Showing 221 - 240 results of 28,739 for search '"computer"', query time: 0.07s Refine Results
  1. 221

    Computing nasalance with MFCCs and Convolutional Neural Networks. by Andrés Lozano, Enrique Nava, María Dolores García Méndez, Ignacio Moreno-Torres

    Published 2024-01-01
    “…Nasalance is a valuable clinical biomarker for hypernasality. It is computed as the ratio of acoustic energy emitted through the nose to the total energy emitted through the mouth and nose (eNasalance). …”
    Get full text
    Article
  2. 222
  3. 223
  4. 224
  5. 225
  6. 226
  7. 227
  8. 228

    Computationally secure steganography based on speech synthesis by Menghan LI, Kejiang CHEN, Weiming ZHANG, Nenghai YU

    Published 2022-06-01
    “…The steganography theory of computing security has been proposed for a long time, but it has not been widely adopted for mainstream steganography using multimedia data as a carrier.The reason is that the prerequisite for calculating secure steganography is to obtain the accurate distribution of the carrier or to accurately sample according to the carrier distribution.However, naturally collected images and audio/video cannot meet this prerequisite.With the development of deep learning technology, various machine-generated media such as image generation and synthesized speech, have become more and more common on the Internet and then generated media has become a reasonable steganography carrier.Steganography can use normal generated media to cover up secret communications, and pursue in distinguishability from normal generated media.The distribution learned by some generative models is known or controllable, which provides an opportunity to push computational security steganography for practical use.Taking the widely used synthetic speech model as an example, a computationally secure symmetric key steganography algorithm was designed and implemented.The message was decompressed into the synthetic audio according to the decoding process of arithmetic coding based on the conditional probability of sample points, and the message receiver had the same generation model to complete the message extraction by reproducing the audio synthesis process.The public key steganography algorithm was additionally designed based on this algorithm, which provided algorithmic support for the realization of full-flow steganographic communication.Steganographic key exchange ensured the security of steganographic content and the security of steganographic behavior was also achieved.The theoretical analysis showed that the security of the proposed algorithm is determined by the randomness of the embedded message.And the steganography analysis experiment further verified that the attacker cannot distinguish the synthesized carrier audio from the encrypted audio.…”
    Get full text
    Article
  9. 229
  10. 230
  11. 231

    Computational and experimental study of swirling ring flow by A. A. Kishkin, Yu. N. Shevchenko, A. A. Zuev, D. A. Zhuikov

    Published 2024-03-01
    “…In the course of work on the energy perfection of thermal control systems for spacecraft with a twophase circuit, the issue of partial regeneration of thermal energy into electrical energy in a low-speed turbogenerator is considered, part of the design work requires computational modeling during the transport of swirling flows in the axial direction from the external input to the input plane into the impeller, which determines the need for theoretical and experimental elaboration of the problem. …”
    Get full text
    Article
  12. 232
  13. 233
  14. 234
  15. 235

    Some Computational Formulas for D-Nörlund Numbers by Guodong Liu

    Published 2009-01-01
    “…A generating function and several computational formulas for D-Nörlund numbers are also presented.…”
    Get full text
    Article
  16. 236

    Mobile edge computing and application in traffic offloading by Jianmin ZHANG, Weiliang XIE, Fengyi YANG, Zhouyun WU, Liang XIE

    Published 2016-07-01
    “…Mobile edge computing(MEC)makes it possible to deploy and provide service locally,which is close to the users,by enabling the IT and cloud computation capacity at the radio access network (RAN).Thus,MEC can improve the quality of experience (QoE) by reducing the latency,and decrease the network operation cost through reducing backhaul capacity requirement.Meanwhile,based on the network context information (location,network traffic load,radio information,etc) exposure to applications and services,MEC can further improve the QoE of user and provide the platform to third-party partners for application and service innovation.Besides the introduction of MEC,the detailed MEC platform was presented.Furthermore,the traffic offloading solution based on MEC was proposed and compared with the solution of local IP access and selected IP traffic offload (LIPA/SIPTO).In addition,the problems and challenges of the MEC were also discussed in detail.…”
    Get full text
    Article
  17. 237

    Research on security defense of mobile edge computing by Lu CHEN, Hongbo TANG, Wei YOU, Yi BAI

    Published 2021-02-01
    Subjects: “…mobile edge computing…”
    Get full text
    Article
  18. 238
  19. 239

    Computation of quark masses from string theory by Andrei Constantin, Cristofero S. Fraser-Taliente, Thomas R. Harvey, Andre Lukas, Burt Ovrut

    Published 2025-01-01
    “…The computation at each point along this locus takes about half a day on a single twelve-core CPU. …”
    Get full text
    Article
  20. 240