Showing 15,881 - 15,900 results of 50,948 for search 'data application', query time: 0.33s Refine Results
  1. 15881
  2. 15882
  3. 15883

    Models and scenarios of implementation of threats for internet resources by S. A. Lesko

    Published 2020-12-01
    “…Cross-site scripting as well as SQL-injection attacks are related to validating input data. The mechanisms of these attacks are very similar, but in the XSS attacks the user is the victim, and in the SQL injection attacks, the database server of the Web application. …”
    Get full text
    Article
  4. 15884

    Smart Tools for Smart Learning: IoT-Based Landslide Early Warning System with TILT Sensors and Apps by Fatmaryanti Siska Desy, Al Hakim Yusro, Widoyoko Sugeng Eko Putro, Akhdinirwanto Raden Wakhid

    Published 2025-01-01
    “…These sensors are connected to the BLINK application, which serves as an easy-to-use interface for data visualization and real-time alerting. …”
    Get full text
    Article
  5. 15885

    Industrial robots reduce carbon emissions in manufacturing through global value chains by Yongliang Zhang, Jianing Zhu, Shali Wang

    Published 2025-07-01
    “…This paper, from the perspective of the manufacturing industry’s embeddedness in the global value chain, utilizes world input-output tables and data related to the application of industrial robots to conduct an empirical analysis of the impact and mechanisms by which industrial robot application affects carbon emissions in the global manufacturing sector. …”
    Get full text
    Article
  6. 15886

    Privacy protection scheme based on fair blind signature and hierarchical encryption for consortium blockchain by Xuewang ZHANG, Zhihong LI, Jinzhao LIN

    Published 2022-08-01
    “…To solve the security hazards of identity information and transaction data and the time-consuming problem of traditional single-level encryption methods in the current application scenarios of consortium blockchain, a privacy protection scheme of consortium blockchain based on fair blind signature and hierarchical encryption was proposed.Considering the strong centrality and poor security of the existing fair blind signature scheme, it was redesigned with zero-knowledge proof technology to be applicable for consortium blockchain application scenario.Based on the Paillier homomorphic encryption algorithm, a supervisable hierarchical encryption method was designed, and the method realized the supervision of encrypted transaction data information and reduced the time cost of the encryption and decryption process.The security analysis and simulation results show that the proposed scheme can effectively resist malicious attacks such as tampering and eavesdropping and significantly improve the encryption efficiency.…”
    Get full text
    Article
  7. 15887

    A trusted IoT architecture model by Ansheng YIN, Shijun ZHANG

    Published 2017-10-01
    “…The internet of things (IoT) has been widely concerned and developed in the world,and its security has been paid more and more attention.However,due to the characteristics of the IoT itself,a lot of security measures in the internet field can’t be applied directly.The current security strategy mainly provide solutions according to the threat of the IoT one by one.In face of increasingly intelligent,systematic,integrated security threats,a trusted IoT architecture of two layers and tri-elements,which brought about a whole trusted security mechanism according to the function of IoT.Starting with the integrity and safety inspection of hardware and software of sensor devices,the trusted chain was transmitted until the application layer,and data was processed according to behavior trusted value in application layer.At the same time,the control function and the data function were separated,and the security strategies cooperated and verified with each other,therefore improving the ability of the IoT to deal with security threats effectively.…”
    Get full text
    Article
  8. 15888

    Overview of smart sensors based on machine learning by Wang Shuaida, Lin Guanying, Wang Nuansheng, Li Yang, Yin Meihua

    Published 2025-03-01
    “…With the rapid development of machine learning, intelligent models created by machine learning algorithms are gradually becoming the core part of new sensor data analysis. The paper firstly introduces the background of intelligent sensors that support machine learning, briefly describes the construction of intelligent models and the generation, verification and testing process of data sets, then lists the application of intelligent sensors based on machine learning, finally points out the current problems and challenges of intelligent sensors based on machine learning and puts forward feasible solutions to provide valuable academic reference for relevant researchers.…”
    Get full text
    Article
  9. 15889

    Penerapan Maksim Grice dalam Iklan Jual Beli Gadget pada Komunitas r/AppleSwap: Analisis Pragmatik dan Wacana by Nanang Syaifudin, Hayatul Cholsy

    Published 2025-05-01
    “…The data were then analyzed qualitatively to examine the application of maxims and quantitatively to calculate the frequency of violations. …”
    Get full text
    Article
  10. 15890

    Fault Diagnosis of Wind-turbine Gearboxes based on Fourier Decomposition Method by Lin Jinshan, Dou Chunhong, Zhao Guangsheng, Yin Jianhua

    Published 2018-01-01
    “…For this reason,EMD in practical application is confronted by many problems,which make EMD hard to extract fault features from vibration data of complex wind-turbine gearboxes. …”
    Get full text
    Article
  11. 15891

    Mapping Your World with Community Analyst: An Easy to Use Tool to Map the Characteristics of U.S. Communities by Robert Swett, Lisa Krimsky

    Published 2014-02-01
    “…This article presents Community Analyst, a web application that provides access to thousands of business, demographic, economic, education, and health data variables for the United States. …”
    Get full text
    Article
  12. 15892

    Design and Implementation of One Map of Watershed Water Conservancy by GAN Haoxin, WANG Zhilong

    Published 2021-01-01
    “…Given the needs of watershed water conservancy management and the requirements of intelligent water conservancy construction,this study adopts the construction and operation mode of “joint construction,shared use,business update and intensive maintenance”,to build One Map of watershed water conservancy that is “dynamic,vivid,three-dimensional,intelligent,safe and reliable” based on the national water conservancy map.Through technological innovation in the fields of data,model,platform and application,this study aims to guide the construction practice of One Map of Pearl River water conservancy,so as to build One Map big data center,One Map service cloud platform,One Map intelligent application,One Map normative system,etc.for Pearl River Basin.This study supports multi-dimensional information query and analysis,rapid construction of special applications,construction of professional systems based on unified maps,and full aggregation display of business achievements,promoting the construction of digital twin watershed.…”
    Get full text
    Article
  13. 15893
  14. 15894
  15. 15895

    Game Edukasi Pengenalan Sistem Isyarat Bahasa Indonesia (SIBI) Menggunakan Myo Armband pada Arsitektur Client Server by Rizky Yuniar Hakkun, M. Rizky, Buchori Rafsanjani

    Published 2022-06-01
    “…Platform tersebut memiliki kemampuan untuk mengenal gerakan tangan yang diperoleh dari data sensor Myo Armband. Aplikasi yang berada sisi frontend dapat menggunakan fitur platform melalui Application Programming Interface (API) yang disediakan. …”
    Get full text
    Article
  16. 15896

    On developing a module for the stressFOAM solver of the OpenFOAM environment by Chitalov Dmitry

    Published 2025-01-01
    “…The purpose of the stressFOAM solver and its basic application field are described. A stack of technologies to implement a graphical, software component of the application, data storage system is defined. …”
    Get full text
    Article
  17. 15897
  18. 15898
  19. 15899

    A physical state prediction method based on reduce order model and deep learning applied in virtual reality by Pengbo Yu, Qiyu Liu, Qiyu Liu, Qiyu Liu, Qiyu Liu, Siyun Yi, Ming Zhu, Yangheng Hu, Gexiang Zhang, Gexiang Zhang

    Published 2025-08-01
    “…The application of virtual reality (VR) in industrial training and safety emergency needs to reflect realistic changes in physical object properties. …”
    Get full text
    Article
  20. 15900

    GSD-YOLO: A Lightweight Decoupled Wheat Scab Spore Detection Network Based on Yolov7-Tiny by Dongyan Zhang, Wenfeng Tao, Tao Cheng, Xingen Zhou, Gensheng Hu, Hongbo Qiao, Wei Guo, Ziheng Wang, Chunyan Gu

    Published 2024-12-01
    “…In addition, we utilize an improved Spore–Copy data augmentation strategy to improve the detection performance and generalization ability of the algorithm to fit the large numbers, morphology, and variety of wheat disease spores in the actual field and to improve the efficiency of constructing a large data set of diverse spores. …”
    Get full text
    Article