Search alternatives:
unstructures » structures (Expand Search), structured (Expand Search)
Showing 161 - 180 results of 53,535 for search '(unstructures OR structure) data', query time: 0.30s Refine Results
  1. 161
  2. 162

    Structural Analysis of Huaguangtan Arch Dam Based on Data Assimilation Parametric Inversion by LIN Xianzhi, LUO Zenghong, XU Zheng, MIN Jiesheng, CAO Chuanbo, ZHAO Quan

    Published 2023-01-01
    “…Aiming at the difficulty of the accurate safety assessment of the overall structural state of Huaguangtan Arch Dam,a finite element model of the arch dam is established,and the data assimilation algorithm is used to invert the material parameters based on the results of the sensitivity analysis of the mechanical parameters of the arch dam concrete and bedrock.Finally,the material parameters of finite element calculation are calibrated by parameter inversion results.The results show that the residual between the finite element displacement simulation result and the monitoring data conforms to the Gaussian distribution,and its standard deviation after data assimilation parametric inversion is reduced by 81.2%,which improves the accuracy of finite element calculation.This method enables automated operation and provides a reasonable and reliable new idea for the structural safety assessment of arch dams.…”
    Get full text
    Article
  3. 163

    Aligning EMR Structure with Treatment Cycles: Enhancing Data Management and CDSS Functionality by Ali Azadi, Francisco José García-Peñalvo

    Published 2025-05-01
    “…Electronic medical records (EMRs) are fundamental to clinical decision support systems (CDSS). Conventional EMR structures still fail to capture the cyclical nature of treatment plans, leading to fragmented data representation and reduced decision accuracy. …”
    Get full text
    Article
  4. 164
  5. 165

    Augmentation method of fatigue data of welded structures based on physics-informed CTGAN by Xinyu Cao, Li Zou, Chen Lu

    Published 2025-04-01
    “…Variable amplitude loading is frequently applied to welded structures in practical engineering, and fatigue failure is a prevalent problem. …”
    Get full text
    Article
  6. 166
  7. 167

    Review of the technology used for structural characterization of the GMO genome using NGS data by Kahee Moon, Prakash Basnet, Taeyoung Um, Ik-Young Choi

    Published 2024-10-01
    “…Conversely, NGS facilitates rapid and comprehensive analysis by mapping whole-genome sequencing (WGS) data to plasmid sequences, accurately identifying T-DNA insertion sites and flanking regions. …”
    Get full text
    Article
  8. 168
  9. 169
  10. 170
  11. 171
  12. 172

    Tensor tree learns hidden relational structures in data to construct generative models by Kenji Harada, Tsuyoshi Okubo, Naoki Kawashima

    Published 2025-01-01
    “…The proposed method offers enhanced performance and uncovers hidden relational structures in the target data. We illustrate potential practical applications with four examples: (i) random patterns, (ii) QMNIST handwritten digits, (iii) Bayesian networks, and (iv) the pattern of stock price fluctuation pattern in S&P500. …”
    Get full text
    Article
  13. 173
  14. 174

    THE NEOTECTONIC STRUCTURE OF INTERMOUNTAIN BASINS OF MOUNTAINOUS ALTAI ACCORDING TO ELECTROMAGNETIC AND GEOLOGICAL DATA by N. N. Nevedrova, A. M. Sanchaa, E. V. Deev, S. M. Babushkin

    Published 2015-09-01
    “…The article presents new data on the geoelectrical structure of Chuya, Kuray and Uymon intermountain basins, which are the three largest ones in Mountainous Altai, Russia. …”
    Get full text
    Article
  15. 175
  16. 176

    Information hiding algorithm based on mapping and structure data of 3D model by Shuai REN, Zhen WANG, Dongxu SU, Tao ZHANG, Dejun MU

    Published 2019-05-01
    “…The existing 3D information hiding schemes are not robust enough against the joint attacks,as a result the secret information will be vulnerable and cannot be extracted correctly.In order to solve the above problem,an information hiding algorithm based on mapping and structure data of 3D models was proposed.First,several texture maps of the original 3D models in .stl format were picked from the standard model library,so the backup secret data after twice two-dimension discrete Daubechies transform can be embedded using dbl function just as the watermark.Secondly,the original 3D model in .stl format was operated by frame sampling in wavelet domain to obtain the coefficient in transform domain,thus the secret data was embedded into the corresponding transform coefficient.Finally,the .obj documents with the secret information were generated by multiplying the 2D texture map data and the 3D .stl data matrix based on orthogonal projection.Texture maps and coordinate space of 3D model were both used to embed the secret information repeatedly in order to enhance the robustness.The experiment analysis indicated that the imperceptibility,robustness and resistance against analysis are improved and information transmission safety in complex environment can be achieved based on the redundancy space of multi-type carriers.…”
    Get full text
    Article
  17. 177
  18. 178

    Combining Several Substitution Cipher Algorithms using Circular Queue Data Structure by Noor Ibraheem, Mokhtar Hasan

    Published 2020-12-01
    “…Lots of algorithms and techniques are available for data security.  This paper presents a cryptosystem that combines several Substitution Cipher Algorithms along with the Circular queue data structure. …”
    Get full text
    Article
  19. 179
  20. 180

    A CDE-based data structure for radiotherapeutic decision-making in breast cancer by Fabio Dennstädt, Maximilian Schmalfuss, Johannes Zink, Janna Hastings, Roberto Gaio, Max Schmerder, Nikola Cihoric, Paul Martin Putora

    Published 2025-07-01
    “…Abstract Background The growing complexity of oncology and radiation therapy demands structured and precise data management strategies. The National Institutes of Health (NIH) have introduced Common Data Elements (CDEs) as a uniform approach to facilitate consistent data collection. …”
    Get full text
    Article