-
161
Culture Shock sebagai Mediator antara Kepribadian Reformer terhadap Sojourner Adjustment
Published 2020-07-01“…This study concludes that the theoretical model of the role of reformer personality on sojourner adjustment through cultural shock mediators is fit with empirical data. Structural analysis shows that cultural shock is a significant mediator variable on the influence of reformer personality on sojourner adjustment.…”
Get full text
Article -
162
Database energy saving strategy using blockchain and Internet of Things
Published 2025-01-01“…Additionally, the paper investigates the blockchain data structure and storage path by analyzing the spatial–temporal correlation properties of blockchain data. …”
Get full text
Article -
163
Blockchain digital forensics: technology and architecture
Published 2024-12-01“…This framework integrated evidence information into the on-chain data structure and introduced a complementary graph analysis algorithm to standardize evidence collection across various scenarios. …”
Get full text
Article -
164
A blockchain and internet of things-based information infrastructure for the Chinese automotive sector carbon-credit market
Published 2025-01-01“…Specifically, we attached carbon credits to each vehicle with radio frequency identification electronic tags and a chained data structure to ensure the traceability and reliability of information flow. …”
Get full text
Article -
165
Research on distributed identity authentication mechanism of IoT device based on blockchain
Published 2020-06-01“…Aiming to solve problems of the low compatibility and weak anti-attack ability of the Internet of things (IoT) centralized platform in the device identity authentication process,a blockchain-based distributed IoT device identity authentication architecture was proposed.The digital identity and related information were stored in the new block data structure,and a distributed IoT device identity authentication mechanism was proposed based on the cryptography related knowledge.At the same time,a device digital certificate issuance process and a detailed process of the identity authentication were designed.The security analysis of the proposed mechanism were carried out from the aspects of power constraints,device privacy protection,and ability to resist attacks among various entities.The performance of three aspects,which were security attributes,computational overhead and storage overhead,were compared and analyzed.The results show that the proposed identity authentication mechanism can resist a variety of malicious attacks,achieve highly secure distributed IoT identity authentication,and has certain advantages in the performance.…”
Get full text
Article -
166
Exploration and practice of AI-empowered smart campus
Published 2024-11-01“…Key technologies such as data structure transformation, visualization, and intelligent search were applied in scenario-based solutions. …”
Get full text
Article -
167
A Cube Analytical Mining Framework for Stream Data
Published 2014-09-01“…Sketch cube maps a set of attributes to a unique number and stores it in sub-linear data structure, and then builds an inverted index by tiled time window. …”
Get full text
Article -
168
Research on Text Similarity Measurement Hybrid Algorithm with Term Semantic Information and TF-IDF Method
Published 2022-01-01“…Based on term similarity weighting tree (TSWT) data structure and the definition of semantic similarity information from the HowNet, the paper firstly discusses text preprocess and filter process and then utilizes the semantic information of those key terms to calculate similarities of text documents according to the weight of the features whose weight is greater than the given threshold. …”
Get full text
Article -
169
CBFM:cutted Bloom filter matrix for multi-dimensional membership query
Published 2016-03-01“…In order to improve the flexibility and accuracy of mu i-dimensional membership query,a new indexing structure called CBFM(cutted Bloom filter matrix)was proposed.CBFM built the bit matrix by the Cartesian product of different bloom filters,each representing one attribute of primary data.In this way,the proposed matrix supported by-attribute membership query.Besides,the attribute combinations in the bit matrix could be reduced and weighted on demand to further enhance memory utilization rate.Theoretical analysis proves that CBFM utilizes memory more effi-ciently than BFM,the current state of art.Experiments also show that,on the scenario of memory size fixed,the false positive rate of CBFM is lower than that of all other indexin ethods.Especially on the scenario of memory constrained,the false positive rate of CBFM can be 3 orders of magnitude lower than that of BFM(Bloom filter matrix) indexing me-thod.CBFM is an accurate data structure for multi-dimensional membership query.…”
Get full text
Article -
170
The Scanian Economic-Demographic Database (SEDD)
Published 2020-11-01“…The data for 1813-1967 was structured in the model of the Intermediate Data Structure (IDS). In addition to storing source data in the SEDD IDS tables, a wide range of individual- and context-level variables were constructed, which means that most types of analyses using SEDD can be conducted without the need of further elaboration of the data. …”
Get full text
Article -
171
Isolation of Karanjin from Pongamia Pinnata and Its Identification by Difference Analytical Techniques
Published 2018-07-01“…From TLC, HPL, IR, 1HNMR, 13CNMR spectra data, structure elucidation was done and the structure was confirmed as karanjin. …”
Get full text
Article -
172
Generating Irregular Models for 3D Spherical-Particle-Based Numerical Methods
Published 2013-01-01“…The results demonstrate that an extremely irregular 3D model of a geological body can be generated using the SGIM and that various types of discontinuities can be inserted to cut the model. The data structure of the model that is generated by the SGIM is versatile and can be easily modified to match various numerical calculation tools. …”
Get full text
Article -
173
A New Method to Construct the KD Tree Based on Presorted Results
Published 2020-01-01“…K-dimensional (KD) tree, as a classical data structure, has been widely used in high-dimensional vital data search. …”
Get full text
Article -
174
Adaptive Transfer Learning Strategy for Predicting Battery Aging in Electric Vehicles
Published 2025-01-01“…Considerations for data structure and representation learning are presented, as well as a workflow to enhance the application of transfer learning for predicting aging in LiBs.…”
Get full text
Article -
175
A Graph-Based Method for IFC Data Merging
Published 2020-01-01“…The IFC data are represented as a graphical data structure, which completely preserves the relationship between IFC entities. …”
Get full text
Article -
176
Deep learning for multi-modal data fusion in IoT applications
Published 2025-01-01“…This sensor-based data is categorized as either structured or unstructured data. Structured data is simpler to process, while the processing of unstructured data is complex, due to its diverse modalities. …”
Get full text
Article -
177
Developing a Method for Building Business Process Models Based on Graph Neural Networks in the Absence of Task Identifier Data
Published 2024-01-01“…The study employs a combination of a weighted adjacency matrix and an adjacency matric accounting for the graph data structure. Textual information about the tasks involved in the business process is considered when implementing the feature matrix using embeddings. …”
Get full text
Article -
178
Privacy protection scheme for internet of vehicles based on homomorphic encryption and block chain technology
Published 2020-02-01“…In order to solve the problem that the security of traditional internet of vehicles devices is relatively low,which may threaten the privacy of users,a privacy protection scheme based on homomorphic encryption and block chain technology was proposed.This scheme added the authentication service composed of two level nodes to the proposed model to realize the permission control of roles in the model.In order to record the information of the internet of vehicles devices,a new block data structure based on homomorphic encryption (HEBDS) was proposed,which enabled the privacy data to be written into the block after being processed by the Paillier encryption algorithm,and then written into the blockchain network by the gateway node obtaining the accounting right.This scheme realized the data processing in ciphertext state,and made up for the shortage of all data disclosure in blockchain network.Through the analysis of the security of the scheme,it is proved that the scheme has the characteristics of unforgeability and privacy data security.Through homomorphic encryption of privacy data and upload to blockchain network,the scheme can distribute,share and calculate privacy data in ciphertext state,which can protect customer privacy more effectively than traditional internet of vehicles model.…”
Get full text
Article -
179
Construction and Application of Music Audio Database Based on Collaborative Filtering Algorithm
Published 2022-01-01“…This research uses Big Data and collaborative filtering algorithm technology to establish a new multilevel music audio database with discrete dynamic modeling characteristics of complex systems, which can greatly improve the data structure of each level of the database, so as to improve the efficiency and accuracy of retrieving various types of music and audio files in the database.…”
Get full text
Article -
180
Targeted maximum likelihood based estimation for longitudinal mediation analysis
Published 2025-01-01“…To tackle causal and statistical challenges due to the complex longitudinal data structure with time-varying confounders, competing risks, and informative censoring, there exists a general desire to combine machine learning techniques and semiparametric theory. …”
Get full text
Article