Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (66)
  • Open Access

    ARTICLE

    Design and Implementation of Open Source Online Evaluation System Based on Cloud Platform

    Zuwei Tian*, Shubo Tian, Tuo Wang, Zhen Gong, Zhenqin Jiang

    Journal on Big Data, Vol.2, No.3, pp. 117-123, 2020, DOI:10.32604/jbd.2020.011420

    Abstract In order to provide a good practice platform for the program design contestants and algorithm enthusiasts, this paper designs and implements a programming online evaluation system based on cloud platform, which is a web system that can return the test results of the program source codes submitted by users in real time. It realizes the automatic evaluation of the program design training questions. The system is implemented by the way of front-end and backend separation and modular programming. The front-end of the web is implemented by Vue framework, the back-end is implemented by Django framework. The judgment core is written… More >

  • Open Access

    ARTICLE

    Workload Allocation Based on User Mobility in Mobile Edge Computing

    Tengfei Yang1,2, Xiaojun Shi3, Yangyang Li1,*, Binbin Huang4, Haiyong Xie1,5, Yanting Shen4

    Journal on Big Data, Vol.2, No.3, pp. 105-115, 2020, DOI:10.32604/jbd.2020.010958

    Abstract Mobile Edge Computing (MEC) has become the most possible network architecture to realize the vision of interconnection of all things. By offloading compute-intensive or latency-sensitive applications to nearby small cell base stations (sBSs), the execution latency and device power consumption can be reduced on resource-constrained mobile devices. However, computation delay of Mobile Edge Network (MEN) tasks are neglected while the unloading decision-making is studied in depth. In this paper, we propose a workload allocation scheme which combines the task allocation optimization of mobile edge network with the actual user behavior activities to predict the task allocation of single user. We… More >

  • Open Access

    ARTICLE

    Multi-Modality Video Representation for Action Recognition

    Chao Zhu1, Yike Wang1, Dongbing Pu1,Miao Qi1,*, Hui Sun2,*, Lei Tan3,*

    Journal on Big Data, Vol.2, No.3, pp. 95-104, 2020, DOI:10.32604/jbd.2020.010431

    Abstract Nowadays, action recognition is widely applied in many fields. However, action is hard to define by single modality information. The difference between image recognition and action recognition is that action recognition needs more modality information to depict one action, such as the appearance, the motion and the dynamic information. Due to the state of action evolves with the change of time, motion information must be considered when representing an action. Most of current methods define an action by spatial information and motion information. There are two key elements of current action recognition methods: spatial information achieved by sampling sparsely on… More >

  • Open Access

    ARTICLE

    Research on the Best Shooting State Based on the “Three Forces” Model

    Xuguang Liu1, Ruqing Zhao2, Qifei Chen2, Ming Shi3, Ziling Xing2, Yanan Zhang4,*

    Journal on Big Data, Vol.2, No.2, pp. 85-93, 2020, DOI:10.32604/jbd.2020.013845

    Abstract The shooting state during shooting refers to the basketball’s shooting speed, shooting angle and the ball’s rotation speed. The basketball flight path is also related to these factors. In this paper, based on the three forces of Gravity, Air Resistance and Magnus Force, the “Three Forces” model is established, the Kinetic equations are derived, the basketball flight trajectory is solved by simulation, and the best shot state when shooting is obtained through the shooting percentage. Compared with the “Single Force” model that only considers Gravity, the shooting percentage of the “Three Forces” model is higher. The reason is that the… More >

  • Open Access

    ARTICLE

    A Survey on Adversarial Examples in Deep Learning

    Kai Chen1,*, Haoqi Zhu2, Leiming Yan1, Jinwei Wang1

    Journal on Big Data, Vol.2, No.2, pp. 71-84, 2020, DOI:10.32604/jbd.2020.012294

    Abstract Adversarial examples are hot topics in the field of security in deep learning. The feature, generation methods, attack and defense methods of the adversarial examples are focuses of the current research on adversarial examples. This article explains the key technologies and theories of adversarial examples from the concept of adversarial examples, the occurrences of the adversarial examples, the attacking methods of adversarial examples. This article lists the possible reasons for the adversarial examples. This article also analyzes several typical generation methods of adversarial examples in detail: Limited-memory BFGS (L-BFGS), Fast Gradient Sign Method (FGSM), Basic Iterative Method (BIM), Iterative Least-likely… More >

  • Open Access

    ARTICLE

    Research on the Development of Project Cost Informatization in the Era of Big Data

    Huiyu Long1, Yan Ma1, Xiang Mao1, Xinyuerong Sun2,*

    Journal on Big Data, Vol.2, No.2, pp. 63-70, 2020, DOI:10.32604/jbd.2020.011214

    Abstract Under the background of big data, Informatization plays an important role in the development of the engineering cost industry. The rapid development of the industry and the increasing complexity of construction projects require higher standards of informatization. The current information processing methods and models have been difficultly to meet new requirements. Based on this, this study deeply analyzes the key factors that impede the informatization of engineering cost development, and tries to find corresponding solutions through theoretical analysis and empirical research to break these constraints. This will play a guiding role in the development of informatization in China's engineering cost… More >

  • Open Access

    ARTICLE

    Research on Copyright Protection Method of Material Genome Engineering Data Based on Zero-Watermarking

    Lulu Cui2,3,*, Yabin Xu1,2,3

    Journal on Big Data, Vol.2, No.2, pp. 53-62, 2020, DOI:10.32604/jbd.2020.010590

    Abstract In order to effectively solve the problem of copyright protection of materials genome engineering data, this paper proposes a method for copyright protection of materials genome engineering data based on zero-watermarking technology. First, the important attribute values are selected from the materials genome engineering database; then, use the method of remainder to group the selected attribute values and extract eigenvalues; then, the eigenvalues sequence is obtained by the majority election method; finally, XOR the sequence with the actual copyright information to obtain the watermarking information and store it in the third-party authentication center. When a copyright dispute requires copyright authentication… More >

  • Open Access

    ARTICLE

    QDCT Encoding-Based Retrieval for Encrypted JPEG Images

    Qiuju Ji1, Peipeng Yu1, Zhihua Xia1, *

    Journal on Big Data, Vol.2, No.1, pp. 33-51, 2020, DOI:10.32604/jbd.2020.01004

    Abstract Aprivacy-preserving search model for JPEG images is proposed in paper, which uses the bag-of-encrypted-words based on QDCT (Quaternion Discrete Cosine Transform) encoding. The JPEG image is obtained by a series of steps such as DCT (Discrete Cosine Transform) transformation, quantization, entropy coding, etc. In this paper, we firstly transform the images from spatial domain into quaternion domain. By analyzing the algebraic relationship between QDCT and DCT, a QDCT quantization table and QDTC coding for color images are proposed. Then the compressed image data is encrypted after the steps of block permutation, intra-block permutation, single table substitution and stream cipher. At… More >

  • Open Access

    ARTICLE

    A Multi-Label Classification Method for Vehicle Video

    Yanqiu Cao1, Chao Tan1, Genlin Ji1, *

    Journal on Big Data, Vol.2, No.1, pp. 19-31, 2020, DOI:10.32604/jbd.2020.01003

    Abstract In the last few years, smartphone usage and driver sleepiness have been unanimously considered to lead to numerous road accidents, which causes many scholars to pay attention to autonomous driving. For this complexity scene, one of the major challenges is mining information comprehensively from massive features in vehicle video. This paper proposes a multi-label classification method MCM-VV (Multi-label Classification Method for Vehicle Video) for vehicle video to judge the label of road condition for unmanned system. Method MCM-VV includes a process of feature extraction and a process of multi-label classification. During feature extraction, grayscale, lane line and the edge of… More >

  • Open Access

    ARTICLE

    Big Data Audit of Banks Based on Fuzzy Set Theory to Evaluate Risk Level

    Yilin Bi1, Yuxin Ouyang1, Guang Sun1, Peng Guo1, 2, Jianjun Zhang3, Yijun Ai1, *

    Journal on Big Data, Vol.2, No.1, pp. 9-18, 2020, DOI:10.32604/jbd.2020.01002

    Abstract The arrival of big data era has brought new opportunities and challenges to the development of various industries in China. The explosive growth of commercial bank data has brought great pressure on internal audit. The key audit of key products limited to key business areas can no longer meet the needs. It is difficult to find abnormal and exceptional risks only by sampling analysis and static analysis. Exploring the organic integration and business processing methods between big data and bank internal audit, Internal audit work can protect the stable and sustainable development of banks under the new situation. Therefore, based… More >

Displaying 41-50 on page 5 of 66. Per Page