Suggested Topics within your search.
Suggested Topics within your search.
- Agriculture 1
- Artificial Intelligence 1
- Artificial intelligence 1
- Automobiles 1
- Data Mining and Knowledge Discovery 1
- Data mining 1
- Economic Policy 1
- Economic policy 1
- Energy Policy, Economics and Management 1
- Energy and state 1
- Energy policy 1
- Environmental Economics 1
- Environmental economics 1
- Fault location (Engineering) 1
- Industrial Organization 1
- Industrial organization 1
- Maintenance and repair 1
- Soil Science & Conservation 1
- Soil conservation 1
- Soil science 1
- Sustainable Development 1
- Sustainable development 1
-
681
A Novel Jamming Method Based on Sine Function Secondary Modulation and Phase Coded Modulation
Published 2025-01-01“…The simulation results based on airborne SAR raw echo data verify the correctness of the theoretical model.…”
Get full text
Article -
682
Integrated Analysis of Long Noncoding RNA and Coding RNA Expression in Esophageal Squamous Cell Carcinoma
Published 2013-01-01“…These data provide compelling evidence for a potential novel genomic biomarker of esophageal squamous cell cancer.…”
Get full text
Article -
683
Integrating multiple precision livestock technologies to advance rangeland grazing management
Published 2025-08-01Subjects: Get full text
Article -
684
Lake detection algorithm in point clouds of the lidar image based on three-dimensional convolutional neural network
Published 2022-06-01Subjects: “…laser scanning data…”
Get full text
Article -
685
Staying True to the Data
Published 2025-06-01“…Secondly, process data in the form of a coding rate time study and theoretical contribution rate, were tracked to monitor theoretical saturation objectively. …”
Get full text
Article -
686
Data-driven optimisation of variation of residual concentration to estimate the hydrogen diffusion coefficient and uptake via MATLABMendeley DataMendeley Data
Published 2025-10-01“…This article presents the data collected during experimental solubility tests in University of Bergamo lab and the developed code to estimate the principal parameters for hydrogen uptake. …”
Get full text
Article -
687
AN INTERFERENCE-IMMUNE COMMUNICATION SYSTEM FOR DIGITAL DATA TRANSMISSION BASED ON A MULTI-CHANNEL CORRELATOR Part 2. DEVELOPMENT OF A CORRELATION-TYPE TRANSCEIVER BASED ON A MULTI...
Published 2025-06-01“…An algorithm for generating and decoding signals of a sub-noise correlation communication system has been implemented, using the spreading signal method for data transmission with noise-like Gold-code-based signals. …”
Get full text
Article -
688
AN INTERFERENCE-IMMUNE COMMUNICATION SYSTEM FOR DIGITAL DATA TRANSMISSION BASED ON A MULTI-CHANNEL CORRELATOR Part 1. DEVELOPMENT OF A SIGNAL FORMATION AND DECODING ALGORITHM FOR T...
Published 2025-03-01“…An algorithm has been developed for generating and decoding from a sub-noise spread spectrum correlation communication system using DSSS technology. The processes of data formation and transmission by noise-like signals based on the Gold codes have been modeled. …”
Get full text
Article -
689
Integrasi Audit dan Teknik Clustering untuk Segmentasi dan Kategorisasi Aktivitas Log
Published 2024-02-01Get full text
Article -
690
Hiding Techniques using Mp3
Published 2010-12-01“…Here, some steganography techniques on sound (Low Bit Encoding, Phase Coding) has been used to apply them on MP3 file format which had been chosen as a cover for data transmission.…”
Get full text
Article -
691
Data Please!: Expanding the Role of Libraries in Data Science through Digital Scholarship
Published 2025-07-01“…Objective: As data science becomes more integrated into research and teaching, libraries are well-positioned to support this work. …”
Get full text
Article -
692
Research on the high-performance transmission control protocol under lossy networks
Published 2014-07-01“…A novel redundancy parameter updating algorithm based on network coding combined TCP was proposed.Reduced coefficients linear network coding which could simplify decoding and simultaneously reduce the overhead in the header was involved in encoding process before data transmission.During the simulations,NS2 was used to test the communication under different lossy networks.Results showed that the new protocol which adopted this algorithm re-tained the fairness and outperformed the other protocols in effectiveness and adaptability especially under light-load net-works.…”
Get full text
Article -
693
Chloroplast genome sequencing and phylogenetic analysis of Brassica tournefortii Gouan (Brassicaceae)
Published 2025-08-01“…These findings provide essential chloroplast genome data for B. tournefortii, supporting research on species identification, evolutionary studies, and understanding species invasion mechanisms.…”
Get full text
Article -
694
Research on data management technology of shearer based on protocol matching and data compression
Published 2024-11-01“…Next, the switching sensor data compression algorithm based on the same state word and the analog sensor data compression algorithm based on the variable length coding are designed to improve the compression ratio of the real-time data of the shearer and reduce the overhead of the data storage subsystem. …”
Get full text
Article -
695
3D PCDM Probabilistic Shaping Transmission Scheme Based on Chaotic Constellation Mapping
Published 2023-01-01“…The bit error rate (BER) performance of the communication system is optimized by using the probabilistic shaping effect of PCDM and the strong correction performance of Polar code. Meantime the Logistic and Lorenz chaotic models are used to mask the constellation map for multiple times to ensure the security transmission of data. …”
Get full text
Article -
696
Mechanism for data recovery as a result of data corruption, infection and/or unauthorized modification
Published 2025-04-01“…To develop the software module, a reversible incremental backup algorithm was chosen as the most suitable for the developed algorithm and more convenient to use.Conclusion. The proposed data recovery mechanism is a modern solution that ensures the safety of personal files in case of their damage. …”
Get full text
Article -
697
Simulating data breaches: Synthetic datasets for depicting personally identifiable information through scenario-based breachesMendeley DataMendeley Data
Published 2025-02-01“…With hackers relentlessly disrupting cyberspace and the day-to-day operations of organizations worldwide, there are also concerns related to Personally Identifiable Information (PII). Due to the data breaches and the data getting dumped on the clear web or the dark web, there are serious concerns about how the different threat actors worldwide can misuse the data. …”
Get full text
Article -
698
Optimizing Energy Efficiency and Green Storage in RAID-6 Systems: Comparative Analyses of Error Correction Codes
Published 2025-01-01“…Despite their benefits, these systems are also associated with high energy consumption, significantly impacting the carbon footprint of data facilities. This study evaluates the energy efficiency of three prevalent error correction codes—Reed-Solomon, Row-Diagonal Parity (RDP), and Liberation Codes—applied within RAID-6 systems. …”
Get full text
Article -
699
Generative adversarial networks based adaptive modulation and coding for next-generation 5G communication systems
Published 2025-01-01“…Abstract In 5G based communication systems, adaptive modulation and coding (AMC) is a key approach that optimizes data transmission by constantly modifying modulation schemes and error correction coding by the current channel circumstances. …”
Get full text
Article -
700
Integer wavelet transform‐based secret image sharing using rook polynomial and hamming code with authentication
Published 2024-12-01“…Also, utilising Hamming code lets us embed data with much less required modifications on the cover image which results in high‐quality stego images.…”
Get full text
Article