-
21
On the research for big data uses for public good purposes
Published 2016-12-01Subjects: “…big data…”
Get full text
Article -
22
Efisiensi Big Data Menggunakan Improved Nearest Neighbor
Published 2019-12-01“…Sorting phase of kNN becomes a computation problem when it is done on big data. In the effort to overcome the classification of big data a more accurate and efficient method is required. …”
Get full text
Article -
23
Optimizing healthcare big data performance through regional computing
Published 2025-01-01Subjects: Get full text
Article -
24
Big Data Analytics for Healthcare Industry: Impact, Applications, and Tools
Published 2019-03-01Subjects: “…big data…”
Get full text
Article -
25
New Benchmarking Methodology and Programming Model for Big Data Processing
Published 2015-08-01“…Big data processing is becoming a reality in numerous real-world applications. …”
Get full text
Article -
26
Digital marketing and sales technologies: big data and synergy effect
Published 2019-09-01Get full text
Article -
27
Research on the Revolution of Multidimensional Learning Space in the Big Data Environment
Published 2021-01-01“…However, the cluster computing system for hybrid big data applications has the characteristics of heterogeneous requirements, which makes more and more cluster resource managers support fine-grained multidimensional learning resource management. …”
Get full text
Article -
28
Mobility-assisted big data collecting in wireless sensor networks
Published 2016-08-01“…In recent years, the big data emerged as a hot topic because of the rapid growth of the information and wireless communication technology. …”
Get full text
Article -
29
Construction of Teaching Management Platform for Universities Based on Big Data
Published 2022-01-01“…However, no research has yet discussed how to handle the increasing scale of online teaching resources, leading to the hindrance of building teaching management platforms in universities, which requires the use of big data technologies and thinking to build new platforms. …”
Get full text
Article -
30
Optimal Management of Computer Network Security in the Era of Big Data
Published 2022-01-01“…In the era of big data, what kind of challenges and impacts will information security face? …”
Get full text
Article -
31
Survey of Distributed Computing Frameworks for Supporting Big Data Analysis
Published 2023-06-01Subjects: Get full text
Article -
32
Comprehensive Survey of Big Data Mining Approaches in Cloud Systems
Published 2021-04-01Subjects: “…Big Data, Data Computing, Big Data Mining, Cloud Computing…”
Get full text
Article -
33
Unstructured Big Data Threat Intelligence Parallel Mining Algorithm
Published 2024-06-01Subjects: “…unstructured big data mining…”
Get full text
Article -
34
Big Data Analytics: A Tutorial of Some Clustering Techniques
Published 2021-09-01Subjects: “…big data…”
Get full text
Article -
35
Distributed Storage Strategy and Visual Analysis for Economic Big Data
Published 2021-01-01“…According to the source and characteristics of economic big data, the data types are analyzed and the database storage architecture and data storage structure of economic big data are designed. …”
Get full text
Article -
36
Call for Papers Special Issue on AI-Enhanced Big Data Governance
Published 2024-06-01“…Big Data Mining and Analytics…”
Get full text
Article -
37
Assessing the Complexity of Intelligent Parks’ Internet of Things Big Data System
Published 2021-01-01“…Finally, the IoT big data system is simulated and tested to verify its complexity. …”
Get full text
Article -
38
Study of social tension based on electronic social networks big data
Published 2022-01-01Get full text
Article -
39
Clinical Big Data and Deep Learning: Applications, Challenges, and Future Outlooks
Published 2019-12-01“…Big Data Mining and Analytics…”
Get full text
Article -
40
Assisting Laboratory Management Based on Network Big Data Mining Technology
Published 2022-01-01“…In today’s big data context, the composition of virtual networks is becoming increasingly complex, so it is neither easy nor difficult to strengthen the control of network security issues. …”
Get full text
Article