Showing 861 - 880 results of 21,428 for search '"computing"', query time: 0.08s Refine Results
  1. 861
  2. 862
  3. 863
  4. 864

    Harnessing distributed GPU computing for generalizable graph convolutional networks in power grid reliability assessments by Somayajulu L.N. Dhulipala, Nicholas Casaprima, Audrey Olivier, Bjorn C. Vaagensmith, Timothy R. McJunkin, Ryan C. Hruska

    Published 2025-01-01
    “…For pre-training the GCN ARMA model across a variety of topologies, distributed graphics processing unit (GPU) computing afforded us significant training scalability. …”
    Get full text
    Article
  5. 865

    Intelligent Soft Computing on Forex: Exchange Rates Forecasting with Hybrid Radial Basis Neural Network by Lukas Falat, Dusan Marcek, Maria Durisova

    Published 2016-01-01
    “…This paper deals with application of quantitative soft computing prediction models into financial area as reliable and accurate prediction models can be very helpful in management decision-making process. …”
    Get full text
    Article
  6. 866
  7. 867
  8. 868

    A Computing Method for Sand Inrush Quantity through a Borehole in Longde Coal Mine by Boyang Zhang, Zhibin Lin

    Published 2018-01-01
    “…Based on the method of fluid mechanics, an all-purpose computing method for quicksand disaster through a borehole was proposed. …”
    Get full text
    Article
  9. 869
  10. 870
  11. 871
  12. 872

    Precision Analysis of Noncircular Gears Based on CNC Machining Technology under Cloud Computing Platform by JianQing Dai, Wei Xu, FenFen OuYang

    Published 2022-01-01
    “…The results show that the technical support of the cloud computing platform can effectively improve the accuracy of noncircular gears.…”
    Get full text
    Article
  13. 873
  14. 874

    A Blockchain-Based Edge Computing Group Signature Authentication Model for Underwater Clustered Networks by Yanxia Chen, Zhe Li, Rongxin Zhu

    Published 2024-12-01
    “…Furthermore, this study enhances existing clustering algorithms to prolong the operational lifespan of the network and introduces a group signature and authentication mechanism tailored to the unique conditions of underwater blockchain edge computing. This mechanism includes a robust two-round block verification scheme designed to secure the blockchain against potential consensus algorithm attacks. …”
    Get full text
    Article
  15. 875
  16. 876
  17. 877
  18. 878
  19. 879

    Privacy-Preserving Efficient Data Retrieval in IoMT Based on Low-Cost Fog Computing by Na Wang, Yuanyuan Cai, Junsong Fu, Jie Xu

    Published 2021-01-01
    “…However, IoMT faces many problems including privacy disclosure, long delay of service orders, low retrieval efficiency of medical data, and high energy cost of fog computing. For these, this paper proposes a data privacy protection and efficient retrieval scheme for IoMT based on low-cost fog computing. …”
    Get full text
    Article
  20. 880