Suggested Topics within your search.
Suggested Topics within your search.
- Information technology 2
- Internet in public administration 2
- Moral and ethical aspects 2
- Public administration 2
- Communication policy 1
- Government policy 1
- Internet 1
- Photography 1
- Prevention 1
- Psychological aspects 1
- Psychology 1
- Social aspects 1
- Technological innovations 1
- Telecommunication policy 1
- Terrorism 1
- Terrorists 1
- Visual communication 1
-
241
Computationally secure steganography based on speech synthesis
Published 2022-06-01“…The steganography theory of computing security has been proposed for a long time, but it has not been widely adopted for mainstream steganography using multimedia data as a carrier.The reason is that the prerequisite for calculating secure steganography is to obtain the accurate distribution of the carrier or to accurately sample according to the carrier distribution.However, naturally collected images and audio/video cannot meet this prerequisite.With the development of deep learning technology, various machine-generated media such as image generation and synthesized speech, have become more and more common on the Internet and then generated media has become a reasonable steganography carrier.Steganography can use normal generated media to cover up secret communications, and pursue in distinguishability from normal generated media.The distribution learned by some generative models is known or controllable, which provides an opportunity to push computational security steganography for practical use.Taking the widely used synthetic speech model as an example, a computationally secure symmetric key steganography algorithm was designed and implemented.The message was decompressed into the synthetic audio according to the decoding process of arithmetic coding based on the conditional probability of sample points, and the message receiver had the same generation model to complete the message extraction by reproducing the audio synthesis process.The public key steganography algorithm was additionally designed based on this algorithm, which provided algorithmic support for the realization of full-flow steganographic communication.Steganographic key exchange ensured the security of steganographic content and the security of steganographic behavior was also achieved.The theoretical analysis showed that the security of the proposed algorithm is determined by the randomness of the embedded message.And the steganography analysis experiment further verified that the attacker cannot distinguish the synthesized carrier audio from the encrypted audio.…”
Get full text
Article -
242
Computer simulation of the wound process (review of literature)
Published 2023-03-01“…Relevance. Computer simulation is a mathematical modeling process performed on a computer that is designed to predict the behavior or results of a real or physical system. …”
Get full text
Article -
243
Trust in the machine: How contextual factors and personality traits shape algorithm aversion and collaboration
Published 2025-03-01Subjects: Get full text
Article -
244
Global Perspectives on Laptop Features: A Sentiment Analysis of User Preferences in Developed and Developing Countries
Published 2025-01-01Subjects: Get full text
Article -
245
An Efficient Hybrid 3D Computer-Aided Cephalometric Analysis for Lateral Cephalometric and Cone-Beam Computed Tomography (CBCT) Systems
Published 2025-06-01“…This explainability is crucial in medical AI applications, where understanding model behavior is as important as achieving high accuracy. …”
Get full text
Article -
246
Heuristic genetic algorithm of computational pipelines optimization
Published 2019-06-01“…An analysis of computational pipelines and their optimization methods has been performed. …”
Get full text
Article -
247
-
248
From Expert Computational Knowledge to Interdisciplinary Communication
Published 2024-06-01Get full text
Article -
249
Computational Intelligence of Numerical Dynamics of Nanofluidic Model
Published 2025-01-01“…Numerical experiments explore both rapid and slow steady-state behaviors, revealing characteristics rarely observed in the integer-order models. …”
Get full text
Article -
250
The Importance of Use of Computer Technology in Ecological Livestock
Published 2017-12-01“…Ecological livestock is a production method which allows all kinds of natural behaviors to be shown, fed with ecological feeds, in order to increase efficiency additives are not used, healthier products are offered to consumers, is sensitive to environmental awareness and animal rights. …”
Get full text
Article -
251
-
252
-
253
-
254
Conjunct model of cloud & client computing based on multi-agent
Published 2010-01-01“…In order to utilize the resources of all nodes in networks fully,a novel conjunct model of cloud & client computing based on multi-agent was proposed,dividing the computing environment into three layers in accordance with the type of node and adopting agent to represent the behavior and resource of node to realize more efficient resource sharing and collaboration.The model takes full account of available resources owned by terminal nodes and deploys tasks in an orderly manner to the core nodes,servers and terminal nodes in order to maximize the efficiency of the resource utilization.To assure that tasks could be completed efficiently and reliably,a multi-agent-based collaborative multi-ring management mechanism was also presented,which is particularly suitable for the cloud & client conjunct computing environment and propitious to enhance the stability of resources sharing and nodes cooperation and relieve the load of core nodes.Finally,the construction method of experimental system and application demonstration based on the model was provided for reference.…”
Get full text
Article -
255
Conjunct model of cloud & client computing based on multi-agent
Published 2010-01-01“…In order to utilize the resources of all nodes in networks fully,a novel conjunct model of cloud & client computing based on multi-agent was proposed,dividing the computing environment into three layers in accordance with the type of node and adopting agent to represent the behavior and resource of node to realize more efficient resource sharing and collaboration.The model takes full account of available resources owned by terminal nodes and deploys tasks in an orderly manner to the core nodes,servers and terminal nodes in order to maximize the efficiency of the resource utilization.To assure that tasks could be completed efficiently and reliably,a multi-agent-based collaborative multi-ring management mechanism was also presented,which is particularly suitable for the cloud & client conjunct computing environment and propitious to enhance the stability of resources sharing and nodes cooperation and relieve the load of core nodes.Finally,the construction method of experimental system and application demonstration based on the model was provided for reference.…”
Get full text
Article -
256
Development of technology for controlling access to digital portals and platforms based on estimates of user reaction time built into the interface
Published 2020-12-01Subjects: Get full text
Article -
257
In‐Materia Neuromorphic Properties Induced by Locally Denatured Regions in Sulfonated Polyaniline Networks Incorporating Au Nanoparticles
Published 2025-08-01“…These results indicate that the design‐less SPAN–AuNP networks exhibit neuromorphic behavior similar to that of spiking neurons and thus have potential applications in in‐materia computing.…”
Get full text
Article -
258
Comparative Analysis of Computational Times of Lithium-Ion Battery Management Solvers and Battery Models Under Different Programming Languages and Computing Architectures
Published 2024-12-01“…Various reduced-order PBM battery models and their computationally efficient numerical schemes have been proposed in the literature. …”
Get full text
Article -
259
Evolutionary dynamics of behavioral motivations for cooperation
Published 2025-04-01Get full text
Article -
260
Recomendaciones para implementar intervenciones de calidad de promoción del desplazamiento activo al colegio (Recommendations to implement quality interventions to promote active c...
Published 2016-07-01“…Como conclusión se recomienda que se incremente la dosis de las intervenciones, así como se oriente de manera adecuada el contenido de la misma y se realicen varias medidas de evaluación a lo largo de la intervención, con el fin de mejorar la calidad de las intervenciones. Abstract. Active commuting to school is a behavior that can be changed and could generate several health benefits in young people. …”
Get full text
Article