Suggested Topics within your search.
Suggested Topics within your search.
- Data processing 4
- Business 3
- Computer programs 3
- Information technology 3
- Management 3
- Internet in public administration 2
- Management information systems 2
- Photography 2
- Public administration 2
- Advertising media planning 1
- Anxiety Disorders 1
- Automatic speech recognition 1
- Bioinformatics 1
- Biological and Medical Physics, Biophysics 1
- Biological physics 1
- Biomathematics 1
- Biophysics 1
- Business intelligence 1
- COMPUTERS / Desktop Applications / Suites 1
- Certification 1
- Children 1
- Cloud computing 1
- Cognitive Therapy 1
- Commercial statistics 1
- Computer graphics 1
- Computer networks 1
- Computer simulation 1
- Computer systems 1
- Computer-aided design 1
- Design 1
-
12721
Parallel Implementation and Scalability Results of a Local-Scale Air Quality Model: Application to Bamako Urban City
Published 2022-01-01“…The efficiency and the scalability of the parallel implementation are illustrated by numerical experiments performed using up to 128 processor cores of a cluster computing system.…”
Get full text
Article -
12722
Thermal-aware resource allocation in earliest deadline first using fluid scheduling
Published 2019-03-01Get full text
Article -
12723
Learning and forecasting open quantum dynamics with correlated noise
Published 2025-01-01“…This approach shows a path towards efficient and effective learning of noisy quantum dynamics and optimally control quantum processors over long and complex computations even in the presence of correlated noise.…”
Get full text
Article -
12724
Improving Performance of Automatic Keyword Extraction (AKE) Methods Using PoS Tagging and Enhanced Semantic-Awareness
Published 2025-07-01“…Automatic keyword extraction (AKE) has gained more importance with the increasing amount of digital textual data that modern computing systems process. It has various applications in information retrieval (IR) and natural language processing (NLP), including text summarisation, topic analysis and document indexing. …”
Get full text
Article -
12725
Programming universal unitary transformations on a general-purpose silicon photonic platform
Published 2025-02-01“…To the best of our knowledge, this is the first time that random unitary matrices are demonstrated on a general-purpose photonic processor and pave the way for the implementation of programmable photonic circuits in optical computing and signal processing systems.…”
Get full text
Article -
12726
Embedded GPU 3D Panoramic Viewing System Based on Virtual Camera Roaming 3D Environment
Published 2019-01-01“…The core computing module is based on NXP’s i.MX6Q application processor and builds an embedded Linux system. …”
Get full text
Article -
12727
Survey on the development of mimic defense in cyberspace:from mimic concept to “mimic+” ecology
Published 2022-04-01“…Build upon the dynamic-heterogeneous-redundant architecture for multi-body execution, multi-mode ruling and multi-dimension reconstruction, cyberspace mimic defense (CMD) uses uncertain system to deal with the uncertain threat to cyberspace ubiquity.The evolution of CMD over the past 8 years were reviewed systematically from the vertical, horizontal, current, developing and future perspectives.From the vertical perspective, the development process of CMD from concept to theory and practice was summarized.From the horizontal view, it elaborated the core structure DHR (dynamical heterogeneous redundancy) of CMD, the principles based on CMD’s three major theorems, safety gains and performance costs.A comparison was conducted between CMD and five other active defense technologies, namely intrusion tolerance, moving target defense, zero trust architecture, trusted computing and computer immunology.From the current perspective, it reviewed the implementation elements, performance, system architecture, heterogeneous strategies, scheduling strategies, voting strategies and other common technology patterns and characteristics of 11 types of main existing mimic products including mimicry router, mimicry processor, mimicry DNS server and mimicry cloud platform.From the developing perspective, it explored the “mimic+” AICDS (Mimic + AI/IoT/Cloud/Data/SDN) symbiotic ecology with respect to 5 types of new technologies, namely artificial intelligence, Internet of things, cloud computing, big data and software-defined network, and proposed the corresponding technology junctions and cross research value.From the future perspective, it looked into the future mimicry baseline 2.0 product ecology, “mimic +5G/6G”, “mimic + edge computing”,“mimic + cloud” and “mimic + blockchain” application scenarios.Besides, 4 types of challenges faced by CMD in the future were analyzed and summarized, including escape space of multi-mode decision attack, mutual restriction of heterogeneous and synchronous, difficult balance between security and function, and limited transformation space of existing endogenous security components.…”
Get full text
Article -
12728
Low-overhead defect-adaptive surface code with bandage-like super-stabilizers
Published 2025-05-01“…However, a major challenge arises from defects in processor fabrication, as well as occasional losses or cosmic rays during the computing process, all of which can lead to qubit malfunctions and disrupt error-correcting codes’ normal operations. …”
Get full text
Article -
12729
Intelligent Monitoring of Multistory Buildings under Unknown Earthquake Excitation by a Wireless Sensor Network
Published 2012-12-01“…Hardware designs of the sensor unit and the cluster head are presented; especially the cluster head contains a low power digital signal processor with strong computing capacity. Thus, the wireless sensor network has the unique feature offers distributed computing at group level. …”
Get full text
Article -
12730
Implementation of Genetic Algorithms for Optimization of Transportation Problem
Published 2019-03-01“…Index Terms— Transportation Problem, Genetics Algorithm (GA), Single-Processor Systems, Multi-Processor Systems, Optimization. …”
Get full text
Article -
12731
-
12732
Online Energy-Aware Scheduling for Deadline-Constrained Applications in Distributed Heterogeneous Systems
Published 2024-01-01“…In the current computing environment, the significance of distributed heterogeneous systems has gained prominence. …”
Get full text
Article -
12733
Memristor-Based Neuromorphic System for Unsupervised Online Learning and Network Anomaly Detection on Edge Devices
Published 2025-03-01“…Threshold optimization and anomaly detection are achieved through a fully analog Euclidean Distance (ED) computation circuit, eliminating the need for floating-point processing units. …”
Get full text
Article -
12734
Analysis of Real-Time Applications Feasibility through Simulation
Published 2016-12-01“…The approach is based on the notion of application density introduced by the authors, which characterizes the use of computational resource by this application and is derived from estimation of the application feasibility for various values of processor performance and the number of its cores in case of a multi-core platform. …”
Get full text
Article -
12735
LP-HENN: fully homomorphic encryption accelerator with high energy efficiency
Published 2025-05-01“…Abstract Fully homomorphic encryption (FHE) enables direct computation on encrypted data without decryption, ensuring data privacy in cloud computing scenarios and preventing the leakage of sensitive information. …”
Get full text
Article -
12736
Verifiable measurement-based quantum random sampling with trapped ions
Published 2025-01-01“…Here, we experimentally demonstrate efficiently verifiable quantum random sampling in the measurement-based model of quantum computation on a trapped-ion quantum processor. We create and sample from random cluster states, which are at the heart of measurement-based computing, up to a size of 4 × 4 qubits. …”
Get full text
Article -
12737
Application of Grouped MCDM Technique for Ranking and Selection of Laptops in the Current Scenario of COVID-19
Published 2023-08-01“…This paper exhibits a group of two MCDM techniques; Best Worst Method (BWM) and Analytical Hierarchy Process (AHP), which have been used to evaluate relative weights of considered conflicting criteria such as brand, price, storage capacity, RAM, processor, weight, touch screen, Bluetooth, and screen size, and these weights are used in the Technique for Order Preference by Similarity to Ideal Solution (TOPSIS) for ranking and selecting the best product of laptops.…”
Get full text
Article -
12738
The backpropagation algorithm implemented on spiking neuromorphic hardware
Published 2024-11-01“…This study presents a neuromorphic, spiking backpropagation algorithm based on synfire-gated dynamical information coordination and processing implemented on Intel’s Loihi neuromorphic research processor. …”
Get full text
Article -
12739
Load Balancer Operation Analyses of Video-Conference Service
Published 2022-09-01“…The graphs of the load on the hardware components of the virtual server at three stages of testing for the central processor, RAM, and network interfaces both within the service and in the structure of the local computer network are given. …”
Get full text
Article -
12740
FalconSign: An Efficient and High-Throughput Hardware Architecture for Falcon Signature Generation
Published 2024-12-01“…Our approach involves a new scheduling flow and architecture for Fast-Fourier Sampling to enhance computing unit reuse and reduce processing time. Additionally, we introduce several optimized modules, including configurable randomness generation units, parallel floating-point processing units, and an optimized SamplerZ module, to improve execution efficiency. …”
Get full text
Article