Showing 1,261 - 1,280 results of 1,987 for search '"big data"', query time: 0.08s Refine Results
  1. 1261

    Value realization of intelligent emergency management: research framework from technology enabling to value creation by Yan Guo, Yan Song, Mingyue Zhang

    Published 2025-03-01
    “…This study investigated the application and the application value of intelligent emergency in emergency management in the big data environment. It addresses the neglect of the application value (performance) measurement of intelligent emergency, further improving the effectiveness of intelligent emergency management. …”
    Get full text
    Article
  2. 1262
  3. 1263
  4. 1264

    The impacts on population health by China's regional health data centers and the potential mechanism of influence by Jiaoli Cai, Yue Li, Peter C Coyte

    Published 2025-01-01
    “…This experiment with “big data” has the potential to influence population health and is the focus of this study. …”
    Get full text
    Article
  5. 1265
  6. 1266
  7. 1267
  8. 1268

    Fuzzy Comprehensive Evaluation Model of Project Investment Risk Based on Computer Vision Technology by Hongjian Wang

    Published 2023-01-01
    “…Project investment is one of the most popular financial management methods in the era of big data. Both large enterprise groups and individual petty bourgeoisie groups have begun to pay attention to the risks and benefits brought by the new financial management method of project investment. …”
    Get full text
    Article
  9. 1269
  10. 1270

    The solution of super-scale DEA models based on preference character by Zhanxin Ma, Hao Li, Yinjie, Ziwei Fan

    Published 2025-01-01
    “…The basic relationships and intrinsic laws in the data envelopment analysis (DEA) are the basis for designing fast solutions for big data DEA models. By delving into these relationships, it becomes feasible to address super-scale DEA problems more swiftly, aligning with the need for timeliness in real-world efficiency evaluations and reducing time costs. …”
    Get full text
    Article
  11. 1271
  12. 1272
  13. 1273

    Social Risk Early Warning of Environmental Damage of Large-Scale Construction Projects in China Based on Network Governance and LSTM Model by Junmin Fang, Dechun Huang, Jingrong Xu

    Published 2020-01-01
    “…Traditional social risk prevention management has some defects in obtaining risk data, such as limited coverage, poor availability, and insufficient timeliness, which makes it impossible to realize effective early warning of social risks in the era of big data. This paper focuses on the three environments of diversification of stakeholders, risk media, and big data era. …”
    Get full text
    Article
  14. 1274

    LeaData a novel reference data of leather images for automatic species identification by Anjli Varghese, Malathy Jawahar, A. Amalin Prince

    Published 2025-02-01
    “…Indeed, leather image analysis with big data can pave the way for automatic and objective analysis with accurate prediction. …”
    Get full text
    Article
  15. 1275
  16. 1276

    Review of cryptographic application security evaluation techniques for new critical infrastructures by Gaolei LI, Jianhua LI, Zhihong ZHOU, Hao ZHANG

    Published 2023-12-01
    “…The construction of new critical infrastructure, represented by high-speed full-time signal coverage, intelligent and fine-grained urban management, and deep space and deep sea scientific innovation experimental fields, has entered a new stage with the deep integration and development of new technologies such as 5G/6G, artificial intelligence, and blockchain in various fields.The security evaluation of cryptography applications, as a key technological resource for ensuring the security of national information, integration, and innovation infrastructure, has risen to the level of international law and national development strategy.It is urgent to construct a comprehensive, fine-grained, and self-evolving cryptography security evaluation system throughout the data lifecycle.The typical APT attacks and ransomware attacks faced by new critical infrastructure in industries such as energy, medicine, and transportation in recent years were considered.And then the growing demand for security evaluation of cryptography applications was analyzed in the face of new business requirements such as preventing endogenous data security risks, achieving differentiated privacy protection, and supporting authenticated attack traceability.The new challenges were also examined, which were brought by new information infrastructure (including big data, 5G communication, fundamental software, etc.), integration infrastructure (including intelligent connected vehicles, intelligent connected industrial control systems, etc.), and innovation infrastructure (including big data, artificial intelligence, blockchain, etc.) to the security evaluation of cryptography applications.Furthermore, the new requirements were revealed about domestically produced cryptography algorithms and protocols deployed on high-performance computing chips, ultra-high-speed communication modules, and large-capacity storage media for cryptography application security evaluation technology.Finally, the development of automated and intelligent cryptography application security evaluation technology was explored.…”
    Get full text
    Article
  17. 1277

    New Media Marketing Strategy Optimization in the Catering Industry Based on Deep Machine Learning Algorithms by Zikang Peng

    Published 2022-01-01
    “…The era of unreachable big data has arrived, which raises questions for the development of corporate marketing. …”
    Get full text
    Article
  18. 1278
  19. 1279

    Bridging the Maturity Gaps in Industrial Data Science: Navigating Challenges in IoT-Driven Manufacturing by Amruta Awasthi, Lenka Krpalkova, Joseph Walsh

    Published 2025-01-01
    “…The importance of including stakeholders in the data review process to enhance the data quality is accentuated in this paper, specifically when big data analysis is to be integrated into corporate strategies. …”
    Get full text
    Article
  20. 1280

    Monte Carlo Algorithm For Matrices in Solving Systems of Linear Equations, Determinants, Inverse, Eigen Values, and Eigenvectors. by Bamwine, Delik

    Published 2024
    “…With increasing data volume and complexity in the "Big Data" era, linear algebra operations are important tools to process massive datasets. …”
    Get full text
    Thesis