Search alternatives:
processor » process (Expand Search)
processes » process (Expand Search)
Showing 12,721 - 12,740 results of 30,198 for search '(processor OR processes) (computing)', query time: 0.26s Refine Results
  1. 12721

    Parallel Implementation and Scalability Results of a Local-Scale Air Quality Model: Application to Bamako Urban City by Abdoulaye Samaké, Amadou Mahamane, Ouaténi Diallo

    Published 2022-01-01
    “…The efficiency and the scalability of the parallel implementation are illustrated by numerical experiments performed using up to 128 processor cores of a cluster computing system.…”
    Get full text
    Article
  2. 12722
  3. 12723

    Learning and forecasting open quantum dynamics with correlated noise by Xinfang Zhang, Zhihao Wu, Gregory A. L. White, Zhongcheng Xiang, Shun Hu, Zhihui Peng, Yong Liu, Dongning Zheng, Xiang Fu, Anqi Huang, Dario Poletti, Kavan Modi, Junjie Wu, Mingtang Deng, Chu Guo

    Published 2025-01-01
    “…This approach shows a path towards efficient and effective learning of noisy quantum dynamics and optimally control quantum processors over long and complex computations even in the presence of correlated noise.…”
    Get full text
    Article
  4. 12724

    Improving Performance of Automatic Keyword Extraction (AKE) Methods Using PoS Tagging and Enhanced Semantic-Awareness by Enes Altuncu, Jason R. C. Nurse, Yang Xu, Jie Guo, Shujun Li

    Published 2025-07-01
    “…Automatic keyword extraction (AKE) has gained more importance with the increasing amount of digital textual data that modern computing systems process. It has various applications in information retrieval (IR) and natural language processing (NLP), including text summarisation, topic analysis and document indexing. …”
    Get full text
    Article
  5. 12725

    Programming universal unitary transformations on a general-purpose silicon photonic platform by José Roberto Rausell-Campo, Daniel Pérez-López, José Capmany Francoy

    Published 2025-02-01
    “…To the best of our knowledge, this is the first time that random unitary matrices are demonstrated on a general-purpose photonic processor and pave the way for the implementation of programmable photonic circuits in optical computing and signal processing systems.…”
    Get full text
    Article
  6. 12726

    Embedded GPU 3D Panoramic Viewing System Based on Virtual Camera Roaming 3D Environment by Hao Meng, Fei Yuan, Yili Xu, Tianhao Yan

    Published 2019-01-01
    “…The core computing module is based on NXP’s i.MX6Q application processor and builds an embedded Linux system. …”
    Get full text
    Article
  7. 12727

    Survey on the development of mimic defense in cyberspace:from mimic concept to “mimic+” ecology by Hailong MA, Liang WANG, Tao HU, Yiming JIANG, Yanze QU

    Published 2022-04-01
    “…Build upon the dynamic-heterogeneous-redundant architecture for multi-body execution, multi-mode ruling and multi-dimension reconstruction, cyberspace mimic defense (CMD) uses uncertain system to deal with the uncertain threat to cyberspace ubiquity.The evolution of CMD over the past 8 years were reviewed systematically from the vertical, horizontal, current, developing and future perspectives.From the vertical perspective, the development process of CMD from concept to theory and practice was summarized.From the horizontal view, it elaborated the core structure DHR (dynamical heterogeneous redundancy) of CMD, the principles based on CMD’s three major theorems, safety gains and performance costs.A comparison was conducted between CMD and five other active defense technologies, namely intrusion tolerance, moving target defense, zero trust architecture, trusted computing and computer immunology.From the current perspective, it reviewed the implementation elements, performance, system architecture, heterogeneous strategies, scheduling strategies, voting strategies and other common technology patterns and characteristics of 11 types of main existing mimic products including mimicry router, mimicry processor, mimicry DNS server and mimicry cloud platform.From the developing perspective, it explored the “mimic+” AICDS (Mimic + AI/IoT/Cloud/Data/SDN) symbiotic ecology with respect to 5 types of new technologies, namely artificial intelligence, Internet of things, cloud computing, big data and software-defined network, and proposed the corresponding technology junctions and cross research value.From the future perspective, it looked into the future mimicry baseline 2.0 product ecology, “mimic +5G/6G”, “mimic + edge computing”,“mimic + cloud” and “mimic + blockchain” application scenarios.Besides, 4 types of challenges faced by CMD in the future were analyzed and summarized, including escape space of multi-mode decision attack, mutual restriction of heterogeneous and synchronous, difficult balance between security and function, and limited transformation space of existing endogenous security components.…”
    Get full text
    Article
  8. 12728

    Low-overhead defect-adaptive surface code with bandage-like super-stabilizers by Zuolin Wei, Tan He, Yangsen Ye, Dachao Wu, Yiming Zhang, Youwei Zhao, Weiping Lin, He-Liang Huang, Xiaobo Zhu, Jian-Wei Pan

    Published 2025-05-01
    “…However, a major challenge arises from defects in processor fabrication, as well as occasional losses or cosmic rays during the computing process, all of which can lead to qubit malfunctions and disrupt error-correcting codes’ normal operations. …”
    Get full text
    Article
  9. 12729

    Intelligent Monitoring of Multistory Buildings under Unknown Earthquake Excitation by a Wireless Sensor Network by Y. Lei, Y. L. Tang, J. X. Wang, Y. Q. Jiang, Y. Luo

    Published 2012-12-01
    “…Hardware designs of the sensor unit and the cluster head are presented; especially the cluster head contains a low power digital signal processor with strong computing capacity. Thus, the wireless sensor network has the unique feature offers distributed computing at group level. …”
    Get full text
    Article
  10. 12730

    Implementation of Genetic Algorithms for Optimization of Transportation Problem by Soobia Saeed

    Published 2019-03-01
    “…Index Terms— Transportation Problem, Genetics Algorithm (GA), Single-Processor Systems, Multi-Processor Systems, Optimization. …”
    Get full text
    Article
  11. 12731
  12. 12732

    Online Energy-Aware Scheduling for Deadline-Constrained Applications in Distributed Heterogeneous Systems by Yifan Liu, Chengelie Du, Jinchao Chen, Xiaoyan Du

    Published 2024-01-01
    “…In the current computing environment, the significance of distributed heterogeneous systems has gained prominence. …”
    Get full text
    Article
  13. 12733

    Memristor-Based Neuromorphic System for Unsupervised Online Learning and Network Anomaly Detection on Edge Devices by Md Shahanur Alam, Chris Yakopcic, Raqibul Hasan, Tarek M. Taha

    Published 2025-03-01
    “…Threshold optimization and anomaly detection are achieved through a fully analog Euclidean Distance (ED) computation circuit, eliminating the need for floating-point processing units. …”
    Get full text
    Article
  14. 12734

    Analysis of Real-Time Applications Feasibility through Simulation by S. N. Baranov, V. V. Nikiforov

    Published 2016-12-01
    “…The approach is based on the notion of application density introduced by the authors, which characterizes the use of computational resource by this application and is derived from estimation of the application feasibility for various values of processor performance and the number of its cores in case of a multi-core platform. …”
    Get full text
    Article
  15. 12735

    LP-HENN: fully homomorphic encryption accelerator with high energy efficiency by Zhuoyu Tian, Lei Chen, Shengyu Fan, Xianglong Deng, Rui Hou, Dan Meng, Mingzhe Zhang

    Published 2025-05-01
    “…Abstract Fully homomorphic encryption (FHE) enables direct computation on encrypted data without decryption, ensuring data privacy in cloud computing scenarios and preventing the leakage of sensitive information. …”
    Get full text
    Article
  16. 12736

    Verifiable measurement-based quantum random sampling with trapped ions by Martin Ringbauer, Marcel Hinsche, Thomas Feldker, Paul K. Faehrmann, Juani Bermejo-Vega, Claire L. Edmunds, Lukas Postler, Roman Stricker, Christian D. Marciniak, Michael Meth, Ivan Pogorelov, Rainer Blatt, Philipp Schindler, Jens Eisert, Thomas Monz, Dominik Hangleiter

    Published 2025-01-01
    “…Here, we experimentally demonstrate efficiently verifiable quantum random sampling in the measurement-based model of quantum computation on a trapped-ion quantum processor. We create and sample from random cluster states, which are at the heart of measurement-based computing, up to a size of 4 × 4 qubits. …”
    Get full text
    Article
  17. 12737

    Application of Grouped MCDM Technique for Ranking and Selection of Laptops in the Current Scenario of COVID-19 by Avinash Gaur

    Published 2023-08-01
    “…This paper exhibits a group of two MCDM techniques; Best Worst Method (BWM) and Analytical Hierarchy Process (AHP), which have been used to evaluate relative weights of considered conflicting criteria such as brand, price, storage capacity, RAM, processor, weight, touch screen, Bluetooth, and screen size, and these weights are used in the Technique for Order Preference by Similarity to Ideal Solution (TOPSIS) for ranking and selecting the best product of laptops.…”
    Get full text
    Article
  18. 12738

    The backpropagation algorithm implemented on spiking neuromorphic hardware by Alpha Renner, Forrest Sheldon, Anatoly Zlotnik, Louis Tao, Andrew Sornborger

    Published 2024-11-01
    “…This study presents a neuromorphic, spiking backpropagation algorithm based on synfire-gated dynamical information coordination and processing implemented on Intel’s Loihi neuromorphic research processor. …”
    Get full text
    Article
  19. 12739

    Load Balancer Operation Analyses of Video-Conference Service by A. N. Markov, A. I. Paramonov

    Published 2022-09-01
    “…The graphs of the load on the hardware components of the virtual server at three stages of testing for the central processor, RAM, and network interfaces both within the service and in the structure of the local computer network are given. …”
    Get full text
    Article
  20. 12740

    FalconSign: An Efficient and High-Throughput Hardware Architecture for Falcon Signature Generation by Yi Ouyang, Yihong Zhu, Wenping Zhu, Bohan Yang, Zirui Zhang, Hanning Wang, Qichao Tao, Min Zhu, Shaojun Wei, Leibo Liu

    Published 2024-12-01
    “…Our approach involves a new scheduling flow and architecture for Fast-Fourier Sampling to enhance computing unit reuse and reduce processing time. Additionally, we introduce several optimized modules, including configurable randomness generation units, parallel floating-point processing units, and an optimized SamplerZ module, to improve execution efficiency. …”
    Get full text
    Article