Showing 3,221 - 3,240 results of 20,442 for search '(functional OR function) data analysis', query time: 0.44s Refine Results
  1. 3221

    Decreased PECAM-1 May be a potential pathological factor for vascular injury in T2DM patients by Jun-Jun Xu, Han-Zhen Cai, Han Sun, Xiang Chen, Xia-Ming Cai

    Published 2025-07-01
    “…Functional enrichment analysis of PPI, GO and KEGG suggested that PECAM-1 was involved in regulation of vascular stability, endothelial function, and angiogenesis. …”
    Get full text
    Article
  2. 3222

    CoRa: An Innovative Software for Raman Spectroscopy by K. Shportko, R. Ruekamp, H. Klym

    Published 2015-10-01
    “…Two examples of practical usage of CoRa for data analysis of amorphous Ge3Sb2Te6 and CdP2 singly crystal have been demonstrated.…”
    Get full text
    Article
  3. 3223
  4. 3224
  5. 3225

    Assemblage theory, data systems and data ecosystems: The data assemblages of the Irish planning system by Rob Kitchin, Juliette Davret, Carla M Kayanan, Samuel Mutter

    Published 2025-09-01
    “…We illustrate the utility of this reconceptualisation through an analysis of the development and control function of the Irish planning system, which is composed of a number of interlinked data systems used for managing the entire planning process from seeking planning permission, monitoring construction, to completed property.…”
    Get full text
    Article
  6. 3226

    The Hybrid Market Segmentation of Electric Vehicles in Ukraine Using Data Science Methods by Andrusyk Yevhenii V., Guryanova Lidiya S.

    Published 2025-06-01
    “…To solve the tasks set, a comprehensive approach was applied, incorporating Data Science methods: descriptive statistics, data collection through Data Scraping techniques, natural language processing (NLP) for thematic modeling and sentiment analysis of the reviews, as well as cluster analysis using the k-means algorithm. …”
    Get full text
    Article
  7. 3227

    Models for analyzing the complexity of English words in the text on the scale from A1 to C2 by М. Бєліков, Т. Ліхоузова, Ю. Олійник

    Published 2024-10-01
    “…SQLite database of English words and the number of their occurrences in English books from 1900 to 2019 has been developed. The functionality is implemented using SQL scripts. Python programming language was used to write ETL processes, data analysis, creation, training and comparison of word complexity prediction models, Sqlite3, Lemminflect, NumPy, Seaborn, Matplotlib, SciPy, Sklearn, SpaCy and XGBoost libraries were used. …”
    Get full text
    Article
  8. 3228

    Application of Data Mining Methods in the Design and Creation of New Products and Services by A. A. Bryzgalov, E. V. Yaroshenko

    Published 2020-12-01
    “…The choice of this software product is explained by a clear interface and the availability of the required functionality. The study was based on data provided by the mobile operator’s billing system. …”
    Get full text
    Article
  9. 3229

    Meta-analysis of clinical trials of osteoarthritis treatment effectiveness with Chondroguard by I. Yu. Torshin, A. M. Lila, A. V. Naumov, A. Yu. Kochish, L. I. Alekseeva, E. A. Taskina, I. V. Sarvilina, A. N. Galustyan, A. N. Gromov, A. K. Khadzhidis, L. V. Vasilieva, E. F. Yevstratova, M. I. Udovika, O. A. Gromova

    Published 2021-02-01
    “…For each study, information was collected on 23 features. Data analysis was carried out using the MEDSTUDY and "R" software packages.Results. …”
    Get full text
    Article
  10. 3230
  11. 3231
  12. 3232

    Construction and Application of Data Model in the Maritime Stereotactic Space Use by LI Shanchi, PENG Yihuan

    Published 2024-08-01
    “…Employing the Cesium 3D engine, the major function of the system is the spatial analysis and synthetic statistics of the stereo right to use marine. …”
    Get full text
    Article
  13. 3233
  14. 3234
  15. 3235

    Local structure of solid and liquid gold probed by reverse Monte Carlo analysis of X-ray absorption data by Nodoka Hara, Fabio Iesari, Toshihiro Okajima, Andrea Di Cicco

    Published 2025-03-01
    “…An accurate reconstruction of the pair and triplet distribution functions in solid and liquid Au was obtained and compared with literature data. …”
    Get full text
    Article
  16. 3236

    COMPARATIVE STUDY OF SURVIVAL SUPPORT VECTOR MACHINE AND RANDOM SURVIVAL FOREST IN SURVIVAL DATA by Ni Gusti Ayu Putu Puteri Suantari, Anwar Fitrianto, Bagus Sartono

    Published 2023-09-01
    “…Survival analysis is a statistical procedure in analyzing data with the response variable is time until an event occurs (time-to-event). …”
    Get full text
    Article
  17. 3237

    Anonymous whistleblowers reply scheme based on secret sharing by HE Kun, HUANG Yajing, DU Ruiying, SHI Min, LI Siqin, CHEN Jing

    Published 2024-12-01
    “…With the technology of distributed point functions and secret sharing, the message was stored in two separate mailbox databases of non-colluding servers, so that the identity of the data receiver was hidden from the attacker. …”
    Get full text
    Article
  18. 3238

    Information hiding algorithm based on mapping and structure data of 3D model by Shuai REN, Zhen WANG, Dongxu SU, Tao ZHANG, Dejun MU

    Published 2019-05-01
    “…The existing 3D information hiding schemes are not robust enough against the joint attacks,as a result the secret information will be vulnerable and cannot be extracted correctly.In order to solve the above problem,an information hiding algorithm based on mapping and structure data of 3D models was proposed.First,several texture maps of the original 3D models in .stl format were picked from the standard model library,so the backup secret data after twice two-dimension discrete Daubechies transform can be embedded using dbl function just as the watermark.Secondly,the original 3D model in .stl format was operated by frame sampling in wavelet domain to obtain the coefficient in transform domain,thus the secret data was embedded into the corresponding transform coefficient.Finally,the .obj documents with the secret information were generated by multiplying the 2D texture map data and the 3D .stl data matrix based on orthogonal projection.Texture maps and coordinate space of 3D model were both used to embed the secret information repeatedly in order to enhance the robustness.The experiment analysis indicated that the imperceptibility,robustness and resistance against analysis are improved and information transmission safety in complex environment can be achieved based on the redundancy space of multi-type carriers.…”
    Get full text
    Article
  19. 3239

    Information hiding algorithm based on mapping and structure data of 3D model by Shuai REN, Zhen WANG, Dongxu SU, Tao ZHANG, Dejun MU

    Published 2019-05-01
    “…The existing 3D information hiding schemes are not robust enough against the joint attacks,as a result the secret information will be vulnerable and cannot be extracted correctly.In order to solve the above problem,an information hiding algorithm based on mapping and structure data of 3D models was proposed.First,several texture maps of the original 3D models in .stl format were picked from the standard model library,so the backup secret data after twice two-dimension discrete Daubechies transform can be embedded using dbl function just as the watermark.Secondly,the original 3D model in .stl format was operated by frame sampling in wavelet domain to obtain the coefficient in transform domain,thus the secret data was embedded into the corresponding transform coefficient.Finally,the .obj documents with the secret information were generated by multiplying the 2D texture map data and the 3D .stl data matrix based on orthogonal projection.Texture maps and coordinate space of 3D model were both used to embed the secret information repeatedly in order to enhance the robustness.The experiment analysis indicated that the imperceptibility,robustness and resistance against analysis are improved and information transmission safety in complex environment can be achieved based on the redundancy space of multi-type carriers.…”
    Get full text
    Article
  20. 3240