Suggested Topics within your search.
Suggested Topics within your search.
- Data processing 10
- Engineering mathematics 2
- Management 2
- Numerical analysis 2
- Social sciences--Data processing 2
- Alphabet 1
- Authorship 1
- Bioinformatics 1
- Building 1
- Building information modeling 1
- Business 1
- Business intelligence 1
- Certification 1
- Cloud computing 1
- Computer networks 1
- Computer programs 1
- Computer simulation 1
- Computer systems 1
- Computer-aided design 1
- Construction industry 1
- Design and construction 1
- Distributed processing 1
- Education 1
- Educational technology 1
- Electronic data processing 1
- Electronic data processing personnel 1
- Engineering mathematics--Data processing 1
- Examinations 1
- Industrial management 1
- Information resources management 1
-
281
Connected Degree of Fuzzifying Matroids
Published 2022-01-01“…Polya’s plausible reasoning methods are crucial not only in discovery of mathematics results, modeling methods, and data processing methods but also in many practical problems’ solving. …”
Get full text
Article -
282
Machine Learning Applications based on SVM Classification A Review
Published 2021-04-01“…This paper, therefore, attempts to deal with data processing, using a support vector machine (SVM) algorithm in different fields since it is a reliable, efficient classification method in the area of machine learning. …”
Get full text
Article -
283
Calibration of Accelerometers by Shock Excitation and Laser Interferometry
Published 2000-01-01“…After digitizing the phase-modulated signals at the output of a homodyne or heterodyne interferometer, the time-dependent displacement is reconstructed on the basis of the principle of coherent demodulation. Data processing developed for determining peak value and spectrum of the acceleration efficiently suppresses disturbing quantities. …”
Get full text
Article -
284
Les statistiques coloniales en question. Niveaux de vie, croissance démographique et économie des populations indigène et européenne en Algérie au xixe siècle. Approche par l’histo...
Published 2017-11-01“…The data processing of French colonial military archives makes it possible to reconstitue the changes in mean height of colonial recruits (spahis and tirailleurs) and European conscripts of Algeria, respectively for birth decades 1800-1880 and 1850-1880. …”
Get full text
Article -
285
Comparison of Tropospheric Horizontal Gradients Modeling Methods in LEO Constellation Augmented GNSS Precise Point Positioning
Published 2025-01-01“…With the improvement in GNSS data processing accuracies, the selection of optimal asymmetric troposphere delay modeling method becomes essential, especially during the period of severe weather events and with the development of low Earth orbit (LEO) constellation augmented GNSS (LeGNSS). …”
Get full text
Article -
286
Nonlinear Pulse Shaping in Fibres for Pulse Generation and Optical Processing
Published 2012-01-01“…The development of new all-optical technologies for data processing and signal manipulation is a field of growing importance with a strong potential for numerous applications in diverse areas of modern science. …”
Get full text
Article -
287
Guidelines for Research Data Integrity (GRDI)
Published 2025-01-01“…They provide clear and practical instructions for the complete research process, including an overall data collection strategy, variable definitions, and data processing recommendations. In addition to raising awareness about potential pitfalls and establishing standardization in research data usage, the proposed guidelines serve as a reference for researchers to provide a consistent standard of data quality. …”
Get full text
Article -
288
Energy efficiency priority IoT task collaborative migration strategy
Published 2019-06-01“…Mobile edge computing can reduce transmission delay and data processing delay for IoT applications by executing communication and computing operation in the edge network.However,for a large number of IoT device connections,massive service data is simultaneously gathered on the edge computing platform,which will significantly increase the traffic load of the forward link and the computing load of the edge server.In order to meet this challenge,based on diversified IoT application requirements,a task collaborative migration strategy was designed to realize the minimum energy consumption of the system under time delay constraints by optimizing the selection control of equipment transmission.In the absence of perfect channel state prior information,a resource management algorithm based on deep reinforcement learning was proposed to obtain the optimal offloading decision with lower complexity.The simulation results show that the proposed algorithm can significantly reduce the energy consumption of the system and meet the service delay of the task compared with the random transmission selection strategy.…”
Get full text
Article -
289
Data Analysis Method of Intelligent Analysis Platform for Big Data of Film and Television
Published 2021-01-01“…In order to cope with different data processing needs of film and television industry, association analysis, cluster analysis, factor analysis, and K-mean + association analysis algorithm training model were applied to model, process, and analyze the full data of film and TV series. …”
Get full text
Article -
290
Analysis of the Effect of Foreign Workers on Unemployment in Banten Province
Published 2024-12-01“…This research uses a qualitative method based on a combination of primary and secondary data processing conducted using a discourse analysis approach. …”
Get full text
Article -
291
Research on the Compression Algorithm of the Infrared Thermal Image Sequence Based on Differential Evolution and Double Exponential Decay Model
Published 2014-01-01“…The results show that the proposed algorithm is a fast and highly precise infrared image data processing method.…”
Get full text
Article -
292
SUPPORT VECTOR MACHINE FOR HYDRAULIC SUPPORT RELIABILITY PREDICTION
Published 2017-01-01“…Based on support vector machine has great advantages in small sample data processing,Putting forward using support vector regression machine estimate weibull distribution parameter of hydraulic support failure time,when the failure date is small sample. …”
Get full text
Article -
293
Integrating Sensor Technologies with Conversational AI: Enhancing Context-Sensitive Interaction Through Real-Time Data Fusion
Published 2025-01-01“…Lastly, this article delves into the scientific principles supporting sensor technologies, data processing methods, and their fusion with generative models such as ChatGPT to develop adaptable, dynamic systems that engage with humans intelligently in real time. …”
Get full text
Article -
294
SVM Intrusion Detection Model Based on Compressed Sampling
Published 2016-01-01“…Intrusion detection needs to deal with a large amount of data; particularly, the technology of network intrusion detection has to detect all of network data. Massive data processing is the bottleneck of network software and hardware equipment in intrusion detection. …”
Get full text
Article -
295
Research on 5G MEC security assessment system and method
Published 2023-08-01“…Multi-access edge computing (MEC) is deployed at the edge of the network, enabling efficient and fast data processing in mobile networks, while also undertaking important security functions, making MEC a prime target for attackers.Therefore, MEC nodes will face huge security risks.How to accurately evaluate and quantify MEC security capabilities is an urgent issue to be solved.For accurately evaluating and quantifying MEC security capabilities, the MEC safety assessment system was proposed in combination with MEC safety risks.The assessment indicators selected in the assessment system comprehensively reflect the basic characteristics of MEC and its complete safety capability.Based on this evaluation system, the MEC security evaluation method was designed by using the analytic hierarchy process (AHP) and fuzzy evaluation, the MEC vulnerability scoring system was creatively proposed, and the evaluation indicators were provided based on the results of MEC vulnerability scoring system, the MEC security capability quantification value was finally calculated.The experimental result proves the effectiveness of the method.…”
Get full text
Article -
296
THEORETICAL AND PRACTICAL ASPECTS OF IDENTIFICATION AND EVALUATION OF SCHOOL EDUCATION QUALITY
Published 2015-03-01“…The method in question involves designing, approbation and analysis of diagnostic materials, as well as mathematical and statistical data processing based on specialized computer software. …”
Get full text
Article -
297
Footstep and Vehicle Detection Using Slow and Quick Adaptive Thresholds Algorithm
Published 2013-10-01“…Detection based on kurtosis was also performed and shortcomings of kurtosis especially for vehicle detection were discussed, proposed algorithm has minimal load on the sensor board and its data processing unit; thus, it is energy efficient and suitable for wireless sensor alarm networks.…”
Get full text
Article -
298
Des normes professionnelles auto-prescrites. Le cas de la mise en œuvre de la démarche d’enseignement scientifique en Suisse romande
Published 2019-01-01“…In this article, we report on the exploratory phase of this research linked to a questionnaire survey of primary school teachers, both beginners and experienced, in French-speaking Switzerland. Data processing was carried out using factor analysis and hierarchical bottom-up classification. …”
Get full text
Article -
299
LEO satellite Internet resource allocation strategy based on terminal traffic prediction
Published 2024-07-01“…Two communication models, differentiated data transmission and task offloading were constructed through Stackelberg games, taking into the data processing latency and energy consumption account. …”
Get full text
Article -
300
Interoperable Internet of Medical Things platform for e-Health applications
Published 2020-01-01“…Moreover, the heterogeneity in the large volume of health data generated by Internet of Medical Things platforms must be attenuated for the proper application of big data processing techniques. This article proposes the joint use of openEHR and Semantic Sensor Network semantics for the achievement of interoperability at the semantic level and use of a machine-to-machine architecture for the definition of an interoperable Internet of Medical Things platform.…”
Get full text
Article