Search alternatives:
compositional » composition (Expand Search)
Showing 181 - 200 results of 21,823 for search '(compositional OR computational) data analysis', query time: 0.37s Refine Results
  1. 181

    Credibility-Adjusted Data-Conscious Clustering Method for Robust EEG Signal Analysis by Fatemeh Divan, Teh Ying Wah, Kheng Seang Lim, Ali Seyed Shirkhorshidi

    Published 2025-01-01
    “…Clustering neurodata, including electroencephalography (EEG) signals, is crucial for brain-computer interface (BCI) and neurological analysis. …”
    Get full text
    Article
  2. 182

    AHP-based multi-criteria analysis of multi-cloud data management techniques by Anton Caceres, Larysa Globa

    Published 2025-02-01
    “…The aviation industry has several characteristics: large-scale modeling, testing, and managing vast data. Running complex simulations is time-consuming and requires significant high-performance computing (HPC) resources. …”
    Get full text
    Article
  3. 183

    System analysis and information processing to solve the problem of detecting breakdowns of computer information storage by N. M. Kodatsky, E. A. Revyakina, A. R. Gazizov

    Published 2025-01-01
    “…The results not only allow the implementation of a working data analysis tool in the field of computer equipment maintenance, but also contain a practical example of increasing the reliability and efficiency of information systems. …”
    Get full text
    Article
  4. 184
  5. 185

    Cloud computing convergence: integrating computer applications and information management for enhanced efficiency by Guo Zhang

    Published 2025-02-01
    “…Grounded in a robust methodological framework, the research employs experimental testing and comparative data analysis to assess the performance of an information management system within a cloud computing environment. …”
    Get full text
    Article
  6. 186
  7. 187
  8. 188

    Daily time-use compositions of physical behaviours and its association with evaluative and experienced wellbeing: a multilevel compositional analysis by Anantha Narayanan, Scott Duncan, Conal Smith, Flora Le, Lisa Mackay, Julia McPhee, Basile Chaix, Tom Stewart

    Published 2025-06-01
    “…We employed Bayesian multilevel compositional analysis to investigate how time-use behaviours, and reallocating time between behaviours, were associated with both life satisfaction and momentary affective states. …”
    Get full text
    Article
  9. 189

    Editorial:  Applied Computing 2023 by Yousra Abdul Alsahib S. Aldeen, Yusliza Yusoff, Samira Naji Kadhim

    Published 2024-04-01
    “…It can be classified the applied computing skills and knowledge into (Current programming languages and technology, Software engineering, IT security, Mobile technology, Networking, Operating system management, Graphic applications, Data integration, Distributed systems, Communication, Critical thinking, analysis, and problem-solving, Project management). …”
    Get full text
    Article
  10. 190
  11. 191
  12. 192

    Computational eco‐systems biology in Tara Oceans: translating data into knowledge by Shinichi Sunagawa, Eric Karsenti, Chris Bowler, Peer Bork

    Published 2015-05-01
    “…Graphical Abstract The computational analysis of the data collected by Tara Oceans represents a formidable challenge that will push the boundaries of our understanding of ecosystems at a planetary scale.…”
    Get full text
    Article
  13. 193

    Data-Driven Computational Methods in Fuel Combustion: A Review of Applications by Jacek Lukasz Wilk-Jakubowski, Lukasz Pawlik, Damian Frej, Grzegorz Wilk-Jakubowski

    Published 2025-06-01
    “…A systematic search in the Scopus database identified relevant articles, which were categorized based on fuel types and computational methodologies. The analysis covers key areas such as combustion modelling and simulation, engine applications, alternative fuels, pollutant control, and industrial combustion systems. …”
    Get full text
    Article
  14. 194

    COMPUTATIONAL AND ANALYTICAL MODELS FOR EQUATIONS OF PARABOLIC TYPE WITH APPROXIMATE DATA ON THE BASIS OF METHODS OF APPLIED HARMONIC ANALYSIS AND VARIATIONAL METHOD OF WEIGHTED RESIDUALS by Igor Eduardovich Naats, Victoria Igorevna Naats, Roman Andreyevich Ryskalenko

    Published 2022-09-01
    “…To solve this problem in the work builds regulating numerical methods and related computational and analytical models based on the methods of applied harmonic analysis and variational method of weighted residuals.…”
    Get full text
    Article
  15. 195

    Privacy-preserving multi-party data joint analysis scheme based on multiset operations in smart contracts by Xin Liu, Huize Gao, Dan Luo, Lanying Liang, Lu Peng, Yuchen Zhang, Shijie Jia, Gang Xu, Xiubo Chen, Baohua Zhang, Yu Gu

    Published 2025-07-01
    “…This paper applies secure multi-party computation (MPC) to smart contracts, based on the secure computation of intersection, union, and difference of multi-party multisets (IUDMM), to protect data privacy while supporting joint analysis. …”
    Get full text
    Article
  16. 196

    PCR and Bio-signature for data confidentiality and integrity in mobile cloud computing by Sreeja Cherillath Sukumaran, Mohammed Misbahuddin

    Published 2021-05-01
    “…Encryption techniques play a significant role in ensuring data security in the Cloud. Various data encryption techniques have been evolved till the date of which DNA Computing techniques got wider acceptance due to biological complexity and computational properties of DNA. …”
    Get full text
    Article
  17. 197
  18. 198
  19. 199
  20. 200

    Data comparable encryption scheme based on cloud computing in Internet of things by Qian MENG, Jianfeng MA, Kefei CHEN, Yinbin MIAO, Tengfei YANG

    Published 2018-04-01
    “…The previously proposed short comparable encryption (SCE) scheme can infer the plaintext relationship by comparing the ciphertexts relationship as well as ensuring data security in Internet of things.Unfortunately,it will incur high storage and computational burden during the process of comparing ciphertexts and generating tokens.To this end,an efficient short comparable encryption scheme called SCESW was proposed,which was utilizing the sliding window method with the same size window.Formal security analysis shows that the scheme can guarantee weak indistinguishability in standard model as well as data security and integrity.The experimental results demonstrate that the storage of the SCESW scheme is <inline-formula><math xmlns="http://www.w3.org/1998/Math/MathML"> <mfrac> <mn>1</mn> <mi>t</mi> </mfrac> <mo stretchy="false">(</mo><mi>t</mi><mi>></mi><mn>1</mn><mo stretchy="false">)</mo></math></inline-formula> times shorter than that of the SCE scheme and the efficiency of the SCESW scheme is superior to that of the SCE scheme.…”
    Get full text
    Article