Showing 1,501 - 1,520 results of 1,987 for search '"big data"', query time: 0.09s Refine Results
  1. 1501

    Socio-economic ecosystems development: a study based on digitalisation indicators by M. V. Alikayeva, L. O. Aslanova, B. Z. Karmova

    Published 2022-03-01
    “…The digitalisation and big data role in economic activity is examined. A number of indicators used worldwide to assess the socio-economic ecosystems digital development quality is considered. …”
    Get full text
    Article
  2. 1502

    Research on Personal Loan Default Risk Assessment Based on Machine Learning by Liu Guangsen

    Published 2025-01-01
    “…In the present era of rapid development of the Internet and big data, the scale of personal loans and the complexity of personal credit data are growing rapidly. …”
    Get full text
    Article
  3. 1503

    Measuring and utilizing temporal network dissimilarity by Xiu-Xiu Zhan, Chuang Liu, Zhipeng Wang, Huijuan Wang, Petter Holme, Zi-Ke Zhang

    Published 2025-01-01
    “…Abstract Quantifying the structural and functional differences of temporal networks remains a fundamental and challenging problem in the era of big data. Traditional network comparison methods, originally developed for static networks, often fall short in capturing the intricate interplay between structural configurations and dynamic temporal patterns inherent in complex systems. …”
    Get full text
    Article
  4. 1504

    Realms of aesthetic experience of classical Chinese gardens based on semantic analysis of online tourism reviews by Mengyuan Xu, Yuanyu Wang, Haitao Yu

    Published 2025-01-01
    “…The novel mixed approach of big data mining and the modeling of aesthetic realms enriched the knowledge of aesthetic experience and provided a new research paradigm for the experiences of cultural heritage by tourists.…”
    Get full text
    Article
  5. 1505
  6. 1506

    Secure vehicular digital forensics system based on blockchain by Meng LI, Chengxiang SI, Liehuang ZHU

    Published 2020-06-01
    “…The emergence of vehicular big data has brought a great promotion to better understand characteristics of vehicular networks,grasp needs of users and improve service qualities.However,malicious users and criminals leverage vehicular networks to conduct illegal behaviors,resulting in a decline in the service quality and difficulties in determining the liability in vehicle accidents.At the same time,there are still some security and privacy issues in the vehicular digital forensics,such as the identity privacy of the data provider and the request control of the data requester.Therefore,a secure vehicular digital forensics scheme based on blockchain was proposed.Firstly,a data requester registered with a certificate authority and an anonymous certificate was obtained for the subsequent data uploading.Then,the data user obtained the public-private key pair and user key in registration,which were respectively used for the data requesting and data decryption.Only if certain attributes were held,the right plaintext could be decrypted.Next,a consortium blockchain was jointly established by several institutions with high credibility to record all data transactions.Finally,the security and privacy were experimentally analyzed,and the performance was tested based on the Ethereum platform.…”
    Get full text
    Article
  7. 1507

    Applicability of Internet of Things in Smart Farming by Khongdet Phasinam, Thanwamas Kassanuk, Mohammad Shabaz

    Published 2022-01-01
    “…Sensors, Internet of Things cameras, mobile applications, and big data analytics are all covered. The hardware consists of an Arduino Uno, a variety of sensors, and a Wi-Fi module. …”
    Get full text
    Article
  8. 1508

    Music Personalized Label Clustering and Recommendation Visualization by Yongkang Huo

    Published 2021-01-01
    “…With the advent of big data, the performance of traditional recommendation algorithms is no longer enough to meet the demand. …”
    Get full text
    Article
  9. 1509

    RADENN: A Domain-Specific Language for the Rapid Development of Neural Networks by Israel Pineda, Dustin Carrion-Ojeda, Rigoberto Fonseca-Delgado

    Published 2023-01-01
    “…All these features make RADENN an ideal tool for Data Scientists, Data Analysts, Big Data Engineers, Software Enginers, and anyone who needs a fast and efficient way to create prototypes and models without extensive programming or deep learning knowledge. …”
    Get full text
    Article
  10. 1510

    Bibliometric Review on Corporate Social Responsibility of the Food Industry by Mingli He, Weiping Yu, Xiaoyun Han

    Published 2022-01-01
    “…The research results show that future research should be more in-depth and reflect the new characteristics of the Internet, digitalization, and big data.…”
    Get full text
    Article
  11. 1511

    Modern Technology's role in accounting cost calculation of industrial enterprises: Informatization as a key strategy to improve management efficiency by HuiFang Liang

    Published 2025-01-01
    “…Secondly, it utilizes data mining technology to assist enterprises in cost accounting and efficiency analysis. Big data analysis aids in predicting production process changes and trends, providing data support for management decisions. …”
    Get full text
    Article
  12. 1512

    Methodological basis for identifying promising industries of business specialization in Russian regions while developing digital technologies by S. L. Ivanov

    Published 2024-12-01
    “…In particular, it has been found that wholesale and retail trade, as well as the information technology industry have the potential for the spread of technologies for collecting, processing, and analyzing big data. The manufacturing industry, wholesale and retail trade, and information technologies have the potential to spread digital platforms.…”
    Get full text
    Article
  13. 1513

    SA Sorting: A Novel Sorting Technique for Large-Scale Data by Mohammad Shabaz, Ashok Kumar

    Published 2019-01-01
    “…With the rise in the generation of big data, the concept of big number comes into existence. …”
    Get full text
    Article
  14. 1514

    The Hybrid Approach to Negotiation: Bridging Traditional and Contemporary Practices in 2024 by Daniel Malutan

    Published 2024-11-01
    “…Traditional negotiations, once defined by formal structures, hierarchical power dynamics, and slow decision-making, are giving way to contemporary approaches that prioritize flexibility, collaboration, and advanced technologies such as Artificial Intelligence (AI) and big data. In response to these shifts, this paper presents a hybrid negotiation model that combines the rigor and structure of traditional techniques with the adaptability and innovation of modern strategies. …”
    Get full text
    Article
  15. 1515

    Effective commercial activity of a company factors in digital economy by S. V. Vandysheva, A. L. Boykova

    Published 2024-12-01
    “…Recommendations have been given on digitalization of key components of commercial activities, including customer services automation, e-commerce, digital supply chain management, big data analytics to optimize business strategies, and online marketing. …”
    Get full text
    Article
  16. 1516

    An intelligent and simplified 5G wireless network technology by Yuhong HUANG, Qi SUN, Minli JIA, Ran DUAN, Zhuo CHEN

    Published 2021-05-01
    “…5G is the current focus of the development of the information and communication industry, and is gradually being deployed and commercialized.The 5G network will cover toC to toB, aiming at the interconnection of everything, so the complexity and challenges are unprecedented.In order to meet the needs of multiple scenarios, 5G network technology is complex and flexible in design, and the traditional management and operation methods are difficult and costly.At the same time, industry application requirements are very different and demanding.All of these require integrated solutions such as cloud-network integration and network industry collaboration.In response to the above-mentioned problems and needs, an intelligent and simplified 5G wireless network technology framework was proposed.Through innovative thinking and technology development of wireless networks, 5G and artificial intelligence, cloud computing, big data, edge computing and other new technologies were integrated and innovated to continuously improve 5G capabilities and promote the deep convergence of 5G and DOICT.A detailed introduction to the entire framework, platforms and applications in the above technology system were given.Finally, a technical outlook was proposed for shaping a new 5G ecology that supported green, smart, efficient operation, and the internet of everything.…”
    Get full text
    Article
  17. 1517
  18. 1518

    Research on Commercial Bank Risk Early Warning Model Based on Dynamic Parameter Optimization Neural Network by Yiming Wang

    Published 2022-01-01
    “…Based on the background of big data, it is necessary to study the dynamic parameter optimization of the commercial bank risk model neural network. …”
    Get full text
    Article
  19. 1519

    Optimization and Matching Scheme of Public Management Resources for Industry 4.0 and Smart City by Jinglin Fan, Lei Shi

    Published 2021-01-01
    “…With the development of Big Data, Industry 4.0, and other technologies, the concept of smart city has become a new goal, new concept, and new practice of many urban developments. …”
    Get full text
    Article
  20. 1520

    Detection method of LDoS attack based on ACK serial number step-length by Zhijun WU, Qingbo PAN, Meng YUE

    Published 2018-07-01
    “…Low-rate denial of service (LDoS) attack is a potential security threat to big data centers and cloud computing platforms because of its strong concealment.Based on the analysis of network traffic during the LDoS attack,statistical analysis was given of ACK packets returned by the data receiver to the sender,and result reveals the sequence number step had the characteristics of volatility during the LDoS attack.The permutation entropy method was adopted to extract the characteristics of volatility.Hence,an LDoS attack detection method based on ACK serial number step permutation entropy was proposed.The serial number was sampled and the step length was calculated through collecting the ACK packets that received at the end of sender.Then,the permutation entropy algorithm with strong time-sensitive was used to detect the mutation step time,and achieve the goal of detecting LDoS attack.A test-bed was designed and built in the actual network environment for the purpose of verifying the proposed approach performance.Experimental results show that the proposed approach has better detection performance and has achieved better detection effect.…”
    Get full text
    Article