Results 41 to 50 of about 3,288,801 (219)
شبكات نقل البيانات الدولية والاقليمية
شبكات نقل البيانات الدولية ...
امل اسماعيل حقي
doaj +1 more source
Hardware optimization for photonic time-delay reservoir computer dynamics
Reservoir computing (RC) is one kind of neuromorphic computing mainly applied to process sequential data such as time-dependent signals. In this paper, the bifurcation diagram of a photonic time-delay RC system is thoroughly studied, and a method of ...
Meng Zhang, Zhizhuo Liang, Z Rena Huang
doaj +1 more source
الأجهزة الإلكترونية Hardware قد خطت في تطورها خطوات سريعة وشاسعة وفي فترة قصيرة ، والسؤال الذي يطرح نفسه هو ما هي أبعاد هذا التطور وما هو اتجاهه العام وما هي الخطوات التي يجب أن يتبعها بلد نام لمسايرة هذا التقدم التكنولوجي؟ في هذا العرض محاولة أولية ...
علي حسين الطرفي
doaj +1 more source
التطور في مجال الحاسبات الدقيقة وتطورها
التطور في مجال الحاسبات الدقيقة ...
زيد علي محمد الخليل
doaj +1 more source
الطرق المستخدمة في شبكات الحاسبات الالكترونية
الطرق المستخدمة في شبكات الحاسبات ...
كامل عجينة
doaj +1 more source
The purpose of this research is to design and implement the technology of Virtual Reality Modeling Language (VRML) 3D) on the introduction of computer hardware websites based.
Zaskia Wiedya Sahardevi+2 more
doaj +1 more source
MetAlign 3.0: performance enhancement by efficient use of advances in computer hardware
A new, multi-threaded version of the GC–MS and LC–MS data processing software, metAlign, has been developed which is able to utilize multiple cores on one PC.
A. Lommen, Harrie Kools
semanticscholar +1 more source
Extracting high fidelity quantum computer hardware from random systems [PDF]
An overview of current status and prospects of the development of quantum computer hardware based on inorganic crystals doped with rare-earth ions are presented.
A. Walther+6 more
semanticscholar +1 more source
Ten years of hardware Trojans: a survey from the attacker's perspective
Hardware Trojan detection techniques have been studied extensively. However, to develop reliable and effective defenses, it is important to figure out how hardware Trojans are implemented in practical scenarios.
Mingfu Xue+4 more
semanticscholar +1 more source
In studying and visualizing computer devices students and students tend to experience difficulties when they want to learn and memorize computer units. This study aims to create a learning application about computer hardware by utilizing the development ...
Andri Wahyu Saputra+2 more
doaj +1 more source