-
1541
Incremental Fuzzy Clustering Based on Feature Reduction
Published 2022-01-01“…In the era of big data, more and more datasets are gradually beyond the application scope of traditional clustering algorithms because of their large scale and high dimensions. …”
Get full text
Article -
1542
Impact of digital transformation on the competitive advantage of companies
Published 2024-01-01“…Key factors of digital transformation, as well as ways in which technologies such as artificial intelligence, big data, automation, and cloud computing enable companies to improve their operations, innovate products and services, and achieve sustainable competitive advantage in the market. …”
Get full text
Article -
1543
Research on the security of national secret algorithm based compute first networking
Published 2023-08-01“…With the promotion of national secret algorithm, in-depth research on the arithmetic network was carried out, a more efficient and reasonable security scheme for the arithmetic network was proposed, ensuring the data security and privacy of the arithmetic network with the help of the state secret algorithm.The main elements of the design program included: Supporting arithmetic demand and cryptographic invocation through the underlying resources, the arithmetic orchestration layer provided the ability to orchestrate data arithmetic, meanwhile, the arithmetic scheduling layer intelligently discerned the optimal nodes for arithmetic resource scheduling and allocation; the cryptographic reinforcement layer used the national secret algorithm based on hardware support with the help of public key cryptosystem, hash function, digital envelope, homomorphic encryption, blockchain and other technologies.Focusing on arithmetic network access security, transmission security, data security and privacy protection aspects of security implementation.An architecture and application form was innovatively proposed to guarantee the data security of the arithmetic network, which could meet the needs of the application layer arithmetic in the scenarios of big data, intelligent technology, etc..The security of the arithmetic network is enhanced by empowering the arithmetic network through the state-secret algorithm.…”
Get full text
Article -
1544
The Multivariate Fusion Distribution Characteristics in Physician Demand Prediction
Published 2025-01-01“…Aiming at the optimization of the big data infrastructure in China’s healthcare system, this study proposes a lightweight time series physician demand prediction model, which is especially suitable for the field of telemedicine. …”
Get full text
Article -
1545
Mathematical Modeling and Simulation of Online Teaching Effect Evaluation Based on Decision Tree Algorithm
Published 2022-01-01“…With the support of big data technology, the field of education is also facing new problems and opportunities. …”
Get full text
Article -
1546
ІННОВАЦІЙНІ ТЕХНОЛОГІЇ В УПРАВЛІННІ БРЕНДОМ НА ПІДПРИЄМСТВАХ МАЛОГО БІЗНЕСУ
Published 2024-11-01“…Розглянуто вплив інноваційних технологій, таких як штучний інтелект, Big Data, діджитал-платформи, автоматизація маркетингу, доповнена та віртуальна реальність. …”
Get full text
Article -
1547
ANALISIS SENTIMEN DATA TWITTER TERKAIT CHATGPT MENGGUNAKAN ORANGE DATA MINING
Published 2024-08-01“…Platform media sosial mampu membangun profil big data pengguna, dengan melacak setiap aktivitas seperti partisipasi, pengiriman pesan, dan kunjungan situs Web. …”
Get full text
Article -
1548
-
1549
-
1550
-
1551
Clinical Treatment and Nursing Intervention Study of Clipping Treatment of Cerebral Aneurysm under the Health Model of Data Analysis
Published 2022-01-01“…This paper studies data analytics health models in the context of big data analytics. The model combines the characteristics of cerebral aneurysms for targeted analysis, and then through the understanding of the clipping treatment of cerebral aneurysms, this paper combines the deep learning in the neural network to train the treatment plan under the data analysis health model. …”
Get full text
Article -
1552
Test of the Equality of Several High-Dimensional Covariance Matrices: A Normal-Reference Approach
Published 2025-01-01“…As the field of big data continues to evolve, there is an increasing necessity to evaluate the equality of multiple high-dimensional covariance matrices. …”
Get full text
Article -
1553
Carbon Footprint Management with Industry 4.0 Technologies and Erp Systems in Sustainable Manufacturing
Published 2025-01-01“…Despite the increasing interest in these domains, the literature reveals critical gaps, particularly in the application of Industry 4.0 technologies—such as IoT, big data analytics, and AI—for effective carbon management and sustainable manufacturing. …”
Get full text
Article -
1554
The Organizational Structure and Operational Logic of an Urban Smart Governance Information Platform: Discussion on the Background of Urban Governance Transformation in China
Published 2020-01-01“…Urban smart governance supported by mobile Internet, the Internet of Things, quantum computing, big data, artificial intelligence, and other information technologies has also entered the field of vision of academics and administrators. …”
Get full text
Article -
1555
Artificial Intelligence in Design Process: An Analysis Using Text Mining
Published 2025-12-01Get full text
Article -
1556
FORESIGHT AS A TOOL OF TECHNOLOGICAL PLANNING IN THE MANAGEMENT OF PUBLIC JOINT STOCK COMPANY “GAZPROM” IN THE ERA OF DIGITALIZATION
Published 2020-06-01“…A digital model that makes a decision on the choice of the necessary technologies based on semantic analysis of big data – IFORA has been considered. A comparison of information input and applied methods has been made. …”
Get full text
Article -
1557
Spaceborne Optical Switching Technology for Satellite Internet
Published 2022-06-01“…With the increasing demands for ultra-high speed and large-capacity information transmission such as satellite remote sensing, big data super computing center, video battlefield and 6G mobile communication.The satellite laser communication technology using laser instead of traditional microwave as information carrier has become development trend.It is an eff ective mean to solve the bottleneck of microwave communication bandwidth and reduce the shortage of spectrum resources.In the future, we need to build a satellite internet with global coverage, which are needed to provide the capabilities that terrestrial optical fi ber networks do not have (large coverage, low-delay, services in sparsely populated areas, no geographical obstacles, etc.).The spaceborne optical switching technology is the key and core for the ultra-high speed and large capacity information processing on satellite nodes.Firstly, the development context of satellite internet based on laser communication was introduced, the importance of spaceborne optical switching technology for satellite internet was analyzed.It focused on the detailed classifi cation and comparison, system and information processing mode of space-borne optical switching technology, and showed the potential technical scheme in the future.Then, the characteristics and application schemes of optical switching core devices were analyzed and studied to provided reference for the next generation of satellite internet technology research.…”
Get full text
Article -
1558
A Proposal for a Zero-Trust-Based Multi-Level Security Model and Its Security Controls
Published 2025-01-01“…The rapid advancement of technology and increasing data utilisation have underscored the need for new models to manage and secure big data effectively. However, the constraints of isolated network environments and the limitations of existing security frameworks hinder the adoption of cutting-edge technologies such as AI and cloud computing, as well as the safe utilisation of data. …”
Get full text
Article -
1559
Approach of detecting low-rate DoS attack based on combined features
Published 2017-05-01“…LDoS (low-rate denial of service) attack is a kind of RoQ (reduction of quality) attack which has the characteristics of low average rate and strong concealment.These characteristics pose great threats to the security of cloud computing platform and big data center.Based on network traffic analysis,three intrinsic characteristics of LDoS attack flow were extracted to be a set of input to BP neural network,which is a classifier for LDoS attack detection.Hence,an approach of detecting LDoS attacks was proposed based on novel combined feature value.The proposed approach can speedily and accurately model the LDoS attack flows by the efficient self-organizing learning process of BP neural network,in which a proper decision-making indicator is set to detect LDoS attack in accuracy at the end of output.The proposed detection approach was tested in NS2 platform and verified in test-bed network environment by using the Linux TCP-kernel source code,which is a widely accepted LDoS attack generation tool.The detection probability derived from hypothesis testing is 96.68%.Compared with available researches,analysis results show that the performance of combined features detection is better than that of single feature,and has high computational efficiency.…”
Get full text
Article -
1560
Sustainable Development in the Digital Age: Harnessing Emerging Digital Technologies to Catalyze Global SDG Achievement
Published 2025-01-01“…This research explores the transformative potential of cutting-edge digital technologies—including artificial intelligence, big data analytics, cloud computing, and the Internet of Things—in fostering sustainable development across economic, social, and environmental dimensions. …”
Get full text
Article