Suggested Topics within your search.
Suggested Topics within your search.
- Data processing 4
- Business 3
- Computer programs 3
- Information technology 3
- Management 3
- Internet in public administration 2
- Management information systems 2
- Photography 2
- Public administration 2
- Advertising media planning 1
- Anxiety Disorders 1
- Automatic speech recognition 1
- Bioinformatics 1
- Biological and Medical Physics, Biophysics 1
- Biological physics 1
- Biomathematics 1
- Biophysics 1
- Business intelligence 1
- COMPUTERS / Desktop Applications / Suites 1
- Certification 1
- Children 1
- Cloud computing 1
- Cognitive Therapy 1
- Commercial statistics 1
- Computer graphics 1
- Computer networks 1
- Computer simulation 1
- Computer systems 1
- Computer-aided design 1
- Design 1
-
1001
Parallel Monte Carlo computations in SCore environment
Published 2004-12-01“… Parallel Monte Carlo (PMC) methods are successful because particles are typically independent and easily distributed to multiple processors. We use the PC Cluster TAURAS [1] with the SCore cluster system software on top of Linux OS to present the strategy for parallelizing Monte Carlo calculations. …”
Get full text
Article -
1002
No-Regret Learning and Equilibrium Computation in Quantum Games
Published 2024-12-01“…As quantum processors advance, the emergence of large-scale decentralized systems involving interacting quantum-enabled agents is on the horizon. …”
Get full text
Article -
1003
-
1004
Full-process aerosol jet printing modelling: achieving high-fidelity simulation via coupling jetting and deposition
Published 2025-12-01Subjects: Get full text
Article -
1005
-
1006
On-Chip Reconfigurable Hardware Accelerators for Popcount Computations
Published 2016-01-01“…Popcount computations are widely used in such areas as combinatorial search, data processing, statistical analysis, and bio- and chemical informatics. …”
Get full text
Article -
1007
WorkflowHub: a registry for computational workflows
Published 2025-05-01“…Abstract The rising popularity of computational workflows is driven by the need for repetitive and scalable data processing, sharing of processing know-how, and transparent methods. …”
Get full text
Article -
1008
DETERMINATION OF STEEL GRAIN GRADE BY COMPUTER METHODS
Published 2010-09-01“…The necessity of correlation of GOST requirements and computer programs of images processing is discussed.…”
Get full text
Article -
1009
THE ROLE OF COMPUTED TOMOGRAPHY IN THE DIAGNOSIS OF RETROPERITONEAL FIBROSIS
Published 2018-06-01“…Although the final diagnosis can be made only on the basis of biopsy, computed tomography is of great importance for the evaluation of the pathological process, it allows diagnosing the disease, assessing its prevalence and observing the dynamics during treatment. …”
Get full text
Article -
1010
Computed Tomography in the Diagnosis of Neonatal Lung Diseases
Published 2009-04-01“…CT established the pattern of a pathological process in the lung. It clarified the nature of the disease in all the cases. …”
Get full text
Article -
1011
-
1012
-
1013
-
1014
Monitored Reconstruction: Computed Tomography as an Anytime Algorithm
Published 2020-01-01“…Computed tomography is an important technique for non-destructive analysis of an object’s internal structure, relevant for scientific studies, medical applications, and industry. …”
Get full text
Article -
1015
Computer modeling of rectangular-cylindrical trawl doors
Published 2015-06-01“…Computer modeling of the rectangular-cylindrical trawl doors designed by P.P. …”
Get full text
Article -
1016
Computationally secure steganography based on speech synthesis
Published 2022-06-01“…The steganography theory of computing security has been proposed for a long time, but it has not been widely adopted for mainstream steganography using multimedia data as a carrier.The reason is that the prerequisite for calculating secure steganography is to obtain the accurate distribution of the carrier or to accurately sample according to the carrier distribution.However, naturally collected images and audio/video cannot meet this prerequisite.With the development of deep learning technology, various machine-generated media such as image generation and synthesized speech, have become more and more common on the Internet and then generated media has become a reasonable steganography carrier.Steganography can use normal generated media to cover up secret communications, and pursue in distinguishability from normal generated media.The distribution learned by some generative models is known or controllable, which provides an opportunity to push computational security steganography for practical use.Taking the widely used synthetic speech model as an example, a computationally secure symmetric key steganography algorithm was designed and implemented.The message was decompressed into the synthetic audio according to the decoding process of arithmetic coding based on the conditional probability of sample points, and the message receiver had the same generation model to complete the message extraction by reproducing the audio synthesis process.The public key steganography algorithm was additionally designed based on this algorithm, which provided algorithmic support for the realization of full-flow steganographic communication.Steganographic key exchange ensured the security of steganographic content and the security of steganographic behavior was also achieved.The theoretical analysis showed that the security of the proposed algorithm is determined by the randomness of the embedded message.And the steganography analysis experiment further verified that the attacker cannot distinguish the synthesized carrier audio from the encrypted audio.…”
Get full text
Article -
1017
Parameter estimation and model selection in computational biology.
Published 2010-03-01“…A central challenge in computational modeling of biological systems is the determination of the model parameters. …”
Get full text
Article -
1018
COMPUTER VIBRATION MONITORING OF MACHINERY AND TURBINE UNITS
Published 2019-06-01“…The hardware-software organization of computer multichannel systems of vibration control is considered. …”
Get full text
Article -
1019
Computational Work with Very Large Text Collections
Published 2011-06-01“…The argument of the piece is that interoperability is a process as well as a state, that it requires mechanisms that would sustain it, and that TEI is one of those mechanisms.…”
Get full text
Article -
1020
COMPUTER- AIDED MODELING AND IMPROVING OF RISOGRAPH PRINTING
Published 2014-12-01Get full text
Article