Showing 861 - 880 results of 10,368 for search '"database"', query time: 0.05s Refine Results
  1. 861

    Speech emotion recognition algorithm based on spectrogram feature extraction of deep space attention feature by Jinhua WANG, Na YING, Chendu ZHU, Zhaosen LIU, Zhedong CAI

    Published 2019-07-01
    “…At the same time, the recognition effect of the model on the natural database (FAU-AEC) and the Berlin database (EMO-DB) were compared. …”
    Get full text
    Article
  2. 862

    Tracking Couples who leave the Study Location in Historical Studies of Fertility: an Australian Example by Helen Moyle

    Published 2016-06-01
    “…The paper describes the methods used to create a database to study the fall of fertility in Tasmania, a colony of Australia, in the late 19th and early 20th centuries. …”
    Get full text
    Article
  3. 863

    A Framework for Promoting Passive Breast Cancer Monitoring: Deep Learning as an Interpretation Tool for Breast Thermograms by Mohamad Firouzmand, Keivan Majidzadeh, Maryam Jafari, Shahpar Haghighat, Rezvan Esmaeili, Leila Moradi, Nima Misaghi, Mahsa Ensafi, Fatemeh Batmanghelich, Mohammadreza Keyvanpour, Seyed Vahab Shojaedini

    Published 2024-07-01
    “…This study aims to introduce a dataset of breast thermograms.Material and Methods: In this study, thermographic images of breast cancer from Iranian samples were prepared and confirmed due to the limited number of breast thermogram databases.  The prepared database was tested using artificial intelligence and another well-known DMR database (Database for Mastology Research) in this study to determine its reliability.Results: A variety of deep learning architectures and transfer learning are used to evaluate these databases for accuracy, sensitivity, speed, training compliance, and validation compliance. …”
    Get full text
    Article
  4. 864

    The 80/20 Rule by Murat Yılmaz

    Published 2005-09-01
    “…In our example, our database was analyzed to test the applicability of the 80/20 rule. …”
    Get full text
    Article
  5. 865

    A method of SQL access logs pretreatment for power business system by Weiwei LI, Tao ZHANG, Yuanyuan MA, Cheng ZHOU

    Published 2015-12-01
    “…With the development of smart grid interactive,the database interaction between the information inside and outside is increasing.A method of SQL access log compression for power business system to respond to the demand of database security audit for the power system was designed in detail.This method can realize the compression of SQL access log and have the function of simple classification for SQL logs.The test results show that the method can achieve a large margin compression of SQL access logs and meet the requirements of log preprocessing for the database behavior audit of power business system.…”
    Get full text
    Article
  6. 866

    Using Clustering Analysis and Association Rule Technology in Cross-Marketing by Yang Cheng, Ming Cheng, Tao Pang, Sizhen Liu

    Published 2021-01-01
    “…The improved idea is that when the first partition is used to generate the projection database, the number of itemsets in the projection database is sorted from small to large, and when the second partition is used, the sequence patterns are generated directly from the mined sequence patterns, so as to reduce the construction of the database. …”
    Get full text
    Article
  7. 867

    Meta-analysis of Effect of Otago Exercise Program on Stroke Patients by Ziwen PEI, Mian WANG, Xianmei MENG

    Published 2019-04-01
    “…Objective:To evaluate the effect of Otago exercise program on the patients with stroke.Methods:Randomized controlled trials(RCTs)about Otago exercise program for falls efficacy balance function in patients with stroke were electronically searched in PubMed, Cochrane Library, Web of Science, EMbase, CNKI Chinese Journal Full-text Database, Wanfang Database, VIP Database and Chinese Biomedical Literature Database from the establishment of each database to May, 2018.All data were analyzed with RevMan 5.3 software.Results:A total of seven studies that represented 545 participants were evaluated. …”
    Get full text
    Article
  8. 868

    Integration of GPS and GIS in Mapping of Secondary Schools in Akure South Local Government Area of Ondo State Nigeria by H. Tata, E.P. Ojo

    Published 2021-11-01
    “… The study aims at integrating GPS and GIS in the Mapping of secondary schools in Akure South Local Government Area of Ondo State with a view to identify, map, and create a database for both private and government secondary schools within the study area. …”
    Get full text
    Article
  9. 869

    Development of an intelligent virtual assistant for digitalization of Moroccan agriculture by Iounousse Jawad, Temsamani Omar

    Published 2024-01-01
    “…The project also encompasses the curation of a comprehensive database to facilitate future fine-tuning of Speech-to-Text (STT) and Text-to-Speech (TTS) models in Darija. …”
    Get full text
    Article
  10. 870
  11. 871

    Integration of GPS and GIS in Mapping of Secondary Schools in Akure South Local Government Area of Ondo State Nigeria by H. Tata, E.P. Ojo

    Published 2021-11-01
    “… The study aims at integrating GPS and GIS in the Mapping of secondary schools in Akure South Local Government Area of Ondo State with a view to identify, map, and create a database for both private and government secondary schools within the study area. …”
    Get full text
    Article
  12. 872

    Determination of Modelling Error Statistics for Cold-Formed Steel Columns by R. P. Rokade, K. Balaji Rao, B. Palani

    Published 2020-01-01
    “…For the first time, a database has been created using test results available in the literature for compression capacities of CFS lipped-channel sections. …”
    Get full text
    Article
  13. 873

    Research on trust measurement method for initial access of industrial internet edge terminals by Ya YU, Yusun FU

    Published 2022-12-01
    “…The development of the discrete manufacturing shows a trend of intelligence, openness and collaboration.As a result, many heterogeneous devices are connected to the industrial internet, which brings serious challenges to the security.Therefore, it is particularly important to introduce trust management and trusted access to devices for trusted measurement.In order to more timely and accurately evaluate the trustworthiness of the edge terminal initially accessing the system, a trustworthiness measurement method based on the device vulnerability database was innovatively proposed.This method adopted the architecture of cloud-edge collaboration, established a device information database and a vulnerability database in the central cloud, and then calculated the terminal risk factor at the edge.Finally, the trust initialization of the access terminal was completed.The simulation results show that the method can well balance the efficiency and security of the system.…”
    Get full text
    Article
  14. 874

    A discovery strategy for APT anomaly based on homologous behavior analysis by Yihan YU, Yu FU, Xiaoping WU, Hongcheng LI

    Published 2016-01-01
    “…As APT(advanced persistent threat)attacks are increasingly frequently,higher requirements for the detection of APT attacks were proposed.It was an effective method to early discover the attack behavior of APT based on homologous behavior analysis.Aiming at the problem of low efficiency of data authentication caused by excessive data,the historical behavior database with data label technology was established and the database was stored in the cloud.Relying on the Hadoop platform and the aggregate computing ability of MapReduce and the pseudorandom permutation technique,the whole traffic parallel detection of the network was realized.In order to determine whether there was a APT attack behavior,the detection of APT attacks was implemented by comparing the data labels in the database.Test results show that the proposed method can detect the abnormal behavior of APT from the network as soon as possibleand improve the efficiency of the whole data flow detection.…”
    Get full text
    Article
  15. 875

    Improving the Component-Based Face Recognition Using Enhanced Viola–Jones and Weighted Voting Technique by Issam Dagher, Hussein Al-Bazzaz

    Published 2019-01-01
    “…Combining these weights was done by a simple voting technique. Three public databases were used: the AT&T database, the PUT database, and the AR database. …”
    Get full text
    Article
  16. 876

    Statistical Analysis of Loss of Offsite Power Events by Andrija Volkanovski, Antonio Ballesteros Avila, Miguel Peinador Veira

    Published 2016-01-01
    “…This paper presents the results of the statistical analysis of the loss of offsite power events (LOOP) registered in four reviewed databases. The reviewed databases include the IRSN (Institut de Radioprotection et de Sûreté Nucléaire) SAPIDE database and the GRS (Gesellschaft für Anlagen- und Reaktorsicherheit mbH) VERA database reviewed over the period from 1992 to 2011. …”
    Get full text
    Article
  17. 877

    SLC2A5 Correlated with Immune Infiltration: A Candidate Diagnostic and Prognostic Biomarker for Lung Adenocarcinoma by Lianxiang Luo, Jiating Su, Yushi Zheng, Fangfang Huang, Riming Huang, Hui Luo

    Published 2021-01-01
    “…This study is aimed at elucidating the function of SLC2A5 in the prognosis and pathogenesis of LUAD by analyzing public databases. The differential expression of SLC2A5 in various tissues from Oncomine, GEPIA, and other databases was obtained, and SLC2A5 expression at the protein level in normal and tumor tissues was detected with the use of the HPA database. …”
    Get full text
    Article
  18. 878

    Expression and Clinical Significance of DAP3 in Breast Cancer and Effect of Bruceine D on Expression of DAP3:Analysis Based on Data-mining from Bioinformatics by Wenlong WANG, Qingzhi KONG, Hongda LU, Qingdong XIANG, Dianlei LIU

    Published 2019-04-01
    “…The expression of DAP3 in breast cancer cell lines was analyzed by using CCLE database to further analyze the effect of Bruceine D on the expression level of DAP3 gene in breast cancer cells.Results:In Oncomine database, there were 417 data sets of different types of DAP3 gene expression, of which 22 studies were of statistical differences(22 up-regulated). …”
    Get full text
    Article
  19. 879

    Time-dependent robust reliability optimization of structure based on genetic interval affine response surface by GUAN Yi, SHENG GuoJun

    Published 2024-06-01
    “…The process of design of experiment was divided into two parts which were design variable database and structural performance response database. …”
    Get full text
    Article
  20. 880

    The High Security Mechanisms Algorithm of Similarity Metrics for Wireless and Mobile Networking by Xingwang Wang

    Published 2017-01-01
    “…Apriori, the most influential algorithm of association rules mining, needs to scan a database many times, and the efficiency is low when the database is huge. …”
    Get full text
    Article