Search alternatives:
processor » processes (Expand Search)
Showing 1,521 - 1,540 results of 30,198 for search '(processor OR process) (computing)', query time: 0.16s Refine Results
  1. 1521

    Sustainable public procurement through Internet of Things and cloud computing in South Africa by Lawrence M. Mojaki, Tite Tuyikeze, Nkanyiso K. Ndlovu

    Published 2025-04-01
    “…Results: The research revealed that IoT and cloud computing bring sustainability, stability and efficiency to the process. …”
    Get full text
    Article
  2. 1522

    Using Simulation Modeling to Estimate Time Characteristics of a Distributed Computing System by G. A. Zvonareva, D. S. Buzunov

    Published 2022-11-01
    “…In present time, distributed computing systems with parallel data processing are widely used. …”
    Get full text
    Article
  3. 1523

    Computing Entropy for Long-Chain Alkanes Using Linear Regression: Application to Hydroisomerization by Shrinjay Sharma, Richard Baur, Marcello Rigutto, Erik Zuidema, Umang Agarwal, Sofia Calero, David Dubbeldam, Thijs J. H. Vlugt

    Published 2024-12-01
    “…These findings highlight the accuracy of our linear regression model in computing entropies for alkanes and provide insight for designing and optimizing zeolite-catalyzed hydroisomerization processes.…”
    Get full text
    Article
  4. 1524
  5. 1525
  6. 1526

    Priority-Based Cloud Computing Architecture for Multimedia-Enabled Heterogeneous Vehicular Users by Amjad Ali, Hongwu Liu, Ali Kashif Bashir, Shaker El-Sappagh, Farman Ali, Adeel Baig, Daeyoung Park, Kyung Sup Kwak

    Published 2018-01-01
    “…In the proposed scheme, we divide multimedia processing into four different subphases, while computing resources to each computing server are assigned dynamically, according to the workload, in order to process multimedia tasks according to the multimedia user Quality of Experience (QoE) requirements. …”
    Get full text
    Article
  7. 1527
  8. 1528

    Research on Migration or Deployment of Telecom Network Management System on Cloud Computing Network by Afang Song, Lian Lin, Faguang Wang

    Published 2015-06-01
    “…Some key problems of system migration or deployment process on cloud computing network were analyzed. …”
    Get full text
    Article
  9. 1529

    An efficient IoT group association and data sharing mechanism in edge computing paradigm by Haowen Tan

    Published 2023-12-01
    “…The group key updating process in our architecture only necessitates minor changes on the EI side, whereas the decryption information of some IoT devices remains constant if the devices have not been revoked. …”
    Get full text
    Article
  10. 1530

    Beamforming and resource optimization in UAV integrated sensing and communication network with edge computing by Bin LI, Sicong PENG, Zesong FEI

    Published 2023-09-01
    “…To address the dependence of traditional integrated sensing and communication network mode on ground infrastructure, the unmanned aerial vehicle (UAV) with edge computing server and radar transceiver was proposed to solve the problems of high-power consumption, signal blocking, and coverage blind spots in complex scenarios.Firstly, under the conditions of satisfying the user’s transmission power, radar estimation information rate and task offloading proportion limit, the system energy consumption was minimized by jointly optimizing UAV radar beamforming, computing resource allocation, task offloading, user transmission power, and UAV flight trajectory.Secondly, the non-convex optimization problem was reformulated as a Markov decision process, and the proximal policy optimization method based deep reinforcement learning was used to achieve the optimal solution.Simulation results show that the proposed algorithm has a faster training speed and can reduce the system energy consumption effectively while satisfying the sensing and computing delay requirements.…”
    Get full text
    Article
  11. 1531

    Verifiable access control scheme based on unpaired CP-ABE in fog computing by Jiangtao DONG, Peiwen YAN, Ruizhong DU

    Published 2021-08-01
    “…Fog computing extends computing power and data analysis applications to the edge of the network, solves the latency problem of cloud computing, and also brings new challenges to data security.Attribute encryption based on ciphertext strategy (CP-ABE) is a technology to ensure data confidentiality and fine-grained access control.The excessive computational overhead of bilinear pairing restricts its application and development.In response to this, a verifiable access control scheme was proposed based on unpaired CP-ABE in fog computing.In order to make CP-ABE more efficient, simple scalar multiplication in elliptic curve encryption was used to replace bilinear pairing, thereby reducing the overall computational overhead.Decryption operations were outsourced to fog nodes to reduce user computational complexity, and based on the tamper-proof and traceable characteristics of the blockchain, the correctness of the access transaction was verified and the access authorization process was recorded.Security and performance analysis shows that the scheme is safe under the elliptic curve decision-making DBDH (Diffie-Hellman) assumption, and the calculation efficiency is higher.…”
    Get full text
    Article
  12. 1532
  13. 1533
  14. 1534

    Computing Legal Analysis: A Guided Approach to Problem Solving in Contract Law by Marton Ribary, Antony Starza-Allen

    Published 2023-11-01
    “…Computational thinking allows students to visualise connections between the initial categorisation of legal information and the constitutive elements of a persuasive legal argument to articulate and demystify the process of producing legal advice.…”
    Get full text
    Article
  15. 1535

    Simplified multibody method for computing the modal characteristics of high-speed railway catenary by GONG Yongzhe, YANG Caijin, ZHAO Yu, LIU Kaizhong

    Published 2022-07-01
    “…To simplify the computing process for the structural vibration modal properties of railway catenary based on absolute nodal coordinates, this paper proposed a fast computational method based on the advanced flexible multibody dynamics. …”
    Get full text
    Article
  16. 1536

    Personalized learning effect evaluation model for vocational education with cloud computing technology by Xiangyu Wang, Kang Cao

    Published 2025-12-01
    “…The advent of cloud computing technology (CCT) has expedited the advancement of online learning methodologies and, to a certain extent, compensated for the limitations inherent in traditional teaching approaches. …”
    Get full text
    Article
  17. 1537

    Emergency Scheduling Optimization Simulation of Cloud Computing Platform Network Public Resources by Dingrong Liu, Zhigang Yao, Liukui Chen

    Published 2021-01-01
    “…Emergency scheduling of public resources on the cloud computing platform network can effectively improve the network emergency rescue capability of the cloud computing platform. …”
    Get full text
    Article
  18. 1538

    A lightweight scalable hybrid authentication framework for Internet of Medical Things (IoMT) using blockchain hyperledger consortium network with edge computing by Abdullah Ayub Khan, Asif Ali Laghari, Roobaea Alroobaea, Abdullah M. Baqasah, Majed Alsafyani, Hamed Alsufyani, Sajid Ullah

    Published 2025-06-01
    “…For secure authentication, Hyperledger ensures a permissioned, decentralized, and impenetrable environment, while edge computing lowers latency by processing data closer to IoMT devices. …”
    Get full text
    Article
  19. 1539
  20. 1540