SmartSearchDirect.com
Your Search Starts Here
  data-recovery >>     Web  |  Articles  |  News  |  Videos  |  Home

DATA RECOVERY Web Results



Waste heat recoveries in data centers: A review - ScienceDirectWaste heat recoveries in data centers: A review - ScienceDirect
Waste heat recovery technology is considered as a promising approach to improve energy efficiency, achieve energy and energy cost savings, and mitigate environmental impacts (caused by both carbon emission and waste heat discharge) at the same time.

Distributed neural tensor completion for network monitoring data recoveryDistributed neural tensor completion for network monitoring data recovery
Abstract Network monitoring data is usually incomplete, accurate and fast recovery of missing data is of great significance for practical applications. The tensor-based nonlinear methods have attracted recent attentions with their capability of capturing complex interactions among data for more accurate recovery.

Tensor network decomposition for data recovery: Recent advancements and ...Tensor network decomposition for data recovery: Recent advancements and ...
Tensor network (TN) decomposition stands as a pivotal technique for characterizing the essential features of high-dimensional data, attracting significant interest and achieving notable success in high-dimensional data recovery.

A neural tensor decomposition model for high-order sparse data recovery ...A neural tensor decomposition model for high-order sparse data recovery ...
When faced with high missing ratios or sparse observed sets, the recovery results become less ideal [20]. More importantly, the nonlinear information in the data may obscure the low rankness and the model performance may be hindered by the multi-linear hypothesis in the decomposition, making it fail to capture the nonlinear features [21].

A graph and diffusion theory-based approach for localization and ...A graph and diffusion theory-based approach for localization and ...
The proposed data recovery framework, comprised of the FDIA localization model and data recovery model, offers a notable improvement in accuracy, providing a more robust defense against cyberattacks and enhancing grid security.

A novel tensor decomposition-based approach for internet traffic data ...A novel tensor decomposition-based approach for internet traffic data ...
A series of numerical experiments about the recovery of structurally missing traffic data and the traffic data prediction on the widely used real-world datasets demonstrate that our approach have favorable performance than some state-of-the-art tensor/matrix based approaches.

Innovative approaches for deep decarbonization of data centers and ...Innovative approaches for deep decarbonization of data centers and ...
The data center heat recovery systems discussed in the studies above fall into two primary categories: those utilizing heat pumps to recover waste heat from data centers for utilization in district heating networks or buildings, and those relying solely on heat exchangers.

False data injection attacks data recovery in smart grids: A graph ...False data injection attacks data recovery in smart grids: A graph ...
False data injection (FDI) attacks, one of the most classical cyber attacks, have increasingly posed a significant threat to the security and reliability of power systems [5]. Such attacks, mislead the system state estimation results, by manipulating the measurements of sensors, and thereby affecting the secure operations of the power system [6]. Research on FDI attacks and their data recovery ...

Demonstration of all-digital burst clock and data recovery for ...Demonstration of all-digital burst clock and data recovery for ...
We experimentally demonstrated all-digital burst clock and data recovery (BCDR) for symmetrical single-wavelength 50 Gb/s four-level amplitude modulat…

Analysis of false lock in Mueller-Muller clock and data recovery system ...Analysis of false lock in Mueller-Muller clock and data recovery system ...
Another view suggests that data correlation is the key contributor [ [9], [10]]. In this work, we provide a comprehensive analysis of MMPD false lock and introduce an enhanced mitigation strategy, validated via simulations. Section 2 investigates the false-lock mechanism and presents an improved phase detection strategy.







Home | Privacy | Contact

Copyright 2010-2013 SmartSearchDirect.com
Thumbnail Screenshots by Thumbshots