Search alternatives:
processor » process (Expand Search)
processes » process (Expand Search)
Showing 2,221 - 2,240 results of 30,198 for search '(processor OR processes) (computing)', query time: 0.20s Refine Results
  1. 2221

    Hardware realization of neuromorphic computing with a 4–port photonic reservoir for modulation format identification by Enes Şeker, Rijil Thomas, Guillermo von Hünefeld, Stephan Suckow, Mahdi Kaveh, Gregor Ronniger, Pooyan Safari, Isaac Sackey, David Stahl, Colja Schubert, Johannes Karl Fischer, Ronald Freund, Max C Lemme

    Published 2025-01-01
    “…The fields of machine learning and artificial intelligence drive researchers to explore energy-efficient, brain-inspired new hardware. Reservoir computing encompasses recurrent neural networks for sequential data processing and matches the performance of other recurrent networks with less training and lower costs. …”
    Get full text
    Article
  2. 2222
  3. 2223

    An open source FEM code for solving coupled thermo-poroelastoplastic processes by Matthew L. McLean, D. Nicolas Espinoza

    Published 2024-06-01
    “… Coupled thermo-hydro-mechanical (THM) processes are ubiquitous in subsurface energy production and geological utilization and storage operations. …”
    Get full text
    Article
  4. 2224

    In-Memory Versus Disk-Based Computing with Random Forest for Stock Analysis: A Comparative Study by Chitra Joshi, Chitrakant Banchorr, Omkaresh Kulkarni, Kirti Wanjale

    Published 2025-08-01
    “…As data become increasingly large, diverse and fast-moving, conventional processing systems often fall short of the performance required for modern analytics.Objective: This research seeks to thoroughly assess the performance of two prominent big data processing frameworks-Apache Spark (in-memory computing) and MapReduce (disk-based computing)-with a focus on applying random forest algorithms to predict stock prices. …”
    Get full text
    Article
  5. 2225

    Analisis Kinerja Jaringan Sensor Nirkabel untuk Edge Computing Menggunakan LORA SX1278 by Mochammad Hannats Hanafi Ichsan

    Published 2021-10-01
    “…The sensing process can be done by using various sensors as needed, while the technology for processing the sensing node is called Edge Computing technology. …”
    Get full text
    Article
  6. 2226
  7. 2227

    Integrated Photonics for IoT, RoF, and Distributed Fog–Cloud Computing: A Comprehensive Review by Gerardo Antonio Castañón Ávila, Walter Cerroni, Ana Maria Sarmiento-Moncada

    Published 2025-07-01
    “…Integrated photonics is a transformative technology for enhancing communication and computation in Cloud and Fog computing networks. Photonic integrated circuits (PICs) enable significant improvements in data-processing speed, energy-efficiency, scalability, and latency. …”
    Get full text
    Article
  8. 2228

    Quantum Computing Approach in K-Medoids Method for AIDS Disease Prediction Using Manhattan Distance by Mochamad Wahyudi, Imeldi Sintagel br Sianipar, Lise Pujiastuti, Solikhun Solikhun, Deny Kurniawan

    Published 2025-04-01
    “…The Manhattan distance is used because it is easier to process data. The quantum computing approach is used to overcome the limitations of classical computing when processing large-scale medical data. …”
    Get full text
    Article
  9. 2229

    Real-time human-robot interaction and service provision using hybrid intelligent computing framework. by Mohammed Albekairi, Meshari D Alanazi, Turki M Alanazi, Mohamed Vall O Mohamed, Khaled Kaaniche, Anis Sahbani, Ali Elrashidi

    Published 2025-01-01
    “…This research introduces a Hybrid Intelligent Computing Model (HICM) to improve robots' ability to process inquiries autonomously. …”
    Get full text
    Article
  10. 2230

    Stage-based colorectal cancer prediction on uncertain dataset using rough computing and LSTM models by K. Supriya, A. Anitha

    Published 2024-11-01
    “…Abstract Artificial intelligence (AI) is an attractive field of Computer Science that helps to classify and to predict various real-time applications. …”
    Get full text
    Article
  11. 2231

    Research on intrusion response strategy based on static Bayesian game in mobile edge computing network by Wei FAN, Cheng PENG, Dali ZHU, Yuqing WANG

    Published 2023-02-01
    “…In the mobile edge computing (MEC) environment, the resources of edge nodes are limited.It is difficult to detect the intrusion process accurately, and there is no effective intrusion response strategy to deal with external intrusions.An intrusion detection network structure suitable for mobile edge computing environment was proposed and an intrusion response decision model based on static Bayesian game was established to simulate the network interaction behavior between edge nodes and external intruders.The probability of attackers and defenders in the game process was predicted respectively.The influence of the system resource, the cost of intrusion response, the detection rate and false alarm rate were considered comprehensively by the intrusion response decision model.The response decision of the intrusion detection system was optimized on the basis of the considering both resource consumption of the intrusion detection and the privacy protection of the edge nodes.The factors that affected the decision-making of intrusion response were analyzed, and the experimental basis for the specific application was provided.…”
    Get full text
    Article
  12. 2232

    Sustainable AI With Quantum-Inspired Optimization: Enabling End-to-End Automation in Cloud-Edge Computing by Andreas Andreou, Constandinos X. Mavromoustakis, Evangelos K. Markakis, Athina Bourdena, George Mastorakis

    Published 2025-01-01
    “…This article explores the integration of quantum computing and end-to-end automation strategies in cloud-edge architectures. …”
    Get full text
    Article
  13. 2233

    Intelligent data analysis in edge computing with large language models: applications, challenges, and future directions by Xuanzheng Wang, Zhipeng Xu, Xingfei Sui

    Published 2025-05-01
    “…Edge computing has emerged as a vital paradigm for processing data near its source, significantly reducing latency and improving data privacy. …”
    Get full text
    Article
  14. 2234

    Research on cloud computing users’ public safety trust model based on scorecard-random forest by Shengli ZHOU, Canghong JIN, Lifa WU, Zheng HONG

    Published 2018-05-01
    “…Traditional cloud computing trust models mainly focused on the calculation of the trust of users’ behavior.In the process of classification and evaluation,there were some problems such as ignorance of content security and lack of trust division verification.Aiming to solve these problems,cloud computing users’ public safety trust model based on scorecard-random forest was proposed.Firstly,the text was processed using Word2Vec in the data preprocessing stage.The convolution neural network (CNN) was used to extract the sentence features for user content tag classification.Then,scorecard method was used to filter the strong correlation index.Meanwhile,in order to establish the users’ public safety trust evaluation model in cloud computing,a random forest method was applied.Experimental results show that the proposed users’ public safety trust evaluation model outperforms the general trust evaluation model.The proposed model can effectively distinguish malicious users from normal users,and it can improve the efficiency of the cloud computing users management.…”
    Get full text
    Article
  15. 2235

    Research on intrusion response strategy based on static Bayesian game in mobile edge computing network by Wei FAN, Cheng PENG, Dali ZHU, Yuqing WANG

    Published 2023-02-01
    “…In the mobile edge computing (MEC) environment, the resources of edge nodes are limited.It is difficult to detect the intrusion process accurately, and there is no effective intrusion response strategy to deal with external intrusions.An intrusion detection network structure suitable for mobile edge computing environment was proposed and an intrusion response decision model based on static Bayesian game was established to simulate the network interaction behavior between edge nodes and external intruders.The probability of attackers and defenders in the game process was predicted respectively.The influence of the system resource, the cost of intrusion response, the detection rate and false alarm rate were considered comprehensively by the intrusion response decision model.The response decision of the intrusion detection system was optimized on the basis of the considering both resource consumption of the intrusion detection and the privacy protection of the edge nodes.The factors that affected the decision-making of intrusion response were analyzed, and the experimental basis for the specific application was provided.…”
    Get full text
    Article
  16. 2236

    Synthetic biology meets neuromorphic computing: towards a bio-inspired olfactory perception system by Kevin Max, Larissa Sames, Shimeng Ye, Jan Steinkühler, Federico Corradi

    Published 2025-01-01
    “…We argue that a co-design approach offers significant advantages in replicating the complex dynamics of odor sensing and processing. We propose a hybrid system of synthetic sensory neurons that provides three key features: (a) receptor-gated ion channels, (b) interface between synthetic biology and semiconductors and (c) event-based encoding and computing based on spiking networks. …”
    Get full text
    Article
  17. 2237
  18. 2238
  19. 2239

    Real-time monitoring and optimization methods for user-side energy management based on edge computing by Jisheng Huang, Shanshan Zhou, Guangming Li, Qiang Shen

    Published 2025-07-01
    “…Abstract This paper presents a comprehensive framework for real-time monitoring and optimization of user-side energy management systems leveraging edge computing technology. The proposed approach addresses key challenges in traditional centralized energy management by bringing computation and data processing closer to end devices. …”
    Get full text
    Article
  20. 2240