Suggested Topics within your search.
Suggested Topics within your search.
- Data processing 10
- Engineering mathematics 2
- Management 2
- Numerical analysis 2
- Social sciences--Data processing 2
- Alphabet 1
- Authorship 1
- Bioinformatics 1
- Building 1
- Building information modeling 1
- Business 1
- Business intelligence 1
- Certification 1
- Cloud computing 1
- Computer networks 1
- Computer programs 1
- Computer simulation 1
- Computer systems 1
- Computer-aided design 1
- Construction industry 1
- Design and construction 1
- Distributed processing 1
- Education 1
- Educational technology 1
- Electronic data processing 1
- Electronic data processing personnel 1
- Engineering mathematics--Data processing 1
- Examinations 1
- Industrial management 1
- Information resources management 1
-
321
Efficient implementation scheme of SM4 algorithm based on FPGA
Published 2024-05-01“…To address the inefficient data processing performance and excessive resource utilization issues that field-programmable gate array (FPGA)-based SM4 implementations faced, an implementation scheme that adopted both iteration and pipeline in order to reduce resource consumption and improve throughput was proposed. …”
Get full text
Article -
322
Research of Locati Rapid Test Method for Gear Contact Fatigue Limit
Published 2016-01-01“…But this method must refer to the related test data to determine the reference curve. A more reliable data processing method is discussed,compared with the traditional method,neither need to determine the reference curve in advance,nor need to calculate the sum of fatigue damage accumulation,but directly solve the fatigue curve equation to obtain the relevant fatigue limit. …”
Get full text
Article -
323
FATIGUE LIFE ANALYSIS OF CYLINDRICAL HELICAL COMPRESSION SPRING BASED ON WEIBULL DISTRIBUTION
Published 2020-01-01“…A new process of spring fatigue data processing is proposed. We developed a Weibull distribution parameter determination program with visual interface using C # and MATLAB mixed programming method based on the traditional Weibull reliability analysis and the graph estimation method based SVM. …”
Get full text
Article -
324
Analysis of Women's Representation in Parliament in Indonesia Using Robust Regression Estimation-S
Published 2024-09-01“…The method used in this research is robust S-estimation regression which can form a better model by minimizing the influence of extreme values. The results of data processing in 509 districts/cities in Indonesia show that women with a high school education or above, women who access the internet and the level of urbanization have a significant effect on women's representation in parliament in Indonesia in 2022, while women's married status does not have a significant effect on women's representation in parliament. in Indonesia in 2022.…”
Get full text
Article -
325
Performance optimization through the dimension of job satisfaction
Published 2024-03-01“…This study attempts to explore more deeply the correlation between the effect of job involvement, digital work design, and IPC organizational culture on the main context of employee performance using job satisfaction as the main mediator.This method uses a quantitative approach with data collection through questionnaires to measure employee perceptions with an interval scale of 1-100 to organic employees, the sampling technique uses simplerandom sampling and data processing using the SEM-PLS instrument.Research findings describe a positive correlation between job involvement on direct performance as well as engagement, and IPC organizational culture on satisfaction. …”
Get full text
Article -
326
ChatGPT, Python, and Microsoft Excel
Published 2025-01-01“…ChatGPT, with its advanced natural language processing, helps automate Python script generation and improve data processing in Excel, streamlining workflows and enabling more precise service delivery. …”
Get full text
Article -
327
Research on computing resource allocation strategy for cloud radio access network based on demand forecasting
Published 2019-12-01“…Cloud radio access network(CRAN) is a new network architecture commonly used in 5G network.It uses network function virtualization and software defined network technology to support end-to-end network slicing so that access network can share the same infrastructure.A computing resource allocation scheme based on virtualized network function(VNF) computing resource demand forecasting was proposed for cloud wireless network supporting end-to-end network slicing.Data-driven operation and maintenance framework established by the control plane collects network information and performs data processing to predict the demand for computing traffic in a period of time,which used the discrete particle swarm optimization based on best-fit-decreasing to dynamically and dynamically allocate CRAN computing resources,reducing the migration energy consumption and migration times of VNF.…”
Get full text
Article -
328
Data protection impact assessment system in the mode of risk management
Published 2018-08-01“…In the era of big data,the risk management approach has been broadly applied in the field of personal information protection.Data protection impact assessment has become an important system to promote data protection.It takes the provisions of the data protection impact assessment of the European General Data Protection Regulation (GDPR) 2016 as the sample.By using the literature research and empirical analysis method,it analyzes in depth the theoretical background,rise and evolution,meaning and scope of data protection impact assessment to establish a standardized and specific impact assessment system as well as promote personal information protection.Assessment content includes not only privacy risk assessment,but also data security,data quality and non-discrimination.Data protection impact assessment should be set as a mandatory obligation for data processing activities that are likely to result in high risks.The evaluation process shall take the advices from stakeholders to reflect their benefits.The external supervision should be strengthened and the assessment report shall be published properly.…”
Get full text
Article -
329
Construction and application of a quantitative efficiency assessment model for green AI in intelligent customer service systems
Published 2024-08-01“…Alongside their growth, the high energy consumption associated with data processing, model training, and deployment in AI large models is necessitating effective evaluation to facilitate quantitative comparisons before and after model optimization. …”
Get full text
Article -
330
Mobile Multi-Agent Evaluation Method for Wireless Sensor Networks-Based Large-Scale Structural Health Monitoring
Published 2012-11-01“…Mobile agent with the signal processing or evaluation algorithm is designed to migrate among different sensor nodes and perform network self-organization, data processing, information fusion, and damage estimation. …”
Get full text
Article -
331
Differential privacy protection technology and its application in big data environment
Published 2019-10-01“…The privacy protection in big data is a research hotspot in the field of cyberspace security.As a strict and provable definition of privacy protection,studying application status of differential privacy protection in big data environment can provide reference and guidance for its subsequent system applications.Based on the analysis of the related concepts and technical characteristics of differential privacy protection,the application of differential privacy protection technology was reviewed in data distribution and analysis,cloud computing and big data computing,location and trajectory services and social networks,which expounded the current representative research results and analyzed its existing problems.The research shows that the existing results have made effective innovation and exploration of differential privacy protection applications from the aspects of differential privacy protection mechanism,noise addition mechanism and location,and data processing methods,and the related results have been cross-applied in different scenarios.Finally,four major problems that need to be studied in the further systematic application of differential privacy protection in the big data environment are proposed.…”
Get full text
Article -
332
Las voces del pueblo ecuatoriano: construcción del pueblo en el fenómeno populista de Rafael Correa
Published 2025-01-01“…This research followed an approach based on grounded theory and discourse analysis and data processing was carried out using the Atlas.ti. Conclusions: This study provides insights into Ecuadorians’ imaginaries regarding politics and populism, and it also enabled an understanding of the collective from the individual perspective, as well as how the homogeneity of the Ecuadorian people emerges from the individuals who make it up. …”
Get full text
Article -
333
Compulsory and Voluntary Biometrics: Content and Distinction in Russian Law
Published 2024-10-01“…The article examines the peculiarities of separation and differentiation of two areas included in the sphere of biometric personal data processing in Russia: compulsory and voluntary biometrics. …”
Get full text
Article -
334
ALTERNATIVE APPROACH TO THE METHODOLOGY OF ECOLOGICAL NORMALIZATION
Published 2020-12-01“…The developed system is represented by a combination of methodological provisions and instruments based on the analysis of the best available techniques in the sphere of monitoring data processing, the use of linear trends of the compressed characteristics, and indirect unified assessment of negative impacts as responses to any kind of economic activities. …”
Article -
335
The effect of porosity on fragmentation statistics of dynamically loaded ZrO2 ceramics
Published 2017-12-01“…Cylindrical samples were fragmented under dynamic compression. Experimental data processing showed that the shape of stress-strain curves, the fragment size distribution and distribution of time intervals between the fractoluminiscense impulses depend on the sample porosity and load intensity. …”
Get full text
Article -
336
Research on safety supervision data sharing of railway construction projects based on edge computing
Published 2020-06-01“…Information security monitoring system is widely used in railway construction projects,but the existing safety supervision model has problems such as high server load,heavy network bandwidth pressure,monitoring data can’t be effectively shared,key monitoring data may be tampered,and security accident responsibility is difficult to determine.A credible sharing model of safety supervision data for railway construction projects based on edge computing was proposed.On one hand,the construction of a safety monitoring edge computing framework for construction projects was constructed,and the data processing flow of edge nodes was described; on the other hand,a trusted data sharing framework based on blockchain was established,and a safety supervision data sharing process was designed and trusted sharing data was implemented through smart contracts.The proposed solution combined with edge computing and blockchain technology,which not only could strengthen the safety supervision of railway construction projects by industry authorities,but also provide new opportunities for stakeholders to share safety monitoring data in real time.…”
Get full text
Article -
337
False data filtering algorithm without relying on MAC authentication for wireless sensor networks
Published 2009-01-01“…A multiple semi-fragile watermarks algorithms was proposed,considering the characteristics of clustering col-laboration aggregation in WSN.The generation of watermarks,embeding and extraction were completed by not a single node,but a fixed number of witnesses nodes which selected within the same clusters.This algorithm could against leak-age of keys when a single node was captured,and it could save energy costs also.On this basis,a false data filtering al-gorithm was proposed based on multiple semi-fragile watermarks,this algorithm could authenticate the accuracy,com-pleteness and fresh using watermarks embedded in data,without relying on MAC authentication.It provided a compari-son between the scheme and previously proposed schemes.The analysis and simulation results indicate significant im-provement in probability of filtering false data,energy saving and having robust,yet fragile characteristics,which support lossy in-network data processing and resist of the noise in certain.…”
Get full text
Article -
338
Research and Analysis on the Cultivation of Intelligent Transportation Technology Professionals under the Background of Integration of Production and Education
Published 2022-01-01“…In the process of data processing of industry-education fusion, this paper demodulates the nuclear magnetic resonance signal obtained after A/D conversion from the carrier frequency signal and places it at zero frequency. …”
Get full text
Article -
339
Classification and Visual Design Analysis of Network Expression Based on Big Data Multimodal Intelligence Technology
Published 2022-01-01“…This paper mainly studies the historical development trend of big data multimodal intelligence technology and the data processing method of multimodal intelligence technology applied to network expression classification, including data acquisition, storage, and analysis. …”
Get full text
Article -
340
Optimization Calculation Method and Mathematical Modeling of Big Data Chaotic Model Based on Improved Genetic Algorithm
Published 2022-01-01“…In addition, the change rate of fitness is basically kept at a high change rate, which also reflects that the basic framework of the model is very excellent, and the whole algorithm structure and data processing are improved by 54%. The improved genetic algorithm proposed in this paper is used to adjust and optimize the controller parameters. …”
Get full text
Article