Search alternatives:
implications » applications (Expand Search)
Showing 15,841 - 15,860 results of 64,817 for search 'data (implications OR application)', query time: 0.43s Refine Results
  1. 15841

    Machine learning and public health policy evaluation: research dynamics and prospects for challenges by Zhengyin Li, Hui Zhou, Zhen Xu, Qingyang Ma

    Published 2025-01-01
    “…BackgroundPublic health policy evaluation is crucial for improving health outcomes, optimizing healthcare resource allocation, and ensuring fairness and transparency in decision-making. With the rise of big data, traditional evaluation methods face new challenges, requiring innovative approaches.MethodsThis article reviews the principles, scope, and limitations of traditional public health policy evaluation methods and explores the application of machine learning in evaluating public health policies. …”
    Get full text
    Article
  2. 15842

    Improving Learning Design Using Learning Analytics in Relation to Study Experience by Satu Aksovaara, Sami Määttä, Tommi Kärkkäinen, Minna Silvennoinen

    Published 2024-12-01
    “…Our case study aims to demonstrate how the practical application of learning analytics (LA)-generated data on students’ psychological qualities can guide teachers in enhancing their instructional delivery and, consequently, enhance student experiences. …”
    Get full text
    Article
  3. 15843

    Infrared and Visible Camera Integration for Detection and Tracking of Small UAVs: Systematic Evaluation by Ana Pereira, Stephen Warwick, Alexandra Moutinho, Afzal Suleman

    Published 2024-11-01
    “…These consist of the acquisition of real data captured from a workstation on the ground, followed by image calibration, image alignment, the application of bias-removal techniques, and data augmentation methods to artificially create images. …”
    Get full text
    Article
  4. 15844

    Artificial intelligence in electroencephalography analysis for epilepsy diagnosis and management by Chenxi Wang, Chenxi Wang, Xinyue Yuan, Wei Jing

    Published 2025-08-01
    “…Crucially, AI outputs require clinician verification alongside multidimensional clinical data.DiscussionFuture research must prioritize algorithm optimization, data quality improvement, and enhanced AI transparency. …”
    Get full text
    Article
  5. 15845

    Measurement and deformation monitoring system for underground engineering robots based on Internet of Things architecture by Yao Di

    Published 2025-04-01
    “…The system was designed with a multi-layer architecture, including a perception layer (real-time collection of deformation data) and a network layer (using a robot to carry a data acquisition terminal and transmit data to a cloud server through wireless communication technology), platform layer (using cloud computing and big data technology to store, process, and analyze collected data), and application layer (visualization platform, convenient operation, and analysis of data). …”
    Get full text
    Article
  6. 15846
  7. 15847
  8. 15848
  9. 15849

    MLCRP: ML-Based GPU Cache Performance Modeling Featured With Reuse Profiles by Minjung Cho, Eui-Young Chung

    Published 2025-01-01
    “…MLCRP consists of three main stages: data preparation, training, and inference. In the data preparation stage, synthetic RP-based traces are generated from parameterized distributions to simulate diverse and non-stationary memory patterns. …”
    Get full text
    Article
  10. 15850

    View adaptive multi-object tracking method based on depth relationship cues by Haoran Sun, Yang Li, Guanci Yang, Zhidong Su, Kexin Luo

    Published 2025-01-01
    “…Abstract Multi-object tracking (MOT) tasks face challenges from multiple perception views due to the diversity of application scenarios. Different views (front-view and top-view) have different imaging and data distribution characteristics, but the current MOT methods do not consider these differences and only adopt a unified association strategy to deal with various occlusion situations. …”
    Get full text
    Article
  11. 15851

    Reducing Defense Vulnerabilities in Federated Learning: A Neuron-Centric Approach by Eda Sena Erdol, Hakan Erdol, Beste Ustubioglu, Guzin Ulutas, Iraklis Symeonidis

    Published 2025-05-01
    “…Additionally, we perform simulations on the GTSR dataset as a real-world application. Experimental results demonstrate that NC-FLD successfully defends against diverse attack scenarios in both IID and non-IID dataset distributions, maintaining accuracy above 70% with 40% malicious participation, a 5–15% improvement over the state-of-the-art method, showing enhanced robustness across diverse data distributions while effectively mitigating the impacts of both data and model poisoning attacks.…”
    Get full text
    Article
  12. 15852

    EarlyExodus: Leveraging early exits to mitigate backdoor vulnerability in deep learning by Salmane Douch, M. Riduan Abid, Khalid Zine-Dine, Driss Bouzidi, Fatima Ezzahra El Aidos, Driss Benhaddou

    Published 2025-09-01
    “…Extensive experiments on LeNet-5, ResNet-32, and GhostNet across MNIST, CIFAR-10, and GTSRB reduce the average attack success rate of seven recent backdoor attacks to about 3%, with clean-data accuracy degradation kept below 2%. These results demonstrate a practical, architecture-agnostic pathway toward trustworthy edge-AI systems and lay the foundation for extending backdoor defenses beyond image models to broader application domains.…”
    Get full text
    Article
  13. 15853

    Access control relationship prediction method based on GNN dual source learning by Dibin SHAN, Xuehui DU, Wenjuan WANG, Aodi LIU, Na WANG

    Published 2022-10-01
    “…With the rapid development and wide application of big data technology, users’ unauthorized access to resources becomes one of the main problems that restrict the secure sharing and controlled access to big data resources.The ReBAC (Relationship-Based Access Control) model uses the relationship between entities to formulate access control rules, which enhances the logical expression of policies and realizes dynamic access control.However, It still faces the problems of missing entity relationship data and complex relationship paths of rules.To overcome these problems, a link prediction model LPMDLG based on GNN dual-source learning was proposed to transform the big data entity-relationship prediction problem into a link prediction problem with directed multiple graphs.A topology learning method based on directed enclosing subgraphs was designed in this modeled.And a directed dual-radius node labeling algorithm was proposed to learn the topological structure features of nodes and subgraphs from entity relationship graphs through three segments, including directed enclosing subgraph extraction, subgraph node labeling calculation and topological structure feature learning.A node embedding feature learning method based on directed neighbor subgraph was proposed, which incorporated elements such as attention coefficients and relationship types, and learned its node embedding features through the sessions of directed neighbor subgraph extraction and node embedding feature learning.A two-source fusion scoring network was designed to jointly calculate the edge scores by topology and node embedding to obtain the link prediction results of entity-relationship graphs.The experiment results of link prediction show that the proposed model obtains better prediction results under the evaluation metrics of AUC-PR, MRR and Hits@N compared with the baseline models such as R-GCN, SEAL, GraIL and TACT.The ablation experiment results illustrate that the model’s dual-source learning scheme outperforms the link prediction effect of a single scheme.The rule matching experiment results verify that the model achieves automatic authorization of some entities and compression of the relational path of rules.The model effectively improves the effect of link prediction and it can meet the demand of big data access control relationship prediction.…”
    Get full text
    Article
  14. 15854

    The Impact of Countries’ Credit Rating Scores on the Export Performance of Companies by Ruhan İri, Esen Gürbüz

    Published 2022-04-01
    “…In the field research covering the second stage of the research, ISO 500 enterprises constitute the universe in which the data is collected. A questionnaire regarding the perceptions of business executives about the export performance of companies in 2013, when Turkey’s credit rating score was raised up to investable level, and in 2016, when Turkey’s credit rating score was lowered, was developed based on the EXPERF scale, and the export performance was measured with online or faceto-face application of the questionnaire to the business executives who participated in the study voluntarily. …”
    Get full text
    Article
  15. 15855
  16. 15856

    Developing a large language model for oil- and gas-related rock mechanics: Progress and challenges by Botao Lin, Yan Jin, Qianwen Cao, Han Meng, Huiwen Pang, Shiming Wei

    Published 2025-04-01
    “…However, there are three primary challenges in building this domain-specific LLM: data standardization, data security and access, and striking a compromise between physics and data when building the model structure. …”
    Get full text
    Article
  17. 15857
  18. 15858

    Exploring the role of organisational learning culture in the relationship between teamwork self-efficacy and employee satisfaction: Insights from the Indian IT Sector across genera... by A. Shakti Priya, B. Prabu Christopher

    Published 2025-06-01
    “…The data were analyzed using partial least squares–structural equation modeling (PLS-SEM), followed by PLS predict algorithm. …”
    Get full text
    Article
  19. 15859

    Advanced Plant Phenotyping: Unmanned Aerial Vehicle Remote Sensing and CimageA Software Technology for Precision Crop Growth Monitoring by Hongyu Fu, Jianning Lu, Guoxian Cui, Jihao Nie, Wei Wang, Wei She, Jinwei Li

    Published 2024-10-01
    “…The development of UAV (unmanned aerial vehicle) remote sensing technology provides a new means for the large-scale, efficient, and accurate acquisition of crop phenotypes, but its practical application and popularization are hindered due to the complicated data processing required. …”
    Get full text
    Article
  20. 15860

    Promoting Computational Access to Digital Collections in the Nordic and Baltic Countries: An Icelandic Use Case by Gustavo Candela, Olga Holownia, Max Odsbjerg, Mirjam Cuper, Nele Gabriëls, Katrine Hofmann, Edward J. Gray, Sally Chambers, Mahendra Mahey

    Published 2025-01-01
    “…Recent initiatives such as GLAM Labs and Collections as data promote the reuse of and computational access to digital collections. …”
    Get full text
    Article