Showing 1,461 - 1,480 results of 50,948 for search 'data application', query time: 0.32s Refine Results
  1. 1461

    Evolution and gaps in data mining research: Identifying the bibliometric landscape of data mining in management by Romel Al-Ali, Sabri Mekimah, Rahma Zighed, Rima Shishakly, Mohammed Almaiah, Rami Shehab, Tayseer Alkhdour, Theyazn H.H Aldhyani

    Published 2025-01-01
    “…Despite a large number of publications, interdisciplinary applications of data mining are limited. The scientific publication on data mining and its relationship with decision-making, artificial intelligence, forecasting, and sentiment analysis is found to be weak, showing significant research gaps in these areas. …”
    Get full text
    Article
  2. 1462

    FedDAR: Federated Learning With Data-Quantity Aware Regularization for Heterogeneous Distributed Data by Youngjun Kwak, Minyoung Jung

    Published 2025-01-01
    “…Federated learning (FL) has emerged as a promising approach for collaboratively training global models and classifiers without sharing private data. However, existing studies primarily focus on distinct methodologies for typical and personalized FL (tFL and pFL), representing a challenge in exploring cross-applicable training methods. …”
    Get full text
    Article
  3. 1463

    Expert Experiences in Anonymizing Personal Data and Its Use as Open Data: Qualitative Insights by Norbert Lichtenauer, Johann Guggumos, Matthias Kampmann, Juliane Kis, Florian Laumer, Elena März, Florian Wahl, Sebastian Wilhelm

    Published 2025-07-01
    “…<i><b>Discussion</b></i>: The findings highlight significant uncertainty among stakeholders regarding the anonymization of personal data. Although the importance and potential applications of open data for innovation and continuous improvement are widely acknowledged and supported, numerous challenges persist at both the macro and micro levels. …”
    Get full text
    Article
  4. 1464

    Enhancing Clinical Data Infrastructure for AI Research: Comparative Evaluation of Data Management Architectures by Richard Gebler, Ines Reinecke, Martin Sedlmayr, Miriam Goldammer

    Published 2025-08-01
    “…ConclusionsThe optimal data management architecture for clinical applications depends on an organization’s specific needs, available resources, and strategic goals. …”
    Get full text
    Article
  5. 1465

    Data of REEs (Ce, Nd, Th) analysis from Bangka tin tailing applying froth flotation method using sodium oleate and KClO3Mendeley DataMendeley DataMendeley Data by Wiwik Dahan, Djoko Hartanto, Ratna Ediati, Rita Sundari, Subandrio, Irfan Marwanza

    Published 2024-12-01
    “…This article presented the data of REEs (Rare Earth Elements) analysis from exploitation of Bangka tin tailing, Indonesia. …”
    Get full text
    Article
  6. 1466

    Research support services in digital humanities: approaches, technologies, tools by Harahulia Serhii, Symonenko Tetiana

    Published 2025-01-01
    Subjects: “…data analytics, library services, big data, research data visualization, research services, european association for digital humanities, artificial intelligence applications, historical and cultural heritage resources, digital culture, digital humanities projects.…”
    Get full text
    Article
  7. 1467

    Account hijacking threat attack detection for OAuth2.0 authorization API by Qixu LIU, Kaili QIU, Yiwen WANG, Yanhui CHEN, Langping CHEN, Chaoge LIU

    Published 2019-06-01
    “…OAuth2.0 protocol has been widely adopted to simplify user login to third-party applications,at the same time,existing risk of leaking user privacy data,what even worse,causing user accounts to be hijacked.An account hijacking attack model around authorization code was built by analyzing the vulnerabilities of the OAuth2.0 protocol.A vulnerable API identification method based on differential traffic analysis and an account hijacking verification method based on authorized authentication traffic monitoring was proposed.An account hijacking attack threat detection framework OScan for OAuth2.0 authorization API was designed and implemented.Through a large-scale detection of the 3 853 authorization APIs deployed on the Alexa top 10 000 websites,360 vulnerable APIs were discovered.The further verification showed that 80 websites were found to have threat of account hijacking attack.Compared with similar tools,OScan has significant advantages in covering the number of identity provider,the number of detected relying party,as well as the integrity of risk detection.…”
    Get full text
    Article
  8. 1468

    Agricultural informatization and big data by Xiaobing WANG

    Published 2016-01-01
    “…The importance of the big data has been widely recognized since it is the main content of the“internet plus”action plan.Agriculture is an important application field of big data.Big data brings new opportunities for development for agricultural information monitoring and early warning.The problems of traditional agricultural development in China were introduced.The important role of the internet plus agriculture was expounded.The importance and specific measures of developing modern agriculture were analyzed.The proposed recommendations can improve the agricultural comprehensive production capacity,reduce the agricultural resources consumption,and provide reference for the construction of the modern agriculture based on the internet and big data technology.…”
    Get full text
    Article
  9. 1469

    Further Understanding of Big Data by Guo-jie LI

    Published 2015-05-01
    “…Widely applications of big data indicated that the information age will enter into a new stage. …”
    Get full text
    Article
  10. 1470

    The potential of obsidian "big data" by Mark Golitko

    Published 2019-03-01
    “…Studies of obsidian provenance have been a core component of the archaeological sciences from the mid-1960s onward. With the growing application of portable X-ray Fluorescence Spectrometers (PXRF) in obsidian research, the number of such studies, and the amount of data generated per study, is rapidly increasing. …”
    Article
  11. 1471

    Study and practice of data element circulation and transaction mode based on data intellectual property rights by JIN Jiahe, ZHOU Zhikai, ZHOU Wen, ZHANG Lijing, DU Xin

    Published 2025-01-01
    “…However, its application in data elements circulation and transaction is still in the initial stage, with problems such as inconsistent data standards, dispersed platform, and insufficient understanding, which need to be studied and solved. …”
    Get full text
    Article
  12. 1472

    Study and practice of data element circulation and transaction mode based on data intellectual property rights by JIN Jiahe, ZHOU Zhikai, ZHOU Wen, ZHANG Lijing, DU Xin

    Published 2025-07-01
    “…However, its application in data elements circulation and transaction is still in the initial stage, with problems such as inconsistent data standards, dispersed platform, and insufficient understanding, which need to be studied and solved. …”
    Get full text
    Article
  13. 1473

    Data-Efficient Reinforcement Learning Framework for Autonomous Flight Based on Real-World Flight Data by Uicheon Lee, Seonah Lee, Kyonghoon Kim

    Published 2025-03-01
    “…Although reinforcement learning offers an alternative, its practical application in real-world settings is hindered by the substantial data requirements. …”
    Get full text
    Article
  14. 1474
  15. 1475

    The Qualitative Face of Big Data by Alexander Nicolai Wendt

    Published 2020-12-01
    “…Apart from other confident attempts to improve these methods, phenomenology and ethnomethodology offer a fruitful account to develop innovative data sources for self-description. Yet, this approach does not support a recurrence of self-description’s previous application but proposes an epistemological shift towards more subtle observations. …”
    Get full text
    Article
  16. 1476

    The spatial glaciological data infrastructure by T. Y. Khromova, A. A. Medvedev

    Published 2015-03-01
    “…The result of integration of the glaciological data technology application is the series of software and technology solutions. …”
    Get full text
    Article
  17. 1477

    ANALISIS INTEGRASI DATA PADA RELASIONAL BASIS DATA DENGAN MENGGUNAKAN METODE SCHEMA MATCHING by Rifqi Hammad

    Published 2019-03-01
    “…University is one of the agencies that use information technology to support various business processes. University requires data integration between the systems so that the data available in one system can be used in other systems to support data management. …”
    Get full text
    Article
  18. 1478

    Advancements in Coded Computation: Integrating Encoding Matrices with Data Shuffling for Enhanced Data Transmission Efficiency by Yuan Shijie

    Published 2025-01-01
    “…This study delves into the fundamental principles, technological advantages, and applications of coded computation, emphasizing the integration of encoding matrices and data shuffling techniques. …”
    Get full text
    Article
  19. 1479

    On applicability of Bayes' formula by Alexander I. Dolgov

    Published 2015-12-01
    “…And finally, the incorrect results obtained with the application of Bayes' formula are compared to the correct results calculated with the use of the proposed formula modifications by the example of the specific initial data. …”
    Get full text
    Article
  20. 1480

    A Method of Performance Optimization for Distributed Stream Data Processing in Vehicle Data Peak Scenario by TANG Pengfei, HU Weimin, YANG Yongtao

    Published 2022-12-01
    “…Actual project application results show that this method can effectively solve the problem of performance bottleneck when the processing rate of streaming data cannot keep up with the reading rate in the data flood scenario.…”
    Get full text
    Article