A trigonometric function-based big data model for network information security control mechanisms

Abstract The study of trigonometric relationships is a result of a combination of mathematics and engineering techniques. It plays an important role in computer network systems, and its applications are involved in all aspects of computer network systems, which mainly include data storage, informati...

Full description

Saved in:
Bibliographic Details
Main Authors: Bohan Zhang, Ruoyu Tan
Format: Article
Language:English
Published: Springer 2025-07-01
Series:Discover Artificial Intelligence
Subjects:
Online Access:https://doi.org/10.1007/s44163-025-00360-3
Tags: Add Tag
No Tags, Be the first to tag this record!
_version_ 1849334284435849216
author Bohan Zhang
Ruoyu Tan
author_facet Bohan Zhang
Ruoyu Tan
author_sort Bohan Zhang
collection DOAJ
description Abstract The study of trigonometric relationships is a result of a combination of mathematics and engineering techniques. It plays an important role in computer network systems, and its applications are involved in all aspects of computer network systems, which mainly include data storage, information retrieval, and retrieval. Big data technology can analyze and integrate massive and complex information, make effective use of data, and provide an important basis for computer network security control. At present, traditional encryption algorithms mainly deal with information data through the use of cryptographic theory, but with the progress of the times, there are higher requirements for the security of data for transmission. For instance, cryptography proposes the principle of confidentiality and uses key generation, plain text flow processes, and encryption algorithms to control the flow of ciphertext, all of which require extensive research on network system security. In this paper, we will study the network security control method of a big data model of triangular fuzzy quotient function relationships and build a targeted and widely applicable computer network system security mat system with high practical value. According to the proposed model, it has the highest accuracy at 94.5%, precision at 93.6%, and recall at 93.8. The results obtained demonstrate a noteworthy enhancement in performance when compared to the current techniques.
format Article
id doaj-art-f5a4ea059f084579b2e6e94108cc70f2
institution Kabale University
issn 2731-0809
language English
publishDate 2025-07-01
publisher Springer
record_format Article
series Discover Artificial Intelligence
spelling doaj-art-f5a4ea059f084579b2e6e94108cc70f22025-08-20T03:45:35ZengSpringerDiscover Artificial Intelligence2731-08092025-07-015111510.1007/s44163-025-00360-3A trigonometric function-based big data model for network information security control mechanismsBohan Zhang0Ruoyu Tan1Department of Mathematics and Applied Mathematics, School of Mathematics and Physics, China University of Geosciences (Wuhan)Department of Engineering Geology and Rock Mechanics, Faculty of Engineering, China University of Geosciences (Wuhan)Abstract The study of trigonometric relationships is a result of a combination of mathematics and engineering techniques. It plays an important role in computer network systems, and its applications are involved in all aspects of computer network systems, which mainly include data storage, information retrieval, and retrieval. Big data technology can analyze and integrate massive and complex information, make effective use of data, and provide an important basis for computer network security control. At present, traditional encryption algorithms mainly deal with information data through the use of cryptographic theory, but with the progress of the times, there are higher requirements for the security of data for transmission. For instance, cryptography proposes the principle of confidentiality and uses key generation, plain text flow processes, and encryption algorithms to control the flow of ciphertext, all of which require extensive research on network system security. In this paper, we will study the network security control method of a big data model of triangular fuzzy quotient function relationships and build a targeted and widely applicable computer network system security mat system with high practical value. According to the proposed model, it has the highest accuracy at 94.5%, precision at 93.6%, and recall at 93.8. The results obtained demonstrate a noteworthy enhancement in performance when compared to the current techniques.https://doi.org/10.1007/s44163-025-00360-3Triangular fuzzy quotient functionBig data modelNetwork security controlControl mechanism module
spellingShingle Bohan Zhang
Ruoyu Tan
A trigonometric function-based big data model for network information security control mechanisms
Discover Artificial Intelligence
Triangular fuzzy quotient function
Big data model
Network security control
Control mechanism module
title A trigonometric function-based big data model for network information security control mechanisms
title_full A trigonometric function-based big data model for network information security control mechanisms
title_fullStr A trigonometric function-based big data model for network information security control mechanisms
title_full_unstemmed A trigonometric function-based big data model for network information security control mechanisms
title_short A trigonometric function-based big data model for network information security control mechanisms
title_sort trigonometric function based big data model for network information security control mechanisms
topic Triangular fuzzy quotient function
Big data model
Network security control
Control mechanism module
url https://doi.org/10.1007/s44163-025-00360-3
work_keys_str_mv AT bohanzhang atrigonometricfunctionbasedbigdatamodelfornetworkinformationsecuritycontrolmechanisms
AT ruoyutan atrigonometricfunctionbasedbigdatamodelfornetworkinformationsecuritycontrolmechanisms
AT bohanzhang trigonometricfunctionbasedbigdatamodelfornetworkinformationsecuritycontrolmechanisms
AT ruoyutan trigonometricfunctionbasedbigdatamodelfornetworkinformationsecuritycontrolmechanisms