Showing 161 - 180 results of 241 for search '"data structures"', query time: 0.08s Refine Results
  1. 161

    Culture Shock sebagai Mediator antara Kepribadian Reformer terhadap Sojourner Adjustment by Ujam Jaenudin, Dadang Sahroni, Zulmi Ramdani

    Published 2020-07-01
    “…This study concludes that the theoretical model of the role of reformer personality on sojourner adjustment through cultural shock mediators is fit with empirical data. Structural analysis shows that cultural shock is a significant mediator variable on the influence of reformer personality on sojourner adjustment.…”
    Get full text
    Article
  2. 162

    Database energy saving strategy using blockchain and Internet of Things by Dexian Yang, Jiong Yu, Zhenzhen He, Ping Li

    Published 2025-01-01
    “…Additionally, the paper investigates the blockchain data structure and storage path by analyzing the spatial–temporal correlation properties of blockchain data. …”
    Get full text
    Article
  3. 163

    Blockchain digital forensics: technology and architecture by FAN Wei, LI Haibo, ZHANG Zhujun

    Published 2024-12-01
    “…This framework integrated evidence information into the on-chain data structure and introduced a complementary graph analysis algorithm to standardize evidence collection across various scenarios. …”
    Get full text
    Article
  4. 164

    A blockchain and internet of things-based information infrastructure for the Chinese automotive sector carbon-credit market by Yanchu Liu, Yu Zhang, Duosi Zheng

    Published 2025-01-01
    “…Specifically, we attached carbon credits to each vehicle with radio frequency identification electronic tags and a chained data structure to ensure the traceability and reliability of information flow. …”
    Get full text
    Article
  5. 165

    Research on distributed identity authentication mechanism of IoT device based on blockchain by Chen TAN, Meijuan CHEN, Ebenezer ACKAH Amuah

    Published 2020-06-01
    “…Aiming to solve problems of the low compatibility and weak anti-attack ability of the Internet of things (IoT) centralized platform in the device identity authentication process,a blockchain-based distributed IoT device identity authentication architecture was proposed.The digital identity and related information were stored in the new block data structure,and a distributed IoT device identity authentication mechanism was proposed based on the cryptography related knowledge.At the same time,a device digital certificate issuance process and a detailed process of the identity authentication were designed.The security analysis of the proposed mechanism were carried out from the aspects of power constraints,device privacy protection,and ability to resist attacks among various entities.The performance of three aspects,which were security attributes,computational overhead and storage overhead,were compared and analyzed.The results show that the proposed identity authentication mechanism can resist a variety of malicious attacks,achieve highly secure distributed IoT identity authentication,and has certain advantages in the performance.…”
    Get full text
    Article
  6. 166

    Exploration and practice of AI-empowered smart campus by SU Xiaoming, ZHANG Siyu, JIANG Kaida

    Published 2024-11-01
    “…Key technologies such as data structure transformation, visualization, and intelligent search were applied in scenario-based solutions. …”
    Get full text
    Article
  7. 167

    A Cube Analytical Mining Framework for Stream Data by Canghong Jin, Zemin Liu, Minghui Wu, Jing Ying

    Published 2014-09-01
    “…Sketch cube maps a set of attributes to a unique number and stores it in sub-linear data structure, and then builds an inverted index by tiled time window. …”
    Get full text
    Article
  8. 168

    Research on Text Similarity Measurement Hybrid Algorithm with Term Semantic Information and TF-IDF Method by Fei Lan

    Published 2022-01-01
    “…Based on term similarity weighting tree (TSWT) data structure and the definition of semantic similarity information from the HowNet, the paper firstly discusses text preprocess and filter process and then utilizes the semantic information of those key terms to calculate similarities of text documents according to the weight of the features whose weight is greater than the given threshold. …”
    Get full text
    Article
  9. 169

    CBFM:cutted Bloom filter matrix for multi-dimensional membership query by Yong WANG, Xiao-chun YUN, ANGShu-peng WANG, Xi WANG

    Published 2016-03-01
    “…In order to improve the flexibility and accuracy of mu i-dimensional membership query,a new indexing structure called CBFM(cutted Bloom filter matrix)was proposed.CBFM built the bit matrix by the Cartesian product of different bloom filters,each representing one attribute of primary data.In this way,the proposed matrix supported by-attribute membership query.Besides,the attribute combinations in the bit matrix could be reduced and weighted on demand to further enhance memory utilization rate.Theoretical analysis proves that CBFM utilizes memory more effi-ciently than BFM,the current state of art.Experiments also show that,on the scenario of memory size fixed,the false positive rate of CBFM is lower than that of all other indexin ethods.Especially on the scenario of memory constrained,the false positive rate of CBFM can be 3 orders of magnitude lower than that of BFM(Bloom filter matrix) indexing me-thod.CBFM is an accurate data structure for multi-dimensional membership query.…”
    Get full text
    Article
  10. 170

    The Scanian Economic-Demographic Database (SEDD) by Martin Dribe, Luciana Quaranta

    Published 2020-11-01
    “…The data for 1813-1967 was structured in the model of the Intermediate Data Structure (IDS). In addition to storing source data in the SEDD IDS tables, a wide range of individual- and context-level variables were constructed, which means that most types of analyses using SEDD can be conducted without the need of further elaboration of the data. …”
    Get full text
    Article
  11. 171

    Isolation of Karanjin from Pongamia Pinnata and Its Identification by Difference Analytical Techniques by Sushil Kumar Dhanmane, Faisal A. Salih

    Published 2018-07-01
    “…From TLC, HPL, IR, 1HNMR, 13CNMR spectra data, structure elucidation was done and the structure was confirmed as karanjin. …”
    Get full text
    Article
  12. 172

    Generating Irregular Models for 3D Spherical-Particle-Based Numerical Methods by Gang-Hai Huang, Yu-Yong Jiao, Xiu-Li Zhang, Amoussou-Coffi Adoko, Shu-Cai Li

    Published 2013-01-01
    “…The results demonstrate that an extremely irregular 3D model of a geological body can be generated using the SGIM and that various types of discontinuities can be inserted to cut the model. The data structure of the model that is generated by the SGIM is versatile and can be easily modified to match various numerical calculation tools. …”
    Get full text
    Article
  13. 173

    A New Method to Construct the KD Tree Based on Presorted Results by Yu Cao, Huizan Wang, Wenjing Zhao, Boheng Duan, Xiaojiang Zhang

    Published 2020-01-01
    “…K-dimensional (KD) tree, as a classical data structure, has been widely used in high-dimensional vital data search. …”
    Get full text
    Article
  14. 174

    Adaptive Transfer Learning Strategy for Predicting Battery Aging in Electric Vehicles by Daniela Galatro, Manav Shroff, Cristina H. Amon

    Published 2025-01-01
    “…Considerations for data structure and representation learning are presented, as well as a workflow to enhance the application of transfer learning for predicting aging in LiBs.…”
    Get full text
    Article
  15. 175

    A Graph-Based Method for IFC Data Merging by Qin Zhao, Yuchao Li, Xinhong Hei, Mingsong Yang

    Published 2020-01-01
    “…The IFC data are represented as a graphical data structure, which completely preserves the relationship between IFC entities. …”
    Get full text
    Article
  16. 176

    Deep learning for multi-modal data fusion in IoT applications by Anila Saghir, Anum Akbar, Asma Zafar, Asif Hassan

    Published 2025-01-01
    “…This sensor-based data is categorized as either structured or unstructured data. Structured data is simpler to process, while the processing of unstructured data is complex, due to its diverse modalities. …”
    Get full text
    Article
  17. 177

    Developing a Method for Building Business Process Models Based on Graph Neural Networks in the Absence of Task Identifier Data by Oleg Kazakov, Natalya Azarenko, Irina Kozlova

    Published 2024-01-01
    “…The study employs a combination of a weighted adjacency matrix and an adjacency matric accounting for the graph data structure. Textual information about the tasks involved in the business process is considered when implementing the feature matrix using embeddings. …”
    Get full text
    Article
  18. 178

    Privacy protection scheme for internet of vehicles based on homomorphic encryption and block chain technology by Ruijin WANG, Yucheng TANG, Weiqi ZHANG, Fengli ZHANG

    Published 2020-02-01
    “…In order to solve the problem that the security of traditional internet of vehicles devices is relatively low,which may threaten the privacy of users,a privacy protection scheme based on homomorphic encryption and block chain technology was proposed.This scheme added the authentication service composed of two level nodes to the proposed model to realize the permission control of roles in the model.In order to record the information of the internet of vehicles devices,a new block data structure based on homomorphic encryption (HEBDS) was proposed,which enabled the privacy data to be written into the block after being processed by the Paillier encryption algorithm,and then written into the blockchain network by the gateway node obtaining the accounting right.This scheme realized the data processing in ciphertext state,and made up for the shortage of all data disclosure in blockchain network.Through the analysis of the security of the scheme,it is proved that the scheme has the characteristics of unforgeability and privacy data security.Through homomorphic encryption of privacy data and upload to blockchain network,the scheme can distribute,share and calculate privacy data in ciphertext state,which can protect customer privacy more effectively than traditional internet of vehicles model.…”
    Get full text
    Article
  19. 179

    Construction and Application of Music Audio Database Based on Collaborative Filtering Algorithm by Jianfei Zheng

    Published 2022-01-01
    “…This research uses Big Data and collaborative filtering algorithm technology to establish a new multilevel music audio database with discrete dynamic modeling characteristics of complex systems, which can greatly improve the data structure of each level of the database, so as to improve the efficiency and accuracy of retrieving various types of music and audio files in the database.…”
    Get full text
    Article
  20. 180

    Targeted maximum likelihood based estimation for longitudinal mediation analysis by Wang Zeyi, Laan Lars van der, Petersen Maya, Gerds Thomas, Kvist Kajsa, Laan Mark van der

    Published 2025-01-01
    “…To tackle causal and statistical challenges due to the complex longitudinal data structure with time-varying confounders, competing risks, and informative censoring, there exists a general desire to combine machine learning techniques and semiparametric theory. …”
    Get full text
    Article