Showing 1,001 - 1,020 results of 50,948 for search 'data application', query time: 0.30s Refine Results
  1. 1001
  2. 1002

    Research on the Application of User Side Power Quality On-line Monitoring by GUO Cheng, ZHAO Zeping, YANG Haorui, WANG Xin

    Published 2016-01-01
    “…Aiming at the problems that the on-line monitoring data of power quality for user side hasn’t been effectively utilized, a method of monitoring data access and application research was put forward. …”
    Get full text
    Article
  3. 1003
  4. 1004

    Application of distributed techniques in large language model training and inference by ZHENG Weimin

    Published 2024-09-01
    “…In the data preprocessing stage, an efficient big data processing engine called "Chukonu" was developed to address the issue of high overhead in reading data from distributed file systems. …”
    Get full text
    Article
  5. 1005

    Exploration and prospect on the application of digital twin in rail transit electric traction systems by SONG Wensheng, ZHANG Sihui, YE Cunxin, ZHANG Zhiwei, ZOU Yuchao

    Published 2024-03-01
    “…Digital twin, as a virtual characterization technique for actual physical systems based on data and machine learning, can simulate the behavioral characteristics and monitor parameters of actual physical systems. …”
    Get full text
    Article
  6. 1006
  7. 1007

    Navigating the microarray landscape: a comprehensive review of feature selection techniques and their applications by Fangling Wang, Azlan Mohd Zain, Yanjie Ren, Mahadi Bahari, Azurah A. Samah, Zuraini Binti Ali Shah, Norfadzlan Bin Yusup, Rozita Abdul Jalil, Azizah Mohamad, Nurulhuda Firdaus Mohd Azmi

    Published 2025-07-01
    “…This review systematically summarizes recent advances in microarray feature selection techniques and their applications in biomedical research. It addresses the challenges posed by the high dimensionality and noise of microarray data, aiming to integrate the strengths and limitations of various methods while exploring their applicability across different scenarios. …”
    Get full text
    Article
  8. 1008

    One- and two-sided prediction intervals for future Pareto record values with applications by Anja B. Schmiedt, Christina Empacher, Udo Kamps

    Published 2025-05-01
    “…As a result, it is seen that although the number of observed record values in the presented real data applications is rather small, as it is usually the case, the selected prediction intervals are of practical use.…”
    Get full text
    Article
  9. 1009

    Diversity and Application of Biplot Methods in Ecuadorian Research: A Systematic Literature Review by Espinel-Obregoso Francisco Paolo, Sánchez-Loor Juan Pablo, Basurto-Quilligana Roberto Ivan, Peralta-Gamboa Dennis Alfredo, Villacís-Macías Carolina Daysi

    Published 2025-05-01
    “…Through the analysis of 46 documents, a notable increase in the application of these techniques since 2020 is observed, reflecting the strengthening of local research capacity and the need for multivariate tools to interpret complex data. …”
    Get full text
    Article
  10. 1010
  11. 1011
  12. 1012
  13. 1013

    Gamified Engagement for Data Crowdsourcing and AI Literacy: An Investigation in Affective Communication Through Speech Emotion Recognition by Eleni Siamtanidou, Lazaros Vrysis, Nikolaos Vryzas, Charalampos A. Dimoulas

    Published 2025-02-01
    “…Specifically, it details the design and development of an innovative gamified application named “J-Plus”, aimed at both professionals and non-professionals in journalism. …”
    Get full text
    Article
  14. 1014
  15. 1015
  16. 1016
  17. 1017
  18. 1018
  19. 1019
  20. 1020

    New discrete memristive hyperchaotic map: modeling, dynamic analysis, and application in image encryption by Fei Yu, Yiya Wu, Xuqi Wang, Ting He, ShanKou Zhang, Jie Jin

    Published 2025-06-01
    “…Through experiments on various images, we verify the algorithm’s effectiveness in improving encryption strength, reducing information leakage risks, and ensuring data security. Finally, the results of keyspace analysis, histogram analysis, correlation analysis, and information entropy demonstrate that the scheme has high security and practicability, along with good application prospects and practical value.…”
    Get full text
    Article