Showing 221 - 240 results of 249 for search 'Computer data storage', query time: 0.06s Refine Results
  1. 221

    Simulation Analysis of a Multiple-Vehicle, High-Speed Train Collision Using a Simplified Model by Suchao Xie, Weilin Yang, Ping Xu

    Published 2018-01-01
    “…In comparison to the full-size finite element model, it is more specific, had more rapid computational speed, and saved a large amount of computational power and storage space. …”
    Get full text
    Article
  2. 222

    Innovative IaaS Management System for Sensor Devices and IT Resources by Hitomi Takahashi, Takayuki Kushida

    Published 2014-06-01
    “…The evaluation results of SC show that the transmission delay for sensor data between the sensor devices and the users in SC was decreased by up to 81% compared to a typical cloud computing implementation.…”
    Get full text
    Article
  3. 223

    Taming large-scale genomic analyses via sparsified genomics by Mohammed Alser, Julien Eudine, Onur Mutlu

    Published 2025-01-01
    “…Abstract Searching for similar genomic sequences is an essential and fundamental step in biomedical research. State-of-the-art computational methods performing such comparisons fail to cope with the exponential growth of genomic sequencing data. …”
    Get full text
    Article
  4. 224
  5. 225

    التخزین السحابی للبیانات وأمن المعلومات " دراسة تقییمیة by د. ممدوح علی محمود

    Published 2016-10-01
    “…Cloud storing is a basic factor in cloud computing that reducescosts for individuals and institutions, saves time and effort in seeking data fromany place in the world. …”
    Get full text
    Article
  6. 226

    An efficient way to represent the processors and their connections in omega networks by Savari Prabhu, T. Jenifer Janany, Paul Manuel

    Published 2025-03-01
    “…This characteristic helps reduce congestion and improve overall system performance, especially in large-scale parallel computing environments where data communication is a critical factor. …”
    Get full text
    Article
  7. 227

    An Efficient GPU-Accelerated Algorithm for Solving Dynamic Response of Fluid-Saturated Porous Media by Wancang Lin, Qinglong Zhou, Xinyi Chen, Wenhao Shi, Jie Ai

    Published 2025-01-01
    “…Regarding the iterative solution of equations, a novel algorithm based on the CUDA kernel function is proposed. For a data set with two million degrees of freedom, it takes only about 0.05 s to compute an iterative step and transfer the data to the CPU. …”
    Get full text
    Article
  8. 228

    Uncertainty quantification of CT regularized reconstruction within the Bayesian framework by Negin Khoeiniha, Patricio Guerrero, Wim Dewulf

    Published 2025-02-01
    “… Computed Tomography (CT) reconstruction is an important inverse problem in industrial imaging, requiring robust methods to address different sources of error in the data and model. …”
    Get full text
    Article
  9. 229

    JUSTIFICATION OF THE STRUCTURE OF A SET OF MODELS FOR THE DEVELOPMENT AND IMPLEMENTATION OF REGIONAL PROGRAMS, TAKING INTO ACCOUNT ASSOCIATED RISKS by A. I. Denisova

    Published 2021-02-01
    “…The study considers the methods of obtaining data for the formation, correction, and evaluation of the implementation of programs. …”
    Get full text
    Article
  10. 230

    AIS-Based Vessel Trajectory Compression: A Systematic Review and Software Development by Ryan Wen Liu, Shiqi Zhou, Shangkun Yin, Yaqing Shu, Maohan Liang

    Published 2024-01-01
    “…The massive AIS data lead to high storage requirements and computing costs, as well as low data transmission efficiency. …”
    Get full text
    Article
  11. 231

    An RSA-Like Scheme for Multiuser Broadcast Authentication in Wireless Sensor Networks by Chen-Yang Cheng, Iuon-Chang Lin, Shu-Yan Huang

    Published 2015-09-01
    “…The quantitative analyses show that our scheme is efficient in terms of storage and computational overheads.…”
    Get full text
    Article
  12. 232

    Efficient and secure electronic evidence exchange scheme for internet of things by Yulong Xiao, Liang Chen

    Published 2025-01-01
    “…Through a secure two-factor authentication mechanism, this scheme achieves identity verification between the user and the storage center, as well as confidentiality during the data transmission process. …”
    Get full text
    Article
  13. 233

    Lagrange Multivariate Polynomial Interpolation: A Random Algorithmic Approach by A. Essanhaji, M. Errachid

    Published 2022-01-01
    “…RLMVPIA is easy to implement and requires no storage.…”
    Get full text
    Article
  14. 234

    A System of Remote Patients’ Monitoring and Alerting Using the Machine Learning Technique by M. Dhinakaran, Khongdet Phasinam, Joel Alanya-Beltran, Kingshuk Srivastava, D. Vijendra Babu, Sitesh Kumar Singh

    Published 2022-01-01
    “…The proposed methodology makes use of different machine learning algorithms along with cloud computing for continuous data storage. Over the years, these technologies have resulted in significant advancements in the healthcare industry. …”
    Get full text
    Article
  15. 235
  16. 236

    One-Time Broadcast Encryption Schemes in Distributed Sensor Networks by Pawel Szalachowski, Zbigniew Kotulski

    Published 2012-03-01
    “…This is because of a WSN is a very dynamic network which includes nodes with limited computational, storage, and communication capabilities. …”
    Get full text
    Article
  17. 237

    Ensuring Safety and Reliability: An Overview of Lithium-Ion Battery Service Assessment by Cezar Comanescu

    Published 2024-12-01
    “…Current reliability assessment techniques include experimental methods, computational models, and data-driven approaches. Emerging trends, such as advanced characterization techniques and standardized testing protocols, advocate for improved practices to enhance the reliability and safety of LIBs across all applications.…”
    Get full text
    Article
  18. 238

    A review of quantum communication and information networks with advanced cryptographic applications using machine learning, deep learning techniques by R. Ramya, P. Kumar, D. Dhanasekaran, R. Satheesh Kumar, S. Amithesh Sharavan

    Published 2025-03-01
    “…Quantum-secured networks enhance urban security, smart management, and infrastructure protection by providing data privacy and facilitating secure data transmission, thereby facilitating robust infrastructure and technological development.…”
    Get full text
    Article
  19. 239

    One-Shot Segmentation of Battery Cells with Gradual Learning by Johann Christopher Engster, Nele Blum, Laura Hellwege, Thorsten M. Buzug, Maik Stille

    Published 2025-02-01
    “… Due to the growing importance of electric vehicles and battery energy storage systems, battery safety must be ensured during and after production. …”
    Get full text
    Article
  20. 240

    Refined construction of semi-provincial hydrogeological models using hierarchical modeling: A case study in Western Shandong Province, China by Guangjun Ji, Zizhao Cai, Xiaobo Tan, Tao Wang, Chuanqi Wang, Qiuxiao Xu, Bo Zhou, Yang Cui

    Published 2025-04-01
    “…Additionally, a systematic design for structural and attribute models was conducted before modeling, based on hydrogeological conditions and data distribution. This ensures precise characterization of geological objects while minimizing data requirements. …”
    Get full text
    Article