Showing 301 - 320 results of 839 for search '"Computer performance"', query time: 0.32s Refine Results
  1. 301

    Graphics-processing-unit-accelerated ice flow solver for unstructured meshes using the Shallow-Shelf Approximation (FastIceFlo v1.0.1) by A. Sandip, L. Räss, L. Räss, L. Räss, M. Morlighem

    Published 2024-02-01
    “…The insights gained will benefit efforts to diminish spatial resolution constraints at higher computing performance. The higher computing performance will allow for ensembles of ice-sheet flow simulations to be run at the continental scale and higher resolution, a previously challenging task. …”
    Get full text
    Article
  2. 302
  3. 303

    A novel hybrid cybersecurity scheme against false data injection attacks in automated power systems by Shahbaz Hussain, S. M. Suhail Hussain, Marziyeh Hemmati, Atif Iqbal, Rashid Alammari, Stefano Zanero, Enrico Ragaini, Giambattista Gruosso

    Published 2023-08-01
    “…Furthermore, the computational performance of the proposed hybrid security scheme is presented to demonstrate its applicability to the time critical GOOSE and SV protocols.…”
    Get full text
    Article
  4. 304

    Branch-and-cut solution approach for multilevel mixed integer linear programming problems by Ashenafi Awraris, Berhanu Guta Wordofa, Semu Mitiku Kassa

    Published 2023-01-01
    “…Additionally, the computational performance of the proposed method is studied by comparing it with existing method through some selected numerical examples.…”
    Get full text
    Article
  5. 305

    Study of access template to graphics engine GM effect on the performance by RomanV. . Arzumanyan, Alexander I. Sukhinov

    Published 2016-06-01
    “…The research subject is the problem of scalability of the parallel computing performance and acceleration. The following hypothesis is checked: while processing images for multi-core shared-memory systems, Gustafson - Barsis’s law is more crucial than the memory access template at the underloading of the GPU cores. …”
    Get full text
    Article
  6. 306

    Topology searching algorithm for multi-port hybrid circuit breakers based on graph theory by Songming He, Songming He, Jin Zhu, Qingpeng Zeng, Qingpeng Zeng, Xinming Guo, Xinming Guo, Jingyuan Yin, Tongzhen Wei, Tongzhen Wei

    Published 2023-04-01
    “…It can be used to significantly save time spent on proposing a new M-HCB topology because viable topologies can be quickly and rigorously carried out from a large number of directed graphs using computers. Performance characteristics of all derived topologies are simultaneously obtained, and a comparison can be easily conducted to meet the needs of actual application scenarios. …”
    Get full text
    Article
  7. 307

    ensemblQueryR: fast, flexible and high-throughput querying of Ensembl LD API endpoints in R by Aine Fairbrother-Browne, Sonia García-Ruiz, Regina Hertfelder Reynolds, Mina Ryten, Alan Hodgkinson

    Published 2023-09-01
    “…We demonstrate improved computational performance of ensemblQueryR over an exisiting tool in terms of random access memory (RAM) usage and speed, delivering a 10-fold speed increase whilst using a third of the RAM. …”
    Get full text
    Article
  8. 308

    Unbalanced Threshold Based Distributed Data Collection Scheme in Multisink Wireless Sensor Networks by Guorui Li, Ying Wang, Cong Wang, Yiying Liu

    Published 2016-01-01
    “…The communication and computational performances of the proposed scheme are also analyzed in detail in the paper.…”
    Get full text
    Article
  9. 309

    Revising the Classic Computing Paradigm and Its Technological Implementations by János Végh

    Published 2021-10-01
    “…Furthermore, it discusses some of the consequences of improper technological implementations, from shared media to parallelized operation, suggesting ideas on how computing performance could be improved to meet the growing societal demands.…”
    Get full text
    Article
  10. 310

    Accelerating image reconstruction in dual-head PET system by GPU and symmetry properties. by Cheng-Ying Chou, Yun Dong, Yukai Hung, Yu-Jiun Kao, Weichung Wang, Chien-Min Kao, Chin-Tu Chen

    Published 2012-01-01
    “…The OSEM reconstruction algorithms were implemented employing both CPU-based and GPU-based codes, and their computational performance was quantitatively analyzed and compared. …”
    Get full text
    Article
  11. 311

    Probing the Influence of Surface Chemical Functionalization on Graphene Nanoplatelets-Epoxy Interfacial Shear Strength Using Molecular Dynamics by Hashim Al Mahmud, Sagar U. Patil, Matthew S. Radue, Gregory M. Odegard

    Published 2023-01-01
    “…In this work, a characterization study of the interfacial interaction between different types of graphene nanoplatelets and an epoxy matrix is computationally performed. To quantify the discrete mutual graphene–epoxy “interfacial interaction energy” (IIE) within the nanocomposite, molecular dynamics simulations with a reactive force field are performed on a localized model of the suggested nanocomposite. …”
    Get full text
    Article
  12. 312

    An efficient parallel spectral code for 3D periodic flow simulations by Kairzhan Karzhaubayev, Lian-Ping Wang, Dauren Zhakebayev

    Published 2022-12-01
    “…Their popularity is motivated by the highest accuracy coupled with decent computational performance. In this work, we introduce the Fortran code based on a pseudospectral solver for tri-periodic flows. …”
    Get full text
    Article
  13. 313

    Simulation platform for pattern recognition based on reservoir computing with memristor networks by Gouhei Tanaka, Ryosho Nakane

    Published 2022-06-01
    “…Numerical simulations show that the memristor-network-based RC systems can yield high computational performance comparable to that of state-of-the-art methods in three time series classification tasks. …”
    Get full text
    Article
  14. 314

    CellS: A Cell-Inspired Efficient Software Framework for AI-Enabled Application on Resources-Constrained Mobile System by Ching-Han Chen, Mu-Che Wu

    Published 2021-02-01
    “…However, very few AI applications make full use of the computing performance of mobile multiprocessors. This is because the typical software development is sequential, and the degree of parallelism of the program is very low. …”
    Get full text
    Article
  15. 315

    Linear scaling approach for optical excitations using maximally localized Wannier functions by Konrad Merkel, Frank Ortmann

    Published 2023-01-01
    “…Furthermore, their strong localization greatly improves the computational performance in two ways: first, the resulting Hamiltonian becomes very sparse and, second, the electron–hole interaction terms can be evaluated efficiently in real space, where large electron–hole distances are handled by a multipole expansion. …”
    Get full text
    Article
  16. 316

    Efficient Dynamic Reconfigurable CNN Accelerator for Edge Intelligence Computing on FPGA by Kaisheng Shi, Mingwei Wang, Xin Tan, Qianghua Li, Tao Lei

    Published 2023-03-01
    “…Results at 250 MHz show a computing performance of 75.1929 GOPS, peak power consumption of 5.25 W, and power efficiency of 13.6219 GOPS/W, indicating the potential of the EDRCA accelerator for edge intelligence computing.…”
    Get full text
    Article
  17. 317

    Authentication and Key Agreement Protocol for UAV Communication by JIAN Qi-rui, CHEN Ze-mao, WU Xiao-kang

    Published 2022-08-01
    “…In order to achieve the requirement for security and lightweight in unmanned aerial vehicle(UAV)communication,two authentication and key agreement protocols targeted for UAVs with different computational performance are proposed,including an ECC based protocol,DroneSec,and a symmetric cipher based protocol,DroneSec-lite.The two protocols achieve secure mutual authentication and key configuration between ground stations and UAVs.DroneSec protocol achieves relatively low computational overhead while ensuring forward secrecy through combining ECDH and MAC,which is suitable for relatively high-performance platforms.DroneSec-lite protocol achieves extremely low computational overhead through using only symmetric ciphers,which is suitable for low-performance platforms.The security of the proposed protocols under the enhanced Dolve-Yao model is verified using ProVerif,a formal protocol verification tool,and the performance of the protocols is analyzed in the simulation environment.The results show that it is superior to existing protocols in terms of computation overhead,communication overhead and security.…”
    Get full text
    Article
  18. 318

    A Survey on Blockchain-Based Federated Learning by Lang Wu, Weijian Ruan, Jinhui Hu, Yaobin He

    Published 2023-12-01
    “…In recent years, there have been notable advancements in combining these two technologies, particularly in data privacy protection, data sharing incentives, and computational performance. Although there are some surveys on blockchain-based federated learning (BFL), these surveys predominantly focus on the BFL framework and its classifications, yet lack in-depth analyses of the pivotal issues addressed by BFL. …”
    Get full text
    Article
  19. 319

    Multi-compartment vehicle selection and delivery strategy with time windows under multi-objective optimization by Chenghong Lv, Jianxin Xu

    Published 2023-12-01
    “…Experiments have shown that the improved large-scale domain search (ILNS) has good computational performance. The experimental data of three modes adapted by 100 customers of Solomon show that multi-compartment vehicle fleets have significant advantages under transportation costss, while the deterioration costs advantages of single compartment vehicle and multi-compartment vehicle combined fleets are prominent. …”
    Get full text
    Article
  20. 320

    New 3D Diffusion Code Based on The Nodal Polynomial Expansion by Jadna Mara Santos Mendes, Sérgio Barros Paixão, Sergio de Oliveira Vellozo

    Published 2021-02-01
    “…The main reason is its higher computational performance and efficiency when compared with the conventional fine mesh difference method or finite element method. …”
    Get full text
    Article