Showing 881 - 885 results of 885 for search '"data mining"', query time: 0.05s Refine Results
  1. 881

    The relationship between factors affecting the development of industrial startups using methodology Fuzzy cognitive mapping by Mirmahmood Naghibi, Changiz Valmohammadi, Kiamars Fathi Hefeshjani, mahmoud modiri

    Published 2025-02-01
    “…Almasi et al, (2021) in a research entitled providing a combined data mining model to investigate the failure or success of Iranian startups by choosing characteristics and classification, concluded that the type of idea industry, creativity and skill of people, innovation, and type investors have a great impact on the success or failure of Iranian startups.   …”
    Get full text
    Article
  2. 882

    Designing the strategic model of online banking relational marketing in the fourth industrial revolution with the foundation's data approach. by Aliasghar Atarodi, arezo ahmadi danyali, nader gharib nawaz

    Published 2025-03-01
    “…Mohammadi fateh et al, (2022) showed that the technologies of the fourth industrial revolution are big data, biological identification system, fraud detection technologies, contactless ATM, data mining, cloud computing, marketing, versatile channel, artificial intelligence, fintech, biometrics, blockchain, intelligent social networks, artificial neural networks, remote monitoring technologies, commercial Internet of Things, and digital account, respectively. …”
    Get full text
    Article
  3. 883

    Research on the spectrum sensing and sharing technology in the dynamic spatiotemporal data driven cognitive Internet of vehicles by Caili GUO, Jiujiu CHEN, Yidi XUAN, He ZHANG

    Published 2020-09-01
    “…With the explosive development of the intellectualization and network connection of the global automobile industry,the communication technology as a crucial support of the Internet of vehicles (IoV) is facing the problem of spectrum shortage.In addition to providing security services,the diverse service demands of the IoV make the introduction of the cognitive radio technology an effective solution,which can share heterogeneous spectrum resources integrating the sub-6 GHz and millimeter-wave spectrum resources with primary users.But the performance is limited due to the influence of the complex dynamic environment of the IoV.To address this issue,a novelty method was proposed which aimed to make full use of the potential multi-source dynamic spatiotemporal data,mine and learn the changing rules of the vehicle trajectory and traffic flow,and the rules were used to guide the sensing and sharing of the spectrum resource.The system-level simulation platform was built for simulation analysis,the results showed that the performance of the proposed scheme was effectively improved.…”
    Get full text
    Article
  4. 884

    Research on construction technology of artificial intelligence security knowledge graph by Xiaochen SHEN, Yinhui GE, Bo CHEN, Ling YU

    Published 2023-04-01
    “…As a major strategic technology, artificial intelligence is developing rapidly while bringing numerous security risks.Currently, security data for artificial intelligence is collected from disparate sources and lacks standardized description, making it difficult to integrate and analyze effectively.To address this issue, a method for constructing an artificial intelligence security knowledge graph was proposed.The knowledge graph was used to integrate the current multi-source heterogeneous data, scientifically represent complex relationships of the data, mine potential value and form a domain knowledge base.In view of the diversity and correlation of concepts in the field of artificial intelligence security, a hierarchical structure of artificial intelligence security ontology was proposed to make the ontology structure more diversified and extensible, provide rule constraints for the process of knowledge graph construction, and form an artificial intelligence security knowledge base.To effectively utilize feature information and reduce noise interference, named entity recognition algorithm based on BiLSTM-CRF and relationship extraction algorithm based on CNN-ATT were adopted for information extraction.The constructed artificial intelligence security dataset was then used to verify the performance of the algorithm.Based on the proposed ontology, the multi-level visualization results of the artificial intelligence security knowledge graph were presented in 3D effect, effectively connecting the multi-source security data information.The experimental results show that the constructed knowledge graph meets the multi-dimensional evaluation criteria of accuracy, consistency, completeness, and timeliness, providing knowledge support for artificial intelligence security research.Overall, the proposed method can help address the complexity and heterogeneity of security data in artificial intelligence and provide a more standardized, integrated approach to knowledge representation and analysis.…”
    Get full text
    Article
  5. 885

    Diversity of <i>mariner</i>-like elements in Orthoptera by K. Ustyantsev, M. Biryukov, I. Sukhikh, N. V. Shatskaya, V. Fet, A. Blinov, I. Konopatskaia

    Published 2020-01-01
    “…In the present study, we explore the diversity of MLEs elements in 16 species of Orthoptera belonging to three infraorders, Acridoidea (Caelifera), Grylloidea (Ensifera), and Tettigoniidea (Ensifera) by combining data mined from computational analysis of sequenced degenerative PCR MLE amplicons and available Orthoptera genomic scaffolds. …”
    Get full text
    Article