Showing 4,081 - 4,100 results of 50,948 for search 'data application', query time: 0.24s Refine Results
  1. 4081

    Research on 5GtoB customized network based data offloading scheme by Yaping CAO, Ying SUN, Huixiao ZHANG

    Published 2022-09-01
    “…With the continuous evolution of 5G network, 5GtoB solution for industrial users is also more flexible.Data offloading can well meet the urgent needs of customers for data not leaving the park, local unloading, local support, low delay and so on.The demand background of data offloading capability in 5G network and the relevant principles of diversion technology were introduced.At the same time, combined with the actual deployment of operators' existing network, the application scenarios and technical implementation of two kinds of data offloading schemes based on multi data network name (DNN) and uplink classifier (UL CL) were expounded, and the advantages and limitations of different schemes were compared and analyzed.Finally, the feasibility of the scheme was verified by an actual case.…”
    Get full text
    Article
  2. 4082
  3. 4083

    A method of IoT terminal’s network behavior monitoring based on network data by Ying LING, Yun QIU

    Published 2017-12-01
    “…The internet of things (IoT) is the network of physical devices,vehicles,home appliances and other items embedded with electronics,software,sensors,actuators and network connectivity which enable these objects to connect and exchange data.Every sensor node is a source of information.In the offered method,telecom network operators could analyze the network data and discover the abnormal situation of the IoT terminals,so as to ensure the normal use of the IoT terminals.A network behavior tag for the IoT terminals by analyzing the network data in the telecom network,and a real-time monitoring method for the IoT terminal network behavior were described.And take the wearable industry application for example,the analysis process of the internet of things network behavior was described.…”
    Get full text
    Article
  4. 4084

    Sustainable Development Garden Landscape Design Based on Data Mining and Virtual Reality by Yuchen Bai

    Published 2022-01-01
    “…In order to improve the application of virtual reality technology in the sustainable development garden landscape design, this paper combines data mining technology and virtual reality technology to construct the sustainable development garden landscape design system. …”
    Get full text
    Article
  5. 4085
  6. 4086

    Developing TalkBuddy : An Inclusive Android Application for Deaf Students' English Learning and Statistical Support by Yuliana Friska, Nisak Ruwah Ibnatur Husnul, Gigih Amrillah Ibnurhus

    Published 2025-06-01
    “…Data collection techniques included interviews, observations, and questionnaires throughout the trial process. …”
    Get full text
    Article
  7. 4087

    Global trends of big data analytics in health research: a bibliometric study by Li Yao, Li Yao, Yan Liu, Tingrui Wang, Chunyan Han, Qiaoxing Li, Qinqin Li, Xiaoli You, Tingting Ren, Yinhua Wang

    Published 2025-07-01
    “…Co-occurrence word analysis identified six key research areas: (1) the application of big data analytics in health decision-making; (2) challenges in the technological management of health and medical big data; (3) integration of machine learning with health monitoring; (4) privacy and ethical issues in health and medical big data; (5) data integration in precision medicine; and (6) the use of big data in disease management and risk assessment. …”
    Get full text
    Article
  8. 4088
  9. 4089

    Efficient Multiple Imputation for Diverse Data in Python and R: MIDASpy and rMIDAS by Ranjit Lall, Thomas Robinson

    Published 2023-10-01
    “… This paper introduces software packages for efficiently imputing missing data using deep learning methods in Python (MIDASpy) and R (rMIDAS). …”
    Get full text
    Article
  10. 4090
  11. 4091

    Performance Evaluation of Tourism Human Resource Management Based on Fuzzy Data Mining by Fei Wei

    Published 2022-01-01
    “…To continuously improve the work efficiency, quality, and level of staff, which has certain application value and practical significance for the long-term and healthy development of tourism industry, this article analyzes the current situation of tourism human resource performance management, introduces the data mining technology and fuzzy data mining technology, and then gives the fuzzy data mining algorithm and detailed fuzzy data mining steps, through the fuzzy data mining technology to evaluate the performance of tourism human resource management. …”
    Get full text
    Article
  12. 4092

    Quasi-Linear Convective Systems in Catalonia Detected Through Radar and Lightning Data by Tomeu Rigo, Carme Farnell

    Published 2024-11-01
    “…This study deals with the application of a technique that consists of combinations of radar and lightning data to identify QLCS in Catalonia (the northeast region of the Iberian Peninsula) and the surrounding areas. …”
    Get full text
    Article
  13. 4093

    Data leakage prevention system based on transparent encryption for mobile terminal equipment by Zhen-tao HUANG, Nuan HE, An-min FU, Bo-yu KUANG, Guang-hua ZHANG

    Published 2016-10-01
    “…With the trend that enterprise key data moves to mobile terminal,data leakage prevention has become an im-portant issue on mobile terminal.To solve the problem,a pre-decryption transparent encryption technology was set up which solved the problem that traditional transparent encryption technology only can ensure application layer security,in addition,performance on mobile was improved.At the same time,taking advantage of the idea of combining thin client and mobile terminal to prevent leakage of data,a virtual remote desktop technology on mobile was proposed,which completely shield the shortcomings of data transmission and ensure the safe transmission of mobile terminal data.Finally,a data leakage pre-vention system for mobile terminal was set up,which makes the mobile terminal fully and effectively protected.…”
    Get full text
    Article
  14. 4094

    Combining Several Substitution Cipher Algorithms using Circular Queue Data Structure by Noor Ibraheem, Mokhtar Hasan

    Published 2020-12-01
    “…With the revolutionized expansion of the Internet, worldwide information increases the application of communication technology, and the rapid growth of significant data volume boosts the requirement to accomplish secure, robust, and confident techniques using various effective algorithms. …”
    Get full text
    Article
  15. 4095

    Snowy Dove: An open-sourcetoolkit for pre- processing of Chinese Gaofen series data. by Debao Yuan, Liuya Zhang, Jiantao Dong, Cheng Fan, Xurui Zhao

    Published 2024-01-01
    “…Some examples will be presented to illustrate the application of the toolkit to data from several CHEOS satellites.…”
    Get full text
    Article
  16. 4096
  17. 4097

    Pricing Strategy of Electric Power Data Credit Product Based on Customer Value by Zhimin Wang, Di Wang

    Published 2022-01-01
    “…With the improvement of the intelligence level of the power network and the gradual improvement of the information and communication of the power system, the application of power big data to the corporate credit market is not only an important supplement to the national social credit system but also an important strategic goal for the State Grid to expand profitability. …”
    Get full text
    Article
  18. 4098

    Implementation of a Web-Based Skincare Decision Support System using the Simple Additive Weighting Method by Sausan Trisdiatin, Elyza Gustri Wahyuni

    Published 2025-09-01
    “…All data were verified for validity using BPOM certification and halal labels. …”
    Get full text
    Article
  19. 4099
  20. 4100

    Applying the VERACITY data framework: how do public health agencies score? by Mrs Rinette Badker, Mr. Benjamin Ash, Ms Naama Kipperman, Mr. Patrick Savage, Mr. Chris Pardee, Nita K Madhav

    Published 2025-03-01
    “…Here, we present a novel application of the VERACITY framework to reported data from several public health agencies to determine if the VERACITY framework meets its objectives. …”
    Get full text
    Article