-
1361
Moving from monitoring to real-time interventions for air quality: are low-cost sensor networks ready to support urban digital twins?
Published 2025-01-01“…This paper contributes insights concerning how to overcome these challenges and calls for common practice in generating and managing live streams of big data.…”
Get full text
Article -
1362
A role for qualitative methods in researching Twitter data on a popular science article's communication
Published 2025-01-01“…Big Data communication researchers have highlighted the need for qualitative analysis of online science conversations to better understand their meaning. …”
Get full text
Article -
1363
Deep Learning-Enabled Integration of Histology and Transcriptomics for Tissue Spatial Profile Analysis
Published 2025-01-01Get full text
Article -
1364
Cloud Based Metalearning System for Predictive Modeling of Biomedical Data
Published 2014-01-01“…This problem is addressed by proposing a cloud based system that integrates metalearning framework for ranking and selection of best predictive algorithms for data at hand and open source big data technologies for analysis of biomedical data.…”
Get full text
Article -
1365
Exploration of developmental toxicity mechanism of emerging environmental contaminants
Published 2024-12-01“…In this column, the developmental toxicity mechanisms of various emerging pollutants were studied by employing model animals, big data analysis, and single-cell sequencing. We hope that this column will encourage further research into the developmental toxicity mechanisms of emerging environmental contaminants and provide a scientific base for policy-making.…”
Get full text
Article -
1366
Digital Empowerment of the Innovation of Ideological and Political Education Methods
Published 2024-01-01“…In the digital era, ideological and political education plays a leading role in the field of ideology and politics, and it should make use of big data technology to enhance the cohesion and leadership of the mainstream ideology, to enhance the vividness of ideological and political education by adapting educational content and methods, and to gather the power of ideological and political education by taking digital technology as the basis, breaking through the limitations of time and space and the field, and realizing the collection and sharing of high-quality resources.…”
Get full text
Article -
1367
-
1368
Towards converged, intelligent, low-carbon characterized 5G-Advanced technologies
Published 2022-03-01“…With the expansion of 5G deployment scale, the industry has paid more attention to 5G evolution.It is not only the extension of the existing 5G technology, but also a transition from 5G to 6G.In April 2021, 3GPP named 5G evolution as 5G-Advanced.The process of 5G-Advanced was introduced.The status of 5G technology so far was summarized, and the direction of 5G evolution technologies were analyzed.Converged, intelligent and low- carbon as the three characteristics of the 5G evolution was proposed.More specially, the multimedia enhancement, heterogeneous network convergence and network big data analysis were introduced.Considering the network technology development, difficulties and key aspects of the system design were also identified.…”
Get full text
Article -
1369
On Disturbance Rejection for a Class of Nonlinear Systems
Published 2018-01-01Get full text
Article -
1370
-
1371
Research on campus emergency command platform incorporating cloud conferencing technology
Published 2024-11-01“…By establishing a campus emergency command platform that integrates cloud conferencing technology, new-generation information technologies like cloud computing, 5G, artificial intelligence, and big data were leveraged to integrate conference room systems, security monitoring systems, and cloud video conferencing systems, which had resulted in a platform capable of multi-terminal on-site response, multi-venue access, secure and stable streaming media data transmission, and comprehensive decision-making assistance. …”
Get full text
Article -
1372
Cross-Domain Recommendation Algorithm Based on Latent Factor Model
Published 2015-07-01“…In the internet environment,the combining of multi-source heterogeneous information objects in different areas makes users face information selection dilemma problem in big data environment.It has been very difficulty for traditional information recommendation algorithms to adapt to the interdisciplinary information recommendation service.The evaluation model from a user clustering set to an information object clustering set has common characteristics of cross-domain and personality characteristics of single domain.By analyzing the evaluation data from users to information objects in different areas,these characteristics were extracted based on latent factor model.Then by transmitting and sharing the common characteristics of cross-domain,the data sparseness problem of target field was alleviated,which could improve the accuracy of cross-domain information recommendation.…”
Get full text
Article -
1373
Load balancing based on clustering analysis and deep learning for multi-frequency and multi-mode network
Published 2020-07-01“…Load balancing is a huge challenge for LTE multi-frequency and multi-mode network.Hundreds of parameters are involved in load balancing for the complex network structure.Therefore,it is difficult to perform precise and meticulous configuration only relying on human experience.In order to cope with the challenge,a load balancing scheme based on clustering analysis and deep learning was proposed.Firstly,the key indicators were selected to identify the network scenes,and then big data and deep learning technologies were used to mine the relationship between data.Finally,the optimum system parameters for different network scenes were found.It has been proved that machine learning technology can greatly improve the accuracy and the efficiency of parameter configuration.…”
Get full text
Article -
1374
Numérique et humanités : de l’ancillarité à la fécondité grâce à la modélisation computationnelle des connaissances
Published 2023-07-01“…Since the end of the 1990s, new tools have been developed for collecting, organising and accessing digital content, including the considerable volume of big data. We plead here for an amplification of the relationship between HSS and computer science, exploiting not only technologies, but also ideas and methods, especially computational thinking. …”
Get full text
Article -
1375
Application of Computer-aided Rehabilitation
Published 2019-08-01“…With the rapid development of computer computing technology, big data, artificial intelligence and cloud computing, the application of computer in the field of rehabilitation medicine is more and more extensive. …”
Get full text
Article -
1376
Research and practice of PON fault intelligent detection and recovery technology
Published 2016-09-01“…Based on current situation that PON network faults are mainly processed around the user account password and terminal problems,and all the complex phenomena and network issues involved are sent to the operation and maintenance department,leading to low failure processing efficiency and high treatment pressure,an end-to-end fault diagnosis and repair method was proposed based on the customer resource tree.Through adopting big data analysis technology and service capability opening technology,an end-to-end fault detection system from service platform to client terminals was built and fault phenomena,conclusions and treatment methods of the nodes in the resource tree were combed,and fault processing scenarios were listed to verify the accuracy of fault detection and fast recovery.The result shows that the failure interception efficiency is improved by 34%.…”
Get full text
Article -
1377
Survey on data preserving for the search of internet of things
Published 2016-09-01“…With the rapid development of the internet of things(IoT) technology and big data technology,the search engine for internet of things become a hot research topic.However,because of the openness of the search of IoT,the privacy in traditional internet search area become more prominent and face more challenges.Firstly,the research background and challenges of privacy preservation for search of IoT were described.Secondly,the framework of data privacy preservation for search of IoT were presented and several main research domain in this framework were described.Thirdly,several privacy preservation technology appropriated for search of IoT were described in detail,including the background,recent research work,main research directions.Finally,the current problems and important research field for future were presented.…”
Get full text
Article -
1378
De l’histoire numérique à l’histoire données ?
Published 2023-07-01“…Historians have been rigorously producing and analyzing information long before the emergence of big data and the digital age. However, the current transformations, which see the accumulation of large deposits of historical data, create new challenges and opportunities that we return to here. …”
Get full text
Article -
1379
Optimizing stewardship of the land?
Published 2024-12-01“… This research considers the ways in which digital agriculture (DA) technologies (like robotic machinery, big data applications, farm management software platforms and drones) fit into discourses of sustainable agriculture in the Canadian political and media landscape. …”
Get full text
Article -
1380
Development trends of the information technology and cyberspace security
Published 2015-12-01“…The basic characteristics,mutual differences and intrinsic relationships of the internet,mobile internet,internet of things,cloud computing and big data technologies were analyzed,and the evolutions of the information technology and information service mode were deeply studied,the spiraling development trends of information technology and our catching up opportunities were explored,and that the major problem in next generation of in-formation technology was energy consumption was pointed out.Based on the analysis,the security requirements and challenges of the network connections,Industrie 4.0 issues in our cyberspace were analyzed,and that the research on security technology should be synchronized with the development of information technology was presented.Finally,the development opportunities and strategies of our cyberspace security were concluded,and an outlook of the de-velopment trends of the cyberspace security was given.…”
Get full text
Article