Showing 2,421 - 2,440 results of 14,865 for search 'Operational data analysis', query time: 0.17s Refine Results
  1. 2421
  2. 2422

    Numerical and Experimental Investigation of Gas Turbine Rotor for Early Fault Detection by Muhammad Akhtar, Waqar Muhammad Ashraf, Nasir Hayat, Ghulam Moeen Uddin, Fahid Riaz

    Published 2025-05-01
    “…ABSTRACT Rotodynamic analysis is a key analysis for turbomachinery for investigating the health and integrity of equipment. …”
    Get full text
    Article
  3. 2423

    Prevalence, influencing factors, and prediction model construction of anemia in ankylosing spondylitis based on real-world data: An exploratory study. by Yifan Gong, Kun Yang, Zhaoyang Geng, Hongxiao Liu

    Published 2025-01-01
    “…The Hosmer-Lemeshow test showed χ2 = 7.005, P = 0.536 (P > 0.05).<h4>Conclusion</h4>Analysis of real-world AS diagnosis and treatment data showed that the prevalence of anemia in Chinese AS was 23.1%. …”
    Get full text
    Article
  4. 2424

    The Direct Assimilation of Radar Reflectivity Data with a Two-Moment Microphysics Scheme for a Landfalling Typhoon in an OSSE Framework by Ziyue Wang, Jingyao Luo, Hong Li, Yijie Zhu, Rui He

    Published 2024-11-01
    “…Despite the well-known importance of radar data assimilation, there are limited studies on landfalling typhoons in terms of directly assimilating radar reflectivity data, especially using a reflectivity operator based on double-moment microphysics. …”
    Get full text
    Article
  5. 2425

    The Interfaces Twitter Elections Dataset: Construction process and characteristics of big social data during the 2022 presidential elections in Brazil. by Sylvia Iasulaitis, Alan Demétrius Baria Valejo, Bruno Cardoso Greco, Vinicius Gonçalves Perillo, Guilherme Henrique Messias, Isabella Vicari, with the Interfaces—Center for Sociopolitical Studies of Algorithms and Artificial Intelligence

    Published 2025-01-01
    “…The process of collecting and creating the database for this study went through three major stages, subdivided into several processes: (1) A preliminary analysis of the platform and its operation; (2) Contextual analysis, creation of the conceptual model, and definition of Keywords and (3) Implementation of the Data Collection Strategy. …”
    Get full text
    Article
  6. 2426

    Data sharing and GRA weight optimization for power prediction of distributed photovoltaic power plant considering missing NWP information by YANG Xiyun, YANG Yan, MENG Lingzhuochao, PENG Yan, WANG Chenxu

    Published 2025-04-01
    “…In addition, because some photovoltaic power plants cannot obtain the relevant numerical weather prediction (NWP) information for power prediction, this poses new challenges to the safe and stable operation of the power grid. On this basis, this paper proposes a power prediction model for distributed photovoltaic power plant based on data sharing and grey relation analysis (GRA) weight optimization. …”
    Get full text
    Article
  7. 2427

    Medical data security and effective organization using integrated Blockchain principles in AI-based healthcare 6.0 infrastructures by Mohammad Gouse Galety, Kuan Tak Tan, Pravin R. Kshirsagar, Subba Rao Polamuri

    Published 2025-08-01
    “…Abstract The future industry development for healthcare services needs an integrated edge, fog, and cloud computing infrastructures. The medical data security and integrity schemes help to operate the data carefully in healthcare networks. …”
    Get full text
    Article
  8. 2428

    Pretrained patient trajectories for adverse drug event prediction using common data model-based electronic health records by Junmo Kim, Joo Seong Kim, Ji-Hyang Lee, Min-Gyu Kim, Taehyun Kim, Chaeeun Cho, Rae Woong Park, Kwangsoo Kim

    Published 2025-06-01
    “…Abstract Background Pretraining electronic health record (EHR) data using language models has enhanced performance across various medical tasks. …”
    Get full text
    Article
  9. 2429

    Sensitive information leakage awareness method for big data platform based on multi-attributes decision-making and taint tracking by Le-tian SHA, Fu XIAO, Wei CHEN, Jing SUN, Ru-chuan WANG

    Published 2017-07-01
    “…Based on multiple-attribute-decision-making and taint tracking,a sensitive-information leakage awareness method was proposed,some relative known vulnerabilities in big data platform was analyzed,target database was extracted and extended,multiple attribute model was built combined with operation semantic,a grey-correlation-analysis and technique for order preference by similarity to an ideal solution based sensitivity measurement was designed in combination of regular operation semantic for sensitive information.A prototype was built based on taint tracking,sensitive-information leakage vulnerabilities could be verified and discovered across big data platforms in this method.The experiment shows that verification for known bugs and discovery for unknown vulnerabilities can be accomplished based on leakage scenarios,which can be regarded as a support for protection in dynamic sensitive information data flow.…”
    Get full text
    Article
  10. 2430

    Using deep neural networks and LASSO regression to predict miRNA expression changes based on mRNA data by Franz Leonard Böge, Helena U. Zacharias, Stefanie C. Becker, Klaus Jung

    Published 2025-07-01
    “…Correlation between log fold changes could also be seen in a cross-study evaluation for the HIV datasets. Data augmentation consistently improved performance in neural networks, while its impact on LASSO models was not significant.DiscussionOverall, cross-omics prediction of expression profiles appears possible, even with some correlations on the Level of the differential expression analysis.…”
    Get full text
    Article
  11. 2431

    A Secure Cooperative Adaptive Cruise Control Design with Unknown Leader Dynamics Under False Data Injection Attacks by Parisa Ansari Bonab, Arman Sargolzaei

    Published 2025-02-01
    “…However, increased connectivity introduces new vulnerabilities, making CACC susceptible to cyber-attacks, including false data injection (FDI) attacks, which can compromise vehicle safety. …”
    Get full text
    Article
  12. 2432

    Assessing the prophylactic use of superficial inferior epigastric vessels (SIEV) for the super-drainage of deep inferior epigastric perforator flaps (DIEPs), correlated to patient... by Rhea M Iyer

    Published 2025-06-01
    “…For these patients a range of biographical data was obtained including: the presence of co – morbidities (BMI, BP, co – existing conditions such as diabetes mellitus) as well as flap characteristics (flap weight, time taken to raise the flap and the ischaemia time) from the free – flap audit forms and this was compared to anatomical data that was obtained from the pre – operative CT angiography reports detailing vascular characteristics: the Size/calibre of the SIEV (large = >3.0 ​mm, medium ​= ​2.0–3.0 ​mm and small = <2.0mm), the presence of venous anastomosis and midline crossover. …”
    Get full text
    Article
  13. 2433

    A decoupling method for wheel-rail contact forces of heavy-duty trains based on big data and neural networks by ZHANG Zhenhui, WEI Kai, PENG Shenyou, YIN Shengwen, WANG Zhonggang

    Published 2025-03-01
    “…To accurately identify and predict wheel-rail contact forces during the operation of heavy-duty trains, this paper proposes a novel method of decoupling and predicting these forces based on big data related to non-contact strain at the wheel periphery and a neural network. …”
    Get full text
    Article
  14. 2434

    Voltage vulnerability curves: Data-driven dynamic security assessment of voltage stability and system strength in modern power systems by Aleksandar Boričić, Marjan Popov

    Published 2025-07-01
    “…Considering the stability challenges of modern power systems, grid operators need to be aware of any vulnerable grid sections and dangerous operating scenarios to always ensure system security and stability. …”
    Get full text
    Article
  15. 2435
  16. 2436

    A Study on Using Transfer Learning to Utilize Information From Similar Systems for Data-Driven Condition Diagnosis and Prognosis by Marcel Braig, Peter Zeiler

    Published 2025-01-01
    “…The former includes condition data of rolling bearings of different dimensioning, recorded under different operating conditions, and the latter includes degradation data of filters with different filtration areas. …”
    Get full text
    Article
  17. 2437

    Effect of perfusion index on oxygen reserve index accuracy in estimating arterial oxygen tension in anesthetized dogs: Data reanalysis. by Francesca Zanusso, Luca Bellini

    Published 2025-01-01
    “…In each group, the relationship between ORi and PaO2 was assessed using linear regression analysis, and the area under the receiver operating characteristic curve (AUROC) investigated the diagnostic performance of ORi in detecting PaO2 >  150 mmHg. …”
    Get full text
    Article
  18. 2438

    Event-Triggered Secure Control Design Against False Data Injection Attacks via Lyapunov-Based Neural Networks by Neslihan Karas Kutlucan, Levent Ucun, Janset Dasdemir

    Published 2025-06-01
    “…This paper presents a secure control framework enhanced with an event-triggered mechanism to ensure resilient and resource-efficient operation under false data injection (FDI) attacks on sensor measurements. …”
    Get full text
    Article
  19. 2439

    Design of Dual Frequency Class E Resonant Converters for Simultaneous Wireless Power and Data Transfer in Low Power Applications by Narayanamoorthi R, Vigna K. Ramachandaramurthy, Dominic Savio A, Radomir Gono, Petr Bernat, Petr Kacor

    Published 2024-12-01
    “…Wireless power transfer (WPT) applications frequently use resonant converters that operate at high frequencies. For consumer electronics charging systems to effectively use WPT, both power and data transfer must occur over the same inductive link. …”
    Get full text
    Article
  20. 2440

    DaLAMED: A Clock-Frequency and Data-Lifetime-Aware Methodology for Energy-Efficient Memory Design in Edge Devices by Belal Jahannia, Abdolah Amirany, Elham Heidari, Hamed Dalir

    Published 2025-01-01
    “…Although hybrid architectures, which combine multiple memory technologies, are widely used, we show that unified emerging Non-Volatile Memory (eNVM) systems can achieve superior efficiency when driven at their optimal frequencies. This paper describes Data Lifetime Aware Memory Energy-efficient Design (DaLAMED), a technology-agnostic methodology to optimize memory system energy efficiency by considering application-specific data lifetime patterns along with operating frequencies. …”
    Get full text
    Article