Search alternatives:
processor » processes (Expand Search)
Showing 14,081 - 14,100 results of 30,198 for search '(processor OR process) (computing)', query time: 0.29s Refine Results
  1. 14081
  2. 14082

    A comprehensive IoT cloud-based wind station ready for real-time measurements and artificial intelligence integration by Décio Alves, Fábio Mendonça, Sheikh Shanawaz Mostafa, Fernando Morgado-Dias

    Published 2024-12-01
    “…Using this method, all station data are processed every 3 seconds and stored ready for Artificial Intelligence usage with an approximate latency of 150–300 milliseconds, representing up to an 85% reduction in processing delay compared to similar solutions with over 1-second latencies. …”
    Get full text
    Article
  3. 14083
  4. 14084

    A New Method for Defuzzification and Ranking of Fuzzy Numbers Based on the Statistical Beta Distribution by A. Rahmani, F. Hosseinzadeh Lotfi, M. Rostamy-Malkhalifeh, T. Allahviranloo

    Published 2016-01-01
    “…Granular computing is an emerging computing theory and paradigm that deals with the processing of information granules, which are defined as a number of information entities grouped together due to their similarity, physical adjacency, or indistinguishability. …”
    Get full text
    Article
  5. 14085
  6. 14086
  7. 14087

    Quantum resonant dimensionality reduction by Fan Yang, Furong Wang, Xusheng Xu, Pan Gao, Tao Xin, ShiJie Wei, Guilu Long

    Published 2025-01-01
    “…Quantum computing is a promising candidate for accelerating machine learning tasks. …”
    Get full text
    Article
  8. 14088

    Cyber‐physical system model based on multi‐agent system by Maqbol Ahmed, Okba Kazar, Saad Harous

    Published 2024-12-01
    “…Abstract Integrating physical processes with computational components creates cyber‐physical systems (CPS) that seamlessly interact between the physical and digital worlds. …”
    Get full text
    Article
  9. 14089

    Coverage problem in camera-based sensor networks using the CUDA platform by Jae-Hyun Seo, Yourim Yoon, Yong-Hyuk Kim

    Published 2017-12-01
    “…In addition, a parallel experiment using general-purpose computing on graphics processing units is added to improve computing speed, which is a disadvantage in genetic algorithms. …”
    Get full text
    Article
  10. 14090

    Real-Time Data-Driven Method for Bolt Defect Detection and Size Measurement in Industrial Production by Jinlong Yang, Chul-Hee Lee

    Published 2025-04-01
    “…A high-precision camera calibration method was used, and image processing was accelerated through GPU parallel computing to ensure efficient and real-time target size measurement. …”
    Get full text
    Article
  11. 14091

    Comparison between Statistical Approaches and Data Mining Algorithms for Outlier Detection by Annisa Putri Utami, Anwar Fitrianto, Khairil Anwar Notodiputro

    Published 2024-05-01
    “…Suggestions for further research are to improve the data mining method by focusing more on statistical analysis apart from focusing on data processing computing time so that the expected results of outlier detection are faster and more precise.…”
    Get full text
    Article
  12. 14092

    A Fast Hybrid Classification Algorithm with Feature Reduction for Medical Images by Hanan Ahmed Hosni Mahmoud, Abeer Abdulaziz AlArfaj, Alaaeldin M. Hafez

    Published 2022-01-01
    “…QGH integrates quantum computing into machine learning and intelligence applications. …”
    Get full text
    Article
  13. 14093

    Low Insertion Loss and Non-Blocking Microring-Based Optical Router for 3D Optical Network-on-Chip by Pengxing Guo, Weigang Hou, Lei Guo, Qiang Yang, Yifan Ge, Hang Liang

    Published 2018-01-01
    “…With the advent of complex computing applications such as cloud computing and artificial intelligence, the utilization of multicore processors has become one of the best solutions to improve the computation performance. …”
    Get full text
    Article
  14. 14094
  15. 14095
  16. 14096
  17. 14097

    Security decision method for the edge of multi-layer satellite network based on reinforcement learning by Peiliang ZUO, Shaolong HOU, Chao GUO, Hua JIANG, Wenbo WANG

    Published 2022-06-01
    “…The geosynchronous orbit satellite has the largest coverage and the strongest computing processing capability. This paper uses deep reinforcement learning algorithms to implement edge security decisions for satellite networks. …”
    Get full text
    Article
  18. 14098

    CRYPTO-RESISTANT METHODS AND RANDOM NUMBER GENERATORS IN INTERNET OF THINGS (IOT) DEVICES by Petro Klimushyn, Tetiana Solianyk, Oleksandr Mozhaiev, Yurii Gnusov, Oleksandr Manzhai, Vitaliy Svitlychny

    Published 2022-06-01
    “…The analysis of technologies and circuit solutions allowed to draw the following conclusions: protection of IoT solutions includes: security of IoT network nodes and their connection to the cloud using secure protocols, ensuring confidentiality, authenticity and integrity of IoT data by cryptographic methods, attack analysis and network cryptographic stability; the initial basis for the protection of IoT solutions is the true randomness of the formed RNG sequences and used in algorithms for cryptographic transformation of information to protect it; feature of IoT devices is their heterogeneity and geographical distribution, limited computing resources and power supply, small size; The most effective (reduce power consumption and increase the generation rate) for use in IoT devices are RNG exclusively on a digital basis, which implements a three-stage process: the initial digital circuit, normalizer and random number flow generator; Autonomous Boolean networks (ABN) allow to create RNG with unique characteristics: the received numbers are really random, high speed – the number can be received in one measure, the minimum power consumption, miniature, high (up to 3 GHz) throughput of Boolean chaos; a promising area of ABN development is the use of optical logic valves for the construction of optical ABN with a bandwidth of up to 14 GHz; the classification of known classes of RNG attacks includes: direct cryptanalytic attacks, attacks based on input data, attacks based on the disclosure of the internal state of RNG, correlation attacks and special attacks; statistical test packages to evaluate RNG sequences have some limitations or shortcomings and do not replace cryptanalysis; Comparison of cryptoaccelerators with cryptographic transformation software shows their significant advantages: for AES block encryption algorithm, speeds increase by 10-20 times in 8/16-bit cryptoaccelerators and 150 times in 32-bit, growth hashing of SHA-256 in 32-bit cryptoaccelerators more than 100 times, and for the NMAS algorithm - up to 500 times. …”
    Get full text
    Article
  19. 14099

    Object-based feedback attention in convolutional neural networks improves tumour detection in digital pathology by Andrew Broad, Alexander Wright, Clare McGenity, Darren Treanor, Marc de Kamps

    Published 2024-12-01
    “…Abstract Human visual attention allows prior knowledge or expectations to influence visual processing, allocating limited computational resources to only that part of the image that are likely to behaviourally important. …”
    Get full text
    Article
  20. 14100

    Image Segmentation Method With Improved GA Optimization of Two-Dimensional Maximum Entropy by Jin Wang, Yanli Tan, Xiaoning Bo, Guoqin Li

    Published 2024-01-01
    “…Image segmentation is the cornerstone that determines the effectiveness of image processing, but traditional image segmentation methods have issues such as long computation time, low recognition accuracy, and poor anti-interference ability. …”
    Get full text
    Article