Showing 7,321 - 7,340 results of 50,948 for search 'data application', query time: 0.30s Refine Results
  1. 7321

    Measuring Innovation Potential in Ecuadorian ICT Companies: Development and Application of the CRI-IRT Model by Christian Anasi, Andrés Robalino-López, Verónica Morales, Carlos Almeida

    Published 2025-02-01
    “…This study aimed to develop a measurement tool for the Ecuadorian context, utilizing the Capacities, Results, and Impacts (CRI) model questionnaire for data collection and Item Response Theory (IRT) as a processing method. …”
    Get full text
    Article
  2. 7322
  3. 7323

    Stem-cutting dipping in insecticides and biopesticide application for the control of Bemisia tabaci whitefly in cassava by Massoud Amour, Khamis A. Issa, Everlyne N. Wosula, Mathias Ndalahwa, Flora Stephano, David Chandler, Innocent Ndyetabula, James P. Legg

    Published 2025-07-01
    “…The experimental design for field experiments was a randomized complete block design with four replicates. The data recorded for field experiments were on whitefly and nymph numbers, CMD and CBSD incidence and severity, and root yield.Results and discussionMortality levels caused by EPFs under laboratory conditions were 35%–86% at 14 days after application. …”
    Get full text
    Article
  4. 7324

    Emerging 2D Material‐Based Synaptic Devices: Principles, Mechanisms, Improvements, and Applications by Zheyu Yang, Zhe Zhang, Shida Huo, Fanying Meng, Yue Wang, Yuexuan Ma, Baiyan Liu, Fanyi Meng, Yuan Xie, Enxiu Wu

    Published 2025-04-01
    “…ABSTRACT The von Neumann architecture is encountering challenges, including the “memory wall” and “power wall” due to the separation of memory and central processing units, which imposes a major hurdle on today's massive data processing. Neuromorphic computing, which combines data storage and spatiotemporal computation at the hardware level, represents a computing paradigm that surpasses the traditional von Neumann architecture. …”
    Get full text
    Article
  5. 7325
  6. 7326
  7. 7327
  8. 7328

    Computer-Visualized Sound Parameter Analysis Method and Its Application in Vocal Music Teaching by Zhenming Yu

    Published 2022-01-01
    “…Through the simulation data analysis, it can be seen that the computer visualization sound parameter analysis method proposed in this paper has a very good application effect in vocal music teaching and can improve the quality of vocal music teaching.…”
    Get full text
    Article
  9. 7329
  10. 7330

    A High-performance Double Side Cooled IGBT Module for EV/HEV Applications by Yaqing MA, Jun YU, Yuekang DU, Jianfeng LI

    Published 2021-09-01
    “…High performance, low cost and high reliability integrated power modules for electric vehicle applications are leading the innovation in power electronic technology. …”
    Get full text
    Article
  11. 7331

    APPLICATION OF INFORMATION AND COMMUNICATION TECHNOLOGIES FOR THE CONTROL OF THE TECHNICAL STATE OF VEHICLES IN A TRANSPORT STREAM by N. S. Jankevich

    Published 2018-05-01
    “…The article deals with the specifics of the application of information technologies in the transport sphere. …”
    Get full text
    Article
  12. 7332
  13. 7333

    APPLICATION OF INFORMATION AND COMMUNICATION TECHNOLOGIES FOR THE CONTROL OF THE TECHNICAL STATE OF VEHICLES IN A TRANSPORT STREAM by N. S. Jankevich

    Published 2018-05-01
    “…The article deals with the specifics of the application of information technologies in the transport sphere. …”
    Get full text
    Article
  14. 7334

    Classified risk assessment method of Android application based on multi-factor clustering selection by Fan CHAO, Zhi YANG, Xuehui DU, Bing HAN

    Published 2021-04-01
    “…Most existing risk assessments of Android applications directly assign weights to factors according to experience, and calculate security risks by counting the frequency statistics of few factors.A new method for risk assessment of Android applications is proposed, which can provide both quantitative and qualitative assessment.This method integrates multiple risk factors such as system permissions, API calls, the action properties of Intent Filter, and data flow.The risks of factors are assigned based on their risk classification and addition, and the weights of factor subsets are distributed based on hierarchical clustering.Experiments show that the assessment results can effectively reflect the real security risks of Android applications.…”
    Get full text
    Article
  15. 7335

    DL-assisted programmable multilayer network application awareness system for IP-over-EON by Zuqing ZHU, Jiawei KONG, Bin NIU, Shaofei TANG, Hongqiang FANG, Siqi LIU

    Published 2019-11-01
    “…In order to realize real-time and fine-granularity network monitoring and adjustment,and satisfy the specific QoS demands of various applications,a deep learning (DL) assisted programmable multilayer network application performance awareness system for IP-over-EON was proposed.The distributed network monitoring based on network application performance awareness was combined with centralized network management.The multilayer and fine-grained network monitoring was implemented by distributed network monitoring,and the data analysis through DL was performed.Experimental results indicate that by combining distributed and centralized processing seamlessly,the proposed network monitoring system can not only realize timely and automatic network control and management but also provide superior scalability.…”
    Get full text
    Article
  16. 7336
  17. 7337

    A Modified DOE-2 Model for Typical Performance of Absorption Chillers and its Application by 杨承, 杨泽亮, 蔡睿贤

    Published 2007-01-01
    “…A modified DOE-2 model for double effect steam-driven absorption chillers, as an example, was developed and its reasonability and validity were tested by the product data and the general theoretical model. Application case study confirms the ability of the modified DOE-2 model to fast predict the part-load performances of absorption chillers.…”
    Get full text
    Article
  18. 7338
  19. 7339

    Application of Online Anomaly Detection Using One-Class Classification to the Z24 Bridge by Amro Abdrabo

    Published 2024-12-01
    “…The study is the first to assess the applicability of one-class classification for anomaly detection on the short-term structural health data of the Z24 bridge.…”
    Get full text
    Article
  20. 7340

    The application of text mining and deep learning in identifying the psychological pressure of college students in employment by Guanlan Chen

    Published 2025-06-01
    “…This study provides a technical foundation for data-driven psychological assessment and student support services.…”
    Get full text
    Article