Search alternatives:
processor » processes (Expand Search)
Showing 13,321 - 13,340 results of 30,198 for search '(processor OR process) (computing)', query time: 0.24s Refine Results
  1. 13321

    Strong Convergence Theorems of Modified Ishikawa Iterative Method for an Infinite Family of Strict Pseudocontractions in Banach Spaces by Phayap Katchang, Wiyada Kumam, Usa Humphries, Poom Kumam

    Published 2011-01-01
    “…We introduce a new modified Ishikawa iterative process and a new W-mapping for computing fixed points of an infinite family of strict pseudocontractions mapping in the framework of q-uniformly smooth Banach spaces. …”
    Get full text
    Article
  2. 13322

    Formal specification and security verification of usage control model based on PAT by Cong-hua ZHOU, Wei-he CHEN, Zhi-feng LIU

    Published 2016-03-01
    “…Then the reachable space of combined processes was the desired space. Finally, the security analysis method based on the reachable space and the conflict analysis of access control policies based on the equivalent checking in process algebras were proposed for UCON model. …”
    Get full text
    Article
  3. 13323

    Influence diffusion model based on affinity of dynamic social network by Yun-fang CHEN, Tao XIA, Wei ZHANG, Jin LI

    Published 2016-10-01
    “…Recently,influence maximization model is a hot issue in the field of social network influence,while the traditional independent cascade model is generally based on static network with a fixed value of activation probability.DDIC model,which was a dynamic network influence diffusion model with attenuation factor was proposed.It calculated the activation probability between nodes via affinity propagation,and according with dynamic segmentation of social network time slice,calculation of influence on proliferation of next time slice with the current time slice of activation probability performance decay.The experimental results show that the nodes in the DDIC model have more chances to active the neighbor and the average probability of activing of the DDIC model is higher.Further experiments show that influence value via computing with affinity propagation can reflect the process of the spread model more accurately.…”
    Get full text
    Article
  4. 13324

    Feynman integrals: Synergies between particle physics and gravitational waves by Mandal Manoj Kumar

    Published 2024-01-01
    “…Feynman integrals are essential for computing scattering amplitudes. Linear relations among these integrals, through Integral-By-Parts (IBP) identities, reduce them to a smaller set of independent integrals, known as master integrals (MIs). …”
    Get full text
    Article
  5. 13325

    Analysis of GPR Wave Propagation in Complex Underground Structures Using CUDA-Implemented Conformal FDTD Method by Jianwei Lei, Zibin Wang, Hongyuan Fang, Xin Ding, Xiaowang Zhang, Man Yang, Haitao Wang

    Published 2019-01-01
    “…However, the numerical accuracy and computational efficiency are not high because of the Courant-Friedrichs-Lewy (CFL) stability condition. …”
    Get full text
    Article
  6. 13326
  7. 13327
  8. 13328

    The Sandblaster Software-Defined Radio Platform for Mobile 4G Wireless Communications by V. Surducan, M. Moudgill, G. Nacer, E. Surducan, P. Balzola, J. Glossner, S. Stanley, Meng Yu, D. Iancu

    Published 2009-01-01
    “…We present a tier 2 Software Defined-Radio platform (SDR), built around the latest Sandbridge Technologies' multithreaded Digital Signal Processor (DSP) SB3500, along with the description of major design steps taken to ensure the best radio link and computational performance. …”
    Get full text
    Article
  9. 13329

    An integration of ensemble deep learning with hybrid optimization approaches for effective underwater object detection and classification model by G. Abirami, S. Nagadevi, J. D. Dorathi Jayaseeli, T. Prabhakara Rao, R S M Lakshmi Patibandla, Rajanikanth Aluvalu, K Srihari

    Published 2025-03-01
    “…Initially, the UODC-EDLHOA model involved several levels of pre-processing and noise removal to improve the clearness of the underwater images. …”
    Get full text
    Article
  10. 13330

    Continuous Arabic Sign Language Recognition Models by Nahlah Algethami, Raghad Farhud, Manal Alghamdi, Huda Almutairi, Maha Sorani, Noura Aleisa

    Published 2025-05-01
    “…The models are trained and evaluated using the created dataset of Arabic sign gestures based on recognition accuracy, processing speed, and robustness to variations in signing styles. …”
    Get full text
    Article
  11. 13331

    Constructing and analyzing algorithms of tensor operation paralleling by Anatoliy Nikolayevich Makokha, Tat'yana Yevgen'yevna Tyshlyar

    Published 2022-09-01
    “…It is assumed that the time of execution for all computing operations is same and equal to a unit of time, and data transfer between computer devices is performed instantaneously without any time consuming (it is acceptable, for example, a parallel computing systems with shared memory). …”
    Get full text
    Article
  12. 13332
  13. 13333

    Precision Target Spraying System Integrated with Remote Deep Learning Recognition Model for Cabbage Plant Centers by ZHANG Hui, HU Jun, SHI Hang, LIU Changxi, WU Miao

    Published 2024-11-01
    “…The model operated on the Jetson Xavier NX controller, which was a high-performance, low-power computing platform designed for edge computing. The system was allowed to process complex tasks in real time directly in the field. …”
    Get full text
    Article
  14. 13334
  15. 13335
  16. 13336

    BIM Based Virtual Environment for Fire Emergency Evacuation by Bin Wang, Haijiang Li, Yacine Rezgui, Alex Bradley, Hoang N. Ong

    Published 2014-01-01
    “…BIM (building information modelling) can play a significant role in this process due to its comprehensive and standardized data format and integrated process. …”
    Get full text
    Article
  17. 13337

    Base4NFDI: Fostering A Cross-Disciplinary Service Landscape For The German National Research Data Infrastructure by Sandra Zänkert, Antje Manske, Bernhard Miller, Juliane Fluck

    Published 2025-08-01
    “…Through a proposal-driven, bottom-up process, Base4NFDI supports technical and organisational solutions, such as identity and access management, computing, software, and workflows that serve the NFDI community. …”
    Get full text
    Article
  18. 13338

    Investigating the diversity and stylization of contemporary user generated visual arts in the complexity entropy plane by Seunghwan Kim, Byunghwee Lee, Wonjae Lee

    Published 2025-07-01
    “…Abstract The advent of computational and numerical methods in recent times has provided new avenues for analyzing art historiographical narratives and tracing the evolution of art styles therein. …”
    Get full text
    Article
  19. 13339

    Orbit Space Information System (Sirubit) as Learning Media at PT Orbit Ventura Indonesia by Yanti Apriyani, Robby Ilham, Melisa Winda Pertiwi, Imam Amirulloh

    Published 2025-07-01
    “…This leads to an ineffective learning process, as the instructional videos are shared separately through WhatsApp rather than integrated into a unified system. …”
    Get full text
    Article
  20. 13340

    Road-Adaptive Precise Path Tracking Based on Reinforcement Learning Method by Bingheng Han, Jinhong Sun

    Published 2025-07-01
    “…In addition, since the entire framework uses a lightweight network structure and a geometry-based method to generate the front wheel angle, the computational load is significantly reduced, and computing resources are saved. …”
    Get full text
    Article