ISSN:2579-0048(print)
ISSN:2579-0056(online)
Publication Frequency:Continuously
Journal on Big Data is launched in a new area when the engineering features of big data are setting off upsurges of explorations in algorithms, raising challenges on big data, and industrial development integration; and novel paradigms in this cross–disciplinary field need to be constructed by translating complex innovative ideas from various fields.
Starting from July 2023, Journal on Big Data will transition to a continuous publication model, accepted articles will be promptly published online upon completion of the peer review and production processes.
Open Access
ARTICLE
Journal on Big Data, Vol.5, pp. 1-18, 2023, DOI:10.32604/jbd.2023.041319
Abstract Movies are the better source of entertainment. Every year, a great percentage of movies are released. People comment on movies in the form of reviews after watching them. Since it is difficult to read all of the reviews for a movie, summarizing all of the reviews will help make this decision without wasting time in reading all of the reviews. Opinion mining also known as sentiment analysis is the process of extracting subjective information from textual data. Opinion mining involves identifying and extracting the opinions of individuals, which can be positive, neutral, or negative. The task of opinion mining also… More >
Open Access
ARTICLE
Journal on Big Data, Vol.3, No.2, pp. 49-63, 2021, DOI:10.32604/jbd.2021.016213
Abstract The demand for Electronic Shelf Labels (ESL), according to the
Internet of Things (IoT) paradigm, is expected to grow considerably in the
immediate future. Various wireless communication standards are currently
contending to gain an edge over the competition and provide the massive
connectivity that will be required by a world in which everyday objects are
expected to communicate with each other. Low-Power Wide-Area Networks
(LPWANs) are continuously gaining momentum among these standards, mainly
thanks to their ability to provide long-range coverage to devices, exploiting
license-free frequency bands. The main theme of this work is one of the most
prominent LPWAN… More >
Open Access
RETRACTION
Journal on Big Data, Vol.3, No.1, pp. 35-47, 2021, DOI:10.32604/jbd.2021.015954
Abstract Nowadays, data is very rapidly increasing in every domain such as
social media, news, education, banking, etc. Most of the data and information is
in the form of text. Most of the text contains little invaluable information and
knowledge with lots of unwanted contents. To fetch this valuable information out
of the huge text document, we need summarizer which is capable to extract data
automatically and at the same time capable to summarize the document,
particularly textual text in novel document, without losing its any vital
information. The summarization could be in the form of extractive and
abstractive summarization. The… More >
Open Access
ARTICLE
Journal on Big Data, Vol.3, No.1, pp. 11-20, 2021, DOI:10.32604/jbd.2021.015208
Abstract Establishing the Lagrangian equation of double complex pendulum
system and obtaining the dynamic differential equation, we can analyze the motion
law of double compound pendulum with application of the numerical simulation
of RK-8 algorithm. When the double compound pendulum swings at a small angle,
the Lagrangian equation can be simplified and the normal solution of the system
can be solved. And we can walk further on the relationship between normal
frequency and swing frequency of double pendulum. When the external force of
normal frequency is applied to the double compound pendulum, the forced
vibration of the double compound pendulum will… More >
Open Access
ARTICLE
Journal on Big Data, Vol.3, No.1, pp. 1-9, 2021, DOI:10.32604/jbd.2021.010364
Abstract In many fields such as signal processing, machine learning, pattern
recognition and data mining, it is common practice to process datasets containing
huge numbers of features. In such cases, Feature Selection (FS) is often involved.
Meanwhile, owing to their excellent global search ability, evolutionary
computation techniques have been widely employed to the FS. So, as a powerful
global search method and calculation fast than other EC algorithms, PSO can solve
features selection problems well. However, when facing a large number of feature
selection, the efficiency of PSO drops significantly. Therefore, plenty of works
have been done to improve this situation.… More >
Open Access
ARTICLE
Journal on Big Data, Vol.3, No.2, pp. 65-76, 2021, DOI:10.32604/jbd.2021.016317
Abstract Grain yield security is a basic national policy of China, and changes in
grain yield are influenced by a variety of factors, which often have a complex,
non-linear relationship with each other. Therefore, this paper proposes a Grey
Relational Analysis–Adaptive Boosting–Support Vector Regression (GRAAdaBoost-SVR) model, which can ensure the prediction accuracy of the model
under small sample, improve the generalization ability, and enhance the prediction
accuracy. SVR allows mapping to high-dimensional spaces using kernel functions,
good for solving nonlinear problems. Grain yield datasets generally have small
sample sizes and many features, making SVR a promising application for grain
yield datasets.… More >
Open Access
ARTICLE
Journal on Big Data, Vol.3, No.4, pp. 175-182, 2021, DOI:10.32604/jbd.2021.024074
Abstract With the advent of the era of big data, traditional financial
management has been unable to meet the needs of modern enterprise business.
Enterprises hope that financial management has the function of improving the
accuracy of corporate financial data, assisting corporate management to make
decisions that are more in line with the actual development of the company, and
optimizing corporate management systems, thereby comprehensively improving
the overall level of the company and ensuring that the company can be in
business with the assistance of financial integration, can better improve and
develop themselves. Based on the investigation of enterprises and universities,… More >
Open Access
ARTICLE
Journal on Big Data, Vol.3, No.1, pp. 21-33, 2021, DOI:10.32604/jbd.2021.015892
Abstract As the wide application of imaging technology, the number of big
image data which may containing private information is growing fast. Due to
insufficient computing power and storage space for local server device, many
people hand over these images to cloud servers for management. But actually, it
is unsafe to store the images to the cloud, so encryption becomes a necessary step
before uploading to reduce the risk of privacy leakage. However, it is not
conducive to the efficient application of image, especially in the Content-Based
Image Retrieval (CBIR) scheme. This paper proposes an outsourcing privacypreserving JPEG CBIR scheme. We… More >
Open Access
RETRACTION
Journal on Big Data, Vol.3, No.2, pp. 97-97, 2021, DOI:10.32604/jbd.2021.041299
Abstract This article has no abstract. More >
Open Access
ARTICLE
Journal on Big Data, Vol.3, No.2, pp. 85-95, 2021, DOI:10.32604/jbd.2021.018618
Abstract With the rise of the Internet of Things (IoT), various devices in life and
industry are closely linked. Because of its high payload, stable error correction
capability, and convenience in reading and writing, Quick Response (QR) code
has been widely researched in IoT. However, the security of privacy data in IoT is
also a very important issue. At the same time, because IoT is developing towards
low-power devices in order to be applied to more fields, the technology protecting
the security of private needs to have the characteristics of low computational
complexity. Visual Secret Sharing (VSS), with its features of… More >
Open Access
ARTICLE
Journal on Big Data, Vol.3, No.4, pp. 147-153, 2021, DOI:10.32604/jbd.2021.017299
Abstract In this paper, a cybersecurity threat warning model based on ant colony
algorithm is designed to strengthen the accuracy of the cybersecurity threat
warning model in the warning process and optimize its algorithm structure.
Through the ant colony algorithm structure, the local global optimal solution is
obtained; and the cybersecurity threat warning index system is established. Next,
the above two steps are integrated to build the cybersecurity threat warning model
based on ant colony algorithm, and comparative experiment is also designed. The
experimental results show that, compared with the traditional qualitative
differential game-based cybersecurity threat warning model, the cybersecurity
threat… More >
Open Access
ARTICLE
Journal on Big Data, Vol.1, No.1, pp. 1-7, 2019, DOI:10.32604/jbd.2019.05899
Abstract Given the glut of information on the web, it is crucially important to have a system, which will parse the information appropriately and recommend users with relevant information, this class of systems is known as Recommendation Systems (RS)-it is one of the most extensively used systems on the web today. Recently, Deep Learning (DL) models are being used to generate recommendations, as it has shown state-of-the-art (SoTA) results in the field of Speech Recognition and Computer Vision in the last decade. However, the RS is a much harder problem, as the central variable in the recommendation system’s environment is the… More >
Open Access
ARTICLE
Journal on Big Data, Vol.1, No.1, pp. 17-24, 2019, DOI:10.32604/jbd.2019.05799
Abstract Railway is the backbone of Chinese transportation system, but its poor quality of services for passengers cause complains now and then. This study first analyzed the influencing factors of service quality on railway passenger, and its quality characteristics was also explained, and finally we proposed an evaluation system of service quality on railway passenger transport. Through the statistical analysis and processing of the basic information from survey data from railway station, trains and the official website of the ticket purchase, the evaluation score of question naire was converted into the score in evaluation index system, which was based on SERVQUAL… More >
Open Access
ARTICLE
Journal on Big Data, Vol.1, No.2, pp. 89-106, 2019, DOI:10.32604/jbd.2019.07235
Abstract Web crawlers are an important part of modern search engines. With the development of the times, data has exploded and humans have entered a “big data era”. For example, Wikipedia carries the knowledge from all over the world, records the real-time news that occurs every day, and provides users with a good database of data, but because of the large amount of data, it puts a lot of pressure on users to search. At present, single-threaded crawling data can no longer meet the requirements of text crawling. In order to improve the performance and program versatility of single-threaded crawlers, a… More >
Open Access
ARTICLE
Journal on Big Data, Vol.2, No.2, pp. 71-84, 2020, DOI:10.32604/jbd.2020.012294
Abstract Adversarial examples are hot topics in the field of security in deep
learning. The feature, generation methods, attack and defense methods of the
adversarial examples are focuses of the current research on adversarial examples.
This article explains the key technologies and theories of adversarial examples
from the concept of adversarial examples, the occurrences of the adversarial
examples, the attacking methods of adversarial examples. This article lists the
possible reasons for the adversarial examples. This article also analyzes several
typical generation methods of adversarial examples in detail: Limited-memory
BFGS (L-BFGS), Fast Gradient Sign Method (FGSM), Basic Iterative Method
(BIM), Iterative Least-likely… More >
Open Access
ARTICLE
Journal on Big Data, Vol.2, No.4, pp. 167-176, 2020, DOI:10.32604/jbd.2020.015357
Abstract Traditional image quality assessment methods use the hand-crafted
features to predict the image quality score, which cannot perform well in many
scenes. Since deep learning promotes the development of many computer vision
tasks, many IQA methods start to utilize the deep convolutional neural networks
(CNN) for IQA task. In this paper, a CNN-based multi-scale blind image quality
predictor is proposed to extract more effectivity multi-scale distortion features
through the pyramidal convolution, which consists of two tasks: A distortion
recognition task and a quality regression task. For the first task, image distortion
type is obtained by the fully connected layer. For… More >
Open Access
ARTICLE
Journal on Big Data, Vol.3, No.1, pp. 1-9, 2021, DOI:10.32604/jbd.2021.010364
Abstract In many fields such as signal processing, machine learning, pattern
recognition and data mining, it is common practice to process datasets containing
huge numbers of features. In such cases, Feature Selection (FS) is often involved.
Meanwhile, owing to their excellent global search ability, evolutionary
computation techniques have been widely employed to the FS. So, as a powerful
global search method and calculation fast than other EC algorithms, PSO can solve
features selection problems well. However, when facing a large number of feature
selection, the efficiency of PSO drops significantly. Therefore, plenty of works
have been done to improve this situation.… More >
Open Access
ARTICLE
Journal on Big Data, Vol.1, No.1, pp. 25-38, 2019, DOI:10.32604/jbd.2019.05800
Abstract Graphical methods are used for construction. Data analysis and visualization are an important area of applications of big data. At the same time, visual analysis is also an important method for big data analysis. Data visualization refers to data that is presented in a visual form, such as a chart or map, to help people understand the meaning of the data. Data visualization helps people extract meaning from data quickly and easily. Visualization can be used to fully demonstrate the patterns, trends, and dependencies of your data, which can be found in other displays. Big data visualization analysis combines the… More >
Open Access
ARTICLE
Journal on Big Data, Vol.1, No.2, pp. 55-69, 2019, DOI:10.32604/jbd.2019.06110
Abstract Haze concentration prediction, especially PM2.5, has always been a significant focus of air quality research, which is necessary to start a deep study. Aimed at predicting the monthly average concentration of PM2.5 in Beijing, a novel method based on Monte Carlo model is conducted. In order to fully exploit the value of PM2.5 data, we take logarithmic processing of the original PM2.5 data and propose two different scales of the daily concentration and the daily chain development speed of PM2.5 respectively. The results show that these data are both approximately normal distribution. On the basis of the results, a Monte… More >
Open Access
ARTICLE
Journal on Big Data, Vol.1, No.2, pp. 79-88, 2019, DOI:10.32604/jbd.2019.05806
Abstract In this paper, the research advances of ontology and its application are reviewed firstly. With the development of ontology technology, subject-oriented web information retrieval technology combining ontology has been becoming one of the hot scientific issues. The innovative method of the semantic web technology combined with the traditional information retrieval technology is put forward, and the related algorithm based on ontology for judging the relevancy with different topics is also represented, and has proved to be effective in given experiments. More >
Open Access
ARTICLE
Journal on Big Data, Vol.2, No.1, pp. 1-8, 2020, DOI:10.32604/jbd.2020.01001
Abstract Water resources are one of the basic resources for human survival, and water
protection has been becoming a major problem for countries around the world. However,
most of the traditional water quality monitoring research work is still concerned with the
collection of water quality indicators, and ignored the analysis of water quality
monitoring data and its value. In this paper, by adopting Laravel and AdminTE
framework, we introduced how to design and implement a water quality data
visualization platform based on Baidu ECharts. Through the deployed water quality
sensor, the collected water quality indicator data is transmitted to the big… More >