Showing 1,881 - 1,900 results of 21,823 for search '(composition OR computational) data analysis', query time: 0.34s Refine Results
  1. 1881
  2. 1882

    Advancing non-target analysis of emerging environmental contaminants with machine learning: Current status and future implications by Alexa Canchola, Lillian N. Tran, Wonsik Woo, Linhui Tian, Ying-Hsuan Lin, Wei-Chun Chou

    Published 2025-04-01
    “…However, interpreting the vast datasets generated by HRMS is complex and requires advanced data processing techniques. Recent advancements in machine learning (ML) models offer great potential for enhancing NTA applications. …”
    Get full text
    Article
  3. 1883
  4. 1884

    Adaptive high frequency data streaming for Soft Real-Time Industrial AI: A scalable microservices based architecture with dynamic downsampling by Telmo Fernández De Barrena, Alcides Fernandes, Juan Luis Ferrando, Ander García, Hugo Landaluce, Ignacio Angulo

    Published 2025-09-01
    “…The rapid adoption of Internet of Things (IoT) devices and Edge computing has increased the demand for efficient processing of high-frequency sensor data. …”
    Get full text
    Article
  5. 1885

    QPSO-Based Adaptive DNA Computing Algorithm by Mehmet Karakose, Ugur Cigdem

    Published 2013-01-01
    “…DNA (deoxyribonucleic acid) computing that is a new computation model based on DNA molecules for information storage has been increasingly used for optimization and data analysis in recent years. …”
    Get full text
    Article
  6. 1886
  7. 1887

    On-Chip Reconfigurable Hardware Accelerators for Popcount Computations by Valery Sklyarov, Iouliia Skliarova, João Silva

    Published 2016-01-01
    “…Popcount computations are widely used in such areas as combinatorial search, data processing, statistical analysis, and bio- and chemical informatics. …”
    Get full text
    Article
  8. 1888
  9. 1889

    Flowering Intensity Estimation Using Computer Vision by Sergejs Kodors, Imants Zarembo, Ilmars Apeinans, Edgars Rubauskis, Lienite Litavniece

    Published 2025-04-01
    “…The comparison was completed using data analysis and the MobileNetV2 classifier as an evaluation model. …”
    Get full text
    Article
  10. 1890
  11. 1891
  12. 1892
  13. 1893
  14. 1894

    Computationally secure steganography based on speech synthesis by Menghan LI, Kejiang CHEN, Weiming ZHANG, Nenghai YU

    Published 2022-06-01
    “…The steganography theory of computing security has been proposed for a long time, but it has not been widely adopted for mainstream steganography using multimedia data as a carrier.The reason is that the prerequisite for calculating secure steganography is to obtain the accurate distribution of the carrier or to accurately sample according to the carrier distribution.However, naturally collected images and audio/video cannot meet this prerequisite.With the development of deep learning technology, various machine-generated media such as image generation and synthesized speech, have become more and more common on the Internet and then generated media has become a reasonable steganography carrier.Steganography can use normal generated media to cover up secret communications, and pursue in distinguishability from normal generated media.The distribution learned by some generative models is known or controllable, which provides an opportunity to push computational security steganography for practical use.Taking the widely used synthetic speech model as an example, a computationally secure symmetric key steganography algorithm was designed and implemented.The message was decompressed into the synthetic audio according to the decoding process of arithmetic coding based on the conditional probability of sample points, and the message receiver had the same generation model to complete the message extraction by reproducing the audio synthesis process.The public key steganography algorithm was additionally designed based on this algorithm, which provided algorithmic support for the realization of full-flow steganographic communication.Steganographic key exchange ensured the security of steganographic content and the security of steganographic behavior was also achieved.The theoretical analysis showed that the security of the proposed algorithm is determined by the randomness of the embedded message.And the steganography analysis experiment further verified that the attacker cannot distinguish the synthesized carrier audio from the encrypted audio.…”
    Get full text
    Article
  15. 1895
  16. 1896
  17. 1897

    Long-Term Engagement of Diverse Study Cohorts in Decentralized Research: Longitudinal Analysis of “All of Us” Research Program Data by Vijay Yadav, Elias Chaibub Neto, Megan Doerr, Abhishek Pratap, Larsson Omberg

    Published 2025-03-01
    “…MethodsWe conducted a longitudinal analysis of the AoURP data, tracking changes in demographic composition, completion rates, and completion times for surveys and substudies. …”
    Get full text
    Article
  18. 1898

    Experimental and Computational Fluid Dynamics Simulation Study on the Performance of a Two-stroke Aviation Engine: A Comparative Analysis of Turbulence Models and Mesh Strategies by G. Coskun, Y. Delil, U. Demir

    Published 2025-06-01
    “…This study presents an experimental and computational fluid dynamics (CFD) analysis to evaluate the performance of a two-stroke aviation engine under constant operating conditions. …”
    Get full text
    Article
  19. 1899

    The Opportunities and Challenges in Integrating AI with Quantum Computing by Tomasz Słapczyński, Marlena Stradomska

    Published 2025-06-01
    “…This analysis reveals significant opportunities in areas like accelerated machine learning, tackling intractable problems, and processing quantum data. …”
    Get full text
    Article
  20. 1900

    Death by Data by Andrew Fitzgerald

    Published 2025-07-01
    “… Computational state violence has developed through the broader political economy of datafication, where increasing dimensions of life are “made productive” via the intensification of enclosure, data capture, and analysis for recursive operationalization. …”
    Get full text
    Article