Search alternatives:
processor » processes (Expand Search)
Showing 13,301 - 13,320 results of 30,198 for search '(processor OR process) (computing)', query time: 0.31s Refine Results
  1. 13301

    Retrieval algorithm based on locally sensitive hash for ocean observation data by Meijuan Jia, Xiaodong Mao, Shuai Guo, Xin Li

    Published 2025-06-01
    “…The fast retrieval algorithm based on locally sensitive hashing can enable us to quickly complete the retrieval process in duplicate data deletion technology and achieve the goal of saving computing resources. …”
    Get full text
    Article
  2. 13302

    Comparison of Kalman Filter and H-Infinity Filter for Battery State of Charge Estimation with a Detailed Validation Method by Waleri Milde, Laurin Kerle

    Published 2025-04-01
    “…The main contributions of this work are: (1) Implementation of multiple filter variants using a consistent equivalent circuit battery model; (2) Development of a standardized validation method for objective performance evaluation; (3) Detailed mathematical formulations enhancing reproducibility; (4) Evaluation of computational efficiency on a digital signal processor (DSP) to provide practical insights for real-time applications. …”
    Get full text
    Article
  3. 13303

    High-integrated photonic tensor core utilizing high-dimensional lightwave and microwave multidomain multiplexing by Xiangyan Meng, Nuannuan Shi, Guojie Zhang, Junshen Li, Ye Jin, Shiyou Sun, Yichen Shen, Wei Li, Ninghua Zhu, Ming Li

    Published 2025-01-01
    “…Herein, an ultrahigh computing density optical tensor processing unit (OTPU), which is grounded in an individual microring resonator (MRR), is introduced to respond to these challenges. …”
    Get full text
    Article
  4. 13304

    2D materials-based 3D integration for neuromorphic hardware by Seung Ju Kim, Hyeon-Ji Lee, Chul-Ho Lee, Ho Won Jang

    Published 2024-11-01
    “…Abstract Neuromorphic hardware enables energy-efficient computing, which is essential for a sustainable system. …”
    Get full text
    Article
  5. 13305

    CONSIDERATIONS ON REAL TIME DATA WAREHOUSING (RTDW) by Marius Bogdan DINU

    Published 2014-05-01
    “…The RTDW concept originated in the early 2000s. By that time, computing power had increased to a level that was allowing extraction of data collections for reporting purposes. …”
    Get full text
    Article
  6. 13306

    Design of a Machine Learning-Based Platform for Currency Market Prediction: A Fundamental Design Model by Kevin Gordillo-Orjuela, Paulo Alonso Gaona-García, Carlos Enrique Montenegro-Marín

    Published 2025-01-01
    “…However, the development of these models and their deployment within computer platforms is a complex task, given the variety of approaches that each researcher uses based on the training process and therefore by definition of the model, which leads to the consumption of high computing resources for its training, as well as various processes for its deployment. …”
    Get full text
    Article
  7. 13307

    A New Unconditionally Stable Method for Telegraph Equation Based on Associated Hermite Orthogonal Functions by Di Zhang, Fusheng Peng, Xiaoping Miao

    Published 2016-01-01
    “…And the coefficients of results for all orders can then be obtained by the expanded equations and the numerical results can be reconstructed during the computing process. The precision and stability of the proposed method are proved by some examples, which show the numerical solution acquired is acceptable when compared with some existing methods.…”
    Get full text
    Article
  8. 13308

    NMM 2020 Nano & Macro Mechanics by Editorial, Foreword

    Published 2021-04-01
    “… • Analyses of construction. • Computational methods for analyses of constructions. …”
    Get full text
    Article
  9. 13309

    A Wavelet-Based Multiresolution Reconstruction Method for Fluorescent Molecular Tomography by Wei Zou, Jiajun Wang, Kongpei Wu, David Dagan Feng

    Published 2009-01-01
    “…Simulation results demonstrate that the proposed approach can significantly speed up the reconstruction process and improve the image quality of FMT.…”
    Get full text
    Article
  10. 13310

    Analysis of User Personalized Retrieval of Multimedia Digital Archives Dependent on BP Neural Network Algorithm by Zhongke Wang

    Published 2021-01-01
    “…This paper briefly introduces the characteristics of content-based multimedia retrieval under the information background, analyzes the implementation process of these technologies in the multimedia archives retrieval system including video and image information of digital archives, and points out that the content-based multimedia retrieval technology is bound to be organically combined with the traditional text retrieval methods. …”
    Get full text
    Article
  11. 13311
  12. 13312

    Research on edge offloading delay optimization of cellular networks based on optimal transport theory by Xiangyu LYU, Yong XIAO, Yi ZHONG, Qiang LI, Xiaohu GE

    Published 2023-12-01
    “…With the development of the internet of things, a large number of user device (UD) were connected to cellular network.Since the changes in the spatial distribution of UD and application requirements, it is necessary to dynamically adjust the UD’ offloading decision.Comprehensively considering various parameter information in the networks such as the spatial distribution of UD, application requirements, and the processing capability of the edge servers on the base station (BS) side, the offloading decision of UD were optimized from the perspective of distribution.Based on the optimal transport theory, a delay optimization algorithm was proposed to reduce the average delay of the UD’ computing tasks offloading process by reasonably planning the offloading BS of the UD in the networks.The simulation results show that the average delay can be reduced by 81.06% using the proposed offloading mechanism based on delay optimization, and the traffic handled by each BS is balanced.…”
    Get full text
    Article
  13. 13313

    Stepped annealing chaotic neural network model for the channel assignment problem by ZHU Xiao-jin, CHEN Yan-chun, SHAO Yong, WANG Jian

    Published 2008-01-01
    “…Simulation results show that compared with other transient chaotic neural networks,the new stepped annealing method decreases the computing time and enhances the searching ability,and has a better performance in the larger scale of network.…”
    Get full text
    Article
  14. 13314

    New approach in form cutter profiling by S. V. Shvets

    Published 2016-12-01
    “…The cutter type has no influence on the calculation algorithm. 3-D modeling is the easiest way to do graphic profiling. Profiling process is based on determining the initial tool surface and characteristics. …”
    Get full text
    Article
  15. 13315

    The Effects of Control Domain Position on Optimal Control of Cardiac Arrhythmia by Kin Wei Ng, Ahmad Rohanin

    Published 2012-01-01
    “…Also, experiment results show that the position of the control domain for Test Case 1 is preferable than that of Test Case 2 during the defibrillation process.…”
    Get full text
    Article
  16. 13316

    Transverse momentum distributions at large-x by Oscar del Rio, Alexei Prokudin, Ignazio Scimemi, Alexey Vladimirov

    Published 2025-06-01
    “…Abstract We investigate the collinear matching of transverse momentum dependent (TMD) distributions at large values of x, computing and resumming the leading large-x asymptotics for matching coefficients. …”
    Get full text
    Article
  17. 13317

    BCP-based joint delegation learning model and protocol by Sheng GAO, Kang XIANG, Youliang TIAN, Weijie TAN, Tao FENG, Xiaoxue WU

    Published 2021-05-01
    “…In order to realize data security sharing and reduce the computing costs of clients in data mining process, a joint delegation learning model and protocol based on BCP homomorphic encryption algorithm was proposed.Firstly, a privacy preserving method based on false records was proposed for the security of decision tree model.Secondly, in view of the vertical and horizontal distribution of data, the corresponding delegation learning protocols based on privacy preserving delegation dot product algorithm and privacy preserving delegation entropy algorithm was proposed.Finally, the security proof and the performance analysis of delegation learning protocols and decision tree model structure were given.The results show that the privacy protection method based on false records does not affect the final model construction, and the final model obtained by each client is the same as that constructed by real data.…”
    Get full text
    Article
  18. 13318
  19. 13319

    A Focus on Selection for Fixation by John Tsotsos, Iuliia Kotseruba, Calden Wloka

    Published 2016-05-01
    “…This design is also constrained by the architectural characteristics of the visual processing pathways. These elements combine into a new strategy for computing fixation targets and a first simulation of its performance is presented. …”
    Get full text
    Article
  20. 13320

    ODC: a method for online detecting & classifying network-wide traffic anomalies by QIAN Ye-kui1, CHEN Ming1, HAO Qiang2, LIU Feng-rong2, SHANG Wen-zhong2

    Published 2011-01-01
    “…A method for online detecting & classifying traffic anomalies(ODC for short) from a network-wide angle of view was put forward.This method constructed traffic matrix with a metric of traffic feature entropy incrementally,de-tected traffic anomalies online using incremental principal component analysis,and then classified traffic anomalies online using incremental k-means,from which network operators could benefit for taking corresponding countermeasures.Theoretical analysis and experiment analysis show that the method has lower storage and less computing time complexity,which could satisfy the requirements of real-time process.Analysis based on both measurement data from Abilene and simulation experiments demonstrate that the method has very good detection and classification performance.…”
    Get full text
    Article