Results 21 to 30 of about 25,310,122 (328)

Classical Solutions to the Initial-Boundary Value Problems for Nonautonomous Fractional Diffusion Equations

open access: yesComplexity, 2020
In this paper, we investigate a class of nonautonomous fractional diffusion equations (NFDEs). Firstly, under the condition of weighted Hölder continuity, the existence and two estimates of classical solutions are obtained by virtue of the properties of ...
Jia Mu, Yang Liu, Huanhuan Zhang
doaj   +1 more source

Existence and Stability of Square-Mean S-Asymptotically Periodic Solutions to a Fractional Stochastic Diffusion Equation with Fractional Brownian Motion

open access: yesComplexity, 2020
In this paper, a generalized Gronwall inequality is demonstrated, playing an important role in the study of fractional differential equations. In addition, with the fixed-point theorem and the properties of Mittag–Leffler functions, some results of the ...
Jia Mu, Jiecuo Nan, Yong Zhou
doaj   +1 more source

A Unified Replay-Based Continuous Learning Framework for Spatio-Temporal Prediction on Streaming Data [PDF]

open access: yesIEEE International Conference on Data Engineering
The widespread deployment of wireless and mobile devices results in a proliferation of spatio-temporal data that is used in applications, e.g., traffic prediction, human mobility mining, and air quality prediction, where spatio-temporal prediction is ...
Hao Miao   +7 more
semanticscholar   +1 more source

A Fully Streaming Big Data Framework for Cyber Security Based on Optimized Deep Learning Algorithm

open access: yesIEEE Access, 2023
Real-time deep learning faces the challenge of balancing accuracy and time, especially in cybersecurity where intrusion detection is crucial. Traditional deep learning techniques have been insufficient in identifying network anomalies and intrusions.
Noha Hussen   +3 more
doaj   +1 more source

A Wrist Sensor Sleep Posture Monitoring System: An Automatic Labeling Approach

open access: yesSensors, 2021
In the hospital, a sleep postures monitoring system is usually adopted to transform sensing signals into sleep behaviors. However, a home-care sleep posture monitoring system needs to be user friendly.
Po-Yuan Jeng   +3 more
doaj   +1 more source

Designing a Streaming Algorithm for Outlier Detection in Data Mining—An Incrementa Approach

open access: yesSensors, 2020
To design an algorithm for detecting outliers over streaming data has become an important task in many common applications, arising in areas such as fraud detections, network analysis, environment monitoring and so forth.
Kangqing Yu, Wei Shi, Nicola Santoro
doaj   +1 more source

An Evaluation System for Regional Collaborative Development of Industries Based on Multi-Source Data: A Case Study of the New Generation Electronic Information Industry Cluster in the Pear River Delta

open access: yesRedai dili, 2023
Industrial coordination constitutes a crucial aspect of regional integration, and evaluation of industrial collaboration holds significant practical importance in elucidating industrial processes and advancing industrial development.
Lin Aiyuan   +4 more
doaj   +1 more source

Search Techniques for the Web of Things: A Taxonomy and Survey

open access: yesSensors, 2016
The Web of Things aims to make physical world objects and their data accessible through standard Web technologies to enable intelligent applications and sophisticated data analytics.
Yuchao Zhou   +3 more
doaj   +1 more source

How big is Big Data? A comprehensive survey of data production, storage, and streaming in science and industry

open access: yesFrontiers in Big Data, 2023
The contemporary surge in data production is fueled by diverse factors, with contributions from numerous stakeholders across various sectors. Comparing the volumes at play among different big data entities is challenging due to the scarcity of publicly ...
Luca Clissa   +4 more
doaj   +1 more source

Streaming Verification of Graph Properties [PDF]

open access: yes, 2016
Streaming interactive proofs (SIPs) are a framework for outsourced computation. A computationally limited streaming client (the verifier) hands over a large data set to an untrusted server (the prover) in the cloud and the two parties run a protocol to ...
Abdullah, Amirali   +3 more
core   +2 more sources

Home - About - Disclaimer - Privacy