Results 11 to 20 of about 3,766,353 (290)

Time Series Recovery Using Adjacent Channel Data Based on LSTM: A Case Study of Subway Vibrations

open access: yesApplied Sciences, 2022
Multi-sensor technology has been widely applied in the condition monitoring of rail transit. In practice, the data of some channels in the high channel counts are often abnormal or lost due to the abnormality and damage of the sensors, thus resulting in ...
Tao Xin   +5 more
doaj   +1 more source

Data Secure De-Duplication and Recovery Based on Public Key Encryption With Keyword Search

open access: yesIEEE Access, 2023
In the current era of information explosion, users’ demand for data storage is increasing, and data on the cloud has become the first choice of users and enterprises.
Le Li   +3 more
doaj   +1 more source

A Blockchain-Based Traceability Model for Grain and Oil Food Supply Chain

open access: yesFoods, 2023
The structure of the grain-and-oil-food-supply chain has the characteristics of complexity, cross-regionality, a long cycle, and numerous participants, making it difficult to maintain the safety of supply.
Yuan Zhang   +7 more
doaj   +1 more source

Data backup methods for mission-critical information systems

open access: yesРоссийский технологический журнал, 2022
Objectives. Digitalization of the economy has led to a situation in which organizations accumulate huge amounts of digital data, the loss or damage of which leads to irreparable damage to the organizations. The issue of increasing data safety is relevant.
S. V. Shaytura, P. N. Pitkevich
doaj   +1 more source

Privacy-Preserving Sensory Data Recovery [PDF]

open access: yes2018 17th IEEE International Conference On Trust, Security And Privacy In Computing And Communications/ 12th IEEE International Conference On Big Data Science And Engineering (TrustCom/BigDataSE), 2018
In recent years, a large scale of various wireless sensor networks have been deployed for basic scientific works. Massive data loss is so common that there is a great demand for data recovery. While data recovery methods fulfil the requirement of accuracy, the potential privacy leakage caused by them concerns us a lot.
Chen, Cai   +4 more
openaire   +2 more sources

Design of a DVI video receiver chip

open access: yesDianzi Jishu Yingyong, 2022
In this paper, a DVI(Digital Visual Interface) receiver chip is designed and an all-digital-based T.M.D.S signal reception recovery scheme is proposed. This scheme can greatly reduce the design difficulty of PLL and the hardware overhead of the chip.This
Gu Hong, Fang Zhen
doaj   +1 more source

Multiattribute Group Decision-Making Approach With Linguistic Pythagorean Fuzzy Information

open access: yesIEEE Access, 2019
The purpose of this study is to construct the multi-attribute group decision making (MAGDM) approach with linguistic Pythagorean fuzzy information (LPFI) based on generalized linguistic Pythagorean fuzzy aggregation operators (GLPFA).
Yi Liu   +4 more
doaj   +1 more source

Length and curvature variation energy minimizing planar cubic G1 Hermite interpolation curve

open access: yesJournal of Taibah University for Science, 2020
In this paper, we study how to construct a planar cubic G1 Hermite interpolation curve with minimal length and curvature variation energy. This problem is solved by a bi-objective optimization model.
Juncheng Li, Li Zhang
doaj   +1 more source

Experimental Verification of Human Body Communication Path Gain Channel Modeling for Muscular-Tissue Characteristics

open access: yesIEEE Access, 2019
To study the signal transmission mechanism in the human body, the channel characteristics are generally analyzed by modeling. In current modeling methods, the human body is considered quasi-static and the human tissues isotropic, for simplifying the ...
Shuang Zhang   +8 more
doaj   +1 more source

A PCA-LSTM-Based Method for Fault Diagnosis and Data Recovery of Dry-Type Transformer Temperature Monitoring Sensor

open access: yesApplied Sciences, 2022
The failure that occurs during the dry-type transformer temperature monitoring sensor working will result in wrong data output, which may cause the monitor and monitoring background to respond incorrectly.
Mingze Zheng   +3 more
doaj   +1 more source

Home - About - Disclaimer - Privacy