-
1781
IDTransformer: Infrared image denoising method based on convolutional transposed self-attention
Published 2025-01-01Get full text
Article -
1782
Trends in InsurTech Development in Korea: A News Media Analysis of Key Technologies, Players, and Solutions
Published 2025-01-01“…First, regarding changes in InsurTech technology, blockchain and the Internet of Things initially garnered significant attention, but artificial intelligence and big data later emerged as more critical technologies. …”
Get full text
Article -
1783
Understanding Sofia’s travel dynamics: Study of private traffic patterns and urban mobility
Published 2025-03-01Get full text
Article -
1784
Intelligent Prediction Method for Operation and Maintenance Safety of Prestressed Steel Structure Based on Digital Twin Technology
Published 2021-01-01“…In the above, a theoretical framework is proposed, and a case analysis of a prestressed steel structure is carried out from big data, and the feasibility of applying this method in the prestress loss and uneven rain and snow load conditions is evaluated. …”
Get full text
Article -
1785
A Clonal Selection Optimization System for Multiparty Secure Computing
Published 2021-01-01“…Furthermore, this research attempts to improve the privacy security defense capability of the federated learning scheme for big data through differential privacy preprocessing. …”
Get full text
Article -
1786
Сreative industry 4.0: trends and transformations in the era of digitalization
Published 2023-12-01“…Artificial intelligence, virtual reality, big data, and other digital technologies facilitate the production, scaling, and consumption of creative services and products. …”
Get full text
Article -
1787
Smart Filter Performance Monitoring System
Published 2023-02-01“…Filter or air-cleaning device manufacturers can improve their products or recommend suitable products to their customers based on big data contributed by this filter monitoring system.…”
Get full text
Article -
1788
Digital pathways to healthcare: a systematic review for unveiling the trends and insights in online health information-seeking behavior
Published 2025-02-01“…Second, the convergence trend with emerging information technologies such as big data, artificial intelligence, and social media is changing user behavior and how people search for health information. …”
Get full text
Article -
1789
Privacy-preserving data compression scheme for k-anonymity model based on Huffman coding
Published 2023-08-01“…The k-anonymity model is widely used as a data anonymization technique for privacy protection during the data release phase.However, with the advent of the big data era, the generation of vast amounts of data poses challenges to data storage.However, it is not feasible to expand the storage space infinitely by hardware upgrade, since the cost of memory is high and the storage space is limited.For this reason, data compression techniques can reduce storage costs and communication overhead.In order to reduce the storage space of the data generated by using anonymization techniques in the data publishing phase, a compression scheme was proposed for the original data and anonymized data of the k-anonymity model.For the original data of the k-anonymity model, the difference between the original data and the anonymized data was calculated according to the set rules and the pre-defined generalization level.Huffman coding compression was applied to the difference data according to frequency characteristics.By storing the difference data, the original data can be obtained indirectly, thus reducing the storage space of the original data.For anonymized data of the k-anonymity model, the anonymized data usually have high repeatability according to the generalization rules of the model or the pre-defined generalization hierarchy relations.The larger the value of k, the more generalized and repeatable the anonymized data becomes.The design of Huffman coding compression was implemented for anonymous data to reduce storage space.The experimental results show that the proposed scheme can significantly reduce the original data and the anonymous data compression rate of the k-anonymity model.Across five models and variousk-value settings,the proposed scheme reduces the compression rate of raw and anonymized data by 72.2% and 64.2% on average compared to the Windows 11 zip tool.…”
Get full text
Article -
1790
-
1791
The construction of a digital dissemination platform for the intangible cultural heritage using convolutional neural network models
Published 2025-01-01“…This work aims to integrate cultural heritage conservation, cultural inheritance, and digital dissemination, fostering the broad transmission and preservation of intangible cultural heritage in the era of big data.…”
Get full text
Article -
1792
Unveiling the Landscape of Sustainable Logistics Service Quality: A Bibliometric Analysis
Published 2025-01-01“…Dominant themes include the integration of cutting-edge technologies such as artificial intelligence (AI), big data analytics, blockchain, and sustainable transportation methods, which collectively enhance logistics service quality while reducing environmental impacts. …”
Get full text
Article -
1793
Three-dimensional illumination analysis in pipe-like complexities by ray-tracing modeling
Published 2025-01-01Get full text
Article -
1794
ID-UNet: A densely connected UNet architecture for infrared small target segmentation
Published 2025-01-01Get full text
Article -
1795
Enhancing global model accuracy in federated learning with deep neuro-fuzzy clustering cyclic algorithm
Published 2025-01-01“…Furthermore, we extend this method to big data processing to cope with more complex data environments.…”
Get full text
Article -
1796
User avoidance behavior in pharmaceutical e-commerce intelligent customer service: a stressor-strain-outcome perspective
Published 2025-02-01“…The analysis revealed strong explanatory power (R2 values ranging from 0.450 to 0.586) and confirmed the mediating role of emotional stress in the relationship between overload factors and user avoidance.DiscussionThis research highlights the critical role of emotional stress in user interactions with ICS, suggesting that pharmaceutical e-commerce companies must refine their ICS design to meet diverse user needs and reduce cognitive burdens. By leveraging big data and establishing robust feedback mechanisms, companies can enhance user experience and loyalty. …”
Get full text
Article -
1797
Blockchain-based cross-data center anonymous and verifiable identity authentication scheme
Published 2024-04-01“…With the progression of big data and cloud computing technologies, there has been an escalating trend in cross-institutional data sharing and interaction within the financial sector. …”
Get full text
Article -
1798
Integrating Model‐Informed Drug Development With AI: A Synergistic Approach to Accelerating Pharmaceutical Innovation
Published 2025-01-01“…Artificial intelligence (AI), encompassing techniques such as machine learning, deep learning, and Generative AI, offers powerful tools and algorithms to efficiently identify meaningful patterns, correlations, and drug–target interactions from big data, enabling more accurate predictions and novel hypothesis generation. …”
Get full text
Article -
1799
Internet of things enabled smart agriculture: Current status, latest advancements, challenges and countermeasures
Published 2025-02-01“…Smart agriculture, interchangeably known as smart farming, utilizes IoT and related enabling technologies such as cloud computing, artificial intelligence, and big data in agriculture and offers the potential to enhance agricultural operations by automating and making intelligent decisions, resulting in increased efficiency and a better yield with minimum waste. …”
Get full text
Article -
1800
5G-based smart airport network security scheme design and security analysis
Published 2023-10-01“…To meet the security requirements of smart airports, a 5G-based smart airport network security solution was proposed.The security characteristics and security requirements of the 5G scenario in smart airport were analyzed, and the pain points of security requirements in the current scenario were summarized in five aspects:unified security management and control, network slicing security, security monitoring and early warning, edge computing security, and IoT-aware node security.And then a 5G network security system was designed for smart airports.The functional components of this system included 5G network unified security management and control functions for ubiquitous networks, lightweight 5G network identity authentication and authentication functions, 5G network slice security protection for multi-service requirements, 5G network security monitoring and early warning based on big data analysis, integrated security protection function based on edge computing, and sensory node security protection function based on device behavior analysis.This comprehensive approach built an all-in-one security platform covering business encryption, network security, terminal trustworthiness, identity trustworthiness, and security management and control.Additionally, the potential counterfeit base station attacks in the existing 5G authentication and key agreement (AKA) were analyzed.Due to the lack of authenticity verification of the messages forwarded by the SN, the attacker can pretend to be the real SN to communicate with the UE and the HN, thus carrying out the base station masquerading attack.This kind of attack may lead to the leakage of smart airport network data, and encounter problems such as tampering and deception by opponents.Aiming at the network security requirements of smart airports and the security issues of 5G authentication and key agreement protocol, an improved 5G authentication and key agreement protocol was designed.Formal security models, security goal definitions, and analysis were performed to ensure the robustness and effectiveness of the protocol against attacks.…”
Get full text
Article