首页 文献索引 SCI期刊 AI助手
期刊目录筛选

期刊名:Frontiers in big data

缩写:

ISSN:N/A

e-ISSN:2624-909X

IF/分区:2.3/Q2

文章目录 更多期刊信息

共收录本刊相关文章索引664
Clinical Trial Case Reports Meta-Analysis RCT Review Systematic Review
Classical Article Case Reports Clinical Study Clinical Trial Clinical Trial Protocol Comment Comparative Study Editorial Guideline Letter Meta-Analysis Multicenter Study Observational Study Randomized Controlled Trial Review Systematic Review
Fiona Leonard,John Gilligan,Michael J Barrett Fiona Leonard
Introduction: Patients boarding in the Emergency Department can contribute to overcrowding, leading to longer waiting times and patients leaving without being seen or completing their treatment. The early identification of potential admissi...
Marco Rovere,Ziheng Chen,Antonio Di Pilato et al. Marco Rovere et al.
One of the challenges of high granularity calorimeters, such as that to be built to cover the endcap region in the CMS Phase-2 Upgrade for HL-LHC, is that the large number of channels causes a surge in the computing load when clustering num...
Zheni Zeng,Chaojun Xiao,Yuan Yao et al. Zheni Zeng et al.
Recommender systems aim to provide item recommendations for users and are usually faced with data sparsity problems (e.g., cold start) in real-world scenarios. Recently pre-trained models have shown their effectiveness in knowledge transfer...
Yutaro Iiyama,Gianluca Cerminara,Abhijay Gupta et al. Yutaro Iiyama et al.
Graph neural networks have been shown to achieve excellent performance for several crucial tasks in particle physics, such as charged particle tracking, jet tagging, and clustering. An important domain for the application of these networks ...
Conor McDermott,Maciej Łącki,Ben Sainsbury et al. Conor McDermott et al.
The sustained increase in new cases of COVID-19 across the world and potential for subsequent outbreaks call for new tools to assist health professionals with early diagnosis and patient monitoring. Growing evidence around the world is show...
Renita M Murimi Renita M Murimi
This paper studies contractual graphs, where the formation of edges between nodes result in dyadic exchanges. Each dyadic exchange is analyzed as a contractual agreement that is implemented upon fulfilment of underlying conditions. As these...
Marthie Grobler,Raj Gaire,Surya Nepal Marthie Grobler
The effectiveness of cyber security measures are often questioned in the wake of hard hitting security events. Despite much work being done in the field of cyber security, most of the focus seems to be concentrated on system usage. In this ...
Cameron Ogle,David Reddick,Coleman McKnight et al. Cameron Ogle et al.
Advanced imaging and DNA sequencing technologies now enable the diverse biology community to routinely generate and analyze terabytes of high resolution biological data. The community is rapidly heading toward the petascale in single invest...
Mohamed Gharibi,Arun Zachariah,Praveen Rao Mohamed Gharibi
[This corrects the article DOI: 10.3389/fdata.2020.00012.]. Keywords: AGROVOC; graph embeddings; knowledge g...
Yoann Bertrand,Karima Boudaoud,Michel Riveill Yoann Bertrand
Data leakage can lead to severe issues for a company, including financial loss, damage of goodwill, reputation, lawsuits and loss of future sales. To prevent these problems, a company can use other mechanisms on top of traditional Access Co...