Search alternatives:
processor » processes (Expand Search)
Showing 13,381 - 13,400 results of 30,198 for search '(processor OR process) (computing)', query time: 0.26s Refine Results
  1. 13381

    Formal Verification of Business Constraints in Workflow-Based Applications by Florin Stoica, Laura Florentina Stoica

    Published 2024-12-01
    “…Workflows coordinate a series of computing tasks to create a sophisticated workflow logic. …”
    Get full text
    Article
  2. 13382

    Application of the methodology of readiness levels for the lean development of digital twins of complex engineering systems by A. V. Sartori, V. A. Pershukov, N. A. Mosunova, N. M. Mantsevich

    Published 2020-03-01
    “…Due to the complexity of full-scale object modeling and the need to use advanced computing technologies, the digital twin development process may require significant time, financial and human resources. …”
    Get full text
    Article
  3. 13383

    Use of hybrid quantum-classical algorithms for enhancing biomarker classification. by Aninda Astuti, Pin-Keng Shih, Shan-Chih Lee, Venugopala Reddy Mekala, Ezra B Wijaya, Ka-Lok Ng

    Published 2025-01-01
    “…Quantum machine learning (QML) combines quantum computing with machine learning, offering potential for solving intricate problems. …”
    Get full text
    Article
  4. 13384

    Research on enterprise digital transformation: A case study of Alibaba by Zhang Ao

    Published 2024-01-01
    “…According to the research results of this paper, it is suggested that in the future digital transformation process, enterprises should strengthen investment in digital infrastructure and talent training, which is the most fundamental step of digital transformation.…”
    Get full text
    Article
  5. 13385

    Multi-version consolidation method for block-level backup data by WANG Shu-peng 1, WU Guang-jun1, WU Zhi-gang3, YUN Xiao-chun1

    Published 2011-01-01
    “…Historical version backup data query efficiency was dependent on the version chain length in a multi-version backup data storage system.A novel block-level backup data multi-version consolidation method was presented for this problem.Any version of a historical full system snapshot could be generated within the incremental backup data version sequence.Theoretical analysis showed that it could increase the target snapshot version query efficiency significantly in the version chain.A variable-length block version merging algorithm was presented to decrease the computing complex-ity in the process of snapshot version merging,according to the block-level backup data distribution features.Finally,the concrete applications and performance analysis for block-level version consolidation method was also introduced.The simulated experiments results expose that the version consolidation method can eliminate redundant version of backup data with the same version chain length,and it can increase full system recovery efficiency than traditional methods sig-nificantly.…”
    Get full text
    Article
  6. 13386

    Model Building and Simulation of the Electric Brake Energy of Urban Rail Vehicle by 师蔚, 方宇

    Published 2011-01-01
    “…By analyzing conditions that urban rail vehicles in the traction power supply network occur the regenerative braking or resistor braking in electric braking process, and depending on the grouping of vehicles, lines, load, run strategy, operation plans, traction power supply and other basic conditions, based on single vehicle computing model and multi-vehicles power supply network model, electric braking energy distribution model were established and simulation were carried out. …”
    Get full text
    Article
  7. 13387

    TraIL: Pinpoint Trajectory for Indoor Localization by Shengnan Li, Zheng Qin, Chenshu Wu, Zheng Yang

    Published 2015-11-01
    “…Indoor localization on smartphones is an enabler for a number of ubiquitous and mobile computing applications attracting worldwide attentions. …”
    Get full text
    Article
  8. 13388

    Torsion point attacks on ‘SIDH‐like’ cryptosystems by Péter Kutas, Christophe Petit

    Published 2023-03-01
    “…The best‐known protocol following that approach is the supersingular isogeny Diffie–Hellman protocol (SIDH); this protocol was turned into the CCA‐secure key encapsulation mechanism SIKE, which was submitted to and remains in the third round of NIST's post‐quantum standardisation process as an ‘alternate’ candidate. Isogeny‐based cryptography generally relies on the conjectured hardness of computing an isogeny between two isogenous elliptic curves, and most cryptanalytic work referenced on SIKE's webpage exclusively focusses on that problem. …”
    Get full text
    Article
  9. 13389

    Flipping the Classroom for higher Education Learners to Improve Productive and Receptive Skills by Cristina

    Published 2020-01-01
    “…Overall, the results of the study have shown the positive impact of this method on the teaching/learning process in the EFL classes for Tourism students, contributing to their motivation and development of their professional skills.…”
    Get full text
    Article
  10. 13390

    Scalable 5G NR Rate-Matcher and Rate-Dematcher for Efficient Use in FPGA Accelerators by Nemanja Filipovic, Dragomir El Mezeni, Vladimir L. Petrovic

    Published 2025-01-01
    “…However, implementing upper physical layer (PHY) processing on off-the-shelf hardware alone might cause inefficient usage of the server processors. …”
    Get full text
    Article
  11. 13391
  12. 13392
  13. 13393
  14. 13394

    A Lightweight YOLOv8s Algorithm for Ceiling Fan Blade Defect Detection With Optimized Pruning and Knowledge Distillation by Qinyuan Huang, Chen Fan, Yuqi Sun, Jiaxiong Huang, Wengziyang Jiang

    Published 2025-01-01
    “…Detecting these surface defects is crucial; however, accurate and rapid detection typically involves complex machine vision algorithms, such as You Only Look Once (YOLO) networks, that require considerable computing resources, which contradicts the industry’s preference for simpler algorithms that can be deployed using low-cost computing power. …”
    Get full text
    Article
  15. 13395

    Harnessing optimization with deep learning approach on intelligent transportation system for anomaly detection in pedestrian walkways by Sultan Refa Alotaibi, Fatma S. Alrayes, Mashael Maashi, Mohammed Maray, Mohammed A. Alliheedi, Donia Badawood, Moneerah Alotaibi

    Published 2025-05-01
    “…The presented HODLAITS-ADPW method utilizes the CV and DL process to detect pedestrians accurately. To attain this, the HODLAITS-ADPW method performs image pre-processing using Median Filtering to enrich the quality of input frames. …”
    Get full text
    Article
  16. 13396

    Reconfigurable optical synaptic weighting engine using a liquid crystal-based multimode interference coupler by Rajib Ratan Ghosh, Danqing Liu, Sander Reniers, Yuqing Jiao, Weiming Yao

    Published 2025-07-01
    “…Artificial neural networks (ANNs) have become ubiquitous in high-performance information processing. However, conventional electronic hardware, based on the sequential Von Neumann architecture, struggles to efficiently support ANN computations due to their inherently massive parallelism. …”
    Get full text
    Article
  17. 13397
  18. 13398

    Advanced KNN-based cost-efficient algorithm for precision localization and energy optimization in dynamic underwater sensor networks by Nadia Shamshad, Lei Wang, Kiran Saleem, Danish Sarwr, Salil Bharany, Ahmad Almogren, Jaeyoung Choi, Ateeq Ur Rehman, Ayman Altameem

    Published 2025-01-01
    “…Furthermore, the study employs the KNN-based cost-efficient method to predict nodes’ orientation in dynamic water conditions, thereby facilitating the mapping of the shortest distance between sensor nodes during the underwater context acquisition process. The effectiveness of the proposed KNN-based cost-efficient method is evaluated through real-time experiments conducted in a water tank setup and simulations using the Ns-3.37 version. …”
    Get full text
    Article
  19. 13399

    High Performance Frequent Subgraph Mining on Transaction Datasets: A Survey and Performance Comparison by Bismita S. Jena, Cynthia Khan, Rajshekhar Sunderraman

    Published 2019-09-01
    “…Later, Google’s MapReduce model with the Hadoop framework proved to be a major breakthrough in high performance large batch processing. Although MapReduce came with many benefits, its disk I/O and non-iterative style model could not help much for FSM domain since subgraph mining process is an iterative approach. …”
    Get full text
    Article
  20. 13400