Suggested Topics within your search.
Suggested Topics within your search.
- Sustainable development 2
- computer 2
- Agriculture 1
- Biotechnology 1
- Calculus 1
- Chemistry Techniques, Analytical 1
- Children 1
- Climate change mitigation 1
- Economic Policy 1
- Economic policy 1
- Education 1
- Energy Policy, Economics and Management 1
- Energy and state 1
- Energy policy 1
- Enterprise application integration (Computer systems) 1
- Environmental Economics 1
- Environmental economics 1
- Ethnoscience 1
- Hospitality industry 1
- Immune System 1
- Immunity 1
- Industrial Organization 1
- Industrial organization 1
- Information technology 1
- Language 1
- Language disorders in children 1
- Linguistics 1
- MEDICAL / Audiology & Speech Pathology 1
- MEDICAL / Biotechnology 1
- Management 1
-
1461
Evolution and gaps in data mining research: Identifying the bibliometric landscape of data mining in management
Published 2025-01-01“…Despite a large number of publications, interdisciplinary applications of data mining are limited. The scientific publication on data mining and its relationship with decision-making, artificial intelligence, forecasting, and sentiment analysis is found to be weak, showing significant research gaps in these areas. …”
Get full text
Article -
1462
FedDAR: Federated Learning With Data-Quantity Aware Regularization for Heterogeneous Distributed Data
Published 2025-01-01“…Federated learning (FL) has emerged as a promising approach for collaboratively training global models and classifiers without sharing private data. However, existing studies primarily focus on distinct methodologies for typical and personalized FL (tFL and pFL), representing a challenge in exploring cross-applicable training methods. …”
Get full text
Article -
1463
Expert Experiences in Anonymizing Personal Data and Its Use as Open Data: Qualitative Insights
Published 2025-07-01“…<i><b>Discussion</b></i>: The findings highlight significant uncertainty among stakeholders regarding the anonymization of personal data. Although the importance and potential applications of open data for innovation and continuous improvement are widely acknowledged and supported, numerous challenges persist at both the macro and micro levels. …”
Get full text
Article -
1464
Enhancing Clinical Data Infrastructure for AI Research: Comparative Evaluation of Data Management Architectures
Published 2025-08-01“…ConclusionsThe optimal data management architecture for clinical applications depends on an organization’s specific needs, available resources, and strategic goals. …”
Get full text
Article -
1465
Data of REEs (Ce, Nd, Th) analysis from Bangka tin tailing applying froth flotation method using sodium oleate and KClO3Mendeley DataMendeley DataMendeley Data
Published 2024-12-01“…This article presented the data of REEs (Rare Earth Elements) analysis from exploitation of Bangka tin tailing, Indonesia. …”
Get full text
Article -
1466
Research support services in digital humanities: approaches, technologies, tools
Published 2025-01-01Subjects: “…data analytics, library services, big data, research data visualization, research services, european association for digital humanities, artificial intelligence applications, historical and cultural heritage resources, digital culture, digital humanities projects.…”
Get full text
Article -
1467
Account hijacking threat attack detection for OAuth2.0 authorization API
Published 2019-06-01“…OAuth2.0 protocol has been widely adopted to simplify user login to third-party applications,at the same time,existing risk of leaking user privacy data,what even worse,causing user accounts to be hijacked.An account hijacking attack model around authorization code was built by analyzing the vulnerabilities of the OAuth2.0 protocol.A vulnerable API identification method based on differential traffic analysis and an account hijacking verification method based on authorized authentication traffic monitoring was proposed.An account hijacking attack threat detection framework OScan for OAuth2.0 authorization API was designed and implemented.Through a large-scale detection of the 3 853 authorization APIs deployed on the Alexa top 10 000 websites,360 vulnerable APIs were discovered.The further verification showed that 80 websites were found to have threat of account hijacking attack.Compared with similar tools,OScan has significant advantages in covering the number of identity provider,the number of detected relying party,as well as the integrity of risk detection.…”
Get full text
Article -
1468
Agricultural informatization and big data
Published 2016-01-01“…The importance of the big data has been widely recognized since it is the main content of the“internet plus”action plan.Agriculture is an important application field of big data.Big data brings new opportunities for development for agricultural information monitoring and early warning.The problems of traditional agricultural development in China were introduced.The important role of the internet plus agriculture was expounded.The importance and specific measures of developing modern agriculture were analyzed.The proposed recommendations can improve the agricultural comprehensive production capacity,reduce the agricultural resources consumption,and provide reference for the construction of the modern agriculture based on the internet and big data technology.…”
Get full text
Article -
1469
Further Understanding of Big Data
Published 2015-05-01“…Widely applications of big data indicated that the information age will enter into a new stage. …”
Get full text
Article -
1470
The potential of obsidian "big data"
Published 2019-03-01“…Studies of obsidian provenance have been a core component of the archaeological sciences from the mid-1960s onward. With the growing application of portable X-ray Fluorescence Spectrometers (PXRF) in obsidian research, the number of such studies, and the amount of data generated per study, is rapidly increasing. …”
Article -
1471
Study and practice of data element circulation and transaction mode based on data intellectual property rights
Published 2025-01-01“…However, its application in data elements circulation and transaction is still in the initial stage, with problems such as inconsistent data standards, dispersed platform, and insufficient understanding, which need to be studied and solved. …”
Get full text
Article -
1472
Study and practice of data element circulation and transaction mode based on data intellectual property rights
Published 2025-07-01“…However, its application in data elements circulation and transaction is still in the initial stage, with problems such as inconsistent data standards, dispersed platform, and insufficient understanding, which need to be studied and solved. …”
Get full text
Article -
1473
Data-Efficient Reinforcement Learning Framework for Autonomous Flight Based on Real-World Flight Data
Published 2025-03-01“…Although reinforcement learning offers an alternative, its practical application in real-world settings is hindered by the substantial data requirements. …”
Get full text
Article -
1474
An algorithm for matching original experimental records based on improved CDC
Published 2022-09-01Subjects: Get full text
Article -
1475
The Qualitative Face of Big Data
Published 2020-12-01“…Apart from other confident attempts to improve these methods, phenomenology and ethnomethodology offer a fruitful account to develop innovative data sources for self-description. Yet, this approach does not support a recurrence of self-description’s previous application but proposes an epistemological shift towards more subtle observations. …”
Get full text
Article -
1476
The spatial glaciological data infrastructure
Published 2015-03-01“…The result of integration of the glaciological data technology application is the series of software and technology solutions. …”
Get full text
Article -
1477
ANALISIS INTEGRASI DATA PADA RELASIONAL BASIS DATA DENGAN MENGGUNAKAN METODE SCHEMA MATCHING
Published 2019-03-01“…University is one of the agencies that use information technology to support various business processes. University requires data integration between the systems so that the data available in one system can be used in other systems to support data management. …”
Get full text
Article -
1478
Advancements in Coded Computation: Integrating Encoding Matrices with Data Shuffling for Enhanced Data Transmission Efficiency
Published 2025-01-01“…This study delves into the fundamental principles, technological advantages, and applications of coded computation, emphasizing the integration of encoding matrices and data shuffling techniques. …”
Get full text
Article -
1479
On applicability of Bayes' formula
Published 2015-12-01“…And finally, the incorrect results obtained with the application of Bayes' formula are compared to the correct results calculated with the use of the proposed formula modifications by the example of the specific initial data. …”
Get full text
Article -
1480
A Method of Performance Optimization for Distributed Stream Data Processing in Vehicle Data Peak Scenario
Published 2022-12-01“…Actual project application results show that this method can effectively solve the problem of performance bottleneck when the processing rate of streaming data cannot keep up with the reading rate in the data flood scenario.…”
Get full text
Article