Suggested Topics within your search.
Suggested Topics within your search.
- Visual communication 2
- computer 2
- Bildanalyse 1
- Bildwissenschaft 1
- COMPUTERS / Internet / General 1
- Children 1
- Cloud computing 1
- Computer scheduling 1
- Data processing 1
- Economic Policy 1
- Economic policy 1
- Economics, Mathematical 1
- Energy Policy, Economics and Management 1
- Energy and state 1
- Energy policy 1
- Engineering mathematics 1
- Environmental Economics 1
- Environmental economics 1
- Industrial Organization 1
- Industrial organization 1
- Language 1
- Language disorders in children 1
- Linguistics 1
- MATHEMATICS / General 1
- MATHEMATICS / Number Systems 1
- MEDICAL / Audiology & Speech Pathology 1
- Moral and ethical aspects 1
- Numerical analysis 1
- Parallel programs (Computer programs) 1
- Photography 1
-
1881
-
1882
Advancing non-target analysis of emerging environmental contaminants with machine learning: Current status and future implications
Published 2025-04-01“…However, interpreting the vast datasets generated by HRMS is complex and requires advanced data processing techniques. Recent advancements in machine learning (ML) models offer great potential for enhancing NTA applications. …”
Get full text
Article -
1883
Parameter Design and Performance Optimization of Aerostatic Bearing
Published 2020-08-01Get full text
Article -
1884
Adaptive high frequency data streaming for Soft Real-Time Industrial AI: A scalable microservices based architecture with dynamic downsampling
Published 2025-09-01“…The rapid adoption of Internet of Things (IoT) devices and Edge computing has increased the demand for efficient processing of high-frequency sensor data. …”
Get full text
Article -
1885
QPSO-Based Adaptive DNA Computing Algorithm
Published 2013-01-01“…DNA (deoxyribonucleic acid) computing that is a new computation model based on DNA molecules for information storage has been increasingly used for optimization and data analysis in recent years. …”
Get full text
Article -
1886
-
1887
On-Chip Reconfigurable Hardware Accelerators for Popcount Computations
Published 2016-01-01“…Popcount computations are widely used in such areas as combinatorial search, data processing, statistical analysis, and bio- and chemical informatics. …”
Get full text
Article -
1888
-
1889
Flowering Intensity Estimation Using Computer Vision
Published 2025-04-01“…The comparison was completed using data analysis and the MobileNetV2 classifier as an evaluation model. …”
Get full text
Article -
1890
StarNet: Indian star gooseberries dataset for quality and maturity assessment(Mendeley Data).
Published 2025-08-01Get full text
Article -
1891
-
1892
Investigating Data Risk Considerations in Emergent Cyber Physical Production Systems
Published 2022-04-01Get full text
Article -
1893
-
1894
Computationally secure steganography based on speech synthesis
Published 2022-06-01“…The steganography theory of computing security has been proposed for a long time, but it has not been widely adopted for mainstream steganography using multimedia data as a carrier.The reason is that the prerequisite for calculating secure steganography is to obtain the accurate distribution of the carrier or to accurately sample according to the carrier distribution.However, naturally collected images and audio/video cannot meet this prerequisite.With the development of deep learning technology, various machine-generated media such as image generation and synthesized speech, have become more and more common on the Internet and then generated media has become a reasonable steganography carrier.Steganography can use normal generated media to cover up secret communications, and pursue in distinguishability from normal generated media.The distribution learned by some generative models is known or controllable, which provides an opportunity to push computational security steganography for practical use.Taking the widely used synthetic speech model as an example, a computationally secure symmetric key steganography algorithm was designed and implemented.The message was decompressed into the synthetic audio according to the decoding process of arithmetic coding based on the conditional probability of sample points, and the message receiver had the same generation model to complete the message extraction by reproducing the audio synthesis process.The public key steganography algorithm was additionally designed based on this algorithm, which provided algorithmic support for the realization of full-flow steganographic communication.Steganographic key exchange ensured the security of steganographic content and the security of steganographic behavior was also achieved.The theoretical analysis showed that the security of the proposed algorithm is determined by the randomness of the embedded message.And the steganography analysis experiment further verified that the attacker cannot distinguish the synthesized carrier audio from the encrypted audio.…”
Get full text
Article -
1895
-
1896
Evaluating Directed Acyclic Graphs with DAGMetrics: Insights from Tuber and Soil Microbiome Data
Published 2025-04-01Get full text
Article -
1897
Long-Term Engagement of Diverse Study Cohorts in Decentralized Research: Longitudinal Analysis of “All of Us” Research Program Data
Published 2025-03-01“…MethodsWe conducted a longitudinal analysis of the AoURP data, tracking changes in demographic composition, completion rates, and completion times for surveys and substudies. …”
Get full text
Article -
1898
Experimental and Computational Fluid Dynamics Simulation Study on the Performance of a Two-stroke Aviation Engine: A Comparative Analysis of Turbulence Models and Mesh Strategies
Published 2025-06-01“…This study presents an experimental and computational fluid dynamics (CFD) analysis to evaluate the performance of a two-stroke aviation engine under constant operating conditions. …”
Get full text
Article -
1899
The Opportunities and Challenges in Integrating AI with Quantum Computing
Published 2025-06-01“…This analysis reveals significant opportunities in areas like accelerated machine learning, tackling intractable problems, and processing quantum data. …”
Get full text
Article -
1900
Death by Data
Published 2025-07-01“… Computational state violence has developed through the broader political economy of datafication, where increasing dimensions of life are “made productive” via the intensification of enclosure, data capture, and analysis for recursive operationalization. …”
Get full text
Article