Search alternatives:
processor » processes (Expand Search)
Showing 13,841 - 13,860 results of 30,198 for search '(processor OR process) (computing)', query time: 0.27s Refine Results
  1. 13841
  2. 13842

    Research and application of V2X based on MEC by Jiahui QIU, Zhichao ZHOU, Xiaobo LIN, Yu XIAO, Chao CAI, Liu LIU

    Published 2020-06-01
    “…The large-scale construction of 5G wireless communication network enhances the development of C-V2X (cellular-vehicle to everything) towards diversified directions.Large bandwidth services,such as high-definition video and AR/VR,bring great transmission and processing pressure to the classical network architecture.Meanwhile,traffic safety services characterized by ultra-high reliability and low delay put stringent requirements on network performance.The network architecture of providing services and computing localization through setting user panel down to close to the terminals and MEC (multiple access edge computing) can meet the requirements of data short loop transmission and ultra-low delay in the internet of vehicles scenario.The combination of MEC and V2X was explored in depth,the MEC networking scenario,MEC network architecture and the key technologies and challenges of MEC were analyzed.The combination scheme of MEC and C-V2X integration of network planning was provided.The application of MEC in C-V2X was presented in several specific scenarios.…”
    Get full text
    Article
  3. 13843

    ARTIFICIAL INTELLIGENCE AS AN OBJECT OF MANAGEMENT: A BENEFIT FOR CIVILISATION OR A THREAT TO MANKIND? by Iia Chudayeva, Boris Dmitruk

    Published 2023-12-01
    “…Today, artificial intelligence is a global trend in technology development and innovation. Advances in computing power, the ability to collect and process huge amounts of information, and instant access to the latest algorithms are important prerequisites for the evolution of intelligent technologies. …”
    Get full text
    Article
  4. 13844

    Research on the Lightweight of Natural Language Understanding Model in Electric Power Field by DONG Zengbo, XU Shiyu, CHEN Xi, XU Bo, XIN Rui, ZHANG Pengfei, SONG Hui

    Published 2024-12-01
    “…To address the application requirements of indicator question-and-answer (Q&A) in the electricity industry, this paper researches a natural language understanding model for balancing performance, computing resource consumption, and inference time, and proposes a method to incorporate an early stopping mechanism in the lightweight process of knowledge distillation. …”
    Get full text
    Article
  5. 13845

    Design and Performance Evaluation of an Authentic End-to-End Communication Model on Large-Scale Hybrid IPv4-IPv6 Virtual Networks to Detect MITM Attacks by Zeeshan Ashraf, Adnan Sohail, Muddesar Iqbal

    Published 2024-10-01
    “…IPv4 and IPv6 protocols will co-exist long during the changeover process. Some attacks, such as MITM attacks, do not discriminate by appearance and affect IPv4 and IPv6 address architectures. …”
    Get full text
    Article
  6. 13846

    Non-Maximum Suppression for Rotated Object Detection During Merging Slices of High-Resolution Images by Lei Ge, Lei Dou

    Published 2024-01-01
    “…Hence, it is more suitable for computing-constrained mobile platforms such as drones to detect objects on high-resolution images.…”
    Get full text
    Article
  7. 13847
  8. 13848
  9. 13849

    From Junk to Genius: Robotic Arms and AI Crafting Creative Designs from Scraps by Jiaqi Liu, Xiang Chen, Shengliang Yu

    Published 2024-12-01
    “…Robotic sorting demonstrated the ability to process up to six foam blocks per minute under controlled conditions. …”
    Get full text
    Article
  10. 13850

    NEURAL NETWORKS OF THE FINAL RING BASED ON THE REDUCTION SCHEME OF THE POSITION-MODULAR-CODE TRANSFORMATION by N. I. Chervyakov, A. A. Kolyada, N. A. Kolyada, V. A. Kuchukov, S. U. Protasenia

    Published 2018-06-01
    “…The article studies the problem of creating a neural network of modular computing structures for highperformance expressions in the field of information security. …”
    Get full text
    Article
  11. 13851

    Research on optimization strategies of university ideological and political parenting models under the empowerment of digital intelligence by Fan Lv

    Published 2025-03-01
    “…Abstract The development of big data, artificial intelligence, cloud computing, and other new generations of intellectual technologies has triggered digital changes in university civic education’s resources, forms, and modes. …”
    Get full text
    Article
  12. 13852

    Evaluation of Several Machine Learning Models for Field Canal Improvement Project Cost Prediction by Saadi Shartooh Sharqi, Aayush Bhattarai

    Published 2021-01-01
    “…Due to the massive advancement of soft computing (SC) and Internet of things (IoT), the main research objective of the current study was initiative. …”
    Get full text
    Article
  13. 13853

    A New Cipher Based on Feistel Structure and Chaotic Maps by Al-Bahrani et al.

    Published 2019-03-01
    “…The proposed cipher operates on more than 500 bytes (4000-bit) readable text blocks by six round computing. Within the basic operator of the cipher, i.e., in the function of the round F, a dynamical lookup table 2D standard map system is used to enhance the complexity and diffusion of the unreadable text. …”
    Get full text
    Article
  14. 13854
  15. 13855

    Towards the Concurrent Optimization of the Server: A Case Study on Sport Health Simulation by Nan Jia, Ruomei Wang, Mingliang Li, Yuhan Guan, Fan Zhou

    Published 2021-01-01
    “…As a result, the simulation process is usually time-consuming and simulation efficiency is low. …”
    Get full text
    Article
  16. 13856

    An Online-Traffic-Prediction Based Route Finding Mechanism for Smart City by Xiaoguang Niu, Ying Zhu, Qingqing Cao, Xining Zhang, Wei Xie, Kun Zheng

    Published 2015-08-01
    “…O-Sense firstly exploits a deep learning approach to process spatial and temporal taxi GPS traces shown in dynamic patterns. …”
    Get full text
    Article
  17. 13857
  18. 13858

    G-Pre: A Graph-Theory-Based Matrix Preconditioning Algorithm for Finite Element Simulation Solutions by Min Chen, Jingyan Li, Lijie Li, Kang Liang, Gai Wu, Wei Shen

    Published 2025-05-01
    “…In finite element simulation and analysis, increasing simulation scales place high demands on the preconditioning and solution process of linear matrices. However, the most commonly used preconditioning methods for incomplete LU factorization usually increase data access and computation due to data padding and forward/backward operations, as well as affect parallel computing design. …”
    Get full text
    Article
  19. 13859

    Autonomous scheduling mechanism based on energy awareness for improving resource allocation in serverless IoT edge by Mohsen Ghorbian, Mostafa Ghobaei-Arani, Leila Esmaeili

    Published 2025-07-01
    “…This choice is complex since allocating the necessary resources to process requests depends on the energy available in the active nodes. …”
    Get full text
    Article
  20. 13860