Search alternatives:
processor » process (Expand Search)
processes » process (Expand Search)
Showing 14,181 - 14,200 results of 30,198 for search '(processor OR processes) (computing)', query time: 0.26s Refine Results
  1. 14181

    Realization of vOLT and development trend by Fengchao FU, Peng WANG, Yu MAO, Yongmei HUANG, Xiaobing GAO, Aihua ZHANG, Guoqiang LIN

    Published 2018-07-01
    “…SDN technology,NFV technology and cloud computing technology have been studied widely recently.How to realize vOLT based on these three techniques mentioned above was studied in order to solve theproblems that the OLTs of traditional PON faced,such as the OLTs of the PON were too difficultto operate and maintain,the resources allocation including ports,VLAN,MAC and others were not flexible,and theservice provisioning process was complicated.Four vOLT schemes were proposed.From the perspectiveof telecom operators,these four methods were compared and analyzed from the perspectives of application scenariosand the difficulty of introduction.Finally,the evolution route and the development trend of vOLT were conclued.…”
    Get full text
    Article
  2. 14182

    Realization of vOLT and development trend by Fengchao FU, Peng WANG, Yu MAO, Yongmei HUANG, Xiaobing GAO, Aihua ZHANG, Guoqiang LIN

    Published 2018-07-01
    “…SDN technology,NFV technology and cloud computing technology have been studied widely recently.How to realize vOLT based on these three techniques mentioned above was studied in order to solve theproblems that the OLTs of traditional PON faced,such as the OLTs of the PON were too difficultto operate and maintain,the resources allocation including ports,VLAN,MAC and others were not flexible,and theservice provisioning process was complicated.Four vOLT schemes were proposed.From the perspectiveof telecom operators,these four methods were compared and analyzed from the perspectives of application scenariosand the difficulty of introduction.Finally,the evolution route and the development trend of vOLT were conclued.…”
    Get full text
    Article
  3. 14183

    Private Cloud Assistant Trust Model for P2P Secure Transactions by Wei Lin, Xianghan Zheng

    Published 2015-01-01
    “…With a few characteristics during computing and storage process(e.g. high efficiency, security, neutrality), private cloud platform is capable to provide trustworthiness calculation, storage and evaluation for each peer in P2P network. …”
    Get full text
    Article
  4. 14184

    机构综合的刚体运动混沌反控制方法研究 by 罗佑新

    Published 2008-01-01
    “…The discovery of dynamical chaos is one of the main achievements in the modern science and how to expand its application has important significance to the development of modern science.Many questions in natural science and engineering are transformed into nonlinear equations to be found,Newton iterative method is an important technique to one dimensional and multidimensional variables and iterative process exhibits sensitive dependence on initial guess point.For the first time,a new method to find all solutions based on utilizing anti-control of chaos in rigid body motion to obtain locate initial points to find all solutions of the nonlinear questions was proposed.The range of chaotic variables is bigger than other methods and the chaotic variables are not emanative,so the computing time is less than other.The numerical examples in linkage synthesis and approximate synthesis show that the method is correct and effective.…”
    Get full text
    Article
  5. 14185

    Physarum Boats: If Plasmodium Sailed It Would Never Leave a Port by Andrew Adamatzky

    Published 2010-01-01
    “…The plasmodium is a promising substrate for non-classical, nature-inspired computing devices. It is capable of approximation of the shortest path in a maze, computation of planar proximity graphs and plane tessellations, primitive memory and decision making. …”
    Get full text
    Article
  6. 14186

    Matrix Approaches for Covering-Based Multigranulation Fuzzy Rough Set Models by Zaibin Chang, Junchao Wei

    Published 2023-01-01
    “…Hence, presenting novel methods to compute them quickly is our motivation for this paper. …”
    Get full text
    Article
  7. 14187
  8. 14188

    NUMERICAL SIMULATION OF TEMPERATURE FIELD AND STRESS FIELD FOR BRAKE DISK IN MINE HOIST by YANG Ying, YE Chao, ZOU ShenYong

    Published 2017-01-01
    “…Based on the of theory heat conduction and thermal-elasticity,simulated the braking process of mine hoist. The changing laws of the boundary condition on the brake disc’s surface during braking were analyzed and the computing method of the convective coefficient was discussed emphatically. …”
    Get full text
    Article
  9. 14189

    A Quantum Implementation Model for Artificial Neural Networks by Ammar Daskin

    Published 2018-02-01
    “… The learning process for multilayered neural networks with many nodes makes heavy demands on computational resources. …”
    Get full text
    Article
  10. 14190

    Application of flexible electronic materials and devices by Cuiping YU, Yuanan LIU, Yangliu LI, Xia GUO

    Published 2019-09-01
    “…New flexible electronic materials and devices have been developed rapidly in nearly a decade from the proposition,discovery,implementation to application.The impact of its strong fold ability and multi-capacity composite structures to technological development and system applications will be enormous.Two mainstream flexible implementation methods were compared:the material-induced flexibility and the structure-induced flexibility.The research progress of domestic and international in related fields was analyzed,including infrastructure,process and potential application directions,and the technical problems faced were summarized.According to the basic research status,flexible electronic devices will have mature application technology innovations achievements in the next few years,new and unprecedented wearable communication,wearable computing,distributed energy,environmental sensing,conformal display devices and devices will be formed.…”
    Get full text
    Article
  11. 14191

    Research on the consensus of big data systems based on RDMA and NVM by Hao WU, Kang CHEN, Yongwei WU, Weimin ZHENG

    Published 2019-07-01
    “…Distributed storage systems and computing systems are the foundation for constructing big data processing systems.High availability of the system is the cornerstone of any distributed system.High-availability technologies generally rely on consensus protocols.The classic non-Byzantine distributed consensus protocol was discussed,as well as the RDMA communication protocol and NVM storage media under the development of new technologies to achieve higher performance high availability systems by combining them.The consensus protocol to make the better use of the features of RDMA and NVM was modified.The implemented system effectively improves the performance of the protocol while ensuring the consistency and availability of the system data.Experiments show that the system implemented in this paper can achieve 40% performance improvement compared to existing systems.…”
    Get full text
    Article
  12. 14192

    Cyber-physical-social system:a data-centric framework by Shuying ZHAI, Bin GUO, Ru LI, Tingliang WANG, Zhiwen YU, Xingshe ZHOU

    Published 2017-11-01
    “…Cyber-physical-social system(CPSS) connects the cyber space,the physical space,and the social space,which has become a promising human-in-the-loop computing system.The unique features of CPSS from the data-centric level were characterized,including the interweaving of spatio-temporal data,the fusion of cross-space data and the collaboration of human and machine intelligence.Furthermore,a general framework for data-centric CPSS was built,with the underpinnings such as resource management,collaborative sensing,data pre-processing,data fusion,and privacy protection.Finally,the major application areas of data-centric CPSS (e.g.…”
    Get full text
    Article
  13. 14193

    Security risk analysis of power 5G hybrid networking by Xiaojian ZHANG, Jiaxuan FEI, Haitao JIANG, Qigui YAO

    Published 2022-01-01
    “…5G communication technology provides strong support for the power internet of things, and it also introduces new security challenges in the application process of the power industry.Starting from the analysis of the needs of the power 5G business, five 5G networking deployment and construction plans were proposed, and a comparative analysis of them was conducted in security and cost.And then, a hybrid networking architecture of 5G and power communication networks was proposed, and the 5G network slicing architecture was re-segmented according to business scenarios.Finally, from the four parts of terminal access, edge computing, network channel and core network, the security risks introduced by 5G technology were analyzed in detail.…”
    Get full text
    Article
  14. 14194

    Écologie sociale et humanités numériques : intégrer la poésie à la science by Ada Desideri, Alexandre Détruit, Bianca Vallarano

    Published 2025-06-01
    “…Do DH have a role to play in a process of degrowth? How would an ecological DH project be organised? …”
    Get full text
    Article
  15. 14195

    Probabilistic approach to robust wearable gaze tracking by Miika Toivanen, Kristian Lukander, Kai Puolamäki

    Published 2017-11-01
    “…This paper presents a method for computing the gaze point using camera data captured with a wearable gaze tracking device. …”
    Get full text
    Article
  16. 14196

    Exploration of crowdsourcing in information extraction from remote sensing images by Jianghua ZHAO, Xuezhi WANG, Qinghui LIN, Jianhui LI, Yuanchun ZHOU

    Published 2016-11-01
    “…Based on geospatial data cloud(GSCloud),the application of crowdsourcing in large scale information extraction from satellite images was studied,and a systematic architecture of this paradigm was proposed.By performing an experiment of extracting lakes on Qinghai-Tibetan plateau from landsat images,various aspects of the paradigm like the incentive mechanism,task assignment method,task division and many others were explored.Results show that paying part of the reward in advance and assigning a task to a team instead of individuals do not help attracting more applicants and improving the quality of results.And the accumulation of talents is of critical importance to obtain high-quality task results.Since this paradigm integrates crowdsourcing and machine computing power,and it is generic,it can be applied in more massive remote sensing image processing work which requires much human intervention.…”
    Get full text
    Article
  17. 14197

    Online Discrete Anchor Graph Hashing for Mobile Person Re-Identification by Liang Xie, Xi Fang

    Published 2021-01-01
    “…Besides, mobile person re-id task also requires real-time processing. In this paper, we propose a novel hashing method: online discrete anchor graph hashing (ODAGH) for mobile person re-id. …”
    Get full text
    Article
  18. 14198

    Reverse-Engineered Exact Control of Population Transfer in Lossy Nonlinear Three-State Systems by Artur Ishkhanyan

    Published 2024-10-01
    “…These features open doors for practical implementation and scalability in quantum technologies, with potential applications in quantum information processing, quantum computing, and quantum communication.…”
    Get full text
    Article
  19. 14199

    Design of Block-Scrambling-Based privacy protection mechanism in healthcare using fusion of transfer learning models with Hippopotamus optimization algorithm by Ghada Moh. Samir Elhessewi, Mohammed Yahya Alzahrani, Mohammad Alamgeer, Abdulbasit A. Darem, Da’ad Albalawneh, Mohammed Alqahtani, Mutasim Al Sadig, Sultan Alanazi

    Published 2025-07-01
    “…At first, the block-scrambling-based encryption (BSBE) technique is utilized in the image encryption pre-processing stage, and then the decryption process is performed. …”
    Get full text
    Article
  20. 14200