Suggested Topics within your search.
Suggested Topics within your search.
- Data processing 10
- Engineering mathematics 2
- Management 2
- Numerical analysis 2
- Social sciences--Data processing 2
- Alphabet 1
- Authorship 1
- Bioinformatics 1
- Building 1
- Building information modeling 1
- Business 1
- Business intelligence 1
- Certification 1
- Cloud computing 1
- Computer networks 1
- Computer programs 1
- Computer simulation 1
- Computer systems 1
- Computer-aided design 1
- Construction industry 1
- Design and construction 1
- Distributed processing 1
- Education 1
- Educational technology 1
- Electronic data processing 1
- Electronic data processing personnel 1
- Engineering mathematics--Data processing 1
- Examinations 1
- Industrial management 1
- Information resources management 1
-
381
Geographical Origin Identification of <italic>Panax notoginseng</italic> Using a Modified K-Nearest Neighbors Model With Near-Infrared Spectroscopy
Published 2025-01-01“…These results demonstrate the potential of combining spectral data processing with advanced machine learning techniques for efficient and accurate geographical origin identification, providing a robust tool for quality assurance and traceability in traditional Chinese medicine.…”
Get full text
Article -
382
The Effect of Self-Leadership Effectiveness on Academic Achievement Through Time Management of Working Students
Published 2025-01-01“…The data collection technique is to use a questionnaire distributed to research respondents. The data processing technique used is PLS (Partial Least Square) with the help of SmartPLS software. …”
Get full text
Article -
383
How will developmental neuroimaging contribute to the prediction of neurodevelopmental or psychiatric disorders? Challenges and opportunities
Published 2025-01-01“…Successful developmental neuroimaging efforts require interdisciplinary expertise to ground scientific questions in knowledge of human development, modify and create technologies and data processing pipelines suited to the young brain, and ensure research procedures meet the needs and protect the interests of young children and their caregivers. …”
Get full text
Article -
384
The Multivariate Fusion Distribution Characteristics in Physician Demand Prediction
Published 2025-01-01“…This lightweight architecture design not only improves the computational efficiency but also enhances the stability in high-dimensional data processing and reduces feature redundancy by combining the normalization process with statistics. …”
Get full text
Article -
385
Multirotor UAV-Based Photogrammetric Mapping for Road Design
Published 2018-01-01“…This study involves four phases which consist of preliminary study, data collection, data processing, and analysis. This study focuses on the UAV as a tool to capture data of the ground from a certain altitude. …”
Get full text
Article -
386
Research on bionic mechanism based endogenous security defense system
Published 2021-02-01“…Shell-based security defense technologies such as firewall, intrusion detection and anti-virus cannot be updated in a timely fashion upon identification of attacks.The security defense mechanism is not associated with the security status of network devices, resulting in low security performance.To solve the above problems, an endogenous security defense system based on the bionic security mechanism was proposed.Firstly, imitating the security defense mechanism of the organism, the endogenous security system integrated the security component with each other at the construction process.Secondly, the endogenous security associates all security components through network interconnection, and proposed a defense in depth and comprehensive approach to increase the security of a system.Finally, through the self-learning, endogenous security's ability of threat detection was continuous enhanced.By integrating the security system and information system, an endogenous security defense system was constructed.The endogenous security defense system can handle the challenges such as low defensive efficiency ratio, high-speed data processing, and unknown threats detection.The endogenous security system is an efficient security defense system of “innate growth and independent growth”.It meets the development needs of information systems with “high availability, security and high efficiency”.…”
Get full text
Article -
387
Evaluasi Kinerja MLLIB APACHE SPARK pada Klasifikasi Berita Palsu dalam Bahasa Indonesia
Published 2022-06-01“…This is because in performing data processing, MLlib runs on memory. This research uses MLlib Apache Spark to classify fake news in Indonesian language with 1786 data that were obtained from fake news and fact provider sites, TurnBackHoax.id. …”
Get full text
Article -
388
Analisis Kinerja Jaringan Sensor Nirkabel untuk Edge Computing Menggunakan LORA SX1278
Published 2021-10-01“…Because in the implementation of the distance based on the large data processing results from Edge Computing is quite varied. …”
Get full text
Article -
389
Pavement Potholes Quantification: A Study Based on 3D Point Cloud Analysis
Published 2025-01-01“…Voxel filtering and voxelization downsampling are used for denoising, filtering, and enhancing data processing efficiency. Surface segmentation is achieved through RANSAC (Random Sample Consensus) and Euclidean clustering, while the Alpha Shapes algorithm is utilized for three-dimensional volume reconstruction, facilitating the volumetric quantification of potholes. …”
Get full text
Article -
390
The effect of service quality and customer value on customer satisfaction and customer loyalty in Bank Sultra
Published 2023-09-01“…The purpose of this study was to determine and analyze the effect of service quality and customer value on satisfaction and loyalty, the effect of satisfaction on loyalty, the role of satisfaction in mediating the relationship between service quality and customer value on customer loyalty in Bank Sultra. Analysis of data processing using the Structural Equation Model (SEM) with Lisrel software The results of the study found that service quality, customer value had a positive but insignificant effect on customer satisfaction but a positive and significant effect on customer loyalty. …”
Get full text
Article -
391
Faktor Risiko Terjadinya Osteoporosis pada Wanita Menopause
Published 2011-12-01“…The sample in this study consists of 51 postmenopausal women. Data processing is done using univariate and bivariate data analysis. …”
Get full text
Article -
392
Carton Coon’s Riddle: Anthropologist, Archaeologist, or CIA Agent? (Critical Review of Carlton Stevens Coon’s Methodology and Publications in the Iranian Paleolithic Archaeology)...
Published 2020-08-01“…In this research, such review was performed based on five categories: theoretical approaches of the field works, degree of specialty, fieldwork approaches, data collecting methods, and data processing procedures. The results indicate that his theoretical and practical approaches have suffered from many weaknesses. …”
Get full text
Article -
393
Unveiling the Potential of Metaheuristics in Transportation: A Path Towards Efficiency, Optimization, and Intelligent Management
Published 2024-12-01“…Methodology: A quantitative approach is employed to analyze the evolution of the discipline by reviewing an extensive database of relevant research and key authors and utilizing advanced data processing tools. This analysis enables the assessment of advances in the optimization of metaheuristic models, with an impact on time and cost savings from an economically sustainable perspective. …”
Get full text
Article -
394
Imperfect interfaces characterization in a multilayered structure by means of an equivalent dynamic model
Published 2024-01-01“…Then the experimental methodology used for characterization is outlined, including the setup, considered samples, and data processing techniques. Specifically, the Corrected Force Analysis Technique (CFAT) is used, which is a robust method based on the equations of motion for thin plates or beams. …”
Get full text
Article -
395
Optimal dispatch of distributed renewable energy and energy storage systems via optimal configuration of mobile edge computing
Published 2024-12-01“…To improve the efficiency of data processing and the flexibility of each unit dispatching, first, the areas are divided according to the load characteristics. …”
Get full text
Article -
396
A hybrid model for smart grid theft detection based on deep learning
Published 2024-02-01“…A hybrid deep learning model was proposed to effectively detect electricity theft in smart grids.The hybrid model employed a deep learning convolutional neural network (AlexNet) to tackle the curse of dimensionality, significantly enhancing data processing accuracy and efficiency.It further improved classification accuracy by differentiating between normal and abnormal electricity usage using adaptive boosting (AdaBoost).To resolve the issue of class imbalance, undersampling techniques were utilized, ensuring balanced performance across various data classes.Additionally, the artificial bee colony algorithm was used to optimize hyperparameters for both AdaBoost and AlexNet, effectively boosting overall model performance.The effectiveness of this hybrid model was evaluated using real smart meter datasets from an electricity company.Compared to similar models, this hybrid model achieves accuracy, precision, recall, F1-score, Matthews correlation coefficient (MCC), and area under the curve-receiver operating characteristic curve (AUC-ROC) scores of 88%, 86%, 84%, 85%, 78%, and 91%, respectively.The proposed model not only increases the accuracy of electricity usage monitoring, but also offers a new perspective for intelligent analysis in power systems.…”
Get full text
Article -
397
The Arctic zone of the Republic of Karelia: Search for ways of Development
Published 2024-06-01“…The problem of creating cascades of small hydroelectric power plants in the region and a network of data processing and storage centres based on domestic high-speed ultra-dense solutions is considered. …”
Get full text
Article -
398
Machine Condition Monitoring System Based on Edge Computing Technology
Published 2024-12-01“…The whole solution includes the design of suitable sensors and of the implementation of the sensor layer, the description of data processing algorithms, the design on the communication infrastructure for the whole system, and tests in the form of experimental operation of the device in laboratory conditions. …”
Get full text
Article -
399
Researching the factors and benefits in increasing the use of AI color cosmetics
Published 2024-08-01“…Furthermore, the research model was analyzed using PLS-SEM. The results of data processing show all significant hypotheses. It is proven that Body Esteem, Price Sensitivity, Social Media Addiction have positively influence on AI Color Cosmetic Usage, which in turn also positively inflluence Trust in Artificial Intelligence, eWOM Engagement, Consumer Satisfaction, Purchase Intention. …”
Get full text
Article -
400
ParticleHolography.jl: Holographic particle measurement in Julia
Published 2025-02-01“…Leveraging the Julia language architecture and NVIDIA GPU capabilities, the package accommodates both interactive parameter exploration and optimization as well as intensive, large-scale data processing across multiple nodes. The modular pipeline structure allows for easy substitution of processing steps with alternative or user-defined methods, facilitating ablation analysis and customization. …”
Get full text
Article