Suggested Topics within your search.
Suggested Topics within your search.
- Computer networks 9
- Computer programs 9
- computer 8
- Information technology 7
- Management 7
- Business 6
- Design and construction 5
- Computer security 4
- Data processing 4
- Design 4
- Human-computer interaction 4
- Language and languages 4
- Security measures 4
- Application software 3
- Computer animation 3
- Computer graphics 3
- Computer science 3
- Computer-aided design 3
- Computer-assisted instruction 3
- Digital techniques 3
- History 3
- Internet 3
- LANGUAGE ARTS & DISCIPLINES / Communication Studies 3
- LANGUAGE ARTS & DISCIPLINES / Linguistics / General 3
- LANGUAGE ARTS & DISCIPLINES / Linguistics / Sociolinguistics 3
- Moral and ethical aspects 3
- Photography 3
- Sociolinguistics 3
- Web sites 3
- Anesthetics 2
-
221
-
222
Computer-Aid System for Automated Jaundice Detection
Published 2023-03-01“…In this study, jaundice or hyperbilirubinemia is diagnosed using a computer vision system based on a random forest algorithm. …”
Get full text
Article -
223
Computation Intelligence in Medicine—Data Analysis and Modelling
Published 2008-01-01Get full text
Article -
224
Computing-network intelligence: research progress and prospects
Published 2024-10-01Subjects: “…computing-network convergence…”
Get full text
Article -
225
Computationally secure steganography based on speech synthesis
Published 2022-06-01“…The steganography theory of computing security has been proposed for a long time, but it has not been widely adopted for mainstream steganography using multimedia data as a carrier.The reason is that the prerequisite for calculating secure steganography is to obtain the accurate distribution of the carrier or to accurately sample according to the carrier distribution.However, naturally collected images and audio/video cannot meet this prerequisite.With the development of deep learning technology, various machine-generated media such as image generation and synthesized speech, have become more and more common on the Internet and then generated media has become a reasonable steganography carrier.Steganography can use normal generated media to cover up secret communications, and pursue in distinguishability from normal generated media.The distribution learned by some generative models is known or controllable, which provides an opportunity to push computational security steganography for practical use.Taking the widely used synthetic speech model as an example, a computationally secure symmetric key steganography algorithm was designed and implemented.The message was decompressed into the synthetic audio according to the decoding process of arithmetic coding based on the conditional probability of sample points, and the message receiver had the same generation model to complete the message extraction by reproducing the audio synthesis process.The public key steganography algorithm was additionally designed based on this algorithm, which provided algorithmic support for the realization of full-flow steganographic communication.Steganographic key exchange ensured the security of steganographic content and the security of steganographic behavior was also achieved.The theoretical analysis showed that the security of the proposed algorithm is determined by the randomness of the embedded message.And the steganography analysis experiment further verified that the attacker cannot distinguish the synthesized carrier audio from the encrypted audio.…”
Get full text
Article -
226
Dynamic fairness evaluation framework for cloud computing
Published 2014-07-01Subjects: Get full text
Article -
227
-
228
The Laws of Natural Deduction in Inference by DNA Computer
Published 2014-01-01Get full text
Article -
229
Automated Image Interpretation Computer-Assisted Diagnostics
Published 2011-01-01Get full text
Article -
230
Parallel Monte Carlo computations in SCore environment
Published 2004-12-01Subjects: Get full text
Article -
231
Computer Vision System for Facial Palsy Detection
Published 2023-03-01Subjects: Get full text
Article -
232
Computer-Aided Classification of New Psychoactive Substances
Published 2021-01-01Get full text
Article -
233
Mobile edge computing and application in traffic offloading
Published 2016-07-01“…Mobile edge computing(MEC)makes it possible to deploy and provide service locally,which is close to the users,by enabling the IT and cloud computation capacity at the radio access network (RAN).Thus,MEC can improve the quality of experience (QoE) by reducing the latency,and decrease the network operation cost through reducing backhaul capacity requirement.Meanwhile,based on the network context information (location,network traffic load,radio information,etc) exposure to applications and services,MEC can further improve the QoE of user and provide the platform to third-party partners for application and service innovation.Besides the introduction of MEC,the detailed MEC platform was presented.Furthermore,the traffic offloading solution based on MEC was proposed and compared with the solution of local IP access and selected IP traffic offload (LIPA/SIPTO).In addition,the problems and challenges of the MEC were also discussed in detail.…”
Get full text
Article -
234
Research on security defense of mobile edge computing
Published 2021-02-01Subjects: “…mobile edge computing…”
Get full text
Article -
235
Stochastic Computer Simulation of Cermet Coatings Formation
Published 2015-01-01“…The results of numerical experiments are presented through the example of thermal spraying the cermet TiC-30 vol.% NiCr powder, illustrating the performance of the developed computational technology.…”
Get full text
Article -
236
Computation of quark masses from string theory
Published 2025-01-01“…The computation at each point along this locus takes about half a day on a single twelve-core CPU. …”
Get full text
Article -
237
Computer-Aided Numerical Inversion of Laplace Transform
Published 2000-01-01“…This paper explores the technique for the computer aided numerical inversion of Laplace transform. …”
Get full text
Article -
238
Biological computing with diffusion and excitable calcium stores
Published 2004-02-01Subjects: Get full text
Article -
239
-
240
The conjunction between computer algebra and numerical methods
Published 2001-12-01Get full text
Article