Showing 13,521 - 13,540 results of 50,948 for search 'data application', query time: 0.35s Refine Results
  1. 13521

    Personalized Clustering for Emotion Recognition Improvement by Laura Gutiérrez-Martín, Celia López-Ongil, Jose M. Lanza-Gutiérrez, Jose A. Miranda Calero

    Published 2024-12-01
    “…An initial approach for clustering labeled data compiled (physiological data, together with emotional labels) is presented in this work, as well as the method to ensure the enrollment of new users with unlabeled data once the AI models are generated. …”
    Get full text
    Article
  2. 13522

    A Method for Constructing a Synthesis Health Index for Metro Vehicle Wheelsets by Min Luo, Tianyi Zhong, Jinzhen Dai

    Published 2025-01-01
    “…The procedural steps describe the detailed process from data collection, preprocessing, and feature extraction to health index construction. …”
    Get full text
    Article
  3. 13523

    Enhanced method based on virtual registers rotation by Yan PAN, Wei LIN

    Published 2018-05-01
    “…Sematic attacks based on the data flow analysis bring big challenges to the code obfuscation.Concerning the data flow of virtual machine based (VM-based) code protection,the method transfers the mapping relation between the virtual registers and the op-code of the bytecode during executing,which means the uncertainty and complexity of the data flow during interpretive execution of the bytecode.In addition,three policies are proposed to address the problem that how to choose the length of rotation for each bytecode,which grows complexity of the protection.Finally,a prototype of VRR-VM (virtual machine protection system based on virtual registers rotation) was implemented.Experiment results show that the method is effective and applicable for anti-reversing.…”
    Get full text
    Article
  4. 13524

    Progressive role of artificial intelligence in treatment decision-making in the field of medical oncology by Archana Reddy Bongurala, Dhaval Save, Ankit Virmani

    Published 2025-02-01
    “…Ethical considerations, such as data privacy, algorithmic bias, and explainability, remain critical for responsible AI integration. …”
    Get full text
    Article
  5. 13525

    A Historical Review of the Technology Used for the Study of Freshness in Red Meats by Julieta Nava-Granados, Maria T. Orvananos-Guerrero, Claudia N. Sanchez, Julieta Dominguez-Soberanes

    Published 2025-01-01
    “…This review provides a comprehensive historical overview of the methods used to assess red meat freshness, including their advantages, limitations, and applications. Furthermore, it discusses state of the art data analysis techniques to enhance detection accuracy, highlighting the potential for industrial implementation and the challenges that must be addressed.…”
    Get full text
    Article
  6. 13526
  7. 13527

    Framing of disaster impact in online news media: a case study from Malawi on flood risk management by Hannah Bailon, Kees Boersma, Claudia Orellana-Rodriguez, Marc Van Den Homberg, Marc Van Den Homberg

    Published 2025-05-01
    “…IntroductionHigh-quality impact data is essential for several applications in disaster risk management including Early Warning Systems. …”
    Get full text
    Article
  8. 13528

    Interpolation Polynomial Approximation for the Optimal Teaching of Employing Educational Technologies in Traditional Education of Mathematics by Kamal Nozad, Mohsen Rostamy-Malkhalifeh, Mohammad Maghasedi, Hamid Rasouli

    Published 2024-09-01
    “…These two methods were employed for different educational classes in some high schools of Karaj city.  The data acquired were analyzed using data envelopment analysis. …”
    Get full text
    Article
  9. 13529

    Digital streaming media distribution and transmission process optimisation based on adaptive recurrent neural network by Wenjing Shan

    Published 2022-12-01
    “…This paper proposes a priority-aware streaming media multi-path data scheduling mechanism, which allows applications to distinguish the relative importance of data and ensure that high-priority data is transmitted on the path with the best quality. …”
    Get full text
    Article
  10. 13530

    OLAP Techniques for Approximation and Mining Query Answering by Murtadaha Hamd, Waleed Hassan

    Published 2010-12-01
    “…The content of a DW is analyzed by the On-Line Analytical Processing (OLAP) applications for the purpose of discovering trends, patterns of behavior, and anomalies as well as finding hidden dependencies between data . …”
    Get full text
    Article
  11. 13531

    HDFS-oriented cryptographic key resource control mechanism by Wei JIN, Fenghua LI, Mingjie YU, Yunchuan GUO, Ziyan ZHOU, Liang FANG

    Published 2022-09-01
    “…The big data environment presents the characteristics of multi-user cross-network cross-access, multi-service collaborative computing, cross-service data flow, and complex management of massive files.The existing access control models and mechanisms are not fully applicable for big data scenarios.In response to the needs of fine-grained access control and multi-service strategy normalization for cryptographic data in the big data environment, starting from the scene elements and attributes of access control, the HDFS-oriented CKCM was proposed by mapping the cyberspace-oriented access control (CoAC) model.Subsequently, a fine-grained access control management model for HDFS was proposed, including management sub-models and management supporting models.The Z-notation was used to formally describe the management functions and management methods in the management model.Finally, the CKCM system was implemented based on XACML to realize fine-grained secure access control for managing file and secret keys in HDFS.…”
    Get full text
    Article
  12. 13532

    Artificial Intelligence Techniques With Digital Twin for Fault Diagnosis in Interconnected Systems: A Review by Imen Nakti, Majdi Mansouri, Rami Al-Hmouz, Atef Khedher

    Published 2025-01-01
    “…We focus on developing hybrid Artificial intelligence models that leverage diverse data sources to enhance fault detection and diagnosis, enabling secure and distributed diagnostics. …”
    Get full text
    Article
  13. 13533

    Innovation and Risk Avoidance of Smart Library Services Based on Generative Artificial Intelligence by Jia LIU

    Published 2024-07-01
    “…The study occupies an important place in the advancement of knowledge in this area and contributes to the development of sustainable, user-centered library services capable of addressing significant contemporary challenges related to information accessibility and data security. [Method/Process] This study uses a systematic literature review and case analysis to examine the current state of generative AI applications in smart libraries. …”
    Get full text
    Article
  14. 13534

    Efficient Computation of the <italic>K</italic> Nearest Neighbors Query Using Incremental Radius on a <italic>k</italic>&#x00B2;-tree by Rodrigo Torres-Aviles, Monica Caniupan

    Published 2025-01-01
    “…Proximity searches within metric spaces are critical for numerous real world applications, including pattern recognition, multimedia information retrieval, and spatial data analysis, among others. …”
    Get full text
    Article
  15. 13535

    A Few-Shot Learning-Based Material Recognition Scheme Using Smartphones by Yeonju Kim, Jeonghyeon Yoon, Seungku Kim

    Published 2025-01-01
    “…The existing research on material and object recognition using smartphone vibrations and accelerometers often requires vast amounts of training data for deep learning-based models, making it challenging to apply to real-world applications. …”
    Get full text
    Article
  16. 13536

    Tensor-Based Uncoupled and Incomplete Multi-View Clustering by Yapeng Liu, Wei Guo, Weiyu Li, Jingfeng Su, Qianlong Zhou, Shanshan Yu

    Published 2025-05-01
    “…Multi-view clustering demonstrates strong performance in various real-world applications. However, real-world data often contain incomplete and uncoupled views. …”
    Get full text
    Article
  17. 13537

    An Integrated Method for High-Dimensional Imbalanced Assembly Quality Prediction Supported by Edge Computing by Yixiong Feng, Tianyue Wang, Bingtao Hu, Chen Yang, Jianrong Tan

    Published 2020-01-01
    “…One of the most important applications is helping factory managers predict the quality of assembled products. …”
    Get full text
    Article
  18. 13538

    Harnessing AI-Powered Genomic Research for Sustainable Crop Improvement by Elżbieta Wójcik-Gront, Bartłomiej Zieniuk, Magdalena Pawełkowicz

    Published 2024-12-01
    “…Despite these advancements, challenges remain, including fragmented data sources, variability in phenotyping protocols, and data ownership concerns. …”
    Get full text
    Article
  19. 13539

    Novel Deep Learning-Based Facial Forgery Detection for Effective Biometric Recognition by Hansoo Kim

    Published 2025-03-01
    “…Furthermore, a binary classification approach combined with supervised contrastive learning addresses data imbalance and strengthens generalization capabilities. …”
    Get full text
    Article
  20. 13540