Suggested Topics within your search.
Suggested Topics within your search.
- Visual communication 2
- computer 2
- Bildanalyse 1
- Bildwissenschaft 1
- COMPUTERS / Internet / General 1
- Children 1
- Cloud computing 1
- Computer scheduling 1
- Data processing 1
- Economic Policy 1
- Economic policy 1
- Economics, Mathematical 1
- Energy Policy, Economics and Management 1
- Energy and state 1
- Energy policy 1
- Engineering mathematics 1
- Environmental Economics 1
- Environmental economics 1
- Industrial Organization 1
- Industrial organization 1
- Language 1
- Language disorders in children 1
- Linguistics 1
- MATHEMATICS / General 1
- MATHEMATICS / Number Systems 1
- MEDICAL / Audiology & Speech Pathology 1
- Moral and ethical aspects 1
- Numerical analysis 1
- Parallel programs (Computer programs) 1
- Photography 1
-
961
High Density Subspace Clustering Algorithm for High Dimensional Data
Published 2020-08-01Get full text
Article -
962
Correlation between Smart Mask and Knitted Coil Sensors Breathing Data
Published 2024-01-01Get full text
Article -
963
Fake News Detection With Credibility Scoring on Turkish Twitter Data
Published 2025-01-01Get full text
Article -
964
The media framing dataset: Analyzing news narratives in Mexico and ColombiaZenodo
Published 2025-02-01“…Additionally, it provides a foundation for linguistic analysis and machine learning projects, enabling researchers and practitioners to explore media framing dynamics and develop innovative tools for media analysis.…”
Get full text
Article -
965
Stochastic algorithm for HDFS data theft detection based on MapReduce
Published 2018-10-01“…To address the problems of big data efficient analysis and insider theft detection in the data theft detection of distributed cloud computing storage,taking HDFS (hadoop distributed file system) as a case study,a stochastic algorithm for HDFS data theft detection based on MapReduce was proposed.By analyzing the MAC timestamp features of HDFS generated by folder replication,the replication behavior’s detection and measurement method was established to detect all data theft modes including insider theft.The data set which is suitable for MapReduce task partition and maintains the HDFS hierarchy was designed to achieve efficient analysis of large-volume timestamps.The experimental results show that the missed rate and the number of mislabeled folders could be kept at a low level by adopting segment detection strategy.The algorithm was proved to be efficient and had good scalability under the MapReduce framework.…”
Get full text
Article -
966
Comparative Analysis of Machine Learning Models for Predicting Contaminant Concentration Distributions in Hospital Wards
Published 2025-05-01“…In this study, contaminant concentration data from hospital wards were obtained through experimentally validated computational fluid dynamics (CFD) simulations. …”
Get full text
Article -
967
ID-SMSA: Indonesian stock market dataset for sentiment analysisMendeley Data
Published 2025-06-01Get full text
Article -
968
Energy entropy analysis of light chestnut soils
Published 2025-02-01“…Materials and methods. According to field data, the analysis of the complete granulometric composition of the soil was carried out with the determination of the weight contribution of each fraction. …”
Get full text
Article -
969
Towards a Conceptual Modeling of Trustworthiness in AI-Based Big Data Analysis
Published 2025-05-01Get full text
Article -
970
Data-driven analysis and visualization of dielectric properties curated from scientific literature
Published 2025-12-01Get full text
Article -
971
Automated Anomaly Detection and Causal Analysis for Civil Aviation Using QAR Data
Published 2025-02-01Get full text
Article -
972
Editorial: Protecting privacy in neuroimaging analysis: balancing data sharing and privacy preservation
Published 2025-01-01Get full text
Article -
973
Secure Data Transmission Using GS3 in an Armed Surveillance System
Published 2025-06-01“…Firstly, this work takes advantage of an efficient, scalable, and distributed system, named SmartFog, which identifies people with weapons by leveraging edge, fog, and cloud computing paradigms. Nevertheless, security vulnerabilities during data transmission are not addressed. …”
Get full text
Article -
974
A hybrid memory trace collection and analysis toolkit for big data applications
Published 2019-07-01“…The rise of in-memory computing framework represented by Spark,the gradual deepening of new non-volatile memory research and the increasingly severe data security situation made the existing memory behavior analysis tools unable to meet the demand for big data applications.A software-hardware hybrid memory trace collection and analysis toolkit for big data applications was proposed.Based on the basic memory trace collected by hardware,the memory behavior information with rich semantic information can be obtained quickly,accurately and undistorted by combining software information synchronization and offline annotation.It also provides an implementation method for real-time security monitoring of large data access.Finally,a group of real big data applications were analyzed by this toolkit.…”
Get full text
Article -
975
Enhancing Precision Beekeeping by the Macro-Level Environmental Analysis of Crowdsourced Spatial Data
Published 2025-01-01Get full text
Article -
976
A Comprehensive Approach to Bias Mitigation for Sentiment Analysis of Social Media Data
Published 2024-12-01Get full text
Article -
977
Spatial analysis of socioeconomic data and its relationship with illicit crops in Nariño-Colombia.
Published 2025-01-01Get full text
Article -
978
SAW: an efficient and accurate data analysis workflow for Stereo-seq spatial transcriptomics
Published 2024-02-01“…These problems affect the applicability and efficiency of the analysis. Here, a high-performance and accurate spatial transcriptomics data analysis workflow, called Stereo-seq Analysis Workflow (SAW), was developed for the Stereo-seq technology developed at BGI. …”
Get full text
Article -
979
Mixed Inverse Gaussian Analysis of Covariance for Censored Data: A Bayesian Approach
Published 2025-01-01Get full text
Article -
980
Career Motivations of the Scientist-Turned-Librarian: A Secondary Analysis of WILIS Data.
Published 2011-03-01“…Are there differences between LIS graduates with and without a science degree that might impact recruitment strategies? An analysis of data from a longitudinal career study, "Workforce Issues in Library and Information Science," sought to answer these questions. …”
Get full text
Article