Showing 7,941 - 7,960 results of 10,771 for search 'Big3~', query time: 1.66s Refine Results
  1. 7941

    Stochastic algorithm for HDFS data theft detection based on MapReduce by Yuanzhao GAO, Binglong LI, Xingyuan CHEN

    Published 2018-10-01
    “…To address the problems of big data efficient analysis and insider theft detection in the data theft detection of distributed cloud computing storage,taking HDFS (hadoop distributed file system) as a case study,a stochastic algorithm for HDFS data theft detection based on MapReduce was proposed.By analyzing the MAC timestamp features of HDFS generated by folder replication,the replication behavior’s detection and measurement method was established to detect all data theft modes including insider theft.The data set which is suitable for MapReduce task partition and maintains the HDFS hierarchy was designed to achieve efficient analysis of large-volume timestamps.The experimental results show that the missed rate and the number of mislabeled folders could be kept at a low level by adopting segment detection strategy.The algorithm was proved to be efficient and had good scalability under the MapReduce framework.…”
    Get full text
    Article
  2. 7942

    Application and Legal Governance of Computational Technologies in Credit Investigation: An Interdisciplinary Perspective by Ying Zhang, Zhen Xie, Xiuwei Qu

    Published 2022-01-01
    “…By analyzing the computational technologies and algorithms most commonly used in credit data collection and data storage, data transmission and data access, data analysis and processing, data calculation, result output and effect evaluation, this paper summarizes and proposes a unified general process of modern credit investigation, pointing out that in this general process, low data quality, privacy violation, algorithmic bias are the main challenges in the big data era, and countermeasures like data quality control, privacy protection, and algorithm governance need to be to be taken seriously into account in order to further explore the great potential of the credit investigation under the legal framework.…”
    Get full text
    Article
  3. 7943

    A dynamic timeslot-based multicast bandwidth advance reservation algorithm for enterprise video conferencing systems by Zhiwen LIAO, Ling ZHANG

    Published 2019-07-01
    “…The simulation results show that compared with other algorithms, the algorithm can effectively reserve bandwidth for big data conferences and solve the problem of time overhead bottleneck.…”
    Get full text
    Article
  4. 7944

    Data-intensive service deployment based on edge computing by Yongmei GAO, Guanjie CHENG

    Published 2019-07-01
    “…The demand is getting higher and higher for data processing due to big data volume, thus, data-intensive service shave emerged. …”
    Get full text
    Article
  5. 7945

    MAXIMUM POWEWR POINT TRACKING SYSTEM FOR PHOTOVOLTAIC STATION: A REVIEW by I. Elzein

    Published 2015-11-01
    “…Therefore MPPT techniques are important to maintain the PV array’s high efficiency. Many different techniques for MPPT are discussed. …”
    Get full text
    Article
  6. 7946

    REPRESENTATION OF SOCIAL CLASSS IN PARASITE MOVIE by Lambok Hermanto Sihombing, Agustinus Alexander Sinaga

    Published 2021-03-01
    “…Parasite is a South Korean movie present as a production-based film and it raises a big theme of lifestyle differences between social classes. …”
    Get full text
    Article
  7. 7947

    Dynamique d’occupation du sol des zones humides urbanisées de Dakar (Sénégal) de 1942 à 2014 by Diop Aimée, Hyacinthe Sambou, Cheikh Diop, Elysée Ntiranyibagira, Honoré Dacosta, Bienvenu Sambou

    Published 2018-05-01
    “…The results of the analysis show that the big drought of the 1970s affected the hydrology of the Niayes and brought a decrease in the extent of the flood-prone areas. …”
    Get full text
    Article
  8. 7948

    Design and implementation of a model for OS kernel integrity protection by Dong-hai TIAN, Jun-hua CHEN, Xiao-qi JIA, Chang-zhen HU

    Published 2015-11-01
    “…Untrusted kernel extensions were considered to be a big threat to OS kernel integrity because once they were loaded into the kernel space,then they may corrupt both the OS kernel data and code at will.To address this problem,MAC-based model named MOKIP for OS kernel integrity protection was presented.The basic idea of MOKIP was to set different integrity labels for different entities in the kernel space,and then ensure that the entities with low integrity label cannot harm the entities with high integrity label.A prototype system based on the hardware assisted virtualization technology was implemented.The experimental results show that proposed system is effective at defending against various malicious kernel extension attacks within a little performance overhead which is less than 13%.…”
    Get full text
    Article
  9. 7949

    White-tailed Deer of Florida by Raoul K Boughton, Bethany Rose Wight, Samantha Wisely, Karen Hood, Martin B Main

    Published 2020-04-01
    “… The white-tailed deer (Odocoileus virginianus) is the most economically important big game mammal in North America and Florida. This 12-page fact sheet written by Raoul K. …”
    Get full text
    Article
  10. 7950

    Network telemetry technology and its application in automatic network operation and maintenance by Dongfeng MAO, Man JIA, Xiaoming HE, Zhihua LIU

    Published 2021-02-01
    “…As a new data acquisition technology, network telemetry has greatly enriched the diversity of data acquisition and expanded the range of traditional OAM data acquisition, whose goal is to realize real-time global network state visibility and traffic visibility.By combining with big data and AI technology, it can reduce human intervention and improve the operation and maintenance level of network automation.Firstly, the problems and challenges faced by the current IP network operation and maintenance were analyzed, and then it was elaborated that the network telemetry technology was the key enabler to realize the automatous network operation and maintenance.On this basis, the application of network telemetry technology in the IP network automatic operation and maintenance was investigated and discussed, and the reference and guidance for the automatic operation and maintenance of large-scale IP network were provided.…”
    Get full text
    Article
  11. 7951

    Practice and application of distributed data quality management system in power enterprise by Yuanning LI, Sen LIU, Shijun ZHANG, Feng CHEN, Zhiying WANG

    Published 2016-04-01
    “…After researching the system features of data quality,some foreign and domestic cases of big data were analyzed as reference,and a solution based on Hadoop distributed processing framework was given to solve the performance bottleneck of centralized data quality system. …”
    Get full text
    Article
  12. 7952

    DEVELOPMENT OF EDUCATIONAL PROGRAMS FOR ECONOMY AND MANAGEMENT AT TECHNICAL UNIVERSITY WITH APPLICATION OF COMPETENCE-BASED APPROACH by Oxana Yu. Eremicheva, Larisa A. Ilyina, Tatyana N. Kochetova

    Published 2015-06-01
    “…The article analyzes the Russian system of the higher education from the state educational standards of higher education on federal state educational standards of higher education according to which educational process is guided not by the content of educational process, and by results of training in the form of the created competences is considered; the accounting of labor costs in test units (credits); a big share of freedom at realization of educational programs In article is noted that new educational standards have essentially new methodological basis assuming leaving from qualification approach to competence-based model of the graduate. …”
    Get full text
    Article
  13. 7953

    FAILURE ANALYSIS AND OPTIMIZATION OF A HIGH FREQUENCY VIBRATION TOOL by WANG Yong, CHEN Sheng, WANG Qi, ZHENG WeiHua, QIU JunGuang

    Published 2019-01-01
    “…Based on flexible multi-body systems dynamics theory and combined finite element analysis simulation method, a rigid-flexible coupling model of the high frequency vibrating tool was developed. Several useful conclusions are drawn that the reasons for tool failure are uneven stress on the eccentric shaft sleeve and big deformation for the linkage coincided with the practical. …”
    Get full text
    Article
  14. 7954

    Les territoires du football en Tunisie (1906-2015) by Ali Langar, Myriam Baron, Claude Grasland

    Published 2018-12-01
    “…This leads to be interested in the way this sport became established and spread during the French protectorate, the political role which it played whether it is in the walking towards the independence or, more recently, during the big demonstrations of the revolution of jasmine during winter 2010-2011. …”
    Get full text
    Article
  15. 7955

    « Dites ce que je dis, ne dites pas ce que je vous dis de dire » ? Dilemmes et paradoxes de l’activité discursive et métadiscursive dans l’enseignement et l’apprentissage de l’oral... by Robert Bouchard

    Published 2011-10-01
    “…But for the native teacher in particular, “embodied” oral expression largely escapes conscious control. There can be big differences between what he wants to teach and what he “displays” naturally in his own oral expression in class. …”
    Get full text
    Article
  16. 7956

    Ethnographie matérielle, sonore et spatiale de la mort en pays maale (Éthiopie méridionale) by Hugo Ferran

    Published 2012-01-01
    “…Two systems for remembering ancestors and “big men” are analyzed: the one material (the spatial arrangements of graves in households), the other immaterial (the music performed during funeral ceremonies). …”
    Get full text
    Article
  17. 7957

    تعلیم علم البیانات بأقسام ومدارس المکتبات والمعلومات بالجامعات الأمریکیة : دراسة تحلیلیة by د. مشیرة أحمد صالح

    Published 2020-09-01
    “…This study aims to identify the concept of data science and big data, as itaims to identify the characteristics of the courses of data science in a sample ofthe departments and schools of libraries and information in American universitiesduring the academic year 2019/2020, using the descriptive analytical approach.The study reached several results, including: 213 special data science coursesare available, representing 13.6% of the total courses available in the library andinformation schools. …”
    Get full text
    Article
  18. 7958

    Viollet-le-Duc is back. Usages fragmentaires d’une œuvre kaléidoscopique (1964-1980) by Bérénice Gaussuin

    Published 2019-06-01
    “…In 1979-1980, many events celebrated the centenary of the architect’s death. One of them is a big monographic exhibition in the Grand Palais in Paris. …”
    Get full text
    Article
  19. 7959

    Dalla sorveglianza al controllo: la parabola della governamentalità algoritmica by Stefano Pietropaoli

    Published 2024-08-01
    “…Queste forme di controllo, basate su algoritmi e big data, sfidano le tradizionali nozioni di libertà, diritti e democrazia. …”
    Get full text
    Article
  20. 7960

    Are We Faced with Two Human Species? by Mladen Davidovic

    Published 2004-01-01
    “…It is a sort of search for a big discovery, like a fountain of youth or such. …”
    Get full text
    Article