Academic literature on the topic 'Electronic data processing Computers'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Electronic data processing Computers.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Electronic data processing Computers"

1

Moulin, P., A. T. Ogielski, G. Lilienfeld, and J. W. Woods. "Video Signal Processing and Coding on Data-Parallel Computers." Digital Signal Processing 5, no. 2 (1995): 118–29. http://dx.doi.org/10.1006/dspr.1995.1011.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Jacobson, Robert V. "Electronic Data Processing Security—An Overview." International Journal of Network Management 6, no. 2 (1996): 77–93. http://dx.doi.org/10.1002/(sici)1099-1190(199603/04)6:2<77::aid-nem184>3.0.co;2-7.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Cao, Yuan, Hongkang Lu, and Tao Wen. "A Safety Computer System Based on Multi-Sensor Data Processing." Sensors 19, no. 4 (2019): 818. http://dx.doi.org/10.3390/s19040818.

Full text
Abstract:
The safety computer in the train control system is designed to be the double two-vote-two architecture. If safety-critical multi-input data are inconsistent, this may cause non-strict multi-sensor data problems in the output. These kinds of problems may directly affect the decision making of the safety computer and even pose a serious threat to the safe operation of the train. In this paper, non-strict multi-sensor data problems that exist in traditional safety computers are analyzed. The input data are classified based on data features and safety computer features. Then, the input data that cause non-strict multi-sensor data problems are modeled. Fuzzy theory is used in the safety computer to process multi-sensor data and to avoid the non-strict multi-sensor problems. The fuzzy processing model is added into the onboard double two-vote-two architecture safety computer platform. The fuzzy processing model can be divided into two parts: improved fuzzy decision tree and improved fuzzy weighted fusion. Finally, the model is verified based on two kinds of data. Verification results indicate that the fuzzy processing model can effectively reduce the non-strict identical problems and improve the system efficiency on the premise of ensuring the data reliability.
APA, Harvard, Vancouver, ISO, and other styles
4

El-Seoud, Samir Abou, Reham Fouad Mohamed, and Samy Ghoneimy. "DNA Computing: Challenges and Application." International Journal of Interactive Mobile Technologies (iJIM) 11, no. 2 (2017): 74. http://dx.doi.org/10.3991/ijim.v11i2.6564.

Full text
Abstract:
&lt;p class="Abstract"&gt;Much of our scientific, technological, and economic future depends on the availability of an ever-increasing supply of computational power. However, the increasing demand for such power has pushed electronic technology to the limit of physical feasibility and has raised the concern that this technology may not be able to sustain our growth in the near future. It became important to consider an alternative means of achieving computational power. In this regard, DNA computing was introduced based on the usage of DNA and molecular biology hardware instead of the typical silicon based technology. The molecular computers could take advantage of DNA's physical properties to store information and perform calculations. These include extremely dense information storage, enormous parallelism and extraordinary energy efficiency. One of the main advantages that DNA computations would add to computation is its self - parallel processing while most of the electronic computers now use linear processing. In this paper, the DNA computation is reviewed and its state of the art challenges and applications are presented. Some of these applications are those require fast processing, at which DNA computers would be able to solve the hardest problems faster than the traditional ones. For example, 10 trillion DNA molecules can fit in one cubic centimeter that would result in a computer that holds 10 terabytes of data. Moreover, this work focuses on whether a large scale molecular computer can be built.&lt;/p&gt;
APA, Harvard, Vancouver, ISO, and other styles
5

Mansfield, John F. "An Introduction Electronic Documentation Preparation and Submission for Future Microscopy and Microanalysis Meetings." Microscopy and Microanalysis 5, S2 (1999): 520–21. http://dx.doi.org/10.1017/s1431927600015920.

Full text
Abstract:
Since the introduction of personal computers in the early 1980s, most documents and manuscripts have been prepared from within a word processing program on such a computer. Indeed, most documents on personal computers are created on a limited number of word processing packages that have come to dominate the market. Most of the data acquisition that attendees of Microscopy and Microanalysis currently perform is digital, i.e. directly into a personal computer or desktop workstation. It is frequently the case that images, spectra and diffraction patterns are only committed to paper when they are dispatched for publication. With the advent of the World Wide Web in 1994, and its subsequent explosive growth, entirely electronic publishing has become possible. It is possible to envisage the day when most publications will be available solely electronically and material will be only printed out occasionally by the reader.While there are a growing number of journals that are only available electronically, entirely paperless publication is not yet the norm and there are no definite plans, as yet, to publish the proceedings of the Microscopy and Microanalysis meetings solely in electronic format. However, there are a number of advantages to applying some of these emerging technologies in the production of the future proceedings. Electronic submission of abstracts is one advance that is being considered by the organizers of the meetings scheduled for the early 2000s. The National Science Foundation now receives almost all proposals electronically. There are several reasons for moving to electronic submission. The first is that proofing and correcting the abstracts would then be straightforward.
APA, Harvard, Vancouver, ISO, and other styles
6

Ahmad Bukhori S. "DESAIN SISTEM: VISUAL BASIC FOR APPLICATION EXCEL 2010 UNTUK PENGGAJIAN GURU MADRASAH ALIYAH MUHAMMADIYAH I MALANG." INTAJ : Jurnal Penelitian Ilmiah 3, no. 1 (2019): 155–85. http://dx.doi.org/10.35897/intaj.v3i1.209.

Full text
Abstract:
In the world of education in Indonesia, computers have been introduced and used in schools ranging from basic education to tertiary institutions. Computers make it easy to find and provide learning materials can also be obtained, for example by the concept of electronic libraries (e-libraries) or electronic books (e-books).&#x0D; MA Muhammadiyah I Malang is a school that is equivalent to a high school (SMA) that has used a computer as a tool for the process of teaching and learning activities, finance, administration and so forth. Computers are tools that help humans in making reports or in producing information that can be achieved as a basis for decision making and can contribute more to data storage and data retrieval processes. Currently in the financial section for the processing of teaching fees and employee honorariums still use Microsoft Excel. Separate financial data in several sheets that require separate data input for each sheet so that financial calculations and reporting are less efficient and fast.&#x0D; The bookkeeping process is sometimes very difficult, complicated or even troublesome for some people. But today's computer technology has been able to change this process to be easier, simpler, faster and more efficientPayroll system is a computer application created to make it easier for employees in the financial department to make, calculate, report and analyze school financial turnover so that the application can provide optimal services to teachers and employees as a support for timely decision making.
APA, Harvard, Vancouver, ISO, and other styles
7

Voland, Patrick, and Hartmut Asche. "Processing and Visualizing Floating Car Data for Human-Centered Traffic and Environment Applications." International Journal of Agricultural and Environmental Information Systems 8, no. 2 (2017): 32–49. http://dx.doi.org/10.4018/ijaeis.2017040103.

Full text
Abstract:
In the era of the Internet of Things and Big Data modern cars have become mobile electronic systems or computers on wheels. Car sensors record a multitude of car and traffic related data as well as environmental parameters outside the vehicle. The data recorded are spatio-temporal by nature (floating car data) and can thus be classified as geodata. Their geospatial potential is, however, not fully exploited so far. In this paper, we present an approach to collect, process and visualize floating car data for traffic- and environment-related applications. It is demonstrated that cartographic visualization, in particular, is as effective means to make the enormous stocks of machine-recorded data available to human perception, exploration and analysis.
APA, Harvard, Vancouver, ISO, and other styles
8

ZIPPEL, RICHARD. "THE DATA STRUCTURE ACCELERATOR ARCHITECTURE." International Journal of High Speed Electronics and Systems 07, no. 04 (1996): 533–71. http://dx.doi.org/10.1142/s012915649600030x.

Full text
Abstract:
We present a heterogeneous architecture that contains a fine grained, massively parallel SIMD component called the data structure accelerator and demonstrate its use in a number of problems in computational geometry including polygon filling and convex hull. The data structure accelerator is extremely dense and highly scalable. Systems of 106 processing elements can be embedded in workstations and personal computers, without dramatically changing their cost. These components are intended for use in tandem with conventional single sequence machines and with small scale, shared memory multiprocessors. A language for programming these heterogeneous systems is presented that smoothly incorporates the SIMD instructions of the data structure accelerator with conventional single sequence code. We then demonstrate how to construct a number of higher level primitives such as maximum and minimum, and apply these tools to problems in logic and computational geometry. For computational geometry problems, we demonstrate that simple algorithms that take advantage of the parallelism available on a data structure accelerator perform as well or better than the far more complex algorithms which are needed for comparable efficiency on single sequence computers.
APA, Harvard, Vancouver, ISO, and other styles
9

Noakes, J. E., J. D. Spaulding, and R. J. Valenta. "Low-Level Liquid Scintillation Counter Array with Computerized Data Acquisition and Age Calculation Capabilities for 14C Dating." Radiocarbon 37, no. 2 (1995): 773–79. http://dx.doi.org/10.1017/s0033822200031325.

Full text
Abstract:
We describe a two-phase study directed toward background reduction of a manual liquid scintillation counter and the interfacing of electronics for counting to a computer data acquisition system. Counter background reduction is achieved with afterpulse electronics, a high-performance cocktail, an auxiliary detector/guard and a special sample vial holder. The data acquisition system is comprised of an electronic signal processor and sorter for operating up to eight counters simultaneously and interfacing to a computer with software for data storage, acquisitions and age dating calculations. We discuss low-background counter modifications, electronic signal processing and computer software for 14C age dating.
APA, Harvard, Vancouver, ISO, and other styles
10

Seitkulov, Yerzhan N., Seilkhan N. Boranbayev, Gulden B. Ulyukova, Banu B. Yergaliyeva, and Dina Satybaldina. "Methods for secure cloud processing of big data." Indonesian Journal of Electrical Engineering and Computer Science 22, no. 3 (2021): 1650. http://dx.doi.org/10.11591/ijeecs.v22.i3.pp1650-1658.

Full text
Abstract:
We study new methods of secure cloud processing of big data when solving applied computationally-complex problems with secret parameters. This is one of the topical issues of secure client-server communication. As part of our research work, we model the client-server interactions: we give specific definitions of such concepts as “solvable by the protocol”, “secure protocol”, “correct protocol”, as well as actualize the well-known concepts-“active attacks” and “passive attacks”. First, we will outline the theory and methods of secure outsourcing for various abstract equations with secret parameters, and then present the results of using these methods in solving applied problems with secret parameters, arising from the modeling of economic processes. Many economic tasks involve processing a large set of economic indicators. Therefore, we are considering a typical economic problem that can only be solved on very powerful computers.
APA, Harvard, Vancouver, ISO, and other styles
More sources

Dissertations / Theses on the topic "Electronic data processing Computers"

1

Parker, Greg. "Robust processing of diffusion weighted image data." Thesis, Cardiff University, 2014. http://orca.cf.ac.uk/61622/.

Full text
Abstract:
The work presented in this thesis comprises a proposed robust diffusion weighted magnetic resonance imaging (DW-MRI) pipeline, each chapter detailing a step designed to ultimately transform raw DW-MRI data into segmented bundles of coherent fibre ready for more complex analysis or manipulation. In addition to this pipeline we will also demonstrate, where appropriate, ways in which each step could be optimized for the maxillofacial region, setting the groundwork for a wider maxillofacial modelling project intended to aid surgical planning. Our contribution begins with RESDORE, an algorithm designed to automatically identify corrupt DW-MRI signal elements. While slower than the closest alternative, RESDORE is also far more robust to localised changes in SNR and pervasive image corruptions. The second step in the pipeline concerns the retrieval of accurate fibre orientation distribution functions (fODFs) from the DW-MRI signal. Chapter 4 comprises a simulation study exploring the application of spherical deconvolution methods to `generic' fibre; finding that the commonly used constrained spherical harmonic deconvolution (CSHD) is extremely sensitive to calibration but, if handled correctly, might be able to resolve muscle fODFs in vivo. Building upon this information, Chapter 5 conducts further simulations and in vivo image experimentation demonstrating that this is indeed the case, allowing us to demonstrate, for the first time, anatomically plausible reconstructions of several maxillofacial muscles. To complete the proposed pipeline, Chapter 6 then introduces a method for segmenting whole volume streamline tractographies into anatomically valid bundles. In addition to providing an accurate segmentation, this shape-based method does not require computationally expensive inter-streamline comparisons employed by other approaches, allowing the algorithm to scale linearly with respect to the number of streamlines within the dataset. This is not often true for comparison based methods which in the best case scale in higher linear time but more often by O(N2) complexity.
APA, Harvard, Vancouver, ISO, and other styles
2

Cheung, Steven. "Packet routing on mesh-connected computers /." [Hong Kong] : University of Hong Kong, 1992. http://sunzi.lib.hku.hk/hkuto/record.jsp?B13209607.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

張治昌 and Steven Cheung. "Packet routing on mesh-connected computers." Thesis, The University of Hong Kong (Pokfulam, Hong Kong), 1992. http://hub.hku.hk/bib/B3121020X.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Rehfuss, Paul Stephen. "Parallelism in contextual processing /." Full text open access at:, 1999. http://content.ohsu.edu/u?/etd,272.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Romig, Phillip R. "Parallel task processing of very large datasets." [Lincoln, Neb. : University of Nebraska-Lincoln], 1999. http://international.unl.edu/Private/1999/romigab.pdf.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Baharon, M. R. "Mobile network and cloud based privacy-preserving data aggregation and processing." Thesis, Liverpool John Moores University, 2017. http://researchonline.ljmu.ac.uk/7244/.

Full text
Abstract:
The emerging technology of mobile devices and cloud computing has brought a new and efficient way for data to be collected, processed and stored by mobile users. With improved specifications of mobile devices and various mobile applications provided by cloud servers, mobile users can enjoy tremendous advantages to manage their daily life through those applications instantaneously, conveniently and productively. However, using such applications may lead to the exposure of user data to unauthorised access when the data is outsourced for processing and storing purposes. Furthermore, such a setting raises the privacy breach and security issue to mobile users. As a result, mobile users would be reluctant to accept those applications without any guarantee on the safety of their data. The recent breakthrough of Fully Homomorphic Encryption (FHE) has brought a new solution for data processing in a secure motion. Several variants and improvements on the existing methods have been developed due to efficiency problems. Experience of such problems has led us to explore two areas of studies, Mobile Sensing Systems (MSS) and Mobile Cloud Computing (MCC). In MSS, the functionality of smartphones has been extended to sense and aggregate surrounding data for processing by an Aggregation Server (AS) that may be operated by a Cloud Service Provider (CSP). On the other hand, MCC allows resource-constraint devices like smartphones to fully leverage services provided by powerful and massive servers of CSPs for data processing. To support the above two application scenarios, this thesis proposes two novel schemes: an Accountable Privacy-preserving Data Aggregation (APDA) scheme and a Lightweight Homomorphic Encryption (LHE) scheme. MSS is a kind of WSNs, which implements a data aggregation approach for saving the battery lifetime of mobile devices. Furthermore, such an approach could improve the security of the outsourced data by mixing the data prior to be transmitted to an AS, so as to prevent the collusion between mobile users and the AS (or its CSP). The exposure of users’ data to other mobile users leads to a privacy breach and existing methods on preserving users’ privacy only provide an integrity check on the aggregated data without being able to identify any misbehaved nodes once the integrity check has failed. Thus, to overcome such problems, our first scheme APDA is proposed to efficiently preserve privacy and support accountability of mobile users during the data aggregation. Furthermore, APDA is designed with three versions to provide balanced solutions in terms of misbehaved node detection and data aggregation efficiency for different application scenarios. In addition, the successfully aggregated data also needs to be accompanied by some summary information based on necessary additive and non-additive functions. To preserve the privacy of mobile users, such summary could be executed by implementing existing privacy-preserving data aggregation techniques. Nevertheless, those techniques have limitations in terms of applicability, efficiency and functionality. Thus, our APDA has been extended to allow maximal value finding to be computed on the ciphertext data so as to preserve user privacy with good efficiency. Furthermore, such a solution could also be developed for other comparative operations like Average, Percentile and Histogram. Three versions of Maximal value finding (Max) are introduced and analysed in order to differentiate their efficiency and capability to determine the maximum value in a privacy-preserving manner. Moreover, the formal security proof and extensive performance evaluation of our proposed schemes demonstrate that APDA and its extended version can achieve stronger security with an optimised efficiency advantage over the state-of-the-art in terms of both computational and communication overheads. In the MCC environment, the new LHE scheme is proposed with a significant difference so as to allow arbitrary functions to be executed on ciphertext data. Such a scheme will enable rich-mobile applications provided by CSPs to be leveraged by resource-constraint devices in a privacy-preserving manner. The scheme works well as long as noise (a random number attached to the plaintext for security reasons) is less than the encryption key, which makes it flexible. The flexibility of the key size enables the scheme to incorporate with any computation functions in order to produce an accurate result. In addition, this scheme encrypts integers rather than individual bits so as to improve the scheme’s efficiency. With a proposed process that allows three or more parties to communicate securely, this scheme is suited to the MCC environment due to its lightweight property and strong security. Furthermore, the efficacy and efficiency of this scheme are thoroughly evaluated and compared with other schemes. The result shows that this scheme can achieve stronger security under a reasonable cost.
APA, Harvard, Vancouver, ISO, and other styles
7

Robinson, Patrick Glen. "Distributed Linda : design, development, and characterization of the data subsystem /." Thesis, This resource online, 1994. http://scholar.lib.vt.edu/theses/available/etd-07102009-040417/.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Ahmed, Abdulbasit. "Online network intrusion detection system using temporal logic and stream data processing." Thesis, University of Liverpool, 2013. http://livrepository.liverpool.ac.uk/12153/.

Full text
Abstract:
These days, the world is becoming more interconnected, and the Internet has dominated the ways to communicate or to do business. Network security measures must be taken to protect the organization environment. Among these security measures are the intrusion detection systems. These systems aim to detect the actions that attempt to compromise the confidentiality, availability, and integrity of a resource by monitoring the events occurring in computer systems and/or networks. The increasing amounts of data that are transmitted at higher and higher speed networks created a challenging problem for the current intrusion detection systems. Once the traffic exceeds the operational boundaries of these systems, packets are dropped. This means that some attacks will not be detected. In this thesis, we propose developing an online network based intrusion detection system by the combined use of temporal logic and stream data processing. Temporal Logic formalisms allow us to represent attack patterns or normal behaviour. Stream data processing is a recent database technology applied to flows of data. It is designed with high performance features for data intensive applications processing. In this work we develop a system where temporal logic specifications are automatically translated into stream queries that run on the stream database server and are continuously evaluated against the traffic to detect intrusions. The experimental results show that this combination was efficient in using the resources of the running machines and was able to detect all the attacks in the test data. Additionally, the proposed solution provides a concise and unambiguous way to formally represent attack signatures and it is extensible allowing attacks to be added. Also, it is scalable as the system can benefit from using more CPUs and additional memory on the same machine, or using distributed servers.
APA, Harvard, Vancouver, ISO, and other styles
9

Baker, James McCall Jr. "Run-time systems for fine-grain message-passing parallel computers." Diss., Georgia Institute of Technology, 1998. http://hdl.handle.net/1853/15366.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Garg, Vivek. "Mechanisms for hiding communication latency in data parallel architecture." Diss., Georgia Institute of Technology, 1997. http://hdl.handle.net/1853/15609.

Full text
APA, Harvard, Vancouver, ISO, and other styles
More sources

Books on the topic "Electronic data processing Computers"

1

Barbara, Deitel, ed. Computers and data processing. Academic Press, 1985.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
2

Mandell, Steven L. Computers and data processing today. 2nd ed. West Pub. Co., 1986.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
3

Myrna, Silver, ed. Computers & information processing. Harper & Row, 1986.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
4

1938-, Williams Brian K., ed. Computers and data processing. 2nd ed. Benjamin/Cummings Pub. Co., 1986.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
5

Alkins, Arthur C. Computers and data processing today. 2nd ed. Dow Jones-Irwin, 1986.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
6

Hofeditz, Calvin A. Computers and data processing made simple. Doubleday, 1987.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
7

Myrna, Silver, and Silver Gerald A, eds. Computers and information processing. HarperPerennial, 1993.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
8

Mandell, Steven L. Computers and data processing: Conceptsand applications. 3rd ed. West Pub. Co., 1985.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
9

Montana. Legislature. Office of the Legislative Auditor. EDP audit: Electronic data processing survey. The Office, 1991.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
10

Deitel, Harvey M. Computers and data processing. Academic Press, 1985.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
More sources

Book chapters on the topic "Electronic data processing Computers"

1

Walsh, Vincent. "Electronic Data Processing." In Computer Literacy. Macmillan Education UK, 1985. http://dx.doi.org/10.1007/978-1-349-07674-1_13.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Cao, Yuan. "The Application of Computer Communication Technology in Electronic Information Engineering." In 2020 International Conference on Data Processing Techniques and Applications for Cyber-Physical Systems. Springer Singapore, 2021. http://dx.doi.org/10.1007/978-981-16-1726-3_11.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Cao, Ting. "The Application of Computer Communication Technology and Electronic Information in Artificial Intelligence Field." In 2020 International Conference on Data Processing Techniques and Applications for Cyber-Physical Systems. Springer Singapore, 2021. http://dx.doi.org/10.1007/978-981-16-1726-3_9.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Rabbi, Khandakar, Mohammed Kaosar, Md Rafiqul Islam, and Quazi Mamun. "A Secure Real Time Data Processing Framework for Personally Controlled Electronic Health Record (PCEHR) System." In Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering. Springer International Publishing, 2015. http://dx.doi.org/10.1007/978-3-319-23802-9_13.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Bingham, John. "Computers — The Machines." In Data Processing. Macmillan Education UK, 1989. http://dx.doi.org/10.1007/978-1-349-19938-9_5.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Bingham, John. "Data Processing and the Role of Computers." In Data Processing. Macmillan Education UK, 1989. http://dx.doi.org/10.1007/978-1-349-19938-9_1.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Ueberhuber, Christoph W. "Computers for Numerical Data Processing." In Numerical Computation 1. Springer Berlin Heidelberg, 1997. http://dx.doi.org/10.1007/978-3-642-59118-1_3.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Ziessow, Dieter. "NMR Data Processing in Computers." In NMR in Living Systems. Springer Netherlands, 1986. http://dx.doi.org/10.1007/978-94-009-4580-7_6.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Malley, Brian, Daniele Ramazzotti, and Joy Tzung-yu Wu. "Data Pre-processing." In Secondary Analysis of Electronic Health Records. Springer International Publishing, 2016. http://dx.doi.org/10.1007/978-3-319-43742-2_12.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Zeevi, Yehoshua Y., and Ran Ginosar. "Neural Computers in Vision: Processing of High Dimensional Data." In Neural Computers. Springer Berlin Heidelberg, 1989. http://dx.doi.org/10.1007/978-3-642-83740-1_19.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "Electronic data processing Computers"

1

Zhang, Hanwen, and Yuansheng Lou. "Research and application of streaming Data transmission and processing architecture based on Pulsar." In 2021 4th International Conference on Advanced Electronic Materials, Computers and Software Engineering (AEMCSE). IEEE, 2021. http://dx.doi.org/10.1109/aemcse51986.2021.00236.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Peng, Ruiqi. "Analysis of Computer Information Processing Technology Based on Unstructured Data." In 2021 IEEE Asia-Pacific Conference on Image Processing, Electronics and Computers (IPEC). IEEE, 2021. http://dx.doi.org/10.1109/ipec51340.2021.9421190.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Hu, Yerong, Yihao Zhang, Xiangzhen He, and Shengyin Zhu. "Acquisition and processing of facial motion capture data." In 2020 Asia-Pacific Conference on Image Processing, Electronics and Computers (IPEC). IEEE, 2020. http://dx.doi.org/10.1109/ipec49694.2020.9115126.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Liu, Ruixia, and Qizhi Zhang. "Establishment and Application of Big Data Processing Platform." In 2020 International Conference on Computer Network, Electronic and Automation (ICCNEA). IEEE, 2020. http://dx.doi.org/10.1109/iccnea50255.2020.00035.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Qin, Jingwei, Yimu Guo, and Miaolei Zhou. "Data Acquisition and Processing of Electronic Compass for Mobile Robot Autonomous Navigation." In 2012 National Conference on Information Technology and Computer Science. Atlantis Press, 2012. http://dx.doi.org/10.2991/citcs.2012.17.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Galcov, German, Evdokiia Berkhova, and Anton Silenkov. "Computer Vision Data Processing Algorithm in 3D Image Reconstruction System." In 2020 IEEE Conference of Russian Young Researchers in Electrical and Electronic Engineering (EIConRus). IEEE, 2020. http://dx.doi.org/10.1109/eiconrus49466.2020.9039044.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Mihai, Viorel, Cristina Elena Hanganu, Grigore Stamatescu, and Dan Popescu. "WSN and Fog Computing Integration for Intelligent Data Processing." In 2018 10th International Conference on Electronics, Computers and Artificial Intelligence (ECAI). IEEE, 2018. http://dx.doi.org/10.1109/ecai.2018.8679064.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Geng, Shaofeng, and Jia Zhang. "A Parallel Processing Method for Uncertain Data Stream." In EITCE 2020: 2020 4th International Conference on Electronic Information Technology and Computer Engineering. ACM, 2020. http://dx.doi.org/10.1145/3443467.3443711.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Zhang, Rongxi. "Research on automatic first break picking method in seismic data processing." In 2014 International Conference on Computer Science and Electronic Technology. Atlantis Press, 2015. http://dx.doi.org/10.2991/iccset-14.2015.106.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Ding, Hui. "Research on Big Data Encryption Algorithm Based on Data Redundancy Elimination Technology." In 2021 IEEE Asia-Pacific Conference on Image Processing, Electronics and Computers (IPEC). IEEE, 2021. http://dx.doi.org/10.1109/ipec51340.2021.9421203.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Reports on the topic "Electronic data processing Computers"

1

Overberg, Mark E., Kent Martin Geib, Darwin Keith Serkland, Alan Yuan-Chun Hsu, Gordon Arthur Keeler, and Patrick Sean Finnegan. Electronic/photonic interfaces for ultrafast data processing. Office of Scientific and Technical Information (OSTI), 2008. http://dx.doi.org/10.2172/940521.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Federal Information Processing Standards Publication: electronic data interchange (EDI). National Institute of Standards and Technology, 1996. http://dx.doi.org/10.6028/nist.fips.161-2.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Standards for the Analysis and Processing of Surface-Water Data and Information Using Electronic Methods. US Geological Survey, 2002. http://dx.doi.org/10.3133/wri20014044.

Full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!