Search alternatives:
applications » application (Expand Search)
Showing 1,441 - 1,460 results of 50,948 for search 'data applications', query time: 0.36s Refine Results
  1. 1441

    Optimizing Customer Data Security in Water Meter Data Management Based on RESTful API and Data Encryption Using AES-256 Algorithm by Syahrul Adrianto, Bambang Agus Herlambang, Ramadhan Renaldy

    Published 2025-06-01
    “…This research aims to develop a web application-based information system to manage customer water meter data at a regional water company in Semarang. …”
    Get full text
    Article
  2. 1442

    A new family of generalized distributions based on logistic-x transformation: sub-model, properties and useful applications by Okechukwu J. Obulezi, Happiness O. Obiora-Ilouno, George A. Osuji, Mohamed Kayid, Oluwafemi Samson Balogun

    Published 2025-03-01
    “…Additionally, Bitcoin’s volatility was modeled using an exponential GARCH (eGARCH) framework, validating the NGLXT-E distribution’s applicability to financial data. This research significantly contributes to statistical literature by proposing a flexible new family of distributions, advancing parameter inference techniques, and demonstrating practical superiority across real-world datasets.…”
    Get full text
    Article
  3. 1443

    The representative deficit in different European Party Systems: an analysis of the elections to the European Parliament 2009-2014 by Jonathan Bright, Diego Garzia, Joseph Lacey, Alexander H. Trechsel

    Published 2020-07-01
    “…We measure the extent of this deficit in different European countries using data from EU Profiler and euandi, two Voting Advice Applications which served millions of users during the EP elections in 2009 and 2014 respectively. …”
    Get full text
    Article
  4. 1444

    Mobile health technologies in inflammatory bowel disease: a narrative review by Adam M. Burton, Bryce K. Perler

    Published 2025-08-01
    “…Health apps offer unique opportunities for an integrated management strategy, empowering patients to have more involvement in their care, and providing clinicians with real-time clinical data to tailor more personalized treatment plans.…”
    Get full text
    Article
  5. 1445

    Evaluating Diversity Metrics: A Critique of the Equity Index Method by Kenneth D. Royal, Keven Flammer

    Published 2015-11-01
    “…Data Collection and Analysis: Not Applicable. Findings: Despite the potential for problems with interpretations based on small samples and subgroups and some concerns about semantics involving the term “equity”, we believe the EIM possesses a number of strengths that many evaluators will find useful. …”
    Get full text
    Article
  6. 1446
  7. 1447
  8. 1448
  9. 1449

    Application of Machine Learning Technologies for Managing Multifactor Threats in an Integrated Model of Cognitive Security Center at Defense Industry Enterprise by Pavel Panilov, Tatiana Tsibizova

    Published 2024-03-01
    “…This article provides a detailed examination of key elements of this model, including data analysis, anomaly detection, threat response, classification and optimization, as well as the notification system. …”
    Get full text
    Article
  10. 1450

    Correction: How FAIR Is Bioarchaeological Data: With a Particular Emphasis on Making Archaeological Science Data Reusable by Alphaeus Lien-Talks

    Published 2024-12-01
    “…How FAIR Is Bioarchaeological Data: With a Particular Emphasis on Making Archaeological Science Data Reusable. …”
    Get full text
    Article
  11. 1451

    CNC machining data repository: Geometry, NC code & high-frequency energy consumption data for aluminum and plastic machiningMendeley Data by Markus Brillinger, Muaaz Abdul Hadi, Stefan Trabesinger, Johannes Schmid, Florian Lackner

    Published 2025-08-01
    “…Data is often referred to as the ``oil of the future,'' playing a crucial role in various applications, including the training of machine learning models. …”
    Get full text
    Article
  12. 1452
  13. 1453

    The research on enhancing LA estimation accuracy across domains for small sample data based on data augmentation and data transfer integration optimization system by Ai-Dong Wang, Rui-Jie Li, Xiang-Qian Feng, Zi-Qiu Li, Wei-Yuan Hong, Hua-Xing Wu, Dan-Ying Wang, Song Chen

    Published 2025-12-01
    “…Objective: In this research, our goal is to develop a novel framework to mitigate prediction biases in LA caused by sample limitations and data heterogeneity. This framework integrates machine learning models to establish a universal solution for cross-domain LA estimation in data-scarce situations. …”
    Get full text
    Article
  14. 1454
  15. 1455
  16. 1456
  17. 1457

    Evolution and gaps in data mining research: Identifying the bibliometric landscape of data mining in management by Romel Al-Ali, Sabri Mekimah, Rahma Zighed, Rima Shishakly, Mohammed Almaiah, Rami Shehab, Tayseer Alkhdour, Theyazn H.H Aldhyani

    Published 2025-01-01
    “…Despite a large number of publications, interdisciplinary applications of data mining are limited. The scientific publication on data mining and its relationship with decision-making, artificial intelligence, forecasting, and sentiment analysis is found to be weak, showing significant research gaps in these areas. …”
    Get full text
    Article
  18. 1458

    The problem of analysis of big web data and the use of data mining technology for processing and searching patterns in big web data on a practical example by K. V. Mulyukova, V. M. Kureichik

    Published 2019-05-01
    “…According to the results of the study, it can be argued that the current state of technology for analyzing large web data allows you to efficiently process data objects, identify patterns, get hidden data and get full-fledged statistical data.The obtained results can be used both for the purpose of the initial study of big data processing technologies, and as a basis for developing an already real application for analyzing web data. …”
    Get full text
    Article
  19. 1459

    Holistic Survey on Security in IoT Application Layer: Attacks, Protocols, and Applications by N. Sharmila Kumari, H. S. Vimala, C. N. Pruthvi, J. Shreyas

    Published 2024-01-01
    “…Context: The growing number of linked devices, the limitations of some IoT devices, worries about data privacy, risks to physical safety, and the ever-changing threats all highlight why it’s crucial to have strong security measures in the IoT application layer. …”
    Get full text
    Article
  20. 1460