Showing 1,921 - 1,940 results of 14,865 for search 'Operational data analysis', query time: 0.28s Refine Results
  1. 1921
  2. 1922

    Development and validation of a diagnostic model for tuberculous meningitis based on laboratory data by Fuyong Liu, Zheng Li, Xuejiao Li, Wei Hong, Yanlin Zhou, Yungang Han, Shuang Xia, Jiao Tan, Yunchang Yang, Shiqi Li, Zhi Li, Wenyi He, Huihui Chen, Pengxiang Li, Yali Wang, Xu Yang, Jingcai Gao, Wei Wang

    Published 2025-05-01
    “…We retrospectively collected and analyzed demographic data (gender, age) and cerebrospinal fluid (CSF) parameters, including biochemical profiles and white blood cell counts with differential analysis. …”
    Get full text
    Article
  3. 1923
  4. 1924

    GLP-1 agonists in anaesthetic practice - a review of clinical data and recommendations by Natalia Pokrywka, Marcelina Polak, Dawid Suwała, Paulina Hetnar, Milena Fortuna, Sebastian Kiper, Sławomir Toczek, Magdalena Tomala, Katarzyna Jastrowicz-Chęć, Klaudia Koryszko

    Published 2025-07-01
    “…Materials and research methods: The article is based on an analysis of research available on PubMed and Google Scholar. …”
    Get full text
    Article
  5. 1925

    Financial Fraud Detection on Social Networks Based on a Data Mining Approach by Victoria Bozhenko, Serhii Mynenko, Artem Shtefan

    Published 2022-12-01
    “…Instagram was chosen to identify fraudulent operations in social networks. The analysis of comments on the social network Instagram to identify text patterns showed that offers and appeals from specific groups of people and promoted in comments with the help of spam are dangerous. …”
    Get full text
    Article
  6. 1926
  7. 1927

    Prediction of moisture content of hummus peach based on multi-burr hyperspectral data by GAO Aidi, QIAO Fengzhang, ZHU Wenxuan, ZHONG Xiaopin, DENG Yuanlong

    Published 2023-12-01
    “…For hyperspectral image data with spikes and noise, compared the effects of several data preprocessing methods, including polynomial smoothing algorithm (SG), multivariate scatter correction algorithm (MSC), standard normal variate algorithm (SNV), first-order derivative operator (D1), and second-order derivative operator (D2) on model prediction accuracy. …”
    Get full text
    Article
  8. 1928

    A method of IoT terminal’s network behavior monitoring based on network data by Ying LING, Yun QIU

    Published 2017-12-01
    “…The internet of things (IoT) is the network of physical devices,vehicles,home appliances and other items embedded with electronics,software,sensors,actuators and network connectivity which enable these objects to connect and exchange data.Every sensor node is a source of information.In the offered method,telecom network operators could analyze the network data and discover the abnormal situation of the IoT terminals,so as to ensure the normal use of the IoT terminals.A network behavior tag for the IoT terminals by analyzing the network data in the telecom network,and a real-time monitoring method for the IoT terminal network behavior were described.And take the wearable industry application for example,the analysis process of the internet of things network behavior was described.…”
    Get full text
    Article
  9. 1929

    High Concurrent Streaming Data Processing Technology and Its Application in Industrial Internet by ZHU Kang, HE Chengzhao, LINAG Wenchao, WANG Chao, HU Weiming

    Published 2021-01-01
    “…Therefore, this paper proposes a high concurrency streaming data processing scheme for industrial internet. By constructing Netty server framework based on asynchronous network communication, it pushes the received data stream with the characteristics of multi-source heterogeneous and high concurrency to the message processing system Kafka, then Kafka consumers put the time-consuming operations such as protocol parsing, data persistence and real-time analysis on the server cluster for distributed computing. …”
    Get full text
    Article
  10. 1930

    Convolutional neural network model over encrypted data based on functional encryption by Chen WANG, Jiarun LI, Jian XU

    Published 2024-03-01
    “…Currently, homomorphic encryption, secure multi-party computation, and other encryption schemes are used to protect the privacy of sensitive data in outsourced convolutional neural network (CNN) models.However, the computational and communication overhead caused by the above schemes would reduce system efficiency.Based on the low cost of functional encryption, a new convolutional neural network model over encrypted data was constructed using functional encryption.Firstly, two algorithms based on functional encryption were designed, including inner product functional encryption and basic operation functional encryption algorithms to implement basic operations such as inner product, multiplication, and subtraction over encrypted data, reducing computational and communication costs.Secondly, a secure convolutional computation protocol and a secure loss optimization protocol were designed for each of these basic operations, which achieved ciphertext forward propagation in the convolutional layer and ciphertext backward propagation in the output layer.Finally, a secure training and classification method for the model was provided by the above secure protocols in a module-composable way, which could simultaneously protect the confidentiality of user data as well as data labels.Theoretical analysis and experimental results indicate that the proposed model can achieve CNN training and classification over encrypted data while ensuring accuracy and security.…”
    Get full text
    Article
  11. 1931

    Analysing humanities scholars’ data seeking behaviour patterns using Ellis' model by Wenqi Li, Pengyi Zhang, Jun Wang

    Published 2024-06-01
    “…We identified eleven characteristics of data seeking behaviours operating at different levels and revealed their variations across research approaches and seeking phases. …”
    Get full text
    Article
  12. 1932

    PREDICTION OF FLAT RING FATIGUE LIFE OF SCRAPER CHAIN BASED ON TEST DATA by MAO Jun, WANG HongTao, XIE Miao, ZHENG Wei

    Published 2019-01-01
    “…In order to prevent the failure of chain flat ring fatigue failure of scraper conveyor chain, the paper based on the field test data to predict the fatigue life of the chain. Taking the 38 × 137 mmC grade chain as the research object, firstly, the tension of the flat ring is monitored on-line during the operation of the scraper conveyor, and the two straight edges of the same flat ring are obviously unequal. …”
    Get full text
    Article
  13. 1933

    Construction and demolition waste material library based on vision systems dataZenodo by Maria Teresa Calcagni, Giovanni Salerno, Gloria Cosoli, Giuseppe Pandarese, Gian Marco Revel

    Published 2025-10-01
    “…The material library was developed as part of an in-depth study of CDW from building demolition and renovation operations in several EU countries. The data collection process included the preparation and analysis of representative samples, with the aim of ensuring maximum accuracy and reproducibility of the measurements. …”
    Get full text
    Article
  14. 1934

    An Adaptive Large Neighborhood Search Algorithm for the Satellite Data Transmission Scheduling Problem by Yingguo Chen, Ming Chen, Jun Wen, Yingwu Chen, Wen Xiang

    Published 2020-01-01
    “…Satellite establishes a satellite ground station to satellite link with a ground station to complete data transmission. However, in China, satellite ground stations only exist within the country. …”
    Get full text
    Article
  15. 1935

    Evaluation of Data-Driven Sustainability Potential at SMEs Using an Altered Ecocanvas Model by Levente Péter Bálint, László Várallyai, Szilvia Botos

    Published 2025-02-01
    “…This paper aims to provide a data-driven situational analysis and tool, which outlines the benefits of data analytics from several aspects while offering practical recommendations for company leaders to consider and implement.…”
    Get full text
    Article
  16. 1936

    Optimization of dynamic data traceability mechanism in Internet of Things based on consortium blockchain by Rui Qiao, Sifeng Zhu, Qingxian Wang, Jie Qin

    Published 2018-12-01
    “…The operations on these data have to be safe and traceable for use in various forensics and decisions. …”
    Get full text
    Article
  17. 1937
  18. 1938

    A fast video coding algorithm using data mining for video surveillance by Bingyue Xie

    Published 2025-08-01
    “…The large volume of video data generated in these areas requires efficient processing techniques. …”
    Get full text
    Article
  19. 1939

    Accounting for population structure and data quality in demographic inference with linkage disequilibrium methods by Enrique Santiago, Carlos Köpke, Armando Caballero

    Published 2025-07-01
    “…These tools operate on SNP data from a single sample of individuals, and provide insights into population structure, including the F ST index, migration rate, and subpopulation number. …”
    Get full text
    Article
  20. 1940

    45 years of directional wave recorded data at the Acqua Alta oceanographic tower by Luigi Cavaleri, Angela Pomaro, Luciana Bertotti, Andrea Bonometto, Luca De Nat, Alvise Papa, Valerio Volpe

    Published 2025-02-01
    “…Different wave gauges have been used since the start of the measurements, progressively upgraded and repositioned during maintenance operations. The recent addition of more precise instruments and the availability of the related raw dataset allowed for a re-evaluation of the previously published data, while extending the timeseries in time. …”
    Get full text
    Article