-
1921
Driving forces of informal employment: An empirical study based on Polish enterprise data
Published 2023-09-01Get full text
Article -
1922
Development and validation of a diagnostic model for tuberculous meningitis based on laboratory data
Published 2025-05-01“…We retrospectively collected and analyzed demographic data (gender, age) and cerebrospinal fluid (CSF) parameters, including biochemical profiles and white blood cell counts with differential analysis. …”
Get full text
Article -
1923
-
1924
GLP-1 agonists in anaesthetic practice - a review of clinical data and recommendations
Published 2025-07-01“…Materials and research methods: The article is based on an analysis of research available on PubMed and Google Scholar. …”
Get full text
Article -
1925
Financial Fraud Detection on Social Networks Based on a Data Mining Approach
Published 2022-12-01“…Instagram was chosen to identify fraudulent operations in social networks. The analysis of comments on the social network Instagram to identify text patterns showed that offers and appeals from specific groups of people and promoted in comments with the help of spam are dangerous. …”
Get full text
Article -
1926
Applications of Bladder Cancer Data Using a Modified Log-Logistic Model
Published 2022-01-01Get full text
Article -
1927
Prediction of moisture content of hummus peach based on multi-burr hyperspectral data
Published 2023-12-01“…For hyperspectral image data with spikes and noise, compared the effects of several data preprocessing methods, including polynomial smoothing algorithm (SG), multivariate scatter correction algorithm (MSC), standard normal variate algorithm (SNV), first-order derivative operator (D1), and second-order derivative operator (D2) on model prediction accuracy. …”
Get full text
Article -
1928
A method of IoT terminal’s network behavior monitoring based on network data
Published 2017-12-01“…The internet of things (IoT) is the network of physical devices,vehicles,home appliances and other items embedded with electronics,software,sensors,actuators and network connectivity which enable these objects to connect and exchange data.Every sensor node is a source of information.In the offered method,telecom network operators could analyze the network data and discover the abnormal situation of the IoT terminals,so as to ensure the normal use of the IoT terminals.A network behavior tag for the IoT terminals by analyzing the network data in the telecom network,and a real-time monitoring method for the IoT terminal network behavior were described.And take the wearable industry application for example,the analysis process of the internet of things network behavior was described.…”
Get full text
Article -
1929
High Concurrent Streaming Data Processing Technology and Its Application in Industrial Internet
Published 2021-01-01“…Therefore, this paper proposes a high concurrency streaming data processing scheme for industrial internet. By constructing Netty server framework based on asynchronous network communication, it pushes the received data stream with the characteristics of multi-source heterogeneous and high concurrency to the message processing system Kafka, then Kafka consumers put the time-consuming operations such as protocol parsing, data persistence and real-time analysis on the server cluster for distributed computing. …”
Get full text
Article -
1930
Convolutional neural network model over encrypted data based on functional encryption
Published 2024-03-01“…Currently, homomorphic encryption, secure multi-party computation, and other encryption schemes are used to protect the privacy of sensitive data in outsourced convolutional neural network (CNN) models.However, the computational and communication overhead caused by the above schemes would reduce system efficiency.Based on the low cost of functional encryption, a new convolutional neural network model over encrypted data was constructed using functional encryption.Firstly, two algorithms based on functional encryption were designed, including inner product functional encryption and basic operation functional encryption algorithms to implement basic operations such as inner product, multiplication, and subtraction over encrypted data, reducing computational and communication costs.Secondly, a secure convolutional computation protocol and a secure loss optimization protocol were designed for each of these basic operations, which achieved ciphertext forward propagation in the convolutional layer and ciphertext backward propagation in the output layer.Finally, a secure training and classification method for the model was provided by the above secure protocols in a module-composable way, which could simultaneously protect the confidentiality of user data as well as data labels.Theoretical analysis and experimental results indicate that the proposed model can achieve CNN training and classification over encrypted data while ensuring accuracy and security.…”
Get full text
Article -
1931
Analysing humanities scholars’ data seeking behaviour patterns using Ellis' model
Published 2024-06-01“…We identified eleven characteristics of data seeking behaviours operating at different levels and revealed their variations across research approaches and seeking phases. …”
Get full text
Article -
1932
PREDICTION OF FLAT RING FATIGUE LIFE OF SCRAPER CHAIN BASED ON TEST DATA
Published 2019-01-01“…In order to prevent the failure of chain flat ring fatigue failure of scraper conveyor chain, the paper based on the field test data to predict the fatigue life of the chain. Taking the 38 × 137 mmC grade chain as the research object, firstly, the tension of the flat ring is monitored on-line during the operation of the scraper conveyor, and the two straight edges of the same flat ring are obviously unequal. …”
Get full text
Article -
1933
Construction and demolition waste material library based on vision systems dataZenodo
Published 2025-10-01“…The material library was developed as part of an in-depth study of CDW from building demolition and renovation operations in several EU countries. The data collection process included the preparation and analysis of representative samples, with the aim of ensuring maximum accuracy and reproducibility of the measurements. …”
Get full text
Article -
1934
An Adaptive Large Neighborhood Search Algorithm for the Satellite Data Transmission Scheduling Problem
Published 2020-01-01“…Satellite establishes a satellite ground station to satellite link with a ground station to complete data transmission. However, in China, satellite ground stations only exist within the country. …”
Get full text
Article -
1935
Evaluation of Data-Driven Sustainability Potential at SMEs Using an Altered Ecocanvas Model
Published 2025-02-01“…This paper aims to provide a data-driven situational analysis and tool, which outlines the benefits of data analytics from several aspects while offering practical recommendations for company leaders to consider and implement.…”
Get full text
Article -
1936
Optimization of dynamic data traceability mechanism in Internet of Things based on consortium blockchain
Published 2018-12-01“…The operations on these data have to be safe and traceable for use in various forensics and decisions. …”
Get full text
Article -
1937
Determination of Chimney Non-Verticality from TLS Data Using RANSAC Method
Published 2024-12-01Get full text
Article -
1938
A fast video coding algorithm using data mining for video surveillance
Published 2025-08-01“…The large volume of video data generated in these areas requires efficient processing techniques. …”
Get full text
Article -
1939
Accounting for population structure and data quality in demographic inference with linkage disequilibrium methods
Published 2025-07-01“…These tools operate on SNP data from a single sample of individuals, and provide insights into population structure, including the F ST index, migration rate, and subpopulation number. …”
Get full text
Article -
1940
45 years of directional wave recorded data at the Acqua Alta oceanographic tower
Published 2025-02-01“…Different wave gauges have been used since the start of the measurements, progressively upgraded and repositioned during maintenance operations. The recent addition of more precise instruments and the availability of the related raw dataset allowed for a re-evaluation of the previously published data, while extending the timeseries in time. …”
Get full text
Article