Search alternatives:
processor » process (Expand Search)
processes » process (Expand Search)
Showing 3,641 - 3,660 results of 30,198 for search '(processor OR processes) (computing)', query time: 0.20s Refine Results
  1. 3641

    Design and Application of UAV Intelligent Inspection System for Transmission Lines Based on Cloud and Fog-edge Heterogeneous Collaborative Computing Architecture by Zheng HUANG, Yongqiang WANG, Hongxing WANG, Chao GAO, Cang BAI

    Published 2020-04-01
    “…To solve the problems of the low computing capacity and low integration degree of the data processing platform of the existing unmanned aerial vehicle (UAV) inspection systems for transmission lines, a new UAV inspection system is proposed based on cloud and fog-edge heterogeneous collaborative computing architecture, and a detail introduction is made to the system architecture, network architecture and operation process. …”
    Get full text
    Article
  2. 3642
  3. 3643

    Research and Implementation of Distributed Computing Management System for College Students’ Sports Health Based on Integrated Regional Collaborative Medical Care by Mian Wang, Lijuan Li

    Published 2022-01-01
    “…In response to the strong demand for cross-regional medical care, this paper gives the overall design of the distributed computing system, for the deployment and architecture of the cross-regional platform; the registration of cross-regional patients, regional platforms, and health events and documents; and data exchange, service integration, and process integration, etc. …”
    Get full text
    Article
  4. 3644

    An eCUA model for integrated computing power and decentralized digital identity and a new business system supporting information framework by Wen QIAO, Xiaozheng WANG, Gan REN, Aidong YANG, Shoufeng WANG, Peng WANG, Xiaozhou YE, Ye OUYANG

    Published 2023-04-01
    “…An enhanced customer-user-account (eCUA) model was proposed.Based on the traditional three-household (customer, user, account) model in telecom industry, an enhanced customer-user-account model and its information framework was constructed by means of virtual digital human and decentralized identity technology, combined with the service demand of task-based computing power.With the globally unique identity, eCUA enables the traditional three-household model to have distributed and decentralized sharing capability.eCUA can solve the problem of information inconsistency in multi-account management, multi-source data synchronization, and multi-channel display of same-origin data.It can effectively support the closed-loop management of the whole process of computing power network business, such as computing power subscription, experience, ordering, and transaction operation.Therefore, the eCUA model proposed can be used as the main data reference frame of the integrated telecommunications service support system.…”
    Get full text
    Article
  5. 3645

    Computing Euler characteristic of $${N}$$ -dimensional objects via a Skyrmion-inspired overlaying ( $${N}$$ +1)-dimensional chiral field by Tae Jung Moon, Seong Min Park, Han Gyu Yoon, Gyunghun Yu, Hee Young Kwon, Changyeon Won

    Published 2025-04-01
    “…Abstract We introduce a novel computational methodology for indexing the Euler characteristics of $$\:N$$ -dimensional objects by overlaying ( $$\:N$$ +1)-dimensional chiral vector fields. …”
    Get full text
    Article
  6. 3646

    Advanced climate model evaluation with ESMValTool v2.11.0 using parallel, out-of-core, and distributed computing by M. Schlund, B. Andela, J. Benke, R. Comer, B. Hassler, E. Hogan, P. Kalverla, A. Lauer, B. Little, S. Loosveldt Tomas, F. Nattino, P. Peglar, V. Predoi, S. Smeets, S. Worsley, M. Yeo, K. Zimmermann

    Published 2025-07-01
    “…These optimizations include parallel computing (execute multiple computation tasks simultaneously), out-of-core computing (process data larger than available memory), and distributed computing (spread computation tasks across multiple interconnected nodes or machines). …”
    Get full text
    Article
  7. 3647

    Fortified-Edge 2.0: Advanced Machine-Learning-Driven Framework for Secure PUF-Based Authentication in Collaborative Edge Computing by Seema G. Aarella, Venkata P. Yanambaka, Saraju P. Mohanty, Elias Kougianos

    Published 2025-06-01
    “…These feature vectors are then processed using lightweight cryptographic primitives, including ECDSA, to enable secure authentication without exposing the original CRP. …”
    Get full text
    Article
  8. 3648

    Analisis Kepuasan Pengguna Aplikasi Sidawai Menggunakan End User Computing Statisfaction (EUCS) DAn Importance Performance Analysis (IPA) by Kiki Haerani, Khairul Imtihan, Wafiah Murniati

    Published 2024-08-01
    “…To determine the gap between expectations and performance, and measure user satisfaction with the SIDAWAI Application using the IPA (Importance Performance Analysis) method based on the results of processing questionnaire data from the End-User Computing Statisfanction (EUCS) model. …”
    Get full text
    Article
  9. 3649

    An Improved Soft Actor–Critic Task Offloading and Edge Computing Resource Allocation Algorithm for Image Segmentation Tasks in the Internet of Vehicles by Wei Zou, Haitao Yu, Boran Yang, Aohui Ren, Wei Liu

    Published 2025-06-01
    “…This PER-iSAC algorithm is designed to accelerate the learning process, maintain stability, and improve the efficiency and accuracy of computation offloading. …”
    Get full text
    Article
  10. 3650
  11. 3651

    Enhanced sensor web services by incorporating IoT interface protocols and spatio-temporal data streams for edge computing-based sensing by Dong Chen, Shaoju Wang, Chao Wang, Xiang Zhang, Nengcheng Chen

    Published 2025-01-01
    “…Compared with cloud-based architectures, this approach significantly improves resource accessibility and real-time processing. By extending SensorML and Sensor Observation Service (SOS), the framework bridges the gap between conventional Sensor Webs and edge computing demands. …”
    Get full text
    Article
  12. 3652

    Physical Reservoir Computing for Real‐Time Electrocardiogram Arrhythmia Detection Through Controlled Ion Dynamics in Electrochemical Random‐Access Memory by Kyumin Lee, Dongmin Kim, Jongseon Seo, Hyunsang Hwang

    Published 2025-07-01
    “…Abstract From the perspective of developing low‐power mobile healthcare devices capable of real‐time electrogram diagnosis, memristor‐based physical reservoir computing (PRC) offers a promising alternative to conventional deep neural network (DNN)‐based systems. …”
    Get full text
    Article
  13. 3653
  14. 3654

    Class-consistent technology-based outlier detection for incomplete real-valued data based on rough set theory and granular computing by Li Zhaowen, He Hongxuan, Wang Pei

    Published 2025-05-01
    “…It has found successful application in numerous fields, including process inspection, anti-terrorist operations, and public security. …”
    Get full text
    Article
  15. 3655

    Soft Computing Techniques to Model the Compressive Strength in Geo-Polymer Concrete: Approaches Based on an Adaptive Neuro-Fuzzy Inference System by Zhiguo Chang, Xuyang Shi, Kaidan Zheng, Yijun Lu, Yunhui Deng, Jiandong Huang

    Published 2024-11-01
    “…To reduce carbon emission in the process of creating and displaying visual art and structures (visual communication), geo-polymer concrete (GePC) is considered by designers. …”
    Get full text
    Article
  16. 3656

    Heuristically enhanced multi-head attention based recurrent neural network for denial of wallet attacks detection on serverless computing environment by Sarah A. Alzakari, Mohammad Alamgeer, Abdullah M. Alashjaee, Monir Abdullah, Khalid Nazim Abdul Sattar, Asma Alshuhail, Ahmad A. Alzahrani, Abdulwhab Alkharashi

    Published 2025-04-01
    “…Abstract Denial of Wallet (DoW) attacks are a cyber threat designed to utilize and deplete an organization’s financial resources by generating excessive prices or charges in their cloud computing (CC) and serverless computing platforms. …”
    Get full text
    Article
  17. 3657
  18. 3658

    MobiRDF: A cloud-based collaborative editing service for mobile RDF data sharing by Nadir Guetmi, Abdessamad Imine, Moulay Driss Mechaoui

    Published 2025-08-01
    “…It uses commutativity-based consistency model to maintain the consistency of the shared RDF graph, ensuring seamless collaboration among users. The heavier computational tasks, such as dynamic group management, synchronization merging, and reasoning processes, are managed in the Cloud, optimizing the performance of resource-constrained mobile devices. …”
    Get full text
    Article
  19. 3659

    Retroviral integration process in the human genome: is it really non-random? A new statistical approach. by Alessandro Ambrosi, Claudia Cattoglio, Clelia Di Serio

    Published 2008-08-01
    “…This has drawn the attention of the scientific community to the molecular determinants of the retroviral integration process as well as to statistical methods to evaluate the genome-wide distribution of integration sites. …”
    Get full text
    Article
  20. 3660