Showing 1,821 - 1,840 results of 14,865 for search 'Operational data analysis', query time: 0.25s Refine Results
  1. 1821

    Formal Description of Trusted Bebavior Oriented Security System for Big Data by Zhi Yan, Jing Zhan

    Published 2014-07-01
    “…The system with Z formal specification was described and the definition of abstract behaviors which contains reading, updating, adding and deleting operation was given. According to the abstract behavior model, behaviors were divided into trusted behavior and malicious behavior and security analysis on each operation was given. …”
    Get full text
    Article
  2. 1822

    Data-driven intelligent productivity prediction model for horizontal fracture stimulation by Qian Li, Yiyong Sui, Mengying Luo, Bin Guan, Lu Liu, Yuan Zhao

    Published 2025-08-01
    “…Second, relevant characteristic parameters were chosen from geological conditions, production characteristics, and fracturing techniques to perform clustering analysis on fracturing intervals in the data sample. …”
    Get full text
    Article
  3. 1823

    Reliability parameters calculation of restorable objects with regard to inaccuracies in the initial data by L. I. Kulbak, T. S. Martinovich

    Published 2018-12-01
    “…The analysis of simple and complex recoverable blocks of structural schemes of reliability taking into account the inaccuracies of initial data is carried out, and formulas for reliability calculation of blocks of structural schemes of reliability are given.As an example of using the method, the results of reliability evaluation of a typical restorable object consisting of simple and complex blocks with loaded and unloaded reserves are presented.…”
    Get full text
    Article
  4. 1824

    Cryptocontainer’s Active Protection as an Element of Countering the Passive Collection of Personal Data by V. A. Kourbatski

    Published 2019-05-01
    “…The article is devoted to the study of the problems of personal information security, taking into account the impact of Big data in the current crisis of information security. …”
    Get full text
    Article
  5. 1825

    Big data mining and application of long-distance oil and gas pipeline by Tao YU, Lijun LIU, Hongjun CHEN, Yao YU

    Published 2020-09-01
    “…In response to the need of the intelligent construction of the long-distance oil and gas pipeline in the future,combining with the supervisory control and data acquisition (SCADA) system and operating parameters of the oil and gas pipeline,comparing with the characteristics of traditional theoretical methods and big data mining methods,the direction of big data to promote intelligent pipeline and three steps of digital informatization,theorization,and intelligence of the pipeline intelligence research were proposed.The pipeline intelligent architecture was established,which included a physical layer,a data layer,a data mining layer,an application layer,and a user layer.The data mining layer was the core of the architecture.The statistical analysis,time series prediction and working condition identification and other application cases showed that the use of the big data mining could effectively solve the actual production business needs and guide the future pipeline intelligent research and construction.…”
    Get full text
    Article
  6. 1826

    Incremental Updating of 3D Indoor Data Considering Topological Linkages by Qun Sun, Xinwu Zhan

    Published 2025-07-01
    “…Maintaining the topological consistency of geometric objects presents a significant challenge in updating indoor data. Consequently, this paper introduces an incremental updating method for 3D indoor data that considers topological linkages. …”
    Get full text
    Article
  7. 1827

    Fractional and stochastic modeling of breast cancer progression with real data validation. by Khaled Aldwoah, Hanen Louati, Nedal Eljaneid, Tariq Aljaaidi, Faez Alqarni, AbdelAziz Elsayed

    Published 2025-01-01
    “…The model is divided into three distinct phases: (1) initial growth, characterized by a constant-order Caputo proportional operator (CPC), (2) intermediate growth, modeled by a variable-order CPC, and (3) advanced stages, capturing stochastic fluctuations in cancer cell populations using a stochastic operator. …”
    Get full text
    Article
  8. 1828

    An Energy-Efficient and Scalable Secure Data Aggregation for Wireless Sensor Networks by Taochun Wang, Xiaolin Qin, Liang Liu

    Published 2013-12-01
    “…The EESSDA scheme does not need encryption and decryption operations during the data aggregation, which saves energy and obtain high accuracy of aggregation results. …”
    Get full text
    Article
  9. 1829
  10. 1830

    Data-sharing as a quid pro quo of co-regulation in the EU by M. L. Entin, E. G. Entina, D. V. Galushko

    Published 2022-12-01
    “…Data-sharing is one of the most appropriate spheres to demonstrate specific traits of digital platforms — the cross-border character of their operation. …”
    Get full text
    Article
  11. 1831

    The Impact of IoT Usage on Big Data Analytics and Supply Chain Integration by Çiğdem Şemsettin, Yildiz Bülent, Meidute-Kavaliauskiene Ieva, Cincikaite Renata

    Published 2025-04-01
    “…Suppliers, manufacturers, distributors, and retailers can share real-time data to coordinate operations and respond quickly and efficiently to changes. …”
    Get full text
    Article
  12. 1832

    A collaborative auditing scheme with dynamic data updates based on blockchain by Jie Xiao, Hui Huang, Chenhuang Wu, Qunshan Chen, Zhenjie Huang

    Published 2023-12-01
    “…The EigenTrust model evaluates the reputation of each user's audit behaviour, effectively avoiding the probability of malicious users participating. For data update, we introduce the Pseudo Index Linked List(PIL) index management structure, which reduces the size of the index management structure to adapt to the blockchain's characteristics and makes the update operation have a constant time complexity. …”
    Get full text
    Article
  13. 1833

    Forecasting the Sugarcane Yields Based on Meteorological Data Through Ensemble Learning by Sumit Kumar, Millie Pant, Atulya Nagar

    Published 2024-01-01
    “…The developed model incorporates the least absolute shrink and selection operator (LASSO), artificial neural network (ANN), and random forest (RF) as base models alongside random forest regression (RFR) and Ridge regression (RR) as meta-models and utilizes principal component analysis (PCA) and SHAPLEY values to reduce dimensions and explore feature correlations within the dataset. …”
    Get full text
    Article
  14. 1834

    The Use of Earth Observation Data for Railway Infrastructure Monitoring—A Review by Milan Banic, Danijela Ristic-Durrant, Milos Madic, Alina Klapper, Milan Trifunovic, Milos Simonovic, Szabolcs Fischer

    Published 2025-03-01
    “…It provides the first in-depth analysis of EO techniques, primarily examining the use of synthetic aperture radar (SAR) and optical satellite data for key applications for infrastructure managers and railway operators, such as assessing track stability, detecting deformations, and monitoring surrounding environmental conditions. …”
    Get full text
    Article
  15. 1835

    Impacts of Missing Data Imputation on Resilience Evaluation for Water Distribution System by Amrit Babu Ghimire, Binod Ale Magar, Utsav Parajuli, Sangmin Shin

    Published 2024-10-01
    “…Incomplete datasets for the nodal pressure of the C-town WDS were developed with 10%, 30%, and 50% missing data percentages by manipulating a true dataset for normal operation conditions produced using EPANET. …”
    Get full text
    Article
  16. 1836

    Efficient Classification and Rapid Processing of Big Data in Power Distribution Networks by Luan Ning, Cheng Li, Wang Dingji, Wang Shuaimei

    Published 2024-01-01
    “…Grid data management technology has taken as a pivotal role in power system operation. …”
    Get full text
    Article
  17. 1837

    CAV-generated mobility data modeling mechanism for adaptive signal control by Wei Lin, Heng Wei, Lan Yang, Xiangmo Zhao

    Published 2025-04-01
    “…This paper presents a developed methodological framework along with associated data models which can be used to configure an intelligent CV/AV data fusion in support of adaptive signal control operations. …”
    Get full text
    Article
  18. 1838

    Data-driven prediction of cardiovascular and cerebrovascular diseases in a nationwide study by Sehyun Kim, Beomsang Ryu, Mingee Choi, Sangyon Lee, Jaeyong Shin, Sok Chul Hong

    Published 2025-07-01
    “…Models based on logistic regression analysis with penalty terms on the objective function were used, and their predictive performances were compared using multiple evaluation metrics, including the area under the receiver operating characteristic curve. …”
    Get full text
    Article
  19. 1839

    Filtering and Overlapping Data for Accuracy Enhancement of Doppler-Based Location Method by Rafał Szczepanik, Jan M. Kelner

    Published 2025-02-01
    “…The use of overlapping at the signal sample level with a factor of 10% allows for more than a twofold decrease in localization errors, while overlapping at the DFS vector provides an increase in the refresh rate of the position of localized objects. Comparative analysis with direct position determination techniques additionally showed high effectiveness of the SDF method, especially using data filtration and overlapping. …”
    Get full text
    Article
  20. 1840