scispace - formally typeset
Search or ask a question
Topic

Software

About: Software is a research topic. Over the lifetime, 130577 publications have been published within this topic receiving 2028987 citations. The topic is also known as: computer software & computational tool.


Papers
More filters
Patent
18 Jan 2001
TL;DR: In this article, a method and corresponding system for updating or installing new software loaded into the memory of an implantable medical device (IMD) implanted within a body of a patient is described.
Abstract: A method and corresponding system for updating or installing new software loaded into the memory of an implantable medical device(IMD) implanted within a body of a patient is described. The updated or new software may be installed in the memory of the IMD without the patient having to travel to a clinic or hospital, and may be effected by employing modem telecommunication and Internet techniques in conjunction with a remote computer system.

332 citations

Journal ArticleDOI
TL;DR: An easy-to-use software package is described which efficiently solves the given problem and has been tested on a number of complex engineering tasks, including aerospace and robotic trajectory planning.
Abstract: A great number of analysis and synthesis problems of modern processes can be written as state and control constrained optimal control problems governed by ordinary differential equations with multipoint boundary values. As the software tools for following this attractive approach are still missing or can be used only by experts, the structure and usage of an easy-to-use software package is described which efficiently solves the given problem. Among its features are user-orientation, applicability on personal computers and mainframes, and robustness with respect to model changes and inaccurate starting values. It has been tested on a number of complex engineering tasks, including aerospace and robotic trajectory planning.

332 citations

Journal ArticleDOI

331 citations

Book
24 Mar 2005
TL;DR: This book is accompanied by a full distribution of ALBERTA (Version 1.2) on a CD including an implementation of several model problems including the direct integration of such new or improved methods in existing simulation software.
Abstract: During the last years, scientific computing has become an important research branch located between applied mathematics and applied sciences and engineering. Highly efficient numerical methods are based on adaptive methods, higher order discretizations, fast linear and non-linear iterative solvers, multi-level algorithms, etc. Such methods are integrated in the adaptive finite element software ALBERTA. It is a toolbox for the fast and flexible implementation of efficient software for real life applications, based on modern algorithms. ALBERTA also serves as an environment for improving existent, or developing new numerical methods in an interplay with mathematical analysis and it allows the direct integration of such new or improved methods in existing simulation software. The book is accompanied by a full distribution of ALBERTA (Version 1.2) on a CD including an implementation of several model problems. System requirements for ALBERTA are a Unix/Linux environment with C and FORTRAN Compilers, OpenGL graphics and GNU make. These model implementations serve as a basis for students and researchers for the implementation of their own research projects within ALBERTA.

331 citations

01 Jan 2008
TL;DR: A new image steganographic technique capable of producing a secret-embedded image that is totally indistinguishable from the original image by the human eye is proposed, and the proposed scheme is secure against the RS detection attack.
Abstract: In this paper, we shall propose a new image steganographic technique capable of producing a secret-embedded image that is totally indistinguishable from the original image by the human eye. In addition, our new method avoids the falling-off-boundary problem by using pixel-value differencing and the modulus function. First, we derive a difference value from two consecutive pixels by utilizing the pixel-value differencing technique (PVD). The hiding capacity of the two consecutive pixels depends on the difference value. In other words, the smoother area is, the less secret data can be hidden; on the contrary, the more edges an area has, the more secret data can be embedded. This way, the stego-image quality degradation is more imperceptible to the human eye. Second, the remainder of the two consecutive pixels can be computed by using the modulus operation, and then secret data can be embedded into the two pixels by modifying their remainder. In our scheme, there is an optimal approach to alter the remainder so as to greatly reduce the image distortion caused by the hiding of the secret data. The values of the two consecutive pixels are scarcely changed after the embedding of the secret message by the proposed optimal alteration algorithm. Experimental results have also demonstrated that the proposed scheme is secure against the RS detection attack.

330 citations


Network Information
Related Topics (5)
User interface
85.4K papers, 1.7M citations
87% related
Cluster analysis
146.5K papers, 2.9M citations
86% related
Support vector machine
73.6K papers, 1.7M citations
86% related
The Internet
213.2K papers, 3.8M citations
85% related
Information system
107.5K papers, 1.8M citations
85% related
Performance
Metrics
No. of papers in the topic in previous years
YearPapers
20246
20235,523
202213,625
20213,455
20205,268
20195,982