To improve the anti-jamming performance of frequency hopping system in complex electromagnetic environment, a Deep Q-Network algorithm with priority experience replay (PER) based on Pareto samples (PPER-DQN) is proposed, which...
Higher educational institutions are implementing e-learning system software to improve the quality and delivery of content and make distance learning easier. E-learning has become an important component of education because of...
A blockchain is an advanced technology that can power over a decentralized network. The authors bring it up to design the autonomous transaction system for e-commerce applications; because of the dramatic increase in IoT...
Social and information networks undermine the real relationship between the individuals (ego) and the friends (alters) they are connected with on social media. The structure of individual network is highlighted by the ego...
Discovering entity synonymous relations is an important work for many entity-based applications. Existing entity synonymous relation extraction approaches are mainly based on lexical patterns or distributional corpus-level...
Basketball, as an offensive and defensive game centered around high altitude, has become an international mass competitive sport. Traditional methods cannot comprehensively evaluate the future potential of players, nor can they...
This study introduces the ‘SARIMA Improved Model + Pearson Correlation Coefficient' approach to predict the demand for big data jobs in Jiangsu Province schools from January 2016 to December 2019. It also explores the matching...
In order to consolidate the poverty alleviation achievements of impoverished counties, villages, and households, it is necessary to establish and improve stable poverty alleviation mechanisms. This article takes the Chengde...
With the rapid development of internet communication and the wide application of intelligent terminal, moving the cache to the edge of the network is an effective solution to shorten the delay of users accessing content....
Real-time network inspection applications face a threat of vulnerability as high-speed networks continue to expand. For companies and ISPs, real-time traffic classification is an issue. The classifier monitor is made up of three...
The growth in the number of cloud users who transfer their health data have enhanced the importance of cloud technology's services and capabilities. However, transferring patient health data to the cloud leaves researchers with...
From the perspective of counter-terrorism strategies, terrorist risk assessment has become an important approach for counter-terrorism early warning research. Combining with the characteristics of known terrorists, a...
Due to tremendous technological improvements, over the past several years the world has witnessed, and continues to witness, digitalization, which has received a wealth of attention. Technology and connectivity have made it...
With China's continuous opening to the outside world, changes in the international environment and the operation of the cross-border RMB settlement system (CIPS), the scale of cross-border RMB settlement has fluctuated...
The authors propose a semantic and smart assistance framework for handling linguistic knowledge, called LingFramework. It targets both expert and novice users. It aims to assist the user in understanding the different aspects of...
The internet of things (IoT) has become a key support object for Chinese strategic emerging industries. It is of great practical significance to promote the construction of the internet of things. Driven by national policies...
Under the background of "Internet +", the supply chain financial model and process have undergone profound changes. Firstly, through the social network analysis, the correlation between the participants in the Internet + supply...
Face detection is the most critical and first step in the attendance management system. The human face is non-rigid and has many differences in visual situations, scale, clarity, poses, and rotation. The precise and reliable...
The cloud computing platforms are being deployed nowadays for resource scheduling of real time data intensive applications. Cloud computing still deals with the challenge of time oriented effective scheduling for resource...
Task optimization scheduling is one of the key concerns of both cloud service providers (CSPs) and cloud users. The CSPs hope to reduce the energy consumption of executing tasks to save costs, while the users are more concerned...
Edge computing undertakes downlink cloud services and uplink terminal computing tasks, data interaction latency and network transmission cost are thus significantly reduced. Although a lot of research has been conducted in...
Fog computing is a decentralized computer system where data, processing, storage, as well as applications are located anywhere between the cloud and data source. Fog computing takes the cloud closer to users, decreasing the...
In dynamic e-commerce environments, researchers strive to understand users' interests and behaviors to enhance personalized product recommendations. Traditional collaborative filtering (CF) algorithms have encountered...
In order to turn our attention to the real progress of the education world, this paper makes a concrete study on the efficiency optimization of MySQL database under big data. On the basis of discussing the significance of...
The traditional grid did not consider the dynamic characteristics of the big data of innovation and entrepreneurship education. The grid based quantitative evaluation model of analytical AI teaching information based on adaptive...