Suggested Topics within your search.
Suggested Topics within your search.
- Biochemistry 2
- Molecular biology 2
- Anesthesia 1
- Critical Care 1
- Evaluation research (Social action programs) 1
- Evidence-based social work 1
- Grammar, Comparative and general 1
- Internet marketing 1
- LANGUAGE ARTS & DISCIPLINES / General 1
- LANGUAGE ARTS & DISCIPLINES / Linguistics / General 1
- LANGUAGE ARTS & DISCIPLINES / Linguistics / Syntax 1
- Mathematical Concepts 1
- Physical Phenomena 1
- Research 1
- Social service 1
- Syntax 1
Search alternatives:
unstructures » structure (Expand Search), structured (Expand Search), unstructure (Expand Search), unstructural (Expand Search)
structures » structure (Expand Search), structural (Expand Search)
unstructures » structure (Expand Search), structured (Expand Search), unstructure (Expand Search), unstructural (Expand Search)
structures » structure (Expand Search), structural (Expand Search)
-
2301
Identifying Abnormal Hosts in Data Streams Using Reversible Sketch
Published 2025-05-01“…Sketches are a type of probability data structure, which are widely used to compress high‐rate data streams and estimate their statistics. …”
Get full text
Article -
2302
Bayesian Spatial NBDA for Diffusion Data with Home-Base Coordinates.
Published 2015-01-01“…This method is especially valuable for studies for which detailed spatially structured data, but no other association data, is available. …”
Get full text
Article -
2303
Spatio-Temporal Data Augmentation Method for Network Traffic Prediction
Published 2025-01-01“…Moreover, network traffic data often exhibits localized and granular patterns, meaning that augmented data with significant spatial deviations from the original distribution can undermine structural consistency, leading to severe performance degradation in prediction models. …”
Get full text
Article -
2304
TOPSIS-RTCID for range target-based criteria and interval data
Published 2021-01-01“…This paper describes a new version of TOPSIS with interval data and capability to deal with all types of criteria. …”
Get full text
Article -
2305
Geomagnetic data real-time forecast based on neural networks
Published 2025-01-01“…Earth magnetosphere has a complex structure and its state is estimated by geomagnetic indexes. …”
Get full text
Article -
2306
Electronic Scientific Data & Literature Aggregation: A Review for Librarians.
Published 2009-12-01“… The advent of large-scale digital repositories, along with the need for sharing useful data world-wide, demands change to the current information structure. …”
Get full text
Article -
2307
Topological Data Analysis in Natural Language Processing -- A Tutorial
Published 2023-05-01“…Topological Data Analysis (TDA) introduces methods that capture the underlying structure of shapes in data. …”
Get full text
Article -
2308
Crustal thickness and lithospheric properties of Mercury constrained by gravity data
Published 2025-06-01“…The gravity field contains information about the internal structure of this innermost planet. Although the Mercury Surface, Space ENvironment, GEochemistry, and Ranging (MESSENGER) mission acquired the best-quality orbital tracking data for Mercury, the solved gravity field models still suffer from the uneven resolution between the northern and southern hemispheres, in which broad gravity anomalies in the northern mid-latitude region and small-scale anomaly features in the high-latitude region are revealed. …”
Get full text
Article -
2309
CP-ABE based data access control for cloud storage
Published 2011-01-01“…To solve the safety issues in cloud storage services for network characteristics and data sharing characteristics,and based on the CP-ABE(cipertext policy-attribute based encryption) algorithm,a cipher text access control mechanism was proposed.According to access control and related architecture,the corresponding secure data structure algorithms were given.After this,the simulations and the performance analysis were given to evaluate our algorithm.Under the premise of untrusted service provider,the proposed mechanism can ensure the data security of the cloud storage system in an open environment,and can reduce right management complexity through property management.…”
Get full text
Article -
2310
Using Weather Data for Improved Analysis of Vehicle Energy Efficiency
Published 2025-02-01“…This article will give an overview of how such data are structured and how they can be accessed in order to augment logs gained during vehicle operation or simulated trips. …”
Get full text
Article -
2311
PERSONAL DATA SECURITY FOR SMART SYSTEMS AND DEVISES WITH REMOTE ACCESS
Published 2019-10-01“…Issues related to the personal data security of users of smart devices with remote access are discussed in the paper. …”
Get full text
Article -
2312
Algorithmic governance and the need for consumer empowerment in data-driven markets
Published 2018-05-01“…The lack of transparency deriving from the complex and massive datafication of consumers – where consumers are profiled, data is brokered and the algorithmically automated decision-making is opaque – speaks to the need for improved supervision at a more structural level above and beyond the individual consumer’s choices, preferably by more active consumer protection authorities.…”
Get full text
Article -
2313
Big data of open source ecosystem for intelligent software development
Published 2021-01-01“…Aimming to the characteristics, the big data structure of open source ecosystem of software engineering was studied, and a self-growing collection and processing framework and a convergence and sharing environment was proposed. …”
Get full text
Article -
2314
The Formation of the Production Losses data for Quick Management Decision-Making
Published 2019-03-01“…Application of methods of observation, system analysis, classification and grouping provided the possibility of modernization of existing methods and methods of data generation in the segment of information space management of economic entities of manufacturing industries. …”
Get full text
Article -
2315
A Combination of SHA-256 and DES for Visual Data Protection
Published 2025-05-01“…This study employs SHA-256 and DES algorithms to safeguard visual data through encryption and decryption processes. …”
Get full text
Article -
2316
Unsupervised Detection of Suspicious Tissue Using Data Modeling and PCA
Published 2006-01-01“…The algorithm employs linear structure and curvelinear modeling prior to PCA implementations. …”
Get full text
Article -
2317
Impact of data spatial resolution on barley yield prediction mapping
Published 2025-12-01“…At 24 m, Stepwise Multiple Linear Regression performs better (R² = 0.81, RMSE = 0.26) due to data limitations. Beyond traditional accuracy metrics, spatial validation was performed using Moran index and Structural similarity index (SSIM) to assess spatial autocorrelation and pattern preservation. …”
Get full text
Article -
2318
Protocol to decipher complex spatial transcriptomics data using STMiner
Published 2025-06-01“…Summary: Complex spatial transcriptomics (ST) data analysis can be challenging due to uneven sampling, sparsity, and ambiguous tissue boundaries. …”
Get full text
Article -
2319
Analysis of the legal and organizational framework for ensuring the security of personal data
Published 2024-03-01“…In general, the authors of the article analyze legal, organizational and planning measures to ensure the security of personal data that can be implemented in an organization.…”
Get full text
Article -
2320
Search for Non-Gaussianities in the WMAP Data with the Scaling Index Method
Published 2011-01-01“…The SIM is able to detect structural characteristics of a given data set and has proven to be highly valuable in CMB analysis. …”
Get full text
Article