Showing 1,781 - 1,800 results of 1,987 for search '"big data"', query time: 0.09s Refine Results
  1. 1781
  2. 1782

    Trends in InsurTech Development in Korea: A News Media Analysis of Key Technologies, Players, and Solutions by Yongsu Lee, Hyosook Yim

    Published 2025-01-01
    “…First, regarding changes in InsurTech technology, blockchain and the Internet of Things initially garnered significant attention, but artificial intelligence and big data later emerged as more critical technologies. …”
    Get full text
    Article
  3. 1783
  4. 1784

    Intelligent Prediction Method for Operation and Maintenance Safety of Prestressed Steel Structure Based on Digital Twin Technology by Zhansheng Liu, Antong Jiang, Anshan Zhang, Zezhong Xing, Xiuli Du

    Published 2021-01-01
    “…In the above, a theoretical framework is proposed, and a case analysis of a prestressed steel structure is carried out from big data, and the feasibility of applying this method in the prestress loss and uneven rain and snow load conditions is evaluated. …”
    Get full text
    Article
  5. 1785

    A Clonal Selection Optimization System for Multiparty Secure Computing by Minyu Shi, Yongting Zhang, Huanhuan Wang, Junfeng Hu, Xiang Wu

    Published 2021-01-01
    “…Furthermore, this research attempts to improve the privacy security defense capability of the federated learning scheme for big data through differential privacy preprocessing. …”
    Get full text
    Article
  6. 1786

    Сreative industry 4.0: trends and transformations in the era of digitalization by Iryna Shkodina, Natalya Kondratenko, Anastasia Shchukina

    Published 2023-12-01
    “…Artificial intelligence, virtual reality, big data, and other digital technologies facilitate the production, scaling, and consumption of creative services and products. …”
    Get full text
    Article
  7. 1787

    Smart Filter Performance Monitoring System by Chenxing Pei, Weiqi Chen, Qisheng Ou, David Y. H. Pui

    Published 2023-02-01
    “…Filter or air-cleaning device manufacturers can improve their products or recommend suitable products to their customers based on big data contributed by this filter monitoring system.…”
    Get full text
    Article
  8. 1788

    Digital pathways to healthcare: a systematic review for unveiling the trends and insights in online health information-seeking behavior by Yang Fu, Yang Fu, Ping Han, Jian Wang, Fakhar Shahzad

    Published 2025-02-01
    “…Second, the convergence trend with emerging information technologies such as big data, artificial intelligence, and social media is changing user behavior and how people search for health information. …”
    Get full text
    Article
  9. 1789

    Privacy-preserving data compression scheme for k-anonymity model based on Huffman coding by Yue YU, Xianzheng LIN, Weihai LI, Nenghai YU

    Published 2023-08-01
    “…The k-anonymity model is widely used as a data anonymization technique for privacy protection during the data release phase.However, with the advent of the big data era, the generation of vast amounts of data poses challenges to data storage.However, it is not feasible to expand the storage space infinitely by hardware upgrade, since the cost of memory is high and the storage space is limited.For this reason, data compression techniques can reduce storage costs and communication overhead.In order to reduce the storage space of the data generated by using anonymization techniques in the data publishing phase, a compression scheme was proposed for the original data and anonymized data of the k-anonymity model.For the original data of the k-anonymity model, the difference between the original data and the anonymized data was calculated according to the set rules and the pre-defined generalization level.Huffman coding compression was applied to the difference data according to frequency characteristics.By storing the difference data, the original data can be obtained indirectly, thus reducing the storage space of the original data.For anonymized data of the k-anonymity model, the anonymized data usually have high repeatability according to the generalization rules of the model or the pre-defined generalization hierarchy relations.The larger the value of k, the more generalized and repeatable the anonymized data becomes.The design of Huffman coding compression was implemented for anonymous data to reduce storage space.The experimental results show that the proposed scheme can significantly reduce the original data and the anonymous data compression rate of the k-anonymity model.Across five models and variousk-value settings,the proposed scheme reduces the compression rate of raw and anonymized data by 72.2% and 64.2% on average compared to the Windows 11 zip tool.…”
    Get full text
    Article
  10. 1790
  11. 1791

    The construction of a digital dissemination platform for the intangible cultural heritage using convolutional neural network models by Zhurong Liu

    Published 2025-01-01
    “…This work aims to integrate cultural heritage conservation, cultural inheritance, and digital dissemination, fostering the broad transmission and preservation of intangible cultural heritage in the era of big data.…”
    Get full text
    Article
  12. 1792

    Unveiling the Landscape of Sustainable Logistics Service Quality: A Bibliometric Analysis by Shereen Abdelaziz, Munjiati Munawaroh

    Published 2025-01-01
    “…Dominant themes include the integration of cutting-edge technologies such as artificial intelligence (AI), big data analytics, blockchain, and sustainable transportation methods, which collectively enhance logistics service quality while reducing environmental impacts. …”
    Get full text
    Article
  13. 1793
  14. 1794
  15. 1795

    Enhancing global model accuracy in federated learning with deep neuro-fuzzy clustering cyclic algorithm by Chin-Feng Lai, Ying-Hsun Lai, Ming-Chin Kao, Mu-Yen Chen

    Published 2025-01-01
    “…Furthermore, we extend this method to big data processing to cope with more complex data environments.…”
    Get full text
    Article
  16. 1796

    User avoidance behavior in pharmaceutical e-commerce intelligent customer service: a stressor-strain-outcome perspective by Jing Jia, Lu Chen, Chengzhen Wu, Manling Xiao

    Published 2025-02-01
    “…The analysis revealed strong explanatory power (R2 values ranging from 0.450 to 0.586) and confirmed the mediating role of emotional stress in the relationship between overload factors and user avoidance.DiscussionThis research highlights the critical role of emotional stress in user interactions with ICS, suggesting that pharmaceutical e-commerce companies must refine their ICS design to meet diverse user needs and reduce cognitive burdens. By leveraging big data and establishing robust feedback mechanisms, companies can enhance user experience and loyalty. …”
    Get full text
    Article
  17. 1797

    Blockchain-based cross-data center anonymous and verifiable identity authentication scheme by XU Shujiang, ZHANG Chaoyang, WANG Lianhai, ZHANG Shuhui, SHAO Wei

    Published 2024-04-01
    “…With the progression of big data and cloud computing technologies, there has been an escalating trend in cross-institutional data sharing and interaction within the financial sector. …”
    Get full text
    Article
  18. 1798

    Integrating Model‐Informed Drug Development With AI: A Synergistic Approach to Accelerating Pharmaceutical Innovation by Karthik Raman, Rukmini Kumar, Cynthia J. Musante, Subha Madhavan

    Published 2025-01-01
    “…Artificial intelligence (AI), encompassing techniques such as machine learning, deep learning, and Generative AI, offers powerful tools and algorithms to efficiently identify meaningful patterns, correlations, and drug–target interactions from big data, enabling more accurate predictions and novel hypothesis generation. …”
    Get full text
    Article
  19. 1799

    Internet of things enabled smart agriculture: Current status, latest advancements, challenges and countermeasures by Navod Neranjan Thilakarathne, Muhammad Saifullah Abu Bakar, Pg Emeroylariffion Abas, Hayati Yassin

    Published 2025-02-01
    “…Smart agriculture, interchangeably known as smart farming, utilizes IoT and related enabling technologies such as cloud computing, artificial intelligence, and big data in agriculture and offers the potential to enhance agricultural operations by automating and making intelligent decisions, resulting in increased efficiency and a better yield with minimum waste. …”
    Get full text
    Article
  20. 1800

    5G-based smart airport network security scheme design and security analysis by Xinxin XING, Qingya ZUO, Jianwei LIU

    Published 2023-10-01
    “…To meet the security requirements of smart airports, a 5G-based smart airport network security solution was proposed.The security characteristics and security requirements of the 5G scenario in smart airport were analyzed, and the pain points of security requirements in the current scenario were summarized in five aspects:unified security management and control, network slicing security, security monitoring and early warning, edge computing security, and IoT-aware node security.And then a 5G network security system was designed for smart airports.The functional components of this system included 5G network unified security management and control functions for ubiquitous networks, lightweight 5G network identity authentication and authentication functions, 5G network slice security protection for multi-service requirements, 5G network security monitoring and early warning based on big data analysis, integrated security protection function based on edge computing, and sensory node security protection function based on device behavior analysis.This comprehensive approach built an all-in-one security platform covering business encryption, network security, terminal trustworthiness, identity trustworthiness, and security management and control.Additionally, the potential counterfeit base station attacks in the existing 5G authentication and key agreement (AKA) were analyzed.Due to the lack of authenticity verification of the messages forwarded by the SN, the attacker can pretend to be the real SN to communicate with the UE and the HN, thus carrying out the base station masquerading attack.This kind of attack may lead to the leakage of smart airport network data, and encounter problems such as tampering and deception by opponents.Aiming at the network security requirements of smart airports and the security issues of 5G authentication and key agreement protocol, an improved 5G authentication and key agreement protocol was designed.Formal security models, security goal definitions, and analysis were performed to ensure the robustness and effectiveness of the protocol against attacks.…”
    Get full text
    Article