Suggested Topics within your search.
Suggested Topics within your search.
- Sustainable development 2
- computer 2
- Agriculture 1
- Biotechnology 1
- Calculus 1
- Chemistry Techniques, Analytical 1
- Children 1
- Climate change mitigation 1
- Economic Policy 1
- Economic policy 1
- Education 1
- Energy Policy, Economics and Management 1
- Energy and state 1
- Energy policy 1
- Enterprise application integration (Computer systems) 1
- Environmental Economics 1
- Environmental economics 1
- Ethnoscience 1
- Hospitality industry 1
- Immune System 1
- Immunity 1
- Industrial Organization 1
- Industrial organization 1
- Information technology 1
- Language 1
- Language disorders in children 1
- Linguistics 1
- MEDICAL / Audiology & Speech Pathology 1
- MEDICAL / Biotechnology 1
- Management 1
-
461
-
462
-
463
Advancing AI-Driven Geospatial Analysis and Data Generation: Methods, Applications and Future Directions
Published 2025-02-01Get full text
Article -
464
Precipitable Water Vapor Retrieval Based on GNSS Data and Its Application in Extreme Rainfall
Published 2025-07-01“…Hence, based on the GNSS observation data from July 2023, this study retrieves PWV using the Global Pressure and Temperature 3 (GPT3) model and evaluates its application performance in the “7·31” extremely torrential rain event in Beijing in 2023. …”
Get full text
Article -
465
Applications of key technologies of storage and analysis in electric power big data for smart grid
Published 2017-11-01“…Firstly,challenges and improvements of big data in smart grid were elaborated.Then the background of big data and smart grid industry was presented.Finally,big data applications in smart grid were illustrated,and analysis on the systems of big data in smart grid and their key technologies were given.…”
Get full text
Article -
466
-
467
Application of the Genetic Algorithm in the Network Intrusion Detection System Using NSL-KDD Data
Published 2013-07-01Get full text
Article -
468
Anomaly Detection Using Data Mining Methods in IT Systems: A Decision Support Application
Published 2018-08-01“…In other studies, analysis of data obtained fromnetwork traffic is analyzed, here, analysis of other information systems dataand suggestions for alternative solutions are given, too. …”
Get full text
Article -
469
Postflight Data Processing Instructions on the Use of Unmanned Aerial Vehicles (UAVs) for Agricultural Applications
Published 2019-11-01“… Remote sensing applications for agriculture often require periodically collected high-resolution data, which are difficult to obtain by manned flights or satellite imagery. …”
Get full text
Article -
470
Enhancing AI applications for European public bodies: A data quality-centric approach
Published 2025-08-01“…For these, AI offers significant potential benefits such as improving the efficiency of internal operations, the effectiveness of policymaking, the responsiveness of public services, and enhancing transparency and accountability. The quality of the data used to train AI models is a key factor for the success or failure of an AI application. …”
Get full text
Article -
471
Application of Ensemble Kalman Filter With Covariance Localization in Data Assimilation of Radiation Belt Electrons
Published 2025-06-01“…Our study demonstrates that the application of covariance localization method can effectively improve the performance of ensemble data assimilation of radiation belt electrons, particularly for finite ensemble sizes. …”
Get full text
Article -
472
On the Numerical Investigation of Two-Phase Evaporative Spray Cooling Technology for Data Centre Applications
Published 2024-11-01“…Two-phase evaporative spray cooling technology can significantly reduce power consumption in data centre cooling applications. However, the literature lacks an established methodology for assessing the overall performance of such evaporation systems in terms of the water-energy nexus. …”
Get full text
Article -
473
Testing the Applicability and Transferability of Data-Driven Geospatial Models for Predicting Soil Erosion in Vineyards
Published 2025-01-01“…The present study focused on the applicability of data-driven geospatial models for predicting soil erosion in three vineyards in the Upper Pannon Wine Region, Central Europe, considering the seasonal variation in influencing factors. …”
Get full text
Article -
474
-
475
Mathematical Modeling and Analysis of COVID-19 Infection: Application to the Kingdom of Saudi Arabia Data
Published 2023-01-01Get full text
Article -
476
The Application of Earth Observation Data to Desert Locust Risk Management: A Literature Review
Published 2025-03-01“…This article seeks to elucidate the factors that affect desert locust distribution and review the application of earth observation (EO) data in explaining the pest’s infestations and impact. …”
Get full text
Article -
477
Retracted: Massive-Scale Data Mining to Enhance Digital Library with Applications in College Education
Published 2023-01-01Get full text
Article -
478
-
479
Research on multi-tenant data partition mechanism for SaaS application based on shared schema
Published 2012-09-01“…In SaaS model,the multi-tenant data using shared schema partitioned in multiple nodes of the cloud environment was put forward in advance.Based on this,a data partition model and algorithm for multi-tenants to support SaaS application was proposed.Through comparsion with many data partition technology and cloud database solutions mainly for analysis application and lack of transaction support,the theoretical analysis and experimental results reveal that the proposed data partition mechanism can effectively realize the dynamic scalability of the system in cloud environment,at the same time to minimize the cost of the distributed transaction.…”
Get full text
Article -
480
Application of LSB Steganography for Encrypted Data Using Triple Transposition Vigenere on Digital Images
Published 2025-08-01“…Grayscale images offer advantages in terms of storage and algorithm efficiency, while RGB images provide broader color diversity and versatile applications. By combining these methods, the proposed approach strengthens data security, ensuring embedded messages are more resilient against advanced steganalysis and unauthorized decryption attempts. …”
Get full text
Article