Search alternatives:
unstructures » structures (Expand Search), structured (Expand Search)
Showing 1,221 - 1,240 results of 53,535 for search '(unstructures OR (structure OR structural)) data', query time: 0.47s Refine Results
  1. 1221

    Strengths and weaknesses of Global Positioning System (GPS) data-loggers and semi-structured interviews for capturing fine-scale human mobility: findings from Iquitos, Peru. by Valerie A Paz-Soldan, Robert C Reiner, Amy C Morrison, Steven T Stoddard, Uriel Kitron, Thomas W Scott, John P Elder, Eric S Halsey, Tadeusz J Kochel, Helvio Astete, Gonzalo M Vazquez-Prokopec

    Published 2014-06-01
    “…The main goal of this observational study was to compare and contrast the information obtained through GPS and semi-structured interviews (SSI) to assess issues affecting data quality and, ultimately, our ability to measure fine-scale human mobility. …”
    Get full text
    Article
  2. 1222

    Analysing the impact of large mammal herbivores on vegetation structure in Eastern African savannas combining high spatial resolution multispectral remote sensing data and field observations by Helena M. Back, Isabel Pérez-Postigo, Clemens Geitner, Almut Arneth

    Published 2025-07-01
    “…Field data as well as NDVI values derived from Sentinel-2 and NDVI contrast values of PlanetScope show that presence of herbivores lowers vegetation cover and modify the woody vegetation structure depending on which herbivores are present. …”
    Get full text
    Article
  3. 1223
  4. 1224
  5. 1225
  6. 1226

    Redefining comorbidity understanding in rheumatoid arthritis through novel approaches using real-world data by Diego Benavent, Chamaida Plasencia-Rodríguez

    Published 2024-02-01
    “…Meanwhile, natural language processing (NLP) and artificial intelligence (AI) image analysis can bridge the gap between structured and unstructured data, by extracting meaningful information from unstructured fields such as free text or imaging. …”
    Get full text
    Article
  7. 1227

    Practical concepts for the use of probabilistic methods in the structural analysis and reassessment of existing bridges - presentation of latest research and implementation by Thomas Braml, Christian Kainz

    Published 2022-08-01
    “…Structure-specific partial safety factors include measured data and can be used for the well-known and in the codes established semi-probabilistic design concept. …”
    Get full text
    Article
  8. 1228

    SuperBand: an Electronic-band and Fermi surface structure database of superconductors by Tengdong Zhang, Chenyu Suo, Yanling Wu, Xiaodan Xu, Yong Liu, Dao-Xin Yao, Jun Li

    Published 2025-05-01
    “…Abstract In comparison to simpler data such as chemical formulas and lattice structures, electronic band structure data provide a more fundamental and intuitive insight into superconducting phenomena. …”
    Get full text
    Article
  9. 1229
  10. 1230
  11. 1231

    Data-driven modeling and identification of a bistable soft-robot element based on dielectric elastomer by Abd Elkarim Masoud, Jürgen Maas

    Published 2025-07-01
    “…The bistable DE system consists of a buckled beam structure and symmetric DE membranes to achieve rapid switching between two stable states. …”
    Get full text
    Article
  12. 1232

    Therapeutic potential of a drug based on avocado and soy unsaponifiable compounds in the treatment of osteoarthritis: data from Russian and international studies (descriptive revie... by A. E. Karateev, A. M. Lila

    Published 2022-05-01
    “…According to the results of the presented studies, ASACs have proven efficacy in reducing the intensity of pain and dysfunction in knee OA. There are data confirming the structure-modifying effect of ASACs in OA of the hip joint (HJ). …”
    Get full text
    Article
  13. 1233
  14. 1234

    Digital elevation model and satellite gravity anomalies and its correlation with geologic structures at Borena basin, in the Southern Main Ethiopian Rift by Yahya Ali Abdulkadir, Shimeles Fisseha, Muralitharan Jothimani

    Published 2022-12-01
    “…This study integrates remote sensing data via Digital Elevation Model (DEM) and satellite gravity data to detect geologic structurs at Borena and the surrounding regions in the Southern Main Ethiopia Rift (SMER). …”
    Get full text
    Article
  15. 1235

    Multi-stage hashing network storage structure for intelligent routing by Feng ZHU, Qun HUANG

    Published 2020-10-01
    “…Network data collection and storage are fundamental for intelligent routing control,providing massive flow data for model training and decision-making.However,as the key device in network storage system,switches have very limited memory size and design flexibility,which can’t satisfy the needs of intelligent routing control for comprehensive high-precision data and lightweight storage system,thus reducing the effectiveness of intelligent routing control.A multi-stage hashing network storage structure (MHNSS) was proposed for intelligent routing control,which fully utilized the limited memory resource of switch and completed network data storage with low collision rate.The number of candidate buckets of the flow key was augmented by multi-stage hash table,thus reducing collision rate and improving memory load ratio.Hash collision was resolved via coarse-grained timestamp LRU algorithm,which always stored most recently used data and cleared least recently used data to avoid subsequent collisions as far as possible.Trace-driven experiments showed that compared with widely used single hash table,MHNSS had significant performance advantage in collision rate and load ratio.…”
    Get full text
    Article
  16. 1236

    Analysis of the structure of palliative pathology in children of the Voronezh region in 2021 by Yu. Yu. Razuvaeva, V. S. Ledneva, L. V. Ulyanova

    Published 2022-10-01
    “…In the Voronezh region, the largest number of patients with palliative pathology is located in the Novousmansky district, which can be attributed to the immediate proximity of the district to the city. According to the structure of the detected palliative pathologies, non-oncological diseases prevail in children of the Voronezh region, which is compared with statistical data for Russia. …”
    Get full text
    Article
  17. 1237

    Firm Value in Profitability, Leverage, Capital Structure, and Firm Growth by Sonnia Dea Larasati, Chintia Betharia

    Published 2024-05-01
    “…Abstract Purpose - This research was conducted to determine and explain how profitability, leverage, capital structure, and company growth can affect firm value. …”
    Get full text
    Article
  18. 1238

    Enhancing Security of Databases through Anomaly Detection in Structured Workloads by Charanjeet Dadiyala, Faijan Qureshi, Kritika Anil Bhattad, Sourabh Thakur, Nida Tabassum Sharif Sheikh, Kushagra Anil Kumar Singh

    Published 2025-02-01
    “…One of the most advanced ways of enhancing database security is using an anomaly detection system, especially for structured workloads. Structured workloads typically exhibit predictable patterns of data access and usage, making them susceptible to displaying anomalies that may indicate unauthorized access, data manipulation, or other security breaches. …”
    Get full text
    Article
  19. 1239

    SMART: Structured Missingness Analysis and Reconstruction Technique for credit scoring by Seongil Han, Haemin Jung, Paul D. Yoo

    Published 2025-04-01
    “…Abstract The Basel Accord emphasizes the necessity of employing internal data models to manage key credit risk components, including Probability of Default (PD), Loss Given Default (LGD), and Exposure At Default (EAD). …”
    Get full text
    Article
  20. 1240

    Enhancing Security of Databases through Anomaly Detection in Structured Workloads by Charanjeet Dadiyala, Faijan Qureshi, Kritika Anil Bhattad, Sourabh Thakur, Nida Tabassum Sharif Sheikh, Kushagra Anil Kumar Singh

    Published 2025-02-01
    “…One of the most advanced ways of enhancing database security is using an anomaly detection system, especially for structured workloads. Structured workloads typically exhibit predictable patterns of data access and usage, making them susceptible to displaying anomalies that may indicate unauthorized access, data manipulation, or other security breaches. …”
    Get full text
    Article