Showing 1,461 - 1,480 results of 1,987 for search '"big data"', query time: 0.07s Refine Results
  1. 1461

    Selected Topics in Management and Modeling of Complex Systems: Editorial Introduction to Issue 16 of CSIMQ by Peter Forbrig

    Published 2018-10-01
    “…The range of topics ends with the discussion of specific algorithms that allow entity clustering for Big Data analysis. The goal of these algorithms is the identification of different notations of references that refer to the same real-world object. …”
    Get full text
    Article
  2. 1462

    Simple-Random-Sampling-Based Multiclass Text Classification Algorithm by Wuying Liu, Lin Wang, Mianzhu Yi

    Published 2014-01-01
    “…The space-time overhead of the algorithms must be concerned about the era of big data. Through the investigation of the token frequency distribution in a Chinese web document collection, this paper reexamines the power law and proposes a simple-random-sampling-based MTC (SRSMTC) algorithm. …”
    Get full text
    Article
  3. 1463

    Prediction of the waterborne navigation density based on the multi-feature spatio-temporal graph convolution network by Wei DONG, Leilei ZHANG, Ziheng JIN, Wei SUN, Junbo GAO

    Published 2020-09-01
    “…In the face of the development of the information technology in the port and waterway,the Internet of things (IoT) technology can help to build China’s water transport perception network.The big data analysis of the waterborne transport has become a hot topic for researchers and practitioners in the field of transportation.The navigation density of each port in the water transportation is nonlinear and spatio-temporal correlation,so it is a great challenge to accurately predict it.A multi-feature spatiotemporal graph convolution network (MFSTGCN) was proposed to solve the problem of the traffic density prediction.MFSTGCN effectively captured the spatial-temporal correlation of the ship navigation density data by using the spatial convolution and temporal convolution through three features,which were navigation volume,average ship speed and ship density.The experiment was carried out on the automatic identification system (AIS) data set collected from a shipping platform.The results show that the prediction effect of the MFSTGCN model is better than the spatio-temporal graph convolution network (STGCN) model.…”
    Get full text
    Article
  4. 1464

    Interoperable Internet of Medical Things platform for e-Health applications by Jesús Noel Sárez Rubí, Paulo Roberto de Lira Gondim

    Published 2020-01-01
    “…Moreover, the heterogeneity in the large volume of health data generated by Internet of Medical Things platforms must be attenuated for the proper application of big data processing techniques. This article proposes the joint use of openEHR and Semantic Sensor Network semantics for the achievement of interoperability at the semantic level and use of a machine-to-machine architecture for the definition of an interoperable Internet of Medical Things platform.…”
    Get full text
    Article
  5. 1465
  6. 1466
  7. 1467

    Provably secure rational delegation computation protocol by Youliang TIAN, Qiuxian LI, Duo ZHANG, Linjie WANG

    Published 2019-07-01
    “…A provably secure rational delegation computation scheme was proposed to solve the requirement of security issues in rational delegate computation.Firstly,game theory was introduced into delegation computation and according to rational participants behavior preferences analysis,a rational delegate computing game model was designed.Secondly,according to the equilibrium demand of game model and the security requirement of rational delegation computation,a rational security model was established.Thirdly,combining Yao's garbled circuit with its advantages of re-randomization,as well as full homomorphic encryption technology,the rational delegation computation protocol was constructed.And the combination of strategies in the protocol could reach the Nash equilibrium state.Finally,the security of the protocol and the privacy of the input and output were proved according to the rational security model,and the performance analysis shows the validity of the protocol.The proposed rational delegation computing protocol not only satisfies the traditional security,but also considers the behavioral preference of participants,which is more in line with the delegationcomputing mode under the big data environment.…”
    Get full text
    Article
  8. 1468

    EC-Structure: Establishing Consumption Structure through Mining E-Commerce Data to Discover Consumption Upgrade by Lin Guo, Dongliang Zhang

    Published 2019-01-01
    “…With the development of Internet economy, many scientific researchers focus on mining knowledge of consumer behavior using big data analysis technology. Because consumption decisions are influenced by not only personal characteristics but also social trends and environment, it is one-sided to analyze the impact of one single factor on the phenomenon of consumption. …”
    Get full text
    Article
  9. 1469

    Cost-Sensitive Support Vector Machine Using Randomized Dual Coordinate Descent Method for Big Class-Imbalanced Data Classification by Mingzhu Tang, Chunhua Yang, Kang Zhang, Qiyue Xie

    Published 2014-01-01
    “…Aiming at class-imbalanced problem on big data, a cost-sensitive support vector machine using randomized dual coordinate descent method (CSVM-RDCD) is proposed in this paper. …”
    Get full text
    Article
  10. 1470

    Risks in Work-Integrated Learning: A Data-Driven Analysis by Xiao Xu

    Published 2025-01-01
    “…By analysing variables related to work placements, student loans, financial assistance, and the alignment of WIL experiences with students’ post-graduation employment, this research provides critical insights into the effectiveness of WIL programs from a large-scale, survey-based, big data perspective. The findings highlight key areas for improvement to mitigate these risks and enhance the overall value of WIL for students across various disciplines.…”
    Get full text
    Article
  11. 1471

    A BP Neural Network-Based GIS-Data-Driven Automated Valuation Framework for Benchmark Land Price by Lei Wu, Yu Zhang, Yongchang Wei, Fangyu Chen

    Published 2022-01-01
    “…The automated valuation of benchmark land price plays an essential role in regulating land demand in Chinese real-estate market as the big data are currently accumulated rapidly. However, this problem becomes highly challenging due to the multidimension, large volume, and nonlinearity of the land price-influencing factors. …”
    Get full text
    Article
  12. 1472

    Model of cyberspace threat early warning based on cross-domain and collaboration by Gang XIONG, Yuwei GE, Yanjie CHU, Weiquan CAO

    Published 2020-12-01
    “…The development of network threat shows the characteristics of initiative,concealment and ubiquity.It poses a severe challenge to the passive,local and isolated traditional network defense mode.In view of the new trend of integration of big data,artificial intelligence and network security,a cross-domain collaborative network threat early warning model was proposed,which could enable and increase efficiency for cyberspace security.Firstly,starting from the overall structure of the protected network space,the model constructs a cross-domain function framework with the vertical and horizontal conjunction by dividing the security threat domain,decomposing the system function,designing the information sharing mechanism.Secondly,to enhance the ability of threat information detection,the collaborative technology architecture is designed by the logic of hierarchical management,and the key technologies involved in threat information perception,processing and application,are systematically introduced.Finally,with the help of application scenarios,qualitatively the capability increment of the proposed threat early warning model was described.…”
    Get full text
    Article
  13. 1473

    A computing allocation strategy for Internet of things’ resources based on edge computing by Zengrong Zhang

    Published 2021-12-01
    “…In order to meet the demand for efficient computing services in big data scenarios, a cloud edge collaborative computing allocation strategy based on deep reinforcement learning by combining the powerful computing capabilities of cloud is proposed. …”
    Get full text
    Article
  14. 1474

    Enhancing 5G Networks with Edge Computing: An Overview Study by Chaouki Halima, Iqdour Radouane, Boulouird Mohamed

    Published 2024-01-01
    “…MEC is a new computing model proposed within the framework of the rapid development of IoT, AI, and big data, aiming to bring cloud capabilities closer to the network edge. …”
    Get full text
    Article
  15. 1475
  16. 1476

    Algorithm Domination As A New Surveillance System by Ahmet Ayhan Koyuncu, Muhittin Evren

    Published 2024-12-01
    “…It profiles people thanks to the information obtained with big data. In this way, people can be easily manipulated and directed by algorithms. …”
    Get full text
    Article
  17. 1477

    Smart universities: Adaption challenges for Historically black universities in South Africa: A concept overview. by Dr. Victor H Mlambo, Dr. Hlanganani Mnguni

    Published 2025-01-01
    “… Universities today are experimenting with AI and big data to improve how students live and learn on campus; however, from a South African perspective, the question is: can historically black universities adapt to this ever-changing higher education environment? …”
    Get full text
    Article
  18. 1478

    Artificial Intelligence in Automotives: ANNs’ Impact on Biodiesel Engine Performance and Emissions by Ramozon Khujamberdiev, Haeng Muk Cho

    Published 2025-01-01
    “…The integration of ANNs with big data and sophisticated algorithms paves the way for more accurate and reliable engine modeling, essential for advancing sustainable and eco-friendly automotive technologies. …”
    Get full text
    Article
  19. 1479

    Efficient privacy-preserving decision tree classification protocol by Lichuan MA, Jiayi PENG, Qingqi PEI, Haojin ZHU

    Published 2021-08-01
    “…To provide privacy-preserving decision tree classification services in the Internet of things (IoT) big data scenario, an efficient privacy-preserving decision tree classification protocol was proposed by adopting the secure multiparty computation framework into the classification model.The entire protocol consisted of three parts: the original decision tree model mixing, the Boolean share-based privacy-preserving comparing, and the 1-out-of-n oblivious transfer-based classification result obtaining.Via the proposed protocol, the service providers could protect the parameters of their decision tree models and the users were able to derive the classification result without exposing their privately hold data.Through a concrete security analysis, the proposed protocol was proved to be secure against semi-honest adversaries.By implementing the proposed protocol on various practical decision tree models from open datasets, the classification accuracy and the average time cost for completing one privacy-preserving classification service were evaluated.After compared with existing related works, the performance superiority of the proposed protocol is demonstrated.…”
    Get full text
    Article
  20. 1480