Search alternatives:
implications » applications (Expand Search)
Showing 13,681 - 13,700 results of 64,817 for search 'data (implications OR application)', query time: 0.44s Refine Results
  1. 13681
  2. 13682

    A Novel Blind Deconvolution Method with Adaptive Period Estimation Technique and Its Application to Fault Feature Enhancement of Bearing by Qiuyang Zhou, Cai Yi, Chenguang Huang, Jianhui Lin

    Published 2021-01-01
    “…The proposed method does not require precise prior fault period input, which greatly improves the fault recovery accuracy and application range of MCG-Lp/Lq-D. Eventually, simulated and experimental data verify the effectiveness and superiority of AMCG-Lp/Lq-D.…”
    Get full text
    Article
  3. 13683
  4. 13684
  5. 13685

    APPLICATION OF FUZZY COGNITIVE MODELS TO ASSESS THE BALANCE OF ELEMENTS OF THE SYSTEM OF SCIENTIFIC SUPPORT AND COMMERCIALIZATION OF INNOVATIONS IN THE AGRO-INDUSTRIAL COMPLEX by Ivan SANDU, Elena DERUNOVA, Anton VORONOV, Nikolay ZAVIVAEV

    Published 2024-01-01
    “…Analysis and assessment of the influence of factors on each other and on the system as a whole was carried out on the basis of regression analysis using the example of 84 regions of Russia using data for 2021-2022. The greatest impact on the volume of shipped innovative goods, considered as the main concept, was exerted by the determinants "The share of organizations implementing technological innovations" and "The ratio of the salaries of scientific workers to the average salary in the region", other concepts are characterized by weak or negative dependencies. …”
    Get full text
    Article
  6. 13686

    Fractional Inclusion Analysis of Superquadratic Stochastic Processes via Center-Radius Total Order Relation with Applications in Information Theory by Mohsen Ayyash, Dawood Khan, Saad Ihsan Butt, Youngsoo Seol

    Published 2025-06-01
    “…These processes serve as a powerful tool for modeling uncertainty in stochastic systems involving interval-valued data. By utilizing their intrinsic structure, we derive sharpened versions of Jensen-type and Hermite–Hadamard-type inequalities, along with their fractional extensions, within the framework of mean-square stochastic Riemann–Liouville fractional integrals. …”
    Get full text
    Article
  7. 13687
  8. 13688

    Loading of anionic surfactant on eco-friendly biochar and its applications in Cr(VI) removal: adsorption, kinetics, and reusability studies by Azza M. Shaker, Mohamed Khedawy, Abeer A. Moneer, Nabila M. El-Mallah, Mohamed S. Ramadan

    Published 2025-01-01
    “…The pseudo-second-order kinetic model best described the removal process, according to the kinetic data, while the Temkin model, one of the applicable adsorption isotherm models, well expressed the adsorption process. …”
    Get full text
    Article
  9. 13689
  10. 13690
  11. 13691

    Design of A Web-Based Community Administration Application Using the Agile Scrum Method in the Tanjung Lengkong RT Environment by Dyo Rizqal Pahlevi, Ifan Junaedi, Anton Zulkarnain Sianipar

    Published 2025-07-01
    “…Ideally, this technological advancement can be utilized to improve service efficiency, data transparency, and more effective communication between RT administrators and their residents. …”
    Get full text
    Article
  12. 13692

    PAuthKey: A Pervasive Authentication Protocol and Key Establishment Scheme for Wireless Sensor Networks in Distributed IoT Applications by Pawani Porambage, Corinna Schmitt, Pardeep Kumar, Andrei Gurtov, Mika Ylianttila

    Published 2014-07-01
    “…Wireless sensor Networks (WSNs) deployed in distributed Internet of Things (IoT) applications should be integrated into the Internet. …”
    Get full text
    Article
  13. 13693

    A novel hesitant fuzzy tensor-based group decision-making approach with application to heterogeneous wireless network evaluation by Muhammad Bilal, Ioan Lucian-Popa

    Published 2025-08-01
    “…The proposed HFT framework captures hesitation more effectively by organizing hesitant fuzzy data within tensorial structures, enabling more comprehensive analysis in group decision-making scenarios. …”
    Get full text
    Article
  14. 13694
  15. 13695
  16. 13696
  17. 13697
  18. 13698

    Architecture of an integrated java application for log analysis to detect computer attacks in information systems by responding to various security anomalies by P. I. Sharikov, A. V. Krasov, A. V. Mayorovv

    Published 2025-04-01
    “…The research used methods of analyzing information in information system logs, static analysis methods, programming for application development, and data processing algorithms.Result. …”
    Get full text
    Article
  19. 13699
  20. 13700

    G-CTRNN: A Trainable Low-Power Continuous-Time Neural Network for Human Activity Recognition in Healthcare Applications by Abdallah Alzubi, David Lin, Johan Reimann, Fadi Alsaleem

    Published 2025-07-01
    “…We validate G-CTRNN on the WISDM human activity dataset, which simulates realistic wearable sensor data for healthcare monitoring. Compared to conventional RNNs, G-CTRNN achieves superior classification accuracy with fewer parameters and greater stability—enabling continuous, real-time HAR on low-power platforms such as MEMS computing networks. …”
    Get full text
    Article