Search alternatives:
implications » applications (Expand Search)
Showing 12,641 - 12,660 results of 64,817 for search 'data (implications OR application)', query time: 0.40s Refine Results
  1. 12641

    Geospatial information technology: analysis of architectural characteristics from vertical and horizontal perspectives and intelligent-driven application modes by Cheng Su, Ershun Zhong, Shaohua Wang, Hao Lu

    Published 2025-08-01
    “…With the advent of spatiotemporal big data, cloud computing, and artificial intelligence, its application modes have evolved significantly, presenting new development opportunities. …”
    Get full text
    Article
  2. 12642

    Economic and Environmental Effects of Farmers’ Green Production Behaviors: Evidence from Major Rice-Producing Areas in Jiangxi Province, China by Mengling Zhang, Li Zhou, Yuhan Zhang, Wangyue Zhou

    Published 2024-10-01
    “…This paper utilizes survey data from 1345 farm households in the main rice production areas of Jiangxi Province, China, using the example of reduced fertilizer application (RFA) among rice farmers. …”
    Get full text
    Article
  3. 12643
  4. 12644

    Monte Carlo simulation and performance assessment of GE Discovery 690 VCT positron emission tomography/computed tomography scanner by Elham Kashian, Hadi Ahangari, Vahab Dehlaghi, Karim Khoshgard, Pardis Ghafarian, Raheb Ghorbani

    Published 2020-10-01
    “…Validation was based on a comparison between simulation data and experimental results obtained with this scanner in the same situation. …”
    Get full text
    Article
  5. 12645
  6. 12646

    Fostering non-intrusive load monitoring for smart energy management in industrial applications: an active machine learning approach by Lukas Fabri, Daniel Leuthe, Lars-Manuel Schneider, Simon Wenninger

    Published 2025-04-01
    “…However, besides the lack of feasible industrial time series data, the key challenge of NILM in industrial applications is the scarcity of labeled data, leading to costly and time-consuming workflows. …”
    Get full text
    Article
  7. 12647

    Cyber threats in mobile healthcare applications: systematic review of enabling technologies, threat models, detection approaches, and future directions by Anayo Chukwu Ikegwu, Uzoma Rita Alo, Henry Friday Nweke

    Published 2025-07-01
    “…It presents cyber threats in mHealth applications where the common cyber threats were identified and security challenges such as data compromise, malicious attacks, insecure systems, and user vulnerabilities. …”
    Get full text
    Article
  8. 12648
  9. 12649
  10. 12650

    Simulating method for TCP aggregated traffic of large scale network by CHEN Yu-feng1, DONG Ya-bo1, LU Dong-ming1, PAN Yun-he1

    Published 2006-01-01
    “…To obtain a trade-off between veracity and complexity when simulating TCP traffic of large-scale network,the TCP aggregated traffic of access network in the gateway was proposed as simulated object,instead of the traffic generated at the individual host or session level.Based on the self-similarity of application-level and network-level,the TCP aggregated traffic model was proposed due to the self-similarity of network traffic.The self-similar traffic at application level was generated by aggregating many ON/OFF sources following Pareto distribution.The aggregated transmission control was put on the traffic at network transmission level based on the mechanism of TCP protocol.Compared with the real data collected from a Network Exchange Center,the simulating result shows the validity of the model from the criteria of traffic load proportion,traffic self-similarity,and the packet loss ratio.…”
    Get full text
    Article
  11. 12651
  12. 12652

    Simulating method for TCP aggregated traffic of large scale network by CHEN Yu-feng1, DONG Ya-bo1, LU Dong-ming1, PAN Yun-he1

    Published 2006-01-01
    “…To obtain a trade-off between veracity and complexity when simulating TCP traffic of large-scale network,the TCP aggregated traffic of access network in the gateway was proposed as simulated object,instead of the traffic generated at the individual host or session level.Based on the self-similarity of application-level and network-level,the TCP aggregated traffic model was proposed due to the self-similarity of network traffic.The self-similar traffic at application level was generated by aggregating many ON/OFF sources following Pareto distribution.The aggregated transmission control was put on the traffic at network transmission level based on the mechanism of TCP protocol.Compared with the real data collected from a Network Exchange Center,the simulating result shows the validity of the model from the criteria of traffic load proportion,traffic self-similarity,and the packet loss ratio.…”
    Get full text
    Article
  13. 12653

    Self‐Potential Tomography Preconditioned by Particle Swarm Optimization—Application to Monitoring Hyporheic Exchange in a Bedrock River by Scott J. Ikard, Kenneth C. Carroll, Scott C. Brooks, Dale F. Rucker, Gladisol Smith‐Vega, Aubrey Elwes

    Published 2024-10-01
    “…The developed algorithm was then validated by an application to SP‐monitoring field data measured on the floodplain of East Fork Poplar Creek, Oak Ridge, Tennessee, to image electrical sources in areas conducive to preferential flow into the flood plain from the bedrock‐lined riverbed. …”
    Get full text
    Article
  14. 12654
  15. 12655
  16. 12656
  17. 12657

    Development and Application of an Integrated Monitoring and Early Warning Platform for Land Transportation Infrastructure under Special Engineering Conditions by Liujun Zhang, Youqiang Qiu, Hui Yu, Lihua Yin, Faru Zhang, Tong Wu

    Published 2022-01-01
    “…The research results show that as the monitoring data storage analysis and early warning carrier, the integrated monitoring and early warning platform not only presents key data such as comprehensive early warning information, evaluation indicators, and monitoring elements but also realizes the intelligent, automatic, and visual presentation of monitoring data. …”
    Get full text
    Article
  18. 12658
  19. 12659
  20. 12660

    The Influence of UI Design Attributes and Users’ Uncertainty Avoidance on Stickiness of the Young Elderly Toward mHealth Applications by Zibin Chen, Jaehwan Lee

    Published 2025-04-01
    “…This study examines how two UI design attributes (usability and aesthetics) and individual uncertainty avoidance (from Hofstede’s cultural dimensions) influence elderly users’ stickiness to mHealth applications. The study used PLS-SEM to analyze survey data from 492 elderly people in China. …”
    Get full text
    Article