Search alternatives:
implications » applications (Expand Search)
Showing 15,001 - 15,020 results of 64,817 for search 'data (implications OR application)', query time: 0.38s Refine Results
  1. 15001

    Problems and Prospects of Mobile Technologies in the Digital Space of Scientific Knowledge in Libraries by A. Yu. Gerasimenko

    Published 2022-12-01
    “…On the basis of the obtained data, prospects of application of mobile technologies in the digital space of scientific knowledge in libraries are disclosed. …”
    Get full text
    Article
  2. 15002

    Combination of Density‐Based Spatial Clustering With Grid Search Using Nash Equilibrium by Uranus Kazemi, Seyfollah Soleimani

    Published 2025-03-01
    “…ABSTRACT This paper introduces a novel clustering approach that enhances the traditional Density‐Based Spatial Clustering of Applications with Noise (DBSCAN) algorithm by integrating a grid search method and Nash Equilibrium principles and addresses the limitations of DBSCAN parameterization, particularly its inefficiency with big data. …”
    Get full text
    Article
  3. 15003

    The Influence of Digital Literacy, Usability, and Convenience on Interest in Using Islamic Bank Mobile Banking for Customers in Gresik by Achmad Hadhirul Marwah

    Published 2025-07-01
    “…This study uses a quantitative approach with a survey data collection method. Respondents in this study were Sharia Bank customers who use mobile banking applications in the Gresik area. …”
    Get full text
    Article
  4. 15004

    Blockchains’ Impact on Enhancing Physical Activity, Rehabilitation, Sport, and Exercise-Based Therapeutics: A Systematic Review by Shahryar Eivazzadeh, Sravan Mutyala, Jaideep Chinthala, Farnoosh Fotrousi, Siamak Khatibi

    Published 2025-03-01
    “…This is becoming more significant as the Internet of Things (IoT) and sport monitoring sensors continue to expand and become more available, leading to a growing number of users in sports and prolonged usage of these devices, which continuously capture large volumes of physical activity data. The substantial volume of data generated in sports and physical activities, combined with distinct concerns compared to medical and health-related information, makes this domain a unique case for blockchain applications. …”
    Get full text
    Article
  5. 15005

    A Novel Context-Aware Douglas–Peucker (CADP) Trajectory Compression Method by Saeed Mehri, Navid Hooshangi, Navid Mahdizadeh Gharakhanlou

    Published 2025-02-01
    “…Future work will focus on spatial auto-correlation and uncertainty to extend the robustness and applicability of the approach.…”
    Get full text
    Article
  6. 15006

    A New Keyed Hash Function Based on Compounded Chaotic Maps by Ana-Cristina Dascalescu, Radu-Eugen Boriga, Iustin Priescu

    Published 2025-01-01
    “…Moreover, the exhaustive numerical simulations show that the proposed hash function has very good confusion and diffusion capabilities, strong collision resistance, high level of security and good speed, being suitable for applications regarding data integrity or authentication, such as ciphers or blockchain applications.…”
    Get full text
    Article
  7. 15007

    A systematic review and comparative evaluation to develop and validate a comprehensive framework for cancer surveillance systems by Mohsen Soleimani, Marjan GhaziSaeedi, Seyed Mohammad Ayyoubzadeh, Ahmad Jalilvand

    Published 2025-04-01
    “…Abstract Background The increasing global burden of cancer necessitates robust cancer surveillance systems to generate accurate and comprehensive data for effective public health interventions. Despite advancements, significant gaps remain in data standardization, interoperability, and adaptability to diverse healthcare settings. …”
    Get full text
    Article
  8. 15008
  9. 15009

    Editorial:  Applied Computing 2023 by Yousra Abdul Alsahib S. Aldeen, Yusliza Yusoff, Samira Naji Kadhim

    Published 2024-04-01
    “…It can be classified the applied computing skills and knowledge into (Current programming languages and technology, Software engineering, IT security, Mobile technology, Networking, Operating system management, Graphic applications, Data integration, Distributed systems, Communication, Critical thinking, analysis, and problem-solving, Project management). …”
    Get full text
    Article
  10. 15010

    Flexible and high‐throughput structures of Camellia block cipher for security of the Internet of Things by Bahram Rashidi

    Published 2021-05-01
    “…Security and privacy of the IoT systems are critical challenges in many data‐sensitive applications. Herein, high‐throughput and flexible hardware implementations of the Camellia block cipher for IoT applications are presented. …”
    Get full text
    Article
  11. 15011

    Psychological Determinants of the Trajectories of Self-quantification and Digitalization of Professional Cyclists’ Physical Activity: Theoretical and Methodological Considerations... by Y. Linossier, G. Martinent, M. Quidu

    Published 2024-12-01
    “…Digitalization and self-quantification have permeated the field of high-level sport, particularly professional cycling. The data generated by connected objects and applications are used to improve riders' performance. …”
    Get full text
    Article
  12. 15012

    Corpus et perspectives pour l'enseignant : Compétences, formation, outils, besoins, activités, objectifs by Geoffrey Sockett

    Published 2014-01-01
    “…Data driven learning is a key pedagogical approach for advanced, specialist learners of modern languages. …”
    Get full text
    Article
  13. 15013

    Research on measurement method of analog input bandwidth of digital oscilloscope by Li Haitao, Qu Hongguang, Zhao Chunbin, Liu Sen, Tian Geng

    Published 2025-01-01
    “…Both the hardware platform and automated testing method are not only applicable to analog input bandwidth of digital oscilloscopes, but also for various data acquisition products.…”
    Get full text
    Article
  14. 15014
  15. 15015

    A Practical Image Augmentation Method for Construction Safety Using Object Range Expansion Synthesis by Jaemin Kim, Ingook Wang, Jungho Yu, Seulki Lee

    Published 2025-04-01
    “…Artificial intelligence (AI) applications in such dynamic domains require domain-specific datasets, yet collecting real-world data can be challenging due to safety concerns, logistical constraints, and high labor costs. …”
    Get full text
    Article
  16. 15016

    Geochemical-process extraction and interpretation using matrix factorization: a framework for verifying effectiveness through forward modeling and inversion analysis by Tatsu Kuwatani, Shotaro Akaho, Shotaro Akaho, Kengo Nakamura, Takeshi Komai

    Published 2025-04-01
    “…The proposed framework offers a systematic methodology for identifying and quantifying underlying geological processes from high-dimensional geochemical data, with potential applications in geochemistry, environmental science, and resource exploration.…”
    Get full text
    Article
  17. 15017

    A Framework for RF-EMF Time Series Analysis Through Multi-Scale Time Averaging by Nikola Djuric, Dragan Kljajic, Nicola Pasquino, Vidak Otasevic, Snezana Djuric

    Published 2025-01-01
    “…Driven by the need to overview monitored data in some distinctive way and further examine hidden phenomena embedded in system’s EMF data series, this paper presents an additional method for analyzing RF-EMF time series through multi-scale time averaging. …”
    Get full text
    Article
  18. 15018

    Identification of an additive interaction using parameter regularization and model selection in epidemiology by Chanchan Hu, Zhifeng Lin, Zhijian Hu, Shaowei Lin

    Published 2024-10-01
    “…Result Using simulated and real data, our proposed methods effectively identified additive interactions and proved to be applicable to real-world data. …”
    Get full text
    Article
  19. 15019

    Integrity verified lightweight ciphering for secure medical image sharing between embedded SoCs by Siva Janakiraman, Vinoth Raj R, R. Sivaraman, A. Sridevi, Har Narayan Upadhyay, Rengarajan Amirtharajan

    Published 2025-03-01
    “…Abstract In the age of digital communication, safeguarding the security and integrity of transmitted images is crucial, especially for online and real-time applications where data privacy is paramount. This paper addresses the problem of protecting sensitive medical images during transmission by proposing a robust, lightweight encryption scheme. …”
    Get full text
    Article
  20. 15020