Showing 6,121 - 6,140 results of 50,948 for search 'data application', query time: 0.37s Refine Results
  1. 6121

    Proactive caching and personalized delivery mechanism of heterogeneous content for MAR applications in the Metaverse by XU Siya, FU Qimeng, GUO Shaoyong

    Published 2024-10-01
    “…Addressing the issues of heterogeneous data content transmission and response latency in mobile augmented reality (MAR) applications, a proactive caching and personalized delivery mechanism of heterogeneous content for MAR applications in the metaverse was proposed. …”
    Get full text
    Article
  2. 6122

    Optimization and application of 5G bearer network backhaul bandwidth estimation model by Yang YE, Huiting FANG, Dantong NIE

    Published 2020-06-01
    “…In the early stage of 5G construction,business requirements are unclear,technology maturity needs to be improved,and traffic growth methods are unpredictable.How to evaluate the capacity of the existing network bearer system according to different construction scenarios and choose a reasonable 5G bearer network construction plan problem.Through theoretical research on the typical configuration of the 5G single base station bearer bandwidth demand assessment method,combined with the engineering experience of 4G network construction,the national sampling survey data was used to demonstrate the huge gap between the theoretical bandwidth estimation model and the actual traffic level.The initial planning and construction of the 5G bearer network was scientifically guided,and an optimized model for the estimation of the 5G bearer network backhaul bandwidth was proposed,and its application in the evolution path of the new 5G bearer network through new scenarios,expansion,and upgrade value was illustrated.…”
    Get full text
    Article
  3. 6123
  4. 6124

    The Application of Dance Movement Skill Feature Recognition in Dance Teaching Movement Analysis by Dixin Zhang

    Published 2022-01-01
    “…From the experimental data, it can be seen that the application effect of dance movement skill feature recognition in dance teaching movement analysis is very good.…”
    Get full text
    Article
  5. 6125

    Android application privacy protection mechanism based on virtual machine bytecode injection by Yubo SONG, Qi CHEN, Rui SONG, Aiqun HU

    Published 2021-06-01
    “…To solve the abuse of the Android application permission mechanism, a method of Android application access control based on virtual machine bytecode injection technology was proposed.The security policy in the form of virtual machine bytecode was generated according to the user’s security requirement and usage scenario, and injected into the coding unit of Android application that involves dangerous permission request and sensitive data access, to realize dynamic application behavior control.Tests on applications crawled from four mainstream domestic App stores show that the method can effectively intercept sensitive API calls and dangerous permission requests of legitimate App programs and implement control according to pre-specified security policies.Also, after injecting virtual machine bytecode, most of the App program operation is not affected by the injected code, and the robustness is guaranteed.The proposed method has a good universality.…”
    Get full text
    Article
  6. 6126

    CASE OF SUCCESSFUL APPLICATION OF METHOD FOR 3D VISUALIZATION AND MODELING IN THORACIC ONCOLOGY by S. V. Shchadenko, E. B. Topolnitskiy

    Published 2016-06-01
    “…Aim. The application of method of 3D-visualization and modeling in thoracic oncology is described.Materials and methods. …”
    Get full text
    Article
  7. 6127

    Web application «Water regime of the rivers of the European part of Russia»: structure and functionality by Natalia L. Frolova, Timofey E. Samsonov, Maria B. Kireyeva, Vladimir N. Semin, Andrey L. Entin

    Published 2024-06-01
    “…To integrate, display and analyze data on the water regime of the rivers of the ETR and its changes for scientific and educational purposes, hydrologists and cartographers of the Lomonosov Moscow State University developed a web application “Water regime of the rivers of the ETR”.…”
    Article
  8. 6128
  9. 6129

    Editorial: Contemporary applications of machine learning and artificial intelligence for the management of heart failure by Andre Rodrigues Duraes, Mansueto Gomes-Neto, Edimar Alcides Bocchi

    Published 2025-06-01
    “…Collectively, these contributions exemplify the transformative potential of data-driven technologies in personalizing care and preventing decompensation in HF. …”
    Get full text
    Article
  10. 6130
  11. 6131

    Development of local knowledge base application using retrieval augmented generation technology by ZHU Junyi, ZHU Shangming

    Published 2024-11-01
    “…Retrieval Augmented Generation (RAG) technology can enable large language models to access external knowledge bases by introducing external documents, thereby large language models can generate more authentic and reliable answers, and effectively solve the problems of outdated data and insufficient corpus. On the basis of introducing the basic architecture and fine-tuning techniques of large language models, the application framework of using retrieval enhanced generation technology to build a local knowledge base system was discussed. …”
    Get full text
    Article
  12. 6132

    Research on the Application of High-Precision Navigation Systems and Sensors in Vehicle Control Systems by Nie Yuchong

    Published 2025-01-01
    “…This research summarizes the working principles of high-precision navigation systems and sensor networks; analyzes the adaptability of sensor applications based on specification data, expands on advanced technologies in sensor networks, and explores the potential applications of sensors and navigation systems. …”
    Get full text
    Article
  13. 6133
  14. 6134

    An Asynchronous FPGA Block with Its Tech-Mapping Algorithm Dedicated to Security Applications by Taha Beyrouthy, Laurent Fesquet

    Published 2013-01-01
    “…This paper presents an FPGA tech-mapping algorithm dedicated to security applications. The objective is to implement—on a full-custom asynchronous FPGA—secured functions that need to be robust against side-channel attacks (SCAs). …”
    Get full text
    Article
  15. 6135
  16. 6136

    Development and Application of 3D Visualization Submergence Analysis System for Datengxia Gorge by DENG Lisi, LIU Chuang, ZHU Changfu

    Published 2021-01-01
    “…In order to improve the 3D visualization level of the Datengxia Gorge Water Conservancy Project,solve the problems in management and retrieval of UAV aerial photography results,and meet the needs of high fidelity display of submerging area changes in the process of water level elevation in the reservoir area,this paper firstly sorts out and summarizes the background,objectives and tasks of system development and construction,builds the overall technical framework based on ArcGIS,and then discusses the key technical issues in building the framework in depth,finally develops the 3D visualization submergence analysis system of Datengxia Gorge.This system can realize the 3D display of data,quick retrieval and view,and estimation of submerging area.With good scientificity,practicability and reliability,it can assist to improve the intellectualization and humanization level of engineering construction management.Therefore,the system enjoys good practical application value.…”
    Get full text
    Article
  17. 6137

    Mechanisms of Odor Coding in Coniferous Bark Beetles: From Neuron to Behavior and Application by Martin N. Andersson

    Published 2012-01-01
    “…Special focus is on I. typographus, for which the available physiological data can be put into a behavioral context. In addition, some recent field studies and possible applications, related to the physiological studies, are summarized and discussed.…”
    Get full text
    Article
  18. 6138
  19. 6139
  20. 6140