Suggested Topics within your search.
Suggested Topics within your search.
- Sustainable development 2
- computer 2
- Agriculture 1
- Biotechnology 1
- Calculus 1
- Chemistry Techniques, Analytical 1
- Children 1
- Climate change mitigation 1
- Economic Policy 1
- Economic policy 1
- Education 1
- Energy Policy, Economics and Management 1
- Energy and state 1
- Energy policy 1
- Enterprise application integration (Computer systems) 1
- Environmental Economics 1
- Environmental economics 1
- Ethnoscience 1
- Hospitality industry 1
- Immune System 1
- Immunity 1
- Industrial Organization 1
- Industrial organization 1
- Information technology 1
- Language 1
- Language disorders in children 1
- Linguistics 1
- MEDICAL / Audiology & Speech Pathology 1
- MEDICAL / Biotechnology 1
- Management 1
-
2001
NHS national data opt-outs: trends and potential consequences for health data research
Published 2024-10-01“…Using a hypothetical study, we explored statistical and epidemiological implications of opt-outs. Results: During the lead up to a key government-led deadline for registering opt-outs (from 31 May 2021–30 June 2021), 1 339 862 national data opt-outs were recorded; increasing the percentage of opt-outs in England from 2.77% to 4.97% of the population. …”
Get full text
Article -
2002
Application of Protocol Buffer in Enterprise Cloud Contacts Abstract This paper introduces the method to use Protocol Buffer to update data in enterprise cloud contacts, and compares the time and size of XML(extensible markup language), JSON(JavaScript object notation)and Protocol Buffer, through the test data.
Published 2012-09-01Get full text
Article -
2003
Data Slots: trade-offs between privacy concerns and benefits of data-driven solutions
Published 2025-05-01“…We define a data-driven solution as an application, service, or device that leverages big data. …”
Get full text
Article -
2004
RESEARCH OF METHODS TO SUPPORT DATA MIGRATION BETWEEN RELATIONAL AND DOCUMENT DATA STORAGE MODELS
Published 2022-06-01“…The following results were obtained: the possibilities of relational algebra and set theory in the context of data models and queries are used, as well as in model redesign, the strategy of migration of data models is chosen, which provides relational and document-oriented data models, the algorithm of application of this method is described. …”
Get full text
Article -
2005
Data augmentation of time-series data in human movement biomechanics: A scoping review.
Published 2025-01-01“…<h4>Objective</h4>This scoping review on data augmentation for biomechanical time-series data focuses on examining current techniques, evaluating their effectiveness, and offering recommendations for their application.…”
Get full text
Article -
2006
Easy Data Augmentation untuk Data yang Imbalance pada Konsultasi Kesehatan Daring
Published 2023-10-01“…The EDA process with RI gave better coherences of 0.55, and it could support the EDA application to handle imbalanced data, eventually improving the classification performance. …”
Get full text
Article -
2007
Who decides what is read on Goodreads? Uncovering sponsorship and its implications for scholarly Research
Published 2025-09-01Get full text
Article -
2008
Implication of Fuel Subsidy Removal on Household Nutrition and Health Status in Kogi Central Senatorial District of Kogi State
Published 2025-06-01“…The simple random sampling technique was used to select one hundred households. The instrument for data collection was a questionnaire titled Implication of Fuel Subsidy Removal on the Household Nutrition and Health Status (IFSRHNHS). …”
Get full text
Article -
2009
-
2010
The emerging role of pathologists in the era of modern medicine.
Published 2023-03-01Get full text
Article -
2011
Demographic variables, clinical aspects, and medicolegal implications in a population of patients with adjustment disorder
Published 2016-04-01“…Half of the patients were subjected to a single first examination; 24.47% requested a copy of medical records.Conclusion: Confirming previous data from previous reports, our results suggest that AD may have a distinct profile in demographic and clinical terms. …”
Get full text
Article -
2012
EXAMINING SPEECH ACTS AND PRAGMATIC IMPLICATIONS IN BBC NEWS HEADLINES: MEDIA DISCOURSE ANALYSIS ON THE PALESTINE-ISRAEL CONFLICT
Published 2024-09-01“…The document analysis through the written texts of headlines was the main data. The research shows that there are four of five categories of speech acts found in this research, calculating “assertive” and “commisive” as both the largest and the least frequent models under the main framework of the Searle model. …”
Get full text
Article -
2013
Evolution and gaps in data mining research: Identifying the bibliometric landscape of data mining in management
Published 2025-01-01“…Despite a large number of publications, interdisciplinary applications of data mining are limited. The scientific publication on data mining and its relationship with decision-making, artificial intelligence, forecasting, and sentiment analysis is found to be weak, showing significant research gaps in these areas. …”
Get full text
Article -
2014
FedDAR: Federated Learning With Data-Quantity Aware Regularization for Heterogeneous Distributed Data
Published 2025-01-01“…Federated learning (FL) has emerged as a promising approach for collaboratively training global models and classifiers without sharing private data. However, existing studies primarily focus on distinct methodologies for typical and personalized FL (tFL and pFL), representing a challenge in exploring cross-applicable training methods. …”
Get full text
Article -
2015
Expert Experiences in Anonymizing Personal Data and Its Use as Open Data: Qualitative Insights
Published 2025-07-01“…<i><b>Discussion</b></i>: The findings highlight significant uncertainty among stakeholders regarding the anonymization of personal data. Although the importance and potential applications of open data for innovation and continuous improvement are widely acknowledged and supported, numerous challenges persist at both the macro and micro levels. …”
Get full text
Article -
2016
Enhancing Clinical Data Infrastructure for AI Research: Comparative Evaluation of Data Management Architectures
Published 2025-08-01“…ConclusionsThe optimal data management architecture for clinical applications depends on an organization’s specific needs, available resources, and strategic goals. …”
Get full text
Article -
2017
Data of REEs (Ce, Nd, Th) analysis from Bangka tin tailing applying froth flotation method using sodium oleate and KClO3Mendeley DataMendeley DataMendeley Data
Published 2024-12-01“…This article presented the data of REEs (Rare Earth Elements) analysis from exploitation of Bangka tin tailing, Indonesia. …”
Get full text
Article -
2018
Research support services in digital humanities: approaches, technologies, tools
Published 2025-01-01Subjects: “…data analytics, library services, big data, research data visualization, research services, european association for digital humanities, artificial intelligence applications, historical and cultural heritage resources, digital culture, digital humanities projects.…”
Get full text
Article -
2019
Account hijacking threat attack detection for OAuth2.0 authorization API
Published 2019-06-01“…OAuth2.0 protocol has been widely adopted to simplify user login to third-party applications,at the same time,existing risk of leaking user privacy data,what even worse,causing user accounts to be hijacked.An account hijacking attack model around authorization code was built by analyzing the vulnerabilities of the OAuth2.0 protocol.A vulnerable API identification method based on differential traffic analysis and an account hijacking verification method based on authorized authentication traffic monitoring was proposed.An account hijacking attack threat detection framework OScan for OAuth2.0 authorization API was designed and implemented.Through a large-scale detection of the 3 853 authorization APIs deployed on the Alexa top 10 000 websites,360 vulnerable APIs were discovered.The further verification showed that 80 websites were found to have threat of account hijacking attack.Compared with similar tools,OScan has significant advantages in covering the number of identity provider,the number of detected relying party,as well as the integrity of risk detection.…”
Get full text
Article -
2020
Advancements in Coded Computation: Integrating Encoding Matrices with Data Shuffling for Enhanced Data Transmission Efficiency
Published 2025-01-01“…This study delves into the fundamental principles, technological advantages, and applications of coded computation, emphasizing the integration of encoding matrices and data shuffling techniques. …”
Get full text
Article