Showing 3,081 - 3,100 results of 29,852 for search '(process OR processes) (computing)', query time: 0.29s Refine Results
  1. 3081

    COMPUTER MODELING IN THE DEVELOPMENT OF ARTIFICIAL VENTRICLES OF HEART by L. V. Belyaev, A. V. Zhdanov

    Published 2011-12-01
    “…In article modern researches of processes of development of artificial ventricles of heart are described. …”
    Get full text
    Article
  2. 3082
  3. 3083
  4. 3084
  5. 3085

    Cloud-based analysis of aerial imagery for unveiling ancient archaeological patterns by Pietro Fusco, Alba Amato, Salvatore Venticinque

    Published 2025-04-01
    “…Abstract Image processing and artificial intelligence techniques represent new and effective tools for supporting archaeological research to bring ancient finds to light. …”
    Get full text
    Article
  6. 3086

    Digital Image Watermarking using Singular Value Decomposition by Sura Sheriff

    Published 2010-12-01
    “…</em> Watermarking, is the process of embedding data into a multimedia cover , and can be used primarily for copyright protection and other purposes.  …”
    Get full text
    Article
  7. 3087
  8. 3088
  9. 3089
  10. 3090

    THE ROLE OF COMPUTED TOMOGRAPHY IN THE DIAGNOSIS OF RETROPERITONEAL FIBROSIS by A. O. Rudnev, M. N. Maxim, V. B. Vizhgorodsky, A. V. Kiryushin, S. Yu. Kotans

    Published 2018-06-01
    “…Although the final diagnosis can be made only on the basis of biopsy, computed tomography is of great importance for the evaluation of the pathological process, it allows diagnosing the disease, assessing its prevalence and observing the dynamics during treatment. …”
    Get full text
    Article
  11. 3091

    Mastering data complexity beyond traditional computation by Ruedi Stoop

    Published 2025-01-01
    “…Their ability to distinguish short- vs. long-range spatiotemporal data coherence, guides toward the improvement of models of spatiotemporally complex processes, in the life sciences and beyond.…”
    Get full text
    Article
  12. 3092

    Computed Tomography in the Diagnosis of Neonatal Lung Diseases by S. A. Perepelitsa, V. Yu. Kanykin, S. V Goncharov, Ye. F. Smerdova, A. M. Golubev

    Published 2009-04-01
    “…CT established the pattern of a pathological process in the lung. It clarified the nature of the disease in all the cases. …”
    Get full text
    Article
  13. 3093

    Computer simulation of photoinduced molecular motion and reactivity by Marco Garavelli, Fernando Bernardi, Michael A. Roob, Massimo Olivucci

    Published 2002-01-01
    “…The use of the computer to simulate light induced chemical processes has given access to a detailed description of the molecular motion and mechanism underlying the reactivity of organic and bio-organic chromophores. …”
    Get full text
    Article
  14. 3094

    METHODS FOR EVALUATING THE PERFORMANCE OF HETEROGENEOUS COMPUTER SYSTEMS by S. A. Sorokin, M. Z. Benenson, A. P. Sorokin

    Published 2017-12-01
    “…Article is devoted to the performance evaluation of heterogeneous computing systems (platforms). The article substantiates the relevance of the use of problem-oriented configuration of computational systems for automated systems of information processing and management. …”
    Get full text
    Article
  15. 3095

    Computational Organic Electrosynthesis: The Role of Overcharge Protectors by Marina Díaz‐Ruiz, Feliu Maseras

    Published 2025-05-01
    “…Our approach combines density functional theory calculations with microkinetic modeling to first elucidate the reaction mechanism in solution and then to characterize the electrodic processes, where the catalyst degradation competes with protector reduction. …”
    Get full text
    Article
  16. 3096

    A Computational Turn in Digital Philology Questions by Elisa Cugliana, Joris S. Van Zundert

    Published 2024-09-01
    “…For this reason, we argue for a computational turn in philology, defining it as the use of performative code to model the processes at the basis of the creation of an edition (such as transcription, collation, stemmatological analysis, annotation etc.). …”
    Get full text
    Article
  17. 3097

    Monitored Reconstruction: Computed Tomography as an Anytime Algorithm by Konstantin Bulatov, Marina Chukalina, Alexey Buzmakov, Dmitry Nikolaev, Vladimir V. Arlazarov

    Published 2020-01-01
    “…In this paper, we introduce a model of a monitored reconstruction process, in which the acquiring of projections is interspersed with image reconstruction. …”
    Get full text
    Article
  18. 3098

    Computationally secure steganography based on speech synthesis by Menghan LI, Kejiang CHEN, Weiming ZHANG, Nenghai YU

    Published 2022-06-01
    “…The steganography theory of computing security has been proposed for a long time, but it has not been widely adopted for mainstream steganography using multimedia data as a carrier.The reason is that the prerequisite for calculating secure steganography is to obtain the accurate distribution of the carrier or to accurately sample according to the carrier distribution.However, naturally collected images and audio/video cannot meet this prerequisite.With the development of deep learning technology, various machine-generated media such as image generation and synthesized speech, have become more and more common on the Internet and then generated media has become a reasonable steganography carrier.Steganography can use normal generated media to cover up secret communications, and pursue in distinguishability from normal generated media.The distribution learned by some generative models is known or controllable, which provides an opportunity to push computational security steganography for practical use.Taking the widely used synthetic speech model as an example, a computationally secure symmetric key steganography algorithm was designed and implemented.The message was decompressed into the synthetic audio according to the decoding process of arithmetic coding based on the conditional probability of sample points, and the message receiver had the same generation model to complete the message extraction by reproducing the audio synthesis process.The public key steganography algorithm was additionally designed based on this algorithm, which provided algorithmic support for the realization of full-flow steganographic communication.Steganographic key exchange ensured the security of steganographic content and the security of steganographic behavior was also achieved.The theoretical analysis showed that the security of the proposed algorithm is determined by the randomness of the embedded message.And the steganography analysis experiment further verified that the attacker cannot distinguish the synthesized carrier audio from the encrypted audio.…”
    Get full text
    Article
  19. 3099

    Parameter estimation and model selection in computational biology. by Gabriele Lillacci, Mustafa Khammash

    Published 2010-03-01
    “…A central challenge in computational modeling of biological systems is the determination of the model parameters. …”
    Get full text
    Article
  20. 3100

    Practical Introduction to Benchmarking and Characterization of Quantum Computers by Akel Hashim, Long B. Nguyen, Noah Goss, Brian Marinelli, Ravi K. Naik, Trevor Chistolini, Jordan Hines, J.P. Marceaux, Yosep Kim, Pranav Gokhale, Teague Tomesh, Senrui Chen, Liang Jiang, Samuele Ferracin, Kenneth Rudinger, Timothy Proctor, Kevin C. Young, Irfan Siddiqi, Robin Blume-Kohout

    Published 2025-08-01
    “…We define and explain QCVV’s core models and concepts—quantum states, measurements, and processes—and illustrate how these building blocks are leveraged to examine a target system or operation. …”
    Get full text
    Article