Showing 1,281 - 1,300 results of 1,987 for search '"big data"', query time: 0.09s Refine Results
  1. 1281

    21ST INTERNATIONAL CONFERENCEON STATISTICAL SCIENCES by Abdur Rasheed

    Published 2024-12-01
    “…The three-day conference, held from December 9 to 11, 2024, brought together renowned experts, researchers, and students worldwide to discuss the theme "Mobilizing Data Science & Big Data to Achieve SDGs." …”
    Get full text
    Article
  2. 1282

    Study on Key Technologies of Intelligent IoT Device by Yingqi Wei, Weiping Lin, Ying Li

    Published 2015-08-01
    “…Smart IoT devices go into product stage from hype stage.Sensors are being miniaturized,integrated,intelligent and diversified,turn the reality into digital.IoT device’s intelligent is based on power of processor and advanced operation system,and be enhanced by the cloud computing and big data.As smart phone,the smart IoT devices need to build an active ecosystem that engage developers to innovate.The several key technologies development status and future trends were explored,analyzed,and displayed.…”
    Get full text
    Article
  3. 1283

    Research on the SDN-Based and Virtualized Mobile Control Network by Xiaojuan Hu, Yuan Zhang, Xu Xia, Huan Deng

    Published 2013-09-01
    “…The key challenges and problems of current mobile network were discussed, and a SDN-based mobile control network architecture was constructed to resolve the problem of processing big data produced by mobile international services. …”
    Get full text
    Article
  4. 1284
  5. 1285
  6. 1286

    A Large Scale NetFlow Analysis System Based on Spark by Shengyong Ding, Shiwu Min, Yongbing Fan

    Published 2014-10-01
    “…The existing systems usually adopt private distributed architectures, which face scalability, openness, cost and latency problems. The development of big data technology such as Spark offers new opportunity for large scale NetFlow processing systems. …”
    Get full text
    Article
  7. 1287

    Design and realization of a high-speed traffic collection and processing scheme for campus networks using FPGA by YAO Renlong, ZHAO Qiong, HE Haitao, WEI Yujun, LI Enlei

    Published 2024-11-01
    “…Subsequent analysis and mining with big data techniques provide data support for campus network management and security, revealing potential risks within the network.…”
    Get full text
    Article
  8. 1288

    Technology research and construction scheme of unified data lake by Zhiyong LIU, Zhongjiang HE, Jinglong LIU, Yilong RUAN, Zhaofang MENG

    Published 2021-01-01
    “…From the requirements of enterprise digital transformation and the challenges faced by big data platform, the construction ideas and principles of unified data lake were expounded.A unifid data lake construction scheme based on BSS/MSS/OSS cross domain fusion was proposed, which adopted logical unification, physical dispersion, unified data directory, unified security management and application of decoupling fusion.The construction practice of unified data lake was described in recent two years.…”
    Get full text
    Article
  9. 1289

    Research and application of the IBN for the next generation internet by Xin ZHANG

    Published 2019-12-01
    “…Faced with the new business needs and complex market environment,traditional manual methods can no longer meet the existing needs,and more intelligent solutions are urgently needed.With the development of artificial intelligence and big data technology,IBN has become a means to solve the current problem.The background and research progress of the IBN were introduced,and the application of the IBN in the next generation internet was analyzed.…”
    Get full text
    Article
  10. 1290
  11. 1291
  12. 1292
  13. 1293

    Construction and Application of Enterprise Internal Audit Data Analysis Model Based on Decision Tree Algorithm by Yuna Si

    Published 2022-01-01
    “…This paper constructs the internal audit flowchart in the big data environment and studies the optimization of the internal audit process in the big data environment. …”
    Get full text
    Article
  14. 1294
  15. 1295

    A Novel Intensive Distribution Logistics Network Design and Profit Allocation Problem considering Sharing Economy by Mi Gan, Shuai Yang, Dandan Li, Mingfei Wang, Si Chen, Ronghui Xie, Jiyang Liu

    Published 2018-01-01
    “…While the development of sharing economy makes it possible to achieve the integration of whole social logistic resources, big data technology can grasp customer’s logistics demand accurately on the basis of analyzing the customer’s logistics distribution preference, which contributes to the integration and optimization of the whole logistics resources. …”
    Get full text
    Article
  16. 1296

    Research on network risk assessment based on attack graph of expected benefits-rate by Wenfu LIU, Jianmin PANG, Xin ZHOU, Nan LI, Feng YUE

    Published 2022-08-01
    “…As Internet applications and services become more and more extensive, the endless network attacks lead to great risks and challenges to the security of information systems.As a model-based network security risk analysis technology, attack graph is helpful to find the vulnerability between network nodes and the harm of being attacked.It has been proved to be an effective method to find and prevent network security risks.Attack graph is mainly divided into state-based attack graph and attribute-based attack graph.Due to the problem of state explosion in state-based attack graph, most researchers prefer the attribute-based attack graph for network risk assessment.In view of the existing researches on attribute-based attack graph, they excessively rely on the vulnerability of network nodes and the essential attributes of atomic attack.However, they ignore that rational attackers usually choose specific attack paths by maximizing attack benefits.Then, a network risk assessment framework and a quantification method of attack benefits-rate based on expected benefits-rate attack graph were proposed.The network risk assessment framework took the open vulnerability resource database, the new vulnerabilities found by the vulnerability mining system and the big data related to network attack and defense as the basic data source.The network risk assessment framework also took the open source big data platform as the analysis tool to mine and calculate the elements related to attack cost and attack benefit.Using the concepts of cost, benefit and benefit-rate in economics, the calculation model of expected benefit-rate of atomic attack was constructed.By constructing the attribute-based attack graph of the target network, the expected benefit-rate of atomic attack on the attack path was calculated, and the expected benefit-rate list of all possible attack paths was generated.Furthermore, taking the expected goal as the starting point, the search was carried out according to the specific optimization strategy (backtracking method, greedy algorithm, dynamic programming).And the complete attack path with the maximum benefit-rate was obtained, which provided the basis for network risk assessment.The simulation results show the effectiveness and rationality of the proposed expected benefit-rate attack graph network risk assessment method, which can provide support for discovering and preventing network security problems.…”
    Get full text
    Article
  17. 1297
  18. 1298
  19. 1299

    Medyalararası Gündem Belirleme Çalışmalarında R Stüdyo Kullanımı: Rozelle-Campbell Taban Hizası ile Çapraz Gecikmeli Korelasyonun Bilişimleştirilmesi by Özlem Alikılıç, İnanç Alikılıç

    Published 2020-06-01
    “…Researchers using intermedia agenda-setting theory have also affected this trend by conducting studies using big data and social media data. The Rozelle-Campbell formula is widely used by such researchers to investigate media effects and their direction. …”
    Get full text
    Article
  20. 1300

    Editor's Note by Robyn Williams, Lisa Otto

    Published 2022-02-01
    “…New and advancing technologies such as artificial intelligence, big data and the Internet of Things have injected themselves in big and small ways in various aspects of daily life. …”
    Get full text
    Article