Search alternatives:
implications » applications (Expand Search)
Showing 2,061 - 2,080 results of 64,817 for search 'data (implications OR application)', query time: 0.40s Refine Results
  1. 2061

    Fuzzy panel data analysis by Muhammet Oguzhan Yalcin, Nevin Güler Dincer, Serdar Demir

    Published 2021-06-01
    “…But PDA requires to satisfy some statistical assumptions such as “heteroscedasticity”, “autocorrelation”, “correlation between units”, and “stationarity” and it is too difficult to hold these assumptions in real-time applications. In this study, fuzzy panel data analysis (FPDA) is proposed in order to overcome these constraints of PDA. …”
    Get full text
    Article
  2. 2062

    Protection of personal data of the employee by S. M. Gusarov, K. Yu. Melnyk

    Published 2023-06-01
    “…The entry into employment is preceded by the work of the employer’s personnel service on personnel selection, within which personal information is received from job applicants. The personnel service is also responsible for the collection, processing, storage and use of data about employees. …”
    Get full text
    Article
  3. 2063

    Implications of high throughput sequencing of plant viruses in biosecurity – a decade of progress? by Fox, Adrian, Botermans, Marleen, Ziebell, Heiko, Fowkes, Aimee R., Fontdevila Pareta, Nuria, Massart, Sebastien, Rodoni, Brendan, Chooi , Kar Mun, Kreuze, Jan, Kumar, P. Lava, Cuellar, Wilmer J., Carvajal-Yepes, Monica, MacDiarmid , Robin M.

    Published 2025-07-01
    “…In the 15 years since High Throughput Sequencing (HTS) was first used for the detection and identification of plant viruses, the technology has matured and is now being used in frontline plant biosecurity applications. Anticipating the challenges this new approach was starting to reveal, recommendations were made a decade ago to streamline the application of these technologies. …”
    Get full text
    Article
  4. 2064
  5. 2065
  6. 2066

    On the Application of a Sparse Data Observers (SDOs) Outlier Detection Algorithm to Mitigate Poisoning Attacks in UltraWideBand (UWB) Line-of-Sight (LOS)/Non-Line-of-Sight (NLOS) Classification by Gianmarco Baldini

    Published 2025-02-01
    “…The proposed techniques are applied to two data sets: the public eWINE data set with seven different UWB LOS/NLOS different environments and a radar data set with the LOS/NLOS condition. …”
    Get full text
    Article
  7. 2067
  8. 2068

    Implications of Learning in Islamic Religious Education in Forming Students' Attitudes of Religious Tolerance by Ainin Najah, Imam Syafe'i, Amiruddin Amiruddin

    Published 2022-12-01
    “…The data is then analyzed by managing data from sources, explaining, and drawing conclusions. …”
    Get full text
    Article
  9. 2069
  10. 2070
  11. 2071

    Computational persuasion technologies, explainability, and ethical-legal implications: A systematic literature review by Davide Calvaresi, Rachele Carli, Simona Tiribelli, Berk Buzcu, Reyhan Aydogan, Andrea Di Vincenzo, Yazan Mualla, Michael Schumacher, Jean-Paul Calbimonte

    Published 2025-03-01
    “…The review follows a structured methodology, assessing 92 primary studies through sixteen research questions covering demographics, application scenarios, user requirements, objectives, functionalities, technologies, advantages, limitations, proposed solutions, ethical and legal implications, and the role of explainable AI (XAI). …”
    Get full text
    Article
  12. 2072
  13. 2073

    Understanding Religious Tolerance Through the Human Rights Lens: The Implication for Religious Education by Marhumah, Zulkipli Lessy, Sri Sumarni, Miftahur Rohman

    Published 2025-06-01
    “…Those who responded to the letters were recruited to be participants. Data was gathered through individual interviews, and a focus group discussion was conducted at the end to consolidate overall data. …”
    Get full text
    Article
  14. 2074

    Advancements in Mass Spectrometry-Based Targeted Metabolomics and Lipidomics: Implications for Clinical Research by Nguyen Ky Anh, Nguyen Quang Thu, Nguyen Tran Nam Tien, Nguyen Phuoc Long, Huy Truong Nguyen

    Published 2024-12-01
    “…Nevertheless, challenges persist in areas such as sample collection, quantification, quality control, and data interpretation. This review summarizes recent advances in targeted metabolomics and lipidomics, emphasizing their applications in clinical research. …”
    Get full text
    Article
  15. 2075
  16. 2076
  17. 2077

    Data Value-Added Service Comprehensive Evaluation Method on the Performance of Power System Big Data by Hao Zhang, Ye Liang, Hao Zhang, Jing Wang, Yuanzhuo Li, Xiaorui Rong, Hongda Gao

    Published 2025-02-01
    “…Firstly, based on the value-added service framework system of grid enterprises, this paper explores the basic technologies for power data applications and designs a technical roadmap for value-added services. …”
    Get full text
    Article
  18. 2078

    Data of the crystal structure of xylose isomerase from Streptomyces avermitilisProtein Data BankZENODO by Ki Hyun Nam

    Published 2025-04-01
    “…The discovery and characterization of novel XI variants are important to enhance the effective industrial applications of XI. Recently, the X-ray diffraction data for XI from Streptomyces avermitilis (SavXI) were collected at a synchrotron. …”
    Get full text
    Article
  19. 2079

    Research on the Bearing Load Measurement Method Based on the Fusion of Redundant Strain Data and Jacking Data by Chengwei Fang, Aihua Liu, Hanhua Zhu, Yibin Deng

    Published 2025-01-01
    “…Secondly, synchronize the measurement of strain data during the jacking phase and fuse the measurement data from the jacking phase based on the Bayesian estimation method to enhance the measurement accuracy of the jack-up method (JM). …”
    Get full text
    Article
  20. 2080

    Data trace as the scientific foundation for trusted metrological data: a review for future metrology direction by Zhanshuo Cao, Boyong Gao, Zilong Liu, Xingchuang Xiong, Bin Wang, Chenbo Pei

    Published 2025-08-01
    “…These traces are especially important when the trust and integrity of potential data evidence are under threat. To this end, this article systematically reviews relevant core techniques and analyzes various detection methods across the different stages of the data lifecycle, evaluating their applicability and limitations in identifying data tampering, unauthorized access, and anomalous operations. …”
    Get full text
    Article