Search alternatives:
processor » processes (Expand Search)
Showing 12,641 - 12,660 results of 30,198 for search '(processor OR process) (computing)', query time: 0.26s Refine Results
  1. 12641
  2. 12642
  3. 12643
  4. 12644
  5. 12645
  6. 12646

    Hardware/software co-verification of USB3.0 IP core under PowerPC architecture by Deng Jiawei, Zhang Meijuan, Wang Qi, Yang Chuwei, Ying Lingkai

    Published 2022-05-01
    “…By comparing USB3.0 and USB2.0, USB3.0 has higher transmission rate.By cooperating with the high preformance PowerPC processor, the transfer capability of the USB controller is improved significantly, and ther PowerPC computing resources are fully utilized.This paper describes a programme of USB3.0 IP core based on the PowerPC architecture. …”
    Get full text
    Article
  7. 12647
  8. 12648
  9. 12649
  10. 12650

    Embedded GPU 3D Panoramic Viewing System Based on Virtual Camera Roaming 3D Environment by Hao Meng, Fei Yuan, Yili Xu, Tianhao Yan

    Published 2019-01-01
    “…The core computing module is based on NXP’s i.MX6Q application processor and builds an embedded Linux system. …”
    Get full text
    Article
  11. 12651

    Dynamic Adaptation for Independent Task Scheduling Using Dynamic Programming in Multiprocessor Systems by Lotfi BENDIAF, Ahmed HARBOUCHE, Mohammed Amin TAHRAOUI

    Published 2025-03-01
    “… Performance in IT systems is critical to ensuring that systems meet user needs and expectations. In heterogeneous computing systems (HCS), which consist of processors with varying capabilities, dynamic adaptation plays a vital role in maintaining high performance. …”
    Get full text
    Article
  12. 12652

    Improving Performance of Automatic Keyword Extraction (AKE) Methods Using PoS Tagging and Enhanced Semantic-Awareness by Enes Altuncu, Jason R. C. Nurse, Yang Xu, Jie Guo, Shujun Li

    Published 2025-07-01
    “…Automatic keyword extraction (AKE) has gained more importance with the increasing amount of digital textual data that modern computing systems process. It has various applications in information retrieval (IR) and natural language processing (NLP), including text summarisation, topic analysis and document indexing. …”
    Get full text
    Article
  13. 12653
  14. 12654

    Survey on the development of mimic defense in cyberspace:from mimic concept to “mimic+” ecology by Hailong MA, Liang WANG, Tao HU, Yiming JIANG, Yanze QU

    Published 2022-04-01
    “…Build upon the dynamic-heterogeneous-redundant architecture for multi-body execution, multi-mode ruling and multi-dimension reconstruction, cyberspace mimic defense (CMD) uses uncertain system to deal with the uncertain threat to cyberspace ubiquity.The evolution of CMD over the past 8 years were reviewed systematically from the vertical, horizontal, current, developing and future perspectives.From the vertical perspective, the development process of CMD from concept to theory and practice was summarized.From the horizontal view, it elaborated the core structure DHR (dynamical heterogeneous redundancy) of CMD, the principles based on CMD’s three major theorems, safety gains and performance costs.A comparison was conducted between CMD and five other active defense technologies, namely intrusion tolerance, moving target defense, zero trust architecture, trusted computing and computer immunology.From the current perspective, it reviewed the implementation elements, performance, system architecture, heterogeneous strategies, scheduling strategies, voting strategies and other common technology patterns and characteristics of 11 types of main existing mimic products including mimicry router, mimicry processor, mimicry DNS server and mimicry cloud platform.From the developing perspective, it explored the “mimic+” AICDS (Mimic + AI/IoT/Cloud/Data/SDN) symbiotic ecology with respect to 5 types of new technologies, namely artificial intelligence, Internet of things, cloud computing, big data and software-defined network, and proposed the corresponding technology junctions and cross research value.From the future perspective, it looked into the future mimicry baseline 2.0 product ecology, “mimic +5G/6G”, “mimic + edge computing”,“mimic + cloud” and “mimic + blockchain” application scenarios.Besides, 4 types of challenges faced by CMD in the future were analyzed and summarized, including escape space of multi-mode decision attack, mutual restriction of heterogeneous and synchronous, difficult balance between security and function, and limited transformation space of existing endogenous security components.…”
    Get full text
    Article
  15. 12655
  16. 12656

    Unleashing the hidden powers of low-cost IoT boards: GPU-based edutainment case study by Marwa K. Elteir, Shaimaa Lazem, Mohamed Azab

    Published 2022-03-01
    “…Unfortunately, even with the limited energy consumption and high processing power of such GPUs, CPUs are usually the only computational element utilized by the hosted applications, thus hindering the capabilities of the entire board. …”
    Get full text
    Article
  17. 12657
  18. 12658
  19. 12659

    Efficient multi-UAV path planning in dynamic and complex environments using hybrid polar lights optimization by Ziyin Xu, Zhilin Wang, Rui Liu, Chenliang Huang, Yuxiang Shi, Mingjing Wang, Huiling Chen

    Published 2025-07-01
    “…Furthermore, parallel processing significantly boosts computational efficiency, especially in high-dimensional and complex scenarios. …”
    Get full text
    Article
  20. 12660

    An Inclusive review on deep learning techniques and their scope in handwriting recognition by Sukhdeep Singh, Sudhir Rohilla, Anuj Sharma

    Published 2025-05-01
    “…Nevertheless, the present handwriting recognition survey foresees deep learning enabling changes at both bench and bedside with the potential to transform several domains as image processing, speech recognition, computer vision, machine translation, robotics and control, medical imaging, medical information processing, bio-informatics, natural language processing, cyber security, and many others. …”
    Get full text
    Article