Showing 7,641 - 7,660 results of 10,771 for search 'Big3~', query time: 1.39s Refine Results
  1. 7641

    Construction of intelligent evolution network based on outbound call by Hua REN, Di YANG, Shaomin WANG

    Published 2019-04-01
    “…With the obvious improvement of various telecom business demands,the outbound call industry,which is the main channel for marketing,resolution and notification of telephone services under the traditional mode,is facing more and more pain points,including market,personnel,training,customer sentiment,cost,accurate data and people flow in all aspects.In order to realize the cost reduction and efficiency increase,inject wisdom and improve capability of telecom services,the main needs of the existing network outbound call system were combined with the application of artificial intelligence and big data technology in the field of outbound calls,aim to build intelligent and high efficiency.A discussion of the feasibility of the program was given based on the network construction involved in the efficiency of the "smart outbound system".…”
    Get full text
    Article
  2. 7642

    Discussion on the common sense of the Internet of things by Yu SUN

    Published 2020-12-01
    “…The development of Internet of things (IoT) in China is in the second decade.First of all,the outcome of the IoT was reviewed.The industry formation and system structure of IoT were introduced.Then,the development process,trends and key points of the next generation of IoT were summarized in the aspect of the service platform,sensor industry,access links and fusion with technologies such as cloud computing,edge computing,big data,identity resolution,blockchain,satellite navigation system,5G and so on.Finally,the problems and possible ideas of the development of IoT in China were put forward in the fields of the application positioning,theoretical research,standard-setting and security.Hope to provide reference for colleagues to understand the IoT.…”
    Get full text
    Article
  3. 7643
  4. 7644

    Rimes de malandrins : du narcocorrido au narco rap by Enrique Flores

    Published 2016-05-01
    “…: artistic and criminal performance; reality as the kingdom of insane violence; Dante’s hell and Rimbaud’s “time of assassins”; jails, drug and misery; Pancho Villa’s mural; Caballeros águila and body painting; outlaw culture and “warriors of the drug” –from the Brazilian jails to the neighborhoods of Los Angeles; “Reynosa la maldosa”; Marcola, Tiger and Subway 3; “Big Word” and “Murderers Artists”; Gangsta rap; narcopoetry and hallucination; poetics of the crime; “Crime pays: rhyme pays”.…”
    Get full text
    Article
  5. 7645

    Survey of application of machine learning in wireless channel modeling by Liu LIU, Jianhua ZHANG, Yuanyuan FAN, Li YU, Jiachi ZHANG

    Published 2021-02-01
    “…Channel characterization is primary to the design of the wireless communication system.The conventional channel characterization method cannot learn the law of certain types of channels by itself, which limits its application in several special scenarios, such as Internet of things, millimeter wave communication and Internet of vehicles.Machine learning was able to process the big data and establish the model.Based on this, the cooperation between the machine learning and channel characterization was investigated.The channel multipath clustering, parameter estimation, model construction and wireless channel scene recognition were discussed, and recent significant research results in this field were provided.Finally, the future direction of the machine learning in wireless channel modeling was proposed.…”
    Get full text
    Article
  6. 7646

    Performance analysis and testing of personal influence algorithm in online social networks by Yong QUAN, Yan JIA, Liang ZHANG, Zheng ZHU, Bin ZHOU, Binxing FANG

    Published 2018-10-01
    “…Social influence is the key factor to drive information propagation in online social networks and can be modeled and analyzed with social networking data.As a kind of classical personal influence algorithm,two parallel implementation versions of a PageRank based method were introduced.Furthermore,extensive experiments were conducted on a large-scale real dataset to test the performance of these parallel methods in a distributed environment.The results demonstrate that the computational efficiency of the personal influence algorithm can be improved significantly in massive data sets by virtue of existing big data processing framework,and provide an empirical reference for the future research and optimization of the algorithm as well.…”
    Get full text
    Article
  7. 7647

    Quelle stratégie de développement durable dans les hôtels en Tunisie ? by Chiraz Ghozzi-Nékhili

    Published 2012-02-01
    “…Tourism is a big consumer of water. Since, water resources in Tunisia are characterized by scarcity and a pronounced irregularity is management should be done with appropriate strategies. …”
    Get full text
    Article
  8. 7648

    Progress of automatic driving technology and future information service architecture evolution of telecom operators by Zhen YANG

    Published 2016-08-01
    “…The concept of artificial intelligence has been proposed for more than 60 years,with the development of internet of things and big data technology,more and more AI technology applications have been achieved.One of the most remarkable AI technology integration application is automatic driving technology.Firstly,the progress of automatic driving technology was studied.Secondly,key technologies of automatic driving were analyzed.Thirdly, the relationship between the telecom operator information service architecture and the requirements of automatic driving was analyzed.In the end,the technology breakthrough point of information service architecture with the core of application of artificial intelligence technology in the future were given.…”
    Get full text
    Article
  9. 7649

    Financial digital transformation practice of power enterprises based on RPA by Wenju QUAN

    Published 2020-01-01
    “…In the era of big data,characterized as an important part of the field of artificial intelligence application,RPA technology can free financial personnel from large number of repetitive tasks and help them to invest more energy into high value-added work such as analysis and decision-making.By introducing RPA,power enterprises could improve the efficiency of financial process as well as the accuracy of financial data.RPA would also provide management and economic benefits to power enterprises through standardizing business processes.Therefore,it is important to explore the role of RPA technology in financial digital transformation through the practical case.Mean-while,it is necessary for managers to realize and control the risk caused by RPA.…”
    Get full text
    Article
  10. 7650

    Performance analysis of topic detection algorithms in distributed environment by Lu DENG, Yan JIA, Binxing FANG, Bin ZHOU, Tao ZHANG, Xin LIU

    Published 2018-08-01
    “…Social network has become a way of life,therefore more and more people choose social network to express their views and feelings.Quickly find what people are talking about in big data gets more and more attention.And a lot of related methods of topic detection spring up in this situation.The performance analysis project was proposed based on the characteristics of social network.According to the project,the performances of some typical topic detection algorithms were tested and compared in large-scale data of Sina Weibo.What’s more,the advantages and disadvantages of these algorithms were pointed out so as to provide references for later applications…”
    Get full text
    Article
  11. 7651

    Network architecture with intrinsic security by Weiyu JIANG, Bingyang LIU, Chuang WANG

    Published 2019-09-01
    “…IP network brings big benefits for human’s life by connecting most devices all over the world,but its security and privacy issues make people frustrating when using end to end communication.Without intrinsic security design of the network,it is difficult for patch-like solutions to cure stubborn security issues (IP spoofing,privacy leakage,MITM attack,DDoS,etc.).On the basis of surveying different kinds of security threats and related security techniques,an overview of the security weakness analysis was given,and network architecture with intrinsic security (NAIS) was presented,including dynamic ID/IP with intrinsic security,security verification and audit protocols,and cross-domain cooperation defense mechanism,which could provide security and trustworthiness for end to end communication.…”
    Get full text
    Article
  12. 7652

    Uncertainty Analysis of Knowledge Reductions in Rough Sets by Ying Wang, Nan Zhang

    Published 2014-01-01
    “…Uncertainty analysis is a vital issue in intelligent information processing, especially in the age of big data. Rough set theory has attracted much attention to this field since it was proposed. …”
    Get full text
    Article
  13. 7653

    Chosen-key extracting attack to random LSB steganography by CHEN Jia-yong1, ZHU Yue-fei1, ZHANG Wei-ming2, LIU Jiu-fen2

    Published 2010-01-01
    “…A chosen-key extracting attack based on random LSB steganography was proposed.By constructing an orient ring model for a sort of pseudo-random steganography algorithms,it proved that there are many equivalent keys and neighboring keys in the model,and then proposed a method to calculate the number of equivalent keys.With the charac-ter of equivalent keys,neighboring keys and outlier detection method,the proposed scheme achieved lower computational complexity than the method proposed by Fridrich.Both academic results and experimental results indicated that the algorithm was reliable even with rather big error in estimating the embedding rate.…”
    Get full text
    Article
  14. 7654

    What Factors Lead Companies to Adopt Social Media in their processes: Proposal and Test of a Measurement Model by Jozé Braz de Araújo, Silvia Novaes Zilber

    Published 2016-01-01
    “…We also found that big companies with more formalized organizational structure (OS) t end to adopt social media more than small ones with no formal OS. …”
    Get full text
    Article
  15. 7655

    Lithuanian on-line periodicals on the World Wide Web by Lina Sarlauskiene

    Published 2001-01-01
    “…The number of analysed publications is not very big, but four years of electronic publishing and the variety of periodicals enables us to establish the causes of this phenomenon, the main features of development, and some perspectives. …”
    Get full text
    Article
  16. 7656

    Understanding Extension for School-Based Agricultural Education #3: FFA and 4-H—A Comparison by Debra Barry, Alyssa J. Shepherd, Jennifer Patton, Stephen Gran

    Published 2020-11-01
    “… Even though many recognize FFA and 4-H, there is still a big disconnect in understanding the similarities and differences between them. …”
    Get full text
    Article
  17. 7657

    Research on Database Deployment Technology in Cloud Computing Environment by Yongshun Cai, Mingchuan Yang, Wei Si, Shaoyang Rao

    Published 2015-07-01
    “…Cloud computing virtualization technology has the characteristics of elastic scalability,automatic migration (high availability),automatic recovery (high stability).Because of the natural complexity of database systems,it makes a big challenge to deploy database systems in cloud computing virtualization environment.On the basis of research and analyzing models of deploying database systems in private cloud environment,the TPC-C benchmark test with database instances running in cloud computing virtual machines was applied.Compared with performance results of same test with database instances running in physical machines,the feasibility of deploying database systems in cloud computing virtualization environment was verified.…”
    Get full text
    Article
  18. 7658

    Sobre la domesticación obrera a través de la vivienda higiénica. Algunos hallazgos (Santiago, 1931-1936) by Diego Morales Barrientos

    Published 2022-07-01
    “…Through the elite's perspective, the low-cost and hygienic household was a tool to improve the deficient living conditions that the popular and working-class sectors were under in big cities. Also, it was a means for cultural transformation of everyday policies. …”
    Get full text
    Article
  19. 7659

    IFC and Monitoring Database System Based on Graph Data Models by Luka Gradišar, Matevž Dolenc

    Published 2021-01-01
    “…The presented IFC and sensor graph data models are structurally flexible and scalable to meet the challenges of smart cities and big data.…”
    Get full text
    Article
  20. 7660

    PROSPECTS OF USING IN RUSSIA OF EXPERIENCE OF CHINA BANKING SYSTEM DEVELOPMENT by L. Ryabchenko

    Published 2018-08-01
    “…Direct lending to state enterprises of the «big four» banks allowed to ensure high rates of economic growth, but led to a rapid growth of «bad debts». …”
    Get full text
    Article