Search alternatives:
processor » processes (Expand Search)
Showing 5,201 - 5,220 results of 30,198 for search '(processor OR process) (computing)', query time: 0.25s Refine Results
  1. 5201

    La écfrasis en el Libro de Alexandre, un proyecto de edición digital para el estudio de la poesía clerical castellana del siglo XIII con minimal computing by Gabriel A. Calarco

    Published 2023-08-01
    “…Secondly, I describe the process of semantic enrichment of the text, the XML-TEI encoding, and the minimal computing approach. …”
    Get full text
    Article
  2. 5202
  3. 5203

    Secure data offloading strategy for multi-UAV wireless networks based on minimum energy consumption by Gaofeng CUI, Yuanyuan XU, Shanghong ZHANG, Weidong WANG

    Published 2021-05-01
    “…To solve the problems of ground passive eavesdropping when ground users offload data to the multi-UAV(unmanned aerial vehicle) edge computing network, a secure data offloading strategy that minimized system energy consumption by jointly optimizing user matching and resource allocation was proposed.Considering the constraints of system delay, communication resources and computing resources, the probability of security interruption was used to restrict the security performance of the data offload process.By using block coordinate descent and successive convex approximation algorithm, the user transmission power, offload factor, UAV computing resource allocation and jamming power were jointly optimized.A pair-wise stable user matching algorithm was proposed to minimize the total energy consumption of UAV system.Simulation results demonstrate that the algorithm can realize the safe offloading of data, and has good performance in energy consumption and delay by comparing with the conventional strategies.…”
    Get full text
    Article
  4. 5204

    Secure data offloading strategy for multi-UAV wireless networks based on minimum energy consumption by Gaofeng CUI, Yuanyuan XU, Shanghong ZHANG, Weidong WANG

    Published 2021-05-01
    “…To solve the problems of ground passive eavesdropping when ground users offload data to the multi-UAV(unmanned aerial vehicle) edge computing network, a secure data offloading strategy that minimized system energy consumption by jointly optimizing user matching and resource allocation was proposed.Considering the constraints of system delay, communication resources and computing resources, the probability of security interruption was used to restrict the security performance of the data offload process.By using block coordinate descent and successive convex approximation algorithm, the user transmission power, offload factor, UAV computing resource allocation and jamming power were jointly optimized.A pair-wise stable user matching algorithm was proposed to minimize the total energy consumption of UAV system.Simulation results demonstrate that the algorithm can realize the safe offloading of data, and has good performance in energy consumption and delay by comparing with the conventional strategies.…”
    Get full text
    Article
  5. 5205

    Construction method of attack scenario in cloud environment based on dynamic probabilistic attack graph by Wenjuan WANG, Xuehui DU, Dibin SHAN

    Published 2021-01-01
    “…Aiming at the problem of complex multi-step attack detection, the method of attack scenario construction oriented to cloud computing environment was studied.Firstly, a dynamic probabilistic attack graph model was constructed, and a probabilistic attack graph updating algorithm was designed to make it update periodically with the passage of time and space, so as to adapt to the elastic and dynamic cloud computing environment.Secondly, an attack intention inference algorithm and a maximum probability attack path inference algorithm were designed to solve the uncertain problems such as error and fracture of attack scenarios caused by false positive or false negative, and ensure the accuracy of attack scenario.Meanwhile, the attack scenario was dynamically evolved along with the dynamic probability attack graph to ensure the completeness and freshness of the attack scenario.Experimental results show that the proposed method can adapt to the elastic and dynamic cloud environment, restore the penetration process of attacker’s and reconstruct high-level attack scenario, and so provide certain references for building supervised and accountable cloud environment.…”
    Get full text
    Article
  6. 5206

    Optimized Trust Prediction and Multi-Criteria Framework for Task and Data Collector Selection Using Deep Learning in Ubiquitous Environments by Ahmed A. A. Gad-Elrab

    Published 2025-01-01
    “…In crowdsourcing and ubiquitous computing environments, efficient task assignment and data collector selection are vital for system performance and profitability. …”
    Get full text
    Article
  7. 5207
  8. 5208

    Resource Allocation for Edge-enhanced Distributed Power Wireless Sensor Network by Gang WU, Jinhui ZHOU, Hui LI

    Published 2023-08-01
    “…Then, the total resource processing capacity of the central unit/distribution unit is determined by controlling the waiting latency in the load transfer process under the common constraints of the remaining resources of the RF remote unit, the load queuing latency, and the remaining resources of the central unit/distribution unit. …”
    Get full text
    Article
  9. 5209

    Research on variable-length control chart pattern recognition based on sliding window method and SECNN-BiLSTM by Tao Zan, Xiaolong Jia, Xiaoyu Guo, Min Wang, Xiangsheng Gao, Peng Gao

    Published 2025-02-01
    “…Abstract Control charts, as essential tools in Statistical Process Control (SPC), are frequently used to analyze whether production processes are under control. …”
    Get full text
    Article
  10. 5210

    AIoT Monitoring for Early Identification of Diseases in Grapevines: Complete Study by Mihaela Hnatiuc, Domnica Alpetri, Sorin-Robertino Sintea, Bogdan Hnatiuc, Gabriel Margarit Raicu, Mirel Paun, Ionica Dina

    Published 2025-01-01
    “…Cloud computing facilitates data processing and real-time visualization, allowing farmers to make timely, data-driven decisions for disease control. …”
    Get full text
    Article
  11. 5211

    An all integer-based spiking neural network with dynamic threshold adaptation by Chenglong Zou, Chenglong Zou, Xiaoxin Cui, Shuo Feng, Guang Chen, Yi Zhong, Zhenhui Dai, Yuan Wang

    Published 2024-12-01
    “…Due to this all integer-based quantization process, the required computational operations are significantly reduced, potentially providing a substantial energy efficiency advantage for numerous edge computing applications.…”
    Get full text
    Article
  12. 5212

    Enhancing Cloud Task Scheduling With a Robust Security Approach and Optimized Hybrid POA by S. V. Aswin Kumer, N. Prabakaran, E. Mohan, Balaji Natarajan, G. Sambasivam, Vaibhav Bhushan Tyagi

    Published 2023-01-01
    “…The allocation of computational tasks in a cloud environment is a complicated process that is affected by multiple factors, such as available network bandwidth, make span, and cost considerations. …”
    Get full text
    Article
  13. 5213
  14. 5214
  15. 5215
  16. 5216
  17. 5217

    Investigation and Empirical Analysis of Transfer Learning for Industrial IoT Networks by Preeti Yadav, Vinay Rishiwal, Mano Yadav, Aziz Alotaibi, Vinay Maurya, Udit Agarwal, Satyam Sharma

    Published 2024-01-01
    “…This paper examines the role of Transfer Learning in IIoT-N, identifying research gaps and challenges, and highlights its potential across various industrial applications, including predictive maintenance, anomaly detection, edge computing, process optimization, and cross-domain knowledge transfer. …”
    Get full text
    Article
  18. 5218

    Inline Wear Detection in High-Speed Progressive Dies Using Photometric Stereo by Moske Jonas, Kutlu Hasan, Steinmeier Adrian, Groenewold Phil, Santos Pedro, Kuijper Arjan, Weinmann Andreas, Groche Peter

    Published 2025-01-01
    “…By assigning anomalies to distinct process stages, the system enhances defect diagnosis. …”
    Get full text
    Article
  19. 5219

    Improved FFT-based alpha-stable density approximation algorithm by BAI Yun, YU Li, ZHU Guang-xi, LI Li

    Published 2007-01-01
    “…Approximation of density of α-stable process is an elementary works in modeling network flow using α-stable process.Combining the mathematical properties of characteristic function of α-stable process with the traditional approximating algorithm,an improved FFT-based algorithm was proposed.The improved algorithm has 2 noticeable features: automatically choosing the sampling space and sampling interval,importing frequency expansion.Experiments show that it can decrease calculation complexity and effectively control computation error.…”
    Get full text
    Article
  20. 5220