Search alternatives:
collect » collected (Expand Search)
Showing 1 - 20 results of 48,913 for search 'data collect (method OR methods)', query time: 0.41s Refine Results
  1. 1

    Efficient Data Collection Method in Sensor Networks by Keyan Cao, Haoli Liu, Yefan Liu, Gongjie Meng, Si Ji, Gui Li

    Published 2020-01-01
    “…However, due to the low battery capacity of sensor nodes and environmental changes, the energy consumption of nodes is serious and the accuracy of data collection is low. In the data collection method of multiple random paths, due to the uneven geographical distribution between nodes and the influence of the environment, it is easy to cause the communication between nodes to be blocked and the construction of random paths to fail. …”
    Get full text
    Article
  2. 2

    Methods of Collecting User Data in the Process of Building Commercial Website by Dariusz Strzębicki

    Published 2012-06-01
    “…The paper discusses different research methods that can be used in order to collect data on potential users when planning and building a company Website. …”
    Get full text
    Article
  3. 3

    Methods for Collecting Data Based Upon an Eastern Paradigm of Evaluation by Craig Russon

    Published 2019-04-01
    “…Purpose: The authors examine data collection methods through the lens of Eastern Philosophy. …”
    Get full text
    Article
  4. 4

    Methods for community-engaged data collection and analysis in implementation research by Lawrence A. Palinkas, Benjamin Springgate, Leopoldo J. Cabassa, Michelle Shin, Samantha Garcia, Benjamin F. Crabtree, Jennifer Tsui

    Published 2025-04-01
    “…Methods We describe three specific methods for engaging community members in data collection and analysis: concept mapping, rapid ethnographic assessment, and Photovoice. …”
    Get full text
    Article
  5. 5
  6. 6

    Secure data collection method of WSN based on mobile Sink by Chunyu MIAO, Yuan FAN, Hui LI, Kaiqiang GE, Xiaomeng ZHANG

    Published 2021-02-01
    “…At present, WSN data collection method based on mobile Sink has some problems, such as low detection rate of network attack and large memory cost, which makes the network vulnerable to network attack and difficult to be applied in practice.To solve this problem, a secure data collection WSN method of WSN based on mobile Sink was proposed, which used convex hull algorithm of energy perception to identify data collection points, used elliptic encryption algorithm (ECC) to generate key for all nodes in the network, used ElGamal algorithm to realize node identity and message authentication, and used support vector machine (SVM) to identify network attack types.The simulation results show that the proposed secure data collection method has good performance in attack detection rate, memory overhead and packet delivery rate.…”
    Get full text
    Article
  7. 7
  8. 8

    An Energy-Efficient Data Collection Method for Wireless Multimedia Sensor Networks by Ilkyu Ha, Mamurjon Djuraev, Byoungchul Ahn

    Published 2014-09-01
    “…When a mobile sink is used, a lot of energy is saved, and the lifetime of the network can be extended because the sensor nodes do not need to transmit multimedia data to a far distant base station. We propose an energy-efficient data collection method to extend the lifetime of networks that use a mobile sink. …”
    Get full text
    Article
  9. 9

    Methods for identifying health status from routinely collected health data: An overview by Mei Liu, Ke Deng, Mingqi Wang, Qiao He, Jiayue Xu, Guowei Li, Kang Zou, Xin Sun, Wen Wang

    Published 2025-03-01
    “…The use of routinely collected health data (RCD) is currently helping to accelerate publications that evaluate the effectiveness and safety of medicines and medical devices. …”
    Get full text
    Article
  10. 10

    Carbon footprinting of railway infrastructure: a standardized, consistent data collection method by Tracey Najafpour Navaei, Simon Blainey, John Preston, William Powrie

    Published 2024-12-01
    “…Use of this form will ensure a standardized and consistent approach in data collection methods, enabling the creation of carbon footprints for small scale case studies of individual railway earthworks (around 100 m linear length) with a specific focus on the construction life cycle stages. …”
    Get full text
    Article
  11. 11
  12. 12
  13. 13
  14. 14
  15. 15

    Shuffled differential privacy protection method for K-Modes clustering data collection and publication by Weijin JIANG, Yilin CHEN, Yuqing HAN, Yuting WU, Wei ZHOU, Haijuan WANG

    Published 2024-01-01
    “…Aiming at the current problem of insufficient security in clustering data collection and publication, in order to protect user privacy and improve data quality in clustering data, a privacy protection method for K-Modes clustering data collection and publication was proposed without trusted third parties based on the shuffled differential privacy model.K-Modes clustering data collection algorithm was used to sample the user data and add noise, and then the initial order of the sampled data was disturbed by filling in the value domain random arrangement publishing algorithm.The malicious attacker couldn’t identify the target user according to the relationship between the user and the data, and then to reduce the interference of noise as much as possible a new centroid was calculated by cyclic iteration to complete the clustering.Finally, the privacy, feasibility and complexity of the above three methods were analyzed from the theoretical level, and the accuracy and entropy of the three real data sets were compared with the authoritative similar algorithms KM, DPLM and LDPKM in recent years to verify the effectiveness of the proposed model.The experimental results show that the privacy protection and data quality of the proposed method are superior to the current similar algorithms.…”
    Get full text
    Article
  16. 16

    Data Tracking and Effect of Frequency Offset to Simultaneous Collecting Method for Wireless Sensor Networks by Ryo Myoenzono, Osamu Takyu, Keiichiro Shirai, Takeo Fujii, Mai Ohta, Fumihito Sasamori, Shiro Handa

    Published 2015-08-01
    “…In the packet access of wireless sensor networks, a distributed access protocol is employed to avoid packet collision but it also causes delay. Therefore, real time data collection is difficult. In wireless communication for simultaneous multidata collection (WC-SDC), sensed data are projected onto the parameters of the wireless communication. …”
    Get full text
    Article
  17. 17

    Secure Data Collection Method Based on Quantum Encryption Algorithm for Power IoT Gateway by ZHANG Jingxin, CHEN Chao, ZHANG Ping

    Published 2025-06-01
    “…In order to realize the secure and high-efficiency collection of electric power IoT gateway data, the secure collection method of electric power IoT gateway data based on quantum encryption algorithm is proposed. …”
    Get full text
    Article
  18. 18
  19. 19
  20. 20

    Measuring Illicit Financial Flows: New Data and Methods by Gilles Carbonnier, Rahul Mehrotra

    Published 2024-05-01
    “…This has been compounded by a lack of consensus over IFF definitions together with poor data and weak methods. Drawing on six years of interdisciplinary research into commodity trade–related IFFs, this chapter examines novel data sources and recent methodological advances that researchers and regulators can draw upon to better capture and eventually reduce IFFs. …”
    Get full text
    Article