Suggested Topics within your search.
Suggested Topics within your search.
- Data processing 4
- Information technology 3
- Management 3
- Business 2
- Computer programs 2
- Internet in public administration 2
- Management information systems 2
- Photography 2
- Public administration 2
- Advertising media planning 1
- Anxiety Disorders 1
- Automatic speech recognition 1
- Bioinformatics 1
- Biological and Medical Physics, Biophysics 1
- Biological physics 1
- Biomathematics 1
- Biophysics 1
- Business intelligence 1
- COMPUTERS / Desktop Applications / Suites 1
- Certification 1
- Children 1
- Cloud computing 1
- Cognitive Therapy 1
- Computer graphics 1
- Computer networks 1
- Computer simulation 1
- Computer systems 1
- Computer-aided design 1
- Design 1
- Design and construction 1
-
3081
COMPUTER MODELING IN THE DEVELOPMENT OF ARTIFICIAL VENTRICLES OF HEART
Published 2011-12-01“…In article modern researches of processes of development of artificial ventricles of heart are described. …”
Get full text
Article -
3082
-
3083
Remove Noise from Grayscale Digital Images by Traditional and Fuzzy Filters
Published 2009-07-01Get full text
Article -
3084
Disease Detection in Tomato Fruit Using Deep Learning Algorithms: Comparative Analysis
Published 2025-06-01Get full text
Article -
3085
Cloud-based analysis of aerial imagery for unveiling ancient archaeological patterns
Published 2025-04-01“…Abstract Image processing and artificial intelligence techniques represent new and effective tools for supporting archaeological research to bring ancient finds to light. …”
Get full text
Article -
3086
Digital Image Watermarking using Singular Value Decomposition
Published 2010-12-01“…</em> Watermarking, is the process of embedding data into a multimedia cover , and can be used primarily for copyright protection and other purposes. …”
Get full text
Article -
3087
Rapid Contrast Enhancement Algorithm for Natural Contrast- Distorted Color Images
Published 2021-12-01Get full text
Article -
3088
-
3089
From Expert Computational Knowledge to Interdisciplinary Communication
Published 2024-06-01Get full text
Article -
3090
THE ROLE OF COMPUTED TOMOGRAPHY IN THE DIAGNOSIS OF RETROPERITONEAL FIBROSIS
Published 2018-06-01“…Although the final diagnosis can be made only on the basis of biopsy, computed tomography is of great importance for the evaluation of the pathological process, it allows diagnosing the disease, assessing its prevalence and observing the dynamics during treatment. …”
Get full text
Article -
3091
Mastering data complexity beyond traditional computation
Published 2025-01-01“…Their ability to distinguish short- vs. long-range spatiotemporal data coherence, guides toward the improvement of models of spatiotemporally complex processes, in the life sciences and beyond.…”
Get full text
Article -
3092
Computed Tomography in the Diagnosis of Neonatal Lung Diseases
Published 2009-04-01“…CT established the pattern of a pathological process in the lung. It clarified the nature of the disease in all the cases. …”
Get full text
Article -
3093
Computer simulation of photoinduced molecular motion and reactivity
Published 2002-01-01“…The use of the computer to simulate light induced chemical processes has given access to a detailed description of the molecular motion and mechanism underlying the reactivity of organic and bio-organic chromophores. …”
Get full text
Article -
3094
METHODS FOR EVALUATING THE PERFORMANCE OF HETEROGENEOUS COMPUTER SYSTEMS
Published 2017-12-01“…Article is devoted to the performance evaluation of heterogeneous computing systems (platforms). The article substantiates the relevance of the use of problem-oriented configuration of computational systems for automated systems of information processing and management. …”
Get full text
Article -
3095
Computational Organic Electrosynthesis: The Role of Overcharge Protectors
Published 2025-05-01“…Our approach combines density functional theory calculations with microkinetic modeling to first elucidate the reaction mechanism in solution and then to characterize the electrodic processes, where the catalyst degradation competes with protector reduction. …”
Get full text
Article -
3096
A Computational Turn in Digital Philology Questions
Published 2024-09-01“…For this reason, we argue for a computational turn in philology, defining it as the use of performative code to model the processes at the basis of the creation of an edition (such as transcription, collation, stemmatological analysis, annotation etc.). …”
Get full text
Article -
3097
Monitored Reconstruction: Computed Tomography as an Anytime Algorithm
Published 2020-01-01“…In this paper, we introduce a model of a monitored reconstruction process, in which the acquiring of projections is interspersed with image reconstruction. …”
Get full text
Article -
3098
Computationally secure steganography based on speech synthesis
Published 2022-06-01“…The steganography theory of computing security has been proposed for a long time, but it has not been widely adopted for mainstream steganography using multimedia data as a carrier.The reason is that the prerequisite for calculating secure steganography is to obtain the accurate distribution of the carrier or to accurately sample according to the carrier distribution.However, naturally collected images and audio/video cannot meet this prerequisite.With the development of deep learning technology, various machine-generated media such as image generation and synthesized speech, have become more and more common on the Internet and then generated media has become a reasonable steganography carrier.Steganography can use normal generated media to cover up secret communications, and pursue in distinguishability from normal generated media.The distribution learned by some generative models is known or controllable, which provides an opportunity to push computational security steganography for practical use.Taking the widely used synthetic speech model as an example, a computationally secure symmetric key steganography algorithm was designed and implemented.The message was decompressed into the synthetic audio according to the decoding process of arithmetic coding based on the conditional probability of sample points, and the message receiver had the same generation model to complete the message extraction by reproducing the audio synthesis process.The public key steganography algorithm was additionally designed based on this algorithm, which provided algorithmic support for the realization of full-flow steganographic communication.Steganographic key exchange ensured the security of steganographic content and the security of steganographic behavior was also achieved.The theoretical analysis showed that the security of the proposed algorithm is determined by the randomness of the embedded message.And the steganography analysis experiment further verified that the attacker cannot distinguish the synthesized carrier audio from the encrypted audio.…”
Get full text
Article -
3099
Parameter estimation and model selection in computational biology.
Published 2010-03-01“…A central challenge in computational modeling of biological systems is the determination of the model parameters. …”
Get full text
Article -
3100
Practical Introduction to Benchmarking and Characterization of Quantum Computers
Published 2025-08-01“…We define and explain QCVV’s core models and concepts—quantum states, measurements, and processes—and illustrate how these building blocks are leveraged to examine a target system or operation. …”
Get full text
Article