Showing 16,801 - 16,820 results of 50,948 for search 'data application', query time: 0.36s Refine Results
  1. 16801

    Comparing Fast Fourier Transform and Prony Method for Analysing Frequency Oscillation in Real Power System Interconnection by Didik Fauzi Dakhlan, Joko Muslim, Indra Kurniawan, Kevin Marojahan Banjar-Nahor, Bambang Anggoro Soedjarno, Nanang Hariyanto

    Published 2025-05-01
    “…To assess power system oscillations and demonstrate the actual application in a real grid system, this research compares two popular signal processing methods: Prony’s approach and the Fast Fourier Transform from Phasor Measurement Unit data in the Java Bali (Indonesia) power system interconnection. …”
    Get full text
    Article
  2. 16802

    User Satisfaction Analysis of University of Jember's UC3 using EUCS Approach by Martiana Kholila Fadhil, Muhammad Riza Darmawan

    Published 2025-09-01
    “…The UC3 service is the University of Jember's integrated digital platform, facilitating academic services including diploma applications, service complaints, and campus problem reporting. …”
    Get full text
    Article
  3. 16803

    Inspection of railway catenary systems using machine learning with domain knowledge integration by Kacper Marciniak, Paweł Majewski, Jacek Reiner

    Published 2025-08-01
    “…This objective is achieved by assessing the technical condition of the infrastructure and maintaining a comprehensive inventory of its components. The application of machine learning methods to this problem is non-trivial, due to various constraints, including the cost of data acquisition. …”
    Get full text
    Article
  4. 16804

    Two-party cooperative blind signature based on SM2 by Xue BAI, Baodong QIN, Rui GUO, Dong ZHENG

    Published 2022-12-01
    “…SM2, issued by China in 2010, is a public key cryptography standard based on elliptic curves.It has been widely used in finance, social security and other fields thanks to its advantages of improved signature efficiency, decreased storage space and computing complexity than RSA.With the popularization and application of SM2, the issues of its key security and data privacy are of great concern.The single-key mode inhibits the potential application in multi-user settings, and the leakage of the key will threaten the security of the entire cryptosystem due to the centralization.The problem of secure storage and reasonable utilization of keys needs to be solved urgently.In addition, the SM2 digital signature algorithm cannot guarantee the message privacy.Aiming at the issues of key security and data privacy of the signature algorithm, many researchers have proposed the idea of cooperative signature and blind signature for SM2.However, there isn’t SM2 collaborative blind signature scheme proposed.Then a two-party cooperative blind signing protocol based on SM2 was proposed in this paper, which allowed two parties to sign except the user.The signing process did not require recovering the complete private key, while not revealing the information of the partial private key and secret number.The key was stored separately to improve the security of the key, while the blind signature protected the privacy of the message.In terms of security, the protocol satisfied unforgeability and unlinkability.The protocol was implemented using C to demonstrate the efficiency of each participant’s local operation.In the honest model, the time cost of each entity in the cooperative signature phase was similar as that of executing a lightweight SM2 blind signature.Overall, the proposed protocol has certain advantages in terms of function and efficiency.…”
    Get full text
    Article
  5. 16805
  6. 16806
  7. 16807

    Healthcare Provider’s Knowledge about Childhood Autism at Baghdad Medical City by Aysen Kamal Muhammed Noor, Bayda'a Abdul Kareem Ismail

    Published 2024-06-01
    “…Data was analyzed through the application of the descriptive statistical analysis (frequency, percentage, mean, and mean of score). …”
    Get full text
    Article
  8. 16808

    MAN 4 Aceh Besar في تدريس الاستماع بـــ Fun Easy Learn Arabic استخدام برنامج by Rizqia Ulfa, Salami Mahmud

    Published 2024-12-01
    “…The tools used to collect data were a test list, namely pre-test and post-test. …”
    Get full text
    Article
  9. 16809

    FDIA Attack Detection Technique for Smart Grids Based on Graph Reconstruction and Spatio-Temporal Joint Modeling by Gao Yuzhang, Xia Jing

    Published 2025-01-01
    “…With the widespread application of smart grids, the false data injection attack (FDIA) has become a major threat to power grid security. …”
    Get full text
    Article
  10. 16810

    HBIM, 3D drawing and virtual reality for archaeological sites and ancient ruins by Fabrizio Banfi

    Published 2020-07-01
    “…Data collection, documentation and analysis of the traces of ancient ruins and archaeological sites represent an inestimable value to be handed down to future generations. …”
    Get full text
    Article
  11. 16811
  12. 16812

    A Study of Betawi Architecture in Setu Babakan, Jakarta by Margareta Maria Sudarwani, Galuh Widati, Nousli Betna G.S, Jessica Putri

    Published 2021-04-01
    “…The research method used a descriptive method based on empirical facts. The data of this research consisted of primary and secondary data obtained from literature and existing field conditions. …”
    Get full text
    Article
  13. 16813

    INFORMATION TECHNOLOGY ADOPTION IN NIGERIAN LOCAL GOVERNMENT ADMINISTRATION; PERSPECTIVES CHALLENGES AND PROSPECTS by NASIRU SULE, KAMILU ISHAQ

    Published 2024-07-01
    “…The paper adopted the qualitative / secondary method of data collection and analysis. It used theoretical perspectives of the democratic participation, globalization, development school and localist. …”
    Get full text
    Article
  14. 16814

    Assessment of Hydration Mechanisms, Rheological Behavior, and Sorptivity of Portland Cement Pastes Using Low-Cost Arduino Platform-Based Sensors by Kalsoom Akash, Muhammad Ali Sikandar, Bakht Zamin, Abid Haider, Mahmood Ahmad, Mohanad Muayad Sabri Sabri

    Published 2022-01-01
    “…The recorded temperature and moisture content data were transmitted using the Android application and the Wi-Fi modem router. …”
    Get full text
    Article
  15. 16815

    Financing of scientific research projects at the University of Defence by Knežević Milena, Trifunović Dragana, Đukić Slobodan

    Published 2025-01-01
    “…Using SPSS software, financial data was analyzed with the aim of enhancing the management of scientific research projects at the University of Defence. …”
    Get full text
    Article
  16. 16816

    Integration of Biochar with Vermicompost and Compost Improves Agro-Physiological Properties and Nutritional Quality of Greenhouse Sweet Pepper by Mohamed M. EL-Mogy, Mohamed A. Adly, Mohamed M. Shahein, Hassan A. Hassan, Sayed O. Mahmoud, Emad A. Abdeldaym

    Published 2024-11-01
    “…All applied treatments were distributed randomly, and each treatment was repeated three times over two seasons. The data analysis revealed that the application of vermicompost—alone or in combination with biochar—significantly increased the plant growth measurements (plant height, SPAD value, leaf area, No. of leaves, and No. of branches), leaf nutrient content (N, P, K, and Ca), and total yield in both seasons. …”
    Get full text
    Article
  17. 16817
  18. 16818
  19. 16819
  20. 16820