Showing 1,721 - 1,740 results of 50,948 for search 'data application', query time: 0.20s Refine Results
  1. 1721

    Optimizing Industrial IoT Data Security Through Blockchain-Enabled Incentive-Driven Game Theoretic Approach for Data Sharing by Muhammad Noman Sohail, Adeel Anjum, Iftikhar Ahmed Saeed, Madiha Haider Syed, Axel Jantsch, Semeen Rehman

    Published 2024-01-01
    “…However, in the Industrial Internet of Things (IIoT), the sharing of data has bandwidth, computational, and privacy issues. …”
    Get full text
    Article
  2. 1722
  3. 1723

    TIGPR: A multi-view ground penetrating radar detection data for damage assessment of transportation infrastructure(Mendeley Data). by Zhen Liu, Bingyan Cui, Xingyu Gu

    Published 2025-06-01
    “…Data acquisition was performed using 2D and 3D GPR systems, including IDS-FastWave, MALA GX750, and GeoScope 3D-Radar. …”
    Get full text
    Article
  4. 1724

    Copyright Data Dilemma of Building High-Quality Data System for AI: Present Situation, Coping Strategies, and Implementation Path by Hecan ZHANG, Chengqi YI, Peng GUO, Qianqian HUANG, Xiaokun JIN

    Published 2024-09-01
    “…[Method/Process] Based on the academic research and industrial practice on the copyright protection of AI data, this study systematically summarizes six representative approaches to address the copyright dilemma of AI training data, and provides a comparative analysis of the advantages, disadvantages, and applicability of these approaches. …”
    Get full text
    Article
  5. 1725
  6. 1726

    Data Journalism in Turkey: Developing a Scale and Measuring Journalists’ Skills by Seçil Özay, Serkan Bayrakcı

    Published 2022-12-01
    “…As a result of the item pool, expert views, and the scale application stages, it is understood that data journalism skills can be measured with a 2-factor structure: “data skills and tools” and “journalism skills.” …”
    Get full text
    Article
  7. 1727

    Sharing is CAIRing: Characterizing principles and assessing properties of universal privacy evaluation for synthetic tabular data by Tobias Hyrup, Anton Danholt Lautrup, Arthur Zimek, Peter Schneider-Kamp

    Published 2024-12-01
    “…To the best of our knowledge, this is the first work to identify properties that constitute good universal privacy evaluation metrics for synthetic tabular data. The goal of universally applicable metrics is to enable comparability across studies and to allow non-technical stakeholders to understand how privacy is protected. …”
    Get full text
    Article
  8. 1728

    Research on the Data Technology of LKJ-15 System by FANG Guanghua

    Published 2018-01-01
    “…Considering the present application status of LKJ infrastructure data, and the Chinese railway transportation demands such as the current railway line construction and operation adjustment, and the application of long locomotive routing, data modeling and data application technology were researched from the perspectives of technical standards, the LKJ-15 system data structure and data application. …”
    Get full text
    Article
  9. 1729

    Overcoming the Barriers That Obscure the Interlinking and Analysis of Clinical Data Through Harmonization and Incremental Learning by Vasileios C. Pezoulas, Konstantina D. Kourou, Fanis Kalatzis, Themis P. Exarchos, Evi Zampeli, Saviana Gandolfo, Andreas Goules, Chiara Baldini, Fotini Skopouli, Salvatore De Vita, Athanasios G. Tzioufas, Dimitrios I. Fotiadis

    Published 2020-01-01
    “…<italic>Results:</italic> The applicability of the framework is demonstrated in a case study of primary Sj&#xf6;gren's Syndrome, yielding harmonized data with increased quality and more than 85% agreement, along with lymphoma prediction models with more than 80% sensitivity and specificity. …”
    Get full text
    Article
  10. 1730

    Real time Data Acquisition of Solar Panel by Youssef Rehouma, Mohamed Abd El basset Mahboub, Aicha Degla, Djafer Ghorma, Ahmed Abd Alouareth Nadjemi

    Published 2022-06-01
    “…The system consists of an Arduino Uno board, the controllership, which is programmed by the Arduino IDE application, based on the C language, and sensors to capture the variables, we put the SD card to save the data and the LCD to see it currently and can be monitoring the data by connecting the Arduino Uno board to the computer and processing it with the Excel application.…”
    Get full text
    Article
  11. 1731

    Numerical Simulation of Protective Spraying by Helicopter-Type Unmanned Aerial Vehicles by V. P. Asovsky, A. S. Kuzmenko

    Published 2024-09-01
    “…The paper illustrates the implementation features of the system’s main blocks and modules, including modeling the inductive wave of a multicopter, droplet deposition, working fluid application indicators and fullarea coverage. The adequacy, reliability, and acceptable accuracy of the modeling results are validated through comparison with experimental data. …”
    Get full text
    Article
  12. 1732
  13. 1733

    Blockchain Technology for Secure Patient Data Sharing by Robert-Stefan CIZMAŞ

    Published 2025-05-01
    “…Since the aim of our project is to develop a complex application for secure data patient sharing, there were no qualitative results measured yet, but will be presented once all proposed features will be implemented. …”
    Get full text
    Article
  14. 1734
  15. 1735

    Bayesian semiparametric inference in longitudinal metabolomics data by Abhra Sarkar, Ornella Cominetti, Ivan Montoliu, Joanne Hosking, Jonathan Pinkney, Francois-Pierre Martin, David B. Dunson

    Published 2024-12-01
    “…Abstract The article is motivated by an application to the EarlyBird cohort study aiming to explore how anthropometrics and clinical and metabolic processes are associated with obesity and glucose control during childhood. …”
    Get full text
    Article
  16. 1736

    DATA-DRIVEN WAREHOUSE SITE SELECTION IN BUCHAREST by Marin-Mihail Patru

    Published 2025-06-01
    “…Using remote sensing, GIS and optimization, a flexible system of real-time data-driven decisions for industrial engineering application was developed. …”
    Get full text
    Article
  17. 1737

    Big data, dementia prediction and knowledge organization by D. Grant Campbell

    Published 2025-06-01
    “…This paper uses principles of knowledge organization to explore the application of big data algorithms to the task of predicting dementia diagnoses. …”
    Get full text
    Article
  18. 1738

    Privacy preservation in self-governing openness of data by Zhihui WANG, Xuchen ZHOU, Yun ZHU

    Published 2018-03-01
    “…The openness of data is very important for improving the application value of data resource.However,due to the consideration of privacy preservation,data should be open under supervision.That is,data should be in the mode of selfgoverning openness.For challenges that self-governing openness of data may bring,a possible system framework for the privacy preservation of a data box was presented.The system framework carries out the privacy disclosure risk evaluation for the data usage declaration of a data user,and then determines whether the corresponding data usage request can be authorized or not on the basis of evaluation results,and thus supports the implementation of self-governing openness of data.…”
    Get full text
    Article
  19. 1739

    Big data security features and operation practices by Zhiyong LIU, Zhongjiang HE, Yilong RUAN, Junfeng SHAN, Chao ZHANG

    Published 2021-05-01
    “…With the continuous refinement of data types, user roles and application requirements, as well as the complex data storage and flow scenarios of big data, the requirement of big data security is higher and higher.Starting from the security characteristics and operation practice of big data, the security characteristics and technology development trend of big data were analyzed, the construction and operation practice of China Telecom’s big data security defense system with “data and people” as the core was systematically summarized.Some thoughts and prospects for the introduction of new technologies were also raised such as blockchain, federated learning, artificial intelligence and zero trust in data security circulation, data security risk monitoring and data access control.…”
    Get full text
    Article
  20. 1740

    Construction of enterprise data asset operation platform by Xiaozheng DU, Xiaofei WANG, Na LI, Lei LOU, Xin LIN

    Published 2024-03-01
    “…It has become a social consensus that data is the core strategic asset for enterprises.In the wave of digital transformation, businesses drive digitization through data resource utilization and commercialization to fully unleash data asset value.This paper examines how to establish a practical management system by effective data asset operations from the supply side, so as to enhance data quality and security.It also explores how to connect internal and external data by data asset operations from the demand side, so as to foster deep integration with business and enriching data asset application scenarios.The data asset operation platform supports the operational loop of data assets, enabling online, standardized, and configurable processes, meeting the needs for automated and intelligent operations.…”
    Get full text
    Article