continues to rise each year, the emergence of new industries such as e-commerce, mobile payments, and cloud computing has opened new avenues for carbon emission reduction (CER). …”
    Get full text
    Article
  10. 6610

    Geographical Peer Matching for P2P Energy Sharing by Romaric Duvignau, Vincenzo Gulisano, Marina Papatriantafilou, Ralf Klasing

    Published 2025-01-01
    “…Furthermore, we propose and study analytically and empirically a spectrum of approaches to address it and perform a cost-efficient matching of peers in a computationally efficient fashion. Our experimental study, based on real-world energy data, demonstrates that our proposed solutions are efficient both in terms of cost savings achieved by the peers and in terms of communication and computing requirements. …”
    Get full text
    Article
  11. 6611

    Tracking illegal activities using video surveillance systems: a review of the current state of research by D. O. Zhadan, M. V. Mordvyntsev, D. V. Pashniev

    Published 2024-03-01
    “…It has been found that although neural networks used to require a lot of computing power, they can now be used in IoT systems and smartphones, and this contributes to the fact that more video surveillance devices can be used to monitor the situation.…”
    Get full text
    Article
  12. 6612
  13. 6613
  14. 6614
  15. 6615

    Experimental Comparison of HfO<sub>2/X</sub>-Based ReRAM Devices Switching Properties by the MIM Capacitance by Fernando Jose da Costa, Aseel Zeinati, Renan Trevisoli, Durga Misra, Rodrigo Trevisoli Doria

    Published 2024-01-01
    “…An increase in the capacitance from 3.904 to 3.917 pF/<inline-formula> <tex-math notation="LaTeX">$\mu $ </tex-math></inline-formula>m2 was observed for the same device when it was subjected to a <inline-formula> <tex-math notation="LaTeX">$144~\mu $ </tex-math></inline-formula>s pulse width, demonstrating a conductance quantization required for the application in in-memory computing systems. Also, the dielectric constant modulates due to the migration of oxygen atoms inside the device&#x2019;s insulator.…”
    Get full text
    Article
  16. 6616

    Frozen Jacobian Multistep Iterative Method for Solving Nonlinear IVPs and BVPs by Fayyaz Ahmad, Shafiq Ur Rehman, Malik Zaka Ullah, Hani Moaiteq Aljahdali, Shahid Ahmad, Ali Saleh Alshomrani, Juan A. Carrasco, Shamshad Ahmad, Sivanandam Sivasankaran

    Published 2017-01-01
    “…Frozen Jacobian multistep iterative methods are computationally very efficient. They require only one inversion of the Jacobian in the form of LU-factorization. …”
    Get full text
    Article
  17. 6617

    Application of WiMAX technology in difficult geographical conditions: Perspectives for mountain environment by Rustamova D. F., Suleymanov N. M., Gafarov G. A., Bakhshaliyeva S. V., Marasulov M., Rizaeva Sh.

    Published 2025-01-01
    “…From a server to a pocket computer, almost any personal device that has enough computing power to process text and graphic information is equipped with one or another network interface, from a modem to WiMAX. …”
    Get full text
    Article
  18. 6618

    TS-PAID: A Two-Stage PUF-Based Lightweight Authentication Protocol for Internet of Drones by Shehzad Ashraf Chaudhry, Azeem Irshad, Bander A. Alzahrani, Ahmad Alhindi, Mohd Shariq, Ashok Kumar Das

    Published 2025-01-01
    “…Owing to energy, storage and computational resource-constraints, the complex and heavy cryptographic solutions could not be directly deployed in IoD environment. …”
    Get full text
    Article
  19. 6619
  20. 6620