Search alternatives:
processor » processes (Expand Search)
Showing 13,581 - 13,600 results of 30,198 for search '(processor OR process) (computing)', query time: 0.19s Refine Results
  1. 13581

    Research of Speech Recognition Algorithm Based on Time Delay Neural Network and Its Application in Rail Transit by LIU Yue, LIN Jun, LUO Xiao, CHU Wei, LIU Ren

    Published 2022-08-01
    “…This paper analyzes the development status of speech technology in the field of automotive field, introduces the development process of this technology in detail, focuses on the demand and application of speech recognition technology in the field of rail transit.Aiming at the problem that the display interactive content of different models of rail transit is changeable and needs to be customized and developed, the research on speech recognition technology based on time-delay neural network is carried out and a speech recognition system for train display based on intelligent computing platform is developed. …”
    Get full text
    Article
  2. 13582

    Application of Cloud Simulation Techniques for Robotic Software Validation by Diogo Vieira, Miguel Oliveira, Rafael Arrais, Pedro Melo

    Published 2025-03-01
    “…Continuous Integration and Continuous Deployment are known methodologies for software development that increase the overall quality of the development process. Several robotic software repositories make use of CI/CD tools as an aid to development. …”
    Get full text
    Article
  3. 13583

    An Initial Investigation of Adjoint-Based Unstructured Grid Adaptation for Vortical Flow Simulations by Li Li

    Published 2011-01-01
    “…A computational fluid dynamics (CFDs) method utilizing unstructured grid technology has been employed to compute vortical flow around a 65° delta wing with sharp leading edge, which is specially known as the geometry of the second international vortex flow experiment (VFE-2). …”
    Get full text
    Article
  4. 13584

    Model of three-way decision based on the space of set pair information granule and its application by Chun-ying ZHANG, Li-ya WANG, Ming-xia LI, Bao-xiang LIU

    Published 2016-10-01
    “…Through the analysis of the existing theory and method of three-way decision,model of three-way decision based on the space of set pair information granule was proposed,which was to explain the intension and extension of three-way decision on the view of unity of opposites.Firstly the space structure of set pair information granule can be di-vided into positive granule,negative granule,different granule,which were similar and slightly different with three re-gions of generalized three-way decision.The three kinds of information granules in set pair information granule space were built based on certain positive degree,negative degree and different degree.Secondly,according to the given threshold,set pair information granule is divided into mutually disjointing positive region,negative region and different region.Based on these three regions,the computing method of decision loss function is put forward,and the process of decision-making algorithm is obtained use the three-way decision method of set pair information granule space to evalu-ate and make decision on risk investment,then good decision results have been achieved.…”
    Get full text
    Article
  5. 13585

    Active Disturbance Rejection Control for an automotive suspension system based on parameter tuning using a fuzzy technique. by Tuan Anh Nguyen

    Published 2025-01-01
    “…In general, system adaptation is ensured under many investigated conditions based on tuning the controller parameters by the soft computing method.…”
    Get full text
    Article
  6. 13586

    Inner–Outer Loop Intelligent Morphology Optimization and Pursuit–Evasion Control for Space Modular Robot by Wenwei Luo, Ling Meng, Fei Feng, Pengyu Guo, Bo Li

    Published 2025-05-01
    “…In addition, by implementing the algorithm on the JAX framework for parallel computing, the computational efficiency was significantly enhanced, allowing the entire optimization process within 17.3 h. …”
    Get full text
    Article
  7. 13587

    Determination of the Shortest Hamiltonian Paths in an Arbitrary Graph of Distributed Databases by E. G. Andrianova, V. K. Raev, D. I. Filgus

    Published 2019-08-01
    “…A method has been developed for finding the shortest Hamiltonian path in an arbitrary graph based on the rank approach, which provides high efficiency and a significant reduction in the error in solving the problem of organizing the process of managing multiple transactions and queries when they are implemented in network databases. …”
    Get full text
    Article
  8. 13588

    Merging Sequence Optimization Based on Reverse Auction Theory and Merging Strategy with Active Trajectory Adjustment of Heterogeneous Vehicles by ShiHui Wang, Min Zhao, DiHua Sun, Xiaoyu Liu

    Published 2022-01-01
    “…In particular, the downstream vehicles in the strategy can change their original velocities to actively participate in the cooperative merging process according to the merging requirements of on-ramp vehicles. …”
    Get full text
    Article
  9. 13589

    Investigation of deep learning image fusion techniques for medical imaging by Angayarkanni Veeraputhiran, Muthukumar Balamurugan, Varun P. Gopi

    Published 2024-08-01
    “…Image fusion is becoming increasingly important as a result of recent advancements in image processing applications because of the enormous number of different capture devices available. …”
    Get full text
    Article
  10. 13590

    Sensors Grouping Hierarchy Structure for Wireless Sensor Network by Ammar Hawbani, Xingfu Wang, Saleem Karmoshi, Lin Wang, Naji Husaini

    Published 2015-08-01
    “…The grouping of sensors is computational process intended to partition the sensors of network into groups. …”
    Get full text
    Article
  11. 13591

    A Novel Methodology for the Stochastic Integration of Geophysical and Hydrogeological Data in Geologically Consistent Models by Alexis Neven, Philippe Renard

    Published 2023-07-01
    “…To speed up the inversion process, forward responses are computed in lower‐dimensional spaces relevant to each physical problem. …”
    Get full text
    Article
  12. 13592

    A Novel Graphical Technique for Combinational Logic Representation and Optimization by Vedhas Pandit, Björn Schuller

    Published 2017-01-01
    “…Transforming a function into the proposed representations (also the inverse) is a very intuitive process, easy enough that a person can hand-calculate these transformations. …”
    Get full text
    Article
  13. 13593

    Digital platforms in the agricultural sector: Dynamics of oligopolistic platformisation by Monja Sauvagerd, Maximilian Mayer, Monika Hartmann

    Published 2024-12-01
    “…We explore how these pre-existing oligopolistic market structures influence the process and outcomes of platformisation in the ag sector. …”
    Get full text
    Article
  14. 13594
  15. 13595
  16. 13596
  17. 13597

    Approach of detecting low-rate DoS attack based on combined features by Zhi-jun WU, Jing-an ZHANG, Meng YUE, Cai-feng ZHANG

    Published 2017-05-01
    “…LDoS (low-rate denial of service) attack is a kind of RoQ (reduction of quality) attack which has the characteristics of low average rate and strong concealment.These characteristics pose great threats to the security of cloud computing platform and big data center.Based on network traffic analysis,three intrinsic characteristics of LDoS attack flow were extracted to be a set of input to BP neural network,which is a classifier for LDoS attack detection.Hence,an approach of detecting LDoS attacks was proposed based on novel combined feature value.The proposed approach can speedily and accurately model the LDoS attack flows by the efficient self-organizing learning process of BP neural network,in which a proper decision-making indicator is set to detect LDoS attack in accuracy at the end of output.The proposed detection approach was tested in NS2 platform and verified in test-bed network environment by using the Linux TCP-kernel source code,which is a widely accepted LDoS attack generation tool.The detection probability derived from hypothesis testing is 96.68%.Compared with available researches,analysis results show that the performance of combined features detection is better than that of single feature,and has high computational efficiency.…”
    Get full text
    Article
  18. 13598
  19. 13599

    Discounted-likelihood valuation of variance and volatility swaps by Napat Rujeerapaiboon, Sanae Rujivan, Hongdan Chen

    Published 2025-01-01
    “…The proposed framework embraces a worst-case perspective while exploiting the underlier’s stochastic process, representing a combination of robust optimization and stochastic programming. …”
    Get full text
    Article
  20. 13600

    Real-time chiral dynamics at finite temperature from quantum simulation by Kazuki Ikeda, Zhong-Bo Kang, Dmitri E. Kharzeev, Wenyang Qian, Fanyi Zhao

    Published 2024-10-01
    “…By introducing a chiral chemical potential μ 5 through a quench process, we drive the system out of equilibrium and analyze the induced vector currents and their evolution over time. …”
    Get full text
    Article