-
781
Efficiency Analysis of Sheep Farms in Cyprus
Published 2025-07-01“…Data Envelopment Analysis was used on data from 50 dairy sheep farms in Cyprus, which operate under extensive, semi-intensive, and intensive systems. …”
Get full text
Article -
782
Does Inclusion in the Sustainability Index Contribute to the Financial Performance of the Companies: Evidence from Developing Countries
Published 2022-12-01“…The study deals with companies operating in Brazil and Turkiye, in this respect, the panel data analysis technique is applied. …”
Get full text
Article -
783
-
784
An efficient secure predictive demand forecasting system using Ethereum virtual machine
Published 2024-12-01“…Finally, the authors tried to validate and optimize the gas cost by using distinguished statistics and analysis.…”
Get full text
Article -
785
Sentiment and Emotion Network Analysis—SENA: An Analytic Framework and No-Code Software to Integrate Natural Language Processing, Linguistic Analysis, and Data Science with Qualita...
Published 2025-05-01“…This software does not require any programming proficiency and executes all required back-end processes locally—thus avoiding the need to upload our data to any servers. In our proposed framework, outcome aggregation is avoided via network modeling that also enables testing for potential differences in emotions distributions across groups. …”
Get full text
Article -
786
Uncertainty Measures in Ordered Information System Based on Approximation Operators
Published 2014-01-01Get full text
Article -
787
A Software Tool for ICESat and ICESat-2 Laser Altimetry Data Processing, Analysis, and Visualization: Description, Features, and Usage
Published 2024-09-01“…This paper presents a web-based software tool designed to process, analyze, and visualize satellite laser altimetry data, specifically from the Ice, Cloud, and land Elevation Satellite (ICESat) mission, which collected data from 2003 to 2009, and ICESat-2, which was launched in 2018 and is currently operational. …”
Get full text
Article -
788
Visualization Monitoring and Safety Evaluation of Turnout Wheel–Rail Forces Based on BIM for Sustainable Railway Management
Published 2025-07-01Subjects: Get full text
Article -
789
Schedule-based analysis of airborne transmission risk in public transportation systems
Published 2025-01-01“…However, quantitative analysis of the effectiveness of transmission risk mitigation methods in public transportation is lacking. …”
Get full text
Article -
790
Analysis the Composition of Hydraulic Radial Force on Centrifugal Pump Impeller: A Data-Centric Approach Based on CFD Datasets
Published 2025-07-01“…A high-precision CFD simulation on a six-blade end-suction centrifugal pump generated a comprehensive hydraulic load dataset. Data analysis methods included exploratory data analysis (EDA) to uncover patterns and trigonometric function fitting to model force variations accurately. …”
Get full text
Article -
791
A Novel Hybrid Model for Loan Default Prediction in Maritime Finance Based on Topological Data Analysis and Machine Learning
Published 2025-01-01“…This study proposes a novel framework integrating topological data analysis (TDA) and machine learning (ML) to enhance default prediction in maritime finance. …”
Get full text
Article -
792
Intelligent Computerized Video Analysis for Automated Data Extraction in Wave Structure Interaction; A Wave Basin Case Study
Published 2025-03-01“…This study investigates the application of Computerized Video Analysis (CVA) for water surface tracking in maritime experimental tests, marking the first exploration of digitalized experimental video analysis at the Australian Maritime College (AMC). …”
Get full text
Article -
793
-
794
Analysis of risk factors for urinary tract infection and bleeding after retrograde flexible ureteroscopy for stone removal
Published 2025-04-01“…ObjectiveThis study aimed to explore the risk factors for urinary tract infection (UTI) and bleeding after retrograde flexible ureteroscopy for stone removal, in order to prevent these complications and improve surgical outcomes.MethodsA retrospective analysis was conducted on 214 patients who underwent retrograde flexible ureteroscopy for kidney stones and ureteral stones from January 2015 to August 2022, with 135 patients having complete data. …”
Get full text
Article -
795
Scheme and practice of IPTV user viewing behavior analysis based on MapR
Published 2017-02-01“…Interactive TV business open platform is the internet and IPTV transformation practice for operators.It's the interconnected hub between users,terminals,content,business and other.The platform now has millions of active users,generating nearly 1 TB of daily viewing activity and system log data.They can be used for business analysis,user portraits and system analysis.MapR was one of the large data processing frameworks suitable for this kind of analysis.The main features and core components of MapR were introduced combined with actual demand,and the architecture design and application effect of analysis system based on MapR was elaborated.…”
Get full text
Article -
796
Generalized Gaussian Distribution Improved Permutation Entropy: A New Measure for Complex Time Series Analysis
Published 2024-11-01“…Simulation results indicate that GGDIPE is less sensitive to parameter variations, exhibits strong noise resistance, accurately reveals the dynamic behavior of chaotic systems, and operates significantly faster than PE. Real-world data analysis shows that MGGDIPE provides markedly better separability for RR interval signals, EEG signals, bearing fault signals, and underwater acoustic signals compared to multiscale PE (MPE) and multiscale dispersion entropy (MDE). …”
Get full text
Article -
797
Discontinued operations and new FAS 4/2023: Updated approaches to accounting for long-term assets for sale and reporting information on discontinued operations
Published 2025-06-01“…The study referred to current legislation by analyzing the approaches proposed by national and foreign researchers, and analyzing the reporting data of public national companies. Generally accepted methods were used, including observation, description, comparison and analysis of data, as well as specialized methods, including interpretation and modeling. …”
Get full text
Article -
798
Research on Compliance Thresholds Based on Analysis of Driver Behavior Characteristics
Published 2024-12-01“…Traffic regulations provide a solid foundation for the safety of all road users; however, the ambiguous provisions and unclear safety thresholds within these regulations pose significant challenges to compliance, particularly concerning the safe operation of autonomous vehicles. To address this issue, this paper conducts an in-depth analysis of vehicle emergency braking behavior based on the Aerial Dataset for China Congested Highway and Expressway (AD4CHE). …”
Get full text
Article -
799
-
800
Content and Meaning of Financial Cyber Security: a Bibliometric Analysis
Published 2023-03-01“…The results of the conducted research are a plan of recommended actions for managers of financial institutions, banks, and enterprises regarding the effective organization of cyber security and includes such steps as: development of cyber security culture on an ongoing basis; appointment of a responsible person for the organization of cyber security; conducting cyber security audits on an ongoing basis; creating a data protection memo; provision of advanced training in the field of cyber data protection; ensuring effective interaction with a third party involved in financial relations, reflected in concluded contracts; formation of a response plan to cyber incidents; organization of secure access to automated information systems used in the institution's operations; organization of device security in case of remote use and performance of professional duties; organization of network connection security; improvement of physical security of official documents and devices; protection of backup copies and testing for the possibility of a full update based on these backup copies; synchronization with cloud technologies in compliance with the provisions of regulatory documents; protection of websites, publication and distribution of up-to-date information on new types and types of cyber threats.…”
Get full text
Article