期刊文献+
共找到1,310篇文章
< 1 2 66 >
每页显示 20 50 100
Efficient rock joint detection from large-scale 3D point clouds using vectorization and parallel computing approaches
1
作者 Yunfeng Ge Zihao Li +2 位作者 Huiming Tang Qian Chen Zhongxu Wen 《Geoscience Frontiers》 2025年第5期1-15,共15页
The application of three-dimensional(3D)point cloud parametric analyses on exposed rock surfaces,enabled by Light Detection and Ranging(LiDAR)technology,has gained significant popularity due to its efficiency and the ... The application of three-dimensional(3D)point cloud parametric analyses on exposed rock surfaces,enabled by Light Detection and Ranging(LiDAR)technology,has gained significant popularity due to its efficiency and the high quality of data it provides.However,as research extends to address more regional and complex geological challenges,the demand for algorithms that are both robust and highly efficient in processing large datasets continues to grow.This study proposes an advanced rock joint identification algorithm leveraging artificial neural networks(ANNs),incorporating parallel computing and vectorization of high-performance computing.The algorithm utilizes point cloud attributes—specifically point normal and point curvatures-as input parameters for ANNs,which classify data into rock joints and non-rock joints.Subsequently,individual rock joints are extracted using the density-based spatial clustering of applications with noise(DBSCAN)technique.Principal component analysis(PCA)is subsequently employed to calculate their orientations.By fully utilizing the computational power of parallel computing and vectorization,the algorithm increases the running speed by 3–4 times,enabling the processing of large-scale datasets within seconds.This breakthrough maximizes computational efficiency while maintaining high accuracy(compared with manual measurement,the deviation of the automatic measurement is within 2°),making it an effective solution for large-scale rock joint detection challenges.©2025 China University of Geosciences(Beijing)and Peking University. 展开更多
关键词 Rock joints Pointclouds Artificialneuralnetwork high-performance computing Parallel computing VECTORIZATION
在线阅读 下载PDF
EG-STC: An Efficient Secure Two-Party Computation Scheme Based on Embedded GPU for Artificial Intelligence Systems
2
作者 Zhenjiang Dong Xin Ge +2 位作者 Yuehua Huang Jiankuo Dong Jiang Xu 《Computers, Materials & Continua》 SCIE EI 2024年第6期4021-4044,共24页
This paper presents a comprehensive exploration into the integration of Internet of Things(IoT),big data analysis,cloud computing,and Artificial Intelligence(AI),which has led to an unprecedented era of connectivity.W... This paper presents a comprehensive exploration into the integration of Internet of Things(IoT),big data analysis,cloud computing,and Artificial Intelligence(AI),which has led to an unprecedented era of connectivity.We delve into the emerging trend of machine learning on embedded devices,enabling tasks in resource-limited environ-ments.However,the widespread adoption of machine learning raises significant privacy concerns,necessitating the development of privacy-preserving techniques.One such technique,secure multi-party computation(MPC),allows collaborative computations without exposing private inputs.Despite its potential,complex protocols and communication interactions hinder performance,especially on resource-constrained devices.Efforts to enhance efficiency have been made,but scalability remains a challenge.Given the success of GPUs in deep learning,lever-aging embedded GPUs,such as those offered by NVIDIA,emerges as a promising solution.Therefore,we propose an Embedded GPU-based Secure Two-party Computation(EG-STC)framework for Artificial Intelligence(AI)systems.To the best of our knowledge,this work represents the first endeavor to fully implement machine learning model training based on secure two-party computing on the Embedded GPU platform.Our experimental results demonstrate the effectiveness of EG-STC.On an embedded GPU with a power draw of 5 W,our implementation achieved a secure two-party matrix multiplication throughput of 5881.5 kilo-operations per millisecond(kops/ms),with an energy efficiency ratio of 1176.3 kops/ms/W.Furthermore,leveraging our EG-STC framework,we achieved an overall time acceleration ratio of 5–6 times compared to solutions running on server-grade CPUs.Our solution also exhibited a reduced runtime,requiring only 60%to 70%of the runtime of previously best-known methods on the same platform.In summary,our research contributes to the advancement of secure and efficient machine learning implementations on resource-constrained embedded devices,paving the way for broader adoption of AI technologies in various applications. 展开更多
关键词 Secure two-party computation embedded GPU acceleration privacy-preserving machine learning edge computing
在线阅读 下载PDF
Experimental Research on Early-Age Property of High-Performance Concrete Column by Embedded Sensors
3
作者 贠英伟 张晓玲 +1 位作者 何朋立 王帅 《Journal of Southwest Jiaotong University(English Edition)》 2008年第3期242-246,共5页
This paper aims at monitoring the autogenous shrinkage (AS) of a high-performance concrete (HPC) column specimen using an embedded strain gauge just after concrete pouring. A real size specimen (40 cm×40 cm&... This paper aims at monitoring the autogenous shrinkage (AS) of a high-performance concrete (HPC) column specimen using an embedded strain gauge just after concrete pouring. A real size specimen (40 cm×40 cm×100cm) was made to simulate the structural members in construction site. The results show that the amount of HPC AS is comparable to that of drying shrinkage and even larger than it, so AS can not be omitted for HPC. By comparing the plain HPC and reinforced HPC specimens, the influences of reinforced bars on autogenous shrinkage and temperature distribution were obtained. 展开更多
关键词 high-performance concrete Autogenous shrinkage embedded strain gauge Temperature distribution
在线阅读 下载PDF
Advances of embedded resistive random access memory in industrial manufacturing and its potential applications
4
作者 Zijian Wang Yixian Song +7 位作者 Guobin Zhang Qi Luo Kai Xu Dawei Gao Bin Yu Desmond Loke Shuai Zhong Yishu Zhang 《International Journal of Extreme Manufacturing》 SCIE EI CAS CSCD 2024年第3期175-214,共40页
Embedded memory,which heavily relies on the manufacturing process,has been widely adopted in various industrial applications.As the field of embedded memory continues to evolve,innovative strategies are emerging to en... Embedded memory,which heavily relies on the manufacturing process,has been widely adopted in various industrial applications.As the field of embedded memory continues to evolve,innovative strategies are emerging to enhance performance.Among them,resistive random access memory(RRAM)has gained significant attention due to its numerousadvantages over traditional memory devices,including high speed(<1 ns),high density(4 F^(2)·n^(-1)),high scalability(~nm),and low power consumption(~pJ).This review focuses on the recent progress of embedded RRAM in industrial manufacturing and its potentialapplications.It provides a brief introduction to the concepts and advantages of RRAM,discusses the key factors that impact its industrial manufacturing,and presents the commercial progress driven by cutting-edge nanotechnology,which has been pursued by manysemiconductor giants.Additionally,it highlights the adoption of embedded RRAM in emerging applications within the realm of the Internet of Things and future intelligent computing,with a particular emphasis on its role in neuromorphic computing.Finally,the review discusses thecurrent challenges and provides insights into the prospects of embedded RRAM in the era of big data and artificial intelligence. 展开更多
关键词 embedded resistive random access memory industrial manufacturing intelligent computing advanced process node
在线阅读 下载PDF
SW-DDFT: Parallel Optimization of the Dynamical Density Functional Theory Algorithm Based on Sunway Bluelight II Supercomputer
5
作者 Xiaoguang Lv Tao Liu +5 位作者 Han Qin Ying Guo Jingshan Pan Dawei Zhao Xiaoming Wu Meihong Yang 《Computers, Materials & Continua》 2025年第7期1417-1436,共20页
The Dynamical Density Functional Theory(DDFT)algorithm,derived by associating classical Density Functional Theory(DFT)with the fundamental Smoluchowski dynamical equation,describes the evolution of inhomo-geneous flui... The Dynamical Density Functional Theory(DDFT)algorithm,derived by associating classical Density Functional Theory(DFT)with the fundamental Smoluchowski dynamical equation,describes the evolution of inhomo-geneous fluid density distributions over time.It plays a significant role in studying the evolution of density distributions over time in inhomogeneous systems.The Sunway Bluelight II supercomputer,as a new generation of China’s developed supercomputer,possesses powerful computational capabilities.Porting and optimizing industrial software on this platform holds significant importance.For the optimization of the DDFT algorithm,based on the Sunway Bluelight II supercomputer and the unique hardware architecture of the SW39000 processor,this work proposes three acceleration strategies to enhance computational efficiency and performance,including direct parallel optimization,local-memory constrained optimization for CPEs,and multi-core groups collaboration and communication optimization.This method combines the characteristics of the program’s algorithm with the unique hardware architecture of the Sunway Bluelight II supercomputer,optimizing the storage and transmission structures to achieve a closer integration of software and hardware.For the first time,this paper presents Sunway-Dynamical Density Functional Theory(SW-DDFT).Experimental results show that SW-DDFT achieves a speedup of 6.67 times within a single-core group compared to the original DDFT implementation,with six core groups(a total of 384 CPEs),the maximum speedup can reach 28.64 times,and parallel efficiency can reach 71%,demonstrating excellent acceleration performance. 展开更多
关键词 Sunway supercomputer high-performance computing dynamical density functional theory parallel optimization
在线阅读 下载PDF
基于Qt/Embedded的无线点餐系统软件设计 被引量:1
6
作者 梁永恩 万世明 汤海林 《电脑与信息技术》 2015年第3期15-17,共3页
针对传统人手点餐服务方式工作量大、易出错、统计不便等缺点,设计了基于QT/Embedded的无线点餐系统。系统软件终端部分采用嵌入式Linux为操作系统,Qt/Embedded为用户图形界面,服务器部分采用C#语言进行设计。文章介绍了系统软件的设计... 针对传统人手点餐服务方式工作量大、易出错、统计不便等缺点,设计了基于QT/Embedded的无线点餐系统。系统软件终端部分采用嵌入式Linux为操作系统,Qt/Embedded为用户图形界面,服务器部分采用C#语言进行设计。文章介绍了系统软件的设计及Qt的移植过程。该系统操作简便,可靠性高,运行稳定,具有良好的实用价值。 展开更多
关键词 计算机应用 点餐系统 QT/embedded 嵌入式LINUX
在线阅读 下载PDF
MatDEM-fast matrix computing of the discrete element method 被引量:7
7
作者 Chun Liu Hui Liu Hongyong Zhang 《Earthquake Research Advances》 CSCD 2021年第3期1-7,共7页
Discrete element method can effectively simulate the discontinuity,inhomogeneity and large deformation and failure of rock and soil.Based on the innovative matrix computing of the discrete element method,the highperfo... Discrete element method can effectively simulate the discontinuity,inhomogeneity and large deformation and failure of rock and soil.Based on the innovative matrix computing of the discrete element method,the highperformance discrete element software MatDEM may handle millions of elements in one computer,and enables the discrete element simulation at the engineering scale.It supports heat calculation,multi-field and fluidsolid coupling numerical simulations.Furthermore,the software integrates pre-processing,solver,postprocessing,and powerful secondary development,allowing recompiling new discrete element software.The basic principles of the DEM,the implement and development of the MatDEM software,and its applications are introduced in this paper.The software and sample source code are available online(http://matdem.com). 展开更多
关键词 Discrete element method high-performance MatDEM Matrix computing
在线阅读 下载PDF
Convergence Platform of Cloud Computing and Internet of Things (IoT) for Smart Healthcare Application 被引量:2
8
作者 M. Mamun-Ibn-Abdullah M. Shahinuzzaman +1 位作者 S. M. Abdur Rahim M. Humayun Kabir 《Journal of Computer and Communications》 2020年第8期1-11,共11页
Internet of Things (IoT) is a widely distributed network which requires small amount of power supply having limited storage and processing capacity. On the other hand, Cloud computing has virtually unlimited storage a... Internet of Things (IoT) is a widely distributed network which requires small amount of power supply having limited storage and processing capacity. On the other hand, Cloud computing has virtually unlimited storage and processing capabilities and is a much more mature technology. Therefore, combination of Cloud computing and IoT can provide the best performance for users. Cloud computing nowadays provides lifesaving healthcare application by collecting data from bedside devices, viewing patient information and diagnose in real time. There may some concerns about security and other issues of the patient’s data but utilization of IoT and Cloud technologies in healthcare industry would open a new era in the field of healthcare. To ensure basic healthcare needs of the people in the rural areas, we have proposed Cloud-IoT based smart healthcare system. In this system various types of sensors (Temperature, Heart bit, ECG, etc.) are equipped in the patient side to sense the patient’s physiological data. For securing data RSA based authentication algorithm and mitigation of several security threats have been used. The sensed data will process and store in the Cloud server. Stored data can be used by the authorized and/or concerned medical practitioner upon approved by the user for patient caring. 展开更多
关键词 Cloud computing embedded Hardware and Software IOT Smart Healthcare System
在线阅读 下载PDF
Analysis and Comparison of Five Kinds of Typical Device-Level Embedded Operating Systems 被引量:1
9
作者 Jialiang WANG Hai ZHAO +2 位作者 Peng LI Hui LI Bo LI 《Journal of Software Engineering and Applications》 2010年第1期81-90,共10页
Today, the number of embedded system was applied in the field of automation and control has far exceeded a variety of general-purpose computer. Embedded system is gradually penetrated into all fields of human society,... Today, the number of embedded system was applied in the field of automation and control has far exceeded a variety of general-purpose computer. Embedded system is gradually penetrated into all fields of human society, and ubiquitous embedded applications constitute the 'ubiquitous' computing era. Embedded operating system is the core of the em-bedded system, and it directly affects the performance of the whole system. Our Liaoning Provincial Key Laboratory of Embedded Technology has successfully developed five kinds of device-level embedded operating systems by more than ten years’ efforts, and these systems are Webit 5.0, Worix, μKernel, iDCX 128 and μc/os-II 128. This paper mainly analyses and compares the implementation mechanism and performance of these five kinds of device-level embedded operating systems in detail. 展开更多
关键词 embedded SYSTEM Operating SYSTEM Core Real-Time Ability I/O Delay and JITTER PERVASIVE computing and Internet of THINGS
暂未订购
Embedded BCI Rehabilitation System for Stroke 被引量:2
10
作者 Wanzeng Kong Siman Fu +3 位作者 Bin Deng Hong Zeng Jianhai Zhang Shijie Guo 《Journal of Beijing Institute of Technology》 EI CAS 2019年第1期35-41,共7页
In stroke rehabilitation,rehabilitation equipments can help with the training.But traditional equipments are not convenient to carry,which limits patients to use related rehabilitation techniques.To solve this kind of... In stroke rehabilitation,rehabilitation equipments can help with the training.But traditional equipments are not convenient to carry,which limits patients to use related rehabilitation techniques.To solve this kind of problem,a new embedded rehabilitation system based on brain computer interface(BCI)is proposed in this paper.The system is based on motor imagery(MI)therapy,in which electroencephalogram(EEG)is evoked by grasping motor imageries of left and right hands,then collected by a wearable device.The EEG is transmitted to a Raspberry Pie processing unit through Bluetooth and decoded as the instructions to control the equipment extension.Users experience the limb movement through the visual feedback so as to achieve active rehabilitation.A pilot study shows that the user can control the movement of the rehabilitation equipment through his mind,and the equipment is convenient to carry.The study provides a new way to stroke rehabilitation. 展开更多
关键词 STROKE REHABILITATION embedded brain computer interface(BCI) MOTOR imagery(MI)
在线阅读 下载PDF
Reversible Data Hiding for Medical Images in Cloud Computing Environments Based on Chaotic Hénon Map
11
作者 Li-Chin Huang Min-Shiang Hwang Lin-Yu Tseng 《Journal of Electronic Science and Technology》 CAS 2013年第2期230-236,共7页
Reversible data hiding techniques are capable of reconstructing the original cover image from stego-images. Recently, many researchers have focused on reversible data hiding to protect intellectual property rights. In... Reversible data hiding techniques are capable of reconstructing the original cover image from stego-images. Recently, many researchers have focused on reversible data hiding to protect intellectual property rights. In this paper, we combine reversible data hiding with the chaotic Henon map as an encryption technique to achieve an acceptable level of confidentiality in cloud computing environments. And, Haar digital wavelet transformation (HDWT) is also applied to convert an image from a spatial domain into a frequency domain. And then the decimal of coefficients and integer of high frequency band are modified for hiding secret bits. Finally, the modified coefficients are inversely transformed to stego-images. 展开更多
关键词 Cloud computing environments ENCRYPTION Haar digital wavelet transformation Henonmap reversible data embedding.
在线阅读 下载PDF
Aspect-Oriented Design Method for Embedded Systems Based on Timed Statecharts
12
作者 文欣秀 虞慧群 郑红 《China Communications》 SCIE CSCD 2013年第9期33-42,共10页
The formal modelling and verification method has become an effective way of improving the reliability and correctness of complex,safety-critical embedded systems.Statecharts are widely used to formally model embedded ... The formal modelling and verification method has become an effective way of improving the reliability and correctness of complex,safety-critical embedded systems.Statecharts are widely used to formally model embedded applications,but they do not realise the reasonable separation of system concerns,which would result in code scattering and tangling.Aspect-Oriented Software Development(AOSD)technology could separate crosscutting concerns from core concerns and identify potential problems in the early phase of the software development life cycle.Therefore,the paper proposes aspect-oriented timed statecharts(extended timed statecharts with AOSD)to separately model base functional requirements and other requirements(e.g.,scheduling,error handling),thereby improving the modularity and development efficiency of embedded systems.Furthermore,the dynamic behaviours of embedded systems are simulated and analysed to determine whether the model satisfies certain properties(e.g.,liveness,safety)described by computation tree logic formulae.Finally,a given case demonstrates some desired properties processed with respect to the aspect-oriented timed statecharts model. 展开更多
关键词 embedded systems model check-ing timed statecharts computation tree logic
在线阅读 下载PDF
SAP S/4HANA Embedded Analytics: An Overview
13
作者 Abani Pattanayak 《Journal of Computer and Communications》 2017年第9期1-7,共7页
Operational analytics is all about answering business questions while doing business and supporting business users across the organization, from shop floor users to management and executives. Therefore, business trans... Operational analytics is all about answering business questions while doing business and supporting business users across the organization, from shop floor users to management and executives. Therefore, business transactions and analytics must co-exist together in a single platform to empower business users to drive insights, make decisions, and complete business processes in a single application and using a single source of facts without toggling between multiple applications. Traditionally transactional systems and analytics were maintained separately to improve throughput of the transactional system and that certainly introduced latency in decision making. However, with innovation in the SAP HANA platform, SAP S/4HANA embedded analytics enables business users, business analysts, and management to perform real-time analytics on live transactional data. This paper reviews technical architecture and key components of SAP S/4HANA embedded analytics. This paper reviews technical architecture and key components of SAP S/4HANA embedded analytics. 展开更多
关键词 SAP HANA In-Memory computing S/4HANA embedded ANALYTICS
暂未订购
Fraud detection on payment transaction networks via graph computing and visualization
14
作者 Sun Quan Tang Tao +3 位作者 Zheng Jianbin Lin Jiale Zhao Jintao Liu Hongbao 《High Technology Letters》 EI CAS 2020年第3期253-261,共9页
With the fast development of Internet technology,more and more payments are fulfilled by mobile Apps in an electrical way which significantly saves time and efforts for payment.Such a change has benefited a large numb... With the fast development of Internet technology,more and more payments are fulfilled by mobile Apps in an electrical way which significantly saves time and efforts for payment.Such a change has benefited a large number of individual users as well as merchants,and a few major players for payment service have emerged in China.As a result,the payment service competition becomes even fierce,and various promotion activities have been launched for attracting more users by the payment service providers.In this paper,the problem focused on is fraud payment detection,which in fact has been a major concern for the providers who spend a significant amount of money to popularize their payment tools.This paper tries the graph computing-based visualization to the behavior of transactions occuring between the individual users and merchants.Specifically,a network analysisbased pipeline has been built.It consists of the following key components:transaction network building based on daily records aggregation;transaction network filtering based on edge and node removal;transaction network decomposition by community detection;detected transaction community visualization.The proposed approach is verified on the real-world dataset collected from the major player in the payment market in Asia and the qualitative results show the efficiency of the method. 展开更多
关键词 payment fraud detection graph computing graph embedding machine learning
在线阅读 下载PDF
Agent-Oriented Architecture for Ubiquitous Computing in Smart Hyperspace
15
作者 Yichao JIN Ruchuan WANG +1 位作者 Haiping HUANG Lijuan SUN 《Wireless Sensor Network》 2010年第1期74-84,共11页
Agent-oriented approach is increasingly showing its magic power in a diversity of fields, specifically, ubiquitous computing and smart environment. Meanwhile, it is considered the next creative issue is to interconnec... Agent-oriented approach is increasingly showing its magic power in a diversity of fields, specifically, ubiquitous computing and smart environment. Meanwhile, it is considered the next creative issue is to interconnect and integrate isolated smart spaces in real world together into a higher level space known as a hyperspace. In this paper, an agent-oriented architecture, which involves the techniques of mobile agents, middleware, and embedded artificial intelligence, is proposed. Detailed implementations describe our efforts on the design of terminal device, user interface, agents, and AI 展开更多
关键词 AGENT-ORIENTED UBIQUITOUS computing SMART HYPERSPACE MIDDLEWARE embedded Artificial INTELLIGENCE
在线阅读 下载PDF
Evaluation of the Application Benefit of Meteorological High Performance Computing Resources
16
作者 Min Wei Bin Wang 《Journal of Geoscience and Environment Protection》 2017年第7期153-160,共8页
The meteorological high-performance computing resource is the support platform for the weather forecast and climate prediction numerical model operation. The scientific and objective method to evaluate the application... The meteorological high-performance computing resource is the support platform for the weather forecast and climate prediction numerical model operation. The scientific and objective method to evaluate the application of meteorological high-performance computing resources can not only provide reference for the optimization of active resources, but also provide a quantitative basis for future resource construction and planning. In this paper, the concept of the utility value B and index compliance rate E of the meteorological high performance computing system are presented. The evaluation process, evaluation index and calculation method of the high performance computing resource application benefits are introduced. 展开更多
关键词 high-performance computing RESOURCES RESOURCE Application BENEFIT EVALUATION BENEFIT Value
暂未订购
A Multilayer Security Framework for Cloud Computing in Internet of Things (IoT) Domain
17
作者 M. Mamun-Ibn-Abdullah M. Humayun Kabir 《Journal of Computer and Communications》 2021年第7期31-42,共12页
Cloud computing is a type of emerging computing technology that relies on shared computing resources rather than having local servers or personal devices to handle applications. It is an emerging technology that provi... Cloud computing is a type of emerging computing technology that relies on shared computing resources rather than having local servers or personal devices to handle applications. It is an emerging technology that provides services over the internet: Utilizing the online services of different software. Many works have been carried out and various security frameworks relating to the security issues of cloud computing have been proposed in numerous ways. But they do not propose a quantitative approach to analyze and evaluate privacy and security in cloud computing systems. In this research, we try to introduce top security concerns of cloud computing systems, analyze the threats and propose some countermeasures for them. We use a quantitative security risk assessment model to present a multilayer security framework for the solution of the security threats of cloud computing systems. For evaluating the performance of the proposed security framework we have utilized an Own-Cloud platform using a 64-bit quad-core processor based embedded system. Own-Cloud platform is quite literally as any analytics, machine learning algorithms or signal processing techniques can be implemented using the vast variety of Python libraries built for those purposes. In addition, we have proposed two algorithms, which have been deployed in the Own-Cloud for mitigating the attacks and threats to cloud-like reply attacks, DoS/DDoS, back door attacks, Zombie, etc. Moreover, unbalanced RSA based encryption is used to reduce the risk of authentication and authorization. This framework is able to mitigate the targeted attacks satisfactorily. 展开更多
关键词 Cloud computing Data Security embedded Platform FRAMEWORK Security Threat
在线阅读 下载PDF
Cryptographic Lightweight Encryption Algorithm with Dimensionality Reduction in Edge Computing
18
作者 D.Jerusha T.Jaya 《Computer Systems Science & Engineering》 SCIE EI 2022年第9期1121-1132,共12页
Edge Computing is one of the radically evolving systems through generations as it is able to effectively meet the data saving standards of consumers,providers and the workers. Requisition for Edge Computing based item... Edge Computing is one of the radically evolving systems through generations as it is able to effectively meet the data saving standards of consumers,providers and the workers. Requisition for Edge Computing based items havebeen increasing tremendously. Apart from the advantages it holds, there remainlots of objections and restrictions, which hinders it from accomplishing the needof consumers all around the world. Some of the limitations are constraints oncomputing and hardware, functions and accessibility, remote administration andconnectivity. There is also a backlog in security due to its inability to create a trustbetween devices involved in encryption and decryption. This is because securityof data greatly depends upon faster encryption and decryption in order to transferit. In addition, its devices are considerably exposed to side channel attacks,including Power Analysis attacks that are capable of overturning the process.Constrained space and the ability of it is one of the most challenging tasks. Toprevail over from this issue we are proposing a Cryptographic LightweightEncryption Algorithm with Dimensionality Reduction in Edge Computing. Thet-Distributed Stochastic Neighbor Embedding is one of the efficient dimensionality reduction technique that greatly decreases the size of the non-linear data. Thethree dimensional image data obtained from the system, which are connected withit, are dimensionally reduced, and then lightweight encryption algorithm isemployed. Hence, the security backlog can be solved effectively using thismethod. 展开更多
关键词 Edge computing(e.g) dimensionality reduction(dr) t-distributed stochastic neighbor embedding(t-sne) principle component analysis(pca)
在线阅读 下载PDF
API Development Increases Access to Shared Computing Resources at Boston University
19
作者 George Jones Amanda E. Wakefield +4 位作者 Jeff Triplett Kojo Idrissa James Goebel Dima Kozakov Sandor Vajda 《Journal of Software Engineering and Applications》 2022年第6期197-207,共11页
Within the last few decades, increases in computational resources have contributed enormously to the progress of science and engineering (S & E). To continue making rapid advancements, the S & E community must... Within the last few decades, increases in computational resources have contributed enormously to the progress of science and engineering (S & E). To continue making rapid advancements, the S & E community must be able to access computing resources. One way to provide such resources is through High-Performance Computing (HPC) centers. Many academic research institutions offer their own HPC Centers but struggle to make the computing resources easily accessible and user-friendly. Here we present SHABU, a RESTful Web API framework that enables S & E communities to access resources from Boston University’s Shared Computing Center (SCC). The SHABU requirements are derived from the use cases described in this work. 展开更多
关键词 API Framework Open Source high-performance computing Software Architecture Science and Engineering
在线阅读 下载PDF
Optimization Techniques for GPU-Based Parallel Programming Models in High-Performance Computing
20
作者 Shuntao Tang Wei Chen 《信息工程期刊(中英文版)》 2024年第1期7-11,共5页
This study embarks on a comprehensive examination of optimization techniques within GPU-based parallel programming models,pivotal for advancing high-performance computing(HPC).Emphasizing the transition of GPUs from g... This study embarks on a comprehensive examination of optimization techniques within GPU-based parallel programming models,pivotal for advancing high-performance computing(HPC).Emphasizing the transition of GPUs from graphic-centric processors to versatile computing units,it delves into the nuanced optimization of memory access,thread management,algorithmic design,and data structures.These optimizations are critical for exploiting the parallel processing capabilities of GPUs,addressingboth the theoretical frameworks and practical implementations.By integrating advanced strategies such as memory coalescing,dynamic scheduling,and parallel algorithmic transformations,this research aims to significantly elevate computational efficiency and throughput.The findings underscore the potential of optimized GPU programming to revolutionize computational tasks across various domains,highlighting a pathway towards achieving unparalleled processing power and efficiency in HPC environments.The paper not only contributes to the academic discourse on GPU optimization but also provides actionable insights for developers,fostering advancements in computational sciences and technology. 展开更多
关键词 Optimization Techniques GPU-Based Parallel Programming Models high-performance computing
在线阅读 下载PDF
上一页 1 2 66 下一页 到第
使用帮助 返回顶部