Showing 4,201 - 4,220 results of 20,442 for search '(functional OR function) data analysis', query time: 0.28s Refine Results
  1. 4201
  2. 4202

    LOTUS Software to Process Wearable EmbracePlus Data by Jack S. Fogarty

    Published 2024-11-01
    “…Future work will expand the toolkit to process Empatica E4 and other wearable signal data, while also integrating more sophisticated functions for feature extraction and analysis.…”
    Get full text
    Article
  3. 4203

    Estimation of Power Lomax Distribution for Censored Data With Applications by Abdelfattah Mustafa, Samah M. Ahmed

    Published 2025-01-01
    “…Finally, a numerical analysis of a real data set is presented to illustrate the application of the proposed inferential processes.…”
    Get full text
    Article
  4. 4204

    A Framework for Rapidly Prototyping Data Mining Pipelines by Flavio Corradini, Luca Mozzoni, Marco Piangerelli, Barbara Re, Lorenzo Rossi

    Published 2025-06-01
    “…The framework’s requirements stem from a combination of literature review findings, iterative industry engagement, and analysis of existing tools. Rainfall enables the visual programming, execution, monitoring, and management of data mining pipelines, lowering the barrier for non-technical users. …”
    Get full text
    Article
  5. 4205

    Data-driven predictive models for sustainable smart buildings by Prabhu Rajaram, Gnana Swathika O․V․

    Published 2025-09-01
    “…In intelligent buildings, AI enables the analysis of vast amount of data collected from sensors and building systems, facilitating enhanced energy management, predictive maintenance, tailored comfort controls, and operational efficiencies derived from informed decisions based on operational conditions and occupant behavior trends, which aid in maximizing both functionality and sustainability of a building. …”
    Get full text
    Article
  6. 4206

    THE PRACTICAL CYBERATTACK ON THE DATA TRANSMISSION CHANNEL OF THE DIGITAL SUBSTATION by T. Strebkova, D. Tuchina, P. Zvada

    Published 2022-02-01
    “…Based on the analysis of the results obtained, solutions to the indicated problem were proposed, with devices supporting the functions of checking the content of GOOSE messages.…”
    Get full text
    Article
  7. 4207

    Data access control policy of encrypted deduplication system by Chunfu JIA, Guanxiong HA, Ruiqi LI

    Published 2020-05-01
    “…To solve the problem that convergent encryption was commonly used in existing encrypted deduplication systems in cloud storage and data owner couldn’t effectively enforce access control on their outsourced data,an encrypted deduplication system was proposed to support access control functions such as identity authentication,authorization deduplication and the update of access control policy.The outsourced data was only deduplicated with the authorized users,and the unauthorized users couldn’t obtain any data information.CP-ABE and the partition of the ElGamal private key were used to update the access control policy of data.Self-control objects was used to encapsulate user’s data and its access policy,providing authentication for data visitors and ensuring the access control policies enforced effectively.Security analysis and simulation results demonstrate that the proposed system enables data access control and executes efficiently.…”
    Get full text
    Article
  8. 4208

    Data access control policy of encrypted deduplication system by Chunfu JIA, Guanxiong HA, Ruiqi LI

    Published 2020-05-01
    “…To solve the problem that convergent encryption was commonly used in existing encrypted deduplication systems in cloud storage and data owner couldn’t effectively enforce access control on their outsourced data,an encrypted deduplication system was proposed to support access control functions such as identity authentication,authorization deduplication and the update of access control policy.The outsourced data was only deduplicated with the authorized users,and the unauthorized users couldn’t obtain any data information.CP-ABE and the partition of the ElGamal private key were used to update the access control policy of data.Self-control objects was used to encapsulate user’s data and its access policy,providing authentication for data visitors and ensuring the access control policies enforced effectively.Security analysis and simulation results demonstrate that the proposed system enables data access control and executes efficiently.…”
    Get full text
    Article
  9. 4209
  10. 4210

    The Immune Epitope Database: How Data Are Entered and Retrieved by Ward Fleri, Kerrie Vaughan, Nima Salimi, Randi Vita, Bjoern Peters, Alessandro Sette

    Published 2017-01-01
    “…Easy access to a vast collection of experimental data on immune epitopes can greatly facilitate the development of therapeutics and vaccines. …”
    Get full text
    Article
  11. 4211

    Improving Deep Learning for Forecasting Accuracy in Financial Data by Shih-Lin Lin, Hua-Wei Huang

    Published 2020-01-01
    “…First, the EMD method is used to transform the CSR index data into a limited number of intrinsic mode functions (IMF). …”
    Get full text
    Article
  12. 4212
  13. 4213

    Application of GUHA data mining method in cohort data to explore paths associated with premature death: a 29-year follow-up study by Lily Nosraty, Esko Turunen, Saila Kyrönlahti, Clas-Håkan Nygård, Prakash KC, Subas Neupane

    Published 2025-01-01
    “…Explanatory variables encompassed sociodemographic characteristics, health and functioning, health behaviors, subjective experiences, working conditions, and work abilities. …”
    Get full text
    Article
  14. 4214

    Pathway metrics accurately stratify T cells to their cells states by Dani Livne, Sol Efroni

    Published 2024-12-01
    “…Abstract Pathway analysis is a powerful approach for elucidating insights from gene expression data and associating such changes with cellular phenotypes. …”
    Get full text
    Article
  15. 4215
  16. 4216

    Multi-clustering algorithm based on improved tensor chain decomposition by ZHANG Hongjun, ZHANG Zeyu, ZHANG Yingjiao, YE Hao, PAN Gaojun

    Published 2025-06-01
    “…With the advent of the era of big data, the effective representation and analysis of high-level data has become a major challenge. …”
    Get full text
    Article
  17. 4217
  18. 4218

    The Effects of International Tourism Receipts on Economic Growth: Evidence from the First 20 Highest Income Earning Countries from Tourism in the World (1996-2016) by Ömer Yalçinkaya, Muhammet Daştan, Kerem Karabulut

    Published 2018-08-01
    “…To determine the effects of international tourism receipts on economic growth for WTR-20 group countries, a model is an extended form of Cobb-Douglas type of production function, will be estimated under the secondgeneration panel data analysis considering cross-sectional dependence. …”
    Get full text
    Article
  19. 4219
  20. 4220