Showing 41 - 60 results of 85 for search '"Computer Architecture"', query time: 0.06s Refine Results
  1. 41

    Smart Internet of things aided by“terminal-edge-cloud” cooperation by Dapeng WU, Puning ZHANG, Ruyan WANG

    Published 2018-09-01
    “…The further expansion of the Internet of things (IoT) traffic and the explosive growth of the terminal data require higher delay performance and computing ability of the access network.The traditional wireless network architecture has been unable to support the rapid development of IoT.Thus,the edge-driven smart IoT architecture was proposed.Firstly,the main factors that restrict the development of IoT were analyzed,and then the edge computing technology was introduced into the IoT to form a “terminal-edge-cloud” cooperative computing architecture to deal with the traffic data efficiently and timely.Finally,the challenges of the edge-driven smart IoT were analyzed and the future work of this system was proposed.…”
    Get full text
    Article
  2. 42

    Research and implementation on college students internet addiction disorder and anti-addict system by Hai-zhuo LIN, Ji-long WANG, Yi-zhe ZHANG, Jing ZHU

    Published 2014-10-01
    “…Based on the traffic analysis on Cernet2,a new discovery mechanism of games service provider IP address is proposed,including Boilerpipe text extraction algorithm and Stanford Chinese NLP,realize this new general method and computing architecture of college student internet addiction.Three kinds of Internet addiction behaviors-online games,video viewing and social networking sites visit,including the total hours spend,length of continuous addiction,frequency,selected time of addiction are analyzed.Concept of Internet addiction disorder index is proposed with quantization on the internet addiction disorder made through AHP.Finally,Internet addiction prevention system is designed and implemented.…”
    Get full text
    Article
  3. 43

    Construction contemplation of cloud platform for domestic password service based on quantum secret communication by Dong WANG, Guochun LI, Xuehao YU, Zhiyu CHEN, Bingyu GE, Lei XIE, Jing TAN

    Published 2018-07-01
    “…With the increasingly serious environment of network space security,the importance of cryptography is becoming more and more prominent.There are many problems in the current application of cryptographic technology and the demand of secure and controllable password resource for key information structure is urgent.According to technology advantages and disadvantages of classical and quantum passwords were analyzed and the integration direction of quantum cryptography and classical password technology was proposed.At the same time,by giving full consideration to the development trend of cloud computing architecture,the password cloud service concept was proposed and the domestic password service cloud platform based on quantum secret communication was designed.It has positive guiding significance for building a new firewall of cyber security based on quantum secret communication.…”
    Get full text
    Article
  4. 44

    Spatial Cluster Analysis by the Bin-Packing Problem and DNA Computing Technique by Xiyu Liu, Jie Xue

    Published 2013-01-01
    “…Typical techniques include CLARANS, density- and gravity-based clustering, and other algorithms based on traditional von Neumann's computing architecture. The purpose of this paper is to propose a technique for spatial cluster analysis based on sticker systems of DNA computing. …”
    Get full text
    Article
  5. 45

    Review on artificial intelligence chip technology system by Yuxia SHI

    Published 2019-04-01
    “…Artificial intelligence technology is the new focus of current countries.The development of artificial intelligence technology has put forward new requirements for computing chips.Deep learning algorithms require the training of massive data,while traditional computing architectures can’t support the large-scale computing requirements of deep learning algorithms.Therefore,artificial intelligence chips of new architectures emerge one after another.The different technical routes of artificial intelligence chips were analyzed,the characteristics of different routes were compared,the development trend of artificial intelligence chip industry and studied,the opportunities and challenges of artificial intelligence chip development in China were analyzed,and the future development of artificial intelligence chip technology was forecasted.…”
    Get full text
    Article
  6. 46

    Scalable network emulation on analog neuromorphic hardware by Elias Arnold, Philipp Spilger, Jan V. Straub, Eric Müller, Dominik Dold, Gabriele Meoni, Johannes Schemmel

    Published 2025-02-01
    “…The ability to emulate and train networks larger than the substrate provides a pathway for accurate performance evaluation in planned or scaled systems, ultimately advancing the development and understanding of large-scale models and neuromorphic computing architectures.…”
    Get full text
    Article
  7. 47

    A Massively Parallel SMC Sampler for Decision Trees by Efthyvoulos Drousiotis, Alessandro Varsi, Alexander M. Phillips, Simon Maskell, Paul G. Spirakis

    Published 2025-01-01
    “…A widely used approach to reducing an algorithm’s runtime is to employ modern multi-core computer architectures, either with shared memory (SM) or distributed memory (DM), and use parallel computing to accelerate the algorithm. …”
    Get full text
    Article
  8. 48

    Privacy-preserving image processing in cloud computing by Kui REN

    Published 2016-01-01
    “…To solve this problem, the security requirements and technical challenges lain in privacy-preserving image processing based on different cloud computing architectures were studied, and several solutions to protect the security of outsourced data while enabling functionality of image processing applications were proposed. …”
    Get full text
    Article
  9. 49

    Cloud native based edge computing: vision and challenges by Deze ZENG, Lvhao CHEN, Lin GU, Yuepeng LI

    Published 2021-06-01
    “…Cloud native computing, featured by low-cost container technology, well fits edge computing.It was proposed to apply cloud native computing to make edge computing resource management and control transparent to application development and operation.Compared with cloud computing, edge computing resources are widely distributed, highly heterogeneous, and fragmented, which called for collaborative resource management and control.According to the development status of cloud native related technologies, through the integration of future networking technologies such as soft were defined network and network function virtualization, a full-stack cloud native based edge computing architecture was proposed.Then, considering the hierarchical characteristics of containers, a low-overhead container deployment optimization problem for resource-limited edge computing was studied.Finally, the development challenges faced by cloud native based edge computing were discussed.…”
    Get full text
    Article
  10. 50

    Optimization of Leaky Integrate-and-Fire Neuron Circuits Based on Nanoporous Graphene Memristors by Kannan Udaya Mohanan, Seyed Mehdi Sattari-Esfahlan, Eou-Sik Cho, Chang-Hyun Kim

    Published 2024-01-01
    “…Artificial neurons form the core of neuromorphic computing which is emerging as an alternative for the von Neumann computing architecture. However, existing neuron architectures still lack in area efficiency, especially considering the huge size of modern neural networks requiring millions of neurons. …”
    Get full text
    Article
  11. 51

    Guiding the security protection of critical information infrastructure with scientific network security concept by Yangzhao LI, Changxiang SHEN, Nan TIAN

    Published 2019-09-01
    “…In the current increasingly competitive international cyberspace security game,critical information infrastructure is facing a severe security situation.From the view of scientific principle,the essence of network security risk is the limitation of people’s cognitive logic of information science.It is impossible to build a solid network defense system,and it is not necessarily cost-effective from the view of economic benefits.In network security work,the most important thing is the convergence of security objectives.The key is to ensure that the logical combination of computing tasks is not tampered with or destroyed,and to achieve correct calculation.Focusing on this security goal,scientific and technological innovations were made in such aspects as logical correct verification theory,computing architecture and application mode of computing engineering.The problem that logical defects were not exploited by attackers was solved,a unity of offensive and defensive contradictions was formed,and the active immunity capability for information systems was established.…”
    Get full text
    Article
  12. 52

    Intrusion Detection Model for Wireless Sensor Networks Based on FedAvg and XGBoost Algorithm by Hongjiao Wu

    Published 2024-01-01
    “…For the characteristics of channel instability in wireless sensor networks, this paper proposes an intrusion detection algorithm based on FedAvg (federated averaging) and XGBoost (extreme gradient boosting) wireless sensor networks using fog computing architecture. First, the network edge is extended by introducing fog computing nodes to reduce the communication delay. …”
    Get full text
    Article
  13. 53

    Linguistic analysis of virtual course's terminology by Danutė Kaklauskienė, Liudvikas Kaklauskas

    Published 2004-12-01
    “… A virtual course of computers architecture is analyses in the present article. …”
    Get full text
    Article
  14. 54

    Overview of TRIPOLI-5, a Monte Carlo code for HPC by Mancusi Davide, Brun Emeric, Dechenaux Benjamin, Fröhlicher Kévin, Gonçalves Thomas, Jinaphanh Alexis, Kowalski Mikolaj Adam, Larmier Coline, Malvagi Fausto, Millasseau Grégory, Monange Wilfried, Petit Odile, Zoia Andrea

    Published 2024-01-01
    “…CEA, IRSN and EDF have joined forces and started the development of the TRIPOLI-5® Monte Carlo particle transport code in 2022, with the goal of performing massively parallel simulations on hybrid computing architectures. TRIPOLI-5 benefits from the experience gained from previous investigations conducted on the PATMOS mini-app, concerning the portability of particle-transport algorithms in High Performance Computing environments. …”
    Get full text
    Article
  15. 55

    Multidimensional QoS cloud computing resource scheduling method based on stakeholder perspective by Mingfeng SU, Guojun WANG, Renfa LI

    Published 2019-06-01
    “…A multidimensional cloud computing architecture is designed and a multidimensional cloud resource scheduling model is constructed based on the stakeholder perspective of cloud users and cloud service providers to meet the high QoS requirements of cloud users (such as task execution time and task completion time) with low computing costs (such as energy consumption,economic costs and system availability).For the second-level cloud resource scheduling,an MQoS cloud resource scheduling algorithm based on multiple Greedy algorithm is proposed.The experimental results show that under the four cloud computing application scenarios with no aftereffects,the MQoS cloud resource scheduling algorithm has an overall increase of 206.42%~228.99% and 34.26%~56.93 in terms of multidimensional QoS degree compared with FIFO and M2EC algorithms.It has an average overall reduction of 0.48~0.49 and 0.20~0.27 in terms of cloud data center load balance difference.…”
    Get full text
    Article
  16. 56

    Optical single-shot readout of spin qubits in silicon by Andreas Gritsch, Alexander Ulanowski, Jakob Pforr, Andreas Reiserer

    Published 2025-01-01
    “…To this end, spin qubits with optical interfaces offer key advantages: they can minimize the heat load and give access to modular quantum computing architectures that eliminate cross-talk and offer a large connectivity. …”
    Get full text
    Article
  17. 57

    The Advances in Neuromorphic Computing and Brain-Inspired Systems (ANCBIS). by DanielRaj K, Ponseka G, Bharath Sanjai Lordwin D J3

    Published 2025-01-01
    “…This field seeks to bridge the gap between traditional computing architectures and biological neural networks by replicating brain-like functionalities. …”
    Get full text
    Article
  18. 58

    LSKE: Lightweight Secure Key Exchange Scheme in Fog Federation by Yashar Salami, Vahid Khajehvand

    Published 2021-01-01
    “…The fog computing architecture allows data exchange with the vehicle network, sensor networks, etc. …”
    Get full text
    Article
  19. 59

    Research on task offloading algorithm of mobile edge computing based on deep reinforcement learning in SDCN by Shouhua JIANG, Yiwu WANG

    Published 2024-02-01
    “…With the continuous development of network technology, the network topology distributed network control mode based on Fat-Tree gradually reveals its limitations.Software-defined data center network (SDCN) technology, as an improved technology of Fat-Tree network topology, has attracted more and more researchers’ attention.Firstly, an edge computing architecture in SDCN and a task offloading model based on the three-layer service architecture of the mobile edge computing (MEC) platform were built, combined with the actual application scenarios of the MEC platform.Through the same strategy experience playback and entropy regularization, the traditional deep Q-leaning network (DQN) algorithm was improved, and the task offloading strategy of MEC platform was optimized.An improved DQN algorithm based on same strategy empirical playback and entropy regularization (RSS2E-DQN) was compared with three other algorithms in load balancing, energy consumption, delay and network usage.It is verified that the improved algorithm has better performance in the above four aspects.…”
    Get full text
    Article
  20. 60

    Dissipative Protection of a GKP Qubit in a High-Impedance Superconducting Circuit Driven by a Microwave Frequency Comb by L.-A. Sellem, A. Sarlette, Z. Leghtas, M. Mirrahimi, P. Rouchon, P. Campagne-Ibarcq

    Published 2025-01-01
    “…Qubit initialization, readout, and control via Clifford gates can be performed while maintaining the code stabilization, paving the way toward the assembly of GKP qubits in a fault-tolerant quantum computing architecture.…”
    Get full text
    Article