-
1381
Resources scheduling and cooperative management of space-based information networks
Published 2017-10-01“…Along with the expansion of the range and space of space-based information networks,and the enhancement of network cognitive ability,real-time,reliability and safety were needed to satisfy higher requirements.The demands of space-based information network designing referred to different platforms and users,random access in anytime,heterogeneous network architecture,cooperative management of different type of resource,and so on.Space-based network operation had the characteristic of high-dynamic,multi-type and big data.The realization of efficient resource management was discussed,and the analysis of multiple dimensions to objects in space-based information networks was realized,the design of dynamic space-based resource virtualization was further mentioned,scheduling and cooperative management was mentioned.…”
Get full text
Article -
1382
Distance-Based Topological Descriptors on Ternary Hypertree Networks
Published 2022-01-01Get full text
Article -
1383
Analysis on marine monitoring and data service of marine internet
Published 2018-06-01“…China has abundant marine resources and provides new ideas for alleviating the shortage of resources.At the same time,natural disasters in the sea caused great economic losses in the coastal areas.Therefore,in the process of marine development and utilization,there is an increasing need for an ocean interconnected information network that can provide real-time marine sampling,environmental monitoring,underwater exploration,and disaster warning applications.Firstly,the characteristics of marine monitoring methods and monitoring data were introduced in detail.Then,taking the oceanography survey of China and the business characteristics of sea-gas CO<sub>2</sub>exchange flux monitoring as examples,it was found that in the long-term marine monitoring task,there were three issues that needed to be solved urgently,including the needs of the marine monitoring internet business,the needs of shared platforms in the context of marine monitoring big data,and the needs of submarine observation networks.…”
Get full text
Article -
1384
Key technology of VANET in terminal-management-cloud model
Published 2016-08-01“…With the increasing of traffic problems,such as traffic congestion,intelligent transportation system(ITS)becomes an effective way to solve the increasing transportation issues of the current traffic.Vehicular Ad Hoc networks(VANET)and vehicles as important parts of ITS have become focus of current research.Firstly,the development history and current situation of VANET both at home and abroad were introduced,and then VANET from the terminal system,management system,cloud system were analyzed respectively.Then,the V2V and V2R communication technologies of terminal system were introduced emphatically.In addition,VANET oriented traffic cloud and big data technology were outlined.Finally,application scenarios and the future development of communication technologies in VANET were discussed.…”
Get full text
Article -
1385
Analysis of value-added services of power communication network in energy internet
Published 2019-06-01“…The value-added services of power communication networks in the energy internet were introduced.5G,4K/8K ultra high definition video,business that cloud drive all-optical network construction were analyzed.How the power company uses its resource advantages to expand energy internet value-added services and their business models were analyzed,including infrastructure resource leasing,backbone line business leased line,FTTH wholesale and telecommunication business,data center leasing,etc.Based on ubiquitous electric internet of things,power company that could combine big data and artificial intelligence to expand more value-added services was forcasted.…”
Get full text
Article -
1386
Survey on differential privacy and its progress
Published 2017-10-01“…With the arrival of the era of big data sharing,data privacy protection issues will be highlighted.Since its introduction in 2006,differential privacy technology has been widely researched in data mining and data publishing.In recent years,Google,Apple and other companies have introduced differential privacy technology into the latest products,and differential privacy technology has become the focus of academia and industry again.Firstly,the traditional centralized model of differential privacy was summarized,from the perspective of analysis of data mining and data released in the differential privacy way.Then the latest local differential privacy regarding data collection and data analysis based on the local model was described,involving crowdsourcing with random response technology,BloomFilter,statistical inference techniques.Finally,the main problems and solutions of differential privacy technology were summarized.…”
Get full text
Article -
1387
Discuss on the Exploration and Practice of Information Communication Network Fault in the Centralized Monitoring Mode
Published 2015-01-01“…The engineering practical value and management supporting values of emerging technology were analyzed in centralized fault management,such as big data technology,virtualization technology,etc.…”
Get full text
Article -
1388
Research development and forecast of automatic speech recognition technologies
Published 2018-02-01“…The purpose of automatic speech recognition (ASR) is to make the machine to be able to “understand” the human speech and transform it to readable text information.ASR is one of the key technologies of human machine interaction and also a hot research domain for a long time.In recent years,due to the application of deep neural networks,the use of big data and the popularity of cloud computing,ASR has made great progress and break through the threshold of application in many industries.More and more products with ASR have entered people’s daily life,such as Apple’s Siri,Amazon’s Alexa,IFLYTEK speech input method and Dingdong intelligent speaker and so on.The development status and key breakthrough technologies in recent years were introduced.Also,a forecast of ASR technologies’ trend of development was given.…”
Get full text
Article -
1389
Key technologies and development trends of intelligent customer service for operators
Published 2023-05-01“…The technology development trend of intelligent customer service for operators was discussed, and automatic speech recognition (ASR) transcription error correction technology, semantic extraction technology, encrypted database, and agent access control technology were introduced.Two different research directions of error detection and automatic error correction for speech recognition were analyzed, two directions of supervised learning and unsupervised learning were discussed, and big data encryption and agent access control technologies were introduced.At the same time, the technical directions of multimodal interaction technology, intelligent recommendation technology and disabled-oriented services were prospected.In conclusion, the development and innovation of intelligent customer service technology will bring a more efficient and convenient service experience to the communication industry and strongly promote the progress of the industry service level.…”
Get full text
Article -
1390
Dynamic behaviors of a Leslie-Gower predator-prey model with Smith growth and constant-yield harvesting
Published 2024-11-01Get full text
Article -
1391
-
1392
Analysis of Numerical Method for Diffusion Equation with Time-Fractional Caputo–Fabrizio Derivative
Published 2023-01-01Get full text
Article -
1393
Design and application of grid cloud testing service platform
Published 2017-07-01“…With the rapid development of big data and cloud computing technology,and successful practice in domestic and foreign enterprises,how to introduce the cloud computing technology,to innovate the traditional test mode,to achieve the conversion of the traditional software testing to the cloud model test mode,become the key to software quality assurance for the enterprise.For cloud platform has strong processing ability,large storage capacity,safety and reliability,moderate distribution capacity,grid cloud testing service platform will meet the advanced,practical,safety and other characteristics,to provide internal and external cloud testing services for enterprises.The application of mobile testing in the cloud platform was enumerated,the availability of the grid cloud testing service platform was verified,the advantages of the platform were analyzed.…”
Get full text
Article -
1394
Review of group recommendation analysis and research
Published 2018-12-01“…With the advent of age of big data,the application fields of recommendation systems have become increasingly widespread.The recommendation service object of the group recommendation systems are expanded from a single user to a group of members,and becoming one of the research hotspots in the recommendation system fields.The group recommendation system needs to consider the preferences of all group members,and to fuse the preferences of the members,and to alleviate the conflicts of preferences among them,so that the recommendation results satisfy all group members as much as possible.The recent research progress of the group recommendation was mainly reviewed.The frontiers of group classification,group detection and group prediction recommendation were summarized.And main factors of the group recommendations were generalized.Finally,the research points of group recommendation and its prospects were separately elaborated.…”
Get full text
Article -
1395
6G endogenous security:architecture and key technologies
Published 2020-01-01“…At the beginning of design for the traditional mobile communication systems,security is considered as an independent technology,relying on “patch” and “plug-in” to realize the security protection of wireless communica-tion.The sixth-generation (6G) mobile communication system is designed based on software-defined slicing platform,edge computing,artificial intelligence and big data mining to adapt to different application scenarios and performance objectives,making the traditional network security mechanisms difficult to guarantee 6G's requirements for embed-ded security.6G endogenous security was proposed,the architecture and key technologies of 6G endogenous security were described,the security threats in the new technologies were discussed which 6G would adopt,and the chal-lenges and future research directions of 6G endogenous security were provided.…”
Get full text
Article -
1396
Overview of the technologies of threat intelligence sensing,sharing and analysis in cyber space
Published 2016-02-01“…With a rapid development of information technologies including big data,cloud computing,Internet of things,etc.,the threats in cyber space also become more ubiquitous and complex.Moreover,more and more persis-tence and hidden features present in all kinds of network attacks.Threat intelligence based network defense can analyze the undergoing attacks and predict the threat situation in the future.Furthermore,based on the potential risk,users can define efficient security policy,thus the defense capabilities of the cyber space could be enhanced system-atically.Threat intelligence is a very wide research area.The research works and developments of the sensing,shar-ing and analysis for threat intelligence were studied and reviewed deeply.…”
Get full text
Article -
1397
Journalists’ Response and Reporting of Public Emergencies in the Era of Artificial Intelligence
Published 2022-01-01“…In order to improve the response ability of journalists to public emergencies, this study uses the computer simulation research method, based on Shannon’s information theory and the basic theory of journalism and communication, constructs the general model of public emergencies based on the statistical results of big data, and constructs the irrational natural person game model of four types of news communication participants. …”
Get full text
Article -
1398
Ecologic planning and application of broadband access network based on geographic grid
Published 2018-09-01“…With the development of broadband services,fixed broadband access network is at the top speed in construction.Multi-carriers pay more attention on both network scale and ability to keep the necessary advantages in access availability and effectiveness.On the other hand,the network construction is also depended on both the co-operation with service development and the match with fundamental resources.The balance of the above factors is the key role in actual network planning and construction.Considering the present planning method of broadband access network,the bottleneck was analyzed and concluded.Based on multi-dimension geographic grid,the ‘cubic model’,containing services,network ability and fundamental resources,were also developed and introduced.Finally,supported by the big data of network statistic,the model was applied and also verified in actual planning environment on the according self-researched planning platform.…”
Get full text
Article -
1399
Deep learning and hyperspectral features for seedling stage identification of barnyard grass in paddy field
Published 2025-02-01Get full text
Article -
1400