[PDF][PDF] The comparison of “Big Data” literatures analysis tools: Taking Citespace and SCI 2 as Examples

J Yang, CX Cheng - Computer Science and Application, 2017 - pdf.hanspub.org
… But the network of citespace is clear due to its path finder function. d) Visualization. Besides
undirected network, SCI2 can output directed network which would express the directed …

[PDF][PDF] Extraction and Analysis of Hotspot Region of Parallel Taxi Trajectory Based on Spark

X Li, Y Sheng, X Lan - Computer Science and Application, 2018 - pdf.hanspub.org
… the original data and the redundant field should be deleted, and partial time data should be
filtered, then the map should be matched; finally using the spark Big Data processing platform…

[PDF][PDF] The Path Analysis of the Effect of Education on Subjective Well-Being

Y Jiang - Adv. Psychol, 2019 - pdf.hanspub.org
Adopting the dataset of 2014 Wuhan General Social Survey, and conducting structural equation
model, we analyzed the direct and indirect influence of education on happiness. Results …

[PDF][PDF] … and Security Review Commission: Chinese Advances in Unmanned Systems and the Military Applications of Artificial Intelligence—the PLA's Trajectory …

EB Kania - Intelligentized” Warfare,” US-China Economic and …, 2017 - uscc.gov
… employment of the military Internet of Things, big data, and cloud computing. However, for
the purposes of this testimony, I will focus more narrowly on artificial intelligence in particular. …

[PDF][PDF] Advance and evaluation in the long time series vegetation trends research based on remote sensing

BF Cai, R Yu - J. Remote Sens, 2009 - gissky.net
data resources of LTSVT research. With volumes of remote sensing data, the analysis and
evaluation methods for LTSVT studyanalysis of the Pathfinder AVHRR Land (PAL) NDVI data

[PDF][PDF] Downrange: A Survey of China's Cyber Ranges

D Cary - Center for Security and Emerging Technology …, 2022 - app-us-east-1.t-cdn.net
path. Past CSET research demonstrates that industrial networks can be recreated from stolen
data… Although technical specifics about the National Big Data Cyber Range are hard to find…

[HTML][HTML] Fast restoration strategy with availability aware in optical burst switching networks

X WANG, J LIANG, Y XIE, Y FU, Y ZHANG… - J. Chongqing Univ …, 2016 - fx361.com
… descriptive analysis and a comprehensive simulation study, … scheme could only suit traffic
with large data burst length[6]. … path, which result in the loss of a large amounts of data and …

[PDF][PDF] The rise of smart courts in China: opportunities and challenges to the judiciary in a digital age

J Peng, W Xiang - Nordic J Law Soc Res (NNJLSR), 2019 - tidsskrift.dk
… the help of modern technology like big data, cloud computing, … for people and to establish
judicial big data. However, lack of … Besides, the current analysis of the state of affairs due to …

[PDF][PDF] 引文网络主路径分析法演化脉络及研究现状的文献计量分析

ZXR Jianhai - 情报资料工作, 2016 - qbzl.ruc.edu.cn
… the deficiency of main path analysis method in citation network ,and some more suggestions
are put forward to remedy the weak鄄 nesses of main path analysis when it is used in study. …

[PDF][PDF] The Capability Evaluation of GPT-4 and Claude on Financial Domain with DIKWP+ TIF Analysis

F Tang, Y Duan, E Dou, Y Yang - AprY2023, 2023 - researchgate.net
… Apply big data analysis technology to more accurately evaluate the credit status and … This
is the direction of the development of financial technology and also provides path options for …