-
301
Dissipation rates from experimental uncertainty
Published 2025-03-01“…Here, we quantitatively relate these fluctuations to a thermodynamic speed limit that constrains the rates of heat and entropy production in nonequilibrium processes. …”
Get full text
Article -
302
RATING THE ACTIVITIES OF EXECUTIVE AUTHORITIES BY THE PUBLIC
Published 2017-10-01“…The findings of the research were reflected in the State Assignment report of 2016. The polling data was processed using the method of public perception ratings. …”
Get full text
Article -
303
-
304
Selected Topics on Business Informatics: Editorial Introduction to Issue 13 of CSIMQ
Published 2017-12-01Subjects: Get full text
Article -
305
Source Process Estimation for the 2024 Mw 7.1 Hyuganada, Japan, Earthquake and Forward Modeling Using N‐net Ocean Bottom Seismometer Data
Published 2025-05-01“…The N‐net seafloor seismograms of the mainshock with a frequency of ∼0.05 Hz recorded east of the source area were reproduced for several stations using the empirical Green's function approach based on the estimated source process data.…”
Get full text
Article -
306
-
307
-
308
Research on privacy preservation of member inference attacks in online inference process for vertical federated learning linear model
Published 2022-09-01“…With the development of big data and the introduction of data security regulations, the awareness of privacy protection has gradually increased, and the phenomenon of data isolation has become more and more serious.Federated learning technology as one of the effective methods to solve this problem has become a hot spot of concern.In the online inference process of vertical federated learning, the current mainstream methods do not consider the protection of data identity, which is easy to leak user privacy.A privacy protection method for member inference attacks was proposed in the online inference process of the vertical federated linear model.A filter with a false positive rate was constructed to avoid the accurate positioning of data identity to ensure the security of data.Homomorphic encryption was used to realize the full encrypted state of the online inference process and protect the intermediate calculation results.According to the ciphertext multiplication property of homomorphic encryption, the random number multiplication method was used to mask data, which ensured the security of the final inference result.This scheme further improved the security of user privacy in the online inference process of vertical federated learning and had lower computation overhead and communication costs.…”
Get full text
Article -
309
Automated methane emission monitoring systems based on satellite data: Radiation transfer model analysis
Published 2025-02-01“…The highest methane emissions were detected on the Apsheron Peninsula (2.8 ppb), which is associated with leaks and gas processing processes. The seasonal analysis demonstrated an increase in concentrations in winter (3 ppm) and summer (2.7 ppm) due to a decrease in the dispersion rate and intensification of mining. …”
Get full text
Article -
310
Secure Image Transmission Using Multilevel Chaotic Encryption and Video Steganography
Published 2025-07-01Get full text
Article -
311
-
312
-
313
Predicting the coefficient of friction in a sliding contact by applying machine learning to acoustic emission data
Published 2024-02-01“…Acquired data is then used to train machine learning (ML) algorithms (e.g., Gaussian process regression (GPR) and support vector machine (SVM)) to correlated acoustic emission with friction. …”
Get full text
Article -
314
Detecting Signatures of Criticality Using Divergence Rate
Published 2025-04-01“…In biology especially, these signatures of criticality are thought to be connected with efficient computation and information processing. Guided by the classical theory of rate–distortion (RD) from information theory, we propose a measure for detecting and characterizing such phenomena from data. …”
Get full text
Article -
315
A deep decentralized privacy-preservation framework for online social networks
Published 2024-12-01Get full text
Article -
316
Efficient and Accurate Zero-Day Electricity Theft Detection from Smart Meter Sensor Data Using Prototype and Ensemble Learning
Published 2025-07-01“…By efficiently processing high-frequency smart meter sensor data, this model contributes to developing real-time and energy-efficient anomaly detection systems in smart grid environments.…”
Get full text
Article -
317
-
318
Bioinformatic Analysis of Complex In Vitro Fertilization Data and Predictive Model Design Based on Machine Learning: The Age Paradox in Reproductive Health
Published 2025-05-01“…This approach to the processing and utilization of clinical data demonstrates the potential for optimization and documentation of therapeutic procedures. …”
Get full text
Article -
319
Study of the structure and development of oil deposits in carbonate reservoirs using field data and X-ray microtomography
Published 2024-04-01“…The advantage of the approach used is the ability to study the deposit at three levels: core-well-development object, it is reasonable to transfer micro-survey data to the regularities of the implementation of technological processes of oil production. …”
Get full text
Article -
320
Pengaruh Padat Tebar Ikan Lele Terhadap Laju Pertumbuhan dan Survival Rate Pada Sistem Akuaponik <Br><I>[ The Effect Of Stocking Density On Survival Rate and Grow Rate Of Aquaponi...
Published 2014-04-01“…Analysis of the data processed using Analysis of Variance (ANOVA) to know whether there is influance the growth rate and survival rate between the treatment given. …”
Get full text
Article