Suggested Topics within your search.
Suggested Topics within your search.
- Agriculture 1
- Artificial Intelligence 1
- Artificial intelligence 1
- Automobiles 1
- Data Mining and Knowledge Discovery 1
- Data mining 1
- Economic Policy 1
- Economic policy 1
- Energy Policy, Economics and Management 1
- Energy and state 1
- Energy policy 1
- Environmental Economics 1
- Environmental economics 1
- Fault location (Engineering) 1
- Industrial Organization 1
- Industrial organization 1
- Maintenance and repair 1
- Soil Science & Conservation 1
- Soil conservation 1
- Soil science 1
- Sustainable Development 1
- Sustainable development 1
-
941
Symbol-Pair Distances of a Class of Repeated-Root Constacyclic Codes of Length <i>np<sup>s</sup></i> over <inline-formula><math display="inline"><semantics><mrow><msub><mi mathvari...
Published 2025-04-01“…Symbol-pair codes are a class of block codes with symbol-pair metrics designed to protect against pair errors that may occur in high-density data storage systems. …”
Get full text
Article -
942
Improving MRAM Performance with Sparse Modulation and Hamming Error Correction
Published 2025-06-01“…During the encoding process, three check bits are appended to the user data and processed using a generator matrix. If the resulting codeword fails to satisfy the sparsity constraint, it is inverted to comply with the coding requirement. …”
Get full text
Article -
943
Bringing it All Together: Data from Everywhere to Build Dashboards
Published 2023-12-01Get full text
Article -
944
Development and testing of data infrastructure in the American College of Emergency Physicians’ Clinical Emergency Data Registry for opioid‐related research
Published 2022-10-01“…Feasibility testing highlighted low‐to‐moderate feasibility of date and social history data elements, significant EHR platform variation, and inconsistency in the extraction of common national data standards (eg, Logical Observation Identifiers Names and Codes, International Classification of Diseases, Tenth Revision codes). …”
Get full text
Article -
945
IAP: Intrusion-Tolerant Malicious Data Injection Attack Analysis and Processing in Traffic Flow Data Collection Based on VANETs
Published 2016-05-01“…Next, we propose an intrusion-tolerant security algorithm to protect traffic flow data collection in VANETs from malicious data injection attacks, that is, IA 2 P, without any security codes or authentication. …”
Get full text
Article -
946
Leveraging the process mining technique to optimize data preparation time in a database used as an automated data delivery center
Published 2025-12-01“…This study investigates the development and implementation of a seismic database utilizing process mining techniques. This data format is generated and stored in seismic centers, such as the U.S. …”
Get full text
Article -
947
Identity-based linear homomorphic signature for a restricted combiners’ group for e-commerce
Published 2025-08-01“…As the volume of electronic transaction data increases and the demand for real-time processing grows, network coding techniques have become popular for improving performance. …”
Get full text
Article -
948
Complete Colombian Caribbean loggerhead turtle mitochondrial genome: tRNA structure analysis and revisited marine turtle phylogeny
Published 2018-11-01“…Mitochondrial DNA sequence data are of great importance for the description, monitoring, and phylogenetic analyses of migratory turtle populations. …”
Get full text
Article -
949
Intrusion detection algorithm of wireless network based on network traffic anomaly analysis
Published 2025-06-01Get full text
Article -
950
-
951
High Fidelity Single-Pixel Imaging
Published 2019-01-01“…Experiments both on synthetic data and real captured data demonstrate that our method can achieve better reconstruction from the same measurements, or reduce the number of required measurements for the same reconstruction quality.…”
Get full text
Article -
952
Effect of spontaneous activity on stimulus detection in a simple neuronal model
Published 2015-12-01Get full text
Article -
953
Data transmission system with encryption by chaotic sequences
Published 2014-06-01“…Improvement of methods of hidden data transfer based on the systems with chaotic synchronization is the important task of research in the field of information and telecommunication systems based on chaos. …”
Get full text
Article -
954
Improving Problem Solving Skills of High School Students Through The Implementation of Digital Module
Published 2025-04-01“…Data analysis, including independent sample t-tests and N-Gain calculations, demonstrated a significant improvement in the experimental group’s problem-solving performance. …”
Get full text
Article -
955
Monitoring the reliability of integrated circuits protection against Trojans: encoding and decoding of combinational structures
Published 2021-09-01“…For the purpose of hardware protection of projects, the methods of hardware coding are currently used.The paper discusses the features and reliability of logical coding of combinational circuits. …”
Get full text
Article -
956
Complete mitochondrial genome of orthotomus sutorius (passeriformes: cisticolidae)
Published 2025-05-01“…It is 16,982 bp in length and consists of 13 protein-coding genes (PCGs), 22 tRNA genes, two rRNA genes (12S rRNA and 16S rRNA) and a control region (CR). …”
Get full text
Article -
957
Sensitivity of Spiking Neural Networks Due to Input Perturbation
Published 2024-11-01“…<b>Methods:</b> This paper first defines the sensitivity of a temporal-coded spiking neuron (SN) as the deviation between the perturbed and unperturbed output under a given input perturbation with respect to overall inputs. …”
Get full text
Article -
958
Compact classification using the biomimetic properties of ultrafast spiking microlaser neurons
Published 2025-01-01“…Machine learning using spiking neurons offers high computational efficiency with minimal resources, enabling sparse coding and brain-inspired methods. Photonic systems potentially enable very fast classifications but, despite recent progress, demonstrations are still challenging to implement. …”
Get full text
Article -
959
Surveillance of severe acute respiratory infections using ICD-10 diagnosis codes and national electronic health records, Denmark, 2022 to 2024
Published 2025-08-01“…Second, using this case definition, we evaluated the surveillance system’s timeliness and completeness by comparing weekly data reported with a delay of 1, 8, 15, 22 and 29 days, respectively, against a complete set of data extracted after 120 days. …”
Get full text
Article -
960
Are you a die-hard K-pop fan? Examining English Korean code mixing uttered by an American native speaker youtuber
Published 2022-02-01“…However, the data identified three specific reasons for code-mixing with Korean native speaker interlocutor, notably clarification of the speech content, interjection, and quotation of someone else. …”
Get full text
Article