Showing 1,321 - 1,340 results of 1,987 for search '"big data"', query time: 0.07s Refine Results
  1. 1321
  2. 1322

    The Recent Progress and Applications of Digital Technologies in Healthcare: A Review by Maksut Senbekov, Timur Saliev, Zhanar Bukeyeva, Aigul Almabayeva, Marina Zhanaliyeva, Nazym Aitenova, Yerzhan Toishibekov, Ildar Fakhradiyev

    Published 2020-01-01
    “…The aim of the review is to discuss and analyze the recent progress on the application of big data, artificial intelligence, telemedicine, block-chain platforms, smart devices in healthcare, and medical education. …”
    Get full text
    Article
  3. 1323
  4. 1324
  5. 1325

    Application of intelligent sorting of customer service work orders with multiple factors vectorization by Hua REN, Zheng WANG, Shaomin WANG

    Published 2018-12-01
    “…As the most important contact point for customers in the internet industry,customer service orders have become the main issues that need to be addressed and urgently solved in various industries.The intelligent sequencing of work orders provides a feasible application for solving this problem.The rapid development of artificial intelligence technology and big data technology has given new directions and opportunities to solve such problems.The background of the intelligent sequencing of customer service orders was analyzed firstly.On the basis of this,the main methods and implementations of intelligent sequencing of customer service orderswere analyzed,and the application of intelligent sequencing of customer service orders based on multi-factor vectorization was expounded.…”
    Get full text
    Article
  6. 1326

    Collaborating Filtering Method Based on Multiple Data Sources by Fushun Ke, Xiaohui Yao

    Published 2015-07-01
    “…The highly efficient utilization of multiple data sources is a key challenge in big data applications.Based on the collaborative filtering recommendation,services pick consumption behaviors of similar clients by clustering to generate the recommendation list.Client clustering contains two units,one is preliminary clustering,and the other is synthetic clustering.Preliminary clustering use client-product score matrixes,telecommunication service identities,client network behaviors and etc.to calculate similarities.Synthetic clustering weights the abundance of data,and then completes the similarity calculation and client clustering.Adjustable weights of data validity were introduced to optimize the system on the basis of click rates and conversion rates of recommendation list.…”
    Get full text
    Article
  7. 1327

    Application Design of Private Cloud of Enterprise Based on Water Resources Survey and Design ——A Case Study of Cloud Platform of Dongguan Water Resources Survey and Design Institut... by LIANG Qian, CHEN Guotao, ZHONG Rongguang

    Published 2020-01-01
    “…The private cloud is good at providing services for big data inside and outside theenterprise. Taking Dongguan water resources survey and design institute as an example, thispaper studies the application of private cloud in water resources survey and design enterprisesdeeply based on the internal professional division of labor and the actual external productionservices, and proposes the application mode, architecture, service scope, data source andmanagement mode of private cloud, which provide reference for application of private cloud in similarenterprises.…”
    Get full text
    Article
  8. 1328

    Formation of the digital ecosystem of industrial cooperation based on advanced digital platforms in the context of reindustrialization by O. E. Pudovkina

    Published 2020-10-01
    “…The article emphasizes that advantage of reindustrialization for industry is to use a digital platform and to work with big data. The generated results will contribute to scientific research aimed at implementing digital transformation programs for industrial enterprises.…”
    Get full text
    Article
  9. 1329

    Design of Multimodal Transport Information Service System Based on Space-Based Internet of Things by Yangyang LU, Guangyue XUE, Hanchang SUN, Qingxia XIE

    Published 2020-12-01
    “…With the statement of container multimodal transport development tendency and network bottleneck hindering information and intelligence evolution, an open, neutral, safe, and credible multimodal transport information service platform based on spaced internet of things and big data technologies was introduced.This platform can provide container tracking, supervision and other comprehensive application services for diff erent freighters such as railway, road, water and air transportation etc., effectively improving the efficiency of multimodal transport service.The platform will bring vital economic and social benefi ts and provide support for establishing modern logistics system.…”
    Get full text
    Article
  10. 1330

    Construction and Practice of Intelligent Data Analysis Center Based on Distributed Power Plant by Yuejin Su, Yingjie Han

    Published 2013-11-01
    “…The results show that it approaches the intelligent diagnostics, device status trend assessment and economic performance evaluation by the light of the information technology in big data era.…”
    Get full text
    Article
  11. 1331

    Research progress of 5G advanced technologies by Hongchi LIN, Wenbin SUN, Jichong GUO, Jinming MA, Yongkang ZHOU, Qiyue YU, Weixiao MENG

    Published 2018-08-01
    “…The standards of the 5th generation communication technology were picking up.Compared with previous generations’communication technologies,5G will facemore complex business requirements,more extreme user experience andmore dense network architecture.Moreover,5G needs to lay a good communication foundation for IoT before the arrival of the era of big data and artificial intelligence.Some hot technologies of 5G were briefly introduced.Firstly,the techni cal vision and demand target of 5G was given,and then the research progress of three hot technologies ofmassive MIMO,ultra dense network and non-orthogonalmulti-access technology was expounded.…”
    Get full text
    Article
  12. 1332
  13. 1333

    Development of visual surveillance standardization by Yuan ZHANG, Ning CAO, Doudou HU

    Published 2018-10-01
    “…The standardization of visual surveillance in major standard organizations both domestic and international was focused on,and the progress of the visual surveillance standards in ITU-T,ONVIF,IEC,ISO,PSIA,HDcctv,IEEE,3GPP,ETSI,TC100,CCSA,AVS and National Information Technical Standardization Committee was introduced.The latest development in standardization area such as visual surveillance systems,architecture,terminals,codecs,intelligent applications,big data applications,cloud storage,cloud computing,edge storage and edge computing were introduced.On this basis,the future research areas of product development and standardization of visual surveillance were discussed.The visual surveillance standardization roadmap was laid out,and the future visual surveillance standardization and research fields were proposed.…”
    Get full text
    Article
  14. 1334
  15. 1335

    Smart home service perception degradation positioning scheme based on the network resource tree and information entropy by Meng MING, Yu SHI, Runhan ZHENG, Yunxi FENG

    Published 2022-05-01
    “…With the accelerating pace of development of the science and technology and informatization, the smart home market is developing rapidly.It brings great convenience to people’s lives, also brings new operation and maintenance tests to operators.A scheme based on big data and AI algorithm, combined with the network resource tree and information entropy was proposed for perceptual real-time monitoring of smart home services, delimiting, segmenting and locating perceptual degradation class faults, aiming to solve the problems of more end-to-end links of smart home services and difficulties in manual location of group faults and single user faults.…”
    Get full text
    Article
  16. 1336

    Approach and Practice of Illegal Voice Call Governance by Hongyi Zhu, Jianhong Lin, Yanqing Wang, Jinran Zhang, Jingyu Wang

    Published 2015-07-01
    “…Telecom operators have been committed to the research of illegal voice call governance approach,which includes analyzing the risk origin,determining the management focus and formulating the prevention strategy.Through the establishment of big data analysis platform based on all kinds of call signaling collection,the call features of all kinds of illegal voice call were researched,the control system of illegal voice call(especially fraud call)was constructed,an all-around control was implemented,and the effect was obvious when the system was applied actually.…”
    Get full text
    Article
  17. 1337

    Research of Technology Solutions and Operation Countermeasures to Telephone Fraud Prevention and Control by Lika Li, Zexiong Ma, Qingnian Chen, Cheng Li

    Published 2014-11-01
    “…According to the root cause analysis, telephone fraud mechanism and behavior characteristics were discussed, network security model and the control system were researched, the recommending of core network number protection ability to ascend was proposed, and a set of early warning and intercept technology system based on big data model of signaling was developed. The real network testing and effect, as well as the key operations management countermeasures were presented.…”
    Get full text
    Article
  18. 1338
  19. 1339
  20. 1340

    Survey of smart contract security by Bo MENG, Jiabing LIU, Qin LIU, Xiaoxiao WANG, Xurui ZHENG, Dejun WANG

    Published 2020-06-01
    “…Blockchain provides a new technology for building transmission and trust mechanism of social ralue.The rapid development of blockchain has promoted the deep integration of smart contract with artificial Intelligence,big data and internet of things,so its security has attracted attention.In recent years,researches on security of blockchain and smart contract have made great progress.Thus,based on smart contract on the blockchain,the related works on security of operating mechanism,on-chain smart contract security and off-chain security were classified,analyzed,compared,summarized and discussed.The hot issues of smart contract security in the future were forecasted.…”
    Get full text
    Article