Showing 761 - 780 results of 2,116 for search 'minimum computing', query time: 0.08s Refine Results
  1. 761

    Fine-grained hardware resource optimization and design for FPGA-based real-time simulation of large-scale renewable energy generations by Yanfei Li, Zhiying Wang, Xiaopeng Fu, Peng Li, Ligang Zhao, Xiaoshan Wu

    Published 2025-08-01
    “…Real-time simulation of renewable energy generations (REGs) is essential for the development and testing of centralized scheduling controllers, inverter controllers and edge computing devices. The rapid expansion of renewable energy has brought tremendous computational challenges to the real-time simulation of REGs, particularly control system solutions. …”
    Get full text
    Article
  2. 762

    Human – Environment QSAR Studies of Radioactive Chemicals by Online Prediction Websites by Kafa Khalaf Hammud

    Published 2023-12-01
    “… Diagnosis, therapy, and research – development are main targets in radioactive materials issues that took huge places in medical sector of radio-molecular imaging and nuclear medicine where adsorbed radionuclide by the target(s) with high selectivity and minimum duration management compared to chemotherapy. …”
    Get full text
    Article
  3. 763

    A secure and efficient deep learning-based intrusion detection framework for the internet of vehicles by Hasim Khan, Ghanshyam G. Tejani, Rayed AlGhamdi, Sultan Alasmari, Naveen Kumar Sharma, Sunil Kumar Sharma

    Published 2025-04-01
    “…AES-256 encryption for strong real-time security and access control, along with Secure Multi-Party Computation (SMPC) and Homomorphic Encryption (HE) for privacy-preserving collaborative data processing and encrypted computations, are some of the innovative contributions to IoV security that this work presents. …”
    Get full text
    Article
  4. 764

    Analysis of Cross-Polarization Discrimination Due to Rain for Earth–Space Satellite Links Operating at Millimetre-Wave Frequencies in Pretoria, South Africa by Yusuf Babatunde Lawal, Pius Adewale Owolawi, Chunling Tu, Etienne Van Wyk, Joseph Sunday Ojo

    Published 2025-02-01
    “…The traditional method of computing XPD employs a constant annual mean rain height and annual mean co-polar attenuation (CPA) over a certain location. …”
    Get full text
    Article
  5. 765

    A Lightweight Citrus Object Detection Method in Complex Environments by Qiurong Lv, Fuchun Sun, Yuechao Bian, Haorong Wu, Xiaoxiao Li, Xin Li, Jie Zhou

    Published 2025-05-01
    “…Secondly, a lightweight neck network is constructed using Grouped Shuffle Convolution (GSConv) to simplify computational complexity. Finally, the minimum-point-distance-based IoU (MPDIoU) loss function is utilized to optimize the boundary return mechanism, which speeds up model convergence and reduces the redundancy of bounding box regression. …”
    Get full text
    Article
  6. 766

    ON ONE APPROACH TO SOLVING THE TRAVELING SALESMAN PROBLEM FOR AUTONOMOUS UNMANNED AERIAL VEHICLE PLANNING OF TARGET FLIGHT PATHS by V. B. Melekhin, M. V. Khachumov

    Published 2021-04-01
    “…The basis for behavior planning is the optimization of the formal description of a given terrain map, which leads to a significant reduction in the number of alternatives compared in the process of searching  for a minimum route to fly around targets. This, in turn, makes it  possible to implement planning procedures on the onboard computer system of an autonomous uncrewed aerial vehicle. …”
    Get full text
    Article
  7. 767

    A Hybrid Strategy for Forward Kinematics of the Stewart Platform Based on Dual Quaternion Neural Network and ARMA Time Series Prediction by Jie Tao, Huicheng Zhou, Wei Fan

    Published 2025-03-01
    “…This approach efficiently balances computational efficiency and fitting accuracy during real-time motion. …”
    Get full text
    Article
  8. 768

    VCMA Gradient-Driven Skyrmion on a Trapezoidal Nanotrack for Racetrack Memory Application by Bikash Sharma, Pema Rinzing Bhutia, Ravish Kumar Raj, Bibek Chettri, Brajesh Kumar Kaushik, Sonal Shreya

    Published 2025-01-01
    “…The maximum speed of 1.27 m/s was achieved by the skyrmion, and the minimum time taken for the skyrmion to reach the detector from the nucleation point was 2.16 ns. …”
    Get full text
    Article
  9. 769
  10. 770

    Evaluation framework for the generation of continental bare surface reflectance composites by Paul Karlshoefer, Pablo d’Angelo, Jonas Eberle, Uta Heiden

    Published 2025-07-01
    “…This study presents a novel approach to evaluate the process of computing bare SRCs across large geographical areas. …”
    Get full text
    Article
  11. 771

    How to Affect the Number of Images on the Success Rate for Detection of Weeds with Deep Learning by Mustafa Guzel, Bulent Turan, Izzet Kadioglu, Bahadir Sin, Alper Basturk, Khaled R. Ahmed

    Published 2022-08-01
    “…The detection of weeds with computer vision without the help of an expert is important for scientific studies and other purposes. …”
    Get full text
    Article
  12. 772

    Wytężenie Materiału w Stanach Podkrytycznych by M. Życzkowski

    Published 1960-12-01
    “…The problem of invertigation of optimum initial stresses and minimum material exertion giving a certain appraisal of the advantages of using such stresses, is also treated. …”
    Get full text
    Article
  13. 773

    A priority-based congestion-avoidance routing protocol using IoT-based heterogeneous medical sensors for energy efficiency in healthcare wireless body area networks by Khalid M Awan, Nadeem Ashraf, Muhammad Qaiser Saleem, Osama E Sheta, Kashif Naseer Qureshi, Asim Zeb, Khalid Haseeb, Ali Safaa Sadiq

    Published 2019-06-01
    “…A wireless body area network is a collection of Internet of Things–based wearable heterogeneous computing devices primarily used in healthcare monitoring applications. …”
    Get full text
    Article
  14. 774
  15. 775
  16. 776

    CRYPTO-RESISTANT METHODS AND RANDOM NUMBER GENERATORS IN INTERNET OF THINGS (IOT) DEVICES by Petro Klimushyn, Tetiana Solianyk, Oleksandr Mozhaiev, Yurii Gnusov, Oleksandr Manzhai, Vitaliy Svitlychny

    Published 2022-06-01
    “…The analysis of technologies and circuit solutions allowed to draw the following conclusions: protection of IoT solutions includes: security of IoT network nodes and their connection to the cloud using secure protocols, ensuring confidentiality, authenticity and integrity of IoT data by cryptographic methods, attack analysis and network cryptographic stability; the initial basis for the protection of IoT solutions is the true randomness of the formed RNG sequences and used in algorithms for cryptographic transformation of information to protect it; feature of IoT devices is their heterogeneity and geographical distribution, limited computing resources and power supply, small size; The most effective (reduce power consumption and increase the generation rate) for use in IoT devices are RNG exclusively on a digital basis, which implements a three-stage process: the initial digital circuit, normalizer and random number flow generator; Autonomous Boolean networks (ABN) allow to create RNG with unique characteristics: the received numbers are really random, high speed – the number can be received in one measure, the minimum power consumption, miniature, high (up to 3 GHz) throughput of Boolean chaos; a promising area of ABN development is the use of optical logic valves for the construction of optical ABN with a bandwidth of up to 14 GHz; the classification of known classes of RNG attacks includes: direct cryptanalytic attacks, attacks based on input data, attacks based on the disclosure of the internal state of RNG, correlation attacks and special attacks; statistical test packages to evaluate RNG sequences have some limitations or shortcomings and do not replace cryptanalysis; Comparison of cryptoaccelerators with cryptographic transformation software shows their significant advantages: for AES block encryption algorithm, speeds increase by 10-20 times in 8/16-bit cryptoaccelerators and 150 times in 32-bit, growth hashing of SHA-256 in 32-bit cryptoaccelerators more than 100 times, and for the NMAS algorithm - up to 500 times. …”
    Get full text
    Article
  17. 777

    A novel method for asynchronous source localisation based on time of arrival measurements by Huijie Zhu, Sheng Liu, Zhiqiang Yao, Moses Chukwuka Okonkwo, Zheng Peng

    Published 2021-10-01
    “…First, by leveraging dimensionality reduction, the maximum (minimum) distance maximum (minimum) time-of-arrival matching-based second-order Monte Carlo method is applied to find a rough initial position of the signal source with low computational complexity. …”
    Get full text
    Article
  18. 778
  19. 779

    Green-Agile Maturity Model: An Evaluation Framework for Global Software Development Vendors by Nasir Rashid, Siffat Ullah Khan, Habib Ullah Khan, Muhammad Ilyas

    Published 2021-01-01
    “…This phenomenon of embedding the green flavor in software has emerged a new research area, green software engineering, that promises the development of eco-friendly software with minimum energy and use of less computing resources, to trim down the adverse effects on both society and environment. …”
    Get full text
    Article
  20. 780

    Comparative Analysis of Nature-Inspired Algorithms for Optimal Power Flow Problem: A Focus on Penalty-Vanishing Terms and Algorithm Performance by Gerardo Castanon, Alberto F. Martinez-Herrera, Ana Maria Sarmiento, Alejandro Aragon-Zavala, Fernando Lezama

    Published 2024-01-01
    “…Utilizing a low-high sorting ranking method, considering mean, maximum, and minimum values for result computation and sorting, we identify the optimal algorithm among all those assessed for various objective functions, alongside assessing the success rate of penalty-vanishing terms. …”
    Get full text
    Article