Search alternatives:
implications » applications (Expand Search)
Showing 2,001 - 2,020 results of 64,817 for search 'data (implications OR application)', query time: 0.39s Refine Results
  1. 2001

    NHS national data opt-outs: trends and potential consequences for health data research by John Tazare, Alasdair D Henderson, Jessica Morley, Helen A Blake, Helen I McDonald, Elizabeth J Williamson, Helen Strongman

    Published 2024-10-01
    “…Using a hypothetical study, we explored statistical and epidemiological implications of opt-outs. Results: During the lead up to a key government-led deadline for registering opt-outs (from 31 May 2021–30 June 2021), 1 339 862 national data opt-outs were recorded; increasing the percentage of opt-outs in England from 2.77% to 4.97% of the population. …”
    Get full text
    Article
  2. 2002
  3. 2003

    Data Slots: trade-offs between privacy concerns and benefits of data-driven solutions by Martina Mazzarello, Fàbio Duarte, Simone Mora, Cate Heine, Carlo Ratti

    Published 2025-05-01
    “…We define a data-driven solution as an application, service, or device that leverages big data. …”
    Get full text
    Article
  4. 2004

    RESEARCH OF METHODS TO SUPPORT DATA MIGRATION BETWEEN RELATIONAL AND DOCUMENT DATA STORAGE MODELS by Mariia Peretiatko, Mariia Shirokopetleva, Natalya Lesna

    Published 2022-06-01
    “…The following results were obtained: the possibilities of relational algebra and set theory in the context of data models and queries are used, as well as in model redesign, the strategy of migration of data models is chosen, which provides relational and document-oriented data models, the algorithm of application of this method is described. …”
    Get full text
    Article
  5. 2005

    Data augmentation of time-series data in human movement biomechanics: A scoping review. by Christina Halmich, Lucas Höschler, Christoph Schranz, Christian Borgelt

    Published 2025-01-01
    “…<h4>Objective</h4>This scoping review on data augmentation for biomechanical time-series data focuses on examining current techniques, evaluating their effectiveness, and offering recommendations for their application.…”
    Get full text
    Article
  6. 2006

    Easy Data Augmentation untuk Data yang Imbalance pada Konsultasi Kesehatan Daring by Anisa Nur Azizah, Misbachul Falach Asy'ari, Ifnu Wisma Dwi Prastya, Diana Purwitasari

    Published 2023-10-01
    “…The EDA process with RI gave better coherences of 0.55, and it could support the EDA application to handle imbalanced data, eventually improving the classification performance. …”
    Get full text
    Article
  7. 2007
  8. 2008

    Implication of Fuel Subsidy Removal on Household Nutrition and Health Status in Kogi Central Senatorial District of Kogi State by Tioluwa Justina Atiti, Calister Lebechukwu Nwadi, Domitila Ogechi Emesiani, Rachael Adiya Wonah

    Published 2025-06-01
    “…The simple random sampling technique was used to select one hundred households. The instrument for data collection was a questionnaire titled Implication of Fuel Subsidy Removal on the Household Nutrition and Health Status (IFSRHNHS). …”
    Get full text
    Article
  9. 2009
  10. 2010
  11. 2011

    Demographic variables, clinical aspects, and medicolegal implications in a population of patients with adjustment disorder by Anastasia A, Colletti C, Cuoco V, Quartini A, Urso S, Rinaldi R, Bersani G

    Published 2016-04-01
    “…Half of the patients were subjected to a single first examination; 24.47% requested a copy of medical records.Conclusion: Confirming previous data from previous reports, our results suggest that AD may have a distinct profile in demographic and clinical terms. …”
    Get full text
    Article
  12. 2012

    EXAMINING SPEECH ACTS AND PRAGMATIC IMPLICATIONS IN BBC NEWS HEADLINES: MEDIA DISCOURSE ANALYSIS ON THE PALESTINE-ISRAEL CONFLICT by Prima Hidayoza, Ahmad Bukhori Muslim

    Published 2024-09-01
    “…The document analysis through the written texts of headlines was the main data. The research shows that there are four of five categories of speech acts found in this research, calculating “assertive” and “commisive” as both the largest and the least frequent models under the main framework of the Searle model. …”
    Get full text
    Article
  13. 2013

    Evolution and gaps in data mining research: Identifying the bibliometric landscape of data mining in management by Romel Al-Ali, Sabri Mekimah, Rahma Zighed, Rima Shishakly, Mohammed Almaiah, Rami Shehab, Tayseer Alkhdour, Theyazn H.H Aldhyani

    Published 2025-01-01
    “…Despite a large number of publications, interdisciplinary applications of data mining are limited. The scientific publication on data mining and its relationship with decision-making, artificial intelligence, forecasting, and sentiment analysis is found to be weak, showing significant research gaps in these areas. …”
    Get full text
    Article
  14. 2014

    FedDAR: Federated Learning With Data-Quantity Aware Regularization for Heterogeneous Distributed Data by Youngjun Kwak, Minyoung Jung

    Published 2025-01-01
    “…Federated learning (FL) has emerged as a promising approach for collaboratively training global models and classifiers without sharing private data. However, existing studies primarily focus on distinct methodologies for typical and personalized FL (tFL and pFL), representing a challenge in exploring cross-applicable training methods. …”
    Get full text
    Article
  15. 2015

    Expert Experiences in Anonymizing Personal Data and Its Use as Open Data: Qualitative Insights by Norbert Lichtenauer, Johann Guggumos, Matthias Kampmann, Juliane Kis, Florian Laumer, Elena März, Florian Wahl, Sebastian Wilhelm

    Published 2025-07-01
    “…<i><b>Discussion</b></i>: The findings highlight significant uncertainty among stakeholders regarding the anonymization of personal data. Although the importance and potential applications of open data for innovation and continuous improvement are widely acknowledged and supported, numerous challenges persist at both the macro and micro levels. …”
    Get full text
    Article
  16. 2016

    Enhancing Clinical Data Infrastructure for AI Research: Comparative Evaluation of Data Management Architectures by Richard Gebler, Ines Reinecke, Martin Sedlmayr, Miriam Goldammer

    Published 2025-08-01
    “…ConclusionsThe optimal data management architecture for clinical applications depends on an organization’s specific needs, available resources, and strategic goals. …”
    Get full text
    Article
  17. 2017

    Data of REEs (Ce, Nd, Th) analysis from Bangka tin tailing applying froth flotation method using sodium oleate and KClO3Mendeley DataMendeley DataMendeley Data by Wiwik Dahan, Djoko Hartanto, Ratna Ediati, Rita Sundari, Subandrio, Irfan Marwanza

    Published 2024-12-01
    “…This article presented the data of REEs (Rare Earth Elements) analysis from exploitation of Bangka tin tailing, Indonesia. …”
    Get full text
    Article
  18. 2018

    Research support services in digital humanities: approaches, technologies, tools by Harahulia Serhii, Symonenko Tetiana

    Published 2025-01-01
    Subjects: “…data analytics, library services, big data, research data visualization, research services, european association for digital humanities, artificial intelligence applications, historical and cultural heritage resources, digital culture, digital humanities projects.…”
    Get full text
    Article
  19. 2019

    Account hijacking threat attack detection for OAuth2.0 authorization API by Qixu LIU, Kaili QIU, Yiwen WANG, Yanhui CHEN, Langping CHEN, Chaoge LIU

    Published 2019-06-01
    “…OAuth2.0 protocol has been widely adopted to simplify user login to third-party applications,at the same time,existing risk of leaking user privacy data,what even worse,causing user accounts to be hijacked.An account hijacking attack model around authorization code was built by analyzing the vulnerabilities of the OAuth2.0 protocol.A vulnerable API identification method based on differential traffic analysis and an account hijacking verification method based on authorized authentication traffic monitoring was proposed.An account hijacking attack threat detection framework OScan for OAuth2.0 authorization API was designed and implemented.Through a large-scale detection of the 3 853 authorization APIs deployed on the Alexa top 10 000 websites,360 vulnerable APIs were discovered.The further verification showed that 80 websites were found to have threat of account hijacking attack.Compared with similar tools,OScan has significant advantages in covering the number of identity provider,the number of detected relying party,as well as the integrity of risk detection.…”
    Get full text
    Article
  20. 2020

    Advancements in Coded Computation: Integrating Encoding Matrices with Data Shuffling for Enhanced Data Transmission Efficiency by Yuan Shijie

    Published 2025-01-01
    “…This study delves into the fundamental principles, technological advantages, and applications of coded computation, emphasizing the integration of encoding matrices and data shuffling techniques. …”
    Get full text
    Article