Search alternatives:
processor » process (Expand Search)
processes » process (Expand Search)
Showing 1,581 - 1,600 results of 30,198 for search '(processor OR processes) (computing)', query time: 0.22s Refine Results
  1. 1581
  2. 1582

    Cyber-physical-social-thinking modeling and computing for geological information service system by Yueqin Zhu, Yongjie Tan, Ruixin Li, Xiong Luo

    Published 2016-11-01
    “…With the development of computer and Internet service model, it is now possible to obtain rich data and process the data with some advanced computing techniques under network environment. …”
    Get full text
    Article
  3. 1583

    Artificial Intelligence for Unstructured Data Processing by Yohanes Bowo Widodo, Febrianti Widyahastuti, Mohammad Narji, Sondang Sibuea

    Published 2025-03-01
    “…Artificial Intelligence (AI) has become an innovative solution in addressing this challenge through techniques such as Natural Language Processing (NLP), Computer Vision, and Machine Learning. …”
    Get full text
    Article
  4. 1584

    A Dual‐Modal Memory Organic Electrochemical Transistor Implementation for Reservoir Computing by Yuyang Yin, Shaocong Wang, Ruihong Weng, Na Xiao, Jianni Deng, Qian Wang, Zhongrui Wang, Paddy Kwok Leung Chan

    Published 2025-01-01
    “…Neuromorphic computing devices offer promising solutions for next‐generation computing hardware, addressing the high throughput data processing demands of artificial intelligence applications through brain‐mimicking non‐von Neumann architecture. …”
    Get full text
    Article
  5. 1585
  6. 1586

    Stock volatility as an anomalous diffusion process by Rubén V. Arévalo, J. Alberto Conejero, Òscar Garibo-i-Orts, Alfred Peris

    Published 2024-12-01
    “…Our architecture combines convolutional and recurrent neural networks (bidirectional long short-term memory units). Our model computes the diffusion exponent of a financial time series to measure its volatility and it categorizes market movements into five diffusion models: annealed transit time motion (ATTM), continuous time random walk (CTRW), fractional Brownian motion (FBM), Lévy walk (LW), and scaled Brownian motion (SBM).Our findings suggest that the diffusion exponent derived from anomalous diffusion processes provides insightful and novel perspectives on stock market volatility. …”
    Get full text
    Article
  7. 1587
  8. 1588

    Optimising complexity and learning for photonic reservoir computing with gain-controlled multimode fibres by Giulia Marcucci, Luana Olivieri, Juan Sebastian Totero Gongora

    Published 2025-08-01
    “…Within this framework, Reservoir Computing (RC) and Extreme Learning Machines (ELM) are powerful approaches that leverage the dynamics of a complex nonlinear system to process information. …”
    Get full text
    Article
  9. 1589

    Research on distributed multi-access edge computing based on mimic defense theory by Hongyi ZHU, Xiaoyuan LU, Yi LI

    Published 2019-09-01
    “…The highly efficient network resources are provided by multi-access edge computing at the edge of the network,but high security capability is required also due to its distributed position and organization.Based on mimic defense theory,mimic defense structure for distributed multi-access edge computing was proposed.By segmenting data,padding check data and processing data at multiple edge node,dynamic scheduling and decision-making functions according to checksum were implemented.The simulation results show that with the increase of delay cost,the data manipulation and leak rates can be reduced effectively by the proposed structure.The edge node scheduling strategy based on trust and cost is proposed to improve the efficiency and security of the system.…”
    Get full text
    Article
  10. 1590

    Research on Migration or Deployment of Telecom Network Management System on Cloud Computing Network by Afang Song, Lian Lin, Faguang Wang

    Published 2015-06-01
    “…Some key problems of system migration or deployment process on cloud computing network were analyzed. …”
    Get full text
    Article
  11. 1591

    Processivity and coupling in messenger RNA transcription. by Stuart Aitken, Marie-Cécile Robert, Ross D Alexander, Igor Goryanin, Edouard Bertrand, Jean D Beggs

    Published 2010-01-01
    “…These processes include elongation, which has a minimum time for completion and processing that is not captured in the model.…”
    Get full text
    Article
  12. 1592

    An efficient IoT group association and data sharing mechanism in edge computing paradigm by Haowen Tan

    Published 2023-12-01
    “…Despite its benefits and promising future, security and privacy challenges for the IoT wireless communication of edge computing environment remain unaddressed. As a result, proper authentication mechanisms are critical, especially in the extreme scenario where some edge facilities are not functional. …”
    Get full text
    Article
  13. 1593

    An FPGA-Based Quantum Computing Emulation Framework Based on Serial-Parallel Architecture by Y. H. Lee, M. Khalil-Hani, M. N. Marsono

    Published 2016-01-01
    “…Hardware emulation of quantum systems can mimic more efficiently the parallel behaviour of quantum computations, thus allowing higher processing speed-up than software simulations. …”
    Get full text
    Article
  14. 1594

    Quantum Computing and Machine Learning in Medical Decision-Making: A Comprehensive Review by James C. L. Chow

    Published 2025-03-01
    “…Medical decision-making is increasingly integrating quantum computing (QC) and machine learning (ML) to analyze complex datasets, improve diagnostics, and enable personalized treatments. …”
    Get full text
    Article
  15. 1595

    Beamforming and resource optimization in UAV integrated sensing and communication network with edge computing by Bin LI, Sicong PENG, Zesong FEI

    Published 2023-09-01
    “…To address the dependence of traditional integrated sensing and communication network mode on ground infrastructure, the unmanned aerial vehicle (UAV) with edge computing server and radar transceiver was proposed to solve the problems of high-power consumption, signal blocking, and coverage blind spots in complex scenarios.Firstly, under the conditions of satisfying the user’s transmission power, radar estimation information rate and task offloading proportion limit, the system energy consumption was minimized by jointly optimizing UAV radar beamforming, computing resource allocation, task offloading, user transmission power, and UAV flight trajectory.Secondly, the non-convex optimization problem was reformulated as a Markov decision process, and the proximal policy optimization method based deep reinforcement learning was used to achieve the optimal solution.Simulation results show that the proposed algorithm has a faster training speed and can reduce the system energy consumption effectively while satisfying the sensing and computing delay requirements.…”
    Get full text
    Article
  16. 1596

    A Microgrid Security Defense Method Based on Cooperation in an Edge-Computing Environment by Jian Shang, Runmin Guan, Changlu Shen

    Published 2023-01-01
    “…Aiming at the problems of high delay and vulnerable to network attack in the traditional microgrid centralized architecture, a collaborative microgrid security defense method in the edge-computing environment is proposed. First, we build the edge-computing framework for microgrid, deploy the edge-computing server near the equipment terminal to improve the data processing efficiency, and deploy the blockchain in the edge server to ensure the reliability of the system. …”
    Get full text
    Article
  17. 1597

    Verifiable access control scheme based on unpaired CP-ABE in fog computing by Jiangtao DONG, Peiwen YAN, Ruizhong DU

    Published 2021-08-01
    “…Fog computing extends computing power and data analysis applications to the edge of the network, solves the latency problem of cloud computing, and also brings new challenges to data security.Attribute encryption based on ciphertext strategy (CP-ABE) is a technology to ensure data confidentiality and fine-grained access control.The excessive computational overhead of bilinear pairing restricts its application and development.In response to this, a verifiable access control scheme was proposed based on unpaired CP-ABE in fog computing.In order to make CP-ABE more efficient, simple scalar multiplication in elliptic curve encryption was used to replace bilinear pairing, thereby reducing the overall computational overhead.Decryption operations were outsourced to fog nodes to reduce user computational complexity, and based on the tamper-proof and traceable characteristics of the blockchain, the correctness of the access transaction was verified and the access authorization process was recorded.Security and performance analysis shows that the scheme is safe under the elliptic curve decision-making DBDH (Diffie-Hellman) assumption, and the calculation efficiency is higher.…”
    Get full text
    Article
  18. 1598

    Computing mutual similarity of 3D human faces in nearly linear time. by Radek Ošlejšek, Petra Urbanová, Jiří Sochor

    Published 2025-01-01
    “…While the algorithms for automated registration (geometrical alignment) and similarity measurement of two facial scans are well-known and used in practice, their direct application for batch processing is limited due to computational requirements. …”
    Get full text
    Article
  19. 1599

    Enhancing healthcare AI stability with edge computing and machine learning for extubation prediction by Kuo-Yang Huang, Ying-Lin Hsu, Che-Liang Chung, Huang-Chi Chen, Ming-Hwarng Horng, Ching-Hsiung Lin, Ching-Sen Liu, Jia-Lang Xu

    Published 2025-05-01
    “…Abstract The advancement of the Internet of Medical Things (IoMT) has revolutionized data acquisition and processing in critical care settings. Given the pivotal role of ventilators, accurately predicting extubation outcomes is essential to optimize patient care. …”
    Get full text
    Article
  20. 1600

    Computing Legal Analysis: A Guided Approach to Problem Solving in Contract Law by Marton Ribary, Antony Starza-Allen

    Published 2023-11-01
    “…Computational thinking allows students to visualise connections between the initial categorisation of legal information and the constitutive elements of a persuasive legal argument to articulate and demystify the process of producing legal advice.…”
    Get full text
    Article