Search alternatives:
processor » processes (Expand Search)
Showing 2,161 - 2,180 results of 30,198 for search '(processor OR process) (computing)', query time: 0.26s Refine Results
  1. 2161
  2. 2162

    Research on cloud computing users’ public safety trust model based on scorecard-random forest by Shengli ZHOU, Canghong JIN, Lifa WU, Zheng HONG

    Published 2018-05-01
    “…Traditional cloud computing trust models mainly focused on the calculation of the trust of users’ behavior.In the process of classification and evaluation,there were some problems such as ignorance of content security and lack of trust division verification.Aiming to solve these problems,cloud computing users’ public safety trust model based on scorecard-random forest was proposed.Firstly,the text was processed using Word2Vec in the data preprocessing stage.The convolution neural network (CNN) was used to extract the sentence features for user content tag classification.Then,scorecard method was used to filter the strong correlation index.Meanwhile,in order to establish the users’ public safety trust evaluation model in cloud computing,a random forest method was applied.Experimental results show that the proposed users’ public safety trust evaluation model outperforms the general trust evaluation model.The proposed model can effectively distinguish malicious users from normal users,and it can improve the efficiency of the cloud computing users management.…”
    Get full text
    Article
  3. 2163

    Research on deep reinforcement learning in Internet of vehicles edge computing based on Quasi-Newton method by ZHANG Jianwu, LU Zetao, ZHANG Qianhua, ZHAN Ming

    Published 2024-05-01
    “…The algorithm was designed by initially incorporating batch normalization techniques to optimize the training process of deep neural networks. Subsequently, optimization was performed using the Quasi-Newton method to effectively approximate the optimal solution. …”
    Get full text
    Article
  4. 2164

    Multi objective reinforcement learning driven task offloading algorithm for satellite edge computing networks by Sai Xu, Jun Liu, Jiawei Tang, Xiangjun Liu, Zhi Li

    Published 2025-07-01
    “…Abstract Satellite edge computing (SEC) has become a revolutionary paradigm to improve the quality of service, reduce the pressure on satellite-terrestrial backhaul bandwidth and reduce the average response delay of task requests. …”
    Get full text
    Article
  5. 2165

    Fuzzy clustering based scheduling algorithm for minimizing the tasks completion time in cloud computing environment by Nawaf R. Alharbe

    Published 2025-06-01
    “…Abstract This paper explores the complexity of project planning in a cloud computing environment and recognizes the challenges associated with distributed resources, heterogeneity, and dynamic changes in workloads. …”
    Get full text
    Article
  6. 2166

    Intelligent Optimization of Wireless Sensor Networks through Bio-Inspired Computing: Survey and Future Directions by Sohail Jabbar, Rabia Iram, Abid Ali Minhas, Imran Shafi, Shehzad Khalid, Muqeet Ahmad

    Published 2013-02-01
    “…Interdisciplinary research is playing a splendid contribution for various problems' solving. The process of combining the individuals' output to form a single problem solving solution is depicted in three-stage ensemble design. …”
    Get full text
    Article
  7. 2167
  8. 2168

    High-throughput alloy and process design for metal additive manufacturing by Sofia Sheikh, Brent Vela, Pejman Honarmandi, Peter Morcos, David Shoukr, Abdelrahman Mostafa Kotb, Ibrahim Karaman, Alaa Elwany, Raymundo Arróyave

    Published 2025-06-01
    “…Evaluating alloy printability requires extensive analysis of chemical composition and processing conditions. The complexity of experimental exploration drives the need for high-throughput computational frameworks. …”
    Get full text
    Article
  9. 2169
  10. 2170

    Observation of the non-Hermitian skin effect and Fermi skin on a digital quantum computer by Ruizhe Shen, Tianqi Chen, Bo Yang, Ching Hua Lee

    Published 2025-02-01
    “…Here, we report the observation of the NHSE and its many-fermion analog on a universal quantum processor. To implement NHSE accumulation on a quantum computer, the time-evolution circuit not only needs to be non-reciprocal and non-unitary, but must also contain sufficiently many lattice qubits. …”
    Get full text
    Article
  11. 2171

    Dynamic QoS-aware intelligent edge computing resource management algorithm for body area networks by MU Siqi, WEN Shuo, LU Yang, AI Bo

    Published 2024-12-01
    “…Firstly, considering the Markov nature of multi-source task priorities and channel state changes in BAN, the original stochastic optimization problem was transformed into an infinite horizon Markov decision process problem. Then, a multi-source task priority sequence for each BAN was constructed and an online decision-making method that integrated proximal policy optimization (PPO) was proposed for task offloading and computing resource allocation. …”
    Get full text
    Article
  12. 2172

    A Prototyping and Evaluation of Hospital Dashboard through End-User Computing Satisfaction Model (EUCS) by Saeed Rouhani, Shooka Zamenian, Sayna Rotbie

    Published 2018-10-01
    “…In today's competitive environment, one of the new tools in the field ofinformation technology is business or organizational dashboards that are as abackup in the process of strategic management of organizations. …”
    Get full text
    Article
  13. 2173

    ScalEdge: A framework for scalable edge computing in Internet of things–based smart systems by Mohammad Babar, Muhammad Sohail Khan

    Published 2021-07-01
    “…The Internet of things (IoT) devices are resource-constrained, unable to process compute-intensive tasks. The convergence of edge computing and IoT with computation offloading offers a feasible solution in terms of performance. …”
    Get full text
    Article
  14. 2174

    An efficient and secure data auditing scheme based on fog-to-cloud computing for Internet of things scenarios by Jun-Feng Tian, Hao-Ning Wang

    Published 2020-05-01
    “…Since the fog computing center only has a part of the private key generated using the identity information, the security of the system will not be damaged due to the leakage of part of the private key held by the fog center, and the fog center significantly participates in the signature generation process, which significantly reduces the computation and communication overhead of the Internet of things device. …”
    Get full text
    Article
  15. 2175

    A data and knowledge-driven practice for ensuring stability in ultra-large intelligent computing clusters by NIU Hongweihua, HUANG Yongbao, DING Guoqiang, HUANG Bao, ZHAO Zhiwen, XU Yang, WANG Tao, ZHANG Ruiling, WANG Xuan, ZHANG Yixiang

    Published 2025-07-01
    “…A data and knowledge-driven stability assurance scheme for such clusters was proposed to address the issues of frequent hardware failures, persistently high task training failure rates, and difficulties in cross-domain problem localization within ultra-large intelligent computing clusters with over ten thousand computing cards. …”
    Get full text
    Article
  16. 2176

    Preface to Special Issue on Scientific Computing and Learning Analytics for Smart Healthcare Systems (Part II) by Chinmay Chakraborty, Sayonara Barbosa, Lalit Garg

    Published 2024-06-01
    “… This special issue introduces emerging intelligent healthcare technologies that incorporate big medical data, artificial intelligence, scientific computing, federated learning, bio-inspired computation, the Internet of Medical Things, security and privacy, semantic databases, etc. …”
    Get full text
    Article
  17. 2177

    An energy-saving virtual machine scheduling algorithm for resource management based on cloud computing technology by Liangyu Zhang

    Published 2025-04-01
    “…In this paper, the current research status of cloud computing and virtual machine scheduling in cloud computing environments is analyzed, and the concept and characteristics, classification, application scenarios, and key technologies of cloud computing are elaborated. …”
    Get full text
    Article
  18. 2178

    Service Virtualization Using a Non-von Neumann Parallel, Distributed, and Scalable Computing Model by Rao Mikkilineni, Giovanni Morana, Daniele Zito, Marco Di Sano

    Published 2012-01-01
    “…This paper describes a prototype implementing a high degree of transaction resilience in distributed software systems using a non-von Neumann computing model exploiting parallelism in computing nodes. …”
    Get full text
    Article
  19. 2179

    Real-time human-robot interaction and service provision using hybrid intelligent computing framework. by Mohammed Albekairi, Meshari D Alanazi, Turki M Alanazi, Mohamed Vall O Mohamed, Khaled Kaaniche, Anis Sahbani, Ali Elrashidi

    Published 2025-01-01
    “…This research introduces a Hybrid Intelligent Computing Model (HICM) to improve robots' ability to process inquiries autonomously. …”
    Get full text
    Article
  20. 2180

    Paint shop vehicle sequencing based on quantum computing considering color changeover and painting quality by Jing Huang, Qing Chang, Hua-Tzu Fan

    Published 2024-02-01
    “…With typically hundreds of vehicles in one shift, the paint shop sequencing problem is intractable in classical computing. In this paper, we propose to solve a general paint shop sequencing problem using state-of-the-art quantum computing algorithms. …”
    Get full text
    Article