No abstract available.
Proceeding Downloads
Analysis of Measure Fluctuation Based on Adtributor Algorithm
In order to be able to quickly and easily discover the root-cause of data when fluctuation occurs, this paper introduces an Adtributor algorithm based on the explanatory power and surprise value, and it is selected from the forecast value compared with, ...
Research on Data Security Protection Method Based on Improved K-means Clustering Algorithm
Data security is a severe challenges in the era of Internet. The traditional K-means clustering algorithm can protect the data security properly when it is applied in the field of information security, but the accuracy and availability of its clustering ...
Data Association Rules Mining Method Based on Improved Apriori Algorithm
In the existing data mining technology, there are some shortcomings in association rule mining methods. In this paper, aiming at the problem that the mining efficiency of Apriori algorithm is not high when dealing with large database, the genetic ...
ESTemd: A Distributed Processing Framework for Environmental Monitoring based on Apache Kafka Streaming Engine
Distributed networks and real-time systems are becoming the most important components for the new computer age – the Internet of Things (IoT), with huge data streams generated from sensors and data sets generated from existing legacy systems. The data ...
Use of Digital Tools to Promote Understanding of the Learning Process in the Tower of Hanoi Game
Better knowledge of learning trajectories contributes to better assertive interventions during learning. New technological opportunities contribute to a better understanding of these trajectories and represent benefits for the design of tools that ...
Short-term Traffic Flow Prediction Based on Multi-Auxiliary Information
Aiming at the problem of short-term traffic flow prediction, on the basis of considering the dynamic change of traffic flow diffusion, this paper proposes a spatio-temporal prediction model that integrates multiple-auxiliary information, and carries out ...
Stock Selection Strategy Based on Support Vector Machine and eXtreme Gradient Boosting Methods
Quantitative investment has emerged a new trend in the advance of artificial intelligence during recent years. Artificial intelligence algorithms have been widely used in stock selection. In this paper, China's stock data, including opening price and ...
Prediction Method of User’s Consumption Behavior in E-commerce Platform Based on RNN Optimization Algorithm
In recent years, the popularity of the Internet makes the public more inclined to online shopping, which breaks through the limitation of time and region. There are many kinds of online goods, which make the platform users have to spend a lot of energy ...
Spatial Distribution and Epidemiological Characteristics of Foodborne Disease in Zhejiang Province, China
Foodborne Disease (FBD) is the most common disease around the world. Based on the surveillance data of FBD in Zhejiang Province from Jan 1, 2013 to Dec 31, 2015, including 26721 illness cases, 1591 hospitalizations and 6 deaths. We conducted exploratory ...
Design of dynamic H-R diagram System
Hertzsprung-Russell diagram (HRD) is an important tool in stellar astronomy, and it is of great significance to study the evolution of stars. With the continuous increase of astronomical big data, the generation speed of HRD is getting slower and ...
Acquisition Function Selection: Bayesian Optimization in Neural Network Technique
This research aims to figure out the best hyperparameter-selection acquisition functions on the specific neural network model. Three Bayesian optimization approaches are discussed in the paper, including Bayesian and Local Optimization Sample-wise ...
LAC: LSTM AUTOENCODER with Community for Insider Threat Detection
The employees of any organization, institute or industry, spend a significant amount of time on computer network, where they develop their own routine of activities in the form of network transactions over a time period. Insider threat detection ...
Implicit data recommendation based on refined classification and ranking learning
With the exponential growth of data, it becomes more and more difficult to quickly obtain valuable information from massive amounts of data. Clicking and browsing of such non-scoring implicit data has also attracted more and more attention from ...
Pyramid Deconvolution Net: Breast Cancer Detection Using Tissue and Cell Encoding Information
Accurate diagnosis of breast cancer lesions from whole slide images (WSIs) is crucial for pathologist, since the results are associated with a certain status of breast cancer development. Until now, it is not yet possible to detect all of the cancerous ...
Captcha Recognition Based on Deep Learning
The captcha is a Turing test used to distinguish between machines and humans. It is considered as the verification code for the security on many websites. In recent years, deep learning has been widely used in the related field such as data analysis and ...
A Visual Method for Ship Close Encounter Pattern Recognition based on Fuzzy theory and Big Data Intelligence
As an important application of big data technology in the maritime field, big data driven visualization of ship encounter patterns helps to intuitively understand the risk situation in the water traffic. However traditional methods based on fixed ...
Face Recognition from Art Face Images based on Deep Learning
The research of face recognition is one of the hot topics of computer vision. Recent models based on deep learning are very useful in many image processing problems. However, there are few researches on face recognition in art works. Based on the face ...
Design of Dial-type Spectrum Visualization System
The analysis of stellar spectrogram is an important subject in astronomy nowadays. Many astronomical researches need to analyze, mine and extract information from stellar spectrogram to obtain the physical parameters of celestial bodies. Different from ...
Index Terms
- Proceedings of the 4th International Conference on Big Data Research