Showing 6,621 - 6,640 results of 50,948 for search 'data application', query time: 0.37s Refine Results
  1. 6621

    Leveraging Generative Text Models and Natural Language Processing to Perform Traditional Thematic Data Analysis by Isil Anakok, Andrew Katz, Kai Jun Chew, Holly Matusovich

    Published 2025-04-01
    “…Using a case study, we illustrate the application of this workflow to a real-world dataset. …”
    Get full text
    Article
  2. 6622

    Fertilizer Experimentation, Data Analyses, and Interpretation for Developing Fertilization Recommendations — Examples with Vegetable Crop Research by George Hochmuth, Ed Hanlon, Allen Overman

    Published 2011-11-01
    “…Fertilizer recommendations contain several important factors, including fertilizer form, source, application timing, placement, and irrigation management. …”
    Get full text
    Article
  3. 6623

    Video surveillance legislation in the EU and Slovenia: privacy rights, security needs, and data protection challenges by Benjamin Lesjak, Mateja Savić

    Published 2023-11-01
    “…The paper shares the idea that harmonizing legislation across the EU helps ensure the balance between security and privacy rights, with significant practical implications in the creation of standardized policies and guidelines for the operation of video surveillance systems regarding European Data Protection Board opinions. The originality of this paper lies in its selected analysis of EU legislation and its practical application in Slovenian legislation. …”
    Get full text
    Article
  4. 6624

    Multi-function supported privacy protection data aggregation scheme for V2G network by Baiji HU, Xiaojuan ZHANG, Yuancheng LI, Rongxin LAI

    Published 2023-04-01
    “…In view of the problem that the functions of the current privacy protection data aggregation scheme were insufficient to meet the increasingly rich application requirements, a multi-function supported privacy protection data aggregation (MFPDA) scheme for V2G network was proposed.By using cryptographic algorithms such as BGN, BLS, and Shamir’s secret sharing, as well as fog computing and consortium blockchain technology, multiple security functions like fault tolerance, resistance to internal attacks, batch signature verification, no need for trusted third parties, and multiple aggregation functions were integrated into one privacy protection data aggregation scheme.Security analysis shows that the proposed scheme can protect data aggregation’s security, privacy and reliability.The performance evaluation shows that the introduction of fog computing can significantly reduce the computing overhead of the control center, and the reduction rate can be as high as 66.6%; the improvement of the consortium blockchain can effectively reduce the communication and storage overhead of the system, and the reduction rate can reach 16.7% and 24.9% respectively.…”
    Get full text
    Article
  5. 6625

    Use Case of Non-Fungible Tokens (NFTs): A Blockchain Approach for Geological Data Dissemination by Muhammad Aufaristama

    Published 2025-01-01
    “…The application of blockchain technology and Non-Fungible Tokens (NFTs) into geology offers potential for the preservation, management, and dissemination of geological data. …”
    Get full text
    Article
  6. 6626
  7. 6627
  8. 6628

    Inverting magnetotelluric data using a physics-guided auto-encoder with scaling laws extension by Lian Liu, Bo Yang, Yi Zhang

    Published 2024-12-01
    “…While a well-trained ANN can deliver near-instantaneous results, offering substantial computational advantages, its practical application is often limited by difficulties in accurately fitting observed data. …”
    Get full text
    Article
  9. 6629

    Predictive Model to Analyse Real and Synthetic Data for Learners' Performance Prediction Using Regression Techniques by SHABNAM ARA S.J, Tanuja R, Manjula S.H

    Published 2025-03-01
    “…Our methodology encompasses the generation of synthetic data via generative model, followed by the application of these algorithms to each data set. …”
    Get full text
    Article
  10. 6630

    An effective library website: a data-driven approach to its management using analytical tools by О. M. Udartseva

    Published 2021-07-01
    “…This article is devoted to topical issues of increasing the efficiency ofa library website and the introduction of a data-driven approach. A data driven approach is considered as a management strategy for the development of a site in a web environment, based on data from web analytical tools as the basis for decision-making. …”
    Get full text
    Article
  11. 6631

    Research on the Communication Management Mechanism of a Data-centric Vital Computer Platform for Rail Transit by TAO Yuan, DAI Fei, YAN Guang, DAI Xichang

    Published 2023-08-01
    “…Experiments show that the data-centric vital computer platform features high throughput and low latency, which can meet the requirements of real-time and high-performance applications of rail transit signal systems.…”
    Get full text
    Article
  12. 6632

    GPU-Based 3D Cone-Beam CT Image Reconstruction for Large Data Volume by Xing Zhao, Jing-jing Hu, Peng Zhang

    Published 2009-01-01
    “…For extra large data volume exceeding the physical graphic memory of GPU, a straightforward compromise is to divide data volume into blocks. …”
    Get full text
    Article
  13. 6633

    Data Collection and Remote Control of an IoT Electronic Nose Using Web Services and the MQTT Protocol by Juan J. Pérez-Solano, Antonio Ruiz-Canales

    Published 2025-07-01
    “…The deployment of such devices often requires the possibility of having remote access over the Internet to manage their operation and to collect the sampled data. In this context, the application of web technologies to the monitoring and supervision of these systems connected to the Internet, which can be considered as an Internet of Things (IoT) device, offers the advantage of not requiring the development of client-side applications. …”
    Get full text
    Article
  14. 6634

    Evaluation and Verification of the Global Rapid Identification of Threats System for Infectious Diseases in Textual Data Sources by Andrew G. Huff, Nathan Breit, Toph Allen, Karissa Whiting, Christopher Kiley

    Published 2016-01-01
    “…GRITS analyzes these textual data sources by identifying, extracting, and succinctly visualizing epidemiologic information and suggests potentially associated infectious diseases. …”
    Get full text
    Article
  15. 6635

    Central Limit Theorem for Conditional Mode in the Single Functional Index Model with Data Missing at Random by Anis Allal, Abdessamad Dib, Abbes Rabhi

    Published 2024-01-01
    “…Additionally, we establish the asymptotic normality of the derived estimators proposed under specific mild conditions, relying on standard assumptions in Functional Data Analysis (FDA) for the proofs. Finally, we explore the practical application of our findings in constructing confidence intervals for our estimators. …”
    Get full text
    Article
  16. 6636

    Bridging Data Gaps in Emergency Care: The NIGHTINGALE Project and the Future of AI in Mass Casualty Management by Marta Caviglia

    Published 2025-04-01
    “…By securing these resources, we can enhance the efficiency and adaptability of AI applications in emergency care, bridging the current data gaps and ultimately improving outcomes during critical situations.…”
    Get full text
    Article
  17. 6637
  18. 6638

    METHODS OF APPROXIMATION OF FUNCTIONS BY GENERALIZED POLYNOMIALS IN NUMERICAL ANALYSIS PROBLEMS RELATED TO CALCULATIONS ON APPROXIMATE DATA by Igor Eduardovich Naats, Victoria Igorevna Naats, Elena Pavlovna Yartseva

    Published 2022-09-01
    “…The practical significance of the results is that the proposed methods and approaches can be used in applied problems of the theory of approximation of functions, problems of applied analysis and boundary value problems of mathematical physics, using approximately given initial data obtained in the course of physical experiments or empirical functions.…”
    Get full text
    Article
  19. 6639
  20. 6640