Search alternatives:
processor » processes (Expand Search)
Showing 17,281 - 17,300 results of 30,198 for search '(processor OR process) (computing)', query time: 0.31s Refine Results
  1. 17281
  2. 17282
  3. 17283
  4. 17284
  5. 17285

    The Hessian by blocks for neural network by backward propagation by Radhia Bessi, Nabil Gmati

    Published 2024-12-01
    “…This method uses the Hessian matrix to guide the optimization process but increases the computational cost at each iteration. …”
    Get full text
    Article
  6. 17286
  7. 17287
  8. 17288
  9. 17289
  10. 17290

    Next-to-next-to-leading order threshold soft function for tW production by Jia-Le Ding, Hai Tao Li, Jian Wang

    Published 2025-05-01
    “…Our results provide a vital component for threshold resummation at the next-to-next-to-next-to-leading logarithmic level in this process.…”
    Get full text
    Article
  11. 17291

    Privacy protection of warning message publishing protocol in VANET by Hui LIU, Xinyan LIU, Yan XU, Hong ZHONG, Meng WANG

    Published 2021-08-01
    “…Aiming at the problem that the traffic control department publishes violation messages to vehicles, a privacy protection warning message publishing protocol was proposed, where transportation manage department could obtain vehicle’s pseudonym according to its real identity and send warning message to vehicles based on its pseudonym in VANET.Elliptic curve cryptography was used to construct a lightweight warning message publishing and receiving process.Furthermore, the conditional privacy protection was realized, which could effectively protect the identity privacy of the receiving vehicle.Security analysis shows that the proposed protocol can meet the security requirements of VANET.Performance analysis shows that the protocol protocol has lower computational overhead and communication overhead.…”
    Get full text
    Article
  12. 17292

    Privacy protection of warning message publishing protocol in VANET by Hui LIU, Xinyan LIU, Yan XU, Hong ZHONG, Meng WANG

    Published 2021-08-01
    “…Aiming at the problem that the traffic control department publishes violation messages to vehicles, a privacy protection warning message publishing protocol was proposed, where transportation manage department could obtain vehicle’s pseudonym according to its real identity and send warning message to vehicles based on its pseudonym in VANET.Elliptic curve cryptography was used to construct a lightweight warning message publishing and receiving process.Furthermore, the conditional privacy protection was realized, which could effectively protect the identity privacy of the receiving vehicle.Security analysis shows that the proposed protocol can meet the security requirements of VANET.Performance analysis shows that the protocol protocol has lower computational overhead and communication overhead.…”
    Get full text
    Article
  13. 17293

    Use of Artificial Neural Networks and Response Surface Methodology for Evaluating the Reliability Index of Steel Wind Towers by Indira Inzunza-Aragón, Sonia E. Ruiz, Laura Cruz-Reyes

    Published 2022-01-01
    “…The estimation of structural reliability is a process that requires a large number of computational hours when statistical data are not available since it is necessary to perform a large amount of analysis or numerical simulations to estimate parameters related to the reliability. …”
    Get full text
    Article
  14. 17294

    Lexicographically Maximum Contraflow Problem with Vertex Capacities by Phanindra Prasad Bhandari, Shree Ram Khadka

    Published 2021-01-01
    “…A real dataset of Kathmandu road network with evacuation spaces is considered to implement the algorithm designed for dynamic multinetwork and to observe its computational performance.…”
    Get full text
    Article
  15. 17295

    Fault-injection attack on countermeasure algorithms of RSA-CRT cryptosystem by Fanyu KONG, Yong QIAO, Pengtao LIU, Xiaodong LIU, Dashui ZHOU

    Published 2019-02-01
    “…As a widely-applied public-key cryptosystem in TLS,SSL and IPSec protocols,the security of RSA cryptosystem is of great importance.At FDTC 2014,Rauzy and Guilley proposed several improved countermeasure algorithms of RSA implementation based on Chinese remainder theorem,which were used to defeat fault-injection attacks.New fault-injection attacks on two of their countermeasure algorithms are proposed.During the RSA computation process,a permanent fault is injected and then a faulty RSA signature result is induced.The RSA private key can be obtained by using the faulty RSA signature and the correct result.Therefore,Rauzy and Guilley’s two countermeasure algorithms cannot resist our fault-injection attack.…”
    Get full text
    Article
  16. 17296

    An extension of compromise ranking method with interval numbers for the evaluation of renewable energy sources by M. Mousavi, R. Tavakkoli-Moghaddam

    Published 2014-06-01
    “…Evaluating and prioritizing appropriate renewable energy sources is inevitably a complex decision process. Various information and conflicting attributes should be taken into account. …”
    Get full text
    Article
  17. 17297

    THE EFFECTIVE ROLE OF DIGITAL TECHNOLOGY IN ARABIC LANGUAGE EDUCATION by Khadidja BENCHAHDA & Fatima ABDERRAHMANE

    Published 2024-12-01
    “…Keywords: Digital technology, didactics, Arabic language, educational computer.…”
    Get full text
    Article
  18. 17298

    Composite Motion Design Procedure for Vibration Assisted Small-Hole EDM Using One Voice Coil Motor by Jing Cui, Zhongyi Chu

    Published 2016-01-01
    “…Particularly, for the purposes of high servo accuracy and high frequency response of the composite motion, an improved zero-phase-error tracking controller (ZPETC) algorithm decoupled with the feedback controller is developed for the process control, in which the feedback parameter adjustment is very simple to reduce the computation complexity. …”
    Get full text
    Article
  19. 17299

    Adaptive Fast Refocusing for Ship Targets With Complex Motion in SAR Images by Xinqi Xu, Xiangguang Leng, Zhongzhen Sun, Xiangdong Tan, Kefeng Ji, Gangyao Kuang

    Published 2025-01-01
    “…Compared to state-of-the-art leading refocusing algorithm, AFRA takes only approximately 15% the time required to process Hisea-1 data with long synthetic aperture time, 27% of the time required to process Gaofen-3 data with short synthetic aperture time, and still has excellent refocusing effect.…”
    Get full text
    Article
  20. 17300