Suggested Topics within your search.
Suggested Topics within your search.
- Agriculture 1
- Artificial Intelligence 1
- Artificial intelligence 1
- Automobiles 1
- Data Mining and Knowledge Discovery 1
- Data mining 1
- Economic Policy 1
- Economic policy 1
- Energy Policy, Economics and Management 1
- Energy and state 1
- Energy policy 1
- Environmental Economics 1
- Environmental economics 1
- Fault location (Engineering) 1
- Industrial Organization 1
- Industrial organization 1
- Maintenance and repair 1
- Soil Science & Conservation 1
- Soil conservation 1
- Soil science 1
- Sustainable Development 1
- Sustainable development 1
-
1241
Dealing with post-excavation data: the Omeka S TiMMA web-database
Published 2024-01-01“…Designed with simplicity in mind, the graphic interface of Omeka S makes it a particularly appropriate tool for collective projects, permitting each user to perform a specific role and record data in their chosen language. This user-friendliness extends up to the data recording and publishing, as well as to the website designing which requires no specific skills in code. …”
Get full text
Article -
1242
Fuzzy Clustering Analysis of HVSR Data for Seismic Microzonation at Lahore City
Published 2022-01-01“…The results of the Silhouette Index suggest that the FCM clustering solution of observation data points is more consistent. The results of clustering reveal three solutions. …”
Get full text
Article -
1243
Digital transformation in the legal sector: Challenges and opportunities for cybersecurity and data protection
Published 2025-05-01“…Additionally, the content of reports from governmental and international organisations was examined to assess current trends in data protection and digital services. The study analysed key documents such as the National Development Strategy of the Kyrgyz Republic for 2018-2040 and the Concept of Digital Transformation of the Kyrgyz Republic for 2024-2028, theCivil and Criminal Codes of the Kyrgyz Republic, as well as laws of the Kyrgyz Republic regulating access to information, data protection, and cybersecurity, namely, “On the Right of Access to Information”, “On Protection of State Secrets of the Kyrgyz Republic”, “On the National Archive Fund of the Kyrgyz Republic”, “On the Electrical Connection”. …”
Get full text
Article -
1244
Security Design for Data Distribution Service Based on Secure Onboard Communication
Published 2025-01-01“…The core innovations are as follows: 1) Dynamic Security Policy Adaptation across Protocol Layers: By extending the Real-Time Publish-Subscribe protocol of DDS, SecOC security fields (Freshness Value + Message Authentication Code) are embedded into the message structure, and a dynamic mapping mechanism is established between the topic-level Quality of Service policies and the Protocol Data Unit-level security parameters is established. …”
Get full text
Article -
1245
Blockchain and NFT-Based Solution for Genomic Data Management, Sharing, and Monetization
Published 2025-01-01“…Next-generation sequencing (NGS) technology creates repositories of sequenced data from individuals’ raw genomic data, which raises challenges related to data ownership, management, and secure sharing. …”
Get full text
Article -
1246
Responsible use of population neuroscience data: Towards standards of accountability and integrity
Published 2025-04-01Get full text
Article -
1247
Process and Validation of Depletion Database Based on Evaluated Nuclear Data Libraries
Published 2024-07-01“…By incorporating the most up-to-date and accurate data into the depletion subroutine DEPTH of the Monte Carlo code RMC, the performance and reliability of the simulation tool were significantly enhanced. …”
Get full text
Article -
1248
Pulse Profile Variability of PSR J1022+1001 in NANOGrav Data
Published 2025-01-01Get full text
Article -
1249
The NANOGrav 15 yr Data Set: Search for Gravitational-wave Memory
Published 2025-01-01Get full text
Article -
1250
Internet, Big data y nuevas tecnologías: repercusiones y respuestas del ordenamiento jurídico | Internet, Big data and new tecnologies: implications and responses from the legal s...
Published 2019-05-01“…Abstract: Each of the movements that occur in the network generates information that is digitized in binary code and it is stored massively. The arbitrariness with which the Big Data corporations operate as well as the opacity of the algorithms used by artificial intelligence have given rise to new forms of violation of rights, where intimacy and honour have been the first victims. …”
Get full text
Article -
1251
Internet, Big data y nuevas tecnologías: repercusiones y respuestas del ordenamiento jurídico | Internet, Big data and new tecnologies: implications and responses from the legal s...
Published 2019-05-01“…Abstract: Each of the movements that occur in the network generates information that is digitized in binary code and it is stored massively. The arbitrariness with which the Big Data corporations operate as well as the opacity of the algorithms used by artificial intelligence have given rise to new forms of violation of rights, where intimacy and honour have been the first victims. …”
Get full text
Article -
1252
Security-Reliability Analysis of NOMA-Assisted Hybrid Satellite-Terrestrial Relay Multi-Cast Transmission Networks Using Fountain Codes and Partial Relay Selection with Presence of...
Published 2025-04-01“…This article proposes a hybrid satellite-terrestrial relaying network (HSTRN) that integrates physical-layer security (PLS), Fountain codes (FCs), non-orthogonal multiple access (NOMA), and partial relay selection (PRS) to enhance system performance in terms of reliability, data rate, and security. …”
Get full text
Article -
1253
A rare coding mutation in the MAST2 gene causes venous thrombosis in a French family with unexplained thrombophilia: The Breizh MAST2 Arg89Gln variant.
Published 2021-01-01“…RNA sequencing analysis of RNA interference experimental data conducted in endothelial cells revealed that, of the 13,387 detected expressed genes, 2,354 have their level of expression modified by MAST2 knockdown, including SERPINE1 coding for PAI-1 and TFPI. …”
Get full text
Article -
1254
-
1255
Moment-curvature response of concrete beams reinforced with steel bars and dual hooked-end fibers: Tests versus predictions by Model Code 2020 and Rilem TC 162-TDF
Published 2025-12-01“…A comparative analysis was then conducted between the code-predicted and experimentally-derived residual stress-strain relationships, which also revealed that Model Code 2020 predictions closely matched the experimental data, especially at higher reinforcement ratios. …”
Get full text
Article -
1256
Identification and functional characterization of G6PC2 coding variants influencing glycemic traits define an effector transcript at the G6PC2-ABCB11 locus.
Published 2015-01-01“…To test this, we analyzed exome-array data from up to 33,231 non-diabetic individuals of European ancestry. …”
Get full text
Article -
1257
Enhancing Gender-Based Violence Research: Holistic Approaches to Data Collection and Analysis
Published 2025-05-01“…The findings suggest that while technological advancements, particularly generative AI and machine learning approaches, offer promising avenues for automating survey processes, reducing costs, and enhancing data collection efficiency, they present the limitations of secondary datasets, a lack of data disaggregation, and discrepancies in data coding systems, which highlight the necessity of refining global data standards.…”
Get full text
Article -
1258
Reversible Data Hiding Algorithm in Encrypted Images with Difference Encoding and Block Compression
Published 2024-07-01“…Due to the reversibility of the encryption operation and adaptive coding, a legitimate receiver can achieve lossless reconstruction of the original plain-text image and error-free extraction of the secret data. …”
Get full text
Article -
1259
Beyond the Hype Cycle: Experiments with ChatGPT’s Advanced Data Analysis at the Palo Alto City Library
Published 2023-12-01“…Our experiments utilized ChatGPTs Advanced Data Analysis feature (formerly Code Interpreter). …”
Get full text
Article -
1260