Search alternatives:
processor » process (Expand Search)
processes » process (Expand Search)
Showing 14,261 - 14,280 results of 30,198 for search '(processor OR processes) (computing)', query time: 0.25s Refine Results
  1. 14261

    All-optical Fourier neural network using partially coherent light by Jianwei Qin, Yanbing Liu, Yan Liu, Xun Liu, Wei Li, Fangwei Ye

    Published 2025-09-01
    “…These findings underscore partially coherent light's potential to optimize optical neural networks, delivering dependable and efficient solutions for applications demanding consistent accuracy and robustness across diverse conditions, including on-chip optical computing, photonic interconnects, and reconfigurable optical processors.…”
    Get full text
    Article
  2. 14262

    From data to dynamics: Reconstructing soliton collision phenomena in optical fibers using a convolutional autoencoder by Qibo Xu, Jifang Rong, Qilin Zeng, Xiaofang Yuan, Longnv Huang, Hua Yang

    Published 2024-12-01
    “…Additionally, by adjusting the training parameters of the convolutional autoencoder model, its reconstruction performance for nonlinear dynamic processes was further validated. This method is expected to provide a different perspective for studying nonlinear phenomena in optical fibers while reducing the consumption of computational resources.…”
    Get full text
    Article
  3. 14263

    Enhancing Binary Convolutional Neural Networks for Hyperspectral Image Classification by Xuebin Tang, Ke Zhang, Xiaolei Zhou, Lingbin Zeng, Shan Huang

    Published 2024-11-01
    “…Nonetheless, the high degree of parameterization inherent in CNN models necessitates considerable computational and storage resources, posing challenges to their deployment in processors with limited capacity like drones and satellites. …”
    Get full text
    Article
  4. 14264
  5. 14265

    Simulation of Vertical Movements of Seawater in Stratified Reservoirs by N. V. Kudinov, A. A. Filina, A. V. Nikitina, D. V. Bondarenko, I. F. Razveeva

    Published 2023-07-01
    “…Introduction. In the field of computational mathematics, there are many ways to approximate the model of fluid mechanics. …”
    Get full text
    Article
  6. 14266
  7. 14267

    Innovations in catalytic understanding: A journey through advanced characterization by Ifeanyi Michael Smarte Anekwe, Stephen Okiemute Akpasi, Emeka Michael Enemuo, Darlington Ashiegbu, Sherif Ishola Mustapha, Yusuf Makarfi Isa

    Published 2024-12-01
    “…Significant advances, including the application of computational techniques, in the study of catalysts are also discussed, focusing on state-of-the-art techniques that provide unprecedented detail on catalyst properties, mechanisms and processes. …”
    Get full text
    Article
  8. 14268

    Parametric Multielement Coupling Architecture for Coherent and Dissipative Control of Superconducting Qubits by G.B.P. Huber, F.A. Roy, L. Koch, I. Tsitsilin, J. Schirk, N.J. Glaser, N. Bruckmoser, C. Schweizer, J. Romeiro, G. Krylov, M. Singh, F.X. Haslbeck, M. Knudsen, A. Marx, F. Pfeiffer, C. Schneider, F. Wallner, D. Bunch, L. Richard, L. Södergren, K. Liegener, M. Werninghaus, S. Filipp

    Published 2025-07-01
    “…As systems for quantum computing keep growing in size and number of qubits, challenges in scaling the control capabilities are becoming increasingly relevant. …”
    Get full text
    Article
  9. 14269

    Bias-field digitized counterdiabatic quantum optimization by Alejandro Gomez Cadavid, Archismita Dalal, Anton Simen, Enrique Solano, Narendra N. Hegade

    Published 2025-04-01
    “…We validate these findings through experimental implementations on both trapped-ion quantum computers and superconducting processors, tackling a maximum weighted independent set problem with 36 qubits and a spin glass on a heavy-hexagonal lattice with 100 qubits, respectively. …”
    Get full text
    Article
  10. 14270
  11. 14271

    Construction and Evaluation of Scenarios as a Learning Strategy through Modelling-Simulation by Juan Luis Peñaloza Figueroa, Carmen Vargas Perez

    Published 2014-12-01
    “…The inclusion of new computing and communication resources to the learning process turns them into teaching tools, which makes it possible to organize the teaching and learning process in a different way. …”
    Get full text
    Article
  12. 14272
  13. 14273
  14. 14274

    QSAC: Quantum-assisted Secure Audio Communication using quantum entanglement, audio steganography, and classical encryption by Md. Raisul Islam Rifat, Md. Mizanur Rahman, Md. Abdul Kader Nayon, Md Shawmoon Azad, M.R.C. Mahdy

    Published 2025-10-01
    “…The emergence of quantum computing poses a significant security threat to the current classical cryptography system since it has the potential to outperform the current classical computer in some specific tasks due to its unique principle of operation. …”
    Get full text
    Article
  15. 14275

    Towards Generative Governance: Co‐Creation With Emerging Technologies to Address Climate Challenges in Cities by Cesar Casiano Flores, A. Paula Rodriguez Müller, Evrim Tan

    Published 2025-07-01
    “…This thematic issue explores how co‐creation processes, facilitated by emerging technologies, can help cities in addressing complex climate adaptation challenges. …”
    Get full text
    Article
  16. 14276

    NMR-spectral and structural characteristics of new pyridoxine derivatives by A.S. Tarasov, I.Z. Rakhmatullin, Yu.G. Shtyrlin, V.V. Klochkov

    Published 2019-06-01
    “…The lineshape analysis of obtained spectra was carried out and the values of rate constants of the exchange of assumed conformational processes were calculated in the WinDNMR computer program. …”
    Get full text
    Article
  17. 14277

    Consistent responses to black carbon and carbon dioxide at global and 100 m model resolutions by Camilla W. Stjern, Øivind Hodnebrog, Gunnar Myhre

    Published 2025-07-01
    “…Abstract Climate responses to external forcings involve processes across a wide range of scales. While the ability of climate models to accurately simulate these responses remains uncertain, the computational cost of high-resolution models limits their use for long-term simulations. …”
    Get full text
    Article
  18. 14278

    RESEARCH ON DEEP NEURAL NETWORK LEARNING BASED ON IMPROVED BP ALGORITHM by HUANG Pei

    Published 2018-01-01
    “…Deep learning can make the computing model that contains a number of processing layers to learn the data that contains many levels of abstract representation.This kind of learning way in the most advanced speech recognition,visual object recognition,object detection and many other areas,such as biology,genetics and medicine brought significant improvement.Deep learning can find the complex structure of large data,and the convolution neural network as one of the important models of the depth study in the processing of voice,image,video and text,and other aspects of a new breakthrough.It is the use of BP algorithm to guide the machine how to get the error before the layer to adjust the parameters of this layer,so that these parameters are more conducive to the calculation of the model.In view of the shortcomings of traditional BP algorithm,a fast BP algorithm is proposed,which has the disadvantages of slow convergence speed and often falls into local minimum points.The improved convolutional neural network is used to validate the data set MNIST,English character recognition and medical image.The simulation results show the effectiveness of the proposed algorithm.…”
    Get full text
    Article
  19. 14279
  20. 14280

    Research on 5G MEC security assessment system and method by Qiucheng LU, Jinhui TANG, Congying BAO, Hao WU, Yusun FU

    Published 2023-08-01
    “…Multi-access edge computing (MEC) is deployed at the edge of the network, enabling efficient and fast data processing in mobile networks, while also undertaking important security functions, making MEC a prime target for attackers.Therefore, MEC nodes will face huge security risks.How to accurately evaluate and quantify MEC security capabilities is an urgent issue to be solved.For accurately evaluating and quantifying MEC security capabilities, the MEC safety assessment system was proposed in combination with MEC safety risks.The assessment indicators selected in the assessment system comprehensively reflect the basic characteristics of MEC and its complete safety capability.Based on this evaluation system, the MEC security evaluation method was designed by using the analytic hierarchy process (AHP) and fuzzy evaluation, the MEC vulnerability scoring system was creatively proposed, and the evaluation indicators were provided based on the results of MEC vulnerability scoring system, the MEC security capability quantification value was finally calculated.The experimental result proves the effectiveness of the method.…”
    Get full text
    Article