-
861
Speech emotion recognition algorithm based on spectrogram feature extraction of deep space attention feature
Published 2019-07-01“…At the same time, the recognition effect of the model on the natural database (FAU-AEC) and the Berlin database (EMO-DB) were compared. …”
Get full text
Article -
862
Tracking Couples who leave the Study Location in Historical Studies of Fertility: an Australian Example
Published 2016-06-01“…The paper describes the methods used to create a database to study the fall of fertility in Tasmania, a colony of Australia, in the late 19th and early 20th centuries. …”
Get full text
Article -
863
A Framework for Promoting Passive Breast Cancer Monitoring: Deep Learning as an Interpretation Tool for Breast Thermograms
Published 2024-07-01“…This study aims to introduce a dataset of breast thermograms.Material and Methods: In this study, thermographic images of breast cancer from Iranian samples were prepared and confirmed due to the limited number of breast thermogram databases. The prepared database was tested using artificial intelligence and another well-known DMR database (Database for Mastology Research) in this study to determine its reliability.Results: A variety of deep learning architectures and transfer learning are used to evaluate these databases for accuracy, sensitivity, speed, training compliance, and validation compliance. …”
Get full text
Article -
864
The 80/20 Rule
Published 2005-09-01“…In our example, our database was analyzed to test the applicability of the 80/20 rule. …”
Get full text
Article -
865
A method of SQL access logs pretreatment for power business system
Published 2015-12-01“…With the development of smart grid interactive,the database interaction between the information inside and outside is increasing.A method of SQL access log compression for power business system to respond to the demand of database security audit for the power system was designed in detail.This method can realize the compression of SQL access log and have the function of simple classification for SQL logs.The test results show that the method can achieve a large margin compression of SQL access logs and meet the requirements of log preprocessing for the database behavior audit of power business system.…”
Get full text
Article -
866
Using Clustering Analysis and Association Rule Technology in Cross-Marketing
Published 2021-01-01“…The improved idea is that when the first partition is used to generate the projection database, the number of itemsets in the projection database is sorted from small to large, and when the second partition is used, the sequence patterns are generated directly from the mined sequence patterns, so as to reduce the construction of the database. …”
Get full text
Article -
867
Meta-analysis of Effect of Otago Exercise Program on Stroke Patients
Published 2019-04-01“…Objective:To evaluate the effect of Otago exercise program on the patients with stroke.Methods:Randomized controlled trials(RCTs)about Otago exercise program for falls efficacy balance function in patients with stroke were electronically searched in PubMed, Cochrane Library, Web of Science, EMbase, CNKI Chinese Journal Full-text Database, Wanfang Database, VIP Database and Chinese Biomedical Literature Database from the establishment of each database to May, 2018.All data were analyzed with RevMan 5.3 software.Results:A total of seven studies that represented 545 participants were evaluated. …”
Get full text
Article -
868
Integration of GPS and GIS in Mapping of Secondary Schools in Akure South Local Government Area of Ondo State Nigeria
Published 2021-11-01“… The study aims at integrating GPS and GIS in the Mapping of secondary schools in Akure South Local Government Area of Ondo State with a view to identify, map, and create a database for both private and government secondary schools within the study area. …”
Get full text
Article -
869
Development of an intelligent virtual assistant for digitalization of Moroccan agriculture
Published 2024-01-01“…The project also encompasses the curation of a comprehensive database to facilitate future fine-tuning of Speech-to-Text (STT) and Text-to-Speech (TTS) models in Darija. …”
Get full text
Article -
870
Mobility-assisted big data collecting in wireless sensor networks
Published 2016-08-01Get full text
Article -
871
Integration of GPS and GIS in Mapping of Secondary Schools in Akure South Local Government Area of Ondo State Nigeria
Published 2021-11-01“… The study aims at integrating GPS and GIS in the Mapping of secondary schools in Akure South Local Government Area of Ondo State with a view to identify, map, and create a database for both private and government secondary schools within the study area. …”
Get full text
Article -
872
Determination of Modelling Error Statistics for Cold-Formed Steel Columns
Published 2020-01-01“…For the first time, a database has been created using test results available in the literature for compression capacities of CFS lipped-channel sections. …”
Get full text
Article -
873
Research on trust measurement method for initial access of industrial internet edge terminals
Published 2022-12-01“…The development of the discrete manufacturing shows a trend of intelligence, openness and collaboration.As a result, many heterogeneous devices are connected to the industrial internet, which brings serious challenges to the security.Therefore, it is particularly important to introduce trust management and trusted access to devices for trusted measurement.In order to more timely and accurately evaluate the trustworthiness of the edge terminal initially accessing the system, a trustworthiness measurement method based on the device vulnerability database was innovatively proposed.This method adopted the architecture of cloud-edge collaboration, established a device information database and a vulnerability database in the central cloud, and then calculated the terminal risk factor at the edge.Finally, the trust initialization of the access terminal was completed.The simulation results show that the method can well balance the efficiency and security of the system.…”
Get full text
Article -
874
A discovery strategy for APT anomaly based on homologous behavior analysis
Published 2016-01-01“…As APT(advanced persistent threat)attacks are increasingly frequently,higher requirements for the detection of APT attacks were proposed.It was an effective method to early discover the attack behavior of APT based on homologous behavior analysis.Aiming at the problem of low efficiency of data authentication caused by excessive data,the historical behavior database with data label technology was established and the database was stored in the cloud.Relying on the Hadoop platform and the aggregate computing ability of MapReduce and the pseudorandom permutation technique,the whole traffic parallel detection of the network was realized.In order to determine whether there was a APT attack behavior,the detection of APT attacks was implemented by comparing the data labels in the database.Test results show that the proposed method can detect the abnormal behavior of APT from the network as soon as possibleand improve the efficiency of the whole data flow detection.…”
Get full text
Article -
875
Improving the Component-Based Face Recognition Using Enhanced Viola–Jones and Weighted Voting Technique
Published 2019-01-01“…Combining these weights was done by a simple voting technique. Three public databases were used: the AT&T database, the PUT database, and the AR database. …”
Get full text
Article -
876
Statistical Analysis of Loss of Offsite Power Events
Published 2016-01-01“…This paper presents the results of the statistical analysis of the loss of offsite power events (LOOP) registered in four reviewed databases. The reviewed databases include the IRSN (Institut de Radioprotection et de Sûreté Nucléaire) SAPIDE database and the GRS (Gesellschaft für Anlagen- und Reaktorsicherheit mbH) VERA database reviewed over the period from 1992 to 2011. …”
Get full text
Article -
877
SLC2A5 Correlated with Immune Infiltration: A Candidate Diagnostic and Prognostic Biomarker for Lung Adenocarcinoma
Published 2021-01-01“…This study is aimed at elucidating the function of SLC2A5 in the prognosis and pathogenesis of LUAD by analyzing public databases. The differential expression of SLC2A5 in various tissues from Oncomine, GEPIA, and other databases was obtained, and SLC2A5 expression at the protein level in normal and tumor tissues was detected with the use of the HPA database. …”
Get full text
Article -
878
Expression and Clinical Significance of DAP3 in Breast Cancer and Effect of Bruceine D on Expression of DAP3:Analysis Based on Data-mining from Bioinformatics
Published 2019-04-01“…The expression of DAP3 in breast cancer cell lines was analyzed by using CCLE database to further analyze the effect of Bruceine D on the expression level of DAP3 gene in breast cancer cells.Results:In Oncomine database, there were 417 data sets of different types of DAP3 gene expression, of which 22 studies were of statistical differences(22 up-regulated). …”
Get full text
Article -
879
Time-dependent robust reliability optimization of structure based on genetic interval affine response surface
Published 2024-06-01“…The process of design of experiment was divided into two parts which were design variable database and structural performance response database. …”
Get full text
Article -
880
The High Security Mechanisms Algorithm of Similarity Metrics for Wireless and Mobile Networking
Published 2017-01-01“…Apriori, the most influential algorithm of association rules mining, needs to scan a database many times, and the efficiency is low when the database is huge. …”
Get full text
Article