Search alternatives:
unstructures » structures (Expand Search), structured (Expand Search)
Showing 1,541 - 1,560 results of 53,535 for search '(unstructures OR structure) data', query time: 0.27s Refine Results
  1. 1541

    MODEL IDENTIFICATION OF PROPERTIES OF ERRORS IN DATA PROCESSING TECHNOLOGY by George N. Isaev

    Published 2016-05-01
    “…The recognition problem is solved on the basis of the properties of the statistical classification structure errors, referred to as defects. Classification is performed by agglomerative cluster analysis on Euclidean metric. …”
    Get full text
    Article
  2. 1542

    Development of a Novel Wireless Data Transfer Device by XIAO Lizhi, TANG Guoping, NIE Huoyong

    Published 2015-01-01
    “…The key problems of TSC1 device on location, wireless transfer, data storage and structure design were summarized and settled correspondingly, and a novel design scheme based on the newest wireless communication technology was provided. …”
    Get full text
    Article
  3. 1543

    DATA STORAGES FOR V. LEONTIEV'S MODEL OF GLOBAL ECONOMY by Nikolay A. Gerasimov

    Published 2017-09-01
    “…The article designed and depicted a variant of the structure for multidimensional data storage (as a cube) to store and analyze results of the economic model presented by a group of experts headed by the Nobel Prize Winner Vasiliy Leontiev. …”
    Get full text
    Article
  4. 1544
  5. 1545

    Research on the national defense cyber security and data governance by Pengyun QI

    Published 2024-05-01
    “…Improving and perfecting China's national defense cyber and data security governance structure is not only an important part of domestic national network and data security governance, but also a key practice in subdivided data fields under the framework of the “Data Security Law”.Through comparative analysis and literature analysis, we can extract the logical characteristics from the 2013-2022 U.S.National Defense Authorization Act, the successful experience of which can be valuable for improving domestic defense cyber and data security frame.Guiding by the holistic approach to national security with the core elements of traditional and non-traditional security construction, we can improve special legislation on national defense network and data security, and a “double interaction” system of government-civilian early warning interaction awareness and government-enterprise cooperation interaction layout to improve the strategic pattern of China's defense network security and data governance.…”
    Get full text
    Article
  6. 1546

    Compressing Graph Data by Leveraging Domain Independent Knowledge by Dr. Sirisha Velampalli

    Published 2021-04-01
    “…Graph compression is used to understand high level structure of the graph through improved visualization. …”
    Get full text
    Article
  7. 1547

    Data-Driven Modeling of a Commercial Photovoltaic Microinverter by Hayder D. Abbood, Andrea Benigni

    Published 2018-01-01
    “…We present a data-driven modeling (DDM) approach for static modeling of commercial photovoltaic (PV) microinverters. …”
    Get full text
    Article
  8. 1548
  9. 1549

    Making it ‘Local’: Community data journalism for health justice by Shirley Roburn

    Published 2025-06-01
    “…The Local’s Code of Ethics and its Race, Representation and Equity Commitment shaped the magazine’s structure, which in turn influenced reporting. The Local applied a health-equity lens to its pandemic data journalism. …”
    Get full text
    Article
  10. 1550

    Parenclitic Network Analysis of Methylation Data for Cancer Identification. by Alexander Karsakov, Thomas Bartlett, Artem Ryblov, Iosif Meyerov, Mikhail Ivanchenko, Alexey Zaikin

    Published 2017-01-01
    “…We make use of ideas from the theory of complex networks to implement a machine learning classification of human DNA methylation data, that carry signatures of cancer development. …”
    Get full text
    Article
  11. 1551

    Audiogmenter: a MATLAB toolbox for audio data augmentation by Gianluca Maguolo, Michelangelo Paci, Loris Nanni, Ludovico Bonan

    Published 2025-01-01
    “…Design/methodology/approach – The authors structured our library into methods to augment raw audio data and spectrograms. …”
    Get full text
    Article
  12. 1552

    Big Data in marketing analytics: opportunities and problems of use by S.F., T.O.

    Published 2023-04-01
    “…The main problems of using Big Data for the development of marketing analytics have been described (objective limitation of the use of Big Data; the time gap between the occurrence and receipt of processed data for decision-making; storage and processing of streaming data; the need to acquire new competencies by employees of the marketing department; the need to improve the structure of the marketing department).…”
    Get full text
    Article
  13. 1553

    Tectonics of rock loosening: geological data and physics of the process by M. G. Leonov, G. G. Kocharyan, A. F. Revuzhenko, S. V. Lavrikov

    Published 2020-09-01
    “…Block-granular geological objects and rock volumetric mobility indicators are described. The mechanisms of structural and material reworking of rocks are considered in relation to the formation of a discrete tectonic structure of rocks and changes in the shapes of the geological bodies, which take place without rupturing the rock surfaces bounding these bodies and provide for the volumetric tectonic flow of solid rocks. …”
    Get full text
    Article
  14. 1554

    Survey of artificial intelligence data security and privacy protection by Kui REN, Quanrun MENG, Shoukun YAN, Zhan QIN

    Published 2021-02-01
    “…Artificial intelligence and deep learning algorithms are developing rapidly.These emerging techniques have been widely used in audio and video recognition, natural language processing and other fields.However, in recent years, researchers have found that there are many security risks in the current mainstream artificial intelligence model, and these problems will limit the development of AI.Therefore, the data security and privacy protection was studied in AI.For data and privacy leakage, the model output based and model update based problem of data leakage were studied.In the model output based problem of data leakage, the principles and research status of model extraction attack, model inversion attack and membership inference attack were discussed.In the model update based problem of data leakage, how attackers steal private data in the process of distributed training was discussed.For data and privacy protection, three kinds of defense methods, namely model structure defense, information confusion defense and query control defense were studied.In summarize, the theoretical foundations, classic algorithms of data inference attack techniques were introduced.A few research efforts on the defense techniques were described in order to provoke further research efforts in this critical area.…”
    Get full text
    Article
  15. 1555
  16. 1556

    Construction and Application of Media Corpus Based on Big Data by Bochun Yin, Lei Fu

    Published 2021-01-01
    “…Then, the state characteristics and probability distribution of feature data are determined by dynamic Bayesian network, the relationship between the state variables and dimensions of media corpus data is determined, and the media corpus data state is processed by component to complete the preprocessing of media corpus data; finally, through the application research of storage and encryption of the designed database through big data technology, the storage structure data and encryption secret key are designed to realize the construction and application of media corpus. …”
    Get full text
    Article
  17. 1557

    Methods for Constructing Artificial Neural Networks for Data Classification by L. V. Serebryanaya

    Published 2022-06-01
    “…Trained networks are used to classify data. Both networks showed acceptable classification accuracy of the results obtained in the course of the students’ knowledge testing.…”
    Get full text
    Article
  18. 1558

    Stair Scheduling for Data Collection in Wireless Sensor Networks by Jinbiao Chen, Yongcai Wang, Yuexuan Wang, Changjian Hu

    Published 2013-04-01
    “…Spatially organized clusters are basic structure for large-scale wireless sensor networks. …”
    Get full text
    Article
  19. 1559

    Data-driven model discovery with Kolmogorov-Arnold networks by Shirin Panahi, Mohammadamin Moradi, Erik M. Bollt, Ying-Cheng Lai

    Published 2025-04-01
    “…Data-driven model discovery of complex dynamical systems can be done using sparse optimization, but it has a fundamental limitation: sparsity in that the underlying governing equations of the system contain only a small number of elementary mathematical functions. …”
    Get full text
    Article
  20. 1560

    Drones and Drawings - methods of data acquisition, management, and representation by Francesca Picchio, Sandro Parrinello, Salvatore Barba

    Published 2022-12-01
    “…The common objective of these researches is to arrive at an effective configuration of integrated, verified, and discretized data, from which to structure valid multiscale and multilevel representation systems. …”
    Get full text
    Article