Results 1 to 10 of about 2,400,902 (294)

Verification of the computing process of the corporate information system

open access: yesВестник Дагестанского государственного технического университета: Технические науки, 2022
Objective. The article discusses the issue of verifying the computing process of a corporate information system. The purpose of the article is to verify the computing process of a corporate information system. Method.
V. I. Polyakov, F. F. Zinnatulin
doaj   +1 more source

Coded Fourier Transform

open access: yes, 2017
We consider the problem of computing the Fourier transform of high-dimensional vectors, distributedly over a cluster of machines consisting of a master node and multiple worker nodes, where the worker nodes can only store and process a fraction of the ...
Avestimehr, A. Salman   +2 more
core   +1 more source

Enabling stream processing for people-centric IoT based on the fog computing paradigm [PDF]

open access: yes, 2017
The world of machine-to-machine (M2M) communication is gradually moving from vertical single purpose solutions to multi-purpose and collaborative applications interacting across industry verticals, organizations and people - A world of Internet of Things
Akrivopoulos, Orestis   +3 more
core   +1 more source

Workpiece Alignment for Hybrid Laser Aided Part Repair Process [PDF]

open access: yes, 2005
Work piece alignment is a key issue for hybrid laser aided part repair, a process utilizing both machining and laser deposition. Proper alignment can greatly improve the accuracy of the repair process.
Liou, Frank   +2 more
core   +2 more sources

Acceleration computing process in wavelength scanning interferometry [PDF]

open access: yes, 2011
The optical interferometry has been widely explored for surface measurement due to the advantages of non-contact and high accuracy interrogation. Eventually, some interferometers are used to measure both rough and smooth surfaces such as white light ...
Gao, F.   +2 more
core  

Privacy-Preserving and Outsourced Multi-User k-Means Clustering [PDF]

open access: yes, 2014
Many techniques for privacy-preserving data mining (PPDM) have been investigated over the past decade. Often, the entities involved in the data mining process are end-users or organizations with limited computing and storage resources.
Bertino, Elisa   +4 more
core   +3 more sources

Bit-Table Based Biclustering and Frequent Closed Itemset Mining in High-Dimensional Binary Data

open access: yesThe Scientific World Journal, 2014
During the last decade various algorithms have been developed and proposed for discovering overlapping clusters in high-dimensional data. The two most prominent application fields in this research, proposed independently, are frequent itemset mining ...
András Király   +2 more
doaj   +1 more source

Enhanced Reliability for Winding Machine via New Fault Tolerant Control Based on RST-Backstepping Controller

open access: yesPower Electronics and Drives, 2021
Due to the external disturbances, model uncertainties, strong coupling, and occurred faults, the winding machine presents a great control challenge. In order to deal with these problems, this paper presents the formulation of a novel scheme of fault ...
Haouari Fouad   +4 more
doaj   +1 more source

Efficient implicit simulation for incremental forming [PDF]

open access: yes, 2010
Single Point Incremental Forming (SPIF) is a displacement controlled process performed on a CNC machine. A clamped blank is deformed by the movement of a small sized tool that follows a prescribed tool path.
Boogaard, A.H. van den, Hadoush, A.
core   +1 more source

Exploiting Non-Causal CPU-State Information for Energy-Efficient Mobile Cooperative Computing

open access: yes, 2017
Scavenging the idling computation resources at the enormous number of mobile devices can provide a powerful platform for local mobile cloud computing. The vision can be realized by peer-to-peer cooperative computing between edge devices, referred to as ...
Brown, André EX   +11 more
core   +5 more sources

Home - About - Disclaimer - Privacy