Search alternatives:
processor » process (Expand Search)
processes » process (Expand Search)
Showing 5,461 - 5,480 results of 30,198 for search '(processor OR processes) (computing)', query time: 0.27s Refine Results
  1. 5461

    Secure fault-tolerant code for cloud storage by Peng-xu TAN, Yue CHEN, Ju-long LAN, Hong-yong JIA

    Published 2014-03-01
    “…A secure regenerating code,called SRCS was proposed to solve the security problem during the process of the fault-tolerant of storage systems,especially the storage system in an extremely open environment such as cloud computing and cloud storage.SRCS achieves the security of the encoding matrix in the regenerating code using the threshold public-key encryption with low redundancy and high efficiency.It is proven that SRCS is secure in the semi-adaptive model using decisional BDHE assumption.…”
    Get full text
    Article
  2. 5462
  3. 5463

    Parallel and distributed chimp-optimized LSTM for oil well-log reconstruction in China by Zisong Wang, Zhiliang Cheng, Wenxiang Wang, Xiujian Ding, Lu Xia

    Published 2025-07-01
    “…PDCOA’s primary goal is to speed up the process of hyperparameter tuning for LSTMs by letting them work in parallel and across multiple computers, with separate groups of computers communicating with each other regularly to ensure the system is diverse and reliable. …”
    Get full text
    Article
  4. 5464

    Damage toughness assessment method of power backbone communication network based on power big data by Xue HAN

    Published 2023-05-01
    “…The damage toughness assessment method of power backbone communication network based on power big data was studied, and the damage toughness assessment results were used to formulate protection strategies and improve the network survivability.The power backbone communication network and the attacker were set as the two sides of the game, and the Nash equilibrium strategy of both sides was determined by the minimax method.The damage probability of nodes was obtained by the Nash equilibrium strategy, and the node damage probability was transformed into the network damage form.According to the network damage pattern, the repair conditions contained in the power big data were obtained by cloud computing technology.According to the importance of each node, the repair resources and repair budget were allocated to the nodes in order.The performance time-history response curve of the power backbone communication network was constructed, and the dynamic evaluation results of the network damage toughness were output.The experimental results show that all operations using cloud computing technology to process massive power big data can not exceed 330 ms.When the repair budget and repair resources are the highest, the damage toughness of the power backbone communication network can reach 0.925 at most, indicating that this method can effectively evaluate the damage toughness of the power backbone communication network.…”
    Get full text
    Article
  5. 5465

    Damage toughness assessment method of power backbone communication network based on power big data by Xue HAN

    Published 2023-05-01
    “…The damage toughness assessment method of power backbone communication network based on power big data was studied, and the damage toughness assessment results were used to formulate protection strategies and improve the network survivability.The power backbone communication network and the attacker were set as the two sides of the game, and the Nash equilibrium strategy of both sides was determined by the minimax method.The damage probability of nodes was obtained by the Nash equilibrium strategy, and the node damage probability was transformed into the network damage form.According to the network damage pattern, the repair conditions contained in the power big data were obtained by cloud computing technology.According to the importance of each node, the repair resources and repair budget were allocated to the nodes in order.The performance time-history response curve of the power backbone communication network was constructed, and the dynamic evaluation results of the network damage toughness were output.The experimental results show that all operations using cloud computing technology to process massive power big data can not exceed 330 ms.When the repair budget and repair resources are the highest, the damage toughness of the power backbone communication network can reach 0.925 at most, indicating that this method can effectively evaluate the damage toughness of the power backbone communication network.…”
    Get full text
    Article
  6. 5466

    Federated deep reinforcement learning-based edge collaborative caching strategy in space-air-ground integrated network by LIU Liang, JING Tengxiang, DUAN Jie, MAO Wuping, YAN Hongcheng, MA Wenjie

    Published 2025-01-01
    “…To address the problem of limited network coverage in remote areas, combining space-air-ground integrated network with mobile edge computing could provide low-latency and high-reliability transmissions for user requests in these areas, as well as timely caching services. …”
    Get full text
    Article
  7. 5467

    Research on Spaceborne Neural Network Accelerator and Its Fault Tolerance Design by Yingzhao Shao, Junyi Wang, Xiaodong Han, Yunsong Li, Yaolin Li, Zhanpeng Tao

    Published 2024-12-01
    “…This fault-tolerant architecture analyzes the hardware accelerator, parameter storage, and actual computation, employing data validation to reinforce model parameters and spatial and temporal TMR to reinforce accelerator computations. …”
    Get full text
    Article
  8. 5468
  9. 5469

    Interaction, Artificial Intelligence, and Motivation in Children’s Speech Learning and Rehabilitation Through Digital Games: A Systematic Literature Review by Chra Abdoulqadir, Fernando Loizides

    Published 2025-07-01
    “…This review of the state of the art examines the role of serious games, Artificial Intelligence (AI), and Natural Language Processing (NLP) in speech rehabilitation, with a particular focus on interaction modalities, engagement autonomy, and motivation. …”
    Get full text
    Article
  10. 5470

    Wireless Sensor Networks in Environmental Monitoring Applications Challenges and Future Directions by R Suganya, P Balaramesh, S Kannadhasan, V Chandrasekhar, S R Arun Raj, R Dhilipkumar

    Published 2025-01-01
    “…Chivalry: Signal Processing for WMSNs Humanoid vertical lace up boot where the lacing up shoes are made of suede or synthetic leather. …”
    Get full text
    Article
  11. 5471

    DRL-Driven Intelligent SFC Deployment in MEC Workload for Dynamic IoT Networks by Seyha Ros, Intae Ryoo, Seokhoon Kim

    Published 2025-07-01
    “…The framework introduces task offloading and a dynamic resource orchestration strategy, where task offloading to the MEC server ensures an efficient distribution of computation workloads. The dynamic resource orchestration process, Service Function Chaining (SFC) for Virtual Network Functions (VNFs) placement, and routing path determination optimize service execution across the network. …”
    Get full text
    Article
  12. 5472

    ZnO-SnO2/WO3-x heterojunction artificial synapse for realization and integration of multiple biological cognitive functions by Pengfei Sun, Ruidong Li, Haotian Meng, Tao Sun, Song Gao, Yang Li

    Published 2025-01-01
    “…In current memristor-based neuromorphic computing research, several studies face the challenge of realizing only a single function at a time or having isolated functions. …”
    Get full text
    Article
  13. 5473

    Rétroaction dans les processus numériques de conception by Sébastien Bourbonnais

    Published 2021-10-01
    “…The goal is to show that the knowledge embedded by the various computer programs will have led to a real overhaul of design knowledge, as part of the implementation of a new epistemology, driven by digital design processes.…”
    Get full text
    Article
  14. 5474
  15. 5475
  16. 5476
  17. 5477
  18. 5478
  19. 5479
  20. 5480