Search alternatives:
processor » process (Expand Search)
processes » process (Expand Search)
Showing 1,301 - 1,320 results of 30,198 for search '(processor OR processes) (computing)', query time: 0.25s Refine Results
  1. 1301

    Increasing the Quality of Transient Processes in the Vehicle Transmission by A. Taratorkin, V. Derzhankii, I. Taratorkin

    Published 2019-12-01
    “…By employing simulation models a number of methods were used to regulate power redistribution. Results of computations made it possible to determine that the efficiency of power redistribution are closely related to initial conditions of the process under the study. …”
    Get full text
    Article
  2. 1302

    Management accounting and analysis of business processes in the enterprise by V.A. Deriy, M.V. Нumenna-Deriy

    Published 2018-08-01
    “…The article considers the main problems of managerial accounting and analysis of business processes in the field of manufacturing sector (industry, construction, agriculture). …”
    Get full text
    Article
  3. 1303

    Anderson impurity solver integrating tensor network methods with quantum computing by François Jamet, Lachlan P. Lindoy, Yannic Rath, Connor Lenihan, Abhishek Agarwal, Enrico Fontana, Fedor Simkovic IV, Baptiste Anselme Martin, Ivan Rungger

    Published 2025-03-01
    “…Solving the Anderson impurity model typically involves a two-step process, where one first calculates the ground state of the Hamiltonian and then computes its dynamical properties to obtain Green’s function. …”
    Get full text
    Article
  4. 1304

    THE COMPUTER-AIDED CONTROLLING OF TECHNICAL AND TECHNOLOGICAL PLANTS IN THE WAVELET MEDIUM by Fedosenkov D.B., Tokarev S.V., Simikova A.A., Iskhakov R.R., Fedosenkov B.A.

    Published 2015-03-01
    “…Dosing processes in mixture producing aggregates for receiving dry dispersed compositions of various kinds are considered as a research plant. …”
    Get full text
    Article
  5. 1305

    Software analysis of scientific texts: comparative study of distributed computing frameworks by Serik Altynbek, Gabit Shuitenov, Madi Muratbekov, Alibek Barlybayev

    Published 2025-05-01
    “…This study aims to conduct a study of popular distributed computing frameworks for scientific text processing. …”
    Get full text
    Article
  6. 1306

    Fog computing based radio access networks:architecture,principles and challenges by Bonan YIN, Yuan AI, Mugen PENG

    Published 2016-06-01
    “…To reduce the burden of fronthaul link,avoid large-scale wireless signal processing in centralized baseband unit(BBU)pool,and take full advantage of processing and storage capabilities in edge devices,a fog computing based radio access network(F-RAN)was presented as an evolution form of heterogeneous cloud radio access networks.The core idea of F-RAN was to take full advantage of processing and storage capabilities in edge devices which could achieve the local distributed content delivery,the local distributed collaboration radio signal processing and the local distributed cooperative radio resource management functions.System architectures of F-RAN,promising key techniques,and researching open issues of F-RAN were discussed in detail.…”
    Get full text
    Article
  7. 1307

    A comparison of computational models for eukaryotic cell shape and motility. by William R Holmes, Leah Edelstein-Keshet

    Published 2012-01-01
    “…In this review, we describe some of the recent computational models for cell motility, concentrating on simulations of cell shape changes (mainly in two but also three dimensions). …”
    Get full text
    Article
  8. 1308

    Development and application of distributed computing system in inverse problems of fracture mechanics by Arkady N. Soloviev, Pavel V. Vasiliev, Lyubov A. Podkolzina

    Published 2017-12-01
    “…The availability of the high-quality high-speed network is desirable. This simplifies the process of the system deployment, and increases the productivity of the computing process. …”
    Get full text
    Article
  9. 1309

    Investigation of the Effectiveness of Programs Optimization Methods for Parallel Computing Systems with GPU by A. Yu. Bezruchenko, V. A. Egunov

    Published 2024-01-01
    “…This task finds its application in various fields from signal and image processing to artificial intelligence systems. Parallel computing systems equipped with GPU are chosen as the target computing architecture. …”
    Get full text
    Article
  10. 1310

    Multiobjective Offloading Optimization in Fog Computing Using Deep Reinforcement Learning by Hojjat Mashal, Mohammad Hossein Rezvani

    Published 2024-01-01
    “…Edge computing allows IoT tasks to be processed by devices with passive processing capacity at the network’s edge and near IoT devices instead of being sent to cloud servers. …”
    Get full text
    Article
  11. 1311

    Computing Continuum Simulator: A comprehensive framework for continuum architecture evaluation by Pablo Rodríguez, Sergio Laso, Javier Berrocal, Pablo Fernández, Antonio Ruiz-Cortés, Juan Manuel Murillo

    Published 2025-05-01
    “…The Computing Continuum paradigm is essential for meeting the needs of IoT applications that demand real-time processing, reliable connectivity, and low-latency response. …”
    Get full text
    Article
  12. 1312

    Edge Computing for Real-Time Climate Data Analysis in Smart Farming by Shnain Ammar Hameed, Abed Z., Annapoorna Errabelli

    Published 2025-01-01
    “…The results shows 35% saved data processing latency and 92% of the prediction accuracy in climate conditions and anomalies. …”
    Get full text
    Article
  13. 1313

    Collaborative Optimization Strategy for Dependent Task Offloading in Vehicular Edge Computing by Xiting Peng, Yandi Zhang, Xiaoyu Zhang, Chaofeng Zhang, Wei Yang

    Published 2024-12-01
    “…This paper proposes a task-offloading scheme based on deep reinforcement learning to optimize the strategy between vehicles and edge computing resources. The task-offloading problem is modeled as a Markov Decision Process, and an improved twin-delayed deep deterministic policy gradient algorithm, LT-TD3, is introduced to enhance the decision-making process. …”
    Get full text
    Article
  14. 1314

    Federated learning based intelligent edge computing technique for video surveillance by Yu ZHAO, Jie YANG, Miao LIU, Jinlong SUN, Guan GUI

    Published 2020-10-01
    “…With the explosion of global data,centralized cloud computing cannot provide low-latency,high-efficiency video surveillance services.A distributed edge computing model was proposed,which directly processed video data at the edge node to reduce the transmission pressure of the network,eased the computational burden of the central cloud server,and reduced the processing delay of the video surveillance system.Combined with the federated learning algorithm,a lightweight neural network was used,which trained in different scenarios and deployed on edge devices with limited computing power.Experimental results show that,compared with the general neural network model,the detection accuracy of the proposed method is improved by 18%,and the model training time is reduced.…”
    Get full text
    Article
  15. 1315

    Comparative analysis of computing platforms for onboard micromodule of provisional image recognition by V. A. Kovalev, D. A. Paulenka, E. V. Snezhko, V. A. Liauchuk, A. A. Kalinovski

    Published 2018-09-01
    “…The information provided in this paper could be useful for engineers and researchers who are developing compact budget mobile systems for processing, analyzing and recognition of images.…”
    Get full text
    Article
  16. 1316

    A Security Monitoring Method Based on Autonomic Computing for the Cloud Platform by Jingjie Zhang, Qingtao Wu, Ruijuan Zheng, Junlong Zhu, Mingchuan Zhang, Ruoshui Liu

    Published 2018-01-01
    “…To protect data, data monitoring is a necessary process. Based on autonomic computing, we develop a cloud data monitoring system on the cloud platform, monitoring whether the data is abnormal in the cycle and analyzing the security of the data according to the monitored results. …”
    Get full text
    Article
  17. 1317

    An Approach to Design and Implement RFID Middleware System over Cloud Computing by Wenhong Tian, Ruini Xue, Xu Dong, Haoyan Wang

    Published 2013-10-01
    “…In view of these objectives and taking especially advantages of virtualization and transparency of Cloud computing, this paper introduces an advanced RFID middleware management system (ARMMS) over Cloud computing, which provides equipment management, RFID tag information management, application level event (ALE) management, and Web service APIs and related functions. …”
    Get full text
    Article
  18. 1318

    Edge computing privacy protection method based on blockchain and federated learning by Chen FANG, Yuanbo GUO, Yifeng WANG, Yongjin HU, Jiali MA, Han ZHANG, Yangyang HU

    Published 2021-11-01
    “…Aiming at the needs of edge computing for data privacy, the correctness of calculation results and the auditability of data processing, a privacy protection method for edge computing based on blockchain and federated learning was proposed, which can realize collaborative training with multiple devices at the edge of the network without a trusted environment and special hardware facilities.The blockchain was used to endow the edge computing with features such as tamper-proof and resistance to single-point-of-failure attacks, and the gradient verification and incentive mechanism were incorporated into the consensus protocol to encourage more local devices to honestly contribute computing power and data to the federated learning.For the potential privacy leakage problems caused by sharing model parameters, an adaptive differential privacy mechanism was designed to protect parameter privacy while reducing the impact of noise on the model accuracy, and moments accountant was used to accurately track the privacy loss during the training process.Experimental results show that the proposed method can resist 30% of poisoning attacks, and can achieve privacy protection with high model accuracy, and is suitable for edge computing scenarios that require high level of security and accuracy.…”
    Get full text
    Article
  19. 1319

    Real-Time Threat Mitigation in Financial IT Infrastructures Using Quantum Computing by Jean Marie Vianney Sindayigaya

    Published 2025-06-01
    “…Quantum computing promises an unmatched level of scalable parallel processing with increased accuracy, speed, and timely response to realtime threats. …”
    Get full text
    Article
  20. 1320