Suggested Topics within your search.
Suggested Topics within your search.
- Sustainable development 2
- computer 2
- Agriculture 1
- Biotechnology 1
- Calculus 1
- Chemistry Techniques, Analytical 1
- Children 1
- Climate change mitigation 1
- Economic Policy 1
- Economic policy 1
- Education 1
- Energy Policy, Economics and Management 1
- Energy and state 1
- Energy policy 1
- Enterprise application integration (Computer systems) 1
- Environmental Economics 1
- Environmental economics 1
- Ethnoscience 1
- Hospitality industry 1
- Immune System 1
- Immunity 1
- Industrial Organization 1
- Industrial organization 1
- Information technology 1
- Language 1
- Language disorders in children 1
- Linguistics 1
- MEDICAL / Audiology & Speech Pathology 1
- MEDICAL / Biotechnology 1
- Management 1
-
4081
Research on 5GtoB customized network based data offloading scheme
Published 2022-09-01“…With the continuous evolution of 5G network, 5GtoB solution for industrial users is also more flexible.Data offloading can well meet the urgent needs of customers for data not leaving the park, local unloading, local support, low delay and so on.The demand background of data offloading capability in 5G network and the relevant principles of diversion technology were introduced.At the same time, combined with the actual deployment of operators' existing network, the application scenarios and technical implementation of two kinds of data offloading schemes based on multi data network name (DNN) and uplink classifier (UL CL) were expounded, and the advantages and limitations of different schemes were compared and analyzed.Finally, the feasibility of the scheme was verified by an actual case.…”
Get full text
Article -
4082
Novel Neighbor Selection Method to Improve Data Sparsity Problem in Collaborative Filtering
Published 2013-08-01Get full text
Article -
4083
A method of IoT terminal’s network behavior monitoring based on network data
Published 2017-12-01“…The internet of things (IoT) is the network of physical devices,vehicles,home appliances and other items embedded with electronics,software,sensors,actuators and network connectivity which enable these objects to connect and exchange data.Every sensor node is a source of information.In the offered method,telecom network operators could analyze the network data and discover the abnormal situation of the IoT terminals,so as to ensure the normal use of the IoT terminals.A network behavior tag for the IoT terminals by analyzing the network data in the telecom network,and a real-time monitoring method for the IoT terminal network behavior were described.And take the wearable industry application for example,the analysis process of the internet of things network behavior was described.…”
Get full text
Article -
4084
Sustainable Development Garden Landscape Design Based on Data Mining and Virtual Reality
Published 2022-01-01“…In order to improve the application of virtual reality technology in the sustainable development garden landscape design, this paper combines data mining technology and virtual reality technology to construct the sustainable development garden landscape design system. …”
Get full text
Article -
4085
Localized large language model TCNNet 9B for Taiwanese networking and cybersecurity
Published 2025-03-01Get full text
Article -
4086
Developing TalkBuddy : An Inclusive Android Application for Deaf Students' English Learning and Statistical Support
Published 2025-06-01“…Data collection techniques included interviews, observations, and questionnaires throughout the trial process. …”
Get full text
Article -
4087
Global trends of big data analytics in health research: a bibliometric study
Published 2025-07-01“…Co-occurrence word analysis identified six key research areas: (1) the application of big data analytics in health decision-making; (2) challenges in the technological management of health and medical big data; (3) integration of machine learning with health monitoring; (4) privacy and ethical issues in health and medical big data; (5) data integration in precision medicine; and (6) the use of big data in disease management and risk assessment. …”
Get full text
Article -
4088
-
4089
Efficient Multiple Imputation for Diverse Data in Python and R: MIDASpy and rMIDAS
Published 2023-10-01“… This paper introduces software packages for efficiently imputing missing data using deep learning methods in Python (MIDASpy) and R (rMIDAS). …”
Get full text
Article -
4090
CHECKING THE FUNCTIONALITY OF A NETWORK ON DATA EXCHANGE BETWEEN THE DEVICES ON THE DIGITAL SUBSTATION
Published 2022-03-01Get full text
Article -
4091
Performance Evaluation of Tourism Human Resource Management Based on Fuzzy Data Mining
Published 2022-01-01“…To continuously improve the work efficiency, quality, and level of staff, which has certain application value and practical significance for the long-term and healthy development of tourism industry, this article analyzes the current situation of tourism human resource performance management, introduces the data mining technology and fuzzy data mining technology, and then gives the fuzzy data mining algorithm and detailed fuzzy data mining steps, through the fuzzy data mining technology to evaluate the performance of tourism human resource management. …”
Get full text
Article -
4092
Quasi-Linear Convective Systems in Catalonia Detected Through Radar and Lightning Data
Published 2024-11-01“…This study deals with the application of a technique that consists of combinations of radar and lightning data to identify QLCS in Catalonia (the northeast region of the Iberian Peninsula) and the surrounding areas. …”
Get full text
Article -
4093
Data leakage prevention system based on transparent encryption for mobile terminal equipment
Published 2016-10-01“…With the trend that enterprise key data moves to mobile terminal,data leakage prevention has become an im-portant issue on mobile terminal.To solve the problem,a pre-decryption transparent encryption technology was set up which solved the problem that traditional transparent encryption technology only can ensure application layer security,in addition,performance on mobile was improved.At the same time,taking advantage of the idea of combining thin client and mobile terminal to prevent leakage of data,a virtual remote desktop technology on mobile was proposed,which completely shield the shortcomings of data transmission and ensure the safe transmission of mobile terminal data.Finally,a data leakage pre-vention system for mobile terminal was set up,which makes the mobile terminal fully and effectively protected.…”
Get full text
Article -
4094
Combining Several Substitution Cipher Algorithms using Circular Queue Data Structure
Published 2020-12-01“…With the revolutionized expansion of the Internet, worldwide information increases the application of communication technology, and the rapid growth of significant data volume boosts the requirement to accomplish secure, robust, and confident techniques using various effective algorithms. …”
Get full text
Article -
4095
Snowy Dove: An open-sourcetoolkit for pre- processing of Chinese Gaofen series data.
Published 2024-01-01“…Some examples will be presented to illustrate the application of the toolkit to data from several CHEOS satellites.…”
Get full text
Article -
4096
IGBT Real-time Junction Temperature Calculation Based on Converter Operation Data
Published 2017-01-01Get full text
Article -
4097
Pricing Strategy of Electric Power Data Credit Product Based on Customer Value
Published 2022-01-01“…With the improvement of the intelligence level of the power network and the gradual improvement of the information and communication of the power system, the application of power big data to the corporate credit market is not only an important supplement to the national social credit system but also an important strategic goal for the State Grid to expand profitability. …”
Get full text
Article -
4098
Implementation of a Web-Based Skincare Decision Support System using the Simple Additive Weighting Method
Published 2025-09-01“…All data were verified for validity using BPOM certification and halal labels. …”
Get full text
Article -
4099
Leveraging deep learning for robust EEG analysis in mental health monitoring
Published 2025-01-01Get full text
Article -
4100
Applying the VERACITY data framework: how do public health agencies score?
Published 2025-03-01“…Here, we present a novel application of the VERACITY framework to reported data from several public health agencies to determine if the VERACITY framework meets its objectives. …”
Get full text
Article