Showing 481 - 500 results of 15,363 for search '"surveying"', query time: 0.07s Refine Results
  1. 481

    Survey of Distributed Ledger Technology (DLT) for Secure and Scalable Computing by Shreya Girish Savadatti, Shruthi Krishnamoorthy, Radhakrishnan Delhibabu

    Published 2025-01-01
    “…This paper comprehensively surveys DLT, highlighting its core principles, cloud integration and enhanced data security/scalability. …”
    Get full text
    Article
  2. 482
  3. 483
  4. 484

    A Comprehensive Survey of Deep Learning Approaches in Image Processing by Maria Trigka, Elias Dritsas

    Published 2025-01-01
    “…The integration of deep learning (DL) into image processing has driven transformative advancements, enabling capabilities far beyond the reach of traditional methodologies. This survey offers an in-depth exploration of the DL approaches that have redefined image processing, tracing their evolution from early innovations to the latest state-of-the-art developments. …”
    Get full text
    Article
  5. 485

    Business Incubators in Russia: 2020 Survey in International Comparative Perspective by M. A. Slesarev

    Published 2022-09-01
    “…We conducted a comprehensive survey among a selection of Russian business incubators.Comparing the world BI average characteristics (secondary data from InBIA, International Business Innovation Association) and UBI Global (the data obtained through Surveys conducted in 2012, 2016, and 2020) helps us understand the actual state and dynamics of business incubation in Russia. …”
    Get full text
    Article
  6. 486
  7. 487

    Advance in Significant Wave Height Prediction: A Comprehensive Survey by Jinyuan Mo, Xianghan Wang, Shengjun Huang, Rui Wang

    Published 2024-12-01
    “…The precision of such predictions carries substantial theoretical and practical weight. This survey delivers an exhaustive evaluation and integration of the latest studies and advances in the domain of significant wave height prediction, serving as a methodical guidepost for academicians. …”
    Get full text
    Article
  8. 488

    Quality of Outpatient Care in Lebanon: A Cross-Sectional Survey by Georges Choueiry, Anna Maria Henaine, Rayan Darwish, Pascale Salameh

    Published 2024-11-01
    “…This study aims to assess the quality of outpatient care in Lebanon from the patient’s perspective and identify its determinants. A cross-sectional survey was administered, between December 2023 and January 2024, to 265 participants over 18 years old who consulted a healthcare provider, excluding dentists. …”
    Get full text
    Article
  9. 489

    A Survey on Frameworks Used for Robustness Analysis on Interdependent Networks by Ivana Bachmann, Javier Bustos-Jiménez, Benjamin Bustos

    Published 2020-01-01
    “…In particular, the analysis of interdependent networks’ robustness focuses on the specific case of the robustness of interacting networks and their emerging behaviors. This survey systematically reviews literature of frameworks that analyze the robustness of interdependent networks published between 2005 and 2017. …”
    Get full text
    Article
  10. 490
  11. 491
  12. 492
  13. 493
  14. 494
  15. 495
  16. 496

    Existence for Singular Periodic Problems: A Survey of Recent Results by Jifeng Chu, Juntao Sun, Patricia J. Y. Wong

    Published 2013-01-01
    “…We present a survey on the existence of periodic solutions of singular differential equations. …”
    Get full text
    Article
  17. 497

    Data security and protection techniques in big data:a survey by Kai-min WEI, Jian WENG, Kui REN

    Published 2016-04-01
    “…Big Data has attracted tremendous attention from all over the world nowadays.Its sheer volume,complex structure and realtime processing requirements often obsolete traditional technologies when coming to provide suffi-cient security protection.To address this challenge,significant research efforts have been carried out by the research community since recent years.Different technical aspects of big data security,including encryption algorithms,data integrity auditing,access control,secure data duplication,assured deletion,and secure search were surveyed,and in-depth discussions on their pros and cons were provided.Various future research directions were also discussed.…”
    Get full text
    Article
  18. 498
  19. 499
  20. 500