Search alternatives:
processor » process (Expand Search)
processes » process (Expand Search)
Showing 1,861 - 1,880 results of 30,198 for search '(processor OR processes) (computing)', query time: 0.23s Refine Results
  1. 1861
  2. 1862
  3. 1863
  4. 1864
  5. 1865

    Microsoft excel 2019 : pivot table data crunching / by Jelen, Bill, Alexander, Michael, 1972-

    Published 2019
    Subjects: “…Microsoft Excel (Computer file) 1627…”
    View in OPAC
    Book
  6. 1866

    Analog Computing for Nonlinear Shock Tube PDE Models: Test and Measurement of CMOS Chip by Hasantha Malavipathirana, Soumyajit Mandal, Nilan Udayanga, Yingying Wang, S. I. Hariharan, Arjuna Madanayake

    Published 2025-01-01
    “…Driven by observed non-trivial improvements in performance over digital processors while solving linear partial differential equations (PDEs), this paper presents experimental results and analysis from a single-chip CMOS analog computer for solving nonlinear PDEs. …”
    Get full text
    Article
  7. 1867

    Shortcut to chemically accurate quantum computing via density-based basis-set correction by Diata Traore, Olivier Adjoua, César Feniou, Ioanna-Maria Lygatsika, Yvon Maday, Evgeny Posenitskiy, Kerstin Hammernik, Alberto Peruzzo, Julien Toulouse, Emmanuel Giner, Jean-Philip Piquemal

    Published 2024-11-01
    “…Indeed, accessing a quantitative description of chemical systems while minimizing quantum resources is an essential challenge given the limited qubit capabilities of current quantum processors. We provide a shortcut towards chemically accurate quantum computations by approaching the complete-basis-set limit through coupling the density-based basis-set corrections approach, applied to any given variational ansatz, to an on-the-fly crafting of basis sets specifically adapted to a given system and user-defined qubit budget. …”
    Get full text
    Article
  8. 1868

    FedACT: An adaptive chained training approach for federated learning in computing power networks by Min Wei, Qianying Zhao, Bo Lei, Yizhuo Cai, Yushun Zhang, Xing Zhang, Wenbo Wang

    Published 2024-12-01
    “…In this paper, we propose an adaptive chained training approach (FedACT) for FL in computing power networks. First, a Computation-driven Clustering Strategy (CCS) is designed. …”
    Get full text
    Article
  9. 1869

    A Literature Review Research on Monitoring Conditions of Mechanical Equipment Based on Edge Computing by Liqiang Song, Huaiguang Wang, Zhiyong Shi

    Published 2022-01-01
    “…To resolve this problem, this article examines the monitoring conditions of equipment based on edge computing. First, the signal is pre-processed by edge computing, so that the fault characteristics can be identified quickly. …”
    Get full text
    Article
  10. 1870

    A Computing Model of Selective Attention for Service Robot Based on Spatial Data Fusion by Huanzhao Chen, Guohui Tian

    Published 2018-01-01
    “…Both static features and dynamic features are composed in attention selection computing process. Information from sensor networks is transformed and incorporated into the model. …”
    Get full text
    Article
  11. 1871

    System for PCB Defect Detection Using Visual Computing and Deep Learning for Production Optimization by Gabriel Gomes de Oliveira, Gabriel Caumo Vaz, Marcos Antonio Andrade, Yuzo Iano, Leandro Ronchini Ximenes, Rangel Arthur

    Published 2023-01-01
    “…This study presents a system based on traditional visual computing and new deep learning methods to detect defects in electronic devices during the manufacturing process. …”
    Get full text
    Article
  12. 1872

    Computing the Dirichlet-to-Neumann map via an integral equation with the adjoint generalized Neumann kernel by Samir Naqos, Ali H.M. Murid, Mohamed M.S. Nasser, Su Hoe Yeak

    Published 2024-12-01
    “…Contrary to the classical approach which requires numerical differentiation in a post-processing step, our method allows computing the Dirichlet-to-Neumann map directly without the need of numerical differentiation in post-processing. …”
    Get full text
    Article
  13. 1873

    SREHA: An Efficient Handover Authentication Scheme Based on Social Relationships in Mobile Edge Computing by Ziwang Wang, Liang Wang, Huili Yan, Zhize Wu

    Published 2024-01-01
    “…The results demonstrate that our scheme effectively reduces the time delay of the handover authentication process, and exhibits lower computational overhead and higher security compared to existing schemes.…”
    Get full text
    Article
  14. 1874

    Foreign Body Detection Method for Transmission Equipment Based on Edge Computing and Deep Learning by Yanqiao LU, Cuiying SUN, Hongwei CAO, Hongwei YAN

    Published 2020-06-01
    “…To solve this problem, a foreign body detection method is proposed based on edge computing and deep learning. Different from the existing method that sends UAV pictures back to the cloud server for processing, this method, by sinking the detection calculation to the edge device, uses the target detection method of Mobilenet and optimized SSD to directly make process calculation in the edge device, and sends the pictures of detected foreign bodies back to the cloud server. …”
    Get full text
    Article
  15. 1875
  16. 1876

    Joint Service Caching and Computing Offloading Strategies for Electrical Equipment Intelligent IoT Platform by Yi SUN, Shaonan CHANG, Kai CHEN, Qiang CUI, Weijie SHEN

    Published 2022-04-01
    “…Mass data constitutes a challenge to the electrical equipment intelligent industrial Internet of Things (EIP), and it is urgently needed for edge computing to assist the real-time processing of data. …”
    Get full text
    Article
  17. 1877

    Time multiplexed single node reservoir computing enabled by transient photon magnon coupling by Haechan Jeon, Bojong Kim, Loïc Millet, Sang-Koog Kim

    Published 2025-06-01
    “…Abstract We present a reservoir computing system that utilizes the transient dynamics of photon-magnon coupling (PMC) for high-accuracy temporal data processing, specifically spoken-digit recognition, while minimizing hardware resources. …”
    Get full text
    Article
  18. 1878
  19. 1879
  20. 1880