Showing 1,381 - 1,400 results of 1,987 for search '"big data"', query time: 0.07s Refine Results
  1. 1381

    Resources scheduling and cooperative management of space-based information networks by Rui WANG, Xiao-dong HAN, Chao WANG, Xi ZHOU, Jun LONG

    Published 2017-10-01
    “…Along with the expansion of the range and space of space-based information networks,and the enhancement of network cognitive ability,real-time,reliability and safety were needed to satisfy higher requirements.The demands of space-based information network designing referred to different platforms and users,random access in anytime,heterogeneous network architecture,cooperative management of different type of resource,and so on.Space-based network operation had the characteristic of high-dynamic,multi-type and big data.The realization of efficient resource management was discussed,and the analysis of multiple dimensions to objects in space-based information networks was realized,the design of dynamic space-based resource virtualization was further mentioned,scheduling and cooperative management was mentioned.…”
    Get full text
    Article
  2. 1382
  3. 1383

    Analysis on marine monitoring and data service of marine internet by Chao DONG, Yankun CHEN

    Published 2018-06-01
    “…China has abundant marine resources and provides new ideas for alleviating the shortage of resources.At the same time,natural disasters in the sea caused great economic losses in the coastal areas.Therefore,in the process of marine development and utilization,there is an increasing need for an ocean interconnected information network that can provide real-time marine sampling,environmental monitoring,underwater exploration,and disaster warning applications.Firstly,the characteristics of marine monitoring methods and monitoring data were introduced in detail.Then,taking the oceanography survey of China and the business characteristics of sea-gas CO<sub>2</sub>exchange flux monitoring as examples,it was found that in the long-term marine monitoring task,there were three issues that needed to be solved urgently,including the needs of the marine monitoring internet business,the needs of shared platforms in the context of marine monitoring big data,and the needs of submarine observation networks.…”
    Get full text
    Article
  4. 1384

    Key technology of VANET in terminal-management-cloud model by Junhui ZHAO, Yan CHEN, Dechang HUANG, Dacheng HUANG

    Published 2016-08-01
    “…With the increasing of traffic problems,such as traffic congestion,intelligent transportation system(ITS)becomes an effective way to solve the increasing transportation issues of the current traffic.Vehicular Ad Hoc networks(VANET)and vehicles as important parts of ITS have become focus of current research.Firstly,the development history and current situation of VANET both at home and abroad were introduced,and then VANET from the terminal system,management system,cloud system were analyzed respectively.Then,the V2V and V2R communication technologies of terminal system were introduced emphatically.In addition,VANET oriented traffic cloud and big data technology were outlined.Finally,application scenarios and the future development of communication technologies in VANET were discussed.…”
    Get full text
    Article
  5. 1385

    Analysis of value-added services of power communication network in energy internet by Hong ZHU, Qi SHAO

    Published 2019-06-01
    “…The value-added services of power communication networks in the energy internet were introduced.5G,4K/8K ultra high definition video,business that cloud drive all-optical network construction were analyzed.How the power company uses its resource advantages to expand energy internet value-added services and their business models were analyzed,including infrastructure resource leasing,backbone line business leased line,FTTH wholesale and telecommunication business,data center leasing,etc.Based on ubiquitous electric internet of things,power company that could combine big data and artificial intelligence to expand more value-added services was forcasted.…”
    Get full text
    Article
  6. 1386

    Survey on differential privacy and its progress by Zhi-qiang GAO, Yu-tao WANG

    Published 2017-10-01
    “…With the arrival of the era of big data sharing,data privacy protection issues will be highlighted.Since its introduction in 2006,differential privacy technology has been widely researched in data mining and data publishing.In recent years,Google,Apple and other companies have introduced differential privacy technology into the latest products,and differential privacy technology has become the focus of academia and industry again.Firstly,the traditional centralized model of differential privacy was summarized,from the perspective of analysis of data mining and data released in the differential privacy way.Then the latest local differential privacy regarding data collection and data analysis based on the local model was described,involving crowdsourcing with random response technology,BloomFilter,statistical inference techniques.Finally,the main problems and solutions of differential privacy technology were summarized.…”
    Get full text
    Article
  7. 1387

    Discuss on the Exploration and Practice of Information Communication Network Fault in the Centralized Monitoring Mode by Yang Wang

    Published 2015-01-01
    “…The engineering practical value and management supporting values of emerging technology were analyzed in centralized fault management,such as big data technology,virtualization technology,etc.…”
    Get full text
    Article
  8. 1388

    Research development and forecast of automatic speech recognition technologies by Haikun WANG, Jia PAN, Cong LIU

    Published 2018-02-01
    “…The purpose of automatic speech recognition (ASR) is to make the machine to be able to “understand” the human speech and transform it to readable text information.ASR is one of the key technologies of human machine interaction and also a hot research domain for a long time.In recent years,due to the application of deep neural networks,the use of big data and the popularity of cloud computing,ASR has made great progress and break through the threshold of application in many industries.More and more products with ASR have entered people’s daily life,such as Apple’s Siri,Amazon’s Alexa,IFLYTEK speech input method and Dingdong intelligent speaker and so on.The development status and key breakthrough technologies in recent years were introduced.Also,a forecast of ASR technologies’ trend of development was given.…”
    Get full text
    Article
  9. 1389

    Key technologies and development trends of intelligent customer service for operators by Xiaoliang MA, Ying LIU, Dequan DU, Lingling AN

    Published 2023-05-01
    “…The technology development trend of intelligent customer service for operators was discussed, and automatic speech recognition (ASR) transcription error correction technology, semantic extraction technology, encrypted database, and agent access control technology were introduced.Two different research directions of error detection and automatic error correction for speech recognition were analyzed, two directions of supervised learning and unsupervised learning were discussed, and big data encryption and agent access control technologies were introduced.At the same time, the technical directions of multimodal interaction technology, intelligent recommendation technology and disabled-oriented services were prospected.In conclusion, the development and innovation of intelligent customer service technology will bring a more efficient and convenient service experience to the communication industry and strongly promote the progress of the industry service level.…”
    Get full text
    Article
  10. 1390
  11. 1391
  12. 1392
  13. 1393

    Design and application of grid cloud testing service platform by Xiaorong CHANG, Chunguang ZHANG, Sining WANG, Junwei ZHANG, Jiamei WU

    Published 2017-07-01
    “…With the rapid development of big data and cloud computing technology,and successful practice in domestic and foreign enterprises,how to introduce the cloud computing technology,to innovate the traditional test mode,to achieve the conversion of the traditional software testing to the cloud model test mode,become the key to software quality assurance for the enterprise.For cloud platform has strong processing ability,large storage capacity,safety and reliability,moderate distribution capacity,grid cloud testing service platform will meet the advanced,practical,safety and other characteristics,to provide internal and external cloud testing services for enterprises.The application of mobile testing in the cloud platform was enumerated,the availability of the grid cloud testing service platform was verified,the advantages of the platform were analyzed.…”
    Get full text
    Article
  14. 1394

    Review of group recommendation analysis and research by Yunchang WU, Baisong LIU, Yangyang WANG, Chenjie FEI

    Published 2018-12-01
    “…With the advent of age of big data,the application fields of recommendation systems have become increasingly widespread.The recommendation service object of the group recommendation systems are expanded from a single user to a group of members,and becoming one of the research hotspots in the recommendation system fields.The group recommendation system needs to consider the preferences of all group members,and to fuse the preferences of the members,and to alleviate the conflicts of preferences among them,so that the recommendation results satisfy all group members as much as possible.The recent research progress of the group recommendation was mainly reviewed.The frontiers of group classification,group detection and group prediction recommendation were summarized.And main factors of the group recommendations were generalized.Finally,the research points of group recommendation and its prospects were separately elaborated.…”
    Get full text
    Article
  15. 1395

    6G endogenous security:architecture and key technologies by Yang LIU, Mugen PENG

    Published 2020-01-01
    “…At the beginning of design for the traditional mobile communication systems,security is considered as an independent technology,relying on “patch” and “plug-in” to realize the security protection of wireless communica-tion.The sixth-generation (6G) mobile communication system is designed based on software-defined slicing platform,edge computing,artificial intelligence and big data mining to adapt to different application scenarios and performance objectives,making the traditional network security mechanisms difficult to guarantee 6G's requirements for embed-ded security.6G endogenous security was proposed,the architecture and key technologies of 6G endogenous security were described,the security threats in the new technologies were discussed which 6G would adopt,and the chal-lenges and future research directions of 6G endogenous security were provided.…”
    Get full text
    Article
  16. 1396

    Overview of the technologies of threat intelligence sensing,sharing and analysis in cyber space by Jian-hua LI

    Published 2016-02-01
    “…With a rapid development of information technologies including big data,cloud computing,Internet of things,etc.,the threats in cyber space also become more ubiquitous and complex.Moreover,more and more persis-tence and hidden features present in all kinds of network attacks.Threat intelligence based network defense can analyze the undergoing attacks and predict the threat situation in the future.Furthermore,based on the potential risk,users can define efficient security policy,thus the defense capabilities of the cyber space could be enhanced system-atically.Threat intelligence is a very wide research area.The research works and developments of the sensing,shar-ing and analysis for threat intelligence were studied and reviewed deeply.…”
    Get full text
    Article
  17. 1397

    Journalists’ Response and Reporting of Public Emergencies in the Era of Artificial Intelligence by Shaoying Lian, Ruoyu Mi, Runhua Tang

    Published 2022-01-01
    “…In order to improve the response ability of journalists to public emergencies, this study uses the computer simulation research method, based on Shannon’s information theory and the basic theory of journalism and communication, constructs the general model of public emergencies based on the statistical results of big data, and constructs the irrational natural person game model of four types of news communication participants. …”
    Get full text
    Article
  18. 1398

    Ecologic planning and application of broadband access network based on geographic grid by Qi ZHANG

    Published 2018-09-01
    “…With the development of broadband services,fixed broadband access network is at the top speed in construction.Multi-carriers pay more attention on both network scale and ability to keep the necessary advantages in access availability and effectiveness.On the other hand,the network construction is also depended on both the co-operation with service development and the match with fundamental resources.The balance of the above factors is the key role in actual network planning and construction.Considering the present planning method of broadband access network,the bottleneck was analyzed and concluded.Based on multi-dimension geographic grid,the ‘cubic model’,containing services,network ability and fundamental resources,were also developed and introduced.Finally,supported by the big data of network statistic,the model was applied and also verified in actual planning environment on the according self-researched planning platform.…”
    Get full text
    Article
  19. 1399
  20. 1400