Speech information processing method, apparatus and storage medium performing speech synthesis based on durations of phonemes

2007 ◽  
Vol 121 (2) ◽  
pp. 688
Author(s):  
Toshiaki Fukada
2014 ◽  
Vol 1010-1012 ◽  
pp. 429-436
Author(s):  
Jin Hua Shan ◽  
Jing Ding ◽  
Jian Feng Lu

Nitrate salt is important heat transfer and storage medium in solar thermal power system, but nitrate salt leakage and pollution in groundwater is seldom investigated. In this paper, the nitrate salt leakage and migration in the soil after rainfall are simulated and analyzed. During the nitrate leakage process, the liquid nitrate will solidify, and then a thin solidification layer of nitrate forms. According to the simulation result, the radius of the leakage opening mainly affects the radius of nitrate solidification layer, while the leakage velocity will influence the radius and thickness of salt layer. During the nitrate migration process after rainfall, the nitrate will gradually migrate to the groundwater, and the final migration domain of nitrate in the soil will be mainly determined by the radius of nitrate solidification layer.


1991 ◽  
Vol 118 (2) ◽  
pp. 275-293
Author(s):  
J. Roberts ◽  
N. J. Greenwood ◽  
J. D. Harsant ◽  
M. G. Sturmey

ABSTRACTThe paper was prepared by an informal working party as an introduction to an open forum discussion. It considers from several viewpoints the relationship between the actuary and the computer, both in its function as a calculating tool and as a data processing and storage medium. The paper considers in detail the requirements of the Appointed Actuary for adequate data, the problems of allocating and pricing for computer costs and the increasing uses of computer modelling in financial reporting. The place of computer literacy in actuarial education, future developments and standards are also considered.


2021 ◽  
Vol 3 (2) ◽  
Author(s):  
Dajana Jelčić Dubček

Quantum computational supremacy may potentially endanger the current cryptographic protection methods. Although quantum computers are still far from a practical implementation in information processing and storage, they should not be overlooked in the context of cybersecurity. Quantum computers operate with qubits - units of information that are governed by the fundamental principles of quantum physics, such as quantum superposition of states and quantum coherence. In order to address the new challenge that quantum computers pose to cybersecurity, the very principles of their operation have to be understood and are overviewed in this contribution.


Sign in / Sign up

Export Citation Format

Share Document