Suggested Topics within your search.
Suggested Topics within your search.
- Sustainable development 2
- computer 2
- Agriculture 1
- Biotechnology 1
- Calculus 1
- Chemistry Techniques, Analytical 1
- Children 1
- Climate change mitigation 1
- Economic Policy 1
- Economic policy 1
- Education 1
- Energy Policy, Economics and Management 1
- Energy and state 1
- Energy policy 1
- Enterprise application integration (Computer systems) 1
- Environmental Economics 1
- Environmental economics 1
- Ethnoscience 1
- Hospitality industry 1
- Immune System 1
- Immunity 1
- Industrial Organization 1
- Industrial organization 1
- Information technology 1
- Language 1
- Language disorders in children 1
- Linguistics 1
- MEDICAL / Audiology & Speech Pathology 1
- MEDICAL / Biotechnology 1
- Management 1
-
13521
Personalized Clustering for Emotion Recognition Improvement
Published 2024-12-01“…An initial approach for clustering labeled data compiled (physiological data, together with emotional labels) is presented in this work, as well as the method to ensure the enrollment of new users with unlabeled data once the AI models are generated. …”
Get full text
Article -
13522
A Method for Constructing a Synthesis Health Index for Metro Vehicle Wheelsets
Published 2025-01-01“…The procedural steps describe the detailed process from data collection, preprocessing, and feature extraction to health index construction. …”
Get full text
Article -
13523
Enhanced method based on virtual registers rotation
Published 2018-05-01“…Sematic attacks based on the data flow analysis bring big challenges to the code obfuscation.Concerning the data flow of virtual machine based (VM-based) code protection,the method transfers the mapping relation between the virtual registers and the op-code of the bytecode during executing,which means the uncertainty and complexity of the data flow during interpretive execution of the bytecode.In addition,three policies are proposed to address the problem that how to choose the length of rotation for each bytecode,which grows complexity of the protection.Finally,a prototype of VRR-VM (virtual machine protection system based on virtual registers rotation) was implemented.Experiment results show that the method is effective and applicable for anti-reversing.…”
Get full text
Article -
13524
Progressive role of artificial intelligence in treatment decision-making in the field of medical oncology
Published 2025-02-01“…Ethical considerations, such as data privacy, algorithmic bias, and explainability, remain critical for responsible AI integration. …”
Get full text
Article -
13525
A Historical Review of the Technology Used for the Study of Freshness in Red Meats
Published 2025-01-01“…This review provides a comprehensive historical overview of the methods used to assess red meat freshness, including their advantages, limitations, and applications. Furthermore, it discusses state of the art data analysis techniques to enhance detection accuracy, highlighting the potential for industrial implementation and the challenges that must be addressed.…”
Get full text
Article -
13526
Tachometric Cup Anemometer with Wind Direction Indicator and Fibre-Optic Signal Transmission
Published 2025-05-01Get full text
Article -
13527
Framing of disaster impact in online news media: a case study from Malawi on flood risk management
Published 2025-05-01“…IntroductionHigh-quality impact data is essential for several applications in disaster risk management including Early Warning Systems. …”
Get full text
Article -
13528
Interpolation Polynomial Approximation for the Optimal Teaching of Employing Educational Technologies in Traditional Education of Mathematics
Published 2024-09-01“…These two methods were employed for different educational classes in some high schools of Karaj city. The data acquired were analyzed using data envelopment analysis. …”
Get full text
Article -
13529
Digital streaming media distribution and transmission process optimisation based on adaptive recurrent neural network
Published 2022-12-01“…This paper proposes a priority-aware streaming media multi-path data scheduling mechanism, which allows applications to distinguish the relative importance of data and ensure that high-priority data is transmitted on the path with the best quality. …”
Get full text
Article -
13530
OLAP Techniques for Approximation and Mining Query Answering
Published 2010-12-01“…The content of a DW is analyzed by the On-Line Analytical Processing (OLAP) applications for the purpose of discovering trends, patterns of behavior, and anomalies as well as finding hidden dependencies between data . …”
Get full text
Article -
13531
HDFS-oriented cryptographic key resource control mechanism
Published 2022-09-01“…The big data environment presents the characteristics of multi-user cross-network cross-access, multi-service collaborative computing, cross-service data flow, and complex management of massive files.The existing access control models and mechanisms are not fully applicable for big data scenarios.In response to the needs of fine-grained access control and multi-service strategy normalization for cryptographic data in the big data environment, starting from the scene elements and attributes of access control, the HDFS-oriented CKCM was proposed by mapping the cyberspace-oriented access control (CoAC) model.Subsequently, a fine-grained access control management model for HDFS was proposed, including management sub-models and management supporting models.The Z-notation was used to formally describe the management functions and management methods in the management model.Finally, the CKCM system was implemented based on XACML to realize fine-grained secure access control for managing file and secret keys in HDFS.…”
Get full text
Article -
13532
Artificial Intelligence Techniques With Digital Twin for Fault Diagnosis in Interconnected Systems: A Review
Published 2025-01-01“…We focus on developing hybrid Artificial intelligence models that leverage diverse data sources to enhance fault detection and diagnosis, enabling secure and distributed diagnostics. …”
Get full text
Article -
13533
Innovation and Risk Avoidance of Smart Library Services Based on Generative Artificial Intelligence
Published 2024-07-01“…The study occupies an important place in the advancement of knowledge in this area and contributes to the development of sustainable, user-centered library services capable of addressing significant contemporary challenges related to information accessibility and data security. [Method/Process] This study uses a systematic literature review and case analysis to examine the current state of generative AI applications in smart libraries. …”
Get full text
Article -
13534
Efficient Computation of the <italic>K</italic> Nearest Neighbors Query Using Incremental Radius on a <italic>k</italic>²-tree
Published 2025-01-01“…Proximity searches within metric spaces are critical for numerous real world applications, including pattern recognition, multimedia information retrieval, and spatial data analysis, among others. …”
Get full text
Article -
13535
A Few-Shot Learning-Based Material Recognition Scheme Using Smartphones
Published 2025-01-01“…The existing research on material and object recognition using smartphone vibrations and accelerometers often requires vast amounts of training data for deep learning-based models, making it challenging to apply to real-world applications. …”
Get full text
Article -
13536
Tensor-Based Uncoupled and Incomplete Multi-View Clustering
Published 2025-05-01“…Multi-view clustering demonstrates strong performance in various real-world applications. However, real-world data often contain incomplete and uncoupled views. …”
Get full text
Article -
13537
An Integrated Method for High-Dimensional Imbalanced Assembly Quality Prediction Supported by Edge Computing
Published 2020-01-01“…One of the most important applications is helping factory managers predict the quality of assembled products. …”
Get full text
Article -
13538
Harnessing AI-Powered Genomic Research for Sustainable Crop Improvement
Published 2024-12-01“…Despite these advancements, challenges remain, including fragmented data sources, variability in phenotyping protocols, and data ownership concerns. …”
Get full text
Article -
13539
Novel Deep Learning-Based Facial Forgery Detection for Effective Biometric Recognition
Published 2025-03-01“…Furthermore, a binary classification approach combined with supervised contrastive learning addresses data imbalance and strengthens generalization capabilities. …”
Get full text
Article -
13540
A sparse tensor generator with efficient feature extraction
Published 2025-07-01Get full text
Article