Search alternatives:
processor » process (Expand Search)
processes » process (Expand Search)
Showing 14,541 - 14,560 results of 30,198 for search '(processor OR processes) (computing)', query time: 0.21s Refine Results
  1. 14541

    All-optical memory based on surface plasmons and Kerr-type nonlinear cavity by Dariush Jafari, Mohammad Danaie

    Published 2025-07-01
    “…These advantages position the proposed design as an ideal candidate for high-performance optical computing systems and on-chip memory applications, addressing key challenges in photonic data processing.…”
    Get full text
    Article
  2. 14542
  3. 14543

    Speech Encryption Algorithm Based on Nonorthogonal Quantum State with Hyperchaotic Keystreams by F. J. Farsana, K. Gopakumar

    Published 2020-01-01
    “…With the advancement in modern computational technologies like cloud computing, there has been tremendous growth in the field of data processing and encryption technologies. …”
    Get full text
    Article
  4. 14544

    Multi-scale approach for the analysis of the stress fields at a contact edge in fretting fatigue conditions with a crack analogue approach by C. Montebello, S. Pommier, K. Demmou, J. Leroux, J. Mériaux

    Published 2015-07-01
    “…This description is obtained through nonintrusive post-processing of FE computation and is conceived in order to be easily implementable in the industrial context. …”
    Get full text
    Article
  5. 14545
  6. 14546

    AlBERTo: Modeling Italian Social Media Language with BERT by Marco Polignano, Valerio Basile, Pierpaolo Basile, Marco de Gemmis, Giovanni Semeraro

    Published 2019-12-01
    “…Natural Language Processing tasks recently achieved considerable interest and progresses following the development of numerous innovative artificial intelligence models released in recent years. …”
    Get full text
    Article
  7. 14547

    Approach of detecting low-rate DoS attack based on combined features by Zhi-jun WU, Jing-an ZHANG, Meng YUE, Cai-feng ZHANG

    Published 2017-05-01
    “…LDoS (low-rate denial of service) attack is a kind of RoQ (reduction of quality) attack which has the characteristics of low average rate and strong concealment.These characteristics pose great threats to the security of cloud computing platform and big data center.Based on network traffic analysis,three intrinsic characteristics of LDoS attack flow were extracted to be a set of input to BP neural network,which is a classifier for LDoS attack detection.Hence,an approach of detecting LDoS attacks was proposed based on novel combined feature value.The proposed approach can speedily and accurately model the LDoS attack flows by the efficient self-organizing learning process of BP neural network,in which a proper decision-making indicator is set to detect LDoS attack in accuracy at the end of output.The proposed detection approach was tested in NS2 platform and verified in test-bed network environment by using the Linux TCP-kernel source code,which is a widely accepted LDoS attack generation tool.The detection probability derived from hypothesis testing is 96.68%.Compared with available researches,analysis results show that the performance of combined features detection is better than that of single feature,and has high computational efficiency.…”
    Get full text
    Article
  8. 14548

    Discounted-likelihood valuation of variance and volatility swaps by Napat Rujeerapaiboon, Sanae Rujivan, Hongdan Chen

    Published 2025-01-01
    “…The proposed framework embraces a worst-case perspective while exploiting the underlier’s stochastic process, representing a combination of robust optimization and stochastic programming. …”
    Get full text
    Article
  9. 14549

    Forming the Foundations of the “Digital Silk Road” by Yiju Liu, E. F. Avdokushin

    Published 2019-12-01
    “…Electronic commerce, as well as several new technologies used on the routes of the new silk road like the Internet, artificial intelligence, big data, cloud computing, blockchain, are becoming a basis of new Silk Road. …”
    Get full text
    Article
  10. 14550
  11. 14551

    Provisioning of Live Container Migration in Edge/Cloud Environments: Techniques and Challenges by Radhwan Al-Bayram, Rawaa Qasha

    Published 2025-06-01
    “…In IoT applications and edge/cloud deployment, the live container migration can substantially reduce computing system overheads by minimizing the migration time and transmitting minimum memory pages from the source host without interrupting the service process. …”
    Get full text
    Article
  12. 14552

    Autonomous Landing of a Fixed-Wing UAV With RTK GNSS and MEMS IMU by Lu Xia, Jianqing Li

    Published 2025-01-01
    “…The flight test results prove that it is feasible to implement the autonomous landing process of fixed-wing UAV with the proposed system and method.…”
    Get full text
    Article
  13. 14553

    Security protocol of wireless sensor networks localization: analysis and performance by Omar Faruq, Fariha Ahmad Chowdhury, Abu Sazzad Md Parvez, Narayan Chandra Nath, Preanka Kabiraj

    Published 2025-04-01
    “…Our main objective is to secure the process of transferring data to the base station. …”
    Get full text
    Article
  14. 14554

    Diffraction-Based Overlay Metrology With Optical Convolution Layer by Jinyang Li, Hung-Fei Kuo

    Published 2023-01-01
    “…Overlay is a crucial indicator of manufacturing processing between layers. Currently, diffraction-based overlay (DBO) is widely adopted in overlay metrology. …”
    Get full text
    Article
  15. 14555

    Using AI and NLP for Tacit Knowledge Conversion in Knowledge Management Systems: A Comparative Analysis by Ouissale Zaoui Seghroucheni, Mohamed Lazaar, Mohammed Al Achhab

    Published 2025-02-01
    “…This paper presents a comparative analysis of natural language processing (NLP) algorithms used for document and report mining to facilitate tacit knowledge conversion. …”
    Get full text
    Article
  16. 14556
  17. 14557

    WebTephraCalc: a tephra fall volume estimation system using WebGIS and OGC web services by Joel Bandibas, Shinji Takarada

    Published 2025-05-01
    “…This is coupled with the formulation of web services used to access and process web-based geospatial contents. This paper presents a WebGIS system developed to compute tephra fall volume with exponential, power law, and Weibull models, as well as the segment integration computing method, using isopach tephra fall data accessed with web services. …”
    Get full text
    Article
  18. 14558
  19. 14559
  20. 14560