Showing 1,401 - 1,420 results of 1,987 for search '"big data"', query time: 0.10s Refine Results
  1. 1401

    SDG11-Based Sustainability Assessment of Urban Communities: A Case Study of Changsha by Qin Shuqian, Zhang Nan, Zhu Peijuan, Zhang Yong, Zhang Chen

    Published 2025-01-01
    “…The data used in the indicator system mainly come from objective big data with temporal continuity, which is conducive for conducting longitudinal continuous tracking research and horizontal comparison research with other cities.…”
    Get full text
    Article
  2. 1402
  3. 1403
  4. 1404
  5. 1405

    A Data-Driven Deep Learning Framework for Prediction of Traffic Crashes at Road Intersections by Mengxiang Wang, Wang-Chien Lee, Na Liu, Qiang Fu, Fujun Wan, Ge Yu

    Published 2025-01-01
    “…Additionally, to address the serious issues of imbalanced classes in TCP and large-scale heterogeneous big data, we propose an effective data sampling approach in data preparation to facilitate model training. …”
    Get full text
    Article
  6. 1406

    SOCIOLOGY OF KNOWLEDGE SECURITY IN THE DIGITAL EDUCATIONAL SPACE by M. Yu. Zakharov, I. E. Starovoytova, A. V. Shishkova

    Published 2020-05-01
    “…Artificial intelligence and machine learning technologies, big data analysis, robotics and virtualization have taken their place in the educational process, and traditional offline teaching methods require revision. …”
    Get full text
    Article
  7. 1407
  8. 1408

    A Review of Traffic Congestion Prediction Using Artificial Intelligence by Mahmuda Akhtar, Sara Moridpour

    Published 2021-01-01
    “…With the introduction of big data by stationary sensors or probe vehicle data and the development of new AI models in the last few decades, this research area has expanded extensively. …”
    Get full text
    Article
  9. 1409
  10. 1410

    PCEP application in cloud-network convergence and end to end traffic assurance scheme by Yue WANG, Aijun WANG, Honglei XU

    Published 2021-08-01
    “…With the booming development of new technologies such as cloud computing, big data and the continuous upgrading of communication infrastructure, the major domestic ISPs have proposed the development strategy of building a centralized control and flexible cloud network infrastructure under the trend of intelligent-traction network transformation.As a path calculation protocol widely used in the existing SDN architecture, PCEP protocol was often used to solve the problem of cross-layer and cross-domain path computing under complex network environment.The application of PCEP protocol in cloud-network convergence scenario was discussed and an end-to-end traffic guarantee scheme was introduced based on PCEP protocol which could ensure the connection-oriented network communication and make end-to-end service guarantee in native IP environment.It helps to improve the operators' ability of real-time perception, agile response and intelligent analysis of the network and meets the operation and maintenance management requirements such as global scheduling of communication resources, comprehensive opening of capabilities and flexible architecture.…”
    Get full text
    Article
  11. 1411

    PCPIR-V:parallel privacy protected algorithms for nearest neighbor query based on Spark by Shi-zhuo DENG, Ji-tao YAO, Bo-tao WANG, Yue-mei CHEN, Ye YUAN, Yan-hui LI, Guo-ren WANG

    Published 2016-05-01
    “…To address the low-efficiency problem for query privacy protection on big data,parallel CPIR-V (PCPIR-V),which had a high level of privacy protection for nearest neighbor query,was presented and implemented based on spark.Two parallel strategies for PCPIR-V,Row strategy and Bit strategy,were proposed.To avoid redundant multiplications,the repeated products were cached based on a clustering technique while computing CPIR on Spark.According to the evaluation results of PCPIR-V on three datasets,the scalablity of PCPIR-V is good until the number of core is larger than 40.The cost of PCPIR-V with the method of caching partial multiplication results is reduced by 20% averagely.…”
    Get full text
    Article
  12. 1412
  13. 1413

    Stochastic algorithm for HDFS data theft detection based on MapReduce by Yuanzhao GAO, Binglong LI, Xingyuan CHEN

    Published 2018-10-01
    “…To address the problems of big data efficient analysis and insider theft detection in the data theft detection of distributed cloud computing storage,taking HDFS (hadoop distributed file system) as a case study,a stochastic algorithm for HDFS data theft detection based on MapReduce was proposed.By analyzing the MAC timestamp features of HDFS generated by folder replication,the replication behavior’s detection and measurement method was established to detect all data theft modes including insider theft.The data set which is suitable for MapReduce task partition and maintains the HDFS hierarchy was designed to achieve efficient analysis of large-volume timestamps.The experimental results show that the missed rate and the number of mislabeled folders could be kept at a low level by adopting segment detection strategy.The algorithm was proved to be efficient and had good scalability under the MapReduce framework.…”
    Get full text
    Article
  14. 1414

    Application and Legal Governance of Computational Technologies in Credit Investigation: An Interdisciplinary Perspective by Ying Zhang, Zhen Xie, Xiuwei Qu

    Published 2022-01-01
    “…By analyzing the computational technologies and algorithms most commonly used in credit data collection and data storage, data transmission and data access, data analysis and processing, data calculation, result output and effect evaluation, this paper summarizes and proposes a unified general process of modern credit investigation, pointing out that in this general process, low data quality, privacy violation, algorithmic bias are the main challenges in the big data era, and countermeasures like data quality control, privacy protection, and algorithm governance need to be to be taken seriously into account in order to further explore the great potential of the credit investigation under the legal framework.…”
    Get full text
    Article
  15. 1415

    Flow-network based auto rescale strategy for Flink by Ziyang LI, Jiong YU, Chen BIAN, Yitian ZHANG, Yonglin PU, Yuefei WANG, Liang LU

    Published 2019-08-01
    “…In order to solve the problem that the load of big data stream computing platform is increasing with fluctuation while the cluster was not able to rescale efficiently,the Flow-network based auto rescale strategy for Flink was proposed.Firstly,the flow-network model was set up and the capacity of each edge that was calculated by self-learning algorithm.Secondly,the bottleneck of the cluster was acquired by maximum-flow algorithm and the resource rescheduling plan was drawn up.Finally,the resource rescheduling plan was executed and the stateful data was migrated efficiently by the data migration algorithm based on the strategy of data partitioning by bulk and bucket.The experimental results show that the strategy can effectively provide performance promotion in the application with complex stateful data.It improved the throughput of the cluster and reduced the time overhead of the data migration on the premise of satisfying the latency constrain of the application,which means that the strategy promotes the scalability of the cluster efficiently.…”
    Get full text
    Article
  16. 1416

    A dynamic timeslot-based multicast bandwidth advance reservation algorithm for enterprise video conferencing systems by Zhiwen LIAO, Ling ZHANG

    Published 2019-07-01
    “…The simulation results show that compared with other algorithms, the algorithm can effectively reserve bandwidth for big data conferences and solve the problem of time overhead bottleneck.…”
    Get full text
    Article
  17. 1417

    Data-intensive service deployment based on edge computing by Yongmei GAO, Guanjie CHENG

    Published 2019-07-01
    “…The demand is getting higher and higher for data processing due to big data volume, thus, data-intensive service shave emerged. …”
    Get full text
    Article
  18. 1418

    Network telemetry technology and its application in automatic network operation and maintenance by Dongfeng MAO, Man JIA, Xiaoming HE, Zhihua LIU

    Published 2021-02-01
    “…As a new data acquisition technology, network telemetry has greatly enriched the diversity of data acquisition and expanded the range of traditional OAM data acquisition, whose goal is to realize real-time global network state visibility and traffic visibility.By combining with big data and AI technology, it can reduce human intervention and improve the operation and maintenance level of network automation.Firstly, the problems and challenges faced by the current IP network operation and maintenance were analyzed, and then it was elaborated that the network telemetry technology was the key enabler to realize the automatous network operation and maintenance.On this basis, the application of network telemetry technology in the IP network automatic operation and maintenance was investigated and discussed, and the reference and guidance for the automatic operation and maintenance of large-scale IP network were provided.…”
    Get full text
    Article
  19. 1419

    Practice and application of distributed data quality management system in power enterprise by Yuanning LI, Sen LIU, Shijun ZHANG, Feng CHEN, Zhiying WANG

    Published 2016-04-01
    “…After researching the system features of data quality,some foreign and domestic cases of big data were analyzed as reference,and a solution based on Hadoop distributed processing framework was given to solve the performance bottleneck of centralized data quality system. …”
    Get full text
    Article
  20. 1420

    تعلیم علم البیانات بأقسام ومدارس المکتبات والمعلومات بالجامعات الأمریکیة : دراسة تحلیلیة by د. مشیرة أحمد صالح

    Published 2020-09-01
    “…This study aims to identify the concept of data science and big data, as itaims to identify the characteristics of the courses of data science in a sample ofthe departments and schools of libraries and information in American universitiesduring the academic year 2019/2020, using the descriptive analytical approach.The study reached several results, including: 213 special data science coursesare available, representing 13.6% of the total courses available in the library andinformation schools. …”
    Get full text
    Article