Search alternatives:
processor » process (Expand Search)
processes » process (Expand Search)
Showing 13,941 - 13,960 results of 30,198 for search '(processor OR processes) (computing)', query time: 0.27s Refine Results
  1. 13941
  2. 13942
  3. 13943
  4. 13944
  5. 13945

    Geometric properties of quantum entanglement and machine learning by S. V. Zuev

    Published 2023-10-01
    “…A proprietary quantum computing emulator is used (it is in the public domain).Results. …”
    Get full text
    Article
  6. 13946

    2D Particle Filter Accelerator for Mobile Robot Indoor Localization and Pose Estimation by Omer Tariq, Dongsoo Han

    Published 2024-01-01
    “…Particle filtering is a reliable Monte Carlo algorithm for estimating the state of a system in modeling non-linear, non-gaussian elements for estimation and tracking applications in various fields, including robotics, navigation, and computer vision. However, particle filtering can be computationally expensive, particularly in high-dimensional state spaces, and can be a bottleneck for real-time applications due to high memory consumption. …”
    Get full text
    Article
  7. 13947

    Calculation of Neural Network Weights and Biases Using Particle Swarm Optimization by Jerin Paul Selvan, Girish Pandurang Potdar

    Published 2024-01-01
    “…By using a different approach, bio-inspired computing can be distinguished from other traditional algorithms. …”
    Get full text
    Article
  8. 13948

    Interactive Learning Tool for System of Linear Equations: Bridging the Gap Between Novice and Expert Through MATLAB-Based Solutions by Reem A. Alnanih, Lamiaa A. Elrefaei

    Published 2024-01-01
    “…The tool allows learners to compare methods based on criteria such as computation time, iteration count, and error margin, using MATLAB solutions as a benchmark for accuracy on systems of any size. …”
    Get full text
    Article
  9. 13949

    Supply Chain Management Using Evolutionary Algorithms by Skitsko Volodymyr I., Voinikov Mykola Yu.

    Published 2024-09-01
    “…The era of digital transformation has made it possible to accumulate large amounts of data that can be used in the decision-making process, in particular in supply chain management. …”
    Get full text
    Article
  10. 13950
  11. 13951
  12. 13952

    Domain-Specific Modeling Language for Security Analysis of EV Charging Infrastructure by Anas Motii, Mahmoud El Hamlaoui, Robert Basmadjian

    Published 2024-11-01
    “…Indeed, EVs have evolved into sophisticated computer systems with extensive internal and external communication capabilities. …”
    Get full text
    Article
  13. 13953
  14. 13954

    High-performance reconfigurable encryption scheme for distributed storage by Zhihua FENG, Yuxuan ZHANG, Chong LUO, Jianing WANG

    Published 2023-10-01
    “…As the world embraces the digital economy and enters an information society, data has emerged as a critical production factor.The collection, processing, and storage of data have become increasingly prevalent.Distributed storage systems, known for their efficiency, are widely used in various data fields.However, as the scale of data storage continues to expand, distributed storage faces more significant security risks, such as information leakage and data destruction.These challenges drive the need for innovative advancements in big data distributed storage security technology and foster the integration of domestic cryptographic technology with computing storage technology.This work focused on addressing security issues, particularly information leakage, in distributed storage nodes.A dynamic and reconfigurable encryption storage solution was proposed, which considered the requirements for encryption performance and flexibility.A high-performance reconfigurable cryptographic module was designed based on the bio mapping framework.Based on this module, multiple storage pools equipped with different cryptographic algorithms were constructed to facilitate high-performance encryption and decryption operations on hard disk data.The scheme also enabled dynamic switching of cryptographic algorithms within the storage pools.A cryptographic protocol with remote online loading functions for cryptographic algorithms and keys was developed to meet the unified management and convenient security update requirements of reconfigurable cryptographic modules in various storage nodes.Furthermore, the scheme implemented fine-grained data encryption protection and logical security isolation functions based on cryptographic reconstruction technology.Experimental results demonstrate that the performance loss of this scheme for encryption protection and security isolation of stored data is approximately 10%.It provides a technical approach for distributed storage systems to meet the cryptographic application technology requirements outlined in GB/T 39786-2021 “Information Security Technology-Basic Requirements for Cryptography Applications” Level 3 and above in terms of device and computing security, application and data security.…”
    Get full text
    Article
  15. 13955

    Optimized memory allocation in edge-PLCs using Deep Q-Networks and bidirectional LSTM with Quantum Genetic Algorithm by N. Naveen Kumar, S. Saravana, S. Balamurugan, P. Seshu Kumar, S. Suresh

    Published 2024-12-01
    “…Moreover, we introduce Quantum Genetic Algorithm Optimization, a cutting-edge approach that infuses quantum-inspired principles into the traditional genetic algorithm framework, to further refine the memory allocation process. By leveraging principles of quantum computing, this optimization algorithm explores the solution space more efficiently, allowing for faster convergence and improved performance. …”
    Get full text
    Article
  16. 13956
  17. 13957

    How to detect occluded crosswalks in overview images? Comparing three methods in a heavily occluded area by Yuanyuan Zhang, Joseph Luttrell, IV, Chaoyang Zhang

    Published 2025-03-01
    “…While automated methods based on computer vision have been explored to detect crosswalks from aerial images, a major obstacle to their application is the handling of candidate crosswalks occluded by objects or shadows in the aerial imagery. …”
    Get full text
    Article
  18. 13958
  19. 13959

    Mobile-Commerce Usage Challenges among University Students in Uganda: A Case of Kabale University. by Phelix, Businge Mbabazi, Micheal, Tamale, Patricia, Kyomugisha

    Published 2020
    “…Mobile commerce (m-commerce) is a new trend in e-commerce that covers a number of services that are conducted online with the help of various computing devices. These services include among others; mobile financial services e.g., mobile banking, mobile payments, mobile brokering etc., mobile shopping services e.g., mobile ticketing and mobile auctioning, and mobile entertainment services e.g., mobile music, mobile gaming, mobile movies, etc. …”
    Get full text
    Article
  20. 13960