Suggested Topics within your search.
Suggested Topics within your search.
- Computer networks 9
- Computer programs 9
- computer 8
- Information technology 7
- Management 7
- Business 6
- Design and construction 5
- Computer security 4
- Data processing 4
- Design 4
- Human-computer interaction 4
- Language and languages 4
- Security measures 4
- Application software 3
- Computer animation 3
- Computer graphics 3
- Computer science 3
- Computer-aided design 3
- Computer-assisted instruction 3
- Digital techniques 3
- History 3
- Internet 3
- LANGUAGE ARTS & DISCIPLINES / Communication Studies 3
- LANGUAGE ARTS & DISCIPLINES / Linguistics / General 3
- LANGUAGE ARTS & DISCIPLINES / Linguistics / Sociolinguistics 3
- Moral and ethical aspects 3
- Photography 3
- Sociolinguistics 3
- Web sites 3
- Anesthetics 2
-
201
-
202
THE ROLE OF COMPUTED TOMOGRAPHY IN THE DIAGNOSIS OF RETROPERITONEAL FIBROSIS
Published 2018-06-01“…Although the final diagnosis can be made only on the basis of biopsy, computed tomography is of great importance for the evaluation of the pathological process, it allows diagnosing the disease, assessing its prevalence and observing the dynamics during treatment. …”
Get full text
Article -
203
Computer Network Attacks and Modern International Law
Published 2014-04-01Subjects: Get full text
Article -
204
Methodological reasoning of the computer literacy standard for students
Published 2002-12-01“… This paper discusses the computer literacy standard of students with respect to the European Computer Driving License (ECDL) and general informatics curricula of comprehensive schools. …”
Get full text
Article -
205
Joint optimization of edge computing and caching in NDN
Published 2022-08-01Subjects: Get full text
Article -
206
Development of Cotton Irrigation Based on Computer Technology
Published 2025-01-01Subjects: Get full text
Article -
207
Computing nasalance with MFCCs and Convolutional Neural Networks.
Published 2024-01-01“…Nasalance is a valuable clinical biomarker for hypernasality. It is computed as the ratio of acoustic energy emitted through the nose to the total energy emitted through the mouth and nose (eNasalance). …”
Get full text
Article -
208
Computation of Bearing Clearance in AUTOCAD by Graphic Method
Published 2002-01-01Get full text
Article -
209
-
210
Effective Reformulation for Resource Allocation in Computational Grid
Published 2009-01-01Get full text
Article -
211
Computer-Aid System for Automated Jaundice Detection
Published 2023-03-01“…In this study, jaundice or hyperbilirubinemia is diagnosed using a computer vision system based on a random forest algorithm. …”
Get full text
Article -
212
Computation Intelligence in Medicine—Data Analysis and Modelling
Published 2008-01-01Get full text
Article -
213
Advances in Computational Fluid Dynamics and Its Applications
Published 2011-01-01Get full text
Article -
214
Computing-network intelligence: research progress and prospects
Published 2024-10-01Subjects: “…computing-network convergence…”
Get full text
Article -
215
Computationally secure steganography based on speech synthesis
Published 2022-06-01“…The steganography theory of computing security has been proposed for a long time, but it has not been widely adopted for mainstream steganography using multimedia data as a carrier.The reason is that the prerequisite for calculating secure steganography is to obtain the accurate distribution of the carrier or to accurately sample according to the carrier distribution.However, naturally collected images and audio/video cannot meet this prerequisite.With the development of deep learning technology, various machine-generated media such as image generation and synthesized speech, have become more and more common on the Internet and then generated media has become a reasonable steganography carrier.Steganography can use normal generated media to cover up secret communications, and pursue in distinguishability from normal generated media.The distribution learned by some generative models is known or controllable, which provides an opportunity to push computational security steganography for practical use.Taking the widely used synthetic speech model as an example, a computationally secure symmetric key steganography algorithm was designed and implemented.The message was decompressed into the synthetic audio according to the decoding process of arithmetic coding based on the conditional probability of sample points, and the message receiver had the same generation model to complete the message extraction by reproducing the audio synthesis process.The public key steganography algorithm was additionally designed based on this algorithm, which provided algorithmic support for the realization of full-flow steganographic communication.Steganographic key exchange ensured the security of steganographic content and the security of steganographic behavior was also achieved.The theoretical analysis showed that the security of the proposed algorithm is determined by the randomness of the embedded message.And the steganography analysis experiment further verified that the attacker cannot distinguish the synthesized carrier audio from the encrypted audio.…”
Get full text
Article -
216
Analysing Academic Texts with Computational Linguistics Tools
Published 2020-07-01Subjects: Get full text
Article -
217
Dynamic fairness evaluation framework for cloud computing
Published 2014-07-01Subjects: Get full text
Article -
218
Computational and experimental study of swirling ring flow
Published 2024-03-01“…In the course of work on the energy perfection of thermal control systems for spacecraft with a twophase circuit, the issue of partial regeneration of thermal energy into electrical energy in a low-speed turbogenerator is considered, part of the design work requires computational modeling during the transport of swirling flows in the axial direction from the external input to the input plane into the impeller, which determines the need for theoretical and experimental elaboration of the problem. …”
Get full text
Article -
219
-
220
The Laws of Natural Deduction in Inference by DNA Computer
Published 2014-01-01Get full text
Article