Showing 381 - 400 results of 953 for search '"Data processing"', query time: 0.10s Refine Results
  1. 381

    Geographical Origin Identification of <italic>Panax notoginseng</italic> Using a Modified K-Nearest Neighbors Model With Near-Infrared Spectroscopy by Xuefeng Cheng, Min Liao, Juan Liu

    Published 2025-01-01
    “…These results demonstrate the potential of combining spectral data processing with advanced machine learning techniques for efficient and accurate geographical origin identification, providing a robust tool for quality assurance and traceability in traditional Chinese medicine.…”
    Get full text
    Article
  2. 382

    The Effect of Self-Leadership Effectiveness on Academic Achievement Through Time Management of Working Students by Kumala Vera Dewi

    Published 2025-01-01
    “…The data collection technique is to use a questionnaire distributed to research respondents. The data processing technique used is PLS (Partial Least Square) with the help of SmartPLS software. …”
    Get full text
    Article
  3. 383

    How will developmental neuroimaging contribute to the prediction of neurodevelopmental or psychiatric disorders? Challenges and opportunities by Koraly Pérez-Edgar, Mary Dozier, Rebecca Saxe, Katherine E. MacDuffie

    Published 2025-01-01
    “…Successful developmental neuroimaging efforts require interdisciplinary expertise to ground scientific questions in knowledge of human development, modify and create technologies and data processing pipelines suited to the young brain, and ensure research procedures meet the needs and protect the interests of young children and their caregivers. …”
    Get full text
    Article
  4. 384

    The Multivariate Fusion Distribution Characteristics in Physician Demand Prediction by Jiazhen Zhang, Wei Chen, Xiulai Wang

    Published 2025-01-01
    “…This lightweight architecture design not only improves the computational efficiency but also enhances the stability in high-dimensional data processing and reduces feature redundancy by combining the normalization process with statistics. …”
    Get full text
    Article
  5. 385

    Multirotor UAV-Based Photogrammetric Mapping for Road Design by Muhammad Akmal Zulkipli, Khairul Nizam Tahar

    Published 2018-01-01
    “…This study involves four phases which consist of preliminary study, data collection, data processing, and analysis. This study focuses on the UAV as a tool to capture data of the ground from a certain altitude. …”
    Get full text
    Article
  6. 386

    Research on bionic mechanism based endogenous security defense system by Aiqun HU, Lanting FANG, Tao LI

    Published 2021-02-01
    “…Shell-based security defense technologies such as firewall, intrusion detection and anti-virus cannot be updated in a timely fashion upon identification of attacks.The security defense mechanism is not associated with the security status of network devices, resulting in low security performance.To solve the above problems, an endogenous security defense system based on the bionic security mechanism was proposed.Firstly, imitating the security defense mechanism of the organism, the endogenous security system integrated the security component with each other at the construction process.Secondly, the endogenous security associates all security components through network interconnection, and proposed a defense in depth and comprehensive approach to increase the security of a system.Finally, through the self-learning, endogenous security's ability of threat detection was continuous enhanced.By integrating the security system and information system, an endogenous security defense system was constructed.The endogenous security defense system can handle the challenges such as low defensive efficiency ratio, high-speed data processing, and unknown threats detection.The endogenous security system is an efficient security defense system of “innate growth and independent growth”.It meets the development needs of information systems with “high availability, security and high efficiency”.…”
    Get full text
    Article
  7. 387

    Evaluasi Kinerja MLLIB APACHE SPARK pada Klasifikasi Berita Palsu dalam Bahasa Indonesia by Antonius Angga Kurniawan, Metty Mustikasari

    Published 2022-06-01
    “…This is because in performing data processing, MLlib runs on memory. This research uses MLlib Apache Spark to classify fake news in Indonesian language with 1786 data that were obtained from fake news and fact provider sites, TurnBackHoax.id. …”
    Get full text
    Article
  8. 388

    Analisis Kinerja Jaringan Sensor Nirkabel untuk Edge Computing Menggunakan LORA SX1278 by Mochammad Hannats Hanafi Ichsan

    Published 2021-10-01
    “…Because in the implementation of the distance based on the large data processing results from Edge Computing is quite varied. …”
    Get full text
    Article
  9. 389

    Pavement Potholes Quantification: A Study Based on 3D Point Cloud Analysis by Qingzhen Sun, Lei Qiao, Yibo Shen

    Published 2025-01-01
    “…Voxel filtering and voxelization downsampling are used for denoising, filtering, and enhancing data processing efficiency. Surface segmentation is achieved through RANSAC (Random Sample Consensus) and Euclidean clustering, while the Alpha Shapes algorithm is utilized for three-dimensional volume reconstruction, facilitating the volumetric quantification of potholes. …”
    Get full text
    Article
  10. 390

    The effect of service quality and customer value on customer satisfaction and customer loyalty in Bank Sultra by Abdul Razak, Abdul hakim, Asraf Yunus

    Published 2023-09-01
    “…The purpose of this study was to determine and analyze the effect of service quality and customer value on satisfaction and loyalty, the effect of satisfaction on loyalty, the role of satisfaction in mediating the relationship between service quality and customer value on customer loyalty in Bank Sultra. Analysis of data processing using the Structural Equation Model (SEM) with Lisrel software The results of the study found that service quality, customer value had a positive but insignificant effect on customer satisfaction but a positive and significant effect on customer loyalty. …”
    Get full text
    Article
  11. 391

    Faktor Risiko Terjadinya Osteoporosis pada Wanita Menopause by Renidayati Renidayati, Clara Clara, Sunardi Sunardi

    Published 2011-12-01
    “…The sample in this study consists of 51 postmenopausal women. Data processing is done using univariate and bivariate data analysis. …”
    Get full text
    Article
  12. 392

    Carton Coon’s Riddle: Anthropologist, Archaeologist, or CIA Agent? (Critical Review of Carlton Stevens Coon’s Methodology and Publications in the Iranian Paleolithic Archaeology)... by Hamed Vahdati Nasab

    Published 2020-08-01
    “…In this research, such review was performed based on five categories: theoretical approaches of the field works, degree of specialty, fieldwork approaches, data collecting methods, and data processing procedures. The results indicate that his theoretical and practical approaches have suffered from many weaknesses. …”
    Get full text
    Article
  13. 393

    Unveiling the Potential of Metaheuristics in Transportation: A Path Towards Efficiency, Optimization, and Intelligent Management by Álvaro Bueno-Ferrer, Jaime De Pablo Valenciano, Jerónimo De Burgos Jiménez

    Published 2024-12-01
    “…Methodology: A quantitative approach is employed to analyze the evolution of the discipline by reviewing an extensive database of relevant research and key authors and utilizing advanced data processing tools. This analysis enables the assessment of advances in the optimization of metaheuristic models, with an impact on time and cost savings from an economically sustainable perspective. …”
    Get full text
    Article
  14. 394

    Imperfect interfaces characterization in a multilayered structure by means of an equivalent dynamic model by Auquier Nicolas, Ege Kerem, Gourdon Emmanuel

    Published 2024-01-01
    “…Then the experimental methodology used for characterization is outlined, including the setup, considered samples, and data processing techniques. Specifically, the Corrected Force Analysis Technique (CFAT) is used, which is a robust method based on the equations of motion for thin plates or beams. …”
    Get full text
    Article
  15. 395

    Optimal dispatch of distributed renewable energy and energy storage systems via optimal configuration of mobile edge computing by He Jiang, Yan Zhao, Hang Zhou

    Published 2024-12-01
    “…To improve the efficiency of data processing and the flexibility of each unit dispatching, first, the areas are divided according to the load characteristics. …”
    Get full text
    Article
  16. 396

    A hybrid model for smart grid theft detection based on deep learning by Yinling LIAO, Jincan LI, Bing WANG, Jun ZHANG, Yaoyuan LIANG

    Published 2024-02-01
    “…A hybrid deep learning model was proposed to effectively detect electricity theft in smart grids.The hybrid model employed a deep learning convolutional neural network (AlexNet) to tackle the curse of dimensionality, significantly enhancing data processing accuracy and efficiency.It further improved classification accuracy by differentiating between normal and abnormal electricity usage using adaptive boosting (AdaBoost).To resolve the issue of class imbalance, undersampling techniques were utilized, ensuring balanced performance across various data classes.Additionally, the artificial bee colony algorithm was used to optimize hyperparameters for both AdaBoost and AlexNet, effectively boosting overall model performance.The effectiveness of this hybrid model was evaluated using real smart meter datasets from an electricity company.Compared to similar models, this hybrid model achieves accuracy, precision, recall, F1-score, Matthews correlation coefficient (MCC), and area under the curve-receiver operating characteristic curve (AUC-ROC) scores of 88%, 86%, 84%, 85%, 78%, and 91%, respectively.The proposed model not only increases the accuracy of electricity usage monitoring, but also offers a new perspective for intelligent analysis in power systems.…”
    Get full text
    Article
  17. 397

    The Arctic zone of the Republic of Karelia: Search for ways of Development by Valery P. Zhuravel

    Published 2024-06-01
    “…The problem of creating cascades of small hydroelectric power plants in the region and a network of data processing and storage centres based on domestic high-speed ultra-dense solutions is considered. …”
    Get full text
    Article
  18. 398

    Machine Condition Monitoring System Based on Edge Computing Technology by Igor Halenar, Lenka Halenarova, Pavol Tanuska, Pavel Vazan

    Published 2024-12-01
    “…The whole solution includes the design of suitable sensors and of the implementation of the sensor layer, the description of data processing algorithms, the design on the communication infrastructure for the whole system, and tests in the form of experimental operation of the device in laboratory conditions. …”
    Get full text
    Article
  19. 399

    Researching the factors and benefits in increasing the use of AI color cosmetics by Ezni Balqiah, Ginsi Trianesti

    Published 2024-08-01
    “…Furthermore, the research model was analyzed using PLS-SEM. The results of data processing show all significant hypotheses. It is proven that Body Esteem, Price Sensitivity, Social Media Addiction have positively influence on AI Color Cosmetic Usage, which in turn also positively inflluence Trust in Artificial Intelligence, eWOM Engagement, Consumer Satisfaction, Purchase Intention. …”
    Get full text
    Article
  20. 400

    ParticleHolography.jl: Holographic particle measurement in Julia by Dai Nakai, Yohsuke Tanaka

    Published 2025-02-01
    “…Leveraging the Julia language architecture and NVIDIA GPU capabilities, the package accommodates both interactive parameter exploration and optimization as well as intensive, large-scale data processing across multiple nodes. The modular pipeline structure allows for easy substitution of processing steps with alternative or user-defined methods, facilitating ablation analysis and customization. …”
    Get full text
    Article