Search alternatives:
unstructural » unstructure (Expand Search)
structural » structure (Expand Search)
Showing 161 - 180 results of 53,535 for search '(unstructural OR structural) data', query time: 0.33s Refine Results
  1. 161
  2. 162
  3. 163

    Applying AI to Structured Real-World Data for Pharmacovigilance Purposes: Scoping Review by Stella Dimitsaki, Pantelis Natsiavas, Marie-Christine Jaulent

    Published 2024-12-01
    “…There are several instances of AI approaches applied to RWD; however, most studies focus on unstructured RWD (conducting natural language processing on various data sources, eg, clinical notes, social media, and blogs). …”
    Get full text
    Article
  4. 164
  5. 165

    Mathematical methods of data processing in the formation and evaluation of sectoral structure in agricultural enterprises by T. Kalashnikova, І. Кoshkalda, O. Тrehub

    Published 2019-08-01
    “…This paper is dedicated to the formation and evaluation of the sectoral structure with the use of mathematical methods of data processing. …”
    Get full text
    Article
  6. 166

    Minimal‐cost route planning via Fibonacci‐heap‐typed data structure by Wangjia Zhan, Haohao Qiu, Bo Min, Lin Lin

    Published 2024-11-01
    “…To achieve this, the reachability determination algorithm is designed to assess the courier company's reachability to all junctions based on the queue‐typed data structure and breadth‐first search idea. Subsequently, the minimal‐cost route planning algorithm is developed to find a feasible transport route with the minimal cost of clearing obstacles by resorting to the Edmonds' algorithm and some feasible data structures. …”
    Get full text
    Article
  7. 167

    Graph neural network approach with spatial structure to anomaly detection of network data by Hao Zhang, Yun Zhou, Huahu Xu, Jiangang Shi, Xinhua Lin, Yiqin Gao

    Published 2025-04-01
    “…Abstract Network anomaly detection using graph-structured data is a critical task in data mining and cybersecurity, involving the identification of unusual patterns within a network by analyzing its structure as a graph. …”
    Get full text
    Article
  8. 168

    Accounting for population structure and data quality in demographic inference with linkage disequilibrium methods by Enrique Santiago, Carlos Köpke, Armando Caballero

    Published 2025-07-01
    “…Abstract Linkage disequilibrium methods for demographic inference usually rely on panmictic population models. However, the structure of natural populations is generally complex and the quality of the genotyping data is often suboptimal. …”
    Get full text
    Article
  9. 169

    Evaluation of Seismic Performance of Reinforced Concrete Frame Structures in the Context of Big Data by Du Guangqian, Zheng Meng, Wang Shijie

    Published 2019-01-01
    “…In the era of big data, the efficient use of idle data in reinforced concrete structures has become a key issue in optimizing seismic performance evaluation methods for building structures. …”
    Get full text
    Article
  10. 170
  11. 171

    Aligning EMR Structure with Treatment Cycles: Enhancing Data Management and CDSS Functionality by Ali Azadi, Francisco José García-Peñalvo

    Published 2025-05-01
    “…Electronic medical records (EMRs) are fundamental to clinical decision support systems (CDSS). Conventional EMR structures still fail to capture the cyclical nature of treatment plans, leading to fragmented data representation and reduced decision accuracy. …”
    Get full text
    Article
  12. 172
  13. 173

    Augmentation method of fatigue data of welded structures based on physics-informed CTGAN by Xinyu Cao, Li Zou, Chen Lu

    Published 2025-04-01
    “…Variable amplitude loading is frequently applied to welded structures in practical engineering, and fatigue failure is a prevalent problem. …”
    Get full text
    Article
  14. 174
  15. 175
  16. 176
  17. 177
  18. 178

    Tensor tree learns hidden relational structures in data to construct generative models by Kenji Harada, Tsuyoshi Okubo, Naoki Kawashima

    Published 2025-01-01
    “…The proposed method offers enhanced performance and uncovers hidden relational structures in the target data. We illustrate potential practical applications with four examples: (i) random patterns, (ii) QMNIST handwritten digits, (iii) Bayesian networks, and (iv) the pattern of stock price fluctuation pattern in S&P500. …”
    Get full text
    Article
  19. 179

    THE NEOTECTONIC STRUCTURE OF INTERMOUNTAIN BASINS OF MOUNTAINOUS ALTAI ACCORDING TO ELECTROMAGNETIC AND GEOLOGICAL DATA by N. N. Nevedrova, A. M. Sanchaa, E. V. Deev, S. M. Babushkin

    Published 2015-09-01
    “…The article presents new data on the geoelectrical structure of Chuya, Kuray and Uymon intermountain basins, which are the three largest ones in Mountainous Altai, Russia. …”
    Get full text
    Article
  20. 180

    Information hiding algorithm based on mapping and structure data of 3D model by Shuai REN, Zhen WANG, Dongxu SU, Tao ZHANG, Dejun MU

    Published 2019-05-01
    “…The existing 3D information hiding schemes are not robust enough against the joint attacks,as a result the secret information will be vulnerable and cannot be extracted correctly.In order to solve the above problem,an information hiding algorithm based on mapping and structure data of 3D models was proposed.First,several texture maps of the original 3D models in .stl format were picked from the standard model library,so the backup secret data after twice two-dimension discrete Daubechies transform can be embedded using dbl function just as the watermark.Secondly,the original 3D model in .stl format was operated by frame sampling in wavelet domain to obtain the coefficient in transform domain,thus the secret data was embedded into the corresponding transform coefficient.Finally,the .obj documents with the secret information were generated by multiplying the 2D texture map data and the 3D .stl data matrix based on orthogonal projection.Texture maps and coordinate space of 3D model were both used to embed the secret information repeatedly in order to enhance the robustness.The experiment analysis indicated that the imperceptibility,robustness and resistance against analysis are improved and information transmission safety in complex environment can be achieved based on the redundancy space of multi-type carriers.…”
    Get full text
    Article