Articles with "data recovery" as a keyword



Photo from archive.org

Missing boundary data recovery using Nash games: the Stokes system

Sign Up to like & get
recommendations!
Published in 2017 at "Numerical Algorithms"

DOI: 10.1007/s11075-017-0400-3

Abstract: We consider the Cauchy-Stokes problem. We use a new method based on Nash game theory to recover the missing velocity and normal stress on some inaccessible part of the boundary. This method is used with… read more here.

Keywords: data recovery; using nash; missing boundary; boundary data ... See more keywords
Photo from wikipedia

Beyond Data Recovery: Developing Digital Information Systems for Cultural Resources in the Online Era

Sign Up to like & get
recommendations!
Published in 2020 at "Advances in Archaeological Practice"

DOI: 10.1017/aap.2020.13

Abstract: ABSTRACT For historic property types such as archaeological sites and historic buildings, data recovery is often the main part of mitigation plans offered by federal agencies with undertakings that will destroy part or all of… read more here.

Keywords: digital information; data recovery; information; beyond data ... See more keywords

Active Data Replica Recovery for Quality-Assurance Big Data Analysis in IC-IoT

Sign Up to like & get
recommendations!
Published in 2019 at "IEEE Access"

DOI: 10.1109/access.2019.2932259

Abstract: QoS-aware big data analysis is critical in Information-Centric Internet of Things (IC-IoT) system to support various applications like smart city, smart grid, smart health, intelligent transportation systems, and so on. The employment of non-volatile memory… read more here.

Keywords: data recovery; qos; big data; recovery ... See more keywords

Multi-Attribute Data Recovery in Wireless Sensor Networks With Joint Sparsity and Low-Rank Constraints Based on Tensor Completion

Sign Up to like & get
recommendations!
Published in 2019 at "IEEE Access"

DOI: 10.1109/access.2019.2942195

Abstract: In wireless sensor networks (WSNs), data recovery is an indispensable operation for data loss or energy constrained WSNs using sparse sampling. However, the recovery accuracy is not satisfying for WSNs with various sensor types due… read more here.

Keywords: low rank; multi attribute; data recovery; attribute data ... See more keywords

Big Data Privacy and Security Using Abundant Data Recovery Techniques and Data Obliviousness Methodologies

Sign Up to like & get
recommendations!
Published in 2022 at "IEEE Access"

DOI: 10.1109/access.2022.3211304

Abstract: The concept of big data security is introduced in this article along with many features. It illustrates the need for security in healthcare systems as the volume of data increases continuously over the period of… read more here.

Keywords: data privacy; big data; security; data recovery ... See more keywords

SASTC : Spatial-Aware Sparse Tensor Completion for Large-Scale Traffic Data Recovery

Sign Up to like & get
recommendations!
Published in 2025 at "IEEE Internet of Things Journal"

DOI: 10.1109/jiot.2025.3622025

Abstract: In intelligent transportation systems (ITSs), missing and deviated traffic data are ubiquitous. However, most existing studies fail to address both the imputation of missing data and the correction of deviated data simultaneously. Moreover, while much… read more here.

Keywords: data recovery; tensor; traffic data; large scale ... See more keywords

Hierarchical Pressure Data Recovery for Pipeline Network via Generative Adversarial Networks

Sign Up to like & get
recommendations!
Published in 2022 at "IEEE Transactions on Automation Science and Engineering"

DOI: 10.1109/tase.2021.3069003

Abstract: In the real-time status monitoring of pipeline network, incomplete pressure data are unavoidable due to some device or communication errors. To solve this problem, a hierarchical data recovery method based on generative adversarial networks (GANs)… read more here.

Keywords: pressure data; pipeline network; pressure; data recovery ... See more keywords

RLDR: Reinforcement Learning-Based Fast Data Recovery in Cloud-of-Clouds Storage Systems

Sign Up to like & get
recommendations!
Published in 2025 at "IEEE Transactions on Cloud Computing"

DOI: 10.1109/tcc.2025.3546528

Abstract: Cloud-of-clouds storage systems are widely used in online applications, where user data are encrypted, encoded, and stored in multiple clouds. When some cloud nodes fail, the storage systems can reconstruct the lost data and store… read more here.

Keywords: storage systems; cloud; data recovery; regeneration ... See more keywords

A 6.15–10.9 Gb/s 0.58 pJ/Bit Reference-Less Half-Rate Clock and Data Recovery With “Phase Reset” Scheme

Sign Up to like & get
recommendations!
Published in 2022 at "IEEE Transactions on Circuits and Systems I: Regular Papers"

DOI: 10.1109/tcsi.2021.3119907

Abstract: This paper presents a low power injection-locked oscillator (ILO)-type clock and data recovery (CDR) in 40 nm CMOS. An efficient “phase reset” scheme is proposed to periodically realign the clock phase to the rising edge… read more here.

Keywords: clock data; phase; reset scheme; phase reset ... See more keywords

EventMon: Real-Time Event-Based Streaming Network Monitoring Data Recovery

Sign Up to like & get
recommendations!
Published in 2025 at "IEEE Transactions on Dependable and Secure Computing"

DOI: 10.1109/tdsc.2024.3519197

Abstract: Data recovery is a fundamental task for sparse network monitoring with a significant impact on many downstream tasks, such as congestion control, network capacity planning, and traffic engineering. To better capture the network dynamically and… read more here.

Keywords: data recovery; network monitoring; real time; network ... See more keywords

An Inertia-Based Data Recovery Scheme for False Data Injection Attack

Sign Up to like & get
recommendations!
Published in 2022 at "IEEE Transactions on Industrial Informatics"

DOI: 10.1109/tii.2022.3146859

Abstract: Due to vulnerabilities exposed to cyberattacks in the cyber physical power system, increasing concerns have been paid to its cybersecurity, especially on the so-called false data injection attack. Timely recovering true values of measurements and… read more here.

Keywords: data recovery; data injection; false data; recovery scheme ... See more keywords