-
1281
21ST INTERNATIONAL CONFERENCEON STATISTICAL SCIENCES
Published 2024-12-01“…The three-day conference, held from December 9 to 11, 2024, brought together renowned experts, researchers, and students worldwide to discuss the theme "Mobilizing Data Science & Big Data to Achieve SDGs." …”
Get full text
Article -
1282
Study on Key Technologies of Intelligent IoT Device
Published 2015-08-01“…Smart IoT devices go into product stage from hype stage.Sensors are being miniaturized,integrated,intelligent and diversified,turn the reality into digital.IoT device’s intelligent is based on power of processor and advanced operation system,and be enhanced by the cloud computing and big data.As smart phone,the smart IoT devices need to build an active ecosystem that engage developers to innovate.The several key technologies development status and future trends were explored,analyzed,and displayed.…”
Get full text
Article -
1283
Research on the SDN-Based and Virtualized Mobile Control Network
Published 2013-09-01“…The key challenges and problems of current mobile network were discussed, and a SDN-based mobile control network architecture was constructed to resolve the problem of processing big data produced by mobile international services. …”
Get full text
Article -
1284
-
1285
Complete γ-th Moment Convergence for Weighted Sums Under WOD Setup
Published 2025-01-01Get full text
Article -
1286
A Large Scale NetFlow Analysis System Based on Spark
Published 2014-10-01“…The existing systems usually adopt private distributed architectures, which face scalability, openness, cost and latency problems. The development of big data technology such as Spark offers new opportunity for large scale NetFlow processing systems. …”
Get full text
Article -
1287
Design and realization of a high-speed traffic collection and processing scheme for campus networks using FPGA
Published 2024-11-01“…Subsequent analysis and mining with big data techniques provide data support for campus network management and security, revealing potential risks within the network.…”
Get full text
Article -
1288
Technology research and construction scheme of unified data lake
Published 2021-01-01“…From the requirements of enterprise digital transformation and the challenges faced by big data platform, the construction ideas and principles of unified data lake were expounded.A unifid data lake construction scheme based on BSS/MSS/OSS cross domain fusion was proposed, which adopted logical unification, physical dispersion, unified data directory, unified security management and application of decoupling fusion.The construction practice of unified data lake was described in recent two years.…”
Get full text
Article -
1289
Research and application of the IBN for the next generation internet
Published 2019-12-01“…Faced with the new business needs and complex market environment,traditional manual methods can no longer meet the existing needs,and more intelligent solutions are urgently needed.With the development of artificial intelligence and big data technology,IBN has become a means to solve the current problem.The background and research progress of the IBN were introduced,and the application of the IBN in the next generation internet was analyzed.…”
Get full text
Article -
1290
A lightweight wheat ear counting model in UAV images based on improved YOLOv8
Published 2025-02-01Get full text
Article -
1291
An atmospheric correction method for Himawari-8 imagery based on a multi-layer stacking algorithm
Published 2025-03-01Get full text
Article -
1292
Incremental Instance-Oriented 3D Semantic Mapping via RGB-D Cameras for Unknown Indoor Scene
Published 2020-01-01Get full text
Article -
1293
Construction and Application of Enterprise Internal Audit Data Analysis Model Based on Decision Tree Algorithm
Published 2022-01-01“…This paper constructs the internal audit flowchart in the big data environment and studies the optimization of the internal audit process in the big data environment. …”
Get full text
Article -
1294
-
1295
A Novel Intensive Distribution Logistics Network Design and Profit Allocation Problem considering Sharing Economy
Published 2018-01-01“…While the development of sharing economy makes it possible to achieve the integration of whole social logistic resources, big data technology can grasp customer’s logistics demand accurately on the basis of analyzing the customer’s logistics distribution preference, which contributes to the integration and optimization of the whole logistics resources. …”
Get full text
Article -
1296
Research on network risk assessment based on attack graph of expected benefits-rate
Published 2022-08-01“…As Internet applications and services become more and more extensive, the endless network attacks lead to great risks and challenges to the security of information systems.As a model-based network security risk analysis technology, attack graph is helpful to find the vulnerability between network nodes and the harm of being attacked.It has been proved to be an effective method to find and prevent network security risks.Attack graph is mainly divided into state-based attack graph and attribute-based attack graph.Due to the problem of state explosion in state-based attack graph, most researchers prefer the attribute-based attack graph for network risk assessment.In view of the existing researches on attribute-based attack graph, they excessively rely on the vulnerability of network nodes and the essential attributes of atomic attack.However, they ignore that rational attackers usually choose specific attack paths by maximizing attack benefits.Then, a network risk assessment framework and a quantification method of attack benefits-rate based on expected benefits-rate attack graph were proposed.The network risk assessment framework took the open vulnerability resource database, the new vulnerabilities found by the vulnerability mining system and the big data related to network attack and defense as the basic data source.The network risk assessment framework also took the open source big data platform as the analysis tool to mine and calculate the elements related to attack cost and attack benefit.Using the concepts of cost, benefit and benefit-rate in economics, the calculation model of expected benefit-rate of atomic attack was constructed.By constructing the attribute-based attack graph of the target network, the expected benefit-rate of atomic attack on the attack path was calculated, and the expected benefit-rate list of all possible attack paths was generated.Furthermore, taking the expected goal as the starting point, the search was carried out according to the specific optimization strategy (backtracking method, greedy algorithm, dynamic programming).And the complete attack path with the maximum benefit-rate was obtained, which provided the basis for network risk assessment.The simulation results show the effectiveness and rationality of the proposed expected benefit-rate attack graph network risk assessment method, which can provide support for discovering and preventing network security problems.…”
Get full text
Article -
1297
-
1298
Intelligent Ensemble Deep Learning System for Blood Glucose Prediction Using Genetic Algorithms
Published 2022-01-01Get full text
Article -
1299
Medyalararası Gündem Belirleme Çalışmalarında R Stüdyo Kullanımı: Rozelle-Campbell Taban Hizası ile Çapraz Gecikmeli Korelasyonun Bilişimleştirilmesi
Published 2020-06-01“…Researchers using intermedia agenda-setting theory have also affected this trend by conducting studies using big data and social media data. The Rozelle-Campbell formula is widely used by such researchers to investigate media effects and their direction. …”
Get full text
Article -
1300
Editor's Note
Published 2022-02-01“…New and advancing technologies such as artificial intelligence, big data and the Internet of Things have injected themselves in big and small ways in various aspects of daily life. …”
Get full text
Article