Showing 1,241 - 1,260 results of 10,293 for search 'data coding', query time: 0.18s Refine Results
  1. 1241

    Dealing with post-excavation data: the Omeka S TiMMA web-database by Rueff, Bastien

    Published 2024-01-01
    “…Designed with simplicity in mind, the graphic interface of Omeka S makes it a particularly appropriate tool for collective projects, permitting each user to perform a specific role and record data in their chosen language. This user-friendliness extends up to the data recording and publishing, as well as to the website designing which requires no specific skills in code. …”
    Get full text
    Article
  2. 1242

    Fuzzy Clustering Analysis of HVSR Data for Seismic Microzonation at Lahore City by Sarfraz Khan, Muhammad Waseem, Shahzad Khalid, Denise-Penelope N. Kontoni, Mahmood Ahmad, Suraparb Keawsawasvong

    Published 2022-01-01
    “…The results of the Silhouette Index suggest that the FCM clustering solution of observation data points is more consistent. The results of clustering reveal three solutions. …”
    Get full text
    Article
  3. 1243

    Digital transformation in the legal sector: Challenges and opportunities for cybersecurity and data protection by Erisa Xhixho, Niiazbek Pazylov, Viktor Savchenko, Nurkhanbek Patiev, Munarym Pazylova

    Published 2025-05-01
    “…Additionally, the content of reports from governmental and international organisations was examined to assess current trends in data protection and digital services. The study analysed key documents such as the National Development Strategy of the Kyrgyz Republic for 2018-2040 and the Concept of Digital Transformation of the Kyrgyz Republic for 2024-2028, theCivil and Criminal Codes of the Kyrgyz Republic, as well as laws of the Kyrgyz Republic regulating access to information, data protection, and cybersecurity, namely, “On the Right of Access to Information”, “On Protection of State Secrets of the Kyrgyz Republic”, “On the National Archive Fund of the Kyrgyz Republic”, “On the Electrical Connection”. …”
    Get full text
    Article
  4. 1244

    Security Design for Data Distribution Service Based on Secure Onboard Communication by Fengjun Zhou, Gang Wang, Qun Wang, Yuxing Wang, Jun Wang

    Published 2025-01-01
    “…The core innovations are as follows: 1) Dynamic Security Policy Adaptation across Protocol Layers: By extending the Real-Time Publish-Subscribe protocol of DDS, SecOC security fields (Freshness Value + Message Authentication Code) are embedded into the message structure, and a dynamic mapping mechanism is established between the topic-level Quality of Service policies and the Protocol Data Unit-level security parameters is established. …”
    Get full text
    Article
  5. 1245

    Blockchain and NFT-Based Solution for Genomic Data Management, Sharing, and Monetization by Ahmad Musamih, Khaled Salah, Raja Jayaraman, Samer Ellaham, Mohammed Omar, Ibrar Yaqoob

    Published 2025-01-01
    “…Next-generation sequencing (NGS) technology creates repositories of sequenced data from individuals’ raw genomic data, which raises challenges related to data ownership, management, and secure sharing. …”
    Get full text
    Article
  6. 1246
  7. 1247

    Process and Validation of Depletion Database Based on Evaluated Nuclear Data Libraries by LUO Hao, LI Jie, HUANG Shanfang, WANG Kan

    Published 2024-07-01
    “…By incorporating the most up-to-date and accurate data into the depletion subroutine DEPTH of the Monte Carlo code RMC, the performance and reliability of the simulation tool were significantly enhanced. …”
    Get full text
    Article
  8. 1248
  9. 1249

    The NANOGrav 15 yr Data Set: Search for Gravitational-wave Memory by Gabriella Agazie, Akash Anumarlapudi, Anne M. Archibald, Zaven Arzoumanian, Jeremy G. Baier, Paul T. Baker, Bence Bécsy, Laura Blecha, Adam Brazier, Paul R. Brook, Sarah Burke-Spolaor, Rand Burnette, J. Andrew Casey-Clyde, Maria Charisi, Shami Chatterjee, Tyler Cohen, James M. Cordes, Neil J. Cornish, Fronefield Crawford, H. Thankful Cromartie, Kathryn Crowter, Megan E. DeCesar, Paul B. Demorest, Heling Deng, Lankeswar Dey, Timothy Dolch, Elizabeth C. Ferrara, William Fiore, Emmanuel Fonseca, Gabriel E. Freedman, Emiko C. Gardiner, Nate Garver-Daniels, Peter A. Gentile, Kyle A. Gersbach, Joseph Glaser, Deborah C. Good, Kayhan Gültekin, Jeffrey S. Hazboun, Ross J. Jennings, Aaron D. Johnson, Megan L. Jones, David L. Kaplan, Luke Zoltan Kelley, Matthew Kerr, Joey S. Key, Nima Laal, Michael T. Lam, William G. Lamb, Bjorn Larsen, T. Joseph W. Lazio, Natalia Lewandowska, Tingting Liu, Duncan R. Lorimer, Jing Luo, Ryan S. Lynch, Chung-Pei Ma, Dustin R. Madison, Alexander McEwen, James W. McKee, Maura A. McLaughlin, Natasha McMann, Bradley W. Meyers, Patrick M. Meyers, Chiara M. F. Mingarelli, Andrea Mitridate, Priyamvada Natarajan, Cherry Ng, David J. Nice, Stella Koch Ocker, Ken D. Olum, Timothy T. Pennucci, Benetge B. P. Perera, Polina Petrov, Nihan S. Pol, Henri A. Radovan, Scott M. Ransom, Paul S. Ray, Jessie C. Runnoe, Alexander Saffer, Shashwat C. Sardesai, Ann Schmiedekamp, Carl Schmiedekamp, Kai Schmitz, Brent J. Shapiro-Albert, Xavier Siemens, Joseph Simon, Magdalena S. Siwek, Sophia V. Sosa Fiscella, Ingrid H. Stairs, Daniel R. Stinebring, Kevin Stovall, Jerry P. Sun, Abhimanyu Susobhanan, Joseph K. Swiggum, Jacob Taylor, Stephen R. Taylor, Jacob E. Turner, Caner Unal, Michele Vallisneri, Rutger van Haasteren, Sarah J. Vigeland, Haley M. Wahl, Caitlin A. Witt, David Wright, Olivia Young

    Published 2025-01-01
    Get full text
    Article
  10. 1250

    Internet, Big data y nuevas tecnologías: repercusiones y respuestas del ordenamiento jurídico | Internet, Big data and new tecnologies: implications and responses from the legal s... by Marina Sancho López

    Published 2019-05-01
    “…Abstract: Each of the movements that occur in the network generates information that is digitized in binary code and it is stored massively. The arbitrariness with which the Big Data corporations operate as well as the opacity of the algorithms used by artificial intelligence have given rise to new forms of violation of rights, where intimacy and honour have been the first victims. …”
    Get full text
    Article
  11. 1251

    Internet, Big data y nuevas tecnologías: repercusiones y respuestas del ordenamiento jurídico | Internet, Big data and new tecnologies: implications and responses from the legal s... by Marina Sancho López

    Published 2019-05-01
    “…Abstract: Each of the movements that occur in the network generates information that is digitized in binary code and it is stored massively. The arbitrariness with which the Big Data corporations operate as well as the opacity of the algorithms used by artificial intelligence have given rise to new forms of violation of rights, where intimacy and honour have been the first victims. …”
    Get full text
    Article
  12. 1252

    Security-Reliability Analysis of NOMA-Assisted Hybrid Satellite-Terrestrial Relay Multi-Cast Transmission Networks Using Fountain Codes and Partial Relay Selection with Presence of... by Toan Van Nguyen, Trung Duy Tran, Ngoc Son Pham, Viet Tuan Pham, Lam Thanh Tu

    Published 2025-04-01
    “…This article proposes a hybrid satellite-terrestrial relaying network (HSTRN) that integrates physical-layer security (PLS), Fountain codes (FCs), non-orthogonal multiple access (NOMA), and partial relay selection (PRS) to enhance system performance in terms of reliability, data rate, and security. …”
    Get full text
    Article
  13. 1253

    A rare coding mutation in the MAST2 gene causes venous thrombosis in a French family with unexplained thrombophilia: The Breizh MAST2 Arg89Gln variant. by Pierre-Emmanuel Morange, Franck Peiretti, Lenaick Gourhant, Carole Proust, Omar Soukarieh, Anne-Sophie Pulcrano-Nicolas, Ganapathi-Varma Saripella, Luca Stefanucci, Romaric Lacroix, Manal Ibrahim-Kosta, Catherine A Lemarié, Mattia Frontini, Marie-Christine Alessi, David-Alexandre Trégouët, Francis Couturaud

    Published 2021-01-01
    “…RNA sequencing analysis of RNA interference experimental data conducted in endothelial cells revealed that, of the 13,387 detected expressed genes, 2,354 have their level of expression modified by MAST2 knockdown, including SERPINE1 coding for PAI-1 and TFPI. …”
    Get full text
    Article
  14. 1254
  15. 1255

    Moment-curvature response of concrete beams reinforced with steel bars and dual hooked-end fibers: Tests versus predictions by Model Code 2020 and Rilem TC 162-TDF by Amarjeet Kumar, Aleksandr Sokolov, Alinda Dey, Karolis Sakalauskas, Darius Bacinskas, Juozas Valivonis, Gintaris Kaklauskas

    Published 2025-12-01
    “…A comparative analysis was then conducted between the code-predicted and experimentally-derived residual stress-strain relationships, which also revealed that Model Code 2020 predictions closely matched the experimental data, especially at higher reinforcement ratios. …”
    Get full text
    Article
  16. 1256

    Identification and functional characterization of G6PC2 coding variants influencing glycemic traits define an effector transcript at the G6PC2-ABCB11 locus. by Anubha Mahajan, Xueling Sim, Hui Jin Ng, Alisa Manning, Manuel A Rivas, Heather M Highland, Adam E Locke, Niels Grarup, Hae Kyung Im, Pablo Cingolani, Jason Flannick, Pierre Fontanillas, Christian Fuchsberger, Kyle J Gaulton, Tanya M Teslovich, N William Rayner, Neil R Robertson, Nicola L Beer, Jana K Rundle, Jette Bork-Jensen, Claes Ladenvall, Christine Blancher, David Buck, Gemma Buck, Noël P Burtt, Stacey Gabriel, Anette P Gjesing, Christopher J Groves, Mette Hollensted, Jeroen R Huyghe, Anne U Jackson, Goo Jun, Johanne Marie Justesen, Massimo Mangino, Jacquelyn Murphy, Matt Neville, Robert Onofrio, Kerrin S Small, Heather M Stringham, Ann-Christine Syvänen, Joseph Trakalo, Goncalo Abecasis, Graeme I Bell, John Blangero, Nancy J Cox, Ravindranath Duggirala, Craig L Hanis, Mark Seielstad, James G Wilson, Cramer Christensen, Ivan Brandslund, Rainer Rauramaa, Gabriela L Surdulescu, Alex S F Doney, Lars Lannfelt, Allan Linneberg, Bo Isomaa, Tiinamaija Tuomi, Marit E Jørgensen, Torben Jørgensen, Johanna Kuusisto, Matti Uusitupa, Veikko Salomaa, Timothy D Spector, Andrew D Morris, Colin N A Palmer, Francis S Collins, Karen L Mohlke, Richard N Bergman, Erik Ingelsson, Lars Lind, Jaakko Tuomilehto, Torben Hansen, Richard M Watanabe, Inga Prokopenko, Josee Dupuis, Fredrik Karpe, Leif Groop, Markku Laakso, Oluf Pedersen, Jose C Florez, Andrew P Morris, David Altshuler, James B Meigs, Michael Boehnke, Mark I McCarthy, Cecilia M Lindgren, Anna L Gloyn, T2D-GENES consortium and GoT2D consortium

    Published 2015-01-01
    “…To test this, we analyzed exome-array data from up to 33,231 non-diabetic individuals of European ancestry. …”
    Get full text
    Article
  17. 1257

    Enhancing Gender-Based Violence Research: Holistic Approaches to Data Collection and Analysis by Subeksha Shrestha, Preeti Patel, Sentirenla Longchar, Aiswarya Francis Xavier

    Published 2025-05-01
    “…The findings suggest that while technological advancements, particularly generative AI and machine learning approaches, offer promising avenues for automating survey processes, reducing costs, and enhancing data collection efficiency, they present the limitations of secondary datasets, a lack of data disaggregation, and discrepancies in data coding systems, which highlight the necessity of refining global data standards.…”
    Get full text
    Article
  18. 1258

    Reversible Data Hiding Algorithm in Encrypted Images with Difference Encoding and Block Compression by Guoqing GE, Bin GE, Chenxing XIA, Zhimeng WANG

    Published 2024-07-01
    “…Due to the reversibility of the encryption operation and adaptive coding, a legitimate receiver can achieve lossless reconstruction of the original plain-text image and error-free extraction of the secret data. …”
    Get full text
    Article
  19. 1259

    Beyond the Hype Cycle: Experiments with ChatGPT’s Advanced Data Analysis at the Palo Alto City Library by M Ryan Hess and Chris Markman

    Published 2023-12-01
    “…Our experiments utilized ChatGPTs Advanced Data Analysis feature (formerly Code Interpreter). …”
    Get full text
    Article
  20. 1260