Search alternatives:
unstructures » structures (Expand Search), structured (Expand Search)
Showing 1,661 - 1,680 results of 53,535 for search '(unstructures OR structure) data', query time: 0.34s Refine Results
  1. 1661

    Analysis of Retinal Thickness in Patients With Chronic Diseases Using Standardized Optical Coherence Tomography Data: Database Study Based on the Radiology Common Data Model by ChulHyoung Park, So Hee Lee, Da Yun Lee, Seoyoon Choi, Seng Chan You, Ja Young Jeon, Sang Jun Park, Rae Woong Park

    Published 2025-02-01
    “…However, since it does not standardize unstructured data, such as medical imaging, using this data in multi-institutional collaborative research becomes challenging. …”
    Get full text
    Article
  2. 1662

    An integrated data pipeline for semantic data representation of the flame spray pyrolysis process [version 2; peer review: 1 approved, 2 approved with reservations] by Lutz Mädler, Norbert Riefler, Henk Birkholz, Jannis Grundmann, Keno Krieger, Manuel Vollbrecht

    Published 2025-05-01
    “…Ontologies have emerged as powerful tools for establishing interoperable and reusable data structures from inconsistent data structures. …”
    Get full text
    Article
  3. 1663

    Best practices for clinical trials data harmonization and sharing on NHLBI bioData catalyst (BDC) learned from CONNECTS network COVID-19 studies by Jeran K. Stratford, Huaqin Helen Pan, Alex Mainor, Edvin Music, Joshua Froess, Alex C. Cheng, Alexandra Weissman, David T. Huang, Elizabeth C. Oelsner, Sonia M. Thomas

    Published 2025-01-01
    “…Our findings highlight the importance of establishing standardized data formats, adopting common data elements and creating and maintaining robust data governance structures that address common challenges (i.e., data privacy and data-sharing limitations resulting from informed consent). …”
    Get full text
    Article
  4. 1664

    Developing Data Workflows: From Conceptual Blueprints to Physical Implementation by Bruno Oliveira, Óscar Oliveira

    Published 2025-06-01
    “…Data workflows are an important component of modern analytical systems, enabling structured data extraction, transformation, integration, and delivery across diverse applications. …”
    Get full text
    Article
  5. 1665

    Layers upon layers: data sharing & reuse challenges in archaeological contexts by Michael Olsson, Olle Sköld, Lisa Andersson

    Published 2024-06-01
    “…This short paper presents preliminary findings from a study of archaeologist’s information practices relating to data sharing and reuse. Method. Semi-structured remote interviews were carried out with 16 archaeologists relating to their research interests, their data creation, use and reuse practices, as well as the general views on the importance of data sharing and reuse in archaeology. …”
    Get full text
    Article
  6. 1666

    From access and transparency to refusal: Three responses to algorithmic governance by Alexandra James, Danielle Hynes, Andrew Whelan, Tanja Dreher, Justine Humphry

    Published 2023-05-01
    “…The third response, one of data justice, abolition and refusal, seeks to address the limitations to achieving social justice through prioritising digital access, inclusion and transparency. …”
    Get full text
    Article
  7. 1667

    “We need workable micronutrient data!”: a qualitative study assessing the need for integrated micronutrient data to support evidence-based decisions by Indian food system stakehold... by Rupinder Sahota, Jaswant S. Khokhar, Aakash Deep, Aakash Deep, Katherine P. Adams, Arindam Das, E. Louise Ander, E. Louise Ander, Edward J. M. Joy, Edward J. M. Joy

    Published 2025-01-01
    “…A qualitative, descriptive study was conducted, with purposive sampling of stakeholders from state and national-level government, development agencies, non-governmental organisations, research institutes, private organisations, and academia. Data were generated through focus group discussions and semi-structured key informant interviews. …”
    Get full text
    Article
  8. 1668

    Multi-stage hashing network storage structure for intelligent routing by Feng ZHU, Qun HUANG

    Published 2020-10-01
    “…Network data collection and storage are fundamental for intelligent routing control,providing massive flow data for model training and decision-making.However,as the key device in network storage system,switches have very limited memory size and design flexibility,which can’t satisfy the needs of intelligent routing control for comprehensive high-precision data and lightweight storage system,thus reducing the effectiveness of intelligent routing control.A multi-stage hashing network storage structure (MHNSS) was proposed for intelligent routing control,which fully utilized the limited memory resource of switch and completed network data storage with low collision rate.The number of candidate buckets of the flow key was augmented by multi-stage hash table,thus reducing collision rate and improving memory load ratio.Hash collision was resolved via coarse-grained timestamp LRU algorithm,which always stored most recently used data and cleared least recently used data to avoid subsequent collisions as far as possible.Trace-driven experiments showed that compared with widely used single hash table,MHNSS had significant performance advantage in collision rate and load ratio.…”
    Get full text
    Article
  9. 1669

    Generation of Structural Components for Indoor Spaces from Point Clouds by Junhyuk Lee, Yutaka Ohtake, Takashi Nakano, Daisuke Sato

    Published 2025-05-01
    “…Currently, particularly in data-driven modeling methods, data preprocessing for dividing structural components and nonstructural components is required before modeling. …”
    Get full text
    Article
  10. 1670

    Structural insights into Beclin 1 interactions with it's regulators for autophagy modulation by Debapriyo Sarmadhikari, Shailendra Asthana

    Published 2025-01-01
    “…This challenge is further compounded by the absence of structural data, which makes deciphering the intricate web of PPIs even more difficult. …”
    Get full text
    Article
  11. 1671

    Analysis of the structure of palliative pathology in children of the Voronezh region in 2021 by Yu. Yu. Razuvaeva, V. S. Ledneva, L. V. Ulyanova

    Published 2022-10-01
    “…In the Voronezh region, the largest number of patients with palliative pathology is located in the Novousmansky district, which can be attributed to the immediate proximity of the district to the city. According to the structure of the detected palliative pathologies, non-oncological diseases prevail in children of the Voronezh region, which is compared with statistical data for Russia. …”
    Get full text
    Article
  12. 1672

    Firm Value in Profitability, Leverage, Capital Structure, and Firm Growth by Sonnia Dea Larasati, Chintia Betharia

    Published 2024-05-01
    “…These data in this research are analyzed with panel data regression analysis which is processed using EViews 12 software. …”
    Get full text
    Article
  13. 1673

    Enhancing Security of Databases through Anomaly Detection in Structured Workloads by Charanjeet Dadiyala, Faijan Qureshi, Kritika Anil Bhattad, Sourabh Thakur, Nida Tabassum Sharif Sheikh, Kushagra Anil Kumar Singh

    Published 2025-02-01
    “…One of the most advanced ways of enhancing database security is using an anomaly detection system, especially for structured workloads. Structured workloads typically exhibit predictable patterns of data access and usage, making them susceptible to displaying anomalies that may indicate unauthorized access, data manipulation, or other security breaches. …”
    Get full text
    Article
  14. 1674

    SMART: Structured Missingness Analysis and Reconstruction Technique for credit scoring by Seongil Han, Haemin Jung, Paul D. Yoo

    Published 2025-04-01
    “…Abstract The Basel Accord emphasizes the necessity of employing internal data models to manage key credit risk components, including Probability of Default (PD), Loss Given Default (LGD), and Exposure At Default (EAD). …”
    Get full text
    Article
  15. 1675

    Enhancing Security of Databases through Anomaly Detection in Structured Workloads by Charanjeet Dadiyala, Faijan Qureshi, Kritika Anil Bhattad, Sourabh Thakur, Nida Tabassum Sharif Sheikh, Kushagra Anil Kumar Singh

    Published 2025-02-01
    “…One of the most advanced ways of enhancing database security is using an anomaly detection system, especially for structured workloads. Structured workloads typically exhibit predictable patterns of data access and usage, making them susceptible to displaying anomalies that may indicate unauthorized access, data manipulation, or other security breaches. …”
    Get full text
    Article
  16. 1676
  17. 1677
  18. 1678

    Non-parametric correlation structures and their respective embeddings in predictive analysis by Adam Dudáš

    Published 2025-05-01
    “…These models are implemented in Python language to ensure broad accessibility and integration into existing data analysis pipelines. Once implemented, the concept of embedding non-parametric correlation chains within non-parametric correlation graphs is explored to enhance the interpretability of correlation structures of a dataset. …”
    Get full text
    Article
  19. 1679
  20. 1680