Search alternatives:
commuting » competing (Expand Search)
Showing 241 - 260 results of 7,907 for search '(commuting OR computing) behavior', query time: 0.18s Refine Results
  1. 241

    Computationally secure steganography based on speech synthesis by Menghan LI, Kejiang CHEN, Weiming ZHANG, Nenghai YU

    Published 2022-06-01
    “…The steganography theory of computing security has been proposed for a long time, but it has not been widely adopted for mainstream steganography using multimedia data as a carrier.The reason is that the prerequisite for calculating secure steganography is to obtain the accurate distribution of the carrier or to accurately sample according to the carrier distribution.However, naturally collected images and audio/video cannot meet this prerequisite.With the development of deep learning technology, various machine-generated media such as image generation and synthesized speech, have become more and more common on the Internet and then generated media has become a reasonable steganography carrier.Steganography can use normal generated media to cover up secret communications, and pursue in distinguishability from normal generated media.The distribution learned by some generative models is known or controllable, which provides an opportunity to push computational security steganography for practical use.Taking the widely used synthetic speech model as an example, a computationally secure symmetric key steganography algorithm was designed and implemented.The message was decompressed into the synthetic audio according to the decoding process of arithmetic coding based on the conditional probability of sample points, and the message receiver had the same generation model to complete the message extraction by reproducing the audio synthesis process.The public key steganography algorithm was additionally designed based on this algorithm, which provided algorithmic support for the realization of full-flow steganographic communication.Steganographic key exchange ensured the security of steganographic content and the security of steganographic behavior was also achieved.The theoretical analysis showed that the security of the proposed algorithm is determined by the randomness of the embedded message.And the steganography analysis experiment further verified that the attacker cannot distinguish the synthesized carrier audio from the encrypted audio.…”
    Get full text
    Article
  2. 242

    Computer simulation of the wound process (review of literature) by A. M. Morozov, A. N. Sergeev, A. V. Sungurova, D. V. Morozov, M. A. Belyak, A. S. Domracheva

    Published 2023-03-01
    “…Relevance. Computer simulation is a mathematical modeling process performed on a computer that is designed to predict the behavior or results of a real or physical system. …”
    Get full text
    Article
  3. 243
  4. 244
  5. 245

    An Efficient Hybrid 3D Computer-Aided Cephalometric Analysis for Lateral Cephalometric and Cone-Beam Computed Tomography (CBCT) Systems by Laurine A. Ashame, Sherin M. Youssef, Mazen Nabil Elagamy, Sahar M. El-Sheikh

    Published 2025-06-01
    “…This explainability is crucial in medical AI applications, where understanding model behavior is as important as achieving high accuracy. …”
    Get full text
    Article
  6. 246

    Heuristic genetic algorithm of computational pipelines optimization by A. A. Prihozhy, A. M. Zhdanouski, O. N. Karasik, M. .. Mattavelli

    Published 2019-06-01
    “…An analysis of computational pipelines and their optimization methods has been performed. …”
    Get full text
    Article
  7. 247
  8. 248
  9. 249

    Computational Intelligence of Numerical Dynamics of Nanofluidic Model by Tahir Nawaz Cheema, Ali Raza, Maysaa Elmahi Abd Elwahab, Ayesha Shabbir, Sharafat Ali, Emad Fadhal

    Published 2025-01-01
    “…Numerical experiments explore both rapid and slow steady-state behaviors, revealing characteristics rarely observed in the integer-order models. …”
    Get full text
    Article
  10. 250

    The Importance of Use of Computer Technology in Ecological Livestock by Hasan Çelikyürek, Kadir Karakuş

    Published 2017-12-01
    “…Ecological livestock is a production method which allows all kinds of natural behaviors to be shown, fed with ecological feeds, in order to increase efficiency additives are not used, healthier products are offered to consumers, is sensitive to environmental awareness and animal rights. …”
    Get full text
    Article
  11. 251
  12. 252
  13. 253
  14. 254

    Conjunct model of cloud & client computing based on multi-agent by XU Xiao-long, CHENG Chun-ling, XIONG Jing-yi

    Published 2010-01-01
    “…In order to utilize the resources of all nodes in networks fully,a novel conjunct model of cloud & client computing based on multi-agent was proposed,dividing the computing environment into three layers in accordance with the type of node and adopting agent to represent the behavior and resource of node to realize more efficient resource sharing and collaboration.The model takes full account of available resources owned by terminal nodes and deploys tasks in an orderly manner to the core nodes,servers and terminal nodes in order to maximize the efficiency of the resource utilization.To assure that tasks could be completed efficiently and reliably,a multi-agent-based collaborative multi-ring management mechanism was also presented,which is particularly suitable for the cloud & client conjunct computing environment and propitious to enhance the stability of resources sharing and nodes cooperation and relieve the load of core nodes.Finally,the construction method of experimental system and application demonstration based on the model was provided for reference.…”
    Get full text
    Article
  15. 255

    Conjunct model of cloud & client computing based on multi-agent by XU Xiao-long, CHENG Chun-ling, XIONG Jing-yi

    Published 2010-01-01
    “…In order to utilize the resources of all nodes in networks fully,a novel conjunct model of cloud & client computing based on multi-agent was proposed,dividing the computing environment into three layers in accordance with the type of node and adopting agent to represent the behavior and resource of node to realize more efficient resource sharing and collaboration.The model takes full account of available resources owned by terminal nodes and deploys tasks in an orderly manner to the core nodes,servers and terminal nodes in order to maximize the efficiency of the resource utilization.To assure that tasks could be completed efficiently and reliably,a multi-agent-based collaborative multi-ring management mechanism was also presented,which is particularly suitable for the cloud & client conjunct computing environment and propitious to enhance the stability of resources sharing and nodes cooperation and relieve the load of core nodes.Finally,the construction method of experimental system and application demonstration based on the model was provided for reference.…”
    Get full text
    Article
  16. 256
  17. 257

    In‐Materia Neuromorphic Properties Induced by Locally Denatured Regions in Sulfonated Polyaniline Networks Incorporating Au Nanoparticles by Yuki Usami, Tomoyo Fukumaru, Yuya Kawashima, Tomoki Misaka, Yoichi Otsuka, Hiroshi Ohoyama, Yasuhisa Naitoh, Takuya Matsumoto

    Published 2025-08-01
    “…These results indicate that the design‐less SPAN–AuNP networks exhibit neuromorphic behavior similar to that of spiking neurons and thus have potential applications in in‐materia computing.…”
    Get full text
    Article
  18. 258

    Comparative Analysis of Computational Times of Lithium-Ion Battery Management Solvers and Battery Models Under Different Programming Languages and Computing Architectures by Moin Ahmed, Zhiyu Mao, Yunpeng Liu, Aiping Yu, Michael Fowler, Zhongwei Chen

    Published 2024-12-01
    “…Various reduced-order PBM battery models and their computationally efficient numerical schemes have been proposed in the literature. …”
    Get full text
    Article
  19. 259
  20. 260

    Recomendaciones para implementar intervenciones de calidad de promoción del desplazamiento activo al colegio (Recommendations to implement quality interventions to promote active c... by Emilio Villa-González, Jonatan Ruiz, Palma Chillón

    Published 2016-07-01
    “…Como conclusión se recomienda que se incremente la dosis de las intervenciones, así como se oriente de manera adecuada el contenido de la misma y se realicen varias medidas de evaluación a lo largo de la intervención, con el fin de mejorar la calidad de las intervenciones. Abstract. Active commuting to school is a behavior that can be changed and could generate several health benefits in young people. …”
    Get full text
    Article