Suggested Topics within your search.
Suggested Topics within your search.
- Data processing 4
- Business 3
- Computer programs 3
- Information technology 3
- Management 3
- Internet in public administration 2
- Management information systems 2
- Photography 2
- Public administration 2
- Advertising media planning 1
- Anxiety Disorders 1
- Automatic speech recognition 1
- Bioinformatics 1
- Biological and Medical Physics, Biophysics 1
- Biological physics 1
- Biomathematics 1
- Biophysics 1
- Business intelligence 1
- COMPUTERS / Desktop Applications / Suites 1
- Certification 1
- Children 1
- Cloud computing 1
- Cognitive Therapy 1
- Commercial statistics 1
- Computer graphics 1
- Computer networks 1
- Computer simulation 1
- Computer systems 1
- Computer-aided design 1
- Design 1
-
921
PRACTICE GUIDELINES FOR THE USE OF STANDARDS FOR DESIGN OF INTERACTIVE SYSTEMS IN TERMAL IMAGING PROCESSING TASKS
Published 2016-10-01“…According to the results of theoretical analysis of the current state of the problem of data processing automation of noisy and distorted IR images revealed that the image processing procedure is an indispensable component of the total signal processing procedure in the chain of data transformations from its registration photodetectors to the presentation to the operator, so the lack of standardized quantitative criterion imaging quality to solve practical problems of modern optoelectronic instrument makes it especially urgent to develop treatment algorithms thermal images with ergonomic requirements for computer systems. …”
Get full text
Article -
922
Photonics Breakthroughs 2024: Nonlinear Photonic Computing at Scale
Published 2025-01-01“…A photonic neural network utilizes photons instead of electrons to process information, with the prospect of higher computing efficiency, lower power consumption, and reduced latency. …”
Get full text
Article -
923
Computational mechanism underlying switching of motor actions.
Published 2025-02-01“…Although considerable research has been devoted to understanding how the brain switches actions, the computations underlying the switching process and how it relates to the selecting and stopping processes remain elusive. …”
Get full text
Article -
924
A Reconfigurable Framework for Hybrid Quantum–Classical Computing
Published 2025-05-01“…In this paper, we propose a reconfigurable framework for hybrid quantum–classical computing. The proposed framework integrates field-programmable gate arrays (FPGAs) with quantum processing units (QPUs) for deploying HQC algorithms. …”
Get full text
Article -
925
Structure for interaction software process modules in the development of technological processes of cast
Published 2019-04-01“…The software algorithm uses the means of computational experiment to determine the optimal values of the parameters in the development of cast processes. …”
Get full text
Article -
926
THE ROLE OF COMPUTED TOMOGRAPHY IN THE DIAGNOSIS OF RETROPERITONEAL FIBROSIS
Published 2018-06-01“…Although the final diagnosis can be made only on the basis of biopsy, computed tomography is of great importance for the evaluation of the pathological process, it allows diagnosing the disease, assessing its prevalence and observing the dynamics during treatment. …”
Get full text
Article -
927
ELEMENTS OF COMPUTER LEXICOGRAPHY IN AGRICULTURAL MANAGERS EDUCATION
Published 2021-12-01“…Special programs (databases, computer files, word processing programs) let us automatically generate dictionary entries, store dictionary information and process it. …”
Get full text
Article -
928
Computed Tomography in the Diagnosis of Neonatal Lung Diseases
Published 2009-04-01“…CT established the pattern of a pathological process in the lung. It clarified the nature of the disease in all the cases. …”
Get full text
Article -
929
Combining Process Mining and Process Simulation in Healthcare: A Literature Review
Published 2024-01-01Get full text
Article -
930
Computer-Modeling System of Agronomist’s Labor Functions
Published 2024-11-01“…This development can also be used in the system of additional education for children. Using a computer game in the educational process will expand children’s knowledge about agriculture: it will familiarize them with different agricultural processes, such as planting, growing and harvesting crops, as well as with various types of crop cultivation technologies. …”
Get full text
Article -
931
Monitored Reconstruction: Computed Tomography as an Anytime Algorithm
Published 2020-01-01“…Computed tomography is an important technique for non-destructive analysis of an object’s internal structure, relevant for scientific studies, medical applications, and industry. …”
Get full text
Article -
932
Computationally secure steganography based on speech synthesis
Published 2022-06-01“…The steganography theory of computing security has been proposed for a long time, but it has not been widely adopted for mainstream steganography using multimedia data as a carrier.The reason is that the prerequisite for calculating secure steganography is to obtain the accurate distribution of the carrier or to accurately sample according to the carrier distribution.However, naturally collected images and audio/video cannot meet this prerequisite.With the development of deep learning technology, various machine-generated media such as image generation and synthesized speech, have become more and more common on the Internet and then generated media has become a reasonable steganography carrier.Steganography can use normal generated media to cover up secret communications, and pursue in distinguishability from normal generated media.The distribution learned by some generative models is known or controllable, which provides an opportunity to push computational security steganography for practical use.Taking the widely used synthetic speech model as an example, a computationally secure symmetric key steganography algorithm was designed and implemented.The message was decompressed into the synthetic audio according to the decoding process of arithmetic coding based on the conditional probability of sample points, and the message receiver had the same generation model to complete the message extraction by reproducing the audio synthesis process.The public key steganography algorithm was additionally designed based on this algorithm, which provided algorithmic support for the realization of full-flow steganographic communication.Steganographic key exchange ensured the security of steganographic content and the security of steganographic behavior was also achieved.The theoretical analysis showed that the security of the proposed algorithm is determined by the randomness of the embedded message.And the steganography analysis experiment further verified that the attacker cannot distinguish the synthesized carrier audio from the encrypted audio.…”
Get full text
Article -
933
Parameter estimation and model selection in computational biology.
Published 2010-03-01“…A central challenge in computational modeling of biological systems is the determination of the model parameters. …”
Get full text
Article -
934
Data-intensive service deployment based on edge computing
Published 2019-07-01“…The demand is getting higher and higher for data processing due to big data volume, thus, data-intensive service shave emerged. …”
Get full text
Article -
935
Data-intensive service deployment based on edge computing
Published 2019-07-01“…The demand is getting higher and higher for data processing due to big data volume, thus, data-intensive service shave emerged. …”
Get full text
Article -
936
-
937
Computational Work with Very Large Text Collections
Published 2011-06-01“…The argument of the piece is that interoperability is a process as well as a state, that it requires mechanisms that would sustain it, and that TEI is one of those mechanisms.…”
Get full text
Article -
938
Formation of the measuring channel for quantum diagnostic computer
Published 2019-08-01“…The result is a description of the processes in the quantum measuring channel, which is used to enter diagnostic data in a quantum computer. …”
Get full text
Article -
939
Efficiently computing RKN for keyword queries on XML data
Published 2014-07-01“…As RKN-Base cannot avoid processing all useless nodes,an optimized algorithm,namely RKN-Optimized,was then proposed,which computes RKN sets based on the set of ELCA nodes, rather than the set of inverted lists as RKN-Base does. …”
Get full text
Article -
940
Efficiently computing RKN for keyword queries on XML data
Published 2014-07-01“…As RKN-Base cannot avoid processing all useless nodes,an optimized algorithm,namely RKN-Optimized,was then proposed,which computes RKN sets based on the set of ELCA nodes, rather than the set of inverted lists as RKN-Base does. …”
Get full text
Article