-
1261
Value realization of intelligent emergency management: research framework from technology enabling to value creation
Published 2025-03-01“…This study investigated the application and the application value of intelligent emergency in emergency management in the big data environment. It addresses the neglect of the application value (performance) measurement of intelligent emergency, further improving the effectiveness of intelligent emergency management. …”
Get full text
Article -
1262
Research on cloud dynamic public key information security based on elliptic curve and primitive Pythagoras
Published 2025-02-01Get full text
Article -
1263
What Factors Contribute to Higher Travel Happiness? Evidence from Beijing, China
Published 2021-01-01Get full text
Article -
1264
The impacts on population health by China's regional health data centers and the potential mechanism of influence
Published 2025-01-01“…This experiment with “big data” has the potential to influence population health and is the focus of this study. …”
Get full text
Article -
1265
-
1266
-
1267
Weak-Strong Uniqueness for Compressible Magnetohydrodynamic Equations with Coulomb Force
Published 2021-01-01Get full text
Article -
1268
Fuzzy Comprehensive Evaluation Model of Project Investment Risk Based on Computer Vision Technology
Published 2023-01-01“…Project investment is one of the most popular financial management methods in the era of big data. Both large enterprise groups and individual petty bourgeoisie groups have begun to pay attention to the risks and benefits brought by the new financial management method of project investment. …”
Get full text
Article -
1269
Convergence-Driven Adaptive Many-Objective Particle Swarm Optimization
Published 2025-01-01Get full text
Article -
1270
The solution of super-scale DEA models based on preference character
Published 2025-01-01“…The basic relationships and intrinsic laws in the data envelopment analysis (DEA) are the basis for designing fast solutions for big data DEA models. By delving into these relationships, it becomes feasible to address super-scale DEA problems more swiftly, aligning with the need for timeliness in real-world efficiency evaluations and reducing time costs. …”
Get full text
Article -
1271
-
1272
-
1273
Social Risk Early Warning of Environmental Damage of Large-Scale Construction Projects in China Based on Network Governance and LSTM Model
Published 2020-01-01“…Traditional social risk prevention management has some defects in obtaining risk data, such as limited coverage, poor availability, and insufficient timeliness, which makes it impossible to realize effective early warning of social risks in the era of big data. This paper focuses on the three environments of diversification of stakeholders, risk media, and big data era. …”
Get full text
Article -
1274
LeaData a novel reference data of leather images for automatic species identification
Published 2025-02-01“…Indeed, leather image analysis with big data can pave the way for automatic and objective analysis with accurate prediction. …”
Get full text
Article -
1275
-
1276
Review of cryptographic application security evaluation techniques for new critical infrastructures
Published 2023-12-01“…The construction of new critical infrastructure, represented by high-speed full-time signal coverage, intelligent and fine-grained urban management, and deep space and deep sea scientific innovation experimental fields, has entered a new stage with the deep integration and development of new technologies such as 5G/6G, artificial intelligence, and blockchain in various fields.The security evaluation of cryptography applications, as a key technological resource for ensuring the security of national information, integration, and innovation infrastructure, has risen to the level of international law and national development strategy.It is urgent to construct a comprehensive, fine-grained, and self-evolving cryptography security evaluation system throughout the data lifecycle.The typical APT attacks and ransomware attacks faced by new critical infrastructure in industries such as energy, medicine, and transportation in recent years were considered.And then the growing demand for security evaluation of cryptography applications was analyzed in the face of new business requirements such as preventing endogenous data security risks, achieving differentiated privacy protection, and supporting authenticated attack traceability.The new challenges were also examined, which were brought by new information infrastructure (including big data, 5G communication, fundamental software, etc.), integration infrastructure (including intelligent connected vehicles, intelligent connected industrial control systems, etc.), and innovation infrastructure (including big data, artificial intelligence, blockchain, etc.) to the security evaluation of cryptography applications.Furthermore, the new requirements were revealed about domestically produced cryptography algorithms and protocols deployed on high-performance computing chips, ultra-high-speed communication modules, and large-capacity storage media for cryptography application security evaluation technology.Finally, the development of automated and intelligent cryptography application security evaluation technology was explored.…”
Get full text
Article -
1277
New Media Marketing Strategy Optimization in the Catering Industry Based on Deep Machine Learning Algorithms
Published 2022-01-01“…The era of unreachable big data has arrived, which raises questions for the development of corporate marketing. …”
Get full text
Article -
1278
Road Traffic Safety Risk Estimation Method Based on Vehicle Onboard Diagnostic Data
Published 2020-01-01Get full text
Article -
1279
Bridging the Maturity Gaps in Industrial Data Science: Navigating Challenges in IoT-Driven Manufacturing
Published 2025-01-01“…The importance of including stakeholders in the data review process to enhance the data quality is accentuated in this paper, specifically when big data analysis is to be integrated into corporate strategies. …”
Get full text
Article -
1280
Monte Carlo Algorithm For Matrices in Solving Systems of Linear Equations, Determinants, Inverse, Eigen Values, and Eigenvectors.
Published 2024“…With increasing data volume and complexity in the "Big Data" era, linear algebra operations are important tools to process massive datasets. …”
Get full text
Thesis