Search alternatives:
like » life (Expand Search)
Showing 3,221 - 3,240 results of 5,467 for search 'data processing like', query time: 0.15s Refine Results
  1. 3221

    Land-use and socioeconomic time-series reveal legacy of redlining on present-day gentrification within a growing United States city. by Peter C Ibsen, Anna Bierbrauer, Lucila M Corro, Zachary H Ancona, Mark Drummond, Kenneth J Bagstad, Jay E Diffendorfer

    Published 2025-01-01
    “…We found changes in these demographic patterns also occurred between 2000 and 2019, highlighting how processes like gentrification can develop from both rapid demographic and land-use changes. …”
    Get full text
    Article
  2. 3222

    Anonymous group key distribution scheme for the internet of vehicles by Zhiwang HE, Huaqun WANG

    Published 2023-10-01
    “…Vehicular ad hoc networks (VANET) play a crucial role in intelligent transportation systems by providing driving information and services such as collision prevention and improved traffic efficiency.However, when a trusted third party (TTP) interacts with a vehicle in VANET, it can be vulnerable to security threats like eavesdropping, tampering, and forgery.Many existing schemes rely heavily on TTP for key negotiation to establish session keys and ensure session security.However, this over-reliance on TTP can introduce a single point of failure and redundancy issues when TTP sends the same information to multiple vehicles.Additionally, key negotiation methods used for creating group session keys often result in increased interaction data and interaction times.An anonymous group key distribution scheme for the internet of vehicles was proposed to address these challenges.The Road Side Units (RSUs) were used to facilitate the creation of group session keys among multiple vehicles.Identity-based public key cryptography and an improved multi-receiver encryption scheme were utilized for communication between RSUs and vehicles, enabling two-way authentication and secure distribution of group session keys.During the key distribution process, a single encryption operation was sufficient to allow all group members to obtain a consistent session key.This reduced the reliance on TTP for authentication and group communication.Formal security proofs demonstrate that the proposed scheme satisfies basic security requirements.Furthermore, performance analysis and comparisons indicate that this scheme offers lower computational overhead and communication overhead compared to similar schemes.…”
    Get full text
    Article
  3. 3223

    Anxiety Detection Using Consumer Heart Rate Sensors by Soraya Sinche, Jefferson Acán, Pablo Hidalgo

    Published 2024-11-01
    “…Additionally, we found that the ECG AD8232 sensor provided more reliable data compared to the photoplethysmography (PPG) signal obtained from the MAX30100 sensor. …”
    Get full text
    Article
  4. 3224

    Potential Therapeutic Efficacy of Ferulic Acid and Its Derivatives in the Management of Cancers: A Comprehensive Analysis With Mechanistic Insight by Shakil Ahmmed, Md. Shimul Bhuia, Raihan Chowdhury, Md. Hanif Munshi, Tanzila Akter Eity, Hossam Kamli, Muhammad Torequl Islam

    Published 2025-01-01
    “…The objective of this study is to determine the botanical sources, pharmacokinetics, and anticancer activity of FA and its derivatives, focusing on the molecular mechanism by using the data obtained from the literature database. The study’s findings suggest that FA demonstrates promising anticancer effects in preclinical pharmacological test methods. …”
    Get full text
    Article
  5. 3225

    PERCEPTIONS, CONSUMPTION PATTERNS, AND PURCHASING BEHAVIOURS OF VEGAN PRODUCTS IN SLOVAKIA: A COMPARATIVE STUDY OF FLEXITARIANS, OMNIVORES, VEGANS, AND VEGETARIANS by Peter ŠEDÍK, Ingrida KOŠIČIAROVÁ, Zdenka KÁDEKOVÁ, Cristina Bianca POCOL

    Published 2024-01-01
    “…Data were collected via an online questionnaire with criteria including the purchase of vegan products and a minimum age of 18. …”
    Get full text
    Article
  6. 3226

    A Comparative Survey of Centralised and Decentralised Identity Management Systems: Analysing Scalability, Security, and Feasibility by Aviral Goel, Yogachandran Rahulamathavan

    Published 2024-12-01
    “…In response, decentralised techniques like blockchain and decentralised identities (DIDs) are being explored. …”
    Get full text
    Article
  7. 3227

    RELIABILITY ANALYSIS OF TELESCOPIC ARM OF PIELINE-CATCHING VEHICLE BASED ON SEMI-SUPERVISED DEEP NEURAL NETWORK by YUAN Guozhi, LIU Wei, YAN Zilong, ZHANG Ruilin, ZHAO Mingxuan, SANG Jianbing

    Published 2025-08-01
    “…Semi-supervised learning processed the finite element simulation data, enhanced deep neural network training accuracy. …”
    Get full text
    Article
  8. 3228

    Accuracy and Fluency Development of Spoken English through Online Informal Activities: A Microgenetic Analysis by Rasoul Mohammad Hosseinpur, Zahra Parsaeian

    Published 2023-04-01
    “…The results of the audio recorded data highlighted the positive impact of the OILE activities on the development of the spoken accuracy and fluency. …”
    Get full text
    Article
  9. 3229

    Selling to Wall Street: Theorizing the Financial Commodity Audience in Network Era Television by Peter Arne Johnson

    Published 2023-07-01
    “…Indeed, during this period, ABC shifted its target audience to, in part, please financial intermediaries but paradoxically alienated those financial elites in the process by turning away from culturally legitimate genres like anthology dramas and high-brow variety series. …”
    Get full text
    Article
  10. 3230

    An information dissemination strategy in social networks based on graph and content analysis by Jing Huang

    Published 2025-03-01
    “…Social networking platforms like Facebook, Twitter, Instagram, and LinkedIn have revolutionized communication, but there’s growing concern about invalid information, misinformation, and disinformation. …”
    Get full text
    Article
  11. 3231

    Decision Model for Information Security Control Assessment for Hospitals Using Disc Picture Fuzzy Information by Peng Zhuo, Lu Jin

    Published 2025-01-01
    “…When dealing with complicated and unpredictable decision-making situations, like evaluating hospital information security control measures, this sophisticated method achieves 18.5% higher accuracy and reduces ambiguity by 30% compared to conventional approaches. …”
    Get full text
    Article
  12. 3232

    Architectural Laboratories by Derya Uzal, Aslıhan Şenel

    Published 2024-12-01
    “…By engaging with thinkers like Bruno Latour, Karen Barad, and Bernard Stiegler, this study highlights the dynamic possibilities of architectural practice when rethinking material agency, data, and human/non-human relationships. …”
    Get full text
    Article
  13. 3233

    Incorporating Wave-ViT for Breast Cancer Diagnosis Using MRI Imaging by Sahil Mahey, Hamid Usefi

    Published 2025-05-01
    “…To ensure high-quality data, both datasets were carefully curated to exclude noisy or mislabeled slices. …”
    Get full text
    Article
  14. 3234

    Application of an Improved LSTM Model to Emotion Recognition by Yuan Li

    Published 2022-01-01
    “…For computers to behave like humans, speech recognition systems must be able to process nonverbal information, such as the emotional state of the speaker. …”
    Get full text
    Article
  15. 3235

    Miz1 deficiency in the mammary gland causes a lactation defect by attenuated Stat5 expression and phosphorylation. by Adrián Sanz-Moreno, David Fuhrmann, Elmar Wolf, Björn von Eyss, Martin Eilers, Hans-Peter Elsässer

    Published 2014-01-01
    “…Microarray, ChIP-Seq and gene set enrichment analysis revealed a down-regulation of Miz1 target genes being involved in vesicular transport processes. Our data suggest that deranged intracellular transport and localization of PrlR and ErbB4 disrupt the Stat5 signalling pathway in mutant glands and cause the observed lactation phenotype.…”
    Get full text
    Article
  16. 3236

    UPAYA DIVERSI TERHADAP ANAK YANG MELAKUKAN TINDAK PIDANA DALAM PERSPEKTIF KEADILAN RESTORATIF by Muhammad Umar Kelibia

    Published 2023-09-01
    “…Often law enforcement officials make peace so that cases are not forwarded to the legal process. But peace like this is not the expected diversion mechanism, because peace here does not pay attention to the best interests of the child. …”
    Get full text
    Article
  17. 3237

    Evolving challenges in Ukrainian education: a comparative study of teacher perspectives by Nataliia Avsheniuk, Nataliia Seminikhyna

    Published 2025-04-01
    “…The study found that while some challenges persisted, the war’s ongoing influence exacerbated issues like declining student performance and motivation, as well as the stress on both students and teachers. …”
    Get full text
    Article
  18. 3238

    Petrogenesis of the drift magmatism in the Cabo Frio High, Campos Basin, Brazil: Evidence from Sr–Nd–Pb–Hf isotopes by Tatiele de Barros, Artur Corval, Sérgio de Castro Valente, Alan Wanderley Albuquerque Miranda

    Published 2025-05-01
    “…This investigation unveils novel Sr–Nd–Pb–Hf isotope data derived from alkaline magmatic rocks extracted from three boreholes strategically positioned within the Cabo Frio High area. …”
    Get full text
    Article
  19. 3239

    Detection of Suicidal Ideation on Twitter using Machine Learning & Ensemble Approaches by Syed Tanzeel Rabani, Qamar Rayees Khan, Akib Mohi UD Din Khanday

    Published 2020-12-01
    “…Online social networking platforms like Twitter, Redditt and Facebook are becoming a new way for the people to express themselves freely without worrying about social stigma. …”
    Get full text
    Article
  20. 3240

    Computational design, docking, and molecular dynamics simulation study of RNA helicase inhibitors of dengue virus by Raghunath Satpathy, Sonali Acharya, Rashmiranjan Behera

    Published 2024-11-01
    “…Based on tetrahydrogedunin molecular structure, 100 drug-like molecules were designed using the Data Warrior tool. …”
    Get full text
    Article