Showing 221 - 240 results of 50,948 for search 'data application', query time: 0.33s Refine Results
  1. 221
  2. 222
  3. 223

    Data Dissemination Techniques for Internet of Things Applications: Research Challenges and Opportunities by Lenando Halikul bin, Albert Sanjay Charles, Alrfaay Mohamad

    Published 2024-12-01
    “…Additionally, it explores emerging opportunities and innovations that can shape the future of IoT applications. Furthermore, the discussion addresses challenges in data dissemination and explores innovative solutions, including machine learning, AI-based strategies, edge, and fog computing, blockchain integration, and advanced 5G/6G networks. …”
    Get full text
    Article
  4. 224
  5. 225
  6. 226

    Research Progress and Application of UAV Multi-Sensor Data Fusion Technology by Jia Yifei, Ji Yuhan

    Published 2025-01-01
    “…This paper reviews the research progress of UAV multi - sensor data fusion technology. With the complexity of application scenarios, single - sensor UAVs can’t meet the requirements. …”
    Get full text
    Article
  7. 227

    Exploring the Applications of Explainability in Wearable Data Analytics: Systematic Literature Review by Yasmin Abdelaal, Michaël Aupetit, Abdelkader Baggag, Dena Al-Thani

    Published 2024-12-01
    “…ResultsOur findings revealed that wrist-worn wearables such as Fitbit and Empatica E4 are prevalent in health care applications. However, more emphasis must be placed on making the data generated by these devices explainable. …”
    Get full text
    Article
  8. 228

    Real-time processing technology,platform and application of streaming big data by Chun CHEN

    Published 2017-07-01
    “…According to its timeliness,big data processing systems can be categorized into two groups,namely batching big data processing and streaming big data processing.Both systems mentioned above are unable to meet the real-time requirement for censoring and query analysis tasks.To this end,the “stream cube” real-time data analysis technology and platform were presented,which can perform timely query with low lag.Currently,this technology has been applied to many fields,including financial risk management,anti-fraud as well as web bots defense,and offers promising prospects for further applications.…”
    Get full text
    Article
  9. 229
  10. 230

    Sinh-Cosh Optimization-Based Efficient Clustering for Big Data Applications by Lahbib Khrissi, Mohammed Es-Sabry, Nabil El Akkad, Hassan Satori, Saad Aldosary, Walid El-Shafai

    Published 2024-01-01
    “…Data clustering is a pivotal aspect of data mining, attracting significant attention in the exploration of cluster analysis through optimization algorithms. …”
    Get full text
    Article
  11. 231
  12. 232
  13. 233
  14. 234

    Entity-Driven New Paradigm of Mine Data: Model Construction and Application by Wenjing Li, Qian Ma, Yanbin Tang, Zhiyong Lin

    Published 2024-12-01
    “…Based on multi-source heterogeneous mine data, we constructed a mining entity data layer. …”
    Get full text
    Article
  15. 235

    Differential privacy protection technology and its application in big data environment by Yu FU, Yihan YU, Xiaoping WU

    Published 2019-10-01
    “…The privacy protection in big data is a research hotspot in the field of cyberspace security.As a strict and provable definition of privacy protection,studying application status of differential privacy protection in big data environment can provide reference and guidance for its subsequent system applications.Based on the analysis of the related concepts and technical characteristics of differential privacy protection,the application of differential privacy protection technology was reviewed in data distribution and analysis,cloud computing and big data computing,location and trajectory services and social networks,which expounded the current representative research results and analyzed its existing problems.The research shows that the existing results have made effective innovation and exploration of differential privacy protection applications from the aspects of differential privacy protection mechanism,noise addition mechanism and location,and data processing methods,and the related results have been cross-applied in different scenarios.Finally,four major problems that need to be studied in the further systematic application of differential privacy protection in the big data environment are proposed.…”
    Get full text
    Article
  16. 236

    Citation Data and Informetrics Laws: An Application in Doctoral Theses to the Turkish Librarianship by Özlem Gökkurt Bayram

    Published 2014-05-01
    “…Seventeen doctoral theses of librarianship have been selected to study the application of informetrics laws. Aricles cited in the bibliographies of theses and the journals in which they appeared were entred into a database and synchronic citation analysis has been performed on the data. …”
    Get full text
    Article
  17. 237
  18. 238

    Simplex-structured matrix factorisation: application of soft clustering to metabolomic data by Wenxuan Liu, Thomas Brendan Murphy, Lorraine Brennan

    Published 2025-05-01
    “…In the simulation study, the cluster prototypes and cluster memberships were well estimated. In the real data application to metabolomic data, the presence of four soft clusters was suggested by the gap statistic. …”
    Get full text
    Article
  19. 239

    Big data mining and application of long-distance oil and gas pipeline by Tao YU, Lijun LIU, Hongjun CHEN, Yao YU

    Published 2020-09-01
    “…In response to the need of the intelligent construction of the long-distance oil and gas pipeline in the future,combining with the supervisory control and data acquisition (SCADA) system and operating parameters of the oil and gas pipeline,comparing with the characteristics of traditional theoretical methods and big data mining methods,the direction of big data to promote intelligent pipeline and three steps of digital informatization,theorization,and intelligence of the pipeline intelligence research were proposed.The pipeline intelligent architecture was established,which included a physical layer,a data layer,a data mining layer,an application layer,and a user layer.The data mining layer was the core of the architecture.The statistical analysis,time series prediction and working condition identification and other application cases showed that the use of the big data mining could effectively solve the actual production business needs and guide the future pipeline intelligent research and construction.…”
    Get full text
    Article
  20. 240